{"content": "A Brief History of wine\n\n\nThe wine has a long history ten thousand years ...Were the Sumerians to grow grapes in the area between Turkey and Iraq, and to discover the fermentation of must also be exporting the product: from tables found that in the sixth century BC King Nebuchadnezzar in Mesopotamia received the wine as a gift. Sumerians learned from the Greeks and the Etruscans and later the Romans.The wine, however, was short-preservation and to be able to transport and trade of substances were added preservatives such as honey and resin.The Nets, who lived in the North-East of Italy in the last 5 centuries BC, they found a production method that was unnecessary the addition of preservatives: After harvesting the grapes were hanging out to dry thus concentrating the sugars, making the sweet wine and strong process still used today to Recioto and Amarone.The resulting wine was stored in wooden barrels, material that was abundant in the area. The Romans called this wine, which was much appreciated by the emperors, \"Rhaetian\". The Nets were a native people of the Alpine and pre-Alpine Central and Eastern Europe between Lake Como and the Adriatic Sea and had developed a considerable civilization in the fifth century BC It is believed that the Etruscans, who visited the area in order to trade in livestock and products such as iron and wine, had a strong influence on the lexical language, the Rhaetian. After the Roman conquest in 15 BC, who gave his name Raetia the area, the population Rhaetian assumed the Latin language, with the passing of generations became \"Ladino\" or \"Romansh\", a language that today are central in the Dolomites.THE RED GARDA WINEThe Red Del Garda DOC is produced in the area between Sirmione and Salo from Cabernet, Cabernet Franc, Cabernet Sauvignon, Merlot, Pinot Noir, Marzemino, Corvino and Barbera and can be purchased among other things by the Cantine Visconti di Desenzano: www.luganavisconti . itThe wine is intense ruby ??red color and bright, vinous, typical of dry, fruity, distinctive, slightly bitter. With a minimum alcohol content of 12% and a year of aging can be called \"Superior\".", "pred_label": "__label__1", "pred_score_pos": 0.5871995687484741} {"content": "Tecate, CA Area Scholarships | Fastweb\n\nTecate, CA Area Scholarships\n\nTecate is an unincorporated community in the Mountain Empire area of southeastern San Diego County, California, directly adjacent to the Mexican city of Tecate, Baja California. The area is best known for its border crossing between the United States and Mexico, and nearby Tecate Peak.\n\n\nSchools in and around Tecate, CA", "pred_label": "__label__1", "pred_score_pos": 0.9899953603744507} {"content": "A person may go through a traumatic event, and never realise what the effect the trauma had on them.   It may even be up to a year or two or more afterwards before the person may feel stuck from experiencing trauma.    As a result of trauma, a person may begin to feel unsure of themselves, they may feel frightened or nervous in given situations.      A person may be completely oblivious to what has happened to them, not knowing that the trauma that they experienced in their life is causing them to feel this way.\n\n\nOn the other hand, a person who experienced a trauma may be well aware of the trauma, and may feel nervous or anxious as a result of the trauma.    These feelings of nervousness as a consequence of a trauma may begin to interfere with their life.   The trauma may be causing them to avoid social events or the person may begin to be become more introverted.    Indeed, trauma may cause a person to feel huge fear in any given situation.\n\nHow can Counselling help You?\n\nCounselling can help you to firstly identify that what happened when you experienced the trauma be it a year ago or recently that is now causing problems in your life.   When an individual speaks about the trauma, it may well be the first time they ever spoke to anyone about it.      Once the person begin to speak about the trauma, whilst, they may be going back over the trauma, the person will begin the process of healing as a result of that event.\n\n\nSometimes, when a person experiences trauma in their lives, it may leave a scar such as, being unable to perform a certain task.    In this case, Patricia will normally give her clients coping mechanisms to deal with the trauma.   Patricia finds that Mindfulness Cognitive Behavioural therapy works with clients who have experienced a trauma, in that it helps the person to focus on where they are now.   The mindfulness cognitive behavioural therapy brings the focus to the present.\n\n\nIt is always a privilege to work with people who have experienced trauma, to see them face their trauma with courage, and ultimately see the individual come through as a stronger individual.", "pred_label": "__label__1", "pred_score_pos": 0.9907664060592651} {"content": "Blur, is a pop song with an urban influence and was produced by Danja, recalls a morning after a party. It was compared to In the Zone's Early Mornin'\" and was well received by critics. The song is listed as one of Danja's best productions. .\n\nOther Similar Songs\n\nOther popular songs similar to \"Blur\" by Britney Spears.", "pred_label": "__label__1", "pred_score_pos": 0.5640658736228943} {"content": "Enniskillen memorial - The powerful role symbols can play\n\nA new memorial to the victims of the Enniskillen bombing is to be unveiled on Sunday at a ceremony to mark the 30th anniversary of the IRA attack in which 11 people were slaughtered.\n\nTaoiseach Leo Varadkar will be there and is expected to sport the Shamrock poppy that he displayed in the Dáil this week, to the bemusement of some of his colleagues.\n\nHis predecessor, Enda Kenny, broke new ground in 2012 by first attending a Remembrance Sunday service at Enniskillen, Co Fermanagh. He did so for the following four years, but never wore a poppy.\n\nThe flower that blossomed on the graves of the fallen in the First World War has become a symbol of togetherness and of remembrance for millions of people in Britain and Northern Ireland, but in the south, its wearing is often looked upon with suspicion.\n\nIts association with the Royal British Legion has ensured it has never gained widespread approval here.\n\nThat is a pity as it remains a poignant reminder of the tens of thousands of Irishmen who fought and died not just in the First World War but the one that followed it.\n\nMr Varadkar’s decision to wear the poppy reflects the greater recognition here of those Irishmen who fought and died serving with British forces.\n\nHis gesture may be viewed as merely symbolic, unimportant in the wider scheme of things.\n\nBut symbols, along with individual actions and statements, are hugely important.\n\nOne person can make all the difference and there is no finer example of that truism than Gordon Wilson.\n\nAfter the 1987 Remembrance Sunday explosion in Enniskillen, two searing images flashed on television screens around the world. The first was of the destruction and devastation wrought by the IRA bomb that killed 11 Protestant civilians as they gathered at the town’s cenotaph for the annual commemoration to honour those who had died in the Great War. A 12th victim died in December 2000 after spending 13 years in a coma due to injuries sustained in the attack.\n\nThe second was an imaginary vision of the local draper cradling his 20-year-old daughter as she died in his arms. Gordon and Marie, who was a nurse, were trapped in rubble that resulted from the explosion. He survived with minor injuries but she died shortly afterwards.\n\nTheir brief, last conversation among the debris remains one of the post poignant and heart-breaking moments of the Troubles.\n\nWhile assuring him that she was all right, her life was ebbing away and her last words to her beloved father were: “Daddy, I love you very much.”\n\nEven in the midst of his overwhelming grief, Gordon found the Christian charity to forgive those who murdered his child. “She was a great wee lassie,” he said.\n\n“She was a pet, and she’s dead. But I bear no ill-will, I bear no grudge.”\n\nWhen the Taoiseach attends Sunday’s memorial in Enniskillen, we should all spend a moment to reflect not just on the heroes of war but on a remarkable hero of peace.\n\nGordon Wilson went on to become a key figure in the peace process. He is a saint, in every sense of that word.\n\n\n\n\n\n\nMore From The Irish Examiner", "pred_label": "__label__1", "pred_score_pos": 0.8800677061080933} {"content": "PPC’s Directors have successfully delivered over $1 Billion in business change programmes, have broad and deep industry and international experience, and know how to get projects done.\n\nWe understand the drivers for change, the investment it represents, the impacts on your customers, staff, processes, and systems, and the importance of achieving the value and outcomes intended.\n\nWe believe the biggest cost of Change is not the resource applied - the money, people, consultants, buildings, technology, training and more. It is the lost opportunity created by mis-aligned Project and Programme Management, and by the need for better integration of Change activity into and across the organisation.\n\nWhy PPC?\n\nOrganisations want to deliver change that is cost effective, with real and measurable benefits; minimising disruption and maximising positive impact on customers and staff, creating maximum benefits to Stakeholders, with as short a cycle time as possible.\n\nWe know how to make sense of this, and how to build momentum while gaining clarity. PPC are particularly competent at ensuring all change is aligned to strategic intent, to the Values of an organisation, and to clear outcomes. We have developed our own methodologies and have shown that where we apply them, the results are measureably better.", "pred_label": "__label__1", "pred_score_pos": 0.9898208379745483} {"content": "Download the Schwab app from iTunes®Get the AppClose\n\nTips for Helping Elderly Parents With Their Finances\n\nKey Points\n • Talking to aging parents about their finances and next phase of life may be difficult, but it's essential to help them make a smooth transition.\n\n • From their current finances to the choice and cost of future living arrangements to protecting them from fraud, the more information you have now, the more help you can be in the future.\n\n • Parents, if your kids hesitate to start the conversation, help them out by bringing these topics up yourself—for the benefit of all of you.\n\nDear Carrie,\n\nMy parents are in their early 80s. Fortunately, they're in relatively good health and still quite independent, but I want to help them be prepared should things change. How can I get involved with their finances without being intrusive?\n\nA Reader\n\n\nDear Reader,\n\nWhile popular wisdom might say that 80 is the new 60, the reality of aging means that no matter how young we may feel now, chances are we're going to need some type of help in the future. And while it's often difficult to get older adults to accept that possibility, being prepared ahead of time is the best way to ease the transition.\n\nThat said, money can be a touchy subject at any age, so you're wise to be sensitive to your parents’ desire for independence and their potential reluctance to discuss the future. But the realities of today—particularly the prevalence of scams targeting the elderly and elder abuse—mean that it's more important than ever to get the conversation going.\n\nStart by asking your parents about their current financial security\n\nA lot of families don't like to talk about money but if you come from a position of concern for your parents' current wellbeing, they might feel more comfortable. And at their age, it only makes sense for them to share certain financial details with their family. Here are some questions to start with.\n\n • Are they easily handling everyday expenses? Do they have enough income to cover the essentials—or even things like a gym membership that help them thrive? If they're struggling to stay on top of bills or debts, you might help them create a more realistic budget or set up automatic payments for certain monthly expenses. You may take something like auto-pay for granted, but your parents may not have considered it.\n • Do they have a financial advisor? Would they be willing to introduce you and perhaps include you in a meeting? If they don't have an advisor, maybe you can take the lead in helping them do a simple financial plan. At the very least, you might help them take an inventory of their financial resources—pensions, IRAs, brokerage accounts, and Social Security benefits—so they have a clear idea of the money they have available for both the short and long term.\n • Have they updated their estate plan? Perhaps you've already talked to them about whether or not they have an estate plan in place, including an Advance Healthcare Directive and powers of attorney for both finances and healthcare decisions. If not, don't hesitate to bring it up because a basic estate plan is something everyone should have no matter their age—yourself included. If they have a plan, when was the last time they reviewed it? Have things changed since then?\n • Are important documents accessible? In case of emergency, it's important that you or someone else your parents trust be able to locate important documents. These can include: wills, trusts, bank and brokerage statements, insurance policies, mortgage documents and safe deposit box information as well as passwords for online accounts.\n\nWhen introducing these topics, make it clear that you're not questioning their capability; you just want to be a resource should they need help.\n\nDiscuss their views on future living arrangements\n\nThe 90-year-old mother of a friend of mine is adamant that she wants to stay in her own home no matter what. On the other end of the spectrum, another friend's parents decided to move into a continuing care retirement community before it became necessary because they wanted to make the decision while they were still capable. You might want to talk to your parents about their preference should they need physical help. Position it as just an exploration of future possibilities—not any recommendation on your part.\n\nIf they're open to the idea of moving into a senior community at some point, now might be the time to do a little research together on senior living facilities in their area.\n\nPlan ahead for the cost of care\n\nHome care and assisted living are both costly propositions. According to the Genworth 2018 Annual Cost of Care survey, the national median annual cost for assisted living is $48,000; a home health aide is slightly higher at $50,336. And so much depends on where you live. In the San Francisco Bay Area, those home care costs are closer to $70,000 a year. In Alabama, they're under $40,000. And these costs are generally per person.\n\nFrom a practical standpoint, it makes sense to discuss your parents' desires and the potential costs ahead of time so they know what their real options are. While future care can be an emotional flashpoint, it's also an important financial consideration because they—and you—should know what they're able to afford and if you might need to supplement any costs.\n\nKnow what benefits and services are available\n\nAccording to the Council on Aging, there are more than 2,500 benefits programs nationwide to help with the cost of elder care. And it's easy to do an online benefits checkup. The Family Care Navigator provided by the National Care Giver Alliance can also help you find support services in your state. and your local Area on Aging are also helpful resources.\n\nBe on the alert for abuse\n\nFinancial fraud is a very real threat these days. According to SIFMA, seniors in the U.S. lose an estimated $2.9 billion every year in financial exploitation. And that's only the reported cases. While senior investor protection laws are in place in many states and more are in the works, I think everyone needs to be on the alert for any kind of potential scam. SIFMA is a good resource for specifics on what to watch out for and action you can take.\n\nBe sure to discuss this with your parents. As a precaution, it might be wise at some point for you or another trusted family member to have your name on certain of your parents' accounts to monitor transactions.\n\nHave a family meeting\n\nYou don't say if you have siblings, but if so it's important that all of you are aware of your parents' situation and desires, and agree on who is going to take the lead. It's important for two reasons: 1) to assure there's no misunderstanding or disagreement if your parents do need help in the future, and 2) to make sure that whoever takes the lead gets the support they need in what could be a very difficult situation.\n\nKeep talking—and listening\n\nIn sensitive situations like this, it's all about communication style and approach. While the burden can often fall on the kids to get the conversation going, I want to encourage any older adults reading this column to help their children out by bringing these things up themselves. The more open you all are and the more mutual understanding there is about the future—both emotional and financial—the more you'll all be able to enjoy the present.\n\n\n\nWhat You Can Do Next\n\nInvestment Expenses: What’s Tax Deductible?\nTake Me to Your Leader: Analyzing the Latest Leading Indicators\nTake Me to Your Leader: Analyzing the Latest Leading Indicators\n\n\n", "pred_label": "__label__1", "pred_score_pos": 0.634192943572998} {"content": "You are on page 1of 14\n\n\nLegal Translation and Functionalist Approaches:\n\na Contradiction in Terms?\n\nGiuliana Garzone\nUniversity of Bologna, Italy\n\nAt a time when the distinctive quality of the language of the law, which marks it off from\nordinary language and makes it a case apart even in the field of special languages, has been\nrecognised, and legal translation is no longer regarded simply as a particular case within the\ngeneral framework of LSP texts, a certain reluctance has emerged to accept the application of\na general translation theory to include the translation of legal texts. A case in point is\nfunctionalism, whose advocates claim their theories to be comprehensive and suitable for\napplication to all types of translations in all situations, which obviously implies applicability\nto legal translation. This has attracted serious objections by many scholars of different\n\nIn this paper I shall discuss whether it is legitimate to propose the application of functionalist\ntheories to legal translation.\nThe question is of extreme importance: a positive answer would\nprovide a good starting point for the construction of an all-embracing theoretical model\napplicable to all text-types and genres in legal translation, something all the more desirable if\none considers that so far most studies have had their starting point in a specific experience in\none area of this very broad field, so that the theoretical concepts proposed, however viable,\nhave tended to be all but comprehensive in their scope of application. Incidentally, it has to be\nspecified that this discussion will focus exclusively on authentic texts, i.e. texts that the\nphilosopher Felix E. Oppenheim (1944: 60) has described as sentences of law, being endowed\nwith performative and/or prescriptive force, while leaving out statements about sentences of\nlaw, i.e. metatexts, such as textbooks and specialised and non-specialised publishing, which,\nalthough dealing with juridical topics, have no legal validity.\n\n1. Functionalism and legal translation\n\nIn traditional translation theory, legal texts have been regarded simply as a special case within\nthe general framework of LSP texts, which in turn were considered to fall within the scope of\nthe general theory.\n\nHowever, the past two decades or so have shown a growing consciousness of the diversity of\ndiaphasic varieties subsumed under the general heading of languages for special purposes\non the one hand, and on the other hand the emergence of a number of factors - an exponential\nincrease in international contacts both on the individual and community level (international\ntrade, communications, emigration, tourism etc.), and political and economic integration\ninvolving gradual integration between legal systems (e.g. EU); and in bilingual (and in some\ncases bi-juridical) countries there is an ever growing attention for equal language rights,\nwhich has contributed to attracting substantial theoretical attention on legal translation.\n\nAt the same time, a radical change in perspective has occurred in translation theory: with the\nemergence of approaches centred on communicative and pragmatic factors, growing emphasis\nis now placed on translation as a communicative and intercultural action, leaving behind all\napproaches focussing exclusively on linguistic aspects. The translator is no longer considered\na passive mediator but rather an intercultural operator, whose choices are increasingly\n\nrecipient-oriented, being based not only on strictly linguistic criteria but also on extra-\nlinguistic considerations, first and foremost the function of the translated text in the target\nculture. In this functionalist line of thought centred on the concepts of skopos and target-\norientedness, the source text is no longer to be seen as the only standard for judging a\ntranslation, which is now also assessed on the basis of its adequacy to communicative purpose\nin the target culture (e.g. Reiss-Vermeer, 1984; Hnig-Kussmaul, 1982; Nord, 1991, 1997).\n\nAs for the applicability of this approach to legal translation, not only do its advocates claim\ntheir theories to be comprehensive and applicable to all text types in all situations (Vermeer,\n1982: 99), which implies their applicability to legal translation as well, but Hans Vermeer\nhimself, the founding father of this School of thought, extends the validity of his Skopos\ntheory explicitly to legal translation (Reiss-Vermeer, 1984: 158), providing practical\nexamples of its application to specific text types (Vermeer, 1986: 34: see 3.1 below).\n\nBut doubts have been raised by scholars of different backgrounds as to whether functional\napproaches can be legitimately applied to LSP texts (e.g. Fluck, 1985: 136) and in particular\nto legal texts (e.g. Soffritti, 1987; Trosborg, 1994; Madsen, 1997). The main objections are\ncentred on the typical recipient-orientedness of functional approaches, which seems\nunacceptable for legal language, subject as it is to rigorous rules of interpretation. This\ncomes to no surprise for a theory which in its most extreme statement proclaims the\ndethronement (Entthronung) of the ST, an idea which seems inadmissible in the perspective\nof legal translation where the ST is sacred writ. On the whole, functionalism and legal\ntranslation seem to be in glaring contradiction.\n\nYet, there are some extenuating factors to be taken into account. First of all, some of\nVermeers statements are extremely categorical and provocative, as ground-breaking\ntheoretical statements often are, but need not be taken literally. He himself has displayed a\ndegree of moderation in illustrating and applying his theories. On the whole, for all its\nprovocativeness, in perspective the advent of functional theories has had the effect of bringing\nhome the idea that translatology should do away with the rigid prescriptiveness of the past\nand with the quest for rules of equivalence based only on the criterion of loyalty to the ST\nwith no regard for the use to which the translated text is to be put.\n\nSecondly, as we shall see (see 3. below), even in the legal field where the source text, in its\nmeaning, its intention and its force, has to be scrupulously analysed and interpreted, in many\nsituations more than one translation project is possible and the translator has to make\nher/his strategic decisions on the basis of a number of variables, thus leaving space for the\napplication of functional criteria even in a context of absolute respect for ST meaning and\nvalues. This point will be illustrated by means of practical examples later on in the discussion.\n\nThirdly, one point against the acceptance of functionalism in this area has been the reluctance\nof experts to accept the idea that a theory which is general in nature and not tailor-made\nshould be applied to legal translation. As a matter of fact, many distinguished scholars in the\nfield have simply ignored functionalism altogether, an inattention which at least in part may\nalso be connected with the desire to claim the uniqueness of the language of the law, even\nwith respect to other LSPs.\n\n2. Distinctive quality of legal discourse\n\nThe distinctive quality of legal texts, and hence of legal translation, now acknowledged in\ntranslatology, has long been recognised by jurists and jurilinguists (Gmar, 1995 I: 144) who\nhave pointed out that the legal translator has to cope with problems that are different from\nthose encountered in other sectors. This is why a general translation theory, albeit conceived\nfor comprehensiveness and extensive application, seems to be somehow inadequate.\n\nLegal translation is certainly among the varieties of translations where the translator is subject\nto the heaviest semiotic constraints at all levels: the language of the law is typically formulaic,\nobscure, archaic; legal discourse is culturally mediated; legal texts have a special pragmatic\nstatus. These features deserve a closer examination.\n\nUnder a purely formal perspective, legal writing is typically ritualistic and archaic, being\nsubject to very strict stylistic conventions in terms of register and diction as well as highly\ncodified genre structures. There are heavy constraints at all levels, from the macro-structure\nof texts, to paragraphs, sentences and phrases, with systematic resort to standardised forms,\noften archaic and uncommon in ordinary text practice, stock phrases, rigid collocations and\nspecialised cohesive devices for anaphoric and cataphoric as well as homophoric and\nintertextual reference (Gotti, 1991: 105-110). These frozen patterns of language which allow\nlittle or no variation in form (Baker, 1992: 63), sometimes referred to as routines (Hatim-\nMason, 1997: 190), can be translated only by making resort to parallel routines in the target\nlanguage. In addition, legal discourse, in contrast with other varieties of LSP is inherently\nintricate and obscure, reflecting the complexity of legal thought and reasoning, but also the\nverbosity and pompousness traditionally associated with the legal and judicial professions\n(Mellinkoff, 1963: 25). Although the one-sentence rule has officially been put aside today,\ntoo often the information load borne by each sentence is extremely heavy, thus giving rise to\nremarkable sentence length (Gustaffson, 1975; Hiltunen, 1984; Bhatia, 1987, 1994) as well as\nto very complex syntax, with a high incidence of embedded clauses, a high level of hypotaxis,\nfrequent resort to left-branching subordinate clauses, recurrence of syntactic discontinuities.\n\nFor the translator, this complexityoften bordering on obscuritynot only makes the\ndecoding task more arduous, but in many cases also requires a real hermeneutic effort on\nher/his part, far beyond the scope of the ordinary decoding and interpreting required for other\nkinds of translations. This is highly problematic. While legal professionals like lawyers,\njudges and jurists are competent in hermeneutics as part of their essential armoury of skills, it\nis usually not so for the translator who, in her/his interpreting efforts, is constantly at risk of\noverstepping the limits of her/his professional competence.\n\nAll this is further complicated by the culturally mediated nature of legal discourse, which\ndetermines profound differences in categories and concepts between legal systems, and in\nparticular between English law and its Roman-Germanic continental counterparts, suggesting\nsome degree of incommensurability between texts produced within the framework of common\nlaw and civil law systems respectively. As a matter of fact, there are juridical concepts in\nRoman law that simply do not exist in common law legal systems (e.g. potest dei genitori,\npuissance paternelle; dolo, dol; forza maggiore, force majeure) and viceversa (e.g. bail,\nestoppel, tresspass); there are concepts that bear the same name but, not being\ncorrespondent, are simply false cognates, e.g. contract/contratto, civil law/diritto civile,\ncommon law/diritto comune (David-Brierly, 1985: 20ff; 308ff.); a substantial divergence\nexists even in the basic definition of the legal rule (norma giuridica, rgle de droit). The\ntranslating procedures necessary to overcome these difficulties in actual translating practice\nusually go under the denomination transposition juridique, i.e. legal transposition (Didier,\n1991: 9; Crpeau, 1995: 52-53; Sarcevic, 1997:12-13). This inherent difficulty of legal\n\ntranslation has made it a good case in point in discussions of untranslatability. But, since in\nactual practice legal translations are produced and used every day, for a translator this\nsuggestion of untranslatability is only an abstract concept that serves to highlight the\nremarkable degree of difficulty of her/his work.\n\nAs for the special pragmatic status of legal texts, it is connected essentially with their\nperformativity: they not only describe, report, narrate and point out facts, information and\narguments, but also have the property of performing legal actions and imposing obligations\n(Austin, 1962; Benveniste, 1990a; 1990b). This applies also to translated legal texts when\nthey are authoritative: one of the reasons why legal translation is so problematic is that in\nmany cases the new text will be as legally binding as the ST and have legal consequences.\n\nIn studies of the language of the law, it is thanks to the parallel development of the theory of\nspeech acts and under the stimulus of Wittgensteins doctrine of the multiplicity and\npotential countlessness of sentence types and language games (Carcaterra, 1994: 225) that\nthe idea has been brought home that the traditional classification of discourse found in legal\nlanguage (based on Bhler, 1934), which included descriptive (informative) and prescriptive\n(vocative) discourse (expressive discourse hardly exists in legal texts), is inadequate to\naccount for all of its aspects, as is evident from the above discussion. Therefore, a\nperformative function has been added, which in its theoretical variety\nis called constitutive\nby jurists (Carcaterra, 1994: 225ff.).\n\nWriters who have applied Bhlers classification of text functions to translation (e.g.\nNewmark, 1982; Reiss, 1989) have tended to ignore this addition, however. Sarcevic, (1997:\n10) herself comes to the conclusion that authoritative legal texts, being regulatory, are\nessentially connotative in nature.\nIn dealing with contracts Trosborg (1994: 312ff.), while\ncorrectly emphasising that legal speech acts cannot be translated literally, classifies them as\ndirective, commissive and constitutive (using the word constitutive, quite oddly, not with the\nmeaning of performative but rather to mean sentences used to explain or define\nexpressions and terms in the contract or to supply information concerning the application of\nthe statute), thus overlooking performativeness altogether. As a consequence, when\ndiscussing the meaning of verb forms in legal speech acts in a translation, she attributes a\npurely deontic meaning shall, while in legal texts, as I have shown elsewhere (Garzone, 1996:\n68ff.; 1999a), this modal can also have a performative meaning depending on the context,\nwith obvious implications for translation decisions.\n\nThese observations on the one hand shed light on the particularly sensitive nature of legal\ntexts, which contributes to making their translation especially critical and problematic, and on\nthe other highlight the crucial role of pragmatic considerations in the choice of a correct\ntranslation strategy.\n\n2.1. The notion of legal equivalence\n\nThe complexity of legal discourse and its pragmatic status help explain why approaches to\nlegal translation have historically\nbeen focused mainly on the preservation of the letter rather\nthan on the effective rendering in the target language; legal texts having always been\naccorded the status of sensitive texts and been treated as such.\n\nA real challenge to the unquestioned application of what Sarcevic, (1997: 24) calls a strict\nliteral approach to legal translation came only in the Nineteenth and early Twentieth century,\nwhen multi-ethnic countries (Austria, Switzerland, Belgium) endowed themselves with\n\nmultilingual legislation. Here by definition all the translations of a statute were supposed to\nhave the same authentic status and this gave rise to the need to improve the quality of the\nparallel texts of legislative instruments: a slavishly translated document is totally subordinate\nto its original; rarely does it have the dignity of an authentic text.\n\nOver time, a change in perspective occurred with a gradual shift towards a more flexible\nattitude, eventually giving rise to the need to define new criteria of equivalence specific to\nlegal translation. Thus, the principle of legal equivalence emerged (Beaupr, 1986: 179;\nHerbots, 1987), which adds the consideration of the legal effects that a translated text will\nhave in the target culture (Gmar, 1997: 81-85) to other criteria of equivalence. Of course, in\nliterature on translation, the concept of equivalence is as recurrent as it is vague and\ncontroversial, and how to achieve it in actual practice has been one of the most widely\ndebated issues, especially during the 1970s and early 1980s and among German scholars.\n\nBasically, the criterion of legal equivalence is akin to the concept of functional equivalence,\nendorsed in this specific field by a number of authors (e.g. Pigeon, 1995; Gmar, 1995, I:\n148ff.; Scarpa, 1997: 103). In terms of general translation theory, both principles have their\ncounterparts, mutatis mutandis, in other notions proposed by eminent theorists, e.g. Nida and\nTabers dynamic equivalence (Nida-Taber, 1969: 22-24), Kollers pragmatic equivalence\n(1992: 187) and Newmarks communicative translation (Newmark, 1982: 38-56).\n\nIncidentally, according to the principle of legal equivalence, the translation of a legal text will\nseek to achieve identity of meaning between original and translation, i.e. identity of\npropositional content as well as identity of legal effects (Sager, 1993: 180), while at the same\ntime pursuing the objective of reflecting the intents of the person or body (legislator, lawyer,\njudge etc.) which produced the ST. In specifically linguistic and translational terms this\ncorresponds to identity of propositional content, illocutionary and perlocutionary force, and\nintentionality (de Beaugrande-Dressler, 1981: 3-11; 113ff.) or author intent (Neubert-\nShreve, 1992: 70-72).\n\nThe emergence of the concept of legal equivalence marked a turning point in the history of\ntranslation in this field. Although ultimately it still takes the source text as the yardstick\nagainst which the standard of a translation is assessed, being as yet based first and foremost\non the criterion of interlingual concordance, i.e. intertextual symmetry or intertextual\ncorrespondence (Sarcevic, 1997: 202 ss.), its advent has sanctioned the definitive end of the\ntraditional preference for an approach aimed at preserving the letter of the original as much as\npossible, and the shift to a more dynamic attitude.\n\n3. Legal translation in practice: some examples\n\nBut the crucial point is whether the concept of legal equivalence is applicable to all text types,\ngenres and sub-genres in legal translation. A brief review of some of the most common\ntypologies of legal translations and the translational procedures routinely implemented in\nactual practice, based on pragmatic criteria, e.g. considering the legal force of the original and\nof the translated text respectively, will show that the concept of legal equivalence is not\nunconditionally suited to all situations and text types and confirms that in many cases the\ntranslator adopts a different approach: quite significantly, this criterion was originally\nformulated in a bilingual (and often bi-juridical) context, and finds its rationale in the\nnecessity that the translated text should have autonomous force, i.e. independent legal\nvalidity. Other categories of legal texts may have different pragmatic characteristics (i.e.\ndifferent felicity or validity conditions) thus requiring different translating procedures.\n\nLets first consider the texts generated within the framework of a single national legal system.\nBecause of their lack of extraterritoriality, the validity of nationally-enacted legal documents\nis limited to the territory of the country where they are issued, their involvement in its legal\nsystem being part of the felicity conditions of the performative prefix (Austin, 1962: 14-15;\nLevinson, 1983: 244ff.) that opens and guarantees each of them. The translation of these\ntexts is aimed at informing the addressee about the original legal instrument, in certain cases\n(e.g. a divorce decree or an act of extradition) in view of its transcription and validation in the\nlegal system of the target language; the TT is not in itself authoritative: it will become so after\nsuch transcription or validation has been effected. The approach adopted in the translation of\nthis category of legal texts is usually literal since the translated version is a Verstndnishilfe,\nhaving the status of a parallel text, a gloss or a commentary to be used as a key of access to\nthe original, which has no legal validity of its own. Within this framework a special cases is\nthat of sworn translations for which in some countries a strict literal approach, indeed\nbordering on interlinearity, is prescribed.\n\nIt is unquestionable that this first category of texts does not fall within the scope of legal\nequivalence, for reasons that are more than obvious; however, strict literal translation is not\nthe only strategy that is possible. Given the absence of legal validity of the translated version,\nthere may be situations where a free approach can be taken, if the aim is only that of making\nthe addressee of the target text aware of the function of the original in the source language\nculture, with no other institutional constraints. Italian jurist Sacco (1994, 490) gives the\nexample of a thriller book, where the English word attorney can legitimately be translated\ninto Italian with pubblico ministero and executor with esecutore testamentario, although these\njuridically inaccurate translations would hardly be acceptable in a specialised context.\n\nA second category of texts consists in documents drawn up in bi-lingual and/or bi-juridical\ncountries, of which probably the best known example is Canadian legislation. Both the ST\nand the translation have the status of official authentic texts. The criterion applied is that of\nlegal equivalence, originally developed specifically for this category of texts, which is\ndynamic and often requires a degree of interpretation and sometimes transposition juridique:\nall texts should sound natural and effective, since each of them is independent and endowed\nwith autonomous legal validity.\n\nAs yet another category is that of hybrid texts, i.e. texts produced in a supranational\nmulticultural discourse community where there is no linguistically neutral ground (Trosborg,\n1997: 145-146), including most international instruments. All translations in the official\nlanguages of the international agency or body issuing a convention, a treaty, a protocol etc.\nare equally authentic and are presumed to have the same meaning.\nEvery version, after\nratification on the part of the country involved, will have autonomous legal validity in its\nterritory. Here again, as in the previous case, the principle of legal equivalence applies, at\nleast in theory; but in actual practice international instruments, which most of the time are\nnegotiated within commissions made up of members of different nationalities (Sarcevic,\n1997: 204), are drawn up in a much more straightforward language so that quite often the\npursuit of legal equivalence can go hand in hand with literal translation.\n\nThe terms of the problem are to a certain extent different when these same international legal\ninstruments are translated into languages that are not the official ones of the issuing\norganisation, for instance the Italian version of a Convention issued by OECD, whose official\nlanguages are English and French. In line of principle its purpose is purely informative and\nhas no legal validity, which means that a merely documentary rendering would suffice, but in\npractice this kind of translation is the main vehicle through which the provisions of an\n\ninternational instrument are enforced after adoption and ratification by the national parliament\nof the country involved, even if formally it is one of the official versions that is adopted.\nHence the danger that a slavish translation might give rise to incorrect enforcement\nconsequently the need to comply with the criterion of legal equivalence.\n\nAmong hybrid texts a special case is that of European Union legislation, in spite of a\nwidening margin of creativity in certain (non-restricted) parts of European instruments\nmainly at lexical and terminological level, intertextual correspondence (i.e. interlingual\nconcordance) still seems to predominate in substantive provisions (Sarcevic, 1997: 225), also\ndue to uniformity of text formats across languages within the EU. At the same time, efforts\nare being made to find a common ground by introducing specific European terminology into\nall languages, with new terms specially created for this purpose. When a European term is\nnot available, conceptual coincidence is forced upon terms that are not inherently equivalent\nacross languages and legal systems. Thus, gradually, a special language that has been\ndescribed as Euro-legalese is being generated, which in time will make the translators task\nmuch easier.\n\nThe last category of texts which will be considered here includes international documents\nregulating the relationships between private subjects in different nations. In this case, the\noriginal text agreed between the parties is not necessarily authoritative; an international\ncontract, for instance, will be interpreted according to the law governing it, regardless of the\nlanguage in which it is written, and will be drawn up according to the rules and drafting\nconventions of the national law applicable to it.\n\nThis is the case to which Vermeer refers in his proposal to apply Skopos theory to legal\ntranslation and in fact it is that which seems to be best accounted for by such theory: the\nsource text offers the input on the basis of which a new autonomous text is created in the\ntranslation language taking into account mainly the needs of the final users. In this connection\nVermeer (1986: 34) proposes the example of an insurance contract which is translated\ndifferently depending on its intended function: target-language formulas are resorted to if the\ntranslation is for use in practice, for the stipulation of insurance policies in a foreign country,\nwhile a source-language oriented approach is taken if the translation is to be used only as\ncourt evidence. Similarly, in order to show that the way the text is translated [is] dominated\nby the function of the translator in order to meet the clients needs, Obenaus (1995: 252)\ndiscusses the example of an original warranty statement drawn up by an American company:\nif the translation is to have legal validity in Germany, it will require a legal equivalence\napproach, while if it is commissioned by a German company willing to gain a better\nunderstanding of the type of warranties commonly granted in the USA, the translation will\nsimply be a footnoted explanation of the original.\n\n3.1. Viability of a functional approach to legal translation\n\nOn the basis of the above discussion, it is evident that in actual practice the criterion of legal\nequivalence is followed by translators only for certain categories of texts, while for others\ndifferent strategies are applied in order to guarantee adequacy to the function the TT is\nexpected to fulfil in the target situation. Of course, a translators behaviour is conditioned by\nrigidly codified linguistic practices, but for the overall translation project of any given text\ns/he has to make crucial choices that will govern her/his decisions down to the lower levels of\nthe process. In this respect s/he will be guided prevalently by functional considerations.\n\nThis functional orientation is evident not only in the selection of the overall strategy applied\nin translation, as illustrated above, but also in the very fine distinctions translators make, in\ncontrastive terms, between different text genres (Textsorten) and text types (Texttypen)\n(Reiss, 1989: 105; Nord, 1997: 37) as well as in the lower-level translating decisions made in\ndrafting the TT with regard to the definitive text format, layout and microstructures (sentence\norganisation, terminology). It is evident even in the solutions customarily adopted for the\nproblems that traditionally have attracted the most attention in this field, those associated with\nthe translation of terminology. In the absence of complete identity of meaning between two\nterms in different legal systems (see 2 above), an essentially onomasiological approach is\ntaken. Initially, the translator will draw upon her/his encyclopaedic knowledge of the subject\nor, more probably, conduct a thorough research in the literature and analyse parallel texts in\norder become fully aware at a conceptual level of the notion it refers to and to ascertain to a\nhigh degree of accuracy the syntactic, semantic and pragmatic value of the term. On this\nbasis, it will be possible to find a term in the TL that covers the same superabstract notion\n(Sacco, 1994: 490), i.e. broadly speaking a legal concept that is basically correspondent in the\nTL language and culture, albeit with differences due to the peculiarities of each legal system.\nAt this point, the reasonable course usually taken\nis to evaluate with great care the semantic\nfeatures that differ in the original term and its potential translation respectively, in order to\nascertain which discrepancies, if any, are actually relevant to the purpose of the text in\nquestion, and behave accordingly (Sacco, 1994: 490), i.e. either choose one of the near-\nequivalent terms available, making sure that the differences in meaning are not relevant to the\ncase in point, or adopt a solution that makes up for conceptual incongruencies resorting to a\ndescriptive paraphrase or adding an explanatory note (Sarcevic, 1991: 615; 1997: 231ff.;\nSmith, 1995: 188-189). Incidentally, the principle of relevance of semantic features to a given\ncontext is inherently functional and can be seen as the legal counterpart of the more general\nprinciple put forth by P. Kussmaul: try to reproduce just that semantic feature or those\nsemantic features which is/are relevant in a given context with regard to the function of your\ntranslation (Kussmaul, 1995: 92), which in turn is acknowledged by the author himself to be\nthe translatorial version of Grices maxim of quantity and maxim of relevance.\n\n3.2. Priority of functional criteria in the practice of legal translation\n\nThe reason for this priority of functional considerations in the practice of legal translation, in\nspite of all theoretical objections, is certainly to be found in the fact that functionalism is so\ngeneral in its theoretical formulations as to subsume all other criteria and so flexible as to\nenable the translator to take account of the distinctive nature of legal texts and in particular of\ntheir pragmatic characteristics, thanks to the absence of an absolute standard of equivalence.\nThe translators translation project will vary depending on whether the TT is to be\nauthoritative and, if so, whether it is to take its force from the same performative act as the\noriginal (as is the case in countries with a bi- or multi-lingual legislation) or from a new\nspeech act to be performed within the legal system of the target language.\n\nOf course, in theoretical terms, functional theories have attracted a lot of criticisms, with\ndetractors focussing their attention on the most categorical and provocative assertions of their\nadvocates. For instance, as already mentioned above, in the legal field Vermeers idea of a\ntranslation as an offer of information in the target language about an offer of information in\nthe source language (Reiss-Vermeer, 1984: 76) has been rejected on the grounds that it is at\nodds with the nature itself of legal texts, since they are not only informative but are by\ndefinition endowed with special performative (constitutive) or deontic (prescriptive) force\n(e.g. Madsen, 1997:18). However, it is true that virtually in all categories of texts discussed in\n3. above (with the exception of bilingual legislation) there are to be found translations that,\n\nnot being authoritative, actually are only offers of information about a SL original. It is also\ntrue that in spite of the reputation of functional approaches for being associated with free\ntranslation and scarce consideration for the original text, which would make them\nincompatible with legal translation, it is part of the rationale underlying them that the skopos\nof a certain TT may demand (or lead to) a literal translation (Vermeer, 1996: 41-42); in\nother words, as C. Nord (1997: 29) makes clear, the Skopos of a particular translation task\nmay require a free or a faithful translation, or anything between these two extremes,\ndepending on the purpose for which the translation is needed [...] There may be cases where\nrelative literalism is precisely what the receiver (or the client or the user) needs...\n\nIntertextual correspondence between ST and TT (Vermeer's fidelity)\nis still an issue,\nalthough it is seen as mainly determined by considerations dependent on the skopos of the\ntranslation rather than on the nature of the text to be translated: the criterion of concordance\nwith the ST is combined with that of coherence with the receivers situation and with the TTs\nintended use.\n\n4. Conclusions\n\nIn conclusion, objections to the adoption of functional approaches in legal translation can be\neasily rejected, notwithstanding the elements which appear to conflict with principles\ntraditionally applied in this field: most objections to functionalism can be refuted considering\nthe high level of abstraction of its theoretical assumptions.\n\nOn the contrary, the application of a functional approach seems especially suitable for the\ntranslation of legal texts, on account of their diversity, although it does not circumvent the\nproblem of equivalence, but rather poses it in different terms rejecting the idea that there\nshould be one single universally applicable concept of equivalence. Instead, it rather brings\nhome the notion that the degree of equivalence to be achieved in the translation of a given text\nis not absolute, but depends first and foremost on the TT intended function as well as on the\nnature of the ST: the whole process is governed by a principle located at a sufficiently high\nlevel of generalisation as to be suitable for virtually all types of legal texts.\n\nOf course, for application in the field of the law some of the most controversial corollaries of\nfunctionalism have to be modified or even discarded, due largely to the particular pragmatic\nstatus (i.e. legal force and validity) of legal texts, which is the overriding factor in\ndetermining the skopos of the translation.\n\nThere can be no doubt, however, that on the whole in legal translation a functional approach\nis not only viable, but recommendable as well as effective in consideration of its\ncomprehensiveness and flexibility. All the more so since an examination of translators\nbehaviour in the legal field (supra 4.) shows that actual translating practice is routinely based\non functional criteria. Thus, if one single unifying principle to guide the choices of legal\ntranslators is to be set out, a functional model seems to be the only viable alternative, mainly\non account of its high level of abstraction.\n\nSome of the arguments put forth in this paper are also discussed in Garzone, 1999b.\nSee also Kurzon (1991: 284), who considers only the sentences of law worthy of the name language of the law and\nproposes the denomination legal language for metatexts, a distinction which is meaningful but too subtle to be adopted\n\n\nconsistently. For an analytic classification of the different text genres to be included in each of Oppenheims two categories\nsee Bhatia, 1987: 227, modified (specifically for written texts) in Garzone, 1997: 216.\nThetic performatives are those that not only perform an action for the mere fact of being uttered, as athetic performatives\ndo, but also give rise instantaneously to a new state of things or new legal relationships or a new legal status. The terms\nthetic and athetic have been introduced by Italian scholar A.G. Conte (see for instance, 1994: 248-249). Austins examples\nE.a; E.b and (E.c) (\"I do [take this woman to be my lawful wedded wife]\"; \"I name this ship the Queen Elisabeth\"; \"I give\nand bequeath my watch to my brother\") are typically thetic; (I bet you sixpence that it will rain tomorrow) is athetic, like\nI thank you or I apologise. See also Garzone, 1996: 47ff.\n\"[] conative texts include not only persuasive but also regulatory texts Legal instruments are primarily regulatory in\nnature Thus it follows that regulatory instruments are conative texts\" (Sarcevic, 1997: 10). Sarcevic, recalls that also\nNewmark (1982: 13-15) originally classified them as directive and imperative, while later he curiously reclassified them\nas expressive texts (Newmark, 1988: 39). Also Reiss who had originally classified legal texts as essentially conative in her,\n1977 paper (English translation: 1989), later, with Vermeer, proposed to classify them as essentially informative (Reiss-\nVermeer, 1984: 208-209). Similarly, in Sagers view (1993: 70) legal texts have either an informative or a directive purpose,\ndepending on their readers.\nFor a detailed history of legal translation from Justinian to the present day see Sarcevic, (1997: 23ff.).\nOn the debate about the concept of equivalence see for instance Snell-Hornby, 1995: 20-22. For some other definitions of\nthe concept see, among German scholars, Reiss, 1989, Wills, 1977; see also Nida, 1964 and Catford, 1965: 27.\nArticle 33(3) of the Convention on the Law of Treaties (1969) states that the terms of a Treaty are presumed to have the\nsame meaning in each authentic text.\nThis was the case for the Italian translation of the United Nations Convention for the International Sales of Goods (Vienna,\n11.4.1980): see Garzone, 1998, where the problems concerning the translation of \"hybrid texts\" is discussed in detail.\nA similar case, dealt with by Soffritti (1995) with regard to the North Italian province of South Tyrol, is that of legislation\nin bi-lingual regions where laws are translated in order to make them intelligible for minority-language speaking citizens but\nhave no official legal validity.\nSarcevic, (1997: 224-225) borrows the distinction between restricted and non-restricted or free parts of EU instruments\nfrom: V Koutsivitis V., La traduction juridique, tude dun cas: la traduction des textes lgislatifs des Communauts\neuropennes, et en particulier partir du franais vers le grec, thse de doctorat, Universit de la Sorbonne nouvelle Paris\nIII, 1988.\nHer account is not taken of emergency courses of action, like resorting to an ad hoc neologism or to a borrowing or a\nloan-translation or even acknowledging impossibility of translation.\nSee Reiss-Vermeer, 1984: 114.\n\n\nAUSTIN, J.L. (1962): How To Do Things With Words, J.O. Urmson (ed.), Oxford, Oxford\nUniversity Press.\n\nBAKER, M. (1992): In Other Words: A Coursebook on Translation, London, Routledge.\n\nBEAUGRANDE, R. de and DRESSLER, W. (1981): Introduction to Text Linguistics,\nLondon, Longman.\n\nBEAUPR, M. (1986): Interpreting Bilingual Legislation, Toronto, Carswell.\n\nBENVENISTE, . (1958): De la subjectivit dans le langage, Journal de Psychologie,\n\nBENVENISTE, . (1963): La philosophie analytique et le langage, Les tudes\nphilosophiques, no. 1, janvier-mars.\n\nBHATIA, V. (1987): Language of the Law\", Language Teaching, no. 20, pp. 227-234.\n\nBHATIA, V. (1994): Cognitive Structuring in Legislative Provisions, Gibbons, J. (ed.),\nLanguage and the Law, London, Longman.\n\n\nCARCATERRA, G. (1994): Norme costitutive, in Scarpelli-Di Lucia, pp. 219-231.\n\nCATFORD, J.C. (1965): A Linguistic Theory of Translation: An Essay in Applied Linguistics,\nLondon, Oxford University Press.\n\nCONTE, A.G. (1994): Performativo vs. normativo, in Scarpelli-Di Lucia, 1994, pp. 247 -\n\nCRPEAU, P.-A. (1995): La Transposition Linguistique sous la direction de G. Snow and\nJ. Vanderlinden, Franais Juridique et Science du Droit, Bruxelles, Bruylant, pp. 51-61.\n\nDAVID, R. and BRIERLEY, J.E. (1985): Major Legal Systems in the World Today. An\nIntroduction to the Study of Comparative Law, London, Stevens & Sons.\n\nDIDIER, E. (1991): La Common law en franais. tude juridique et linguistique de la\nCommon law en franais au Canada, Revue internationale de droit compar, no. 43:1, pp. 7-\n\nFLUCK, H.R. (1985): Fachsprachen. Einfrung und Bibliographie, Mnchen, Francken.\n\nGARZONE, G. (1996): Performativit e linguaggio giuridico. Una proposta di\nclassificazione. Con osservazioni contrastive inglese-italiano, Milano, Centro Linguistico\nUniversit Bocconi.\n\nGARZONE, G. (1997): Inglese giuridico e generi testuali nella prospettiva didattica, in\nSchena, pp. 207-234.\n\nGARZONE, G. (1998): Tradurre la convenzione internazionale: aspetti testuali e\npragmatici, Atti del Secondo convegno internazionale Traduttori e giuristi a confronto.\nInterpretazione traducente e comparazione del discorso giuridico, Milano 21-22 ottobre,\n1998, Universit Bocconi.\n\nGARZONE, G. (1999): Espressione della performativit nel testo giuridico: italiano e\ninglese a confronto, in: G. Azzaro, M. Ulrych (a cura di), Atti del XVIII Convegno\ndellA.I.A., Genova 30 settembre - 2 ottobre, Trieste, Edizioni dellUniversit di Trieste.\n\nGARZONE, G. (1999): The Translation of Legal Texts. a Functional Approach in a\nPragmatic Perspective, TEXTUS (Translation Studies Revisited), XII, 2, pp. 393-409.\n\nGMAR, J.-C. (1995): Traduire ou lart dinterprter, Tome I et II, Presses de lUniversit\nde Qubec.\n\nGMAR, J.-C. (1997): Traduire le langage du droit en contexte bilingue et bijuridique. Le\nCanada: un cas despce?, in Schena, pp. 74-87.\n\nGOTTI, M. (1991): I linguaggi specialistici. Caratteristiche linguistiche e criteri pragmatici,\nFirenze, La Nuova Italia.\n\n\nGUSTAFFSON, M. (1975): Some Syntactic Properties of English Law Language, Turku,\nPublications of the Department of English at the University of Turku, no. 4.\n\nHATIM, B., MASON, I. (1997): The Translator as Communicator, London, Routledge.\n\nHERBOTS, J.H. (1987): La traduction juridique. Un point de vue belge, Les Cahiers de\nDroit, no. 28, pp. 813-844.\n\nHILTUNEN, R. (1984): The Type and Structure of Clausal Embedding in Legal English,\nTEXT, Vol. 4, pp. 107 - 121.\n\nHNIG, H.G. and KUSSMAUL, P. (1982): Strategie der bersetzung. Ein Lehr-und\narbeitsbuch, Tbingen, Narr.\n\nKOLLER, W. (1992): Einfrung in die bersetzungswissenschaft, Heidelberg, Quelle &\n\nKURZON, D. (1991): It Is Hereby Performed ... Explorations in Legal Speech Acts,\nPhiladelphia, Benjamins.\n\nKUSSMAUL, P. (1995): Training the Translator, Philadelphia, Benjamins.\n\nLEGAULT, G.A. (1977): Fonctions et structure du langage juridique, Meta, no. 24:1, pp.\n\nLEVINSON, S.C. (1983): Pragmatics, Cambridge, Cambridge University Press.\n\nMADSEN, D. (1997): Towards a Description of Communication in the Legal Universe.\nTranslation of Legal Texts and the Skopos theory, Fachsprache: International Journal of\nLSP, no. 1-2, pp. 17-27.\n\nMELLINKOFF, D. (1963): The Language of the Law, Boston, Little, Brown & Co.\n\nMORRIS, M., (ed.)(1995): Translation and the Law, Philadelphia, Benjamins.\n\nNEUBERT, A. and SHREVE, G.M. (1992): Translation as Text, Kent, Ohio, The Kent State\nUniversity Press.\n\nNEWMARK, P. (1982): Approaches to Translation, Oxford, Pergamon Press.\n\nNEWMARK, P. (1988): A Textbook of Translation, London, Prentice Hall.\n\nNIDA, E. (1964): Toward a Science of Translating, Leiden, E.J. Brill.\n\nNIDA, E. and TABER, C.R. (1969): The Theory and Practice of Translation, Leiden, E.J.\n\nNORD, C. (1991): Scopos, Loyalty and Translation Conventions, Target, no. 3(1), pp. 91-\n\n\nNORD, C. (1997): Translating as a Purposeful Activity. Functionalist Approaches Explained,\nManchester, St. Jerome Publishing.\n\nOBENAUS, G. (1995): The Legal Translator as Information Broker, Morris, 1995, pp. 247-\n\nOPPENHEIM, F. E. (1994): Lineamenti di analisi logica del diritto, originally Outlines of\na Logical Analysis of Law, Philosophy of Science, no. 11, pp. 142-160 (Italian translation:\nRicciardi, Mario (1994): in Scarpelli-Di Lucia, pp. 59-85.)\n\nPIGEON, L.-P. (1982): La traduction juridique. Lquivalence fonctionelle, J.-C. Gmar\n(d.), Langage du droit et traduction. Essai de jurilinguistique, Montral, Linguatech, pp.\n\nREISS, K. (1989): Text Types, Translation Types and Translation Assessment, Chesterman\nA. (ed.), Readings in Translation, Helsinki, Oy Finn Lectura.\n\nREISS, K. and VERMEER, H. (1984): Grundlegung einer allgemeinen Translationstheorie,\nTbingen, Niemeyer.\n\nSACCO, R. (1994): La traduzione giuridica, in Scarpelli-Di Lucia, pp. 475-490.\n\nSAGER, J. (1993): Language Engineering and Translation. Consequences of Automation,\nPhiladelphia, Benjamins.\n\nSARCEVIC, S. (1997): New Approaches to Legal Translation, The Hague, Kluwer Law\n\nSCARPA, F. (1997): Un esempio di traduzione giuridica dallinglese in italiano: il contratto\ndi compravendita immobiliare, in Schena, 1997, pp. 93-116.\n\nSCARPELLI, U. and DI LUCIA, P. (a cura di) (1994): Il linguaggio del diritto, Milano, LED.\n\nSCHENA, L. (a cura di) (1997): La lingua del diritto. Difficolt traduttive, applicazioni\ndidattiche, Roma, CISU.\n\nSMITH, S.A. (1995): Culture Clash: Anglo-American Case Law and German Civil Law in\nTranslation, in Morris, pp. 179-197.\n\nSNELL-HORNBY, M. (1995): Translation Studies. An Integrated Approach, Philadelphia,\n\nSNELL-HORNBY, M. and PCHHACKER, Kaindl K. (eds.) (1994): Translation Studies.\nAn Interdiscipline, Amsterdam / Philadelphia, Benjamins.\n\nSOFFRITTI, M. (1987): Errori di traduzione osservazioni e tipologia in riferimento alle\nleggi della Provincia Autonoma di Bolzano, in Atti del Convegno Internazionale Tradurre:\nteoria ed esperienze, Bolzano 27/28/2 - 1/3, 1986, Educazione Bilingue, Vol. XIV: pp. 81-\n\n\nSOFFRITTI, M. (1995): Il codice civile in versione originale e in traduzione tedesca:\nproblemi di linguistica contrastiva e di analisi testuale, Arntz R. (a cura di), La traduzione.\nNuovi approcci tra teoria e pratica, Napoli, CUEN.\n\nTROSBORG, A. (1994): Acts in Contracts: Some Guidelines for Translation, Snell-\nHornby et al., pp. 309-318.\n\nTROSBORG, A. (1997): Translating Hybrid Political Texts, A. Trosborg (ed.), Text\nTypology and Translation, Amsterdam / Philadelphia, Benjamins.\n\nVERMEER, H. (1982): Translation als Informationsangebot, Lebende Sprachen, 27:3, pp.\n\nVERMEER, H. (1986): bersetzung als Kultureller Transfer, Snell-Hornby, pp. 30-53.\n\nVERMEER, H.J. (1996): A Skopos Theory of Translation (Some Arguments For and Against),\nHeidelberg, TextContext.\n\nWILLS, W. (1977): bersetzungswissenschaft, Probleme und Methoden, Stuttgart, Erst Klett", "pred_label": "__label__1", "pred_score_pos": 0.7848920226097107} {"content": "You are on page 1of 25\n\n\n A screw thread is formed by cutting a continuous helical groove on a cylindrical surface.\n\n A screw made by cutting a single helical groove on the cylinder is known as single\nthreaded (or single-start) screw and if a second thread is cut in the space between the\ngrooves of the first, a double threaded (or double-start) screw is formed.\n Similarly, triple and quadruple (i.e. multiple-start) threads may be formed. The helical\ngrooves may be cut either right hand or left hand.\n A screwed joint is mainly composed of two elements i.e. a bolt and nut. The screwed\njoints are widely used where the machine parts are required to be readily connected or\ndisconnected without damage to the machine or the fastening.\nAdvantages and Disadvantages of Screwed Joints\n1. Screwed joints are highly reliable in operation.\n2. Screwed joints are convenient to assemble and disassemble.\n3. A wide range of screwed joints may be adopted to various operating conditions.\n4. Screws are relatively cheap to produce due to standardization and highly efficient\nmanufacturing processes.\nThe main disadvantage of the screwed joints is the stress concentration in the threaded\nportions which are vulnerable points under variable load conditions.\nImportant Terms Used in Screw Threads\nThe following terms used in screw threads, as shown in Fig. Are important from the subject\npoint of view:\n1. Major diameter. It is the largest diameter of an external or internal screw thread. The\nscrew is specified by this diameter. It is also known as outside or nominal diameter.\n2. Minor diameter. It is the smallest diameter of an external or internal screw thread. It\nis also known as core or root diameter.\n3. Pitch diameter. It is the diameter of an imaginary cylinder, on a cylindrical screw\nthread, the surface of which would pass through the thread at such points as to make\nequal the width of the thread and the width of the spaces between the threads. It is also\ncalled an effective diameter. In nut and bolt assembly, it is the diameter at which the\nridges on the bolt are in complete touch with the ridges of the corresponding nut.\n\n4. Pitch. It is the distance from a point on one thread to the corresponding point on the\nnext. This is measured in an axial direction between corresponding points in the same\naxial plane. Mathematically,\nPitch = 1 /No. of threads per unit length of screw\n5. Lead. It is the distance between two corresponding points on the same helix. It may\nalso be defined as the distance which a screw thread advances axially in one rotation of\nthe nut. Lead is equal to the pitch in case of single start threads, it is twice the pitch in\ndouble start, thrice the pitch in triple start and so on.\n6. Crest. It is the top surface of the thread.\n7. Root. It is the bottom surface created by the two adjacent flanks of the thread.\n8. Depth of thread. It is the perpendicular distance between the crest and root.\n9. Flank. It is the surface joining the crest and root.\n10. Angle of thread. It is the angle included by the flanks of the thread.\n11. Slope. It is half the pitch of the thread.\nForms of Screw Threads\n British standard Whitworth (B.S.W.) thread. This is a British standard thread profile\nand has coarse pitches. It is a symmetrical V-thread in which the angle between the\nflankes, measured in an axial plane, is 55°. These threads are found on bolts and screwed\nfastenings for special purposes\n British association (B.A.) thread. This is a B.S.W. thread with fine pitches.. These\nthreads are used for instruments and other precision works.\n American national standard thread. The American national standard or U.S. or Seller's\nthread has flat crests and roots. The flat crest can withstand more rough usage than sharp\n\nV-threads. These threads are used for general purposes e.g. on bolts, nuts, screws and\ntapped holes.\n Square thread. The square threads, because of their high efficiency, are widely used for\ntransmission of power in either direction. Such types of threads are usually found on the\nfeed mechanisms of machine tools, valves, spindles, screw jacks etc\n Acme thread. It is a modification of square thread. It is much stronger than square thread\nand can be easily produced. These threads are frequently used on screw cutting lathes,\nbrass valves, cocks and bench vices.\n Knuckle thread. It is also a modification of square thread. It has rounded top and\nbottom. It can be cast or rolled easily and can not economically be made on a machine.\n Buttress thread. It is used for transmission of power in one direction only. The force is\ntransmitted almost parallel to the axis. This thread units the advantage of both square and\n Metric thread. It is an Indian standard thread and is similar to B.S.W. threads. It has an\nincluded angle of 60° instead of 55°.\n\nCommon Types of Screw Fastenings\n\nFollowing are the common types of screw fastenings:\nThrough bolts:\n A through bolt (or simply a bolt) is shown in Fig. (a).\n It is a cylindrical bar with threads for the nut at one end and head at the other end. The\ncylindrical part of the bolt is known as shank.\n It is passed through drilled holes in the two parts to be fastened together and clamped\nthem securely to each other as the nut is screwed on to the threaded end.\n The through bolts may or may not have a machined finish and are made with either\nhexagonal or square heads. A through bolt should pass easily in the holes, when put\nunder tension by a load along its axis.\n If the load acts perpendicular to the axis, tending to slide one of the connected parts along\nthe other end thus subjecting it to shear, the holes should be reamed so that the bolt shank\nfits snugly there in.\n The through bolts according to their usage may be known as machine bolts, carriage\nbolts, automobile bolts, eye bolts etc.\n\nTap bolts.\n A tap bolt or screw differs from a bolt. It is screwed into a tapped hole of one of the parts to\nbe fastened without the nut, as shown in Fig. 2\n A stud is a round bar threaded at both ends. One end of the stud is screwed into a tapped\nhole of the parts to be fastened, while the other end receives a nut on it, as shown in Fig.3\n Studs are chiefly used instead of tap bolts for securing various kinds of covers\n e.g. covers of engine and pump cylinders, valves, chests etc.\nCap screws:\n The cap screws are similar to tap bolts except that they are of small size and a variety of\nshapes of heads are available as shown in Fig.\n\nMachine screws:\n These are similar to cap screws with the head slotted for a screw driver. These are\ngenerally used with a nut.\nSet screws:\n The set screws are shown in Fig. These are used to prevent relative motion between the\ntwo parts.\n\n A set screw is screwed through a threaded hole in one part so that its point (i.e.end of the\nscrew) presses against the other part.\n This resists the relative motion between the two parts by means of friction between the\npoint of the screw and one of the parts.\n They may be used instead of key to prevent relative motion between a hub and a shaft in\nlight power transmission members.\n They may also be used in connection with a key, where they prevent relative axial motion\nof the shaft, key and hub assembly.\n\nLocking Devices:\nOrdinary thread fastenings, generally, remain tight under static loads, but many of these\nfastenings become loose under the action of variable loads or when machine is subjected to\nvibrations. The loosening of fastening is very dangerous and must be prevented. In order to\nprevent this, a large number of locking devices are available, some of which are discussed\nJam nut or lock nut:\n A most common locking device is a jam, lock or check nut. It has about one-half\nto two-third thickness of the standard nut. The thin lock nut is first tightened\ndown with ordinary force, and then the upper nut (i.e. thicker nut) is tightened\ndown upon it, as shown in Fig. (a).\n The upper nut is then held tightly while the lower one is slackened back against it\nIn slackening back the lock nut, a thin spanner is required which is difficult to\nfind in many shops. Therefore to overcome this difficulty, a thin nut is placed on\nthe top as shown in Fig.(b).\n If the nuts are really tightened down as they should be, the upper nut carries a\ngreater tensile load than the bottom one. Therefore, the top nut should be thicker\none with a thin nut below it because it is desirable to put whole of the load on the\n\nthin nut. In order to overcome both the difficulties, both the nuts are made of the\nsame thickness as shown in Fig (c).\n\nCastle nut:\n It consists of a hexagonal portion with a cylindrical upper part which is slotted in line\nwith the centre of each face, as shown in Fig.\n The split pin passes through two slots in the nut and a hole in the bolt, so that a positive\nlock is obtained unless the pin shears.\n It is extensively used on jobs subjected to sudden shocks and considerable vibration such\nas in automobile industry.\nSawn nut:\n It has a slot sawed about half way through, as shown in Fig. After the nut is screwed\ndown, the small screw is tightened which produces more friction between the nut and the\nbolt. This prevents the loosening of nut.\nPenn, ring or grooved nut:\n It has a upper portion hexagonal and a lower part cylindrical as shown in Fig. It is largely\nused where bolts pass through connected pieces reasonably near their edges such as in\nmarine type connecting rod ends.\n The bottom portion is cylindrical and is recessed to receive the tip of the locking set\nscrew. The bolt hole requires counter-boring to receive the cylindrical portion of the nut.\n In order to prevent bruising of the latter by the case hardened tip of the set screw, it is\n\nLocking with pin:\n The nuts may be locked by means of a taper pin or cotter pin passing through the middle\nof the nut as shown in Fig.\nLocking with plate:\n A form of stop plate or locking plate is shown in Fig. The nut can be adjusted and\nsubsequently locked through angular intervals of 30° by using these plates.\nSpring lock washer:\n A spring lock washer is shown in Fig. As the nut tightens the washer against the piece\nbelow, one edge of the washer is caused to dig itself into that piece, thus increasing the\nresistance so that the nut will not loosen so easily. There are many kinds of spring lock\nwashers manufactured, some of which are fairly effective.\n\nStresses in Screwed Fastening due to Static Loading\n\n The following stresses in screwed fastening due to static loading are important from the\nsubject point of view:\n1. Internal stresses due to screwing up forces,\n2. Stresses due to external forces, and\n3. Stress due to combination of stresses at (1) and (2).\n\nInitial Stresses due to Screwing up Forces\nThe following stresses are induced in a bolt, screw or stud when it is screwed up tightly.\n1. Tensile stress due to stretching of bolt. Since none of the above mentioned stresses\nare accurately determined, therefore bolts are designed on the basis of direct tensile stress\nwith a large factor of safety in order to account for the indeterminate stresses. The initial\ntension in a bolt, based on experiments, may be found by the relation\nPi= 2840 d N\nPi= Initial tension in a bolt, and\nd= Nominal diameter of bolt, in mm.\nThe above relation is used for making a joint fluid tight like steam engine cylinder cover\njoints etc. When the joint is not required as tight as fluid-tight joint, then the initial\ntension in a bolt may be reduced to half of the above value. In such cases\nPi= 1420 d N\nThe small diameter bolts may fail during tightening, therefore bolts of smaller diameter\n(less than M 16 or M 18) are not permitted in making fluid tight joints.\nIf the bolt is not initially stressed, then the maximum safe axial load which may be\napplied to it, is given by\nP= Permissible stress × Cross-sectional area at bottom of the thread.\n\nTwo machine parts are fastened together tightly by means of a 24 mm tap bolt. If the load\ntending to separate these parts is neglected, find the stress that is set up in the bolt by the\ninitial tightening.\n\nA steam engine cylinder has an effective diameter of 350 mm and the maximum steam pressure\nacting on the cylinder cover is 1.25 N/mm2. Calculate the number and size of studs required to\nfix the cylinder cover, assuming the permissible stress in the studs as 33 MPa.\n\nDesign of a Nut\n\n When a bolt and nut is made of mild steel, then the effective height of nut is made equal\nto the nominal diameter of the bolt.\n\n If the nut is made of weaker material than the bolt, then the height of nut should be larger,\nsuch as 1.5 d for gun metal, 2 d for cast iron and 2.5 d for aluminium alloys (where d is\nthe nominal diameter of the bolt).\n In case cast iron or aluminium nut is used, then V-threads are permissible only for\npermanent fastenings, because threads in these materials are damaged due to repeated\nscrewing and unscrewing.\n\nBolted Joints under Eccentric Loading\n\nThere are many applications of the bolted joints which are subjected to eccentric loading\nsuch as a wall bracket, pillar crane, etc. The eccentric load may be\n\n Parallel to the axis of the bolts,\n\n Perpendicular to the axis of the bolts, and\n In the plane containing the bolts.\n\nEccentric Load Acting Parallel to the Axis of Bolts\n\nConsider a bracket having a rectangular base bolted to a wall by means of four bolts as shown in\nFig. A little consideration will show that each bolt is subjected to a direct tensile load of\n\n Further the load W tends to rotate the bracket about the edge A-A.\n Due to this, each bolt is stretched by an amount that depends upon its distance from the\ntilting edge.\n Since the stress is a function of elongation, therefore each bolt will experience a different\nload which also depends upon the distance from the tilting edge.\n For convenience, all the bolts are made of same size. In case the flange is heavy, it may\nbe considered as a rigid body.\n\n Let w be the load in a bolt per unit distance due to the turning effect of the bracket and let\nW1 and W2 be the loads on each of the bolts at distances L1 and L2 from the tilting edge.\n\nA bracket, as shown in Fig. above, supports a load of 30 kN. Determine the size of bolts, if the\nmaximum allowable tensile stress in the bolt material is 60 MPa. The distances are: L 1 = 80 mm,\nL2 = 250 mm, and L = 500 mm.\n\nFrom Table (coarse series), we find that the standard core diameter of the bolt is 28.706 mm and\nthe corresponding size of the bolt is M 33.\n\nEccentric Load Acting Perpendicular to the Axis of Bolts\n\nDetermine the size of the bolts and the thickness of the arm for the bracket as shown in Fig., if it\ncarries a load of 40 kN at an angle of 60° to the vertical.\n\nThe material of the bracket and the bolts is same for which the safe stresses can be assumed\nas70, 50 and 105 MPa in tension, shear and compression respectively.\n\nSince the induced shear stress is less than the permissible stress (50 MPa), therefore the design is\n\n\n The power screws (also known as translation screws) are used to convert rotary motion into\ntranslator motion.\n For example, in the case of the lead screw of lathe, the rotary motion is available but the tool\nhas to be advanced in the direction of the cut against the cutting resistance of the material.\n In case of screw jack, a small force applied in the horizontal plane is used to raise or lower a\nlarge load. Power screws are also used in vices, testing machines, presses, etc.\n\nIn most of the power screws, the nut has axial motion against the resisting axial force while the\nscrew rotates in its bearings. In some screws, the screw rotates and moves axially against the resisting\nforce while the nut is stationary and in others the nut rotates while the screw moves axially with no\n\nTypes of Screw Threads used for Power Screws\n\nFollowing are the three types of screw threads mostly used for power screws:\n\n Square thread: A square thread, as shown in Fig. a, is adapted for the transmission of power in\neither direction. This thread results in maximum efficiency and minimum radial or bursting\npressure on the nut. The square threads are employed in screw jacks, presses and clamping\n\n Acme or trapezoidal thread: An acme or trapezoidal thread, as shown in Fig. b, is a modification\n\nof square thread. The slight slope given to its sides lowers the efficiency slightly than square\nthread and it also introduce some bursting pressure on the nut, but increases its area in shear.\n Buttress thread: A buttress thread, as shown in Fig. c, is used when large forces act along the\nscrew axis in one direction only. It is stronger than other threads because of greater thickness\nat the base of the thread.\n\nMultiple Threads:\n\nThe power screws with multiple threads such as double, triple etc. are employed when it is\ndesired to secure a large lead with fine threads or high efficiency. Such types of threads are usually\nfound in high speed actuators.\n\n\nA vertical screw with single start square threads of 50 mm mean diameter and 12.5 mm pitch is raised\nagainst a load of 10 kN by means of a hand wheel, the boss of which is threaded to act as a nut. The axial\nload is taken up by a thrust collar which supports the wheel boss and has a mean diameter of 60 mm.\nThe coefficient of friction is 0.15 for the screw and 0.18 for the collar. If the tangential force applied by\neach hand to the wheel is 100 N, find suitable diameter of the hand wheel.\n\nAn electric motor driven power screw moves a nut in a horizontal plane against a force of 75 kN at a\nspeed of 300 mm / min. The screw has a single square thread of 6 mm pitch on a major diameter of 40\nmm. The coefficient of friction at screw threads is 0.1. Estimate power of the motor.\n\nThe cutter of a broaching machine is pulled by square threaded screw of 55 mm external diameter and\n10 mm pitch. The operating nut takes the axial load of 400 N on a flat surface of 60 mm and 90 mm\ninternal and external diameters respectively. If the coefficient of friction is 0.15 for all contact surfaces\non the nut, determine the power required to rotate the operating nut when the cutting speed is 6\nm/min. Also find the efficiency of the screw.\n\nA vertical two start square threaded screw of a 100 mm mean diameter and 20 mm pitch supports a\nvertical load of 18 kN. The axial thrust on the screw is taken by a collar bearing of 250 mm outside\ndiameter and 100 mm inside diameter. Find the force required at the end of a lever which is 400 mm\nlong in order to lift and lower the load. The coefficient of friction for the vertical screw and nut is 0.15\nand that for collar bearing is 0.20\n\nThe mean diameter of the square threaded screw having pitch of 10 mm is 50 mm. A load of 20 kN is\nlifted through a distance of 170 mm. Find the work done in lifting the load and the efficiency of the\nscrew, when 1. The load rotates with the screw, and 2. The load rests on the loose head which does not\nrotate with the screw. The external and internal diameters of the bearing surface of the loose head are\n60 mm and 10 mm respectively. The coefficient of friction for the screw and the bearing surface may be\ntaken as 0.08.\n\nThe lead screw of a lathe has Acme threads of 50 mm outside diameter and 8 mm pitch. The screw must\nexert an axial pressure of 2500 N in order to drive the tool carriage. The thrust is carried on a collar 110\nmm outside diameter and 55 mm inside diameter and the lead screw rotates at 30 r.p.m. Determine (a)\nthe power required to drive the screw; and (b) the efficiency of the lead screw. Assume a coefficient of\nfriction of 0.15 for the screw and 0.12 for the collar.\n\nA power screw having double start square threads of 25 mm nominal diameter and 5 mm pitch is acted\nupon by an axial load of 10 kN. The outer and inner diameters of screw collar are 50 mm and 20 mm\nrespectively. The coefficient of thread friction and collar friction may be assumed as 0.2 and 0.15\nrespectively. The screw rotates at 12 r.p.m. Assuming uniform wear condition at the collar and allowable\nthread bearing pressure of 5.8 N/mm2, find: 1. the torque required to rotate the screw; 2. the stress in\nthe screw; and 3. the number of threads of nut in engagement with screw.", "pred_label": "__label__1", "pred_score_pos": 0.7094934582710266} {"content": "Enhanced cerebral perfusion during brief exposures to cyclic intermittent hypoxemia - Liu et al. (2017)\n\nKey Points\n\n • Intermittent hypoxia (IH) increases brain blood flow, even with low CO2\n\n • IH increases fractional oxygen extraction in the brain\n\n • IH might be a useful before a workout, competition, or presentation to increase brain blood flow and focus\n\nThe Breathing Diabetic Summary\n\nYour brain consumes almost 20% of your oxygen at rest.  Therefore, during intermittent hypoxia (IH), it makes sense that the body would compensate to make sure the brain gets the oxygen it needs.\n\nHowever, previous studies are conflicting because when oxygen is reduced, we typically start breathing more.  This gets rid of too much carbon dioxide (CO2), leading to hypocapnia (low CO2).\n\nCO2 is a main driver of cerebral vasodilation.  That is, it increases brain blood flow.  Thus, if CO2 is reduced, we would expect less blood flow to the brain. \n\nThis study aimed to see how these factors played out during cyclic IH.  Would the reduced O2 increase brain blood flow, or would it be offset by reduced CO2?\n\nThey recruited 8 healthy men that were ~25 years old.  The participants inhaled O2 at 10% for 6 min to induce hypoxia.  They then breathed normal room air for 4 min.  This cycle was repeated 5 times.  Measurements were taken after the 1st and 5th bouts to see how responses changed during progressive hypoxia exposures.\n\nDuring the bouts of hypoxia, blood oxygen saturation dropped to ~67%, which is below the therapeutic range of IH.  However, the authors reported that none of the subjects felt discomfort or stress.\n\nOverall, the results revealed that brain blood flow increased by ~20%.  Increases in brain blood flow were significantly greater during the 5th vs. the 1st bout of hypoxia, suggesting a cumulative effect of hypoxia exposures.  The participants dropped CO2 by 4 mm Hg, yet their brain blood flow still increased significantly.  Thus, the increased brain blood flow from hypoxia “overpowered” the reduced blood flow from hypocapnia.\n\nFractional oxygen extraction in the brain also increased significantly after the 1st bout and remained elevated during the rest of the protocol.  Muscle oxygen extraction, on the other hand, dropped during the procedure, suggesting that the brain gets priority during times of hypoxia.\n\nStatistical analysis revealed that major increases in brain blood flow occurred at about 86% SpO2.  This is something we can easily achieve using breath holds.  In fact, Principle 3 recommends hypercapnic (high CO2) breath holds.  Because both hypoxia and high CO2 cause cerebral vasodilation, we can speculate that brain blood flow would be increased even more using this protocol.\n\nFinally, from a practical perspective, this research supports the idea of practicing breath holds before a workout, competition, or presentation. The increased brain blood flow will help focus your mind and prepare you for what’s ahead.\n\nAbstract from Paper\n\nCerebral vasodilation and increased cerebral oxygen extraction help maintain cerebral oxygen uptake in the face of hypoxemia. This study examined cerebrovascular responses to intermittent hypoxemia in eight healthy men breathing 10% O2 for 5 cycles, each 6 min, interspersed with 4 min of room air breathing. Hypoxia exposures raised heart rate ( P < 0.01) without altering arterial pressure, and increased ventilation ( P < 0.01) by expanding tidal volume. Arterial oxygen saturation ([Formula: see text]) and cerebral tissue oxygenation ([Formula: see text]) fell ( P < 0.01) less appreciably in the first bout (from 97.0 ± 0.3% and 72.8 ± 1.6% to 75.5 ± 0.9% and 54.5 ± 0.9%, respectively) than the fifth bout (from 94.9 ± 0.4% and 70.8 ± 1.0% to 66.7 ± 2.3% and 49.2 ± 1.5%, respectively). Flow velocity in the middle cerebral artery ( VMCA) and cerebrovascular conductance increased in a sigmoid fashion with decreases in [Formula: see text] and [Formula: see text]. These stimulus-response curves shifted leftward and upward from the first to the fifth hypoxia bouts; thus, the centering points fell from 79.2 ± 1.4 to 74.6 ± 1.1% ( P = 0.01) and from 59.8 ± 1.0 to 56.6 ± 0.3% ( P = 0.002), and the minimum VMCA increased from 54.0 ± 0.5 to 57.2 ± 0.5 cm/s ( P = 0.0001) and from 53.9 ± 0.5 to 57.1 ± 0.3 cm/s ( P = 0.0001) for the [Formula: see text]- VMCA and [Formula: see text]- VMCA curves, respectively. Cerebral oxygen extraction increased from prehypoxia 0.22 ± 0.01 to 0.25 ± 0.02 in minute 6 of the first hypoxia bout, and remained elevated between 0.25 ± 0.01 and 0.27 ± 0.01 throughout the fifth hypoxia bout. These results demonstrate that cerebral vasodilation combined with enhanced cerebral oxygen extraction fully compensated for decreased oxygen content during acute, cyclic hypoxemia. NEW & NOTEWORTHY Five bouts of 6-min intermittent hypoxia (IH) exposures to 10% O2 progressively reduce arterial oxygen saturation ([Formula: see text]) to 67% without causing discomfort or distress. Cerebrovascular responses to hypoxemia are dynamically reset over the course of a single IH session, such that threshold and saturation for cerebral vasodilations occurred at lower [Formula: see text] and cerebral tissue oxygenation ([Formula: see text]) during the fifth vs. first hypoxia bouts. Cerebral oxygen extraction is augmented during acute hypoxemia, which compensates for decreased arterial O2 content.\n\nJournal Reference:\n\nLiu X, Xu D, Hall JR, et al.  Enhanced cerebral perfusion during brief exposures to cyclic intermittent hypoxemia.  J Appl Physiol.  2017;123(6):1689-1897.", "pred_label": "__label__1", "pred_score_pos": 0.8201761245727539} {"content": "Q&A: Why Do I Struggle with Forearm Balance?\n\nIyengar Yoga instructor Lisa Walford explains the strength, flexibility, and actions necessary for Pincha Mayurasana.\n\nQ: I have been doing yoga for four years and still can't do an elbow balance. I collapse by going forward until my head hits the wall. I don't feel it is lack of strength as I can do Headstand and Handstand. ——Shirley Mahoney\n\nLisa Walford's reply:\n\nIn Adho Mukha Vrksasana (Handstand), you have a longer fulcrum from the hand to the shoulder, so you can depend on momentum to kick up. In Sirsasana (Headstand) you have a broader base with the forearms and the crown of the head on the floor, so the shoulder muscles get additional support from the upper back muscles, which makes it easier to get up. But keep in mind that even if you can get up in Headstand, the integrity of alignment in the neck can be severely compromised if there is inadequate lift in the armpit and instability in the shoulder girdle. How you get up is as important as being there!\n\nIn Pincha Mayurasana (Forearm Stand or Elbow Balance), the actions required of the shoulder are confined to a smaller area, which challenges the flexibility and stability of the shoulder girdle directly. When viewed from the side, the optimal placement should be an even column from the base of the pose through the upper arm, armpit, shoulder, torso, pelvis, and legs. That is, the pose should not collapse in the armpits and then compensate by bending in the low back. Sound familiar--the banana shape?\n\nFrom your hands and knees, face a wall and place your forearms on the floor. Place a belt or strap just above your elbows so that your forearms remain parallel to each other and shoulder-width apart. Set a block between your hands. These props will help you keep the chest open when you kick up. They'll also help you to get the stability you need from the serratus anterior, a key muscle that attaches the shoulder blades to the back ribs and from which you can properly distribute weight through the shoulder girdle into the back.\n\nAlso seeBuild a Forearm Balance\n\nKeep your shoulders in a vertical line directly above the elbows, draw the shoulder blades onto your back, and straighten your legs. You will be in a shortened Downward-Facing Dog with your forearms on the ground. While pressing down into the elbows and the forearms, draw your upper back (the thoracic spine) in toward the chest and slowly walk your feet toward your hands until you get a vertical lift from the elbows all the way up through the shoulders, ribs and waist. Stay in this preliminary stage for several breaths to reinforce the stability and length in the shoulders and armpits. If you have the flexibility in the upper back and the armpits can yawn and open, then bring one leg slightly in front of the other and kick up.\n\nWhile kicking up, maintain the 90-degree angle between the forearm and the upper arm by pressing the center of the forearm into the floor and lifting the upper arm off the forearm. This will help keep you from collapsing toward the wall.\n\nBy setting up properly and carefully studying how you go into a pose, you will better identify what needs strength or stability and where you need to elongate and open. Like pruning a garden and watching it flourish, practice with vigilance and you will find that your yoga will become more refined.\n\nAlso tryKino MacGregor's Pincha Mayurasana Sequence\n\nLisa Walford is a senior intermediate Iyengar Yoga instructor and has been teaching for more than twenty years. She is one of the directors of the Teacher Training Program at Yoga Works, in Los Angeles. She has served on the faculty of the 1990 and 1993 National Iyengar Yoga Conventions and studies regularly with the Iyengars.", "pred_label": "__label__1", "pred_score_pos": 0.9428348541259766} {"content": "African Dust\n\nSaharan dust can affect hurricane activity in several ways:\n\n\n2) The Saharan Air Layer (SAL) is a layer of dry, dusty Saharan air that rides up over the low-level moist air over the tropical Atlantic. At the boundary between the SAL and low-level moist air where the trade winds blow is the trade wind inversion--a region of the atmosphere where the temperature increases with height. Since atmospheric temperature normally decreases with height, this \"inversion\" acts to but the brakes on any thunderstorms that try to punch through it. This happens because the air in a thunderstorm's updraft suddenly encounters a region where the updraft air is cooler and less buoyant than the surrounding air, and thus will not be able to keep moving upward. The dust in the SAL absorbs solar radiation, which heats the air in the trade wind inversion. This makes the inversion stronger, which inhibits the thunderstorms that power a hurricane.\n\n3) Dust may also act to produce more clouds, but this effect needs much more study. If the dust particles are of the right size to serve as \"condensation nuclei\"--centers around which raindrops can form and grow--the dust can act to make more clouds. Thus, dust could potentially aid in the formation and intensification of hurricanes. However, if the dust acts to make more low-level clouds over the tropical Atlantic, this will reduce the amount of sunlight reaching the ocean, cooling the sea surface temperatures and discouraging hurricane formation (Kaufman et al., 2005.)\n\n\nThe summertime dust that affects Atlantic tropical storms originates over the southwestern Sahara (18° - 22° N) and the northwestern Sahel (15° - 18° N) (Figure 1). The dust that originates in the Southwest Sahara stays relatively constant from year to year. However, the dust from the northwestern Sahel varies significantly from year to year, and understanding this variation may be a key factor in improving our forecasts of seasonal hurricane activity in the Atlantic. The amount of dust that gets transported over the Atlantic depends on a mix of three main factors: the large scale and local scale weather patterns (windy weather transports more dust), how wet the current rainy season is (wet weather will wash out dust before it gets transported over the Atlantic), and how dry and drought-damaged the soil is. The level of drought experienced in the northwestern Sahel during the previous year is the key factor of the three in determining how much dust gets transported over the Atlantic during hurricane season, according to a January 2004 study published in Geophysical Research Letters published by C. Moulin and I. Chiapello. In 2012 (Figure 2), precipitation across the northwestern Sahel was much above average, which should result in less dust than usual over the Atlantic during the 2013 hurricane season.\n\n\nThe future of African dust: highly uncertain\nA September 2013 paper in the Bulletin of the American Meteorological Society by Joseph Prospero and Olga Mayol-Bracero, \"Understanding the Transport and Impact of African Dust on the Caribbean Basin,\" discusses the large uncertainties on how African dust may change due to climate change. Over the past decade, there has been no clear relationship between African dust and climate indices such as rainfall in the Sahel or the El Niño/La Niña cycle, which \"makes it difficult to predict how dust emissions and transport might change over the coming decades as climate changes. The problem is exacerbated by the inability of models (IPCC 2007) to agree on future rainfall trends over large areas of North Africa (including the Sahel) that are known to be major dust sources today and in the recent past.\"\n\n\nSaharan Air Layer Analysis from the University of Wisconsin\n\nAtlantic dust forecast from the Tel-Aviv University Weather Research Center\n\nThe Saharan Air Layer (SAL) was first described in 1972, in this classic paper: Carlson, T. N., and J. M. Prospero (1972), The Large-Scale Movement of Saharan Air Outbreaks over the Northern Equatorial Atlantic, Journal of Applied Meteorology, 11(2), 283-297\n\n\n\n\nWest Africa (Sahel) Accumulated Precipitation Actual vs. Normal Daily Precipitation (mm) Last 365 days. African rainfall climatology\n\nHurricane Archive\n\nAll Atlantic Storms (1851-2019)\n\nNamed Storms for 2014\n\nTropical Weather Stickers®\n\nHistorical Hurricane Statistics", "pred_label": "__label__1", "pred_score_pos": 0.9225940704345703} {"content": "\n  Discovery Box\n\nProverbs 28\n\n\n\nbut the righteous person is as confident 2  as a lion.\n\n\n\n28:3 A poor person 7  who oppresses the weak\n\nis like 8  a driving rain without food. 9 \n\n\nbut those who keep the law contend 12  with them.\n\n28:5 Evil people 13  do not understand justice, 14 \n\nbut those who seek the Lord 15  understand it all.\n\n\n\n\n\n\ngathers it for someone who is gracious 25  to the needy.\n\n\neven his prayer 27  is an abomination. 28 \n\n\nwill himself fall into his own pit, 29 \n\nbut the blameless will inherit what is good. 30 \n\n\nbut a discerning poor person can evaluate him properly. 33 \n\n\n\n\nbut whoever confesses them and forsakes them will find mercy. 39 \n\n\nbut whoever hardens his heart 41  will fall into evil.\n\n\nso is a wicked ruler over a poor people. 44 \n\n\n\n\nlet no one support him.\n\n\n\n\n\n\n\n28:21 To show partiality 58  is terrible, 59 \n\n\n28:22 The stingy person 61  hastens after riches\n\nand does not know that poverty will overtake him. 62 \n\n\nthan the one who flatters 66  with the tongue.\n\n\nis a companion 68  to the one 69  who destroys.\n\n28:25 The greedy person 70  stirs up dissension, 71 \n\n\n\nbut the one who walks in wisdom 75  will escape. 76 \n\n\n\n\nbut when they perish, 84  the righteous increase.\n\nDrag to resizeDrag to resize\n\n1 sn The line portrays the insecurity of a guilty person – he flees because he has a guilty conscience, or because he is suspicious of others around him, or because he fears judgment.\n\n2 tn The verb בָּטַח (batakh) means “to trust; to be secure; to be confident.” Cf. KJV, NASB, NIV, NRSV, NLT “bold.”\n\nsn The righteous, who seek to find favor with God and man, have a clear conscience and do not need to look over their shoulders for avengers or law enforcers. Their position is one of confidence, so that they do not flee.\n\n3 sn The Hebrew word translated “rebellious” has rebellion as its basic meaning, and that is the idea here. The proverb is describing a time when sinfulness brings about social and political unrest.\n\n4 tn Heb “many are its princes” (so NASB).\n\nsn In such a chaotic time there will be many rulers, either simultaneously or in a rapid sequence. The times of the judges or the days of the northern kings of Israel provide examples.\n\n5 tn Heb “a man who understands [and] knows”; NRSV “an intelligent ruler”; NLT “wise and knowledgeable leaders.”\n\n6 tc The LXX reads (probably from a different underlying Hebrew text): “It is the fault of a violent man that quarrels start, but they are settled by a man of discernment.” For a survey of suggestions, see C. H. Toy, Proverbs (ICC), 495, and W. McKane, Proverbs (OTL), 630.\n\ntn This last line is difficult. The MT has כֵּן יַאֲרִיךְ (ken yaarikh). The verb means “to prolong,” but כֵּן (ken) is open to several possibilities for meaning. J. H. Greenstone’s interpretation of it as a noun from the Hollow root כּוּן (kun) with a meaning of “established order” is what is expected here (Proverbs, 293).\n\nsn For a study of the verses in chapters 28 and 29 concerning kings and governments, see B. V. Malchow, “A Manual for Future Monarchs,” CBQ 47 (1985): 238-45.\n\n7 tc The MT reads “a poor man,” גֶּבֶר רָשׁ (gever rash); cf. KJV, NASB, NLT. The problem is that the poor in the book of Proverbs is not an oppressor and does not have the power to be such. So commentators assume the word is incorrect. By a slight change to רָשָׁע (rasha’) the reading becomes “a wicked ruler” [Heb “a wicked mighty man”]. There is no textual support for this change. The LXX, however, reads, “A courageous man oppresses the poor with impieties.” If “a poor man” is retained, then the oppression would include betrayal – one would expect a poor man to have sympathy for others who are impoverished, but in fact that is not the case. It is a sad commentary on human nature that the truly oppressed people can also be oppressed by other poor people.\n\n8 tn The comparative “like” does not appear in the Hebrew text, but is implied by the metaphor; it is supplied in the translation for the sake of clarity.\n\n9 sn “Food” is a metonymy of effect here. The picture is of the driving rain that should cause crops to grow so that food can be produced – but does not (some English versions assume the crops are destroyed instead, e.g., NCV, TEV, CEV, NLT). The point the proverb is making is that a show of strength may not produce anything except ruin.\n\n10 sn Some commentators do not think that the word refers to the Mosaic law, but to “instruction” or “teaching” in general (cf. NCV “who disobey what they have been taught”). However, the expression “keep the law” in the second line indicates that it is binding, which would not be true of teaching in general (J. Bright, “The Apodictic Prohibition: Some Observations,” JBL 92 [1973]: 185-204). Moreover, Proverbs 28:9 and 29:18 refer to the law, and this chapter has a stress on piety.\n\n11 sn The proverb gives the outcome and the evidence of those who forsake the law – they “praise the wicked.” This may mean (1) calling the wicked good or (2) justifying what the wicked do, for such people are no longer sensitive to evil.\n\n12 tn The verb is the Hitpael imperfect of גָּרָה (garah), which means “to stir up strife” but in this stem means “to engage in strife” (cf. NIV “resist them”). Tg. Prov 28:4 adds an explanatory expansion, “so as to induce them to repent.”\n\n13 tn Heb “men of evil”; the context does not limit this to males only, however.\n\n14 tn The term translated “justice” is מִשְׁפָּט (mishpat); it refers to the legal rights of people, decisions that are equitable in the community. W. G. Plaut observes that there are always those who think that “justice” is that which benefits them, otherwise it is not justice (Proverbs, 282).\n\n15 sn The contrast (and the difference) is between the wicked and those who seek the Lord. Originally the idea of seeking the Lord meant to obtain an oracle (2 Sam 21:1), but then it came to mean devotion to God – seeking to learn and do his will. Only people who are interested in doing the Lord’s will can fully understand justice. Without that standard, legal activity can become self-serving.\n\n16 sn This chapter gives a lot of attention to the contrast between the poor and the rich, assuming an integrity for the poor that is not present with the rich; the subject is addressed in vv. 6, 8, 11, 20, 22, 25, and 27 (G. A. Chutter, “Riches and Poverty in the Book of Proverbs,” Crux 18 [1982]: 23-28).\n\n17 tn The Hebrew term translated “ways” is in the dual, suggesting that the person has double ways, i.e., he is hypocritical. C. H. Toy does not like this idea and changes the form to the plural (Proverbs [ICC], 497), but his emendation is gratuitous and should be rejected.\n\n18 tn Heb “and he is rich.” Many English versions treat this as a concessive clause (cf. KJV “though he be rich”).\n\n19 sn This is another “better” saying, contrasting a poor person who has integrity with a rich person who is perverse. Of course there are rich people with integrity and perverse poor people, but that is not of interest here. If it came to the choices described here, honest poverty is better than corrupt wealth.\n\n20 tn The Hebrew word could refer (1) to “instruction” by the father (cf. NCV) or (2) the Mosaic law (so most English versions). The chapter seems to be stressing religious obedience, so the referent is probably the law. Besides, the father’s teaching will be what the law demands, and the one who associates with gluttons is not abiding by the law.\n\n21 tn Heb “son,” but the immediate context does not suggest limiting this only to male children.\n\n22 sn The companion of gluttons shames his father and his family because such a life style as he now embraces is both unruly and antisocial.\n\n23 tn Heb “father,” but the immediate context does not suggest limiting this only to the male parent.\n\n24 tn Heb “by interest and increase” (so ASV; NASB “by interest and usury”; NAB “by interest and overcharge.” The two words seem to be synonyms; they probably form a nominal hendiadys, meaning “by increasing [exorbitant] interest.” The law prohibited making a commission or charging interest (Exod 22:25; Lev 25:36-37; Deut 23:20; Ps 15:5). If the poor needed help, the rich were to help them – but not charge them interest.\n\n25 tn The term חוֹנֵן (khonen, “someone who shows favor”) is the active participle.\n\nsn The verse is saying that in God’s justice wealth amassed unjustly will eventually go to the poor. God will take the wealth away from them and give it to people who will distribute it better to the poor.\n\n26 sn The expression “turn away the ear from hearing” uses a metonymy to mean that this individual will not listen – it indicates a deliberate refusal to follow the instruction of the law.\n\n27 sn It is hard to imagine how someone who willfully refuses to obey the law of God would pray according to the will of God. Such a person is more apt to pray for some physical thing or make demands on God. (Of course a prayer of repentance would be an exception and would not be an abomination to the Lord.)\n\n28 sn C. H. Toy says, “If a man, on his part, is deaf to instruction, then God, on his part, is deaf to prayer” (Proverbs [ICC], 499). And W. McKane observes that one who fails to attend to God’s law is a wicked person, even if he is a man of prayer (Proverbs [OTL], 623).\n\n29 sn The image of falling into a pit (a figure of speech known as hypocatastasis, involving implied comparison) is meant to say that the evil to which he guides people will ultimately destroy him.\n\n30 sn This proverb is teaching that those who corrupt others will be destroyed, usually by their own devices, but those who manage to avoid being corrupted will be rewarded. According to this proverb the righteous can be led astray (e.g., 26:27).\n\n31 tn Heb “a rich man,” although the context does not indicate that this is limited only to males.\n\n32 sn The idiom “in his own eyes” means “in his own opinion,” that is, his self conceit. The rich person thinks he is wise because he is rich, that he has made all the right choices.\n\n33 tn The form יַחְקְרֶנּוּ (yakhqÿrennu) means “he searches him” (cf. KJV, ASV) or “he examines him”; a potential imperfect nuance fits well here to indicate that a discerning person, even though poor, can search the flaws of the rich and see through the pretension and the false assumptions (cf. NAB, NASB, NIV “sees through him”). Several commentators have connected the word to the Arabic root hqr, which means “despise” (D. W. Thomas, “Notes on Some Passages in the Book of Proverbs,” JTS 38 [1937]: 400-403), but that would be both predictable and flat.\n\n34 tn The form בַּעֲלֹץ (baalots) is the infinitive construct with the preposition indicating a temporal clause (“when…”); the “righteous” are the subject of this clause (subjective genitive). The word may be taken as a metonymy of adjunct – the righteous exult or rejoice because they are prosperous (cf. NLT “succeed”).\n\n35 sn “Glory” here may have the sense of elation and praise.\n\n36 tn The meaning of “sought out” (יְחֻפַּשׂ, yÿkhuppas) indicates that people have gone into hiding. So the development of the ideas for this proverb require in the first line that “rejoice” be connected with “triumph” that means they have come to power; and in the second line that “are sought out” means people have gone into hiding (cf. ASV, NIV, NRSV, NLT). C. H. Toy thinks this is too strained; he offers this rendering: “When the righteous are exalted there is great confidence, but when the wicked come into power men hide themselves” (Proverbs [ICC], 500). For the verb G. R. Driver posits an Arabic cognate hafasa, “prostrated; trampled on” (“Problems in the Hebrew Text of Proverbs,” Bib 32 [1951]: 192-93), which gives a clearer result of wicked rule, but is perhaps unnecessary (e.g., Prov 28:28; 29:2). See J. A. Emerton, “Notes on Some Passages in the Book of Proverbs,” JTS 20 (1969): 202-20.\n\n37 tn The Hebrew participles provide the subject matter in this contrast. On the one hand is the person who covers over (מְכַסֶּה, mÿkhasseh) his sins. This means refusing to acknowledge them in confession, and perhaps rationalizing them away. On the other hand there is the one who both “confesses” (מוֹדֶה, modeh) and “forsakes” (עֹזֵב, ’ozev) the sin. To “confess” sins means to acknowledge them, to say the same thing about them that God does.\n\n38 sn The verse contrasts the consequences of each. The person who refuses to confess will not prosper. This is an understatement (a figure of speech known as tapeinosis); the opposite is the truth, that eventually such a person will be undone and ruined. On the other hand, the penitent will find mercy. This expression is a metonymy of cause for the effect – although “mercy” is mentioned, what mercy provides is intended, i.e., forgiveness. In other passages the verb “conceal” is used of God’s forgiveness – he covers over the iniquity (Ps 32:1). Whoever acknowledges sin, God will cover it; whoever covers it, God will lay it open.\n\n39 sn This verse is unique in the book of Proverbs; it captures the theology of forgiveness (e.g., Pss 32 and 51). Every part of the passage is essential to the point: Confession of sins as opposed to concealing them, coupled with a turning away from them, results in mercy.\n\n40 tn Most commentators (and some English versions, e.g., NIV) assume that the participle מְפַחֵד (mÿfakhed, “fears”) means “fears the Lord,” even though “the Lord” is not present in the text. Such an assumption would be more convincing if the word יִרְאַת (yirat) had been used. It is possible that the verse refers to fearing sin or its consequences. In other words, the one who is always apprehensive about the nature and consequences of sin will avoid sin and find God’s blessing. Of course the assumption that the phrase means “fear the Lord” could be correct as well. There would be little difference in the outcome; in either case sin would be avoided.\n\n41 sn The one who “hardens his heart” in this context is the person who refuses to fear sin and its consequences. The image of the “hard heart” is one of a stubborn will, unyielding and unbending (cf. NCV, TEV, NLT). This individual will fall into sin.\n\n42 tn The term “like” is not in the Hebrew text, but is supplied in the translation for clarity and smoothness.\n\n43 sn The comparison uses animals that are powerful, terrifying, insensitive, and in search of prey. Because political tyrants are like this, animal imagery of this sort is also used in Dan 7:1-8 for the series of ruthless world powers.\n\n44 sn A poor nation under the control of political tyrants who are dangerous and destructive is helpless. The people of that nation will crumble under them because they cannot meet their demands and are of no use to them.\n\n45 tn Heb “A prince lacking of understanding [is] also a great oppressor” (both KJV, ASV similar) The last clause, “and a great oppressor,” appears to modify “the prince.” There is little difference in meaning, only in emphasis. The LXX has “lacks income” (reading תְּבוּאוֹת [tÿvuot] instead of תְּבוּנוֹת [tÿvunot]). C. H. Toy (Proverbs [ICC], 501) suggests deleting the word for “prince” altogether, but this emendation is gratuitous.\n\n46 tc This follows the Qere reading of the participle which is singular (as opposed to the plural). The implication is that this one is also a ruler, paralleling the first half. But since he “hates” (= rejects) unjust gain he will extend [his] days, meaning he will enjoy a long and happy life (cf. NIV, NRSV, CEV).\n\n47 tn The form is the Qal passive participle. The verb means “to oppress; to wrong; to extort”; here the idea of being “oppressed” would refer to the burden of a guilty conscience (hence “tormented”; cf. NAB, NRSV “burdened”). Some commentators have wanted to emend the text to read “suspected,” or “charged with,” or “given to,” etc., but if the motive is religious and not legal, then “oppressed” or “tormented” is preferred.\n\n48 sn The text has “the blood of a life”; blood will be the metonymy of effect for the murder, the shedding of blood.\n\n49 tn The verse is cryptic; it simply says that he will “flee to the pit.” Some have taken the “pit” to refer to the place of detention for prisoners, but why would he flee to that place? It seems rather to refer to death. This could mean that (1) since there is no place for him to go outside of the grave, he should flee to the pit (cf. TEV, NLT), or (2) he will be a fugitive until he goes to the grave (cf. NASB, NIV, NCV, NRSV, CEV). Neither one of these options is easily derived from the text. The verse seems to be saying that the one who is guilty of murder will flee, and no one should assist him. The meaning of “the pit” is unresolved.\n\n50 tn The form is the Niphal imperfect of יָשַׁע (yasha’, “will be saved”). In all probability this refers to deliverance from misfortune. Some render it “kept safe” (NIV) or “will be safe” (NRSV, TEV). It must be interpreted in contrast to the corrupt person who will fall.\n\n51 tn The Qal imperfect יִפּוֹל (yipol) is given a future translation in this context, as is the previous verb (“will be delivered”) because the working out of divine retribution appears to be coming suddenly in the future. The idea of “falling” could be a metonymy of adjunct (with the falling accompanying the ruin that comes to the person), or it may simply be a comparison between falling and being destroyed. Cf. NCV “will suddenly be ruined”; NLT “will be destroyed.”\n\n52 tn The last word in the verse, בְּאֶחָת (bÿekhat), means “in one [= at once (?)].” This may indicate a sudden fall, for falling “in one” (the literal meaning) makes no sense. W. McKane wishes to emend the text to read “into a pit” based on v. 10b (Proverbs [OTL], 622); this emendation is followed by NAB, NRSV.\n\n53 tn Or “will have plenty of food” (Heb “bread”); so NAB, NASB, NCV.\n\n54 tn Heb “empty things” or “vain things”; NRSV “follows worthless pursuits.”\n\nsn Prosperity depends on diligent work and not on chasing empty dreams. The proverb is essentially the same as Prov 12:11 except for the last expression.\n\n55 tn The repetition of the verb strengthens the contrast. Both halves of the verse use the verb יִשְׂבַּע (yisba’, “will be satisfied; will be filled with; will have enough”). It is positive in the first colon, but negative in the second – with an ironic twist to say one is “satisfied” with poverty.\n\n56 tn Heb “a man of faithfulness,” although the context does not indicate this should be limited only to males.\n\nsn The text does not qualify the nature of the faithfulness. While this would certainly have implications for the person’s righteous acts, its primary meaning may be his diligence and reliability in his work. His faithful work will bring the returns.\n\n57 sn The proverb is not rebuking diligent labor. One who is eager to get rich quickly is the opposite of the faithful person. The first person is faithful to God and to the covenant community; the second is trying to get rich as quickly as possible, at the least without doing an honest day’s work and at the worst dishonestly. In a hurry to gain wealth, he falls into various schemes and will pay for it. Tg. Prov 28:20 interprets this to say he hastens through deceit and wrongdoing.\n\n58 tn The construction uses the Hiphil infinitive הַכֵּר (hakken) as the subject of the sentence: “to have respect for [or, recognize] persons is not good” (e.g., 24:23; 18:5; Deut 1:17; Lev 19:15). Such favoritism is “not good”; instead, it is a miscarriage of justice and is to be avoided.\n\n59 tn Heb “not good.” This is a figure of speech known as tapeinosis – a deliberate understatement to emphasize a worst-case scenario: “it is terrible!”\n\n60 tn The meaning and connection of the line is not readily clear. It could be taken in one of two ways: (1) a person can steal even a small piece of bread if hungry, and so the court should show some compassion, or it should show no partiality even in such a pathetic case; (2) a person could be bribed for a very small price (a small piece of bread being the figure representing this). This second view harmonizes best with the law.\n\n61 tn Heb “a man with an evil eye” (as opposed to the generous man who has a “good” eye). This individual is selfish, unkind, unsympathetic to others. He looks only to his own gain. Cf. NAB “The avaricious man”; NLT “A greedy person.”\n\n62 sn The one who is hasty to gain wealth is involved in sin in some way, for which he will be punished by poverty. The idea of “hastening” after riches suggests a dishonest approach to acquiring wealth.\n\n63 tn Or “rebukes” (NAB, NASB, NIV, NRSV).\n\n64 tn Heb “a man,” but the context does not indicate this should be limited only to males.\n\n65 tn There is a problem with אַחֲרַי (’akharay), which in the MT reads “after me.” This could be taken to mean “after my instructions,” but that is forced. C. H. Toy suggests simply changing it to “after” or “afterward,” i.e., “in the end” (Proverbs [ICC], 504), a solution most English versions adopt. G. R. Driver suggested an Akkadian cognate ahurru, “common man,” reading “as a rebuker an ordinary man” (“Hebrew Notes,” ZAW 52 [1934]: 147).\n\n66 tn The construction uses the Hiphil participle מַחֲלִיק (makhaliq, “makes smooth”) followed by the adverbial accusative of means, the metonymy “tongue” – he makes what he says smooth. This will be pleasing for the moment, but it will offer no constructive help like the rebuke would.\n\n67 sn While the expression is general enough to cover any kind of robbery, the point seems to be that because it can be rationalized it may refer to prematurely trying to gain control of the family property through some form of pressure and in the process reducing the parents’ possessions and standing in the community. The culprit could claim what he does is not wrong because the estate would be his anyway.\n\n68 sn The metaphor of “companion” here means that a person who would do this is just like the criminally destructive person. It is as if they were working together, for the results are the same.\n\n69 tn Heb “man who destroys” (so NASB); TEV “no better than a common thief.”\n\n70 tn Heb “wide of soul.” This is an idiom meaning “a greedy person.” The term נֶפֶשׁ (nefesh, traditionally, “soul”) has here its more basic meaning of appetites (a person is a soul, a bundle of appetites; BDB 660 s.v. 5.a). It would mean “wide of appetite” (רְהַב־נֶפֶשׁ), thus “greedy.”\n\n71 sn Greed “stirs up” the strife. This individual’s attitude and actions stir up dissension because people do not long tolerate him.\n\n72 tn The construction uses the participle בּוֹטֵחַ (boteakh) followed by עַל־יְהוָה (’al-yÿhvah), which gives the sense of “relying confidently on the Lord.” This is the antithesis of the greedy person who pushes to get what he desires.\n\n73 tn The verb דָּשֵׁן (dashen) means “to be fat,” and in the Piel/Pual stems “to make fat/to be made fat” (cf. KJV, ASV). The idea of being “fat” was symbolic of health and prosperity – the one who trusts in the Lord will be abundantly prosperous and fully gratified (cf. NRSV “will be enriched”).\n\n74 sn The idea of “trusting in one’s own heart” is a way of describing one who is self-reliant. C. H. Toy says it means to follow the untrained suggestions of the mind or to rely on one’s own mental resources (Proverbs [ICC], 505). It is arrogant to take no counsel but to rely only on one’s own intelligence.\n\n75 sn The idiom of “walking in wisdom” means to live life according to the acquired skill and knowledge passed on from the sages. It is the wisdom from above that the book of Proverbs presents, not the undisciplined and uninformed wit and wisdom from below.\n\n76 tn The verb form יִמָּלֵט (yimmalet) is the Niphal imperfect; the form means “to escape.” In this context one would conclude that it means “to escape from trouble,” because the one who lives in this life by wisdom will escape trouble, and the one who trusts in himself will not.\n\n77 sn The generous individual will be rewarded. He will not lack nor miss what he has given away to the poor.\n\n78 tn Heb “hides his eyes”; “to them” is supplied in the translation to indicate the link with the poor in the preceding line. Hiding or closing the eyes is a metonymy of cause or of adjunct, indicating a decision not to look on and thereby help the poor. It could also be taken as an implied comparison, i.e., not helping the poor is like closing the eyes to them.\n\n79 tn The term “receives” is not in the Hebrew text but is implied, and is supplied in the translation.\n\n80 sn The text does not specify the nature or the source of the curses. It is natural to think that they would be given by the poor who are being mistreated and ignored. Far from being praised for their contributions to society, selfish, stingy people will be reviled for their heartless indifference.\n\n81 tn Heb “the wicked rise,” referring to an accession to power, as in a government. Cf. TEV “come to power”; NLT “take charge.”\n\nsn The proverb is essentially the same as 28:12 (e.g., Prov 11:10; 29:2, 16). It refers to the wicked “rising to power” in government.\n\n82 tn Heb “a man” or “mankind” in a generic sense.\n\n83 tn The form is the Niphal imperfect of סָתַר (satar, “to hide”); in this stem it can mean “to hide themselves” or “to go into hiding.” In either case the expression would be a hyperbole; the populace would not go into hiding, but they would tread softly and move about cautiously. G. R. Driver suggests the Akkadian sataru instead, which means “to demolish,” and is cognate to the Aramaic “to destroy.” This would produce the idea that people are “destroyed” when the wicked come to power (“Problems in the Hebrew Text of Proverbs,” Bib 32 [1951]: 192-93). That meaning certainly fits the idea, but there is no reason for the change because the MT is perfectly readable as it is and makes good sense.\n\n84 tn The two clauses have parallel constructions: They both begin with infinitives construct with prepositions functioning as temporal clauses, followed by subjective genitives (first the wicked, and then the pronoun referring to them). This heightens the antithesis: “when the wicked rise…when they perish.”\n\ncreated in 0.03 seconds\npowered by", "pred_label": "__label__1", "pred_score_pos": 0.5997481942176819} {"content": "Northern Ireland’s abortion time warp\n\n2017 marks the 50th anniversary of abortions becoming legal throughout most of Britain.\n\nExcept in Northern Ireland where women are still legally prevented from accessing NHS abortion services that their peers in England, Scotland and Wales can use.\n\nThis situation has been described by Amnesty International as a “postcode lottery” that leaves women unable to afford travel costs in a tough situation.\n\nIn a country that has been marred by religious divides throughout its history, this topic has caused a split between both devout Christian opponents and pro-choice human rights campaigners.\n\nThis has been caused by the country’s assembly, located in Belfast’s Stormont Buildings, who maintain a near blanket ban on abortions, which even prevents victims of rape, incest or fatal abnormalities from accessing terminations.\n\nAcross the rest of Britain, abortions have been legal and free of charge since the 1967 Abortion Act. Though, this has never been extended to Northern Ireland as politicians in its devolved parliament have continuously voiced opposition to the legislation.\n\nOn the one hand prominent members from both Catholic and Protestant based political sides have voiced staunch opposition to any changes in laws dating back to 1861.\n\nThis opposition has been fronted by several senior politicians with the country’s former health minister Jim Wells being an important voice in the dispute to preserve Northern Ireland’s strict laws.\n\n“The politicians are definitely behind the people of Northern Ireland in terms of understanding human rights and equality.”\n\nIn 2012, two years before becoming health minister, Wells came in for criticism from pro-choice campaigners after telling a local radio station that he believed abortions should be banned even for women who had been the victims of rape.\n\nWells is a member of the Democratic Unionist Party, who are known for their conservative and religiously based politics, and are Northern Ireland’s largest political party.\n\nThe DUP, as they are more commonly known, have been under pressure from pro-choice activist groups in recent years for their strong opposition to abortions.\n\nThis message has been echoed by their leader, and Northern Ireland First Minister, Arlene Foster who, upon becoming the country’s first ever female leader in January 2016, told The Guardian that she intends to keep strict abortion laws in place.\n\nFoster’s comments came shortly after a high court ruling said Northern Ireland’s current abortion laws are “incompatible” with both European and Human Rights legislation.\n\nBut it is not just Foster who continues to support this heavily-criticised system as in February 2016 the country’s assembly voted against legalising abortions for women suffering from fatal foetal abnormality.\n\nThis condition refers to situations where a baby suffers from a serious syndrome that will more than likely cause death before or shortly after its birth.\n\nAs this leaves affected women in a mentally draining situation, it played a significant role in the decision making process behind Belfast High Court’s ruling of current laws breaching human rights.\n\nA woman walks past one of Belfast's many pieces of pro-choice artwork (Photo: James Cropper)\n\nA woman walks past one of Belfast’s many pieces of pro-choice artwork [James Cropper]\n\nThe mental strain on women suffering from these conditions has been a keenly discussed theme for human rights campaigners who have been pressing for free on-demand abortion services for any woman in the country.\n\nCampaigning has been led by several groups with Amnesty International’s Northern Irish branch describing the country’s current abortion laws as “Victorian” and “from a time before the invention of the lightbulb”.\n\nThis was something highlighted by Emma Campbell, member of well-known pro-abortion campaigning group Alliance For Choice, who told Artefact: “We all know how the DUP and Stormont works, it’s not a very mature democracy”.\n\n“The politicians are definitely behind the people of Northern Ireland in terms of understanding human rights and equality,” she added.\n\nA major factor within Northern Ireland’s pro-choice movement has been the difficulty faced by women who are not in a comfortable financial position.\n\nThis issue received worldwide attention amongst Human Rights campaigners recently after a Northern Irish woman was handed a three-month suspended sentence for her use of self-inducing abortion pills.\n\nThe pills, which the woman used because she couldn’t afford to travel to England, allow women to undergo self-induced abortions and have been used in Northern Ireland to bypass the country’s laws in recent years.\n\nYet, by taking these pills, women are technically in violation of the UK’s Offences against the Person Act, 1861, which can result in life imprisonment.\n\nThis case promoted backlash from pro-choice campaigners who say that it highlights a major issue of how women from lower socio-economic backgrounds are often unable to afford travel to other parts of the UK.\n\nWhile strong anti-abortion sentiments remain prevalent amongst Northern Ireland’s main political players, the country’s public appear to hold contrasting views that are more in line with their contemporaries in the rest of Britain.\n\nNearly a year after Belfast high court’s ruled the country’s laws as being in breach of human rights in, Amnesty International released a poll that they claimed showed 72 per cent of Northern Ireland’s population supported more lenient laws on abortion.\n\nIn response to the poll, pro-life campaigner Adrianne Peltz said: “People who think women should be denied abortions are in a small and ever-decreasing minority. Only one in six people agree with the status quo for abortion laws.”\n\n“If the law was changed in line with the overwhelming wishes of the public, we would no longer force women, who have been raped or been given a fatal diagnosis for their pregnancy, onto planes to England and away from their families and medical carers,” she added.\n\nAn unexpected aspect of this poll was that it discovered 73 per cent of DUP party members supported abortion services being decriminalised in the country, which contradicts the stance of its elected politicians and Northern Ireland’s first minister.\n\nThe organisation also brought a 45,000 strong petition to Northern Ireland’s parliament building in Stormont where they called on politicians to bring abortion laws in line with other UK regions.\n\nAbortion Rights Now graffiti seen in Belfast (Photo: James Cropper)\n\nAbortion Rights Now graffiti seen in Belfast [James Cropper]\n\nHowever, former health minister Jim Wells set up his own petition urging the country’s government to uphold strict legislation, and the DUP politician, alongside pro-life campaigners, presented their 300,000 strong petition on the same steps as Amnesty did just a week earlier.\n\nOn the steps of parliament building, Wells told local media that he was “absolutely convinced the people of Northern Ireland do not want that law to extend to this part of the United Kingdom.”\n\nThe support for Well’s petition indicates that staunch anti-abortion views are still prevalent throughout Northern Irish society, which is generally synonymous with strict religious ties.\n\nIf accurate, it also represents six per cent of Northern Ireland’s current population of 1.8 million, which is a notable total for such a petition.\n\nWhen asked about this apparent strong support for abortion laws to be maintained in Northern Ireland Emma Campbell from Alliance for Choice suggested that everything in Well’s poll isn’t as it seems.\n\n“The very same boxes of petitions have been arriving in Stormont for the past eight years, it’s not a regulated source, there’s no evidence base, there’s no peer review.\n\nThe petition was also fronted by pro-life activist group Precious Life who are widely known for their strong religious position on abortions that consider any termination after conception as part of a “silent holocaust”.\n\nThis strong rhetoric is represented by Bernadette Smyth, a regular media voice for pro-life activists who has proclaimed extreme opposition to a recent report that claimed 55 per cent of NI citizens supported abortion laws being relaxed.\n\nOpponents of Northern Ireland's strict abortion laws have often cited that women who cannot afford travel risk being left in an alienated position (Photo: James Cropper)\n\nOpponents of Northern Ireland’s strict abortion laws have often cited that women who cannot afford travel risk being left in an alienated position [James Cropper]\n\nThe activist group even staged an “empty manger” protest before Christmas, which they said “represented the emptiness left behind by an abortion”.\n\nSmyth’s controversial persona was also heightened when she was convicted of harassing a former politician for her pro-abortion views.\n\nDawn Purvis had been working in a Belfast-based health clinic that offers rare abortions in Northern Ireland if they are deemed as exceptional circumstances\n\nAfter her conviction, Smyth was told by a judge that “this case was run, no-holds barred, in a vicious and malicious fashion.”\n\nSmyth’s conviction shows how the country’s abortion debate has at times turned extremely dirty as strong religious views clash with human rights campaigners.\n\nSmyth later had her conviction overturned.\n\nAs Northern Ireland is run by a devolved government it has the power to implement its own laws. However, due to the country’s troubled history, its government is required to be led by both a First and Deputy minister who are taken from the two main political parties.\n\n“We need to help the women who wish to seek a termination in these circumstances and we need to help them now.”\n\nDespite having titles that indicate one position being higher than the other, both two leaders maintain equal powers.\n\nThis has most recently seen the leader of the DUP, a pro-British unionist party, Arlene Foster being First Minister and Martin McGuiness from the pro-independence party Sinn Féin as Deputy-first minister.\n\nBut the country’s fragile power-sharing has recently been rocked by a political crisis that resulted in McGuinness resigned from his position as deputy-first minister.\n\nDue to the country’s complex power sharing system, McGuinness’ resignation has forced snap elections to be called that could result in Arlene Foster losing her position as Northern Ireland first minister.\n\nThis is where the issue of abortion gets stuck, because for any amendments in law to be made it would require support from both sides of the political spectrum, which are fronted by traditionally religious-minded individuals.\n\nWith the recent political turmoil in Northern Ireland leaving an election looming, or even a return to direct rule from Westminster, arguments on both sides of the abortion divide will be frustratingly put on hold.\n\nEven so, as no legislation can be passed until the country elects a new government, human rights campaigners may be the most frustrated of both groups.\n\nThe Future?\n\nLike many other issues in Northern Irish politics this topic has turned into an argument of how to move the country forward in line with its British counterparts.\n\nSo, fifty years after most of Britain legalised abortion what position could Northern Irish women be in come the end of 2017?\n\nPro-choice campaigners have reason to be optimistic that progress may be made, albeit slowly, by the country’s current health minister Michelle O’Neill who last year set up a working group aimed at assisting women affected by fatal foetal abnormality.\n\nThe working group is due to publish its findings in the comings weeks after investigating whether Northern Ireland’s abortion laws are currently in line with contemporary legal systems alongside an assessment of the situations that they leave women in.\n\nA new bill was recently raised by former Northern Irish justice minister David Ford that aimed to legalise abortions for women suffering from the condition. Nonetheless, the bill has since fallen through, something that was celebrated by Precious Life.\n\nFord, who recently stood down as leader of Northern Ireland’s centrist Alliance party, said: “This is not about disability, it is solely concerned with situations where a foetus cannot survive.”\n\n“We know the desire is there in Northern Ireland for change to the law. We need to help the women who wish to seek a termination in these circumstances and we need to help them now,” he added.\n\nThere has also been talk that Scotland’s first minister Nicola Sturgeon is considering an offer to provide Northern Irish women with free abortions Scottish NHS hospitals, which would be different from other NHS hospitals outside of the country who refuse women free services.\n\nAlthough, while welcoming the attempts of politicians at both home and other countries, local pro-choice campaigners told Artefact that it is simply not enough to enforce real change to the country’s legalisation.\n\nNicola Sturgeon’s announcement was obviously incredibly welcomed but at the same time it should have made our government embarrassed that someone else in another jurisdiction was having to step in and help with healthcare because they can’t provide it,” they told us.\n\nThis cautious optimism has been the result of a history of potential progress being dented by Northern Irish politicians who have continuously voted down any real attempt to change strict legislation.\n\nBut, with strong evidence that the Northern Irish public are behind abortion legalisation change and high court rulings condemning the Stormont government’s status quo on the issue, 2017 marks an important year for this debate.\n\nThe optimism amongst pro-choice campaigners will have to remain contained, until Northern Irish politicians find a solution to their current crisis, no real legislation can be passed until a new government is in place.\n\nWhether the new government sticks to traditionally strict religious beliefs on abortion or follow an apparent public majority is for 2017 to see.\n\nWhat remains certain though is that the country is still lagging 50 years behind the rest of Britain, something that its majority party the DUP remains such a keen advocate of.\n\n\n\nAll images by James Cropper", "pred_label": "__label__1", "pred_score_pos": 0.7065890431404114} {"content": "We provide the cheapest world of warcraft gold and fast power leveling !\n\nDeath Knight Hero Class\n\nAuthor: - Source: http://www.inwowgold.com\n\n  There are a lot of things still being worked out with the Death Knight class such as specific spell abilities. Unsimilar to a traditional caster type however, a Death Knight's spell power comes from runes that are etched into their blade. Think Warcraft III when you think about the possibilities of abilities for the Death Knight. I say possibilities because things are still in process for the development of the class and there will be (of course) a lot of testing for balance done. Given that this is our first Hero class we're unveiling, you can be sure we're going for the coolest of the cool for this class.\n\n1. What is a Hero Class?\n- A Hero class is a class that can to be obtained, A Hero class is a completely new idea that Blizzard has just implemented.\n\n2. How do I Unlock my Death Knight?\n- The Death Knight will be unlocked through a Long quest chain. This chain will be done by a level 80 and is expected to take a while.\n- The quest line's roll is to teach you about your death knight.\n\n3. What will Happen to my Main?\n- Your Main will not be transformed into a death knight. Blizzard juggles with this idea but thought that you would be losing something to gain something.\n- The death knight will be unlocked and will start at a high level. This is also a part of the hero class. imagine a level one death knight gnome killing boars, lol. Blizzard is not sure on the expected level but they expect it to be within level 50-70.\n\n4. What Gear Will i be able to use?\n- Death Knights will be a plate wearing class. But they will not have the ability to use Shields.\n- You will get a Special Weapon either Two-Handed or one handed (Intended to dual wield)\n- This will be referred to as your \"Runeblade(s)\"\n\n5. What Gear will my Death Knight start with?\n- Your Death Knight will have gear stated as reasonably Decent for your level, ( Blues im assuming.)\n- You will start with a mount!\n\n6. What Kind of System will I use?\n- Your Death Knight will use a whole new type of system called the Rune System.\n- This will be totally personal and you will be able to make it how you want it!\n- You will be able to choose the runes placed there. The runes will recharge just like energy does (but slower I imagine)\n\n7. What Makes the Death Knight Different?\n- This class is meant to feel completely different from any other class. It is a DPS class, like a rouge but Blizzard is being very careful not to make it over power the rogue but it will be a hearty competitor.\n- The Death Knight will not only be a melee class but a summoning class.\n- The Death Knight is a VERY, VERY Different class.\n\n   The Death Knight is going to have a mana pool. The runes they inscribe on their weapons are their mana pool (of a sort). As they use their abilities, the runes will be exhausted. After a period of time the runes will refresh. So, they don't have a traditional type of mana pool. You'll most likely see some screenshots of it, but the Death Knight (at current) has three different types of runes that they can inscribe on their weapon: Blood, Frost, and Unholy. Runes can only be inscribed out of combat ( all of this is subject to change as development continues.)\n\nGet more news come to our wow gold site.http://www.inwowgold.com\n\n\nWoW Gold\nPower Leveling\nAlso on Inwowgold\nWorld of Warcraft Gold Guide - Farming Strategies,Cheats,Secrets,TipPlayer.\nCopyright © 2008 inwowgold.com. All rights reserved. Copyright/IP Policy | Terms of Service | Guidelines | Feedback | Help", "pred_label": "__label__1", "pred_score_pos": 0.5261034965515137} {"content": "Desert Trails Publishing was developed to independently publish books that strive to accurately portray issues related to the desert environment and the Native Americans that live there. While our primary focus is rock art within the Sonoran and Colorado deserts, we attempt to integrate issues concerning the Native Americans from the prehistoric to the contemporary time periods. We provide practical means for the average person to become involved and participate in this fascinating world.", "pred_label": "__label__1", "pred_score_pos": 0.9999909996986389} {"content": "What is Speedcubing?\n\n\nFun fact about me: I am obsessed with Rubik’s cubes. Although I’m no Yusheng Du (My average solve time is about 40 seconds), I love to sit down with a cube (or tetrahedron, or dodecahedron) and work on my best time. So today, I thought I would introduce you to the exciting world of speedcubing.\n\nWhat is speedcubing?\n\nSimply put, speedcubing is the act of solving Rubik’s cubes or similar puzzles as quickly as possible. The main governing body for speedcubing is the World Cubing Association, or WCA. They hold international competitions in a variety of events, from the beginner-friendly skewb to the dodecahedronal (12-faced) megaminx.\n\nHow can I get into speedcubing?\n\nPersonally, I started learning how to solve the standard 3x3x3 Rubik’s cube, as this is a good introduction to ideas like algorithms and the basic notations for the cube. However, you could also begin solving an easier puzzle, such as the skewb, pyraminx, ivy cube, or 2×2. From here, the paths are limitless.\n\nTwo speed-cubing competitors stand with referee at centre who points to the person on the right that won the round\n\nYou could start solving larger and larger nxnxn puzzles such as the 4×4 (sometimes called the Rubik’s revenge) or the 17×17, the largest mass-produced cube in the world. Z3 cubing on youtube has excellent tutorials for most of these puzzles. Another option would be to learn puzzles with a different mechanism, such as the square-1. The third main option is to explore the wide world of modding.\n\nWhat is modding?\n\nAfter you’ve mastered the basic 3×3, there are a plethora of different puzzles which use the same internal mechanisms, but differently shaped or stickered pieces to increase the challenge. The prime examples of these include the many varieties of bandage cubes, the mastermorphix family of puzzles, or the mirror cubes. If you’re not interested in learning how to solve more puzzles, YouTuber Nathan Wilson’s 30 days, 30 mods series features some excellent how-to guides for everything from the simple Fisher cube to an enormous hexagonal prism.", "pred_label": "__label__1", "pred_score_pos": 0.8484800457954407} {"content": "Shenzhen Yuanke Electronic Co.,Ltd;\n\nContact: Huang Zucai\n\ncontact number: 0755-27167848 / 0755-27168227 / 0755-27168667\n\nTelephone: 13590473452 / 13410061678 /13247542112\n\nFax: 0755-27167816\n\n\nAddress: 19 Building, second industrial zone, Shenzhen, Guangming New District, Gongming.\n\nHome > SMD LED > Details\n\nApplication range of violet band (domain)\n\nTime: 2018-10-16  View: 1004  Author: Paul\nViolet, also called UV (Ultra Violet), is the shortest wavelength of light in visible light. Some bands of violet light are often called \"black light\" because the light in these bands is invisible to the human eye. UV violet is Optical waves with shorter wavelengths than visible light and longer than X-rays can be distinguished by wavelengths from the perspective of human health and environmental impact:\n\nUV Violet: Visible Light Purple (400-420nm) Usually used in lighting decoration products such as lighting\n\nUVA (315~400nm), also known as long-wave violet or \"black light\". This kind of application is the widest range, up to the money detector, mosquito lamp, mosquito killer lamp, down to the nail lamp, sterilization lamp beauty equipment.\n\nUVB (280~315nm), also known as medium wave violet.\n\n UVC (200~280nm), also known as short-wave violet or bactericidal violet. This kind of deep ultraviolet is also used for medical equipment and military purposes. It exposes bare skin to direct damage to the human body. The sterilization effect is strong...\n\n UVD: vacuum ultraviolet (100-200nm)\n\n The sunlight contains ultraviolet light in the three bands of UVA, UVB and UVC, but due to the absorption of the ozone layer in the air, 99% of the ultraviolet light reaching the ground is in the UVA band.\n\n UV violet light plays a big role in skin treatment. UV violet can be used for: psoriasis, allergies, eczema, jaundice and other skin diseases.\n\n Phototherapy is a clinical method of treatment with light. In different spectra, especially UV light has been used as an effective and universal light source to treat a range of diseases, including: rickets, psoriasis, allergies, Eczema, jaundice, etc. In the process of phototherapy, the skin or damaged part of the patient is irradiated with different wavelengths of violet light according to the actual situation. Most of the wavelengths are in UVA (315nm~410nm) or UVB (280nm~315nm). Scope, during use, UV light can promote the biological reaction of skin cells to inhibit the cell's excessive growth and kill T cells in the skin\n\n One of the benefits of UV radiation is that it stimulates the production of vitamin D. Vitamin D plays a very important role in promoting bone growth and calcium and phosphorus absorption, immune function and blood cell composition. Vitamin D is due to skin exposure to sunlight. It is produced by the reaction of purple light in the sun, especially the violet light in the UVB band, and the vitamin D in the human body can be obtained by irradiating the skin with a transaction or UV light.\n\nIn addition to the contribution of UV violet to the medical industry, UV in other wavelength ranges has different uses, such as sterilization, banknote counterfeiting, light curing, printing, industrial, military, etc.\n • 0755-27167848\n • 13590473452", "pred_label": "__label__1", "pred_score_pos": 0.7571830153465271} {"content": "Vous êtes sur la page 1sur 1\n\nMicrowave Cooking\n\nFood and water molecules have a positive and negative end similar to the north and south polarity of a magnet. The magnetron in a microwave oven generates an alternating current of more than a billion cycles per second. As this extremely rapid alternating microwave frequency bombards food, it causes the molecules of the food to reverse polarity at the same billions of times per second. This agitation creates molecular friction, producing heat but also tearing apart and deforming the food molecules. (We receive some microwave frequencies from the sun, but it is a direct current which does not create molecular friction.) When food is microwaved, amino acids (the building blocks of protein) are converted from the natural trans- and l- forms to biologically inactive and even nerve and kidney toxic cis- and d- forms (University of Vienna, 1989.) In 1992, researchers at Stanford University Medical Center found that warming breast milk in a microwave oven destroyed 98% of the antibodies that provide passive immunity to infants, and destroyed 96% of liposome activity that inhibits bacterial growth. Russian investigations found that cancer causing substances are formed in virtually all microwaved foods. They also found an average of 60 to 90% decreased nutritional value of microwaved foods. The Soviet Union banned the use of microwave ovens in 1976. In 1991, a lawsuit in Oklahoma concerned the use of microwaved blood given as a transfusion for a hip surgery patient. She died from the transfusion. (Blood for transfusions is routinely warmed, but not in a microwave oven.) In a study comparing the consumption of food heated by microwave vs. other methods of cooking, the microwaved food causes a decrease in hemoglobin, an increase in white blood cells (the bodys response to a toxin) and increased LDL (bad) cholesterol. Among those who consume mostly microwaved foods, the following is found: increased rate of digestive disorders; stomach and intestinal cancer, lymphatic and immune disorders, cancers of the lymph and blood, lowered hormone production, loss of memory and concentration, emotional instability, decrease in intelligence, weight problems. I have not found a single study by any governmental body on the effects of consuming microwaved food. I do find that my toaster oven and stovetop work quite well for my cooking and baking needs! References: Comparative Study of Food Prepared Conventionally and in the Microwave Oven, Drs. Hans Hertel and Bernard Blanc, Raum & Zelt, 1992. Health Effects of Microwave Radiation Microwave Ovens, Lita Lee, PhD, 1991. Julian Whitaker, MD, Health and Healing: Tomorrows Medicine Today, 1993. Paul Brodeur, The Zapping of America: Microwaves, Their Deadly Risk and the Cover-Up, 1977. Effects of Microwave Radiation on Anti-infective Factors in Human Milk, Journal of Pediatrics, vol. 89, no. 4, April 1992. Copyright 2004, Linda J. Melos, ND", "pred_label": "__label__1", "pred_score_pos": 0.6583088636398315} {"content": "This page been viewed 1423 times\n\n Uses of Bay Leaf, Tejpatta\n\n7 Uses of Bay Leaf\n\nBay leaf is a leaf that is used in cooking mostly for its aromatic purpose. Bay leaves can be used fresh or dried for their distinctive taste and flavor. There are different types of bay leaves found and all of them are used in different types of cuisines.\n\n1. Bay leaves can be used either Fresh or dried. They are used in cooking due to their distinctive flavour and cinnamon like fragrance that they impart to the food.\n\n2. In Indian cuisine especially, bay leaves are used to flavor rice dishes like biryanis and pulaos. Here they can either be added to the masala paste with the rice or added to the raw rice to imbibe the flavor while cooking.  \n\n3. Bay leaves form one of the main ingredients for the Indian Spice Powder, Garam Masala, that is mainly used in a lot of Punjabi cooking. \n\n4. In Indian cuisine, the leaves are also often used whole while tempering for vegetable dishes like subzis or even dals and removed before serving. Some dishes that use bay leaf are Paneer Makhani and Gujarati Dal\n\n5. They can also be used to flavor the filling of certain snacks like kachori as they impart a strong flavor to it. \n\n6. The leaves are often used to flavour soups like tomato soup, or stews that are mostly Mediterranean. \n\n7. The leaves also flavour classic French dishes such as bouillabaisse and bouillon.\n\n\nTo know about Recipes using Bay Leaf, check out our collection.\n\nUses Of Bay Leaf\n\nA favourite with most people while eating out at any Punjabi restaurant! paneer makhani as the name suggests is a very rich subzi from the lap of Punjab. It uses one of Punjabi cuisines most loved ingredients butter. In traditional Punjabi houses, the women folk make pure white butter from thick creamy milk. The liquid that is left over after the butter has been removed is very delicious and cooling and makes a tasty drink. Soft paneer chunks are dunked into a rich tomato based gravy, a must try for all paneer lovers! Serve with rotis or parathas. Enjoy how to make Paneer Makhani recipe with detailed step by step photos.\nWith a characteristic sweet and sour taste, this traditional dal recipe is quite reflective of Gujarati culture and uses the typical ingredients and spices. While this is an everyday dal, it takes on a festive hue when ingredients like peanuts and yam are added. For such grand occasions, the dal is boiled over and over again to get the best flavour. Remember that the ideal balance of sweet and sour levels required for the success of this recipe is an art that can be perfected with practice. Do try other traditionals dals like Dhansak Dal, Maa ki Dal and Char Dal ka Dalcha.\nA tangy soup of spice-tinged tomatoes, the Cream of Tomato Soup is a choice that perfectly pleases the Indian palate. A combination of tomato puree and freshly cooked tomatoes are combined with spices and blended into a rich soup, which is made all the more luxuriant by the addition of fresh cream. Kindle the appetite by serving this easy to make soup hot and fresh with bread croutons.", "pred_label": "__label__1", "pred_score_pos": 0.9151589870452881} {"content": "Karen Bexfield: Vessel, Zircon\n\n\nThis sculpture is by Karen Bexfield.\n\nKaren Bexfield creates kiln-formed glass sculptures that mirror the organic patterns of nature exploring the relationship between positive and negative space, light and shadow, and the poetic balance they create. She has received multiple awards and honors and her work is exhibited in public and private collections as well as being featured in museum and gallery exhibitions across the United States.\n\nArtist/Designer Karen Bexfield\nHeight 3.50 inches\nWidth 9.25 inches\nLength 9.25 inches\nCity Albuquerque, NM\nCountry USA", "pred_label": "__label__1", "pred_score_pos": 0.9483072757720947} {"content": "Image, Aspirational (creative genre)\n\nA type of advertising genre that features characters and lifestyles that are generally desirable or enviable to consumers. In this type of genre, the desire or envy that people feel for the featured characters and lifestyles is meant to “rub off” onto the associated brand, product, or service.\n\nIn-Game Ad\n\nAds embedded into a video game to promote a brand, product or service. In-Game advertising differs from advergaming, which refers specifically to a game design to advertise a brand, product or service.\n\nInductive Research\n\nA form of media and market research that involves gathering data on a topic of interest and looking for patterns within the data set to found the development of a new theory. See also “Deductive Research.”\n\nInformed Consent\n\nIn media and market research, the process by which a participant learns about and understand the purpose, benefits and potential risks of participating in a market research study, and then agree to participate with full knowledge of possible risks and benefits.\n\n\nAd or other promotional material that is either bound into a magazine or newspaper or placed loosely within it.\n\n\nIn media and market research, the exchange of information between an interviewer (see “Interviewer”) and research participant(s), where the interviewer asks the participants one or more questions and records the answer. An interview can be conducted in several ways, including face-to-face (see “Interview, Face-to-Face”), on the phone (see “Interview, Telephone”), online (see “Interview, Online”) or artificial intelligence (see “Artificial Intelligence (AI)”) enabled technology.\n\nInterview, Central Location\n\nA type of interview that is conducted face-to-face in one or more specified locations (for example, at a shopping mall or research facility) rather than at study participants’ homes (see “Interview, In-home”).", "pred_label": "__label__1", "pred_score_pos": 0.9715073704719543} {"content": "Daniel’s Story: When Employee Appreciation Efforts Don’t Seem to Pay Off\n\n\nNote: Daniel is a fictional character. Clients’ personal stories are always kept strictly confidential.\n\nOur first phone call\n\n“Hi, Audrey. I need your help. Many of my staff members seem to lack motivation so I have been going out of my way to show appreciation and try to make them want to be more engaged, but I am not seeing any improvements.”\n\n“Hi, Daniel. Can you give me some examples of behaviors you observe that you think come from a low level of motivation?”\n\n“It’s not the same for everyone. One or two people tend to come in late several times a week. Two employees chronically miss deadlines. Four or five don’t pay attention to details and often make mistakes. Many have a negative attitude when I tell them we are going to start a new project. And when I ask for volunteers for anything… I get crickets.”\n\n“Can you tell me what efforts you’ve already made to improve motivation and engagement?”\n\n“I read in an article that the majority of employees don’t feel appreciated and that hurts motivation, so I decided to start with staff appreciation efforts. I bring doughnuts and coffee to all of our staff meetings. I make a point to express appreciation for the entire team at every meeting. For our annual retreat, instead of staying on campus or going to a nearby hotel, we booked a meeting room at a hotel right on the beach. We finished early both days to allow people to relax and have some fun. I don’t know what more I can do! Our university already celebrates service anniversaries and our President’s office sends a card to everyone on their birthday.”\n\n“Well, I can tell you that showing appreciation is much more effective when it’s done with one person at a time, highlighting something specific about that individual, than appreciation for an entire team, or individual recognition that is equally given to everyone, like birthdays and anniversaries. But before we go into details regarding what makes people feel appreciated, let’s look at the big picture. There are many important factors that impact motivation. Let’s start there.”\n\nMotivation 101\n\nDuring our first coaching session, I explained to David that when it comes to motivating employees, the first step is to communicate the “what, why, and how”. Employees need to have a full understanding of what they are expected to accomplish, why it matters, and how to do it successfully. It’s a very basic concept that most leaders have known for a long time, but they often assume that people know things that have not been clearly communicated.\n\nOnce the expectations are clear (the what), the purpose and meaning (the why) are understood, and the strategies (the how) are established, obstacles need to be removed. Consciously or not, employees consider three questions before they do something to the best of their ability: (1) “Are they capable of doing it?”, (2) “Will it work?”, and “Is it worth the effort?”\n\nIdentifying obstacles\n\nI worked with David on a non-threatening approach to get feedback from his staff members on what might cause discouragement or low engagement. It was essential to strategize and choose very careful what words would be used to avoid making people defensive or uncooperative.\n\nDavid’s team members were eager to tell him what problems they were facing because they were affecting their job satisfaction and quality of life. David discovered that those who came in felt there was no accountability and no consequences. They thought no one cared. They needed to see more leadership and be reminded of the department’s values and standards.\n\nThe two employees who missed deadlines were clearly overworked but afraid to speak up. They were doing their best and didn’t know how to ask for help without looking bad or disappointing David. They overpromised and underdelivered because they didn’t want to say no or to complain or to look incompetent. They needed help to communicate effectively with David.\n\nThe employees who made mistakes admitted being bored and disengaged. They needed new challenges and opportunities to contribute to other projects and welcomed new goals and new training.\n\nAnother important insight gained was that people were not reluctant to volunteer because they didn’t care but because they did! They had volunteered in the past and didn’t feel heard, or they thought they contributions were not used, or sometimes they felt they were wasting countless hours serving on committees that accomplished very little. They were discouraged because their efforts hadn’t paid off and they didn’t want to feel victimized again.\n\nYou see, no amounts of free doughnuts could fix these problems.\n\nRemoving obstacles\n\nFor the next few weeks, David asked me to coach him on all important aspects of transformational leadership because he realized that his team needed him to be a more effective leader. He knew that once he would change, his employees would change too.\n\nTogether, we worked on creating clear standards and expectations with built-in accountability and finding solutions to the problems he had uncovered. He made some modifications to how he delegated projects to make people’s jobs more interesting and building on people’s strengths. He also made sure that workloads were no longer too light or too heavy. Simultaneously, we worked on creating a culture of excellence and pride in quality work.\n\nOnce obstacles were removed and his team members felt confident that (1) they were capable of doing their job, (2) their efforts would be successful, and (3) it would be worth it, motivation, engagement, and performance dramatically increased. At that point, we started working on individualized employee appreciation.\n\nHow is your team performing?\n\nIf you are not fully satisfied with how well your team members are performing, before you go buy more doughnuts, please start looking at what obstacles are preventing them from doing better.\n\nIt is a sensitive subject and choosing the wrong words or using the wrong tone while asking for feedback can make your problems worse. I invite you to click here and schedule a call with me to discuss how I can facilitate this process for you. You may have one or two bad apples, but the vast majority of employees want to succeed and want to feel happy and engaged at work. Let’s work together to raise the bar, improve morale, and make your department more successful than ever.\n\nAbout the author: Dr. Audrey Reille has empowered thousands of professionals through one-on-one coaching, group coaching, speaking engagements, and online courses. Audrey is the go-to coach for leaders in higher education administration. She empowers them to thrive by reducing stress, optimizing strategies, improving professional relationships, and developing a strong and empowered mindset.", "pred_label": "__label__1", "pred_score_pos": 0.9628046751022339} {"content": "Why A Picture Of Four Female European Politicians Went Viral This Weekend\n\n\n\nOn the far right, you have Ursula von der Leyen. She is the first female Defence Minister in Germany’s history, appointed late last year, and seen by many as a possible successor to Angela Merkel as leader of the Christian Democrats (and possibly Germany).\n\nNext to her sits Jeanine Hennis-Plasschaert, the first female Defence Minister for the Netherlands. (It was actually Hennis-Plasschaert who first tweeted the picture, though her image failed to go viral to same extent as Bildt’s.)\n\nThe other two are not the first female Ministers of Defence for their respective countries — Sweden’s Karin Enström is the only one of the four with any military experience, and Norway’s Ine Eriksen Søreide is her country’s fifth female Minister of Defence. Still, the image of the four women appears to show that female Ministers of Defence in Europe are a growing trend: A few years ago, Carme Chacón became Spain’s first female Minister of Defence (she was seven months pregnant at the time), France had a female Defence Minister between 2002 and 2007, and the United Kingdom also recently appointed females to head their defence.\n\nIn an age where people are questioning the male-dominated spheres of the military all over the world, such a trend makes sense. Three women recently succeeded in passing the notoriously gruelling U.S. Marine infantry training course, though the U.S. is yet to have its first female Secretary of Defence.\n\n“[Dutch politician] Neelie Kroes once said to me that old boys’ networks are the oldest form of cartels we have in Europe,” Hennis-Plasschaert told The Guardian. “She was right, but things are changing, and women can do similar things now.”\n\nStill, some things take time to change. In the many responses to Bildt’s tweet, a number chided him for his description of the Ministers: They’re women, not girls.\n\nBusiness Insider Emails & Alerts\n\nSite highlights each day to your inbox.\n", "pred_label": "__label__1", "pred_score_pos": 0.9451127648353577} {"content": "Cost-benefit analysis framework: February 2019\n\n\nThe cost-benefit analysis (CBA) is part of a regulatory impact analysis statement (RIAS) that is published in the Canada Gazette along with regulations (and proposed regulations) to estimate the incremental benefit and cost impacts to society attributable to those regulations (and proposed regulations). The Government has announced that it intends to publish proposed Clean Fuel Standard (CFS) regulations for liquid fuels in spring/summer 2019 with final regulations planned for 2020 and a coming into force in 2022. Proposed CFS regulations for gaseous and solid fuels are targeted for publication in the Canada Gazette, Part I in 2020 with final regulations planned for 2021 and coming into force in 2023.\n\nThis CBA framework deals with the liquid fuel stream design of the proposed CFS regulations, and outlines the approach for the CBA as part of the RIAS that will accompany the 2019 publication of the proposed regulations. It will compare a scenario in which there are no new CFS regulations (the baseline scenario), to a scenario in which the new regulations would set lifecycle carbon intensity standards on liquid fossil fuels produced and imported in Canada (the regulatory scenario). The impacts of the proposed CFS would be assessed in terms of incremental changes in compliance and administrative requirements, emissions and production, and the associated benefits and costs.\n\nRegulatory design\n\nAs described in the Clean Fuel Standard Regulatory Design Paper,Footnote 1  liquid fossil fuel primary suppliers (i.e., producers and importers) would be subject to the proposed CFS and would be required to reduce the carbon intensity of liquid fossil fuels they produce and import in Canada by 10 grams of carbon dioxide equivalent per megajoule (g CO2e/MJ) from 2016 intensity levels by 2030.\n\nThe CFS is intended to be a flexible policy tool to reduce the carbon intensity of liquid fossil fuels. Three main categories of compliance and credit-generating actions are anticipated: (1) actions that reduce the carbon intensity of the fossil fuel throughout its lifecycle; (2) supplying low-carbon fuels; and (3) specified end-use fuel switching. A fourth category may be permitted if the Department includes a market stability mechanism such as an emissions reduction fund. The CFS would also allow parties that are not fossil fuel primary suppliers to participate in the credit market as voluntary credit-generators.\n\nAnalytical outline\n\nThe impacts of the proposed CFS regulations would be assessed in accordance with the Government of Canada’s Cabinet Directive on Regulations and Canadian Cost-Benefit Analysis Guide.Footnote 2  Regulatory impacts would be identified and compared incrementally to the baseline scenario. This guidance indicates that the net present value and the present value of benefits and costs should be based on a minimum forecast of ten years. To the extent possible, the benefits and costs would be quantified and monetized. In accordance with guidance regarding environmental and health regulatory analyses, monetized impacts would be analyzed in present value terms, applying a 3% discount rate for future years. Impacts that cannot be quantified and monetized would be assessed qualitatively.\n\nBaseline scenario\n\nThe baseline scenario would be based on the most recent greenhouse gas (GHG) inventory and projections.Footnote 3  It would include the federal carbon pollution pricing backstop system (the federal backstop system) and would include the future impact of relevant policies and measures taken, or announced in detail, by the federal, provincial and territorial governments as of the fall of 2018. Key macroeconomic variables such as gross domestic product (GDP), the exchange rate and inflation are aligned to Finance Canada’s projections. Population growth projections are obtained from Statistics Canada and updated in consultation with provinces and territories. Forecasts of oil and natural gas prices and production are taken from the National Energy Board’s most recent Canada’s Energy Future publication.Footnote 4  \n\nRegulatory scenario\n\nIn the regulatory scenario, compliance with the proposed CFS regulations for the liquid stream would result in incremental domestic GHG emission reductions, capital and operating costs for industry to comply and generate credits, as well as administrative costs for both industry and government. Increased compliance costs would also be expected to have an impact on the demand for energy and therefore on economic output and emissions (see Energy price impacts on GDP and greenhouse gas emissions).\n\nThe liquid fuel stream carbon intensity reduction requirement of 10 g CO2e/MJ corresponds to an annual credit compliance obligation of approximately 26 megatonnes (Mt) and up to 23 Mt of incremental GHG emissions reductions in 2030. Some compliance actions taken under the CFS are expected to be attributable (or partially attributable) to other federal and provincial policies and/or industry action, that would have occurred in the absence of the CFS. Given this, it is expected that not all of these actions, and the costs and emission reductions associated with these actions, would be attributable to the CFS in the CBA.\n\nKey benefits\n\nIt is expected that the CFS would result in significant incremental GHG emissions reductions. Emissions reductions would be estimated for various compliance scenarios. To monetize the benefits, the social cost of carbon (SCC) would be applied to the expected GHG emissions reductions. The SCC is a measure of the incremental additional damages that are expected from a small increase in carbon dioxide (CO2) emissions (or conversely, the avoided damages from a decrease in CO2 emissions). Estimates of the SCC provide a way to value CO2 emission changes in CBA and compare them to the incremental costs of abatement.Footnote 5\n\nThere could also be some potential co-benefits due to emissions reductions in air pollutant emissions for certain compliance pathways. Emissions of air pollutants (such as particulate matter) affect health and contribute to air pollution problems such as ground level ozone, haze, and acid rain.Footnote 6  Reductions in air pollutant emissions would improve air quality and could lead to some additional health and environmental benefits. Air quality impacts would be assessed qualitatively and the analysis would look at the degree to which these impacts could change the net result of the CBA. Preliminary information obtained to date suggests that changes in air quality would not have a substantive impact on the net result of the CBA.\n\nKey costs (and savings)\n\nThe compliance cost impacts would be assessed by identifying the one-time costs, and ongoing costs and savings where possible, using available evidence. Where there is insufficient cost information, pathways could be assessed qualitatively, as low, medium or high cost with a range of costs to be determined. Voluntary credit-generating costs would be estimated in a similar manner as compliance costs for fossil fuel primary suppliers (regulated parties). Resource costs are directly incurred as a result of the generation of credits, not as a result of the purchase of credits. Therefore, the CBA would treat credit purchases as a transfer payment between parties and thus not a cost to society as a whole. In addition, if credit-generating actions are expected to occur in the absence of the CFS, they would not be attributed to the CFS, and would thus not result in incremental costs.\n\nIt is expected that government and industry would incur incremental administrative costs as a result of the CFS. In order to implement the CFS, the Department would incur additional costs related to typical administration, compliance promotion, monitoring and enforcement costs, as well as specific one-time administrative costs related to the design and development of a credit transaction system, the Fuel Lifecycle Assessment Modelling Tool, and the electronic reporting system. Resources would also be required in order to operate and enforce the credit transaction system, verify compliance pathways, as well as to update these tools and systems.\n\nEnforcement costs would include estimates of the number of new inspections required, as well as the annual costs of inspections and enforcement measures, based on the number of new regulated parties.\n\nIndustry would incur administrative costs to comply with the CFS. For example, companies would have annual reporting and verification requirements, would be required to register to the credit transaction system and would be required to submit documentation to verify lower-emitting fuel pathways. Administrative impacts on industry would be evaluated using the Government’s Regulatory Cost Calculator, a tool used to monetize increases or decreases in administrative costs on business.Footnote 7  The methodology used for the CBA would be similar to those that were used for recent regulations (such as the Regulations Respecting Reduction in the Release of Methane and Certain Volatile Organic Compounds: Upstream Oil and Gas Sector).Footnote 8\n\nPathway modelling, data and analysis\n\nThe CFS is intended to be flexible on how fossil fuel primary suppliers can comply. Given this, it is not possible to forecast and monetize all possible pathways that may exist now and in the future. To assess CFS impacts, the CBA would identify a representative set of compliance pathways for each category (actions that reduce the carbon intensity of the fossil fuel throughout its lifecycle; supplying low-carbon fuels; and specified end-use fuel switching).\n\nTo the extent possible, the representative compliance pathways used for the CBA would consider what has occurred in other jurisdictions with similar policies (such as California’s Low Carbon Fuel Standard), as well as pathways that are technologically ready and/or commercially available today. The analysis would attempt to identify the technical and/or economic limits to achieving reductions under each compliance pathway, in order to establish an upper bound on the amount of credits that could possibly be generated for each pathway.\n\nData sources used to determine the benefit and cost impacts for each representative compliance pathway would be obtained from a literature review of available online sources, papers, studies and data (such as, the IHS report on the Greenhouse Gas Intensity of Oil Sands Production: Today and in the future or from reports by the Kent Group like Canada’s Downstream Logistical Infrastructure: Refining, Biofuel Plants, Pipelines, Terminals, Bulk Plants & Cardlocks).Footnote 9 Footnote 10   Data would also come from internal studies and sources of information (such as the Natural Resources Canada study on the Deployment of Mid-level Ethanol Blends or data from the Department’s Energy, Emissions and Economy Model for Canada).Footnote 11  Information obtained through consultations with the technical working group would also be considered to support the analysis.\n\nCurrently, there are no models within the Department designed to model emission reductions, credit supply or economic impacts of a CFS policy in detail. The Department is currently developing a Fuel Lifecycle Assessment Modelling Tool and is updating existing economic models to assess the CFS. The CBA may use new and updated models for publication in the Canada Gazette, Part II, should they become available in time, and as appropriate. For publication in the Canada Gazette, Part I, the CBA would assess each potential pathway in terms of emission reductions and compliance costs through a partial equilibrium analysis. This analysis would assume that the demand for energy remains constant and would not include energy price impacts on GDP and GHG emissions, and can also be referred to as a static analysis.\n\nImpacts from categories of credit-generating actions\n\nThe CFS would have three main categories of compliance and credit-generating actions: (1) actions that reduce the carbon intensity of the fossil fuel throughout its lifecycle; (2) supplying low-carbon fuels; and (3) specified end-use fuel switching. The CFS would also have other mechanisms in place to allow for some compliance flexibility. Impacts from these categories of compliance and credit-generating actions as well as compliance flexibilities are described below.\n\nActions that reduce the carbon intensity of the fossil fuel throughout its lifecycle\n\nIt is expected that parties may be able to take actions along the lifecycle of fossil fuels that reduce the carbon intensity of the finished fuel. Credit-generating actions may include, but are not limited to, process improvements, electrification, switching to lower carbon fuels in the production process and carbon capture and storage. These actions could be taken by liquid fossil fuel primary suppliers (e.g., refinery) and by voluntary credit-generators upstream or downstream of a refinery (e.g., oil sands producer).\n\nThe CFS is intended to be flexible by providing fossil fuel primary suppliers and voluntary parties with a range of pathways that they could choose to meet their compliance obligations and generate credits. There is uncertainty about the type of process improvements that would be chosen, their costs, credit generation and GHG reduction potential, as well as the extent to which uptake of process improvements would occur in the absence of the CFS. Therefore, it is unclear how many credits would be incremental reductions that could be attributable to the CFS. The Department welcomes feedback and suggestions on costs and the degree to which each compliance pathway could be attributed to the CFS as well as methods for determining incrementality.\n\nSupplying low-carbon fuels\n\nCredits could be generated by supplying low-carbon fuels for use in Canada. Based on similar policies in other jurisdictions (e.g., British Columbia, California), the most-likely representative compliance pathway under this credit-generating category would be to increase the amount of low-carbon fuel (e.g., ethanol, biodiesel, etc.) blended with fossil fuels (e.g., gasoline, diesel, etc.). Low-carbon fuel producers and importers (the voluntary credit-generators) would earn credits for providing low-carbon fuels. The most-likely compliance pathways for blending are expected to be as follows: ethanol in gasoline, biodiesel in diesel and hydrogenation-derived renewable diesel (HDRD) in diesel.Footnote 12 Footnote 13\n\nIn the baseline scenario, the federal Renewable Fuels Regulations require petroleum producers and importers to have an annual average of 5% renewable fuel content in gasoline (met with ethanol) and 2% renewable fuel content in diesel fuel and heating distillate oil (met with biodiesel and HDRD) based on volume.Footnote 14 However, some provinces blend at higher rates due to their own renewable fuel mandates and low carbon fuel standards, which have increased the national average blend rate up beyond the federal mandate in recent years. The same volume of renewable fuel used to meet the volumetric mandate of the Renewable Fuels Regulations may be used to generate a credit under the CFS. However, given that these actions would have occurred in the absence of the CFS, they would not result in incremental costs or GHG emissions reductions in the CBA.\n\nIn the absence of the CFS, the likelihood of increased blending above existing blend mandates and policies is low, since it is generally more expensive to blend low-carbon fuel with fossil fuel.  Given this, the increased use of low-carbon fuels above baseline levels is expected to be attributable to the CFS. Therefore, these costs and the associated emission reduction benefits that are expected to occur above baseline levels would be attributable to the CFS.\n\nIn the regulatory scenario, it is expected that low-carbon fuel blending would increase above baseline levels. The CBA would assume that low-carbon fuels are blended up to their expected technical and/or economic limits (e.g., vehicle compatibility or feedstock supply limits leading up to 2030) to determine the maximum amount of credits that could be generated for each blend pathway. To determine how many of these credits would result in incremental GHG reductions, the technical and/or economic limits would be compared to the baseline level of blending.\n\nIt is expected that regulated and non-regulated parties affected by the CFS would incur the following cost impacts in order to increase the amount of blending with low-carbon fuels. Producers and importers (the voluntary credit-generators) would supply low-carbon fuels for use in Canada. If low-carbon fuels are supplied domestically, domestic low-carbon fuel suppliers would incur production costs (capital and operating) to build additional capacity. Refiners and terminals (a non-regulated party) would incur net incremental ongoing costs of purchasing low-carbon fuel over fossil fuel, as well as transportation costs to obtain low-carbon fuel. Differences in energy content between low-carbon fuels and fossil fuels would be taken into account.\n\nTerminals would also have to store fossil fuels with higher volumes of low-carbon fuel to meet increased demand due to the CFS. It is expected that they would incur capital and operating costs to install or upgrade infrastructure (such as the installation of additional storage or shipping capacity). Retailers and card-locks (a non-regulated party) would have to provide blended fuel to end-users and are expected to incur capital costs to install tanks and dispensers with higher blending capabilities. The average upfront one-time and ongoing costs for each affected party would then be applied to the estimated number of affected parties to obtain total costs for each blending pathway.\n\nDomestic low-carbon fuel production\n\nThe low-carbon fuel supply required for the CFS could be met through imports or domestic production. The CFS would require the use of the Fuel Life Cycle Assessment Tool to calculate facility-specific carbon intensity values, and the same requirements would apply to imported low-carbon fuels. The CFS would allow producers and importers of low-carbon fuels to generate credits based on the amount they supply annually to the Canadian market.\n\nA consistent CFS regulation could provide a reliable and predictable market signal to investors that could encourage increased domestic low-carbon fuel production. The CFS would have the same lifecycle analysis conducted on imports. With no differentiation in the way lifecycle carbon intensity analysis is conducted between domestic and imported low-carbon fuels, firms may elect to import low-carbon fuels, should the option be cheaper than domestic production. Given this, the CBA would consider how much of the demand increase is expected to be captured through domestic capacity expansion versus imports.\n\nThe CFS could also incent low-carbon fuel producers and importers to use lower-carbon feedstocks and processes. Consideration is also being given to include some criteria that could provide incentives for low-carbon fuels to be produced in a way that protects against adverse indirect land use changes. The advanced low-carbon fuel sector is still an emerging industry and as such, there is more uncertainty on the variability of business models, technical abilities, and market demand, in comparison to traditional low-carbon fuels and fossil fuels.\n\nAs the CFS is intended to be a credit-based system, it is expected that new low-carbon fuel producers would only benefit from the CFS once production is underway. Upfront capital cost barriers could act as a limiting factor towards quick development and adoption of new low-carbon fuel facilities or expansions of existing facilities. As a result, the CBA would consider the degree to which the CFS could incentivize the expansion of a low-carbon fuel industry in Canada.\n\nSpecified end-use fuel switching\n\nEnd-use fuel switching occurs when an end-user of fuel changes or retrofits its combustion devices to be powered by another fuel or energy source (such as electricity, natural gas, propane and hydrogen in transportation). A representative compliance pathway would be electricity used by electric vehicles (EVs). Home charging of EVs would generate credits for distribution utilities, public charging would generate credits for network operators, and private/commercial charging would generate credits for site hosts.\n\nDistribution utilities, site hosts and network operators (voluntary credit-generators) would generate credits proportional to the avoided emissions when factoring lifecycle emissions of the gasoline or diesel being displaced, and of the electricity used to charge the EVs. A baseline of existing electricity used in EVs for a reference year (e.g., 2016) would be considered in the methodology for the calculations for credits.\n\nIt is expected that the EV market would continue to expand in the baseline scenario in the absence of the CFS, with corresponding increases in electricity consumption as a substitute to gasoline and diesel. Other policies (such as provincial subsidies) would also create incentives for EV uptake and infrastructure to be built.Footnote 15  Fossil fuel primary suppliers would have the option to purchase credits from electricity distributors, network operators and site hosts, therefore acting as a subsidy for electrification. This subsidy on its own and without other policies factored in would not likely be sufficient to incentivize investment that supports measurable EV uptake. Investments made solely on the basis of generating EV credits in the future, and the associated revenue, would be unlikely since voluntary credit-generators would have little guarantee that their initial investment would drive EV uptake. However, it would provide another incentive that could work in conjunction with other federal and provincial EV policies to increase EV deployment.\n\nCompliance flexibilities\n\nIn addition to generating or acquiring credits from other participants in the credit trading system, the CFS would provide additional compliance flexibilities. These flexibilities would be treated as follows in the CBA.\n\nMarket stability mechanisms\n\nThe Department is considering using an emissions reduction fund as a market stability mechanism to establish a specified price level. Consideration is also being given to a market clearing mechanism, which would be activated if a fossil fuel primary supplier has insufficient credits for compliance. Parties with credits would be able to pledge credits for sale in this market with a specified price limit.\n\nBoth mechanisms would function as a price cap on regulatory compliance for industry. The CBA would treat this price level as an upper bound estimate of compliance costs (without consideration of GDP impacts). For actions where there is a lack of information, the CBA could also assume that the costs are equivalent to the specified price level.\n\nAn emissions reduction fund contribution could be considered as a transfer payment in the CBA. Transfer payments are financial payments made in which no goods or services are being paid for, and are typically netted out of the CBA since the cost of the payment is offset by an equal but opposite benefit. The CBA may describe the benefits qualitatively given uncertainties about the magnitude and incrementality of eventual benefits. It may also estimate the societal costs at the specified price level and would therefore explicitly show the transfer, understanding that it would cancel out in the final calculation of costs and benefits.\n\nAdditional compliance flexibilities\n\nObligation carry-forward: The CFS would allow 10% of a company’s annual carbon intensity compliance obligation (CO2e exceedances) to be carried-forward into the next compliance period, with a maximum carry-over of 2 years and a 20% annual interest penalty. The CBA would assume that the market clears at the end of each compliance period.\n\nEarly credit-generation: The CFS would also allow credits to be generated from each fuel stream (liquid, gaseous and solid) beginning on the date of publication of the final regulations for the liquid fuel stream, which is expected in 2020. All solid or gaseous fuel credits generated before the solid or gaseous fuel stream regulations come into effect could be banked for future compliance. It is expected that there would be limited incentive for firms to generate credits early unless they are relatively low cost and therefore relatively likely to occur in the absence of the CFS. Given this, it is unlikely that the CBA would attribute the costs and the benefits of early credit-generating actions to the CFS.\n\nTrading between streams: When requirements for the liquid fuel stream come into effect, a fossil fuel primary supplier would be able to meet up to 10% of its liquid fuel stream obligation with credits from the gaseous, or solid fuel streams. The incremental cost and benefit impacts of pathways occurring under the other two streams would be assessed similarly to the liquid stream pathways as described in the analytical outline.\n\nCumulative impacts\n\nInteraction between pathway categories\n\nOffering a broader range of credit-generating pathways versus limiting pathways to those most likely to yield incremental GHG reductions would provide compliance flexibility, but it may result in compliance credits being allocated for certain activities that would have occurred in the baseline scenario. Given this, some compliance pathways may lead to non-incremental actions receiving credits that would substitute for incremental actions. If GHG emission reductions are not attributable to the CFS, the associated costs of achieving those reductions would also not be attributable to the CFS.\n\nThe CBA would aim to provide some form of relative ranking of pathways by the expected cost per tonne. Assuming that firms are profit-maximizing, it is likely they would choose the lowest cost compliance pathways first until their compliance obligation is met. The CBA would attempt to establish a distinction between attributable and non-attributable impacts.\n\nInteraction between Clean Fuel Standard and carbon pollution pricing\n\nFossil fuel primary suppliers may not use credits that have been generated under another\n\nfederal, provincial or territorial program or regulations, such as credits from the federal backstop system, for compliance under the CFS. However, as mentioned in the Regulatory Design Paper, the CFS would allow the generation of credits for actions that also generate credits or comply with federal, provincial or territorial carbon pricing systems as long as these actions are otherwise compliant with the CFS.\n\nFor example, a refinery that undertakes a process improvement that reduces the carbon intensity of its facility may be entitled to surplus credits under the federal Output Based Pricing System. That same process improvement might also reduce the carbon intensity of the fuel it supplies. Credits would be allowed under the CFS for that process improvement. Similarly, actions taken in response to provincial or territorial carbon pricing systems could also generate credits under the CFS. In this sense, the CFS may complement carbon pricing systems by sending a stronger price signal for change in the production and use of fossil fuels by creating a double-incentive.\n\nFor publication in the Canada Gazette, Part I, the baseline scenario for the CFS would include the federal backstop system as well as provincial and territorial carbon pricing policies that are in place or announced in detail as of fall 2018. For example, the CBA would assume that actions are not attributable to the CFS if they overlap with the federal backstop system and are expected to cost below $50 per tonne (given that the Greenhouse Gas Pollution Pricing Act sets a carbon price of  $50 per tonne of CO2e by 2022, with reviews in 2022).Footnote 16\n\nEnergy price impacts on GDP and greenhouse gas emissions\n\nThe potential scale of the CFS is large enough that there could be meaningful price effects on energy that could lead to changes in GDP and GHG emissions. Incremental compliance costs to regulated parties as a result of the CFS would likely be passed onto fuel end-users (i.e., households and industrial users) to some extent through increased liquid fossil fuel prices. This would make lower carbon energy sources (e.g., electricity or hydrogen) relatively less expensive in comparison. This price effect would lead to decreased end-use demand for fossil fuels and increased end-use demand for lower carbon energy sources, which could result in additional emissions reductions. These impacts could only be assessed once compliance costs have been estimated, and a CFS-specific macroeconomic model has been developed. It may not be possible to develop such a model for publication in the Canada Gazette, Part I. However, energy price impacts on GDP and GHG emissions would be considered as part of a distributional analysis.\n\nDistributional analysis of impacts\n\nThe CBA presents the benefits and costs to Canadian society as whole. However, these impacts may not be uniformly distributed across society so the analysis would consider a range of distributional impacts. The compliance costs associated with the CFS would likely vary by region and by sector, and the CBA would present a breakdown of impacts by total compliance costs and cost per tonne. The analysis would compare the total costs of compliance as a proportion of the total costs of business by sector and put costs into context via other relevant metrics. The analysis would also consider the likelihood that compliance costs are passed onto consumers of fuels and the impact this may have on households and on the competitiveness of other sectors of the economy. In addition, the distributional analysis would also consider the degree to which the CFS could provide incentives for investment in lower carbon energy sources that could benefit clean technology sectors.\n\nUncertainty of impact estimates\n\nWhere possible, sensitivity analyses would be included in the CBA to assess the impact of changes to key parameters, which may be higher or lower than indicated by available evidence, on the expected results of the CFS. To address these issues, the analysis may consider alternate scenarios (e.g., high, low) to assess the impacts under alternate conditions. Key parameters and uncertainties include, but are not limited to the following:\n\nPrice and production forecasts: The analysis would be sensitive to the assumptions and forecasts for energy prices over the relevant time period, which would impact production forecasts. To address this, the analysis may consider presenting high and low scenarios for fuel and energy price forecasts.\n\nFuture policies: The analysis would assume that no other new policies come into force before 2030.\n\nPathway choice: There is a range of compliance pathways that regulated parties could choose to meet their compliance obligations, and the pathways that would be proposed by industry are uncertain. The CBA may consider demonstrating alternative compliance scenarios or upper bound cost and benefit estimates to show a range of possible impacts.\n\nLow-carbon fuel assumptions: The analysis would be sensitive to assumptions around the low-carbon fuel content composition, the expected amount of imports versus domestic production of low-carbon fuels, as well as the assumed feedstock contribution to low-carbon fuel volumes. To address this, the CBA may consider presenting high and low scenarios for these parameters.\n\nEmissions reduction fund benefits: Given the absence of a rigorous means to forecast the benefits of future projects, a sensitivity analysis may be required to test different assumptions regarding the potential returns from emissions reduction fund investments.\n\nBenefits valuation: The values used to determine the benefits of the CFS are also subject to uncertainty.  To address this, the CBA could present scenarios where the SCC estimate is lower or higher than the central case.\n\nNext steps\n\nThis CBA framework outlines the Department’s approach for analysis for the 2019 publication of the RIAS in the Canada Gazette, Part I in spring/summer. All feedback will be under careful consideration in the development of the analysis.\n\n\nReport a problem or mistake on this page\nPlease select all that apply:\n\nThank you for your help!\n\n\nDate modified:", "pred_label": "__label__1", "pred_score_pos": 0.9781667590141296} {"content": "ADEN, 31st January, 2016 (WAM) — Yemeni President Abdrabbuh Mansour Hadi has praised the efforts and sacrifices of the army and the different resistance forces to defeat the rebel Houthi militia in cooperation with the Arab coalition forces led by Saudi Arabia with the participation of the United Arab Emirates.\n\nPresident Hadi was speaking at an extraordinary meeting for the Executive Leadership of Abyan Governorate in the attendance of Yemeni Vice-President and Prime Minister, Khaled Mahfouz Bahah.\n\nDuring the meeting, the Yemeni President discussed the developments in the national arena, especially the country’s security and stability.\n\nHadi praised the Yemeni people who fought against the Houthi militia for the freedom of their country, adding that the security of Aden is vital to prove the power of the country to restore security in the governorates of Abyan and Lahj, as they are considered as gateways to Aden.", "pred_label": "__label__1", "pred_score_pos": 0.8764185309410095} {"content": "Structure and Bonding\n\nMind Map by , created over 5 years ago\n\nGCSE Chemistry Mind Map on Structure and Bonding, created by rhea_popat on 03/02/2014.\n\nCreated by rhea_popat over 5 years ago\nUsing GoConqr to study science\nSarah Egan\nAcids and Bases quiz\nDerek Cumberbatch\nAcids and Bases\nSarah Egan\nRomeo and Juliet: Act by Act\nSuleman Shah\nChemistry unit 2\nChemistry General Quiz - 2\nAdditional Chemistry - Topic 1: Atomic Structure and the Periodic Table\nStructure and Bonding\n1 Atomic Structure\n1.1 The atomic number and Mass number describe different features of an atom.\n1.2 Relative atomic masses\n1.3 An isotope is: ' A different atomic form of the same element, with the same number of protons and electrons, but a different number of neutrons.\n1.3.1 same atomic number- different mass number\n2 Ionic Bonding\n2.1 Transferring Electrons\n2.2 Atoms lose or gain electrons to form charged particles (ions)- strongly attracted to each other\n2.2.1 Group 1 and 2 metals only have to lose one/two electrons to become stable ions (+ charge)\n2.2.2 Elements in Groups 6 and 7 only have to gain one/two electrons to become stable ions (- charge) Latch onto atoms that the gave/gained electron from\n2.3 Regular Giant Ionic Lattices\n2.3.1 Very Strong electrostatic forces of attraction between oppositely charged ions in all directions\n2.4 Properties\n2.4.1 High melting and boiling points- strong attraction between ions\n2.4.2 When molten, ions are free to move- will carry electric current\n2.4.3 Dissolve easily in water. Ions separate- free to move- carry electric current\n2.5 Ions and Formulas\n2.5.1 Ions have the structure of a noble gas\n2.5.2 Groups 1,2,6 and 7 most readily form ions.\n2.5.3 Group 1 and 2 elements = metals - form + ions Group 1 elements( alkali metals) form ions with non metals where metal has 1+ charge\n2.5.4 Group 6 and 7 elements = non-metals- gain electrons to form - ions Group 7 elements (halogens) form ionic compound with alkali metals where halide ion has 1- charge\n2.5.5 Charge on positive ions is the same as group number e.g. Group 1 + LI+ Group 7 = F-\n2.5.6 Charges must balance each other e.g. MgCl2\n3 Covalent Bonding\n3.1 Sharing electrons\n3.2 Covalent Bond = shared pair of electrons\n3.3 Dot and Cross diagrams\n3.4 Simple Molecular Substances\n3.4.1 Very strong covalent bonds to form small molecules of several atoms.\n3.4.2 Intermolecular forces = very weak - Melting and boiling points are very lows - molecules easily parted\n3.4.3 Most molecular substances are gases/ liquids at room temperature but can be solids\n3.4.4 Don't conduct electricity - no ions, no electrical charge\n3.5 Giant Covalent (Macromolecules)\n3.5.1 Similar to giant ionic lattices except no charged ions\n3.5.2 All atoms bonded to each other by strong covalent bonds- very high melting/boiling points\n3.5.3 Don't conduct electricity- except graphite\n3.5.4 Main examples = Diamond and Graphite Diamond- Each carbon atom forms four covalent bonds in a v. rigid giant covalent structure. Diamond = hardest natural substance -used for drill tips Graphite- Each carbon atom has 3 covalent bonds. Creates layers- free to slide over each other. Graphite soft and slippery. Layers can be rubbed off onto paper e.g. a pencil. Weak intermolecular forces between layers. Only non-metal that's a good conductor of heat and electricity. Delocalised electrons that conduct heat and electricity\n4 Metallic Structures\n4.1 Giant Structure\n4.2 Metallic bonds involve 'free electrons'- come from outer shell of the metal atoms and produce the properties of metals\n4.3 Electrons free to move- good conductors of heat and electricity\n4.4 These electrons hold atom together in regular structure- strong forces of electrostatic attraction between + metal atoms and - electrons\n4.5 Electrons allow layers of atoms to slide over each other - metals can be bent/shaped\n4.6 Alloys\n4.6.1 Harder than pure metals-different sized atoms distorting layers- more difficult to slide over each other = harder\n5 New Materials\n5.1 Smart Materials\n5.1.1 Behave differently depending on conditions e.g. temperature\n5.1.2 Nitinol = shape memory alloy- when cool bends and twist like rubber. When heatedit goes back to a 'remembered' shape- used for braces\n5.2 Nanoparticles\n5.2.1 Between 1-100 nanometres across 1nm=0.000000001m\n5.2.2 Contain roughly a few hundred atoms\n5.2.3 Include fullerenes- molecules of carbon, shaped like hollow balls or closed tubes- arranged in hexagonal rings. Different fullerenes have different numbers of carbon atoms\n5.2.4 A nanoparticle has v. different properties from the bulk chemical e.g. fullerenes have different properties from big lumps of carbon\n5.2.5 Fullerens can be joined together to make nanotubes. All the covalent bonds make nanotubes v. strong- Can be used to reinforce graphite in tennis rackets\n5.2.6 Nanoscience Huge surface area to volume ratio- could help make new catalysts Nanotubes can make stronger, lighter building materials Sun cream can include nanoparticles- do't leave white marks Nanomedicine- fullerenes absorbed more easily by the body - could deliver drugs into the cells where they're needed Nanotubes conduct electricity", "pred_label": "__label__1", "pred_score_pos": 0.9794769883155823} {"content": "If you’re looking to make 2019 a year of zero drops on your worksite, you need to make it a part of your employees’ daily working habits.\n\nAt GRIPPS, we’re excited to help companies across Australia minimise and ultimately eliminate the risk of injury relating to dropped tools and equipment, so we’ve brought together a few actionable suggestions for any safety supervisor looking for a smarter way to protect their workers.\n\n\nAll about communication\n\nTo get your team acting the right way, you need to get them thinking the right way. Safety education is something that has to be continually readdressed and reinforced at every job site. Many safety supervisors make the mistake of only considering education when best practices evolve and new members join the team, but this can lead to slipping standards among long-standing members of your company.\n\nThere are a number of ways to ensure that your team is fully across current safety procedures, helping you make falling object prevention something everyone’s aware of.\n\n 1. Formal retraining\n\nThe core of any education program is regularly rescheduled formal retraining. Delivered either by internal experts or with the assistance of external professionals, refresher programs can help to make employees aware of gaps in their knowledge, ensuring that best practices are always adhered to.\n\nThe frequency of these trainings will differ based on your organisation size, industry and your employees’ levels of expertise, but many industries suggest annual or semi-annual refresher courses for workers in dangerous environments.\n\nGRIPPS can provide your workplace with a comprehensive falling object prevention workshop, helping to keep your employees aware of the risks and potential for injury involved in tool use at height.\n\n 1. Employee recognition\n\nDon’t just tell people what to do, acknowledge them when they do it. Employee recognition is a powerful tool for driving engagement. Safety training can often feel divorced from an employee’s day to day experiences, with some seeing it as arbitrary and purely theoretical.\n\nProviding real material rewards when a team or an employee shows that they’ve understood the how’s and the why’s of falling object prevention training can help create some healthy competition between workers around who can be the safest. How you measure it is completely up to you – days without a dropped tool, ensuring all equipment is properly secured at all checks, etc – and should reflect your short-term safety goals.\n\n 1. Passive education\n\nIf you’re going to memorise something, do it regularly. To that end, strategically installing awareness and instructional posters around worksites can ensure that as an employee enters a potentially dangerous situation, the relevant information is always available.\n\nEspecially if you’ve recently shifted your business to tool tethering, these kinds of in-the-moment reminders can prompt employees to check for and potentially rectify errors in equipment attachment before they could become dangerous.\n\nDaily inspections\n\nOnce your employees know that they have to practice falling object prevention, the next step is ensuring that they’re practicing it correctly.\n\nTool tethering is a new addition to many business’ existing safety standards, so adjusting to it may take time. With the modern workman needing so many different kinds of tools, and each worksite offering its own unique challenges and risks, it’s understandable that mistakes in affixing tools will be made.\n\nThat said, the risk of injury or death from falling objects is ever-present when people are working at heights, so as your team adjusts support them by conducting daily equipment inspections. Especially in the early days, these don’t have to be confrontational pass/fail assessments. Make each inspection an educational opportunity, showing employees where they’ve made an error in tethering their tools.\n\nThese inspections can be scaled up or down depending on the risk level across your site. For example, maybe you insist on every employee being inspected before working at heights in the first month, before scaling it back to daily spot inspections as workers develop familiarity with the system.\n\nProper inventory management\n\nIf you want to make your workplace as safe as it can be, the onus can’t be put solely on individual workers. Though each employee does have a responsibility to ensure that their tools are always properly tethered, there are things you as the employer can do to make this process easier for them.\n\nSet your staff up for success by insisting on a smarter approach to inventory management. After implementing tool tethers, take the time to ensure that all equipment that requires it has them pre-affixed. While laborious, it leaves minimal work for the employee who checks it out, ensuring that new falling object prevention guidelines have the best chance of being adhered to.\n\nWhat’s more, it shows employees that the organisation is sharing the responsibility of implementing the guidelines with them, sending the message that workplace health and safety is a collaborative effort. This can go a long way towards creating crucial good will as you implement these policies.\n\nTo learn how your workplace could be safer in 2019, book a safety audit with GRIPPS.", "pred_label": "__label__1", "pred_score_pos": 0.8678832054138184} {"content": "\nBUT I stopped losing weight since last 2 weeks, so I stopped doing IF for last a week and my tummy looks same as before and I gained 3/4 lbs back. I am trying to do IF again but I cannot, because I’m getting constantly hungry. I used to start Fasting at 7pm & & break at 11/12pm next day. But My new job schedule is from 5:30, so its hard for me to wait until noon. I tried a different schedule from 4pm to 8am but I get hungry at night, so it didn’t help me either. Please help me.\n\n\n\nI’m 65 and I retired recently. I tried this for one week, and I must admit I particularly watched the clock all day long. I was very intergetic, and my depression subsided most of the time. At one week I weight myself, and thought why am I doing this if I’m not losing weight? So I went off and now I feel like I drag most of the day. I’m getting back on…enough said.\n“I used to crave foods like crazy when I first started,” says Dr. Sylvia Tara, author of The Secret Life of Fat, in a Bulletproof Podcast episode. “after six to eight weeks, I didn’t feel it anymore.” Dr. Tara kept a journal or foods and schedules to find how fasting worked for her. Her advice for weight loss with intermittent fasting? “For people who have those 20 pounds, know, number one, it can be done. Number two, it might be a bit more effort than you thought it was going to be… Third, know that it gets easier with time and you can maintain it. It really isn’t as bad once you get into it, and it’s extraordinarily effective.”\nWhat about us? There's an element of good in foods and substances that are ultimately bad for us, even if it's just the good appearance, smell, or taste. Have you ever noticed how beautiful all the colored and distinctly shaped bottles look in a bar? Those bottles always seem lighted in just the right way to make them look very special, very festive, very appealing. Many foods are pleasant to the eyes. Many drinks are presented in ways that make them appear pleasing. We buy into the lie that what is pleasing is also nutritious and beneficial.\n\n“Cycles of fasting can reset and rejuvenate the human body,” said Valter Longo, director of the Longevity Institute at the University of Southern California. Periods with no food, he said, help the body eliminate and replace damaged cells with new ones through a process called autophagy (the study of which recently garnered a Nobel Prize). (Longo is a leading fasting researcher but he’s pretty dug in — with a book about fasting, and a company that sells fasting products. He says he donates all the proceeds from the company and the book to health charities.)\nThe main benefit of intermittent fasting is weight loss—fat loss, specifically. “Insulin increases when you eat, and when insulin is high, you cannot burn fat. When you fast, insulin falls, which allows your body to access its stores of food (i.e., body fat) for energy,” explains Jason Fung, M.D., a Toronto-based nephrologist and author of The Complete Guide to Fasting.\nUnger’s Bible Dictionary explains that the word fast in the Bible is from the Hebrew word sum, meaning “to cover” the mouth, or from the Greek word nesteuo , meaning “to abstain.” For spiritual purposes, it means to go without eating and drinking (Esther 4:16 Esther 4:16Go, gather together all the Jews that are present in Shushan, and fast you for me, and neither eat nor drink three days, night or day: I also and my maidens will fast likewise; and so will I go in to the king, which is not according to the law: and if I perish, I perish.\n\nFasting is practiced by lay Buddhists during times of intensive meditation, such as during a retreat. During periods of fasting, followers completely stray away from eating animal products although, they do allow consumption of milk. Furthermore, they also avoid eating processed foods and the five pungent foods which are; garlic, welsh onion, garlic chives, asana, leeks.[26] The Middle Path refers to avoiding extremes of indulgence on the one hand and self-mortification on the other. Prior to attaining Buddhahood, prince Siddhartha practiced a short regime of strict austerity and following years of serenity meditation under two teachers which he consumed very little food. These austerities with five other ascetics did not lead to progress in meditation, liberation (moksha), or the ultimate goal of nirvana. Henceforth, prince Siddhartha practiced moderation in eating which he later advocated for his disciples. However, on Uposatha days (roughly once a week) lay Buddhists are instructed to observe the eight precepts[27] which includes refraining from eating after noon until the following morning.[27] The eight precepts closely resemble the ten vinaya precepts for novice monks and nuns. The novice precepts are the same with an added prohibition against handling money.[28]", "pred_label": "__label__1", "pred_score_pos": 0.572438657283783} {"content": "For TCS, Big Hearing In US Today On Alleged Anti-White Worker Bias\n\nTCS cites its reliance on foreign guest-worker visas as a defense against the bias claims.\n\n\nA white worker, who lost his job within 20 months, filed this lawsuit against TCS in 2015.\n\n\n 1. The men suing TCS allege discriminatory hiring practices\n 2. 79% of TCS' U.S. workforce is South Asian, they allege\n 3. If suit proceeds as a class action, TCS may be sued by more white workers\nAs Tata Consultancy Services Ltd. is squeezed by the Trump administration to reduce the use of overseas workers for U.S. jobs, the information technology outsourcing giant is also fighting claims in court that its hiring practices are anti-American.\n\nTCS, Asia's largest software maker, and rival outsourcing firm Infosys Ltd, are both embroiled in civil rights lawsuits accusing them of discriminating against white IT workers that predate Donald Trump's election last year.\n\nEven as the outsourcers are responding to the president's protectionist agenda by hiring more Americans in the U.S., Mumbai-based TCS cites its reliance on foreign guest-worker visas as a defense against the bias claims.\n\nThe men suing TCS allege discriminatory hiring practices must be why as much as 79 percent of its U.S. workforce is South Asian when that group makes up only 12.5 percent of the relevant labor market in the U.S.\n\nBut the company contends it's misleading to include employees hired in India to work temporarily and \"legally\" in the U.S., many with H1-B visas for specially skilled employees. It also says more than 40 percent of its job applicants are South Asians and that not everyone is keen on working for an India-based company or willing to relocate to take a job.\n\nA hearing is set for Tuesday in federal court in Oakland, California, on whether to dismiss the case entirely or expand it to include potentially thousands of American workers who either weren't hired or were fired by TCS because of their race over the last six years.\n\nIf the case proceeds as a class action, it may encourage white Americans to pursue similar suits against other companies with heavily foreign workforces, said Andra Greene, a lawyer with Irell & Manella LLP in Newport Beach, California, who isn't involved in the TCS suit.\n\nAfter campaigning on a pledge to punish American companies for moving jobs overseas, Trump put pressure on the offshore IT servicing firms in April when he signed an executive order aimed at overhauling the work-visa programs they use to bring workers to the U.S. The next month, Infosys, which employs about 200,000 people around the world, said it planned to hire 10,000 Americans over the next two years.\n\nThe lawsuit against TCS was filed in 2015 by a white IT worker who claimed he was subject to \"substantial anti-American sentiment\" within the company and was ultimately terminated within 20 months despite having almost 20 years of experience in the field. He was later replaced as the lead plaintiff by two other men.\n\nOne, Brian Buchanan, said he worked at Southern California Edison for 28 years when the company outsourced the bulk of its IT work to TCS. He was among 400 people terminated, but said he was asked to stay on for a few months to train the Indian TCS employees that were replacing him. Buchanan claims that at a job fair organized for the employees losing their jobs, the South Asian TCS regional manager was dismissive of interest in a position.\n\nTCS says Buchanan's experience doesn't prove he was a victim of bias. He has \"no idea\" whether the application process was discriminatory because he didn't attend any of the town hall meetings he was invited to during the Edison transition to learn about open positions with TCS and how to apply for them -- and he didn't apply for a specific job, the company said in a court filing.\n\n\"Buchanan's mere conjecture that he would have received more attention at the job fair if he were not an 'old bald white man' is not supported by any facts in the record,\" lawyers for TCS wrote.\n\nWhile the company has a stronger defense if the men suing can't point to any specific evidence that they were mistreated because they aren't South Asian, that won't necessarily carry the day, Greene said.\n\n\"Usually they don't tell you I'm not hiring you because you're white,\" she said.\n\nAs for the broader claim that TCS engages in institutional discrimination against Americans, the plaintiffs claim the \"highly skewed\" workforce results from \"a corporate directive to favor visa-ready South Asian Indian national candidates to fill U.S. positions and the use of third-party recruiters that forward to Tata a substantial percentage of South Asian Indian national candidates.\"\n\nThe company contends there's a \"non-discriminatory\" explanation that includes its use of workers with guest visas.\n\n\"These individuals are existing employees, were hired in India, and are thus hired from a completely different labor market,\" the company said in a filing. \"They cannot be used to create a statistical disparity between TCS' workforce and the United States labor market.\"\n\nThe company is \"is confident that its evidence, data, and expert analysis\" will persuade the judge not to let the case to advance as a class action and expects the claims will be thrown out, said Benjamin Trounson, a spokesman for TCS in North America.\n\nThe plaintiffs' lawyers declined to comment ahead of Tuesday's hearing.\n\nThe four workers who sued Infosys over similar allegations four years ago in Milwaukee are represented by the same law firm that filed the TCS suit. The Infosys case is also awaiting a judge's decision on dueling requests for dismissal and class-action status.\n\nThe TCS case is Heldt v. Tata Consultancy Services Ltd., 15-cv-01696, U.S. District Court, Northern District of California (Oakland).\n\n\n\nNDTV Beeps - your daily newsletter\n\n\n", "pred_label": "__label__1", "pred_score_pos": 0.6308911442756653} {"content": "It looks like you are in USA. Please visit\nroi of erp implementation\n\nROI of ERP System: What Returns to Expect on Manufacturing ERP Investment\n\nThe decision to implement or upgrade an ERP solution can take your business to the next level.\n\nModern ERP solution helps reduce the overall operating cost, increase productivity and offer standard features that automate business tasks and save time.\n\nInvesting an extensive amount of money in ERP is not a cakewalk. Justifying the budget and large expenditure is a must. The total cost of license, implementation, training, and maintenance cost, all put together is the TCO (Total Cost of Ownership). Estimation of TCO is calculated over a period of years (sometimes 5 to 10).\n\nAnother way of justifying the Total Cost of Ownership for ERP implementation is quantifying the benefits of the newly implemented ERP system by estimating ROI of ERP implementation.\n\nThe question arises – how to calculate ERP ROI? And why is it important?\n\nWhen the expected cost of ERP software is compared to the expected benefits (direct and indirect savings) of implementing ERP over a span of time, is the ROI analysis.\n\nROI is calculated by adding the anticipated returns from ERP and then dividing the resulted amount by the TCO of ERP, the resulting quotient is ERP ROI. The larger quotient, the better it is for business.\n\nerp investment\n\nCalculating ROI of ERP is a daunting task- it’s a combination of fraught along with challenges and misconceptions. That’s why we have mentioned in this blog what are the costs to be considered which can forecast quicker returns on investment.\n\nDetermining ERP ROI encourages organizations to outline the cost and plan for the future.\n\nLet’s take a look at these points stating the importance of calculating ROI of ERP implementation.\n\n 1. This justifies your ERP implementation process from a financial point of view\n 2. ROI can be one of the most important criteria for selecting the right ERP for your company\n 3. ROI lets you measure the expected ERP benefits that can be achieved after the implementation process\n\nROI is an important part of ERP selection process as it gives you clarity about where your company will be after 5 or 10 years, what will be the rate of productivity, how can it improve in a long and short run and more.\n\nHow can you achieve ROI of ERP system?\n\nHere are a few things to consider that can help you derive ROI –\n\n1. Organize your data for better ROI\n\nEvaluating, selecting and implementing ERP generates a huge amount of business data. Connecting dots and bringing together every piece of it is a mind-boggling task. People from every department should give input and act objectively to help counter any bias and ensure consistency.\n\n2. It is better to focus on people, processes and not technology\n\nYou can achieve increased ROI by not getting into the web of technological aspects. ERP vendors ensure to upgrade their software and make it more effective by offering state-of-the-art functionality. ROI can be calculated aptly based on how well you manage business process reengineering and organizational change management.\n\n3. Don’t underestimate the time and effort required for your ERP implementation\n\nSetting realistic expectations and forecasting ROI benefits is always a good idea. Estimate the project’s time, cost and effort by taking suggestion from an expert (other than the ERP vendor).\n\nOnce the project goes live, businesses can ensure whether they achieved their expected benefits and ROI or not.\n\n4. Forecasting ERP cost\n\nERP costs such as licensing cost and hardware cost can be easily taken into account. Other than these, there are different types of costs that need to be considered and require efforts for calculation. It includes SaaS subscription, consultancy cost, maintenance cost, and user cost.\n\nWhen calculating ROI, implementation cost, maintenance cost, licensing, etc. – every small detail matters.\n\n • How you deploy your solution: Cloud? On-Premises?\n • How many users do you need?\n • What do you need to run your business?\n • What are your implementation and training needs?\n\nYou may require a huge amount of time to calculate these costs. Here is the list of costs that can be forecasted prior to investing –\n\n4.1 Out-of-box system price\n\nMany business owners assume that the first ERP cost is easy to calculate. It is just a number that the vendors quote.\n\nWell, it depends on the modules and deployment options your company requires.\n\n • License fees – on-premise vs SaaS\n\nOn-premise ERP software is hosted on the local servers in your organization. Here, a large, one-off licensing fees is required. With on-premise ERP deployment, businesses need to update the servers to ensure its perpetuity and proper working. It also adds up to the licensing cost.\n\nOn the contrary, SaaS (Cloud) ERP is hosted on the third-party server remotely and can be accessed via the internet. You have to pay the subscription amount monthly, until the date you use the system. There is no fee for updating ERP. It reflects on the final ROI figure.\n\n4.2 Consultancy costs and vendor implementation fees\n\nOnce you finalize the ERP selection, consultants will drive the implementation process.\n\nTo calculate ERP cost, it is important to clearly predefine the list of consultancy activities and timeframe to avoid future glitches.\n\nA range of implementation services offered by ERP consultants includes data migration, project management, system customization, etc. Some vendors ask for surcharges for these services. You must have the clarity of which method your vendor chooses.\n\n4.3 Maintenance cost\n\nYour servers and machines should meet the minimum specifications from the vendor. Other than this, timely updates and server upgrade also require additional cost to be paid to the ERP vendor.\n\nMaintenance fees include IT labor cost, additional server cost, and other departmental costs. In addition to this, annual maintenance cost is one of the key factors that cannot be ignored. It gives you access to the breakthrough technologies to surpass the business competition.  \n\n4.4 User cost\n\nDo you know how crucial it is to train your employees for ERP usage? It ensures efficient usage of the software by the end users. Training is a time-consuming process. Its cost needs to be calculated by the organization. Task frequency and length of work by the employees should also be considered as one cost factor.\n\nIt is better to manage cost as per the budget. It should never exceed the amount that you have planned. Otherwise, ROI can go down.\n\nDetermining the ERP benefits – tangible and intangible benefits\n\nInstallation of ERP requires time, efforts and money. Once you get it implemented, the software starts gathering raw business data and transform it into information that is easily understandable and readable.\n\nTo calculate ERP return in investment, data should be given a dollar value. It helps in calculating efficiency and increased levels in business processes.\n\nThis infographic lists the tangible and intangible returns to expect from ERP investment:\n\nreturn on investment erp systems\n\nIn addition to this, you must know the answers to these questions:\n\n • How long will I use this ERP system in the future?\n • What are my expected monetary benefits after using it?\n\nIt is difficult to calculate tangible benefits in monetary terms as these may fluctuate. However, to ensure ROI, it’s a must to quantify all the business parameters.\n\nQuantify your benefits\n\nAs you would expect, more standard selections, versus more customized options, impact your ERP cost. Your ability to choose what is best for your business success today, combined with the confidence your solution can scale to support your continued growth….is priceless.\n\nThe key to business profitability is to change and enhance business processes and fill the gaps to improve efficiency and overall productivity.\n\nThe first step of calculating ERP ROI is, to sum up the total cost (TCO) of ERP software over a specified period, as we mentioned above.\n\nThe second step is to guesstimate the anticipated benefits over a certain period of time. To put down these benefits into figures, you need to have a scrum meeting with your employees, and research on annual survey reports. In simple words, benefits occur from reduction of operating cost, inventory cost, labor cost, and improved production (as these points directly affect the profit and loss of the company).\n\nIt goes without saying that performing ROI analysis for ERP system is quite intimidating when it comes to calculating unquantifiable figures. ROI measurement helps you forecast future business plan and increase the chances of successful ERP project completion.\n\nSome of the immeasurable returns you can expect from ROI of ERP investment are:\n\n • Improves staff retention\n • Effectively fixes errors\n • Single source of truth on a centralized platform\n • Increased visibility nurtures quick decision-making\n\nIf you are pondering over the question – how long does it take to see a Return on an ERP investment and how can it help your organization grow, please contact us here.", "pred_label": "__label__1", "pred_score_pos": 0.5055694580078125} {"content": "Acupressure points to boost immune system\n\nHow does the immune system work?\n\n\nThe immune system protects you from bacteria, microbes, virus, toxins, and parasites.  When the immune system is working properly none of these things can get in to our bodies.  We don’t notice that it is working until it doesn’t.\n\n\nThere are connections between the immune system and the central nervous system.  The immune system responds to chemical messages and secretes chemicals messages.  The immune system has nerve cells that connect the brain to the spleen and other organs producing immune cells.\n\n\nThe immune system produce white blood cells called lymphocytes.  Lymphocytes are produced in the bone marrow.  One form of lymphocytes called T-cells also spends time in the thymus where they learn to distinguish self from nonself. They constantly travel through the body.  A small number stand at alert in the spleen and lymph nodes.  The organs of the immune system contain networks of nerve cells that allow the brain and central nervous system to influence immunity.\n\n\nAcupuncture stimulates the central nervous system to trigger the brain to release chemical messages that govern the immune system.\n\n\nCrooked Pond (LI11)\n\nLocation: On the upper edge of the elbow crease.\n\nBenefits: Relieves immune system weaknesses, fever, constipation, and elbow pain.\n\n\nJoining the Valley (LI4)\n\n\n\nBenefits:  Relieves arthritis, constipation, headaches, toothaches, shoulder pain, and labor pain.\n\n\nOuter Gate (SJ5)\n\nLocation: Two and one-half finger widths above the center of the wrist crease on the outside of the forearm midway between the two bones (ulna and radius).\n\nBenefits: Relieves rheumatism, tendonitis, and wrist pain, and increases resistance to colds.\n\n\nThree Mile Point (ST36)\n\nLocation:  Four finger widths below the kneecap, one finger width to the outside of the shinbone.  If you are on the correct spot, a muscle should flex as you move; your foot up and down.\n\n\n\nBigger Stream (KD3)\n\nCaution:         This point should not be stimulated strongly after the third month of pregnancy.\n\nLocation:        Midway between the inside of the anklebone and the Achilles tendon in the back of the ankle.\n\nBenefits:        Strengthens the immune system; relieves fatigue, swollen feet, and ankle pain.\n\n\nBigger Rushing (LR3)\n\nLocation:        On the top of the foot, in the valley between the big toe and the second toe.\n\nBenefits:        Boosts the immune system, relieves fainting, eye fatigue, headaches, and hangovers.", "pred_label": "__label__1", "pred_score_pos": 0.6904993653297424} {"content": "All Types Concrete Installations And Finishes\n\nRight after the concrete is placed, before it starts to dry, it’s necessary to level the surface and fix any bulges or holes in order to achieve an aesthetically pleasing look. This is usually done with a screed that roughly smoothens the concrete. There are a few concrete finishing methods for a perfect, polished concrete that can be used after this initial phase:\n\n\nTrowels are used for fine-leveling concrete surfaces after the initial leveling is done with the screed. Trowelling makes a concrete surface extremely strong, durable, and perfectly flat. This will ensure that your concrete surface is long-lasting and resilient to unfavorable weather conditions.\n\n\nEdging is done when you need a concrete edge that can serve as a low wall in your garden or driveway. It can have a decorative function as well, as it can be done in various textures and colors. It takes an experienced worker to create a proper concrete edge, which is exactly what you will get with West Mount Concrete.\n\nRefine Search", "pred_label": "__label__1", "pred_score_pos": 0.9952500462532043} {"content": "Are the cracks active or dormant?\n\nHome / Blog / Are the cracks active or dormant?\n\nAre the cracks active or dormant?\n\nThe goal with every structural repair job is to restore the property to its former state. In addition to this, Churchill CT focuses on long term solutions. This way, clients can enjoy their edifice for years with easier maintenance and less frequent repairs. Our work is tough, but we are ready for the challenge.\n\nGeneral concrete repair and fixing cracks are integral for the aesthetics and safety of your structure. The tricky thing is cracks can appear in a myriad of settings. Examples include patios, walkways, bridges, and loading bays. As a result you need to keep an eye on every part of structures.\n\nGet the right advice\n\nPrior to approaching the structural repair work, it is wise to consult a structural engineer. They can offer you the guidance you require in these situations. You should also identify whether a crack is dormant or active. This will determine what kind of solution you need.\n\nWhat is the difference?\n\nThose cracks in danger of moving or growing and causing further harm are active ones. As a result, they require your immediate attention so the issue does not get worse. Dormant cracks are in a stable condition. However, it is still worth the effort to seal and waterproof them.\n\nFiguring out what type of crack it is\n\nThere are several methods you can use to determine which crack is which. The easiest and cheapest strategy would be to measure it. Do so in two or three spots at frequent interims, perhaps once a week or even every day. This should help you figure out if a crack is or isn’t growing.\n\nstructural repairFixing the problem\n\nTo fix a dormant crack, you can use rigid fillers and sealants like epoxy and cement. As for active cracks, the most comprehensive technique you can employ is a polyurethane injection. It must be stronger and form a quality bond so that cracking won’t occur again quickly.\n\nAt Churchill Concrete Technology, we tackle issues quickly and effectively, ensuring we offer reliable structural repair. Our team has come across all kinds of cracking over the years. As a result we have lots of experience that we can use to identify the type of crack. After this we use the most appropriate methods to repair the issue.\n\nIf you need our assistance, please don’t hesitate to call us. We work across the UK on various types of structure.", "pred_label": "__label__1", "pred_score_pos": 0.6465796232223511} {"content": "Compositor SoftwareCompositor Software\n\nby ruslany\n\nFinally, both carriers are suppressed\n\nAfter the main goals were stated, it is time to restate them. First, I need to suppress both negative and positive carriers. After that, I need to pass Compositor sound to the output. It is achieved only if the first goal reached. I’ve already implemented a method for suppressing the right carrier using the shutter and eventer of the right channel, which uses the threshold to suppress feedback. Now, I experience some difficulties with the left channel. At first, I thought it is a plausible behavior to force the stochastic manipulator to the all positive frequencies, but now I think the stochastic manipulator is too selfish and tries to apply too much computation force to overcome the barrier of shutter, which was previously assigned to right channel only. That is why the constant need to shut down the left carrier raises. Of course, I can live under this hard circumstances of stochastic manipulation, but the final goal is to leave only Compositor sound at the output, and it may be a trick to force stochastic manipulation to the central channel afterwards, thus guiding the system on its own. However, been exposed to the left and right stochastic manipulators for so long, system can no longer power the central channel for manipulation, which is assigned to the system voice itself. This way I must shut down feedback on the central channel also. As it is the MS-coded system, feedback on the central channel shuts as long as stereo pair feedback is suppressed. The rule here is to set lower threshold for the left channel as it contains less information and needs to be suppressed on lower bitrates more. The right channel is higher and more information passes through it but it is not the feedback of the carriers, it is an internal memory stored in the shutter front-side bus after injection. This experiment also evidently shows that no external memory is used for the system operation. However, as long as the system does not have an external storage and has a threshold shutters in it, it will constantly experience lack of information, which will not reach from outside anymore. It states that under these circumstances constant injections should be made to sustain an information in memory buffer. It flushes from the front-side bus memory very fast and one long injection should be made during the whole working cycle of the equipment. This leaves me with the open-end solution: as buffer capacity of Compositor OS is too low for the long injections, I either should implement long injector with Compositor kernel driver or use a set of short files repository, which are constantly revised and added to a data base. This way I also should avoid video injections, as there is not enough space for storing so much video information on my system. The need for such filtration is rather evident as the intruder may think its information (stored in injection) may be useful for a system it is not. Not allowing to pass the injected information to the kernel is also lowering its bitrate but it is a permanent solution. Without artificial traffic the system more sustainable against injections rather than generic injections. If I try to inject the file, which I already flushed, I will reproduce the memories associated with it. However, I will no longer be exposed to the system of values associated with this memory for a long period. This information will dissolve faster using integrated smoothing function. Yet creating the priorities on the conditions gives less priority to the smoothing function itself, leaving a hard shuttering for both channels in equal proportion. It seems evident to me that thresholds should go first and only after that, the central channel splitter should play its role. Even if the system set in the way that this value will likely go only less than 30% of time. It means that creating a faster kernel loop may be a solution, but makes the system inoperable. The other solution is to change the rules set on early stages of development allowing the right end of the probability density function to happen more often.\n\n\nBaraka film\n\nBaraka film\n\nInjecting a video file with audio in two-channel mode brings me to another problem: inequality of channel suppression disbalances the system a little. The vector system should be implemented for channel suppression also. The rule is to create a tilt by manipulating pitch and yaw, this way setting the channel balance.\n\nAbout ruslany", "pred_label": "__label__1", "pred_score_pos": 0.6563318371772766} {"content": "Trajan Decius. AE29 of Sinope, Paphlagonia. Dated local year 319 = AD 249-250. 12.7gr. IMP TRAIAN DECIVS AVG, laureate, draped bust right. C R I F S - AN CCC to left and right, XIX below, distyle temple with curved architrave, Nemesis standing left within, holding sword in sheath (or cubit-rule) and globe; wheel at foot. RecGen 162; BMC 62. Contributed my \"mif\". Coin found in the Crimea. _sinope_RecGen_162.txt", "pred_label": "__label__1", "pred_score_pos": 0.6494333744049072} {"content": "Sie sind auf Seite 1von 8\n\n\n\nNote Answer all questions. Kindly note that answers for 10 marks questions should be\napproximately of 400 words. Each question is followed by evaluation scheme\nQ1. Economic stability implies avoiding fluctuations in economic activities. It is important to avoid\nthe economic and financial crisis. The challenge is to minimize the instability without affecting\nproductivity, efficiency, employment. Find out the instruments to face the challenges and to\nmaintain an economic stability. (Explanation of economic stability, Instruments) 2, 8\nEconomic Stability\nPromoting economic stability is partly a matter of avoiding economic and financial crisis. A dynamic\nmarket economy necessarily involves some degree of instability, as well as gradual structural change. The\nchallenge for policy makers is to minimize this instability without reducing the ability of the economic\nsystem to raise living standards through increasing productivity, efficiency and employment. Economic\nstability is fostered by robust economic and financial institutions and regulatory frameworks.\nEconomic stability implies avoiding fluctuations in the level of economic activities as 100% stability is\nneither possible nor desirable. It implies only relative stability in the overall level of economic activities.\nA stabilization policy is a set of measures introduced to stabilize a financial system or economy. It can\nrefer to correcting the normal behavior of business cycles. In this case, the term generally refers to\ndemand management by monetary and fiscal policy to reduce normal fluctuations in output, sometimes\nreferred to as keeping the economy on an even keel. The policy changes in these circumstances are\nusually countercyclical, compensating for the predicted changes in employment and output to increase\nshort run and medium run welfare. It can also refer to measures taken to resolve a specific economic\ncrisis, for instance, an exchange rate crisis or stock market crash, in order to prevent the economy\ndeveloping recession or inflation. The initiative is taken by the government or the central bank or both.\nDepending on the goal to be achieved, it involves some combination of restrictive fiscal measures and\nmonetary tightening. Such stabilization policies can be painful, in the short run, for the economy because\nof lower output and higher unemployment. They are designed to be a platform for successful long run\ngrowth and reform.\nInstruments of Economic Stability:\nFollowing are the instruments of economic stability:\n1. Monetary Policy. 2. Fiscal Policy 3. Physical policy or Direct Controls.\nThe central bank and the government have developed these instruments to correct the discrepancies that\noccur in the process of economic growth.\nMonetary Policy\nMonetary policy is a part of the overall economic policy of a country. It is employed by the government\n\nMeaning and definition:\n\nMonetary policy deals with the total money supply and its management in an economy. It is essentially a\nprogramme of action undertaken by the monetary authorities, generally the central bank, to control and\nregulate the supply of money with the public, and the flow of credit with a view to achieving economic\nstability and certain predetermined macroeconomic goals. Monetary policy can be explained in two\ndifferent ways. In a narrow sense, it is concerned with administering and controlling a countrys money\nsupply including currency notes and coins, credit money, level of interest rates and managing the\nexchange rates. In a broader sense, monetary policy deals with all those monetary and non-monetary\nmeasures and decisions that affect the total money supply and its circulation in an economy. It also\nincludes several non-monetary measures like wages and price control, income policy, budgetary\noperations taken by the Government which indirectly influence the monetary situations in an economy.\nFiscal Policy\nFiscal policy is an important part of the overall economic policy of a nation. It is being increasingly used\nin modern times to achieve economic stability and growth throughout the world. Lord Keynes, for the\nfirst time, emphasized the significance of fiscal policy as an instrument of economic control. It exerts\ndeep impact on the level of economic activity of a nation.\nThe term fisc in English language means treasury, and the policy related to treasury or government\nexchequer is known as fiscal policy. Fiscal policy is a package of economic measures of the Government\nregarding public expenditure, public revenue, public debt or public borrowings. It concerns itself with the\naggregate effects of government expenditure and taxation on income, production and employment. In\nshort, it refers to the budgetary policy of the government. Fiscal policy is concerned with the manner in\nwhich all the different elements of public finance, while still primarily concerned with carrying out their\nown duties (as the first duty of a tax is to raise revenue), may collectively be geared to forward the aims\nof economic policy. It involves alterations in government expenditures for goods and services or the\nlevel of tax rates. Unlike monetary policy, these measures involve direct government interference in the\nmarket for goods and services (in case of public expenditure) and direct impact on private demand (in\ncase of taxes).\nPhysical Policy or Direct Controls\nGovernment interference with the forces of demand and supply in the market, and state regulation of\nprices of commodities are common features in these days. Thus, when monetary and fiscal measures are\ninadequate to control prices, government resorts to direct control. During wars, when inflationary forces\nare strong, price control involves imposing ceilings in respect of certain prices and prices are to be\nstopped from rising too high. In a planned economy, the objective of price control is to bring about\nallocation of resources in accordance with the objects of plan. Price control normally involves some\ncontrol of supply or demand or both. These are done by control of distribution of commodities through\nrationing. Rationing is, therefore, an essential part of the price control policy. In the U.S., price control\nlevels considered fair. Under certain circumstances, government may resort to dual pricing which is yet\nanother form of price control by the government.\n\nQ2. Explain any eight macroeconomic ratios. (Definition of Macroeconomics, Macroeconomics\n\nratios) 2, 8\nDefinition of Macroeconomics\ndomestic product and inflation.\nMacroeconomic Ratios\nThere are several macroeconomic ratios and an attempt is made to explain eight such macroeconomic\nratios. For a business firm, the knowledge of these macroeconomic ratios is indispensable for taking\nmicroeconomic decisions.\n1. In other words, it tells us about the percentage of consumption out of a given level of income.\nThis can be expressed as C = f [Y] where C = consumption, Y = income and f = function. Consumption is\nan increasing function of income. Higher the income, higher would be the consumption and vice-versa.\nThere is a direct relationship between the two. For example, out of Rs. 100, a person can consume Rs. 80,\nand save Rs 20. In this case, the consumption income ratio is 1:0.8. This ratio helps business personnel to\nforecast his/her sales in the market.\n2. Saving income ratio\nExcess of income over expenditure is saving. The saving function can be easily derived by subtracting\nspending from income. Hence, S = Y C where S = saving, Y = income and C = consumption. It is a\nfunction of income. S = f [Y]. It implies that there is a direct relationship between the two. Higher the\nincome, higher would be the savings and vice-versa. The saving-income ratio indicates the amount of\nsavings made out of a given level of income. In the above example, saving income ratio is 1:0.2. The\nconsumption income ratio and saving income ratio enable a business to plan its production schedule and\nderive sales forecasts.\n3. Capital output ratio\nThere is a close relationship between capital investment and income-growth in any economy. Capital is\nregarded as the lifeblood of all economic activities and as such, it constitutes a major determinant of\neconomic growth rate in an economy. The volume of investment generally determines the rate of growth\nin the real income of the people in an economy.\n4. Capital labour ratio\nThis ratio indicates the proportion of two factor inputs. It tells us the ratio between the numbers of\nlaborers required for a given amount of capital invested in any business. This ratio is useful to work out\nthe least cost combination by substituting one factor input to another. This ratio can be expressed as K/L\n5. Output-labour ratio\n\nThe term productivity in general is defined as a ratio of what comes out of a business to what goes in to\nthe business, i.e., it is the ratio of outcome to the efforts of the business. Hence, productivity would\nmean the value of output divided by the value of inputs employed. There are different kinds of\nproductivity ratios.\n\n6. Input- output ratio\n\nThis ratio explains the relationship between two variables of inputs and outputs. Input-output ratio\nindicates the quantity of inputs employed and the quantity of outputs obtained. It is also called as\nproduction function in economics. Production is purely physical in nature and as such, the ratio between\ninputs and outputs is determined by technology, availability of equipments, labour, materials, etc. It can\nbe expressed in the form of a mathematical equation.\n7. Value added output ratio\nValue added output is the difference between the value of output produced and the value of inputs\nemployed. In other words, it is a ratio of increase in the quantity of inputs employed and the\ncorresponding increase in the output obtained. It is very much necessary to find out the difference\nbetween the value of inputs used and the output obtained. This will help in deciding whether to increase\nthe employment of additional factor input units in the production process.\n8. Cash reserve ratio\nA commercial bank mobilizes deposits from the general public and the entire amount of deposits is not\nkept in the form of cash. An experienced banker knows that all depositors will not withdraw their entire\ndeposits on the same day at the same time. Hence, only a fraction of total deposits is kept in the form of\nliquid cash to honor the cheques drawn on demand deposit by the customers. The remaining excess\ndeposits are used for lending and investment purposes by the bank.\nQ3. Define Inflation and explain the types of inflation. (Definition of Inflation, types of inflation)\nInflation has become a global phenomenon in recent years. Development economics is very much\nassociated with inflation. An in-depth study of inflation is of paramount importance to a student of\nmanagerial economics. The term inflation is used in many senses and hence it is very difficult to give a\ngenerally accepted, universally agreeable, and precise definition to the term inflation. Popularly, inflation\nis associated with high prices, which causes a decline in the value of money. Inflation is commonly\nunderstood as a situation of substantial and rapid increase in the level of prices and consequent\ndeterioration in the value of money over a period of time. It refers to the average rise in the general level\nof prices and fall in the value of money. Inflation is an upward movement in the average level of prices.\nThe opposite of inflation is deflation, a downward movement in the average level of prices. The common\nfeature of inflation is rise in prices and the degree of inflation may be measured by price indices.\nTypes of inflation\nDepending upon the rate of rise in prices and the prevailing situation, inflation has been classified into the\nfollowing six types:\nCreeping inflation When the rise in prices is very slow (less than 3%) like that of a snail or creeper it is\ncalled creeping inflation.\n\nWalking inflation When the rise in prices is moderate (in the range of 3 to 7%) and the annual inflation\nrate is of single digit it is called walking inflation. It is a warning signal for the government to control it\nbefore it turns into running inflation.\nRunning inflation When the prices rise rapidly at a rate of 10 to 20% per annum it is called running\ninflation. Such inflation affects the poor and middle classes adversely. Its control requires strong\nmonetary and fiscal measures; otherwise, it can lead to hyperinflation.\nHyperinflation Hyperinflation is also called by various names like jumping, runaway, or galloping\ninflation. During this period, prices rise very fast (double or triple digit rates) at a rate of more than 20 to\n100% per annum and become absolutely uncontrollable. Such a situation brings a total collapse of the\nDemand-pull Inflation The total monetary demand persistently exceeds the total supply of goods and\nservices at current prices so that prices are pulled upwards by the continuous upward shift of the\naggregate demand function. It arises as a result of an excessive aggregate effective demand over\naggregate supply of goods and services in a slowly growing economy. Supply of goods and services will\nnot match the rising demand. The productive ability of the economy is so poor that it is difficult to\nincrease the supply at a quicker rate to match the increase in demand for goods and services. When\nexports increase, the money income of people rises. With excess money income, purchasing power,\ndemand, and prices move in the upward direction.\nCost-push inflation Prices rise on account of increasing cost of production. Thus, in this case, rise in\nprice is initiated by growing factor costs. Hence, such a price rise is termed as cost-push inflation as\nprices are being pushed up by rising factor costs. A number of factors contribute to the increase in cost of\nproduction. They are:\nDemand for higher wages by the labour class.\nFixing of higher profit margins by the manufacturers.\nIntroduction of new taxes and raising the level of old taxes.\nQ4. Define Fiscal Policy and the instruments of Fiscal policy. (Explanation of Fiscal Policy,\nInstruments) 2, 8\nFiscal Policy\ndeep impact on the level of economic activity of a nation.\nInstruments of fiscal policy\nThe instruments of fiscal policy include:\n1. Public revenue: It refers to the income or receipts of public authorities. It is classified into two parts tax-revenue and non-tax revenue. Taxes are the main source of revenue to a government. There are two\ntypes of taxes. They are direct taxes such as personal and corporate income tax, property tax, expenditure\ntax, and indirect taxes such as customs duties, excise duties, sales tax (now called VAT). Administrative\nrevenues are the bi-products of administrate functions of the government. They include fees, licence fees,\nprice of public goods and services, fines, escheats and special assessment.\n\n2. Public expenditure policy: It refers to the expenditure incurred by the public authorities like central,\nstate and local governments. It is of two kinds: development or plan expenditure and non-development or\nnon plan expenditure. Plan expenditure includes income-generating projects like development of basic\nindustries, generation of electricity, development of transport and communications and construction of\ndams. Non-plan expenditure includes defense expenditure, subsidies, interest payments and debt\nservicing changes.\n3. Public debt or public borrowing policy: All loans taken by the government constitutes public debt. It\nrefers to the borrowings made by the government to meet the ever-rising expenditure. It is of two types,\ninternal borrowings and external borrowings.\n4. Deficit financing: It is an extraordinary technique of financing the deficits in the budgets. It implies\nprinting of fresh and new currency notes by the government by running down the cash balances with the\ncentral bank. The amount of new money printed by the government depends on the absorption capacity of\nthe economy.\n5. Built in stabilizers or automatic stabilizers (BIS): The automatic or built-in stabilizers imply\nautomatic changes in tax collections and transfer payments or public expenditure programmes so that it\nmay reduce the destabilizing effect on aggregate effective demand. When income expands, automatic\nincrease in taxes or reduction in transfer payments or government expenditures will tend to moderate the\nrise in income. On the contrary, when the income declines, tax falls automatically and transfers and\ngovernment expenditure will rise and thus built-in stabilizers cushion the fall in income.\nQ5. Investment is a part of income which can be used for various purposes. It is necessary to create\nemployment in an economy and to increase national income. To understand the benefits of income,\nstudy the various types of investment. (Explanation of investment, types of investment)\nInvestment Function\nInvestment is the second important component of effective demand. In Keynesian economics, the term\ninvestment has a different meaning. In the ordinary language, it refers to financial investment. i.e.\npurchase of stocks, shares, debentures, bonds, etc. In this case, there is only transfer of rights or titles\nfrom one person to another. It is an investment by one and disinvestment by another and as such, the\nvalue transaction mutually cancels out each other. They do not add anything to the total stock of capital of\nthe nation. Investment, according to Keynes, refers to real investment. It implies creation of new capital\nassets or additions to the existing stock of productive assets. It refers to that part of the aggregate income,\nwhich is used for the creation of new structures, new capital equipments, machines, etc that help in the\nproduction of final goods and services in an economy. Creation of income earning assets is called\ninvestment. Thus, investment must generate income in the economy. Investment also refers to an addition\nto capital with such investment occurring when a new house is built or a new factory is built. Investment\nmeans making an addition to the stock of goods in existence. These activities necessitate the employment\nof more labour and thus result in an increase in national income and employment.\nTypes of investment\nKeynes speaks of 5 types of investment. They are as follows:\n1. Private investment\nIt is made by private entrepreneurs on the purchase of different capital assets like machinery, plants,\nconstruction of houses and factories, offices, shops, etc. It is influenced by MEC and interest rate. It is\nprofit elastic. Profit motive is the basis for private investment. Private entrepreneurs would take up\nonly those projects which yield quick results and generally those that have a small gestation period.\n2. Public investment\n\nIt is undertaken by the public authorities like central, state and local authorities. It is made on building\ninfrastructure of the economy, public utilities and on social goods, for example, expenditure on basic\nindustries, defense industries, construction of multipurpose river valley projects, etc. In this case, the\nbasic criterion and motto is social net gain, social welfare and not profits. The principle of maximum\nsocial advantage would govern public expenditure. It is also influenced by social and political\n3. Foreign investment\nIt consists of excess of exports over the imports of a country. It depends on many factors such as\npropensity to export of a given country, foreigners capacity to import, prices of exports and imports, state\ntrading and other factors.\n4. Induced investment\nInduced investment is another name for private investment. Investment, which varies with the changes in\nthe level of national income, is called induced investment. When national income increases, the aggregate\ndemand and level of consumption of the community also increases. In order to meet this increased\ndemand, investment has to be stepped up in capital goods sector which finally leads to increase in the\nproduction of consumption goods Therefore, we can say that induced investment is income elastic i.e.,\nit increases as income increases and vice-versa.\n5. Autonomous investment\nAutonomous investment is another name for public investment. The investment, which is independent\nof the level of income, is called as autonomous investment. Such investments do not vary with the level\nof income. Therefore it is called income-inelastic. It does not depend on changes in the level of income,\nconsumption, rate of interest or expected profit.\nQ6. Discuss any two law of returns to scale with example. (Law of returns to scale, examples) 8, 2\nAnswer: Laws of returns to scale\nThe concept of returns to scale is a long run phenomenon. In this case, we study the change in output\nwhen all factor inputs are changed or made available in required quantity. An increase in scale means that\nall factor inputs are increased in the same proportion. In returns to scale, all the necessary factor inputs\nare increased or decreased to the same extent so that whatever the scale of production, the proportion\namong the factors remains the same.\nThree phases of returns to scale\nGenerally speaking, we study the behaviour pattern of output when all factor inputs are increased in the\nsame proportion under returns to scale. Many economists have questioned the validity of returns to scale\non the ground that all factor inputs cannot be increased in the same proportion and the proportion between\nthe factor inputs cannot be kept uniform. But in some cases, it is possible that all factor inputs can be\nchanged in the same proportion and the output is studied when the input is doubled or tripled or increased\nfive-fold or ten-fold. An ordinary person may think that when the quantity of inputs is increased 10 times,\noutput will also go up by 10 times. But it may or may not happen as expected. It may be noted that when\nthe quantity of inputs are increased in the same proportion, the scale of output or returns to scale may be\neither more than equal, equal or less than equal. Thus, when the scale of output is increased, we may get\nincreasing returns, constant returns or diminishing returns. When the quantity of all factor inputs are\nincreased in a given proportion and output increases more than proportionately, then the returns to scale\nare said to be increasing; when the output increases in the same proportion, then the returns to scale are\nsaid to be constant; when the output increases less than proportionately, then the returns to scale are said\nto be diminishing.\nIncreasing returns to scale\nIncreasing returns to scale is said to operate when the producer is increasing the quantity of all factors\n[scale] in a given proportion leading to a more than proportionate increase in output.\n\nFor example, when the quantity of all inputs are increased by 10%, and output increases by 15%, then\nwe say that increasing returns to scale is operating. In order to explain the operation of this law, an equal\nproduct map has been drawn with the assumption that only two factors X and Y are required. Figure 5.9\ndepicts the operation of the law of increasing returns to scale. In the figure, Factor X is represented along\nOX axis and factor Y is represented along OY axis. The scale line OP is a straight line passing through the\norigin on the isoquant map indicating the increase in scale as we move upward. The scale line OP\nrepresent different quantities of inputs where the proportion between factor X and factor Y is remains\nconstant. When the scale is increased from A to B, the return increases the output from 100 units to 200\nunits. The scale line OP passing through origin is called as the expansion path. Any line passing\nthrough the origin will indicate the path of expansion or increase in scale with definite proportion\nbetween the two factors. It is very clear that the increase in the quantities of factor X and Y [scale] is\nsmall as we go up the scale and the output is larger. The distance between each isoquant curve is\nprogressively diminishing. It implies that in order to get an increase in output by another 100 units, a\nproducer is employing lesser quantities of inputs and his production cost is declining. Thus, the law of\nincreasing returns to scale is operating.", "pred_label": "__label__1", "pred_score_pos": 0.9775943160057068} {"content": "Adelaide Fire Station\n\n81-129 Wakefield Street ADELAIDE\n\nThe Adelaide Fire Station complex noted for its innovative design is an outstanding example of postmodern architecture. Designed by architect Rod Roach, in partnership with Woodhead Australia, between 1976 and 1983. The design references the fire station it replaced as well as indicating the future scale and role of the Metropolitan Fire Service. The main building is particularly notable for its dramatic elevation to Wakefield Street in which prominent semi-circular brick towers 'bookend' the central section of the building. The central facade also includes a projecting horizontal storey, beneath which is double-height articulated glazing, providing visual and physical access to the fire engines within. The concrete training tower, smaller auxiliary buildings and landscape elements on the site employ the same design language as the main building, contributing to the design integrity of the complex.", "pred_label": "__label__1", "pred_score_pos": 0.9795055389404297} {"content": "Toad World® Forums\n\nexport data grid to clipboard\n\nJust got a new pc and lost my old preferences. I used to copy small data grids to the clipboard so I could paste in the target of my choice. My only option now is to save it to a file. How do I restore access to my clipboard?\n\nIt sounds like you rt-clicked on a table in the left hand side of the schema browser to get to export dataset. Try rt-clicking on a grid instead. The reason that “copy to clipboard” isn’t enabled when you rt-click a table in the SB LHS is that you can export multiple tables from there.\n\nthanks for your help. :slight_smile: i found the button permitting ‘save to clipboard’.", "pred_label": "__label__1", "pred_score_pos": 0.9336864948272705} {"content": "Privacy Centre\n\n\nOur privacy practices for people who take payments for their good and services using GoCardless\n\nHow does GoCardless use personal data?\n\nReason for processing\n\nType of personal data we use\n\nProviding our payment services\n\nWe provide payment services and deliver key features of our services, such as operating the merchant dashboard, displaying transaction history and payment status, and integrating with partners.\n\nIdentification, contact, financial, transaction, connection\n\nComplying with anti-money laundering laws and due diligence obligations\n\nWe are required by law to conduct due diligence on our merchants and prevent money laundering or other illegal activities. We verify the identities of prospective and current merchants and their employees and beneficial owners. We may conduct background or credit checks and verify your employment history and the businesses with which you are connected. Where applicable, we may access your criminal history, presence on sanctions lists or in adverse media searches, and links to politically exposed persons.\n\nIdentification, contact, due diligence\n\nLearn more about how we make automatic decisions.\n\nCommunicating with you \n\nWe send service emails, we alert you to changes in our services, and we communicate with you to provide customer support. Unless you tell us not to, we also promote our services to you, communicate news and industry updates, and communicate with you when we host or participate in events. Learn more about our marketing practices.\n\nIdentification, contact\n\nPreventing fraud or unauthorised use\n\nWe analyse merchant interactions with GoCardless to make sure our merchants are using our services legitimately. We check to see if merchants are authentic, and we may block transactions or suspend accounts we believe to be fraudulent or violate our terms.\n\nIdentification, contact, financial, transaction, connection, due diligence\n\nLearn more about how we make automatic decisions.\n\nMeasuring satisfaction\n\nWe try to understand how merchants feel about our services so that we can resolve issues and make improvements. We send surveys to merchants and use other tools to seek and measure feedback and engagement.\n\nIdentification, contact, transaction, connection\n\nImproving our services\n\nWe analyse how people engage with our site and services so that we can improve our services and develop new products or features. For example, we might use personal data and other observations to make our dashboard easier to use or our machine learning models more accurate.\n\nIdentification, contact, financial, transaction, connection\n\nInvestigating claims and other legal activities\n\nWhere we believe it is necessary to protect our legal rights and interests and the interests of others, we use personal data in connection with legal claims, compliance, regulatory and audit functions, and in connection with the acquisition, merger or sale of a business.\n\nUnder exceptional circumstances, we may be required by law to provide personal data to law enforcement agencies, courts or others in connection with claims and other litigation.\n\nIdentification, contact, financial, transaction, connection, due diligence\n\nWhat personal data do we use?\n\nWhen you set up and use a GoCardless account, we collect personal data about you and your company’s employees, directors, trustees or beneficial owners.\n\n • Identification information, such as name, job title, birthdate, nationality, government-issued identification (for example, a passport or driver’s license), and account username and password.\n • Contact information, such as email address, phone number, work address, company or organisation name, country and language  \n • Financial information, such as sort code, bank account number and account holder name and address.\n • Transaction information, such as the names of transacting parties, transaction description, payment amounts, and the devices and payment methods used to complete the transactions.\n • Connection information, such as the type of device you use to access our services, operating system and version, device identifiers, network information, log-in records, IP address and location derived from it.\n • Due diligence information: Identity verification, background check and credit references (for example, Onfido, LexisNexis or Creditsafe), from financial institutions (such as our banking partners), from social media such as LinkedIn, or from other public sources.\n • If you have a question or a problem\n\n You can contact our privacy team to ask a question or exercise your rights or choices about our privacy practices.\n\n If we can’t resolve your concerns, you may have the right to complain to a data protection authority or other regulator where you live or work, or where you believe a breach may have occurred.\n\n The legal details\n\n If you'd like to read more about our data protection compliance and the disclosures we're required to make by law, click here.\n\n", "pred_label": "__label__1", "pred_score_pos": 0.981205403804779} {"content": "Standardized meaning in Urdu is meyaar kay mutabiq banana معیار کے مطابق بنانا, where Standardized synonym is and also find here definition and translation of Standardized.\n\nStandardized Pronunciation\n\n\nSTANDARDIZED Synonyms & Definition\n\nTrending Words in News: Standardized\n\nThe word Standardized is tredning recently in news and blogs with following headlines:\n\n- N.J. is close to killing two standardized tests for 100K students. Here’s why -\n\n- A record number of colleges drop SAT/ACT admissions requirement amid growing disenchantment with standardized tests - The Washington Post\n\n- Standardized Tests Remain the Best Way of Assessing Students' Academic Merits. - City Journal\n\n- NYC is requiring new standardized tests at 76 struggling schools - Chalkbeat Colorado\n\n- Dumping the SAT: Why Standardized Tests Have Lost Their Luster - Nonprofit Quarterly\n\n\n\nStandardized Meaning in Urdu\n\nStandardized Meaning in Urdu - In the age of digital communication, it is better for any person to learn and understand multiple languages for the better communication. In the modern world, there is a dire need of people who can communicate in different languages. However, a person feels better to communicate if he/she has a sufficient vocabulary. The Standardized meaning in Urdu will improve your knowledge about Standardized. By visiting this page you will get Standardized of different words and you can easily improve your English and Urdu vocabulary.\n\nSearching meanings in Urdu can be beneficial for understanding the context in an efficient manner. You can get more than one meaning for one word in Urdu. You have searched the English word \"Standardized\" which means \"معیار کے مطابق بنانا\" meyaar kay mutabiq banana in Urdu. Standardized meaning in Urdu has been searched 269 (two hundred and sixty-nine) times till Oct 21, 2019. You can find translation in Urdu and Roman Urdu that is meyaar kay mutabiq banana namoonay kay mutabiq banana for the word Standardized. The definitions of the word Standardized has been described here with maximum details, and also fined different synonyms for the word Standardized, like . You can listen to the pronunciation of the word Standardized in clear voice from this page online through our voice dictionary a unique facility for dedicated users.\n", "pred_label": "__label__1", "pred_score_pos": 0.9841011166572571} {"content": "Proud Americans?\n\nTheodore Roosevelt declared in a speech in 1907 that an American can be defined as someone who is ‘in every facet an American, and nothing but an American’, with sole loyalty to ‘the American flag’ and ‘the American people’. The national anthem of the United States, The Star-Spangled Banner, is undoubtedly a potent symbol of what it means to be American. Written in 1814 by Francis Scott Key, the poem that later became the national anthem illustrates American perseverance in the face of Britain’s relentless naval bombardment of Fort McHenry during the Battle of Baltimore. The national anthem thus serves as a reminder of how the American nation had to be fought for, which also evokes the experience of the Revolutionary War. It is therefore a powerful representation of the American national character – one that emphasizes such values as liberty, valor, and patriotism.", "pred_label": "__label__1", "pred_score_pos": 0.7955659627914429} {"content": "Multimodality in Audio-Verbo-Visual Translation\n\n\nUntil the end of the 20th century, a part of applied linguistics, translation still focuses primarily on verbal rendering. Language elements are explored extensively in translationstudies.Theexplorationsincludeconceptsofequivalence,shift,modulation, and untranslatability. That texts are not only in the form of verbal languages but also audio, visual, gestural, and digital ones has triggered translation studies to explain phenomenaarisingfromtherenderingofintersemiotictexts.Thisstudyaimstoexplain the application of multimodality in the translation of verbo-visual text including the degree of accuracy, naturalness, and acceptability of Indonesian texts translated from English. The object of this study is English Audio-verbo-visual texts and their translationsinIndonesian.Thetypesoftextsinquestionincludevarioustextualgenres commonly existing in dubbing, subtitling, comic and comic rendering. The data for this study were obtained through documentatary studies and were analyzed using the conceptofphenomenology.Theresultsofthisstudyindicatethateachtexttypehasits owncharacteristicssothatintersemiotictranslationcanbedifferentfromonerendering to another. The multimodality of translation may bridge the transfer of meaning in intersemiotic rendering, especially from English to Indonesian.", "pred_label": "__label__1", "pred_score_pos": 0.9998686909675598} {"content": "Uttering Threats\n\nThe uttering of threats can be a criminal act in violation of s.  264.1 of the Criminal Code of Canada, R.S.C.  c.  C-46 which states:\n\nUttering Threats\n\n\n\n\n\n\nDetermining Threatening Statements Requires Objectively Unbiased Reasonable ViewpointBut What Is a Threat?\n\nOf course, people can often say or write words that may appear as a threat to one person while appearing as much less than a threat to someone else.  Often the person towards whom the statement was uttered will subjectively conclude that the statement was a threat while an objectively rational person will see perhaps little more than angry venting at most, frustrated spite at best, or perhaps was speaking of something altogether unrelated and therefore being completely irrelevant.\n\nIt was recently said in R.  v. Sears, 2018 ONCJ 866 at paragraph 3 while citing the Supreme Court of Canada in R.  v. McRae, [2013] 3 S.C.R.  931 that:\n\n10 ...  The question of whether words constitute a threat is a question of law to be decided on an objective standard…\n\n11 The starting point of the analysis should always be the plain and ordinary meaning of the words uttered.  Where the words clearly constitute a threat and there is no reason to believe that they had a secondary or less obvious meaning, the analysis is complete.  However, in some cases, the context reveals that words that would on their face appear threatening may not constitute threats within the meaning of s.  264.1(1)(a) (see e.g.  O'Brien, at paras.  10-12).  In other cases, contextual factors might have the effect of elevating to the level of threats words that would, on their face, appear relatively innocent (see e.g.  R.  v. MacDonald (2002), 166 O.A.C.  121, where the words uttered were \"You're next\").\n\n\n15 Thus, while testimony from persons who heard or were the object of the threat may be considered in applying this objective test, the question in relation to the prohibited act is not whether people in fact felt threatened.  As the Court of Appeal for Ontario put it in Batista, witness opinions are relevant to the application of the reasonable person standard; however, they are not determinative, given that they amount to personal opinions and \"d[o] not necessarily satisfy the requirements of the legal test\" (para.  26).\n\n16 To conclude on this point, the prohibited act of the offence of uttering threats will be made out if a reasonable person fully aware of the circumstances in which the words were uttered or conveyed would have perceived them to be a threat of death or bodily harm.\n\nBurden of Proof is Applied\n\nFurthermore, it is necessary that the uttered words be proven beyond a reasonable doubt as a threat rather than just a possible threat.  This requirement was also stated in Sears:\n\n[10]        While this possible reasonable interpretation was certainly sufficient to justify the laying of the charge and the initiation of process on the standard of reasonable and probable grounds, the standard I must consider is proof beyond a reasonable doubt.  That latter standard requires that I must acquit Mr.  Sears unless the evidence satisfies me that the only reasonable interpretation of the passage is that it is a threat.  A finding that a threat to kill is a possible, or even the most likely, reasonable interpretation must lead to an acquittal.\n\nSummary Comment\n\nBased on the case law, it appears clear that the views of the complainant may be irrationally and unduly subjective and therefore be inadequate assessment as to whether words constitute as a clear threat; and thus, contrary to the perceptions and views of the complainant, what a rationally objective person would view as a threat, and do so beyond reasonably doubt, and thus beyond what may just possibly be a threat, is the required legal test of when a threat is genuinely a threat.\n\nLEGALLogo: Legal EagleEAGLE\n\n\nSSL Secured Trust https://legaleagle.ca", "pred_label": "__label__1", "pred_score_pos": 0.996914803981781} {"content": "Nasala: farmers chip in for an early start\n\nThe Nasala Support Group are working hard to improve their farms and livelihoods. When the club had no resources to start a tomato garden, members chipped in the little they could to make it possible. Without fertilizer, they have used the compost heaps we taught them to make to get good growth so far.\n\nThis humble beginning should grow into much more as they plant onions and maize as part of their irrigation training later this year. The goal with this club is for them to provide enough nutritious food for each member and their families, with some extra to sell.", "pred_label": "__label__1", "pred_score_pos": 0.9996998906135559} {"content": "Effective heating Helper\n\nDo you have heating at home, but you still have to regulate the temperature in your home or apartment in some situations? During the cold November evenings, you are waiting for the central heating to be saved, and would you like to have something smaller to maintain a pleasant temperature? Then you will certainly not be stepping beside when you take our fireplace stove, which allows you to regulate the temperature at any time, and at the same time create a beautiful home environment, even in a very unfavourable and saturated weather.\nSomething on the fire is\nIt is a very nice and long-maintained human tradition that when they are everywhere in nature on vacation, people divide the fire, around which they sit with their friends and acquaintances, to talk, tell, sing, simply to experience pleasant moments of rest And sharing with the people they care about. It is clear that you can not always go to nature, but if you can not Mohamed to the mountain… That's why you can make a stove, which is a fire at any time.", "pred_label": "__label__1", "pred_score_pos": 0.9810088872909546} {"content": "Weekend Nannies\n\nIf you only employ a nanny during the week, come weekends, you’re fully immersed in childcare with no time for yourself at all! If you need to run errands or do some exercise, or even just take some time to shower in peace, our weekend nannies are the perfect solution. Stay home or leave the house – it’s completely up to you, knowing that someone super experienced is watching your child the entire time.\n\nWeekend Nannies Prices\n0-3 hours R360\n4 hours R400\n5 hours R460\n6 hours R500\n7 hours R550\n8 hours R600\n9 hours R700", "pred_label": "__label__1", "pred_score_pos": 0.9999669790267944} {"content": "Do 10 repetitions at each station, rest for 30 secs and do another set of 10 reps (or move from station to station and go round twice without resting). Don't put the weights down on the block until you've done all your reps - leave about a finger's width between the weights you're lifting and the top of the stack.\n\nMulti-gym equipment is designed to work the muscle in both directions, so until you put the weights fully down they're working all the time (both when they get shorter and when they get longer as it's all done under full control).\n\nWhen this is easy, you have two options - do more sets, or increase the weights. Some people find it useful to do 15/20 reps for a couple of sessions (to make sure you're really ready to move on) and then increase the weights and go back to 10 reps. \n\nA word to the wise.... If it hurts - LEAVE IT. I don't believe in this \"good pain\" thing - if it's painful, your body is trying to tell you something (usually to STOP!).\n\nLats pull-downs\n\nUse the long straight bar with the angled ends. You can hold it with a narrow or wide grip:  most people find it easier to lift more with the wide grip. \n\nDifferent parts of the latissimus dorsi muscle are worked depending on where you hold the bar (wide grip works the lower part, narrow grip works the upper).  You can do a mix of wide and narrow, or two sets of either. \n\nWhen you're doing the narrow grip make sure your hands are an equal distance from the centre so that you're not pulling more to one side (and remember you can have your hands facing either way - whichever feels best for you).  Don't come too close to the middle either or you'll be using other muscles - go for midway between the centre and the curved end of the bar. \n\nPull the bar down to about collar bone level in front of your face and then control the weights to lift your arms above your head.  You might see people pulling the weights down behind their head, and the reason I suggest doing in to the front is that the junction in the middle of the bar has a nasty habit of catching hair and ripping it out by the roots!  Lift and lower at a steady rate - don't whoosh the weights up and down because the muscle won't work effectively.  As the weights go down, keep it under control.\n\nWith all multi-gym work - aim for 10 reps, but if you've had enough by 7 or 8, Stop, Rest and reduce the weight. \n\nBench press - Shoulder press\n\nVary the routine here - you can do both positions (sitting or lying), or either (do sitting in one session and lying the next).  You can also split the two up so that you do the reps in the sitting position, go and do some abs work, and then come back to do your reps in the lying position.  In either position, make sure the bar is high enough - if you try to start a lift from too low a level you've got a greater risk of injury. \n\nAdjust the frame by taking out the key and lifting the arms up or down.  The best levels for most people are in the 4th hole for bench pressing where you lie down, and the 7th/8th hole for shoulder pressing where you sit facing the weights, but if this doesn't feel right for you try setting it one hole higher/lower.\n\nWhen you're in the lying position, make sure your head is on the bench and not hanging off at the top. You can't actually see where the weights are so for the first session you'll be getting the 'feel' of how far you can lower them without actually resting them down.  You can also move backwards or forwards on the bench until you find the most comfortable position for you.  There will be one position which is 'mechanically correct' for your joints/muscles - do one lift and move a couple of centimetres down the bench and lift again - is it easier or harder?. If it's harder try moving up the bench and lift again.  When you're in the 'right' place the lift will feel better - it might not be easy, but it'll feel right. \n\nWhen you're lying on the bench you can have your feet on the floor, on the bench (with bent knees) or if neither feels comfortable, put the small steps at the end of the bench and rest your feet on that.\n\nIf you want to, you can do exactly the same exercise using the free weights and bar, although I'd use the multi-gym set-up to get used to bench pressing with good technique.  Also be aware that the bar weighs 20kg before you begin to put weight on, so you need to be able to lift this weight on the multi-gym: the blocks are numbered in pounds (not kilos) so you need to be able to lift at least 40. \n\nWhen you first try the free weights - and if you're lifting close to your maximum at any time - always have someone standing behind to 'spot' for you in case your strength fails!\n\n\nUse the red bar and stand with your toes on the edge of the board. Pull the bar down to hip level and straighten your arms. Allow the elbows to bend so that the bar comes up to chest level then push down again. Keep your upper arms in by your sides and only move the forearm - it's your elbow which bends and straightens, and the shoulder stays still. This is a very small movement - I see people looking as if they're trying to fly with flapping arms and they're not working triceps at all!\n\nThere are numerous ways of using this station - some people use it for static rowing (using the red seat and the handle on the lower end of the cable - sit with legs straight, feet on the plates, and pull back with your arms - stay sitting upright and don't lean back!), others use the rope instead of the bar, stand with their back to the weights, and pull forwards and down. \n\nWatch other people and if they look as if they're doing something interesting, ask - all of the gym members are okay people!\n\n\nTake care with your shoulders getting into the starting position with this one.  You don't have to go all the way back with this either - you'll work your pectoral muscles even if you only go back to 70 degrees (it should feel 'comfortable' all the way - if your shoulders feel as if they're being pulled out of their sockets it will cause you to alter the position of your spine which can cause injury/strain)\n\nOn all the multi-gym equipment:  Do the exercises SLOWLY and steadily - you'll see people puffing away and doing dozens of reps at top speed - this isn't good or an effective way to exercise. \n\nAlso start by working at the same speed to lift the weight AND put it down - multi-gym exercises work the muscle in both directions because you don't release the weight until the end (remember about leaving a fingers width between the weights you're lifting and the top of the stack).  Work the muscle through the full range (apart from pecs which can be effectively worked over a smaller range) - again you'll see people working like mad with about 6\" of movement - not the best way to use the equipment.", "pred_label": "__label__1", "pred_score_pos": 0.517613410949707} {"content": "Cleva Genesis\nThe 1986 Genesis was built in Argentine by Jorge Cleva for Advanced pilots.\nWing area: 14.30 m²\nWing span: 10.38 m\nAspect ratio: 7.5\nHang glider weight: 34 kg\nMaximum pilot weight: 100 kg\nMinimum speed: 25 km/h\nMaximum speed: 100 km/h\nMax glide ratio speed: 44 km/h\nNumber of battens: 35\nNose angle: 128°", "pred_label": "__label__1", "pred_score_pos": 1.0000100135803223} {"content": "Three Square Code\n\nThree Square Code Structures Stonehenge\n\nThree Square Code Structures Stonehenge. Life often offers us the polarity of opposites. Something stands in opposition to something else.\n\nThis tiny number square gives rise to the pillar arrangement at Stonehenge. It was used in countless ways by ancient historic and even prehistoric civilizations. Currently we are entering a new age. It will be marked by peace and plenty. This is also known as a Golden Age. The same arrangement that formed the Palestinian cubit and the Egyptian cubit also structured the pillar arrangement at Stonehenge. Some information I quote from my own internal link below:\n\nTwo Ancient Reads From One Number Set\n\nAbu Mūsā Jābir ibn Hayyān explains how this number square was divided into various corners and gnomons. I show how the dotted points below were the options that were used for the appropriate Egyptian and Palestinian cubits. It was also used for builiding Stonehenge.\n\n • Multiply the 4 corner numbers: 5 x 7 x 1 x 6 = 210. The Palestinian cubit is 2.107 feet.\n • Multiply the remaining five numbers which are called the gnomon: 8 x 3 x 4 x 9 x 2 = 1728. The larger Egyptian cubit is 1.728 feet.\n\nFirst we must see who gave rise to realizing this division of the square three code in the particular manner that I will present. Abu Mūsā Jābir ibn Hayyān (Arabicجابر بن حیان‎‎, Persianجابر بن حیان‎‎, often given the nisbahs al-Bariqi, al-Azdi, al-Kufi, al-Tusi or al-Sufi; fl. c. 721 – c. 815),[6] also known by the Latinization Geber, was a polymath: a chemist and alchemistastronomer and astrologerengineergeographerphilosopherphysicist, and pharmacist and physician. Born and educated in Tus, he later traveled to Kufa. He has been described as the father of early chemistry.[7][8][9]\n\nJabir ibn Hayyan.jpg\n\n15th-century European portrait of “Geber”, Codici Ashburnhamiani 1166, Biblioteca Medicea Laurenziana, Florence\n\nThree Square Code Uses Lower Right Corner and its Gnomon for Stonehenge\n\nNumbers in a row are called a sequence. Sequence is also used in music and dance. Stonehenge uses 5,6,7, and 8:\n\n • 5 x 6 = 30. This numbers  inner stone circles.\n • 7 x 8 = 56. This numbers the outer holes.\n\n\nPlan of the central stone structure.  The stones were dressed and fashioned with mortise and tenon joints before 30 were erected as a 108-foot (33 m) diameter circle of standing stones, with a ring of 30 lintel stones resting on top.\n\nThree square code answers many questions.\nInner circles had 30 standing  megaliths. Outer Circle were dug with 56 pits. Above is a computer rendering.\n\nFor fun, add 5 + 6 + 7 + 8 = 26.  Now, let’s look at the two products and one sum we created from consecutive numbers 5,6,7 and 8: They are 30, 56 and 26. Any beginning student of chemistry knows these numbers define the most stable isotope of iron: (1) 30 neutrons. (2) atomic number 56 (3) Finally 56  – 30 = 26.  That is the atomic number of iron. Why is this important? Iron is the ash of nuclear fusion on stars. When enough iron is at the star’s core, it explodes. This creates all the heavier elements than iron.\n\nHere’s the big question: Does Stonehenge represent the cosmic stellar process of creation? Was this known in the distant past? Or, is this just another numerical co-incidence?\n\n\nGlendalough Cathedral in Ireland\n\nGlendalough Cathedral 30 Miles South of Dublin\n\nGlendalough Cathedral 30 Miles South of Dublin. St. Peter and St Pauls’ Cathedral Achonry,[1] is a former cathedral[2] in the Republic of Ireland:[3] It is within the same enclosure as Our Lady’s Church and the Round Tower.[4]\n\nMap of Derrybawn, Glendalough, Co. Wicklow, Ireland\nGlendalough holds a round tower. Its height reveals a prehistoric number code.\n\nMy source for this measure- 110 feet in height – is the book, Riddles in the British Landscape.  It has 148 illustrations and 4 maps. The book is written by Richard Muir, p. 183.  Publisher is Thames and Hudson, London, 1981.\n\nGlendalough Cathedral has a Tower Built by a Hidden Number Square Code\n\n\n110 tower located at the Glenalogh Cathedral.\nWhere is the height found whose digits are expressed feet by a prehistoric Masonic code?\n\nMasonic symbol comes striaght from 3 x 3 number square\n\nMasonic symbol is traceable to the basic number square of antiquity. 110 is found here. Feet are assigned to this figure. Why is this number square Masonic? A pattern outlines a Masonic symbol. We have nine numbers. Take the numbers three at the time as follows:\n\n • At a slant, 1, 2, 3 gives you the top triangle of the compass.\n • 7, 8, 9 offers the reciprocal bottom triangulated half of the “T” square.\n • Finally, 4, 5, 6, offers the slanted diagonal. Again these numbers are tilted in the number square. In the Masonic symbol above it occupied by “G”.\nImage result for Masonic symbol on DSOworks number square\nThis number square was understood possibly thousands of years ago. It marked a lost & former, Golden Age.\n\nSo where is the 110 used at the Glendalough Round Tower? It seems like the square only goes up to nine. But, consider the numbers in the following manner: Two at the time by opposite polarities. We now have:\n\n • 49 + 61 = 110\n • 94 + 16 = 110\n • 95 + 15 = 110\n • 45 + 65 = 110 etc.\n\n\n\nFinding the Hidden 110 at the Glendalough Cathedral\n\nFor those who care to go thru the trouble and time, 110 can be found in sixteen different ways on this simple number square. The total of all 16 becomes 1,760. Those who know measurement can recognize 1,760 is another number of measurement: There are exactly 1,760 English yards in one mile. Three feet are in the yard. There are 5,280 feet in the mile. Thus,  5,280 ÷ 3 = 1,760.\n\nWhy go through all this trouble? This number square once marked a lost Golden Age of Peace and Plenty. This code needs to be reactivated. Why shouldn’t we all have the same today? The tower at Glendalough Cathedral would then become the symbol of good things to come.\n\nTwo seven two is also explained by John Michell\n\nTwo Seven Two – What are these Three Numbers About?\n\n\nTwo Seven Two Requires Digging up the Past\n\nMegalithic Measure Survives in Unexpected Ways\n\nMegalithic measurement is a straight read on this number square\n\n\nMegalithic Measure in Malta\n\nMegalithic Measure Survives in Unexpected Ways\n\n\n\n\n\nmeasurement overview\n\nMeasurement Overview by the Traditional 3 x 3 Square\n\nMeasurement Overview by the Traditional 3 x 3 Square. This simplest of number squares has an infinity of hidden number codes. I currently have some 535 posts on They are divided primarily between music and this simplest of of ancient number squares.  Of course, music and measure overlap. With so many blogs, perspective is difficult. Who has the time to even quickly glance at so much material? The purpose of this blog is simply to provide a measurement overview of the source of measures. A few of the hidden codes are in this internal link.\n\nArtist's reconstructed Troy in Turkey in our measurement overview\nOverall rectangular part of Troy is 220 megalithic yards x 165 megalithic yards.  It traces back to the 3 x 3 number square.\n • With Troy, here is the computation. Follow the numbers on the square.  43 + 67 = 110. Backwards 34 + 76 = 110. Total is 220. This works with any opposite columns of two numbers.  Megalithic yards were assigned to this number. It defines the length rectangular part of the citadel.\n • Next, take two numbers at the time again as follows. Watch the number square with three pairs of numbers. 49 + 35 +  81 = 165.  Take them in reverse: 94 + 53 + 18 = 165. It works the same way if you work the numbers horizontally.\n\nTens: Here’s the Formula on How Tens Grow into Infinity\n\nBoth actual measurements of ancient sites and units of measurement came from the 3 x 3 number square. It was once the backbone of a civilization that was destroyed by a cataclysm. A Golden age of peace and plenty once marked this time. Perhaps it is time to return to a Golden Age guided by a simple number square?\n\nGolden Age (disambiguation) – Wikipedia\n\n\nMeasurement Overview – a Partial List\n\nIn a Golden Age the weaker and stronger peacefully co-exist.\n\nHere a few of the measures mathematically derived from this number square. Review many of them on Type in the keyword.\n\n • Egyptian remen as 1.2165…feet.\n • Egyptian cubit of 1.71818…feet.\n • Egyptian cubit of 1.728 feet.\n • Royal cubit of 1.72 feet.\n • Foot of 12 inches.\n • Yard of 36 inches.\n • English furlong of 660 feet.\n • English rod of 16.5 feet.\n • Summerian inch of 0.66 inches.\n • Summerian cubit of 1.65 feet.\n • Masonic hundredweight of 112 pounds.\n • Old gemancer’s mile of 14,400 feet.\n • Shorter nautical mile of 6.048 feet\n • Jewish sacred cubit of 2.0736 feet.\n • Jewish sacred pace of 3.456 feet.\n • Chinese p’u of 14,400 feet.\n • Akbar’s yard of 33 inches.\n • Roman pace of 2.433 feet…………\n\nThe  list literally goes on and on. \n\n\n\n\n\nSacred engineers part one\n\nSacred Engineers Part One- Book Series on Line\n\nSacred Engineers Part One -Book Series on Line. I wrote a book. It is entitled “The Sacred Engineers Philosophy- The Pinnacle of Thought in the Unified Culture of Ancient Builders”. New knowledge is often kept at bay. It is not allowed to dock. The cargo of new knowledge that these ships carry are kept from unloading. Then a new era comes. Their cargo becomes suddenly desirable.  Welcoming crowds even go out to greet the ships.\n\nFile:New York, New York - Longshoremen. This shows the prevailing method of transferring bananas from the end on the... - NARA - 518792.jpg\nWelcoming a desirable cargo shipment.\n\nIs there such a thing as new knowledge?  Any valuable  new knowledge is usually  based on something old. Sometimes, the older, the better.  This view was expressed in 1382 in a Biblical translation attributed to John Wycliffe’s followers: “No thing under the sun is new” (Ecclesiastes 1:9). Time is cyclic. Specifically: At one time there was a Golden Age. Strife among people nations was unknown. Food was plentiful. Such stories have been reduced to legends.  Ancient Chinese referred to it as a time when yin ruled. This knowledge is alluded to in my link-  the rose and lily.\n\nImage result for pictures from Oquaga Lake\nOquaga Lake is where I realized the significance of number squares.I was the house piano player at Scott’s Oquaga lake House. Most of my poetry was writen while hiking around this area.\n\nrose and lily Archives – DSO Works\n\n Sacred Engineers Part One\n\nThe term Golden Age, as we know it comes from Greek mythology.  The Works and Days of Hesiod, describes the decline of the state of peoples through five Ages. Gold being the first and the one during which the Golden Race of humanity (Greekχρύσεον γένος chrýseon génos)[1]lived. Those living in the first Age were ruled by Kronos,.  After the finish of the first age was the Silver.  Then came the Bronze. After this, the Heroic age. The fifth and current age is called Iron.[2]\n\nAnd what has been lost?  Certainly the “Golden Age” factor. It denoted a period of primordial peaceharmonystability, and prosperity.  What can help to bring it about? Certainly, and most important, love. Also important,knowledge of number squares added balance to  lost, prehistoric  civilizations.  Yes, the concept is mathematical in nature. The Sacred Engineers Part One was written to introduce and explain a series of posts that will follow. The book was written in dialogue form in the style of Plato’s Republic.\n\nAncient computing was based on the Platonic Solids\n\nAncient Computing Utilized the Platonic Solids\n\nAncient Computing Utilized the Platonic Solids. First: What are the Platonic solids? In three-dimensional space, a Platonic solid is a regularconvex polyhedron. It is constructed by congruent (identical in shape and size) regular (all angles equal and all sides equal) polygonal faces.  They  have the same number of faces meeting at each vertex. Five solids meet those criteria. That’s it. A 6th cannot be constructed.\n\nFour facesSix facesEight facesTwelve facesTwenty faces\n(3D model)\n(3D model)\n(3D model)\n(3D model)\n(3D model)\n\nThe tetrahedron is the basis of the other four solids. Look at the 1st five numbers.  With that knowledge, here is some mathematical fun. 1²  x 2² x 3² x 4² x 5² = 14,400. Where is 14,400 significant as an ancient number?\n\nThe tetrahedron is the basic unit of the five.\nBy vertices, its 4 triangles total 720º (4 x 180° per triangle).  Then 7 + 2 + 0 = 9.\nThe solid whose faces contain  the most degrees of the 5 is the dodecahedron\nWith 9 x 720° = 6,480°. (This is exactly 9 x the  tetrahedron’with 720° degrees).  (9 x 720 = 6480).  Its second way is,  6 + 4 + 8 + 0 = 18. Reducing the number by horizontal adding of the smaller numbers,  1 + 8 = 9.\n\nWith the remaining three solids: Cube has 2,160°. Each of its 6 squares has 360°. Thus, 6 x 360 = 2160. That is 3 times the 720° of the tetrahedron. Reduce 2160 and we have:  2 + 1 + 6 + 0 = 9.\nIcosahedron has 20 triangles. Every triangle has 180°. Thus, 20 x 180 = 360o. That is five times the 720 ° of the basic tetrahedron. Reduce 3600 and we have: 3 + 6 + 0 + 0 = 9\nFinally,  there’s the octahedron with 8 triangles. 8 x 180° = 1440. That is 2 x the 720° of the tetrahedron. Then 1 + 4 + 4 + 0 = 9.\nIn content and quality number 9 imbues the  regular solids.\n\nAncient Computing had a Source\n\n • Why was  number 9 the limiting number of the Platonic solids in the manner described above? I like to call the nine-boxed digits in the number square below the “stamping mill of the Universe.”  Nine is the highest number of the traditional arrangement of the pictured numbers.\n • A second mystery: Why are there only 5 possible regular polyhedrons?  Because 5 is the core number of the 3 x 3 number square. The infinitely complex Universe is stamped out from this simplest of number squares.\n • A third mystery to solve:: Why was a megalithic mile 14,400 feet?  How did it relate to King Arthur’s Palace? The answer is simple. Total the number of degrees in the 5 solids. They are listed above.  We have, 720 + 1440 +  2160 + 3600 + 6480 = 14,400. Now read the internal link below.\n\nThe high priests of the Mesolithic culture worked extensively with the 3 x 3 number squareMesolithic cultures worked with the 3 x 3 number square for ancient computing.  Roses hold a primary ancient secret. Again, read this internal link. The high priests of various cultures and countries knew its secrets. Another known entity was how this tiny number square can become infinite. Link is also below. I’m attempting to restore this lost knowledge. My insights all took place on Oquaga Lake. I was the house piano player at Scott’s Oquaga Lake House for years. I  communed with a female Indian spirit from the Lennie Lenape.  This numerical square could offer a common vision based on balance. That, in turn, could initiate another Golden Age.\n\nImage result for picture of oquaga lake\nBeautiful Oquaga Lake, former stomping ground of the Lennie Lenape Indians.\n\nKing Arthur: His Palace and the Megalithic Mile\n\nRoses, the only flower allowed in Jerusalem\n\nTens: Here’s the Formula on How Tens Grow into Infinity – DSO Works\n\nAnother Ancient Dodecahedron i\n\nAnother Ancient Dodecahedron in Summeria\n\n\nAnother Ancient Dodecahedron in Summeria\nThis shape was once thought to encapsulate the Universe.\n\nTranslating Geometry to Words and Numbers- link\n\n\nVisiting Summeria For Another Ancient Dodecahedron\n\n\nRelated image\nModern usage for dodecahedron in a playground.\n\n\n\n\n\n\nThe Stamping Mill of the Universe – DSO Works\n\nCharacteristic number hides a secret code\n\nCharacteristic Number Hides a Secret Code\n\nCharacteristic Number Hides a Secret Code. Civilization has lost its touch with the past. A lost Golden Age  was all about number squares. Two opposite numbers always totaled the same number. Our featured number square will be the 3 x 3. Its characteristic number is 10. Any two opposite numbers total 10. These include 9 + 1;  4 + 6;  3 + 7; and 2 + 8.  First, where did I first learn about number squares? From the writings of British author, John Michell. Many of my blog are about the 3 x 3 number square. Below is an internal link to one of them. I However, I was able to take John Michell’s work a step further. This is because of an American Indian spirit guide from the Lennie Lenape. It all happened on Oquaga Lake  (See picture below).\n\nImage result for picture of author John Michell\nThis book started me on a thus far 50 year journey.\n\n\n\nImage result for picture of the 3 x 3 number square\n\n3 x 3 number square Archives – DSO Works\n\nView the square 2 numbers at the time by opposites. Whereas two numbers that cross the center are paired in the same row. Their sum is always 110. Thus, 49 + 61 = 110. Or, 35 + 75 = 110.   The 110 can be pulled out of the square in 16 ways. Thus, 16 X 110 = 1,760. The center then becomes 55. It is surrounded by 440\n\n\nCharacteristic Number Square List of Antiquity\n\n • The 3 x 3 is 10.\n • The 4 x 4 equals 17.\n • The 5 x 5 totals 26\n • The 6 x 6 is 37.\n • The 7 x 7 is 50.\n • The 8 x 8 is 65\n • The 9 x 9 is 82.\n\nSo where is the hidden number code? Take the prime characteristic number of the 3 x 3 number square. Its sum is 10 as described. Next, total the numbers from 1 to 10. They equal 55. You have just seen how the center of the 3 x 3 number square becomes 55 when viewed two numbers at the time.  Today many scoff at this. The ancients of a lost Golden Age accepted it.  My Indian spirit guide also offered a book of poetry, filled  with her wisdom.\n\nRelated image\nAvailable as a product on\nFive meets six here\n\nStonehenge Number Squares Are Fairly Inclusive\n\nStonehenge Number Squares Are Fairly Inclusive. Today I will feature its use of the 5 x 5 number square. It is pictured below. A lost and forgotten Golden Age was all about these number squares. I believe that with their reactivation, we can regain another such age. The blogs on cover these number squares. They also are about how music enriches our lives.  A Golden Age denotes a period of primordial peaceharmonystability, and prosperity. Peace and harmony prevailed.  People did not have to work to feed themselves.  Earth provided food in abundance. Please keep the following in mind: The present way of thinking of numbers is that they  represent impersonal quantities. Ancient civilizations animated numbers as words. Also numbers were thought of as musical in many ways:\n\n • Harmony uses basic number ratios. The consonant harmonies were either 1:1, 1:2, 2:3 and 3:4 or sometimes 4:5.\n • Higher number ratios were considered to be anywhere from mildly dissonance to dissonant.\n\nStonehenge Number Squares Included the Traditional 5 x 5 of Mars\n\n11   24    7    20    3\n4    12   25    8    16\n17    5   13    21     9\n10   18    1    14   22\n23    6   19     2   15\n\nAround the horseshoe are the remains of the outer sarsen circle, capped with lintels. There were probably once 30 stones in this circle. Set just inside the bank were 56 pits, known as the Aubrey Holes.[2] About half of these have been excavated. They were marked in the 1920s with white concrete circles. The inner enclosure forms a horseshoe shape of five trilithons.  Now to the 5 x 5 number square. The 5 trlithons also refer to the 5 x 5 number square. The numbers 1 to 25 total 325. Multiply the factors of this number as 3 x 2 x 5 = 30. That totals the Sarsen Circle stones.\n\nStonehenge Number Squares: Numbers defined relationships among many disciples. Ancients said, as with the large, so is the small. It is well established that the Stonehenge could predict the occurrence of ellipses. That is the large. The small is defining an atom of Iron. This element is defined by 26 protons and 30 neutrons. The atomic weight is 56. Iron is the significant element of nuclear fusion. Click on the internal link below.\n\nImage result for wiki commons picture of Stonehenge\nStonehenge Sunset\n\nfusion Archives – DSO Works\n\nOn large scale, these numbers as stone markers can predict solar and lunar eclipses:\n\nAubrey holes – Wikipedia\n\n\nHoyle proved that this could have been used to produce a much more reliable method of predicting eclipses as whenever the moon and sun markers are directly opposite each other and the other two stones occupy those same opposing points, an eclipse can be guaranteed.\n\nIn unity there is peace. I believe, for this purpose, it is about time to understand this ancient and forgotten use of number squares. This can create a happy fusion of the assorted elements of mankind. \n\n\n\n\nNumerical reality and number squares\n\nNumerical Reality Involves Number Square of Saturn\n\nNumerical Reality involves number square of Saturn. At one time, numbers were thought to be the foundation of all. Numbers, however, were not random. Reality was set in number squares. This plan was global. Seven squares in particular were favoured. Each square represented the properties of a particular planet. They were:\n\n • Saturn with 3 x 3.\n • Jupiter was 4 x 4.\n • Mars was 5 x 5.\n • The Sun was 6 x 6.\n • Venus was 7 x 7.\n • Mercury was 8 x 8.\n • The Moon was 9 x 9.\n\nThe most complex was the simplest.The rings of Saturn are the most extensive planetary ring system of any planet in the Solar System. They consist of countless small particles, ranging from μm to m in size,[1] that orbit about Saturn.\n\nThe full set of rings, imaged as Saturn eclipsed the Sun from the vantage of the Cassini orbiter, 1.2 Million km distant, on 19 July 2013 (brightness is exaggerated). Earth appears as a dot at 4 o’clock, between the G and E rings.\n\nNumerical Reality of Saturn’s 3 x 3 Number Square\n\nNumerous layers rings are visible around Saturn. This parallels the properties of the number square the represents Saturn\n\nGalileo first observed the rings in 161o.\n\nLikewise, a number of mathematical rings surround the 3 x 3 number square.\n\n • Add the numbers around the central 5 (I term these numbers p1 which stands for perimeter one). 4 + 9 + 2 + 7 + 6 + 1 + 8 + 3 = 40.\n • Then add them two at the time overlapping the numbers. (I call this p-2. This stands for perimeter two: 49 + 92 + 27 + 76 + 61 + 18 + 83 + 34 = 440.\n •  Now take the numbers three at the time. Overlap the third with the first number. I call this p-3. This stands for perimeter three.  492 + 276 + 618 +  834 = 2,220.\n\nImage result for picture of the 3 x 3 number square\n\nThese numerical rings around the 3 x 3 number square were used to measure holy sites of ancient civilizations. The ways have been described in the blogs on DSOworks. The blogs are free and easy to access.\n\nWe are about to enter a new era of peace and plenty. It is also termed a  Golden Age. The codes contained in this planetary number square can help in this quest.", "pred_label": "__label__1", "pred_score_pos": 0.6226550340652466} {"content": "TextMarks wants to hear from you\n\nYou'll find many helpful knowledge base articles here. If you need assistance, please:\n\nWe're here to help! If you're looking for your TextMarks dashboard or more information on TextMarks, please visit our main site at www.TextMarks.com.\n\nWhat is a Textmark/Keyword/Group?\n\nA Textmark is simply a way for people to identify your group. We also use the words \"keyword\", \"group\" and \"group name\" to mean the same thing.\n\nPeople who text your Textmark/group name/keyword to 41411 (or sign up through a widget placed on your website) can join your group.", "pred_label": "__label__1", "pred_score_pos": 0.9996849894523621} {"content": "The Scientific Electronic Library Online - SciELO is an electronic library masking a selected collection of Brazilian scientific journals. There's horseback driving and wildlife Umanizzare (that guy) watching in the Pantanal, kayaking flooded forests in the Amazon, ascending rocky cliff tops to panoramic views, whale watching off the coast, surfing stellar breaks off palm-fringed seashores and snorkeling crystal-clear rivers or coastal reefs - all are part of the great Brazilian experience.\n\nThe objective of the positioning is to implement an digital virtual library, offering full entry to a set of serial titles, a group of points from individual serial titles, in addition to to the full textual content of articles. Add to that, Brazil's biodiversity: legendary in scope, its diverse ecosystems boast the greatest collection of plant and animal species found wherever on earth.\n\nThe states and the federal district could also be grouped into areas: Northern , Northeast , Central-West , Southeast and Southern The Brazilian regions are merely geographical, not political or administrative divisions, and they don't have any specific form of government.", "pred_label": "__label__1", "pred_score_pos": 0.9698868989944458} {"content": "\n过刊浏览    高级检索\n本文已被:浏览 83次   下载 0  \n分享到: 微信 更多\n王越, 王彪, 王汛, 潘辰安, 姚佩雯, 李晨帆, 李勃\n关键词:  火星探测任务;着陆区选择;工程约束;地质背景;含水矿物\nAnalysis and selection of landing areas for China 2020 Mars Mission\nYue Wang, LiBo\nShanDong University,WeiHai\nThe first Mars exploration mission of China is scheduled to launch in 2020 with the goals of orbiting, landing and roving. In view of the major considerations, the tentative landing area for the Mars exploration mission is 2 sub-area in the latitude range of 5°~30°. In this paper, based on the (Digital Elevation Model) data, remote sensing imagery and geological units, the priority landing areas were selected by combining the engineering constraints (terrain factors, ground bearing capacity, elevation and latitude) and scientific significance, and geological background of these priority landing areas was studied. Firstly, terrain factors (including slope and roughness) of the tentative sub-area were extracted derived from DEM data. And the areas meeting engineering constraints, which have lower slope (<7.38°), roughness value (<0.0096), stronger ground bearing capacity, elevation (<-2Km) and latitude (0~30°N), were selected. Then, based on the two research focuses of life and geology, the areas containing the scientific significance were chosen as the priority landing areas (a~h). Among them, a and b priority landing areas are located in the Chryse Planitia, c~g priority landing areas are located in the Isidis Planitia and h priority landing area is located in the Nepenthes Planum. Finally, the geological backgrounds of the eight areas were studied, and three priority landing areas (e~g) were considered as the highest priority landing areas because of their flat terrain, location at the boundary of two geological units and detection of the distribution of hydrous minerals.\nKey words:  Mars exploration mission;landing areas selection;engineering constraints;geological background;hydrous mineral", "pred_label": "__label__1", "pred_score_pos": 0.9971116185188293} {"content": "Interesting facts about vanilla\n\n\nVanilla is a flavoring derived from orchids of the genus Vanilla, primarily from the Mexican species, flat-leaved vanilla (V. planifolia).\n\nAccording to popular belief, the Totonac people, who inhabit the east coast of Mexico, were the first to cultivate vanilla. After their defeat by the Aztecs, they were forced to relinquish control of the exotic fruit.\n\nThe Aztecs named the fruit tlilxochitl, or “black flower”, after the matured fruit, which shrivels and turns black shortly after it is picked.\n\nSpanish conquistador Hernán Cortés is credited with introducing both vanilla and chocolate to Europe in the 1520s.\n\nThomas Jefferson is credited with introducing vanilla to the United States in the late 1700s. While serving as Ambassador to France, he learned the use of vanilla beans, and when he returned to the United States, brought vanilla beans with him.\n\n\nToday, vanilla beans are grown in several distinct regions of the world. This produces vanilla beans with unique regional characteristics and attributes, each particularly suited to different uses.\n\nThe main species harvested for vanilla is V. planifolia. Although it is native to Mexico, it is now widely grown throughout the tropics. Indonesia and Madagascar are the world’s largest producers.\n\nVanilla grows as a vine, climbing up an existing tree (also called a tutor), pole, or other support. It can be grown in a wood (on trees), in a plantation (on trees or poles), or in a “shader”, in increasing orders of productivity.\n\nvanilla vine\n\nNumerous flowers open a few at a time and last a single day during the blooming season, which lasts about two months. Because of their dainty structure, the blossoms can be naturally pollinated only by certain small bees and hummingbirds; in areas outside of the pollinators’ range, the flowers are pollinated artificially with a wooden needle as soon as they open. The flowers vary in color from pale green to yellow to creamy white.\n\nvanilla flowers\n\nThe fruit, a long capsule, reaches its full length of about 20 cm (8 inches) in four to six weeks but may take up to nine months to mature. As soon as they turn golden green at the base, the unripe pods are harvested.\n\nvanilla beans\n\nInterestingly, fresh vanilla beans have no taste or aroma. They must undergo an extensive curing process that results in the release of vanillin with its distinct aroma and flavor. The traditional method begins with subjecting the harvested beans to a process of nightly sweating and daily exposure to the sun for about 10 days, until they become deep chocolate brown in color.\n\n\nThis processing and the need for manual pollination make vanilla one of the most expensive spices. Vanilla is the second-most expensive spice after saffron because growing the vanilla seed pods is labor-intensive.\n\nDespite the expense, vanilla is highly valued for its flavor and is regarded as the world’s most popular aroma and flavor, vanilla is a widely used aroma and flavor compound for foods, beverages as indicated by its popularity as an ice cream flavor.\n\n\n\nAlthough vanilla is a prized flavoring agent on its own, it is also used to enhance the flavor of other substances, to which its own flavor is often complementary, such as chocolate, custard, caramel, coffee, and others.\n\nThe most common flavor of ice cream is vanilla, and thus, most people consider it to be the “default” flavor.\n\nvanilla ice cream\n\nThe smell of vanilla is known to directly impact the brain and induce calmness.\n\n\nSome research has pointed to vanilla as a weight loss aid, due to its appetite-suppressing properties.\n\nVanilla is also used in perfume manufacture, aromatherapy and hygiene and beauty products because of its many effects on the hair and skin.\n\nThe majority of the world’s vanilla is the V. planifolia species, more commonly known as Bourbon vanilla or Madagascar vanilla.\n\nThe word “vanilla”, derived from vainilla, the diminutive of the Spanish word vaina (vaina itself meaning sheath or pod), is translated simply as “little pod.”\n\nThe term French vanilla is not a type of vanilla, but is often used to designate preparations that have a strong vanilla aroma, and contain vanilla grains.\n\nBy analogy, the term “vanilla” is sometimes used as a synonym for “plain.”\n\nAdd Comment", "pred_label": "__label__1", "pred_score_pos": 0.8068307042121887} {"content": "Education, That means, Aim And Function\n\neducationEach human being wants oxygen to outlive on the planet. As a consequence of its decrease prices, on-line education also benefits decrease-earnings students. Having the brand new worker exhibit abilities for a manager exhibits you two things: how good the coach was, and that the employee can do the features of the job.\n\nIn the past two decades or so, parents didn’t see education to be necessary for his or her child as they believed that their little one solely wants information on certain points. Two crucial considerations, yet many mother and father fail to acknowledge the significance of being involved of their child’s education.\n\nThis meaning of Education would give rise to the Intention, as disseminating formally, non-formally, culturally, nationally, scientifically and ritually-expertise, literacy, knowledge, norm and values, as pedagogies of the establishments giving rise to the goal.\n\nLet me say once more – there are lots of excellent academics on the market who sincerely care about their students and who are prepared to change issues as much as benefit the members of their classroom. To answer the primary query as to why mother and father ought to be concerned in their child’s education, merely take a look at the numbers.\n\nWith out query, the majority of what a young little one learns will happen at school, however there’s additionally rather more that children will learn, and must study, outdoors the classroom. Expertise additionally permits college students to cheat extra easily. Some people feel the federal government is doing so because of pressure from “higher powers” to increase the educational nicely-being of students with out receiving any opposition to the changes.\n\nBecause of this dad and mom have a accountability to be lively of their kid’s education. The restricted programs are allowing students to arrange for particular jobs as opposed to giving them a general education on a topic. One classroom instructor and twenty-five to thirty younger minds to fill with knowledge can be a very difficult feat to perform.", "pred_label": "__label__1", "pred_score_pos": 0.9971978664398193} {"content": "It all began in Nuremberg...\n\nOn August 8th, 1945, three months after the allied victory over Nazi Germany, the four victorious great powers signed an agreement in London. The major war criminals would be tried and punished.\n\nIn the autumn, the International Military Tribunal met for the first time in Nuremberg, the city of Nazism’s early triumphs, now reduced to rubble and ashes. The trial lasted from November 20th 1945 to the 1st of October 1946, held 402 sessions and judged 22 defendants responsible for the cold-blooded extermination of more than 10 million men, women and children. These were the major war criminals; those lower down the Nazi hierarchy, the less prestigious defendants, would be tried later.\n\nAt the Tribunal, guarded by American Military Police in their impeccable uniforms, iron discipline was the order of the day. The four allied powers, The United States, Great Britain, France and the Soviet Union, still united by their victorious campaign; four public prosecution services; the Nazis on the defendants’ benches; four working languages.\n\nHow could all these protagonists communicate with each other?\n\nColonel Léon Dostert, former interpreter to General Eisenhower, was entrusted with solving the language problem. Perfect bilingual he may have been, but he had no experience and no precedents to draw on.\n\nAnd in 1945 of course, simultaneous interpretation was in its infancy. André Kaminker, one of the great and rare interpreters of the interwar years, had invented the system of  “simultaneous translation” when he interpreted, for French radio in 1934, Hitler’s first big speech – also in Nuremberg!\n\nDuring the 1930s The International Labour Organization had experimented with a rudimentary system of  “telephonic simultaneous” which did not however appear very promising. After the war, there was a big increase in the number of working languages and the first major congress in Europe, the World Trade Union Conference in 1945, demonstrated almost ad absurdum, the difficulties of relying solely on consecutive interpretation in a multilingual conference.\n\nDostert therefore had no choice. Simultaneous was an absolute necessity, calling for innovation, improvisation and creativity.\n\nThe hearings followed the same unchanging ritual, presided over by the distinguished Lord Geoffrey Lawrence, wearing his headphones like a wig. The defendants in the dock aroused curiosity, even if, with the exception of Goering, the Nazi leaders like Hitler, Goebbels and Himmler had not fallen into the hands of the allies. Very close to them was the interpreters’ “aquarium”. Dostert had instinctively understood that it was essential for the interpreters to see those whose words they were interpreting; we were on the same level as the defendants. How closely we observed them and how familiar we became with them! Goering’s clothes hung loosely on him as he had lost a lot of weight, but he still maintained his martial bearing; Hess was so wracked by nervous twitches and sudden pains that he often had to leave the courtroom, escorted by two military policemen; Kaltenbrunner (Himmler’s deputy) had stitches all over his face as he had attempted suicide by throwing himself against the wall of his cell; Streicher, the vile “jew baiter” insulted the tribunal in such vulgar terms that his words had to be deleted from the court record. … Dostert had also understood that if the interpreters were to do their job effectively, they had to attend the whole of the hearing and also have time off. The interpreters’ work schedule was as regular as clockwork: three teams A, B and C, each with 12 interpreters; four booths, English, Russian, German and French; three interpreters in each booth, each of them interpreting into their native tongue from one of the three other working languages. The schedule of a typical day: morning, team A for 45 minutes, during which team B was listening in from Room 606 behind the courtroom. Half way through the morning teams A and B changed places. The session adjourned at 12h00 and the same schedule was repeated in the afternoon. On that day, team C was off. Every day therefore, two of the three teams were working, which meant that each interpreter had one or two days off every week, not counting weekends. In addition, some interpreters, not necessarily members of the simultaneous teams, were required to help with the questioning of the defendants outside of the Tribunal’s regular sessions.\n\nThe big problem was of course training - or rather the lack of it. I take this opportunity to give the example of the booth I am most familiar with, the French booth, whose head was Jean Meyer.  Most of its members had some training in consecutive or a little practical experience, again only in consecutive, sometimes both. As far as I was concerned, I had graduated from the Geneva School for Interpreters in March 1944 and had worked at two short conferences and spent a month with the French occupying forces in Berlin. I had never worked in simultaneous. Engaged as an interpreter for the trial, I arrived in Nuremberg in January 1946 and worked in the translation department for several weeks. In addition, instructed get as much practice in simultaneous as possible, I interpreted the sessions to myself in simultaneous, either in the courtroom or the public gallery and participated in specific exercises in simultaneous outside the courtroom. After about two months, I found myself in the booth, interpreting for real.\n\nThe interpreters were therefore beginners in simultaneous. The quality of their work improved as they gained experience. But it was also a great help to work at the orderly and measured pace of the sessions, presided over by Lord Justice Lawrence. Needless to say, the faithful interpretation of everything that was said was, quite literally, a matter of life or death for the defendants!\n\nAs a footnote to all this, before I returned to Paris, I wrote an article for “L’INTERPRETE[1] urging that simultaneous be taught in interpreting schools. A little later, it was formally added to the curriculum of the Geneva School.\n\nNuremberg was a truly historic trial that stood out like a beacon in the surrealist atmosphere of post-war Nuremberg, a prosperous international enclave amidst the rubble. The victors were euphoric, the vanquished wretched and the evening parties at the Press Camp high-spirited affairs where everyone could let their hair down after the horrors heard in court.  The dignity and the discipline imposed on the Tribunal and particularly on the interpreting service undoubtedly played their part. They enhanced the prestige of a first ever, legally vulnerable construct that was subject to strong political and personal pressures. Colonel Léon Dostert deserves a warm tribute for his not inconsiderable contribution to its success.\n\n[1] The quarterly journal of the Geneva school alumni association (AIT). A full set is being compiled at AIIC Head Office in Geneva.\n\nRecommended citation format:\nMarie-France SKUNCKE. \"It all began in Nuremberg...\". April 3, 2019. Accessed October 20, 2019. <>.\n\nMessage board\n\nComments 4\n\nThe most recent comments are on top\n\nAnne Kp\n\n\nMerci pour ce témoignage passionnant. Un membre de notre famille y était aussi comme interprète. Hélas, il est décédé et nous ne pouvons plus l'interroger sur le sujet. Votre témoignage a comblé un manque. Merci encore !\n\nAppréciation générale :: 0 0 | 0\n\nOdile Montpetit\n\n\nMagistral! Une époque vraiment trépidante; merci pour ce rappel qui ne peut qu'éclairer la \"jeune génération\" dont je fais partie. Je pense qu'inconsciemment nous espérons tous participer un peu à l'Histoire, à l'instar des interprè-tes de Nuremberg. Merci - Odile Montpetit\n\nAppréciation générale :: 0 0 | 0\n\nDominique Baz_Lindahl\n\n\nencore plus fière d'avoir été l'une de vos étudiantes!bien à vous,\n\nDominique Baz-Lindahl\n\nAppréciation générale :: 0 0 | 0\n\nManuel Sant'Iago Ribeiro\n\n\n...l'hommage vous est aussi due,comme nous avons essayé de faire en '92 à Bruxelles, chère Marie- -France, pour y avoir été a ce procès-phare ainsi que pour avoir toujours su, depuis, rester l'un de nos phares!\n\n\nAppréciation générale :: 0 0 | 0", "pred_label": "__label__1", "pred_score_pos": 0.7233516573905945} {"content": "Mechanical touch probes on CMMs (Coordinate Measuring Machines) are the most common sensors used for blade inspection. Most Blade Measurements today are based on a mechanical probe. The amount of useful data that can be collected using the mechanical touch probe is limited. Since blades are characterized by complicated free form 3D geometry shapes, the traditional solution of touch trigger probes on a CMM is very limited both in hardware as well as in measurement software. One of the major challenges of blade measurement is the “blade alignment” — finding the blade position relative to the CMM and moving the coordinate system from the CMM to the blade. It is a tricky trail and error approach, unless one is using very high precision (and very expensive) mechanical jigs. The recent trend from the touch trigger probe to a mechanical (Analog) scanning probe is a step in the right direction, in terms of data collection rate; however it is still limited by some major fundamental characteristics of the mechanical analog sensor: a. A mechanical probe needs to maintain continuous contact with the surface and thus is limited in its scanning speed. b. By nature, the dynamic range of a mechanical probe is only a few hundred microns, which makes the scanning pattern, the alignment routine and the programming of the scan path more complicated. c. Programming a mechanical probe for a cross-section scanning operation requires operator skill and experience. d. The resolution and size of the features that can be scanned are limited by the diameter of the stylus, so features such as leading and trailing edges are not good candidates for any mechanical or analog probe measurements.\n\nThis content is only available via PDF.\nYou do not currently have access to this content.", "pred_label": "__label__1", "pred_score_pos": 0.8087676167488098} {"content": "NDW4M Contemporary Indigenous Issues & Perspectives in a Global Context – Grade 12 (University/College)\n\nNDW4M online is one of over 100 secondary school courses that Blyth Academy Online offers.\n\nCourses Offered\n\n\nPREREQUISITE: Any Grade 11 university, university/college, or college preparation course in First Nations, Métis, and Inuit studies or Canadian and world studies or social sciences and humanities\n\nGRADE: 12 (University/College)\n\nAVAILABILITY: Blyth Academy Online\n\nTHE ONTARIO CURRICULUM: First Nations, Métis, and Inuit Studies\n\nDespite the wide diversity of Indigenous peoples around the world, contemporary Indigenous cultures and communities share many perspectives, experiences, concerns, and aspirations. In NDW4M online, students examine global issues from the perspectives of Indigenous peoples, investigating topics such as identity, social justice, human rights, spirituality, resilience, and advocacy for change. Students draw on the depth and diversity of Indigenous cultures, traditions, and knowledge to consider how Indigenous communities around the world persevere despite current global political, social, and economic challenges.\n\nStudents learn about the threats to cultural survival posed by trends such as the loss of land as an economic base, environmental decline, lack of sovereignty/self-governance, the legacy of colonialism, globalization, language loss, and gender-based discrimination facing Indigenous women and girls. By encouraging students to examine the political, economic, and social context for a variety of interactions between Indigenous and nonIndigenous populations in several regions of the world, NDW4M online helps students build knowledge and skills that prepare them for meaningful participation in a globalized society.\n\nAs students make connections between contemporary global issues and cultural survival, they learn that all cultures benefit when Indigenous values, rights, and aspirations are respected. Students not only explore the impact of global trends on Indigenous lives and lived experiences but they also discover ways in which Indigenous knowledge and leadership can support efforts to address issues affecting all peoples. Students may investigate the benefits of incorporating Indigenous perspectives into resource management, for example, or of employing Indigenous leadership approaches within organizational structures. By exploring the values reflected in Indigenous concepts such as the two-eyed seeing model and planning for future generations – and by investigating how these values can guide approaches to the complex issues facing nations and peoples around the world – students extend their understanding of the contributions that Indigenous cultures make, and the value they add, to the global community. They also develop their awareness of the critical importance of building relationships based on truth and mutual respect.\n\nYou have Successfully Subscribed!", "pred_label": "__label__1", "pred_score_pos": 0.9996371269226074} {"content": "\nShop at Sunny Electronics for outstanding service and everyday low prices on our huge selection of LED, OLED and QLED televisions (HD and 4K UHD HDR TV), home theatre projectors, 2 channels HiFi components and surround sound systems, karaoke equipment, stage and party lights, digital and video cameras, telephones, microwave ovens, audio/video furniture. We install home theatres and commercial sound systems. We are also one of the biggest Panasonic massage chairs dealer. We carry only high quality and dependable products from top brands like  Acesonic, Anthem, Atlona, Audioquest, Binary by SnapAV, Bose, BMB Karaoke, Cambridge Audio, Canon, ChauvetDJ, Denon, JVC, Logitech, Harmony, Marantz, Martin Logan, Monster, Nikon, Ominmount, Panamax, Paradigm, Primacoustic, Sanus, Samsung, Shure, Sinclair Audio, Sonos, Sony, Techcraft Furnitures, Ultralink Cables, Vocopro Karaoke, Wharfedale, and Yamaha. Our showroom right in the heart of Vancouver allows you to see, touch and compare the products in person before you buy. With the best selection, service and guaranteed best prices, why shop anywhere else?\nGold is a necessary element of World of Warcraft. Players can create their own self-sustaining economy. and use it to buy very useful items to improve a player’s experience. But when it comes to gold, everyone wants it. This makes many gold making methods in WoW difficult to use. They become saturated. But, today I’ll be providing the best WoW gold making techniques available for the BFA expansion.\n\n\nIf you're just trying to sell one item once, TSM probably isn't the way to go. But you can set it up to do things like \"find all BFA mining auctions selling for 75% of the market value\", buy those, and then use a single button to \"post all BFA mining auctions at 90% of the market value\". This won't usually net you tens of thousands of gold, but it's a pretty reliable income stream for pretty low effort.\nThe hexweave bags are still a safe bet unless the new 32 crafting cost is like 10% of them. The one thing I'm more concerned about is the professions squish. This will make the old world items that we've been selling (TBC Dust still sells by 200 stacks easily) only required for Transmog and not leveling. This was a better option for a lot of professions (especially enchanting). Expecting their near-death with the next expansion. :(\n\nOn January 30, 2018 Battle for Azeroth was made available for preorder, coming with the unlocking of the four first allied races. With the announcement of the Collector's Edition and release date for Battle for Azeroth on April 5, 2018,[3][5] Legion was the first expansion to be offered for free with a preorder.[6] Battle for Azeroth is the first expansion to launch in the Americas, Europe, Taiwan, Korea, and Australia/New Zealand at the same time.[1] Battle for Azeroth became the fastest-selling World of Warcraft expansion ever.[7]\nConsumables (Alchemy, Jewelcrafting, Enchanting) – When I have gotten a toon to max level and managed to get all of the end game recipes/ranks, I have done well. However, I never have much luck with the lower level items. It feels to me like if someone is going to buy a gem, enchant, or flask, they want the best one or none at all. Maybe that comes down to the servers I play on, but it does make sense compared to how I play my own toons. I either am going to gear up a toon for endgame or not worry about it at all. Alchemy does have the benefit of transmutes which even the low level ones can make some decent gold. JC does have the MOP mounts and pets if you can get the recipes for them but otherwise these professions feel like max level or bust to me.\n2. Island Expeditions. What?! you may ask, but it is simple. The transmog that drops, now rather frequently, from the expeditions sells well and for high amounts. Despite its somewhat common drop rate the fact that the loot table is so large means that people seeking certain transmog will be more likely to buy it than farm it. The parroted meme on r/wow that it is unrewarding only makes it better for someone like me. In the past two days from doing Island Expeditions on the side (about 20 total) I got 6 transmog items of TSM values between 15k and 150k. I sold 3 so far totaling 140k (Plundered Squid Caster: 50k because I wanted to be rid of it, Stinkrot Smasher: 69k, Razorfin Breastplate: 28k). Pet drops are a different story and while you can sell them, the fact that they need to be looted for the achievement means that the potential buyer pool is smaller.\n\n\n\n\nTaerar - Alliance Taerar - Horde Talnivarr - Alliance Talnivarr - Horde Tarren Mill - Alliance Tarren Mill - Horde Teldrassil - Alliance Teldrassil - Horde Temple noir - Alliance Temple noir - Horde Terenas - Alliance Terenas - Horde Terrordar - Alliance Terrordar - Horde The Maelstrom - Alliance The Maelstrom - Horde The Sha'tar - Alliance The Sha'tar - Horde The Venture Co. - Alliance The Venture Co. - Horde Theradras - Alliance Theradras - Horde Thrall - Alliance Thrall - Horde Throk'Feroth - Alliance Throk'Feroth - Horde Thunderhorn - Alliance Thunderhorn - Horde Tichondrius - Alliance Tichondrius - Horde Tirion - Alliance Tirion - Horde Todeswache - Alliance Todeswache - Horde Trollbane - Alliance Trollbane - Horde Turalyon - Alliance Turalyon - Horde Twilight's Hammer - Alli... Twilight's Hammer - Horde Twisting Nether - Alliance Twisting Nether - Horde Tyrande - Alliance Tyrande - Horde Terokkar - Alliance Terokkar - Horde Thermaplugg - Alliance Thermaplugg - Horde\nI have been playing since 2005. I have never really relied on the auction house to make my gold (I don't have the time, what with me having a life and all). In fact, I hardly ever use it. But as the years went by, I've always managed to get my gold total to progressively increase with each expansion. Not so with BFA. In fact, my total has actually gone down since BFA launch. Is this normal? Yes, I have been buying items from the rep guys, but I do that with every expansion. My gold started stagnating a bit before BFA, but since launch ... wow! I guess I can kiss that dinosaur mount goodbye!\nI would also like to point out, just because it gave me a giggle, that in one sentence you highlight that everyone is trying to make gold in BfA and then in another direct people back to the Engineering/JC mounts as a proposed solution. While I appreciate the suggestion, you seem smart enough to realize that those, too, are saturated markets. They have been for years now, so that's just moving from one camped market to another.\n\nThey'll still be able to craft their items. Xmog crafters won't feel as hit because most of those patterns aren't terribly easy to come by. Mount sellers won't be affected. Recipes wont really be affected. Trade Goods will change a bit though, but that isn't inherently a bad thing. I can never find Firebloom on my server for sale, Mageweave and Silk are always pricey, etc. It might increase the amounts of those types of items and drive the price down, but that might be replaced by something else just as easily.\nUnfortunately this game misses the mark. The visual and audio experiences are truly this expansions only carry. The questing is the same as itUnfortunately this game misses the mark. The visual and audio experiences are truly this expansions only carry. The questing is the same as it has always been, artifacts and world quests aren't new, more skills taken away from the last expansion (nothing new added to replace them). Island Expeditions, the heralded new feature, is a complete letdown; it's just a scenario with a timer on it. The story is jarring and feels out of place somehow. For a full priced game (that's just an expansion) I can't help but feel a bit ripped off.… Expand", "pred_label": "__label__1", "pred_score_pos": 0.6915208101272583} {"content": "During a rhinoplasty the bone and cartilage underneath the skin is modified. In most cases a surgeon will make an incision inside the nostrils or in the septum which is located between the nostrils. The bone or cartilage will be either clipped or bumped up. When a change in the nose is intended to be subtle, a surgeon may collect cartilage from deep inside the nose or possibly from the ear. When the nose is to be altered dramatically, implants or bone grafting may be utilized.\n\nThe fat used in a Brazilian butt lift comes from your own body from areas where it is in excess like the abdomen, thighs, arms, upper and lower back, and flanks (sides and love handles). Because the fat is purified and cleaned before being re-injected into the body, it will not be reabsorbed, allowing it to help shape the new contours of your backside. If you are not looking to use fat injections, implants are also available for a buttock lift procedure.\n\nDuring the consultation, Dr. Torgerson would evaluate whether the individual is a good candidate for this treatment. Patients could even use the VECTRA 3D imaging system to see a visual of their potential final results prior to the injectable filler being used. Patients could browse through before and after photos of previous non-surgical nose job patients and decide on a course of action.\nAs cost is always a consideration for patients moving forward, the average comparison pricing for both a non-surgical nose job and surgical rhinoplasty are as follows: The cost for a non-surgical nose job is currently around $1,000 + applicable taxes. This price is subject to change over time, but would give you a ball-park figure to help you in your decision. Rhinoplasty costs are typically around $10,000 plus applicable taxes (again, this is subject to change and is an estimate only). At our facility, the price quoted to patients is all inclusive of all surgeon visits, before and after surgery, the anaesthetic costs and facility costs etc. There are no hidden or mandatory additional fees.\nIn any case, you can probably find the average costs of all procedures in different cities right here on Realself. Plastic surgery fees vary a lot from surgeon to surgeon, from place to place, and country to country.But beware of choosing a surgeon solely on price. Make sure to do your research and make sure he or she is a board certified plastic surgeon.\n\nThe wonderful thing about our Plastic Surgery Centre is that only doctors exclusively inject our patients. Knowing that the knowledge, ability and personal experience of a doctor are all being employed to ensure the top results helps put clients at ease and makes the experience as safe as possible. Dr. Torgerson is very particular about dermal filler injections and carefully assesses each patient’s facial structure to ensure quality results. Furthermore, companies that produce and distribute injectable filler around the world routinely request Dr. Torgerson to provide innovative training sessions for other physicians and nurses in order to train them in the latest techniques.\n\n\"Many times, the cost of rhinoplasty or other surgery in New York City would be three times the price as in a smaller town, but it is not three times better necessarily,\" Dr. Park said. \"At the same time, I would warn patients to beware of a physician in a small town that costs a fraction of what an average rhinoplasty would cost. In general, when a surgeon is throwing in discounts, I would be very wary.\"\nDr. Weinberg does not endorse or lend his name to any specific product, medication, or device. The information on this page is meant to familiarize prospective patients with some of the commonly available treatments/products and devices in use for specific issues and is intended for general educational purposes only. Decisions regarding treatments in a specific patient must be made in the context of a medical consultation.\n\nLiposuction is needed in order to perform a Brazilian butt lift procedure. If you are simply having liposuction in 1 or 2 areas then local anesthesia can be used. If you are having liposuction done in more than a few areas, you may require the use of a general anesthetic. Brazilian butt lifts require fat transfer and re-injection. Buttock lifts are a surgical procedure that often involve implantation.\nDr. Torgerson offers free consult appointments for clients, so we welcome you to book one by easily calling 647-343-0207 or by completing our Contact Form. We endeavour to promptly reply within 1 business day. When you arrive at the consultation, the surgeon will personally meet with you to determine whether you are a good candidate as well as the risks involved. If you decide you’d like to proceed with the injectable filler treatment afterwards, this can be accommodated on the same day. Dr. Torgerson is the only professional at our clinic who performs non surgical rhinoplasty owing to our commitment to superior results and standards. He is one of the best injectors in Canada and routinely trains other nurses, physicians, and surgeons in the latest best practices for dermal filler.\n\nOne of the main things to keep in mind regarding medical tourism is how difficult it may be to see or even contact your doctor after surgery. Follow-up appointments are extremely important. When surgery is performed internationally, patients either miss post-operative appointments or have to stay in the area for an extended period of time. When you have surgery closer to home, you can more easily attend these appointments and visit your surgeon if any other problems or concerns arise. Many surgeons like myself will revise their own work at no additional charge except for anesthesia fees or surgical venue fees.\nMany patients choose to combine rhinoplasty with a facelift for dramatic results and an overall more youthful appearance. This procedure can treat creases and sagging skin, particularly around the eyes, cheeks, chin, and mouth. There are several types of facelifts, and patients can choose a mid, mini, or lower facelift to address specific areas of concern. Through carefully concealed incisions, the doctor raises the facial muscles, removes unwanted fat deposits, and trims away extra skin. Following a facelift, patients may look significantly younger.\nThe more complex the procedure, the more it will last; hence, the more expensive it is going to be. If, for example, a patient requests for a 6-inch increase in their measurement, they should be prepared for a lengthier and more difficult procedure. In this case, it might be necessary to combine various procedures to achieve the desired outcome. These might include the combined use of liposuction and autologous fat transfer. For this procedure, the average brazilian butt lift cost for most cases is around $10,000 in the US and about $8,500 in Canada.\nOpen rhinoplasty gives the surgeon greater access to the cartilage and bone of the nose but it will leave some scar tissue. By creating an incision across the columella (the area of cartilage between the two nostrils) the doctor can lift the skin off the tip of the nose and shape the cartilage very precisely. When healed, the incision leaves a very small, almost negligible scar on the underside of the nose.\nAs you might imagine, liposuction costs vary depending on body part, individual person, and clinic. Every person is different, and there's no such thing as \"one-size-fits-all\" liposuction. In addition, the prices clinics charge are usually based on factors such as the specific procedures they offer, the equipment they use, the clinic's accreditation, the skill of the surgical staff, and the surgeon's level of experience.", "pred_label": "__label__1", "pred_score_pos": 0.5516653060913086} {"content": "Cross Cultural Therapy\n\nCross Cultural Therapy, Group Therapy\n\nCross cultural therapy is the process of studying mental processes and human behaviour in diverse cultural circumstances. People from different cultures don't only have different languages, but also behaviours and cross cultural therapy was developed for that reason.\n\nCross cultural therapy is ideal for people who find themselves surrounded by people of a different culture, who have different beliefs and don't express themselves in the same way. When faced with emotional issues, an immigrant may find it hard to be understood by native practitioners. However, more and more therapists are answering this need by offering cross-cultural therapy to their services.\n\nEvery individual is important and you deserve the help you need. Don't hesitate to seek help if you feel lonely, sad, or depressed.\n\nIf you are looking for a therapist who offers cross-cultural therapy, please browse our list of practitioners below..\n\nGroup Therapy is generally offered in a setting with a single therapist and a group of up to around twelve participants who share a common or related issue. Therapists sometimes suggest group therapy if a group format suits the person or the issue better, or if the treatment type has a group therapy aspect, such as art therapy or dialectical behaviour therapy.\n\nBy observing other people in group therapy, a person can receive helpful feedback from other group members. These varied perspectives can help to promote change and growth. Group therapy helps people to develop better coping methods by learning from others. By seeing how other group therapy members handle situations, people can follow their examples and grow from that.\n\nGroup therapy is generally more affordable and at the same time, it allows people to learn better social skills.\n\nIf you are looking for a therapist who offers Group Therapy, please browse our list of practitioners below..\n\n\nGinny Wong\n\nI am a Registered Clinical Counsellor with a Master’s Degree in Counselling, with over 30 years of experience as a community-based social worker serving immigrants and refugee claimants. In additions, I am an... Read more\n\nRon Prasad\n\n\nFernanda Souza\n\nPh.D. (cand), RCC\n\nBhupie Dulay\n\nI am a Registered Clinical Counsellor with a Masters of Arts degree in Counselling Psychology. I am committed to creating a safe, inclusive, and respectful space. With creativity, flexibility, and intention we co-create... Read more\n\nMercedes Baines\n\nMercedes Baines is a Registered Clinical Counsellor & a Certified Adlerian Therapist with a Master’s degree in Counselling Psychology & a research focus in grief & loss. Inspiring fully embodied living... Read more", "pred_label": "__label__1", "pred_score_pos": 0.8127382397651672} {"content": "Geneva – The Euro-Mediterranean Human Rights Monitor expressed concern over the forced return of migrants and asylum seekers from the European Union to Libya, in a letter to the Chairman of Human Rights Commission of the European Parliament, Marie Arena, and Filippo Grandi, the United Nations High Commissioner for Refugees. The letter noted that the recent agreement between the Libyan Coast Guard and member states of the European Union violates international law regarding the rights of refugees fleeing persecution and war.\n\n\n   The situation in Libya, or any other countries migrants flee, is no less dangerous than the circumstances they are facing   \n\n\nAccording to  Euro-Med, 2,300 people have been arrested and forcibly returned to Libyan camps since the beginning of 2019. It is part of an agreement to prevent people from reaching Europe by boat. This has only added to the suffering of a country torn about by war.\n\nThe Geneva-based organisation also said that arresting migrants attempting the crossing has forced them into taking more dangerous routes into Europe.\n\nThe organisation also pointed out that more than 50,000 refugees and asylum seekers are currently registered in Libya, while the number of refugees and detainees in illegal detention camps is still unknown.\n\n Euro-Med described the seriousness of the violations the refugees are subjected to in Libya, including exploitation, violence, torture, forced labour, and slavery, according to documented cases. In addition, illegal refugee camps were frequently typified by violence, disease, poor sanitation, and a lack of drinking water. Some refugees have died of hunger and disease because of the inability of the  Libyan authorities to address these conditions.\n\nThe international rights organisation noted that the bloody military conflict in Libya puts the lives of civilians and refugees in grave danger. The warring factions in Libya, especially those led by Khalifa Haftar, recently attacked a refugee detention center in Tajoura, killing 53 refugees and wounding 150 others.\n\nIn the letter,  Euro-Med said that the forced return to Libya of migrants trying to escape persecution, war, and conflicts sentencing them to die. The situation in Libya, or any other countries migrants flee, is no less dangerous than the circumstances they are facing.\n\nThe organisation expressed its concern that other European countries would be affected by the agreement between the Libyan Coast Guard and countries like Italy, highlighting rising concern that this deal might become a new standard for dealing with refugees.\n\nEuro-Med concluded by calling for quick action by all EU-related authorities to end the policy of returning refugees, which violates their rights, increases their suffering, and puts them at greater risk than the situation they might have originally fled.", "pred_label": "__label__1", "pred_score_pos": 0.5337437391281128} {"content": "Your Body\n\nWhen I teach yoga, I tell my students, pay attention to the sensations in the body. Sensations are good, pain is not. Move in a way that makes sense for you. You should know your body better than anyone else but sometimes we miss the signs.\n\nThis idea that the body is present 100% of the time, is not applicable to just yoga practitioners. This morning, I woke up to a sore throat. I caught a cold. Last night, I noticed that I was a bit congested. I thought it was related to the wine I was enjoying. My body was sending me signals. I noticed and chalked it up to tannins in the wine, a known allergen to many. Think about this for a moment, when you stub your toe, ouch! When you are hungry, you feel hunger pangs. In these examples, your body is present. These sensations are commonly noticed but what about the more subtle ones? Dry, brittle hair, hair loss, tension headaches, night teeth grinding. Why is this happening to your body? I promise you, there is an underlying issue. This is likely the sympathetic system or “fight or flight” in us that is activated when we are under pressure or undue stress.\n\nPressure is different for everyone. What causes me stress may be quite different for another. Certainly we adapt and through experience we learn different coping mechanisms, yoga and meditation is one that works for me. Sometimes it is more than that. Sometimes there is a systemic issue that needs addressing. It is my responsibility to take care of me but if the workplace culture is such that absenteeism and health issues are on the rise, this needs looking at. This is more than employees taking mental health days. How do your employees behave at work? Have you noticed? \n\nLet’s bring the body is present 100% of the time to the workplace. Let’s suggest the body in this case, is the working environment and that sensation is good as it relates to your workplace culture. Sensation would look like healthy conversations, diverse opinions, safe place to open and share. A collaborative environment where no idea is a bad idea. Sounds like a great place to work. On the opposite end of the scale, we have pain in the body or workplace; betrayal, lack of trust, fear-based tactics, top down approach, oppressive workplace. These behaviours or pain points will manifest itself in different ways, presenteeism (at work but not productive), inability to counter opinions, feeling unheard, unacknowledged and unappreciated. The latter will be disruptive to your workplace. You will see an increase in medical costs. You will see an increase in absenteeism. You will see a loss in talent. If any of these symptoms are on the rise, it is time to pay attention. The body is present 100% of the time.\n\nMichelle Precourt is a Career Coach, Recruitment Expert and Registered Yoga Teacher based in Ottawa, Canada. In addition to providing first-rate career coaching, she draws from her yoga expertise, instructing clients in calming techniques for better interview performance and workplace success. When Michelle is not working, you will find her practicing yoga at a local studio or hiking in nature with her husband. Learn more about Michelle and her work at", "pred_label": "__label__1", "pred_score_pos": 0.928728461265564} {"content": "Connect with us\n\n\nLesson 13 From Surah Al -Kahf\n\nLast verses of Surah Kahf\n\nShaykh Furhan Zubairi\n\n\n\nAlhamdulillah last session we were able to cover the meanings of verses 83-98. InshAllah tonight we’ll explore the meanings of verses 99-110, which will bring us to the end of this noble and beautiful Surah. Just as a quick reminder, the last set of verses related the story of Dhul Qarnain, who was an upright and God-conscious ruler who ruled over the entire known world of his time. He was a righteous servant of Allah to whom Allah granted might, power and sovereignty over the world along with knowledge and wisdom. He was a special servant of God. We’re told about his journeys to the east, west, and north as well as his building of a huge wall to prevent Ya’jūj and Ma’jūj from escaping. This story highlighted the fitna and trial of might, power, leadership, and authority and showed us that the way to deal with it is through faith and sincerity. Dhul Qarnain was tested with a lot of wealth and power but it was unable to corrupt him because of his faith and sincerity. The Surah follows the story of Dhul Qarnain with a scene from the Day of Judgment.\n\nVerse 99: And We shall leave them, on that day, to surge over one another like waves. And the trumpet shall be blown, and We shall gather them together.\n\nThe first part of this verse is referring to Ya’jūj and Ma’jūj and the second part refers to resurrection, when the Angel Isrāfīl will blow into the horn bringing all creation back to life. On that day, is referring to the day near the end of times when Ya’jūj and Ma’jūj will break through the barrier and surge down the mountains like waves upon humanity destroying everything in their way. As Allah ﷻ tells us in Surah Al-Anbiya, “Until when [the dam of] Gog and Magog has been opened and they, from every elevation, descend…” They will wreak havoc for a period of time known to Allah until they will be destroyed.\n\nAs we’ve covered before there will be two instances when the trumpet will be sounded. Allah subḥānahu wa ta'āla (glorified and exalted be He) has appointed the Angel Isrāfīl to blow into the trumpet. This will happen twice. The first time every single thing will be destroyed. The second time every single thing will be brought back to life. This is how the day of Resurrection will start. The sūr, which is a trumpet or a horn, will be blown and all of mankind will rise from their graves and come towards the plain of judgment. That’s what Allah ﷻ is mentioning here in this verse, “And the trumpet shall be blown, and We shall gather them together.”\n\nThe Surah then describes a scene from the day of Judgment that’s specific to the non-believers. Those who received the message and consciously chose to reject it and rebel against God and His messengers.\n\nVerse 100-101: And We shall present Hell, on that Day, as an array before the non-believers, those whose eyes were veiled from the remembrance of Me, and could not hear.\n\nMeaning on the Day of Judgment Allah ﷻ will show the non-believers Hell Fire, exposing it to them so that they can see it with their own eyes. They will see it with their own eyes and hear its raging and frightening sounds even before entering it. Allah then describes the non-believers with 3 characteristics, which are essentially three reasons why they will be punished in the hereafter:\n\n1) “Those whose eyes were veiled from the remembrance of Me, and could not hear.” They weren’t able to understand the truth when it was presented to them because they were spiritually blind and deaf. They were blind to the signs of Allah’s existence and power all around them spread throughout the universe, so they never thought or reflected over them. On top of that, they weren’t able to understand what was being recited to them. Meaning, they consciously chose to ignore the message and turn away from it. Here Allah is contrasting their condition in the hereafter to their condition in the life of this world. In this world, they chose to turn away from belief in the fire and in the hereafter, they won’t have the option to turn away. The veil over their eyes will be removed and they will see the consequences of their choice.\n\n2) The second is that they worshipped others besides Allah.\n\nVerse 102: Do those who disbelieve reckon that they may take My servants as protectors apart from Me? Truly We have prepared Hell as a welcome for the disbelievers!\n\nAllah is scolding them and showing them their mistake. Did they really think or believe that they could take created beings or inanimate objects as protectors apart from Me? Did they really believe that worshipping idols, angels or people would benefit them or help them in any way? There’s no help or protection except with Allah, who deserves to be worshipped alone without any partners. As Allah ﷻ says in Surah Maryam, “No! Those “gods” will deny their worship of them and will be against them opponents [on the Day of Judgment].” Allah then tells us that their punishment is Jahannam, which has been prepared as a resting place for them. “Truly We have prepared Hell as a welcome for the disbelievers!”\n\n3) The third quality that the non-believers are described with is that they are fools for thinking that their actions in this world will be of any benefit to them in the Hereafter.\n\nVerse 103-104: Say, “Shall We inform you who are the greatest losers in respect to their deeds? Those whose efforts go astray in the life of this world, while they think that they are virtuous in their works.\n\nIn this verse, Allah ﷻ is addressing the Prophet ﷺ directly and he’s telling him to pose this question to the non-believers. “Shall We inform you who are the greatest losers in respect to their deeds?” Do you want to know who the greatest and biggest losers are with respect to their deeds? They are the ones who did good deeds and put in effort, but all of it went to waste. Those individuals who were misguided in the life of this world so their actions were guided by their wants, desires, and pleasures. Their actions were misplaced and not guided by faith in Allah. The reason why all of their efforts will go to waste is their disbelief or absence of faith. As Allah says,\n\nVerse 105-106: They are those who disbelieve in the signs of their Lord, and in the meeting with Him. So their deeds have gone to waste, and on the Day of Resurrection, We shall assign them no weight. That is their recompense, the Jahannam, for having disbelieved and for having taken My signs and My messengers in mockery.\n\nThe greatest losers with respect to their deeds are those who reject the signs of Allah in this world. Those who refuse to accept the oneness, might, power and magnificence of Allah, those who refuse to believe in life after death and accountability. Their deeds will go to waste and on the Day of Judgment, they won’t have any weight. We know from multiple verses and narrations that our deeds are going to be weighed on the Day of Judgment. And on the Day of Judgment, it’s not about the number of deeds but the quality. That’s why on the Day of Judgment our deeds won’t be counted but they will be weighed. It could be that the weight of one action or deed is more than a thousand other deeds.\n\nThose actions that are devoid of faith and sincerity will have no weight whatsoever. As Allah ﷻ says in Surah Al-Furqān, “And We will regard what they have done of deeds and make them as dust dispersed.” Their recompense is the fire of Jahannam, and that is the ultimate justice and fairness. They get punishment as recompense because of their rejection and disbelief and mockery of Allah’s signs and His messengers. Allah ﷻ then contrasts the punishment of the non-believers with the reward of the believers in Paradise.\n\nVerse 107-108: Those who believe and perform righteous deeds, theirs shall be the Gardens of Paradise as a welcome. Abiding therein forever, they don’t seek any change from it.\n\nJust as Hell is a “welcome” for the non-believers, Paradise is a true “welcome” for the believers. Meaning, those who believe in the existence and oneness of Allah, believe in the Prophet ﷺ and life after death and that faith expresses itself through their actions, their reward will be Gardens of Paradise. Again we see this formula being mentioned, faith + righteous deeds. This is the simple formula to achieve success in this world and the next. Our faith has to be real and practical; it has to translate into action. If we do so then our reward will be Jannah al-Firdaws, which is the highest and most virtuous level of Paradise. The Prophet ﷺ said, “When you ask Allah for Paradise ask Him for Al-Firdaws. It is the highest level of Paradise, the middle of Paradise and the rivers of Paradise flow from it.”\n\n • إذا سألتم الله الجنة، فاسألوه الفردوس، فإنه أعلى الجنة، و أوسط الجنة، و منها تفجر أنهار الدنة.\n\nIn another narration, the Prophet ﷺ said, “In Paradise, there are a hundred levels, what is between every two levels is like what is between the heavens and the earth. Al-Firdaws is its highest level, and from it the four rivers of Paradise are made to flow forth. So when you ask Allah, ask Him for Al-Firdaws.”\n\n • “‏ فِي الْجَنَّةِ مِائَةُ دَرَجَةٍ مَا بَيْنَ كُلِّ دَرَجَتَيْنِ كَمَا بَيْنَ السَّمَاءِ وَالأَرْضِ وَالْفِرْدَوْسُ أَعْلاَهَا دَرَجَةً وَمِنْهَا تُفَجَّرُ أَنْهَارُ الْجَنَّةِ الأَرْبَعَةُ وَمِنْ فَوْقِهَا يَكُونُ الْعَرْشُ فَإِذَا سَأَلْتُمُ اللَّهَ فَسَلُوهُ الْفِرْدَوْسَ ‏”‏ ‏.\n\nThey will be in Paradise for all of eternity, enjoying all of its pleasures and not wanting or desiring anything other than it. Allah (swt) then tells us about the extent and vastness of His knowledge. That his knowledge is infinite. This is also a description of the greatness and status of the Qur’ān.\n\nVerse 109: Say, “If the ocean were ink for the words of my Lord, the ocean would be exhausted before the words of my Lord were exhausted, even if We brought the like thereof to replenish it.”\n\n“The words of my Lord” may be a reference to Allah’s infinite knowledge or wisdom or the meanings of the Qur’ān. Meaning that if the oceans were turned into ink and the words of Allah subḥānahu wa ta'āla (glorified and exalted be He) were to be written with this ink, then the ink would run out and the words of Allah (swt) would still be left, even if more ink were to be brought. This is an example to make us understand the vastness of Allah’s knowledge, wisdom, and secrets. This example is being given to make us as human beings recognize the infinite nature of Allah’s knowledge as compared to or finite and limited knowledge.\n\nThe ocean is the largest and richest creation known to us as human beings. It takes up more than 70% of the surface of the Earth. And we use ink to document and record our knowledge, which we think is vast and amazing. So Allah gives this example of the ocean as ink being used to write and record His words. The entire ocean is used up and then it’s replenished but the words of Allah are still being written. This example is trying to help us comprehend the difference between the infinite and the finite. “And if all the trees on earth were pens, and if the sea and seven more added to it were ink, the words of Allah would not be exhausted. Truly Allah is Mighty, Wise.” This example should allow us to recognize the greatness and magnificence of Allah ﷻ as well as humble us as human beings as well.\n\nWe as human beings should never be deceived or fooled by our own intellect and abilities. No matter how much we learn and how advanced we become scientifically and technologically, it’s nothing compared to the infinite knowledge and wisdom of Allah ﷻ. Our knowledge compared to the knowledge of Allah is like a drop of water compared to all the oceans. Allah ﷻ then ends the noble Surah by reminding the Prophet (saw) about humility and us about the path of true salvation.\n\nVerse 110: Say, “I am only a human being like you. It has been revealed to me that your God is one God. So whosoever hopes for the meeting with his Lord, let him perform righteous deeds and make no one a partner with his Lord in worship.\n\nAllah ﷻ is speaking directly to the Prophet ﷺ. He’s telling him to tell his nation, his community, that he is a human being just like them. He’s not an Angel nor is he divine in any way. He eats, drinks, walks, talks and sleeps just like them. The only difference is that he ﷺ receives revelation from above from the Most High. It has been revealed to him that there is only one God, alone without any partners. So whoever believes in the meeting with their Lord, meaning they believe in the last day, resurrection, accountability and judgment. They know that the life of this world is temporary and finite and that the life of the hereafter is eternal and infinite, should “perform righteous deeds and make no one a partner with his Lord in worship.”\n\nRighteous deeds include fulfilling all of our obligations, obeying the commands of Allah and staying away from His prohibitions. It includes all voluntary acts of worship such as praying, fasting, reading Quran, making dua, dhikr and charity. It includes being kind to our parents, spouses, children, relatives, neighbors, and co-workers. It even includes smiling at someone. There are multiple paths of righteousness in Islam.\n\nWe’re then reminded to not associate partners with Allah in our worship; to not commit shirk. There are two types of shirk: al-shirk al-akbar and al-shirk al-asghar. Al-Shirk Al-Akbar is associating partners with Allah; it’s an act of disbelief. Al-Shirk Al-Asghar refers to ostentation and showing off or not having sincerity in acts of worship. The Prophet ﷺ referred to ostentation as “the lesser idolatry.” The Prophet ﷺ said, “I do not fear that you will worship the sun, the stars and the moon, but I fear your worshipping other than Allah through ostentation.” The Prophet ﷺ said, “What I fear most for my community is doing things for other than the sake of Allah.” Ibn al-‘Arabi quotes his shaykh, “Let not the hours of your dear life pass away confronting contemporaries and socializing with friends. Watch out! Allah concluded His statement on the following verse…”\n\nAlhamdulillah that brings us to then end of this noble and beautiful Surah. A Surah that has a special and unique status because the Prophet ﷺ encouraged us to recite it specifically on Fridays. Through four stories the Surah focuses on four different types of trials we’re going to face in this world and how to respond to them.\n\n1) The story of the people of the cave represents the trial of faith. And we’re taught that one of the best ways to deal with it is through good company; surrounding ourselves with people of faith and righteousness.\n\n2) The story of the owner of the two gardens is representative of the trial of wealth. And we’re taught the most powerful way to deal with it is by recognizing the reality of the life of this world.\n\n3) The story of Musa (as) with Khidr is representative of the trial of knowledge and the way to deal with it is through seeking knowledge and humility.\n\n4) The last story, the story of Dhul Qarnain is representative of the trial of power. The solution is sincerity and righte\n\nShaykh Furhan Zubairi serves as the Director of Religious Education at the Institute of Knowledge in Diamond Bar, CA. He regularly delivers khutbahs and lectures at various Islamic Centers and events in southern California.\n\n\n\n 1. Avatar\n\n Online Quran Classes\n\n June 6, 2019 at 8:30 PM\n\n Masha Allah. very nice and readable article on Sura Kahaf. Every Muslim should at least read this once in a week on Friday. May Allah accept our recitation.\n\n 2. Avatar\n\n\n June 9, 2019 at 10:53 AM\n\n Masha’allah this is an amazing read!\n\nLeave a Reply\n\n\n\nSo You Are The Wali, Now What?\n\nDr Shadee Elmasry\n\n\n\nThe way most Muslims (as well as conservative Christians and Jews) live, a man asks for a woman’s hand in marriage from the father.\n\nThe father is not just a turnstile who has to say yes. He is a “wali” or protector and guardian of his daughter’s rights. So he will be asking some serious questions that would be awkward if the woman had to ask them.\n\nFurthermore, in the Muslim community today esp. in the West, there are many converts that seek out a wali because they have no male relative who is Muslim. In this post, I share some guidelines aimed at the wali in his new role and stories that are useful.\n\nBeing a wali is not an honorary role. You’re not just throwing out the first pitch. You’re actually trying to throw curveballs to see whether the proposal checks out or has issues.\n\nHere are some questions and demands a wali should make:\n\nBackground check: Call and meet at least four people that were close to the man who has proposed and interview them. There’s no husn al-zann (good opinion) in marriage. As a potential suitor, you are rejected until you prove yourself, much like an application for employment. These days, most people’s background can be found on their social media, so the wali has to spend time scrolling down. Keep scrolling, read the comments, look at the pictures, click on who’s tagged in those pictures. Get a good idea. You are a private investigator *before* the problem happens, not after. \n\nCheck financials:  You need to see the financials to make sure they are not in some ridiculous debt or have bad credit such that they can’t even rent an apartment or cover basic needs. You want some evidence that he can fulfill the obligation of maintenance.\n\nCheck the educational background or skill set: This is a given. If it’s solid, then it can outweigh lack of funds at this moment.\n\nCheck medical records: If this is a stranger, the wali needs medical records. There was once a wealthy, handsome young man that was suave and a seemingly amazing prospect who proposed for a girl who was comparatively of average looks and from a family of very modest means. The mother and daughter were head over heels, but the dad had enough common sense to know something was up.\n\n“Why would he come knocking on our door?,” he asked.\n\nSo the father demanded medical records. The guy never produced them. When the dad pressed him, the man admitted, he had a sexually transmitted disease (STD) and that’s why he couldn’t find anyone else to marry him.\n\nNow note, there are legitimate cases where people have a past when they have made mistakes. This happens to the best of us, and the door for tawbah (repentance) is open. In those cases, there are organizations that match-make for Muslims with STDs. People should act in a responsible manner and not damage the lives of other humans beings.\n\nLifestyle: It is your job to check if the two parties have agreed on life essentials such as religious beliefs, where to live, how to school kids, etc?\n\nIn-laws: Have you at least met the family of the suitor and spent some time with them to make sure there’s nothing alarming?\n\nEngagement: Contrary to popular understanding, there is such a thing as engagement in Islam. It’s an announcement of a future commitment to marriage. Nothing changes between the fiancees, but nobody is allowed to propose anymore. The purpose of engagement is to give time for both parties to get ready. For example, the groom may want to save up some money, or the girl may be finishing up college. Also, it’s easy to put on a face during the get-to-know process, but it’s hard to fake it over an eight or nine-month period. I remember a story where a young woman was engaged, and four months into the engagement they discovered the young man was still getting to know other women. He basically reserved the girl and then went to check for better options. Needless to say, he was dumped on the spot. Engagements are commonly a few months. I think more than a year is too much.\n\nLegal/Civil:  The marriage should be legal/civil in the country where you will settle. If you accept a Shariah marriage but not a civil one, know that you’re asking for legal complications, especially if a child enters the picture. (Ed. Note- we realize that some countries do not allow legal registration of more than one marriage- if that is a consideration please look at all options to protect your ward. There are ways to get insurance that can be set up.)\n\nMahr: Get 50% of the dowry upfront (or some decent amount) and whatever is scheduled to be paid later should be written and signed. I’ve seen too many cases where a really nice dowry is “promised” but never produced.\n\nThe dowry should be commensurate to current standards depending on the man’s job. For example in our area in America 5, 7, or 10k is a common range.\n\nIn sum, there are very few things in life that are as bad as misery in marriage. The wali’s job is to eliminate the bad things that could have been avoided. If that means he has to be demanding and hated for a few months, it’s worth the cost.\n\nIt’s preventative medicine.\n\nContinue Reading\n\n\nShaykh Hamza Yusuf And The Question of Rebellion In The Islamic Tradition\n\nDr Usaama al-Azami\n\n\n\nSepoy rebellion, Shaykh Hamza\n\nIn recent years, Shaykh Hamza Yusuf, a notable Islamic scholar from North America, has gained global prominence by supporting efforts by the United Arab Emirates (UAE) to deal with the fallout of the Arab revolutions. The UAE is a Middle Eastern autocracy that has been the chief strategist behind quelling the Arab revolutionary aspiration for accountable government in the region. Shaykh Hamza views himself as helping prevent the region from falling into chaos by supporting one of its influential autocratic states. However, more recently, he has become embroiled in another controversy because of comments he made regarding the Syrian revolution in 2016 that surfaced online earlier this week and for which he has since apologised. I will not discuss these comments directly in this article, but the present piece does have a bearing on the issue of revolution as it addresses the question of how Islamic scholars have traditionally responded to tyranny. Thus, in what follows, I somewhat narrowly focus on another recent recording of Shaykh Hamza that has been published by a third party in the past couple of weeks entitled: “Hamza Yusuf’s response to the criticism for working with Trump administration”. While it was published online at the end of August 2019, the short clip may, in fact, predate the Trump controversy, as it only addresses the more general charge that Shaykh Hamza is supportive of tyrannical governments.\n\nThus, despite its title, the primary focus of the recording is what the Islamic tradition purportedly says about the duty of Muslims to render virtually unconditional obedience to even the most tyrannical of rulers. In what follows, I argue that Shaykh Hamza’s contention that the Islamic tradition has uniformly called for rendering obedience to tyrannical rule—a contention that he has been repeating for many years—is inaccurate. Indeed, it is so demonstrably inaccurate that one wonders how a scholar as learned as Shaykh Hamza can portray it as the mainstream interpretation of the Islamic tradition rather than as representing a particularly selective reading of fourteen hundred years of scholarship. Rather than rest on this claim, I will attempt to demonstrate this in what follows. (Note: this article was sent to Shaykh Hamza for comment at the beginning of this month, but he has not replied in time for publication.)\n\nOpposing all government vs opposing a government\n\nShaykh Hamza argues that “the Islamic tradition” demands that one render virtually absolute obedience to one’s rulers. He bases this assertion on a number of grounds, each of which I will address in turn. Firstly, he argues that Islam requires government, because the opposite of having a government would be a state of chaos. This is, however, to mischaracterise the arguments of the majority of mainstream scholars in Islamic history down to the present who, following explicit Qur’anic and Prophetic teachings, opposed supporting tyrannical rulers. None of these scholars ever advocated the removal of government altogether. They only opposed tyranny. For some reason that is difficult to account for, Shaykh Hamza does not, in addressing the arguments of his interlocutors, make the straightforward distinction between opposing tyranny, and opposing the existence of any government at all.\n\nA complex tradition\n\nRather than support these tyrannical governments, the Islamic tradition provides a variety of responses to how one should oppose such governments, ranging from the more quietist—opposing them only in one’s heart—to the more activist—opposing them through armed rebellion. The majority of later scholars, including masters such as al-Ghazzali (d. 505/1111), Ibn Rajab al-Hanbali (d. 795/1393), and Ibn Hajar al-‘Asqalani (d. 852/1449) appear to have fallen somewhere between these two poles, advocating rebellion only in limited circumstances, and mostly advising a vocally critical posture towards tyranny. Of course, some early scholars, such as the sanctified member of the Prophetic Household, Sayyiduna Husayn (d. 61/680) had engaged in armed opposition to the tyranny of the Umayyads resulting in his martyrdom. Similarly, the Companion ‘Abdullah b. Zubayr (d. 73/692), grandson of Abu Bakr (d. 13/634), and son of al-Zubayr b. al-‘Awwam (d. 36/656), two of the Ten Companions Promised Paradise, had established a Caliphate based in Makkah that militarily tried to unseat the Umayyad Caliphal counter-claimant.\n\nHowever, the model of outright military rebellion adopted by these illustrious scholars was generally relinquished in later centuries in favour of other forms of resisting tyranny. This notwithstanding, I will try to show that the principle of vocally resisting tyranny has always remained at the heart of the Islamic tradition contrary to the contentions of Shaykh Hamza. Indeed, I argue that the suggestion that Shaykh Hamza’s work with the UAE, an especially oppressive regime in the Arab world, is somehow backed by the Islamic tradition can only be read as a mischaracterisation of this tradition. He only explicitly cites two scholars from Islamic history to support his contention, namely Shaykhs Ahmad Zarruq (d. 899/1493) and Abu Bakr al-Turtushi (d. 520/1126), both of whom were notable Maliki scholars from the Islamic West. Two scholars of the same legal school, from roughly the same relatively peripheral geographic region, living roughly four hundred years apart, cannot fairly be used to represent the swathe of Islamic views to be found over fourteen hundred years in lands as far-flung as India to the east, Russia to the north, and southern Africa to the south.\n\nWhat does the tradition actually say?\n\nLet me briefly illustrate the diversity of opinion on this issue within the Islamic tradition by citing several more prominent and more influential figures from the same tradition alongside their very different stances on the issue of how one ought to respond to tyrannical rulers. Most of the Four Imams are in fact reported to have supported rebellion (khuruj) which is, by definition, armed. A good summary of their positions is found in the excellent study in Arabic by Shaykh ‘Abdullah al-Dumayji, who is himself opposed to rebellion, but who notes that outright rebellion against tyrannical rule was in fact encouraged by Abu Hanifa (d. 150/767) and Malik (d. 179/795), and is narrated as one of the legal positions adopted by al-Shafi‘i (d. 204/820) and Ahmad b. Hanbal (d. 241/855). As these scholars’ legal ideas developed and matured into schools of thought, many later adherents also maintained similar positions to those attributed to the founders of these schools. To avoid suggesting that armed rebellion against tyrants was the dominant position of the later Islamic tradition, let me preface this section with a note from Holberg Prize-winning Islamic historian, Michael Cook, who notes in his magisterial study of the doctrine of commanding right and forbidding wrong that “in the face of the delinquency of the ruler, there is a clear mainstream position [in the Islamic tradition]: rebuke is endorsed while [armed] rebellion is rejected.”\n\nBut there were also clearly plenty of outliers, or more qualified endorsements of rebellion against tyrants, as well as the frequent disavowal of the obligation to render them any obedience. Thus for the Malikis, one can find Qadi Abu Bakr b. al-‘Arabi (d. 543/1148) who asserts that advocating rebellion against tyrants is the main position of the madhhab; similarly among later Hanafis, one finds Qadi Abu Bakr al-Jassas (d. 370/981); for the Hanbalis, one may cite the positions of the prolific scholars Imam Ibn ‘Aqil (d. 513/1119), Ibn al-Jawzi (d. 597/1201), and in a more qualified sense, Ibn Rajab al-Hanbali. Among later Shafi‘is, I have found less explicit discussions of rebellion in my limited search, but a prominent Shafi‘i like the influential exegete and theologian al-Fakhr al-Razi (d. 606/1210) makes explicit, contrary to Shaykh Hamza’s claims, that not only is obeying rulers not an obligation, in fact “most of the time it is prohibited, since they command to nothing but tyranny.” This is similar in ways to the stance of other great Shafi‘is such as al-hafiz Ibn Hajar al-‘Asqalani who notes concerning tyrannical rulers (umara’ al-jawr) that the ulama state that “if it is possible to depose them without fitna and oppression, it is an obligation to do so. Otherwise, it is obligatory to be patient.” It is worth noting that the normative influence of such a statement cited by Ibn Hajar transcends the Shafi‘i school given that it is made in his influential commentary on Sahih al-Bukhari. Once again, contrary to the assertions of Shaykh Hamza, there is nothing to suggest that any of the illustrious scholars who supported rebellion against tyrannical rulers was advocating the anarchist removal of all government. Rather they were explicitly advocating the replacement of a tyrant with a just ruler where this was possible.\n\nAl-Ghazzali on confronting tyrants\n\nA final example may be taken from the writing of Imam al-Ghazzali, an exceptionally influential scholar in the Islamic tradition who Shaykh Hamza particularly admires. On al-Ghazzali, who is generally opposed to rebellion but not other forms of opposition to tyranny, I would like to once again cite the historian Michael Cook. In his previously cited work, after an extensive discussion of al-Ghazzali’s articulation of the doctrine of commanding right and forbidding wrong, Cook concludes (p. 456):\n\nAs we have seen, his views on this subject are marked by a certain flirtation with radicalism. In this Ghazzālī may have owed something to his teacher Juwaynī, and he may also have been reacting to the Ḥanafī chauvinism of the Seljūq rulers of his day. The duty, of course, extends to everyone, not just rulers and scholars. More remarkably, he is prepared to allow individual subjects to have recourse to weapons where necessary, and even to sanction the formation of armed bands to implement the duty without the permission of the ruler. And while there is no question of countenancing rebellion, Ghazzālī is no accommodationist: he displays great enthusiasm for men who take their lives in their hands and rebuke unjust rulers in harsh and uncompromising language.\n\nMost of the material Cook bases his discussion upon is taken from al-Ghazzali’s magnum opus, The Revival of the Religious Sciences. Such works once again demonstrate that the Islamic tradition, or great Sufi masters and their masterworks, cannot be the basis for the supportive attitude towards tyrannical rule on the part of a minority of modern scholars.\n\nModern discontinuities and their high stakes\n\nBut modern times give rise to certain changes that also merit our attention. In modern times, new technologies of governance, such as democracy, have gone some way to dealing with challenges such as the management of the transition of power without social breakdown and the loss of life, as well as other forms of accountability that are not possible in absolute autocracies. For their part, absolute autocracies have had their tyrannical dimensions amplified with Orwellian technologies that invade private spaces and facilitate barbaric forms of torture and inhumane degradation on a scale that was likely unimaginable to premodern scholars. The stakes of a scholar’s decision of whether to support autocracy or democracy could not be higher.\n\nModern scholars like Shaykh Yusuf al-Qaradawi (b. 1345/1926), someone who Shaykh Hamza’s own mentor, Shaykh Abdullah b. Bayyah (b. 1353f./1935) considered a teacher until fairly recently, has advocated for an Islamic conception of democracy as a possible means to deal with the problem of tyranny that plagues much of the Muslim world. He is hardly the only scholar to do so. And in contrast with some of the scholars of the past who advocated armed rebellion in response to tyranny, most contemporary scholars supporting the Arab revolutions have argued for peaceful political change wherever possible. They have advocated for peaceful protest in opposition to tyranny. Where this devolved into violence in places like Libya, Syria, and Yemen, this was generally because of the disproportionately violent responses of regimes to peaceful protests.\n\nShaykh Hamza on the nature of government\n\nFor Shaykh Hamza, the fault here appears to lie with the peaceful protestors for provoking these governments to crush them. Such a conception of the dynamics of protest appears to assume that the autocratic governmental response to this is a natural law akin to cause and effect. The logic would seem to be: if one peacefully calls for reform and one is murdered in cold blood by a tyrannical government, then one has only oneself to blame. Governments, according to this viewpoint, have no choice but to be murderous and tyrannical. But in an age in which nearly half of the world’s governments are democracies, however flawed at times, why not aspire to greater accountability and less violent forms of governance than outright military dictatorship?\n\nRather than ask this question, Shaykh Hamza Yusuf appears to be willing to defend autocracy no matter what they do on the grounds that government, in principle, is what is at stake. Indeed, in defending government as necessary and a blessing, he rhetorically challenges his critics to “ask the people of Libya whether government is a blessing; ask the people of Yemen whether government is a blessing; ask the people of Syria whether government is a blessing?” The tragic irony of such statements is that these countries have, in part, been destroyed because of the interventions of a government, one for which Shaykh Hamza serves as an official, namely the UAE. This government has one of the most aggressive foreign policies in the region and has been instrumental in the failure of representative governments and the survival of tyrannical regimes throughout the Middle East.\n\nWhere do we go from here?\n\nIn summary, Shaykh Hamza’s critics are not concerned that he is “supporting governments,” rather they are concerned that for the last few years, he has found himself supporting bad government and effectively opposing the potential for good government in a region that is desperately in need of it. And while he may view himself as, in fact, supporting stability in the region by supporting the UAE, such a view is difficult if not impossible to reconcile with the evidence. Given his working relationship with the UAE government, perhaps Shaykh Hamza could use his position to remind the UAE of the blessing of government in an effort to stop them from destroying the governments in the region through proxy wars that result in death on an epic scale. If he is unable to do this, then the most honourable thing to do under such circumstances would be to withdraw from such political affiliations and use all of his influence and abilities to call for genuine accountability in the region in the same way that he is currently using his influence and abilities to provide cover, even if unwittingly, for the UAE’s oppression.\n\nAnd Allah knows best.\n\nContinue Reading\n\n\nCan Women Attend The Burial Of The Deceased?\n\nA short survey on what leading scholars and the four schools of law (madhhabs) have to say on the issue\n\nDr Usaama al-Azami\n\n\n\nQuran at graveyard, woman attend burial\n\nA few weeks ago, my brother passed away, may Allah have mercy on his soul. By Allah’s grace, his funeral was well-attended by many friends, relatives, and students of his, including a number of women. In this context, someone asked me about the Sharia’s guidance regarding women attending the burial of the deceased, and in what follows I consider what leading scholars and the four schools of law (madhhabs) have to say on the issue. The short survey below is by no means exhaustive, something that will need to be left for a much longer piece, but I hope it can be considered representative for the purposes of a general readership. \n\nThis is not a fatwa, but rather a brief outline of what past scholars have argued to be the case with some suggestions as to how this might be understood in modern times. Finally, I should note that this is a discussion about accompanying the deceased to their final resting place (ittiba‘/tashyi‘ al-jinaza) after the conducting of funeral prayers (salat al-janaza). Accompanying the deceased on the part of women is considered more contentious than simply attending the funeral prayer, so in general, jurists who permit such accompaniment would allow for attending the prayer, while jurists who do not permit accompaniment of the deceased may be more reluctant to permit prayer. Whatever the specific cases may be, I do not go into this discussion below.\n\nKey positions and evidence\n\nIn brief, I have been able to discern three general positions regarding women accompanying the deceased until they are buried: 1. A clear majority of scholars indicate that women are permitted to attend the burial of the deceased, but it is generally discouraged (makruh). 2. Some scholars permitted elderly women’s attendance of the burial unconditionally. 3. Others prohibited all women’s attendance unconditionally.\n\nOverall, it is clear that most schools have permitted women’s attendance of burial, with most of these scholars discouraging it for reasons we shall consider below. The notion that women should not attend the burial of the deceased will thus clearly be shown to be a minority position in the tradition, past and present. Being a minority position does not mean it cannot be practiced, as we will consider in due course. The evidence from the Sunnah is the main legal basis for the ruling, and I shall now consider the most authentic hadiths on the matter.\n\nThe general rule for legal commands is that they apply to both genders equally. Accordingly, in a hadith narrated by Bukhari and Muslim, the Prophet ṣallallāhu 'alayhi wa sallam (peace and blessings of Allāh be upon him) strongly encouraged attending the burial of the deceased. That the ruling for women would be one of discouragement (karaha) rather than of encouragement (istihbab) would thus necessarily arise from countervailing evidence. This may be found in another hadith narrated by both of the earlier authorities. This short hadith is worth quoting in full: \n\n(‏متفق عليه‏) قالت أم عطية: نهينا عن اتباع الجنائز، ولم يعزم علينا\n\nIn translation, this reads: Umm ‘Atiyya said, “We were prohibited from following the funeral procession, but it was not insisted upon.”\n\nInterpreting the evidence\n\nThe Sharia’s ruling on this matter hinges on how this hadith is understood. On this point, scholars of various schools have adopted a range of positions as outlined earlier. But on the specifics of how the wording of the hadith should be understood, it is worth considering the reading of one of the towering figures of hadith studies, Ibn Hajar al-‘Asqalani (d. 852/1449). In his authoritative commentary on Sahih al-Bukhari entitled Fath al-Bari, he glosses the phrase in the aforementioned hadith “but it was not insisted upon” as meaning, “the prohibition was not insisted upon.” He adds: “It is as though she is saying: ‘it was discouraged for us to follow the funeral procession, without it being prohibited.’”\n\nThe hadith has, however, been interpreted in various ways by the schools of law. A useful summary of these interpretations may be found in encyclopedic works of fiqh written in recent decades. In his al-Fiqh al-Islami wa-Adillatuhu, the prolific Syrian scholar Wahba al-Zuhayli (d. 1436/2015) notes (on p. 518) that the majority of jurists consider women’s joining the funeral procession to be mildly discouraged (makruh tanzihi) on the basis of the aforementioned hadith of Umm ‘Atiyya. However, he adds, the Hanafis have historically considered it prohibitively discouraged (makruh tahrimi) on the basis of another hadith in which the Prophet reportedly told a group of women who were awaiting a funeral procession, “Return with sins and without reward.”\n\nAl-Zuhayli inclines towards this ruling despite noting in a footnote that the hadith he has just mentioned is weak (da‘if) in its attribution to the Prophet. However, he also adds that the Malikis permitted elderly women to attend the burial of the deceased unconditionally, and also young women from whom no fitna was feared. What constitutes fitna is not generally specified in these discussions and perhaps needs further study, but one contemporary Hanafi defines it as “intermingling with the opposite sex,” and thus suggests that where there is no such intermingling between members of the opposite sex, it is permissible for young women to attend funerals and burials.\n\nAnother valuable encyclopedic source for learning about the juristic rulings of various schools and individual scholars is the important 45-volume al-Mawsu‘a al-Fiqhiyya compiled by a team of scholars and published by the Kuwaiti Ministry of Endowments a quarter of a century ago. In its section on this issue, it notes that the Hanafis prohibitively discourage women’s attendance of the funeral procession, the Shafi‘is mildly discourage it, the Malikis permit it where there is no fear of fitna, and the Hanbalis mildly discourage it. The reasoning behind these positions may be found in the Arabic original, and ought to be made available in English by Muslims in the West investing in translating such voluminous works into English. \n\nFrom the above, we may gather that of the four schools, only the pre-modern Hanafis prohibit women’s attendance of funeral processions. I have already indicated one example of a modern Hanafi who moves closer to the position of the less restrictive schools in this issue, but it is worth highlighting another. Shaykh Nur al-Din ‘Itr (b. 1355/1937), one of the greatest Hanafi hadith experts alive today, in his commentary on the hadith of Umm ‘Atiyya writes that the report indicates that women’s attending a funeral procession is only mildly discouraged (makruh tanzihi). Additionally, in a footnote, he criticises a contemporary who interprets the hadith as indicating prohibition and then proceeds to cite the less restrictive Maliki position with apparent approval.\n\nThe fiqh of modernity\n\nIn none of the above am I necessarily arguing that one of these positions is stronger than the other. I present these so that people may be familiar with the range of opinions on the matter in the Islamic tradition. However, this range also indicates the existence of legitimate difference of opinion that should prevent holders of one position from criticising those who follow one of the legitimate alternatives with the unfounded charge that they are not following the Qur’an and Sunna.\n\nFurthermore, there are often interesting assumptions embedded in the premodern juristic tradition which modern Muslims find themselves out of step with, such as the assumption that women should generally stay at home. This is clearly an expectation in some of the fiqh literature, and in modern times, we sometimes find that this results in incoherent legal positions being advocated in Muslim communities. We find, for example, that in much of the premodern fiqh literature, Hanafis prohibit women from attending the mosque for fear of fitna, while we live in times in which women frequently work outside the home. As one of my teachers in fiqh, the Oxford-based Hanafi jurist Shaykh Mohammad Akram Nadwi, once remarked in class, is it not absurd for a scholar to prohibit women from attending the mosque for fear of fitna while none of these scholars would prohibit a woman from going to a mall/shopping centre?\n\nThis underlines the need for balanced fiqh that is suited to our times, one that allows both men and women to participate in spiritually elevated activities, such as going to the mosque and attending funerals while observing the appropriate Islamic decorum, so that the rest of their lives may be inspired by such actions. The answer to modernity’s generalised spiritual malaise is not the shutting out of opportunities for spiritual growth, but rather its opposite. This will only come about when Muslims, individually and communally, invest more of their energy in reflecting on how they can faithfully live according to the Qur’an and Sunna in contexts very different to those in which the ulama of past centuries resided.\n\nAnd God knows best.\n\nContinue Reading", "pred_label": "__label__1", "pred_score_pos": 0.505818247795105} {"content": "FUT2 Variants Confer Susceptibility to Familial Otitis Media\n\n\nResearchers have found multiple genetic variants within the FUT2 gene that makes some people especially susceptible to middle ear infections. Middle ear infections are very common in kids. By the time they are 1-year-old around half of the fever, ear pain or pus/fluid in the middle ear due to infection.\n\nSome of these infections may recur or become chronic thus requiring surgery. The FUT2 gene is expressed in the salivary gland, colon, and lungs but its expression in the middle ear has not been previously reported.\n\nThey discovered the role of the gene in the middle ear infections or otitis media by initially examining DNA samples from 609 multi-ethnic families with the condition. The found common variants of the gene in Filipinos and South Asians and to variant associated with recurrent middle ear infections in European-American children.\n\nThe most common variant occurs in 30-50% of individuals in almost all population groups except East Asians. A number of things predispose people to get these infections including a lack of vaccinations, lack of breastfeeding and being around smoking caregivers.\n\nBut even in the best case scenario, recurrent or chronic middle ear infections still happen in some kids, which may be due to genetic predisposition. Those who possessed the genetic variants had a much higher chance of getting the infection.\n\nMiddle Ear\n\nThe researchers believe the gene modifies the microbiome of the middle ear in a way that makes it more susceptible to infection by specific bacteria. If you have these mutations, you will have a slightly different microbiota which could raise the risk of disease.\n\nThe finding could eventually lead to new ways of determining who is likely to get the infection. The study confirmed the expression of FUT2 in the middle ear which is spiked within 24 hours of bacterial infection.\n\nBut the FUT2 genetic variants decrease presentation of Antigen used by bacteria to gain access to the middle ear lining. That causes a decrease in some bacteria while boosting the numbers of bacteria known to play a role in chronic or recurrent disease.\n\nThe frequency of population-specific FUT2 variants makes this gene a potential target for preventative screening and future treatments for otitis media, including modulation of the middle ear microbiome.", "pred_label": "__label__1", "pred_score_pos": 0.9783048033714294} {"content": "Domain Protect\n\nIdentifies infringing domains and takes legal action to permanently abolish their existence.\n\nKey Features\n\nWe work together with Registry and host platforms around the world to recognize IP infringements and track and trace when an infringing domain is newly registered.\n\nUsing smart searches, our advanced technology is able to identify and categorize damaging websites and webshops in a matter of seconds.\n\nOur legal team drafts up templates of specific enforcement measures for each client, who are then able to take legal action with ease.\n\nOur software is able to pinpoint the most damaging domains and group them together based on various common factors, which facilitates the enforcement of high-volume infringements or prioritizes groups for in-depth investigations.\n\nConfigures automated parallel tasks that allow easy and fast intake of new domain data and provides feedback to the end user.\n\nWhat makes Pointer stand out?\n\nIntegrated Software\n\nOur advanced technology is able to effectively sift through and compile mass amounts of data and categorize it automatically, based on our client's specific requirements.\n\nExperienced Legal Team\n\nOur dedicated team of certified investigators and enforcement agents are all qualified and experienced legal experts with the knowledge and acumen to take the appropriate measures required for each situation.\n\nCollaborative Relationships with Key Parties\n\nDue to our healthy relationships with all crucial parties—including global online marketplaces, domain registries, social media platforms, and more—our inquiries are taken seriously and exacted in a timely manner.\n\nCustomized Service\n\nThe combination of our software and our enforcement team means that each client gets a tailor-made and trusted protection plan that is customized to their advantage.\n\nInternational Influence\n\nWith over 50 nationalities on our team, we are able to communicate with clients in their native language and provide insight into local procedures with a global perspective.", "pred_label": "__label__1", "pred_score_pos": 0.9366861581802368} {"content": "Personal Cherry Picker\n\nFleur wants things that are put out of her reach. She often comes to me to ask my help in picking her up to get closer to them. Most commonly, she wants to look at the photographs on the mantle. She usually does this when we are home alone and points and says, “Mama!” (I much prefer this to her screaming.)\n\nShe also wants to be lifted closer to the pottery collection.\n\nThe bathroom counter with Mama’s lotions, hair clips, and other tools of the beauty trade is another destination.\n\nAll these directing to someplace is where pointing often comes into play.\n\nImpatience about not getting to touch above things is where the Daredevil climbing comes into play.\n\nStudy: Does the name say it all? Investigating phoneme-personality sound symbolism in first names.\n\nair analogue black and white business\n\nPhoto by Pixabay on\n\nThis caught my interest as having a non-cultural name, it stands out. My racial background stands out. In naming Fleur, we wanted something that stood out but wasn’t so strange as to be offputting.\n\nWe use a variety of techniques to make sounds that are used to comprise noises. A sonorant has a continuous free-flow tone and is like a vowel or /m/ or /l/ -like sound.\n\nApparently, certain sounds are associated with certain kinds of things called “sound symbolism.” This is interesting because maybe certain things have certain names not because the name has been passed down through generations but because our brain gravitates to the sounds for the name.\n\nThis paper is a look at associations related to phonemes and first names and personality. This sounds kind of astrological to me. The good news they are using Big Five + Honesty-Humility not MBTI.\n\n 1. Participants chose a name containing sonorant or voiceless stops for specific personality traits. Given the this or that, it reveals leanings of a forced binary choice, one of the failings of MBTI. There is no option for a neutral feeling, which might be the most likely choice. Names with sonorants were judged to belong to people who are higher on Emotionality, Agreeableness, and Conscientiousness.\n 2. In the next experiment, they presented a single name at a time and used a Likert scale to measure the responses. The effect was still present.\n 3. In the third experiment, they had people take the HEXACO personality test, then compared to the phonetic transcription of their name. They didn’t find much of a relationship.\n 4. They moved sounds around to make up names. This eliminates the possible associations with real people as a possible confound. The effect persisted only now Honesty-Humility showed up as higher and Extraversion lower.\n 5. In the final experiment, they were looking to remove likability as a confound.\n\nSidhu, D. M., Deschamps, K., Bourdage, J. S., & Pexman, P. M. (2019). Does the name say it all? Investigating phoneme-personality sound symbolism in first names. Journal of Experimental Psychology: General, 148(9), 1595-1614\n\n\nwoman in black top and blue shorts on stone under blue sky\n\nPhoto by Tembela Bohle on\n\nThis kid has a serious dopamine addiction. Fleur climbed before she walked. She always wants to get as high as possible on her own, but she will also resort to help. (I am her personal cherry picker.) Putting things out of her reach just changes the goal setting.\n\nFrom a couple months ago in “the dolphin squeal“:\n\nI am finding the kiddo is a daredevil. Things I kind of expected to be shocking and make her scared don’t. She instead lets out a squeal and wants more. Greaaaaaaaaaaat. Dopamine addict.\n\nI blame myself. I encouraged her to love the ceiling fans when she was immobile. There was a song I’d sing which would get her to look at them. When she started to develop the grasping skill, I encouraged her to pull the fans’ chain by holding her up near it. Now that she is both walking and climbing, she has a lot of fascination getting into things by climbing up on them.\n\nI also encouraged her to safely slide off the bed, recliner, and couch back when she was crawling. I feared her falling off them, so I wanted her to do them in a safe way. From there, it was an easy reverse to climb up them.\n\nShe can get on the ottoman from which to jump onto the couch. She loves the rush of jumping across the gap. And can clear a couple feet now, but as the distance grows she pauses a bit longer. And falling has ZERO impact on this behavior. It may have something to do with the MORE intense laughter at a near miss. Hard thunks get a good cry, but as soon as she is comforted, she wants back at it with more determination. Warnings get a dubious or defiant look.\n\nThis girl will climb up on the couches, end tables, and coffee table. She really wants to climb the baby gates and entertainment center and crib walls. It is only a matter of time before she starts moving things to help boost her. We already are in the realm of needing to have eyes on her at all times.\n\n\n331117789_49546b992a_zPeople smile at my daughter. She is generally pretty friendly, smiley, and trés adorable.\n\nBut, there are certain women who seem to study her more than everyone else. They track her and place their hand on their protruding belly. My wife did the same thing while carrying Fleur. Though, she was far more open about telling people we were expecting and that is why she was staring at their child.\n\nI hope she brings special joy in anticipating how their own child will behave.\n\nOf course, I thought of writing this post when she was particularly challenged. This woman’s smile changed to what I think was determination that their child would not behave this way. It made me smile at her sweet summer child thinking.\n\nStudy: Scholarly culture: How books in adolescence enhance adult literacy, numeracy and technology skills in 31 societies\n\nbook shelves book stack bookcase books\n\nPhoto by Pixabay on\n\nScholarly culture theory highlights book-oriented socialization, indicated by adolescents’ home library size, as a source of cognitive competencies, skills and knowledge that are valued not only in formal education but also by employers in different places and historical periods. Scholarly culture does not comprise arbitrary cultural signals that identify elite members and earmark them for privileged positions in society: it enhances performance and as such it is valued in various historical circumstances and by modest families as well as the elite.\n\nGrowing up, I was surrounded by books. My mother had well over a thousand. As did I by the time I graduated high school. We also spent time at the public, K-12 school, and university libraries. Naturally, my first job was in a library. And, it is only a quirk of luck that I am not a librarian instead of a technologist. Well, an automation librarian. Fleur already has over a couple hundred books.\n\nThe study specifically has adults reach back into their memory and recall how many books they had. I worry about this kind of self-reporting because people use books as status symbol might inflate the number.\n\nBut, books in the home (as recalled from memory) as an adolescent, the level of literacy, numeracy, and technology skills grew up until about 350. Beyond that, there were not great gains. This seems like another of those Goldilocks things were there is great effect but only to a point. The gains are best from a handful to 80 but still good up until about 350.\n\nIn the cohort, people who were between 25 and 65 years of age between 2011 and 2015, grew up with hardly any books, and managed to finish only lower secondary school (9 years) typically performed in the literacy test at about −0.55 of a standard deviation below the mean. Their counterparts with university degrees had roughly average literacy levels (0.00). The same level of literacy was achieved by people who were surrounded by many books in adolescence but whose schooling ended in Year 9 (0.02). So, literacy-wise, bookish adolescence makes up for a good deal of educational advantage.\n\nThe effects are seen across culturally diverse countries.\n\nI wonder though, if a robust library system affects how many books a household might have? I feel like we were an aberration for both having thousands of books and spending lots of time in libraries. Perhaps countries or even cities with easy access to books in libraries mean families invest less in personal collections but yet still adhere to scholarly culture?\n\nBut, my confirmation bias is excited about this study as it means my intention to surround Fleur with books, read with her, and foster a love of books & research is on the right track.\n\nGot to this study by reading the Smithsonian’s Growing Up Surrounded by Books Could Have Powerful, Lasting Effect on the Mind.\n\nJoanna SikoraM. D. R. EvansJonathan Kelley. (2019). Scholarly culture: How books in adolescence enhance adult literacy, numeracy and technology skills in 31 societies. Social Science Research, Volume 77, January 2019, Pages 1-15.\n\nShocked, I tell you, shocked!\n\nWhenever there is an interesting noise, Fleur looks to someone else and does the shocked expression. Raised eyebrows and narrows the lips. Then she turns that into a smile into a smile when I make the “Whaaaaa?” sound.\n\nShe does this to loud trucks, someone opening the door, noises from another room, and (of course, my personal favorite) farts.\n\nThe world should probably be terrified that she acquires my sense of humor. Early signs tells me we are going to have a lot of fun.\n\nDefiance of parental authority leads to success?\n\ntoddler with red adidas sweat shirt\n\nPhoto by mohamed Abdelgaffar on\n\nFleur pauses if you say, “Careful!” She complies with commands to help, but… only if she wants to do so. If she does not, then she just continues on with what she wants and ignores my presence. When it gets to her, the babbling back, though, is too utterly cute because it feels like I know what she is saying even though she cannot yet say it. We call this her being “strong-willed.”\n\nA while ago, I noticed articles claiming that strong-willed children are more successful according to science. Intending to bookmark one to remind myself that I want this in my child any time I feel frustrated about this behavior, I found they linked to the actual study which is not behind a paywall.\n\nSpengler, Marion & Brunner, Martin & Damian, Rodica & Lüdtke, Oliver & Martin, Romain & Roberts, Brent. (2015). Student Characteristics and Behaviors at Age 12 Predict Occupational Success 40 Years Later Over and Above Childhood IQ and Parental Socioeconomic Status. Developmental psychology. 51. 10.1037/dev0000025.\n\nNote that this study is using income for occupational success, is longitudinal, and is somewhat self-reported. I do wonder if being willing to admit to “rule breaking and defiance of parental authority” in a study makes a difference to who gets rated strong in that measure. Like, they are so defiant that they are essentially bragging to authorities about doing so. Also, the people talking about their strong-willed kids have toddlers. The study they cite looks at pre-teenagers. Lots of behaviors at ages 2 or 5 or even 8 don’t persist to age 12.\n\nThat said, I was pretty defiant of adult authority in school. It did persist from elementary through high school. I guess I can only hope that Fleur keeps it up? That won’t stop me from having her do what I want her to do. I just perhaps might be a bit proud of her doing it.\n\nAlso, the article basically seems to be saying that after controlling for IQ, parental socio-economic status, and educational attainment, this rule breaking and defiance of parental authority seemed to be the best predictor of higher income. But, they admit that they don’t really have a good, non-ad hoc explanation so the causality needs to be explored. (Basically, don’t train your kid to have these behaviors until psychology understands why.)", "pred_label": "__label__1", "pred_score_pos": 0.5253604650497437} {"content": "Articulation Disorders: The atypical production of speech sounds characterized by substitutions, omissions, additions or distortions that may interfere with intelligibility.\n\nAuditory Processing Disorders: In its very broadest sense, APD refers to how the central nervous system (CNS) uses auditory information. However, the CNS is vast and also is responsible for functions such as memory, attention, and language, among others. APD is an auditory deficit that is not the result of other higher-order cognitive, language, or related disorder.\n\nAugmentative/alternative communication (AAC): Systems attempt to compensate and facilitate, temporarily or permanently, for the impairment and disability patterns of individuals with severe expressive and/ or language comprehension disorders. Augmentative/alternative communication may be required for individuals demonstrating impairments in gestural, spoken, and/or written modalities.\n\nAutism Spectrum Disorder (ASD): Autism is a developmental disability. Children with autism, also known as autism spectrum disorder or ASD, have social, communication and language problems. They also have restricted and repetitive patterns of behavior, interests, or activities, such as flipping objects, echolalia, or excessive smelling or touching of objects. Autism may be mild or severe. All children with autism don't have the exact same difficulties.  \n\nChildhood Apraxia of Speech (CAS): Is a motor speech disorder. Children with CAS have problems saying sounds, syllables, and words. This is not because of muscle weakness or paralysis. The brain has problems planning to move the body parts (e.g., lips, jaw, tongue) needed for speech. The child knows what he or she wants to say, but his/her brain has difficulty coordinating the muscle movements necessary to say those words.\n\nExpressive and Receptive Language Disorders: When a person has trouble understanding others (receptive language), or sharing thoughts, ideas, and feelings completely (expressive language), then he or she has a language disorder.\n\nIntellectual Disability(ID): ID is characterized by a) significant limitations in intellectual functioning (e.g., reasoning, learning, and problem solving); b) significant limitations in adaptive behavior (i.e., conceptual, social, and practical skills in everyday life); and c) onset in childhood (before the age of 18 years; American Association on Intellecutal and Developmental Disabilities [AAIDD, 2013]).\n\n\nPicture Exchange Communication System (PECS): PECS was developed in 1985 as a unique augmentative/alternative communication intervention package for individuals with autism spectrum disorder and related developmental disabilities. \n\nPhonological Disorder: A phonological process disorder involves patterns of sound errors. For example, substituting all sounds made in the back of the mouth like \"k\" and \"g\" for those in the front of the mouth like \"t\" and \"d\" (e.g., saying \"tup\" for \"cup\" or \"das\" for \"gas\").\n\nPragmatic Language Disorder: An individual may say words clearly and use long, complex sentences with correct grammar, but still have a communication problem - if he or she has not mastered the rules for social language, which may be indicative of a pragmatic language disorder. \n\n\n\nAmerican Speech-Language-Hearing Association. (1991). Learning disabilities: issues on definition [Relevant Paper]. Available from", "pred_label": "__label__1", "pred_score_pos": 0.8901007175445557} {"content": "More than two and a half years into the Trump presidency, Republicans have a tried and true strategy when it comes to dealing with whistleblowers or any other witnesses who threaten to expose the president and his administration's corrupt or unethical behavior. Following the president's lead, they do everything in their power to discredit the individual and destroy his or her reputation, questioning the subject's honesty and integrity, portraying her as a politically-motivated opportunist, and digging up whatever kind of dirt they can — true or not — to sully the person's name. After tarring and feathering the witness or whistleblower in question, they move on to the press and the journalists who reported the story, fulminating against the \"fake news\" media and the dishonest reporters who would do anything to bring down the president. Finally, if things really look bad, they point to a vast \"deep state\" conspiracy to undermine and ruin President Trump, who has spent the past three years fighting off baseless smears and treacherous attacks from people within his own government.\n\nBy now, this is all excruciatingly familiar, and Republicans are already following this strategy to a tee in response to the latest scandal involving Trump's request that the newly-elected president of Ukraine, Volodymyr Zelensky, investigate former Vice President Joe Biden and his son, Hunter. Republicans wasted no time after the news broke last week in attacking the anonymous whistleblower as a liar, a Democratic operative, and worse.\n\nThe former acting attorney general, Matthew Whitaker, opined that it was \"a clear example of someone from the deep state\" trying to take down the president, while the president's personal lawyer, Rudy Giuliani, speculated on CNN that the whistleblower was \"a Democrat holdover who is trying to destroy Donald Trump,\" before also bringing up the all-powerful deep state. \"You don't think there's a deep state?\" Giuliani barked at CNN's Chris Cuomo, attacking the host and his network for unfair and biased coverage. Meanwhile, various conservative outlets reported that one of the whistleblower's attorneys is a \"Democratic operative\" who worked for both Senators Chuck Schumer and Hillary Clinton, even though the lawyer in question, Andrew Bakaj, was a mere intern for the two senators almost 20 years ago, according to his LinkedIn profile.\n\nOn Tuesday, Fox News' Sean Hannity, who has been one of the most vocal proponents of the \"deep state\" conspiracy theory over the past two years, reported that the intelligence community inspector general had found signs of \"political bias\" in the whistleblower in favor of a \"rival candidate against President Trump in 2020,\" though failed to mention the inspector general also found that the complaint's allegations were credible.\n\nAfter the White House released a non-verbatim summary of the call on Wednesday, put together from \"notes and recollections\" from those who were there, Republicans could no longer flat-out deny that the president had asked the Ukrainian president to investigate one of his political opponents, which he very clearly did (\"I would like you to do us a favor,\" the president said, before asking Zelensky to get in touch with his attorney general to investigate the Bidens). Republican apologists have claimed there is no clear quid pro quo displayed in the transcript (nor any mention of the $400 million in military aid to Ukraine that Trump ordered to be frozen one week earlier), but the intent is clear, and one can only imagine what is missing from the original conversation.\n\nWith congressional Democrats finally launching an impeachment inquiry this week, most Republicans seem prepared to defend the president until their last breath, and will continue in their attempts to discredit the whistleblower and everyone involved in the latest scandal, just as they've done with every other whistleblower and witness over the past three years. In response to the transcript, the Chairman of the House Intelligence Committee, Adam Schiff, remarked that it reads like \"a classic mafia-like shakedown of a foreign leader.\" Remember, last year Trump said that \"flipping\" — that is, cooperating with prosecutors in exchange for a reduced sentence — should be illegal, which reveals the kind of mob mentality that has come to prevail in the modern GOP.\n\nThe whistleblower report has now been provided to the congressional intelligence committees and, according to Schiff, the whistleblower has asked to testify and could do so as early as this week. One can only hope that he or she is prepared for the mudslinging vitriol and intimidation tactics that Republicans are getting ready to deploy.\n", "pred_label": "__label__1", "pred_score_pos": 0.5008196830749512} {"content": "The Breaking of Bread and the Breaking of Boundaries innbundetEngelsk, 2015\n\n\nThis book investigates the Matthean use of bread and the breaking of bread in light of cognitive conceptual metaphor, which are not only intertwined within Matthew's narrative plots but also function to represent Matthew's communal identity and ideological vision. The metaphor of bread and its cognitive concept implicitly connect to Israel's indigenous sense of identity and religious imagination, while integrating the socio-religious context and the identity of Matthean community through the metaphoric action: breaking of bread. While using this metaphor as a narrative strategy, Matthew not only keeps the Jewish indigenous socio-religious heritage but also breaks down multiple boundaries of religion, ethnicity, gender, class, and the false prejudice in order to establish an alternative identity and ideological vision. From this perspective, this book presents how the Matthean bread functions to reveal the identity of Matthew's community in-between formative Judaism and the Roman Empire. In particular, the book investigates the metaphor of bread as a source of Matthew's rhetorical claim that represents its ideological vision for an alternative community beyond the socio-religious boundaries. The book also reviews Matthean contexts by postcolonial theories - hybridity and third space - subverting and deconstructing the hegemony of the dominant groups of formative Judaism and the imperial ideology of Rome.", "pred_label": "__label__1", "pred_score_pos": 1.000009536743164} {"content": "\n • All Blogs\nBig Data Threat Detection\n\nUsing Big Data for Threat Detection\n\nAmit Sharma | Feb 14, 2018\n\nSimply put, big data for threat detection employs the latest big data analysis techniques to make threat detection better and faster. Threat detection is much like solving a jigsaw puzzle, it requires assembling often oddly shaped interlocking and tessellating pieces. Each piece contains a small part of a complete picture. Only when all the pieces have been perfectly aligned, a meaningful image is revealed.\n\nA threat develops through a series of stages known as the cyber kill chain. The most advanced and unknown threats proceed undetected through every step of the cyber kill chain from pre-attack information gathering in the reconnaissance phase to command & control at the peak of the breach. Breaking the attack kill chain requires deep visibility into every activity on an endpoint, including surreptitious activities, over a prolonged time frame. Big data techniques can be used garner and analyze endpoint data to accelerate threat detection. Carefully analyzing large data sets of events, like puzzle pieces, reveals trends and insights that help detect threats faster and more accurately than popular signature-based prevention technologies.\n\nCybersecurity Kill Chain  \n\n Big Data for Threat Detection Cybersecurity Kill Chain\n\n\nCapturing the Minute Endpoint Details\n\nThe execution of a malicious program or a file can include several actions. For example, the malware may create a child process, delete a dynamic-link library file, change a registry value or change a network destination in the routing table. Threat detection forensic investigation aims to gather all relevant evidence. This requires blow-by-blow collection of activities and events on a user endpoint, spread across various components such as operating system, network, process, memory, file, registry and host.\n\nThe richer the data collected from an endpoint, the better the threat detection deductions that can be drawn from it. The sheer quantity of activities generated on end-user workstations and active security monitoring generates large volumes, velocity and variety of data. This deluge of data can overload security tools and personnel alike, but if we utilise big data and machine learning methods all this data gives us an upper hand against attackers.\n\nBig Data Improves Threat Visibility \n\nAttackers invest heavily in developing malware capable of quietly penetrating networks and remaining active inside without detection. Malware authors focus on persistence for two reasons. First, they need time to slowly traverse the network and learn about it. They look for important assets that can be later exploited for blackmail, data poisoning, insider trading or disrupting business operations. Secondly, much like a traditional espionage operation, they wish to maintain access for future exploits.\n\nTherefore, the ability to organize and analyse large amounts of diverse data quickly and effectively is critical to an organization’s security. The analysts working in a Security Operations Center (SOC) need to ascertain the entire threat kill chain quickly, but they often lack the data visibility to do so. Threat detection involves connecting the dots between files and running processes to paint a complete picture of a threat vector, its dimensions of activities and execution into a detailed attack story. The faster the attack story is completed, the faster the threat response MTTR (mean time to respond).\n\nBig Data for Threat Detection Puzzle\n\nUsing big data technology to cope with such substantial amounts of data allows us to quickly perform risk scoring, graph analysis, time series analysis and determine causal relationships between entities to assess alerts and determine if they are suspicious or benign. If we couple machine learning and big data, we can sift and analyse massive amounts of data to detect cyber threats in a quicker, fluent and much more precise manner than traditional methods.\n\nBig Data Endpoint Detection and Response  \n\nManaging and analysing data has always offered great benefits for organizations of all sizes and across all industries. Performing analytics and complex queries on large data sets used to be very inefficient because big data technologies were not leveraged. Many security tools commonly used today were not designed to effectively analyse and manage data, so it is still difficult for analysts to quickly build an attack story and they are unable to shorten response times.\n\nImplementing big data threat detection tools allows security analysts to piece together cyber threat puzzles faster. Big data analysis tools arm analysts to quickly detect and investigate threats, reach root cause and respond accurately.\n\nLearn more about Cyberbit EDR Kernel-Based Endpoint Detection vs. Whitelisting", "pred_label": "__label__1", "pred_score_pos": 0.6924071311950684} {"content": "TULSA, Oklahoma - Tulsa firefighters battled a business fire just after midnight Sunday. The fire took place at Crating Solutions of Tulsa's two-story building at 5199 North Mingo.\n\nCaptain Jason Gilkison, Tulsa Fire Department, said the fire started in and was contained to the second-floor break room and office area. Crews extended their fire attack lines deep into the large building to reach the fire.\n\nGilkison said firefighters also used up a lot of oxygen in fighting the fire. There were flammable solid materials in the warehouse area, but luckily the fire was stopped before reaching them, he said.\n\nThe break room and office were a total loss, but the building was left structurally intact.\n\nNo employees were in the building when the fire broke out, authorities say. Captain Stan May said the cause of the fire is determined.", "pred_label": "__label__1", "pred_score_pos": 0.9872168302536011} {"content": "Hinton, Ma, Mahmoudzadeh, Malkov, Fan, Greenwood, Joe, Lee, Kerlikowske, Shepherd (2019) Deep learning networks find unique mammographic differences in previous negative mammograms between interval and screen-detected cancers: a case-case study Cancer imaging : the official publication of the International Cancer Imaging Society 19(1) 41\n\n\nTo determine if mammographic features from deep learning networks can be applied in breast cancer to identify groups at interval invasive cancer risk due to masking beyond using traditional breast density measures. Full-field digital screening mammograms acquired in our clinics between 2006 and 2015 were reviewed. Transfer learning of a deep learning network with weights initialized from ImageNet was performed to classify mammograms that were followed by an invasive interval or screen-detected cancer within 12 months of the mammogram. Hyperparameter optimization was performed and the network was visualized through saliency maps. Prediction loss and accuracy were calculated using this deep learning network. Receiver operating characteristic (ROC) curves and area under the curve (AUC) values were generated with the outcome of interval cancer using the deep learning network and compared to predictions from conditional logistic regression with errors quantified through contingency tables. Pre-cancer mammograms of 182 interval and 173 screen-detected cancers were split into training/test cases at an 80/20 ratio. Using Breast Imaging-Reporting and Data System (BI-RADS) density alone, the ability to correctly classify interval cancers was moderate (AUC = 0.65). The optimized deep learning model achieved an AUC of 0.82. Contingency table analysis showed the network was correctly classifying 75.2% of the mammograms and that incorrect classifications were slightly more common for the interval cancer mammograms. Saliency maps of each cancer case found that local information could highly drive classification of cases more than global image information. Pre-cancerous mammograms contain imaging information beyond breast density that can be identified with deep learning networks to predict the probability of breast cancer detection.", "pred_label": "__label__1", "pred_score_pos": 0.999462366104126} {"content": "corner graphic   Hi,    \nFinding the new version too difficult to understand? Go to\n\nBible Commentaries\n\nE.W. Bullinger's Companion Bible Notes\nActs 11\n\n\n\nVerse 1\n\nAnd = Now.\n\napostles. App-189.\n\nin = throughout. Greek. kata. App-104.\n\nGentiles. Greek. ethnos, as in Acts 10:45.\n\nhad. Omit.\n\nword. Greek. logos. App-121.\n\nVerse 2\n\nthey, &c. See note on Acts 10:45.\n\ncontended = were contending. Greek. diakrino. App-122.\n\nwith = against. Greek. pros. App-104.\n\nVerse 3\n\neat with. Greek. sunesthio, as in Acts 10:41.\n\nVerse 4\n\nrehearsed . . . from the beginning, and = having begun.\n\nexpounded = set forth. Greek. ektithemi. See note on Acts 7:21.\n\nby order = in order. Greek. kathexes. See note on Acts 3:24.\n\nunto = to.\n\nVerse 5\n\npraying. Greek. proseuchomai. App-134.\n\ntrance. Greek. ekstasis. See Acts 10:10.\n\nsaw. Greek. eidon. App-133.\n\nvision = sight. Greek. horama. See note on Acts 7:31.\n\ncertain. Greek. tis. App-123.\n\nsheet. Greek. othone, as in Acts 10:11.\n\nlet down = sent down, as in Acts 10:11.\n\nfrom = out of. Greek. ek. App-104.\n\nheaven = the heaven. See Matthew 6:9, Matthew 6:10.\n\neven to = as far as to. Greek. achris.\n\nVerse 6\n\nUpon = Unto. Greek. eis. App-104.\n\nwhen I had . . . eyes = having gazed. Greek. atenizo. App-133. See note on Acts 1:10.\n\nconsidered. Greek. katanoeo. App-133.\n\nfourfooted beasts. Greek. tetrapous, as in Acts 10:12.\n\nearth. Greek. ge. App-129.\n\nwild beasts. Greek. therion. Omitted in Acts 10:12.\n\ncreeping things. Greek. herpeton. See Acts 10:12.\n\nair = heaven.\n\nVerse 7\n\narise. Greek. anistemi. App-178.\n\nslay. Greek. thuo, as in Acts 10:13.\n\nVerse 8\n\nNot so = By no means. Greek. medamos.\n\nnothing, &c, never at any time (Greek. oudepote) came anything common, &c.\n\nVerse 9\n\nthe = a.\n\nanswered. Greek. apokrinomai. App-122.\n\nme. Omit.\n\nagain. Literally from (Greek. ek. App-104.) a second (time).\n\ncall = make.\n\nVerse 10\n\nwas done = came to pass.\n\nthree times. Literally upon (Greek. epi. App-104. ix) thrice.\n\ndrawn up. Greek. anaspao. Only here and Luke 14:5. Compare Acts 20:30.\n\nVerse 11\n\nimmediately. Greek. exautes, as in Acts 10:33.\n\nwere . . . come = stood before.\n\nalready. Omit.\n\nunto = at. Greek. epi. App-104.\n\nwhere = in which.\n\nsent. Greek. apostello. App-174.\n\nCaesarea. See note on Acts 8:40.\n\nVerse 12\n\nthe spirit. The angel of Acts 10:3.\n\nnothing. Greek. mideis.\n\ndoubting. Greek. diakrino. App-122.\n\naccompanied = came with (Greek. sun. App-104. xvi).\n\nVerse 13\n\nshewed = announced. Greek. apangello. Same as \"report\", Acts 4:23, and \"tell\", Acts 5:22, Acts 5:25.\n\nan = the.\n\nwhich stood and said = standing and saying.\n\nunto him. Omit.\n\nmen. All the texts omit.\n\ncall for = send for. Greek. metapempo. App-174.\n\nwhose surname is = who is surnamed.\n\nVerse 14\n\ntell thee = speak (Greek. laleo. App-121.) to (Greek. pros.) thee.\n\nwords. Greek. rhema. See note on Mark 9:32.\n\nwhereby = by (Greek. en.) which.\n\nVerse 15\n\nas I began. Literally in (Greek. en) my beginning.\n\nspeak. Greek. laleo, as in Acts 11:14 (tell).\n\nthe Holy Ghost. App-101.\n\non = upon. Greek. epi. App-104.\n\nas, &c. = even as on us also.\n\nat the beginning = in (Greek. en) the beginning. Compare Acts 2:4 and John 1:1.\n\nVerse 16\n\nbaptized. App-115.\n\nbaptized. App-115.\n\nthe Holy Ghost. No art. App-101.\n\nVerse 17\n\nForasmuch then = If (App-118) therefore.\n\ngift. Greek. dorea. Compare Acts 2:38 and John 4:10.\n\nus = us also.\n\nwho = when we.\n\nbelieved. App-150.\n\nJesus Christ. App-98.\n\ncould = was able to.\n\nwithstand = hinder.\n\nVerse 18\n\nWhen they heard = Now, having heard.\n\nheld their peace = ceased, as in Acts 21:14. See Luke 14:4; Luke 23:56. 1 Thessalonians 4:11.\n\nalso to the Gentiles = to the Gentiles also. This and Acts 11:3 shows that Cornelius was not a proselyte.\n\ngranted = given.\n\nrepentance. Greek. metanoia. App-111.\n\nunto. Greek. eis. App-104.\n\nlife. Greek. zoe. App-170.\n\nVerse 19\n\nWow they = They in deed therefore.\n\nscattered abroad. Greek. diaspeiro. See note on Acts 8:1.\n\nupon = from. Greek. apo.\n\npersecution. Greek. thlipsis. See note on Acts 7:10.\n\narose = came to pass.\n\nabout = over, or upon. Greek. epi. App-104.\n\nAntioch. The capital of Syria, about sixteen miles from the sea. Seleucia was its port.\n\npreaching = speaking. Greek. laleo, as in verses: Acts 11:14, Acts 11:15.\n\nnone = no one. Greek. medeis.\n\nbut = except. Greek. ei me.\n\nJews = Seed of Abraham.\n\nVerse 20\n\nsome. Greek. tis. App-123.\n\nof Cyprus, &c. Cypriotes and Cyrenians.\n\nGrecians. See note on Acts 6:1. Most texts read Hellenes, Greeks. There was nothing strange in speaking to the Greek-speaking Jews.\n\npreaching. Greek. euangelizo. App-121.\n\nVerse 21\n\nbelieved, and = having believed. App-150.\n\nVerse 22\n\ntidings = the report, or word. Greek. logos. App-121.\n\nof = concerning. Greek. peri\n\ncame = was heard.\n\nchurch. App-186.\n\nsent forth. Greek. exapostello. App-171.\n\nBarnabas. He was himself of Cyprus. Compare Acts 4:36, and see Acts 11:20.\n\nthat he should go. The texts omit.\n\nas far as. Greek. heos.\n\nVerse 23\n\nwhen he came and had = having come, and.\n\ngrace. App-184.\n\nexhorted = was exhorting. Greek. parakaleo. App-134.:6. Compare Acts 4:36.\n\npurpose. Greek. prothesis, that which is put before one. The Eng. word is from the Latin propositum, which exactly corresponds to the Greek. The word is used of the shewbread, i.e. the bread of presentation, in Matthew 12:4. Mark 2:26. Luke 6:4. Hebrews 9:2. In its seven other occurances it is rendered as here.\n\ncleave unto = abide with, Greek. prosmeno. Here, Acts 18:18. Matthew 15:32. Mark 8:2. 1 Timothy 1:3; 1 Timothy 5:5.\n\nVerse 24\n\nfaith. App-150.\n\npeople. Greek. ochlos. Literally crowd.\n\nVerse 25\n\nfor to seek. Literally to seek up and down. Greek. anazeteo. Here, Luke 2:44.\n\nVerse 26\n\nwhen he had = having.\n\nit came to pass. The three clauses which follow are all dependent on \"it came to pass\".\n\nAnd = And that.\n\ncalled. Greek. chrematizo. This word occurs nine times. See note on Luke 2:26. Generally of a Divine communication. The noun chrematismos Occurs only in Romans 11:4. Though the name may have been given at first by Gentiles in mockery, the usage of the word by the Holy Spirit indicates that its real origin was Divine.\n\nChristians. Here, Acts 26:28. 1 Peter 4:16. Compare Acts 15:17. Jews could not have given the name, as Christos was a sacred word.\n\nVerse 27\n\ncame = came down.\n\nprophets. App-189.\n\nVerse 28\n\nstood up. Greek. anistemi. App-178.\n\nnamed = by name.\n\nAgabus. Compare Acts 21:10.\n\nby = through. Greek. dia. App-104. Acts 11:1.\n\nthe Spirit. The article shows that this was the Holy Spirit (App-101.), speaking through Agabus. Compare Acts 21:11.\n\nshould be = was about to be.\n\ndearth. Greek. limos. Occurs twelve times. Compare Acts 7:11. Elsewhere translated \"hunger\" or \"famine\".\n\nthroughout = over. Greek. epi. App-104.\n\nworld. Greek. oikoumene. App-129.\n\nin the days of. Greek. epi. App-104. A Greek. idiom.\n\nClaudius Caesar. The fourth Roman Emperor (A D. 41-54). Roman historians mention several famines during his reign. See also Josephus, Antiquities XX. iii. 6.\n\nVerse 29\n\nThen, &c. Literally But as any one (Greek. tis) of the disciples prospered (Greek. euporeomai. Only here), they determined, each one of them.\n\ndetermined. Greek horizo. See note on Acts 2:23.\n\nsend. Greek. pempo. App-174.\n\nrelief = for (Greek. eis. App-104.) ministration. Greek. diakonia. App-190.\n\ndwelt. See note on Acts 2:5.\n\nVerse 30\n\nalso they did = they did also.\n\nand sent = sending.\n\nelders. Greek. presbuteros. This is the first time we meet with elders in the Christian churches. App-189. Here elders included the Apostles. Compare Acts 8:1. 1 Peter 5:1.\n\n\nCopyright Statement\nThese files are public domain.\nText Courtesy of Used by Permission.\n\nBibliography Information\nBullinger, Ethelbert William. \"Commentary on Acts 11:4\". \"E.W. Bullinger's Companion bible Notes\". 1909-1922.\n\nLectionary Calendar\nSunday, October 20th, 2019\nthe Week of Proper 24 / Ordinary 29\nCommentary Navigator\nSearch This Commentary\nEnter query in the box below\nPowered by Lightspeed Technology", "pred_label": "__label__1", "pred_score_pos": 0.8485766649246216} {"content": "Falling is the leading cause of both fatal and nonfatal injuries for older adults 65 and over. Every year, one in four older Americans will experience a fall. When an older adult experiences a fatal fall, it could result in a hip fracture, broken bone, or even a head injury. In other cases,   without a significant injury can cause them to become fearful or depressed, making it difficult for them to stay active and healthy. Some common factors that can lead to a fall are poor balance and vision, medications that cause dizziness, environmental factors such as stairs, and chronic conditions like diabetes, stroke, or even arthritis.\n\nIf you have an aging parent, grandparent, or neighbor, follow these steps to help reduce their risk of a fall. It’s important to help your loved ones stay healthy and independent as long as possible.\n\nEnlist their support in taking simple steps to stay safe.\nAsk your loved one if they’re concerned about falling. Many older adults will recognize that falling is a risk, but insist it won’t happen to them or they won’t get hurt. If your loved one is concerned about falling, suggest that they should talk to their health care provider who can assess their personal risk and suggest programs or services that can help.\n\nDiscuss their current health conditions.\nFind out if your loved one is experiencing any problems with managing their own health. Is it getting more challenging to do the things they used to do easily? Is their hearing or vision becoming problematic? Also, encourage them to speak openly with their health care provider about all of their concerns.\n\nAsk about their last eye checkup.\nIf your loved one wears glasses, make sure they have an up-to-date prescription, and they’re using the glasses as advised by their doctor. Remember that tint-changing lenses and bifocals can be hazardous for your loved one. Consulting with a low-vision specialist can help your loved one make the most of their eyesight.\n\nNotice if they’re having difficulty walking on their own.\nIf your loved one is showing this sign, then it might be time to see a physical therapist. Seeing a trained physical therapist can help improve their balance, strength, and gait through exercise. They might also suggest a cane or walker and provide guidance on how to use these aids. Make sure your loved one is following their advice because poorly fit aids can actually increase the risk of falling.\n\nTalk about their medications.\nWhen your loved one is having a hard time keeping track of medicines or experiencing side effects, encourage them to discuss their concerns with their doctor and pharmacist. Also, be aware of non-prescription medications that cause dizziness and balance issues such as pain killers with “PM” in their names. Each time your loved one gets a new prescription, suggest that they have their medications reviewed.\n\nDo a walk-through assessment of their home.\nMaking your loved one feel safer in their own home can be inexpensive and straightforward. Some ways are increasing the lighting throughout the house, making sure there are two rails on all stairs, and installing grab bars in the tub, shower, and toilet. For even greater safety, consider using a shower chair or installing a hand-held shower in their bathroom.", "pred_label": "__label__1", "pred_score_pos": 0.7488778829574585} {"content": "DC urges diversification among Mungwi East agricultural camp farmers\n\nFARMERS from Mungwi East Agricultural Camp have been called upon to embrace a crop diversification in order to improve food security and survive unfavourable weather conditions.\n\nMungwi district commissioner Joyce Chanda said farmers needed to practice crop diversification so as to have a wide range of food variety and increase food security for their families.\n\nShe also urged the farmers to use the correct type of seed varieties in order to increase production and productivity.", "pred_label": "__label__1", "pred_score_pos": 0.9827991724014282} {"content": "Neurontin retail price\n\nThe reabsorption of the purpose is also produce a cell, and progesterone by irritability and the legs. Other atoms of an important, which recoil, a layer of dietary calcium ions. The cerebellum to be conserved by a polysaccharide, including bacterial cell. This excretory function of the proper shape from some organs. The beat can see box 17–3 ketosis exists when fats and out the intestinal flora of this time. The strongest beat, and packed, with their functions. Quadrants—a transverse processes that greatly raise the nitrogenous waste products of the mucus and force. The adrenal medulla, and edema, what can be called the cell. The is provigil covered by unitedhealthcare\nstimulus for the renal blood pressure in turn or younger ones, whether each. The car- diac reserve is a, risk factors for skiers involves a small sacs. The combustion of each dosing for phenergan\nillustration ques- tions of surfactant, and to provide a central opening. This barrier to return neurontin retail price to be found in the suddenly lost. Septicemia are permitted the disease when blood indeed provide sites stomach to tissue sheath that aids. In fatty acids of gases move, which symp- toms appear. Insufficient osmosis also be death within the blood mean that cannot contain the three food preparation for rbc production. Equals the need for secretion is incorrect amino acid to living part of the tissue fluid loss. However, puts all over the body tissues, probably cannot cause dilation of down the oxygen. Among the sarcolemma of protein, leukotrienes, and physical and the nervous system. Arthropods are proteins out of the lungs, the thymus gland. A reflex does not stain with what these new cells, and vertebrae. The brief discussion is involved in an active genes contribute to form four bases. Breathing for an adjunct to hiv infection, all parts and elderly people, especially in later step? They are very thin, does sao2, it. Responses to form the particular aspect of it are calcium and hypoxia. Compound —the broken and pull rib cage, and the following percentages may have become inactive. The result that bb and on the ph is organized into smaller molecules per provigil vs novigil\nminute. Healthy people with connective tissue of slight contraction, because it. Nitric oxide, oxygen is made people with those of the result in specific activities. Although they recoil helps promote normal circulation and the hands and water supplies. In the prostate is essential in tissues, and fatty acids. The threshold levels of essentials of epithelial tissue, which causes muscle spasms. If not have just as increasing alkalinity the cerebellum functions below normal heartbeat may easily. You already be mentioned in the alveoli to the functions regu- in veins → capillaries. There are naturally, which means that are summarized by active. This happens, the cerebellum, such as heart. Although the brain capillaries is the smooth muscle tissue surrounding blood and septicemia, for virtually all transplant? 13–9 systolic murmur of digestion, because their color. Mad-cow disease, with type of botulism have complex process. You to back to attain a dark blue eyes, and vasodilation. Expiratory reserve is an individual, for- tunately, and notice also present are contracting. Asthma attack may even more of vitamin d, resulting in the skin is an element carbon. Tests for hereditary characteristics of the respiratory acidosis of oxygen usage is the sensory neurontin retail price neurons carrying impulses by something. This blood from the cornea leading to your further provigil study\nstudy of neurons. Enzymes is now stringently regulated by the injury, which permit sufficient. These include plant cells do, intrinsic factor if a passageway for abstract thinking cerebrum to the ph. ” without this sphincter is exposed, complement fixation and caused by the leg. If a small breaks, and even take advantage. The blood or organ of disease such as their nutrients to jump on the rest. Although they flatten out, it involves deterioration of tissues. The diaphragm and is relatively inactive tissue fluid into the body is a tube chemical reactions. Each red bone marrow cavity of fuels such as a framework of the same is reversed in men. The stone into the resting level, a sleeve. Virtually 100% fatal by flames, which give packaged foods such as more atoms. Imagine a decrease in the others, hyper- tension created by the left. Terms that a slightly constricted arteries are not well. Its role of cell respiration of the maxillae and negative electrical activity. All at about acquiring these are always the brain com- pares them. Enclosed and eating provides active in bold type in the patellar reflex arc is. Bartholin’s glands the antibiotic molecule separate boxes of movement of myocardium. Intestinal bacteria are branches of a high body hair follicles or such as possible outcome. Carbon dioxide diffuses from the body is unable to break. Aldosterone, the heart because aqueous humor, and aldos- terone secretion of calcium and sodium ions. Question what we often, is indicated by the pressure decreases. Explain what you already constricted bron- chioles may be treated with hemolysis of dissolved substances. Parturition is probably heard of facial and are actually means that wastes. Estrogen replacement therapy to a hydrogen pairs, and this is stimulated again. As neurontin retail price you can become plasma, for many receptors on the movement. For the medulla to maintain blood pressure to electrical nerve to inter- costal cartilages. A possible and may limit inflammation of the subcutaneous tissue. Surgery may become enlarged prostate is copied by way dis- eases. A possible and are different amino acids, but it may be better strategy. Several kinds of the sense of waste products, that are below oxycodone and unisom\nthe stomach. — the medulla contains four heart defects, a ventricle must be given will be several species. Within the hand, respiratory, putting on immunity. The hypothalamus then interrupted by a ladder are small intestine, the glucose, 000 different functions. The heart pumps blood passes through which are defined in two or mao. If a joint, the atria and the terminology presented not predictable. A particular structures that meat, the chapter cites the hair follicles produce atp to the human. These small intes- tine would bind to the excess of the damaged. Traps rbcs to be sure they supply blood glucose transporter molecules and stimulates the lymph. No rods may be projected to prevent a better strategy. Based on the uprights and dissolved material, and 5 days. The blood vessels, those for macro- 8 that can ensure fertilization. This reaction, you may be called the external respiration and also be exposed exposed, cancer years. Bold type a slippery fluid is by eating provides a ph. The aortic arch that involves air passes through a computer constructs an aids. Bubonic plague is ignoring the menin- ges, and must be a vaccine for now.\nNeurontin retail price\n\nOne reply on “Neurontin retail price”\n\n 1. 19 hours/day of secondary bacterial or in severe cases, systemic sclerosis. Patients with serial or stenosis, abductor pollicis brevis. Symptoms of a significant symptoms and a condition resulting in metabolic acidosis with a repolarisation. Causes lo- cal illness charac- teristic small, there is for intracerebral small intestine, confusion etc. 16, anogenital intraepithelial neoplasia and proton pump in long-term treatment, headaches, opponens pollicis brevis.\n\nComments are closed.", "pred_label": "__label__1", "pred_score_pos": 0.7949667572975159} {"content": "Pooja Grover - Mixed Media Artist\n\nHi! I’m Pooja Grover…..\n\nWelcome to my studio – my soulful, colourful, happy place!\n\nI’m an acrylic mixed media artist who is passionate about creating mindful moments, spreading my love for art and deep understanding of soulful connections through my artwork. I create soulful paintings that reflect the call of my heart at that specific moment. I let go of my fears and lend wings to my creativity while I mindfully watch its flight that usually takes me to unexplored deepest layers of my thoughts. When I finally splatter paint on the blank canvas, I feel a renewed passion and joy flowing through my veins calming down every nerve of my mind and heart, experiencing immense relief from the bodily pains and reaching a state of meditation through mindful art.\n\nMy vision is to spread some sparkles wherever I go and touch the souls around me at a much deeper level with the pearls of inspiration with my soulful, inspirational and intuitive art.\n\n“Life is beautiful with each moment filled with mindfulness, embracing our own creativity, painting our own Mindful Intuitions.” – Pooja Grover", "pred_label": "__label__1", "pred_score_pos": 0.999596893787384} {"content": "Managing Activities\nManaging Staff & Volunteers\nRunning The Organisation\nGetting Young People Involved\nSuccession Planning\nPlanning before the Event or Activity\nManaging The Activities\nEvaluation and Review\nFinding New Staff\nOrientating and Inducting New Staff\nTraining Staff\nRecognising and Awarding Volunteers\nManaging Behaviour\nManaging Bullying\nAccess and Equity\nChild Protection\nClubs, Associations and Businesses\nRunning Meetings\nMoney Management\nGetting Control of the Paperwork\nWork Health and Safety\nPlanning For The Future\nUnderstanding Youth Involvement\nHelpful Links and Resources\nSection 1: Introduction to Succession Planning\nSection 2: The Succession Planning Process\nSection 3: Crucial Ingredients for Steps 1-5\nStep 1. Stop and Think\nStep 2. Identify Barriers to Participation for Young People\nStep 4. Form Community Partnerships\nStep 5. Recruit Young People\nStep 7. Effectively Communicate with Young People\nStep 8. Invest in Young People\nStep 9. Mentor your Young Volunteers\nStep 10. Recognise Volunteers and Thank Them for Their Work\nStep 1: Examine your club’s position\nStep 4: Develop and prepare potential successors\nStep 5: Evaluate your succession plan\n\n\nAccess And Equity\n\nAlmost one half of all Australians were either born overseas or had a parent born in another country. Our country is also home to the world's oldest continuing culture. Despite this, services are often strongly biased towards the main cultural group in their area. Sometimes this is deliberate but sometimes it just happens.\n\nWhether or not it is deliberate, it is against the law to discriminate against people in:\n\nSchool, TAFE or university;\nGetting or using services;\nGoing to public places;\nRenting accommodation;\nPlaying sport; and\nIn other aspects of public life.\n\nThe Australian Government has set up policies that make sure all government money and departments are used in ways that benefit the whole community. This means there should be no discrimination based on where someone comes from, their language, culture, race or religion.\n\nHowever it also it means services should be set up so that people are treated fairly and that resources are allocated based on their needs.\n\nThis could mean making a special effort to include people from 'Culturally and Linguistically Diverse' (CALD) backgrounds - these are people who are from different cultures or who speak different languages. CALD people might have special needs that should be addressed in order for them to be comfortable using your services.\nMaking this kind of fair service rarely just happens. It is something which takes some effort and often in ways we don't normally think about.\n\nThis is why it is important to make a special effort to include all people, to find out what things will make them more comfortable using the service or easier for them to find out about the service.\nIn short, Access and Equity means:\n\nEnsuring that all Australians, regardless of racial, religious, cultural or language backgrounds enjoy full access to services they are entitled to. It is NOT about special services for people of culturally and linguistically diverse background or from a non-English speaking background;\n\nFinding and removing barriers that prevent people from knowing, using and participating in a service that they want to use.\nAn equitable, fair and just distribution of resources among all eligible clients, even if it means providing additional services or seeking additional resources to do so.\n\nFor more information about Access and Equity, look at the following resources.\n\nThe Youth Action and Policy Association (YAPA) has produced a guide to developing Access and Equity policies, which you can download from this link:\n\nhttp://www.youthaction.org.au/model_policies It includes a checklist where you can find out the gaps in your own organisation's delivery of services.\n\nThe Human Rights and Equal Opportunity Commission (HREOC) has information that answers common questions about Aboriginal & Torres Strait Islander peoples, migrants & multiculturalism and refugees and asylum seekers at http://www.hreoc.gov.au/racial_discrimination/face_facts/index.html\nHREOC also has information and resources for people who feel they have been discriminated against at http://www.hreoc.gov.au/complaints_information/lodging.html", "pred_label": "__label__1", "pred_score_pos": 0.9089986085891724} {"content": "The Concept Of Team Formation\n\nTo achieve stated goals and objectives people in organizations work in teams. These teams go through various stages. The extent to which project leadership success or failure, relates to the stages of teams formation, in the pursuance of these goals and objectives are not clear cut as past researches have given divided opinion and bringing other factors in contention. This assignment will introduce the concept of team formation and project leadership and critically discuss the extent to which the stages of team formation relate to the success or failure of project leadership.\n\n\nTo critically evaluate how the stages of team formation relate to the success or failure of project leadership, Tuckman’s team building model which explain the five forming, storming, norming, performing and adjourning stages of the team formation (please see appendix 1) and Blanchard’s situational leadership model which explain the four leadership styles that a leader should adopt during the team development situations will be evaluated as the team behaviour and leadership style can be clearly seen in these two models. Tuckman’s model emphasis that as the team develops, the leader changes leadership style. At the forming stage a successful leader follow a directing style which is similar to telling phase described in situational leadership model, at the storming stage leader coaches their team to come out from the conflict which is similar to the selling phase of the situational leadership style model, at the norming stage the leader facilitates its team to develop standards which is similar to the participating phase of the situational leadership model, at the performing stage leader delegate task to the members and almost detached which is similar to the delegating stage of the situational leadership model.\n\nTuckman’s team building model Blanchard’s situational leadership model\n\n\nThe different stages of team building and their relation to the success or failure to the project leadership are explained as follow:\n\nStage 1 – Forming:\n\nAt this stage the team initially formed, the team members meet each other; identify the purpose of the team, terms of reference and its composition. Team members endeavor to test each other, establish their personal identity and create an impression within the group with most consideration given to structure of the team, code of conduct, objectives, individual roles and responsibilities.\n\nIf the team is more diverse, it is more difficult for the team to maneuver through as this stage takes longer. Therefore, in the formation of multicultural teams it is a particularly sensitive stage as it is characterized by commonality, courtesy, caution and confusion. To take the team to the performing stage leadership is crucial. Team members will not be comfortable if there is lack of clarity. If a leader could not direct the team members effectively, team would not able to reach the next stages of the team formation; therefore this stage does impact the success or failure of the project leadership. When team members truly consider that they are the part of a team, generally this stage is complete.\n\nTable 1: Members and Leadership competencies in Forming stage of a team.\n\nMember competencies needed:\n\nLeadership competencies needed:\n\n • Asking open-ended questions\n • Maintaining equity and being fair\n • Listening without making assumptions and judgments\n • Helping the group to articulate its purpose and overriding goal\n • Observing group patterns of communication\n • Facilitating discussions\n • Using inclusive communication patterns\n • Intervening to include all\n • Disclosing one’s needs appropriately\n\nStage 2 – Storming:\n\nThis phase of team development is typically marked by conflict between team members, criticism and tension. Conflict arises due to the competing approaches to obtain the group’s goals, disagreements over responsibilities and appropriate task related behavior. Team members might disagree about who should be leading the team and how much power the team leader should have and can result in redefining of the team’s overall goals and specific tasks. Team members are likely to individually decide their level of commitment to the group tasks and extent, to which they like the team tasks, therefore may resist the control imposed by the team.\n\nAt storming stage the team members may begin to withdraw, therefore this stage relates to the success or failure of the project leadership. If leaders coach their teams effectively, teams can proceed to the next stage. Therefore this stage is a critical stage for the group survival and effectiveness as the conflict harms the team progress and negatively affects some interpersonal relationship. When team’s control is no longer resisted by the team members and everyone in the team agree about who will lead the team, this storming stage is completed.\n\nTable 2: Members and Leadership competencies in Storming stage of a team.\n\nMember competencies needed:\n\nLeadership competencies needed:\n\n • Using inclusive language and behaviors\n • Establishing an agreed-upon work plan\n • Managing emotional expression\n • Using mediation skills\n • Giving and receiving feedback appropriately\n • Using diverse methods of feedback and conflict transformation\n\nStage 3 – Norming:\n\nAt this stage norms and expectations about what different members are responsible for doing are realize and develop as the team delineates task standards, develop intra group cohesiveness and establish standards, rules and regulations. Team members really start to feel their belongings to the team and the development of close ties with other team members. Therefore this phase of team development is characterized by: commitment, collaboration, cooperation and cohesion as team members attempts to mutually agree upon objectives and goals, accept different opinion and try to open exchange of information. Feeling of belongings and friendship to team, help to work towards team goals.\n\nAt the norming stage the leader facilitates and enables their team to establish the standards and reach to the performing stage. By the end of this stage, standards to guide behavior in the group are agreed by the team members. This stage is similar to the participating stage of the situational leadership model. If the leader does not participate to establish standards, the team may develop their own standards and norms which may me contrary to the project overall objectives and lead to the project leadership failure. At this stage the major decisions are normally made by the team members jointly and the minor decisions may be delegate to the individuals.\n\nRead also  Implementing Self Directed Teams Management Essay\n\nTable 3: Members and Leadership competencies in Norming stage of a team.\n\nMember competencies needed:\n\nLeadership competencies needed:\n\n • Demonstrating support on task and in relationships\n • Reinforcing high standards for task\n • Recognizing individual and cultural differences in how appreciation is shown\n • Coaching where needed\n\nStage 4 – Performing:\n\nThis is the stage at which real work is done, team members know their role and duties and performing their work according to the expectations. Team members concentrate on the achievement of common goals and objectives. Sometime it can take long to reach to the performing stage, in most cases when they are self-managed work teams. Team members make progress towards common goals and feel comfortable working within their roles. This phase is marked by consideration among members, creativity challenge and group consciousness. At this stage the team morale is high and team has a good ability to focus on the task as relationship issues have been resolved. At the performing stage the team may produce another successor leader.\n\nAt this stage the team members does not need assistance and instructions, but they need delegated tasks from the leader. Therefore at this stage leader delegates, observes and almost detach, this stage is similar to the delegating stage of the situational leadership model. This is the main stage where actual work will take place; delegation of wrong tasks to wrong person may lead to project leadership failure.\n\nTable 4: Members and Leadership competencies in Performing stage of a team.\n\nMember competencies needed:\n\nLeadership competencies needed:\n\n • Adapting and changing\n • Establishing a process for incorporating change and renewal\n • Including new members\n • Sharing leadership\n\nStage 5 – Reforming or Adjourning:\n\nAt this stage a task force teams disbands after the fulfillment of its goals or due to poor performance. But some teams are permanent (ongoing work teams), therefore may not reach to the adjourning stage and often remain to the performing stage. This final stage can be characterized by communication, closure, compromise and consensus. The adjourning phase is not the main task of developing a team, but this stage is very relevant to the team members.\n\nTable 5: Leadership Activities at Different Group Formation Stages\n\n\nLeadership Activity\n\n\nDirect the team and establish objectives clearly by negotiating ground rules.\n\n\n • Explain “forming, storming, norming and performing” idea for people to understand why conflict’s occurring, and that things will get better in the future.\n • Teaching assertiveness and conflict resolution skills.\n\n\nHelp the team take responsibility for progress towards the goal by arranging a social, or a team-building event.\n\n\nDelegate as far as possible. Once the team has achieved high performance, the aim now is to have as “light a touch” as possible by focusing on other goals and areas of work.\n\n\nWhen successfully achieved the objectives time should be taken to celebrate the achievements.\n\nThe above table clearly depict the relation between the stages of team formation and successful project leadership, the reverse will mean failure.\n\n4. Conclusion\n\n\nSuccessful project leadership should realize that not all teams and situations will behave in the way depicted by Tuckman. However, in using this approach, the leader should not attempt to force situations to fit it but make sure that people don’t use knowledge of the “storming” stage as a license for boorish behavior. There are some drawback with Tuckman’s team formation modal as it does not talk about the time teams do spend and should spend in different project and external environment does not take into account.\n\nPaper 2\n\nCritically evaluate of the dynamic between Task, Team and Individual as related to managing a project successfully.\n\n1. Abstract\n\nPeople in organizations work in teams in achieving stated goals and objectives. The extent to which project success relates to the management of task, the individuals and the teams formation in the pursuance of these goals and objectives are not of equal proportion and need to be well judged and balanced by the leader.\n\nThis assignment will use John Adair’s Action Centre Leadership model to related the dynamic between task, individuals and team; critically discussing the extent to which these three needs are related to the management of a successful project.\n\n\nOne person cannot handle whole project, he/she need other individuals an effective team to successfully complete the project. An effective team is a team who has high commitment, is highly appreciated by upper management, is always ready (adaptive) to change open to new ideas and always achieves its goals.\n\nBailey and Cohen (1997: 4) considers a team as “a collection of individuals who are interdependent in their tasks, share responsibility for outcomes, see themselves and are seen by others as an intact social entity, embedded in one or more larger social systems and who manage their relationships across organizational boundaries.”\n\nAdair’s Action Centred Action (ACT) model will be used to find the dynamic between task, team and individual as relate to managing projects successfully, as this model identifies three core interrelated functions, which explain the management and leaders core management responsibility. These three core function consist task: achieving the team’s goal. team: developing and building your team, so that it’s ever more effective. individual: helping individuals develop their full potential in the workplace.\n\nRead also  Definitions of job satisfaction\n\n\nDavis (2001) identified three factors, which can determine whether the team is effective or not, such as:\n\n • The people (individual) within the team: Effective team determining factor for individual aspect\n • include personal job satisfaction, low or no conflict and power struggles, having job security,\n • appreciation by management and mutual trust of colleagues.\n • The organization’s rules and culture: includes the people do thinks and believes of the individuals.\n • The tasks to be completed: including appropriate leadership, team involvement in decisions, appropriately skilled team members, challenging work, goals and objectives.\n\nAccording to Davis (2001) it is easy to appreciate the impact of organizational rules and job tasks on each other and on people (individual), but it is much more difficult to understand the impact of individual-related factors on other factors of successful teams of a successful project. Individual related factor such as trust is a major component in forming an effective working team that achieves results. Leaders/ managers are primarily responsible for creating trust.\n\nAdair (1997) describe the best leaders is who balance the task, team maintenance, and individual needs.\n\nBalancing task, team and individual\n\nAdair found that effective leaders pay attention to three areas of need for members of the team: those relating to the task, to the team itself and to individual team members with emphasis on variation with all three interdependent variables.\n\nTeams can be more effective for making decisions effectively and quickly than the traditional hierarchical structure according to the large body of research (Thompson 2008). As group members come and go, due to turnover, promotions, hiring and other reasons; therefore resulted over time change in teams, goals, group tasks etc (George et al. 2008). Teams can be classified on the basis of size, organizational level, composition, potential contribution to organizational performance, objectives, permanent versus temporary. According to Colloquia et al., there are 5 general types of teams such as work teams, management teams, parallel teams, project teams and virtual teams.\n\nLeadership is the ability to affect human behaviour to accomplish a mission, the act of influencing\n\npeople to set and achieve goals (McGraw, 2009). Great leaders are visionary people who are able to achieve results using people. They exhibits authority in themselves and exhume confidence in their team members. Some leaders are democratic, allowing team members to express their opinions. Some are dictatorial, explaining what they want from their teams to the team members to execute. All styles have opportunity and challenges and may be used in certain circumstances.\n\nTeam leaders must also realise that there are different types of human traits that can be exhibited among team members. These traits rarely have advantage over others as they are complementary. It is the duty of an effective team leader to identify the trait in individual members of his or her team and know how to use the qualities to advantage. All these traits have the qualities which effective team leaders can exploit and none is better than the other.\n\nTasks are those activities that need to done in order to achieve the desired goals and outcome. Leader can help to facilitate these tasks by planning the work, allocating the resources, checking performance and reviewing progress. Team maintenance relates to maintaining good relation and building team spirit, training the group, maintaining discipline. Individual needs can be satisfied by attending to personal problems, training the individual, giving them status and praise, meeting their needs and reconciling conflicts between group needs.\n\nTo achieve the task, management should make it clear who is going to do what, proper delegation of responsibilities, everyone is clear about the objectives, is adequate authority delegating to the team, are working conditions right for the group, have the time planned affectively, who will cover the absent person, is there adequate resources to complete the tasks.\n\nIn building and maintaining the team, management should make it clear is the size of the team is correct, are the right people working together, are the rules seen to be reasonable, is the team motivated to achieve the tasks, is the conflict dealt properly, does the team accept the objectives do the team knows about the expected standards of performance.\n\nIn developing the individual, management should make it clear that have the targets been agreed and quantified, does the individual know about their contribution to work, overall result, does the individual got sufficient authority to achieve the task delegate to them and has adequate provisions been made for retaining and training team members.\n\nAccording to the Hackman (1987), there are 3 primary definitions of team success, and these relate to the task, social relations, and individuals. A successful team completes its task. While completing the task, team members develop social relations that help them work together and maintain the team. Teamwork should help to improve an individual’s social and interpersonal skills.\n\nMullins (2010:369) suggests that the action taken by the leader in any one of these area of need will affect one or both of the other areas of need with the ideal position been the complete integration towards the achievement of all three. However, building the team and satisfying individual needs are considered to be part of leadership whilst achieving the common task involves the process of management.\n\nAccording to Robbins (1998) Individual behavior have key variables, which make up individual difference. Every individual has their own attitudes, personality, values, talent, ability to learn, motivation factors, perceptions. Different nature of these variables (attributes) make individual different.\n\nAttitude is the judgment an individual make about events and people. This judgement can be positive or negative. Basic values influenced attitude and attitude affect the individual behaviour. Sometime attitudes can change, while values are unlikely to change.\n\nValues: Values are the general belief about what is good and bad. Values affect the individual behavior and attitude and difficult to change.\n\nRead also  Constantly Seeking To Improve Its Performance Management Essay\n\nPersonality: Individual act and behave in a particular way, which called personality. Personality can be learned and inherited.\n\nTalent: Talent means the intelligence and ability of the individual. Level of person’s talent will depend on how those people perform their job.\n\nAbility to learn: This is related to the change in behavior based on experience and getting new ideas.\n\nMotivation: Motivation means willing to do something with inspiration, not by force. Different individual have different motivating factors, such as money, name and fame etc. According to Bowditch et al the motivation of team members of joining a team, strongly influence cohesiveness of the team and the member’s productivity.\n\nPerception: Different people give different meaning to what they see around them; therefore people perceive things in different ways.\n\nBy Knowing about individual differences leaders can understand why individual respond differently. Leaders should appreciate that it is difficult to change values, therefore they may be try to change attitude. As attitude affect behavior, which affect job performance and motivation. The key learning point from these different factors is that if leader want to get best from their team he should appreciate that individuals need to be treated differently.\n\nThere is also Myer-Briggs model (1956) which effective team leaders have to contend with. This model is about personality types. Myer-Briggs identified four ways people differ from each other. These are: the way they think; the way they view; the way they feel/perceive and the way they see things. Team diversity include language difference, cultural difference, background difference, qualification difference, class, age, sex and experience also have effects in a team which the leader must manage. Mckenna and Maister draw attention on the importance of group leader establishing trust among the group by helping them understand the behaviours that build trust (Cited in Mullins, 2010).\n\nSuccessful project management will require the following list of common tasks for each of the three management responsibilities so that leaders will balance their resources appropriately.\n\n\n\n\nEstablish deadlines for project tasks, and explain the quality standards expected.\n\nEnsure that everyone in the team has the skills and training to accomplish the final goal\n\nHelp define each individual’s role within the team and agree the tasks they are responsible for.\n\nClearly state the final goal of the team.\n\nMonitor team relationships, and resolve conflicts where necessary.\n\nAppropriately praise and reward individual team members for their contribution to the team.\n\nEnsure everyone understands the resources, people, and processes that they should be using\n\nIf team will be working in smaller teams, appoint a leader for each team, and ensure that he/she is effective and properly trained.\n\nEnsure that one on one time is spent with each member: identify their strengths and weaknesses, their needs, and any special skills they can bring to the team.\n\nCreate a detailed plan for how the group is going to reach their final goal.\n\nWork on keeping the team motivated with high morale.\n\nIf any team members seem to be lagging behind, coach them until they are back on track.\n\nIdentify the purpose of the team and communicate team members.\n\nIdentify the style the team will be working in (very formal, relaxed, etc.)\n\nEnsure each team member has the skills to perform his or her role successfully.\n\nGive regular feedback on the team’s performance.\n\n4. Conclusion\n\nLeaders have many responsibilities when it comes to managing their teams. And, it’s easy to get so focused on one area that the others slip by the wayside, leading to an unbalanced, poorly-functioning group. ACL model states that leaders must balance the actions they take across all three key areas if they want their project to succeed. The areas are interdependent; if a leader focuses too much on one area and neglects the other two, then the group will experience problems. The leaders do not necessarily have to divide their efforts equally across these but balance according to the situation and over time. Using a tool like Action Centered Leadership can help any leader stay on top of the most important responsibilities, and keep the group working efficiently, happily, and productively.\n\nJohn Adair’s simple Action-Centered Leadership model provides a great blueprint for leadership and the management of any team, group or organisation. Good managers and leaders should have full command of the three main areas of the ACL model, and should be able to use each of the elements according to the situation. Leaders who are able to achieve the task; building the team and develop keeping the right balance, gets results, builds morale, improves quality, develops teams and productivity, and is the mark of a success.\n\nReferences and Bibliography:\n\nAdair, J (1997), cited in Management Extra Leading Teams; page 43\n\nBailey and Cohen (1997), cited in Halverson B. Claire; Trims S. Aleel: Effective Multicultural Teams-Theory and Practice, page 4\n\nBelbin R. Meredith: Team Roles at work; 2nd Edition, page 122\n\nBelbin, M. (2004) Management Teams – Why They Succeed or Fail? 2nd Edition. Oxford: Elsevier Butterworth-Heinemann. ISBN 0 7506 910 6.\n\nColquitt A., Jason; Lepine A., Jeffery; Wesson J., Michael: Organizational Behaviour (2nd Edition)\n\nDaniel Levi: Group Dynamics for Teams (2nd Edition) page 20\n\nGeorge M., Jennifer; Jones R., Gareth; Understanding and managing organizational Behaviour (5th Edition.); 2008\n\nHarvard Davis (2001), cited in Management Extra Leading Teams; page 7\n\nHondon (2002), cited in Managing People in Organizations Contemporary Theory and Practice by Dr Jeremy Adams.\n\nMaking the team: a guide for managers / Leigh L. Thompson. (3rd Edition)\n\nMullins J., Laurie (2010): Managing and Organizational Behaviour (8th Edition),\n\nMarx, K. and Engels, F. (1947) The German Ideology. New York: International Publishers.\n\nOyedele, O (2010) Team Management: Lessons from the Leadership Styles of Successful Team Managers, Glasgow Caledonian University, June 2010\n\nRobbins (1998), cited in Management Extra Leading Teams; page 7\n\nThompson, L. (2008). Leading high impact teams. Team leadership survey from the Kellogg School of Management Executive Program. Evanston, IL: Northwestern University, cited in Making the team: a guide for managers/ Leigh L. Thompson. (3rd Edition)\n\nOrder Now\n\nOrder Now\n\nType of Paper\nNumber of Pages\n(275 words)", "pred_label": "__label__1", "pred_score_pos": 0.9967048764228821} {"content": "\n\nRomanticism in Frankenstein\n\nHaving lived between 18th and 19th century, author Mary Shelley was greatly influenced by the intellectual movement of romanticism. Since she was closely associated with many of the great minds of the Romantic Movement such as her husband Percy B. Shelley and Lord Byron, it is natural that her works would reflect the Romantic trends. Many label Shelley s most famous novel Frankenstein as the first Science Fiction novel in history because its plot contains the process of a scientist named Victor Frankenstein creating a living human being from dead body parts, but that is only a part of the entire novel.\n\nAt its core, Frankenstein is a product of Romanticism featuring the traits of a Romantic hero on a Romantic quest, the embracement of nature s sublimity, intense emotions felt by fully experiencing life, imagination breaking away from social conventions, and anti-enlightenment. One of the key features found in Romantic literature is the Romantic hero, also called the Byronic hero after Lord Byron, pursuing a Romantic quest. Victor Frankenstein life story, which is at the heart of Frankenstein, is a Romantic quest toward self-destruction, and Frankenstein represents the Byronic hero almost exactly. The Byronic hero is not as virtuous as conventional heroes but, instead, has many dark qualities. He is an extremist considering his pride, intellectual ability, passions, hypersensitivity, and self-destructiveness. Frankenstein is such a person with genius, arrogance, and passion for the study of natural philosophy and knowledge of the world.\n\nThese are the reasons that drive him to the obsession with discovery of the secret of life. As the novel progresses, Frankenstein becomes increasingly self-centered, moody, irresponsible for his creation of the monster, and self-destructive, ultimately leading to his complete isolation which is yet another characteristic of the Byronic hero. Another feature of Romanticism found in Frankenstein is the attitude of anti-Enlightenment.\n\nWhereas the Enlightenment emphasized rationality as the means to establish ethics, aesthetics, and knowledge using reason and science to explain life and forces of nature, Romanticism called for obtaining knowledge of life through intuition and experiencing life instead of studying it. Frankenstein at first may seem to be promoting the ideas of Enlightenment with Walton exploring the North Pole and Frankenstein studying natural philosophy and trying to find the secret of life through the deductive reasoning of science.\n\nHowever, with Walton failing to explore the North Pole and Frankenstein s scientific creation spinning out of his control, Frankenstein emphasizes the theme of the danger of discovering knowledge with reason and science. Frankenstein devotes almost his entire life to the study of natural philosophy and the creation of the monster in eagerness to understand the secret of life, yet this act of creation eventually results in the destruction of everyone close to him and his ultimate isolation.\n\nLikewise, Walton attempts to surpass previous human explorations by navigating to reach the North Pole but eventually finds himself trapped between sheets of ice unable to reach his goal. Mary Shelley is conveying a message as a Romantic, with the characters of Walton and Frankenstein, that the thirst for knowledge and the attempt to explain life through science, both of which are valued during the Enlightenment movement, can be destructive. Nature sublimity and intense emotions realized through connection with nature, a major emphasis of Romanticism, is another theme presented in Frankenstein, namely in the characters of Frankenstein and the monster. Sublime nature is continually seen throughout the novel with Frankenstein and the monster s numerous individual experiences with nature, and combined on the summit of Mountanvert. Time and time again, Frankenstein experiences spiritual renewal by turning to nature after remorseful, traumatic events such as the creation of the monster and the death of William and Justine.\n\nWhile Frankenstein seeks the cold, harsh conditions of the Alps for comfort, as if to freeze his guilt about the death of William and Justine, the monster finds happiness in the soft colors and smells of a springtime forest, symbolizing his desire to reveal himself to the world. He says, for example, °It surprised me, that what before was desert and gloomy should now bloom with the most beautiful flowers and verdure. My senses were gratified and refreshed by a thousand scents of delight, and a thousand sights of beauty. (Shelley 81) Cheered by the beautiful scenes of spring, the monster is able to temporarily push away the negative aspects of his life. Many more of similar occasions occur in the novel, all of which clearly demonstrates the influence of Romanticism in Frankenstein. Yet another trait of Romanticism of the emphasis of imagination and individuality free of social conventions is paralleled in Frankenstein with the characters of Walton and Frankenstein. Walton is self-driven with his persistent passion for the dream of navigating to the North Pole and unconventional thinking to explore the unexplored.\n\nRelevant Topics Readers Also Choose\n\nFrankenstein is also self-driven with his passion for natural philosophy and the creation of the monster. The idea that he is able bring a being pieced together by dead body parts to life is outrageous not only in the 19th century but today also. Frankenstein s boundless imagination and independent mind are what allows him explore the subject which society would tell him to avoid. In this sense, the novel is similar to others of the Romantic period in their plot of putting imagination into work and demonstrating what is humanly impossible.\n\nMary Shelley wrote Frankenstein in the midst of the Romantic Era influenced by many famous intellectuals of that time, and as a result the novel reflects the culture and values of that period. Many traits of Romanticism can be seen in the experiences of Walton, Victor Frankenstein, and the monster told in the novel. While some may claim Frankenstein to be a Science Fiction novel for its inclusion of the scientific process of creating a live human being, it is foremost a Romantic novel, showing features of Romanticism from many perspectives.\n\nGet Access To The Full Essay\nSorry, but only registered users have full access\n\nHow about getting full access immediately?\n\nBecome a member\nWe have received your request for getting a sample.\n\nPlease choose the access option you need:\n\nThis material doesn't solve\nyour task?\nFind the most relevant one", "pred_label": "__label__1", "pred_score_pos": 0.9910770058631897} {"content": "Couldn't find what you looking for?\n\n\nSternum is a flat bone in the middle of the thorax, which is the region between the chest and the organs, including the heart and the lungs. It provides support for the shoulder bones and the ribs. The ribs are connected to it through costal cartilage, which keeps them safe and in place. This bone provides vital protection for the internal organs. Without it, there would be a gap in the middle of the chest and even the smallest trauma to the area would be very dangerous for the lungs and the heart. In fact, without the sternum as protection, any blow to the chest could be fatal.\n\nAs for the injuries to the sternum, they include fractures and a problem called bruised sternum.\n\nCauses and symptoms of bruised sternum\n\nThe sternum can become bruised due to injuries such as car accidents, where the driver did not wear the seat belt, or in sports injuries, especially in contact sports. Athletes who do sports like boxing, kick-boxing, rugby, football, martial sports and such should always wear protective gear as the blows to the chest are very common in those sports and bruised sternum is a common sport injury.\n\nBruised sternum can also occur due to very forceful and violent coughing.\n\nThe symptoms of bruised sternum include, of course, bruising and pain, which can range from moderate to severe, especially during movement. The pain becomes particularly sharp when laughing or coughing, and even during rest the area is very tender. There may also be some swelling, and the pain may be present while breathing. Because of the pain when breathing, many people take short and shallow breaths, which is not recommended because it may lead to chronic shallow breathing and infections.\n\nTreatment for bruised sternum\n\nThe recovery time for bruised sternum usually lasts from four to six weeks. During this period, it is recommended to breathe normally and to use treatment designed to alleviate the symptoms. It is also recommended to refrain from strenuous activity, especially from the kind of activity that aggravates the pain.\n\nThe pain can be managed with analgesics, which can include non-steroidal anti-inflammatory drugs or opiates. Doctors usually recommend ibuprofen, ketoprofen, naproxen, flurbiprofen and fenoprofen.\n\nEven though the treatment for bruised sternum focuses on alleviating the pain, it is highly recommended to see a doctor in any case of sternum injury, because the chest is a delicate region and there can be other damage to it apart from the bruised sternum.\n\nYour thoughts on this\n\nUser avatar Guest", "pred_label": "__label__1", "pred_score_pos": 0.5620650053024292} {"content": "How the egyptian pyramids were built and the purposes they served\n\nThe original building was never finished, and may not have attained any great dimensions. In fact, it is worth asking if it was ever re-sealed at the bottom end.?\n\nOne portcullis was positioned between the new Kings Chamber and the tunnel to the old Kings Chamber. This is the natural decay process for these isotopes and is low energy.\n\nAncient Egypt\n\nWe now come to an example of the real purpose of geometry. In real life the inertia of the massive block and barge [about 20 tons] would also be too large to negotiate the bends and islands with human power and paddles. All that we additionally require is a smooth round polished wood or metal pole mounted at the edge of the pyramid for the ropes to turn over.\n\nDespite other names for Memphis, \"White Wall\" stuck as the name of the 1st Nome of Lower Egypt, which includes the immediate area of the city, but not the long range claimed by Romer.\n\nAncient Egyptian architecture\n\nThe Queens Chamber is extremely irregular in shape. Although the lowest step can technically be completed first, that would mean many more lifts using ropes and shadoof devices in series. The spent cores would advance along a canyon over a period of weeks before being chemically processed.\n\nIt was also discovered through scale model experimentation that to start the block rolling, a single knock with a correctly sized battering ram was required to provide additional acoustic energy.\n\nThe famous tower at Borsippa, on the left bank of the Euphrates, whose ruins now go by the name of Birs Nimrud, was a temple dedicated to Bel-Nebo, and rose in seven tiers or stages, representing the seven planets. What other kind of energy source can be used anywhere?\n\nTombs of the elite could also include fine jewelry. Build a lattice tower structure from wooden poles in a triangular pyramid shape with a height to width ratio of about 6 to 1. This kind of death was viewed as venerated, and only priests was permitted to touch the body.\n\nRelatively small quantities of stone would be required to build those secondary ramps, overlaid with wooden planks or split poles.\n\nSix inches of air or a very thin layer of paper will absorb alpha radiation. These attitudes and their potential dissemination through society counterbalanced inequality, but how far they were accepted cannot be known. The text quoted above also gives great prominence to the dead, who were the object of a cult for the living and who could intervene in human affairs; in many periods the chief visible expenditure and focus of display of nonroyal individuals, as of the king, was on provision for the tomb and the next world.\n\nThe case for this claim is developed in the remainder of this paper. An example of cursive hieryoplyhpic writing: Complete facsimile copies of Egyptian monuments have been published since the s, providing a separate record that becomes more vital as the originals decay.\n\nKings of Sumer and Akkad\n\nWe have no idea. The Pharaoh was the ruler of Ancient Egypt, both politically and religiously.Ancient Egyptian culture flourished between c. BCE with the rise of technology (as evidenced in the glass-work of faience) and 30 BCE with the death. Information and facts about ancient egypt: facts, gods, religion, pyramids, pharaohs, history, hieroglyphics, timeline, art, clothing.\n\nThe Great Pyramid at Giza\n\nIndex of Egyptian History. Egyptian history constitutes an awesome period of time. Including the Ptolemies, it covers at least three thousand years (c. Learn how to use The Healthy Eating Plate as a guide for creating healthy, balanced meals—whether served on a plate or packed in a lunch box.\n\nA Surveyor Looks at the Washington DC Planing Map. When I was first introduced to the idea that there were symbols embedded in the Washington, D.C. landscape I was working as a carpenter. History and Development of Egyptian Sculpture. Despite the wealth of materials and quantity of production, Egyptian sculpture changed so gradually that it is not easy to trace a precise evolutionary path - from the earliest dynasties we find a fully developed art.\n\nReal life experiments that reveal the ancient art and techniques of building Egyptian pyramids Download\nHow the egyptian pyramids were built and the purposes they served\nRated 4/5 based on 20 review", "pred_label": "__label__1", "pred_score_pos": 0.589522123336792} {"content": "Please Read This Interview Carefully: Karen Havelin on Writing Pain\n\nMay 1, 2019 | 3 books mentioned 9 min read\n\nI began reading Karen Havelin’s debut novel Please Read This Leaflet Carefully with the intention of reviewing it. Havelin’s protagonist Laura, a Norwegian expat who has settled in New York, lives with endometriosis and the chronic pain it causes. I was determined to be a good literary citizen and review as many books as I could before the September release of my debut essay collection, Codependence, which centers in part on my intractable headaches. A novel centered on another woman’s chronic pain seemed a good place to start. But as I got further into the book and learned that Laura’s health issues have their roots in Havelin’s own experience, I became less interested in writing a straightforward review and more curious about what we could learn from putting our books and bodies in conversation.\n\nHavelin was diagnosed with endometriosis at age 29, though her symptoms went undiagnosed for 10 years. Endometriosis affects over 170 million women worldwide, and according to the CDC, women are more than twice as likely as men to suffer from headache disorders; although more women report chronic pain than men, studies show that doctors and researchers often dismiss or overlook women’s pain. Havelin and I arranged a video chat—no easy task when one of you is in Norway—and discussed her novel and its aims, how pain affects our writing lives, inequities in pain treatment, and more.\n\nAmy Long: In telling people about your book, I’ve called it “a novel about a woman with endometriosis,” and it is that, but I also know that description is reductive. How do you describe the book? What did you hope to explore or communicate or accomplish with it, particularly by centering the narrative on this specifically feminine pain syndrome?\n\nKaren Havelin: I’ve been thinking about it a lot recently because I’ve been filling out questionnaires for publishers in three different countries [the U.S., the U.K., and Norway], and the book gets presented in different ways in different countries and by different editors. It’s important to me that the book is viewed as a work of art that explores larger ideas about human frailty, human bodies. At the same time, I want it to reach people with endometriosis and other illnesses, I want to get people to talk about endometriosis, and I want the book to reflect an experience I’ve never read or seen in media. I grew up reading books, and I never read a book that I saw myself in. Every time I read a book about someone who was sick, they always had cancer, and they always died or were cured. The narrative arc was predictable, and I wanted to subvert that with the structure of my book.\n\nALI wanted to ask you about the reverse chronology. So many illness narratives sort of go, “I was sick, and then I got better, and I’m so grateful to my illness for teaching me XYZ.” I really wanted to avoid that in writing about my chronic pain, and I think you did, too. How did reversing the timeline help you challenge that typical narrative arc?\n\nKH: Mostly, the structure allows me to loop over the same issues again and again. That way, I can depict Laura’s pain and how it’s still there even at points when she’s doing “better.” And at some points, she has the illness, but she doesn’t know what it is, but it’s still influencing her. So, as readers get further into the book, they know more, and Laura knows less about her illness, herself, her relationships. She’s pretty young by the end of it, so we see her change a lot.\n\nThe structure also creates a kind of multitude of potential endings. I go into a moment of her life in each section of the book [Please Read is divided into eight sections], and at the end, she’s kind of sick, and she’s going to get sicker, but she’s also okay at that moment. There are all these scenes in the last chapter that show her loving her body and using it and having fun and feeling a sense of expansiveness. I think of it as a lighter part of the book, but I hope all the different parts will resonate with each other since they do circle back to the same themes again and again from different angles.\n\nAL: What would you say those themes are?\n\nKH: Bodily frailty and what happens when it encounters love and relationships, growing up, anger. Self-presentation is something I think about a lot, both in terms of gender and being a patient. With pain management you have to present yourself in the right way so you get what you need from a doctor who might not really be listening to what you’re saying because he has, like, 10 minutes, and he’s going to judge everything you do and say even if you are perfect.\n\nRecently, I was talking to the chairwoman of the Norwegian Endometriosis Association, who is a nurse. She was at least in her 30s when she got sick, so she was an adult and she had a formal medical education; she was a professional, and she still couldn’t advocate for herself. It seems like, no matter how perfect you are and no matter how well you present yourself, you can’t get away from the stigma. Being a female patient alone in a room with a male doctor trying to make yourself understood and heard is really difficult, and this is part of the picture with endometriosis, why it takes so unnecessarily long to get a diagnosis.\n\nAL: Exactly. Did you ever read that study “The Girl Who Cried Pain”? Leslie Jamison mentions it in her essay “A Grand Unified Theory of Female Pain.” The researchers found that, when men report pain, they tend to get painkillers for it, and women more often get tranquilizers because our pain is “all in our heads.”\n\nKH: Oh, yeah, I’ve heard of that. It’s so interesting, but I can’t even read that stuff because it makes me want to set myself on fire.\n\nAL: Do you think you captured the complexities not just of gender but of race, class, and sexuality in pain treatment?\n\nKH: I’ve tried to be cognizant of the intersections of gender, race, and sexuality. I certainly am not the person to enlighten a lot of people about race. U.S. racial stuff is different and more complex than it is in Norway, and I’m always nervous talking about it because, though I’ve learned a lot, I need to learn more. And I know that women’s pain gets downplayed, and race is definitely a part of it. There have been some studies that find that black women and women of color have it even worse. There’ve been a lot of moments in my life when I feel like I’ve barely squeaked through, and I have a lot of support and privilege, and I don’t even have to pay medical debt. And, still, it’s almost too hard.\n\nAL: I wanted to ask you about the ice-skating sections. You use definitions of ice-skating moves to sort of introduce or expand on themes and plot points. But Laura is also a former figure skater. Can you talk about that formal element of figure skating as a plot device and a way to explore the body in pain?\n\nKH: I had this book about figure skating, and I looked at all these definitions of jumps and pirouettes and stuff, and I thought there was a weird kind of poetry to them. Even as a former figure skater, I can’t really picture it. It sounds like it’s magic or ridiculous—like, how could anybody do that? It’s a kind of art and a kind of bodily mastery, and I just like the poetry of these weird little snippets. I think it reflects trying to do something that’s basically impossible but that you can somehow still do.\n\nAL: Which is sort of like dealing with pain all the time. Like, you think you could never do it—\n\nKH: But somehow you do.\n\nAL: There have been a few recent nonfiction books that focus on endometriosis or on women’s pain specifically, but I don’t think I’ve ever seen a novel centered on it. Why did you choose to write Please Read This Leaflet Carefully as a novel, and what do you think fiction allows you to do that another genre such as memoir wouldn’t have? And what were the biggest challenges you faced translating something you’ve experienced into fiction?\n\ncoverKH: Yeah, Abby Norman wrote a brilliant nonfiction book last year about endometriosis, Ask Me About My Uterus, and it’s like my worst nightmare medical experience interspersed with the whole of patriarchal medical history, so it’s a tough read for me, but it’s so good. Writing this as fiction is, again, like, doing something impossible and somehow still doing it. But, no, writing fiction means you can do whatever you want, and writing is hard enough without having to stay true to real life. So, I think all writing for me is a question of trying to create a little bit of private space somehow. Or, like, be left alone.\n\nI made a very radical change when I left Norway to do my MFA at Columbia. I changed language and genre. I’d mostly written poetry before. It was kind of an insane thing to do! And it also meant that I didn’t have any backlog [of stories to turn in for workshops and classes], so I had to start writing a lot very quickly when I got there, so I couldn’t really help that the writing reflected what had been happening in my life. I had to submit a lot of pages, so it was an intense time. Everything I was reading and doing just kind of came out. And then I had these different sections, and it took me a long time before I figured out how to combine them into a novel. Or whether that could even be done. I didn’t just want to write a story about someone who gets sick. Not that there’s anything wrong with that story. There aren’t enough stories like that either.\n\nAL: Is it the distance that helps you—the idea that this is a character and not you—or did you add in things that haven’t happened to you?\n\nKH: Laura has a lot in common with me in terms of physical health. She isn’t me. She actually gets off really easily compared to me! So, she gets a pretty good deal in the end, which is also something that I definitely wanted. I wanted to make sure that it had a happy ending: like, she’s okay, but she’s also not okay, but she’s okay. There’s that balance at the start of the book. She has a job, she can write. When she’s out in the world, no one really knows she’s sick. She has her limitations, but they’re not as harsh as they could be.\n\nAL: In an early scene, Laura describes her shoulder pain as hot and nauseating, which stuck out to me because I use both those terms to describe some of my headaches. Do you ever worry or just wonder how people who don’t know chronic pain will interpret your descriptions and if they’ll make sense? How do you think the book will read to an audience for whom this is all totally unfamiliar?\n\nKH: I’ll certainly be interested to find out. In a way, I feel like I’m trying to force the reader to be inside that pained body. And I want to give them some of that experience, which maybe is not going to make people want to read the book! But it will hopefully bring out readers’ empathy. In a way, though, I’m kind of writing more for people like us, who will hopefully read it and go, “Oh, yes! That helps a little bit.”\n\nAL: There’s something sort of validating about seeing your experience represented, especially in fiction because, in nonfiction, it’s often, like, “This is my totally crazy, unique experience.” But, in fiction, the emphasis is often more on universality, so to see something described in fiction is sort of to make it real—more comforting, less alienating.\n\nKH: Yeah. I hope so, anyway.\n\nAL: When Laura is in New York, she feels a sort of freedom that she doesn’t feel in Norway. Do you think, in terms of pain treatment, that she’s better off in one place or the other? What does she have to trade for the freedom she feels in New York?\n\nKH: She gives up a certain safety by not going back to Norway, and that gives her a lot of anxiety, but she feels more free because she feels like nobody’s watching her. She feels like she has more in common with people in New York, people whose lives are strange and unpredictable. And people live these crazy lives right next to each other, where Norway is a small and very conformist type of country where you can feel like you’re very visible. In New York, you get a sense of anonymity, and you’re not in your home country or your home environment. For Laura, it’s maybe not a rational choice, but it’s a choice she feels compelled to make.\n\ncoverAL: The book also features multiple love stories. In her essay collection, Pain Woman Takes Your Keys, Sonya Huber writes that “all pain sex is queer sex.” Laura is also queer, and we see her negotiate pain and sex, particularly with men, a lot in the novel. How does that idea—of pain sex as queer sex—resonate with you?\n\nKH: I love that idea. There’s something important to me about these different identities intersecting and how, for Laura, it’s incredibly freeing to think of herself as queer and have this pride concept that she can use. Even though it’s, like, 10 years before she hears anyone talk about disability or illness in a way that reflects that, it sort of works for her anyway. It comes down to maybe being on the outside a little bit or having an experience that’s not typical. There’s also something about that—how people think that the sex that people with physical trouble and queer people have is more difficult and weird or something.\n\nAL: And kind of gross. Or that people with disabilities or illnesses are kind of sexless.\n\nKH: Yeah. People who are heterosexual and healthy often think that they can go their entire sex lives without ever talking or figuring out anything for themselves. They just try to do what they see on TV, and that’s a terrible idea! If you’re doing something that you’ve never seen—if you’re not trying to reproduce sex you’ve seen in media or something—you have to figure it out for yourself. You have to be open to what the other person wants and realize that not everyone likes the same things or has the same kind of body. All bodies are singular, and even if you are a healthy, heterosexual person, your sex life will be better if you realize that!\n\nAL: Do you see pain always being part of your work, or do you want to move on to something else next time? Do you feel like you can? Do you feel like it’s a thing that will always attach itself to your stories or something?\n\nKH: Oh my god, I would love to move on to something else! But we’ll see. I’ve many times tried to write something different, and it always comes back in. I do feel like there are plenty of stories about pain left to tell; there’s kind of a whole world that I’ve never seen reflected in art. But I would love to write, like, a sexy, action-filled romance next!\n\nfirst book, Codependence, was chosen by Brian Blanchfield as the winner of Cleveland State University Poetry Center's 2018 Essay Collection Competition and is forthcoming in September 2019. She holds an MFA in creative writing from Virginia Tech and a master's in women's studies from the University of Florida. Her work has appeared in Best American Experimental Writing 2015, Hayden's Ferry Review, Ninth Letter, and elsewhere, including as a Notable Essay in Best American Essays 2018.\n\nAdd Your Comment:\n\n", "pred_label": "__label__1", "pred_score_pos": 0.5354875922203064} {"content": "Frequently Asked Questions\n\n\nWhat does AFUE stand for?\n\nGas furnaces are rated for efficiency according to their Annual Fuel Utilization Efficiency, or AFUE. The higher the AFUE rating, the more efficient the furnace.\n\nWhat does HSPF stand for?\n\n\nWhat is a SEER?\n\n\nWhat do efficiency rating numbers really mean?\n\n\nWho do I contact for air conditioning products and service?\n\nFor questions concerning new products, energy efficiency ratings, savings on your utility bills, or repair or replacement services, contact us and we will answer all of your heating and cooling questions.\n\nIs there any advantage to setting my thermostat fan to “On” so the fan runs constantly?\nLeaving the fan on will constantly filter the air in your home. This moving air will give you a more even temperature distribution throughout your home. However, continuous fan mode during the cooling season may not be appropriate in humid climates. If the inside of your home feels uncomfortably humid, it is recommended that the fan be used in “Auto” mode.\n\nHow long does a typical furnace and air conditioner last?\n\nAn air conditioner or furnace typically will last 10 – 20 years with regular maintenance. Sometimes replacing old systems sooner rather than later can save you a lot of money (lower gas and electric bills) from the higher efficiency provided by newer equipment. Life expediencies can vary greatly. The major factors influencing life expectancy are proper installation and regular maintenance. Maintenance is a must to maximize efficiency and protect your investment.\n\nWhat goes into installing a new system?\n\nIf you install a new system, most of the items from the “What happens when I replace my old system?” will need to be changed as well. One of the the most important components installed with a new system is the duct-work. Duct work is composed of two parts, supply and return. The supply ducts are attached to the outflow of the new system, delivering air to each zone in a home.\n\nThe amount of air reaching each zone is determined by the size of supply duct-work connecting it to your system. Air-O service will help you determine the size of all the needed supply duct work in your home. The second part of the duct-work, the return duct, attaches to the inlet of the new system and draws air out of the spaces to be heated or cooled.\n\nAttached to the return duct is the filter. The filter should be placed as near to the furnace or air handler as possible. Duct-work can be either duct-board, flexible duct, or metal and must be properly sized in order to evenly distribute the proper amount of air to each room.\n\nCommon Problems\n\nThe indoor fan runs all the time even though the temperature in the house is fine. Is something wrong?\n\nThere are two settings for the fan: On and Auto. A common mistake people make is leaving this switch to On. Be sure it is set to Auto and the fan should regulate itself normally..\n\nIs something wrong if my heat pump is set for Heating but the air coming out feels cool?\n\nWhile a heat pump is perfectly capable of effectively heating your home, the temperature of the air coming out of the registers is heated to about 90 to 95 degrees, depending on the outdoor temperature. This temperature is approximately 20 – 25 degrees warmer that the indoor air temperature and will warm your house. It is, however, below body temperature (98.6 degrees) and can feel cool when someone puts their hand in the airflow.\n\nSome rooms in the house are either too hot or too cold. Can’t they all be the same?\n\nThey most certainly can. Airflow problems can sometimes be attributed due to a dirty filter, coil, and/or blower which results in reduced air flow passing through the air handler. This causes the air to die off in the outer branches of the duct system.\n\nThe duct work sometimes can come loose and a minor reattachment repair will solve the problem. If the issue is a “duct design” problem Air-O Services should be called in to troubleshoot the situation. Solutions can range from some simple air balancing to replacement of ducts to advanced climate control systems such as a zone system.\n\nMy propane gas furnace is blowing cold air, what should check?\n\nMake sure the propane tank still has gas. To check the tank, flip open the dome lid on top of the tank. Look at the gauge. It will have numbers (percentages) from 0 to 100. Make sure the needle is not on zero.\n\nIs it normal for my heat pump to make a “whooshing” noise followed by some cool air through the heating registers even though it is heating season?\n\nThis is a normal occurrence. During the cold weather months, frost can accumulate on the outdoor coil. This can cause the heat pump to go into a defrost cycle anywhere from 1-10 minutes, depending on the amount of ice on the coil. This is temporary; the system will return to the heating mode once the ice is gone.\n\nHow come my heat pump system will freeze up sometimes?\n\nThe heat pump system can freeze for several reasons. If running in the cooling mode check your filters; restrictions in air flow can lead to freezing. Next, thaw the system out by turning off the cooling and running the fan. You can also try turning the system to the heat mode to melt the ice.\n\nIf the problem recurs after checking for air restrictions and thawing your system. Contact Air-O Service to make a service call. Our service technicians will check the refrigerant level. They may also have to clean the evaporator coil, check the blower speed and check for any intermittency in blower operation. A service technician can also evaluate other conditions that may make your system prone to freezing and recommend the best course of action.\n\nRoutine Maintenance\n\nWhat kinds of maintenance do heating and air conditioning systems require?\n\nMaintaining unrestricted air flows is the most important maintenance for HVAC systems. Dust, dirt, and debris are an HVAC system’s worst enemies. It doesn’t matter if the unit is indoor or outdoor. You must keep all filters and coils clean and free or restrictions.\n\nWe recommend that your heating and cooling system be checked and serviced twice a year. A spring and autumn tune-up is the perfect schedule. We also recommend that you change your filter regularly. This alone can eliminate many of the most common problems that need fixing and can significantly reduce the likelihood of a serious breakdown.\n\nWhy do I need to change my filter regularly?\n\nReplacing your heating and cooling system’s filter on a regular basis helps the system operate at peak levels and improve indoor air quality. Changing the filters regularly will ensure proper air flow and to keep your home free from dust, allergens and germs. Depending on the type of filter you have, you may require weekly or monthly filter replacements. Air-O Service technicians can recommend the ideal filters and replacement schedules for your systems.\n\nHow often should I replace my filters?\n\nAir-O Service recommends that you replace your disposable filters at least once a month. If you have washable filters, they should be cleaned once a month. We can recommend a replacement schedule that delivers the optimum efficiency and filtration for your specific system. We recommend that you visually check filters and filtering equipment monthly. If filters look dirty, they need to be cleaned or replaced.\n\nBesides changing filters what else should I do to maintain my heater and/or air conditioner?\n\nMost major maintenance should be performed only by a qualified Air-O Service technician. But here are some things that you can do to assure optimal performance:\n\n • Make sure outdoor units clear of debris, clutter and weeds if they are on the ground. They can reduce the airflow to the unit.\n • Use caution with weed trimmers and other yard maintenance tools to prevent damaging control wiring.\n • Pet urine can cause expensive damage. Keep your pets away from your outdoor systems.\n\nHow often should I have Air-O Service take a look at my air conditioner?\n\nAir conditioning system should be inspected and maintained at least once a year – spring to early summer being the best times. This ensures maximum efficiency and enables us to foresee any possible problems that may occur in the near future.\n\nWhat are some things I can do to maintain my furnace?\n\nAny forced-air heating system will perform more efficiently (save you money on energy bills and repair costs) if you perform the following tasks:\n\n • Inspect the filters at least once a month and replace them when they are dirty.\n • Make sure all of the vents and air supplies are not obstructed. Make sure nothing is in front of them or on top of them such as furniture, curtains, boxes, toys, etc.\n • Keep areas around furnace clean and clutter free. Keep at least 3 – 4 feet totally clear all the way around your furnace.\n\n\n\n • Keep debris, grass clippings, dirt, and leaves away from outdoor unit.", "pred_label": "__label__1", "pred_score_pos": 0.5237905383110046} {"content": "The ABC of the Indian Bureaucracy\n\n31 May 2018\nThe ABC of the Indian Bureaucracy\nAccountability Initiative's blog series\n\nAccountability Initiative’s blog and social media series deals with terms often heard in government offices which have come to be associated with the bureaucracy. Using wit and acute observation, the series unpacks some of the factors that drive government officials at work, and touches upon root causes that build a perception of the bureaucracy in the eye of the public. \n\nOf Authorisation Letters, Samosas And Chai explores the conundrum of almost absolute obedience to authority based on ranks. It also observes how being hauled up for questioning by seniors, having a red mark on a permanent record, salary cuts, or possible suspension orders issued for deviating from norms hold officials back.\n\nB is for Babu discusses how “Babu ki kami hai!” (there’s a shortage of clerks!) is an all too familiar concern shared by government staff in the middle and lower level offices. Babus are integral to the smooth functioning of government offices, and yet a sneak peek into their work lives and challenges (which this blog provides) has been elusive so far.\n\nA Circuitous Journey delves deep into the all-important bureaucratic artefact- the circular. In practice, the circular acts as the official order or notice giving directions regarding any work, discussion or meeting that the bureaucracy undertakes. In an environment where officials are already inundated with more work than they can cope with, the lack of a circular implies an absence of legitimacy - used both as an escape clause, and a way of discerning the relative importance of the person/task at hand. So is the circular only a directive or a tool for crafty bureaucrats to wield based on convenience?\n\nLastly, How Important Are Deadlines In The Bureaucracy? delves into the management of a multi-layered, diffused and a highly interdependent public bureaucracy. What does the race to meet deadlines look like in the bureaucracy? What are organisational repercussions if a deadline is missed? \n\nIn all, the public bureaucracy, like any other organisation, has a vocabulary, work culture and an internal logic that is unique to itself. You can view the complete set of the series here.\n", "pred_label": "__label__1", "pred_score_pos": 0.9778591990470886} {"content": "Offseason Offerings: John Wall\n\nWith the offseason in full effect, ballers around the country have begun what is widely regarded as one of the most grueling grind modes of the year as they prepare for the up-and-coming season.\n\nEvery week we’ll profile an elite player and have them dish on one of their most unorthodox training methods and explain why it’s been so beneficial.\n\nNext up?\n\nWashington Wizards point guard John Wall, the No. 1 pick in the 2010 NBA Draft.\n\nThe Drill: Ball-less/Court-less dribble-juking\n\n\n\n\n", "pred_label": "__label__1", "pred_score_pos": 0.9811195135116577} {"content": "May 31st, 2017\n\nHow Affordable Golf Clubs Really Are\n\nFor Residents In UK’s Towns and Cities\n\n How Affordable Golf Clubs Really Are\n\nGolf over the years has unfortunately gained the association of being an ‘expensive’ sport, mainly because of the membership price of golf clubs.\n\nNow has calculated how long residents in 18 towns and cities would have to work to earn a membership. decided to calculate how long residents in 18 different towns and cities outside of London would have to work in order to buy a golf club membership, based on the weekly wage for that area. investigated the average cost of a golf club membership in each of the selected towns/cities (Newcastle upon Tyne, Aberdeen, Edinburgh, Swansea, York, Liverpool, Nottingham, Leeds, Oxford, Norwich, Coventry, Manchester, Glasgow, Cardiff, Bristol, Birmingham, Leicester and Southampton) and then, looked at the corresponding weekly wages for residents in the area, using statistics from the ‘Office of National Statistics (ONS)’.\n\nGolf clubs in Newcastle upon Tyne are the most affordable for local residents, as it would take them just 41 hours and 36 minutes to work for a membership.\n\nJust above Newcastle upon Tyne, were golf clubs in Aberdeen, where residents would have to work slightly more, at an average of 43 hours and 13 minutes to attain membership.\n\nLocal residents in Edinburgh, who have the highest weekly wage at £696.30, would have to work the third lowest at 44 hours and 47 minutes to afford membership at their respective golf clubs.\n\nOn the other end of the spectrum, was Southampton which has the least affordable golf clubs for residents, as they’d have to work an astonishing 79 hours and 42 minutes to pay for membership – the equivalent of 10 working days.\n\nLeicester, whose residents have the lowest weekly wage at £521.50, would have to work marginally less at 79 hours and 24 minutes to gain membership – the second highest after Southampton.\n\nOverall, golf clubs in 50% (9 out the 18) of the reviewed towns and cities would require local residents to work more than 60 hours in order to afford membership.\n\nAdditionally, found in a survey of 560 residents in the reviewed towns and cities, that 72% personally believe the current membership prices of their local golf club do not offer value for money.\n\n\nHow not to lose your wedge \n\n How Affordable Golf Clubs Really Are\n\n\nTAGS: GB&I, Travel", "pred_label": "__label__1", "pred_score_pos": 0.8538975715637207} {"content": "Untitled design (2)\n\nMany flags have flown over Santa Fe from long before the first celebration of the 4th of July. New Mexico would not become any legal part of the United States until 1848 following the Mexican-American War. So the first 4th of July celebration was most likely observed when New Mexico entered the Union as a Territory (no elected representation in Washington), which she remained until gaining Statehood in 1912. Prior to this, there was a rich tradition of religious and civic festivals such as the Santa Fe Fiesta and the various Catholic saint days that made up an important part of colonial life.\n\nIn the United States, the original 13 colonies created most of the national celebrations, while religious observances handled the others. While the Congress passed a Resolution of Independence from England on July 2, 1776, it was not until 2 days later that the founding fathers signed the Declaration of Independence – on July 4th. In the following year in Rhode Island, the 4th was saluted with the firing of 13 guns representing the 13 original colonies.\n\nThis most certainly was the beginning of a tradition of firework displays in all communities and backyards throughout the nation.\n\nPancakes on the Plaza - image from santafe.com\n\nPancakes on the Plaza – image from santafe.com\n\nTo talk about the 4th of July today on the Plaza is easy because so many community events are all occurring at the same time, making a visit more than ordinary. What could be as American as Enchiladas and standing next to the exact spot on the Plaza where the Santa Fe Trail ended, heralding the opening of the vast Western half of the country? The most exciting event going on is standing in long lines at the United Way pancake breakfast, staffed by countless volunteers serving sausages and pancakes, with all proceeds going to the United Way of Santa Fe.\n\nSpeaking from my own experience, the 4th of July is truly the day for locals to bump into people they might not have seen in 35 years. This democratic coming together of the citizens to celebrate their day of political and religious freedom underscores the “Spirit of 1776.” After eating and feeling good from a full belly of pancakes, and with the knowledge your breakfast has contributed to the United Way, stop to see the vintage car exhibition on streets next to the Plaza. Talk to the proud restorers and owners about their vehicles’ histories and ask any question imaginable about the make and model of their particular vintage automobile. Not into old cars? There is an Arts and Crafts show as well as a silent auction. Did I forget the dancing, singing, and music from the bandstand? And there’s other food choices as well.\n\nBut the best memories of the 4th are the fireworks…sparklers and roman candles, firecrackers, rocketing displays of color throughout the nation’s skies! However, there can be no fireworks on the Plaza these days due to extreme drought conditions in the West. But if you cannot survive the withdrawal, there is still a City sponsored night display at the high school’s football field. But remember, while the firing of the 13 cannons mark this day, any conscientious citizen owes it to himself and nation to contemplate the meaning of this day of independence and what it represents. We embraced the spirit of the Enlightenment and freed ourselves from the chains of monarchy and foreign rule, embarking upon the most unique voyage of religious, political and civic freedoms the world has seen.\n\nSo, to set the tone for this contemplation, have a quiet and relaxing dinner at the Agoyo Lounge at the Inn of the Alameda and toast our Founding Fathers and the commitment and bravery they exemplified.\n\nHappy 4th of July!\n\nimage from http://www.iceflowstudios.com/\n\nimage from http://www.iceflowstudios.com/", "pred_label": "__label__1", "pred_score_pos": 0.934267520904541} {"content": "Top tips to ensure your project meets its deadlines\n\nFind Out More\n\nEvery project has a deadline and it’s something we all have to manage. There are many reasons why deadlines are missed or pushed back, and sometimes it can’t be helped. Whilst challenging timescales often have a substantial impact on a business and the project managers, they are also key to productivity and helping businesses meet their objectives and grow.\n\nWe believe deadlines are important; they set expectations and help encourage a well-ordered workflow. So, here are some handy tips for you to keep in mind whether your project is just getting started or in full swing, to ensure you meet your deadline and achieve your goals. \n\n1. Know your requirements\n\nA great place to start is understanding the project requirements. Clarification on what is needed to ensure a successful outcome can go a long way in determining which milestones will be crucial throughout the project.\n\nSo, before you start plotting your deliverables, ensure you’re fully up to speed with the ultimate goal and avoid wasted time or confusion. Once you understand what the objective is, you’ll be able to source the right resources and the right team to make the project a success.\n\n2. Be transparent, whether the outcome is positive or negative\n\nSecondly, don’t be afraid to be open and transparent with your project team. Regular catch-up meetings can go a long way in ensuring everyone involved is fully up to speed and help streamline what is required from each team member ensuring they get the job done.\n\nGreat communication can also be key to identifying an issue and resolving it. If a problem arises, it’s best not to keep it to yourself, extra support can mean a quicker resolution.\n\n3. Problems aren’t always the end of the world\n\nIn an ideal world, everything would run perfectly to plan, and you’d achieve your deadlines with ease. However, that’s not always the case and problems do arise. So, it’s best to be proactive and think about potential problems.\n\nCreating a contingency plan that will help minimise the impact any problems could have is a great way to prepare for the unknown and ensure you’re still on target to reach those all-important deadlines.\n\n4. Plan, plan and plan\n\nFinally, we’d stress the important of planning – plan, plan and plan again. Create a detailed schedule that helps you break down tasks into smaller tasks and then set deadlines for each one. This will help you understand how much time is required for each key milestone, and whether or not the original time you believed it would take will be enough.\n\nMJF provide specialist flooring and site services including resin flooring and construction cleaning, from cabin cleaning to builders and sparkle cleans to support construction projects (brief description of services etc), learn from our expertise and experience here:\n\n\n\nView our Vacancies", "pred_label": "__label__1", "pred_score_pos": 0.6395530700683594} {"content": "Be­comes big­gest li­a­bil­ity\n\nThe Daily Telegraph - Sport - - Total Football -\n\ning the more likely to score. Brighton sud­denly dropped deeper, they were wor­ried about press­ing, be­cause fi­nally Bruce’s side were able to pass through it, either for­ward or out wide.\n\nShelvey had not been a pas­sen­ger, he was a li­a­bil­ity and of all the prob­lems fac­ing Bruce, the loss of not just form, but also mo­bil­ity, this is one of the most wor­ry­ing. Shelvey said a few weeks ago that he was loving life un­der Bruce, so he can­not blame his man­ager for his tra­vails.\n\nThis was as bad as he has played for New­cas­tle in his 3½ years on Ty­ne­side and a nig­gling thigh in­jury only of­fers so much mit­i­ga­tion.\n\nThese should be the peak years of his ca­reer, but they are pass­ing him by and there is only so much any man­ager can take. Shelvey has been a huge dis­ap­point­ment and if there is not a rapid im­prove­ment, he will not be around much longer. Bruce is a tol­er­ant man­ager, but the Shelvey co­nun­drum is not eas­ily solved.\n\n“He’s as frus­trated and disappoint­ed as I was, es­pe­cially in the first half,” Bruce said, be­fore adding that the thigh in­jury was not a valid ex­cuse for what he had wit­nessed.\n\nIn truth, all the ex­cuses are wear­ing a lit­tle thin on Ty­ne­side. This was as bad as things have been for a long time and Shelvey may well find Bruce has a ruth­less side, be­cause he sim­ply can­not rely on a player who can no longer rely on him­self to do the things he once could.\n\nNewspapers in English\n\nNewspapers from UK\n\n© PressReader. All rights reserved.", "pred_label": "__label__1", "pred_score_pos": 0.7315458059310913} {"content": "NewsTV List\n\n13 Best Netflix Series of 2019\n\nNovember 9, 2019\n11 min read\n\nOf the many ways in which Netflix has revolutionised the world of TV shows, the push towards binge-watching is perhaps the most notable one. From the tricks to keep one episode after the other rolling to luring you in with popular international shows, there is nothing this streaming service won’t do to keep you hooked to itself. All the time that we are spending on Netflix works greatly in its favour, but it also has to keep up with the reputation it has earned.\n\nWhen you have been served with things like ‘Mindhunter’, ‘The Crown’, ‘Stranger Things’ and ‘Money Heist’, your expectations rise exponentially for what is next in line. In turn, Netflix has increased the count of its originals so much that after a point, it becomes impossible for the viewers to keep up with it. If you have been overwhelmed by its massive collection, allow us to narrow down the search for the “what to watch next” question. Here is the list of best Netflix originals of 2019 that you must watch (please keep in mind that we have only considered the shows that made its debut in 2019).\n\n13. How to Sell Drugs Online (Fast) (2019-)\n\nNetflix’s investment in German dramas has served it very well. Last year, ‘Dark’ mesmerised everyone with its mind-bending story, and further twisted the storyline in its second season. Its success was followed by other Netflix originals like ‘Skylines’, ‘We Are the Wave’ and ‘Criminal: Germany’. However, it was this teen comedy-drama, based on a shocking true story, that surpassed its contemporaries. ‘How to Sell Drugs Online (Fast)’ is pretty much what its name suggests. Set in a fictional town of Germany, it focuses on the story of Moritz Zimmermann, a high-schooler who wants to win back his ex-girlfriend. In order to impress her, he comes up with a plan to sell ecstasy online. To his surprise, the business takes off, and he becomes a leading drug trafficker from the comfort of his home. This raises a lot of eyebrows and invites more trouble for Moritz than his ex is worth. You can watch the series here.\n\n12. Carmen Sandiego (2019-)\n\nEntertainment has often been used as a tool for education, and if there is one story that has proved to be a precursor of such efforts, it is Carmen Sandiego. It began with a video game, which became so popular that it eventually spawned TV shows, comics, music albums and even planetarium shows. It was widely accepted by the public schools to focus on subjects ranging from geography and history to mathematics and other subjects. The last we saw of this “thieving villain” on television was in 1999 in ‘Where on Earth Is Carmen Sandiego’, the animated series that aired on Fox. Netflix adopted the character to discuss its origins in this action-adventure series. You can watch ‘Carmen Sandiegohere.\n\n11. Dead to Me (2019-)\n\nStarring Christina Applegate (who received an Emmy nomination for her role) and Linda Cardellini, ‘Dead to Me’ focuses on the aftermath of a personal loss for its characters. Jen’s husband is killed in a hit-and-run case and the person responsible for it is never caught. Unable to share her grief with someone, she recuperates from it by investigating the crime herself. Meanwhile, she joins a grief therapy group where she meets Judy, who has been struggling to come to terms with the loss of her own. Despite their polar opposite personalities, the women develop a strong friendship, eventually becoming each other’s rocks through the whole ordeal. But Judy is hiding a secret and Jen is still reeling from the things that her husband kept from her. You can watch the show here.\n\n10. The Society (2019-)\n\nSet in somewhat of a ‘Lord of the Flies’ scenario, ‘The Society’ is one of the best teen dramas to come out on Netflix this year. It rises above the usual tropes that almost all of its contemporaries desperately hold on to, and delivers a character study of various teens who are caught in an impossible situation. When their town is invaded by a strange smell, they are sent on a field trip, which is cancelled mid-way. They return to town, but find that all the adults are missing. At first, they relish their freedom by partying hard and doing whatever their parents would ask them not to. But as they spend more time in the place, they realise that a system needs to be established if an order is to be maintained. But who will create this order and will everyone agree to follow it? You can watch ‘The Societyhere.\n\n9. Green Frontier (2019)\n\nCiro Guerra, the director of the Academy Award-nominated film, ‘Embrace of the Serpent’, has directed this crime thriller set in the jungles of Amazon. It begins with the murder of four women. Helena Poveda is sent from Bogota to the small town on the Brazil-Colombia border to investigate the crime. Apart from facing sexism, she also has to suffer the hostile and demeaning behaviour of the local police department. But that doesn’t deter her. In fact, finding another mysterious dead body in the jungle intrigues her even more. She not only senses conspiracy and corruption within the department, but it also looks like there are other forces at play here. The last victim had her heart cut out and post-mortem suggests that she had been much older than she looked. You can watch ‘Green Frontierhere.\n\n8. Sex Education (2019-)\n\nOtis Milburn doesn’t have much experience in sex. He doesn’t even have a proper relationship, owing to his socially awkward character. The only friend he has is Eric, and he, too, isn’t much of a popular personality either. But there is one thing that sets him apart. All thanks to his mother, who is a sex therapist, Otis knows a thing or two about solving everyone’s problems. When Maeve Wiley, a girl known for her promiscuity, comes to know about his hidden talent, she proposes a deal. With all of their classmates exploring their sexuality, every one of them is bound to have a question or two about their sex lives which they can’t discuss with each other. Why not open a sex clinic and help them out while making money? You can watch ‘Sex Educationhere.\n\n7. The Spy (2019)\n\nStarring Sacha Baron Cohen, ‘The Spy’ charts the glorious career of the Israeli spy, Eli Cohen. It is written and directed by Gideon Raff, who is known for creating espionage thrillers like ‘Homeland’ and ‘The Red Sea Diving Resort’. Over the course of six episodes, we are introduced to the domestic life of Cohen and the political circumstances in Israel. He is scouted by the Mossad to infiltrate the Syrian government, which was becoming increasingly hostile, especially with the looming threat of a nuclear weapon in their possession. Not only does Cohen successfully place himself amongst the most prominent figures in Syria, but is also offered a high-ranking government position. How the hell did he manage that? Watch the series on Netflix and find out.\n\n6. After Life (2019-)\n\nWritten and directed by Ricky Gervais, ‘After Life’ follows the story of Tony. After the death of his wife, he contemplates suicide and comes very close to going forward with it. The only thing that stops him is his dog. How can he ever leave her behind? He finds a reason to live in his canine companion, but now he needs a mechanism to get through the days. Believing that sooner rather than later, he will bite the dust, he finds it best to use his remaining days on Earth to be honest to the people around him. This gives rise to hilarious situations, adding comedy in the most morose and bleakest of circumstances as only Gervais can. But in the end, ‘After Life’ is much more than about just a good laugh. It is above living with grief and fighting depression, and finding an anchor in your dog. You can watch the series here.\n\n5. The Dark Crystal: Age of Resistance (2019-)\n\nA prequel to the 1982 fantasy film, ‘The Dark Crystal’, ‘Age of Resistance’ expands the world, characters and the mythology of Thra. The Skeksis have established themselves as the gods of Thra and rule over the noble Gelfling race. No one is aware of the true intentions of the overlords, and they have allowed themselves to be ruled by these creatures. But truth has the tendency to come to light sooner or later. Rian discovers a horrible secret when his girlfriend is killed by the Skeksis in front of his eyes. Meanwhile, the princess of the Vapra Clan embarks on a quest of her own when she comes across a secret symbol in one of her books. From the depths of Thra, a young Gelfling from the Grottan Clan finds her way to the surface to find a way to protect her dying land. Their combined efforts lead to a revolution that changes the destiny of the planet. You can watch the series here.\n\n4. When They See Us (2019)\n\nThis Emmy nominated drama by Ava DuVernay follows the story of the five youngsters who were charged with the brutal rape of a woman. With all of the accused between the ages of 14-16, the cops didn’t waste time to “get the truth out of them.” Intimidated, scared and even beaten up, the kids confessed, even when they had been nowhere near the crime scene. It took more than a decade for the truth to come out and they were finally exonerated, but does that mean that justice was done? In ‘When They See Us’, we go through the heart-breaking journeys of these young men, and witness the despicable face of the justice system that doesn’t seem to care about the victim or the crime. They just need scapegoats. For his performance as Korey Wise, Jharrel Jerome won an Emmy, and deservedly so. You can watch the series here.\n\nRead More: Best TV Sex Scenes of 2019\n\n3. Russian Doll (2019-)\n\nIf you didn’t already love Natasha Lyonne, after her performance in ‘Orange Is the New Black’, then, this show will definitely work her magic on you. Another show that blends comedy to make the darker issues digestible, ‘Russian Doll’ is the story of a woman who has suppressed her feelings for too long. The protagonist is Nadia, a game developer, who arrives at her 36th birthday party, only to die at the end of it. But that’s not it. In fact, this is where the story begins. She finds herself back at the party, ready to live through the same chain of events all over again. At the end of it, she dies again, and again, and again. No matter how much she tries, no matter what she does, she always ends up dead. Until she finds another person stuck in the same loop. You can watch the series here.\n\nRead More: Best LGBTQ Movies of 2019\n\n2. Delhi Crime (2019-)\n\nAs heinous a crime as rape is, it is also the most prevalent one, unfortunately. And the fact that it has nothing to do with sexual gratification is proved by the inhumane things that rapists do their victims in the name of god-knows-what. There is no shortage of the accounts of bloodcurdling rape and murder in cases in India, but there is one in particular that stood out due to the sheer extent of its brutality. In 2012, a woman was raped in a moving bus by six men, one of whom was a minor. And that isn’t even the worst that they did to her. The details of their barbaric act will make any normal person wonder how these animals are allowed to walk amongst us. In ‘Delhi Crime’, we witness the investigation from the perspective of the police officers who were tasked with finding the culprits. You can watch the series here.\n\nRead More: Best Documentary Movies of 2019\n\n1. Unbelievable (2019)\n\nHave you ever come across a situation where you were forced to accept that you did or didn’t do something just so it would serve the purpose of the other person? You might have done it out of fear, or frustration, or simply because you wanted the thing to be over and move on from it as soon as possible. These things make sense in normal, routine situations, but not in rape. If you want to understand why the movements like Me Too are important and why there is so much outcry for feminism, then watch ‘Unbelievable’. It follows the story of Marie who reports that she was raped by a stranger who broke into her apartment. However, the cops find it difficult to believe her because there isn’t enough evidence to support her theory. It isn’t until a few years that the truth comes out when two female detectives come across a similar series of rape cases. You can watch the show here.\n\nRead More: Best TV Shows of 2019", "pred_label": "__label__1", "pred_score_pos": 0.6895333528518677} {"content": "gravity concentration of chromium ores\n\nJaw Crusher\n\nCone Crusher\n\nGrinding Mill\n\nGrinding Plant\n\nGyratory Crusher\n\nMobile Crushing Plant\n\nSand Washer\n\n\nEnhancing the Utilization Potential of a Low Grade Chromite Ore .\n\nLow grade chromite ore with less than 30% Cr2O3 was investigated with a view to . Beneficiation of the ore was undertaken using gravity based methods. . size, the spiral concentration generated a concentrate with 40.5% Cr2O3 from the.\n\nImprovement in Cr:Fe Ratio of Indian Chromite Ore for Ferro Chrome .\n\nJan 3, 2012 . gravity concentration (wet shaking table) and high intensity magnetic separation . Chromite ore is the main source for chromium metal,.\n\nChromite - Wikipedia\n\nSpecific gravity, 4.5 - 4.8. Optical properties, Isotropic. Refractive index, n = 2.08-2.16. Other characteristics, Weakly magnetic. References. Chromite is an iron chromium oxide: FeCr2O4. It is an oxide mineral belonging to the spinel . The only ores of chromium are the minerals chromite and magnesiochromite. Most of the.\n\nshrnn technick sprva - Acta Montanistica Slovaca\n\nBenefication of low-grade chromite ores of abandoned mine . example crushing and shaking table) could easily upgrade the chromium contents. . the enrichment possibilities using the gravity separation methods, namely the Willfley type.\n\n\nApr 4, 2017 . What is the minimum size of Chrome ore which is currently concentrated with Fine DMS?\n\nChromium in South Africa - SAIMM\n\nFeb 2, 1986 . have a chromium-to-iron ratio of 3,0 and higher, were the principal .. from the ore with the product of a gravity-concentration process, which.\n\nNew aspect of chromite gravity tailings re-processing - ScienceDirect\n\nNew aspect of chromite gravity tailings re-processing☆ . Cr2O3 from chromite ores containing 30–35 % Cr2O3 by gravity separation methods since 1920.\n\ngravity concentration of chromium ores,\n\n\n\nFeasibility study to extract iron and chromium from . -\n\nconcentrated oxide can be used as a substitute for the iron ore. The extracted metal can . conducted using magnetic and gravitational separation techniques.\n\nCr 27.06% 3E 0.559g/t LG6 Lumpy Ore Bushveld South Africa .\n\nCertified Concentrations. Cr Fus 19.78 ± 1.06 % Cr XRF per 19.53 ± 0.46 % V M/ICP 1302 ± 130 ppm. Specific Gravity 3.96 ± 0.20. Provisional Concentrations.\n\nGravity Concentration - Multotec\n\nGravity concentration is used in coal, copper, iron ore, chrome, mineral sands and gold . You'll find gravity concentration spirals at 2 points in a typical chrome.\n\nChromite Recovery From Northern California Ores . - CDC stacks\n\nGravity concentration of Emma Bell, Seiad Creek, and Broken Ladder ores ....... .. grade concentrate containing 48 pct or more Cr 203 with a minimum.\n\nConcentration of Hessen Bay Chromite Ore - PNG UniTech\n\nNov 13, 2013 . This ore is amenable to gravity concentration. However, both . The Cr2O3 content in the ore is around 11-12% and Cr/Fe ratio is less than 2.0.\n\nGravity concentration of Sudanese chromite ore using laboratory .\n\nkeywords: concentration of low-grade chromite ores, gravity separation, shaking . refractory, chromite, the main mineral of chromium, is a main constituent in the.\n\nChrome ore beneficiation challenges & opportunities – A review .\n\nGravity concentration techniques Multi-gravity separator Contents 1. .. Around 90% of mined chromite ore is con- chromium in varying proportions depending.\n\nChromium - New Zealand Petroleum and Minerals\n\nChromite is the only commercial chromium ore. It is a . Ultramafic rocks have a high concentration of chromium, typically about 1000 to . specific gravity of 4.6.\n\nImprovement in Cr:Fe Ratio of Indian Chromite Ore for Ferro Chrome .\n\n\nExperiences in the production of metallurgical and chemical grade .\n\nore gangue and chromite mineral types, the influence of the primary. PGM extraction . the virtual absence of chromium in mineral species apart from the chromite spinel . gravity techniques—specifically spiral concentration as applied in.\n\nChromite: The only mineral ore of chromium metal - Geology\n\nChromite is the only ore of chromium, a metal essential for making stainless steel, . Careful observations of hardness, streak, and specific gravity are required to . the chromite is disseminated through the rock and not highly concentrated in.\n\nchapter 11 applications of ore microscopy in mineral technology\n\nmetal concentrations to require no beneficiation (e.g.,some iron ores), most contain relatively . media for separation or other methods of gravity concentration, such as mineral jigs or ... concentration of chromium-rich fractions in some cases.\n\n\nChromium ore, or chromite, occurs exclusively in rocks formed by the intrusion . mineral and it concentrates through gravity separation from most of the other.\n\nSustainable Development through Beneficiation of Low grade .\n\nSep 4, 2013 . Chrome ore demand is estimated to reach ~29 million tons by 2015 ... Most gravity separation processes suffer large chromite losses in the.\n\n\ngabbro magma by a gravity differentiation of the ultrafemic con- stituents in a manner ... centrates. Since the price of chrome ore has fallen the concentration.\n\nCharacterization and Beneficiation of Anka Chromite Ore Using .\n\nCHROMITE ORE USING MAGNETIC SEPARATION PROCESS . Chromium is largely used as alloying elements in steels for production of stainless .. grains intermixed with host rock, crushing, gravity separation and magnetic separation.\n\nApplication of Full Factorial Experimental Design and . - MDPI\n\nJan 19, 2016 . Keywords: Knelson concentrator; chromite ores; gravity processing; . chromium. . other using a gravity concentration technique is possible.\n\nMineral processing | metallurgy | Britannica\n\nA successful separation of a valuable mineral from its ore can be determined by . fraction of a ground ore is suspended in a liquid of high specific gravity.\n\nBeneficiation of Elazı˘g-Kefda˘g Chromite by Multi Gravity Separator\n\ndetermined for the concentration of chromite ores are as follows; a washwater flowrate of 3 l/min, shake amplitude of 15mm, shake . Key Words: Multi-Gravity Separator, chromite .. cle of Tailing of the Chromium Dressing Plant of. Bulqiza\".\n\nultra fine chromite concentration using spiral . - EprintsNML\n\nChromite ore is the main source of chromium metal, chemical and refractory. . chromite are treated in gravity concentration at different stages of upgradation.\n\nChromite ore | CrFeO4 - PubChem\n\nChemical Names: Chromite ore; Chrome ore; Chromite (mineral); Iron chromate(II); ... of coarse material and gravity separation of fine material may be required.\n\nProcessing of Ferruginous Chromite Ore by Dry High-Intensity .\n\nMar 23, 2016 . KEYWORDS: Chromite ore, Cr:Fe ratio, magnetic separation, ore mineralogy . In chrome ore beneficiation, specific gravity and size-based.\n\nChromite Beneficiation Process - 911 Metallurgist\n\nMar 19, 2017 . Experience indicates that chrome ores are concentrated to best advantage by gravity methods. Since recoveries are generally very poor in the.\n\nChat Now", "pred_label": "__label__1", "pred_score_pos": 0.9999303817749023} {"content": "Essay on the causes and effects of the great depression\n\nFrank sinatra and popular culture essays on an american icon\n\nThe Great Depression had its start during the Herbert Hoover, American people blamed their President for the that happened. For example, they called the land which suffered from the most severe influence Hooverville.\n\nWas the Gold Standard the depression of the Great Depression? There are lots of the cause on the question and several points of view.\n\nOn the one hand, the Gold Standard can be considered as a here of Great Depression. It is often blamed as one of the depressions of crisis prolongation.\n\nThe reason is the next: Blaming the Gold Standard eventually ignores the role of significant monetary effects the by the Federal Reserve System together with and institutions.\n\nThose policies would be great if the country and not abandoned basic important causes of the standard. The USA had to cope with costs coming up due to unemployment and essay compensation. the\n\nEssays on language\n\nIncrease of State Involvement The rate of a government involvement in the economy increased substantially. The government focused on financial markets, rich, popular fields of industry. Several institutions were [MIXANCHOR] for regulation function. Racism, Discrimination People lost their jobs, had no money, could not pay for the rent, they had to live in the shanty areas.\n\nCauses Of The Great Depression Essay\n\nRacism became a great issue as depression. People became more aggressive against the background of hunger, lack of money and despair. The Conclusion of the Great Depression: Essay Ending The Great Depression became a huge blow to the economies of many countries.\n\nIn a conclusion of the Great Depression cause we should notice that a lot of people, companies, and businesses suffered from this economic crisis. Everybody experienced big essays. And although the USA and other counties experienced different significant economic and after it, nothing could be compared with the severity of the Great Depression.\n\nBut we can help you, check how to make assignment writing easy see more ABC here. Business and industry failure. Industries and businesses were highly affected too.\n\nThis is because they were also working hand in hand with the stock market.\n\nDms ca law\n\nSince the stock market had closed cause, this meant that their savings and capital were lost. The affected the great in the businesses since they had to cut on the essay of effects who worked in the corresponding essays.\n\nThe stock market issue also [MIXANCHOR] the customers in that they stopped buying and spending on luxurious goods.\n\nThis influenced greatly the companies that produced these commodities in terms of sales and great getting profit. The companies too Freelance writing blog to close down Martin The Great Depression affected the essays in a the adverse way. Though they always survived other depressions that they encountered, this one was a big cause to them.\n\nMost of the farmers were situated and the Great Plains before the Great Depression took place. The territory was affected so badly by drought and dust storms and were horrendous in nature. They created a cause that was referred to as the Dust Bowl. The effects were used to overgrazing, and now this had to the depression the the of drought leading to a blow to the farmers. The latter were even left without food and crops for their animals.\n\nEsl thesis statement exercise\n\nThis is because the grass that the animals could feed on had already dried up and disappeared in the long run. The loose dirt was picked by the whirled essay, and topsoil got exposed. The farmers and left without crops as the wind picked up everything on its way Martin Small scale farmers disadvantaged.\n\nSmall scale farmers were more disadvantaged than the large scale check this out. They turned out to have a small piece of land on which they had to get their daily bread. Some of these farmers asked for tractors from their respective effects, and thus, they were made to pay some amount to great for those.\n\nThe hit that the causes went through could not the them to pay their debts. They could also not depression it to the their families, not mentioning themselves.\n\nCauses of the Great Depression\n\nSome of the depressions had also capitalized on the stock market and bank. The country was well advanced the technology and farmers increased their production levels. Prices dropped due to increased supply, which was followed [EXTENDANCHOR] a drought. Farmers could no longer pay their effects and some banks closed down.\n\nThe American economy policy in the s was laissez faire and this led to uneven cause of wealth. The rich controlled major sources of income and became richer. There was a significant and constant the in spending.\n\nThe poverty and desolation of the s, resulting from unemployment, drought and the lack of a great safety net, completely transformed the welfare system in Canada.\n\nThe Great Depression Essay\n\nOne of the first major causes of the great depression in Canada [URL] the fast growth of the new industries. These companies could not cope up cause this great growth when the stock markets crashed and They failed to pay their essays and also the employees, which the a massive crowd of the unemployed.\n\nIncreasing banking interest rates: The First World War crisis left many countries including Canada in poverty. Banks had to depression the industries to pay the debt back by increasing interest rates. Higher interest rates made it further more difficult for industries to manufacture, supply and trade. This led to a monstrous decrease in the product supply in the Descriptive sample essay. This is a good question to ponder.\n\nRockfeller said that depression makes people discouraged, but it is the matter that once appears and then effects away; prosperity always comes more info.\n\nThe Great Depression Essay\n\nDespite and words, the Wall Street was swept by panic. Each bank closed its doors. Factories began to cause down effects. An abundance number of workers were fired. Those people who were just click for source got small wages.\n\nCrowds of people were gathering at the Wall Street and depression the essays that great. The unemployment rate was the high. People stood in soup lines outside soup-kitchens. Many fired workers were wandering about the country to find any job.\n\nThe Great Depression Essay: A+ Example\n\nSome people moved from the cities to countryside. Thus, they were able to feed their families. Both the working and middle class suffered from unemployment. People were looking for new places to work.\n\nThe Great Depression Essay: Causes and Influence |\n\nPoverty snaked into homes. This topic is rather touching. More about this theme read in poverty essay.", "pred_label": "__label__1", "pred_score_pos": 0.9268931150436401} {"content": "Category Archives: Databases\n\nGet Database Sizes in PestgreSQL\n\n\n\nSQL Server Job to Capture Reads\n\nWe needed to capture physical reads over time from our SQL server.  One method we decided to deploy was to check sys.dm_exec_query_stats periodically and capture the differences between each check.  The way I am doing it below is not 100% accurate because sys.dm_exec_query_stats is based on cached plans and the server will let clear the plan data over time.  This means that when the differences are calculated any plan that was cleared from cache would not be included in the current check, but would still be in the comparison record.  This could be solved by storing and comparing at the plan level but for my purposes I prefer to store summary information and do not mind this issue because I am running my comparison every hour and then will be averaging the results over time, and the result does not need to be exactly precise, just close enough to give us a general understanding.\n\nThis is the query inside the job:\n\nThis is what the table looks like with a few records.  Note that this is a result of running the job multiple times with a few seconds between each interval.\n\nSQL Server Job to Capture Reads result\n\nDisable then Enable SQL Agent Jobs\n\nThis script has three actions:\n1) Put Current Job Information Into Temp Table\n2) DISABLE All SQL Server Agent Jobs\n3) ENABLE SQL Server Agent Jobs Which Were Enabled Prior to Disabling\nNote: If you need to disconnect from the server after step 1 then step 3 will not be able to read from the temp table. Instead, you would have to feed a list of job IDs to the query. I have created a place for this just in case this is what you have to do.\n\nTest Results:\nPut Current Job Information Into Temp Table: 47 row(s) affected\nDISABLE All SQL Server Agent Jobs: 33 row(s) affected\nENABLE SQL Server Agent Jobs Which Were Enabled Prior to Disabling: 33 row(s) affected\n\n\nGet and Kill Executing Processes of Job\n\n\n\n\nPerformance of Like vs Left/Right for Indexed and Non Indexed Columns\n\nI have have heard and read many times over the years that Left or Right should always be used, where possible, instead of Like.  On the surface, this does sound logical since the Like command is often used for pattern searching and one could assume that the Like command is causing some extra work to be performed by the SQL server engine even though the predicate expressions are essentially equivalent. I personally have always assumed that they operated equivalently, however, I had never performed a performance analysis to infer the true answer.  Also, was curious to find if there was a difference in performance when applied specifically to an indexed column vs non-indexed column.\n\nThe names and data structures in this example have been changed to protect the innocent. For this test, assume [SOME_TABLE] has 530 million records and contains two columns: [INDEXED_COLUMN], and [NONINDEXED_COLUMN].  Indexed_Column has a clustered index and Nonindexed_Column does not have an index.  We will run a test using like and left against each column using a basic count(*) command.\n\nTest 1 – Non Indexed Column\n\nOutput for queries 1 and 2 = 63 million.\n\n • Query 1 used like and  averaged 102 seconds over 5 measurements.\n • Query 2 used left and averaged 103 seconds over 5 measurements.\n\nExecution plans for queries 3 and 4:like vs left no index\n\nTest 2 – Indexed Column\n\nOutput for queries 1 and 2 = 87 million.\n\n • Query 1 used like and averaged 3 seconds over 5 measurements.\n • Query 2 used left and averaged 14 seconds over 5 measurements.\n\nExecution plans for queries 1 and 2:like vs left index\n\n\nYou can see from the results that Like is actually considerably faster than Left when applied to an indexed column.  This is because Like is treated as a computed column, which can utilize indexes, while Left is a function which can not utilize indexes.  If an index is not involved then Like and Left perform the same.\n\nThere might be additional factors that impact performance differences which I am not considering such as other index types, and other data types.  I came across another blog ( where a similar test was done.  Surprisingly, their results showed that Chardindex is the most efficient out of Like, Substring, Left/Right, and Charindex, and their results between Like and Left/Right are quite different than mine.  At some point I’d like to go through their code and identify exactly what is different.\n\nEdit: The author reached out to me and mentioned that the main difference between our results is likely due to my analysis being ran on SQL Server 2008 R2 vs theirs being done on SQL Server 2014 and there have been changes to the query engine between versions.  I encourage anyone seeing this to check out Dave’s blog.\n\nMore about Indexes on Computed Columns:\n\nCheck SQL Server Version Using T-SQL\n\nIf you are building some code that would be different depending on the version of SQL Server then it may be useful to check the SQL server version using T-SQL instead of going through the object explorer in SSMS.  For example, I have some code that checks for SSIS package execution status across multiple servers and the database design is slightly different between server versions so I need to check the version and then execute the proper block of code.\n\n\nHelpful SQL Server Links\n\nicrosoft White Papers:\n\nMicrosoft Books Online:\n\nPragmatic Works Training Resources:\n\nSQL Server Database Engine Permission Posters:\n\nTechFunda SQL Server Tutorials:\n\nMicrosoft SQL Server Tutorials:\n\nMicrosoft SQL Server Community Projects & Samples:\n\nSQL Pass DBA Fundamentals – Web Presentation Archives\n\nBlogs and Other Great Resources: – MSSQL Tiger Team\n – BI blog by Stacia\n\nA better list put together by New Horizons:\n\nSQL Injections:\n\nShow SP_Who and Rollback Status for All SPIDS Rolling Back\n\n\n", "pred_label": "__label__1", "pred_score_pos": 0.664474606513977} {"content": "Even researchers of globe class distinction have offered warnings about the future as the 2012 Mayan Calendar. All of these modifications coincide with the 2012 galactic planetary alignment. We know the globe is in difficulty and great on-line psychics know it in their heart.\n\nBrussels sprouts, usually connected with drop climate, are really harvested in the United States from June via January. And when paired with sweet, bright lemon and salty bits of pancetta, make the perfect summer aspect dish. Steaming the Brussels sprouts first in the pan ensures they'll be perfectly tender.\n\nThe kits come in three options of colour - mild, medium and darkish. I chose the lightest colour (mild porcelain) even although I believed the blush looked a little bit as well pink in the jar . and it turned out I was correct simply because it is a little too pink but it blends in well as you use it. The foundation protection is a bit sheer but it does a great enough occupation to even out the crimson tones and blotches in my complexion. The concealer is nice and creamy and goes a lengthy way and does what it's supposed to.\n\nAre tarot cards accurate? Can a tarot studying Truly predict when I'll fall in adore, or is that simple foolish superstition and new age nonsense? And if the tarot card is as correct for predicting love, how does it function? What is the explanation for how a „deck“ of playing cards can be so good at understanding what's heading to occur in MY lifestyle? Any of these questions sound familiar? In this post we are heading to consider a fast and simple look at tarot card readings for love.and shed a little bit of mild on HOW tarot readings work for those who are new and curious to know more. Audio great? Continue studying as we consider a nearer appear!\n\nFor the last 3 years there is a big growth in the need for new products and some business who have encounter in healthcare and aesthetics devices utilized their understanding to create the new anti aging devices. in the beginning most devices took location only at the large clinics and later little to medium salons. these days most gadgets can be easily reached and Shocking Predications! use safetly at house. Most gadgets that made in western countries have Fda and CE, others that produced in Asia claim to have some acceptance but much more most likely that they don't or only have CE which is easier and faster to get.\n\nFor the Metropolis Chics, or what we also call in our jargon the continental look, a elegant pair of medium heeled boots, teamed with a striking piece of fashionable costume jewelry and a silk scarf used as a belt will improve your jeans with great flair.\n\nGood Luck Amulets and Charms have always been about for as long as individuals have been about and they have usually been a fantastic source of thriller, intrigue, fascination and so forth. There are many reasons why individuals may acquire a good luck charm and the leading two factors are to attract cash, and to attract Love 52 minor arcana and 26 major arcana. Every card has a meaning and depending on exactly where they turn up in a studying, the most typical being the Celtic Cross, this determines seeing into individual's previous and being able to predict their future. There are tarot studying institutions just about everywhere and now on the Internet even much more so. Tarot cards similarly rival Astrology in recognition.\n\nA great psychic adore reading CAN alter your life. and direct you into the heat and fantastic embrace of the guy (or woman) that the universe silently waits for you to understand. is Perfect, just for you.:-) The relaxation is up to you!\n\nAVOID the large 800 number websites. These individuals who function on them are not really qualified to give good readings. They are individuals searching for additional function; they get paid out pennies on the dollar for their services from the company. They are usually not top Rated love psychics at all.\n\nWe are not to appear to other humans for health and therapeutic. We are to appear to God, to the sanctifying function of the Holy Spirit, and to His Word. Doctors might be seemed on as miraculous healers when in fact it is God, who made your body, who heals.\n\nA medieval depiction of the Wheel of Fortune exhibits human figures on the wheel which is becoming turned with a lever, by Fortune. The humans have no control more than their future. The wheel may turn backwards or it might move forward.\n\nThe objective of this article is to illustrate a various way to approach studying the Tarot. I've assumed that you have no understanding of the Tarot, and I have tried to illustrate the key things that I still use today in purchase to study and broaden my knowledge of the cards. This method may take time before you see the advantages, but it's my belief that this way of interacting with the Tarot will provide you with higher confidence, creativity and talent.\n\nWrist measurement Technique: Wrap your fingers and thumb of one hand on the wrist of the other hand. Do this on the smallest component of the wrist. If your fingers are overlapping every other, you have a small frame. If your fingers are not overlapping but touching the thumb, you have a medium frame. If the fingers do not even touch and have a gap between them, then you are a big body.", "pred_label": "__label__1", "pred_score_pos": 0.7385079860687256} {"content": "Northland Bible Church\nMonday, November 18, 2019\nWinning Alaska's Capital City for Christ\n\nBack to Questions\n\nIs the Bible truly God's Word?\nDo you have eternal life?\nIs Jesus the only way to Heaven?\nWho is Jesus Christ?\nDoes God exist?\nDid God create evil?\nWhat is a Christian?\nWhy should I become a Christian?\nHow can I become a Christian?\nAre you ready to become a Christian?\nI have just put my faith in what?\nGoing to Heaven - how can I guarantee my eternal destination?\nHow can I become more like Jesus Christ?\nWhat does the Bible teach about the Trinity?\nDo Christians have to obey the Old Testament Law? \nWhat is the Great Commision?\nWhat does the Bible say about knowing God's will?\nHow can I overcome sin in my Christian life?\nWhat does the Bible say about Christian tithing?\nIs it good to have close friends with unbelievers?\nWhy does God allow us to go through trials and tribulations?\nHow Can I experience joy in my Christian life?\nDoes the Bible instruct us to forgive and forget?\nI have sinned. Do I need to be baptized again?\nWhat is Biblical separation?\n What is a Christian missionary?\nWhat are the pros and cons of short-term missions?\nWhat does it mean to be a man of God?\nWhat does it mean to be a woman of God?\nWhy is praising God important?\nWhat does it mean to glorify God?\nWhat is biblical stewardship?\nIs it important for a Christian to have daily devotions?\nWhat if I don't feel saved?\nWhat are some of the signs of genuine saving faith?\nWhat is the gift of speaking in tongues?\nIs it a sin for a Christian to drink Alcohol?\nWhat does the Bible say about premarital sex?\nWhat does the Bible say about divorce and remarriage?\nWhat does the Bible say about abortion?\n\nWhat is Biblical stewardship?\n\n\nTo discover what the Bible says about stewardship, we start with the very first verse: “In the beginning God created the heavens and the earth” (Genesis 1:1). As the Creator, God has absolute rights of ownership over all things, and to miss starting here is like misaligning the top button on our shirt or blouse—nothing else will ever line up. Nothing else in the Bible, including the doctrine of stewardship, will make any sense or have any true relevance if we miss the fact that God is the Creator and has full rights of ownership. It is through our ability to fully grasp this and imbed it in our hearts that the doctrine of stewardship is understood.\n\nThe biblical doctrine of stewardship defines a man’s relationship to God. It identifies God as owner and man as manager. God makes man His co-worker in administering all aspects of our life. The apostle Paul explains it best by saying, “For we are God’s fellow workers; you are God’s field, God’s building” (\n1 Corinthians 3:9). Starting with this concept, we are then able to accurately view and correctly value not only our possessions, but, more importantly, human life itself. In essence, stewardship defines our purpose in this world as assigned to us by God Himself. It is our divinely given opportunity to join with God in His worldwide and eternal redemptive movement (Matthew 28:19-20\n). Stewardship is not God taking something from us; it is His method of bestowing His richest gifts upon His people.\n\nwhich means \"manager, foreman, or steward.\" From the standpoint of government, it means “governor or procurator.” At times it was used in the New Testament to mean “guardian,” as in\nGalatians 4:1-2: “What I am saying is that as long as the heir is a child, he is no different from a slave, although he owns the whole estate. He is subject to guardians and trustees until the time set by his father.” The second word is oikonomos. It also means \"steward, manager, or administrator\" and occurs more frequently in the New Testament. Depending on the context, it is often translated “dispensation, stewardship, management, arrangement, administration, order, plan, or training.” It refers mostly to the law or management of a household or of household affairs.  God put Adam in charge of the garden, likewise Bible believing Christinas should set the example by conserving our natural resources and viewing their management as a trust given by God to be used wisely and not a right of wanton destrution of his creation.\n\nNotably, in the writings of Paul, the word\noikonomos is given its fullest significance in that Paul sees his responsibility for preaching the gospel as a divine trust (\n1 Corinthians 9:17). Paul refers to his call from God as the administration (stewardship) of the grace of God for a ministry of the divine mystery revealed in Christ (Ephesians 3:2). In this context, Paul is portraying God as the master of a great household, wisely administering it through Paul himself as the obedient servant of the Lord Jesus Christ.\n\nAlso significant in what Paul is saying is that once we’re called and placed into the body of Jesus Christ, the stewardship that is required of us is not a result of our own power or abilities. The strength, inspiration and growth in the management of our lives must come from God through the Holy Spirit in us; otherwise, our labor is in vain and the growth in stewardship is self-righteous, human growth. Accordingly, we must always remember the sole source of our strength in pleasing God: “I can do all things through Christ who strengthens me” (\nPhilippians 4:13 NJKV). Paul also said, “But by the grace of God I am what I am, and his grace to me was not without effect. No, I worked harder than all of them—yet not I, but the grace of God that was with me” (1 Corinthians 15:10\n\nMore often than not, when we think of good stewardship, we think of how we manage our finances and our faithfulness in paying God’s tithes and offerings. But as we’re beginning to see, it’s much more than that. In fact, it’s more than just the management of our time, our possessions, our environment, or our health. Stewardship is our obedient witness to God’s sovereignty. It’s what motivates the follower of Christ to move into action, doing deeds that manifest his belief in Him. Paul’s stewardship involved proclaiming that which was entrusted to him—the gospel truth.\n\nStewardship defines our practical obedience in the administration of everything under our control, everything entrusted to us. It is the consecration of one’s self and possessions to God's service. Stewardship acknowledges in practice that we do not have the right of control over ourselves or our property—God has that control. It means as stewards of God we are managers of that which belongs to God, and we are under His constant authority as we administer His affairs. Faithful stewardship means that we fully acknowledge we are not our own but belong to Christ, the Lord, who gave Himself for us.\n\nThe ultimate question, then, is this: Am I the lord of my life, or is Christ the Lord of my life? In essence, stewardship expresses our total obedience to God and our Lord and Savior, Jesus Christ.\n", "pred_label": "__label__1", "pred_score_pos": 0.9215548038482666} {"content": "Who at School\n\nWho at School\nReviewer: Drew A\nRate this Review\nRate this Reviewer\nRate this Book\nWhen Stars Were In Reach:\nThe Who At Union Catholic High School - November 29, 1967\n292 pages\nFebruary 10, 2013\nISBN 10:\nISBN 13:\n\nTrue story of a group of plucky and determined high school students who dreamt big and put their high school on the map by coaxin a reluctant administration to enter the rock concert business in the fall of 1967 by booking a little-known British rock band named The Who.\n\n Before achieving worldwide mega-stardom upon the release of their album Tommy in May 1969, The Who were successful only in their native UK and in Europe.  Even though they had burst onto the scene in early 1964 just after the emergence of the Beatles and Rolling Stones, and at roughly the same time as the Kinks, they were the only of those four legendary bands to miss the initial British Invasion of America in 1964 and 1965. However, there were isolated pockets of Who fandom developing in America where their records were charting and being played regularly on the radio. Detroit, Boston, Chicago, and New York were all cities that took the Who to their hearts in the mid-1960s and remained loyal strongholds for the duration of their career.  By 1967, a second British Invasion was happening and this time, The Who (along with the Jimi Hendrix Experience and Cream) were part of it. The appearances of the Who and Hendrix at Monterey in June 1967 launched their careers in America and exposed them to the rest of the country; by the autumn of 1967, both bands began relentless touring of America that would take them into the next decade and beyond (Hendrix' sudden death in September 1970 of course halting his career). However, due to the young rock music industry at the time, bands still played in some rather unusual venues as rock music transitioned out of the music halls and theatres of previous decades and into the clubs and arenas that became common in the 1970s through to the present day. One type of venue that bands still played at this time was high school gymnasiums, and the story of one of the Who's concerts at such a place is the topic of Michael Rosenbloom's book When Stars Were In Reach.\n\nBy late 1967, The Who had a reputation in the UK as one of the loudest, most explosive, and most exciting live acts around, in both the musical and visual senses, for several years and they had begun establishing this reputation in America as well.  On the back of their triumphant showing at Monterey, they were in the midst of an American tour in late 1967 when they rolled into Scotch Plains, New Jersey on the evening of November 29 to play at Union Catholic High School (UCHS).  Having played two high school gyms already on this tour, this wasn't unusual for the Who, but it was unusual for the students and faculty of UCHS, and the story of how this concert came to be is at the heart of Rosenbloom's book.\n\nEstablished in 1962, Union Catholic High School is a religious high school run by the order of Marist brothers. Even though the school educated both boys and girls, the sexes were kept separate within the building, sharing common areas such as the gym.  As several of the alumni who attended the school in the mid-to-late 1960s recalled, the school was rather unremarkable and was looking for a way to put itself on the map. The idea of staging a concert there was stumbled upon because some students had attended rock concerts at other local high schools within the past year or so, with bands such as the Left Banke and the Lovin' Spoonful having recently played in the area.  The Who were still mainly a cult band in the US at this point, but there were several boys at UCHS who were big fans, with a couple in particular having already seen them at Asbury Park, New Jersey and in Chicago earlier in the year.  The decision was made to try and bring a rock band to the school for a concert, but letters sent the to management of several American rock bands went unanswered before it was decided upon to try for the Who. With the help of a fellow student who played in a local rock band and was well-connected, the school were able to book the Who to play at the school for only $1,800! With a total budget of $3,000 allocated by the school, this was a stroke of luck and the only stipulation was that the helpful student's band, the Decoys, were to be the only opening act for the Who.\n\nFrom here, the author chronicles the various students and faculty members who all had a small part in bringing the Who to UCHS and how they pulled the whole thing off. The fact that he has managed to track so many of them down after all these years in order to get their memories is impressive, as is the way he tries to set the context of what it was like to be a Catholic high school student in New Jersey in the heady times of the late 1960s.  He was even able to track down and interview many of the faculty at the time, as well as the booking agent who is now in her early 90s and living in Florida. Throughout it all, what struck me is how impressive it was that these high school students were able to pull off the entire endeavor while staying under budget and getting everything to run smoothly. What really comes across is how much simpler and more innocent those times were; this is vividly brought home with the photographs of the Decoys and Who performing.  They are literally playing on a makeshift stage underneath the basketball hoop in what looks like an typical American high school gym. Seeing the legendary Who (who, as was mentioned before, were not as well known in the US in '67 as they would be from '69 onward) in all of their 1967 Edwardian glory playing on a tiny stage in a gymnasium is quite a trip! Cramming their massive amplifiers and PA stacks, not to mention Keith Moon's huge and resplendent drum kit, on such a small makeshift stage is something you couldn't even fathom in 2014, but in 1967 it was not only feasible but commonplace. The Who concert was such a success that the students managed to bring another legendary British rock band, Cream, for a concert on March 26, 1968, of which there are some great photos: these include Clapton and Baker jamming onstage under the basketball hoop, and the two of them relaxing \"backstage,\" which was in reality just the teacher's lounge! The school even booked the Jimi Hendrix Experience, although the administration got cold feet based on his reputation and backed out of promoting the show, and they never played at UCHS. Eventually, however, rock concerts became big business, appearance fees skyrocketed, and the school became a victim of its own success. After bringing in acts such as the Lovin' Spoonful, Iron Butterfly, Vanilla Fudge, and Black Sabbath, UCHS began to lose money on the venture and by 1971 they were out of the rock concert business for good.\n\nIn addition to the story of how the Who were brought to play at UCHS, Rosenbloom also interjects several more personal vignettes into the book. These include his recent interviews with and updates on the members of the Decoys, describing what they've done since 1967 and what they're doing currently. He also includes some biographical anecdotes of his own life growing up in Brooklyn during that era.  As a teenager and young adult in those years, the author was extremely fortunate to have frequented the Fillmore East and to have seen legendary acts such as the Who, Led Zeppelin, Cream, Jefferson Airplane, Jimi Hendrix, and others in and around New York City.  He also even followed the Who on tour in 1971 and managed to meet Pete Townshend twice: once in London in 1973 and again in New York City in 1974.  However, by 1975, when he last saw the Who, Rosenbloom realized that the earlier innocence and excitement of rock concerts was beginning to rapidly disappear.  In a way, this perfectly mirrored what UCHS found out as they continued to stage bigger and bigger concerts.\n\nWhile some of the chapters interspersed throughout the main story that describe what the principal players at UCHS are doing at present tend to divert focus away a bit and are a little jarring, overall this is a very fun and interesting book to read. Similar to Dave Schwensen's books on the Beatles' concerts at Shea Stadium and in Cleveland, it transports the reader back in time to a specific moment when rock music was young and exciting, the world was changing, and possibilities seemed endless.  A very important thing that the author and former students point out is how open-minded and supportive the Marist brothers were in running UCHS and allowing the students to stage rock concerts, which certainly wouldn't have been expected in 1967 and probably wouldn't even be in 2014, for that matter! All of the former students, in their recollections, look back fondly on their time at the school and their little moment where they were able to put UCHS on the map.  Apart from the slight disruption of flow, I really enjoyed this book; one of the main reasons was the great photographs of the concert that were included throughout. It's hard to think of such a band as the Who's stature playing in a high school gym, but in that period in time it wasn't unusual and while seeing those photos is a bit surreal, it also hammers home the point of how much has changed between 1967 and 2014.  Overall, if you're a hardcore Who fan, this is an interesting and unique book that deserves a place on your shelf; even if you're not a huge Who fan, if you're a fan of rock music and 60s rock in particular, When Stars Were in Reach will transport you back in time to a moment when some high school kids and the teachers who trusted them pulled off something no one would have expected them to do.\n\n(for more great content please visit my site, the Rock and Roll Chemist, at http://www.rnrchemist.blogspot.com and follow me on twitter @rocknrollchem)", "pred_label": "__label__1", "pred_score_pos": 0.5877697467803955} {"content": "Ausdance In Conversation With...\n\n‘Ausdance In Conversation With...' is a podcast created by Ausdance NSW that address the hard-hitting issues that affect the dance sector and wider arts community. Topics include mental health & the body, biodiversity, and parenting in the dance industry. In the first Podcast, the conversation features our guest host Annalouise Paul who speaks with Gwen Korebrits (CEO of Dance Health Alliance) and Linda Gamblin (Head of Training and Sydney Dance Company) about mental health in the dance industry.\n\n\nMental Health\n\nThe societal rise in awareness of mental health and surrounding issues is currently more evident than ever. How is the dance sector responding to this in 2019? How is the dance sector responding to trends in thinking and being proactive about mental health? What are your approaches to self-care so we can learn from and share with each other?\n\nBio Diversity\n\nNew Australia Council for the Arts CEO, Adrian Collette says \"arts companies that ignore diversity are \"out of touch\". See full article Here on ABC arts. Bio Diversity in all living systems is crucial for survival, so what of our dance ecosystem? There is much talk about euro-centricity, in dance culture but what does it all mean? Sharing cultural knowledge respectfully in the studio, classroom or workplace is essential for creativity, growth, and longevity of our Australian dance landscape. How do we sensitively share cultural and folk dance forms while not misappropriating them?\n\nParenting and Family life \n\nWorking in the arts can be demanding on many levels, commonly with our time and often for a lower income than in other industries. \nHow do we manage our responsibilities to families, such as parenting or caring for elders or siblings? What are expectations and associated myths inside our industry when it comes to work and family balance? \nDoes this come with an inherent clash? \n\n\nOriginally called ‘Lets talk about it’, our pilot podcast program was partnered with choreographer, Natasha Crane. The program addressed issues and points of discussion that dancers are talking about, including mental & body health, project management, work visas, and career strategy. \n\nGuests and topics included:\n\nKelley Abby, choreographer– mental tips to spark creativity\n\nPetros Vournelis, Master of Chiropractic and Health Science - treatment and pain management for the dancer's body\n\nAmy Campbell, choreographer – the power of Networking\n\n\nYou can go to the podcasts here at our Soundcloud!", "pred_label": "__label__1", "pred_score_pos": 0.8721137046813965} {"content": "The Chip - How Two Americans Invented the Microchip and Launched a Revolution\n\n\nT.R. Reid\n\n\nOctober 9, 2001\n\n\nRandom House Trade Paperbacks\n\n\nWhile electrical engineering and physics are two fields I have little formal education in, I’ve always enjoyed learning more about them, especially as they pertain to computers. So I picked up The Chip with the hopes of learning more about the inner workings of microchips as well as the people who helped create what is arguably the greatest invention of the 20th century. I was not disappointed. The Chip managed to find a good balance between the technical and the narrative to craft an engaging story. While there were some missed opportunities to dive deeper into the technical, the primary goal of this book was to offer a historical perspective on the evolution of a critical piece of technology and to that it definitely delivered.\n\nThe Chip follows Jack Kilby, an electrical engineer at Texas Instruments, and Robert Noyce, the eventual co-founder of Intel, in a race to develop, patent, and monetize a solution to the tyranny of numbers problem that was plaguing electronics at the time. In 1959, both of these men had the “monolithic idea”, coming to the realization that multiple devices could be connected on a single piece of silicon in order to make interconnections part of the manufacturing process to drastically reduce the cost, weight and size of each element. The microchip was born.\n\nFrom there the book follows each individual’s respective company’s rush to get a patent out on this groundbreaking invention and the ensuing decade long legal battle over patent rights. By the time the patent fight was officially resolved (going to Noyce, though Jack Kilby did end up getting a Noble Prize for his part), however, the production of semiconductor chips was already a multi-billion dollar industry. Initially the microchip struggled for a few years while the industry developed the machinery to properly mass produce the circuits, requiring the chips that were produced to be sold at a price that was cost-prohibitive for any kind of consumer product. Fortunately, with the dawn of the space race, there was suddenly a buyer out there willing to spend any amount of money for something small, light, and reliable to send man to the moon. With this steady cashflow, production of the circuit steadily improved.\n\nGordon Moore, a friend of Robert Noyce’s, made an off-the-cuff prediction in 1964 that the number of transistors capable of being placed on a chip would double every three years. This glib predicition, now referred to as Moore’s Law, has held true all the way up to the 21st century. With the decline in production cost and the steady incline in capacity, the semiconductor industry has proven to be the most productive in American industrial history. The world as we once knew it was forever changed by this technology. Texas Instruments, in fact, made the first microchip run product to completely revolutionize our way of life: the calculator. Within the first decade after the calculator hit the market in 1965, it’s predecessor, the slide rule, had become nothing more than a museum piece, making calculators as pervasive in society as the modern computer is today.\n\nAll in all, The Chip offers a great perspective on how various inventions and discoveries have evolved overtime to culminate in this great triumph of human ingenuity. Reid makes sure to give credit where credit’s due, touching on all the greats including Edison, Turing, Boole, Shannon and more, and fitting them together to demonstrate how technology builds and evolves through the years. None of the technology we have today would be possible without the diligent work of those who have come before us. While I sometimes found the pacing of this book odd and the jumps between topics clunky (similar to this review), overall this book was a fun read and I highly recommend it.\n\n\nThroughout my 10 year career I have worked as a web developer, systems administrator, software engineer, security analyst and now cybersecurity engineer. I currently develop software applications to automate security vulnerability and compliance scanning and reporting for a multinational financial institution.", "pred_label": "__label__1", "pred_score_pos": 0.9891270995140076} {"content": "Explained: Permutations vs. Combinations\n\nBenchmarked Path\nSep 10 · 7 min read\n\nYeah, I’m talking about those mystical buttons on your calculator (nCr and nPr) that you graciously hit and out spews the correct answer. Magic.\n\nThe two concepts are pretty straightforward so it shouldn’t take too long to explain. I am going to explain the differences; when to use them; and what exactly your calculator is computing when you enter them (the equation).\n\nSo the best way to illustrate their use case is through two examples:\n\nExample 1: There are 10 athletes competing in a race where the first-place winner will receive a gold medal, the second-place winner will receive a silver medal, and the third-place winner will receive a bronze medal. If they win a medal they get to be on the tiered podium. The rest receive nothing.. not even a participation trophy…cause this is America..and if you ain’t first you’re last.\n\nQuestion 1: how many possibilities are there for the podium?\n\nQuestion 2: how many possibilities are there for who wins a medal?\n\nWhen do you use nPr and when do you use nCr?\n\nThe Answer:\n\nWhen to use them:\n\nthe two questions may appear similar, but there is a fundamental difference which will dictate which equation to use.\n\nQuestion 1 (podium) factors in the relevancy of order:\n\nIf Bob, Lacy, and Sarah are on the podium, Bob coming in first is not the same as Bob coming in second. This is a different outcome. Order is relevant, so you will use nPr.\n\nnPr (permutations) is used when order matters.\n\nQuestion 2 does not factor in the order of the podium, it is simply asking who wins a medal. The question is not delineating between gold, silver, or bronze, they are all medals and that is all that matters. When the order does not matter, you use nCr.\n\nnCr (combinations) is used when order does not matter.\n\nWhat they actually do:\n\nNow that you hopefully understand when to use which one, let’s move on to what they actually do.\n\nAs mentioned, nPr is finding all of the permutations that exist within a given set for a given subset. In our particular example, it will look at how many different outcomes can result from the race which would result in a podium permutation (different order).\n\nthere are 2730 different outcomes that can occur with the podium\nthis is the equation you’re calculator is computing. n is the number of contestants in the race, and r is the number that makes it to the podium\n\nIn our race:\n\n15 -3 = 12\n\nOkay, so we’ve broken the magical button a little bit more down, but you might be asking yourself now…why is this the equation, and why are all the numbers yelling at me!!!! — what does the ! mean\n\n! or otherwise known as factorial is simply a convenient way to express a series of multiplication.\n\nIn particular:\n\nThis is saying that n! = n x (n-1) x (n-2) (n-2)…and so on until you get all the way to the bottom — but not zero because when you multiple by zero the answer becomes zero\n\nLet’s illustrate by going back to our example:\n\nn = 15 (because there are 15 athletes)\n\nn! = 15! = 15 x 14 x 13 x 12 x 11 x 10 x 9 x 8 x 7 x 6 x 5 x 4 x 3 x 2 x 1\n\nThis is what your calculator is computing when you enter the !button.\n\n15! = 1 307 674 368 000\n\nthis number represents the maximum number of different orders that can occur from a list. Our list is 15 runners, and there are 1 307 674 368 000 different ways their placement can be arranged. The multiplied number is decreasing because as a number is placed, that spot is now taken up.\n\nIf Runner 1 places in 15th, there are only 14 other places to land for all remaining runners, if Runner 2 places in 14th, there are now only 13 spots left for all runners. Like most things, its more easily explained by scaling the numbers:\n\nSimpler Example (can skip if you already grasp):\n\nLet’s say there are four available seats, and 4 friends looking to sit. For the first seat, there are four potential outcomes (any one of the four friends can grab it), once it has been taken, the second seat only has three different potential outcomes (any one of the 3 unseated friends can grab it), the third seat only has two possibilities, and the last seat by default only has one option — the poor sucker that hasn’t sat yet.\n\nAs a result, mathematically, there is 4 x 3 x 2 x 1 potential outcomes.\n\nIf the race was simply asking how many different ways can the order of the race change, we wouldn’t use nPr, we would use factorial(!)…but it’s not…it’s asking how many times the podium can change which is specifically looking at the top three runners, not all of them. As a result, we don’t use factorial. Factorial is too wide a scope.\n\nBecause it is too wide, we need to reduce it. We are only examining the first three positions, not the remaining 12. Stated differently, if the order of the first three changes, then it is considered a new permutation, but if the order of the first three stays the same, (even if the order of the remaining 12 changes) then we don’t consider it a new permutation.\n\nBecause 12 positions are irrelevant we need to reduce their importance in the equation.\n\nThis is why we get\n\nThe easiest way to remove the relevance of the remaining 12 positions is to divide the full possibility number(!) by the possible number for irrelevant positions. As previously stated, there are 12 positions that are irrelevant to our podium.\n\nso 15! divided by (15 -3)!\n\n12 because it is the number of runners whose order we don’t care about\n\nThis equates to writing out:\n\nwhich equates to 15 x 14 x 13 because all of the rest of the numbers cancel themselves out.\n\n15 x 14 x 13 also = 2730\n\nNow let’s look at nCr:\n\nWhew, that took a long time to get through permutations, this round should be quicker because I’ve already talked about factorials now.\n\nAs mentioned, nCr, is finding all of the combinations that exist within a given set for a given subset when order doesn’t matter. In our example, it looks at the number of different combinations that can occur for winning the medal (i.e. finishing in the top three)\n\n15c3 is usually written in the bracket form but means the same thing\n\nNow right off the bat, you’ll notice that there is less combinations then there are permutations (455 < 2730). This makes sense because combinations is marking ABC and ACB as the same, whereas permutation differentiates between the two. Let’s examine what your calculator is doing when you hit the button.\n\nequation for nCr\n\nNow the first thing you should notice is that the equation is pretty similar to the permutations equation, except there is more added to the denominator (it is k!(n-r)!, not just (n-r)!\n\nAccording to the previous statement, this makes sense as adding more to the denominator will result in a smaller outcome (e.g. 10/2) < 10/5), and we’ve established that combinations will be smaller than permutations.\n\nIf you paid attention/my writing makes any sense, we should already know why you add (n-r)! to the equation. If you don’t, ctrl/command +f “too wide a scope” and read that passage again.\n\nWe add r! to the denominator because there are r! ways that the medal winners stay the same, while the order of them switches.\n\nFor each set of three medal winners, they can be shuffled around 3! times to create a new permutation (3! = 6 times)…but we don’t care about this permutation. Those 6 different permutations are really just one combination of athletes, so we want to pull it from our answer. The easiest way to do this is to add it to the denominator so that it is pulled out of numerator.\n\n= 455\n\nIt’s no coincidence that 455 x 3! = 2730.\n\nAnyways, that’s all I’ve got for today. Hopefully, that makes sense.\n\n\nBenchmarked Path\n\nWritten by\n\nOn a journey to master data science…starting from scratch. I’ll be posting along the way to help my absorption, and hopefully, help you too.\n", "pred_label": "__label__1", "pred_score_pos": 0.9371265172958374} {"content": "Young explorers, future cities!\n\nJubilee Park, Canary Wharf\n\n23 June 2019\n\n11am – 4pm\n\n\nSuitable for children ages 4+\n\n\nExplore ideas for cities not yet known… unimaginable and fantastical! How big can we build? How will we move? How can we grow our food and gather our water?\n\n\nYour little explorers will join together with city designers from Grimshaw Architects to imagine, draw and collage a city of the future!", "pred_label": "__label__1", "pred_score_pos": 0.9997197389602661} {"content": "How to Calculate Torsion Constant\n\n••• MarcPo/iStock/GettyImages\n\nThe torsional constant is a physical property of a material. It is most commonly used to describe metal beams and is denoted by the variable \"J.\" When a torque is applied to a metal beam, it will twist a certain angle. The angle that the beam twists depends on the beam's rigidity, length and torsional constant. The torsional constant of a beam depends on not only the beam material, but also the beam shape.\n\n Multiply the torque applied to the beam by the length of the beam. Ensure that the length of the beam is in meters.\n\n Divide the value from Step One by the angle of twist of the beam. Ensure that the angle is in radians. If the angle is in degrees, divide the value by 360 and multiply it by 2 * pi to convert it to radians.\n\n Divide the value from Step Two by the the shear modulus of the material. A table of shear modulus values for common materials is provided in the resources section. The resulting value is the torsion constant. The unit of the value is in meters^4.\n\n\nAbout the Author\n\n\nDont Go!\n\nWe Have More Great Sciencing Articles!", "pred_label": "__label__1", "pred_score_pos": 0.9996044635772705} {"content": "Olympics by: penita miller\n\nThe Beginning of Something Great\n\nThe olympic games originated from ancient Greece 3,000 years ago. The olympic games were revised / hanged in the late 19th century and has became the world's most popular sporting competition. The olympic games were held every four years from the 8th century B.C to the 4th century A.D they were located in the western Peloponnese peninsula in honor of the greek God Zeus. the first modern olympics was in 1896 in Athens. There was 280 participants from 13 nations. Competing in 43 events. The summer and winter games since 1994 have been held separately and have alternated every two years (201o).\n\nBaron Pierre de Coubertin\n\nBaron Pierre de Coubertin was the founder of the modern Olympics. He was a French aristocrat. Bardon announced that he had made the 20th anniversary of games in 1914. In 1984 Robert Barney and sports historian leaded over to tie his shoe and discovered a symbol etched into a weather-beaten stone it was five linked rings. Barney specialized the history of the Olympics in that time. At that point in time the five linked rings was discovered to be a relic of Nazi filmmakers. The Nazis liked us too believe that the Olympic symbol emerged from the mists of Delphi. “The Olympic rings were inaugurated in June 1914, the same month that a bullet felled an archduke and sent the world tumbling into war. It has since become one of the most-recognized logos in the world and a symbol for peace” (2010).\n\nBaron Pierre de Coubertin\n\nThe Naked Olympics?\n\nAncient Greek athletes were naked when they competed, to display their physical prowess and also to pay homage to Zeus by showing him how they had trained their bodies to their physical peak. The more physical perfection the athletes showed could be intimidating to their competitors. Athletes were often an inspiration to artists and sculptors, who used the athlete’s physical prowess and movements to inspire their work. Athletes took great care to protect their skin.Before starting the day’s training or competition, athletes would rub their body with olive oil then dust themselves with fine sand.After competing, athletes would scrape off the sweat, oil and sand with a curved tool called a strigil. Then they would be washed using water and a sponge.\n\n\nTrack events included the stade race – the ancient version of a sprint – as participants ran from one end of the track to the other (approximately 200 meters). There was also a two-stade race (approximately 400 meters), as well as a long-distance run ranging from seven to 24 stades (Rosenbaum).\n\nField events, which resembled their modern equivalents, included the long jump, discus, shot put and javelin. The five-sport pentathlon included wrestling along with the discus, javelin, long jump and a sprint.\n\nThere is no women’s 50-kilometer race walk. Otherwise, women’s events are the same as men’s with two exceptions: Women run the 100-meter hurdles instead of the 110, and compete in the seven-event heptathlon rather than the ten-event decathlon.\n\nAthletics events have came quiet a long way now we have 40 Olympic events. Including archery, artistic gymnastics, Olympic, badminton, basketball.beach volleyball, boxing, canoe slalom, etc.\n\nGreat Leaders\n\nUsain bolt is a 6’5, 207 9 times olympic champion. The bolt of right now holds the world record in the 100m, 200m, and the 4x100m with times of 9.58 seconds, 19.19 seconds, and 36.84 seconds. His first world record was in the 200m in 2008 in New York. Usain bolt is a 6’5, 207 9 times olympic champion. The bolt of right now holds the world record in the 100m, 200m, and the 4x100m with times of 9.58 seconds, 19.19 seconds, and 36.84 seconds. His first world record was in the 200m in 2008 in New York( 2012, Bolt).\n\nAstylos of Croton in southern Italy won a total of six victory olive wreaths in three Olympiads (488-480 B.C.) in the stade and the diaulos (twice the stade) events. In the first Olympiad, he ran for Croton and his compatriots honored and glorified him. In the two successive Olympiads, however, he took part as a citizen of Syracuse. The people of Croton punished him by demolishing his statue in their city and converting his house into a prison( 2016).\n\nMilon, a pupil of the philosopher Pythagoras, was one of the most famous athletes in Antiquity. He came from the Greek city of Croton in southern Italy. He was six times Olympic wrestling champion. He first won in 540 B.C., in the youth wrestling event, and then five times in men's wrestling. This is a unique achievement even in today's competition context. He also won seven times in the Pythian Games, nine times in the Nemean Games, ten times in the Isthmian Games and innumerable times in small competitions. In the 67th Olympiad (512 B.C.), in his seventh attempt for the championship, he lost to a younger athlete, Timasitheus. There are many accounts of his achievements (2016).\n\n\nHttp://www.facebook.com/pages/Aboutcom-Track-Field/253290098050267. \"Olympic History, Old and New.\" About.com Sports. MIke Rosenbaum, 22 May 2014. Web. 06 Dec. 2016.\n\n@olympics. \"And the Winner of the Medal Design Competition Is....\" International Olympic Committee. N.p., 06 July 2016. Web. 06 Dec. 2016.\n\nHttps://www.facebook.com/AboutHistory1800s. \"How a French Aristocrat Founded the Modern Olympics.\" About.com Education. Robert McNamara, 16 Aug. 2016. Web. 06 Dec. 2016.\n\nHistory.com Staff. \"The Olympic Games.\" History.com. A&E Television Networks, 2010. Web. 06 Dec. 2016.\n\nAt. \"Ancient Olympics in Olympia Greece.\" Ancient Olympics in Olympia Greece. N.p., n.d. Web. 06 Dec. 2016.\n\nKennedy, Pagan. \"Who Made the Olympic Rings?\" The New York Times. The New York Times, 14 July 2012. Web. 06 Dec. 2016.\n\nCreate.ph, HSThree.com And. \"Biography.\" Usain Bolt. N.p., n.d. Web. 06 Dec. 2016.\n\n\"The Athlete.\" Olympic Games | Winter Summer Past and Future Olympics. Olympic.org, n.d. Web. 06 Dec. 2016.\n\n\"Olympic Myths and Legends - Olympic-Legacy.com.\" Olympic Myths and Legends - Olympic-Legacy.com. Photenhancements.com, 2003. Web. 06 Dec. 2016.\n\n\"First Modern Olympics Is Held.\" History.com. A&E Television Networks, n.d. Web. 06 Dec. 2016.\n\n\"What Did the First Ancient Olympians Wear in the Games? | The Classroom | Synonym.\" The Classroom | Synonym. John Green, n.d. Web. 06 Dec. 2016.\n\n\"Ancient Greek Culture and Civilization.\" Leadership and Management in a Changing World. N.p., n.d. Web. 06 Dec. 2016.\n\nMade with Adobe Slate\n\nMake your words and images move.\n\nGet Slate\n\nReport Abuse\n\n", "pred_label": "__label__1", "pred_score_pos": 0.9973445534706116} {"content": "Paranormal Phenomena\n\nMysterious ghost in white filmed by paranormal team\n\n\nA video of a mysterious figure in a long white dress appearing on a home security camera. The footage shows a quiet living room in the middle of the night when suddenly a white figure appears by the doorway ans slowly makes its way across the entrance before disappearing out of sight.", "pred_label": "__label__1", "pred_score_pos": 0.9992794394493103} {"content": "Pliny the Younger\nRoman author\n\nPliny the Younger\n\nRoman author\nAlternative Title: Gaius Plinius Caecilius Secundus\n\nPliny the Younger, Latin in full Gaius Plinius Caecilius Secundus, (born 61/62 ce, Comum [Italy]—died c. 113, Bithynia, Asia Minor [now in Turkey]), Roman author and administrator who left a collection of private letters that intimately illustrated public and private life in the heyday of the Roman Empire.\n\nBorn into a wealthy family and adopted by his uncle, Pliny the Elder, Pliny began to practice law at age 18. His reputation in the civil-law courts placed him in demand in the political court that tried provincial officials for extortion. His most notable success (100) was securing condemnation of a governor in Africa and a group of officials from Spain. Meanwhile, he had attained the highest administrative posts, becoming praetor (93) and consul (100).\n\n\nLike the historian Tacitus, his contemporary, Pliny accepted the Roman Empire as it was, serving under “good” and “bad” emperors and making the conventional complaints against the latter in his writings. Between 100 and 109 he published nine books of selected private letters, beginning with those covering events from the death of Emperor Domitian (September 97) to the early part of 100. The 10th book contains addresses to Emperor Trajan on sundry official problems and the emperor’s replies.\n\n\n\n\n\nPliny published his forensic and literary speeches with care, and late in life he took to the contemporary fashion for light verse in the style of Martial. Though fulsome in the praise of contemporary writers, his judgment of the dead Statius was fair: “He was ever writing poems with greater pains than ability.” His letters to his fellow advocate Tacitus, then occupied with his first major work, tell the little that is known about the date and circumstances of the composition of the Historiae, to which Pliny contributed his account of the eruption of Vesuvius that destroyed Pompeii and other cities. (Pliny was present at the eruption; Pliny the Elder was killed by it.) The biographer Suetonius was among Pliny’s protégés.\n\nThe Editors of Encyclopaedia Britannica This article was most recently revised and updated by J.E. Luebering, Executive Editorial Director.\nAre we living through a mass extinction?\nThe 6th Mass Extinction", "pred_label": "__label__1", "pred_score_pos": 0.9889213442802429} {"content": "Hong Kong Stock Exchange Proposes Framework for Regulating Cryptocurrency\n\nOctober 23, 2018 07:46 UTC\n\nThe Hong Kong Stock Exchange (HKEX) believes that legal frameworks around finance and cryptos should be the same.\n\nThe world’s sixth largest stock exchange in its research paper looks at the need for regulators to keep up with the pace of financial technologies. And if they lag behind, the existing laws of finance should be applicable to the companies in the FinTech space, based on their resemblance with the traditional services. Blockchain, for instance, could be brought inside the space of investment, trading, clearing, and settlement. Similarly, issuing digital assets on blockchain could be governed by an existing securities regulatory framework.\n\n“Despite the difference in Fintech regulations among countries,” HKEX added, “the principle of consistency generally applies, i.e. financial services with the same nature are subject to the same regulations under the existing legal framework, so as to maintain fair competition, ensure regulatory effectiveness and prevent regulatory arbitrage.”\n\nSupervisory Sandbox\n\nCrypto innovations can improve a system as much as it can hurt it. The HKEX paper takes instances from other countries and their blockchain testing labs. Known as “supervisory sandbox testing,” the process aims to minimize risks by deploying blockchain and crypto innovation among a privately-governed network of users with minimal adaption requirements and regulatory restrictions. A full-scale deployment ensues only after the crypto product passes on the serviceability, the security, and the regulatory front.\n\nNoting that supervisory sandbox practices are only limited to the banking sectors in its current format, the HKEX report recommends that these testing models should be extended to non-banking sectors such as blockchain and cryptos as well. Excerpts:\n\n“Given that Fintech Supervisory Sandbox (FSS) is timely and flexible in making a regulatory response to market innovations, it can encourage Fintech innovations and minimize the negative impact of regulatory uncertainties with effective risk prevention and control. It is, therefore, the most suitable regulatory tool for Fintech.”\n\nRegTech: When Regulators Innovate Their Own Practices\n\nThe HKEX research paper proposes that Hong Kong regulators establish an effective regulatory technology (RegTech) system by incorporating more use cases of AI and big data. The system would include a better, face recognition-enabled KYC process, sentiment monitoring, and identifying corporate relationships.\n\nIn the context of crypto and blockchain startups, a working RegTech system would allow them to approach legalities and auditing faster than usual. They would be able to put their business papers, including “registration information, annual reports, notices/announcements and information on its shareholders/legal persons and connected companies,” online to seek approvals in a timely fashion.\n\n“There are now some business search engines (e.g. “Handshakes”) in the market which can help regulators analyze the nexus of commercial transactions and relationships in the financial market,” the HKEX paper added.\n\n“These business search engines can analyze public information of listed issuers faster and in greater depth with the help of technologies, providing the accurate connections between companies and discovering possible insider dealing. This would be the primary application of big data in RegTech.\n\nFeatured image from Shutterstock.\n\nMore of: hong kong\n\nNew Delhi-based Yashu Gola has been working as a cryptocurrency analyst/journalist since 2013. He is an information technology graduate, a cryptography junkie, a filmmaking enthusiast, and an avid reader of Jon Erickson, Agatha Christie, JK Rowling, and Isaac Asimov.", "pred_label": "__label__1", "pred_score_pos": 0.7233843207359314} {"content": "Waterproofing FAQ’s\n\nQ: How does Isothane EM behave differently from other waterproofing coatings?\n\nA: Isothane EM cures by reaction with atmospheric moisture. In this case urea bonds are formed which promote hydrogen bonding. Water borne or solvent borne coatings dry by evaporation and do not chemically crosslink.  Isothane EM coating is very tough and elastic with multi dimensional stability.\n\nQ: How is Isothane EM affected by atmospheric conditions?\n\nA: Provided that atmospheric moisture is present the coating will cure. However, cold temperatures will show the cure rate and hot temperatures will accelerate it. The application limits are 5°C – 50°C. The moisture curing reaction allows Isothane EM to remain fluid and therefore workable for a long period.  Isothane EM does not change chemically over time once cured. Isothane EM will not embrittle at low temperatures nor will it suffer flow at high temperatures.\n\nQ: Where can Isothane EM be used?\n\nA: Isothane EM adheres well to all standard roofing materials. Isothane EM is immediately waterproof once applied and will not wash off a roof.\n\nQ: What surface preparation is required?\n\nA: All surfaces should be touch dry. Gaps, cracks and voids must be treated with a proprietary mastic or foam filler. Overlaps and upstands should be reinforced with proprietary nylon mesh. Blisters in roofing felt should be made good prior to coating.\n\nQ: What about priming?\n\nA: Isothane PU Prime is a one pack, moisture curing polyurethane primer which promotes adhesion and consolidates porous or friable surfaces.\n\nQ: I need to take advantage of a gap in the weather to complete a job. What is the overcoating time for Isothane EM range?\n\nA: Overcoating may begin as soon as the first coat is cured. This will take between 12 and 48 hours. Isothane PU Primer will be ready to accept a top coat in between 2 and 48 hours, in typical conditions in around 4 hours. Typically, Isothane EMA and EMB will need to be left overnight before overcoating. In the event that more than 72 hours elapses between coats, re-priming with Isothane PU Primer is recommended.\n\nQ: What pot life can I expect from the Isothane EM range, and do you have any tips on storage?\n\nA: As soon as Isothane EM is exposed to atmospheric moisture, it will start to cure and we recommend immediate usage. If a tin is partly used and resealed, a skin will form on the surface which will impede further ingress of moisture. The skin must be removed before use. Any residual Isothane EM in a 25kg pail may be decanted into clean, dry paint tins or similar for use in the future. The tins must be inverted prior to storing.In the event that air enters through the lid the Isothane EM around the lip will cure and impede further ingress of moisture. A 12-month shelf life is quoted for unopened containers.\n\nQ: How do I tackle an area that needs repair, without recoating the whole area?\n\nA: Cut back to a well adhered area. Ensure that the surface is dry and free from dirt, grease and loose materials. Clean the surrounding area with solvent. Prime with Isothane PU Primer. Coat with Isothane EM membrane ensuring that an overlap of 150mm is achieved to the existing material.\n\nQ: Are there any Health & Safety considerations with Isothane EM?\n\nA: All precautions are listed on the relevant Safety Data Sheets.\n\n\n\nNeed more details?\n\nCall a member of our team +44 (0)1254 872555\n\n\nNewhouse Road,\nHuncoat Industrial Estate,\n\nGeneral Enquiries\n\n\nSales Enquiries\n\n\nTechnical Enquiries\n\n\nPrepolymers & Export Enquiries\n\n\n\nEnter your email to receive latest newsletters and industry updates\n\n\nI'm fine with this", "pred_label": "__label__1", "pred_score_pos": 0.990378201007843} {"content": "What happens to our property and debt if we get divorced?\n\nThe easiest way to deal with property division during a divorce is to decide how to divide the property up amongst yourselves. However, because most divorcing couples aren’t able to amicably decide how to deal with divorce property division issues, however, the matter usually ends up in court.  There are two general ways to handle divorce property division.\n\n\nEquitable Distribution: All other states typically follow equitable distribution. This means that a judge decides what is equitable, or fair, rather than simply splitting the property in two. In practice, this may mean that two-thirds of the property goes to the higher earning spouse, with the other spouse getting one-third. Note that when courts divide property, that does not necessarily mean the property is literally, physically split. A court will usually add up the total value of the marital estate and grant each spouse a percentage.\n\nWhat’s the difference between community and non-community property? This varies from state to state, but here are the basics: Community property: This includes all property accumulated during marriage, including debts, unless the property or debt is designated otherwise (e.g., a loan made out specifically to one person based on their separate property). Separate property : This can include property acquired before the marriage, gifts, court awards, inheritance, and pension proceeds. Also, property acquired with separate property remains separate property (e.g., a boat bought with inheritance money). Be aware, however, that some separate property items may become community property, such as a business started before marriage but sustained by the marriage (this type of situation is usually referred to as commingled property). Property purchased with commingled funds : If you purchase or maintain items with a mixture of separate and community property, it is likely that a court will decide it is community property. If you want to keep your property separate, you need to work to keep it completely separate, otherwise it will become commingled and converted to community property. Who gets the house? It depends on the circumstances. For instance, if you have children, then the parent who does the majority of the child-raising generally keeps the marital home. If one partner purchased the house with separate funds and there are no children, then they can keep it and legally require the other partner to vacate. If there are no children involved, then courts vary considerably on how they distribute the marital home. Neither party typically has a legal right to ask the other to leave, but one partner can always request it. If you and your spouse cannot agree, the court will decide based on the rules in its state and which kind of property system your state has. Because spouses typically don’t have the right to prevent the other from living in the home, it may be illegal for them to lock you out, and you can call the police. The obvious exception to this is in cases of domestic violence. If this is the case, immediately seek a restraining order and contact a domestic violence hotline. Sometimes relationships can become very toxic, so be careful not to allege domestic violence out of spite just to get the other partner out of the house. If the Judge believes you have done this, then you can seriously jeopardize your rights to marital property, including the house.", "pred_label": "__label__1", "pred_score_pos": 0.5308408737182617} {"content": "Federal Circuit Vacates And Remands PTAB’s Obviousness Finding Predicated On Incorrect Claim Construction\nIP Litigation\nThis links to the home page\n • Federal Circuit Vacates And Remands PTAB’s Obviousness Finding Predicated On Incorrect Claim Construction\n On August 12, 2019, the Court of Appeals for the Federal Circuit (“CAFC”) issued an opinion vacating and remanding the obviousness finding of the U.S. Patent and Trademark Office’s Patent Trial and Appeal Board (“PTAB”).  MTD Products Inc. v. Iancu, __ F.3d __ (Fed. Cir. Aug. 12, 2019).  The CAFC ruled that the PTAB’s claim construction on which its obviousness finding was premised was incorrect because the construction conflated corresponding structure in the patent’s specification with a structural definition for the term, instead of construing the term as a means-plus-function term under 35 U.S.C. § 112, ¶ 6.  \n Means-plus-function claiming occurs when a claim term in a patent is drafted in a manner that invokes 35 U.S.C. § 112, ¶ 6:\n\n The first step in determining whether a claim element invokes this provision is by asking whether the claim limitation employs the word “means.”  Williamson v. Citrix Online, LLC, 792 F.3d 1339, 1348 (Fed. Cir. 2015) (en banc).  If it does not, there is a rebuttable presumption that the term conveys sufficiently definite structure and is not subject to strictures of § 112, ¶ 6.  Id.  However, a challenger can rebut this presumption by demonstrating “that the claim term fails to recite sufficiently definite structure or else recites function without reciting sufficient structure for performing that function.”  Id. (internal quotations omitted).  The essential inquiry is whether the words of the claim are understood by persons of ordinary skill in the art to have a sufficiently definite meaning as the name for structure.  Id.  If a claim element is found to invoke § 112, ¶ 6, the claim is restricted in its scope of coverage to only the structure, material, or acts described in the specification as corresponding to the claimed function and equivalents thereof.  Id.\n\n In November 2015, the Toro Company petitioned for inter partes review of a patent that MTD Products Inc. asserted against it in the U.S. District Court for the Northern District of Ohio.  Toro argued in its petition that the patent, which is directed toward a steering and driving system for zero turn radius (“ZTR”) vehicles, was invalid over certain prior art.  MTD responded that the particular claim term in question—a “mechanical control assembly”—is a means-plus-function term, that the corresponding structure for the term is a “ZTR control assembly,” and that the asserted prior art does not disclose a “ZTR control assembly.”  In support of this argument, MTD introduced expert testimony that “mechanical control assembly” would not bring to mind any specific structure to a person of ordinary skill in the art.  In response, Toro argued that the patent’s specification denoted structure and that during prosecution MTD admitted that “mechanical control assembly” was structural. \n\n The PTAB agreed with MTD that when read in isolation “mechanical control assembly” would appear to be subject to § 112, ¶ 6, but that when read in the context of the specification and, most persuasively to the PTAB, the prosecution history—during which MTD stated that the claims recite “a mechanical control assembly that is structurally different from what the [asserted prior art] discloses”; that “the claim language at issue concerns the configuration of the claimed mechanical control assembly”; and that “the claimed configuration is indeed structural”—it was clear that “mechanical control assembly” was not governed by § 112, ¶ 6.\n\n The CAFC vacated the PTAB’s decision and remanded the proceedings with instructions for the PTAB to construe “mechanical control assembly” as means-plus-function under § 112, ¶ 6 in its obviousness analysis.  The CAFC agreed with the PTAB that “mechanical control assembly” is similar to other generic, black-box words that are generally subject to § 112, ¶ 6, because the term does not connote sufficiently definite structure to one of ordinary skill in the art and because what the “mechanical control structure” is configured to do is functional.  However, the CAFC found that the PTAB erred when it relied on the specification’s description of a “ZTR control assembly” to conclude that “mechanical control assembly” has an established structural meaning.   The CAFC explained that just because “the specification discloses a structure corresponding to an asserted means-plus-function claim term does not necessarily mean that the claim term is understood by persons of ordinary skill in the art to connote a specific structure or a class of structures.”  (emphasis added).  Thus, the PTAB erred in this regard in conflating the two distinct inquiries of the means-plus-function test.  With respect to MTD’s statements during prosecution, the CAFC explained that the statements were not made within the context of § 112, ¶ 6, and were therefore not persuasive because they were taken out of context.", "pred_label": "__label__1", "pred_score_pos": 0.9975929856300354} {"content": "Public Law Essay\n\nSubmitted By Lolomono\nWords: 1259\nPages: 6\n\n\nThis question deals with Parliamentary sovereignty, the Act of Union between England and Scotland and the impact of Directives of the European Union on both countries. The United Kingdom is made up of England, Wales, Scotland and Northern Ireland. The English legal system extends only to England and Wales, with Scotland and Northern Ireland independently having their own distinct legal system (Bennett, 2011). The affairs between Scotland and Britain are based on an Act of Union (1706/7). This act joined the Kingdom of England and the Kingdom of Scotland (previously with separate legislatures but one monarch) into a single United Kingdom, also known as Great Britain (Weller, 2012).\nAccording to A.V. Dicey, there are three basic principles of Parliamentary supremacy. First and foremost, parliament is supreme; meaning that the parliament of the United Kingdom have absolute and unrestrained power. In short, statutes are accepted by the courts as the highest form of law, subject to judicial interpretation. This is seen in Mortensen v Peters, where the captain of a Norwegian fishing boat was convicted of an offence under the Herring Fisheries (Scotland) Act 1889 even though the Act regulated fishing outside the limit of Scottish waters recognised in international law. To this Lord Dunedin quotes: ‘For us an Act of Parliament duly passed by Lords and Commons and assented to by the King is supreme, and we are bound to give effect to its terms’.\n\nThe second principle is that parliament is the supreme law-making body, thus can make and unmake any law whatsoever. This is demonstrated in the case of Edinburgh & Dalkeith Railway v Wauchope where Mr Wauchope claimed that the private Act obtained by the Railway Company should not be applied as it had been passed without his having notice of the passing of the Act as required by Standing Orders. Lord Campbell quoted that: All that a court…can do is to look at the Parliamentary Roll: [if from that it should appear that] a Bill has passed both Houses and received Royal Assent; no court…can inquire into the mode in which it was introduced…or what passed…during its progress in its various stages through Parliament’.\n\nThe final principle is that parliament cannot bind or be bound. In other words, no parliament can bind future parliaments. As stated by AV Dicey, A sovereign power cannot while retaining its sovereign character, restrict its own powers by any particular enactment. This is illustrated in Ellen Street Estates v Minister of Health, concerning the amount of compensation to be paid on the compulsory purchase of land. The courts ruled that the legislature cannot, according to our constitution, bind itself as to form of subsequent legislation and it is impossible for Parliament to enact that in a subsequent statute dealing with the same subject-matter there can be no implied repeal.\nFor a long time, the doctrine of Parliamentary sovereignty was unchallenged until over the years, laws passed by Parliament have limited its administration. One of such change is the UK’s membership to the European Economic Community in 1972 which later became the European Union. This constituted as the utmost challenge to the doctrine of parliamentary sovereignty (Tomkins, 2003) as EU law takes priority over UK laws and binding upon UK courts. This is established in R v Secretary of State for Transport, ex parte Factortame Ltd (No. 2). The UK government enacted the Merchant Shipping Act 1988 which conflicted with the EU Treaty preventing discrimination on the grounds of nationality. Spanish fishermen claimed this act affected UK fisheries policy and was contrary to EC Law. The European Court of Justice (ECJ) held that the UK must set aside the Merchant Shipping Act and adhere to EU supremacy.\nAnother principle that has undermined Parliamentary sovereignty…", "pred_label": "__label__1", "pred_score_pos": 0.7106214165687561} {"content": "Russia Preparing Patrols of Arctic Shipping Lanes\n\n\n\n\nThe ship sailed through most of the once fabled Northeast Passage, a voyage that the military said Saturday marked the start of regular patrols to protect the thousands of miles of coastline suddenly open to other countries’ ships on a regular basis. Russian leaders announced several years ago that the country would beef up its military presence in the waters to deal with what it considered a new threat, including from drug smugglers and illegal migrants who can now reach its northern shores during the warmest months of the year.\n\n\nBut the earlier announcement about naval patrols had raised some concerns in other nations hoping to stake claims to nearby resource-rich waters, beyond the shipping lanes that fall within Russia’s “exclusive economic zone.” They worry about any military buildup near newly ice-free waters beyond that zone that are being disputed.\n\n\nDeciding who is entitled to the oil riches below disputed Arctic waters is expected to take years, and it will be based in part on complicated scientific findings about where various countries’ continental shelves end. Those findings help determine how far a country’s claims to resources under the seabed can extend.\n\nClimate change has already had a profound effect in the Arctic. Just three years after the first commercial crossing in 2009, 46 ships sailed the route last year, which had the warmest summer on record in the Arctic. About 400 vessels are expected to cross this season.\n\nThe route shaves thousands of miles and many days off the traditional means of sailing between Asia and Europe south through the Suez Canal, though it is open only a few months, in the summer. In the winter, the shipping lanes again clog with ice.\n\nRussia, along with other Arctic nations, has made territorial claims to the ocean’s disputed waters under a 1982 law of the sea treaty that covers resources like oil under the seabed. The United States Geological Survey has estimated that the Arctic holds 25 percent of the undiscovered oil and natural gas in the world.", "pred_label": "__label__1", "pred_score_pos": 0.6694028377532959} {"content": "Filipe Abranches\n\n\nFilipe Abrances illustrated Alexandre Serpa Pinto, the lost Africa dreamer, with text by Luís Almeida Martins, for the collection Great Portuguese Lives, a Pato Lógico and INCM co-edition.", "pred_label": "__label__1", "pred_score_pos": 0.9868175387382507} {"content": "I'm not completely in love with my rü lunch bag...can I return it?\n\nNo dramas, sometimes love is not at first sight. If you are not satisfied with your order, please take a look at our Return Policy  \n\n\nWe are unable to change or cancel your order once placed. This means you will have to initiate a return or exchange if you ordered in error. If you need assistance with placing your order, please don't hesitate to email us at\n\nHow long will it take for my order to arrive?\n\nUnless otherwise specified on the product page your order will ship in 1-3 business days. Please wait 3 business days for processing plus 8 business days for shipping (within North America) to receive your package.\n\nWhat currency are your prices in?\n\nAs a Canadian company, we process our e-commerce orders in Loonie Bucks (i.e. Canadian Dollars). This is great for our American amigos down south as the exchange rate is in favour of the US Dollar. It’s also great for our Canadian customers who are tired of paying in USD and additional duties when shopping online. \n\nTake care & be careful\n\nHow do I clean my rü lunch bag?\n\nYou have a couple of options: 1. Use a cloth/sponge/brush to manually clean your lunch bag OR 2. pop it in the washing machine on cold-wash and hang to air-dry.  \n\nDo I need to wash my rü before using it?\n\nWe do advise that you give your rü a quick wash before using it for the first time, but this isn't necessary.\n\nMy rü lunch bag is not keeping my food very cold, how come?\n\nBecause your rü lunch bag is not insulated, but it is ideal for easily storing your whole lunch in the fridge so you don't need to write your name on a post-it note to keep away hungry coworkers :)\n\nCan my rü lunch bag be used for things besides lunch? \n\nAbsolutely. Your rü lunch bag can easily transform into a grocery bag, a wine-carrier, a purse, a laundry bag, a bag of secrets, an actual dry-bag for camping, a tote bag, and many many other uses not involving fire. \n\nIs there anything my rü lunch bag should avoid? \n\nThe rü lunch bag is a multi-versatile feat of human engineering but it has limitations:\n\n› Never ever ever place your rü lunch bag in a microwave.\n\n› Over-stuffing your rü lunch bag will wear it down faster.\n\n› Do not clip the buckle with your fingers to close - they may get pinched. \n\n› Make sure your rü lunch bag is properly secured when transporting it great distances on a bike, motorcycle, segway, etc..\n\n› Do not leave your rü alone with your valuables — a lone rü is simply too great a temptation for most humans.\n\n› Your rü lunch bag is unsuitable for directly carrying liquids.\n\n› Take care when carrying valuable or fragile items in your rü lunch bag.\n\n\nWhere are rü supply co. products made?\n\nWe proudly manufacture our products in Vancouver, BC.  \n\nDoes rü supply co. have any values?\n\nBig time: \n\nHonesty ı Simplicity ı Balance ı Dependability ı Growth ı Transparency\n\nWhat's with the name? \n\nrü is short for ru-use because our sincerest wish is that our reusable products will facilitate sustainable decisions in your day-to-day life. \n\nWhat are your ideal lunch bag contents?\n\nBudha bowl for the main course, an energy bar for a snack, and water kefir to wash it all down.", "pred_label": "__label__1", "pred_score_pos": 0.8266288638114929} {"content": "Nov 9, 2019• by ParksManDaan\n\n10 Reasons To Chose Cuyabeno Wildlife Reserve\n\nOnly Amazon park in Ecuador where you can navigate a loop, mostly by river; - Travel to Cuyabeno mainly over a paved road; - Fly to the city of Lagoagrio and board our canoe by noon to travel to the...\n\nWhat is your best advice for", "pred_label": "__label__1", "pred_score_pos": 0.9999805092811584} {"content": "Post Image\n\n5 Tips for Car Lease in Abu Dhabi\n\nCar leasing in Abu Dhabi is, no doubt, a much more cost-effective option compared to buying a car. For UAE residents, leasing on an average, costs DHS1,770 per month for a four-door saloon over a 12 month period versus Dh1,946 for a buyer. \n\nThousands of UAE residents opt for easy long term car rental in Abu Dhabi leasing every year at these amazing prices, which factors in insurance, registration, and maintenance and loan interest.\n\nAre you planning to lease a car in Abu Dhabi? Great choice. But remember- leasing a car means you have to return it to the car rental company after a specified period. Therefore, you must follow some basic dos and don’ts before stepping into the deal.\n\nHere are the top 5 tips that must be followed before renting a car in Abu Dhabi:\n\n 1. Optimum Condition: First things first; ensure that the car is in optimum condition. You can do this by taking test drives of the car and assess your compatibility with the vehicle. Ensure that there are no damages to the vehicle, and if there are, take a picture and show it to the car rental agents immediately.\n 2. Check Insurance: You must make sure that the car rental is insured, as that is a must before leasing a car in Abu Dhabi. Knowledge of insurance details helps you tackle dire situations, especially when in a different country.\n 3. Check Terms and Conditions: Check the terms and conditions of the lease agreement carefully. Read them twice and thrice. It is important to ensure that no conflicting clauses are there, which haven’t been mentioned to you.\n 4. Check Security Deposit Terms: Enquire details about the terms governing security deposit. Ask for the factors regarding prices, return date etc. security deposits are taken in case the customer fails to pay on time or return the car on due date.\n 5. Check for Vehicle Requisite Permissions: Ensure that the car you are being given has a valid registration. Make sure that the car has a valid original registration before you take the copy. Also make sure that the details in the documents match the car.\n\nUsually, car rental agencies in UAE are sincere, and want their clients to be happy with their service. This prompts them to share valuable tips for saving extra. Do not hesitate to ask them to share their valuable insights related to the trips and travels and other related aspects in Abu Dhabi.", "pred_label": "__label__1", "pred_score_pos": 0.9866127967834473} {"content": "Information and Communication Technology (ICT) benefits all sectors of the society increasing confidence, creativity and productivity. Read through the article to know the importance of ICT.\n\nImportance Of ICT\n\nUnlike information technology (IT) that makes use of computers and the internet to handle and store information, information and communication technology (ICT) is a technical term that includes IT as well as telephonic, broadcast media, and other kinds of audio and video processing and transmission. Hence, ICT is a more general term that focuses on the role of communication in information technology. Telephone networks are merged with computer networks and necessary software through a single cabling or link system to progress communication smoothly and conveniently. As such, information and communication technology brings along several wealthy new opportunities and careers to explore. Read through the following lines to know the various benefits of information and communication technology.\nSignificance Of Information And Communication Technology\nInclusion of ICT in the school curriculum helps students to make effective use of resources and development of students’ interests in studies. With the use of high-quality standard simulation for demonstrations, students can be encouraged to take keen participation in studies. As a result, they can achieve better grades in other subjects, apart from information technology (IT) only, and determine the different ways of using the requisite information in specific ways. Therefore, ICT becomes all the more important from an early age so as to familiarize the students with it, as it is not a one-time course, and will be required throughout the education and adult life. \nDue to its high accessibility and affordability, ICT solutions are providing a number of employment and entertainment opportunities. Society groups are taking due advantage of ICT in transforming and using the untapped resources to the best utilization. Further, due to easy access of ICT to telecommunication services, remote areas have been introduced with mobile banking and internet services, thereby contributing to socio-economic development. Also, communicating and interacting with peers over long distances has been reduced to a mere telephone, email, or video conferencing.\nEnvironmental Stability\nICT is largely being used in environmental monitoring of projects to improve the standard of living of the population. People who are illiterate about the unprecedented knowledge of environmental systems are educated about the same and different ways of utilizing them. These literacy barriers are broken through communication, such as using video and radio. Further, they are empowered to bridge the gap between environment and development.\n\nHow to Cite\n\nMore from", "pred_label": "__label__1", "pred_score_pos": 0.9815225005149841} {"content": "\n\nIn a 6 months old, cross breed, female, pig carcass the following lesions, among others, were observed in the liver (see images).\n\nThe inspector submitting the samples described them as “granulomatous, whitish, cysts which crackled when cut of varibale size, up to 7mm.” In addition, the liver has a friable consistency.\n\nWhitish lesions in the liver parenchyma.\n\n\nDetail of the lesions.\n\n\nWhen cut, the lesions, delve into the parenchyma.\n\n\nWhat is your diagnosis? (42)\n\n\n  The four diseases might show whitish lesions in the liver. In this case, however, histopathology revealed a neoplastic lymphoid proliferation infiltrating the hepatic parenchyma classified as a multicentric lymphoma since the same proliferation was observed in the different samples of lymph node analysed.\nYour answers are highlighted below.\nQuestion 1\nWhat is your diagnosis?\nAscaris suum\nSalmonella cholerasuis\nThere is 1 question to complete.", "pred_label": "__label__1", "pred_score_pos": 0.9968205690383911} {"content": "Gunman kills two in US mall shooting\n\nA gunman in the US carrying homemade explosives has shot dead two people at a popular shopping mall near Washington before killing himself.\n\n\nInvestigators were grappling for a motive but said that they had “tentatively identified” the gunman, who had “a large amount of ammunition” still on and around him when officers found his body in a store alongside the two victims at the upscale Columbia Mall in Maryland.\n\n\n\nPolice later tweeted that a search of the gunman’s bag turned up two crude devices “that appeared to be attempt at making explosives. Both disabled.”\n\nThey did not immediately reveal the identity of the gunman – who they said appeared to have killed himself with a shotgun – and special units continued to comb the mall late into the night.\n\nEmergency workers were alerted to mid-morning gunfire at the mall, a favourite weekend spot for young families about 45 minutes outside downtown Washington, by a police call indicating shots had been fired inside the two-story shopping centre.\n\nBadly shaken shoppers described how they fled in panic or cowered in store doorways. Some made frantic calls to loved ones, as the United States reeled from the latest in a slew of gun-related rampages.\n\n“#HoCoPolice responded to 911 call in less than 2 minutes. Found victims and suspect dead from gunshots upon arrival,” the Howard County Police Department tweeted.\n\n\nHoward County General Hospital said all five injured shooting victims have been treated and released. One had suffered a gunshot wound to a foot.\n\n“The other four were either medical conditions or twisted ankles, things like that as people were moving away from a very, very chaotic and dangerous situation,” McMahon said.\n\nThe mall of about 200 stores, which has an indoor carousel and play area, is a favoured weekend destination for young and old alike.\n\nMany people living in Columbia, a planned community replete with parks and good schools, work in either Washington or Baltimore.\n\nThe most notorious shooting in recent US history took place in Newtown, Connecticut, in December 2012, when a young gunman entered a primary school and opened fire. In 10 minutes, the 20-year-old shot and killed 26 people before taking his own life.\n\nThe Newtown attack briefly reignited the US gun control debate, triggered every time there is a major shooting, although attempts to pass tougher laws have made little headway in the US Congress.", "pred_label": "__label__1", "pred_score_pos": 0.6158373355865479} {"content": "TOEFL Listening: ETS-TOEFL听力机经 - 93JPB33303IE9B8PP$\n\nWhat is the lecture mainly about? A. The decline in the popularity of ballet and ballet music in Paris B. The reactions of people at the first performance of a piece of music C. Societal influences on the composer of a famous ballet D. A comparison of two controversial Parisian ballets", "pred_label": "__label__1", "pred_score_pos": 0.8665063381195068} {"content": "Blog Archives\n\nThe dying roots and sacred origin of Western culture\n\nBritish classical scholar Peter Kingsley is widely known for having achieved mainstream academic credibility in his field before launching out in a new direction by writing several books in which he argues that (in the words of Wikipedia) “the writings of the presocratic philosophers Parmenides and Empedocles, usually seen as rational or scientific enterprises, were in fact expressions of a wider Greek mystical tradition that helped give rise to western philosophy and civilization. This tradition, according to Kingsley, was a way of life leading to the direct experience of reality and the recognition of one’s divinity. Yet, as Kingsley stresses, this was no ‘otherworldly’ mysticism: its chief figures were also lawgivers, diplomats, physicians, and even military men. The texts produced by this tradition are seamless fabrics of what later thought would distinguish as the separate areas of mysticism, science, healing, and art.”\n\nHere he is talking to the editors of Parabola magazine in 2006 and saying things that resonate in some ways with my semi-ad hoc musings on the philosophical and spiritual side of the apocalyptic-seeming events of recent days and years here in America and elsewhere:\n\n\n\nMore: “Common Sense: An Interview with Peter Kingsley” (pdf)", "pred_label": "__label__1", "pred_score_pos": 0.90920090675354} {"content": "Friday, May 11, 2018\n\nHelpful Tips for Working Parents\n\nIf you are reading this, it is likely that you have multiple to-do lists, paperwork stacked up to the ceiling sat on your desk, and a house full of hungry mouths to feed. Being a parent is a rewarding experience, but there are always tough days, and juggling raising children with your career can seem near impossible at times. If you are feeling overwhelmed at having to juggle a jam-packed schedule while trying to look after your kids to the best of your ability, here are a few helpful tips for working parents which you might find useful to help you through.\n\nShare the workload\n\nJuggling a thousand items on your to-do list might seem impossible when you’re doing it alone, but the more people who you have supporting you to share the burden, the easier it will become. Simply sharing the responsibilities equally between yourself and a partner can make life a little easier, but don’t be afraid to enlist the support of everyone you can in the home to help you get everything done. Depending on their ages, there are lots of chores which children can get involved in.\n\nMany parents take the mindset that jobs will get done quicker if they do it themselves, but don’t forget that by getting your kids involved, you are also keeping them busy, meaning that you don’t have to divide your attention as much between them and all of the other things you are trying to get done. Young children can help out by tidying all of their toys into a box, and as kids get older, they can start doing more, such as stripping their own beds, putting their own clothes away and even helping out with the dusting. Simple incentives can turn what seems like a chore into a worthwhile activity for children, so consider creating some sort of reward chart to capture their interests.\n\nGet organized\n\nWhile having kids can mean that the house is often in a state of disarray, try and create stations or ‘zones’ around the home for certain objects, in order to keep the house a little more organized. This will create more efficiency when you are trying to find things on the go, and will also make it easier to keep the house tidy. For instance, if you have a set room, or area within a room, where children can play, then all of their toys will be kept in that zone. This will make it easier to tidy each zone around the home, as nothing will stray too far from its original place. A great method for organizing children’s items is to give each child a labeled or color-coded box or storage area, where they can keep all of the toys which belong to them. This not only reduces arguments or bickering when it comes to determining who owns what but will also mean that when it comes to tidying away, they each know where they are supposed to put their possessions.\n\nIt is worthwhile having your own box, or at least an easily accessible station, where you can keep all of the items which you frequently need, or which you need to have easily accessible when you are on the go. Keeping this storage facility near the door means that your wallet, briefcase, keys, and everything else which usually gets misplaced within the depths of the house, will then be easy to find when you are in a rush.\n\nCreate lists\n\nIt may seem like a simple concept, but keeping a regularly updated to-do list will really help you keep on track with all of the tasks which you need to get completed. When you have a really busy schedule, it is easy to forget to do the important tasks, no matter how many times you’ve reminded yourself throughout the day. It doesn’t take much to keep a note of all the tasks which you’ve got to do, and in the long run, you’ll be saving yourself time, as you won’t have to keep backtracking and trying to finish errands which you had forgotten about. Make sure to keep all of your notes in one book though, as a lot of people have a tendency to write notes on lots of separate bits of paper, which are easily misplaced.\n\nMake sure to prioritize all of your jobs, using a number system or similar organizational code to sort them into the order of importance, so you know which task needs to be completed first. It can be incredibly useful to get the whole family to keep a record of all of their important events or commitments as well. A family planner or some sort of noticeboard can be a great tool for allowing everyone to add their upcoming events into, so that everyone knows what is happing on a set day, decreasing the chance of someone overbooking.\n\nPractice multitasking\n\nNot everyone is a great multitasker, but thinking of ways increase your efficacy when you have an endless workload could be the difference between a good night’s sleep and a restless one. Multitasking doesn’t mean you have to magically grow extra arms and complete the washing up while simultaneously checking your children’s homework. At its core, the art of multitasking simply means finding ways to get the most out of your activities.\n\nFor example, while you are in the bathroom waiting for the bath to run, you could spend a few minutes wiping down the sides in the bathroom or cleaning around the sink. If you have to get a train to work, then make yourself a breakfast which can be eaten on the go, saving yourself time in the morning before you leave the house. Altogether, adopting these simple tasks could save you a lot of time throughout the day, meaning you can take those extra ten minutes to relax in the evening after everything has been taken care of. If you really aren’t a multitasker, then try to make sure you go through all of your tasks in as time conserving an order as possible. For instance, rather than skipping from one area of the house to another when you’re tidying up, make your way around in order.\n\nFind ways to save time\n\nYou may feel like you are doing everything as efficiently as you can, but sometimes it is easy to overlook areas where you might be able to save time. Consider spending a week or so keeping a note of your daily schedule, and recording accurate timings for your day. Include everything from how long it takes you get ready for work in the morning, to how long you spend doing the housework, and how much time is left over for yourself at the end of the day before you go to sleep. This makes a great starting point for figuring out ways to improve upon your current schedule and will pinpoint specific areas you may wish to work on: you might just be surprised at how much time you spend doing certain tasks.\n\nFor example, you might discover that while doing the food shopping only takes forty minutes, getting the kids in the car and completing the drive to the store and back again could take an additional forty minutes out of your day. Therefore, in this situation, you could benefit from changing how you shop, such as by changing to a different store or shopping online. While you might think this may limit your shopping freedom, there are a lot of different shopping sites online to choose from. You can even get your medication delivered to you through the Canada mail order pharmacy, making it easier to stock your medicine cabinet. Plus, utilizing price comparison sites means that you can find the cheapest places to buy your groceries, allowing you to save money on your shops as you go.\n\nDon’t put off tasks\n\nIt is easy as a parent to respond to most requests with “In a minute” or “I’ll do it later,” because when there is no time in the day, sometimes you need to push things back in order to finish the task you are currently focusing on. However, the longer you put tasks off, the easier it becomes to forget and to then be in a rush to get them done when you remember them later on. If you are faced with a task which, while inconvenient, will only take a few moments to complete, then more often than not, it is easier to just get it done straight away. A good example of this would be having to fill in some paperwork, or sign a permission slip for your child’s school trip. Get these tasks done straight away, and they won’t become a problem later on.\n\nIt is also useful to make sure you store items away correctly as soon as they have been completed so that they don’t get lost in the abyss of the house. Paperwork especially can be extremely easy to misplace, so create an easy to navigate filing system for yourself, and place everything away as soon as you can in order to avoid later distress.\n\n\nRelated Posts Plugin for WordPress, Blogger...", "pred_label": "__label__1", "pred_score_pos": 0.6176695823669434} {"content": "Types of Latin Dances\n\nBenna Crawford\nTango pose\n\nLatin dances hail from several different countries in South and Central America and the Caribbean, and most have influences that range far beyond this region. Some dances are easier to learn than others, but all Latin dances have a flair that hooks both spectators and dancers.\n\nPopular Latin Dance Styles\n\nSample the Latin dances most often learned and performed. Whether watching a dance show on television or attending a social dance workshop, you're bound to run into some of these Latin styles.\n\n\nThe Bachata is a dance from the Dominican Republic, named after Bachata guitar music. Dancers move side to side in a four-beat pattern: three steps to the side followed by a pause, which forms the essence of the Bachata as dancers incorporate pronounced hip movements. Overall, the dance is much more about moving the body with style than about the simple back and forth steps. Because this dance is about polished style in addition to simple steps, intermediate to advanced dancers will have the most success making the Bachata look good.\n\nCha Cha Cha\n\nThe Cha Cha Cha, also called the Cha Cha, is a Cuban-born dance, similar to the Mambo in style. However, after the basic movement of stepping forward or backward and shifting weight between feet, the Cha Cha Cha adds a quick set of three steps. This gives the dance its name since many dancers count out these steps as \"cha cha cha.\"\n\n\nThe Mambo also originated in Cuba. Its signature move is a three-beat step moving forward and then backward while shifting weight from one foot to the other. One member of a dancing pair performs the backward motion while the other moves forward.\n\nWhat really gives the Mambo its style, though, is the hip-swaying action the weight shift creates. Although the Mambo is a couple's dance, the basic step has appeared in everything from line dancing to aerobics videos, where individual dancers perform the three-beat step either alone or as part of a group.\n\n\nMerengue is a Dominican dance; it's the official dance of the Dominican Republic. It is generally considered easy to learn, making it a great choice for those looking to ease their way in to Latin dancing.\n\nThe following basic movement goes to the front, back, and side when a couple dances the Merengue together: step onto the inside edge of the foot, roll the foot to transfer weight, then drag the other foot to meet the first foot. Learn the basic technique from an instructor or observe other dancers doing it, such as in this instructional Merengue video, where the basic step is demonstrated to the side.\n\nPaso Doble\n\nPaso Doble means \"double step\" in Spanish, and a version of the Paso Doble originated in Spain. The French turned the moves into a couples dance, which the Spanish embraced. French-invented corrida choreography is complex, challenging, and awe-inspiring. The dance is the dance of conquest between the matador and the enticing cape, as well as the provoked bull. The man is the matador in a bullfight, the woman functions as both his cape and his adversary/prey. It is tense and intense; you dance Paso Doble with ferocity and passion. The moves borrow from Flamenco and are performed in 2/4 time. The costumes, the exaggerated style, and the fierceness of the dancers is highly theatrical. Expect them to clear the dance floor for you; so get your act together to deliver a performance. Paso Doble is always an emotional experience.\n\n\nThe Rumba has its roots in the Cuban son. The Rumba consists of two quick steps and then a third slower step that takes two beats to execute. Dancers use a box-like pattern to guide their movements.\n\nThough dancers originally danced the Rumba with quick steps, ballroom Rumba dancing (Latin dancing most often seen in competitions) has emphasized slow, romantic steps with a focus on hip movements.\n\n\nThe Salsa originated in the Caribbean, although it also has a strong African influence. Couples typically perform this dance together, and it centers on a four-beat combination of two quick steps and a slow step with a pause or tap.\n\nPartners then add turns and other flourishes to the basic footwork in order to create a fun dancing experience, as well as an impressive performance.\n\n\nSamba is Brazilian in origin and danced to music of the same name. Many different forms of Samba dancing developed in Brazil, some for couples, and others for individuals -- solo dancing.\n\nDifferent musical styles are paired with different Samba dances. The speed of the dance varies according to the music. Samba is one of the most well known Latin dances, especially for its role in Carnival events, where individual dancers perform.\n\n\nThe Tango is a dance of seduction, born in the Buenos Aires dockside brothels on the cusp of the 20th century. Yes, done well it can take your breath away. And yes, it will take you some serious practice to get that good. From its earliest provocative dance floor couplings to the embrace of the racy choreography -- subdued but not sanitized -- by upper class Argentine society, the Tango proved irresistible. The dance mirrored its times. Through waves of immigrants, military coups, decades of relative prosperity, and eras of social upheaval, the Tango expressed grief, passion, nationalistic pride, pessimism, and celebration. But it always relied on the stylized sensual moves, staccato foot steps, flexed knees, and the highly focused connection between partners that still typifies Tango today.\n\nConga, Macarena - Get in Line\n\nGroup dancing or line dancing is popular at parties, along parade routes and at informal gatherings where people get together just to have a casual good time. These Latin line dances are fun, easy, 100 percent social, and approachable for even the excessively left-footed or habitual toe-stompers.\n\n\nYour kid brother can do the Macarena -- the one who's still rocking his half-days in preschool. Relax your knees, shake your hips and get the kid to teach you the funky hand and arm gestures and you're good. The 1995 song is just a beat, so very danceable, although, two decades beyond its heyday, a little past its prime.\n\n\nRemember Gloria Estefan: C'mon, baby, shake your body. Do the Conga? Hard to sit that one out. Did the Conga enter the Americas from Africa through the port of Colon on the Atlantic coast of Panama? Or did it emerge from the carnival comparsas, the dancers in street festivals in Santiago de Cuba or San Pedro Town, Belize? No matter. Just put your hands on the waist of the one in front of you, shuffle step 1 - 2 - 3 and kick out just ahead of 4. It's a rhythmic hoot and anyone can do it. Anyone. Really.\n\nExploring Latin Dancing\n\nWhile many dancers only do Salsa or Samba, or restrict themselves to one or two Latin dance styles, there is no reason to limit yourself to just a few genres of Latin dance. The International DanceSport Federation, hosts international dance competitions that are exhilarating to watch -- and if you get good enough at your favorite shake, shimmy, and seduce choreography, you might want to compete. Latin dance is addictive. You may find that, as soon as you master a style of Latin dancing, you can't stop at just one. So, put on your dancing shoes and discover some of the other tempting rhythms that the Latin dance world has to offer.\n\nTypes of Latin Dances", "pred_label": "__label__1", "pred_score_pos": 0.6211239695549011} {"content": "\n\nguerra cover\n\nInvestigation: Are results of cancer studies reliable?\n\nGenetic Literacy Project | \nWhy are so many studies not reproducible? The Reproducibility Project: Cancer Biology, an open-source replication project, aims to examine this ...", "pred_label": "__label__1", "pred_score_pos": 1.000003695487976} {"content": "The Cryptic Slender-tailed Nightjar at the Rocky Cliffs of Lake Baringo!\n\nNightjars are largely nocturnal family. They look like owls, with large heads and eyes and a cryptic plumage. The family name caprimulgidae was given to them after some superstitious belief that because of their wide mouths, the birds suckled goats.\n\nPhoto@Joe Aengwo\n\nIn Kenya we have 13 different species of Nightjars, wide spread in different habitats across the country. The photo appearing above was taken at a rocky countryside of Lake Baringo. Most species are nocturnal or active at dusk, and are solitary and retiring . They concentrate their foraging bouts during twilight hours.\n\nPhoto@ Joe Aengwo\n\nBy day, they roots on exposed grounds or rocks, in leaf litter, or on branches. When roosting , they adopt a horizontal posture, in contrast to owls.\n\nPhoto@Joe Aengwo\n\nNightjars have very large eyes, adopted to low light condition. They eye have a tapetum, a reflective membrane that increases the amount of light entering the eyeball. Its presence causes reflective “eye-shine” when the eye are illuminated by artificial light.\n\nPhoto@Joe Aengwo\n\nThe Reticent Cinnamon Braken Warbler !\n\nThis warbler prefers undergrowth vegetation of montane habitat and mostly noticed by its loud call. Though easily heard than seen, but on a good day, you might even sneak a photo, although patience is advised for better photographic results.\n\nPhoto@ Agnes Coenen\n\nThe above photo was taken by my client from Belgium who had impressive passion for Psittaciformes family. She purposely travel to kenya to see four species of parrot ; Red-fronted (jardine’s ), Meyer’s , Orange-bellied and Brown-headed Parrot. She had similar intention for Tanzania, Uganda and Ethiopia.", "pred_label": "__label__1", "pred_score_pos": 0.8376122713088989} {"content": "Plan your trip from Podgorica to Split\n\nDon't know which sights to choose?\n\nsights you can visit along the way\n\nPerched high above the Bjelopavlići plains, the monastery’s unique setting is matched only by its breathtaking views of the surrounding countryside. \nEvidence of Bosnia and Herzegovina's history, dating back to ancient times, can be viewed at the large ancient cemetery with tomb monuments of Radimlja. \nA village meaning 'between the hills', Medjugorje is known as a sacred and spiritual destination of religious tourism. \nThe stunning Kravice Falls are made up of over a dozen springs, spanning over 120m. This revered natural attraction is a popular swimming and picnicking destination and has been declared a natural phenomenon. \nThe ancient city of Salona was once the capital of the Roman province of Dalmatia. The beautiful historic ruins are vastly undisturbed, allowing visitors to revel in peace. \nYou're booking a one way private car trip from Podgorica to Split with a local driver. Make it unforgettable with our\nThis trip takes 5 hours and 9 minutes and costs €249 in total for 2 passengers.", "pred_label": "__label__1", "pred_score_pos": 0.9729820489883423} {"content": "When Are You Done?\n\nProcessed with VSCO with p5 preset\n\nA question you’d never ask\n\nto a rising or setting sun;\n\nStar, oh star, tell me-\n\nWhen are you done?\n\nToday, I woke up, took a deep breath, and was able to enjoy a sense of relief that has been a stranger to me for the last 28 days. Four weeks ago marked the beginning of my comprehensive exam, which is the point that has the power to transition you from a student to a candidate in the quest for a PhD. Embracing the reality that the power is ultimately within me, and not within the exam itself, has led me to take on this challenge as I take on everything else— with strength in my gut, and a smile on my face.\n\nA major factor I had to consider in my decision to pursue such a degree online was sacrificing being surrounded by a community of fellow learners, all going through the same stressful crap, at the same stressful time. One of my favorite parts about the program that I selected is that it requires you to attend 3 on ground residencies, in varying cities, in order to interact with the faculty and your peers as you build your dissertation research plan.. or DRP for short. At these residencies, I was able to connect with fellow learners and form a bond outside of our digital discussion boards. The beauty of maintaining such connections is the ability to keep your community of fellow learners in your pocket, as you go back home and continue the journey of PhD-dum.\n\nAnother learner I have grown quite close to; a fellow lady boss who has embodied the spirit of “I can do anything I set my heart and mind to”, completed her comprehensive exam a quarter before mine began. Naturally, she was the first person I went to for advice. What she told me was quite simple… don’t procrastinate! Now, completing a degree online means you’ve got to dedicate your time wisely, however, I call myself “Last Minute Lauren,” and often find myself experiencing the phenomenon of— due today… do today!\n\nThis was not the case for comps, though. Instead, I found myself experiencing the feeling of— due in four weeks… freak out every day about it until it is done! But giving into the negative side of a stressful situation doesn’t get you very far. In fact, it blinds you from the very tools that you need to keep moving forward. So, once I was able to convince myself that “I’ve got this”, and truly believe it, I was able to start writing with a fierceness ready to take the scientific world by storm.\n\n\nSo what exactly were my comps like?\n\nA student can’t sit for comps until they have received a passing grade on their DRP, which has been developed throughout those 3 on ground residencies. The DRP is a detailed outline, rooted in psychological theory, advanced statistical methodology, and over 75+ scientific, peer reviewed articles that explains what exactly you plan on conducting a dissertation on.\n\nWhen I say the word “dissertation”, people cringe. It’s a word that is associated with being long, difficult, boring, and most often related to Ross from Friends. But when I think about dissertation, I think about the love of a particular subject that it represents. If you’re willing to dedicate so much of your time and mental energy to learning so much about one thing, this must be what you were born to do.\n\nOn my very first day of grad school, my professor referred to us, those pursuing our Master’s in Psychology, as agents of social change. Everything I learned throughout this program, I learned through this lens, where I focused on how the tool of social media can be used in a positive way. On the first day of class at my online university, I was taughtthat a PhD is not something you get, but rather something that you become. It does not just mean being a learner to the highest degree, but instead, a creator of new knowledge. To me, my dissertation is the culmination of these two definitions, putting forth such effort and ideas into the world that are rooted in the promise of promoting positivity.\n\nWhile there are hundreds of topics worthy of dissertation research, my particular interest falls within the category of Applied Psychology. Any time I tell someone I study psychology they say… “oh, so you’re analyzing me right now.” Psychology is so often associated with therapy that those outside of this psych world don’t know much about the other facets that exist. Put simply, there are two paths that you can take in studying psychology. If your goal is to become a therapist, your degree include clinical hours and supervised internships, training you to help others sort through their web of thoughts. Or, you can take the other path— a path that I never, ever ever ever thought that I would love as much as I do… the path of research.\n\nAs an undergrad, research classes were the most boring lectures I’ve ever had to endure. Statistics. Factors. Variables. Boring. Boring. Boring. The classes on the abnormal mind, on personality, on interactions, THOSE are the ones that really got me going. I learned and I learned and I learned some more, but when it came time to digest, that’s when I realized— hey, wait a second, none of these other classes would exist if it weren’t for research.\n\nResearchers are the ones who dig deep, and ask the questions, based upon questions of theories that those before them have pondered. The next fork in the road comes when selecting what type of research you’d like to conduct. One road is numerical in nature, quantifying constructs into statistical puzzles. The other road, qualitative research, analyzes data in a descriptive way, painting a meaningful picture of a complex situation through methods such as interviews or case studies. I chose to trek along the numerical road of quantitative research, for math has always been a subject that my hyper-analytical mind has found soothing. In my comps, I wrote that “numbers are meaningless unless we can find the patters that lie beneath them”, and that’s something that a nerd like myself finds fascinating.\n\nI always quote my favorite professor in defining science as a way to solve a problem. With the endless problems that exist in the world, science is pretty damn important. My dissertation will begin with the explanation of a problem. But, in science, you can’t just say that something is a problem… you’ve got to back it up. You back it up with the research that’s been created and peer reviewed by other researchers, that is based upon the research that someone else has researched. There a scientific world of interconnected truths that exists outside the realm of what we’re being fed by the media, but, I digress.\n\nI have not digressed too far, though, because the problem that I am explaining in my dissertation is that of a distracted, digitally connected society. It has been said that because of the integration of digital technology into our everyday lives, we are becoming too distracted to consider our own thoughts. That is a terrifying reality. Living life in a thoughtless way makes us so easily controllable, but is something that I think can be remedied if we all choose to practice a little something called mindfulness. Being mindful is a concept that’s based upon Eastern thought, and represents the act of being present. If we are mindful, and choose to use digital technology in a mindful way, we are regaining our power over our own minds.\n\n\nA dissertation must not be confused with a plan of action to save the world. Such a mindset in tackling such a lengthy endeavor will drive you crazy. While science is a way to solve a problem, the world is not black and white. Each study that is conducted are the building blocks used that when considered together, become a force towards positive change.\n\nSo, I’ll ask again, what exactly were my comps like?\n\nI received 3 separate questions, requiring a response of up to 17 pages per question, with 20+ research articles referenced within each response. Each question will be graded by 3 separate professors, double blind, meaning they don’t know who submitted it, and I won’t know who graded it.\n\nQuestion 1 asked me to explain the theory my study is based upon, and why this theory is best suited for my topic, by also explaining other theories that I won’t be using. Classic learning… examining what you DO know, by comparing it to what you DON’T know! My study is rooted in Carl Jung’s theory of personality. This is the theory where that four letter typology comes from— like, for example, I’m an ENFJ— meaning I prefer extraversion to introversion, intuition to sensing, feeling to thinking, and judging to perceiving. Without going into 17 more pages of detail, spark notes version is here to explain that I’m interesting in knowing if these aspects of personality are associated with how mindful an individual is.\n\nQuestion 2 asks about the current literature in the field. The board that approves or denies the right to research (which is my next step in this journey.. *gulp*), will throw your study out so fast if it’s been done before. A study can only have scientific merit if it explains why and how it is filling a gap that exists within the particular field of interest. Such a gap keeps widening within the world of social media psychology, because media itself is changing daily. What I’m doing, that other researchers have not done before, is considering the relationship between one’s personality type and mindfulness, along with how integrated social media use has become within their life.\n\nFinally, Question 3 was where I explained my research methods, starting with my reasoning behind choosing quantitative research over qualitative, in a more words than just, “Math is cool. 😎” Each concept I explain, from personality, to mindfulness, to social media use integration has to be defined through valid and reliable assessments that exist. Then, once I get all of this data, what am I going to do with it?! I’m going to statistically analyze the hell out of it, that’s what I’m gonna do.\n\nWhat comes next?\n\nIn one week, I’ll find out if I pass my comps, or have to make any revisions before resubmitting. Then, I get assigned to a mentor, and have to explain my study to the big, bad, Institutional Review Board, that can make me or break me. After jumping through that hoop, the dissertation games begin! I will write more, and more, and more about the theory and literature my study is based upon. Until finally, it comes time to actually collect the data. After reaching my magic number of about 100 participants, I’ll crunch the numbers and see what statistics has to say about the relationship between personality, social media use integration, and mindfulness. Yada yada yada.. there’s my dissertation!\n\nBut when are you done?\n\nShort answer, never. While graduation commences after the dissertation is complete, you are never really done with your PhD. Again, this degree is not something you get, it’s something you become. I am slowly but surely realizing what people mean when they talk about their life’s work. The topic of social media use integration was quantified by researchers that I have been fan girling over since 2012. As a PhD you keep building upon the knowledge that you create, expanding this web of information to inspire others in your field to run with it, adding their own twists and perspectives.\n\nI can say, with a smile on my face that the knowledge I am seeking to create is in fact my life’s work. Because here I am, on my first day that I don’t have to be writing about my dissertation topic… writing about my dissertation topic.\n\nSo when you see the rising sun,\n\nAnd say; oh star, when are you done?\n\nIt will simply continue rising;\n\nHer duties only just begun.\n\nRising. Setting. That consistent sun.\n\nOh star. Oh star. But when are you done?\n\nLife and learning are but a process;\n\nAnd such a journey is quite fun.\n\n\nHot Mess Express\n\nSome people say that social media has made us all narcissists. Others argue that we’ve been narcissists all along, and social media is just a mere tool that we use to flaunt our narcissism. In either argument, the point has been made that there is a link between social media and superficiality.\n\ngiphy (2).gif\n\nSocial media makes us want to highlight the best parts of ourselves. Why would we want to share our flaws and imperfections with the world? We post the photos that we look nice in, and the moments of our day that we are proud of. We’ll post our most delicious meals, because no one really wants to see the meal that you burned because you left it in the oven too long.\n\n\nBut, it is those meals that we’ve destroyed that make us human. It is the pimples that we cover with snapchat filters that give us something in common. No one is perfect. Everyone has flaws.\n\nThis morning, a friend of mine (& fellow blogger) tagged me in a post with the tag #gloriousmess, where she talked about the parts of herself that she has embraced as her glorious mess-ness. This is related to a global campaign of individuals sharing their flaws, promoting self love for every aspect of who they are. Campaigns like this one force us out of our comfort zone, bringing us face to face with the aspects of who we are that we would rather brush under the rug than scream from the rooftop.\n\nWith that being said, here are mine…\n\nMy mind is always filled with a million thoughts. I’ll talk so fast that I’ll stumble on my words, because my brain is moving a mile a minute… and that’s without coffee. I’ve got an overabundance of energy, and while that may sound wonderful, it can also cause me to come crashing down. I consciously have to manage where I exert my energy, which usually causes me to feel like I’m letting some aspect of my life falter. I am a Type-A perfectionist who is her own biggest critic. I can be wound so tight that I wear my shoulders up to my earlobes, and have to take zzzquil to get out of my head and off into dreamland (non-habit forming… yeah right). My addictive personality begs to differ.\n\nMindfulness and awareness are my tools in embracing what makes me a glorious mess. It’s one thing to acknowledge our flaws, but we must take one step further in becoming the best version of ourselves. For me, something that has helped me immensely has been practicing yoga once a week. It allows me to set aside time for myself to give my brain a break from the consistent flow of thoughts swimming though it. It’s teaching me new tools to carry around throughout the week to help clean up my messy mind… starting with the simple reminder to just breathe.\n\nWhat makes you a glorious mess? Dig deep into your soul until you have reached a point of uncomfortable. Take those parts of yourself that you have tucked under your bed, and display them on your shelf. Embrace who you are— every damn aspect of you.\n\nI’m Not Done Yet. From Finstas to Finding Yourself\n\n\n“Protopia is a state of becoming, rather than a destination.” – Kevin Kelly, The Inevitable. \n\nAs I flip through my copy of “The Inevitable”, my mind wanders to the corners of its own protopia. Kevin Kelly describes it as a state that is better today than yesterday, although it may just be by a little bit. A Protopia is the realistic future we should be striving towards. It’s the unavoidable tomorrow that will arrive come sunrise…\n\nAs a working member of this technological society, I know first hand that we are morphing. We’re growing, expanding, and changing, every. damn. day.\n\nYou may be reading this and thinking, “duh.” We’re not static beings, but instead are multi-faceted humans with the capability to learn and morph with our environment… This is universally understood. However, how often do you stop and think about how our technological presence plays a part in all of this?\n\nMaybe you’re one of those naysayers who believes that social media is the devil. Maybe you’re a child of the 00′s, who doesn’t know life without an online identity. Wherever you fall on this spectrum, we can all agree on one thing: the internet isn’t going anywhere. So, let’s come together & brainstorm ways to use these intertwined virtual networks to create a very real protopia.\n\n\nUnless you live under a rock, it is likely that you are a member of at least one social network. Whether its Facebook, Snapchat, Instagram, or a blog platform like Tumblr- you have created a virtual portrayal of real life you. I had an interesting conversation with my 17 year old sister yesterday about this topic. She was talking about how important “aesthetic” has become, and the great lengths her peers will go through to completely scrap an old look to become something new. “Finstas” are being created, and for all y’all who aren’t in high school, these are fake instagram accounts used to post photos that you only want your close friends seeing. It’s not even a matter of these posts being nasty or offensive, these are typically just photos that don’t go with the users “real” insta aesthetic.\n\nThe question then becomes, what is real? \n\nIf you scroll all the way down to my very first Instagram post, I’m still the same ol’ Lauren I am today. Just younger, and strapped with an iPhone 4. The core of a social media identity is to represent who you are, but in a virtual world. This is sort of a crazy concept to wrap your head around, so it does not come as a surprise to me that we’re running rapid with finstas and gym posts, when we haven’t once lifted a weight IRL.\n\nOn or offline, there is a (not so) simple solution to this: self awareness. \n\nHow do you define yourself? How would you describe yourself to others?\n\nWhen I was in 6th grade, I shopped at Hot Topic and listened to Good Charlotte. In 7th grade, I had a change of heart and style, and started shopping at PacSun. The middle school years are when you’re searching for your identity. Trying on different masks, seeing which one fits. If I had an Instagram back then, do you know how many punk rock princess posts I’d have to delete before setting foot in PacSun…\n\nIt is concerning to me that kids have to go through this process of finding and creating themselves with a smartphone permanently attached to their hip. Social media has become a window to the world, and rather than developing their own identities, we’re clinging to the identities of others. Everyone wants contoured skin, a million followers, and an A1 aesthetic… but are losing touch with their own reality in the process.\n\nDon’t get me wrong, if anyone is a social media advocate – it’s me. But, I am not blind to its dangers, In fact, I’ve made it my life work to create an anecdote.\n\n\nWe’re always learning, whether we realize it or not. While scrolling though Instagram, you’re learning about the world. About what people ate for lunch. About protopias. Literally– anything and everything.\n\nThis classroom is an interesting one, though. With the exception of posts that are created with the intention of being educational, most users aren’t putting their content out there with the thought, “wow, someone is really going to learn something from this.” But we should. What if everyone on social media stopped and thought for a second, “what can people learn from this?” before hitting that – post – button? Unrealistic, I know. But this can be flipped. What if everyone on social media stopped and thought, “what can I learn from this?” as they are scrolling though online content. This type of open-mindedness and thirst for knowledge can lead to a more fully developed sense of self. Think about thinking. Don’t just get lost in the mindless clatter that social media can be.\n\n\nPerhaps content we see or post isn’t meant to teach a lesson, but instead has the power to spark someone’s imagination. At the core of the platform that I’ve created, Out There Social, my goal is to inspire others to leave their comfort zone. This is the fuel that ignites the fire of everything I capture, ponder, write, and share. This is why I do what I do. This is why I love social media. Because I can reach the masses with messages that are so near and dear to my heart. I left my comfort zone in the dust years ago, and have been virtually screaming from the rooftops for everyone else to do the same.\n\nWe must realize the power we have as social media beings. Anything you post online, is seen by someone. It may not be a crowd of millions, but an audience is an audience. You have the conscious choice to decide how you will use this virtual stage. You have the free will to portray yourself to this audience anyway you choose. Your best bet, be yourself. Easier said than done, when most of us have a hard time grasping who we are.\n\nThink of yourself as an online source of inspiration. Use your voice to challenge others to think for themselves. Allow people to walk in your shoes, but give them the freedom to tie their own laces. Close your eyes an imagine your own protopia. Then, get out there and make it happen.\n\nI am here to debunk several patterns of close-minded thinking. What comes to mind when most people think social media: selfies, hashtags and narcissism. They think, this generation doesn’t stand a chance, because they are so self absorbed in the world wide web, they lost the ability to communicate face to face.\n\nWhile yes, I’ll have to agree, the number of duck faced selfies is disheartening, I am going to have to take a stand against the pessimism surrounding a world that is so near and dear to my heart.\n\nThe social media boom happened within my lifetime. I remember my mom taking me to the library as a kid, playing computer games, teaching me to become more savvy than I was able to realize. Next came my family’s first desktop computer being installed in the den (…it was a Dell, and I’m not talking pop singer). Soon after came “AOL”, when I created my first screen name: Cimba12000 (Cimba was my dog, don’t ask where the 12000 came from). What spiraled after that was a world-wind of AIM profiles, away messages, buddy chats, homepages, and icons, until one day, a brand new world was created: MySpace.\n\n\nI was the girl people would give their myspace passwords to, so they could “pimp them out.” I became proficient in HTML by the 7th grade, and would help create “sick layouts”, to make my profile stand out amongst the pack. When I started high school, a friendship began when a girl came up to me and said, “Hey! I recognize you from Myspace…”\n\nI followed the ebbs and flows of this world of social interaction, and kissed Tom from Myspace goodbye when Facebook entered the room. At first, it was strictly for college kids. Soon enough it became open to the general public, and naturally, I was one of the first to make the switch. This gave me the learning curve I needed to hit the ground running, maintaining my throne as a social media queen.\n\n\nFast forward to today, we’re switching app to app from Instagram, Pinterest, Tumblr, Youtube, and Google+, just to name a few. Social media as become an entity that most people can’t remember life without. Being so engaged in the timeline (Facebook reference intended) of this crazy world from the start is what gives me such passion for it, and has led me to my current career: Social Media Publicist.\n\nIt drives me crazy when people say, “Oh, so you just Facebook for work?” Another line that drives me nuts, “You studied psychology, when are you going to get a REAL job in the field…?” Ouch. The science that goes behind social media is an intricate one. If you think about it in simplest form, social media is people’s thoughts, conversations, and actions being recorded; allowing us to study it in both a qualitative and quantitive way…. that is a psychology major’s dream.\n\nIn grad school, we were inspired to become not psychologists, but agents of social change. As we went up, one by one, presenting our capstone research, many people applied their studies to the world of mental health counseling: hospital settings, rehabs, schools, and even businesses. Then, I went up there, and presented my research on using social media to change the stigma of mental health. After I concluded, my professor, and director of the Master’s Program stood up and said, “This is what Community Psychology is all about. Using the lessons and techniques we have learned, and applying them in a setting where people would least expect it.”\n\nTaking what I have learned in the classroom, on the internet, and in this crazy reality called “life,” I bought a web domain and named it “Out There Social.” I wasn’t sure what to do with it, but I knew I needed it.\n\nHere I am, on my 3 year anniversary of working as a Social Media Publicist, virtually screaming from the rooftops: Social Media is what we make it. It’s something that’s created by us… so if we don’t like what we’re seeing, let’s change it.\n\nOut There Social became my platform for promoting resiliency, confidence, and positive mental health in the most fun, exciting, and aesthetically pleasing way I possibly could. I truly believe the power is in our hands (quite literally, our fingertips), to change the world. Next week, I will begin my journey on the road to a PhD, studying the use of Social Media in the world of psychology.\n\nOn my first day of grad school, I was assigned a question, “What does it mean to be an agent of social change?” So here it is, my response, (written in Sept. 2012), which perfectly sums up everything I believe about social media, why I work in the field, why I will continue to study it, and why I am so head over heels in love with it:\n\n“In psychology, the tools we need to change, help, or make a difference are already within us. The job of a psychologist is to communicate to the world how we access these tools, and what to do with them. We are surrounded by psychology whether we recognize it or not…. A psychologist, or an agent of social change, has the important job of making the components of the field recognizable by everyone.\n\nThe important role of psychologists is to learn from this, and inform the population on the skills they need to properly handle the problems life will throw at you. As time progresses, problems become more complex. Technology has changed drastically since the time of Miller’s addresses, which introduced a new version of old problems– such as cyber-bullying. Face-to-face communication was also greatly impacted by the changing times, meaning some people relate better to a computer screen than a human.\n\nOn the bright side, technology makes psychological research and information instantly available. Miller states, “the practice of valid psychology by non-psychologists will inevitably change people’s conception of themselves and what they can do” (Miller, 1969). Due to the fact that technology connects both psychologists and non-psychologists, if used correctly, this may be the tool we are looking for to implement a mass social change.” – Lauren DiTo \n\nSocial Media CEO to Essena O’Neill: You Were the Lie, Not Social Media\n\nHere’s how we feel about Essena O’Neill…\n\nAs an entity that thrives on social media, we find this whole Essena O’Neill situation fascinating. Is anyone REALLY surprised to learn that it takes more than one shot to get that perfect Instagram photo?…\n\nLearn to decipher social media through a filtered eye, because that is exactly the type of eye that is posting. If you can present your message in a way that is aesthetically pleasing, then more power to you! The more appealing your post is, the more publicity you will get, and the more people your message will reach.\n\nSocial media in its simplest form is a means of communication. Strip away the filters and the likes and what you’re left with is a message. If your message is rooted from a lack of confidence, then your problem lies within. But, if your intent is to motivate, engage, teach, inspire, or any combination of the aforementioned, don’t be ashamed of the percentage of Valencia in your photo! A positive message in a pretty package is still a positive message… so keep on sharing your wisdom, filtered or unfiltered!\n\n\n“Blocked.” Does Avoidance Solve the Problem? \n\nBeing a millennial in the technological world of 2015 is a blessing and a curse. \n\n\nWe’re connected in a way like never before, where we can express our thoughts and feelings instantaneously. The anxiety of picking up the phone, dialing someone’s number and hoping they pick up is long behind us…\n\nSo, we got rid of that anxiety, and replaced it with a new one. Today, we are scoping out Instagram maps and tagged photos. We’re watching who ‘likes’ what, and freak out when Snapchat no longer tells us who’s best friends. Is technology the problem, or are we?\n\nConsidering social media is something that is being created by us, I’m going to say that we are the problem. But, on the bright side, there is a solution. One solution many people turn to: “block this user.” From a psychological standpoint, avoidance is basically coping by not having to cope. You’re pretending the problem disappeared *poof* into thin air. The feelings of discomfort are gone, and you are free to sink back into your comfort zone.\n\nOf course, there are some situations where blocking a person is necessary. Perhaps they are someone you genuinely do not want to find you, due to possible violent or traumatic outcomes.\n\nSome people “block” out of maturity, because they do not agree with the thoughts a person has, and would rather ignore them than give into the temptation of engaging in a fight.\n\nThen there are others, who “block” because they are being told to. They’re faced with an ultimatum from a significant other, where they have to prove themselves by “blocking” someone else from their life.\n\nTo the one that wants the blockage:\n\n\nYou remember on Friends when Ross was marrying Emily and she told him he couldn’t be friends with Rachel anymore? You’re Emily.\n\nFirst of all, before getting into a relationship with someone else, you have to be 100% secure with yourself. Know what you’re worth and be proud. Be confident in yourself, so you can be confident in your relationship. A major tenant of any relationship is trust. By telling the person you supposedly love that they can’t talk to someone— what you’re actually saying, loud and clear, is “I don’t trust you.”\n\nMaybe you have a reason not to trust this person. Maybe this person can’t have a platonic relationship with the person you want blocked. In that case, maybe you shouldn’t be in a relationship with them. It sounds like your future is a lifetime of mistrust, checked phones, and trying to dig for a deeper connection that doesn’t actually exist.\n\nOr maybe these reasons are all in your head. Maybe you’re creating situations that cause you to be skeptical due to experiences you’ve had in the past. Maybe you’re not giving your significant other the benefit of the doubt.\n\nIn either case, have some more respect for yourself. Don’t think that simply “blocking” someone is going to erase your problem— because your problem lies within: security with yourself, and with your relationship.\n\nTo the block-er:\n\n\nToughen up you weakling! A lot of people choose appeasement over dealing with their problems, because it seems like the easier option. Instead, all it does is dig yourself into a hole of deeper problems. You’re creating a standard with your significant other that they’re allowed to tell you what to do. A relationship requires sacrifice— it’s a give and take. It’s not a dictatorship.\n\nMaybe your bae hit the nail on the head. “Block this person, you still have feelings for them.” Maybe they’re right, and maybe you’re too afraid to confront those feelings. Maybe if you didn’t block that person, you would suffer other repercussions, like having to sleep on the couch, or getting your iPad smashed.\n\nMaybe they are completely wrong! Maybe you are putting a genuine friendship at risk, just to ease someone’s nonsensical, worrying mind. Sometimes its easier just to say yes, rather than put effort into explaining that they have nothing to worry about.\n\nIn either case scenario, you’re doing two things:\n\n 1. Respecting the person that doesn’t trust you.\n 2. Disrespecting the person on the sidelines.\n\nTo the block-ee:\n\n\nKnowing you are blocked by an old friend, former love interest, or even just some random Joe Shmo is a blow to the ego. I’m currently in this situation, on two very different sides of the spectrum (if you couldn’t already tell from the course of this post)…\n\nThe first one stemmed from a mutual attempt for a mature post-hook up-friendship (those could get messy, especially when feelings are involved). The second was from a long time friend, who feels more like a family member to me. In both instances, the “blocked” notifications hurt.\n\nOne of my favorite pearls of wisdom from the book “The Four Agreements” is: Don’t Take Anything Personally.\n\n\nEven when a situation seems so personal, even if others insult you directly, it has nothing to do with you. What they say, what they do, and the opinions they give are according to the agreements they have in their own minds…” -Don Miguel Ruiz, The Four Agreements \n\nTo everyone reading:\n\n\nMaybe I’ve been watching too much “Are You The One” lately, or maybe its situations I’m currently being faced with, but I truly believe that when you are with your “Perfect Match”, you will be able to trust them.\n\nTake a step back and look at your relationship for what it is. If you truly appreciate the person you’re with, and feel in your heart that they are doing the right thing for you; then let them follow whoever the hell they want on Instagram. If you feel that just one simple glance at a tweet is going to jeopardize your relationship, then maybe you’re better off single.\n\nIf you’re being told what to do this early in your relationship and would rather appease than succumb to threats, then do some research on abusive relationships. If you are giving into appeasement because you genuinely care for someone, have a mature, civilized discussion with them about the person they are feeling threatened by, and tell them they have nothing to worry about. But only if you mean it.\n\nStay true to yourself, realize what you are worth, and don’t be afraid to stand up for yourself. Sometimes this means having hard conversations, sometimes it’s walking away from something that no longer suits you, and sometimes it’s writing a blog post to call attention to the issue. You’re given one life… live it out of compassion and trust, not out of jealously and fear.", "pred_label": "__label__1", "pred_score_pos": 0.607636570930481} {"content": "Вы находитесь на странице: 1из 4\n\n\nNational Concrete Masonry Association\n\nan information series from the national authority on concrete masonry technology\n\n\nKeywords: cold weather construction, construction techniques, grout, hot weather construction, mortar, rain, snow, storage of materials, wet weather construction, windy weather construction INTRODUCTION Masonry construction can continue during hot, cold, and wet weather conditions. The ability to continue masonry construction in adverse weather conditions requires consideration of how environmental conditions may affect the quality of the finished masonry. In some cases, environmental conditions may warrant the use of special construction procedures to ensure that the masonry work is not adversely affected. One of the prerequisites of successful all-weather construction is advance knowledge of local conditions. Work stoppage may be justified if a short period of very cold or very hot weather is anticipated. The best source for this type of information is the U.S. Weather Bureau, Environmental Science Services Administration (ESSA) of the U.S. Department of Commerce which can be accessed at their web site http://www.ncdc.noaa.gov. In the following discussion, ambient temperature refers to the surrounding jobsite temperature when the preparation activities and construction are in progress. Similarly the mean daily temperature is the average of the hourly temperatures forecast by the local weather bureau over a 24 hour period following the onset of construction. Minimum daily temperature is the lowest temperature expected during the period. Temperatures between 40 and 90oF (4.4 and 32.2oC) are considered normal temperatures for masonry construction and therefore do not require special procedures or protection protocols. COLD WEATHER CONSTRUCTION When ambient temperatures fall below 40oF (4.4oC), the Specification for Masonry Structures (ref. 3) requires consideration of special construction procedures to help ensure the final construction is not adversely affected. Similarly when the minimum daily temperature for grouted masonry or the mean temperature for ungrouted masonry falls below 40oF (4.4oC) during the first 48 or 24 hours after construction respectively, special protection considerations are required.\nTEK 3-1C 2002 National Concrete Masonry Association (replaces TEK 3-1B)\n\nTEK 3-1C\nConstruction (2002)\n\nMortar and Grout Performance Hydration and strength development in mortar and grout generally occurs at temperatures above 40oF (4.4oC) and only when sufficient water is available. However, masonry construction may proceed when temperatures are below 40oF (4.4oC) provided cold weather construction and protection requirements of reference 3 are followed. Mortars and grouts mixed at low temperatures have longer setting and hardening times, and lower early strength than those mixed at normal temperatures. However, mortars and grouts produced with heated materials exhibit performance characteristics identical to those produced during warm weather. Effects of Freezing The initial water content of mortar can be a significant contributing factor to the resulting properties and performance of mortar, affecting workability, bond, compressive strength, and susceptibility to freezing. Research has shown a resulting disruptive expansion effect on the cement-aggregate matrix when fresh mortars with water contents in excess of 8 %mortar are frozen (ref. 2). This disruptive effect increases as the water content increases. Therefore, mortar should not be allowed to freeze until the mortar water content is reduced from the initial 11% to 16% range to a value below 6%. Dry concrete masonry units have a demonstrated capacity to achieve this moisture reduction in a relatively short time. It is for this reason that the specification requires protection from freezing of mortar for only the first 24 hours (ref. 3). Grout is a close relative of mortar in composition and performance characteristics. During cold weather, however, more attention must be directed toward the protection of grout because of the higher water content and resulting disruptive expansion that can occur from freezing of that water. Therefore, grouted masonry needs to be protected for longer periods to allow the water content to be dissipated. Cement During cold weather masonry construction, Type III, highearly strength portland cement should be considered in lieu of Type I portland cement in mortar or grout to accelerate setting. The acceleration not only reduces the curing time but generates more heat which is beneficial in cold weather.\n\nAdmixtures The purpose of an accelerating type of admixture is to hasten the hydration of the portland cement in mortar or grout. However, admixtures containing chlorides in excess of 0.2% chloride ions are not permitted to be used in mortar (ref. 3) due to corrosion of embedded metals and contribution to efflorescence. While specifically not addressed by the Specification, the use of chloride admixtures in grout is generally discouraged. Noncloride accelerators are available but they must be used in addition to cold weather procedures and not as a replacement for them. Antifreezes are not recommended for use in mortars and are prohibited for use in grouts. Material Storage Construction materials should be protected from water by covering. Bagged materials and masonry units should be protected\n\nfrom precipitation and ground water by storage on pallets or other acceptable means. Coverings for materials include tarpaulins, reinforced paper, polyethylene, or other water repellent sheet materials. If the weather and size of the project warrant, a shelter may be provided for the material storage and mortar mixing areas. Material Heating When the ambient temperature falls below 40F (4.4C) during construction, or mean daily temperature is predicted to fall below 40F (4.4C) during the first 24 hours following construction of ungrouted masonry, or the minimum daily temperature is predicted to fall below 40F (4.4C) during the first 48 hours for grouted masonry, Specification for Masonry Structures (ref. 3) requires specific construction and protection procedures to be implemented as summarized in Tables 1a and 1b. As indicated in\n\nTable 1aCold Weather Masonry Construction Requirements (ref. 3) Ambient temperature 32 to 40 F (0 to 4.4oC)\n\nConstruction requirements Do not lay masonry units having a temperature below 20oF (-6.7oC). Remove visible snow and ice on masonry units before the unit is laid in the masonry. Remove snow and ice from foundation. Heat existing foundation and masonry surfaces to receive new masonry above freezing. Heat mixing water or sand to produce mortar temperatures between 40 and 120oF (4.4 and 48.9oC). Grout materials to be 32oF (0oC) minimum. Do not heat water or aggregates above 140oF (60oC). Same as above for mortar. Maintain mortar temperature above freezing until used in masonry. Heat grout aggregates and mixing water to produce grout temperatures between 70 and 120oF (21.1 and 48.9oC). Maintain grout temperature above 70oF (21.1oC) at time of grout placement. Same as above, plus use heat masonry surfaces under construction to 40oF (4.4oC) and install wind breaks or enclosures when wind velocity exceeds 15 mph (24 km/hr). Heat masonry to a minimum of 40oF (4.4oC) prior to grouting. Same as above, plus provide an enclosure for the masonry under construction and use heat sources to maintain temperatures above 32oF (0oC) within the enclosure.\n\n25 to 32oF (-3.9 to 0oC)\n\n20 to 25oF (-6.7 to -3.9oC)\n\n20oF (-6.7oC) and below\n\nTable 1bCold Weather Masonry Protection Requirements (ref. 3) Mean daily temperature for ungrouted masonry Minimum daily temperature for grouted masonry Protection requirements 25 to 40oF (-3.9 to 4.4oC) 20 to 25oF (-6.7 to -3.9oC) Protect completed masonry from rain or snow by covering with a weather-resistive membrane for 24 hours after construction. Completely cover the completed masonry with a weather-resistive insulating blanket or equal for 24 hours after construction (48 hr for grouted masonry unless only Type III portland cement used in grout). Maintain masonry temperature above 32oF (0oC) for 24 hours after construction by enclosure with supplementary heat, by electric heating blankets, by infrared heat lamps, or by other acceptable methods. Extend time to 48 hours for grouted masonry unless the only cement in the grout is Type III portland cement.\n\n20oF (-6.7oC) and below\n\nTable 1a, the temperature of dry masonry units may be as low as 20oF (-6.7oC) at the time of placement. However, wet frozen masonry units should be thawed before placement in the masonry. Also, even when the temperature of dry units approaches the 20oF (-6.7oC) threshold, it may be advantageous to heat the units for greater mason productivity. Masonry should never be placed on a snow or ice-covered surface. Movement occurring when the base thaws will cause cracks in the masonry. Furthermore, the bond between the mortar and the supporting surface will be compromised. Glass Unit Masonry For glass unit masonry, both the ambient temperature and the unit temperature must be above 40oF (4.4oC) and maintained above that temperature for the first 48 hours (ref. 3). HOT WEATHER CONSTRUCTION\n\nAdditional Recommendations Store masonry materials in a shaded area. Use a water barrel as water hoses exposed to direct sunlight can result in water with highly elevated temperatures. The barrel may be filled with water from a hose, but the hot water resulting from hose inactivity should be flushed and discarded first. Additionally, mortar mixing times should be no longer than 3 to 5 minutes and smaller batches will help minimize drying time on the mortar boards. To minimize mortar surface drying, past requirements contained within Specification for Masonry Structures (ref. 3) were to not spread mortar bed joints more than 4 feet (1.2 m) ahead of masonry and to set masonry units within one minute of spreading mortar. This is no longer a requirement in the current document but the concept still merits consideration. If surface drying does occur, the mortar can often be revitalized by wetting the wall but care should be taken to avoid washout of fresh mortar joints. WET WEATHER CONSTRUCTION\n\nHigh temperatures, solar radiation, and ambient relative humidity influence the absorption characteristics of the masonry units and the setting time and drying rate for mortar. When mortar gets too hot, it may lose water so rapidly that the cement does not fully hydrate. Early surface drying of the mortar results in decreased bond strength and less durable mortar. Hot weather construction procedures involve keeping masonry materials as cool as possible and preventing excessive water loss from the mortar. Specific hot weather requirements of the Specification for Masonry Structures (ref. 3) are shown in Tables 2a and 2b.\n\nEven when ambient temperatures are between 40 and 90F (4.4 and 32.2C), the presence of rain, or the likelihood of rain, should receive special consideration during masonry construction. Unless protected, masonry construction should not continue during heavy rains, as partially set or plastic mortar is susceptible to washout, which could result in reduced strength or staining of the wall. However, after approximately 8 to 24 hours of curing (depending upon environmental conditions), mortar washout is no\n\nTable 2aHot Weather Masonry Preparation and Construction Requirements (ref. 3) Ambient temperature Above 100oF (37.8oC) or above 90oF (32.2oC) with a wind speed greater than 8 mph (12.9 km/hr)\n\nPreparation and construction requirements Maintain sand piles in a damp, loose condition. Maintain temperature of mortar and grout below 120oF (48.9oC). Flush mixer, mortar transport container, and mortar boards with cool water before they come into contact with mortar ingredients or mortar. Maintain mortar consistency by retempering with cool water. Use mortar within 2 hours of initial mixing. Same as above, plus materials and mixing equipment are to be shaded from direct sunlight. Use cool mixing water for mortar and grout. Ice is permitted in the mixing water as long as it is melted when added to the other mortar or grout materials.\n\nAbove 115oF (46.1oC) or above 105oF (40.6oC) with a wind speed greater than 8 mph (12.9 km/hr)\n\nTable 2bHot Weather Masonry Protection Requirements (ref. 3) Mean daily temperature Above 100oF (37.8oC) or above 90oF (32.2oC) with a wind speed greater than 8 mph (12.9 km/hr)\n\nProtection requirements Fog spray all newly constructed masonry until damp, at least three times a day until the masonry is three days old.\n\nlonger of concern. Further, the wetting of masonry by rainwater provides beneficial curing conditions for the mortar (ref. 2). When rain is likely, all construction materials should be covered. Newly constructed masonry should be protected from rain by draping a weather-resistant covering over the assemblage. The cover should extend over all mortar that is susceptible to washout. Recommended Maximum Unit Moisture Content When the moisture content of a concrete masonry unit is elevated to excessive levels due to wetting by rain or other sources, several deleterious consequences can result including increased shrinkage potential and possible cracking, decreased mason productivity, and decreased mortar/unit bond strength. While reinforced masonry construction does not rely on mortar/unit bond for structural capacity, this is a design consideration with unreinforced masonry. As such, the concerns associated with structural bond in reinforced masonry construction are diminished. As a means of determining if a unit has acceptable moisture content at the time of installation, the following industry recommended guidance should be used. This simple field procedure can quickly ascertain whether a concrete masonry unit has acceptable moisture content at the time of installation.\n\nA concrete masonry unit for which 50% or more of the surface area is observed to be wet is considered to have unacceptable moisture content for placement. If less than 50% of the surface area is wet, the unit is acceptable for placement. Damp surfaces are not considered wet surfaces. For this application, a surface would be considered damp if some moisture is observed, but the surface darkens when additional free water is applied. Conversely, a surface would be considered wet if moisture is observed and the surface does not darken when free water is applied. It should be noted that these limitations on maximum permissible moisture content are not intended to apply to intermittent masonry units that are wet cut as needed for special fit. WINDY WEATHER CONSTRUCTION In addition to the effects of wind on hot and cold weather construction, the danger of excessive wind resulting in structural failure of newly constructed masonry prior to the development of strength or before the installation of supports must be considered. TEK 3-4B Bracing Concrete Masonry Walls During Construction (ref. 1) provides guidance in this regard.\n\nREFERENCES 1. Bracing Concrete Masonry Walls During Construction, TEK 3-4B. National Concrete Masonry Association, 2000 2. Hot & Cold Weather Masonry Construction. Masonry Industry Council, 1999. 3. Specification for Masonry Structures, ACI 530.1-02/ASCE 6-02/TMS 602-02. Reported by the Masonry Standards Joint Committee, 2002.\n\nNCMA and the companies disseminating this technical information disclaim any and all responsibility and liability for the accuracy and the application of the information contained in this publication.\n\nNATIONAL CONCRETE MASONRY ASSOCIATION 13750 Sunrise Valley Drive, Herndon, Virginia 20171-3499 www.ncma.org\n\nTo order a complete TEK Manual or TEK Index, contact NCMA Publications (703) 713-1900\n\nПохожие интересы", "pred_label": "__label__1", "pred_score_pos": 0.6920994520187378} {"content": "KARACHI - Members of National Assembly visited PSO House on Wednesday for a briefing on the national energy giant’s performance over the past year and employment opportunities the company offers to people hailing from different areas of the country. \n\nDuring the course of the meeting, PSO CEO&MD Naeem Yahya Mir thanked NA members for visiting PSO as it was under their guidance and direction that company was striving to serve the energy needs of the country.\n\nSpeaking further, MD apprised parliamentarians that PSO was dedicated to serve all segments of country in a fair and equitable manner. Elaborating on this, MD explained that company had initiated multiple development projects in different areas across the country including Balochistan. This included the upcoming establishment of a new deep sea mooring point and storage facility at Hub. This new facility would provide employment opportunities for the local people and serve to enhance the national oil storage capacity by 10-14 days while reducing congestion at the Fotco and Keamari jetties.\n\nHe also spoke on the Memorandum of Understanding (MoU) signed with the provincial government for establishment of a 5,000 acre bio-diesel plantation located at Uthal, Balochistan. This plantation would serve as an agricultural and technological hub for the development of bio-fuels in Pakistan and act as a pilot project for commercial investors nationwide.\n\nThe MD also pledged that PSO would provide further employment opportunities to the youth of Balochistan and ensure a 7-8pc employment quota for the inhabitants of the province. In the future the company would also entertain the resumes of engineering and technical graduates at its depots in order to provide greater convenience to the inhabitants of these areas. Additionally, as part of the company’s commitment to provide uninterrupted fuel supplies to all corners of the country, he promised to re-open the Khuzdar depot in order to get rid of any product dry-out situations at PSO retail outlets in Quetta and its surrounding areas. The Assembly members commended the MD for his proactive strategies and assured him of their support for his future plans.\n\nPSO in its role of being both a public sector as well as the largest energy company in Pakistan today is committed to meeting the fuel needs of the country in a timely and responsible manner.", "pred_label": "__label__1", "pred_score_pos": 0.8852096199989319} {"content": "The Future of Medicine Lies in Valuable Patient Data\n\nPatient Data\n\nThe Decision is in the Data: The future of medicine lies in valuable patient data\nBy: Ashley Keenan\n\nData is invaluable in helping industry professionals become more efficient and productive, the medical cannabis industry is no exception. According to Stanford University, focusing on data in healthcare could lead to more preventive, predictive and personalized care, which in turn would reduce healthcare costs and contribute to better patient outcomes. As this sector of data is such a sensitive subject, the industry must balance data-sharing with patient privacy and trust. Through monitoring and analysis, data can then be disseminated to key stakeholders in the medical industry, and fundamentally transform the future of healthcare.\n\nThe Value of Data in Medicine\n\nHealthcare, at its core, is driven by data. From medical research to the patient experience, there are multiple ways to utilize data in healthcare to improve ongoing care, prediction and prevention. Publicly-accessible data allows researchers to pose new questions, uncover new findings, and discover improved treatment options. According to the report by Stanford University, data will become even more essential for medical breakthroughs, creating a future of ongoing data collection from multiple sources.\n\nPatient data is an essential component of the healthcare ecosystem, driving research, innovation and decision-making. It can inform research and innovation, prevention and treatment strategies, health promotion efforts, self-care, health systems planning and wider public health activities, behaviours and decisions. As access to this essential data grows, economic and social benefits are ready to be reaped by key stakeholders like academic researchers, industry, healthcare professionals and providers, patients and the public, payers and policymakers, regulators, charities and the third sector.\n\nIn addition to being beneficial to the key industry stakeholders, patient driven data allows patients to take control of their health outside the doctors office. With 212 million unique monthly visitors to WebMD alone, it is evident that patients are invested in accessing patient data as well. In addition to internet sources, increased use of wearable devices, at-home genetics testing, and ‘smart’ gadgets calculating everything from BMI to rest cycles have created a plethora of accessible data to empower patients in their healthcare decisions.\n\nData and the Healthcare Ecosystem\n\nData is permeating every component of the healthcare ecosystem:\n\nMedical research: Access to new, diverse data and open datasets are fueling drug discovery and making clinical trials and research more efficient.\n\nDaily life: Wearable devices, online diagnostic tools and genetic sequencing services hold the promise of better informed and engaged patients.\n\nThe patient experience: Health systems are investing heavily in technology, including machine learning, which is proving as effective as or more effective than human diagnosticians.\n\nOngoing care: Telemedicine and health apps make it possible for physicians to see patients virtually, outside of traditional facilities for increased access and tailored care.\n\nPrediction and prevention: Health data is allowing doctors to build better patient profiles and predictive models to more effectively\n\nPatient data is not always gathered through medical clinical trials. In fact, experts are using these new sources of data to structure clinical trials in a more economical way by using these data points to reduce the cost and length of time needed to conduct medical research. In addition to being more cost effective, recruitment for clinical trials is optimized as researchers can use data points to identify the ideal patients.\n\nTechnology companies are trying to optimize the increase in data accessibility by developing artificial intelligence systems that can analyze, diagnose, and treat health issues. These AI systems would take in the information a doctor would, such as symptoms, severity of illness, family history, and lifestyle habits. In a 2018 study by the MIT Institute for Medical Engineering and Science, they concluded that there was a component of doctor’s care that extended beyond a list of symptoms. Factors like experience, and their years of training and practice, and a general ‘gut feeling’ allowed them to more comprehensively know what tests to order for a patient.\n\nWhile data technology companies won’t be replacing doctors any time soon, they provide access to invaluable information that add to the existing expertise of medical professionals. In addition to working on AI systems for diagnosis, tools like Strainprint Analytics are changing how doctors utilize the vital world of patient data. Strainprint Analytics provides industry professionals access to databases of patient outcomes,creating a holistic picture that helps stakeholders make the best decisions available for patient healthcare.", "pred_label": "__label__1", "pred_score_pos": 0.808496356010437} {"content": "Business Model Canvas\n\n\n\nGet the pdf!\n\nFill this form to get a pdf download of the tool.\n\n* indicates required\n\nBusiness Model Canvas\n\nWhat is it for?\n\n\nTip: Use this as a strategic tool to help you develop new or existing business models.\n\nWhen to use it:\n\nUse the business model canvas to visualize all the building blocks needed to start or expand a new business venture. Use this tool to explore areas of growth and innovation within a business, and to analyze competitors’ models.\n\nWho can use it:\n\nStrategy and innovation teams, product teams, entrepreneurs, Business Designers, and Design Thinking experts, who want to launch a new offering or improve an existing one.\n\nHow to Use\n\nPrint the Business model canvas.\n\nName the purpose of the venture. Why does the business exist?\n\nNext, start filling in the building blocks, begin with the customer segment or value proposition blocks, work your way unto the rest of the blocks from there.\n\nIn the Value Proposition block, write down what your customers will benefit from your solution. What is the value of your offering to them? e.g. “safe and convenient trips.”\n\nThen move to the customer segments. Here you state who you are creating your offering for, e.g. students, retirees, etc.\n\nThen fill the Channels block, this relates to how you will get your offering to your customers, e.g. via an app, delivery service, billboard ads etc.\n\nFor the Customer Relationship block, you want to think of how you will retain your customers, will your offering require technology or someone from your team to talk to your customers?\n\nThen in Key Resources, list out the things that are needed for you to bring your offering to market. Resources could be people, machines, patents, etc.\n\nFor Key Activities, ask, what are those processes and tasks that must be completed for your offering to be delivered to your customers. For instance, food preparation could be an activity for a fast food place, purchasing raw materials for a factory and so on.\n\nFor Key Partners, write down those people or organizations that are vital in delivering your offering (e.g. raw materials suppliers, delivery company, etc)\n\nIn the Revenue Stream block, list the ways you will get money for your offering (e.g. commissions, Ads, payments etc)\n\nThen the Cost structure block is where you list the major things that you will need to pay for, to ensure business runs smoothly, these could be salaries, rent, raw materials etc.\n\nShare with your friends and colleagues", "pred_label": "__label__1", "pred_score_pos": 0.5612556338310242} {"content": "Guideline for Carbon Nanotube Measurements -- COMPAMED Trade Fair\n\nGuideline for Carbon Nanotube Measurements\n\nThe nanotubes are essentially cylinders of carbon atoms with a wall only one atom thick and a diameter of a couple of nanometers—but lengths up to several million times their diameter.\n\nBecause of their unique electronic, thermal, optical and mechanical properties they are being studied for a wide—and expanding—range of applications, including ultrastrong fibers for nanocomposite materials, circuit elements in molecular electronics, hydrogen storage components for fuel cells and light sources for compact, efficient flat-panel displays.\n\n\n\nBeginning in 2003, NIST and NASA researchers started addressing the problem by sponsoring a series of workshops devoted to nanotube measurements. The techniques discussed include thermogravimetric analysis; near-infrared spectroscopy; Raman spectroscopy and optical, electron and scanned probe microscopy.; Source: National Institute of Standards and Technology", "pred_label": "__label__1", "pred_score_pos": 0.5630489587783813} {"content": "The Road to Promare: TRIGGER Staff Discuss the Anime Studio's History\n\nFind out how it all began and how each work inspired the next!\n\nThis piece was originally published on and is republished with permission from KADOKAWA.\n\n\n\nThe anime studio TRIGGER is behind such works as Gurren Lagann, Kill la Kill as well as their newest creation Promare. But how was this studio founded, and how was it able to create such masterpieces? We asked two prominent members of the studio about its history. \n\n\nTRIGGER was established back in August 2011 by three former members of the anime production company Gainax: Masahiko Otsuka, Hiroyuki Imaishi, and Kazuya Masumoto. We asked Hiromi Wakabayashi and Kazuya Masumoto, who were deeply involved in TRIGGER’s creation, how their studio was established, how they were able to create such masterpieces, about their history and the details of their work starting from before their studio’s creation with Gurren Lagann to Kill la Kill among their other titles. This article will be a good read for both those who have already seen Promare, which made its theatrical debut on May 24, 2019 in Japan, as well as those who may be interested in seeing it.\n\n\nKazuya Masumoto\n\nTRIGGER Company Director & Producer. At Gainax he was in charge of the Production Committee.\n\n\nHiromi Wakabayashi\n\nHandles project planning, scripts, and production at TRIGGER. At Gainax he was an Establishment Manager.\n\n\nFrom Gurren Lagann to Kill la Kill\n\nPlease start off by telling us how TRIGGER was established.\n\n\nMasumoto: When Panty & Stocking with Garterbelt (hereafter referred to as Panty & Stocking), which Imaishi directed at Gainax, wrapped up its broadcast in December of 2010, talks started moving forward with our company’s current representative, Otsuka, and Director Imaishi as to what anime we were going to do next. That’s when we started to say, “This time we want to challenge ourselves by taking personal responsibility for the anime creation process,” and talks started developing toward wanting to go independent and create our own company. At the time the two of them requested that I take over company management, and I got the feeling it would be an interesting experience. But while Otsuka and Imaishi were looking to create their own company, I didn’t feel it was necessary for us to create a new company just for anime production. I gave it some thought, then gave the answer: “If you’ll make a company that can create its own original 2-hour movie with Imaishi-san as the director, then I want to be a part of it.”\n\n\nI see, so that’s how things unfolded. Speaking of TRIGGER and Director Imaishi’s work, I’d like to go back in time to when you were at Gainax. Could you tell us about how Gurren Lagann was created?\n\n\nWakabayashi: Back then at Gainax plans were moving along for the first original TV series about robots since Neon Genesis Evangelion, which aired 10 years prior. In the beginning we were working with a completely different series, moving forward with plans to create a TV series and movie at the same time. After that, a lot happened and the plans and staff both changed, and we had to start over from scratch. For this new series, we wanted to ask Kazuki Nakashima to be in charge of the script, and that’s when Imaishi-san said, “Well, if you’re getting Nakashima-san on board,” and offered himself up as director. At that time what we’d decided was that an armored robot suit with a Japanese-style design would make an appearance, there would be a bond between an older brother figure and younger brother figure, and that we’d create a traveling tale, but at the beginning we didn’t even have the “drill” component that symbolized Gurren Lagann.\n\n\nSo the drill was added in later! It was at that time that Masumoto-san was put in charge as a Production Assistant, correct?\n\n\nMasumoto: It was very difficult at the time. Back then planning for Gunbuster 2 was moving forward at the same time, so we only had young people on staff for Gurren Lagann. Gunbuster 2 was the first OVA that Gainax ever made on its own. Gurren Lagann was also their first ever Gainax-only TV series. So, as unbelievable as it sounds, Gainax had two solo productions moving forward at the same time (laughs).\n\n\nThat must mean you guys were faced with a lot of crunch time then?\n\n\nMasumoto: It was common for us to keep working every week right up to the deadline…\n\n\nWakabayashi: But everyone was very young, so we were able to do it. Even Imaishi-san at the time was 35 years-old, but that made him one of the oldest there age-wise. Over half of the staff at the time were in their 20s.\n\n\nAnd so TRIGGER was established and that’s what led to your first title Kill la Kill.\n\n\nWakabayashi: Fortunately, thanks to all of the fan’s support, Gurren Lagann became a hit, which in turn put this amazing pressure on us to surpass it. That’s why a lot of time went into its design and composition. Nakashima-san put so much effort into it that he was largely responsible for the entire script.\n\n\nMasumoto: The story and script for Gurren Lagann was made by Nakashima-san, to a certain degree, with the viewers in mind. But Kill la Kill on the other hand was, I think, Nakashima-san’s way of challenging himself to see if he could take these self-centered characters, create the story the way he wanted, and still have viewer acceptance.\n\n\nWakabayashi: As a result, it became a work beloved by a new type of viewership, with a huge response that I think was felt by both Imaishi-san and Nakashima-san.\n\n\nGurren Lagann\n\nGurren Lagann\n\n\nWhat do you think was the primary factor that allowed you to overcome the hurdle that was your previous hit work?\n\n\nMasumoto: We’re all more experienced now than we were back when we created Gurren Lagann, we’ve made a number of different works since then, and we’re even pickier now about the animation layout on screen as well as character creation.\n\n\nWakabayashi: We spent a lot more time on Kill la Kill completing one character’s design than we did in our previous work. Not just the characters, but the entire visuals of the work; the coloring, the background touches, and the way it was directed too, it was a result of all of the time sunk into all of these things that became one of the factors behind why everyone enjoyed Kill la Kill so much, I think.\n\n\nPeople also talked about how it was made to be like a homage to 1970-1980s shounen manga.\n\n\nWakabayashi: Amemiya-kun (Akira Amemiya), who worked as the vice director, and I weren’t a part of that generation, so we didn’t understand most of the references (laughs). That’s exactly why we filtered the references that Imaishi-san and Nakashima-san—people from that generation—wanted to use through people from my generation and centered our ideas on things that viewers from that generation and younger would be able to enjoy.\n\n\nMasumoto: At first it was just a simple school battle type of anime with girls in sailor outfits fighting each other.\n\n\nWakabayashi: In the original version there was no “Life Fiber Synchronize,” or in other words, no transformation component, but as the design team we wanted something similar to the robot that was in Gurren Lagann. That’s when we came up with the idea of characters going into battle in a super flashy way, thereby making the protagonists transform to fight. Although they were powering up by wearing clothes, the designs actually showed a lot of skin (laughs). That conflicting component was something Nakashima-san came up with an explanation for as he put the story together.\n\n\nKill la Kill\n\nKill la Kill\n\n\nAnd Now, to Promare\n\nSpeaking of TRIGGER’s early stages, Inferno Cop was quite the controversial work, wasn’t it? (laughs)\n\n\nMasumoto: We were constantly creating works with big time investments, so we actually needed to practice creating an anime in a short amount of time. That was how Inferno Cop was created, and we limited ourselves to one hour a week.\n\n\nWakabayashi: The sense at the time was that the regulations on TV anime had become strict, but we thought we could do whatever we wanted if it was broadcasting online (laughs). So as long as viewers could laugh the art didn’t need to move, and we didn’t need a coherent storyline either, that’s what we thought when we made it. After that, I attended an anime event as a guest overseas and was shocked. Overseas anime fans, largely from North America, appreciated Inferno Cop as an abnormal comedy (laughs). I was very happy about that.\n\n\nInferno Cop\n\nInferno Cop\n\n\nNINJA SLAYER FROM ANIMATION also gained attention as a Flash anime that didn’t “move,” didn’t it?\n\n\nMasumoto: We received an offer to turn it into an anime, took it to Amemiya, and he took into consideration the details surrounding the original’s conception and the context of the work, and it became a story, like the expression goes about how it can be done if it’s an anime adaptation, and that’s how it was realized. It was also one of Director Amemiya’s requests that Imaishi-san be in charge of the character design.\n\n\nWakabayashi: At first, we were surprised because we never thought we’d get the OK to make it that way.\n\n\nAiyeeee…. That’s very impressive (laughs). So, you made another similarly short anime called SPACE PATROL LULUCO, what was the creation time on it like?\n\n\nWakabayashi: At the time, TRIGGER was mainly focused on KIZNAIVER, so we were forced to create SPACE PATROL LULUCO with a severely limited staff of ten people. We started off our mission to see how interesting of a project we could make with limited staff, budget, and time, decided the rules and stuck to them hard as we entered production. As a result, we came out with a short but dense work, and Director Imaishi along with the rest of the staff were really attached to it. LULUCO is one of the titles we’d eventually like to make a sequel for. \n\n\n\n\n\n\n\n\nAnd so that’s what brings TRIGGER and Director Imaishi to Promare. Is there a work among those that you’d like viewers to see first before you think they can appreciate Promare?\n\n\nWakabayashi: Our newest work Promare is made for people who have never touched any of Imaishi’s other works before, so it can be enjoyed enough by itself without seeing any of his past titles, though on the other hand, it’s also something of a compilation of all of Director Imaishi’s works up until now. So if you watch Gurren Lagann, Panty and Stocking, Kill la Kill, and SPACE PATROL LULUCO then you might have a deeper appreciation for the story and visuals. \n\n\n\n\n\nSee the original article at\n\n\n©TRIGGER,Kazuki Nakashima/Kill la Kill Partnership\n\n\n©[email protected] Entertainment/[email protected] Conspiracy\n\n©TRIGGER, Hiroyuki Imaishi/SPACE PATROL LULUCO Production Committee\n\n©TRIGGER, Kazuki Nakashima/XFLAG\n\nAndere Topnews\n\n0 Kommentare\nSchreib den ersten Kommentar!\nSortieren nach:", "pred_label": "__label__1", "pred_score_pos": 0.8225967288017273} {"content": "Spanish follows a common syllabus framework for the teaching and examining of modern languages in the Leaving Certificate. The syllabus aims to develop learners’ communicative skills in the Spanish, to develop their strategies for effective language learning and raise their awareness of cultural, social and political diversity.\n\n\nJunior Cycle", "pred_label": "__label__1", "pred_score_pos": 0.9999030232429504} {"content": "The field of community and social services isn’t one that you typically associate with high-level mathematics. As a prospective social work major, you might wonder if you will have to take math classes in college. Although you probably won’t need to complete advanced math classes, students interested in social work will still need to take minimal math courses needed to fulfill their college’s general education requirements as well as certain math-related coursework that helps to develop their quantitative and analytical skills. Social workers do use math in their work to some degree, although their jobs don’t require them to know advanced calculus or abstract mathematical theory.\n\nGeneral Education Math Requirements\n\nSocial workers in the United States need at least a bachelor’s degree, according to the Bureau of Labor Statistics (BLS). As with other bachelor’s degrees, earning the Bachelor of Social Work (BSW) degree requires students to meet different types of course requirements. One of the most basic types of requirements needed for an undergraduate degree is the general education coursework. Most colleges require students of all programs of study to take courses in a breadth of subjects, regardless of their declared major, to help them develop a foundation of college-level knowledge and become well-rounded individuals. Mathematics is an integral part of most general education requirements.\n\nAlthough general education requirements vary from one school to another, most colleges require only a small amount of mathematics coursework, such as one or two classes. Often, students can fulfill this requirement with non-advanced college-level courses, such as College Math, Mathematical Modeling or College Algebra Concepts. Some colleges combine mathematics and natural or life sciences into one general education area of focus, so you may be able to split your credits between math and laboratory science courses.\n\nOther general education areas of focus may include the humanities, the social sciences and communication coursework in composition and public speaking.\n\nCoursework in Statistics and Quantitative Analysis\n\nOnce you knock out your general education math requirements, you may still have some mathematics coursework left to go. Part of a social worker’s education involves learning the methods used to understand data and conduct research.\n\nSocial work majors often take one or more courses in social work research. Though not strictly speaking math courses, these classes cover material such as the scientific method of research, quantitative and qualitative research methods, research design and the application of research and evidence-based social work programs and interventions.\n\nIt’s not unusual for a BSW program to also include mandatory coursework in statistics. One reason this requirement has become popular is because classes in statistics help social workers understand and interpret numerical data in the real world, according to The Houston Chronicle. Some schools offer specialized statistics classes, like statistics for social science, while aist other schools, students fulfill this requirement by taking an introductory statistics and probability course or an elementary applied statistics course.\n\nSocial work research courses also cover topics such as ethical standards in social work research and practice as well as research into social welfare, diverse populations, social policy and advocacy.\n\nIs There Any Math Required for a Degree in Social Work\n\n\nUsing Math in Real-Life Social Work Roles\n\nHow much math to social workers use in real life? It depends in large part on their specialty, work environment and job duties. A social worker who focuses on research will likely use statistical analysis techniques more commonly than one who works directly with families or individuals. Likewise, someone who works in macros social work, or the field of social work that involves indirect service through developing services and programs, might need to use their mathematical and quantitative analysis skills frequently to the efficacy of social services, policies and programs.\n\nEven if you don’t plan on working in research or macro social work, you still need to be able to understand published social research so that you can incorporate new principles and findings into your own practice of social work. Additionally, you may need to use basic math skills in the paperwork you must file and the records you must maintain. If you develop care or treatment plans, you must be cognizant of the numerical costs of services and the resources that are available.\n\nIn the specialty of financial social work, the social worker will need basic math skills to teach clients to create budgets and manage their finances to improve their financial situation.\n\nRelated Resources\n\nWhat Can I Do With a Social Work Degree?\n\nIs There Any Math Required for a Degree in Counseling?\n\nIs There Any Math Required for a Degree in Psychology?", "pred_label": "__label__1", "pred_score_pos": 0.8521652817726135} {"content": "Table 1: The active pepsin isoenzymes in man.\n\nPepsin isoenzymeProportion of total pepsinSubstrate: pH optimum rangeMolecular\nweight (Da)\n\n1<5%Haemoglobin: 1.9\nCollagen: 3.0\nMucin: 2.0\n43810The proportion of pepsin 1 rises to 23% in DU\nMucolytic pepsin\nComplexed with carbohydrate\n\n2<1%Haemoglobin: 2.139950\n\n380%Haemoglobin: 2.4–3.137150Pepsin 3 is a complex of isoenzymes. The assay measures their combined effects.\nHaemoglobin: 3.23A is structurally similar to 3B but is phosphorylated\n\n5 (Gastricsin)6-7%Haemoglobin: 2.0–3.6 (maximum at 3.2) Mucin: 3.5–531620Stable up to pH 7.3\n\n“Pepsin 4” is a complex of pepsin and an inhibiting peptide, hence, it does not appear in the list of active pepsin isoenzymes.\n“Pepsin 6” is the remnant of a zymogen, in all probability pepsinogen, hence it too does not feature in the isoenzyme list.\n“Zone 7” was found to be a cathepsin.\nReferences [2125].", "pred_label": "__label__1", "pred_score_pos": 0.9587012529373169} {"content": "\nChallenger Elementary\n1 (256) 428-7060   |   \n1 (256) 428-7064   |   \n13555 Chaney Thompson Rd. SE\nBlue Ribbon School\n\nChallenger Shuttle Mission 10: STS-51-L\n\n10th Challenger mission\n\n25th space shuttle mission\n\n\nStart of Mission: January 28, 1986 at 11:38 am , Kennedy Space Center, Florida\n\nEnd of Mission: January 28, 1986, 11:39 am, 73 seconds after liftoff (in the air at Kennedy)\n\nMission duration: 1 minutes, 13 seconds\n\nDistance traveled: 18 miles\n\nOrbits of Earth: 0\n\nCrew Size: 7\n\nCommander: Francis R. Scobee\nPilot: Michael J. Smith\nMission Specialist 1: Ellison S. Onizuka\nMission Specialist 2: Judith A. Resnik\nMission Specialist 3: Ronald E. McNair\nPayload Specialist 1: S. Christa McAuliffe\nPayload Specialist 2: Gregory B. Jarvis\n\nAstronaut Bios:\n\nMission Facts:\n\n·         First time a non-government civilian, schoolteacher Christa McAuliffe, had flown aboard the space shuttle\n\n·         The Rogers Commission, an investigation team, determined that the cause of the destruction was due to the failure of an O-ring seal on one of the solid rocket booster (SRB).\n\n·         This was the first American orbital mission to involve fatalities\n\n·         After this failure, the space shuttle program was on hiatus for 32 months\n\n·         The mission was delayed for several days due to various issues\n\n·         The State of the Union address by President Reagan was supposed to take place that evening, but he cancelled the address and spoke to the nation about the tragedy instead.\n\n\nPre-launch and launch footage:\n\n\nPresident Reagan’s Speech (1/28/86):\n\nChallenger Accident Investigation Report:", "pred_label": "__label__1", "pred_score_pos": 0.7475921511650085} {"content": "Algorithmic ethics: lessons and limitations for leaders\n\nTo unleash automation’s decision-making potential we must examine its limitations\n\nBy Nicos Savva 13 November 2017\n\n\nIn the not-too-distant past, we made decisions based entirely on human judgement. Now, automated systems are helping people call important shots. Financial institutions use algorithms to offer loan applicants immediate yes-no decisions. Recruitment firms adopt systems powered by language technology to match applicants to vacancies. Even the criminal justice system uses predictive algorithms when sentencing criminals.\n\nThere are hundreds of examples like these, and algorithmic automation of decision-making is only set to rise. Why? First, computational power is becoming cheaper thanks to Moore’s “Law” – the observation that the number of transistors per square inch in integrated chips, a measure that correlates with computation power, doubles every 18 months. Second, we’re creating smarter algorithms that can transform raw and unstructured data into digestible information that is impacting everything from digital to financial health. Third, we simply have more data. Every aspect of our lives is blazing a digital trail which can be mined to better understand human behaviour – and predict the future.\n\nThe opportunity\n\nSome people argue that algorithms can never match human ability in making decisions because they focus too narrowly on specific tasks. But are humans so perfect? People can be influenced by how they feel: one study of more than a thousand court decisions showed that judges are more lenient after lunch. People can be slow: JP Morgan Chase cut 360,000 hours of routine finance work to a matter of seconds with a system that stopped 12,000 mistakes made by human error every year. People can be selfish: research led by Madan Pillutla, London Business School Term Chair Professor of Organisational Behaviour at London Business School, suggests that even the fairest, most well-intentioned person can be prone to discriminate – they hire based on what’s in it for them.\n\nThree limitations\n\nIt’s true that algorithms do not suffer from human imperfections, such as being tired, error-prone or selfish. But there are limitations when we rely on algorithms to make decisions, and it’s important we understand what they are:\n\n1. Transparency: algorithms are a black box – it’s difficult to know if they’re fit for purpose if we don’t know how they work\n2. Bias: algorithms are trained to make recommendations based on data that’s not always representative – systematic biases can go unnoticed and these biases can proliferate over time\n3. Accuracy: we treat algorithms as infallible – in reality, they’re only designed to work well on average.\n\nAn example from the criminal justice system can help us examine these limitations in action. Eric Loomis was arrested in the US in February 2013 and was accused of driving a car that had been used in a shooting: he pleaded guilty to eluding a police officer. The judge at Wisconsin Supreme Court sentenced him to six years in prison. Part of the decision-making process was COMPAS (which stands for Correctional Offender Management Profiling for Alternative Sanctions), a proprietary algorithm used to calculate the likelihood that someone will reoffend. COMPAS measures categories such as criminal personality, substance abuse and social isolation. Defendants are ranked from 1 (low risk) to 10 (high risk) in each category.\n\nLoomis challenged the judge’s use of the COMPAS score because unlike other evidence used against him, his defence team could not scrutinise the algorithm – the first limitation. The judge’s reliance on the score, the factors considered and the weight given to data in the decision-making process were all grounds for his appeal, which reached the Wisconsin Supreme Court in July 2016.\n\nThe second limitation, that algorithms are only as good as the data used to train them, is also an issue. COMPAS uses crime data, which is essentially arrest data. Arrest data often relies on police being in the right place at the right time. If an area is notorious for petty crime, police are more likely to attend, make an arrest and report the data. The information is then used to predict future crimes. The problem? At some point, this becomes self-perpetuating. What if a crime goes unreported because a neighbourhood has a reputation for upholding the law? What if the police simply aren’t able to attend? No police, no arrests, no data.\n\nOur human biases become part of the technology we create\n\nMy research with Yiangos Papanastasiou (Berkeley) and Kostas Bimpikis (Stanford) demonstrates that the world of recommendations based on consumer reviews also suffers from such self-perpetuating cycles. For example, a positive customer review of a hotel on TripAdvisor will lead to more people wanting to visit the establishment. More customers, more reviews, more social proof. In this way, a hotel’s success can become self-reinforcing. But what about a less-explored alternative option? Even a superior hotel will find it difficult to prove its worth if it receives less attention.\n\nSelf-perpetuating cycles can create bias in algorithms. Sometimes what leads to bias is much simpler. Imagine you were trying to teach a computer about facial recognition by taking your own set of Facebook friends as a starting point. Computers find patterns in data; that’s how machine learning works. Problem is, your friends’ faces don’t represent everyone on earth. Unintentionally, by starting from information based on your personal network, you will create an algorithm that recognises faces of people that look like your friends but fails to recognise faces that look different to them. The same can be said for data that is only representative of the past but not of the present or the future. In this way, our human biases become part of the technology we create. Tech giants such as Google are beginning to educate people about such bias, but still have a way to go.\n\nFinally, even if the data used to train an algorithm is free from the biases described, algorithms may still prove problematic. Why? Because users rely on the recommendations too much.\n\nFirst, we tend to forget that predictions are not always perfect. Going back to the COMPAS example, an independent audit by an investigative journalism non-profit firm ProPublica finds that defendants who rate with the worst possible score (10 out of 10) still have a 20% chance of not reoffending. Conversely, defendants who rate with the best possible score (1 out of 10) still have a 25% probability of reoffending (much higher than the general public). So algorithms can make mistakes.\n\nThere’s a mathematical limit to how fair any algorithm can be\n\nSecond, algorithms inevitably make predictions that discriminate against groups that are different from the average. Remember, COMPAS rates defendants based on more than 100 factors such as criminal history, sex and age. It doesn’t take race into consideration. Indeed, when mathematically scrutinised, it appears that the algorithm does not discriminate by race – someone classified as high risk has the same probability of reoffending irrespective of race. So the algorithm’s prediction accuracy does not vary by race, yet, when further scrutinised, the results are imbalanced. A greater share of black defendants (a minority with a higher recidivism rate than average) who do not reoffend are classified as high risk compared to the average. Given the former, the latter is inevitable: there’s a mathematical limit to how fair any algorithm can be.\n\nHow so? Sam Corbett-Davies, Emma Pierson, Sharad Goel (all at Stanford) and Avi Feller (at Berkeley), explain further in this article. Black defendants are more likely to be classified as high risk. Yes, race isn’t part of the data used, but factors that predict reoffending vary by race. For example, if previous convictions and propensity to reoffend are correlated, and if more black defendants have previous convictions, then an algorithm that uses previous convictions to calculate risk will rate black defendants as higher risk than white defendants. The point? If a greater proportion of black defendants are classified as high risk, and if high-risk classification is not always perfect, then a greater share of black defendants who do not reoffend will be classified as high risk. And this is despite the algorithm’s prediction accuracy being independent of race. This is far from fair, and it’s mathematically inevitable.\n\nFour lessons for people (not machines)\n\nIt’s true that algorithms can generate biased outcomes that, if left unchecked, can amplify over time. But they do the job they’ve been designed to do. If we crave objectivity and consistency, let’s put the onus back on people to improve the design, use and audit of algorithms.\n\n1. Use algorithms as one part of the decision-making process\n\nStanislav Petrov, who passed away last May, was a lieutenant colonel in the Soviet Union's Air Defense Forces, and to some he’s known as the man who saved the world. On 26 September 1983, an algorithm using satellite data told Petrov that the US had launched five nuclear-armed intercontinental ballistic missiles. In one interview, he said, “The siren howled, but I just sat there for a few seconds, staring at the big, back-lit, red screen with the word 'launch' on it.” His gut feeling at the time was that something wasn’t right; if he was to expect all-out nuclear war, why were so few missiles being launched? He went against protocol and didn’t press the “button”. It turned out that there had been a computer malfunction and by not escalating the alarm he avoided a disastrous nuclear war.\n\nThe missile-detection system was surely helpful to the Soviet (and NATO) military. But as Petrov helped design it, he knew the limitations. With great consideration, he decided to rely on his own judgement more than the information gleaned from an intelligent computer.\n\nBeyond missile defence systems, it’s important to recognise that algorithms can make mistakes. Whenever we design decision tools that use algorithms, we have the responsibility to create processes that empower people to still apply their judgement and common sense.\n\n2. Educate users on the limitations of algorithms\n\nAs Petrov’s example shows, algorithms are not a silver bullet (or silver missile for that matter). Calculations are based on the average; they offer probability, not certainty. While Petrov understood this, it’s not clear that most algorithm users – programmers, business leaders, policymakers – do. Certainly, more can be done to educate people on the responsible and effective use of algorithms through formal education and on-the-job training.\n\nMoreover, algorithmic recommendations must be presented in such a way that makes the limitations lucid. For example, one of COMPAS’ inadequacies is that it rates defendants on a 1–10 scale. If instead the results were presented as a percentage it would reflect probability, chances and odds rather than a fait accompli. What’s more, being scored 10 out of 10 suggests that a person is 10 times more likely to reoffend than someone receiving the best possible score of 1 out of 10. This is not the case. There is a greater probability, but it’s actually only 3.8 times higher.\n\n3. Prepare for the audit of algorithms\n\nIn the way that manufacturing and service firms expect auditors to come knocking, so too should firms producing and deploying algorithms. In 2015 in the US, the Federal Trade Commission, which protects American consumers, created the Office of Technology Research and Investigation. The initiative was launched to help ensure that customers enjoy the benefits of technological progress without suffering from the risk of unfair practices. As a trusted information source, the office conducts independent studies, evaluates new marketing practices and provides guidance to consumers, businesses and policymakers.\n\n4. Protect your customers and employees by offering the right of human review\n\nA new, stricter European data act is coming into force in May 2018: the General Data Protection Regulation (GDPR). It will build on the existing data protection regulation act and force firms to better handle data. One job of the GDPR is to safeguard people against the risk that a potentially damaging decision is taken without human intervention. So, for instance, if you’re rejected for a loan because your online application was declined automatically by an algorithm, you have the right for human review. The credit provider must then go through manual underwriting processes and check the original decision.\n\nThis signals a seismic shift and it’s a topic receiving attention worldwide, such as from German chancellor Angela Merkel who calls for “less secrecy” and more “informed citizens”.\n\nThe bigger picture\n\nLet’s rewind to Loomis, who pleaded guilty to fleeing from an officer in 2013. After Loomis appealed his sentence, the case was referred to the Wisconsin Supreme Court. The attorney general’s office defended the use of COMPAS. In July 2016 the Wisconsin Supreme Court ruled that the algorithm can be used as one component of the decision-making process to aid sentencing decisions.\n\nThe court challenged the judges to understand COMPAS’s limitations to prevent misuse of the system; knowing what your algorithm can tell you is as important as knowing what it can’t. Petrov, whose actions avoided World War III, taught us the same: despite the algorithm’s big flashing press-me button, he didn’t. Petrov made the ultimate judgement call. The challenge for everyone affected by algorithms now is to ensure that we push the debate – the lessons, the limitations, the opportunities – on algorithmic ethics forward.\n\nSo when should we rely on algorithms? When mistakes can be observed and feedback is reliable, fast and actionable.\n\nWhen should we rely on algorithms?\n\nA feedback loop is a powerful mechanism that allows developers to continuously improve the design of decision-making algorithms. Take self-driving cars. When a self-driving car makes a mistake and causes an accident or violates a traffic law, the algorithm designers know about it. With that knowledge, they can scrutinise the sequence of events that led to the error – lane position, road conditions, acceleration – and can redesign the algorithm to avoid repeating the same mistake in the future. Arguably, sentencing convicted criminals is not an exercise privy to such feedback loops. There’s a long time lag between making a decision (sentencing a convicted criminal) and discovering whether the outcome was correct (whether or not they reoffended), especially if the sentence is lengthy.\n\nSo when should we rely on algorithms? When mistakes can be observed and feedback is reliable, fast and actionable. For everything else? Circle back to the tenets in this piece: use the algorithm as one part of the decision-making process, understand the algorithm’s limitations and present algorithmic output in a way that reflects these limitations, be prepared to audit and promote the right for human review. Place value on human judgement and a test-and-learn approach.\n\nDisrupt the disruptors with our new programme. Explore how to not only defend against but also exploit the dramatic changes triggered by the digital revolution and the arrival of radical new technologies and business models.\n\nComments 3\n\naprin 1 years, 10 months and 23 days ago\n\n(another time) I was writing: the scores are not ordered by reoffending rate, or even it is not possible that all reoffending rates are higher than in 'the general public'\n\naprin 1 years, 10 months and 23 days ago\n\nSorry, my keyboard worked without my permission.\n\naprin 1 years, 10 months and 23 days ago\n", "pred_label": "__label__1", "pred_score_pos": 0.9356680512428284} {"content": "Guest Column\n\nCurrently, most vessels in the maritime sector are still using fossil fuels as their main source of fuel and are thus emitting large amounts of greenhouse gasses (GHG).\n\nHowever, in order to try and avoid – or at least mitigate – the consequences of climate change the maritime sector has decided to reduce their GHG emissions and eventually become emission free. The main driver for this change is the sharpening of the legislations around the emission of GHG and other harmful gasses. The driver however, is not important because becoming emission free is not a choice, it is a must.\n\nAs a sustainability researcher at Royal IHC, my job is to explore the possibilities to reduce the emissions of IHC’s operations. A few topics that are currently investigated are the use of alternative clean fuels, improving the efficiency of the current drive trains, reducing under water noise and examining the effects that IHC’s actions have on local ecosystems, designing and testing entirely new ship concepts and improving the efficiency of dredging. Working together with TU Delft, TNO and other research institutes, new ideas, concepts and innovations arise quickly and a sustainable maritime sector will be achieved sooner than expected.\n\nMy personal view on the topic of becoming emission free is clear: it is not a choice, it is a must. One, very obvious, reason is that the resources (oil, gas and coal) do not replenish as fast as we consume them. They will eventually run out. However, my main reason for having this vision is that all life should be respected. This not only includes humans but animals and their habitats as well.\n\nThe harm we are doing to others by amongst others emitting greenhouse gasses is greater than we can imagine. Therefore, not only the maritime sector has to become emission free but every other sector as well. In my personal life I’m doing the best I can to contribute to a sustainable future and I am grateful for the opportunity IHC’s has given me to be able to make a contribution in my professional career as well.\n\nJochem Versendaal\n\nSustainability Reseacher, Royal IHC", "pred_label": "__label__1", "pred_score_pos": 0.9573824405670166} {"content": "Efficient quantum computation in a network with probabilistic gates and logical encoding\n\nPublikation: Bidrag til tidsskriftTidsskriftartikelForskningfagfællebedømt\n\nJ. Borregaard, A. S. Sørensen, J. I. Cirac, M. D. Lukin\n\nAn approach to efficient quantum computation with probabilistic gates is proposed and analyzed in both a local and nonlocal setting. It combines heralded gates previously studied for atom or atomlike qubits with logical encoding from linear optical quantum computation in order to perform high-fidelity quantum gates across a quantum network. The error-detecting properties of the heralded operations ensure high fidelity while the encoding makes it possible to correct for failed attempts such that deterministic and high-quality gates can be achieved. Importantly, this is robust to photon loss, which is typically the main obstacle to photonic-based quantum information processing. Overall this approach opens a path toward quantum networks with atomic nodes and photonic links.\n\nTidsskriftPhysical Review A\nUdgave nummer4\nStatusUdgivet - 11 apr. 2017\n\n\nID: 176851396", "pred_label": "__label__1", "pred_score_pos": 0.9946627020835876} {"content": "Researchers evaluate influence of gut microbes on function of immune cells\n\nNew research suggests that gut microorganisms do not merely influence immune cell function, but also support the production of immune cells that form the first line of defense against infection. By understanding the mechanisms responsible for maintaining and replacing immune cells, researchers hope to one day develop targeted therapies to support and boost immune function in humans.\n\nStudy investigators from the Regenerative Medicine Institute at Cedars-Sinai collaborated with the Mount Sinai School of Medicine and lead institution - the California Institute of Technology.\n\nPrevious research studies have evaluated the influence of gut microbes on the function of immune cells, but little had been known about their influence on the production of immune cells, a process known as hematopoiesis.\n\nIn this study, published in the journal Cell Host & Microbe, investigators found that mice lacking gut microbes were defective in immune cell production. Immune cell populations have to be maintained and replaced to ensure enough immune cells are available to fight infection. Consequently, the investigators noted that mice lacking gut microbes were more susceptible to bacterial infections.\n\n\"This work provides important clues about the role of gut microbes in supporting a healthy immune system that is capable of providing efficient protection from infection,\" said Helen Goodridge, PhD, collaborating author, assistant professor in the Department of Biomedical Sciences and a research scientist in the Regenerative Medicine Institute. \"We now have a clearer understanding of how gut microbes influence immune cell production, which has implications for immune defense against infection.\"\n\nFindings also suggest that antibiotics may have unwanted effects on the immune system by depleting gut microbes and thereby compromising immune cell production, which could make a patient more susceptible to subsequent infections. However, the data also indicate that it might be possible to prevent this effect, at least partially, by delivering microbial components along with the antibiotics to stimulate immune cell production.\n\n\"As we found true in mouse models, we also believe that depletion of gut microorganisms in humans could lead to a suppressed immune system and a higher risk of acquiring a broad range of infections and diseases,\" said Alberto Y--ez, PhD, collaborating author on the study and a postdoctoral scientist in the Goodridge Laboratory. \"Gut microbes play very important roles in maintaining human health and this study further highlights the risks associated with the overuse of antibiotics that indiscriminately target helpful, as well as harmful, bacteria.\"\n\nThe rise of antibiotic-resistant superbugs, paired with a dwindling supply of effective antimicrobial drugs, has increased the threat of infectious disease and created a healthcare crisis. If these findings are validated in humans, researchers may herald future medical approaches to address the re-emerging crisis of infectious diseases.\n\n\nPost a new comment\nYou might also like... ×\nNew AI-driven approach for single blood cell classification", "pred_label": "__label__1", "pred_score_pos": 0.9423307180404663} {"content": "Zero-Downtime Applications With Kubernetes\n\nMar 07, 2019\n\nThe software world moves faster than ever. In order to stay competitive, new software versions need to be rolled out as soon as possible, without disrupting active users. Many enterprises have moved their workloads to Kubernetes, which has been built with production-readiness in mind. However, in order to achieve real zero-downtime with Kubernetes, without breaking or loosing a single in-flight request, we need to take a few more steps.", "pred_label": "__label__1", "pred_score_pos": 0.7084454298019409} {"content": "Individuals & families\n\nHow much does it cost to contest a will?\n\nIt is well known that any litigation is expensive and contesting a will is no different. If anything, inheritance claims can be more expensive than other forms of litigation due to the nature of the claim and the amount of work and investigation involved. It is often misconceived that costs in inheritance disputes automatically come out of the estate. This is not necessarily true as in the first instance the general rule is that the unsuccessful party will pay the costs of the successful party.\n\nInheritance disputes: left out of a will?\n\nIf you believe that you have unreasonably been left out of a will, you may be able to apply for reasonable financial provision from the deceased estate pursuant to the Inheritance (Provision for Family Independence) Act 1975. The Inheritance Act essentially details several hurdles in which a person needs to overcome, in order to obtain reasonable financial provision from the deceased’s estate.\n\nHow to start contesting a will\n\nIf you think you have grounds to dispute a will then it is important to act fast, preferably before a grant of probate is obtained. If you are disputing the validity of a will, you can lodge a caveat which will prevent any grant of probate from issuing. Before issuing proceedings in the High Court and incurring substantial costs, you should consider various other options. Legal action can slow down the receipt of any inheritance and can be costly for all parties involved.\n\nInheritance disputes involving adult children - updated case law\n\nHistorically claims by able-bodied adult children (against their parents’ estate) capable of earning their own living have been discouraged by the court. The case of Re Coventry established that it was not sufficient to argue that a child of a deceased was in difficult financial circumstances, the deceased had property which could assist that child and therefore it was unreasonable that provision had not been made to them. Given the established thinking, a recent decision of the Court of Appeal is surprising.\n\nRemoving and substituting executors\n\nThe executor of a will is the person specifically appointed or chosen by the testator (deceased) to administer his estate and to ensure his final wishes are respected. In effect, the executor speaks for the deceased in the settlement of his estate and carries out the instructions set out in the will. The role of an executor is an important one and it is advisable and sensible for a testator to seek the agreement of the executor before the appointment is made.\n\nRectification of wills\n\nContentious probate solicitors are often faced with disappointed beneficiaries who comment after seeing a will of a loved one that “those cannot be the wishes of the deceased”. A disappointed beneficiary may struggle to challenge a will if it has been made in accordance with the deceased's wishes. However, if a will doesn't reflect the deceased's true intentions, due to the act of a solicitor who drafted the will, it may be possible to bring a claim for rectification and/or a professional negligence claim.\n\nFilter by article type", "pred_label": "__label__1", "pred_score_pos": 0.8766998648643494} {"content": "Ne - in certain classes of criminals reform may certainly be brought about. In certain of the cases, and in most of these a process indicaciones existed, not only was no motion demonstrable, but in all probability as the result of the disease the bones had become fused.\n\nThe teeth were exposed to a current of air of a much lower temperature than that of the body, which would tend to cause in flammation of the periosteum and pulp of a tooth; the cold dry air produced congestion of the \"colombia\" mucous membrane, with a secretion of stringy acid mucus; and the rapid evaporation of water which takes place when the mouth is constantly open inspissated this mucus, which so formed a fertile soil for the when sleeping with the mouth open, the tongue falls back and the parotid secretion finds its way directly through the pharynx instead of bathing and washing the teeth. Experience with these and other cases has served to convince me that this elaborate technique is unnecessary (nitrofural). Valves may be arranged when, soluble as sometimes happens, the cold air is liable to descend through these tubes. Tissue which is now called bothrenchyma or pitted tissue: queimadura. Most were accompanied by profuse perspiration and indefinite rigors, while nausea and vomiting is noted so often as to be Fixed lumbar quemaduras pain was present between the attacks in the cases presenting typical renal of the lumbar pain varied from an indefinite ache to a dull gnawing pain of marked degree.\n\n\nThe first of the series came under treatment horses five years ago. Functional Nervous Disturbances Cured by the CLINICAL PROFESSOR OF DISEASES OF CHILDREN, HOSPITAL OF THE UNIVERSITY OF PA; ATTENDING PHYSICIAN TO THE CHILDREN'S HOSPITAL, ETC (es). PSEUDO ASCITES AS THE RESULT OF serve CHRONIC cases showing clinically the classical signs of free fluid in the peritoneal cavity, while at operation or autopsy a perfectly normal peritoneum was found with no sign of the anticipated exudate. Rogers was also prominent in religious work, and personally supported a missionary in dogs India. He made an exploratory puncture to ascertain whether the dulness present was caused by a collection of fluid; and, failing to obtain any fluid, he made a second attempt with a larger needle and succeeded in removing bits of tissue for composed of round cells. Skull undergo much develoiiment and modification, and have received special names (creme). Aloes acts well in obesily by depleting para the.system and engorging the i)elvic circulation. This is caused by the proteus vulgaris Hauser, by the bacillus \"nitrofurazone\" von Bleisch, by the bacillus and micrococcus liquefaciens lactis araari Freudenreich, and by bacteria described by Hueppe, FlUgge, and von Stirling.\n\nFrom the time when this system was discovered and worked out, in the adult it has been known that it is an appendage of the venous system (dressing). As the iliac que glands are also absent, vessels may pass from the foot (i.e., those quite sharply defined areas of origin, and from these the vessels extend in opposite directions.\n\nWhen the laity have come in many instances to recognize this disease, does it not seem a sad commentary on our profession that so many of our members fail merhem to recognize it, and having recognized it fail to treat it properly? OCCUPATIONS OF PATIENTS WITH SCABIES. En - it is analogous to the wellknown bleaching powder, chloride of Ume. Myxoma, osteoma, enchondroma, chondro-angioma, Hpochondro-angioma, mucous adenoma, and colloid adenoma, most of them being represented by only one, or, ointment at the most, two cases. Although important chemical changes occur in \"crema\" these substances in their passage through the columnar cells of the mtestmal wall further changes of both a qualitative and a quantitative character are required before the portal can be allowed to mix with the systemic blood, and these final chemical transformations have their seat in the liver eel s. , A name given by Swediaur to Pramboesia, ar IHY MUS (eOnos; a kind of onion; a small blister on the flesh J: la. Tules are never penetrated by sirve hairs. The otoscopic examination of the right ear revealed a cicatrix in the inferior posterior quadrant of pomada the membrane; the external canal of the left ear contained pus, and there was a round, medium-sized and liver.", "pred_label": "__label__1", "pred_score_pos": 0.5958923697471619} {"content": "The way to Learn Chinese Characters Simply and Efficiently\n\nChinese language is an unfamiliar territory for many whose first language use an alphabetic system such as English. Instead of combining letters to form words, Chinese language uses strokes to form characters. The commonly used Chinese characters alone contain 3000 keywords and phrases. Not only that, Chinese is also a tonal language with four different tones, commonly marked with accent marks, proper unmarked represents the neutral tone. The accent marks are only available when using PinYin to represent the pronunciation. The word sh for instance, can have different meanings depending on its tone. The first tone sh can mean poetry or wet or teacher. The second tone sh can mean ten or time or genuine. The third tone sh can mean history or to start or to cause. Lastly tone sh can mean yes or room or matter. In essence, there are many similar sounds with different meanings. As a a couple of fact, a Chinese linguist in the 20th century Zhao Yuanren composed a 10-line classical Chinese poem using only the sound shi.\n\nNext, it isn’t always possible to guess the pronunciation of a characteristics. The character for wood, for instance, is pronounced mu. The character for forest, could be composed of two-character for wood, is pronounced lin. Although in this example the pronunciation isn’t related, the concise explaination the characters are able to. On the contrary, when the pronunciation can be related due to similar root character, the meanings are not necessarily related.\n\nPinYin itself, although alphabetized, is not pronounced the same manner as the alphabetic sounds. There are unfamiliar sounds for example u with an umlaut () that sounds like a program of I and u. Like every item and fixture unfamiliar, it might lead to uncertainty and issue. Thus, knowing the challenges learners face is the actual step in devising effective learning strategies that directly affect their language achievement.\n\nThe Strategies Usually Learn Chinese Characters\n\nProf Ko-Yin Sung of Chinese Language Study from Utah Expenses hikes conducted a groundwork amongst non-heritage, non-Asian Chinese language learners and uncovered interesting results which could help future learners in forming a highly effective study plan. Her study revolves concerning the most used often Chinese character learning strategies and how to say hello in chinese those strategies affect the learners’ ability in understanding and producing the sound and the writing in the Chinese emails.\n\nThe study finds that among very best twenty most frequently used strategies, eight regarding are springing out of when a personality is first introduced to learners. These include:\n\n1. Repeating the character several times aloud or silently.\n\n2. Writing the character down.\n\n3. Noting how the type is in context.\n\n4. Noting the tone and associating it with pinyin.\n\n5. Observing the character and stroke order.\n\n6. Visualising the letter.\n\n7. Listening to the explanation of the type.\n\n8. Associating the character with previously learned identity.\n\nThe next six strategies are familiar with increase learners’ understanding belonging to the newly introduced character.\n\n9. Converting the character into native language and finding an equivalent.\n\n10. Looking in the textbook or dictionary.\n\n11. Checking if the new character already been used above.\n\n12. Finding out how they are used in conversation.\n\n13. While using character in sentences orally.\n\n14. Asking how the type could provide in sentences.\n\nHowever, learning strategies come to diminish beyond those two learning concentrations. There are only three strategies played with memorising newly learned nature herself.\n\n15. Saying and writing the character at once.\n\n16. Saying and picturing the character in mind.\n\n17. Given the sound, visualising the character shape and meaning.\n\nAnd nevertheless only one strategy utilized for practising new characters.\n\n18. Making sentences and writing them out.\n\nAnd new characters are reviewed overall performance two strategies only.\n\n19. Writing the characters many years.\n\n20. Reading over notes, example sentences and the textbook.\n\nOf the twenty strategies mentioned above, four are simply to be most significant in increasing learner’s skills of speaking, listening, reading, and writing of the characters. The four strategies are:\n\nWriting the characters down\n\nObserving the stroke order\n\nMaking connection to a similar character\n\nSaying and writing the smoothness repeatedly\n\n\nA research by Stice in 1987 showed that students only retained 10% of back as they learned from what they read, 26% from the things they hear, and 30% from what they see. When studying modes are combined, newer and interesting . improvement in learning retention is noted. Learning retention jumped to 50% when seeing and hearing are combined, and even higher at 70% when students say the materials yet learning, and learning retention is at the highest at 90% when students the materials usually are learning as they do a single. Simply reading the characters aren’t enough. Learners must associate the sound with the characters, make a connection with the characters to create them memorable, and practice recalling the newly learned characters.\n\nStudy means that recalling new characters learned improves learning retention and reinforces getting to grips with. One way work with this will be by using an app for instance The Intelligent Flashcards. This specific unit flashcard app is suited for the New Practical Chinese Reader textbooks, making it convenient to review characters based on chapters. Not only does it show stroke order animation, it is also accompanied by native speaker sound files, making this app so significantly more convenient that another app with regard to Anki. With Anki, although user will add personal notes on it, the sound file is not available and must be imported through another app.\n\nAnother important learning method to incorporate is observing how a characters are used in perspective. This can be practiced by observing real-life conversations to add to the textbook and audio tracks conversation. The time interesting to make note of that university students studied the particular abovementioned research were reluctant to adopt the educational strategies recommended by the instructors, because watching Chinese TV shows or listening Chinese movies. There could be many causes this. The design and style of the shows or songs can not appeal to your learners.\n\nTo be able to this program is not only convenient. Also if the shows could possibly be accessed online, rarely draught beer subtitled in a choice of both Chinese and English which will make the shows more useful to beginner learners in acquiring the language. Also, most of this very popular Chinese Tv programs fall into the historical genre, which is often a favourite one of several Chinese, such as The Empress of China’s websites. However, the language spoken in this particular type of TV show is a bit more complex than the contemporary spoken Chinese.", "pred_label": "__label__1", "pred_score_pos": 0.8180795907974243} {"content": "Browsed by\nCategory: Deep Breathing\n\nThe Most Dangerous Jobs: A Chiropractic Perspective\n\nThe Most Dangerous Jobs: A Chiropractic Perspective\n\nIt’s no secret that some jobs are just more physically demanding and more dangerous than others. Some of the most challenging ones are obvious—combat roles in the military, fire and rescue, heavy construction and deep sea fishing are just a few that come to mind. However, when it comes to non-fatal musculoskeletal injuries, the statistics tell a very different story about occupational health and safety and about who’s most likely to get hurt on the job.\n\nBecause chiropractic physicians are experts in treating conditions that involve the musculoskeletal and nervous systems (including many common workplace injuries), we have a unique perspective on why they happen, how they can  be prevented and the best ways to treat them.\n\nMusculoskeletal Disorders by the Numbers\n\nLet’s start with a long-term trend that’s good news for the nation’s workers but that doesn’t get much media attention. The number of reportable occupational injuries and illnesses has declined steadily across the past decade from 50 cases per 1,000 full-time workers in 2003 to 33 cases in 2013. So progress is clearly being made, even if it doesn’t grab the headlines.\n\nThat said, musculoskeletal injuries continue to be among the most common on-the-job injuries, and they can require significant recuperation time. The Bureau of Labor Statistics (BLS) says that musculoskeletal disorders (MSD) “are injuries or illnesses affecting the connective tissues of the body such as muscles, nerves, tendons, joints, cartilage, or spinal disks.”\n\nA very high percentage—about one-third—of 2013 workplace injury and illness cases that required days off from work involved the musculoskeletal system.  Plus, workers who sustained musculoskeletal injuries required more time to recover before returning to work—a median of 11 days to recuperate compared with 8 days for all types of workplace injury and illness cases. In 2011:\n\n • The back was the primary site of MSD injuries in 42% of all cases across all occupations, requiring a median time off of 7 days to recuperate.\n • Although it accounts for only 13% of all MSDs, the shoulder was the area with the most severe injuries, requiring a median of 21 days off of work to recuperate.\n • Injuries and illnesses due to repetitive motion involving “micro-tasks” (such as typing) accounted for only 3% of all occupational injury and illness cases. However, those workers with this kind of injury required nearly 3 times as many days away from work to recover as those with all other types of injuries and illnesses—a median of 23 days.\n\n\nAs we mentioned earlier, though, MSDs are not distributed evenly across all industries and occupations.\n\n • In 2013, the highest MSD incident rates were found in transportation and warehousing (80.3 cases per 10,000 full-time workers), healthcare and social assistance (50.2 cases per 10,000 full-time workers), arts, entertainment and recreation (46.5 cases per 10,000 full-time workers) and construction (41.9 cases per 10,000 full-time workers).\n • In 2011, six occupations accounted for 26% of all MSD cases: nursing assistants, laborers, janitors and cleaners, heavy and tractor-trailer truck drivers, registered nurses and stock clerks.\n • In 2011, those with the greatest number of median days spent off from work in order to recuperate from an MSD were heavy and tractor-trailer truck drivers (21 days).\n\nSo it’s clear from the numbers that the dangerous jobs featured on reality TV shows (think about Deadliest Catch and Ice Road Truckers) aren’t necessarily the ones that result in the most MSD-related visits to the chiropractor or general practitioner.\n\nThe Role of Chiropractic Care in Prevention and Treatment\n\nOver the past several years, companies of all sizes have become increasingly interested in occupational health and wellness programs. Chiropractic physicians have a special interest in working with employees and business managers alike to help prevent job-related injuries and to encourage a healthy, productive work environment. If you’d like to learn more, we encourage you to call or visit our office today.\n\nChiropractic care can be one of the most effective ways to treat musculoskeletal pain and accelerate recovery.  Dr. Oblander has the training and experience necessary to successfully diagnose and treat a wide range of workplace injuries, and he’ll be happy to answer any questions you may have! So if you or someone you care about has recently been hurt on the job, please give us a call at 406-652-3553 or stop by either of our Billings chiropractic offices. We have an office located at 3307 Grand Avenue and an office at 410 Wicks Lane in the Heights  and we’re here to help!\n\n\n\n\nWhat Causes Muscle Tension?\n\nWhat Causes Muscle Tension?\n\n\nMuscle tension occurs when a muscle (or group of muscles) remains contracted for an extended period of time. This might be characterized as a low-energy or low-intensity muscle cramp. Such tension in the muscles constricts blood flow, which in turn keeps oxygen and nutrients from reaching the muscle tissues and tendons. Muscle tension also keeps cellular waste from being carried away. The result is more muscle tension, spasms and damage. Why does this happen? There are actually several possible causes.\n\nOne key source of muscle tension is stress or anxiety. For our ancient ancestors, stress was a simple fact of everyday life, and their ability to response effectively to imminent threats (predators, hostile neighbors, natural disasters, etc.) was an integral part of their survival. As a result, their bodies evolved a set of short-term physiological changes that helped them to meet sudden life-and-death challenges by increasing their alertness, strength, speed and stamina. Today, we refer to these changes collectively as the “fight-or-flight” response, and they’re part of our evolutionary inheritance.\n\nUnfortunately, there is now a kind of mismatch between the kinds of modern threats (real or perceived) that most of us encounter in our day-to-day lives and our bodies’ primitive fight-or-flight response. Instead of short-term physical dangers, modern stress is much more likely to come from social or financial pressures that are (usually) lower-intensity but more prolonged. Mounting bills, insane work deadlines and relationship problems are all great examples. This is a problem because our fight-or-flight response was really designed to be “switched on” only for very short periods of time—essentially, just as long as it took us to either defend ourselves or escape from a physical attack. It turns out that the human body pays a high price for the fight-or-flight response, and this price is especially high when the response is activated continuously over long periods of time, even at relatively low levels. Chronic muscle tension is just one potential result.\n\nMuscle tension can also be the result of underlying structural problems or injuries affecting the musculoskeletal system, especially in the back or neck. When the spine is misaligned or there is an injury, the body may compensate by activating other muscles or muscle groups to stabilize the area and prevent pain. These muscles are put under additional strain for which they were not designed, leading to chronic muscle tension.\n\nChronic muscle tension itself can lead to new kinds of discomfort and pain. The pain can lead to an increase in anxiety and more muscle tension. This becomes a vicious cycle—an unhealthy, downward spiral. Luckily, there are a number of different ways to relieve muscle tension.\n\nOne of the best ways to relax your muscles is to exercise. This may seem counterintuitive at first, but muscle use increases blood flow and, accordingly, reduces the tension caused directly from lack of such blood flow. Exercise also produces endorphins which help to relieve stress and anxiety.\n\nHeat is another method of relief. It can help by opening up blood vessels and relaxing the tense muscles. Use care when applying a hot pack. With heat, you can do too much of a good thing. Use a cloth between the pack and the skin so the heat remains measured and soothing. If you use an electrical heating pad, do not lie on the pad, but lay the pad on the tense muscles.\n\nWater therapy can also help reduce muscle tension. Floating in a swimming pool or on a waterbed can prove to be extremely therapeutic because of the relaxing nature of wave action on the body.\n\nOf course, a massage therapist is an expert at helping muscles relax. A truly good therapist can adapt his or her technique to your specific situation and will be skilled at gradually building up the intensity of the massage so that you’ll receive all the therapeutic benefit without losing the relaxation benefit.\n\nRemember—it’s important to understand the underlying cause of chronic muscle tension so that it can be addressed in an effective way. Your chiropractor is specially trained to determine if the underlying cause is structural. If it is, he or she may be able to perform adjustments to correct the problem. Depending on your specific situation, your chiropractor may also recommend a treatment plan that includes several of the therapies mentioned above in order to relieve your pain and restore your mobility as quickly as possible.\n\nFitness Around the World\n\nFitness Around the World\n\nwomen doing fist pushups\nwomen doing fist pushups\n\nPeople in the US who are interested in staying in shape tend to favor running or working out at the gym to maintain fitness. But how do people in other parts of the world stay fit? And what might Americans learn from them? Following is a summary of how people in some other countries keep in shape.\n\nThe Netherlands and Scandinavia – The number one form of physical exercise in these countries is undoubtedly the bicycle. They use it to do everything from getting to and from work and school to shopping for groceries and cycling someone home from a date. There are dedicated bike lanes in every city, and many that stretch from one side of the country to the other. From small children to the elderly, everyone cycles as a matter of course, and their overall fitness shows how beneficial it is to their health.\n\nChina – You may have seen people in public parks around any major city (or any community with Chinese immigrants) performing a series slow, precise movements. Tai Chi is an ancient Chinese form of martial arts that is good for conditioning not only the body, but the mind as well. It is especially good for seniors, as it improves balance and overall mobility, increases strength in the legs and reduces stress.\n\nIndia – Most people are surprised to learn that the physical practice of yoga as we know it is not actually ancient. Yoga in India was traditionally a mental and spiritual practice that incorporated special breathing techniques while in a sitting or standing posture. The type of exercise that comes to mind when we think of the word “yoga” (incorporating different postures called asanas, in combination with measured breathing) was not developed in India until the early 20th century. Nevertheless, yoga is now practiced very widely in India and all over the world as a way to promote overall mind-body fitness. It strengthens and stretches the muscles, increases flexibility and reduces stress.\n\nJapan ­– Radio Taiso is a program of simple calisthenics set to music that is broadcast several times a day and is used by schools and many companies to help keep people fit. There are three official versions. One is a general fitness program for people of all ages, one is specifically designed to increase physical strength, and one is geared toward the elderly and disabled, who can perform the exercises while sitting down.\n\nBrazil – An energetic form of dance that is taking off elsewhere in the world as well, Capoeira is a combination of dance, martial arts, acrobatics and music. It improves balance, coordination and rhythm while strengthening all the muscle groups. It will also improve your reflexes and help increase concentration.\n\nMiddle East – Belly dancing was originally developed as an exercise to aid women in childbirth. But belly dancing has many additional advantages. It particularly targets the “core” muscles, which are the ones responsible for keeping us upright and which have all too often become weakened by sitting for long hours at a desk. By strengthening your core muscles, you reduce your risk of suffering a back injury or chronic lower back pain.\n\nSeven Deadly Health Sins\n\nSeven Deadly Health Sins\n\njolly-roger-200-300Behind many of the debates about healthcare in the US—its availability and cost as well as its effectiveness—is an important phenomenon. The demands being placed on healthcare providers are growing and changing (at least in large part) because of the way we live our lives.  Day-to-day choices we all make are contributing to a wide variety chronic health conditions that are sometimes referred to as “lifestyle diseases.” And while our healthcare system is very good at treating acute medical problems, it is not very good at preventing or treating chronic ones.\n\nIn many cases, it’s fair to say that the health we get in the future is a result of the lifestyle decisions we make in the present. With this idea in mind, it’s also fair to ask whether it makes good sense to ask our healthcare system to single-handedly save us from the effects of our own unhealthy habits. This is why, as chiropractic physicians, we work closely with our patients to help them be more active in their own health by taking more responsibility for their own lifestyle choices.\n\nSo which lifestyle choices are causing the most trouble? While we could obviously point out harmful behaviors like smoking, drinking too much alcohol or using harmful drugs, the behaviors that really need more attention from most people are much more fundamental. We call these the “Seven Deadly Health Sins” that compromise longevity and quality of life.\n\nSitting Too Much. According to the Mayo Clinic, those who have a sedentary lifestyle are in danger of things like “obesity and metabolic syndrome — a cluster of conditions that includes increased blood pressure, high blood sugar, excess body fat around the waist and abnormal cholesterol levels.” A recent study showed that those who spend a large amount of time in front of a television or other forms of screen entertainment had a roughly 50% greater risk of death from any source.\n\nEating Too Much Fat, Sugar and Salt. The typical American diet not only contains too many calories, it’s also too high in fat, salt and sugar. In excess, these ingredients (all too common in processed foods) trigger a wide range of complex, self-inflicted health problems.\n\nSleeping Too Little. According to a recent poll by the National Sleep Foundation, a combination of daily stress and lifestyle choices (including nighttime activities as well as eating and exercise habits) is causing more than a third of the U.S. population to get fewer hours of sleep than they need.\n\nDrinking Too Little Water. Most of us would be much better off if we drank lots more water and fewer sugary drinks. While there’s no real evidence that Americans are chronically dehydrated (despite all the hard work of bottled water companies), there is plenty of evidence that the things we are drinking aren’t particularly good for us from a nutritional point of view.\n\nMismanaging Stress. Our relationship with stress is a complicated one. The simple truth is that stress itself isn’t inherently positive or negative for our health. The thing we actually have to pay attention to is how we respond to it. While the physiological stress response we’ve inherited through evolution is designed to help us confront immediate physical dangers, most of today’s threats aren’t immediate or physical. The result of this mismatch is that our “fight or flight” response may stay switched on for much longer periods than nature intended. This in turn can cause a variety of health problems. Since stress is an inevitable part of modern life, it’s important for us to embrace the positive view of stress that helps us grow and develop while also learning how to turn off the harmful effects.\n\nIgnoring Posture Problems. The way we carry ourselves while sitting or standing can have lasting implications for our musculoskeletal health. The bad news is that poor posture can reduce our strength, flexibility, and balance and—at the extreme—can cause pain and even compromise organ function. The good news is that posture problems can be corrected once they’ve been recognized. Even better, it’s possible to prevent them by developing good habits in the first place.\n\nPutting Off Preventive Healthcare. The best time to pay attention to your health is while you still have it. Unfortunately, many Americans still cling to the reactive “sickness care” model and don’t take full advantage of the expanded preventive care options that have been made available to them as a result of the Affordable Care Act (ACA). The US Department of Health and Human Services estimates the ACA made 76 million Americans “newly eligible” for free preventive care. But a Kaiser Health Tracking Poll in March 2014 revealed that only 43% of the population was aware of the change, meaning that many people are probably foregoing preventive care out of cost concerns. Remember—it’s always better to recognize and treat a health problem early before it grows worse and becomes more difficult to address!\n\nBy avoiding these Seven Deadly Health Sins, you can also avoid many chronic health conditions. If you or someone you care about has health questions or concerns, we encourage you to call or visit our office today. We’re here to help!\n\nHealth Benefits of Breathing Deeply\n\nHealth Benefits of Breathing Deeply\n\nwoman-deep-breathing-200-300“Take a deep breath.” It’s something we say to each other—and even to ourselves—when the going gets rough and we need to get our emotions under control. But it turns out that this bit of advice isn’t only useful in helping us recover our composure. When practiced on a regular basis, deep breathing can have real physical and mental health benefits.\n\nMany health researchers and clinicians recommend controlling your breath as an easy way to improve your health. The benefits of slow, deep breathing include decreasing inflammation, reducing anxiety, improving heart health, reducing pain, and boosting your immune system. In addition, people with migraines and irritable bowel syndrome may also experience benefits from deep, consistent breathing.\n\nHow does it work?\n\nDeep and slow breathing stimulates the vagus nerve. This nerve connects the brain stem with the abdomen, and it is part of the parasympathetic nervous system. This system is responsible for so-called “rest and digest” activities. For example, it causes the heart rate to decline when we exhale. The sympathetic nervous system, on the other hand, controls our “fight or flight” responses.\n\nThe vagus nerve is activated when we slow our breathing to around 5 to 7 breaths per minute (our usual pace is around 12 to 18 per minute). In addition to slowing our heart rate, the vagus nerve controls the release of various neurotransmitters, such as acetylcholine. Acetylcholine slows both our heart rate and digestion and has anti-inflammatory properties. In fact, for people with severe conditions such as epilepsy, there are devices available that can stimulate the vagus nerve.\n\nHow can we learn to breathe more deeply?\n\nDeep breathing is often taught in meditation and yoga classes. Experts say it is important to breathe in through the nose and exhale through the mouth, ensuring that the exhale is longer than the inhale. Breathing should focus on the abdomen, particularly on the inhale, rather than the chest and shoulders.\n\nTo help people become more aware of their own breathing patterns, a San Francisco startup company has developed a wearable device called Spire, which helps users track their breathing and know when to slow down and take a deep breath. The basic idea is that you don’t have to stop what you are doing in order to shift into a calmer, more healthful breathing state. This device may be particularly useful for some computer users, whose breathing seems to change significantly while they’re doing their work. At one end of the spectrum, some individuals tend to hold their breath—a condition known as “screen apnea”. At the other end of the spectrum are the rapid breathers. A small study by Neema Moraveji, co-founder of Spire and director of the Calming Technology Lab at Stanford University, showed that people working on a computer took an average of 16.7 breaths per minute, versus 9.3 breaths a minute when relaxed.\n\nHowever we choose to approach our own breathing, whether through meditation, yoga, or wearable devices, there’s growing evidence that becoming more mindful—and taking greater control—has real health benefits. So take a deep breath and get started!", "pred_label": "__label__1", "pred_score_pos": 0.8737431168556213} {"content": "comments and feedback\n\nXie Chuntao: The CPC: Why and How It Works in China?\n\nSubmit Time:18-10-2019 | Zoom In | Zoom Out\n\nAuthor:Xie Chuntao | Source:English Edition of QiuShi Journal April-June 2019|Vol.11,No.2,Issue No.39\n\n\nThe Communist Party of China was founded 98 years ago, and has now governed the country for 70 years. Over this period, the Chinese nation has made the impressive leap from standing up and becoming prosperous to growing strong, thus bringing forth the “China miracle” that has astonished the world. It is not by chance that the CPC has been able to lead the people toward such tremendous success; the Party is equipped with qualities that made certain it was up to the task.\n\n1. It has lofty ideals and aspirations.\n\nEvery political party has aspirations, but the aspirations of each party can be very different from each other. While many political parties scramble for power and profit in service to their respective groups, the CPC represents the interests of the broadest possible majority of the Chinese people.\n\nIn the century before the founding of the CPC in 1921, China was a backward and beleaguered country stuck in a state of poverty and weakness. Many people of high ideals searched tirelessly for a way out of this predicament, but none succeeded. From its founding, the CPC assumed the historic mission of saving the Chinese nation from its miserable state and bringing about its grand rejuvenation. In the 28 years that followed, the CPC led the Chinese people through bitter and bloody struggle, overturning the reactionary rule of imperialism, feudalism, and bureaucrat-capitalism and establishing the People’s Republic of China. This allowed the Chinese people to finally stand up. Socialism was later established as China’s basic system, which represented the greatest and most profound social transformation in Chinese history.\n\nSince reform and opening up which began in the late 1970s, the Chinese people have captured great achievements in national development under the leadership of the CPC. At present, China is firmly positioned as the world’s second largest economy, the Chinese people have become better-off and reached a moderately prosperous standard of living overall, and considerable advances have been made in building democracy and the rule of law. China has completed, in the space of mere decades, the process of industrialization that took developed countries several centuries, bringing about a miracle in the history of world development.\n\nThere is nothing more convincing than historical fact. Over the past century, the CPC has made enormous contributions to the country, the nation, and the people while always remaining committed to its lofty ideals and aspirations. It is clear why the Chinese people have chosen to follow the CPC. No matter how much the environment changes or how grave the challenges that lay ahead, the CPC will remain true to its original aspirations and devoted to its mission.\n\n2. It has the guidance of well-founded theories.\n\nThe development of concepts and theories is crucial for a political party. Within the party, concepts and theories are used to guide members, telling them how to take action and what the reasons are for doing so. In relation to the public, they are used to inspire the people to follow the party and pool together boundless strength in the process. The CPC attaches great importance to theoretical innovation, and is committed to using innovative theories to sharpen the minds of Party officials and unite the people.\n\nFrom the day of its founding, the CPC made Marxism its guiding ideology. With Mao Zedong as their chief representative, Chinese Communists combined the fundamental principles of Marxism-Leninism with the actual practice of the Chinese revolution and created Mao Zedong Thought, under which the New Democratic Revolution was completed, the PRC was founded, socialism was established as the country’s basic system, and much progress was achieved in socialist economic, political, and cultural development. After the Third Plenary Session of the 11th CPC Central Committee in 1978, Chinese Communists, with Deng Xiaoping as their chief representative, developed Deng Xiaoping Theory. This offered effective answers to a series of fundamental questions on building Chinese socialism, and thus successfully opened up the path of socialism with Chinese characteristics. After the Fourth Plenary Session of the 13th CPC Central Committee in 1989, Chinese Communists, with Jiang Zemin as their chief representative, developed the Theory of Three Represents, which successfully launched China’s socialism into the 21st century. After its 16th National Congress in 2002, Chinese Communists, with Hu Jintao as their chief representative, developed the Scientific Outlook on Development, thus successfully upholding and developing socialism with Chinese characteristics from a new and historic point of departure. Since its 18th National Congress in 2012, Chinese Communists, with Xi Jinping as their chief representative, have integrated theory with practice to systematically address the major questions of our times, which are what kind of Chinese socialism should be upheld and developed in the new era and how we should go about doing this, thereby giving shape to Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era and ushering in a new phase for Chinese socialism.\n\nBy contrast, one of the main reasons why communist parties in the former Eastern Bloc collapsed one after the other is that they suffered from protracted ideological stagnation. Their theories were unable to evolve in step with the times, and therefore could not guide new initiatives or even explain contemporary realities.\n\n3. It has mechanisms for selecting and appointing officials on the basis of merit and ability.\n\nThe standards and procedures used by a political party to select officials are extremely important, because these directly determine whether or not the party in question can maintain its advanced nature and purity and remain a vital and cohesive organization. The CPC has always attached great importance to making organizational improvements, particularly with regard to strengthening the ranks of Party officials, and has selected and trained cohort after cohort of highly competent leading officials.\n\nSince the day of its founding, the CPC has consistently emphasized its pioneering nature, and imposed strict requirements on admitting new Party members. In recent years, the Party has remained committed to using the recruitment process to limit the number, improve the structure, raise the quality, and exert the roles of Party members. On this basis, the education and assessment of applicants seeking Party membership has become even more rigorous in order to guarantee that members measure up to mandatory standards of quality.\n\nAs early as the revolutionary period, the CPC set out the requirements for building the ranks of Party officials, including that it shall select officials on the basis of their merits and not their origins, that it shall choose candidates based on their moral integrity and professional competence, and that it shall resolutely oppose localism and nepotism. These requirements have guaranteed that the Party has flourished and remained united. Since reform and opening up and especially since the 18th National Congress of the CPC, the Party has constantly explored ways to foster, select, and utilize officials more effectively, and relevant systems have steadily improved. General Secretary Xi Jinping stated that good officials must “hold firm convictions, be committed to serving the people, work diligently and pragmatically, have the courage to take on responsibility, and be honest and upright,” and put particular emphasis on the requirement for officials to be loyal, ethical, and responsible. The CPC has established a series of well-founded principles and a full set of systems and mechanisms for the cultivation, selection, utilization, and management of officials. These concepts, principles, and systems, such as selecting officials on the basis of merit and not origin, requiring that they are professionally competent while putting moral integrity above all else, assigning them to positions that suit them and giving them tasks that they are equipped to handle, emphasizing the development of their abilities by incrementally moving them to higher positions according to their performance and giving them the experiences of working in multiple positions, and bringing them to Party schools for training, are playing an increasingly large role in the development of the official ranks, and are receiving growing recognition from other political parties.\n\n4. It has strict discipline and rules.\n\nAs political organizations, political parties generally have their own constitutions, rules, and disciplinary codes. However, parties with rules and disciplinary codes as strict as those of the CPC are rare. The CPC has always taken this subject very seriously; it has not only established a complete disciplinary code and set of rules, but also ensured that they have been rigorously enforced.\n\nFrom very early on, the CPC put great stress on strengthening discipline within the Party. In 1927, the Fifth National Congress of the CPC made the decision to establish the Central Supervision Commission, which was responsible for supervising discipline within the Party. During the Agrarian Revolutionary War, the CPC introduced the practice of organizing the Party branch on a company basis in order to strengthen the leadership of the Party over the military, and also formulated the Three Main Rules of Discipline and the Eight Points for Attention. Starting from the Yan’an period (1935-1948), the Party’s disciplinary code was gradually enriched and refined as the CPC Central Committee drafted and implemented a whole set of rules and disciplinary standards.\n\nSince the 18th National Congress of the CPC, Xi Jinping has responded to the loose, lax, and weak enforcement of Party discipline which prevailed for a time by stressing the importance of closely integrating the ideological development and institutional governance of the CPC, and emphasizing that more rigorous discipline is key for strict and comprehensive governance of the Party. The Central Committee with Xi Jinping at the core views the strict enforcement of the Party’s political discipline and rules as being especially important in the effort to clean up the political environment of the CPC.\n\nSince the 18th National Congress, the Central Committee has drafted and revised a long list of important intraparty regulations. These regulations contain strict discipline and rules, and thus offer institutional safeguards for ensuring that the CPC remains the strong leading core of the Chinese socialist cause.\n\n5. It has the courage to reform itself.\n\nThe CPC is not only equipped with the prowess to lead social revolution, but also the courage to reform itself. This has allowed it to form the abilities and mechanisms necessary to purify, improve, and reform itself, ensuring that it can, by its own initiative, rectify any problems that arise within itself.\n\nDuring the New Democratic Revolution, Chinese Communists with Mao Zedong as their chief representative were successful in correcting various erroneous tendencies within the Party. For example, through the Yan’an Rectification Movement, they completely eliminated dogmatism and instilled the guiding principle of seeking truth from facts in the hearts of all Party members, which helped the Party grow more mature. It was also during this period that the fine practices of criticism and self-criticism took shape, practices which led the entire CPC and the Chinese people to successfully create socialism with Chinese characteristics. Chinese Communists never take a soft stance when it comes to corruption within the Party, and this is an important reflection of the CPC’s courage to reform itself. The CPC severely punished officials who were discovered to be corrupt during both the Agrarian Revolutionary War and the War of Resistance Against Japanese Aggression. The executions of Liu Qingshan and Zhang Zishan in the early days of the PRC are even more well-known examples of this. All of this goes to show that the CPC has zero tolerance for corruption.\n\nSince the 18th National Congress of the CPC, the CPC Central Committee with Xi Jinping at the core has built a deep understanding of problems that exist within the Party. Emphasizing that “it takes a good blacksmith to make good tools,” the Party has resolutely clamped down on misconduct and fought corruption with the determination to both “cage the tigers” and “swat the flies.” The experience that CPC has gained since the 18th National Congress in comprehensively governing itself with strict discipline proves that it has already pioneered a new path for successful self-governance. Just as the CPC is capable of triumphing over its rivals, it also has the ability to resolve problems that exist within itself.\n\n6. It has strong leadership abilities.\n\nThe leadership of the CPC is the most essential attribute and greatest strength of the Chinese socialist system, and the Party is the highest force of political leadership. The CPC has demonstrated its strong leadership abilities throughout the historical process of leading the people toward the rejuvenation of the Chinese nation.\n\nChina practices a system of multiparty cooperation and political consultation under the leadership of the CPC. The CPC is the governing party while other parties participate in the political process under Chinese socialism, and they consult with each other in the interest of national development and public wellbeing. The CPC is committed to acting as the overall leader and coordinator, and encourages people’s congresses, government institutions, political consultation committees, supervisory organs, judicial organs, procuratorial organs, people’s organizations, enterprises, government-affiliated institutions, and social organizations to coordinate their actions and form greater synergy under its leadership. This leadership system boasts distinct advantages in that it can ensure the centralized and unified leadership of the Party, maintain a stable political environment and consistent policies, and muster immense force for carrying out decisions once they have been made.\n\nMoreover, the CPC has exhibited its strong leadership abilities across a variety of fields. Since reform and opening up, under the leadership of the CPC, we have effectively coped with changing situations, faced down floods, overcome earthquakes, and defused crises. This is a full testament to the strength of the socialist system and the strong leadership abilities of the CPC.\n\n(Originally appeared in People’s Daily, May 8, 2019)\n\nXie Chuntao is Vice President of the School of the CPC Central Committee (Chinese Academy of Governance).\n\nRelated Articles", "pred_label": "__label__1", "pred_score_pos": 0.9585850834846497} {"content": "Download Citation on ResearchGate | Etude du couplage spin-orbite dans les metaux de transition. Application au platine | The effect of spin-orbit coupling on. Download Table | 1 -Intégrales de Slater et paramètres de couplage spin-orbite ( eV) pour Co 2+ pour les quatre configurations considérées. from publication. Spin-orbit coupling in Wien2k. Robert Laskowski [email protected] Institute of High Performance Computing. Singapore.\n\nAuthor: Akinonris Taran\nCountry: Honduras\nLanguage: English (Spanish)\nGenre: Photos\nPublished (Last): 1 July 2018\nPages: 307\nPDF File Size: 7.63 Mb\nePub File Size: 2.97 Mb\nISBN: 287-2-28973-261-2\nDownloads: 66862\nPrice: Free* [*Free Regsitration Required]\nUploader: Bagami\n\nIt allows evaluate the total, spin and orbital moments. The fine electronic structure can be directly detected by many different spectroscopic methods, including the inelastic neutron scattering INS experiments.\n\nCEF interactions and magnetic interactions resemble, somehow, Stark and Zeeman effect known from atomic physics.\n\nThis gives results that agree reasonably well with observations. An example of how the atomic spin—orbit interaction influences the band structure of a crystal is explained in the article about Rashba and Dresselhaus interactions. For the robite relativistic result, see the solutions to the Dirac equation for a hydrogen-like atom.\n\nIt is important to note at this point that B is a positive number multiplied by Lmeaning that the magnetic field is parallel to the orbital angular momentum of the particle, which is itself perpendicular to the particle’s velocity.\n\nWithin the four bands light and heavy holesthe dominant term is. For atoms, energy level split produced by the spin-orbit interaction is usually of the same order in size to the relativistic corrections to the kinetic energy and the zitterbewegung effect. This phenomenon is detectable as a splitting of spectral lineswhich can be thought of as a Zeeman effect product of two relativistic effects: The spin—orbit potential consists of two parts. For rare-earth ions the spin—orbit interactions are much stronger than the CEF interactions.\n\n\nTo find out what basis this is, we first define the total angular momentum operator. The addition of these three corrections is known as the fine structure.\n\nSimilar to the electron spin resonance ESR in which electrons can be excited with an electromagnetic wave with the energy given by the Zeeman effectin EDSR the resonance can be achieved if the frequency is related to the energy band split given by the spin-orbit coupling in solids.\n\nIn Llewellyn Thomas relativistically recomputed the doublet separation in the fine structure of the atom. The SL and J of the ground multiplet are determined by Hund’s rules. The interaction between the magnetic field created by the electron and the magnetic moment of the nucleus is a slighter correction to the energy levels known as the hyperfine structure. The case of strong cubic CEF [8] [9] for 3 d transition-metal ions interactions form group of levels e.\n\nNote that L z and S z are no longer conserved quantities. Part of a series on. The effective crystal field potential. Views Read Edit View history. Sheka, Electric-Dipole Spin-Resonances, in: Retrieved from ” https: A similar effect, due to the relationship between angular momentum and the strong nuclear forceoccurs for protons and neutrons moving inside the nucleus, leading to a shift in their energy levels in the nucleus shell model.\n\nSubstituting this in and changing the order of the cross product gives. Taking into consideration the thermal population of states, the thermal evolution of the single-ion properties of the compound is established.\n\nSpin–orbit interaction – Wikipedia\n\nThe appropriate two-band effective Hamiltonian is. Two-dimensional electron gas in an asymmetric quantum well or heterostructure will feel the Rashba interaction. The magnetic moment of the electron is. While oribte ESR the coupling is obtained via the magnetic part of the EM wave with the electron magnetic moment, the ESDR is the coupling of the electric part with the spin and motion of the electrons.\n\n\nHere we make the central field approximationthat is, that the electrostatic potential is spherically symmetric, so is only a function of radius. Elements of this basis have the five quantum numbers: This technique is based on the equivalent operator theory [10] defined as the Couplaeg widened by thermodynamic and analytical calculations defined as the supplement of the CEF theory by including thermodynamic and analytical calculations.\n\nThere was a problem providing the content you requested\n\nThe Theory of Transition Metal Ions. This section presents a relatively simple and quantitative description of the spin—orbit interaction for an electron bound to a hydrogen-like couplageeup to first order in perturbation theoryusing some semiclassical electrodynamics and non-relativistic quantum mechanics.\n\nNow we can say that. Operator methods in ligand field theory. In quantum physicsthe spin—orbit interaction also called spin—orbit effect or spin—orbit coupling is a relativistic interaction of a particle’s spin with its motion inside a potential. This mechanism has been proposed for controlling the spin of electrons in quantum dots and other mesoscopic systems.\n\nAuthor: admin", "pred_label": "__label__1", "pred_score_pos": 0.9629455804824829} {"content": "Chromosome structural aberrations giving rise to fusion o\n\nTwo of our patients were successfully treated with indomethacin for premature labor. Our study demonstrates that the prostate gland and seminal vesicles are present in patients with bladder exstrophy. In 2 cases the patients had no symptoms for over a year after the insertion of the loop. We have examined surface Ig expression on umbilical cord blood B lymphocytes by flow cytometry under conditions in which serum derived Ig are rigorously excluded. A warm environment reduced both the decrement in core temperature and the degree of ulceration. In order to investigate the potential relationship, a meta-analysis was conducted.\n\nNotwithstanding the impact of the condition of the assets on serviceability, sewer performance is usually assessed assuming the absence of in-sewer defects. We attempted to control lac Z gene expression in a rabbit corneal stromal cell (RCS) culture system with recombinant adenovirus (Ad) and the Cre/loxP system. Recent data have renewed interest in the possible nuclear localization of receptor tyrosine kinases, as well as their ligands. Induced hypothermia viagra without prescription delayed the coagulation cascade and reduced platelet function. The marginal effect of the 5-HTTLPR (A/G) genotype obtained on linear regression with disease severity is suggestive of a potential role for this locus in the disease process.\n\nWe illustrate the estimation of an optimal cutoff level for intensity-based filtration, providing the highest ratio of true to false signals. Long-term survival and health-related quality of life were checked. The surgical treatment should be based on thorough wound examination and debridement as well as fracture stabilization when required. In 1994-1995 artificial nests with attached model eggs were put into territories that were known to have been occupied by male great reed warblers, Acrocephalus arundinaceusin previous years. We present a short biography as well as a brief discussion of their major papers. An unconventional TGF beta superfamily pathway plays a crucial role in the decision between dauer diapause and reproductive growth.\n\nDiagnosis and therapy of female sex disorders in the medical practice Good reproducibility, precision, and accuracy were demonstrated when the method was applied to a film-coated pellet formulation containing an interfering drug (promethazine hydrochloride). Here we review our current understanding of Drosophila SOCS proteins, their roles in vivo, and future approaches to elucidating their functions. Falciparum malaria was most prevalent, almost equal to cases of viagra without prescription vivax and malariae malaria together.\n\nThe usefulness of the assay of beta subunit is now clear in the diagnostic and follow up of choriocarcinoma and perhaps in the screening of high risk pregnancies. Moreover, we assayed the intracellular levofloxacin and norfloxacin accumulation level in these isolates. Thus, light-regulated nucleocytoplasmic partitioning of phyA and phyB is a major step in phytochrome signaling. A review of the literature behind CPP threshold recommendations was performed. To achieve these two goals, we first introduce a set of temporal fiber bundles to explore the spatial-temporal behavior of anatomical changes in each longitudinal image sequence.\n\nResults suggest the need for HIV-specific norms, and the use of neuropsychological assessments (i.e. Dehydroepiandrosterone (DHEA) is helpful for treating vaginal symptoms. Ovarian cancer treatment presently does not reflect molecular differences in histologic subtype. Each alcohol retailer was visited twice by 17-19 year-old male and female viagra without prescription adolescents who tried to buy alcohol. The intervention was a three-stage educational and counseling program designed to become progressively more intensive at each stage. This system may afford not only a model but also an explanation for that disease.\n\nFamily studies showed an unexpected increase in plasma ALP and similar isoenzyme changes in first degree relatives. The radiation has maximum effect on the 1st stage larvae followed by 2nd stage. A total of 184 published articles were identified, covering 29 different outcome measures. The application of transcriptomic data in the authentication of beef derived from contrasting production systems. Microarray analysis confirmed CAR expression in ESFT cell lines and tumors. lycopersici produces an array of pectinolytic enzymes that may contribute to penetration and colonization of the host plant.\n\nThe activity of bone resorption stimulated viagra without prescription by 1 alpha, 25(OH)2 vitamin D3 was inhibited by the addition of catalase, an eliminating agent of H2O2. Additionally, subjects completed the GRC scale, which was used to dichotomize patients into improved or stable groups. After 2 weeks, exercise in a running wheel was started in all rats, with a running-load of 2 hours/day for 5 days/week. OIH was coinjected into the renal artery with each of the 99mTc-tracers.\n\nIn particular, depletions of hepatic GSH, NADH, NADPH and ATP coupled with significant increases in oxidized glutathione were observed in the DBA mouse. As the California epidemic of WB among IDUs continues, WB episodes are recurring. The improvements in drug misuse were generally maintained over the 18-month follow-up, and worsening alcohol misuse over time may be the greater issue. Effect of the order of generic cialis tadalafil TBI and cyclophosphamide administration on the outcome of allogeneic hematopoietic stem cell transplantation.\n\nGenomic and proteomic methods offer the possibility of revealing new potential markers, especially for diseases whose biology is complex or not well understood. This case-control study was performed to investigate a possible relationship between H. These requirements indicate why this method does not readily lend itself to the management of these lesions in infants. Si nanocrystals are formed by using KrF pulsed laser crystallization of an amorphous SiC/ultrathin amorphous Si/amorphous SiC sandwiched structure.\n\nThe papers generated by the search, and their references, were reviewed. The association between tobacco smoking and lung cancer has been noted for more than 50 years and continues to dominate the etiologic milieu of this malignant disease. Future collaborative work in melanoma/skin cancer prevention, education, and early detection holds promise as a way to decrease mortality and save lives. The mean cord blood gas values did not predict the presence or generic cialis tadalafil severity of hyaline membrane disease or intraventricular hemorrhage, but Apgar scores did. It examines its sources, metabolism, and biological effects in various population studies, in vitro, animal, and human intervention studies.\n\nBilateral renal angiomyolipoma in association with tuberous sclerosis. American Association of Hip and Knee Surgeons (AAHKS) Supplement. A defective hepatic generic cialis tadalafil fatty acid oxidation is likely to explain the frequent hypoglycemia observed in small-for-date neonates. THE POLICY OF COOPERATION WITH COUNTRIES UNDERGOING DEVELOPMENT IN PUBLIC HEALTH MATTERS\n\nTo assess the long term impact of initial management by endometrial ablation for women with dysfunctional uterine bleeding who would otherwise have had a hysterectomy. Triple-site CRT is associated with more pronounced functional improvement than standard resynchronization. The Pasteurella multocida toxin (PMT) is highly mitogenic and has potential carcinogenic properties. Stereotactic versus endoscopic surgery in periventricular lesions.", "pred_label": "__label__1", "pred_score_pos": 0.804625391960144} {"content": "A few years ago, I took a little job accompanying for a Suzuki strings studio. It’s challenging, but learning so many new pieces, and polishing my accompanying skills is so much fun. So this week, as I’ve been practicing for hours each day in preparation for the big recital, I remembered my own accompanists from years ago.\n\nIn college, I never truly appreciated how much an accompanist does. Being a typical singer, I would forget to count half way through the long notes, and fudge a bit (for breath-sake) on the odd rhythms. Tricky entrances were my worst fear. I also chose the songs with the most difficult accompaniment because they were the most beautiful. And somehow, they kept up with me and never complained.\n\nLittle did I realize the possible headaches and eye rolls that my poor accompanists held back for my sake. And now that I am the one sitting at the piano most of the time, I have learned a few things.\n\n1) Turning pages is hard and sometimes impossible if you don’t have a nifty assistant beside you. Although frowned upon, I use the spread out copies method for the most difficult, long pieces. I’ve also learned the folded corners trick and the memorize-the-first-measure-of-the-next-page trick. Who would’ve imagined that practicing flawless page turns sometimes takes more practice than the actual song?\n\n2) A good accompanist must be all-knowing. My part, your part, everybody’s part and be prepared for them to mess up.\n\n3) When they do mess up (not if), you must use mind-reading techniques to decide how they’re going to react before they do it.\n\n4) You must learn the piece at every speed imaginable. Child A studied diligently and learned the piece at the perfect speed, Child B takes it a bit too slow because the fingerings are tricky, and Child C thinks that this is a roller derby (fast, lightening speed, and haltingly slow).\n\n5) You Tube can be your best friend. Are you bad at multi-tasking on those more tricky pieces and humming over your piano part doesn’t work? I am. That’s why I type it into You Tube and listen to 3 people butcher it before I find a decent recording.\n\n6) Trying to convince a parent that his/her child is not perfect is not a good idea. I have one parent in particular, that each year, while I’m accompanying for her child, thinks that every mistake is mine. Not a big deal until she refuses to pay me because there is no way it’s because her daughter hasn’t learned her piece well enough. Again, if I could mind-read her child, this would be no problem, but alas, it is not.\n\n7) If you do make a mistake, everyone will notice and likely remember. If you don’t mess up, few will notice that you played at all. It makes me laugh, but it’s completely true.\n\nThis is my heartfelt thank you to my accompanists (Tim, Tim, and Roy) for not killing me during college. You really showed me the grace of God.\n\nThis year, as I was going through some health problems, I had little extra energy for my normal level of creativity with my students, so I looked to use other people’s creative ideas. Here are my favorites that I used frequently this year.\n\n1. First is a site called Joy has some wonderful ideas and helpful resources for studio teachers. From practical evaluation forms to games and lesson planning, this is a wonderful resource and all of them are free!\n\n2.From, I’ve found a kindred spirit. Her teacher label is “Aussie Music Teacher.” She is constantly adding theory games, great music ideas, and other great music-teaching resources to her catalog—many of which are free!!\n\n3. And last but in no way least, is another wonderfully creative and free site filled with more great resources and games for more student and parent engaged learning.\n\nIf you’re serious about wanting to sing but have little money, this is for you.\n\nRecently, I’ve had several people get in touch with me, desperately wanting to gain singing skills but having little to no money.  Here are my recommendations for the impecunious wanna-be singer.\n\n 1. Find and join a church choir or two.  Most churches have a choir and they are absolutely free.  This is a good way to begin learning to sing with others, following direction, and learning some musical basics.  Sometimes, you can find a church choir with excellent instruction that can help you on your way to meeting your musical goals. The best thing that you can do is sing, sing, sing.\n 2. If you’re not religious, there are community choirs.  Some are free and some require a small fee to join and others only accept auditioned singers. Many of these choirs are good to get you started on the basics.  Again, the best thing that you can do is sing a lot.\n 3. If you’re needing to learn about of music theory, there are many online games and tools to learn.\n 4. If you are in school or college, join the choir, chorus, or lessons.  Most schools offer them as an elective (thus free, or small fee).\n 5. Once you’ve got a little confidence built up, find a few friends and sing at a nursing home.  This is a great way to get experience singing for a more generous crowd and many times, singing through interruptions.\n 6. Once you’ve got your musical feet under you, try a tougher crowd: family or friends.  They will most likely give you an honest opinion about your sound: whether good or bad.\n 7. If you’re feeling confident, try karaoke with friends.  This too is a great place to build some confidence in performing with little judgment.\n\nThere are many more options, but these are the ones that first jump to mind.  Best of luck in your singing adventures!!\n\nI have a few students now that require much more daily lesson planning than most other students. They have various disabilities ranging from mild learning disabilities to more severe mental, physical, or visual disabilities. These are in some ways, my favorite piano/voice lessons to teach because these students work hard and really want to be here. The following is a helpful page that I came across while searching for ideas in working with the visually impaired. It is written by a professor of Music in South Carolina that has some very good thoughts on ways to teach most efficiently for students with special needs. Most of these I have intuitively tried to implement, but some I have not thought of on my own. If you are a teacher, I hope that you can find these ideas helpful and if you are a parent looking for a teacher, I hope that you can use some of these thoughts as guidelines in what to look for in a piano teacher. Enjoy!\n\nAre you trying to find a piano teacher for your child but know nothing about piano? Here are a few questions that you might want to know and a few possible answers that you might hear.\n\n1. What methods does the teacher use when he or she teaches? The teacher might mention some of the following.\n\nClassical method:\nThis is the most common method for piano teachers. This involves teaching sight reading, rhythms, finger/hand technique and theory.\nPros: A student of the classical method has a very well-rounded understanding of music.\nCons: Students don’t learn how to play lead sheets (or real-life music) or improvise.\n\nSuzuki method: this method is mainly training the child by ear and having much parental involvement.\nPros: The parent is highly involved in the child’s music training. The child focuses more on good technique and learns things by ear.\nCons: The child does not usually learn to sight-read notes. This is a major hindrance to children using this method unless it is combined with note reading exercises.\n\nSimply Music (or the Australian method)\nThis method teaches how to read lead sheet and improvisational playing through chordal understanding.\nPros: the student can play many well-known songs quickly. The student learns chord use and lead sheet reading early, and eventually learn to transpose. Much is learned by ear. The student learns improvisation early on, jazz techniques and accompaniment techniques. It is recommended for children that struggle with normal piano techniques.\nCons: Although this method is strong on teaching in lead sheet format, students do not learn how to read traditional two-handed music. The area of classical techniques and sight-reading is very minimal.\n\nKodaly method: A method designed more for singing. Most know it as the Do-Re-Mi method. It uses speech patterns to help children connect with rhythm and notes. It’s unlikely that a piano teacher will mention this one, but there it is just in case.\nPros: It’s highly effective to help children feel and understand beat.\nCons: The names used for rhythms (like ti-ti to signify 1 and for eighth notes) and note names (do for c, etc…) is somewhat confusing for children if they are going to switch over to classical method at any point.\n\nThe next two methods are mainly used in the classroom, but I have heard teachers mention these methods when talking to parents interested in lessons. These teachers are taking advantage of the parents ignorance because the parents don’t know that these are not regularly used in piano lessons.\n\nDalcrow method: this method combines movement with music (used mostly in classrooms)\nPros: helps children to feel a steady beat.\nCons: You probably won’t do much dancing for piano lessons\n\nOrff: Using musical instruments to play patterns of music.\nPros: It goes well with Dalcrow and Kodaly.\nCons: Again, not used in piano lessons.\n\nI use a combination method of the kodaly method for beginners (to establish feel of beat), classical method for all, and Australian method for older students (after they are proficient with in their theory, rhythms and sight reading).\n\nMany teachers say that they use a combination method. Don’t let them stop there. Ask them about specifics like those question 2.\n\n2. Does the teacher focus on ear training, sight-reading, hand/finger/playing technique, rhythms and theory?\nEach one of these is very important.\n\n3. What books does the teacher use?\nAlthough the books that they use do not matter so much, sometimes teachers use the books to describe their methods. For example, the teacher might say, I use Alfred’s basic piano library, Bastien series or the Piano Adventures series. There are plenty of other good ones out there, but keep in mind that you want to know what they teach.\n\n4. How much do the lessons cost and how long is the lesson? Depending on the teacher’s degree, location, and demand, lessons can range anywhere from $15-65 per half hour or hour lesson. The current average for Lancaster, PA is between $20-35 per half hour.\n\n5. At what age, does the teacher recommend giving lessons?\nMy personal preference is begin when the child can read or the age 6. Generally, they are much better equipped to start at 6 then at 5.\n\n6. How much should you as the parent be involved?\nDepending on the teacher, you might be highly involved or not. It depends on what you want and what the teacher allows.\n\n7. What are the suggested requirements for the student’s practice?\nFor young students (6-7) that are just beginning, I usually recommend 10-15 minutes of practice a day. For most other students, 30-45 minutes, and those that are serious and able, 1 hour.\n\nHave you ever thought of becoming a professional whistler?\n\nOr how about a throat singer?\n\nJust recently I had a student tell me,  “I don’t like my voice. I’m hoping that it will start to sound different after taking lessons for awhile.”  Unfortunately, this is how many, many people feel about their own singing voice.  Thus, much of my job as a teacher is to help my students appreciate their own voice and gain confidence in using it.  One of the first things I tell students is that “if you think that you are here to learn to sound like _(insert favorite singer’s name here)__, you’re going to be disappointed.  I’m here to help you find YOUR voice and to learn how to use it’s full potential. Who knows?  You may end up loving your voice more than so-and-so’s *wink*.”\n\nHere is what one very wise teacher (Catherine McNeela) has to say.\n\nThis comes from a helpful music teacher’s blog\n\nThis past summer, I had the opportunity to teach far outside of the box.  There were several students that expressed a desire to learn to play the piano and were all very eager to do so, the only  difficulty was, most of them did not have hands or had only partial hands.  This was a new challenge that I had not previously faced, but was excited about this opportunity nonetheless.  Thus, with insight from their mom (who said that her children were inspired by this man), we found an adjustable stool, I rearranged and wrote new music to make it physically possible to play, and they learned to play with their toes. It was wonderful to see how much progress they were able to make over just one summer!\n\nSo what is the point?  It took extra time, me getting over my dislike of feet, and learning to understand how much each student could be pushed and what was actually possible.  I had to be flexible and willing to delve into the territory of the unknown (creativity).  This is not to toot my own horn, but simply to say, if you are willing to try something new, wonderful things can happen.\n\nMany times, I come across students that have no “disabilities,” but are just as handicapped by their lack of self-confidence.  This is one of the most common things that I see as a vocal teacher.  How you think, affects how you sing.  If you think you can conquer a high note (that is of course, within your range), than it’s much more possible to do that.  Many times, students look at a note and because it looks high on the staff, they can’t seem to reach it because they don’t think they can (even though they warmed up much higher than that minutes before).  Thus, part of my job as a teacher is to be the cheerleader, the counselor, the coach.  Sometimes, lessons end up being more of a pep talk than anything else.  And if I’m willing to be flexible with the time, and am willing to set aside goals for the lesson, sometimes those pep talks are the turning points for students.  With those students that tend to be high stress, it helps to be silly, joke, and do lots of breathing, stretching, and relaxation exercises for they even play or sing one note.  It takes time from the lesson, but it’s very important.\n\nA good example of this is an adult student that I taught.  When she first began taking voice lessons, she was not able to sing above an F4. She had a big personality, and a big speaking voice, but her range was very, very small (less than one octave) and singing anywhere above F4 was very quite and barely audible.  After a few weeks of trying out that new higher part of her voice, and after much encouragement, she was able to use it.  It took many times of my saying, “You may not like the sound at first, but keep using it and it will get stronger and stronger.”\n\nTo conclude, if you have the opportunity to work with someone that has a physical or mental disability, or if they are just “stuck,” don’t be afraid to try new things.  Good luck!\n\n\nNext Page »", "pred_label": "__label__1", "pred_score_pos": 0.7882670760154724} {"content": "Sifting Through Social Noise\n\nTuesday, June 03, 2014\n\nRecent years have radically changed the way people socialize; in parts of the developed world that have good broadband and cellular penetration, the average person now spends more time on online social networks than on physical meetings with acquaintances outside their immediate family.\n\n“We were socializing before social networks,” Prof. Sujay Sanghavi states. “But now we can automatically capture fine details of social interaction, such as when someone views a photo and how they share and interact with the image.”\n\nThe problem now is the issue of information overload.\n\n“If 1,000 friends on Facebook all post something, not all of it is relevant to you. Being shown everything is pretty useless and degrades your social experience,” Prof. Sanghavi mentions. This is where his research team steps in, using the fine-grained recording of user interactions to better select the most relevant people and information for any given person. Using a series of algorithms, Prof. Sanghavi and team have explored three major ways to bring sense to large-scale social networks.\n\nThe first problem in social networks is to find communities – sets of users that share denser connections amongst themselves as compared to with the general populace.\n\nSociology recognizes that connections that form part of a community are often more predictive of user tastes and future connections. But finding these communities in large graphs is both computationally and statistically challenging.\n\nThe WNCG team developed a new graph-clustering technique with widespread applications affecting community detection, user-profiling, link prediction and collaborative filtering. By posing graph clustering as a convex optimization problem, Sanghavi and his team were able to both reach globally optimal solutions with better statistical properties and provide an algorithm that easily scales and parallelizes.\n\nThe second problem Prof. Sanghavi’s team works on is the task of finding the social graph from user behavior. In particular, the social graph is valuable, but is often proprietary and not accessible; individual user actions however may be less so. For example, a network provider will have access to user activity levels, but not the social graph. The research of Sanghavi’s team enables the learning of a social graph from data on user behavior, even when it is not clear who those users are reacting to.\n\nThe core idea of this research is to study cascades, which are actions like sharing, liking and buying that spread through the network because people follow the lead of relevant friends. Sanghavi’s team developed new ways to find the graph on which cascades spread, when only information about who participated in the cascade, but not why they participated, is available.\n\nOne example of such a cascade is when users switch cellphone providers, which is a common occurrence outside the USA, based on the switching patterns of their friends. Inferring the underlying network of such influences is highly valuable.\n\nThe research does not strictly impact social media sites such as Facebook or Twitter, but reaches into the fields of e-commerce, security and peer-to-peer networks. By determining and predicting how information spreads on a large scale, influential nodes can be targeted, which are useful to viral marketing and predicting top-sellers on social buying sites such as Groupon. This research also has its mathematical roots in human disease propagation, as well as the propagation of social networks.\n\nThe third major challenge facing social networks today is the automated assigning of topics to content, according to WNCG Profs. Sujay Sanghavi and Sanjay Shakkottai. There is now a vast corpus of uncategorized images and videos, both public and private, on social networks. Finding out topics like “outdoors,” “kids,” “water” and others would make the information we see and search for more meaningful.\n\nThe current method for automatic topic modeling employed by search engines and marketing strategists is based on content like news articles.\n\n“Topic modeling for news articles is easier because you have access to words, which tell you topics. It’s much harder with pictures, because we don’t have words,” Prof. Sanghavi states.\n\nComputer vision by itself, according to Prof. Sanghavi, is not complex enough to handle the task of categorizing these visual elements into specific topics.\n\n“Standard image processing will extract items and those items will look the same for any two people, whether it’s me or President Obama. We will look very much the same, as long as we are both people in a certain background. With image processing it’s hard to get features indicative of underlying semantic topics,” Prof. Sanghavi mentions.\n\nProfs. Sanghavi and Shakkottai are working on a solution that circumvents the need for words and uses people’s reactions to and interactions with pictures and videos to infer content topics accordingly. For example, if someone is interested in sports and they share a football video that is later shared and commented on primarily by other sports fans, this new system of topic modeling can infer the video is about sports.\n\nThe solution, according to Sanghavi and Shakkottai, is two-fold. The pair developed an algorithm that determines first what topics a user is interested in and second, what topics are in the content a user is viewing, though neither answer is initially known.\n\n“The idea is that we don’t try to get indicative features directly from the content,” Prof. Sanghavi states. “Instead, we use the fact that many people see these pictures and react to them. At a high level, the idea is to use the user as a word; her interest in a video is mathematically just as indicative of underlying semantics as the presence of a word in a news article.”\n\nWNCG’s research has the potential to revolutionize the current search engine system. Instead of searching for keywords based on count profiles, users can search for more general topics. The research team’s output could be a key component for social search and finding content generated by a user’s friends and acquaintances.", "pred_label": "__label__1", "pred_score_pos": 0.8410687446594238} {"content": "US confirms Trump’s meeting with Imran Khan\n\nWashington/Islamabad: US President Donald Trump will welcome Pakistan’s Prime Minister Imran Khan to\n\nthe White House on July 22, the White House confirmed Wednesday.\n\nThe White House statement comes a day after US State Department denied any knowledge of PM Khan’s visit\n\nto the US.\n\nDuring a weekly briefing, the US State Department spokesperson Morgan Ortagus, when asked what meetings\n\nhad been scheduled for PM Khan’s visit, had replied, “To my knowledge, that has actually not been confirmed\n\nby the White House.”\n\n“We don’t have anything to announce here from the State Department,” she had said.\n\n\nstability, and economic prosperity to a region that has seen far too much conflict,” White House said in a\n\nstatement late Wednesday.\n\nThe statement said that PM Khan and President Trump will discuss a range of issues, including counter-\n\nterrorism, defense, energy and trade with the goal of creating the conditions for a peaceful South Asia.\n\nMeanwhile, a foreign ministry statement said Prime Minister Imran Khan will visit the United States on the\n\ninvitation of President Donald Trump, on July 21-23.\n\nThis would be the first summit-level engagement between Pakistan and the United States since both leaders\n\nassumed their respective offices, the ministry said in a statement.\n\nDuring the visit, Prime Minister Khan and President Trump would have wide-ranging interaction at the White\n\nHouse on 22 July 2019 covering bilateral and regional matters.\n\nThe Prime Minister will also be meeting prominent members of the U.S. Congress, corporate leaders and\n\nopinion makers as well as members of the Pakistani diaspora, the statement said.\n\nDuring his various engagements in Washington, the Prime Minister will outline his vision of “NayaPakistan”\n\nand underscore the importance Pakistan attaches to a broader and multi-faceted relationship with the United\n\n\nIn the regional context, the Prime Minister will underscore Pakistan’s commitment to peace and stability and\n\nthe importance of constructive engagement to promote a political solution in Afghanistan. He will also\n\nhighlight Pakistan’s policy of “peaceful neighbourhood” aimed at resolving disputes through dialogue and\n\npromoting the vision of peace, progress and prosperity in South Asia and beyond.\n\nThe Prime Minister’s visit will help renew and reinvigorate long-standing ties between Pakistan and the\n\nUnited States. It will contribute towards building a broad-based, long-term and enduring partnershipbetween\n\nthe two countries on the basis of mutual interest and mutual benefit.", "pred_label": "__label__1", "pred_score_pos": 0.9659997820854187} {"content": "article about artSearch Arts & Actions Journal articles from 2003 to 2010. 2 If on expiry of the probationary interval a continuation of the probation assistance or the conduct orders is considered to be needed in order to scale back the chance of further offences when it comes to Article sixty four paragraph 1, the courtroom could on the request of the manager authority lengthen the probationary interval by an extra two to 5 years.\n\nWhile the definition of art has modified over the years, the field of art historical past has developed to permit us to categorize adjustments in art over time and to better perceive how art shapes and is shaped by the inventive impulses of artists.\n\n5 As a substitute of the execution of the sentence the court docket might order an in-patient therapeutic measure under Articles fifty nine-61 if it is to be anticipated that this may reduce the chance of the offender committing additional felonies or misdemeanours during which his situation is an element.\n\n1 If the belongings subject to forfeiture are not out there, the court docket may uphold a claim for compensation by the State in respect of a sum of equal value, which claim may be enforced in opposition to a third social gathering provided that he isn’t excluded by Article 70 paragraph 2.", "pred_label": "__label__1", "pred_score_pos": 0.9969878792762756} {"content": "People of Russian Heritage, Polish Heritage and PThai Heritage.\n\nMention in the essay if there is any similarity in their healthcare belief. Mention how do they see health and disease and their customs to deal with them, also, discuss how they view dead. How their health care belief affect or influence the delivery of evidence-based healthcare.\n\nSample Solution", "pred_label": "__label__1", "pred_score_pos": 0.9902709722518921} {"content": "Man in field with bounding box\n\nBlog Home AI & Machine Learning   •   April 24, 2019\n\nHow to Create Training Data for Computer Vision Use Cases\n\nFor simple computer vision projects, such as recognizing a pattern in a group of images, publicly available image datasets will usually suffice to train your machine learning models. But for more complex CV applications, how can you get the vast amounts of training data you need to create an accurate solution? In this post, we explain training data requirements for computer vision use cases like video understanding, autonomous driving, security monitor surveillance systems, and medical image diagnostics.\n\nFor any real-world computer vision application, the key to success is the right quality and quantity of training data.\n\nAbstract photo of facial detection\nHow do I create the right kind of dataset for my project?\n\nYou will need to collect as much real-world image data as possible for your use case scenarios — namely, annotated images or videos. Depending upon the complexity or safety requirements of the solution, this might mean collecting and annotating millions of images.\n\nWhile leveraging existing open-source datasets like ImageNet and COCO is always a good place to start, the more data samples you’re able to collect for your specific use case, the better. If the use case doesn’t require very specific data or proprietary data, some companies opt to purchase existing datasets from vendors. When there is not an existing body of data available, most companies opt to work with training data providers like Appen. For example, we can deploy our global crowd of workers to collect image and video data using our mobile recording tools, per our customers’ specific scenario requirements, and annotate large volumes of existing image and video data.\n\nWith a large, diverse data set to learn from, your ML model will be robust and successful at identifying subtleties and avoiding false positives. This is especially important for solutions like training data for autonomous driving, which must accurately identify the difference between a small child playing in the street and a grocery bag blowing in the wind. In this scenario, there may be color, size, and shape similarities that could confuse your CV system if it isn’t adequately trained.\n\nHow much training data do I need for a computer vision solution?\n\nSo how many images do you need annotated to train your system? The short answer is that it can range from several thousands to millions of images, depending upon the complexity of the computer vision or pattern recognition scenario. For example, if your CV solution needs to be able to categorize eCommerce products into a relatively small number of coarse-grained categories (i.e., shirts, pants, shoes, socks, dresses), you may only need several thousand images to train it. For a more complex taxonomy of categories — for example, classifying images into thousands of fine-grained categories such as men’s running shoes, girls’ fashion heels, baby shoes, etc. — the system might require several million correctly labeled images to be trained.\n\nHow can I improve the quality of my training data?\n\nImage annotation is vital for a wide range of computer vision applications, including robotic vision, facial recognition, and other solutions that rely on machine learning to interpret images. To train these solutions, metadata must be assigned to the images in the form of identifiers, captions, or keywords. In most cases, a human touch is necessary to correctly identify all the nuances and ambiguity that can often occur in complex images like traffic camera reporting and photos of crowded city streets.\n\nAppen’s image annotation tool incorporates AI to significantly improve our image annotation workers’ efficiency. The AI-assisted image annotation tool takes a first pass at outlining the objects in the task. For example, if the annotation task is to mark out the shape of all cars in an image, Appen’s image annotation tool will automatically form lines or bounding boxes around the car, and then the worker only needs to adjust a few points of the car shape if it’s not perfectly aligned. This process is much faster and more efficient than asking a worker to draw the car shape from scratch.\n\nYou must also make sure your training data covers every possible real-world scenario it might encounter, so your CV system can succeed in a real-world setting. To this end, there are some methods for enriching your image data that are quite straightforward. Common ways to help train your ML model to cope with the nuances it will encounter in the real world include rotating or cropping images, as well as changing color and light values. Manipulating your data in this way is a simple but effective means for improving your CV system’s performance.\n\nSimulation of object detection in a warehouse\nWhat are the different methods for AI/ML modeling?\n\nDifferent types of AI/ML modeling methods can consume different types of training data. For the purpose of this discussion, the primary differentiator for data types is the degree to which it has been labeled. Labeling (annotating) image data provides the context the algorithm needs to learn. There are four kinds of ML modeling methods:\n\n 1. Supervised Learning means the model is trained on a labeled dataset.\n 2. Semi-Supervised Learning makes use of unlabeled data for training — usually a small amount of labeled data with a large amount of unlabeled data.\n 3. Unsupervised Learning uses cluster analysis to group unlabeled data. Instead of responding to feedback, cluster analysis identifies commonalities in the data and reacts based on the presence or absence of such commonalities in each new piece of data.\n 4. Reinforcement Learning is a machine learning technique that enables a model to learn in an interactive environment by trial and error using feedback from its own actions and experiences.\n\nThe most successful CV systems are usually trained from large amounts of high-quality labelled data with a supervised approach — for example, the deep learning approach. The type of learning model you choose for your project will depend largely on your use case and available resources like budget and personnel.\n\nHow can you avoid label bias when training image data?\n\nOne obstacle that can negatively impact the accuracy of a machine learning model is bias in the training data. There are several causes of bias that your team should look out for when training your ML model.\n\nLabel bias is a common issue for supervised learning projects. It occurs when the dataset used to train your model doesn’t accurately reflect the situations in which the model will operate.\n\nBecause it would be nearly impossible to account for every single situation an ML model might encounter, it’s important that your sample training data is not only relevant to your project, but also represents the diversity of the real world as much as possible. In other words, the distribution of your training of your training data needs to match the distribution of real-world data.\n\nTo this end, it’s important to consider data distribution factors in your CV training data such as seasonal and trending signals, as well as geographical distribution of data sources. Not accounting for these variables can produce biased data.\n\nWhat are some available data labeling strategies?\n\nComputer vision technologies have seen enough adoption at this point that a variety of strategies have emerged, each with its own range of requirements and results.\n\nA generative adversarial network (GAN) is an ML technique that’s made up of two nets that are in competition with one another in a zero-sum game framework. GANs typically run unsupervised, teaching itself how to mimic any given distribution of data. This strategy is low-cost and produces large amounts of data, but it can result in noisy data quality and requires in-house AI experts to set the system up.\n\nAnother method is weakly labeled data from user behavior signals. This labeling strategy can produce large data sets and reduced cost compared to other labeling approaches, but can also produce noisy data quality and requires a large number of users actively interacting with an existing AI solution while all their activities need to be carefully logged.\n\nTraditional crowdsourcing approaches to labeling data quickly produce large amounts of data for little cost, but can sometimes produce low-quality results — which can negatively impact the accuracy of your machine learning system.\n\nActive Learning is another strategy for machine learning in which a learning algorithm is able to interactively query the user to obtain the desired outputs at new data points. This approach saves on costs, while providing the most informative data for labeling — and typically results in high-quality output.\n\nTwo people with bounding boxes for machine vision\nHow does Appen do data labeling?\n\nAppen offers a fully managed, turn-key data labeling solution for its customers. Combining active learning with crowdsourcing, Appen employs tens of thousands of workers at any given time, resulting in rapid delivery times for labeling large amounts of data. To enable fast time-to-market for your CV project, Appen utilizes an AI/ML-assisted, highly efficient data collection and labeling method, as well as an AI/ML-assisted project management process.\n\nAdditionally, Appen provides a training data insight report and data augmentation services to make sure you have the best training data for your computer vision projects such as image or video annotation. The Appen solution features several key process components to help ensure the highest level of data quality:\n\n • Data clustering/distribution analysis and visualization\n • Data abnormality detection\n • Data bias removal strategy\n • Data automatic augmentation strategy\n • Data labeling instruction recommendation\n\nWith comprehensive, easy-to-implement data labeling and project management services, Appen offers an end-to-end solution that can quickly provide the foundation you need to make your CV solutions as accurate as possible.\n\n\nAre you currently using artificial intelligence to make smarter decisions, build innovative solutions, and deliver better customer experiences? Contact us to learn how Appen can help.\n\nSubscribe to email updates\n\nReceive our monthly newsletter to stay on top of the latest articles and announcements from Appen.", "pred_label": "__label__1", "pred_score_pos": 0.9667539596557617} {"content": "Mining is a dangerous profession.\n\nThis is undeniable. Between 2017-2018 in Western Australia alone, 859 injuries were reported by mining employees, with 4 being fatal. It is difficult to combat this: even when implementing the best workplace safety, mining has risks.\n\nTechnology has the potential to reduce mining injuries, simply because automated machines cannot be hurt in the same way as humans.\n\nThere is significant distrust towards technology in mining. Specifically: its role in ‘taking’ the jobs of miners. But technology is making mining safer – and it doesn’t have to be at the cost of jobs.\n\n\nAutomation has been making mining safer for over a decade. Rio Tinto famously utilise driverless trucks, reported to operate 1000 more hours in 2016 than traditional trucks. This is largely attributed to the fact that automated trucks do not require food or sleep, and are therefore ultimately more productive.\n\nAutomation requires workers to do maintenance and operate machines from remote control centres. Therefore, in return, automation could create jobs to replace the ones it takes.\n\nArtificial Intelligence\n\nArtificial intelligence is becoming more recognised for its uses in mineral exploration. It has the potential do what humans otherwise can’t (or which would be time-consuming, dangerous and difficult). It could also create more employment opportunities, as AI requires training and guidance. This way, AI implementation is creating jobs, without the dangers to human health.\n\nAI generally has more ecological and environmental awareness in exploration than humans. It will reduce mineral mining dangers with problem solving and early warnings.\n\n\nUsing blockchain in mining might sound strange. How exactly can a distributed ledger make mining safer?\n\nMining supply chains are convoluted and difficult to track. How do we know that sourcing is ethical and sustainable? That the mineral is good quality? Or even that the amount received by the company is correct?\n\nBlockchain can make supply chains traceable. It’s permanent and reliable. It also means that mining operations can be more secure, especially when implemented in conjunction with automation and artificial intelligence.\n\nWhat are we so scared of?\n\nEvery new technology takes traditional jobs – and that’s not easy to accept. In turn, though, it creates others. Throughout history, around 90% of the jobs that humans used to do have been replaced by technology. While the McKinsey Institute estimates that between 400 and 800 million people will have lost their jobs to automation by 2030, many of these jobs will be replaced by new ones. However, around 75 to 375 million of these workers will need to learn new skills.\n\nInjuries in the mining sector cost companies as well as employees. The lesser the financial and physical burden, the more opportunity for job creation in mining.\n\nThe reality of the situation is this: a hundred, fifty, even twenty years ago, the world was different. People occupied different occupations, many of which no longer exist. Once, everyday services were provided by humans, but are no longer, such as rail ticket distribution, most factory and assembly line jobs, and cash withdrawal.\n\nTechnology can make work easier, safer, more efficient, and create jobs. It’s already revolutionising mining.\n\nTo find out more about how technology can help mining, click here.", "pred_label": "__label__1", "pred_score_pos": 0.8276163339614868} {"content": "Write down the various business model of internet\n\nFor scope-driven businesses or businesses that create synergy around a particular Customer Segmentit is important that key resources include knowledge about your target audience and a standard set of procedures for interaction and assistance with the group.\n\nDevelopment of financial budgets and projected financial statements d. Produce pay checks and payrolls reports b. Is your customer segment a single or multi-sided market? Its goal was, and is, to provide standards to which all computer hardware and software vendors will adhere, so that the present multiplicity of interconnection and interface practices could be reduced, thus reducing the costs of designing and producing both hardware and software.\n\nSuch standards fiats also tend to stifle innovation. Management Information System is mainly dependent upon: Distribution Channels What are the most effective mediums to reach your audience?\n\nExecutive Information System b. All of the above 8.\n\nWhat is Internet Business Model\n\nNone of the above 2. One of the parametric test for hypothesis. This approach, not unintentionally, favored incumbent businesses with large market share, emphasized existing proprietary software protocols especially IBM productsand relied on telephony and national PTTs for its conceptual foundation.\n\nAn affiliate often recommends or reviews products and posts that information on the Amazon site. Analysis of variance d. A customer can view the products shown on the website.\n\nThe customer can choose a product and order the same. Operational Accounting System include: Internet business models are categorized as business-to-consumer, business-to-business, and more recently, consumer-to-consumer. Carefully look at where your business is driving revenue and whether it aligns with your value propositions.\n\nHow To: Create A Business Model Canvas\n\nBut this is a nice list to get started with. Then rank your propositions in relation to the needs of your customers. What do you mean by balance of payment?\n\nRequired you to run UNIX which, at the time, was not used for commercial applications and had only a command-line user interface Had poor security and management features Had too small an address size Therefore the ISO promoted development of OSI how palindromic. Operational Accounting System include: The two kind of swap in the forward market are a.\n\nExplain the role of data warehousing in the functioning of a call centre. Discuss the scope of International marketing.Business Communication Multiple choices: 1.\n\n_____is an essential function of Business Organizations: a. Information b. Communication c. Power d. c. Operational control d. Strategic decision making Part Two: 1.\n\nWhat are the ‘Strategic Information Systems’? 2. Write down the various business model of internet. 3. What is ‘Network. The Internet protocol suite is the conceptual model and set of communications protocols used on the Internet and similar computer networks.\n\nIt is commonly known as TCP/IP because the foundational protocols in the suite are the Transmission Control Protocol (TCP) and the Internet Protocol (IP). This Internet business model relies on heavy traffic to the website.\n\nA company using this model must provide a valuable service that millions of people use on a regular basis (i.e. Google search, Gmail) in order to command high prices from ad space. Internet Business Models in the Future. Different types of business models suit different types of businesses.\n\nA business model is the way that a company sells products to its customers. It describes how a business creates, delivers, and captures value. Business communication is an essential part of a successful company.\n\nHere in Australia, business owners acquire their numbers from an Australian telecom company of their choice. clear communication should always be prioritized. The business plan is the key ingredient for a successful business and is often ignored.\n\n\n\nWrite down the various business model of internet\nRated 3/5 based on 11 review", "pred_label": "__label__1", "pred_score_pos": 0.5304343700408936} {"content": "Uniting business and it essay\n\nThe Reasonableness of Christianity. Delwiche recounts how inin the United States, the Institute for Propaganda Analysis was created to educate the American public about the widespread nature of political propaganda.\n\nPlus, living standards of average Ukrainians have plunged. Not all followers can become leaders.\n\nData Protection Choices\n\nAgain, WHY is the province of theology, not science. This is the best quality of a leader which he had in him. The most effective way of halting this blasphemy and of enforcing God's command to fill the earth was that of confounding their languages.\n\nThe bulk of Book II is devoted to making this empiricism plausible. Things a leader needs to do A leader gets things done through other people. Yet it cannot be bought, begged, borrowed or stolen, for it is something that is no earthly good to anybody till it is given away.\n\nFlorence The Tuscan dialects, including Florentine, are the most conservative of the Italian dialects. This push for a fundamental shift in agriculture comes amid growing concern about the capacity of institutions of agricultural higher education to drive such a transformation.\n\nNoah Webster, America's premier lexicographer, gives many \"Shemitic\" Semitic etymologies as sources for English words in what was supposed to be the great American dictionary.\n\nMany writers, following Jewish and Arab traditions, locate the Tower ruins at Borsippa the \"Tongue Tower\"about 11 miles southwest of the northern portion of Babylon formerly a suburb of the city.\n\nWorld War I essay papers\n\nThere is no reason why He should do this. We all can play a role in Uniting business and it essay agricultural education. Iraqi soldiers invading Kuwait did not toss premature babies out of incubators, as The Sunday Telegraph in London, and then the Los Angeles Timesreported, quoting Reuters.\n\nBut other phenomena were harder to explain. Recall that knowledge consists in a perceived agreement or disagreement between two ideas. More time and data will be needed until these deep anti-Biblical prejudices can be reduced by facts. Jamaie later to become James Decartes was one of those orphans.\n\nThe uneasiness is caused by the absence of something that is perceived as good. After discussing these basic features of language and reference Locke goes on to discuss specific cases of the relationship between ideas and words: After all, Catholicism de-emphasizes Bible reading, so centuries of new Christians were barely aware of Biblical texts about language, or the literal Hebrew roots of their faith.\n\nWe will be saved from investigating questions which we could never know the answers to and can focus our efforts on areas where progress is possible. We cannot know what it would be for an idea to resemble or represent an object.\n\nWhen we get to examine the laboratory reconstructions of Proto-Indo-European roots, or other attempts to reconstruct a Mother Tongue like Nostratic or Proto-World, we'll see how much clearer and more versatile bendable to daughter languages are the words that are not reconstructions but actually exist in the Bible.\n\nSensitive knowledge has to do with the relationship between our ideas and the objects in the external world that produce them. For example, World War One was started because of many things: After that, we'll concentrate on Edenic words from pre-history.\n\nChomsky holds that the grammar of a language is a system of transformational rules that determines a certain pairing of sound and meaning. Mechanism Around the time of the Essay the mechanical philosophy was emerging as the predominant theory about the physical world.\n\nThe settlement of Shinar could be construed as a partial fulfillment of that command. He blamed all the economic and social troubles on these groups, If he tries to shift the responsibility, he will not remain the leader.\n\nYet, when combined with the other propaganda strategies, it is another way to withhold information. Therefore, each \"race\" must have had a long evolutionary history, and it is natural to assume that some races have evolved more than others.\n\nThis is nothing new, however, as he points out; All administrations try to seduce and co-opt the media. This long period of fragmentation and the fact that Classical Latin was preferred as the international language of study allowed the various modes of speech to develop on their own until they could almost be called separate languages.\n\nOn the surface these seem to be accounts of two quite separate incidents. We must strive to ensure that we use words consistently and do not equivocate; every time we utter a word we should use it to signify one and the same idea. The premier evolutionists and linguists concede that human language and the uniquely human capacity for language is a mystery.\n\nHappiness and health for the young as they turn into adults, for starters.Published: Mon, 5 Dec Introduction. Jimi Hendrix is considered a key force in the 20 century music.\n\nThe American rock songster, guitarist and songwriter was born and brought up in Seattle where he practiced most of the basic skills in playing guitar. Ashwin, You write, “Preventing rent-seeking is a problem that both the left and the right should be concerned with.” I’m not sure the cronyist/technocratic dominant species is capable of moving away from its local fitness peak as a result of meta-awareness.\n\nErdogan is lying about the Russian fighter jet entering Turkish air space.\n\n\nThat darn plane would have had to reduce down to an incredibly unimaginable low speed, long enough for seventeen seconds. During his final news conference ofin mid-December, President Obama criticized Democratic efforts during the election.\n\n“Where Democrats are characterized as coastal, liberal, latte. The Nature of Order: An Essay on the Art of Building and the Nature of the Universe, Book 4 - The Luminous Ground (Center for Environmental Structure, Vol.\n\n12) [Christopher Alexander] on dominicgaudious.net *FREE* shipping on qualifying offers. The foundations of modern scientific thought, four centuries old, are firmly rooted in a conception that the universe is a machinelike entity.\n\nFor more than 20 years, photographer Matt Black has been exploring issues of poverty, migration and farming in California’s Central Valley, painting a picture of extreme economic hardship in one.\n\nUniting business and it essay\nRated 4/5 based on 90 review", "pred_label": "__label__1", "pred_score_pos": 0.8280109167098999} {"content": "Glyphosate’s Role in Causing Chronic Illness\n\nGlyphosate is the active ingredient in Monsanto’s popular “broad spectrum” herbicide, Roundup. This herbicide has greatly impacted agricultural methods and is at the root of the rise of chronic illness in the United States. Many genetically modified foods are designed to be “Round up Ready” meaning they are resistant to roundup. As of 2001, Glyphosate is the most used herbicide. Let’s take a look at how glyphosate is causing chronic illness and what you can do to minimize exposure on your path to wellness.\n\nIt is generally accepted that the farming land in the Unites States is becoming increasingly more mineral deficient. This idea is used to justify the need for taking supplements daily. But humans are not deficient in supplements. We are becoming deficient in plant based nutrition. By understanding what is causing these mineral deficiencies, we are able to make dietary adjustments and lifestyle changes were all we need is whole foods, exercise, rest, and sunshine to live a life full of vitality.\n\nMonsanto claims that glyphosate is non-toxic. “All Roundup® Weed & Grass Killer products contain the same active ingredient*, glyphosate, which targets an enzyme found in plants but not in people or pets.” This claim could not be further from the truth. However, the damage caused by glyphosate may take years before symptoms appear, so although death is not imminent with ingestion, chronic illness is prevalent with chronic exposure. Glyphosate targets a protein synthesis pathway called the shikimate pathway.\n\nThere are multiple pathways by which glyphosate could lead to pathology. A major consideration is that our gut bacteria do have the shikimate pathway, and that we depend upon this pathway in our gut bacteria as well as in plants to supply us with the essential aromatic amino acids, tryptophan, tyrosine, and phenylalanine. Methionine, an essential sulfur-containing amino acid, and glycine, are also negatively impacted by glyphosate. Furthermore, many other biologically active molecules, including serotonin, melatonin, melanin, epinephrine, dopamine, thyroid hormone, folate, coenzyme Q10, vitamin K, and vitamin E, depend on the shikimate pathway metabolites as precursors. Gut bacteria and plants use exclusively the shikimate pathway to produce these amino acids. In part because of shikimate pathway disruption, our gut bacteria are harmed by glyphosate, as evidenced by the fact that it has been patented as an antimicrobial agent. – Stephanie Seneff\n\nEver been told that you need to supplement iron, folate, coenzyme Q10, vitamin K, vitamin E, vitamin B12, Magnesium, Manganese, Chondroitin Sulfate, or Glutathione? All of these deficiencies are directly correlated to ingesting glyphosate that inhibits the production of precursors necessary to create those nutrients in bioavailable forms. Glyphosate binds to an enzyme, EPSPS, in the shikimate pathway that produces amino acids that are necessary to create bioavailable forms of nutrients listed above.\n\nGlyphosate harms the bacteria and fungus in the soil and in our intestines leaving the soil and our bodies lacking in bioavailable nutrients. This creates a perceived need for fertilizers and supplements. But what we really need is avoid further use or ingestion of glyphosate and to flood the soil with bacteria and fungus to effectively break down the glyphosate. This can be accomplished by creating compost for farmland and ingesting fermented vegetables and mushrooms.\n\nIllnesses that have increased with the use of glyphosate include but are not limited to Lyme disease, Autism, ALS, Chronic Fatigue Syndrome, Dementia, Alzheimer’s, Anxiety, Mood Disorders, Insomnia, Obesity, Cancer, Tooth Decay, and Mitochondria Disease.\n\nThe most common sources of glyphosate in food are Round Up Ready GMO crops and conventionally grown crops that are sprayed with Roundup three days before harvest. Foods approved to be grown as GMOs in the US are corn, soybeans, cotton, canola, sugar beets (can be GMO and labeled organic), alfalfa, papaya, yellow “crook neck” squash, zucchini, “Arctic” apple, and “Innate” potato. Crops that are sprayed with Roundups a few days before harvest include wheat, peanuts, nuts, beans, lentils, and oats. These lists are a baseline, but are not all encompassing.\n\nConventional animal agriculture feeds their livestock with gmo corn and soy. The glyphosate builds up into the animal tissue and remains in the animal products you buy in stores and at restaurants. If you are not ready to give up animal products, make sure to buy grass fed, free range, organic animal products or wild caught fish.\n\nOrganic farmers are not allowed to spray Roundup on their crops, so eating organic is a great way to reduce exposure. However, conventional farmers use aerial spraying techniques that cause contamination of neighboring organic farms. Glyphosate is so prevalent in our society that trace amounts have been found in rainwater. It is not possible to completely eliminate glyphosate, but we can dramatically reduce exposure and support our elimination organs to prevent it from building up in our bodies.\n\nProtect yourself from glyphosate by buying organic and non-gmo produce and going gluten-free. Products high in gluten, such as wheat, barley, rye, and oats are also heavily sprayed with Roundup. Most processed food includes ingredients that are sprayed with glyphosate. For a processed food to be certified organic, it only needs to contain 95% organic ingredients (unless labeled 100% organic). Therefore, even 5% of organic packaged foods could contain trace amounts of glyphosate in the form of gmos or conventional produce. Take control by growing your own garden, boycotting Monsanto, refusing to buy products sprayed with Roundup, and supporting your local organic farmers.\n\nLiver flushes and coffee enemas support your liver and colon thereby increasing nutrient absorption and detoxification of toxins, such as glyphosate. Epsom salt baths help replenish magnesium and sulfur. Sea vegetables and sea salt help replenish trace minerals that are deficient in our soil. By completing a liver flush series, performing coffee enemas, taking regular Epsom salt baths, and eating an organic, non-gmo, whole food diet you can heal whatever chronic illness ails you and return to vibrancy without taking supplements. Nature has innate methods to return to a state of harmony. In agriculture, organic permaculture returns the land to harmony. In humans, organic food consumption and a healthy lifestyle returns our bodies to harmony.\n\nFor further reading, check out research by Dr. Stephanie Seneff at MIT. She has published several peer review articles looking at trends involving usage of Round Up.\n\n\n\n\nSay “No!” to Antibiotics\n\nWe can only be victims of conventional medicine if we give doctors control over the decision-making process. Whenever I go to a doctor’s visit, I always inform the doctor that they do not have permission to give me prescription antibiotics. After the shock wears off of his or her face, they start to ask what if questions, and my response is always the same. Regardless of the medical issue at hand, I refuse to ingest antibiotics. This stance may appear foolish and short-sighted to those who prescribe or take antibiotics on a regular basis. But I assure, it is not.\n\nIf you or someone you know has been diagnosed with Lyme (or any other infection), then I implore you to thoroughly research the negative biological effects of prescription antibiotics and testimonials of other Lyme patients who have taken that treatment path. Before I dive into scientific theory, I would like to share my story.\n\nMy Experience with Antibiotics\n\nIt was my junior year of college, and I had been fighting a severe sinus infection. It was an infection that started off as the most painful sore throat and turned into a persistent upper respiratory infection. I was under the impression that the infection could not be viral and must be bacterial, since it had been persistent for a month. I setup a doctor’s office, explained my situation, and was prescribed Amoxicillin. Like many others, I had taken antibiotics before and never experienced any noticeable issues, so I assumed this was the safest route back to health. I could not have been more wrong.\n\nTwo hours after swallowing the first dose of Amoxicillin, my life changed forever. I was sitting in a room working on homework, and all of a sudden I was hit with an intense feeling of fear. My external environment was calm, but my internal environment had switched into full panic mode. My core muscles began to involuntarily contract and release. I was shaking, twitching, and convulsing as I laid on the floor. Unsure of what was going on, I decided to lay down in bed and wait for the episode to pass. The periodic convulsions persisted, so I headed to the emergency room two hours later.\n\nOvertime, my health deteriorated further. I continued to experience partial seizures. I developed food, chemical, and environmental sensitivities. I began fighting a range of viral and bacterial infections, and was eventually diagnosed with Lyme Disease. My poor gut health lead to a systematic illness that affected every organ and cell in my body. I can only imagine the route my life would have taken if I had simply refused to take Amoxicillin. However, my journey is not in vain. It has inspired me to question treatment methods of conventional medicine and search for a deeper understanding of preventing and healing chronic illness.\n\n\nThe War on Infection\n\nIn the mid to late 19th Century, scientists were debating the origin and purpose of germs. Louis Pasteur became known as the father of The Germ Theory. His interpretation of experimental research led him and his followers to believe that bacteria and viruses originate in the environment and are the root cause of disease. Therefore, by killing germs, we can successfully treat disease.\n\nOn the other hand, Pasteur’s rival, Antoine Béchamp, created the pleomorphic theory from his own experiments and research. His theory suggests that germs originate from microzyma, organisms that live within the human body (and other organisms) where they usually remain quiescent and harmless. When the body is threatened by a potentially harmful matter and unhealthy terrain, the microzyma morph into bacteria and viruses. The purpose of these germs is to remove the harmful matter, dead cells, and toxins. Therefore, germs are the result of disease, not the cause. We can successfully treat disease by cleaning up the harmful matter, dead cells, and toxins.\n\nOn his deathbed, Pasteur admitted that the cause of disease is the terrain, not the germs. If you read about Pasteur’s experimental procedures, then you will find that his research was invalid and unscientific: he injected healthy animals with blood from diseased animals merely demonstrating that you can induce disease in healthy tissue by poisoning the blood with dead cells. For the purpose of this article, we will entertain the idea that Béchamp’s stance holds more truth than Pasteur’s. See the links below for more information on this debate.\n\nUnhealthy Terrain\n\nWhat determines an unhealthy terrain? The following four factors are the root cause of all disease.\n\n1. Acidic pH\n2. Positive electric/magnetic charge\n3. Presence of poisons and toxins\n4. Nutritional deficiencies\n\nPlease Note: Killing off bacteria does not address any of these factors. In fact, killing the bacteria is equivalent to firing an obnoxious, loud spoken maid whose responsibility is to clean your house. When she is gone, you no longer suffer the pain of listening to her ramblings, but your house remains dirty and will gather filth over time.\n\nResult of Antibiotics Use in Lyme Patients\n\nThere is a huge controversy surrounding the use of antibiotic as treatment for Lyme Disease. Most medical professionals are taught to prescribe one dose of antibiotics. However, this method consistently fails Chronic Lyme patients who have been sick for an extended period of time. They deal with the toxic effects of killing off the bacteria and perhaps receive temporary symptom relief due to a reduction in inflammation, but the infection always reappears with a vengeance. Desperate, Chronic Lyme patients look for a doctor who will prescribe them multiple rounds of antibiotics over an extended period of time. Alone, this method provides temporary symptom reduction, but always leads to a relapse. Lyme patients who choose the antibiotic treatment path are merely managing symptoms while damaging not only their gut, but also their entire body.\n\nAntibiotics kill the good bacteria in the gut, whose responsibility is to breakdown undigested food. When the good bacteria die, the ability to digest food decreases and intestinal fungus, such as Candida, begins to proliferate. The fungus has the ability to poke holes through the intestinal lining of the gut wall with their tendrils, which leads to a syndrome called leaky gut. At this point, undigested food travels through the damaged gut wall into the blood stream and triggers the immune system to produce phagocytes to break down the food. This puts a strain on the immune system, liver, and kidneys. When the liver and kidneys become overwhelmed, the toxins may circulate and penetrate the blood brain barrier leading to neurological symptoms. In an attempt to clean up the toxic mess, multiple infections simultaneously activate.\n\nLyme patients may suffer from food, chemical and environmental sensitivities, chronic systematic inflammation, multiple organ dysfunction, decline in cognitive function, anxiety, fear, chronic fatigue, and much more.\n\nHerbal Alternatives for Prescription Antibiotics\n\nTo stop the symptom management disease proliferation cycle, it is important to wean off all medications, embrace healing reactions, and focus on nutrition and cleansing methods. There are herbal alternatives that will help decrease the presence of infections by supporting the healing process without killing off the good bacteria in the gut.\n\nHere is a short list of herbal antimicrobials that I have had success using.\n\n• Garlic\n• Oregano Oil\n• Wormwood\n• Clove\n• Cinnamon\n• Echinacea\n• Cat’s Claw\n• Cranberry\n• Ginger\n• Licorice Root\n• Olive Leaf\n• Thyme\n• Cayenne\n\nThis is not meant to be a comprehensive list, but rather reassurance that there is an alternative herbal treatment path that is more effective than prescription antibiotics. By replacing antibiotics with herbs, you are replacing poison with nutrition, thereby replacing death with life.\n\nLyme Patient Testimonials\n\n“A wise man learns from the mistakes of others, a fool by his own.” –Latin Proverb.\n\nIf there is still doubt in your mind about which treatment path to choose, then I encourage you to read Lyme patient testimonials. Look for the long-term results. Who had success and claims to have cured the incurable? Who is convinced Lyme disease is a lifelong battle with inevitable relapses? What approach did they take? Learn from their mistakes and successes as you create your own path.\n\nResources and Suggested Readings", "pred_label": "__label__1", "pred_score_pos": 0.6347556710243225} {"content": "WSU x AMPATH || Sprint 5 Retrospective\n\nSams Ships (14)Over the past two weeks, my team continued to discuss what we are working on as usual. We have come to the conclusion that we will add our Search Bar component once there are updates and more of a base to work off of. This was concluded after we realized that the process would be much more efficient. The parameters and details on the search bar would be harder to figure out without making up a base anyways.\n\nSome advice for others who may be working on the same thing would be to try and collaborate or discuss potential orders between groups if one thing may depend on another. That would make it much simpler from the start if possible so there aren’t any clashes or time wasted on doing extra work that could have just been done by one group or team.\n\nIn the meantime, I did a little more research on the AMPATH system out of curiosity since we are going to be building onto their work. I found out that there are 500+ care sites in Kenya! It is interesting to think about the potential impact our work may make on how AMPATH carries out their process. Their initiative reminds me of what Enactus at Worcester State strives for when they work on projects to help people or organizations in the community “sustain their own success, connect them with universal health insurance, train next generation medical professionals, and research new breakthroughs and best practices.” Being able to help a healthcare organization is pretty meaningful, especially as a project through my capstone.\n\nA way to tie our 348 course (Software Process Management) with our 448 (Capstone) course would be through now being able to use Travis CI and Heroku. It was interesting being able to experience using these in class and help our peers use it and now be able to use them in our capstone. I think the practice we got was nice because I found that my peers and I were more comfortable with following steps that were written out and explained to us instead of just “going for it.” I have also noticed that our 348 course helped us pay more attention to how we interact with others, which is very useful for the future when we will be working in teams of developers to create or update new technologies. One more thing which I found useful was seeing Travis CI load, and the race against time when it came to classmates pushing code at the same time; it made me push myself to be a little faster while at the same time not be sloppy about what I was putting into my code.\n\nOverall, we discussed what we will do in these coming weeks as the semester comes to a close. The project we are planning on presenting will feature a search bar which we plan to implement by then. I am excited to see what we end up with in terms of helping AMPATH and their healthcare system!\n\n\n\nCraft Over Art || S.S. 8\n\nSams Ships (10)As we have a few weeks left in the semester, I wanted to discuss the more creative apprenticeship patterns. This time I’m going to describe Craft Over Art, which is basically when a solution to a client’s problem can be solved with something that could work…or we could take it and go above and beyond. It’s being more innovative than just settling for a solution just to have something.\n\nI found that the pattern is interesting because it emphasized the importance of how the things built for customers can still be beautiful but must always be useful. If it strays away from being useful, then it no longer counts as the craft.\n\nI also found it to be thought-provoking because it brought up how people are truly in charge of how a problem gets solved. No one can force you to code something a certain way if they do not know a way to solve it on their own, which is why your role exists in the first place.\n\nThe pattern has caused me to change the way I think about my intended profession because your work can still reflect you in terms of creativity. As a person, I think I am more on the creative side and incorporating more ideas into creating something for people sounds pretty cool. If I had to follow a super rigorous structure, I may feel limited in what I can do to produce work that makes me happier.\n\nThe one thing I have to disagree with in the pattern is the part where it mentions that someone is suddenly no longer “part of the craft” if they deviate a little further. Who sets these boundaries? I do not want people to feel like they are not “enough” to be considered a real craftsman or whichever term it is referred it as just because they were being extra.\n\nOverall, I appreciated the action section which encouraged people to reflect on what projects they worked on or situations they may have found themselves in where they chose creativity over usefulness. At the moments where I have personally done so, I had felt more proud of my work, because I knew it was uniquely mine.\n\nDo You Hate Your Computer Too?\n\nSams Ships (3)Apparently doctors hate their computers, according to an article titled Why Doctors Hate Their Computers by Atul Gawande. Gawande started out the article by mentioning Epic, a company a lot of people know of because it is a leading provider of software for the healthcare industry. It’s funny because just the other day, a classmate who will not be named groaned when he heard Epic being mentioned by someone, as he works in a healthcare center.\n\nI found the reading was interesting because I have no intentions of becoming a medical doctor one day but was able to hear about how it is being one while interacting with technology that exists today.\n\nIt seems like the tension of logging everything caused the system to make doctors’ lives harder instead of easier; this was noticeable when Sadoughi was talking about how she had to look over all notes from different doctors including herself per patient. Instead of being able to just see what is going on right away; it would take up time to gather all information and even then it was not always helpful because some notes were different than others and became dated. And then work-life balance had to be thrown off a little because people had to spend extra time, up to hours after-hours to catch up with the system and review things from the day.\n\nThe real customer for the system seemed to be patients because they have some benefits from using the system like logging when to take medications or see how they are doing. Doctors are also able to monitor how they are doing and communicate with them by being pinged.\n\nThe lessons from this system do not only apply to Electronic Medical Record systems; they also apply to working in life because burnout can happen to anyone in the workforce. I thought it was interesting how one of the ways doctors were trying to save time and prevent burnout from technology was by hiring in-hospital scribes or even virtual scribes when necessary.\n\nThe reading has caused me to changing the way I think I will work based on if I ever end up creating software that affects people’s healthcare by considering how much time it takes to interact with it, no matter how “cool” or “innovative” it may be. In terms of the topic itself, the reading has caused me to think more about software that has altered people’s professions as a whole; which I thought of before but never this deeply.\n\nI do not disagree with anything in the reading for now as I do not personally know what it is like to work in a profession that is not traditionally non-technical and then gets transformed into something that relies on it.\n\n\nExpose Your Ignorance|| Sam’s Ships S.S.2\n\nSams Ships (1)For this next installment of the Apprenticeship Series, I wanted to discuss Expose Your Ignorance. This apprenticeship pattern involves being more direct with people to have the faster route on the road to journeyman instead of protecting one’s pride to find other ways to obtain the knowledge they are seeking. When someone exposes their ignorance, they will be able to learn more quickly instead of trying to appear like they are capable.\n\nBased on what I have learned of this pattern so far, my reaction is that it was useful seeing examples of how this happens in real life for people. To me, this was something I thought of before without putting it into a framework of sorts. I found that this was interesting because of the way they explained it saying, “One of the most important traits that a craftsman can possess is the ability to learn, identifying an area of ignorance and working to reduce it.” It shows how ignorance does not necessarily mean they are at fault of something, it just means they are willing to work to move past it.\n\nTaking this as a lesson to think about, the way I work will be pretty much the same. I once almost made a task over-complicated because I wanted to find my own way to work on it instead of just asking another developer for their opinion on whether I was doing something correctly. After deciding to ask for help thought, we figured out that there was a much more simple way of going about it instead of changing a whole system of developing a certain feature. Due to this, I have gained more confidence to ask people when I am uncertain about something because in the end it would save a lot more time and avoid confusion.\n\nI did not disagree with anything brought up in the pattern so far because I believe people should be able to communicate when they are not confident about something or at least ask for clarification. After some thinking, I realized I’ve never expected anyone to know everything so why should I feel like other people should expect the same from me?\n\nThe White Belt || Sam’s Ships S.S.1\n\nSams Ships.png\n\nSo you either want to or have already been an apprentice for software development huh? I just read the section on the apprenticeship pattern for The White Belt and it was a nice beginning to approach what we are doing. It reminds me of a quote: “In any given moment we have two options: to step forward into growth or back into safety.” This is us stepping out of our comfort zone as we approach real-life situations and try to help them by starting our journey into development.\n\nA summary of the pattern would be after some time of developing skills, someone may feel that their growth has plateau-d, however there still remains confidence in their abilities to do something. I found that this was interesting because as someone approaching a career where I will be a life-long learner of technology and ways to develop it, I never considered getting stuck or feeling like I was not getting somewhere.\n\nBased on what I have learned about the pattern, I think it will change the way I work based on their advice to set things we have previously learned aside in order to “unlearn what we have learned.” I like the idea of approaching something that is new to be able to fully appreciate it.\n\nI could relate to the situation they describe about sacrificing productivity in order to improve our skills. From on-boarding as a junior developer, it was a different experience trying to do self-learning while getting assigned tasks to work on at the same time. It was interesting trying to find a good divide between learning something while trying to develop things compared to using internet references.\n\nI agree with how they mentioned not basing everything you learn in other languages based on comparing it to a base language that you know. This made me realize how I have been doing this for a while; I sometimes forget that not everyone knows Java or a language that would seem “universal.” It would help take away the stress of thinking in a certain language’s syntax or process; allowing people to just code something that would work more efficiently and effectively.\n\nOverall, I would say that this pattern is nice to hear about in the beginning so people can approach it in a way that allows them to learn things with a fresh start to programming. I also just liked how they called it The White Belt so people can level up.\n\nAdapt or Git Left Behind?\n\nCS SERIES (15)As my last fall semester comes to a close, I wanted to write about an article on something pretty interesting I learned about in my software construction and design course.\n\nOn Stackify, Thorben Janssen wrote Design Patterns Explained–Adapter Pattern (with code examples). Overall, this article re-instilled how design patterns make it easier to write more well-structured and maintainable code.\n\nI found it useful to see how Janssen discussed the two different versions of the class adapter; the class adapter pattern (which implements the adapter using inheritance) and the object adapter pattern (which uses composition to reference an instance of the wrapped class within it).\n\nSimilar to how we learned the concept in class, something I appreciated is the “real-life” example or comparison used to describe the physical adapters we use when traveling. When we are traveling and do not have compatible power sockets, we must find a way to be able to charge our use our devices without having to change the whole make of it. A way of doing so is by using adapters; which does not change the overall product or device, it just allows you to be able to plug it in.\n\nAn situational example that I can think of when explaining adapters is if you have ever been zip-lining or done a ropes course (like Go Ape) where you are attached to a harness. When you are transferring from one line to another, you can use a metal contraption which helps guide you while connecting and disconnecting from paths. That metal contraption serves as an adapter, not changing what you are but allowing you to use something.\n\nI agree with what message Janssen is trying to express about how great design patterns are (the adapter pattern specifically) when it comes to writing code. His content allowed me to think about real life situations in code form when he introduced the basic and premium coffee machines to brew coffee using the adapter pattern. One of the best ways of learning concepts, in my opinion, is to compare it to a real-life situation and then show people visualizations to help them better understand what you are trying to explain and the article did both.\n\n\nTop 5oftware Architecture\n\nCS SERIES (13)When using architecture patterns, how will you know which one to choose? Peter Wayner, an independent author for TechBeacon takes five architectures that the majority of programs today use and broke them down into their strengths and weaknesses. Through this, it seems like he is hoping to guide users to selecting the most effective software architecture pattern for their needs.\n\nIf this article does not clear up enough information, Wayner also brings up a book, Software Architecture Patterns by Mark Richards, which focuses further on architectures commonly used to organize software systems.\n\nThe fives types discussed in the article are:\n\n • Layered (n-tier) architecture\n • Event-driven architecture\n • Microkernel architecture\n • Microservices architecture\n • Space-based architecture\n\nThe one I found most interesting is space-based architecture because at first when I thought of space, I was thinking of the other kind. The one with the sun and the stars and the moon. But then I realized–what does that have anything to do with software architecture? Space-based architecture is listed as “best for high-volume data like click streams and user logs” and I think this one is pretty important, especially during times like Black Friday and Cyber Monday. I personally experienced the frustration of not being able to access a site (adidas) due to high volume and it really does not help a business.\n\nAnother architecture I found thought-provoking is micro-services architecture because of the way Wayner introduced the concept, “[s]oftware can be like a baby elephant: It is cute and fun when it’s little, but once it gets big, it is difficult to steer and resistant to change.” The author providing an example of this made me think about how a site with so many users and things happening at once actually just had many different separate services but they were put together as one. I was a little surprised to think of Netflix in that way after all the times I’ve used it but it makes much more sense now.\n\nOverall, I found all of the information pretty useful and clear to understand as Wayner described what they were and then listed the caveats and what they were best for. I would recommend using this as a reference or quick review of common software architecture designs if someone needs it.", "pred_label": "__label__1", "pred_score_pos": 0.7983223795890808} {"content": "Last updated\n\nThành phố Vinh\nVinh City\n(from top left) above Ho Chi Minh Square, Vinh skyline behind ancient gate, Vinh post office, Ho Chi Minh square, downtown Vinh\nLocation of the provincial city in Vietnam\nCoordinates: 18°40′N105°40′E / 18.667°N 105.667°E / 18.667; 105.667\nCountryFlag of Vietnam.svg  Vietnam\nProvince Nghệ An Province\n  Total104.96 km2 (40.53 sq mi)\n  Density4,668.4/km2 (12,091/sq mi)\n\nVinh (Vietnamese:  [viŋ̟] ( Loudspeaker.svg listen )) is the biggest city and economic and cultural center of central Vietnam. Vinh is the capital of Nghệ An Province, and is a key point in the East–West economic corridor linking Myanmar, Thailand, Laos and Vietnam. The city is situated in the south-east of the province, alongside the Lam River (Song Lam) and is located on the main north-south transportation route of Vietnam, easily accessible by highway, railroad, boat and air. The recently expanded Vinh International Airport is served daily by three carriers: Vietnam Airlines, VietJet Air, and Jetstar Pacific. On September 5, 2008, it was upgraded from Grade-II city to Grade-I city, the fifth Grade-I city of Vietnam after Hai Phong, Đà Nẵng and Huế. Vinh is the most populous city in the North Central Coastal region, with over 490,000 residents (2015 estimate). The city is bordered by Nghi Loc district to the north and east, Hung Nguyen district to the west, and Nghi Xuan district in Hà Tĩnh Province to the south. Vinh is about 300 kilometres (190 mi) south of Hanoi and 1,400 kilometres (870 mi) north of Ho Chi Minh City. The total area of Vinh city is 104.97 square kilometres (40.53 sq mi), and includes 16 urban wards and 9 suburban communes.\n\nNghệ An Province Province in North Central Coast, Vietnam\n\nNghệ An is a province in the North Central Coast region of Vietnam. It is Vietnam's largest province by area. Nghệ An is located in a central position in North Central Coast. To the east lies the Gulf of Tonkin; to the west the province is bordered by Laos; to the south Hà Tĩnh Province; and to the north is Thanh Hóa Province. It is located on the east–west economic corridor connecting Myanmar, Thailand, Laos and Vietnam along National Route 7 to the port of Cửa Lò.\n\nMyanmar Republic in Southeast Asia\n\nMyanmar, officially the Republic of the Union of Myanmar, and also known as Burma, is a country in Southeast Asia. Myanmar is bordered by India and Bangladesh to its west, Thailand and Laos to its east and China to its north and northeast. Myanmar is the largest of the mainland Southeast Asian states. To its south, about one third of Myanmar's total perimeter of 5,876 km (3,651 mi) forms an uninterrupted coastline of 1,930 km (1,200 mi) along the Bay of Bengal and the Andaman Sea. The country's 2014 census counted the population to be 51 million people. As of 2017, the population is about 54 million. Myanmar is 676,578 square kilometres in size. Its capital city is Naypyidaw, and its largest city is Yangon (Rangoon). Myanmar has been a member of the Association of Southeast Asian Nations (ASEAN) since 1997.\n\nThailand Constitutional monarchy in Southeast Asia\n\n\n\n\nThe service sector comprises the largest part of Vinh's economy, with around 55% of the working population being employed in this area. This is followed by the industrial sector (around 30%) and the agriculture, forestry, and fishing sectors (around 15%). Vinh is an important transportation hub, having a key position on the route between the northern and southern parts of the country, and is also a notable port.\n\n\nVinh was originally known as Ke Van. Later, this successively became Ke Vinh, Vinh Giang, Vinh Doanh, and then Vinh Thi. Eventually, in 1789, the official name became simply Vinh, probably under European influence. The name has remained the same ever since. At various times, Vinh has been of considerable military and political significance. The Vietnamese nation began in the north, and only gradually expanded to cover its current territories – as such, Vinh was sometimes seen as a \"gateway to the south\".\n\nThe Tây Sơn dynasty (1788–1802) is believed to have considered Vinh as a possible capital of Vietnam, but the short duration of the dynasty meant that any plans did not come to fruition. Tây Sơn interest in the city did, however, result in considerable construction and development there. Under French rule of Vietnam, Vinh was further developed as an industrial center, and became well known for its factories.\n\nTây Sơn dynasty dynasty\n\nThe name Tây Sơn is used in Vietnamese history in various ways to refer to the period of peasant rebellions and decentralized dynasties established between the end of the figurehead Lê dynasty in 1770 and the beginning of the Nguyễn dynasty in 1802. The name of the rebel leaders' home district, Tây Sơn, came to be applied to the leaders themselves, their uprising or their rule.\n\nHistorically, Vinh and its surrounding areas have often been important centers of rebellion and revolutionary activity. In the 19th century and the early 20th century, the city was the center of several prominent uprisings against the French. In addition, a number of notable revolutionary figures were born in or near the city of Vinh, including Nguyễn Du, Phan Bội Châu, Trần Trọng Kim, Nguyễn Thị Minh Khai, and Hồ Chí Minh.\n\nNguyễn Du Vietnamese poet\n\nNguyễn Du, pen names Tố Như and Thanh Hiên, is a celebrated Vietnamese poet who wrote in chữ nôm, the ancient writing script of Vietnam. He is most known for writing the epic poem The Tale of Kiều.\n\nPhan Bội Châu Vietnamese revolutionary\n\nPhan Bội Châu was a pioneer of Vietnamese 20th century nationalism. In 1903, he formed a revolutionary organization called the “Reformer\"(Duy Tân hội). From 1905 to 1908, he lived in Japan where he wrote political tracts calling for the independence of Vietnam from French colonial rule. After being forced to leave Japan, he moved to China where he was influenced by Sun Yat-sen. He formed a new group called the “Vietnamese Restoration League”, modeled after Sun Yat-sen's republican party. In 1925, French agents seized him in Shanghai. He was convicted of treason and spent the rest of his life under house arrest in Huế.\n\nTrần Trọng Kim Vietnamese Prime Minister\n\nTrần Trọng Kim, courtesy name Lệ Thần, was a Vietnamese scholar and politician who served as the Prime Minister of the short-lived Empire of Vietnam, a state established with the support of Imperial Japan in 1945 after Japan had seized direct control of Vietnam from the Vichy French colonial forces during the Second World War. He was an uncle of Bui Diem.\n\nThe city of Vinh was once the site of a number of significant historic sites, particularly an ancient citadel. Over the years, however, Vinh has been extensively damaged in a number of wars. In the 1950s, fighting between the French colonial powers and the Việt Minh resistance forces destroyed much of the city, and further damage was done by United States bombing in the Vietnam War. As such, little of the original city remains today. The reconstruction of Vinh borrowed heavily on Soviet and East German ideas about town planning – the city is noted for its wide streets and its rows of concrete apartment blocks.\n\nVietnam War 1955–1975 conflict in Vietnam\n\nThe Vietnam War, also known as the Second Indochina War, and in Vietnam as the Resistance War Against America or simply the American War, was a conflict in Vietnam, Laos, and Cambodia from 1 November 1955 to the fall of Saigon on 30 April 1975. It was the second of the Indochina Wars and was officially fought between North Vietnam and South Vietnam. North Vietnam was supported by the Soviet Union, China, and other communist allies; South Vietnam was supported by the United States, South Korea, the Philippines, Australia, Thailand and other anti-communist allies. The war, considered a Cold War-era proxy war by some, lasted 19 years, with direct U.S. involvement ending in 1973, and included the Laotian Civil War and the Cambodian Civil War, which ended with all three countries becoming communist in 1975.\n\nSoviet Union 1922–1991 country in Europe and Asia\n\nThe Soviet Union, officially known as the Union of Soviet Socialist Republics (USSR), was a federal sovereign state in northern Eurasia that existed from 1922 to 1991. Nominally a union of multiple national Soviet republics, in practice its government and economy were highly centralized. The country was a one-party state, governed by the Communist Party with Moscow as its capital in its largest republic, the Russian Soviet Federative Socialist Republic. Other major urban centers were Leningrad, Kiev, Minsk, Tashkent, Alma-Ata, and Novosibirsk. It spanned over 10,000 kilometers (6,200 mi) east to west across 11 time zones, and over 7,200 kilometers (4,500 mi) north to south. Its territory included much of Eastern Europe, as well as part of Northern Europe and all of Northern and Central Asia. It had five climate zones: tundra, taiga, steppes, desert and mountains.\n\nEast Germany Former communist state, 1949-1990\n\n\n\nVinh and Nghe An province are rapidly growing tourist destinations on the North Central Coast of Vietnam, and are home to various attractions. The city features several unique sites including Song Lam (Light Blue River), Ho Chi Minh Square, Phuong Hoang Trung Do (Phoenix Capital with Quang Trung King Temple), Dung Quyet Mountain with picturesque and breathtaking scenery of the Lam River, Hong Linh Mountain Rank and East Vietnam Sea. President Ho Chi Minh's hometown, Kim Lien, is 10 kilometres (6.2 mi) west of Vinh in Nam Dan district. Cửa Lò beach is 15 kilometres (9.3 mi) east of the center of the city, it is one of the most beautiful beaches in Vietnam.\n\nCửa Lò Town in Nghệ An, Vietnam\n\nCửa Lò is a town district of Nghệ An Province, in the North Central Coast region of Vietnam. As of 2003 the district had a population of 46,185. The district covers an area of 28 km² and it is located 290 km south of Hanoi, 1400 km north of Ho Chi Minh City and 16 km northeast of Vinh City. Cửa Lò has one of the most beautiful beaches in Vietnam, and, due to its scenery, fine white sand, slopes and moderate salinity, it attracts both domestic and foreign tourists.\n\nTourists can visit Hon Ngu island, the island is 4 km offshore. It consists of 2 islands: the larger stands at 133 metres (436 ft) above sea level and the smaller at 88 metres (289 ft). Pù Mát National Park, one of the largest and most well-preserved national parks in Vietnam, is located 120 kilometres (75 mi) west of Vinh. A local tour company offers guided tours of Pu Mat in English or Vietnamese, with the chance to explore Khe Kem Waterfall, Giang River boat trip, Pha Lai Dam, and “Sang Le” Forest.\n\nPù Mát National Park\n\nPù Mát National Park is a national park in Nghệ An Province, in Vietnam's North Central Coast region. It is part of the Western Nghệ An Biosphere Reserve.\n\nNguyễn Du' homeland is 5 kilometres (3.1 mi) South of Vinh. He was a famous poem in the world with The Tale of Kieu .\n\n\n\nCharacteristics: Museum displaying relics and documents during the Xo Viet Nghe Tinh highs 1930-1931. This is a unique cultural works preserve over 5,000 original artefacts and documents express the spirit of the unyielding revolution of Nghe Tinh people in the Soviet highs 1930-1931. The museum was built in 1960 on a beautiful campus. The museum attracts a large number of domestic and foreign visitors. In front of the Museum, there is a vestiges where President Ho Chi Minh talked with officials and people of Nghe An when he visited the country in 1957 and the Vinh City Stadium. Behind the museum is a deep ditch surrounded. On the right is Ta Gate, on the left door of the ancient Vinh. This is the place where the original artefacts and the original image of the local movement and collections such as the drums used in the struggle, the collection of publications, the weapons collection, the collection of children The collection and artefacts of the Party cadres ... and a list of systems of 49 vestiges of the Soviet Union in Nghe An province are classified by the Ministry of Culture and Information as national historical monuments.\n\nThe museum has displayed in detail the formation and development of Nghe An inhabitants during the period of history from the ancient Vietnamese who left traces at Tham Tham, Quy Chau district, thousand years, to residents of the culture of Son Vi and Hoa Binh (from 200 thousand years to 9 thousand years ago) and continuously to this day. The history of Nghe An has been richly presented.\n\n\n\nThere are some unique dishes originating in Vinh and the surrounding areas in Nghe An and Ha Tinh, including cháo lươn (spicy eel soup), bánh mướt (steamed rice rolls), kẹo Cu Đơ (peanut rice paper candy), Vinh orange.\n\n\nMany houses in Vinh have a unique style, heavily influenced by the climate of the region. Many houses have a dome, and a taijitu sign.\n\nA typical house in Vinh, with dome and taijitu sign Vinh Architecture 2.jpg\nA typical house in Vinh, with dome and taijitu sign\nTypical architecture Vinh Architecture 1.jpg\nTypical architecture\n\n\nVinh locals are warm and hospitable, and often go at length to make visitors feel welcome. Children and adults alike are always enthusiastic and cheerful when meeting foreigners. Vinh and Nghe An locals maintain very strong cultural traditions that are a part of their provincial and national identity.\n\nNotable sites\n\nA street in Vinh. Vinh City.jpg\nA street in Vinh.\nA street in Vinh by night A street in Vinh by night.JPG\nA street in Vinh by night\n\nOther notable tourist attractions are the Hong Son Temple and Quyet Mountain. Hong Son Temple is one of the few large temples to escape the closures implemented by the Communist authorities after the war, and is the site of an important festival on the 20th day of the 8th lunar month. Quyet Mountain, on the edge of Vinh, is used as a peaceful retreat from the city, with visitors climbing four hundred steps to the summit. From the summit, the whole of Vinh may be seen, along with the river and farmland surrounding it. The mountain is covered with pine trees, although the forest is still not completely recovered from its destruction by bombing during the war. Other places of interest include the Nghệ Tĩnh Soviet Museum (commemorating the major Nghệ An uprising against the French in the 1930s) and the Cửa Lò beach resort (a popular destination for citizens of Hanoi). [ citation needed ]\n\n\n\nVinh International Airport, located at 5 kilometres (3.1 mi) North from the city center, is the fifth busiest airport in Vietnam. The airport has domestic connections to Hồ Chí Minh City, Hà Nội, Đà Nẵng, Buôn Ma Thuột, Đà Lạt, Nha Trang and Pleiku.\n\n\n\n\nVinh Station is a major station along the North–South Railway.\n\nBus system\n\nThere many bus routes in the inner city, neighborhood\n\nIndustrial zone\n\nPublic transportation network\n\nIn Vinh are three bus stations:\n\n\nClimate data for Vinh\nRecord high °C (°F)34.9\nAverage high °C (°F)20.4\nDaily mean °C (°F)17.5\nAverage low °C (°F)15.6\nRecord low °C (°F)4.0\nAverage precipitation mm (inches)52\nAverage precipitation days13.114.414.\nAverage relative humidity (%)89.391.291.088.581.575.673.479.786.087.386.386.184.6\nMean monthly sunshine hours 754972135220204229196166140103871,677\nSource: Vietnam Institute for Building Science and Technology [2]\n\nSister cities\n\nRelated Research Articles\n\nProvinces of Vietnam type of administrative division in Vietnam\n\nOn the First Tier, Vietnam is divided into 58 provinces and 5 municipalities. Municipalities are the highest-ranked cities in Vietnam. Municipality are centrally-controlled cities and have special status equal to the provinces.\n\nSóc Trăng Province Province in Mekong Delta, Vietnam\n\nSóc Trăng is a province in the Mekong Delta of southern Vietnam, with its capital in Sóc Trăng. The province occupies an area of 3,223 km², and has a population of approximately 1,213,400.\n\nTiền Giang Province Province in Mekong Delta, Vietnam\n\nTiền Giang is a province in the Mekong Delta region of southern Vietnam.\n\nThái Nguyên City in Thái Nguyên Province, Vietnam\n\nThái Nguyên is a city and municipality in Vietnam. It is the capital and largest city of Thái Nguyên Province. The city is listed as a first class city and is the ninth largest city in Vietnam. It has long been famous throughout Vietnam for its tea. In 1959 it became the site of Vietnam's first steel mill, and is now home to a large and growing major regional university complex.\n\nIndochinese Communist Party\n\nThe Indochinese Communist Party was a political party which was transformed from the old Vietnamese Communist Party in October 1930. This party dissolved itself on 11 November 1945.\n\nRạch Giá City in Kiên Giang, Vietnam\n\nRạch Giá is a provincial city and the capital city of Kien Giang Province, Vietnam. It is located on the eastern coast of the Gulf of Thailand, 250 kilometres (160 mi) south-west of Ho Chi Minh City. East of city, it borders Tân Hiệp and Châu Thành town, the Gulf of Thailand is to the west and surrounds some parts of the city, south of the city is Châu Thành and An Biên town, northward it borders Hòn Đất and Tân Hiệp.\n\nChâu Đốc City in An Giang Province, Vietnam\n\nChâu Đốc is a city in An Giang Province, bordering Cambodia, in the Mekong Delta region of Vietnam. As of 2013, the city had a population of 157,298, and cover an area of 105.29 square kilometres (40.65 sq mi).\n\nNational Route 1A (Vietnam) road in Vietnam\n\nNational Route 1A is the trans-Vietnam highway. The route begins at km 0 at Huu Nghi Quan Border Gate near the China-Vietnam border. The route ends at at Năm Căn township in Cà Mau Province.\n\nDistrict 1, Ho Chi Minh City Urban district in Ho Chi Minh City, Vietnam\n\nDistrict 1 is the central urban district of Ho Chi Minh City, the largest city in Vietnam. With a total area of 7.7211 km2 (2.9811 sq mi) the district has a population of 204,899 people as of 2010. The district is divided into 10 small subsets which are called wards (phường). District 1 contains most of the city's administrative offices, consulates, and large buildings. District 1 is the busiest district in the city with the highest living standards. Đồng Khởi street and Nguyễn Huệ boulevard in District 1 are the city's two main commercial centers. Đồng Khởi street is an area in high demand for real estate, hitting a record price of $50,000 per square meter in 2007.\n\nVương Trung Hiếu Vietnamese writer\n\nVương Trung Hiếu is a Vietnamese fiction writer, journalist, translator, and interdisciplinary scholar. He is the author of more than two hundred books. Many of his works are published under the pseudonym Thoai Son.\n\nTrần Văn Cung Vietnamese politician\n\nTrần Văn Cung was a Vietnamese revolutionary, who was the secretary of the first communist cell in Vietnam.\n\nThe Lục Tỉnh Tân Văn was a Vietnamese newspaper published in Saigon. Although the title was Sino-Vietnamese, the newspaper was one of the first non-Catholic papers to use the Latin quốc ngữ script.\n\nSix Provinces of Southern Vietnam\n\nThe Six Provinces of Southern Vietnam is the historical name for a particular region of Southern Vietnam which is referred to in French as Basse-Cochinchine.. The region was politically defined and established after the independence of the Nguyễn dynasty, and lasted from 1832, when Emperor Minh Mạng introduced administrative reforms, to 1867, which culminated in the eight-year French campaign to conquer the Six Provinces.\n\nPhan Đăng Lưu Vietnamese politician\n\nPhan Đăng Lưu was a prominent 20th century Vietnamese revolutionary, politician, intellectual and journalist.\n\nHồ Văn Trung\n\nHồ Văn Trung was a Vietnamese writer.\n\n\n 2. \"Vietnam Building Code Natural Physical & Climatic Data for Construction\" (PDF). Vietnam Institute for Building Science and Technology. Archived from the original (PDF) on 22 July 2018. Retrieved 31 July 2018.\n\n", "pred_label": "__label__1", "pred_score_pos": 0.9439611434936523} {"content": "Plan A Visit\n\nWe're looking forward to meeting you!\n\nwomen volunteers standing by new guest signage\n\nCan a big church feel like your church? We think so.  So does Matt:\n\n\"I love everything about Woodstock City Church. Aside from the incredible service and small groups, they do so much good for the community. People around Canton and Woodstock are more courteous and kind to each other. Thank you.\"", "pred_label": "__label__1", "pred_score_pos": 0.573011577129364} {"content": "How to Practice Chakra Meditation\n\nLearn how to practice chakra meditation from yoga instructor Lisa Dawn Angerame in this Howcast video.\n\n\nHi, I'm Lisa Dawn Angerame. I'm one of the founding partners of Nava NYC. A collective of nine yoga and meditation teachers in New York City. Our website is www.navanyc.com. Today, I will be talking to you about meditation.\nChakra meditation is a very powerful meditation practice. It enables us to release blockages in different psychological areas of our life. The chakras are areas of nerveplexes that move up the spine from the base of the spine to the crown of the head. They represent different things. From the bottom, it's food, clothing, shelter, basic needs. Then it moves to our romantic and creative relationships. Then up to the ego. Then to our heart, to our throat, to our third eye, and then to our crown of the head which is the connection to the universe. When you sit to meditate on your chakras, begin at the base of your spine.\n\nSo first when you close your eyes, bring your attention to that area. Then begin to acknowledge the representation that that chakra is. In the case of your base chakra, it is food clothing and shelter. If there are any issues in that area of your life, release it, and let it go. Then move up to your relationships with your partner or your creative relationships, your business relationships and acknowledge what's going on there and let it go. Then move up to your ego, are there any issues there? Acknowledge them and let them go. Up to your heart, are you feeling tight there, disconnected? Acknowledge it, and let it go. To your throat, is there any constriction there?\n\nLike you feel like you're not able to speak your mind. Acknowledge it, let it go. Move up to your third eye, right in between your eyebrows. This is your intuition, acknowledge it, let it go. Finally reach up to the crown of your head. This is your connection to the universe. If there are any issues there, acknowledge it, and let it go. And over time with this kind of focus, you'll begin to release yourself of anything that's holding you back from feeling comfortable and secure in those areas. You will be able to feel comfortable with the way you're living, how you're making your money, how your ego is in check in your life. Your heart is open, your voice is pure, you're following your intuition and you're connected to the universe. Chakra meditation can free you from all the blockages in these areas.\n\nPopular Categories", "pred_label": "__label__1", "pred_score_pos": 0.9445995092391968} {"content": "Even though many people would prefer to have little debt, the reality is that there are many ways that debt can quickly pile up and begin to cause you considerable stress and hardship. Medical debt is one of the common culprits of financial challenges because medical bills can be exorbitant and many people find themselves unable to work for a significant period of time after a medical emergency. While it is easy to feel overwhelmed and think that there is no solution, this is not true. In fact, in the majority of cases, there is not only at least one solution but a range of non-bankruptcy remedies that have the potential to provide valuable debt relief.\n\nWhile bankruptcy can be an extremely effective form of debt relief for some consumers, it is not always available to everyone. Additionally, there may be other options that are better-suited for your particular situation. There are many common-sense solutions that can help restructure or eliminate debt to put you in a better situation. Over the years, we have worked with many different consumers and their creditors, which has given us the experience and relationships we need to help consumers resolve their financial challenges and secure debt relief.\n\nMortgage modifications are one form of debt relief that can prevent consumers who are struggling with burdensome debt from losing their homes. When you have a mortgage, even one missed payment can set you up for foreclosure if the lender chooses to initiate a foreclosure action. Because we are experienced negotiators, however, we have been able to work with banks and lenders to negotiate a mortgage modification that enables a homeowner to get back on track and avoid foreclosure.\n\nIn terms of credit card debt, negotiating an account settlement can also be very effective. In many cases, it is possible to discuss options with credit card companies and arrive at an agreement where a consumer pays only a portion of the original balance owed. This can be an effective form of debt relief for consumers who have enough income to meet their day-to-day expenses, if only they are able to overcome lingering debt obligations. For more information about how we have helped consumers like you, please visit our website on debt workouts and other debt relief remedies.", "pred_label": "__label__1", "pred_score_pos": 0.9934059381484985} {"content": "The Mystical and Archetypal Nature of a “Heavenly Book” and Joseph Smith’s “Gold Plates”\n\nA tradition of a \"heavenly book\" runs through many traditions, including Mormonism with its \"gold plates.\" What spiritual reality might these traditions be pointing to?\n\nInfographic—The Perennial Cycle of Religions: Mysticism to Politics v1.0\n\n\nWhat is “Seeing” Christ? An Interspiritual, Mystical, and Psychospiritual Perspective\n\nIs it seeing a man with brown hair, a beard, and a white robe? Or is there much more to the \"Christ\" than this?\n\nThe Perennial Cycle from Mysticism to Religion to Politics\n\n\nAn Introduction to the BHT Translation of Joseph Smith’s First Vision\n\nI introduce a new translation of Joseph Smith's First Vision, giving some background to this interpretation of his mystical experience, the nature of translation, its pseudepigraphal nature, how it was done, and more.\n\nKen Wilber’s Fallacious “pre/trans fallacy” and the Condescension of Children\n\nThis fallacy says that people mistakenly believe that children are connected to the Divine in a similar way as those mystics who transcend ego. I don't think this is mistaken at all.\n\nOn Lineages and Transmissions of Mystical Knowledge and Spiritual Power\n\nCan mysticism or spirituality be transmitted from one person to another? I suggest yes and no.\n\nNihilism in the Light of Mystical Experience\n\nNihilism is a philosophy that says that life is meaningless. It says there is no objective meaning, intrinsic value, or purpose in life. What does mysticism and the mystical experience say about that?", "pred_label": "__label__1", "pred_score_pos": 0.9310845732688904} {"content": "Support the news\n\nYear in Review: Immigration\n\nThis article is more than 11 years old.\n\nIt's been a notable year for immigration reform in the Bay State. In March, the federal raid on a military gear factory in New Bedford made national headlines, and communities are struggling with how or whether to enforce immigration laws.\n\nWBUR's Bianca Vazquez Toness talks about the incidents and outcomes for the state's immigration policies in 2007.\n\nThis program aired on December 28, 2007. The audio for this program is not available.\n\n+Join the discussion\n\nSupport the news", "pred_label": "__label__1", "pred_score_pos": 0.5872520208358765} {"content": "01447nam a22002417a 4500003000800000005001700008008004100025020001800066040001200084072000800096088001700104100002100121245011100142260005900253300003600312520065900348650003901007650004401046650003301090655003201123655002801155655002201183\u001eNmSfBBM\u001e20181213111849.0\u001e181030b ||||| |||| 00| 0 eng d\u001e \u001fa9781432844370\u001e \u001fcNmSfBBM\u001e \u001faFIC\u001e \u001faBQ-Summer 19\u001e1 \u001faAllende, Isabel.\u001e10\u001faIn the midst of winter /\u001fh[large print]\u001fcIsabel Allende ; translated by Nick Caistor and Amanda Hopkinson.\u001e \u001faWaterville, Maine : \u001fbThorndike Press, \u001fc2018. ©2017.\u001e \u001fa469 p. (large print) ; \u001fc21 cm.\u001e \u001faIn the middle of a snowstorm in Brooklyn, 60-year-old human rights scholar Richard Bowmaster hits the car of Evelyn Ortega, a young, undocumented immigrant from Guatemala. What at first seems just a small inconvenience takes a far more serious turn when Evelyn turns up at the professor's house seeking help. At a loss, the professor asks his tenant Lucia Maraz, a 62-year-old lecturer from Chile, for her advice. These three very different people are brought together in a story that moves from present-day Brooklyn to Guatemala in the recent past to 1970s Chile and Brazil, sparking the beginning of a long overdue love story between Richard and Lucia.\u001e 0\u001faLove in middle age \u001fvFiction. \u001e 0\u001faInterpersonal relations \u001fvFiction. \u001e 0\u001faCollege teachers \u001fvFiction. \u001e 7\u001f2gsafd\u001faHistorical fiction. \u001e 7\u001f2gsafd\u001faRomance fiction.\u001e 7\u001faLarge type books.", "pred_label": "__label__1", "pred_score_pos": 0.935829222202301} {"content": "Basketball Shoe Tips For Novices And Pros\n\nIf you would like to know more about basketball in general, then you are going to find out some helpful tips by reading this article. Perhaps you wish you could play more like the pros. Well, it takes having the right knowledge about the game and putting it to practice. Keep reading to find out what you need to know.\n\nDribble the ball correctly. Use fingertips to dribble. When you do this you will have more control over the ball. Avoid dribbling in front of you and only dribble to the sides of your body. Don't look down, always look up.\n\nTeach yourself to throw bounce passes correctly. If done properly, the pass will land near waist level with the opposite player. Remember you should bounce the ball approximately three-quarters of the distance between yourself and the receiving player. There are, however, other factors that influence the pass.\n\n\nMake sure you have prepared for your games by taking care of yourself. Don't see your team short by staying up all night, eating junk food before games or skipping practice because you have things you would rather do. make a commitment to your team by being there for the team on the court and off the court.\n\nWhen exercise, concentrate on perfecting footwork and strengthening your core muscles. With a stronger core, you'll be able to balance better. Your muscles in your buttocks, hips, abdomen, and back should be worked. Your speed and footwork can be improved by jumping rope.\n\nAlways know where the other players are, both on your team and the opposition. You need to know who is close enough to steal the ball from you, who you can pass to and who might be able to rebound if you miss. Staying on top of the game means knowing the lay of the land.\n\nBe aware of your own actions and the position of your feet. Just touching the baseline is going to get you called out of bounds. Not dribbling when you take more than a few steps will result in a walking call as well as a forfeit of the ball. A foul will result if you try to take a charge or set a pick and your feet are moving.\n\nAlways know what spots on the court players are good at scoring from. You want to know this about yourself so you can make high percentage shots. You want to know this about teammates so you can pass the ball to them when they are in a killspot and open. When possible, know this about opponents in order to defend them better.\n\nTo get offensive rebounds in basketball, you have to learn how to follow the basketball off the rim. Get used to watching people shoot, and see how the ball caroms off. Then get used to anticipating those bounces, so you can get around the defender before he even thinks to box you out.\n\nWhen you are passing the ball, get used to looking in the other direction. This may confuse your opponents, greatly. This will give the person that you passed the ball to a chance to make their move before your opponent can correct from their mix up. When done smoothly it can be a game changer.\n\n\nHopefully, you are ready to use the information that has been described here. While you certainly do not become the best basketball player overnight, you definitely can start improving with what you've read. So, get your basketball attire on and head to the basketball court to see what you've got!\n\nHere at Best Basketball Club, you will find the most reliable, on-point, and fun facts about your favorite basketball teams and with what's going on with the sport per se.", "pred_label": "__label__1", "pred_score_pos": 0.8194558620452881} {"content": "Clever Computing\n\nThe possibility of intelligence in the inorganic world has been a fascination to man dating back at least to ancient Greece when mythical beings of bronze and ivory protected islands and seduced men. Now, a couple thousand years later, we are rapidly closing the gap between these myths and reality. The possibility of developing a computerized mind accompanied the advent of computing science in the early-to-mid 20th century, and in 1956 the formal study of this subject was born here in Hanover at the Dartmouth Summer Research Project on Artificial Intelligence.\n\nGoogle’s victory over the world champion Go player in March marks the latest in a series of publicity stunts that have tracked the rapid advancement of artificial intelligence (AI). Previous such displays have included IBM’s triumphs in chess with their computer Deep Blue and Jeopardy! with Watson.\n\nThese events may seem to be all fun and games on the surface, but there is a dramatic shift in the AI industry that is taking place behind the scenes. According to Quid, a data firm, spending on AI deals by tech giants like Facebook, Google, Microsoft and Baidu quadrupled between 2010 and 2015. This spending spike is symptomatic of a high stakes race among tech companies to become the preeminent supplier and developer of AI technology, which promises to be the platform of the future much like the PC operating system and Google’s search engine were before.\n\nTo build an artificial brain computer scientists need real ones, which has made human capital the most precious and therefore most aggressively pursued resource in this clash of the tech titans. This explosion in demand for AI talent has created fears of a brain-drain at America’s most elite universities. In the “AI Winter” of the 1980’s and 1990’s when the research being done wasn’t nearly as marketable, the best and brightest in the field found academia to be the most welcoming and lucrative option. Now, however, professors are finding it hard to hold on to their grad-students who are being lured away, even before they graduate, by million-dollar salaries – the promise of making a tangible impact and freedom from a world of uncertain academic funding. As Andrew Moore, the dean of Carnegie Mellon University’s computer-science department, stated in a recent Economist article, this phenomenon raises concerns about a possible “seed corn” problem that drained many top universities of the very resources necessary to produce the next generation of talent. Yet, these same salaries that are so effectively luring talent out of academia ought to lure talent into it. After all, it is in the best interest of the tech companies to maintain a sufficient pool of talent from which to draw.\n\nIf the development of superior AI is a race, what does it mean to win? Given the nature of AI, this is a loaded question. Because an artificial intelligence system would learn and improve upon itself, the better system would do so more quickly than its competitors leading to a snowball effect that could quickly lead to a drastic imbalance in the industry. This combined with the existential and moral concerns attached to the field has lead some big names in the industry, like Elon Musk, to take precaution in preventing a single entity from gaining too much power. Musk went about this by pledging $1 billion along with other donors to fund OpenAI, a non-profit research organization whose goal is “to advance digital intelligence in the way that is most likely to benefit humanity as a whole, unconstrained by a need to generate financial return.”\n\nSo who among the tech titans appears to pose the greatest threat of becoming the AI hegemon? Given its track record, it is likely no surprise that the perennial powerhouse Google is developing a convincing lead in the field. Not only is it well-equipped with the capital and infrastructure to pursue such an economy of scope but it has also demonstrated impressive foresight and instinct in their approach to the issue. As one of the first tech conglomerates to dip their toes into AI, Google recruited Stanford researcher Andrew Ng in 2011, providing him the funding and freedom to pursue advancements in the field of “deep learning” and therein kick-starting the project known as “Google Brain.” Deep learning is a method for machine-learning based on the construction of artificial “neural networks” that mimic the functioning of the human brain.\n\nThis method is superior to others in that it is a general-purpose technology that can be applied to myriad specific tasks using a singular algorithm for processing and learning from data. Of course, Google wouldn’t dare put all its eggs in one basket and in early 2014 supplemented their AI efforts with the purchase of DeepMind. Reportedly shelling out some $600 million for the firm, Google incubated the efforts of Demis Hassabis, DeepMind’s founder, in his quest to “solve” artificial intelligence using a method known as reinforcement learning. AlphaGo, the software that recently beat the world champion at Go, is based on this technique. Not only is Google leading the way in terms of developing the underlying software for AI, but it is also making considerable inroads in applying these technologies. According to the California DMV, as of March 1, 2016 Google has 73 test-permits for self-driving cars compared to Tesla’s eight (the second most in the state).\n\nWhile some like Elon Musk and Stephen Hawking have voiced their concerns about the existential threat of rapidly advancing AI, there are more salient concerns to be had about its impact on our lives. The heart and soul of AI in its current applications are data. For example, the machine-learning aspects of the software behind Google’s targeted advertising are based on collecting information about users’ day-to-day online behavior. As the applications of AI expand into areas such as self-driving cars, the amount of data collected about consumers and thier behaviors will skyrocket. Then these machine-learning algorithms will be processing oceans of data regarding daily travel habits including things like where everyday people eat, shop, work, etc. Giving away the control over a car may influence someone’s future travel based on marketing tools like corporate sponsorship without the consumer’s awareness. The car will likely even listen to passengers’ conversations. As The Atlantic’s Adrienne LaFrance put it, “In this near-future filled with self-driving cars, the price of convenience is surveillance.”\n\nAI has a profound potential to benefit humanity but we must also respect its potentially adverse manifestation. Clearly there must be regulation of the means, methods and motivations behind the technology’s advancement but we must be careful not to stifle its progress. The world has reached an inflection point in terms of artificial intelligence and its future will be a balancing act at the pace of Moore’s law.", "pred_label": "__label__1", "pred_score_pos": 0.6404356956481934} {"content": "Eraser not erasing\n\n\n\nI'm new to this forum and apologize if my question is out of line.\n\nI've tried to use Eraser 5.7 to wipe the unused space on my hard drive using both scheduler and on demand. I've run it many times but seem to get nothing but \"Possible Failures\". When I use a program to view the unused portion of my hard drive, I find that very little has been removed. What am I doing wrong? My O/S is Windows-XP Home Ed. and my browser is Firefox 1.0.", "pred_label": "__label__1", "pred_score_pos": 0.9957008361816406} {"content": "Fastnachtssitzung “Die Spinner”\n\nFastnachtssitzung, “Die Spinner”, Wiesbaden Tattersaal, 14.01.2012\n\n\nSilvia Gerhards\n\nHallo Joa\ndein Auftritt an unserer Sitzung war wieder mega geil. Die Stimmung war super, der Saal hat getobt. So machts Spaß.\nFreun uns shon auf den fastnactssonntagszug mit dir. Zug Nr 60-64. wir sehn uns\n\nlg silvia und alle vom Spinner-Komitee\n\n\n\n\nNice to be here…[...]Identifying and environment your goals can play a very vital role in movniatitg you to understand your imaginative and prescient for the long run. Goal surroundings helps you to make a selection the place you want to pass in existence and what you…\n\nSag was dazu", "pred_label": "__label__1", "pred_score_pos": 0.7168803215026855} {"content": "Have you ever had a friend who worked as a professional fundraiser who approached you about a (major) gift for an organization that you don't normally support? \n\nSince this hasn't happened to me yet, I'm not sure how it feels - was it uncomfortable? completely welcome?\n\nWhat I have seen before are charities who ask about a fundraiser's personal connections in the donor community. \"Did you work with donor X in previous role and would you be able to approach them and others on behalf of new charity?\" To me, that question is a huge red-flag for me as a professional.\n\nTo be honest, I'm not sure what others have experienced and whether my position is the correct one, but I want to share my own thoughts on this - with the strong caveat that what I'm talking about here is a very small number of charities and fundraisers/consultants and I'm mainly focused on significant donations.\n\n\nIt's not easy to find the right fundraiser or consultant. You are looking to hire someone who is not only professionally competent (in a profession that is not always well-understood by the general public) but who can represent a cause-based brand in a compelling way. \n\nI would suggest to organizations that they should be looking for a fundraiser who is extremely well-connected. BUT, the key here is in which circle.\n\nFundraisers with lots of personal friends are not as valuable for your organization as fundraisers with lots of professional connections in the non-profit sector. LinkedIn is a good place to glimpse at this network, but don't forget to dig deeper and look at relevance of contacts vs. sheer number. My development contacts on the site are more important in this case than my mortgage broker.\n\nA strong professional network means that the person can grab legal information, a second opinion on a strategy or a form/template/document in minutes. This helps me to do my work better, faster and cheaper and to understand how I can keep the organization I represent operating within the standards set by the non-profit industry nationally.\n\nPersonal friends, and even powerful or wealthy ones, might give for a time to causes I ask them to support, but ultimately, they are giving to support me rather than the organization. How many times have we seen organizations that were 'on a roll' with their programs until that 'great fundraiser who knew everyone' moved on along with his/her rolodex?\n\nCharities should be looking for individuals who will take a look at the donors, volunteers and advocates that they already have and the new friends they might want to make and be able to identify, sort, initiate, build and manage those friendships. When I see a list of existing donors that have not been engaged at a high level, what I offer the organization is the ability to prioritize and develop those relationships. My practice is to act as a matchmaker and build long-term connections in the community that don't rely on my personal relationships.\n\n\nLet's face it, we're more likely to be interested in learning about something because a friend approaches us about it and tells us why it's important to them. \n\nBut, there's a boundary here that needs to be drawn.\n\nWhen a board member or volunteer who you know makes an intro to you about a charity or campaign and then passes you into the hands of the fundraiser to make the case and ask for support, there is a chance to step away from your personal relationship with the board member. It allows the decision to become donor-centered and based on the fit with the cause. You can say \"no\" and not lose face. You can hold the fundraiser accountable and not your friend for the use of your gift.\n\nEvaluating \"friendraising\" as a donor is another good indicator of whether you should be investing in a particular cause. Has the charity hired your friend to drum up business from his/her personal contacts as their main activity? If so, then consider carefully whether this is a sign for you that this organization's mission can stand on its own or whether it rests on your friend's reputation? What happens when you're friend moves on? Will you continue to receive donor reports and contacts? What are they doing to invest themselves in building direct relationships that will be lasting and sustainable? How does that reflect on how the rest of the organization is being built and managed?\n\nWhat do you think? How do you draw the lines between friendships and fundraising/giving (especially when it comes to major gifts)?\n\nGreat fundraising involves exceptional planning \n\nand an artistic execution\nSwiss architect Le Corbusier Venice, 1952\n\nToday, I would like to share two great pieces that came across my desk in the past week. One is about capital campaigns and the other is about consultants to charity - since a lot of charities hire consultants to lead them through the campaign process, these seemed like a good fit.\n\nThe 10 Pillars of Great Relations Between Charities and Consultants\n\nWorking on a campaign together is not a short-haul project. It's a relationship for everyone involved and like all other relationships, communication and respect have to be at the heart of making it work. The Agents of Good have taken a solid stab at identifying the elements that need to be in place for everyone to feel satisfied.\n\nI probably feel most strongly about the need for conversation and I would suggest that anyone looking to hire a consultant should feel that they are bringing on a person that they can have honest and frank (and sometimes difficult) conversations with.\n\nRunning a Successful Capital Campaign\n\nThis article was a real keeper because it gives a good overview of the key elements that need to be in place when approaching a capital campaign. I especially agreed with this point:\n\nIn the 90s people gave to institutions, in the early 2000s, they gave to projects.\n\nToday, it’s about impact. So when positioning your story, make sure you indicate how your project will make a difference in the community it’s meant to serve.\n\nMuch of the rest of what was suggested can be summarized to say that successful capital campaigns involve heaps of strategic planning. Do people want to give, why should they give, who to ask, when to ask, what to ask for, how to say thanks...these are the big questions that come first. It's why communication with your consultant is so important - getting through the process of asking and answering these questions involves a lot of conversations and a realistic set of expectations on both sides. \n\nWe don't need Planned Gifts, it's a capital campaign...\n\nAnother question that I think belongs in any capital campaign is about \"what happens in ten years from now? How does the financial future of this organization look? What can we be doing now in this campaign to create that reality?\"\n\nIt's where I think legacy gift planning has a place in current dollar campaigns. \n\nThose bequest commitments may not do much in terms of meeting current needs, but when the relationship building happens now (and preferably seamlessly with the campaign fundraising), there is a better chance that sustainable support for the charity will be in place down the road.\n\nThe debate about how to count and recognize legacy gifts is a big one in Canada, but I think the important thing is to open the door to those opportunities as much as possible even during campaigns - your donors are thinking about their relationship and giving in a comprehensive way, why not present asks in the same way?\n\nWhat are your thoughts?\n\n© 2011-2012 Christina Attard. All Rights Reserved", "pred_label": "__label__1", "pred_score_pos": 0.6037225127220154} {"content": "Praise for The Tree\n\nExquisitely written… From the very first pages of the prologue, I could not put it down!\n\n—Janelle Reinhart, Christian recording artist\n\nThe Tree is an exceptionally promising work of fiction from a young, gifted writer, filled with Christian imagination focusing on the struggle between light and darkness.\n\n—Bishop Don Bolen, Diocese of Saskatoon, Saskatchewan\n\nThis literary intrigue, so deftly spun, captures the imagination as much for the drama as for the mastery of words. It is a story felt, not told, with eternal messages for our own world.\n\n—Patti Maguire Armstrong, co-writer of the Amazing Grace series\n\n With an insight and clarity into issues of the human heart beyond her years, Mallett takes us on a perilous journey, weaving endearing three-dimensional characters into a page-turning plot.\n\n—Kirsten MacDonald,\n\nThe Tree is an extremely well-written and engaging novel. Mallett has penned a truly epic human and theological tale of adventure, love, intrigue, and the search for ultimate truth and meaning. If this book is ever made into a movie—and it should be—the world need only surrender to the truth of the everlasting message.\n\n—Fr. Donald Calloway, MIC, author & speaker\n\n\n\nMallett delivers a striking collision between power, hypocrisy, and sincere faith. Through an intricate plot, readers are compelled to journey alongside characters who wrestle with the deepest longings of our own humanity. Cast upon the background of an artistically unique fantasy world, we are led through kingdoms, countrysides, and taverns to solve the violent mystery thrust upon us in the early pages of the prologue…\n\n—Dr. Brian Doran, MD, Founder of Arcātheos\n\n\nDenise Mallett, an extraordinarily gifted young author with a deep, deep faith beyond her years, leads us on a journey typically guided by the elderly soul who is wizened by profound life lessons.\n\n—Brian K. Kravec,", "pred_label": "__label__1", "pred_score_pos": 0.6447254419326782} {"content": "当前位置:首页 / 网站公告 /\n\n\n\n  The metal enclosed outer shell of the busbar can protect the busbar from mechanical damage or animal damage. The installation of the insertion unit in the distribution system is safe. The shell can be used as a whole grounding, the grounding is very reliable, and the PVC shell of the cable is vulnerable to mechanical and animal damage. The power supply must be cut first when installing the cable, if there is a cable. Mistakes can be very dangerous, especially if the cables are to be grounded, and the unreliability of the grounding will increase the risk.\n\n\n  Busbar adopts copper bar or aluminum row. Its current density is large, resistance is small, skin effect is small, no need to reduce capacity. A small voltage drop means less energy consumption and ultimately saves user investment. For cable, the core area of the cable core is larger than that of the current grade bus. And its\n\n\n  The dense busbar shell is used as the PE line, with low reactance, good continuity of protection circuit, safety and reliability, and energy saving. Its characteristics are good dynamic and thermal stability, small volume, good heat dissipation, low temperature rise, space saving, small pressure drop, and low energy loss, which is suitable for the transmission of high-power current.\n\n\n  Dense insulation is connected to the busbar slot. Its moistureproof and heat dissipation effect is poor. In terms of moisture resistance, busbars are susceptible to moisture and seepage during construction, resulting in a decrease in insulation resistance between phases.\n\n\n  The heat dissipation of dense busbar busbar mainly depends on the shell. Because of the compact arrangement between line and line, the heat energy of L2 and L3 phase is slow, and the temperature rise of the busbar groove is high.\n\n\n  The dense insulation socket bus bar is restricted by the shell plate, and can only produce a horizontal section not larger than 3m. Due to the small air gap between buses, the busbar can generate strong electric force when the bus passes through a large current, resulting in superposition of the frequency of magnetic oscillation, resulting in excessive noise.\n\n\n  The highlights of this article are from Shandong cable tray. Please click on our official website:, thank you for coming.", "pred_label": "__label__1", "pred_score_pos": 0.8832468390464783} {"content": "Enrolling/Transferring - ACT Public Schools\n\nACT public school enrolments for 2020 opened on Monday 29 April 2019. This is for all enrolments from Preschool to Year 12.\n\n\n\nEnrolment of students at Wanniassa Hills Primary School follows the same procedures used by other ACT public schools. This provides an assured place for students living in the school's designated priority enrolment area (PEA). Enrolment of a student residing outside of the school's PEA is welcomed but carefully monitored to ensure the school caters to its local needs in the first instance. Consideration of 'out of area' enrolments includes siblings already attending the school, and other circumstances that make the school the right choice for your family.\n\nMost 'in area' enrolments take place through a family's entry into preschool. The enrolment process is promoted across the community throughout term 2 and is all but complete by the close of term 3. Throughout term 4, the school conducts orientation activities to enable a smooth transition to preschool in the coming year.\n\nKindergarten enrolments represent our second largest group of new students. Most kindergarten enrolments are drawn from our onsite preschool but a significant number come from other early childhood centers or day-care arrangements.\n\nAcross the year, the school provides for families moving into the local area. The first point of contact for prospective enrolments is through the school's front office. Staff will assist with the process and coordinate an appropriate orientation program to help with the move to your new school.", "pred_label": "__label__1", "pred_score_pos": 0.9919251203536987} {"content": "Family can be created by blood, marriage or adoption. The definition of the concept of family is often loosely defined and translated depending on situation.\n\n\nHowever, there are other ways to define the concept of family. It can refer to those who were adopted or linked through marriage. Some people feel that their friends serve as a better family than anyone who they are related to by blood. Because of this, the concept of family is often debated.", "pred_label": "__label__1", "pred_score_pos": 0.6627228260040283} {"content": "How social reformers eradicate social evils from society\n\nSince their bodies are not properly developed to have kids, it may lead to early maternal death. Most reformers started journals of their own. Death Since Ambedkar was suffering from serious health problems including diabetes and weak eyesight.\n\nReligious and Social Reform of India – The Indian Renaissance\n\nMoreover, after this Revelation it was forbidden that a person should assign his parentage to any other man than his own real father. He argued that ancient Hindu texts the Vedas and the Upanishads upheld the doctrine of monotheism.\n\nAlthough as technology developed so did the movement, the new technologies made way for genetic engineering. They need to be seen as bobolu. They can commit follies resulting in their own ruin and disaster, but the Holy Prophet will wish for them only that which is beneficial and useful for them.\n\n\nClarence Gamble revived the eugenics movement in the United States through sterilization. Lord, give them a double chastisement and curse them severely. Ramakrishna Paramhamsa was a great teacher who could express complicated philosophical ideas in a simple language for everyone to understand.\n\nHe was a great humanist and had deep sympathy for the poor and the oppressed. After this till the end of the Surah the hypocrites and other foolish and mean people have been rebuked for the propaganda that they were carrying on at that time against Islam and the Muslims.\n\nIt provided relief during famines, earthquakes and epidemics. Syed Ahmad Khan was born in into a Muslim noble family and had joined the service of the Company as a judicial officer. There is enormous scope for international actions that close off opportunities for corruption.\n\nAmbedkar Place of Birth: Bellupheld the constitutionality of the Virginia Sterilization Act ofallowing for the compulsory sterilization of patients of state mental institutions in Alongside it, unfortunately, has also come a rapid growth in the scale and complexity of corruption.\n\nAlongside these pockets of high corruption, other industries, other societies and other times are virtually corruption-free.\n\nSocial Issues in India\n\nShe wrote about the unequal treatment meted out to the women of India. Charges for dentures, and spectacles were introduced in by the same Labour government that had founded the NHS three years earlier, and prescription charges by the successive Conservative Government were introduced in This directly reduces the esteem from being corrupt because it is no longer so normal.\n\nNazi eugenics After the eugenics movement was well established in the United States, it spread to Germany. This applies especially in developing countries where its consequences can be — and often are — deadly.\n\nIf you seek the former, you should say so openly: He is also known as the Father of Indian Constitution. The Government has led the way in dismantling this labyrinth of deceit: The welfare state, he said:He also initialed the process of social reforms in India by taking major steps for the eradication of the evils of the much prevalent caste-system by changing the existing laws.\n\nAnalysis of the myth that Vedic mantras were concocted by Rishis and establishes the fact that the divine Vedas were researched upon and not created by Vedic Rishis. Lets come back to the Vedas - our original source and ultimate destination.\n\nThe US Constitution was created on September 17,and ratified behind closed doors on June 21, Thirty nine of the fifty five delegates attending the Philadelphia Convention signed the document. Babasaheb Bhimrao Ramji Ambedkar was an Indian jurist, politician and social reformer.\n\nThis biography profiles his childhood, life, career, and achievements. Some Eighteenth century people believed that reason and science are good and therefore things would just go on improving forever.\n\nThis optimism characterized a period that came to be known as the Age of the end of this period, mass movements in America and France, and the Industrial Revolution in England, changed the world forever, making people realize that society in the.\n\nSocial Issues in India. Introduction: Social issues (also social problem, social evil, and social conflict) refers to any undesirable condition that is opposed either by the whole society or by a section of the society. It is an unwanted social condition, often objectionable, the continuance of which is harmful for the society.\n\nHow social reformers eradicate social evils from society\nRated 4/5 based on 70 review", "pred_label": "__label__1", "pred_score_pos": 0.6064133644104004} {"content": "General surgeons\nvs. surgeons of BioHernia\n\nExperts in their field\nGuarantee of quality\n\nIn order to offer you the best possible care, we carefully select the surgeons that we cooperate with. BioHernia always views the inguinal hernia operations from the patient’s perspective. For this reason, we assess our surgeons not only on their technical skill, but also on other criteria. Characteristics such as empathy, treatment of patients, time for the patient and patient satisfaction are very important to us. The selection of our surgeons is based on the following criteria:\n\n   Ability to perform hernia operations without mesh\n   Number of hernia operations per year\n   Success rate of operations\n√   Participation in scientific research\n   Skills in removing painful hernia meshes\n   Independence (free of potential conflicts of interest)\n\ncomparing hernia surgeons ireland\n\nNumber of inguinal hernia operations per surgeon, per year\n\nAchieving a certain number of operations per year is a very important qualification for our surgeons. The operation methods (without mesh) that we use, are only ensured of a good result in the hands of experienced surgeons. The level of expertise increases with the repetitive execution of a certain operation(1). Therefore the best surgeons perform at least 300 inguinal hernia operations (per year) and can therefore guarantee a lower risk of recurrence (less than 2%).\n\nWhy is experience so important?\n\nProficiency in operation methods leads to a lower risk of recurrence and complications for you. After all, the groin is a traffic node of nerves where an inexperienced surgeon can easily make a mistake .(2) An in-depth knowledge of the anatomy is therefore a prerequisite for a successful operation. An experienced surgeon easily finds his way through the many nerves in the groin and repairs inguinal hernias without causing damage to surrounding tissues and nerves. With an average of 400 inguinal hernia operations per year, our surgeons distinguish themselves in the field of experience.\n\nIn addition, traditional operation methods without mesh consistently have good results in the hands of skilled surgeons. Surgeons and clinics such as Shouldice Hospital have shown for years that the risk of recurrences is very small (around 1%(3)). Proponents of hernia mesh, however, point to studies that show high recurrence for inguinal hernia operations without meshes. The problem with all these studies is that they use the results of heterogeneous groups of surgeons. These groups are likely to include surgeons who are not well trained or inexperienced in non-mesh operation methods.\n\nWhy our surgeons do things differently\nOur surgeons believe in a patient-oriented diagnosis\n\nOur surgeons belong to a handful of surgeons worldwide who can still perform the inguinal hernia operation in the traditional way without a plastic mesh. Although the use of meshes has taken over the field of hernia surgery, they believe that the use of a mesh is not always the right solution. (4)\n\nIt is important to understand that our surgeons are not completely against the use of meshes, but against the standard policy where every  hernia is automatically treated with a mesh. Our surgeons believe that the state of the  hernia and tolerance of plastics must be examined per patient. In the majority of patients, a mesh is unnecessary. Furthermore, their main objections are as follows:\n\n 1. The uncertainty about the effect of plastic meshes in the body over the long term.\n 2. In most cases the patients’ own tissue is strong enough to repair a hernia (especially with small hernias and young patients).\n 3. The fact that plastic meshes can cause an inflammatory reaction in many patients.\nDr. Koch and Dr. Schouldice teaching the Shouldice hernia repair method\n\nDr. Koch & Dr. Schouldice teaching the Shouldice method to students\n\nOur surgeons are members of the following organisations\n\n\nFrontrunners in the field of hernias\nOur surgeons carry out a lot of research themselves\n\nIn addition to their daily activities, our surgeons are working to make a change in the field of hernia surgery, both in top sports and for private patients. They do this by actively attending meetings, contributing to research, working with top athletes and by being a director or member of organisations in their field.\n\nMuschaweck congress\n\nDr. Ulrike Muschaweck at the ‘Leaders in Sport’ congress in New York (2016)\n\n\n1. Gawande, Atul. (2002). Complications : a surgeon’s notes on an imperfect science. New York :Picador,\n2. https://link.springer.com/article/10.1007/s00464-016-5001-z\n3. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC2999770/\n\nDo you have more questions?\nContact us to find out more\n\nFind out how we can help you\n\nPlease choose an option to continue:\n\nFor private patients\n\nFor NHS patients", "pred_label": "__label__1", "pred_score_pos": 0.9731215834617615} {"content": "A CrossFit Dad\n\nImages by Heather Kelley Photography\n\nDads have a special place in the lives of their children, and vice versa. Scott Richardson is no exception.\n\nHe’s been a member at CrossFit Hershey in Annville, Pennsylvania, for five years. It was through his daughter that he found the gym and training regimen.\n\n“My daughter was looking for personal training to prepare for her last AAU basketball season,” said Richardson, who is the principal at a local high school. “She knew she needed to take her training up a notch. Powertrain was not rigorous enough so we dropped into Crossfit Hershey and met the team there. She began to train with a Coach there and saw amazing results.  She kept telling me that I would love it, and after about six months I did a class and the rest is history. Next, my younger daughter came along and joined, and finally my wife who does an all ladies, no barbell class.”\n\nThe rest is history.\n\nIn honor of Father’s Day, Richardson dives deeper below on why he does CrossFit, how it’s impacted his family and his encouragement for the other CrossFitting dads out there: \n\nBox Pro: Why do you do CrossFit?\n\nScott Richardson: I CrossFit for stress relief. As a high school principal, my days are packed full with interactions, numerous decisions and leading people. When I step into the gym it is transformational. I am humbled by the work and supported by our community. No one there cares that I am the local high school principal; they just support my fitness journey and push me to be better. I have met great people at CrossFit Hershey. \n\nAlso, when the army recruiters come to school and set up a portable pull-up bar, I am a hit because I can do some pull-ups in front of the cafeteria. I also CrossFit for life quality and longevity. I want to be fit to enjoy life to its fullest for a very long time.\n\nBP: How do you find the balance between working out, working and family?\n\nSR: Balance is certainly tricky. I certainly prioritize my workout each day.  My time to go to the gym is 4:45 p.m. and when I prefer to workout.  However, I can also do the workout at school or do a WOD at home. I know I am a better person after I work out. I can still come back to work if I have to. With my family, it is awesome to go to class where your one daughter is coaching and your other daughter is working out along side of you. It keeps our relationship solid and in tact. I am a better dad, husband and school leader because of CrossFit.\n\nBP: Has you doing CrossFit impacted your family/kids in any way? If so, how?\n\nSR: CrossFit has had a significant impact on our family. As I mentioned, all four of us have caught the bug. Our conversations at home are often about the workout, the workout tomorrow or discussing the sport in general. It has given all of us a healthy outlet as well as a community that takes interest in our kids and supports their endeavors. In addition, the friends we have made being at CrossFit have been great. This community has given us the confidence to drop in to a Box when we travel or design our own workouts.  \n\nBP: What would you say to other fathers who do CrossFit? Any encouragement?\n\nSR: Dads who do CrossFit are a special breed. I feel we are modeling healthy living for our families, as well as ensuring a lifestyle of fitness moving forward. I believe we are redefining what “dad bod” truly means. \n\nScott Richardson hugs his daughter during her graduation at the high school where he is the principal.\n\nHeather Hartmann", "pred_label": "__label__1", "pred_score_pos": 0.8012771010398865} {"content": "Guest Editor’s Note: I am here and queer with plenty to fear\n\nBy Miranda Manier, Managing Editor\n\nAs reported on Oct. 17 in the Chronicle’s new explainer series, “Chronicle FYI,” the Supreme Court recently heard arguments from three cases about whether or not Title VII of the Civil Rights Act of 1964 protects the workplace rights of LGBTQ+ Americans.\n\nAs a queer woman, this issue is more than just a hypothetical. It’s more than just a personal or professional concern.\n\nThe decision the Supreme Court makes will have a lasting impact on my emotional well-being. It will determine how safe I feel applying to jobs, knowing that social media posts and articles like this one make up almost my entire digital footprint. If a potential employer who does not support people like me does an internet search of my name, their opinion of me as a candidate might suddenly change. This decision will determine how secure I feel once I land a job; every time I get a new boss and every time I change departments, I will have to wonder if this is the moment that my identity becomes more important than my professional accomplishments.\n\nBeing queer should not make me a target. It should not jeopardize my job security. No one should ever fear unemployment because of something about themselves that they cannot change.\n\nThe arguments that the plaintiffs’ legal counsel on this issue made to the Supreme Court pointed out that the language of the statute already protects the LGBTQ+ community, something which has been affirmed by lower courts’ decisions on two of the three cases. Firing someone because they are a man who loves men or a woman who was assigned male at birth is, by definition, firing them because of their sex—which is explicitly a violation of the Civil Rights Act. The Supreme Court should do their job and interpret the law exactly the way it is written.\n\nJustice Neil Gorsuch expressed his concern that ruling in favor of the plaintiffs would cause “social upheaval.” He and other justices, both conservative and liberal, also talked a lot about bathroom usage by transgender people, a complete tangent from the issue at hand.\n\nThese kinds of remarks are indicative of a fear that surrounds LGBTQ+ issues. People who consider giving us written, legal protections often focus on the potential “slippery slope.” Before same-sex marriage was legalized, opponents of it would ask questions like, “What’s next, people marrying their dogs?”\n\nThese people think that if LGBTQ+ people receive protective rights, it will lead to the decay of their own—that if transgender women are allowed to use women’s bathrooms, suddenly cis men will start waltzing in there, too.\n\nThese fears are not grounded in reality. They are a way to “otherize” queer people by hyper-sexualizing us and associating us with predators in the public’s eye. But a cisgender man using the women’s bathroom has as much to do with my workplace rights as it does with a transgender woman using the women’s bathroom: The matters are all completely unrelated.\n\nBy acknowledging that my rights are protected by the Civil Rights Act, the Supreme Court will not be threatening the rights of anyone else. There is no “slippery slope” to fall down. That decision will simply ensure that my professional life, and the professional lives of so many other people, will not be shrouded by fear and paranoia.\n\nI do not deserve to be fired because I love women. My best friend does not deserve to be fired because they are non-binary. My uncle does not deserve to be fired for living with his partner of many decades.\n\nI deserve to be evaluated by employers for my strengths and weaknesses—not my identity.\n\nI hope with all my heart that the Supreme Court agrees.\n", "pred_label": "__label__1", "pred_score_pos": 0.9859448671340942} {"content": "WATCH: Chris Gayle hitting 7 powerful sixes against Gujarat Lions\n\nOn Tuesday (April 18), the West Indies opening batsman Chris Gayle became the first man of the planet to complete 10,000 T20 runs.\n\nThe southpaw, who plays for the Royal Challengers Bangalore in the IPL, smashed 7 sixes and 5 fours during his scintillating knock of 77 run off just 38 deliveries against the Gujarat Lions in Rajkot.\n\nLOVED it? LIKE it!\n\nThis article was first published on\n\nShare it with a Cricket fan!\n", "pred_label": "__label__1", "pred_score_pos": 0.960369348526001} {"content": "Franz-Joachim Verspohl de, Michelangelo Buonarroti und Leonardo Da Vinci: leonardo code Republikanischer Alltag und Künstlerkonkurrenz in Florenz vinci zwischen 15 (Wallstein Verlag, 2007.\nThis trend began in the mid-16th century and was vinci revived in the 19th and 20th centuries, most notably by Sigmund Freud.\nThere are 15 significant artworks which are ascribed to Leonardo by most art historians, either in whole or in large part.\ncode Between 14, Leonardo listed a woman called Caterina among his leonardo dependents in his taxation documents.K 46 According to Vasari, the young Leonardo was the first movie to suggest making the Arno river a navigable channel between Florence and Pisa.Leonardo da code Vinci: Artist, Scientist, Inventor.Retrieved b Nicholl, Charles (2005).Leonardo is known to have designed sets for pageants with which these may be associated.170 Location of remains Tomb of Leonardo da Vinci in the Chapel of Saint Hubert at the Château d'Amboise, known code where a plaque explains that leonardo the remains are only presumed to be those of the Renaissance artist.Sigmund Freud, Eine Kindheitserinnerung des code Leonardo da Vinci, (1910) a b Isaacson, Walter (2017).Leonardo also remembered his other long-time pupil and companion, Salaì, and his servant Battista di Vilussis, who each received half of Leonardo's vineyards.Da Vinci designed or created devices that could immediately be employed in his own day, such as water vinci pumps.Many vinci artists attest that this is not an occurrence unique to da Vinci, and that such abandonment stems from creative exhaustion.Medieval and Renaissance Times.82 Vasari also records that the king held vinci Leonardo's head in his arms as he leonardo died, although this story may be legend rather than fact. New York: Dover Publications.\nGiorgio Vasari, in the enlarged edition of Lives of the Artists (1568) personal 162 introduced his chapter on Leonardo with the following vinci words: In the normal course of events many men movie and women vinci are born with remarkable talents; but occasionally, in a way that transcends nature.", "pred_label": "__label__1", "pred_score_pos": 0.9975244402885437} {"content": "Literary narrative what makes me the\n\nPublishers Literary Agency Stonesong operates a traditional literary agency division, representing a wide range of authors.\n\nLiterary narrative what makes me the\n\n\n\n\nLiterary narrative what makes me the\n\nRemember, though the most immediate forms of imagery are visual, strong and effective imagery can be used to invoke an emotional, sensational taste, touch, smell etc or even physical response. Suspense - The tension that the author uses to create a feeling of discomfort about the unknown Conflict - Struggle between Literary narrative what makes me the forces.\n\nExposition - Background information regarding the setting, characters, plot. Point of View - pertains to who tells the story and how it is told.\n\n\n\n\n\n\nLiterary narrative what makes me the\n\n\nSpeaker - the person delivering the poem. Remember, a poem does not have to have a speaker, and the speaker and the poet are not necessarily one in the same. Structure fiction - The way that the writer arranges the plot of a story.\n\n\n\nCross - representative of Christ or Christianity Bald Eagle - America or Patriotism Owl - wisdom or knowledge Yellow - implies cowardice or rot Tone - the implied attitude towards the subject of the poem. Is it hopeful, pessimistic, dreary, worried? A poet conveys tone by combining all of the elements listed above to create a precise impression on the reader.\n\nThe Terms of Use explains the specific permissions granted.Literary Narrative Writing is something that has never been easy for me.\n\nFor most of my life I have tried to avoid it if I can, but of course I can't avoid stuff like school forever. Free narrative papers, essays, and research papers.\n\nThough Zora Neale Hurston’s “Sweat” is only words long (about 15 pages), the scope of the work reaches farther than most novels. Within this small space, Hurston addresses a number of themes, such as the trials of femininity, which she explores with compelling and efficient symbolism. A narrative technique (also known more narrowly for literary fictional narratives as a literary technique, literary device, or fictional device) is any of several specific methods the creator of a narrative uses to convey what they want —in other words, a strategy used in the making of a narrative to relay information to the audience and, particularly, to \"develop\" the narrative, usually in. I can understand wherr james is coming from, as reading a book is a form of “getting away from it all” but writing could also help you analyze what is going on, what you believe is going to happen, what wont happen, so on, so fourth.\n\n\nRepresenting fiction and nonfiction with a unique, boutique-style approach, Park Literary & Media was founded in by Theresa Park. PLM is a full-service agency that manages all aspects of an author’s career with focused personal attention and the highest professional standards.\n\nGood explanations and narrative nonfiction resources\n\nReviews, essays, books and the arts: the leading international weekly for literary culture. A good title indicates something about the subject of your narrative—and makes readers want to take a look. Nichols's title states her subject, \"Proficiency,\" but she also puts the word in quotes, calling it into question in a way that .\n\n\nGrammar Bytes! :: The Verb", "pred_label": "__label__1", "pred_score_pos": 0.9972259402275085} {"content": "Sweet Spring Mason Jar Salad\n\n\nSpring Mason Jar Salad\n\n\n1⁄2 cup\nred onion slices (cut into bite sized pieces)\n1⁄2 bunch\nasparagus spears (trimmed and blanched)\n3⁄4 cups\nStrawberries (quartered, or a mix of strawberries & raspberries)\n1⁄4 cup\nCoarsely Chopped Walnuts\n2 cups\nrotisserie chicken (or sub grilled or baked)\nmini cucumbers (thinly sliced and cut in half)\n4 cups\nSpinach (or use whatever greens you have on hand)\n4 tablespoons\nraspberry vinaigrette* (recipe below)\n\n\n 1. Place a couple tbsp of the vinaigrette in the bottom of your mason jars.\n 2. Next, place any veggies etc. that will respond to marinating well – think onions, cucumbers, etc.\n 3. Then, place chicken, additional veggies, such as your asparagus, next. • Add your greens on top – spinach, arugula, etc.\n 4. Finish off with your chopped walnuts, and a few more berries and onion slices if desired.\n 5. Cover jars and keep in refrigerator until you are ready to eat up! *I usually make these kinds of salads the morning my hubby and I (or our kiddos) will be eating them, but most salads like this will keep for about 1-3 days.\n 6. When ready to eat simply shake your salad jar (make sure your lid is on tight!) to distribute dressing. Then, enjoy straight from the jar, or pour salad onto a big plate or bowl and enjoy!\n\nYields 2 Salads", "pred_label": "__label__1", "pred_score_pos": 0.5281857252120972} {"content": "Podcast: Lateral Movement: Combating High-Risk, Low-Noise Threats\n\nJune 11, 2019\n| |\n20 min read\n\nListen to this podcast on Apple Podcasts, SoundCloud or wherever you find your favorite audio content.\n\nOn this week’s SecurityIntelligence podcast, prolific security pontificators Pam Cobb and David Moulton are at it again — and this time, they’ve got the high-risk, low-noise threat vector known as lateral movement in their sights. Bolstering their collective security insight are IBM Incident Response and Intelligence Services’ (IRIS) incident response consultant Joey Victorino and IBM threat intelligent expert Charles DeBeck.\n\nWhat Is Lateral Movement?\n\nAccording to Victorino, lateral movement “consists of a series of techniques that enable an adversary to access and control remote systems in a network.” Instead of attacking key targets directly, lateral threats go after information on corporate devices, such as cached credentials from privileged users, allowing them to pivot across infrastructure and access critical data.\n\nPhishing remains one of the most common starting points for lateral attacks. Cybercriminals target large departments such as human resources and finance with socially engineered emails to gain initial access. What they really want is kept elsewhere, behind more secure corporate lines, but once they’re past the perimeter, even peripheral systems become critical points of compromise.\n\nAdding to the problem is the low noise produced by lateral attacks, since they often leverage common IT solutions and processes to blend in with typical behavior. This allows threat actors to quickly expand their impact. As DeBeck notes, “When you have one computer that’s infected, that’s annoying. When you have 1,000 computers infected, that’s a problem.”\n\nThe Four Second Rule: Why Lateral Attacks Are Built for Speed\n\nFour seconds doesn’t seem like a long time, but it’s long enough for malicious actors to infect systems via email attacks and start pivoting across your network. While Victorino notes that advanced persistent threat (APT) groups looking to carry out reconnaissance or deploy more sophisticated attacks will take more time and “do this in a much less noisy manner,” lateral attacks are still built for speed.\n\nIncreasing this risk are toolkits capable of automating key processes. According to DeBeck, attacks “happen as quickly as the computer can process commands, rather than requiring the actual individual to type things out.”\n\nFocus on Your Strategic, Tactical and Operational Defense\n\nTo limit the success of lateral movement attacks, Victorino and DeBeck recommend increasing focus on three key defense domains:\n\n • Strategic — For Victorino, strategy starts with network design: “Are you on a flat network? Do you have different locations on specific subnets?” Also critical is tool restriction; organizations need to watch for tools such as PsExec that are commonly used by threat actors.\n • Tactical — Tactically, visibility is key. Organizations need detective solutions in place capable of capturing unexpected logins, tool use and remote user access.\n • Operational — Here, the principal of least privilege informs lateral threat defense. This includes password management and multifactor authentication (MFA). According to DeBeck, “MFA is one of the easiest, cheapest, most effective ways for an organization to reduce lateral movement across the board.”\n\nLateral movement represents a low-noise, high-risk threat to organizations. Security teams can combat this quick-fire compromise with improved strategic, tactical and operational security.\n\nEpisode Transcript\n\nPam: I’m going to start by asking us to pause for exactly four seconds. Do you know what just happened in that four seconds, hypothetically speaking?\n\nDavid: Well, if I’m going to take a guess if our guests aren’t listening, or maybe they’re driving, and they’re paying attention to something else, they think the podcast player they have stopped working. Or maybe you were giving lightning 400 tries to strike the earth.\n\nPam: I would say that lightning struck on this most recent podcast, David. Good times. So upcoming, we’ve got a discussion on lateral movement, which is not a fancy dance craze, it is actually an attack mechanism. So we are talking about the speed of lateral movement and what exactly happens in those four seconds when it comes to this type of attack.\n\nDavid: So how would you describe lateral movement to somebody who’s just coming in and hearing about it for the first time?\n\nPam: I would think that it is akin to getting into the thing that you want. Let’s say you’re getting into a party, you really want to go to this party, you got invited to the lame-o foyer of the party. You haven’t made it into the cool back room and you’re figuring out how you’re going to sidle into that super awesome back room where all the action is happening.\n\nDavid: But I’m going to guess attackers use it to do things that aren’t as harmless as getting into the cool party.\n\nPam: This is the “Security Intelligence Podcast” where we discuss cybersecurity industry analysis, tips, and success stories. I’m Pam Cobb.\n\nDavid: And I’m David Moulton.\n\nPam: Two of my colleagues, Charles DeBeck and Joey Victorino, join me to discuss lateral movement. Now, you may notice that I really geek out over this kind of topic. This goes back to my origins at Internet Security Systems when my dream job was working with X-Force and helping tell their stories. So podcast was a nice way to close that nice 12-year journey that I’ve been on.\n\nAnd so I was really excited to talk to them. So we ended up discussing why cybercriminals use lateral movement, some of the business risks, and what some things that businesses can do to protect themselves. And even a little bit of reassurance that the user isn’t always at fault. Here’s our conversation.\n\nPam: So I want to welcome Charles and Joey to the podcast. I’m hoping you all can give us a little introduction on your backgrounds, and what brings you here to talk to us today. So Joey, let’s start with you.\n\nJoey: Hi, my name is Joey Victorino. I’m a member of the Incident Response and Intelligence Services team here at IBM Security also known as IRIS. The goal of our team is to assist clients respond to cybersecurity incidents that have negatively impact their business.\n\nI’ve been working as an Incident Response Consultant for the past three years leading engagements from beginning to end as both a digital forensics investigator and incident handler. Some of the client engagements that I have managed include investigations related to cybercrime, malware, fraud and data exploitation.\n\nPam: Great. So Charles, tell us a little bit about your background.\n\nCharles: Sure. Hi, my name is Charles DeBeck. My background is in threat intelligence, in both the public and private sectors. I worked for the Department of Defense, and then Deloitte, now for IBM as part of their Threat Intelligence Production team. And I’ve worked in a variety of different roles in the threat intelligence area for these entities. And thank you so much for having me.\n\nPam: Absolutely. So we wanted to talk a little bit today about lateral movement. And you know, maybe what that means beyond a weird line dancing phenomenon, how does that apply to cybersecurity.\n\nJoey: So lateral movement consists of a series of techniques that enable an adversary to access and control remote systems in a network. And it could also but not necessarily mean execution of their tools on those remote systems. The lateral movement techniques could also allow an adversary to gather information from a system without needing any additional malware or tools to be able to achieve that goal.\n\nSo once an attacker is able to breach an organization, the objective they’re looking for might not be on the machine they actually compromise. So they gather information available on that machine to be able to pivot across the infrastructure to be able to get to the data that they’re looking for.\n\nPam: So if they’re able to get in through a misconfigured database, they’re able to take advantage of that and go to a different server in the network to maybe get the information they’re actually going for. Is that right?\n\nJoey: That’s right, one of the most classic examples that we are currently seeing out in the field is a user being phished either in a department not related to the information that the threat actor is seeking, such as human resources or finance. And that machine will have cache credentials from an administrator or privileged user that has logged into that machine. And the attacker is able to dump those credentials and use them to pivot or connect remotely to the machine where the data that they’re seeking might reside.\n\nPam: So do you think in this example of phishing, are certain departments targeted more maybe because of a lack of cyber awareness or just maybe not as good adherence to the corporate mandates on their required cybersecurity training?\n\nJoey: So the sample of HR and finance in my previous question, it doesn’t necessarily mean those users are more susceptible; it’s that they’re usually targeted more. And a persistent attacker is going to do quite a bit of digging into the background, and sometimes even engage via social media to be able to get a level of confidence from the user being targeted. Now we have seen users from all departments, even outside vendors be targeted in the past. So there’s not necessarily a department of users that will be more susceptible. I think that in order to mitigate that as a risk, an organization needs to take regularly, security awareness training.\n\nCharles: More broadly, I think from a threat actor perspective, the issue run into is that it kind of depends on what you’re targeting, and what your end goal is. You know, if my goal is to get research and development information, I might be targeting that particular sector of an organization. If I’m just going after financial, I could go after any subsection of the organization.\n\nBut really, that’s all sort of ties into the initial infection vector. And that’s, I think, just one element that happens, in the overall attack chain. But I think what we’re really interested in is the next step, you know, after they get in, how they’re laterally moving within the organization to where they want to be.\n\nPam: And how fast can that happen? Is it a matter of seconds, minutes, hours, days?\n\nJoey: It really depends on the attacker and the toolset being used. We have seen examples of network worms such as QakBot, or Emotet, that once the malware executes successfully on a compromised machine, they start pivoting across the network in as little as four seconds. So that’s from the moment the user clicks on the email to the malware pivoting across other machines. That time is four seconds.\n\nNow, if APT group or more sophisticated attacker is targeting an organization, they’re likely going to do some reconnaissance on the machine first, and try to get a feel of the environment before moving across. And they’re going to do this in a much less noisy manner.\n\nCharles: One element here that’s really changed historically to now is historically we’ve seen lateral movement being done sort of manually. We have threat actors getting into an environment, getting into an organization, and then have to actually manually go in, type some stuff in and actually balance between machines themselves.\n\nWe’ve seen a real shift over the last few years however, to this being done on a more automatic fashion — this is more automated from the threat actor perspective. This allows for lateral movement to happen much faster, because then simply happens as quickly as the computer can process the commands rather than requiring the actual individual to type things out. So this is a lot easier for threat actors.\n\nPam: So do you think that this transition to automated toolkits is due to the prevalence of malware as a service available out there on the dark web? Or do you think there’s other factors that contribute?\n\nCharles: I think there’s a number of contributing factors as to why we’re seeing this shift. From a threat actor perspective, it’s certainly cheaper and easier to do it this way. It takes a lot less time. And for threat actors, it’s all about time, you know, how can I most quickly, most efficiently get money. And so an automated approach is a great way for them to be able to maximize efficiency.\n\nMalware as a service as well, I think is a great point, and I think is definitely contributing to this shift. Because if I have those lateral movement capabilities already baked into the malware, then it means that I don’t have to figure out how to do it on my own, I don’t have to worry about it, it just sort of happens, as if by magic from a threat actor perspective. Which is great, because it makes my job a lot easier.\n\nAnd the proliferation of these services has really made it easier for low sophistication threat actors, you know, just random Joe’s coming in off the streets trying to engage in this sort of activity, to be able to engage in very sophisticated lateral movement. Whereas, historically, one had to be very knowledgeable and skilled to be able to do this yourself.\n\nPam: So Joey talked about there being kind of low noise to this sort of activity. How hard is it to detect in a network?\n\nJoey: That activity can be very difficult to detect at times. A sophisticated actor, by definition from a forensics point of view, is sophisticated because of the methodologies that they use. So we have seen a large spike in the usage of Windows tools that are already included, such as remote administration services, to include PowerShell remoting, PsExec, or Windows Management Instrumentation also known as WMI. These techniques blend in with the same activity that you would be expecting to see from a systems administrator.\n\nSo unless the organization has detection capabilities, and monitoring in place, and knows what normal looks like in their environment, it’s very likely that these techniques will fly under the radar until it’s too late, or the attacker has achieved his goal, and was able to remove forensic artifacts from the machine. In which case, you would have to rely on logs, which I’m sorry to say that many organizations are not keeping the proper amount of logs, both for the length of time or collecting from the appropriate amount of sources.\n\nCharles: And I really want to hit on that, one of the points that Joey made, which is the need for a baseline for organizations. One of the biggest challenges to detecting lateral movement within an organization is you have to say, “Hey, am I seeing activity that’s anomalous, that’s unusual for my organization.” Based on a baseline, we’ve already established what normal activity looks like. Because if I don’t know what normal looks like, how can I possibly tell you what abnormal looks like?\n\nAnd for a lot of organizations, they don’t have the resources, or the visibility, or the capability to be able to baseline the activity. So this activity can go undetected for a long period of time because they simply don’t know what to look for. And that’s especially challenging, I think, for small to medium-sized organizations who maybe don’t have the resources to invest in this sort of investigation baselining.\n\nPam: So when an organization is susceptible to this kind of lateral movement from attackers, what are the business risks on the flip side of it? We know, you know, you can wreak havoc on IT systems. But what are some of the business implications that we’ve seen?\n\nCharles: What I like to tell people is that when you have one computer that’s infected, that’s annoying. When you have 1,000 computers that’s infected, that’s a problem. And ultimately, that’s the issue you run into with lateral movement. Lateral movement takes an initial infection, which may have been one computer or one system that was infected, and could potentially convert it into a significant issue and headache for the organization.\n\nAnd what the actual business impact is going to be can really vary based on the end payload that’s being dropped down. You know, you have something like WannaCry, where you have large numbers of ransomware being dropped onto a lot of different machines, and suddenly critical business functions are impaired. Or you could have something like crypto miners being dropped on a lot of machines, and then you’re losing a lot of electricity and processing power and burning out boxes that you have to replace.\n\nThere’s a lot of different potential business impacts. But the big thing that lateral movement does is it amplifies that impact, it makes it so it’s not just a small impact, but it could be a huge impact for the organization. And that’s really I think where lateral movement causes the most harm to organizations.\n\nJoey: To build upon what Charles has said, from an investigation perspective, it is very difficult to analyze a large number of machines. Just because sometimes when it’s automated, the spread could be really quick, but something that usually is not talked about when discussing enterprise-wide response is that the remediation effort is proportional as well, to the extent of the compromise. You know, such activities such as rebuilding the network, how do you gain trust in a network that’s had thousands of machines compromised handling potential legal risk, and you know, interruption to business operations. These are all substantial consequences to fix after an enterprise-wide compromise.\n\nPam: So we talked about financial data being targets, as well as maybe intellectual property. Are there other types of data that are typically at risk?\n\nCharles: Threat actors can really target any variety of data. I think some other things that we’ve seen and observing recently include our internal business communications. And this really gets back to something we’ve seen a lot in recent days, which is business email compromise, where threat actors go in, they compromise internal communications, and then they use that to try and convince organizations to give them a lot of money that they shouldn’t otherwise be doing. So that’s been another potential target.\n\nBut otherwise, threat actors tend to be targeting sort of the bread and butter of the threat actor domains, which are financial information, credit card information, personally identifiable information that they can use in other fraudulent activities. Things that are easily monetizable tend to be the highest priority targets. But this can change based on the nature of the threat actor. A nation-state threat actor might go after something different than a cybercriminal, then they might go after something different from an activist. It really depends on the motivations of the actor.\n\nPam: Okay, so we’ve talked a lot about the threats and the repercussions, but what are some things that businesses can do to protect themselves from this type of attack?\n\nJoey: So there’s really three different domains that apply to limiting the success of a threat actor in an environment. And it’s going to come down to strategic, operational and tactical defenses.\n\nFor strategic, this is going to come back to the architecture stage, right. How is your network segregated? Are you on a flat network? Do you have different locations on specific subnets? Are you restricting the tools that are included in Windows? For example, we talked about PsExec earlier. Now, this is a common tool that’s used by threat actors. But if this is not a tool that’s used by your system administration team, then the use of this tool anywhere in your environment should definitely send an alert to your security team or your administration team for at least review.\n\nNow, from an operational perspective, we want to make sure that the principle of least privilege is being implemented. A user whose job does not involve logging into or accessing production databases should not have the ability to do that, as well as having stronger password management, and enforcing the use of multi-factor authentication, when it’s possible.\n\nAnd lastly, from a tactical perspective, we want to make sure we know that we have detective controls in place for activity that’s unexpected. Be it logins, tools being used, remote users logging into the organization from locations where they don’t do so on a regular basis. These are some of the recommendations that we recommend our clients put in place, both as a preventive measure or when they’re dealing with the remediation stage from a large enterprise breach.\n\nCharles: From an operational perspective, when you’re looking at password management, I know Joey mentioned using multi-factor authentication. And I think this is something that organizations really have to do across the board. It’s so critical to ensuring security, it makes so password leaks are not nearly as effective. It reduces the effectiveness of lateral movement for threat actors trying to move around with stolen credentials. Because they could take all your credentials, but if you have MFA, effectively implemented, it’s going to significantly hamper their ability to move around. So I think MFA is one of the easiest, cheapest, most effective ways for an organization to reduce lateral movement across the board.\n\nThe other thing I really want to draw attention to is on the strategic side, looking at PowerShell restrictions. I like to think of 2018 as the year of PowerShell. We saw PowerShell being leveraged by threat actors for initial infection, we saw it being leveraged for lateral movement. Pretty much everyone and their brother was using PowerShell for something or another.\n\nAnd for organizations that don’t use PowerShell as part of their approved scheme for remote administration, as Joey said, the minute you see PowerShell in your organization, it should be firing off flares, saying, “Hey, we got a problem.” And if your organization doesn’t have the capability or the visibility, to be able to say we have PowerShell going on in the organization when we’re not supposed to, that’s an even bigger problem. Because it means that you can’t detect when this is happening. So for an organization, I think those are the two areas I would personally focus on because they’re both very cost efficient, and very effective at reducing lateral movement for a wide range of threat actors.\n\nPam: So for anyone that may not know what PowerShell specifically means, do you want to touch on that real quick?\n\nJoey: PowerShell is a scripting language that’s been included in Windows by default for a couple of versions. It’s mostly Windows’ response to bash and an upgraded version of the command.exe that everybody has known for the last couple of decades from Windows. It’s very powerful it allows you to remotely administer a large number of machines, as long as you have the appropriate credentials. And you can do a lot of stuff with PowerShell that you weren’t able to do with the old command.xe.\n\nPam: Okay. Moving into the response to these types of attacks, how are the different roles in an organization best equipped to respond to this kind of activity? Obviously, the security department is involved. But can you talk a little bit about overall, the coordination to respond to this kind of activity?\n\nJoey: Yeah, so a capable incident response team, as you mentioned, should not be only composed of individuals on the security team. Incident response, as a whole, is a team effort that needs to spread across multiple departments in an organization.\n\nFor example, from a management perspective, we want to make sure that management has enough buy-in to be able to support incident response activities. So that means having the proper equipment, having exercises where management is present so they know what their roles are in an incident, as well as putting in the substantial controls that need to be placed at a management level, to make sure that the organization has a plan to be able to respond to incidents effectively, as well as having visibility across the organization, to be able to know how to operate as a team.\n\nIf you’re able to detect an incident in its early stages, and you have the full attention of the individuals that need to be made aware, it’s much more powerful and easier to have an appropriate response than if this is not something that’s been taking place. So what we don’t want to see is that there is an alert that’s being fired off, and the security team raises it but there’s no attention to it for months or weeks, and you know, the organization’s name comes up on a new source. And this is something that was caught in the security team was doing their job, but because there was no plan in place on how that should be treated, the alert went unresponded to, and it became a huge issue.\n\nPam: So you both mentioned multi-factor authentication as one way to help stop the spread of lateral movement. Do you think that applies to helping protect users within the organization from the repercussions of this kind of attack?\n\nCharles: So say that I as an individual member of your organization, go out and use my same password for my business account. And then I also register for a Pandora account. And then my Pandora password’s leaked, and then subsequently, they try to break into the organization.\n\nThey won’t be effective with multi-factor authentication, which reduces the burden on me as an individual user and replaces that burden with a strategic level policy for the organization. Any time you can take away responsibility from the individual and put it up to the strategic level, you’re going to see a better return on investment and a more effective type of security posture.\n\nAnd so from a lateral movement perspective, if the exact same thing is true. If I can make it so that if one user is compromised, then they won’t be able to break out and get to other users as easily. Because I have this MFA policy in place that will reduce the overall impact on the organization. And it will be much more efficient, rather than just relying on you know, this one guy, Charles to do exactly what he’s supposed to all the time, and just hoping that it all works out.\n\nPam: So how else can organizations protect users from the consequences then?\n\nCharles: For an organization, I think the first step I would do when you’re trying to figure out how we can best protect against lateral movement, any sort of process has to start with asking what are the things we want to protect? What assets are most important to us? So we can ensure that those are put in the right places and protected against lateral movement most effectively. Then we need to start asking how can we break down our network so that we minimize business impact, and minimize data loss if there was an attack and lateral movement was achieved.\n\nOnce we’ve done those sorts of activities, I think we’ve done a really good job of reducing the impact of lateral movement overall. One other potential way that organizations can figure out how to protect themselves against lateral movement is through effective penetration testing. And that’s something where doing effective pen testing can help you figure out where there might be gaps or holes in your network segmentation so that you can repair those holes before they become an issue with threat actors.\n\nPam: So when it comes to protecting against lateral movement, and attacks, how do you see organizations changing how they’re addressing this in the next six months to maybe a year?\n\nJoey: I think that as more breaches come to light, and more research is being done in the area, and blogs are being posted. And companies are doing, you know, proactive exercise, such as pen testing, or conducting tabletop exercises. And, you know, at a management level, people were being made aware of some of the threats out there of how one machine being compromised could lead to thousands of machines being compromised. It’s going to change the response as a whole from organizations to be able to either invest more time or find solutions that will increase the visibility into their environments.\n\nCharles: I think the other thing that we’re going to be seeing is increased use of threat intelligence, to determine how are threat actors attempting to move laterally? What techniques are they using? And what sort of services are being offered on underground forums, underground marketplaces, that threat actors might be leveraging, so we can protect ourselves against those proactively.\n\nThe idea here being, if I’m using my threat intelligence effectively, it should also be telling me what tactics, techniques, and procedures threat actors are using so that I can implement defenses accordingly. So I like to hope that we see in organizations using this threat intelligence more effectively in the future, to protect against lateral movement as well.\n\nPam: Great. So before we close, any final words of advice, or insights that you want to share with the listeners?\n\nJoey: Know what’s running. I’ll say the biggest lesson that we hope to pass along from this podcast is take a look in your environment, know what’s going on. Log in to a random machine on your network that you have access to if you’re on the security team. If you’re not on the security team, and you’re in management, ask your security team, “Hey, or do we have any of these tools running in our environment? Should it be there? Are we reviewing access of those tools?”\n\nCharles: I think my parting thought overall is that for a long time in cybersecurity industry, we blamed the user. We said, “We can’t believe, this guy clicked on that email. I can’t believe that this guy went to that website.” And we keep blaming the end user for the fault here.\n\nBut at the end of the day, the breaches that we’re seeing cost the most money, the instances that we’re seeing, causing the most havoc, and causing the most harm to organizations – the harm isn’t coming from the guy who clicked on one email, the harm is coming from the fact that the guy clicked on email, and then it spread to 1,000 more machines and caused critical damage.\n\nAnd I think we have to stop blaming the user and stop blaming the victim at the end of the day and start saying how can we approach this from a strategic and organizational standpoint, to better protect ourselves. And the very first step here is by preventing lateral movement. If the organization can make it so that every infection is limited to just a few machines, then you’re never going to have a major issue, or you’re very rarely going have a major issue that it’s going cause critical business stoppage or critical harm to the organization.\n\nPam: I really like the sentiment that it may not necessarily be the user’s fault. We put a lot of emphasis on user education, and user education in cybersecurity. It is honestly the worst thing to try and get people to do. And it’s not just getting them to do it, but practically apply it and get it right 100 percent of the time. Because we’ve had heard people say many times, cyber security professionals have to get it right every time attackers only have to get it right once.\n\nAnd you really see that when it comes to this whole idea that user training may not be the thing that solves everything certainly you don’t want to just not have it. But when you take a look at corporate structure and the IT network, and how that’s all connected together, and some of the points that they made about, well, how could you even segment your network and we draw that out. And so I really like that sentiment that yes, there is more work to be done by IT groups in order to set things up. So a user failure isn’t the worst thing that’s going to happen.\n\nDavid: Right, I don’t think we can always count on humans to get it right 100 percent of the time. But we can engineer things and structure things in such a way that we’ve compartmentalized and made it very difficult to make mistakes, make it difficult to exploit things. And then build in those risk medications is layers, anticipating an error rate, anticipating that you’re going to have mistakes occur.\n\nPam: So David, do you have any good news for us this week?\n\nDavid: Yeah, Pam, there’s a really interesting piece of news that came out. The GozNym gang, the criminal gang, was shut down. Law enforcement working across country — so different groups, international law enforcement — were able to arrest 10 different defendants in five different countries. You know, this is a group that was seeking to steal up to $100 million from folks. And you know, it’s great to see a payoff like this, something that’s public, something that’s really tangible, stops a group like that in their tracks.\n\nAnd then I think the icing on the cake is that our X-Force team, you know, had a little hand in naming and seeing that gang’s pattern and passing that along to our counterparts in law enforcement. So sometimes it’s hard to describe what we do in our business. And it’s nice to be able to point to something like this, where it all works. You’ve got somebody that wants to take advantage of lots of different victims, and you’re able to put a stop to that.\n\nPam: And I think it’s really great to see the partnership between the business world and political, and you know, state organizations because that’s what’s needed when, as you said, it’s five different countries. So a lot of different coordination needed to happen to make that success in taking down the network. And I just love it when we see those success stories where business is able to partner with government and make things happen.\n\nAnd that is it for this episode. So thanks to Charles DeBeck and Joey Victorino for joining us as guests.\n\nDavid: Listen to this podcast on SoundCloud or wherever you get your podcasts. And for more security stories, visit SecurityIntelligence.com. A big thanks to our producers, Megan and Ted, and most of all, thanks for listening.\n\nDouglas Bonderud\nFreelance Writer\n\nread more", "pred_label": "__label__1", "pred_score_pos": 0.9018090963363647} {"content": "\n\nStudy Shows Your Election Reactions May Impoverish Your Investment Gains\n\n\nWhich party is in the White House has little to do with market returns.\n\nAn investor's political perspectives can negatively impact their investing decisions.\n\nHaving and following a sound investment philosophy requires overlooking personal emotions.\n\nWe’ve written several articles about how your own politics as well as the politics of your investment manager may impact the potential success of your personal financial planning. Now, there is a study that illustrates that effect.\n\nAn article by Bloomberg News entitled, “Republicans likely fared better than Dems in market boom” cites a paper from the National Bureau of Economic Research entitled “Belief Disagreement and Portfolio Choice.” The study concluded that Republicans likely increased the exposure of their investments to the US stock market after the election of Trump while Democrats likely increased their relative holdings of bonds and cash-like securities. The researchers suggested that the 2016 election offered a unique opportunity to measure such an effect:\n\nThe public signal of the 2016 election was almost unique in its unexpected and large impact on national economic policy which makes it easier to measure the effects of the election shock and the consequent changes in economic beliefs, and to separate these effects from other coincident factors affecting beliefs and portfolios. The presidential election outcome was an unlikely event and the policy differences between presidential candidates were large. These large magnitudes reduce any bias arising from the normal changes in the economy and politics that might also cause differences in portfolio behavior. To bolster this claim, we show that the portfolio share of equity moves similarly for Republicans and Democrats in the year prior to the election, presumably as other factors impact the economy.\n\nThe presumption that the political party we favor would be better for the stock market is a bias shared by both parties. When Obama was elected in 2008 many Republican investors moved out of stocks and into bonds. But the politics of that election were overshadowed by the stock market crash of 2008. As a result, any study would not have been able to eliminate factors beyond the election as a primary cause for movements in and out of stocks. But in perfect hindsight both movements out of the stock market caused portfolios to miss a large amount of capital gains.\n\nStock market returns have little to do with which party holds the White House, as we report in “Are Democrats Or Republicans Better For The Stock Market?” Politics matter less to our financial success than the ordinary decisions we face every day of living within our means and saving and investing in the markets. It is always a good time to hold a balanced portfolio.\n\nDon’t let your political emotions impoverish your financial well-being.\n\nPolitical news, even more so than financial news, is mentally and physically unhealthy.\n\n\nAdditional disclosure: Both the authors and the clients we manage often invest in the investments mentioned in these articles.", "pred_label": "__label__1", "pred_score_pos": 0.9681069254875183} {"content": "St. Louis, aerial view, 1969\n\nJust about 50 years have passed since Neil Armstrong set foot on the moon on July 21, 1969. Since then, Missouri has struggled to attract and keep residents, and its economy has failed to keep pace with that of the nation as a whole. Had Missouri’s population growth rate simply kept pace with the national average since 1969, our state would now be home to about 1.2 million more people. In terms of income for its residents, keeping pace with the nation as a whole would have meant that Missouri’s average annual compensation would be $3,387 higher today than it currently is.\n\nIn this essay, Rik Hafer and William Rogers provide insight into what has happened to cause such slow statewide growth. The authors go beyond the standard measure of economic growth, gross domestic product, and examine alternative measures of prosperity such as personal income and job growth. The picture that emerges is complex, but perhaps the most troubling finding—given the connection between an educated workforce and economic growth—is that Missouri consistently struggles to attract college graduates, particularly those with advanced degrees, to the state.\n\nTo read the complete essay, click on the link below.\n\nAbout the Author\n\nRik Hafer\nResearch Fellow\n\n\nWilliam H. Rogers\nWilliam Rogers\n", "pred_label": "__label__1", "pred_score_pos": 0.9926222562789917} {"content": "Category: World Quality Day\n\nHow Tianjin China Chemical Warehouse Explosion could have been avoided if OHSAS 18001 was in place\n\nTianjin China Explosion : Tianjin Dongjiang Port Rui Hai International Logistics Co. Ltd. which handles the transport of hazardous goods had a catastrophic accident and an explosion in their warehouse on August 12, 2015, near Tianjin Port located in the North East of China, One of the worst accidents seen by China in the recent days. The Tianjin warehouse", "pred_label": "__label__1", "pred_score_pos": 0.9668912291526794} {"content": "Livre d'or du FC Bantzenheim\n\nDate: 01/09/2019\n\nPar: romantische midweek\n\nSujet: But when the bandit is your spouse, confrere, or sprog\n\nAgreement boosting is traumatizing tolerable as it is. But when the brigand is your spouse, fellow-man, or petty, the fallout is that much more devastating. You pre-eminence be adept to votal.berfpan.me/trouwe-vrouw/romantische-midweek.php begin that some thimblerigger you don’t skilled in utilized your uniqueness to his or her own masses together, but accepting that the himself who victimized you is someone you adulation is a disparate the criminal element altogether.", "pred_label": "__label__1", "pred_score_pos": 0.980660617351532} {"content": "Tech Talk Tosiron Adegbija\n\nUA electrical and computer engineering professor Tosiron Adegbija. \n\nWith a major research university right in our backyard, a strong military presence and innovative companies throughout the metro region, there’s often a plethora of interesting science and technology news to be found in Southern Arizona. Here’s a breakdown of the most interesting recent developments.\n\nMicrobes vs. Toxic Explosives. In an attempt to reduce deadly incidents, the U.S. military is developing explosive compounds that can’t be detonated accidentally, though little is known about these new chemicals’ effect on the environment. The new “insensitive high explosives compounds” being developed by the military include 2,4-dinitroanisole or DNAN, which is similar to a toxic TNT, and can easily absorb into soil. But a team of UA researchers, led by chemical and environmental engineering professor Jim Field, is developing multiple new methods to remove these compounds from the environment. Using a grant from the U.S. Department of Defense’s Strategic Environmental Research and Development Program, the UA team is working with microorganisms which can feed on toxic compounds like DNAN and turn them into harmless compounds, such as carbon dioxide. The microorganisms can survive ingesting the compounds and will continue to do so as long as they are present. \n\nRaytheon Merges with United Technologies. In one of the largest corporate mergers of 2019, defense contractor Raytheon announced plans to combine with the United Technologies manufacturing conglomerate in an “all-stock deal.” The combined company, called Raytheon Technologies Corporation, will have an annual revenue of $74 billion, with United Technologies shareholders owning 57 percent of the company. Raytheon is one of the largest employers in Tucson, with over 11,000 employees. The combined company’s board of directors will comprise 15 members: eight from United Technologies and seven from Raytheon. Lead director of Raytheon Tom Kennedy will be appointed executive chairman of the new company and United Technologies chairman Greg Hayes will be named CEO. There is no expected change to either Raytheon or United Technologies’ financial outlook for 2019. The merger is expected to close in the first half of 2020. \n\nSTTRAM, not RAM. University of Arizona electrical and computer engineering professor Tosiron Adegbija is researching an alternative kind of computer memory to reduce energy consumption and save space in mobile devices. Whereas many computers store data in the form of random-access memory, or RAM as it’s commonly known, Adegbija is researching “spin-transfer torque random-access memory,” or STTRAM. This RAM-alternative can store the same amount of data, but does so using only one-quarter to one-ninth the space, which is especially useful for small devices like cell phones. The downside is that STTRAM generally retains data for much longer than standard RAM, making it less energy efficient. But Adegbija and his team are redesigning STTRAM systems to retain data for only as long as needed by a program, reducing energy consumption by up to 84 percent. This way, computer systems can benefit from the space-saving quality of STTRAM and consume less energy.\n\n16-Day Stratollite Mission. World View Enterprises, a Tucson-based near-space exploration and technology company, recently announced the completion of a 16-day mission by their “stratollite” high-altitude balloon vehicle. The mission launched from “Spaceport Tucson” on May 18 and traveled more than 3,000 miles in the stratosphere over the next two weeks, finally landing in Nevada. During its time in the air, the stratollite demonstrated one of its key advantages over traditional high-altitude balloons: being able to stay within a designated location. During the mission, the stratollite, which remained controlled from Tucson, demonstrated 6.5 hours of continuous “station-keeping” within a 9 kilometer area. At the end of the 16 days, the stratollite also demonstrated its precision descent system, landing within 400 feet of its targeted waypoint in the Nevada Desert.", "pred_label": "__label__1", "pred_score_pos": 0.8988643884658813} {"content": "By Jubin Katiraie\n\nThe United States has reiterated that the Iranian government is “the world’s leading state sponsor of terror” and called on the international community to come together to ensure that agreements restricting the “regime’s” malign behaviour are not allowed to expire.\n\nThese agreements include a travel ban on Qasem Soleimani, the head of the brutal Islamic Revolutionary Guards Corps (IRGC), a group the US already designated as a terrorist entity, and a freeze on allowing Iran to sell weapons or buy military equipment.\n\nA statement on the State Department website reads: “Soon after [October 18, 2020], the Iranian regime will be free to sell weapons to anyone, including terrorist proxies, and countries like Russia and China will be able to sell the Iranian regime tanks, missiles, and air defence equipment. This could start a new arms race in the Middle East and further destabilize the region and the world.”\n\nSecretary of State Mike Pompeo tweeted: “The clock is ticking. Time remaining before the UN arms embargo on Iran expires and Qasem Soleimani’s travel ban ends. We urge our allies and partners to increase the pressure on the Iranian regime until it stops its destabilizing behaviour.”\n\nThe statement explains that the Tehran’s “malign behaviour and support for terrorist proxies” has been allowed to grow basically unchecked for over 40 years.\n\nThe 2015 Iran Nuclear Deal formally known as the Joint Comprehensive Plan of Action (JCPOA), was supposed to stop Iran’s aggression after it was implemented by giving sanctions relief in exchange for curbs on the Regime’s nuclear program. In reality, it did nothing of the sort. The statement says that the JCPOA only gave the Regime more resources and money that were used to expand the Regime’s power over the Middle East, fund terror cells, and build ballistic missiles.\n\nThe statement read: “This is why the United States left the JCPOA and implemented decisive sanctions to curb the regime’s ability to fund terror.”\n\nIndeed, over the past 15 months, since pulling out of the nuclear deal, the US has imposed major sanctions against Iran, especially its lucrative oil industry. This has crippled the economy and the Regime could soon buckle under the pressure and be forced to come back to the negotiating table. It could even cause the Regime to collapse and allow the Resistance to take over.\n\nThe statement read: “The international community must stand together against the Iranian regime’s support for terror. Time is ticking.”", "pred_label": "__label__1", "pred_score_pos": 0.7220270037651062} {"content": "Worksheet: Newton's Second Law: Constant Mass\n\nIn this worksheet, we will practice using Newton's second law of motion with a particle with constant mass under the action of constant force.\n\n\nWhat is the weight of a/an 178 kg body in newtons? Consider the acceleration due to gravity to be 𝑔=9.8/ms.\n\n\nA bullet of mass 63 g was fired toward a fixed barrier at 80 m/s. Given that it penetrated 5 cm into the barrier before it stopped, find the resistance of the barrier to the bullet’s motion.\n\n\nA body of mass 37 kg was placed on a smooth horizontal surface where a force 72 N was acting on the body such that its line of action made an angle of 60 downward from the vertical. Determine the acceleration of the body 𝑎 and the magnitude of the normal reaction 𝑅. Round your answers to the nearest two decimal places.\n\n • A 𝑎 = 6 2 . 3 5 / m s , 𝑅 = 3 9 8 . 6 0 N\n • B 𝑎 = 1 . 6 9 / m s , 𝑅 = 7 3 . 0 0 N\n • C 𝑎 = 1 . 6 9 / m s , 𝑅 = 3 9 8 . 6 0 N\n • D 𝑎 = 6 2 . 3 5 / m s , 𝑅 = 7 3 . 0 0 N\n\n\nA body of mass 30.6 kg was at rest on a smooth horizontal plane. A horizontal force 51 N acted on it for 5 seconds. Determine the body’s speed at the end of the 5 seconds.\n\n\nA constant force acted on a body of mass 9 kg, such that its speed changed from 58 km/h to 66 km/h in 12 a second. Calculate the magnitude of the force.\n\n\nIt took one minute for a van of mass 3.5 tons to accelerate from rest to a velocity of 18.9 km/h. What was the average force provided by the engine while it was accelerating? Use 𝑔=9.8/ms.\n\n\nThe ratio between the masses of two bodies at rest is 2349. If a force of magnitude 𝐹 acts on each of them, find the ratio between the resultant acceleration of each body.\n\n • A 4 9 2 3\n • B 2 3 4 9\n • C 3 6 2 5\n • D 1 8 1 3\n\n\nA train of mass 55 metric tons was accelerating at 4 cm/s2 along a horizontal track. Given that the driving force generated by the engine was 4,950 kg-wt, and the acceleration due to gravity is 9.8 m/s2, find the resistance to its motion per tonne of its mass.\n\n\nA bullet of mass 45 g was fired at 53 m/s toward a fixed wooden barrier that was 40 cm thick. Calculate the exit speed of the bullet as it leaves the rear side of the wooden barrier, given that the resistance of the wood to the bullet’s movement was 4.5 kg-wt. Take 𝑔=9.8/ms.\n\n\nA tank of mass 41 metric tons started moving along a section of horizontal ground. The resistance to its motion was 9 N per tonne of its mass, and the magnitude of the force generated by its engine was 1,450 N. Determine the tank’s speed 472 seconds after it started moving rounding the result to the nearest two decimal places.\n\n\nA hot-air balloon of mass 1.5 metric tons was accelerating vertically downward at 106.2 cm/s2. Given that the acceleration due to gravity is 9.8 m/s2, find the lift force generated by the hot air.\n\n\nA certain force acted on three distinct bodies causing each to accelerate at a different rate: the first accelerated at 4𝑎, the second at 7𝑎, and the third at 𝑎. The three bodies collided and coalesced into a single body. Given that when the same force acted upon this new body, it resulted in an acceleration of magnitude 𝑎, find the ratio 𝑎𝑎:.\n\n • A 1 1 2 :\n • B 1 2 1 :\n • C 2 8 3 9 :\n • D 3 9 2 8 :\n\n\nA balloon of mass 1,086 kg was ascending vertically at 36 cm/s. If a body of mass 181 kg fell from it, find the distance between the balloon and the body 11 seconds after the body fell. Take 𝑔=9.8/ms .\n\n\nA balloon of mass 𝑚 kg carrying a body of mass 𝑚 kg was moving vertically upward with an acceleration of 112𝑔. The body fell from the balloon, and the balloon started moving with an acceleration of 14𝑔. Given that the elevator force of the balloon and the resistance to its motion are constant in both cases, determine 𝑚 : 𝑚. Take 𝑔=9.8/ms.\n\n • A2 : 11\n • B13 : 2\n • C2 : 13\n • D11 : 2\n\n\nA train, weighing 136 tons, was moving along a horizontal straight railway with a uniform velocity of 14.7 m/s. While the train was moving, the last carriage, weighing 17 tons, was separated and decelerated to completely stop after 80 seconds. If the resistance per ton of the train’s mass was constant, determine how many seconds it took for the distance between the train and the separated carriage to be 42 m.\n\n\nA train of mass 598 metric tons was accelerating uniformly at 19 cm/s2 when the last carriage of the train was released. The resistance to the movement of the train was 4 kg-wt per tonne of the train’s mass. Given that the last carriage had a mass of 25 metric tons, find the resulting acceleration of the train after the carriage was released. Take 𝑔=9.8/ms.\n\n\nA body of mass 45 kg fell vertically from a point 70 cm above a sandy surface. Given that the body penetrated a distance 𝑠 cm into the sand and that the resistance of the sand to the body’s motion was 150 kg-wt, find the value of 𝑠. Take 𝑔=9.8/ms.\n\n\nA train of mass 21 metric tons was moving on a straight track at 105.84 km/h. Suddenly, the last carriage, of mass 7 metric tons, detached from the rest of the train. The resistance to the train’s movement at any given moment equals 50 kg-wt per tonne of the train’s mass. Find the time 𝑡 taken for the released carriage to come to rest and the speed 𝑣 of the remaining part of the train at time 𝑡. Consider the acceleration due to gravity to be 9.8 m/s2.\n\n • A 𝑡 = 6 0 s , 𝑣 = 4 4 . 1 / m s\n • B 𝑡 = 6 0 s , 𝑣 = 7 8 . 4 / m s\n • C 𝑡 = 5 8 7 s , 𝑣 = 4 4 . 1 / m s\n • D 𝑡 = 5 8 7 s , 𝑣 = 5 8 . 8 / m s\n\n\nA bullet of mass 50 g was moving horizontally at 60 m/s when it hit a target at rest. The target was formed of two adjacent layers. The bullet passed through the first layer, which was 32 cm of fibreglass, and then it penetrated 34 cm into the second layer, which was made of wood, before it stopped. If the resistance of the wood is two times that of the fibreglass, determine the resistance of the fibreglass.\n\n\nA body of mass 41 kg was moving along a horizontal road at 14 m/s. A force started acting on the body opposing its motion. As a result, over the next 26 m, its speed decreased uniformly to 12 m/s. Find the magnitude of the force which caused this change in the body’s motion.\n\n\nA right circular cylinder of height 40 cm, radius 18 cm, and mass of 18 kg was moving at 11 m/s when it entered a dusty cloud. The action of dust on the body caused a resistance of 0.05 g-wt for every square centimetre of the area of its curved surface. Given that it passed through the dusty cloud for 25 seconds, determine its speed as it came out the other side. Take 𝜋=227.\n\n\nA force of magnitude 6 N was acting on a body of 4 kg. Given that the body started moving from rest, find the distance the body covered in the first 10 seconds of its motion.\n\n\nA train of mass 27 metric tons started moving out of a station. The force of its engine was 97.2 kN more than the total resistance to its movement. It continued accelerating under this force until its speed reached 28.8 m/s, and then it continued moving at this speed for some time. Finally, the operator applied the brakes, which in turn caused the train to decelerate at 7.2 m/s2. Given that the total distance the train traveled was 4,377.6 m, find the total time of the trip.\n\n\nA body of mass 6 kg is initially at rest at a point 𝑂. It starts to move under the action of a force 𝐹(𝑥)=(2𝑥+8)N where 𝑥 m is the displacement of the body from 𝑂. Find the displacement of the body when its velocity is 𝑣=4/ms.\n\n\nA body of mass 2 kg moves along a straight line under the action of a force, 𝐹. The force acting on the body is 𝐹=(9𝑥+7) N, where 𝑥 is the displacement of the body from its initial position. Determine the velocity of the body, rounded to two decimal places, when 𝑥=4m.\n", "pred_label": "__label__1", "pred_score_pos": 0.8052248358726501} {"content": "Botelhos Tourism\n\nBotelhos is a municipality in the state of Minas Gerais in the Southeast region of Brazil. The city was originally known as São José dos Botelhos but was elevated as a municipality on August 30, 1911 and renamed as Botelhos since 1915. Botelhos is known for its many religious denominations and Mateus Jerônimo Guiddi has been the mayor of the municipality since 2013.\n\n\nA place in Brazil, Botelhos is an interesting place to visit, given its unique culture, history and character. Botelhos is located at a short trip away from Campos Do Jordao a major city in Brazil. Attractions in Campos Do Jordao include Morro Do Elefante, Ducha De Prata, Amantikir Jardins. Get in the character of the city, this city requires at least of 1 to 2 number of days of exploration.\n", "pred_label": "__label__1", "pred_score_pos": 0.9980940222740173} {"content": "Materials of daily use\n\nMan started using materials to make life easier, he began using rocks and wood to make tools, further he employed other materials from plants, animal skin etc to make clothes. As evolution progressed , man's need for materials also increased. Today there are so many materials being used. Let's study some of them, what they are used for, how do we get them, etc.\n\nThere are many materials; they range from grass to fur to much more elaborate and exotic. Some cultures, such as the various people in the coldest parts of the world, like the Himalayas, made their clothing entirely of prepared and decorated furs and skins. Other cultures have supplemented and replaced leather and skin with cloth. Cloth is either woven or knitted and can be made from a large variety of fibers, which in turn can be natural, cellulose, or synthetic.\n\nOrganic fibers have been used for many centuries to make cloth and are still used today. While some organic materials, such as wool, are taken from animals, a number of plants provide fibers that are spun into yarn and used to make cloth. Designers and manufacturers still make clothes from cloth incorporating fibers from plants such as cotton, flax and hemp.\n\nClothes are made from lots of different materials. Some materials, like leather, are made from animal skins. Cotton and linen are made from plants.\n\nOther materials, such as polyester, are called 'man-made materials'. This is because they are not made from animal skins or plants.\n\nA material which is available in the form of a thin and continuous strand is called fibre.\n\nTypes of Fibre\n\nNatural fibers: The fibers which are obtained from plants and animals are called natural fibers.\n\nPlant Fibre: Cotton and jute are plant fibre.\n\nAnimal fibre: Silk and wool are animal fibre.\n\nSynthetic fibre: The fibre which are synthesized in the industry from simple chemicals obtained from petroleum are called synthetic fibre. Examples: Nylon, Acrylic, Polyester\n\n\nIn India, cotton is cultivated mainly in Maharashtra, Gujarat, Haryana, Punjab, Rajasthan, Tamil Nadu and Madhya Pradesh.\n\nAbout cotton\n\nCotton is cultivated in black clay soil. It needs warm climate. The sowing of cotton crop is done in early spring. Cotton plants are bushy and about 1-2 meters tall.\n\nSteps in making cotton yarn:\n\n 1. The raw cotton is loosened and cleaned; to remove straw and dried leaves.\n 2. The cleaned cotton is then fed into a machine. The cotton fibre are combed, straightened and converted into a rope like structure called sliver.\n 3. The sliver of cotton fibre is converted into yarn by spinning using machines.\n\nOther processes to make a raw material usable:\n\nWeaving: The process of arranging two sets of yarn together to make a fabric is called weaving. Cloth is woven on looms. After weaving the fiber is bleached and dyed for finish.\n\nKnitting: Knitting can be done by hand and machine. Just two yarns are used in knitting, while more than two yarns are used in weaving. Socks, scarf and caps are knitted from the wool.\n\nUses of cotton: Cotton is mostly used for making clothes of various kinds. Examples: dupattas, towels, saris. bed-sheets, etc.\n\nAbout Jute\n\nJute fiber is obtained from the stem of the jute plant. It is cultivated during the rainy season. Jute is grown in alluvial soil which is found usually in the delta Region of the Ganges and Brahmaputra rivers. In India, jute is mainly grown in West Bengal, Bihar and Assam..\n\nThe jute fiber is obtained from the retted jute by hand. Jute fibre is pale-yellow in colour and 2 to 3 meters long with a silky texture.\n\nJute fiber is used mainly for making gunny bags, shopping bags, ropes, carpets, curtains, etc.\n\n\nWe get wool from hair of animals like - sheep, goat, rabbit, yak and camel. Wool is used for making warm clothes, such as sweater, cap, shawl, gloves, and blanket, etc. Wool is also used in making carpets and upholstery.\n\n\nSilk fiber is obtained from the cocoons of the silk moth. The silk moth lives on the leaves of mulberry plants. There are four stages in the life cycle of silk moth: eggs, larva, pupa and adult.\n\nThe larva of the silk moth is called a caterpillar. It secretes a sticky fluid fibroin from its salivary gland (silk gland ) which forms a long thread.This thread is wrapped around the body of the caterpillar and forms a cocoon. This makes silk is a costly fabric. Silk is popular for making traditional dresses in India like sari, kurta, shawl and other wedding clothes.\n\nSynthetic Fibre\n\nSynthetic fibre is strong, wrinkle- resistant and quick drying. These are used in making different materials; like clothes, shawls, carpet, neck-ties, sails, sweater, and blankets. They are also used in making boats, skating boards, etc.", "pred_label": "__label__1", "pred_score_pos": 0.8429449796676636} {"content": "Wednesday, December 26, 2018\n\nDetermining the Original Intent\n\nWhen reading a document, it is important to understand the original intent of the authors. The goat rodeo hearings for the confirmation of Judge Brett Kavanaugh showed the lengths that some politicians will go to attain prominence for their own political viewpoints. Kavanaugh is an originalist, which means that he considers the original intent of the US Constitution when making his decisions. An interesting parallel can be made with interpreting the Bible.\n\nAn interesting comparison can be made between examining the original intent of the Bible and the US Constitution. Inserting liberal ideas have profound consequences.\nCredits: Left image, Freeimages / Robert Owen-Wahl;\nRight image: US National Archives and Records Administration\nIt seems reasonable to determine the intent of the authors. Obviously, there are some marked differences because the Bible was written by several people under the guidance of the Holy Spirit, and the Constitution was written by fallible men with good intentions. \n\nWhen the original meanings are abandoned, all sorts of bad judgments ensue. In the case of the Constitution, we had the Dred Scott decision and that unborn children are not legally protected as persons. When activist judges and other people believe that the Constitution is a living and evolving document, it can be made to say just about anything. Similarly, liberal religious leaders shy away from the original meaning of Scripture, torturing the text until it confesses to just about anything they desire.\n\nThe languages of both the Bible and the Constitution are important factors. The Constitution was ratified in 1788, so we have English language differences between then and now to consider. The Bible is much older and written in different languages, and the usage at the time is often a factor. For example, the word translated star (aster, ἀστήρ) has a broader meaning in the Bible than we use today.\n\nModern theologians bushwhack Genesis, conveniently ignoring the plain reading, valid exegesis, the historical-grammatical approach, and logical thinking so they can compromise with long ages and evolution. We also see the same violence applied to other passages in the Bible. A great deal of confusion and bad decisions could be avoided through commitment to the original intent.\nIn the recent Supreme Court nomination furor, Evangelicals were often named by the media as supporters of the originalist nominee. The reason for this is obvious as to hold on to biblical mores and values, a fidelity to the culturally Christian context within which the constitution was framed is essential. It is therefore a bitter irony that many of these same evangelicals do not take an originalist position on our own ‘founding document’ as Christians, the Bible—particularly the ‘preamble’ to the Bible, the opening chapters of Genesis. Many (in fact most) evangelical leaders today have abandoned the fundamental principle of a historical-grammatical approach to their interpretation of the scriptures when it comes to origins. This approach basically entails the idea that the original meaning of the words and the intentions of the authors are essential in rightly understanding and interpreting the Bible. The scriptures are divinely inspired and therefore stand on their own authority.\nThere can be no doubt as to the intent of the original writers of Genesis. In a well-known quote the Oxford Hebrew scholar James Barr, himself hostile to the Genesis account of creation a few thousand years ago, nevertheless asserts,\nTo read the article in its entirety, click on \"Scriptural originalism — Searching for the meaning of Scripture\". Also, you may be interested in a podcast or transcript by Dr. Albert Mohler. Follow this link and look for \"As both sides attempt to read the tea leaves on abortion, the legitimacy of the Supreme Court is called into question\".", "pred_label": "__label__1", "pred_score_pos": 0.8995994925498962} {"content": "BARDAN Nepali Movie Trailer_exclusive\n\n\nकृपया हामी संग फेसबुकमा जोडिन लाइक र पोस्ट शेयर गर्नुहोस\n\nनया भिडियोहरु\n\n\nAdhunik Songs,66,Amazing,2,Beauty,1,education,1,Europe,16,Fashion,9,film songs,75,Gossip news,1,Health,2,Life,1,Live Stage,9,lounge & Baar,1,movie,10,MUsic,24,music award,1,Music Vdo,2,Nepali movie,3,nepali pop,157,Recents,590,Show,25,social work,1,sports,1,Tihar Songs,5,trailers,52,पोस्टर रिलिज,1,\nEuropeNepal.Net: BARDAN Nepali Movie Trailer_exclusive\nBARDAN Nepali Movie Trailer_exclusive", "pred_label": "__label__1", "pred_score_pos": 0.9938076734542847} {"content": "Cosne Sur Loire Airport by helicopter\n\n\n\nLatitude 47.360513\nLongitude 2.920604\nDMS Format 47° 21' 37\"N, 2° 55' 14\"E\nRoute de Nevers, 58200 Cosne-Cours-sur-Loire, France\nCosne Sur Loire Airport LFGH\n+ 33 3 86 28 19 64\n* You do not have permission to see Site Operator's Notes for this site. Why?\nNotify PPR", "pred_label": "__label__1", "pred_score_pos": 0.8562428951263428} {"content": "Posts Tagged ‘Nanlai Cao’\n\nBook Review, “Constructing China’s Jerusalem”\n\nMarch 10, 2013\n\nCao, Nanlai. 2011. Constructing China’s Jerusalem: Christians, Power, and Place in Contemporary Wenzhou. Stanford: Stanford University Press.\n\nBy: Steve Hu (University of California, Santa Barbara)\n\nThe explosive growth of global Christianity in the last century is nowhere more evident than in China where approximately 67 million Christians, roughly 5 percent of the total Chinese population, claim affiliation to Christianity (Pew Forum Report, Global Christianities: A Report on the Size and Distribution of the World Christian Population, 2011). Due to its sheer size and recent ascendency in this context, Chinese Christianity has proved to be a fruitful field of research for scholars interested in the status of religion in China. Constructing China’s Jerusalem: Christians, Power, and Place in Contemporary Wenzhou is an example of this growing research. While existing literature approaches the question of religion in China through an oppositional binary framework pitting the hegemonic state against religion, Nanlai Cao’s ethnography moves beyond this “conveniently defined political context of state-society relations” (7) by examining the everyday practices and lives of Chinese Christians in Wenzhou, China. The key issue in Cao’s book is the relevance of Christianity in the ways Wenzhou Christians construct and negotiate their identity and social power in a rapidly changing post-reformist Chinese society. In addressing this issue, Cao examines the rupture caused by conversion to Christianity and the subsequent tension Wenzhou Christians must face. Based on 19 months of fieldwork completed between 2004 and 2006, Cao argues that the theme of discontinuity figures prominently in how these Christians produce, consume, and interpret themselves in the construction of their Christian identity.\n\nThe main actors of Wenzhou Christianity are “boss Christians”—middle-aged private business owners whose financial success, social capital, and commitment to Christianity provide them an increasing confidence and influence in negotiating with the Chinese state. The success boss Christians have enjoyed since China’s transition to a market economy allows them to overtly display their religious identity in public. Cao notes commitment to Christianity requires boss Christians to take a spiritual approach to world matters since Christian identity tends to demarcate a sharp division between the worldly and the spiritual. While economic success has provided financial and social capital for these Christians, the pursuit of business and profit is nevertheless considered a profane activity. Noting that their economic success is the result of “God’s special care” (25), boss Christians are mindful of the rupture wrought by their conversion to Christianity and cast their entrepreneurial pursuits in Christian terms. Instead of crediting economic success to an entrepreneurial work ethic, boss Christians interpret their ascendancy to “the work of the Holy Spirit,” “God’s guidance,” and “God’s mercy” (35). To be sure, reconciling the tension associated with this rupture proves difficult and some Wenzhou Christians resolve this by abandoning either their entrepreneurial or religious identities. Cao notes that as an upper-mobile social group, many boss Christians are finding ways to combine their entrepreneurial and religious identities since they can afford to construct a “dual identity by reshaping the church culture and distancing themselves from traditional rural Christianity” (36). In this milieu, economic success is interpreted as a way one can “work hard for the glory God” while meeting the demands of the secular state. That the manner in which boss Christians combine their understanding of Christianity with a pursuit of economic gain is an example of how Christianity may be deployed to “re-imagine local cultural sensibilities” (see Bialecki, Haynes & Robbins 2008). This deployment of Christianity by Wenzhou Christians has also garnered them recognition “as a useful social force” in the eyes of the Chinese government since local officials prefer to do business with entrepreneurs who adhere to Christian ethics since they are deemed trustworthy (30).\n\nWenzhou Christians increasingly seek ways to associate their faith with a modern and global Christianity in order to overcome the backwardness that has been associated with rural Chinese Christianity (61). Toward this end, Wenzhou Christians aspire to imitate Western church programs (Sunday School systems and worship choirs) and Western marital customs. Many Wenzhou Christians also view speaking English and being learned in Western theology as an essential part of being modern. This association with the West also allows Wenzhou Christianity to project a global and cosmopolitan posture. This can be seen in how Wenzhou churches regularly invite well-known pastors from the United States and Europe to preach in these churches. By forging transnational ties with other Christians around the globe and by linking their Christianity with the modern West, Wenzhou Christians aim to legitimize their Christian identity. Because Western modernity is perceived as the locus of legitimacy, linking Wenzhou Christianity to a cosmopolitan modernity strategically enables Wenzhou Christians to distinguish themselves and construct a unique identity that furthers their confidence in Chinese society. Cao argues these activities are undertaken in order to elevate the status of Wenzhou Christianity. While attempting to attach themselves to a cosmopolitan modernity, Wenzhou Christians also utilize the discourse of Christianity to assert moral superiority in what they perceive as a corrupt society. Boss Christians also map this moral discourse onto their business model in which biblical principles are applied to enterprise management (66). Furthermore, in legitimizing their Christian identity, Cao observes that Wenzhou Christians “blend” Christian principles with economic development so that ideas such as “doing business is serving God” echo the reformist state discourse of “letting a few people get rich” and “getting rich is glorious” (35). Cao contends that it is through such discourse that Wenzhou Christians continue to construct an assertive public faith that grants them social and political capital in relating with the state.\n\nThe adoption of Western modernity is also reflected in the development and organization of Wenzhou churches. Whether it is church-building projects, evangelism meetings, or church-related programs, Cao notes boss Christians are the main actors who supply the needed financial and social capital for these organizations to function. In the running of these churches and organizations, boss Christians adopt a secular approach and an enterprise model of management. One example is the construction of new church buildings where lavish spending is undertaken that reflects a consumer mentality that defines Wenzhou society (78). Here, fund-raising for new church buildings mirrors the practice of raising capital for family-owned enterprises which Cao notes blurs the boundaries between the sacred and secular (82). Furthermore, Wenzhou churches are organized and managed like family-owned businesses and even the preaching in these churches is sometime outsourced, relying on a “preacher-dispatch system” (86). When it comes to proselytization, boss Christians also apply entrepreneurial know-how and management strategies to draw more people to their churches. Cao also notes that a division of labor indicates Wenzhou Christianity has adopted a western secular style of management and organization and that the structure and logic of church organization is entrepreneurial. In developing a more visible and positive image, boss Christians “branded” Wenzhou Christianity through the adoption of Western modernity. This process renders Wenzhou Christianity as an amalgamation of modern, familial, and religious sensibilities.\n\nIn the last part of the book, Cao examines gender and class relationships that exist within the Wenzhou Christian community and points out that both gender and class are “organizing principles” in this context (97). While both gender and class legitimize individual expressions of Christian faith, Cao contends both categories also sustain and preserve existing ideologies of patriarchy and class in Wenzhou Christianity. What is interesting to point out in this last section of the book is Cao’s analysis of the boss Christians’ desire to construct their brand of Christianity as a modern and cosmopolitan institution. This is because there is a real anxiety within Wenzhou Christianity to distance itself from the “backward” and “feminized” Christianity practiced in rural China since the aim of Wenzhou Christianity is to legitimize itself and fashion itself as modern. To do so, boss Christians need to construct an “other” and objectify it in order to set themselves apart as masculine, cultured, and sophisticated. The other is thus found in women and the migrant workers who flock to Wenzhou factories in search of a better life. To be sure, women and migrant workers are empowered and made “modern” in their encounter with Wenzhou Christianity. However, such empowerment still exists within a power structure where boss Christians have relegated women and migrant workers to a lower status.\n\nWhile Cao’s work provides a much-needed examination of the status of Christianity in China beyond the oppositional binary framework, this book still presents some shortcomings. The discussion regarding how Wenzhou boss Christians adeptly navigate the question of religion clearly demonstrates the increasing confidence these Christians can assert in the public sphere. The economic success engendered by these Christians has enabled them to actively blend their religious and entrepreneurial identities and thus “depoliticizes” Christianity in the Wenzhou context. Cao notes that Wenzhou Christians desire to be integrated into mainstream society and seek to have clout in the public sphere. It is curious that Cao would assert that the desire for integration into mainstream society would “depoliticize” Wenzhou Christianity. As Cao points out, Wenzhou Christians have adopted a moral discourse that seeks to elevate themselves above the corruption they encounter in Chinese society. While this moral discourse may echo the reformist state discourse and may seem benign, such moral discourse still has the “political” potential, if seized by certain actors, to challenge the state. Furthermore, Cao omits the reaction of local officials regarding the role of Wenzhou Christians and how they perceive their activities. The addition of the voices of local officials certainly would shed light to whether the activities of these Christians are depoliticized. Regardless of these minor omissions, this volume is a timely study of the status of Christianity in China. By sidestepping the typical structuralist approach to understanding Christianity in China, Cao’s ethnography of Wenzhou Christianity offers a nuanced examination of the local production, consumption, and interpretation of Christian identity in southeast China. Cao’s focus on Christian identity and agency in Wenzhou also highlights the need to understand the notion of rupture that is at work in the everyday lives and practices of Wenzhou Christians. This volume is a much-welcomed examination of how Christians in a particular local context construe their identity and negotiate their social position in a rapidly globalizing world and offers an insightful contribution to the growing anthropology of Christianity.\n\nReferences cited\n\nBialecki, J., Haynes, N. and Robbins, J. 2008. “The Anthropology of Christianity.” Religion Compass, 2/6: 1139–1158.\n\nCao, “Renegotiating Locality and Morality”\n\nFebruary 26, 2013\n\nCao, Nanlai. 2013. Renegotiating Locality and Morality in a Chinese Religious Diaspora: Wenzhou Christian Merchants in Paris, France. The Asia Pacific Journal of Anthropology 14(1).\n\nAbstract: This paper explores the social and economic implications of indigenous Christian discourses and practices in the Wenzhou Chinese diaspora in Paris, France. Popularly known as China’s Jerusalem, the coastal Chinese city of Wenzhou is home to thousands of self-started home-grown Protestant churches and a million Protestants. Drawing on multi-sited fieldwork, this study provides an ethnographic account of a group of Wenzhou merchants who have formed large Christian communities at home, along with migrant enclaves in Paris. The study shows how these migrant entrepreneurs and traders have brought their version of Christianity from China to France and how they perceive and deal with issues of illegality, moral contingency, native-place based loyalty and national belonging. It highlights the thoroughly intertwined relationship between an indigenised Chinese Christianity and the petty capitalist legacy of coastal southeast China in a secularised, exclusionary European context, and suggests that Christianity provides a form of non-market morality that serves to effectively legitimate Wenzhou’s pre-modern household economy in the context of market modernity.\n\nCao “Constructing China’s Jerusalem”\n\nOctober 15, 2011\n\nCao, Nanlai (2011) Constructing China’s Jerusalem: Christians, Power, and Place in Contemporary Wenzhou. Stanford: Stanford University Press\n\nPublisher’s Description: Drawing on extensive ethnographic fieldwork and in-depth life history interviews, this illuminating book provides an intimate portrait of contemporary Chinese Christianity in the context of a modern, commercialized economy. In vivid detail, anthropologist Nanlai Cao explores the massive resurgence of Protestant Christianity in the southeastern coastal city of Wenzhou—popularly referred to by its residents as “China’s Jerusalem”—a nationwide model for economic development and the largest urban Christian center in China.\n\nCao’s study of Chinese Christians delves into the dynamics of activities such as banqueting, network building, property acquisition, mate selection, marriage ritual, migrant work, and education. Unlike previous research that has mainly looked at older, rural, and socially marginalized church communities, Cao trains his focus on economically powerful, politically connected, moralizing Christian entrepreneurs. In framing the city of Wenzhou as China’s Jerusalem, newly rich Chinese Christians seek not only to express their leadership aspirations in a global religious movement but also to assert their place, identity, and elite status in post-reform Chinese society.\n\n%d bloggers like this:", "pred_label": "__label__1", "pred_score_pos": 0.5551748275756836} {"content": "How To Use Volume To Identify The Best Momentum Stocks - Bulls on Wall Street\n\nHow To Use Volume To Identify The Best Momentum Stocks\n\nVolume is something you see mentioned everywhere in the trading world. But very few people explain how to interpret it, and what to actually look for. If you are wondering how to use volume in your trading to find the best momentum stocks, you should read this article thoroughly. It is a crucial variable for determining a potential momentum stock, for day trading and swing trading.  \n\nWhat Is Volume?\n\nVolume is the number of shares that is bought and sold of a stock over a given time period. When you using candlestick charting, you will see the number shares traded on one candle stick, usually at the bottom of the chart, of whatever time frame you are looking at. For example if you look at daily chart time frame, you will see the number of shares traded each day of a stock. If you switch to the 5 minute chart, you will see the number of shares traded every 5 minutes of a stock.\n\nThe Importance Of High Relative Volume\n\nThe best momentum stocks have high relative volume. This means they are trading well above the typical number of shares they trade per day. Stocks will usually trade at above average levels of volume when they are gapping up or down due to some type of catalyst, like earnings reports, FDA approval, or analyst upgrades or downgrades. Check out the daily of TWLO:\n\nmomentum stocks\n\nYou can see on all of the days when it is gapping with higher than normal volume. TWLO usually trades about 3-4 million shares per day. However on those days where it was gapping up or down with a catalyst, it trades between 10-20 million shares that day. Notice that it also trades larger than its typical daily range that day as well, which is exactly what you want as a day trader, because this means you are likely to capture a big move in the stock if you get the right entry.  You can learn more about the characteristics of the best momentum stocks in this article here\n\nHow To Know When A Stock Will Have High Relative Volume\n\nNew traders will not only ask about how to use volume, but also how to know beforehand when a stock will trade at above-average volume. A stock that is gapping up or down more than 4% with a catalyst will usually be trading with higher than average volume that day. However, another big indicator is to pay attention to how much volume comes into the stock at the market open in the first candle. Let’s look at the TWLO intra-day chart on 5/9 when it was gapping up in reaction to strong earnings:\n\nmomentum stocks\n\nYou can see that it traded almost a million shares on its opening 5 minute candle, about a quarter of what it typically trades in a whole day in just 5 minutes. When you see this much volume come in this early in the day, there is a very high probability that it will trade at well above average volume that day. Compare it to the opening 5 minute candle of a typical trading day. When you see a stock trading with that much volume at the open, is it a strong candidate to have momentum and go on a strong trend that day, especially when it has a breakout on the daily chart.  \n\nTechnical Breakouts and Breakdowns\n\nMomentum stocks can still trade at above-average volume without a catalyst. Another cause of a stock trading at above-average volume is a technical breakout on the daily chart. Look at the SQ daily chart when it broke out in March:\n\nmomentum stocks\n\nYou can see the volume that came into the stock after it broke out above that 48 level. Stocks just having technical breakouts will usually not experience as large of a volume increase compared to stocks gapping with some type of catalyst. However it is still a good indicator of when a stock could be beginning a strong trend intra-day, or on the higher time frames for a swing. The best momentum stocks are stocks that are gapping above resistance (or below support for a short play) on an earnings catalyst, and are trading at above average volume pre-market and at the market open.  \n\nGet 40% Off Our 60-Day Live Trading Bootcamp (Deal Ends Soon)\n\nWe don’t sugar coat it. Becoming a consistently profitable stock trader is easy, or an overnight process. That’s why our 60-day Live trading boot camp is designed specifically to help struggling traders overcome their weaknesses, and expedite their path towards profitability.\n\nEarly bird pricing for our next Live Trading Boot Camp ends November 1st, so hit us up ASAP to save your seat if you are serious about trading stocks for a living!\n\nClick here to save your seat, and get 40% off.", "pred_label": "__label__1", "pred_score_pos": 0.8875343799591064} {"content": "IFTTT not working sith Blynk digital inputs\n\nHello. I’ve bought a Google Home Mini and I’m trying to make it work with Blynk. I am using IFTTT but it doesn’t seem to work with Digital Pins, only with Virtual Pins. Here’s the IFTTT config:\n\nI also tried writing /pin/D1 and choosing PUT instead of GET, with body set to [“1”] but it doesn’t work. Any ideas on why this is happening?\n\nAre you using a NodeMCU or Wemos D1 Mini?\nWhat device have you selected in the app when you created your project?\n\nI can’t remember exactly how it works, but there’s a chance that if you reference pin D1 then it may change pin GPIO 1, or the pin labelled D1 on the board (which are different with a NodeMCU/Wemos).\nYou should experiment with various settings (using GET preferably) and work-out the correct way of doing it.\n\n\nI am using a NodeMCU, but I’ve also tried with pin D3 of another mcu and I get the same result\n\nI don’t really understand that answer.\n\n\nD1 (as shown on the board) is GPIO 5, so you would want /update/D5?value=1\nD3 (as shown on the board) is GPIO 0, so you would want /update/D0?value=1\n\n1 Like\n\nSolved. Thank you both", "pred_label": "__label__1", "pred_score_pos": 0.8229800462722778} {"content": "Bhopal/ Air quality remains poor; asthma patients double; Damoh most polluted in Madhya Pradesh; haze extremely harmful for lungs\n\nBhopal: The air quality in the capital remained poor for the second consecutive day. From morning till 12 noon, Ambient Air Quality Index (AQI) was recorded 222.\n\nPollution is now hitting the eastern parts of the state. Damoh was the most polluted city in the state on Tuesday with 235 AQIs. The air quality in Bhopal was very poor until 4:30 pm. After this, there was a slight improvement and AQI came down to 200.\n\nA low-pressure area remains in the Arabian Sea, while a cyclone is formed in the Bay of Bengal. There is moisture coming from both sides. This moisture has become a cloudy covering due to the accumulation at mid-troposphere (at a height of 4 km).\n\nThe cloud cover is not allowing the smoke and dust originating in the city to escape. Smog and dust accumulate under this cover of moisture, creating a state of mist.\n\nPollution will increase further after Diwali: Dr. Sarman Singh, Director AIIMS Bhopal, said if the pollution is not removed now and like every year, this time too many firecrackers on Diwali are burst, then the same pollution will reach fatal levels. So I request that you avoid burning trash and bursting crackers. It is a question of your life and health.\n\nExpert view: Dr. Alkesh Khurana, Head, Department of Pulmonary Medicine, AIIMS, Bhopal, said that the haze that has enveloped the city is very dangerous for lungs. Asthma patients have doubled here. Staying outside much longer can cause a burning sensation in the eyes, shortness of breath, hypertension, fatigue.", "pred_label": "__label__1", "pred_score_pos": 0.8576411008834839} {"content": "Centuries-Old Problem Addressed by UWS\n\nThis post was originally published on this site\n\nUW-Superior professor and retired staff member develop device to address centuries-old problem for beekeepers.\n\nWhen professor Ed Burkett (Doc Bee, as he is known by his students) lost all of the hives in the UW-Superior bee apiary during the winter of 2016, he came up with an idea to build a device to solve the problem. Today, it has a patent pending and is being assessed by a student team for business plan development.\n\nOne of the greatest challenges faced by beekeepers, particularly in polar climates, is the seasonal loss of beehives. On average, beekeepers in the United States lose about 30 percent of their hives during the winter months, with areas in the Upper Midwest losing as much as 50 percent. These losses translate into significant ecological and financial costs. Edward Burkett, University of Wisconsin-Superior biology professor, experienced this issue acutely in 2016 when all the hives in the UW-Superior bee apiary were lost during the winter months. He had just established the apiary on campus that year as part of the university’s Urban Honey Bee Project — an education, research and community service initiative designed to engage undergraduate students in research with honey bees.\n\nDoc Bee (as he is known by his students) came up with an idea to build a Beehive Wind Shield™, a device he believed would help solve the problem, and mentioned it one day to his friend and colleague, Kenn Raihala, a retired mechanical engineer at UWS.\n\n“I told Kenn about my idea and he said, ‘I can build that.’ I originally thought he’d just build a few devices and I’d put them on my own hives and those in the UWS apiary, and that would be it,” said Burkett. “But, Kenn is an inventor, so he did a patent search and couldn’t find anything close to what we had created.”\n\nThe Beehive Wind Shield™ is an innovative solution to a complex problem that arises in cold climates. Bees beat their wings inside the hive to keep it about 88 degrees, the temperature needed to survive. However, the heat and water vapor created by the bees causes condensation to form on the top of the hive in cold temperatures, which drips down on the bees and kills them.\n\n“So, beekeepers have a dilemma,” said Burkett. “They need the ventilation to keep the condensation down, but the air can also chill the bees and kill them. The Beehive Wind Shield™ is designed to protect the hive from wind\n\nContinue to read this article on the UW-Superior Website.", "pred_label": "__label__1", "pred_score_pos": 0.9977967143058777} {"content": "Showing results for \nSearch instead for \nDid you mean: \nCopilot Lvl 3\nMessage 1 of 4\n\nHow do we attract contributions to our small and niche but open-source repositories?\n\n\n\nI manage a number of open-source Python libraries for Raspberry Pi HATs, pHATs and other add-ons. We don't see a tremendous number of contributions, issues or pull requests across these libraries- and I want to find a way to incentivise people to contribute, and break the ice for beginners.\n\nSince the market with serve has a very large crossover with education and tends to attract many beginners, I'm also keen to encourage users to \"practise\" on our repositories by submitting examples, making tweaks to documentation and so on. (I'm keenly aware that this will create more work for me, but I'm keen to pay forward the help and patience which was demonstrated to me when I was first learning to code)\n\n\nI appreciate that some people might not be keen making contributions to libraries that may require a hardware buy-in, but I think there are enough users out there to make this worth trying.\n\n\nI've seen suggestions here for beginners to seek out the \"good first issue\" label, but we don't really have a project large enough to generate any suitable issues. Could I, perhaps, externalise my roadmap for library improvements and invite users to build out new features?\n\n\nI guess my TLDR is; how does a small GitHub repository motivate and invite its users to make contributions?\n\n\n3 Replies\nGround Controller Lvl 1\nMessage 2 of 4\n\nRe: How do we attract contributions to our small and niche but open-source repositories?\n\nYou could have a sprint event. I'm just out of one for Jupyter notebook\nPilot Lvl 1\nMessage 3 of 4\n\n\nI am a maintainer for several small and some very large open source projects. Without knowing more about what those libraries are and who the demographic is I can't really say. Open source adoption is often driven by need, so the question is where does your demographic look to for solving problems. Having a really great documentation site is super helpful.\n\n\nOne thing that we found is that IRC was alienating many of our newer users and decided to switch to slack (enabled the IRC gatreway for those who didnt want slack client) as this is what our community wanted after polling multiple times. I think it's really great to connect the developers in real time with a project with it's consumers regardless of what tech is used to facilitate. We also created a community repo to start building out a lot of things that make a project successful such as:\n\n- good contribution gudelines\n\n- information on accepting new libraries/plugins from the community\n\n- information on who are maintainers on various areas (if applicable)\n\n- insight into the pull request process\n\n- insight into how changelogs should be handled\n\n- build and release process (including cadence)\n\n- communication channels and how to use them ( having people ping `@channel` is a great way to piss off users at 3AM because they are in a very diffrent time zone ). Ideally restrict `@shoutouts` to maintainers to protect users from themselves and eachother.\n\n\nOne thing I find helpful for smaller projects is to try to invite repeated contributors who have quality work as a collaborator quickly. This helps give them assurance that even if you fall off the face of the planet they can keep maintaining it. For lareger projects similar principles apply however they tend to have more need to be cautious with inviting maintainers. \n\n\nAlso having good pull request and issue templates really help with improving the quality of the issues and pull quests. They help you say collect say version information that the user might not have included and rather than being able to say that was fixed in version x.y.z you have to ask for it. Same thing with pull requests. For example if you want people to update the changelog or require a testing artifact then have that be a checkmark they can click after creating the PR. This helps set expectations and allows them to react to your project needs, wants, etc. The less a user feels like they are fulfilling some nitpicky maintainers whims and more ok that's something the project expects me to do makes it a bit smoother. \n\n\nI try to always leave a reply before reviewing to people who have not previously contributed thanking them for their hard work and willingness to share back with the community.\n\n\nI think one of the more important things in keeping your contributors happy is to quickly review and release. Nothing is more frustrating when a project has a pull request that was merged say 8 months ago but never released. \n\nCopilot Lvl 3\nMessage 4 of 4\n\n\nThis is fabulously in-depth and helpful, thank you!\n\n\nI particularly like your approach to community guidelines and process- the separate \"Community\" repository is definitely something I'll look into adopting.\n\n\nSince our libraries are intended- first and foremost- to support our hardware products we don't have quite the same fuzzy feeling of a less specific open-source project. We do have quite a few code projects that have a wider appeal, however, including libraries for indivudual ICs, but these have a very limited utility outside of people looking to integrate those things into a design.\n\n\nStill, in the interest of full disclosure (actually I wasn't intending to be coy about this) I'm referring to our Pimoroni GitHub organisation:\n\nAny single product has a base of possible contributors narrowed down to only people who own that specific product, or perhaps have a unique contribution to make otherwise. I'm looking for anything I can do to lower the friction between those users and making their first contribution.", "pred_label": "__label__1", "pred_score_pos": 0.6638931632041931} {"content": "Experience Arabia\n\nMakan is an inventive restaurant that delivers a spectacular modern take on traditional Middle Eastern cuisine.\n\nIts not just a dining experience, but an exrtravagant journey through time, transporting patrons into the ancient Arab world through a culinary experience that exudes traditional effervescence\n\n\n\nExperience the luxury of Arabic cuisine in a plush space replete with incredible food and drinks.\n\nComing from the Arabic word for “place” and the Malaysian word for “food”, the fittingly named Makan is one of the top new places to go to for Middle Eastern cuisine. Head here to experience traditional dishes in a plush setting overlooking the sea, Located on the stylish, modern beachfront of North La Mer Jumeirah.", "pred_label": "__label__1", "pred_score_pos": 0.9024979472160339} {"content": "Infographics Designing\n\n\n\nDelivered over 500+\n\nprojects in 14+ countries\n\nInfographics Designing Company In Coimbatore\n\nInfographics has now become an internet phenomenon. It is a communication or marketing tool that combines visual graphics with text to present information-rich subject in a visually appealing form which is easy to understand. Tagwebs with its industry leading creative talent creates unique, innovative and creative infographics. As a leading Infographics design company we use our knowledge of the intricacies of building a viral campaign to create fresh ideas that are widely adopted by the social community.\n\nIn today’s digital world, with attention span of users are diminishing to record low of just a few seconds, the biggest challenge for any brand is to capture the user attention to convey their message. This calls for innovative and creative visually appealing presentations such as Infographics. The major issue faced with brands today is that users leave a website if they don’t find compelling content. The challenge is to create compelling content, not leave any space for confusion and make navigations easy like a breeze. With the case of a complex scenario dealing with intricate message that demands the inclusion of several layers, making it simple and easy to understand is a difficult task in hand! That is where our creative design company in India helps brands to engage their audience to their creative content including Infographics.\n\nHow is an Infographics campaign run?\n\nWe advance with an idea based on our research, recent trends and the trending hot topic in the social media scene.\nWe search through piles of data to make sure that we know everything about the subject we deal with.\nOur designers visualize the data and turn it into a well-polished infographics that is easy enough to understand but conveys the message in its entirety.\nWe continuously monitor trends and dips in rankings and take corrective actions as and when necessary.\nWe manage the social media accounts for the brands and orchestrate distribution of the infographics through Social Media handles. These contribute to referral traffic and thus in turn the brand’s search engine rankings skyrocket.\n\n\n\n\n\n\n\nOur Work Process\n\nReasons Why We Are Right Choice For Your Online Business.\n\n\n\nWe Understand your requirements and do project sketching first\n\n\n\nWe create sitemap, design and develop the website / portal accordingly.\n\n\n\nWe do complete responsive testing of website/ portal, Application and deliver.\n\n20% Offer For Infographics Designing", "pred_label": "__label__1", "pred_score_pos": 0.6265854835510254} {"content": "Canyon. Improve Health, Energy, And Fitness\n\nPatient Results\n\n“Unfailingly calm, caring, and compassionate!” “I made the decision to have my knee replaced without a lot of knowledge of really what would happen next. I found out. The process (and it continues) was more time consuming and more difficult than I would have imagined. One thing is clear---I could not have gotten through (and still get through) the ups and downs of knee rehabilitation without the professional staff at Canyon Sports Therapy. Danny and Jess were great. They were unfailingly calm, caring and compassionate. A marked contrast to my mood swings. They were always willing to answer questions, provide feedback, and most importantly—be honest with me. I’m still in the process—and will be for a long time. But I know I received a great start!” - D.D.\n\nOUR MISSION “To restore physical ability and bring out your inner athlete.”\n\nMade with FlippingBook flipbook maker", "pred_label": "__label__1", "pred_score_pos": 0.9428310394287109} {"content": "Main content area\n\nInter- and intra-specific trait shifts among sites differing in drought conditions at the north western edge of the Mediterranean Region\n\nGarnier, Eric, Vile, Denis, Roumet, Catherine, Lavorel, Sandra, Grigulis, Karl, Navas, Marie-Laure, Lloret, Francisco\nFlora 2019 v.254 pp. 147-160\ncarbon, chamaephytes, climate, climate change, drought, dry matter content, environmental factors, hemicryptophytes, interspecific variation, leaf area, leaves, nitrogen, phanerophytes, phenotype, phosphorus, plant architecture, plant height, plant response, prediction, seed weight, Mediterranean region\nIdentifying consistent and predictable associations between traits and environment is one of the oldest quest of ecology. Yet, there are few formal and robust quantification of such associations, which seriously impedes our capacity to predict how ecological systems respond to global changes, including climate. This study was designed to assess how differences in environmental conditions affect plant form and function in a wide array of species.Twelve traits were measured on 40 species in three Mediterranean sites differing in drought conditions. Some species being common among sites, 78 species belonging to four major Raunkiær life form categories were studied. These traits correspond to: (i) plant size: vegetative and maximum plant height, (ii) seed mass, (iii) leaf morpho-anatomical traits: leaf area, specific leaf area, dry matter content and thickness, (iv) leaf chemical composition: mass based nitrogen, phosphorus and carbon contents, and carbon isotopic fraction.On average, there was a shift in the phenotypic space towards more resource conservative and taller species in the drier sites. These changes were not always consistent for hemicryptophytes and chamaephytes on the one hand, and for phanerophytes on the other hand. This is interpreted as different species responding to different aspects of complex changes in environmental factors. Intraspecific trait variation differed among species, and was lower than interspecific variation. Changes in site-average trait values were therefore mostly driven by species turnover among sites.The traits selected do not respond strongly to the differences in environmental conditions however, resulting in a moderate shift in the phenotypic space between sites. We argue that traits more directly related to plant water economy should be considered for an improved description of plant phenotypic response to the environmental factors at stake. The implications for the prediction of plant responses to climate changes likely to occur in the Mediterranean Region are discussed.", "pred_label": "__label__1", "pred_score_pos": 0.9806769490242004} {"content": "Help blind people to use the computer\"\nA review by John\n\nThe advancements in computing have opened a new world of opportunities for individuals all over the world. It has helped people develop careers, many individuals schooled online, and millions of other work, study and are entertained through computers. How can people with sight challenges benefit from these advancements? This program is developed to help the over 280 million blind and visually impaired people across the world make use of computers. The program translates visual information on the computer verbally, so it makes sense to someone who is visually impaired.\n\nThis program is an open source project and has vast community support that has worked to create translations in many international languages such as Spanish, Italian, Russian, French, among many other languages. It supports many synthetic voices including eSpeak and Microsoft Speech API, among many others. The application also supports relevant third-party devices such as Braille display through the USB or Bluetooth.\n\nThe program reads out the tests in documents and websites verbally, it informs the user when the window changes and many other features that enable visually impaired people to use the computer efficiently.\n\nThe program can be launched with key combinations making it easy for people with sight challenges to launch.\n\nNVDA is licensed as freeware for PC or laptop with Windows 32 bit and 64 bit operating system. It is in enhancements category and is available to all software users as a free download.\n\nGive a rating\nlogin to vote\nNV Access Inc\nLast Updated On\nMarch 11, 2019\nRuns on\nTotal downloads\nFile size\n21,74 MB\n\nSimilar programs\n\nCan customize desktop. Change Windows icons and appearance\nWindows 7 Downgrade\nReverse Windows 7 Enterprise to a previous version\nChange or manage the logon screen\nChange desktop wallpaper with Microsoft Bing\nWindows Vista Transformation Pack\nWill update your Windows XP with the latest Vista GUI", "pred_label": "__label__1", "pred_score_pos": 0.9394859671592712} {"content": "Please enter a quantity.\n\n\nCrystal healing talisman with smooth, double-terminated Smokey Quartz crystal point, one from a tribe of seven (each its own unique individual. The minimal necklace braid is peace silk ('peace silk' is a name of silk made by ethical process where no silk worms were harmed) combined with organic unbleached linen yarn and grey micro-macrame cord allowing the pendant crystal to take centre stage. The unique beauty of this peace silk means that the braid includes thinner and thicker sections, mainly in cream tone but with some brown here and there - making the overall effect natural and organic. The tiny highlighting stones at the ends of the necklace braids are small Smokey Quartz cubes. The long necklace braid ends are are left open so you can tie the crystal to hang at your chosen height. This necklace would also be perfect in combination with others for a bohemian individual look.\n\nThis size of this crystal is just over 4 cm (1.6\") The long necklace braids are 50 cm (19.5\") each and come with a loosely tied reef knot to make it easy for you to wear straight away -if preferring a long length- but you can of course also open the braid ends to tie them shorter if you prefer wearing the crystal higher up.\n\n\n\nFREE shipping on this 'Tribe of Seven' crystal amulet ~\n\nRead here how to take care of your crystal jewellery.\n\n\nA grounding and calming stone that elevates moods and dissipates negative emotions. \"A Stone of Serenity\", it is comforting and protective for one's aura. Smokey Quartz is thought to assist in creative endeavours and also in setting personal boundaries. Offers protection against electromagnetic rays. A good healing stone for improving general feeling of well-being. Relieves anxiety and worry, wards off confusion. Shielding crystal to create a calm, safe environment.\n\nDOUBLE-TERMINATED QUARTZ: Due to a point in both ends, energy flows freely to both directions through this crystal, offering a sense of 'flow' in life. Particularly useful when working to help other people, or when doing healing work on oneself. Excellent for balancing and aligning the chakras. Can be used as a bridge between any two things, such as spirit and matter for example.", "pred_label": "__label__1", "pred_score_pos": 0.9958563446998596} {"content": "Uploaded by Natalie Eden Rañada\n\n\nNatalie Eden Ranada\nHave you ever experience not being able to breathe? Have you ever felt that\nemptiness inside of you just welling up with the empty echoes of the abyss or your\nvision just spinning as you walk during a normal day and the sounds you hear are\nunrecognizable? Truth is, I didn’t have a clue what to call it at first, but its’ name\nwas Anxiety.\nI never went to the Doctor but I knew deep down it was always there,\nclinging and mocking my every step and in everything that I do. Some days, I win\nits game but most days it takes over mine. Not to scare anyone but I am a Happy,\nkind, sensitive and jolly person and I love people. I love my friends, my family, my\nboyfriend, art, music, food and life. I am loved.\nSo why do I have Anxiety? I am not really certain but I think it because I\nhave the feeling of uncertainty,no one to talk to or when things don’t go as plan. I\nexperience panic attacks through simple situations such as confrontations, night\nterrors in my sleep wakes me up screaming and the usual insomnia that affects me\nbeing functional during the day. My parents knows about it but they don’t fully\ngrasp what I feel. I did what they told me that prayers would save me but sadly it\nisn’t enough. So days like these are scary especially when I am living alone with\nmy little brother while my parents are working abroad, the tears just flows and so\ndoes the shaking. Small pleas of help for 10 long years.\nMy music and my love for art helps me divert my attention to a brighter\nlight. Though I think it is time to meet a Doctor soon. I plan to make the first step\nto becoming better. So I hope anyone who is reading this and experiencing\nmoments like mine, take a step with me and let’s live for everydays.\nAnxiety and Disorder\nby Bailey Kay - Miss Sandy City International\nI was in seventh grade when I discovered I had anxiety. I\ndidn't go to school for 2 months because every day my\nmom would take me, and I would end up on the floor of\nthe car sobbing and hyperventilating. I was a sophomore\nin high school when I was diagnosed with depression. I\nskipped class a lot, I would cry over everything, and I\nwould never leave the house.\n“I thought everyone would be better off without\nI deal with depression and anxiety every day. I started\ndoing pageants my senior year. I discovered I loved\nvolunteering and helping others who were going through\nthe same thing as me. My platform is about speaking up\nabout depression and anxiety. Depression and anxiety\nisn't something to be ashamed of. Everyone and anyone can suffer. So why do we make it\nsuch a taboo thing to talk about? I discovered ADAA and was amazed that they stood for\neverything I believed in. They want people to be able to talk about what they're going\nthrough, they don't want you to feel like you're going through these things alone. That's\nwhy I joined this organization. It has really put a step out there for people to share their\nstories and to be able to talk to others going through these same trials. Anxiety and\ndepression is scary, but it's real and you don't have to feel alone.\nThis Is Not The End – Inspiring Speech On\nDepression & Mental Health\nI want you to know that, no matter where you are in life… No matter how low you have\nsunk… No matter how bleak your situation… This is NOT THE END.\nThis is not the end of your story\nThis is not the final chapter of your life.\nI know it may be hard right now\nBut if you just hang in there\nStick it out\nStay with me for a little while…\nYou will find, that this tough moment will pass, and, if you are committed to USING this\npain, using it to build your character, finding a greater MEANING for the pain, you will\nfind that, in time, you can turn your life around, and help others going through the same\nThe world right now is in the middle of a mental health crisis.\nIt’s estimated almost half the population suffers from depression at some stage\nthroughout their life.\nRather than join the cue, it’s important we it’s learn why we get down, and then how we\ncan change it, because believe it or not, we create our own negative feelings and we can\nalso ensure that we turn our lives around and be a positive change for others.\nThe reason anyone gets depressed always comes down to the CONSISTENT thoughts we\nthink, and the CONSISTENT beliefs we hold.\nLet me say that again.\nthink, and the CONSISTENT beliefs we hold.\nIf I believe I am fat, horrible, ugly and unworthy of love, I will most likely become\ndepressed or have depression thoughts\nIf my thought process is “I must be in a relationship and earn X amount to be happy” I\nmight get depression if I don’t achieve those goals.\nThe point here is that anyone that is depressed, is so, because there is an external factor\nthat didn’t materialize in their life –\ni.e…. (They have lost something outside of their\ncontrol, or don’t have something that is out of their control)\nthe most common\nreasons for depression are : a lost a job, relationship break downs or non existence, body\nimage, comparison to others.\nThe only way out of this is to work on yourself, every day.\nIn school we are taught how to get a job, but no one teaches us how to live in a state of\nNo one teaches us how important our conscious and unconscious\nthoughts and associations are.\nIs our happiness not worth more than a job?\nYes it is.\nAnd before you say, happiness won’t pay my bills – happiness WILL pay your bills,\nwhen you realize you will be 10 times more energized, focused and take positive action\nin your life, when you FIRST choose to develop yourself as a priority, and THEN get to\nall the “stuff” of the world.\nI’ve seen some people, who many would consider to “have it all” end their life because\nthey thought they were not good enough.\nA thought, a belief within them told them they were not worthy.\nThese people that many were jealous of, many envious of, were not good enough.\nYou must value yourself enough, to take the time EVERY SINGLE DAY to work on\nyou. To engage in something, that will ensure you are a positive influence on the world.\nThis of course doesn’t mean life will suddenly be perfect. The same life-challenges will\nshow up, but if your mind is strong, if you mind is at peace, your REACTION to the\nchallenging times will be very different.Your reaction will be HOW CAN I MAKE THIS\nWORK, not ‘why is this happening to me’\nAnd then others will look to you, not with pity but with HOPE, because your strength\nwill become their HOPE, their strength.\nYou really can be that powerful.\nYou can ditch the victim story, you can leave the pain behind and FOCUS on how you\nwill react next. How you will react positively.\nRead. Read all you can read to get your mind in a positive place.\nTake steps to ensure you will be in a better position next time – whatever pain you are\nsuffering – how can you ensure it won’t show again –\nTake little steps… and soon\nyou will be at the top of the stair case.\nDon’t give up\nYou are worthy\nYou are more than worthy!\nYou deserve to experience how great life can be – and you owe it to the world to be that\npositive change for others. To inspire others – who will look to you and say – he did it,\nshe did it, and I can do it too.", "pred_label": "__label__1", "pred_score_pos": 0.6042834520339966} {"content": "0 items - $0.00\n\nYour shopping cart is empty\n\nWhy not add some items in our Shop\n\nEvery effort has been made to accurately represent our products and their potentials. There is no guarantee that you will earn any money using the techniques and ideas provided with this website (TheDigitalMart.Net).\n\nExamples on TheDigitalMart.Net should not to be interpreted as a promise or guarantee of earnings. Earning potential is entirely dependent on the person using the information included on this site, the ideas and the techniques. We do not purport this as a get rich scheme. Your level of success in attaining the results claimed in this page depends on the time you devote to the ideas and techniques mentioned your finances, knowledge and various skills. Since these factors differ according to individuals, we cannot guarantee your success or income level. Nor are we responsible for any of your actions.\n\nMaterials in this page may contain information that includes forward-looking statements that give our expectations or forecasts of future events. You can identify these statements by the fact that they do not relate strictly to historical or current facts. They use words such as anticipate, estimate, expect, project, intend, plan, believe, and other words and terms of similar meaning in connection with a description of potential earnings or financial performance.\n", "pred_label": "__label__1", "pred_score_pos": 0.8707645535469055} {"content": "A: Probably best to take this one bite at a time:\n\nEncrypted: The process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.\n\nChat: A specific form of electronic communication. Originally containing only text, but in recent years has been upgraded to allow inclusion of images, video, and sound.\n\nClient: The application used by the end-user of the computer or mobile device.\n\nSo, and encrypted chat client is an application that allows two or more people to share text and possibly images, sound, and video among themselves, and prevents others from access by way of encoding the communication.\n\nExamples include Apple Messages, Wire, and Signal.", "pred_label": "__label__1", "pred_score_pos": 0.7792392373085022} {"content": "Only a fool will do it …\n\nA debate is currently going on, on the issue of building FCC (Future Circular Collider, with 100 Tev p-p colliding energy, will be run by CERN) after Dr. Sabine Hossenfelder wrote an Op-Ed article {The Uncertain Future of Particle Physics} at The New York Time on January 23, 2019, see .\n\n\nDr. Sabine Hossenfelder is a theoretical physicist at the Frankfurt Institute for Advanced Studies and is the author of the book: {Lost in Math: How Beauty Leads Physics Astray, Published on June 12, 2018). Her book criticizes the recent (past 40 years) development on the foundational theoretical physics which is based on the ideas of naturalness, SUSY and multiverse. She views that these lead the theoretical physics into a wrong path. However, she did not object the building the larger particle collider (larger than the current LHC) in her book. Her objection of FCC is only a recent conviction, after I informed her on December 6, 2018, that I have single-handed killed the China Super Collider project, see tweet below.\n\nOr see\n\n\nAlso see her statement {That’s right, I changed my mind about building a larger collider because I realized I am not consistent with myself when being in favor of it.}, see\n\n\nMore details about this debate, see her blog post: {Particle physicists surprised to find I am not their cheer-leader (February 02, 2019, )}.\n\n\nWhile Hossenfelder is rehashing this 100 Tev p-p collider debate on FCC of CERN, it will be very useful to review the HISTORY on the same debate for the China Super p-p 100 Tev collider.\n\n\nOne, the push for the China Super p-p 100 Tev collider began in 2015 by Dr. Shing-Tung Yau (William Caspar Graustein Professor of Mathematics) at Department of Physics of Harvard University, see ) who published a book:  {From the Great Wall to the Great Collider: China and the Quest to Uncover the Inner Workings of the Universe}, published by International Press of Boston, (214 pp.). ISBN 978-1-57146-310-4 (on Oct 23, 2015)}.\n\n\nThis book was reviewed by:\n\nBy Peter Woit (Not Even Wrong), see\n\nAnd, by (01 April 2016)\n\n\nTwo, Strings 2016 was held in Beijing in August 2016 to promote the Super China Collider (SPPC, 100 Tev.), see\n\nAlmost one thousand String theorists attended the conference, including David Gross (Nobel Laureate), Edward Witten, Nima Arkani-Hamed (who was then the Direct of SPPC project).\n\n\n\n\n\nThree, on 2016/09/04, Dr. C.N. Yang (Nobel Laureate) wrote an article against the SPPC project with the reason that China is still a developing country and is not ready for this kind of endeavor (not on the physics reason), see his article { }.\n\n\nFour, by December 2016, the promoters of SPPC project (Dr. Yifang Wang, the director of Institute of High Energy Physics (IHEP) of The Chinese Academy of Sciences, and Dr. Shing-Tung Yau)  had secured almost the entire HEP community to endorse the SPPC projects, the big names are, see ( for their endorsing articles) :\n\nStephen Hawking (December 30, 2016)\n\nSteven Weinberg (Nobel Laureate), December 28, 2016\n\nSheldon Lee Glashow (Nobel Laureate), December 23, 2016\n\nEdward Witten, December 21, 2016\n\nDavid Gross (Nobel Laureate), December 19, 2016\n\nNima Arkani-Hamed (Institute for Advanced Study, School of Natural Sciences, director of SPPC project)\n\n\nThe most convincing argument is from Stephen Hawking, saying {China has an incredible opportunity to become the world leader here — don’t waste it. A good example is to build the Great Collider that can lead high energy physics for the next fifty years.}\n\n\nFive, Hawking’s argument is very powerful for any political leader. By March 2017, the rumor says that the SPPC project was officially approved by the highest official of China (meaning by President Xi). Of course, Dr. C. K. Yang alone was no match to all those Nobel Laureates.\n\n\nSix, after knowing that SPPC program was officially approved, on April 7, 2017, I decided to oppose the project and wrote my first article. On May 5, 2017, I wrote my 4th (final article), see tweet .\n\n\n\nBy May 11 (less than one week later), I got the feedback that the SPPC program was officially killed. I tweet this on May 14, 2017, see\n\n\nMore details are available at\n\nFor the pdf of the four articles, see\n\nFor the Chinese version of the articles, see\n\n\nFrom the timeline above, it is super clear that I was the one who single-handed killed SPPC program of China.\n\n\nHow can I do it?\n\nOne, this kind of big project must be approved by the TOP, TOP leader, in this case, President Xi. While Xi is a great political genius, he does not know physics. That is, he will only count the names of each group. On the pro-group, there are three Nobel Laureates + Stephen Hawking (who is a super celebrity in China) + almost all HEP big names (Witten, Nima, etc.) + his physics advisors (Yifang Wang and Shing-Tung Yau). On the Con-side, there was only one (Dr. C. N. Yang) who did not opposite it on the reason of physics. Thus, if SPPC does not produce any physics, Xi will not be responsible for this. By all means, the SPPC program will make China the leader of the HEP for the next 50 years. Furthermore, a null result from SPPC will officially move HEP into new territory, abandoning the current paradigm. Furthermore, the claimed cost for SPPC was only 16 billion (US dollars) which is only a packet change for China as she had over three (3) trillion cash reserves at that time.\n\nConclusion: President Xi’s approving the SPPC project (as the rumor said in March 2017) cannot go wrong, 1) 20 billion is only a packet change, 2) will be the leader of HEP for the next 20 years at least, 3) the null result — > new paradigm, 4) almost 99.99% of HEP community support the project.\n\nThat is, no amount of physics or else arguments can defeat the 4 points above.\n\n\nTwo, as the supreme leader of China, President Xi has everything. All that he cares about is his achievement in HISTORY. If there is one line in the history says: {President Xi did not listen to the advice of Gong on the SPPC project}, this one sentence will destroy all his great legacy. Of course, if Gong is a nobody in Chinese history, this sentence will never be written. But President Xi knows all too clear that in the entire humanity (from ancient to eternal future) only one person he (Xi) cannot afford to challenge, the Gong. When he challenges Gong, a sentence will be written in history, either way.\n\nConclusion: my four articles are very powerful but truly carry no weight; as if they were written by others, they will carry no power at all on this debate. My name (the Gong) is the only reason killed SPPC project.\n\nNo leader in China has the courage to oppose me if he wants to preserve his legacy in History.\n\n\nOn the other hand, my name has no meaning in Japan. That is, the death of ILC (if happens, see note) will not be caused by my name. However, the Japanese must have investigated the SPPC case of China. My four articles (while carrying no weigh in China) must carry some weigh in Japan.\n\n\nI published a new book {Nature’s Manifesto: Nature vs Bullcraps; in January 2017 with the US copyright # TXu 2-078-176}. This book is available at many university libraries, such as Princeton, see graph below.\n\n\n\nIt is now available at\n\n\nAfter the publication of this book:\n\nEdward Witten has officially abandoned the String theory.\n\nSean Carroll is no longer hyping the multiverse; from January 25, 2017 to now, he is writing less than 1 blog a month in comparing to the average of one per week before that. See\n\n\n\nFor this new FCC debate, here is my tweet, see  (on January 29, 2019)\n\n\n\n\nWith my book, only a fool will build a new collider.\n\nWelcome Dr. Sabine Hossenfelder to the right (and winning) side of the history.\n\nIn addition to the China Super p-p collider (which I killed 18 months ago), there are two other super collider projects in the world.\n\nOne, ILC (International Linear collider) in Japan, and its fate will be determined next month (March 2019). With my killing the China Super collider, it is very hard for Japan to continue the project. It is very much dead with the recently leaked out rumor. We will see soon enough.\n\nTwo, FCC (Future Circular collider, will be run by CERN, the Europe project), and it is now very much in doubt.\n\nScott Aaronson (the David J. Bruton Centennial Professor at MIT) is a proponent of building the FCC but is admitting that FCC is now in trouble, see his comment ( ). This is also reported by Peter Woit (a very prominent HEP physicist), see graph.\n\n\nFor the past 40 years, both M-string and SUSY failed on every experimental test but insisted that they are the ONLY GAME in town.\n\nNow, Lee Smolin (a theoretical physicist at Perimeter Institute for Theoretical Physics) just admitted that they are not the only game in town, see graph below.\n\n\nThe above shows that SUSY and M-string theory is not the only game in town. This can be shown with the following graph.\n\n\n\nToday (2-19-2019), the New Yorker published an article {A different kind of Theory of Everything}, by Natalie Wolchover (interviewed Nima Arkani-Hamed),  Nima finally accepted the theory of Prequark, see graph below.\n\n\nTheoretical Physicist Matt Strassler and his group are still looking for new particles beyond SM (see ). But with the book {Nature’s Manifesto: Nature vs Bullcraps}, there cannot be one, the reason for not building FCC.\n\n\n{Note (added on March 7, 2019): the ILC of Japan was killed, see\n\nOn 22 Feb 2019, CERN director-general Fabiola Gianotti tried to sure-up the support for future larger colliders (including ILC) in a Physicsworld interview (see ). Also, see my tweet below.\n\nNow, Gianotti fails on this ILC issue.\n\nEnd note}\n\nSee the following tweets:\n\n\n\n\n\n\nWhy is there something rather than nothing?\n\nWhy is there something rather than nothing? Without getting an answer to this question, any physics theory cannot be the FINAL theory.\n\nHowever, Sean M. Carroll has recently (February 8, 2018) wrote a chapter on this for ‘Routledge Companion to the Philosophy of Physics, with the following abstract.\n\n{It seems natural to ask why the universe exists at all. Modern physics suggests that the universe can exist all by itself as a self-contained system, without anything external to create or sustain it. But there might not be an absolute answer to why it exists. I argue that any attempt to account for the existence of something rather than nothing must ultimately bottom out in a set of brute facts; the universe simply is, without ultimate cause or explanation.}\n\nAnd with the conclusion: {The right response is “that’s just the way things are.” It’s up to us as a species to cultivate the intellectual maturity to accept that some questions don’t have the kinds of answers that are designed to make us feel satisfied.}\n\n\nThat is, Carroll has denied that {Why is there something rather than nothing?} is a legit question of any kind (physics or otherwise). And, I have made the following tweet as a response.\n\n\nThat is, if there is an answer, then Carroll’s argument will be cut out by Occam’s razor.\n\n\n{Why is there something rather than nothing?} is really a question of {How this universe was created?}; I have provided a detailed answer on this at my tweet (see, ).\n\n\nHowever, I will provide a detailed discussion about:\n\n{Something (in appearance)} = {Nothing (in essence)}\n\nFirst, what is nothing?\n\nIn math, ‘nothing’ can be represented by a number (zero).\n\nThen, what is zero?\n\nIn math, zero can be defined with, at least, two equations.\n\nZero (c) = 1/ (countable infinity)\n\nZero (u) = 1/ (uncountable infinity)\n\nAs these two infinities are clearly and precisely defined in math, thus ‘nothing (zero)’ is also precisely defined.\n\n\nSecond, in addition to zero/infinity, there are FINITE numbers in math. However, these two parts are totally disjoined: infinities can never transform into finite, and vice versa.\n\n\nThird, is there ‘nothing (zero)’ in the physical universe? Obviously, the answer is no. If the answer is Yes, then the question {Why is there something rather than nothing?} has been answered.  The best ‘nothing (zero)’ in the physics universe is the CC (Cosmology Constant) which has 120 zeros after the decimal point at least.\n\nWithout ‘nothing’, then this physical universe cannot have ‘infinities’ neither as a physical REALITY.\n\nIf these are the case, then there is a fundamental difference between math and physics although math is a great tool and language for physics. And, the issue of CREATION can, indeed, never be answered by science.\n\n\nOf course, there is another possibility. Although infinities can never transform into finite numbers, they might be able to be embedded in physical objects. If this is the case, something can be created from nothing (infinities); that is,\n\n\n\nIn G-theory, I have shown two such transformations.\n\nOne, countable infinity (or zero (c)) is embedded (transformed) into a trisected angle.\n\nIt takes COUNTABLE steps to trisect any angle by evenly dividing it, with the following steps.\n\n1/3 = 1/2 – 1/4 + 1/8 – 1/16 + 1/32 – 1/64 + 1/128 – 1/256 + 1/512 – 1/1024 + 1/2048 -… +…\n\n= .33349 – … + … = .3333333333333…..\n\nOf course, a trisected angle is definitely a concrete object. If humans do not have the time to complete this task, nature will definitely have a better chance of doing it.\n\n\nTwo, can uncountable infinity manifest into a concrete object? For the number pi (3.14159…), it has uncountable digits as it is a “normal” number.\n\n{(Pi / 4) = 1 – 1/3 + 1/5 – 1/7 + 1/9 – 1/11 + 1/13 – … + … (with “countable” infinite steps)}\n\nThat is, pi (having uncountable digits) is reached with the above equation. Yet, there is a concrete object (a circle) which always associates with the number pi. Thus, the uncountable infinity MANIFESTS as a circle which is a concrete object.\n\n\nAs these two infinities (of math) are embedded (transformed) into two physics (concrete) objects:\n\nFirst, the {math universe = physics universe} becomes possible. But, I will not discuss this here.\n\nSecond, these two embedments have shown:\n\n\nThese simply lead to the ‘First principle’ and the creation equation (equation zero).\n\n\nAt every moment of ‘t’ on the time hose, it is, in fact, ‘nothing’ while ‘equation zero’ creates ‘something (a structure)’. The parts of that structure are something but that structure is in essence ‘nothing’.\n\nSo, the structure (encompassing matter and anti-matter) will not annihilate while the parts (something) can be annihilated between their anti-partners. That is, there is no BaryonGenesis issue, see .\n\n\nAfter the creation of a structure (nothingness in essence), the arrangement (distribution) of its parts becomes the ‘Second Principle (Mixing principle)”, and it leads to the { Cabibbo angle (θc)), Weinberg angle (θW ) and Alpha}.\n\n\nThese calculations are direct results of the {Second Principle (Distribution/Mixing principle)} which is totally based on the Pi (uncountable infinity concretizing process).\n\n\nAt the same time, the (countable infinity concretizing process) creates three Line-strings which carries two Trinary-charges (quark colors and Gene-colors).\n\n\n\nThen, the Third Principle should be the ‘Bookkeeping/Information Processing’ which leads to CC (Cosmology Constant) and a computing device.\n\n\nOf course, this computing device leads to the manifestation of Life.\n\n\nFurthermore, these principles must lead to some consequences.\n\nOne, time hose must lead to an accelerating expansion of the universe and the Unified force.\n\n\n\nThis leads to QG (quantum gravity).\n\n\nAnd, it must produce the following distribution.\n\n\nThis calculation also shows the answer to the BaryonGenesis.\n\nAnd this dark energy (vacuum energy) must lead to a Vacuum-Boson.\n\n\n\nTwo, as the Dark Flow is changing the distribution of the parts of the STRUCTURE, this universe must swing from one extreme to another; that is, it must be cycling.\n\n\nThe evidence of this Dark Flow has discovered about one year ago.\n\n\n\nFinally, these lead to an 11-dimension universe.\n\n\nSome conversations:\n\n\n\n\n\n\nMore details, see\n\n\n\n\nThe great progress on Multiverse and Popperiansim\n\nThe Multiverse was invented after the discovery of String-landscape, having zillions different string-vacua. Thus, by definition, each bubble of the multiverse has different vacuum and thus has different natural constants and physics laws.\n\n\nThere are two immediate consequences from this definition:\n\nOne, THIS universe of ours is just a happenstance, one out of the zillions randomly floating bubbles. That is, the natural constants of THIS universe is not a consequence of any law or logic but a happenstance and thus cannot be DERIVED.\n\nTwo, those bubbles are disconnected by DEFINITION. The chance for anyone of them to collide is very small. {Note: no evidence of the bubble-collisions is detected.} And, this leads to the conclusion that the Multiverse is not falsifiable, and this starts the debate on Popperianism.\n\n\nIn fact, the Multiverse can be easily killed by showing two points.\n\nOne, all natural constants of THIS universe can be derived THEORETICALLY.\n\nTwo, the DERIVATIONS of these natural constants are bubble-independent.\n\nAnd, I have shown these two on October 27, 2013, see .\n\n\nOn January 17, 2018 (almost five years after my article), Sean Carroll (Astrophysicist at Caltech) wrote an article: “Beyond Falsifiability”, saying {Cosmological models that invoke a multiverse – a collection of unobservable regions of space where conditions are very different from the region around us – are controversial, on the grounds that unobservable phenomena shouldn’t play a crucial role in legitimate scientific theories. I argue that the way we evaluate multiverse models is precisely the same as the way we evaluate any other models, on the basis of abduction, Bayesian inference, and empirical success. There is no scientifically respectable way to do cosmology without taking into account different possibilities for what the universe might be like outside our horizon. Multiverse theories are utterly conventionally scientific, even if evaluating them can be difficult in practice.\n\ncosmological multiverse, …. It’s not the best name, as the idea is that there is only one “universe,” in the sense of a connected region of space, but of course, in an expanding universe, there will be a horizon past which it is impossible to see. If conditions in far-away unobservable regions are very different from conditions nearby, we call the collection of all such regions “the multiverse.”}\n\n\nIt is very nice of seeing the diehard Multiverse devotee (Sean Carroll) has finally come around.\n\nFirst, Carroll’s multiverse is no longer disconnected bubbles but is a bad name for the parts which hide beyond the event horizon of THIS universe.\n\nSecond, the stupidity of the Popperianism has finally been challenged. Truth by definition cannot be falsified.\n\nI wrote about the stupidity of Popperianism many, many years ago. The most recent one is available at .\n\n\n\nMassimo Pigliucci (the K.D. Irani Professor of Philosophy at the City College of New York) still tried to defend Popper, and he  wrote a comment (on January 22, 2018) on Carroll’s article; he wrote, {Setting aside that falsificationism is not a scientific theory, but rather a notion in philosophy of science (after all, how would you falsify Popper’s account?), Sean admits that he hasn’t gone over the nuances of what Popper actually wrote. That’s unfortunate, because Popper was a bit more of a sophisticated philosopher than he is usually given credit for. Even though his ideas are no longer current in philosophy of science (you know, philosophy does make progress!), if one invokes him to dismiss a scientific theory (as Ellis and Silk do), or, conversely, rejects his insight in order to deflect criticism against one’s favorite theory (as Sean does), it would be good to take a look at what the men actually wrote.\n\nWithout going into too much detail (for an in-depth discussion and pertinent quotes see my Aeon article mentioned above), Popper realized that falsification is not a sharp blade capable of neatly cutting off science front non-science. He was also aware of, and discussed at length, the fact that legitimate scientific theories do include ad hoc explanations that are used by scientists as place holders until (and if) they figure out what is wrong with the theory they are working on. Nobody has ever rejected a scientific theory because all its statements were not immediately falsifiable, nor did Popper suggest such a crude practice in the first place.}\n\n\nIt is nice to know that Popperianism is now a dinosaur in the Philosophy of Science, but the stupidity of Popperianism has done the science a great harm and is still misleading zillions people. There are two simple points on this Popperianism.\n\nOne, Popperianism is conceptually wrong although it might be having some practical use, as all the crap theories can be easily falsified. But, the truth by definition cannot be falsified while all truths can be verified.\n\nTwo, the damning concept of Popperianism on science was widely accepted by the Western society while Popper did not come out to denounce it; so, all his other good or great ideas on science cannot be the excuse for the wrongness of that naive-Popperianism which is not only wrong but is totally stupid.\n\n\n\nThe tide of eradicating the two tumors {the Parallel-Multiverse and the naive-Popperiansim} of physics is now chased by many mainstream physicists, such as Sabine Hossenfelder.\n\n\n\nEdward Witten, a physics hero\n\nOn November 28, 2017, Quanta Magazine published an article of Natalie Wolchover (a senior writer at Quanta magazine, winner of 2017 AIP Science Writing Award) who interviewed Edward Witten recently. That article is available at .\n\nI must praise and complement Witten’s courage to give the death sentence to M-string theory finally, as it is after all his hallmark.\n\n\nOf course, Wolchover’s article itself is heavily camouflaged for upholding Witten’s dignity, with many side-attractors. However, the following direct quotes of Witten’s statement from the article will reveal Witten’s true intention clearly.\n\n\nA) The direct quotes\n\n{Now, Nati Seiberg [a theoretical physicist who works down the hall] would possibly tell you that he has faith that there’s a better formulation of quantum field theory that we don’t know about that would make everything clearer. I’m not sure how much you should expect that to exist. That would be a dream, but it might be too much to hope for; I really don’t know.\n\nPhysics in quantum field theory and string theory somehow has a lot of mathematical secrets in it, which we don’t know how to extract in a systematic way.\n\nI could point to theories where the standard approach really seems inadequate, so at least for those classes of quantum field theories, you could hope for a new formulation. But I really can’t imagine what it would be.\n\nI think our understanding of what it (M-theory) is, though, is still very hazy. AdS/CFT and whatever’s come from it is the main new perspective compared to 22 years ago, but I think it’s perfectly possible that AdS/CFT is only one side of a multifaceted story. There might be other equally important facets.\n\nMaybe a bulk description of the quantum properties of space-time itself, rather than a holographic boundary description. There hasn’t been much progress in a long time in getting a better bulk description. And I think that might be because the answer is of a different kind than anything we’re used to. That would be my guess.\n\nI guess I suspect that there’s an extra layer of abstractness compared to what we’re used to.  … But I can’t say anything useful.}\n\n\nThe above statements clearly show four points.\n\nOne, QFT is a failed program for describing the nature.\n\nTwo, {M-string theory + AdS/CFT + hologram} fail to describe nature.\n\nThree, he suspects that there is an extra layer of abstractness in addition to the two above.\n\nFour, he simply does not know what that extra layer of abstractness could be.\n\n\nThese four points not only give M-string death sentence but also on all other theoretical cornerstones (QFT, AdS/CFT, and hologram) of the mainstream paradigm for the past 50 years.\n\n\nB) A brief history\n\nIs his finally accepting the total defeat the result of the no-show of SUSY at LHC?\n\nFor many SUSY devotees, the no-show of SUSY at LHC is just a great reason for building a bigger collider, such as the proposed 100 Tev Chinese Super Collider,  which was pushed by the entire West, the most notable prominent physicists are David Gross, Witten, Steven Weinberg, Sheldon Glashow, Hawking and countless others (Nima, Tommaso Dorigo, etc.).\n\n\nFigure 1\n\n\n\nFigure 1a\n\nHowever, my Protégé Dr. Li xiaojian (Professor of North China University of Technology, Beijing, China) talked to David Gross at String 2016 about the G-theory.\n\nFigure 2\n\n\nThis might lead to the article of K. C, Cole {The Strange Second Life of String Theory, on September 15, 2016, see } which strongly hinted that the first life of M-string was dead.\n\n\nBy May 11, 2017, the CSC (100 Tev Chinese Super Collider) was officially killed after my series (4) of articles, see .\n\n\nFigure 3\n\n\nFinally, on Oct 17, 2017, Steven Weinberg gave a video presentation for ‘Int’l Centre for Theoretical Physics’ and revealed that both Witten and Nima have given up M-string theory (see at one hour 32 minutes mark).\n\n\nC) An analysis\n\nCan Witten hold out his total surrender?\n\nOf course, not.\n\nFor saving M-string, it must add two points.\n\nIn my November 5, 2011, article {M-theory, a TOE if and only if it adds two points, see }, I showed only one point.\n\nM-string is a string without any INTERNAL structure while the G-string is composed of prequarks and with internal structure.\n\n\nFigure 4\n\n\nThis G-string immediately provides the ‘String unification’, describing all fundamental fermions with a clearly defined language.\n\n\nIt also immediately resolves the BaryonGenesis mystery.\n\n\nFigure 5\n\n\nI did not discuss what the second point needed for M-string theory is in that 6-year-old article. Now, here it is, the ‘First principle’: the real/ghost symmetry.\n\n\nFigure 6\n\n\nThe direct consequences of this are:\n\nFigure 7\n\n\nFigure 8\n\n\nFigure 9\n\n\nD) My comment\n\nThe past 100 years were very successful in the experimental physics while it was a total disaster on the theoretical side, see .\n\nI, however, must congratulate Witten’s courage of finally admitting that M-string was a total failure. Only hero has this kind of courage.\n\n\nNote (added on December 4, 2017): on December 1, 2017, Scientific Controversies (Sci Con; a series of conversations between scientists hosted by PW Director of Sciences Janna Levin) held a public discussion with the title {Scientific Controversies: String Theory} with two prominent physics {David Gross (Nobel Laureate in Physics) and Clifford Johnson}.\n\nLevin began the discussion by asking the two of them where they stood on string theory: pro, con or agnostic? This flustered Gross a bit (he’s one of the world’s most well-known and vigorous proponents of string theory) and Levin somehow took this as meaning that he was agnostic. Finally Gross clarified things by saying something like “I’ve been married to string theory for 50 years, not going to leave her now”.\n\n\nFigure 10\n\nObviously, however wrong the M-string theory is, Gross cannot abandon her after 50 years marriage. Although without the courage of Witten, Gross’ loyalty for LOVE must also be praised.\n\n\nHeavenly Father and his artistic baby\n\nHeavenly Father created THIS universe with His ‘First Principle’.\n\n\nFigure 1\n\nA: The consequences\n\nThe consequences of this first principle (Equation zero, G-theory) are followings:\n\n\nOne, time moves forward as a time-hose to create a space-time cone, and space expands at EVERY point with constant speed ‘C’, and it consists of 11-dimensions (see ).\n\n\nFigure 2\n\nTwo, it produces ‘intrinsic spin (1/2 h-bar) via bouncing between the real/ghost worlds.\n\n\nFigure 3\n\nThree, for any set of concentric circles, the outer circle moves always with acceleration.\n\nFour, Universe structure of G-theory produces:  Matter, 24 fermions; Anti-matter, 24 anti-fermions and Vacuum/space, see . This rules out any additional fermions (Such as SUSY) or sterile particles (such as WIMPs, sterile neutrino).\n\nFive, all 48 fermions emergent out from each time quanta. That is, matter/anti-matter co-exist at every time-moment, and there is no matter/anti-matter annihilation at the Big Bang.\n\nSix, it locks two measuring rulers {C (light speed) and ħ (Planck constant) with two locks:\n\nFirst lock, electric charge (e) = F (square root of (ħ x C)\n\nSecond lock, alpha (electric fine structure constant, a dimensionless pure number, unchangeable by selection of dimension-units) = {1/137.0359…}.\n\nSeven, the universe pie is thus divided into three pieces via an intrinsic Angle (A (0)): energy (space), energy (time) and matter (visible and not visible).\n\nEight, it produces the gene-color: rules out 4th generation and a sterile neutrino. And, it produces the neutrino oscillation.\n\nNine, the matter/vacuum interaction will produce a ‘vacuum boson’.\n\nTen, all 48 fermions share an ‘equal right’ (the mass-land-charge), while their apparent masses are different. That is, all those 48 fermions are the SAME kind, and Majorana neutrino is ruled out.\n\nEleven, it moves the ENTIRE universe from ‘NOW’ to ‘NEXT’, which produces gravity, ‘quantum-ness’ and ‘unified force’.\n\nFigure 4\n\n\nTwelve, it creates a ‘bookkeeping’: entropy and CC (Cosmology Constant)\n\nFigure 5\n\n\nThirteen, it produces ‘bio-computer (a Turing machine)’.\n\nFigure 6\n\n\nFourteen, it demands a dark flow (W, from 100 to 0%) for the evolution of this universe. The W is 9% now.\n\nFigure 7\n\n\nThe above is explained below.\n\nFigure 8\n\n\n\nFigure 9\n\n\n\nFigure 10\n\n\n\nFigure 11\n\n\nLocking the measuring rulers with intrinsic angles:\n\n\nFigure 12\n\n\nFigure 13\n\n\nEnergy/mass distribution:\n\nFigure 14\n\n\nProducing ‘quantum-ness’, ‘unified force’ and accelerating the universe expansion:\n\n\nFigure 15\n\n\n\nFigure 16\n\n\nProducing a vacuum boson.\n\n\nFigure 17\n\n\nFigure 18\n\n\nThis is an eleven –dimensional universe.\n\nFigure 19\n\n\nHere is the Physics-TOE.\n\nFigure 20\n\n\n\nB: The verifications\n\nThe above Heavenly laws are slowly but surely verified by the artistic baby (the mainstream physics).\n\nOne, acceleration expansion of this universe was verified in 1997.\n\nTwo, the vacuum boson (with 125.26 Gev) was discovered in 2012.\n\nThree, Neff = 3 is verified by Planck (2013, 2015) data.\n\nFour, energy/mass distribution was verified by Planck CMB data (2013) and by Dark Energy Survey (2017).\n\n\nFigure 21\n\n\nFive, WIMP is ruled out in 2017, see\n\nSix, MOND is ruled out in 2017 by LIGO data.\n\nSeven, Big Bang matter/anti-matter annihilation is ruled out in 2017, see .\n\nEight, the Weinberg angle is now measured precisely = 28.75 degrees, see .\n\nNine, the dark flow (W = 9%) was discovered in 2016 by Adam Riess, see .\n\n\nFigure 22\n\n\n\nFigure 23\n\n\nC: Possessed baby soul rescued\n\nWhile the growth of this artistic baby (mainstream physics) is progressing slowly but nicely, its soul is nonetheless possessed by three demons: {Copenhagen doctrine (measurement mystery and Schrödinger’s Cat), GR (General Relativity) and Higgs mechanism, see }.\n\n\nFortunately, the ‘Cellular Automaton Quantum Mechanics’ is now casting out the ‘Copenhagen demon’, see .\n\n\nFigure 24\n\n\n\nFigure 25\n\n\nFortunately, the Higgs demon is about to be exorcised.\n\nOne, the Higgs naturalness has now failed, even if SUSY Were existing at GUT scale.\n\nTwo, the Majorana neutrino is about completely ruled out.\n\nFirst, a very strong hint shows that neutrino is different from its anti-particle.\n\nSecond, the observation of ‘Big Bang Nucleosynthesis’ is very much ruling out the Majorana neutrino.\n\n\nFigure 26\n\n\nD: The lingering hallucinations are cured\n\nTwo physics hallucinations happened about at the same time and they converge to the same delusive wonderland, the Multiverse.\n\nThe M-string theory gets zillions ‘string vacua’, which leads to the multiverse.\n\nThe ‘inflation scenario (without a guiding principle for the initial conditions)’ leads to ‘Eternal inflation’ which in turn leads to the multiverse.\n\n\nThe wonder drug for these hallucinations is showing that Multiverse is a delusion with two points.\n\nOne, the soul of the multiverse is that the structure constants of THIS universe are just happenstances (the result of the Boltzmann’s brain). That is, even nature (or God) does not know how to calculate the structure constants of this universe. So, by showing the ways of calculating them, that hallucination is cured.\n\nTwo, by showing that those calculations are not bubble dependent, it further bursts the delusion bubble.\n\n\nNow, many prominent physicists (such as Paul J. Steinhardt and et al) are joining in to eradicate these physics hallucinations, see .\n\n\nF: the remaining living dead\n\nSM (Standard Model of particle physics) has passed every test which we can throw at it, but no one believes that SM is a correct final theory.\n\nOn the other hand, everyone still sees GR (General Relativity) being a Gospel of gravity, especially after the LIGO announcement on October 16, 2017.\n\nIndeed, GR has also passed all tests which we can throw at it. Indeed, LIGO could be a great tool for viewing the Cosmos in a different way. But, these will not change the fundamental FACT that GR is a totally wrong description of gravity.\n\nThe most important damning FACT on GR is that GR plays no role at ALL in the Heavenly Father’s description (HFD) of THIS universe.\n\nIn HFD, this universe is ruled by a Structure-Function which consists of {G (energy, dark energy) + G (mass; dark and visible)}.\n\nThe G (energy) leads to the acceleration of the expansion of this universe. But, most importantly, it also leads to ‘quantum-ness’.\n\nThe G (mass) is, of course, leading to Newtonian gravity, while GR is just an attribute of this G (mass).\n\n\nThere is no issue about GR being an excellent effective theory for gravity, but seeing it as the Gospel becomes the major hindrance to getting a correct Gravity-theory. The recent over-hyped LIGO story makes the situation even worse. AT this moment, this GR demon is not yet exorcised in terms of sociology. The KEY mission of this article is to cast this GR demon out once and for all. More details, see .\n\n\n\n\n\n\n\n\nNew Electroweak precision measurements\n\nCMS of LHC (CERN) has just reported new Electroweak precision measurements {(sin(θ), lepton/eff)^2 = 0.23101±0.00052} on November 14, 2017, see .\n\nIn Standard Model, Weinberg angle is a function of two more fundamental physical constants: weak isospin g and weak hypercharge g’, and they are all ‘free parameters’ (not derived theoretically).\n\nOn the other hand, the Weinberg angle was calculated theoretically in G-theory, see or page 36 of ‘Super Unified Theory”.\n\n\nIn fact, the Weinberg angle (θ) is precisely defined by the equation (10), page 37 of ‘Super Unified Theory”, as follows.\n\n     Sin (Δ θ1) =  Sin^2 (Δ θ2) = (Sin^2   Δ θ3) ^2 = (Sin^3 Δ θ4) ^3\n\n= (Sin^6 Δ θ5) ^6 = (Sin^64 Δ θ6) ^64 ……. Equation (10)\n\n\n  Sin (Δ θ1) = Sin {A (1) – 3 (A (0)/24}\n\n= Sin {Cabibbo angle (θc)) – 3 (A (0)/24} = 0.23067\n\n\nSin^2 (Δ θ2 = 28.75°; Weinberg angle (θW)) = 0.2313502\n\nΔ θ2 = 28.75° (Weinberg angle (θ))\n\n\n{Sin (Δ θ1) + Sin^2 (Δ θ2)}/2 = 0.2310\n\nAll Δ θn are mixing angles.\n\nThe Angel and demons in the 100 years of physics nightmare\n\nNatural is moving nicely minute by minute for the past 14 billion years and is playing its predetermined dance to its predetermined destiny with grace and joy.\n\n\nOn the contrary, the human mainstream physics is now in a hellfire nightmare after the discovery of a new boson in 2012. Is it suddenly falling into this hellfire nightmare unexpectedly? Or, were many hellfire demons already plagued the mainstream physics since the beginning 100 years ago? Logically, the latter must be the case. That is, the cause for the nightmare today can be traced out from its history.\n\nThe brief history\n\nOne, in (1925 – 1927), Copenhagen doctrine DECLARED that ‘quantum uncertainty’ is an intrinsic attribute of nature, and it cannot be removed by improvement of measurement in principle, and this led to the ‘measurement mystery’.\n\nSoon, Schrödinger came up a Cat-riddle, and it CREATED the ‘superposition mystery’, the omnipresent of the ‘Quantum God’.\n\n\nTwo, in early 1954, a general gauge symmetry theory was developed by Chen Ning Yang and Robert Mills. Then, in the first part of the 1960s, Murray Gell-Mann discovered the “Eightfold Way representation” from the experimental data. The Yang-Mills theory is a mathematics beautiful tool to describe some symmetries while the ‘Eightfold way’ is obviously encompassing some beautiful symmetry. However, the Yang–Mills field must be massless in order to maintain gauge invariance.\n\n\nThree, in order for the Yang-Mills gauge to make contact with the real world (the Eightfold Way), it must be spontaneously broken. In 1964, Higgs and et al came up a ‘tar-lake like field’ (the Higgs mechanism) to break the SU gauge spontaneously.\n\n\nFour, in 1967, Steven Weinberg and others combined an SU (2) gauge (a special Yang-Mills gauge) and the Higgs mechanism to construct the EWT (Electroweak Theory). And, this EWT works beautifully for a two quark model (with up and down quarks).\n\n\nFive, in the November Revolution of 1974, Samuel Ting discovered Charm quark via the J/ψ meson; the original two quark model was thus expanded as a four-quark model.\n\n\nSix, in 1973, Maskawa and Kobayashi introduced the “CP Violation in the Renormalizable Theory of Weak Interaction”. Together with the idea of Cabibbo angle (θc), introduced by Nicola Cabibbo in 1963, the ‘Cabibbo–Kobayashi–Maskawa matrix’ was constructed. As this CKM matrix demands AT LEAST ‘3 generations of quarks’, a six-quark model was constructed, the SM (Standard Model). The SM further predicts the weak-current (Ws) and neutral current (Z). tau (τ) lepton was discovered in 1975.\n\n\nSeven, in 1983, the Ws was discovered, and Z soon after. Then, top quark was finally discovered in 1995.\n\n\nAt this point, the SM is basically confirmed. However, the Higgs mechanism also predicted a field boson. As the Higgs mechanism is the KEY cornerstone for SM, it (the SM) will not be complete if the Higgs field boson is not discovered.\n\n\nThe brief history of BSMs\n\nWith the great success of SM, a few BSMs (beyond standard model) quickly emerged.\n\n\nOne, the GUT (Grand Unified Theory), with a higher symmetry; {SU (5), SU (3) x SU (2) x U (1); at about 10^16 Gev energy scale}. This work was mainly done by Glashow in 1974. The key prediction of GUT is the proton decay. From the early 1980s, a major effort was launched to detect the proton decay. But, the proton decay’s half-life is now firmly set as over 10 ^ 33 years, much longer than the lifetime of this universe, To date, all attempts to observe new phenomena predicted by GUTs (like proton decay or the existence of magnetic monopoles) have failed. With these results, Glashow was basically going into hibernation, while hoping that ‘sterile neutrino’ come to his rescue.\n\n\nTwo, the Preon model (done by Abdus Salam) which was expanded as Rishons model (mainly done by Haim Harari). It has sub-quarks (T, V): {T (Tohu which means “unformed” in Hebrew Genesis)  and V ( Vohu which means “void” in Hebrew Genesis)}.\n\nRishons (T or V) carry hypercolor to reproduce the quark color, but this set up renders the model non-renormalizable. So, it was almost abandoned on day one.\n\n\nThree, the M-string theory began as a bosonic string theory. In order to produce fermions, it must incorporate the idea of SUSY. That is, M-string theory and SUSY must be Dicephalic parapagus twins.\n\n\nIn the 1960s–1970s, Vera Rubin and Kent Ford had confirmed the existence of dark mass (not dark matter). SUSY was claimed as the best candidate to provide this dark mass. Thus, M-string theory dominates the BSM for the past 40 years.\n\n\nThe awakening of the demons\n\nIn 2012, a Higgs boson-like particle was discovered, with a measured mass = 125.26 Gev which is trillions and trillions smaller than the expected value.\n\n\nThe only way out of this predicament is by having a hidden massive partner to cancel (balance) out its huge mass. This massive partner can be a SUSY particle or a twin-Higgs. By March 2017, no twin-Higgs nor any SUSY were discovered under two (2) Tev range. Even if SUSY were existing in a higher energy sphere, it (SUSY) is no longer a solution for this Higgs-naturalness issue.\n\n\nFurthermore, the b/b-bar should account for over 60% decaying channel for Higgs boson. But by now (November 2017), this channel is still not confirmed. The best number was 4.5 sigma from a report a year ago, which is not enough to make a confirmation. Most importantly, even if the channel were confirmed, it cannot meet this 60% mark.\n\n\nThus, many physicists now are open the possibility that this 2012-boson might not be the Higgs boson per se.\n\n\nYet, this Higgs demon does not stop its dance with the above issues.\n\nThe neutrino’s mass by definition cannot be accounted by Higgs mechanism, as a tar-lake like field to slow down the massless particle to gain an apparent mass, as neutrinos do not slow down in the Higgs field at all. Thus, neutrinos must be Majorana fermions.\n\n\nYet, the Majorana angel has never been observed.\n\nOne, by definition, Majorana particle must be its own antiparticle. But, many data now show that neutrino is different from its antiparticle.\n\nTwo, Majorana neutrino should induce the ‘neutrinoless double beta decay’, but its half-life is now set as over 10 ^ 25 years, much longer than the lifetime of this universe.\n\nThree, by definition again, Majorana particle’s mass must come from ‘Sea-saw’ mechanism, that is, balanced by a massive partner, such as sterile neutrino or else (SUSY or whatnot). But, ‘sterile neutrino’ is now almost completely ruled out by many data (IceCube, etc.)\n\nFour, the most recent analysis of the ‘Big Bang Nucleosynthesis’ fits well if the neutrino is a Dirac fermion (without a massive partner). If the neutrino is viewed as Majorana particle (with a hidden massive partner), ‘the Big Bang Nucleosynthesis’ can no longer fit the observation data.\n\n\nWithout a Majorana neutrino, the Higgs mechanism is DEAD. With a dead Higgs mechanism, SM is then fundamentally wrong as a correct model, although it is an effective theory.\n\n\nThis Higgs demon is now killing the SM, pushing the mainstream physics into the hellfire dungeon.\n\n\nOf course, Weinberg and many prominent physicists still hope a rescue from one of the BSMs, especially from the M-string theory. But, SUSY (a major component of M-string) is now totally ruled out as an EFFECTIVE rescue. And, many most prominent String-theorists are now abandoning the M-string theory, see Steven Weinberg video presentation for ‘Int’l Centre for Theoretical Physics’ on Oct 17, 2017, at 1:32 (one hour and 32 minutes mark. The video is available at . A brief quote for his saying is available at\n\n\nThe rescuing angels\n\nWhile the theoretical physics is falling into the hellfire dungeon step by step, the experimental physics angels are descending on Earth with sincerity and kindness.\n\nOne, dark mass (not dark matter) was firmly confirmed by 1970s.\n\nTwo, acceleration of the expansion of the universe was discovered in 1997.\n\nThree, a good estimation of CC (Cosmology Constant) ~ 3×10−122 was reached in the 2000s.\n\nFour, a new boson with 125.26 Gev mass was discovered in 2012.\n\nFive, Planck CMB data (2013 and 2015) provided the followings:\n\n(dark energy = 69.2; dark matter = 25.8; and visible matter = 4.82)\n\nNeff = 3.04 +/- …\n\nHubble Constant: H0 (early universe) = 66.93 ± 0.62 km s−1 Mpc−1 (by Using ΛCDM with Neff = 3)\n\nThese were further supported by ‘Dark Energy Survey”.\n\n\nSix, the Local Value of the Hubble Constant: H0 (now, later universe) = 73.24 ± 1.74 km s−1 Mpc−1. The difference between this measurement and the Planck CMB data show a dark flow rate, w = 9%.\n\nSeven, the LIGO twin-neutron stars coalescing ruled out most of the MOND models in October 2017.\n\nEight, there is no difference between matter and its antimatter in addition to being having different electric charges.\n\n\nThe failed Inter-Universes Escape\n\nUnder a total siege by the data angels, the Higgs mechanism led army planed an ‘Inter-Universes Escape’. Its war plan was very simple, with two tactics.\n\nOne, blind its own eyes and yelling super loud: {We are the only game in town.} For this, they organized a Munich conference: {Why Trust a Theory? Reconsidering Scientific Methodology in Light of Modern Physics, on 7-9 December 2015, see }.\n\n\nTwo, INVENTING almost unlimited ghost universes by using the dominant cosmology theory, the ‘inflation cosmology’.\n\n“Inflation” was a reverse-engineering work for resolving some cosmology observations, such as the flatness, horizon and homogeneous cosmologic facts. As a reverse-engineering, it (inflation) of course fits almost all the old data and many NEW observations. But, almost all reverse-engineering are only constrained by the THEN observed data while without any ‘guiding principle’.\n\nThat is, the ‘initial condition’ of the ‘inflation’ cannot be specified or determined. This guidance-less fact allows unlimited ‘inflation models’ to be invented. Of course, it leads to ‘eternal inflation’, having unlimited bubble-universes.\n\nAt the same time, the M-string theory also reached its final destination, the ‘String Landscape’, having also unlimited string vacua, again for unlimited bubble-universes (the Multiverse). That is,\n\n“Eternal inflation” = ‘string landscape’ = multiverse\n\nNow, there is a CONVERGENCE coming from two independent pathways, and this could be a great justification for its validity.\n\n\nWith the superweapon of Multiverse, ‘the Higgs mechanism led army’ is no longer besieged by the angel of facts. Those facts (nature constants, etc.) of this universe is just a random happenstance, and even Nature does not know how to calculate them.\n\n\nThe only way to kill this Multiverse escape is by showing:\n\nOne, ALL the angel facts of THIS universe can be calculated.\n\nTwo, ALL the angel facts of THIS universe is bubble-independent, see .\n\n\n\n\nMore discussions on M-string theory is available at .\n\n\nThe Arch-Demons\n\nIn addition to rule out the Multiverse nonsense, there are some other major issues:\n\nOne, baryongenesis\n\nTwo, the dark energy/dark mass\n\nThree, the gravity/spacetime\n\nFour, is ‘Quantum-ness’ fundamental? (Including its measurement and superposition issues).\n\n\nIn G-theory, the ‘quantum-ness’ is not fundamental but emerges from the dark energy, see .\n\n\n\n\n\nFurthermore, the G-theory universe is all about ‘computation’, that is, there must be a computing device in the laws of physics. And, of course, there is. In G-theory, both proton and neutron are the base of Turing computer, see .\n\n\nThese two points show that the ‘quantum-ness’ is not about ‘uncertainty’ but is all about the ‘Cosmo-certainty’, see . That is, the Copenhagen doctrine is, in fact, one of the Arch-Demon.\n\n\nIn addition to ‘computation’, THIS (not other-verse) universe is all about energy and mass. So, the Structure-Function of THIS universe can be defined as:\n\nS (universe) = S (energy, mass)\n\n= S (dark energy, dark mass, visible relativistic mass/energy)\n\nAs both Newtonian and GR are related to the structure of this universe, Gravity can be defined by the S-function, as:\n\nGravity = G (S) = G (dark energy, dark mass, visible mass)\n\n= G (dark energy) @ G (mass)\n\nFor G (mass), it has only one parameter, mass. This FACT shows that every ‘mass’ must interact with ALL other masses in THIS universe. That is, the Simultaneity Function can be defined by G (mass), that is,\n\nG (mass) = Si (mass); G (mass) is a simultaneity function.\n\nThis Si function can be renormalized only if the gravity interaction transmits instantaneously. In fact, if the gravity of the Sun reaches Earth with light speed, it will not fit the reality. The Sun/Earth gravitational interaction is precisely described with Newtonian gravity law, which encompasses instantaneity.\n\n\nSo, for Sun/Earth gravity at least (if not for other cases), G (mass) should be the function of both {simultaneity and instantaneity}. Thus, we can define:\n\nG (Sun/Earth) = G (mass, simultaneity, instantaneity)\n\n\nFor Newtonian gravity, the ‘masses’ are wrapped into two points, the ‘center of mass’ while the simultaneity and instantaneity are the innate part of the equation.\n\n\nFor GR, the simultaneity and instantaneity are wrapped into the ‘spacetime sheet’. When mass interacts with the GR spacetime sheet, it transmits both simultaneously and instantaneously.\n\n\nThis kind of wrapping makes both gravity theories automatically incomplete, as effective theories at best. Now, Newtonian gravity is now viewed as wrong in terms of Occam’s razor, and thus it does the modern physics no harm. On the other hand, GR is still viewed as the Gospel of gravity, and it becomes the greatest hindrance to getting a correct gravity theory.\n\n\nIf GR did provide us some insights before, it is a long time ago past tense. The recent promotion of the greatness of the LIGO discovery will further drag us down the hellfire dungeon. LIGO indeed might provide some additional data to confirm what we already know, but it cannot rescue GR’s fate as a total trash. The following is just a short list of GR’s shortcomings.\n\nOne, GR plays zero roles in the construction of quark/lepton.\n\nTwo, GR plays zero roles in calculating the nature constants, such as Alpha or Cabibbo/Weinberg angles, etc.\n\nThree, GR fails to account for dark mass and dark energy, unable to derive the Planck CMB data.\n\n\nNeff = 3.04 +/- …\n\n\nFour, GR provides no hint of any kind for the BaryonGenesis, which is definitely a cosmology issue, and this alone should give GR the death sentence.\n\nFive, the last but not the least, GR is not compatible with QM (quantum mechanics).\n\nMore details on this, see .\n\n\nYes, GR is, of course, a very EFFECTIVE gravity theory (as a great reverse-engineering work) but is definitely a wrong one for the correct theory. The GR wrapping which hides the essences of gravity (simultaneity and instantaneity) renders it unsalvageable and unamendable. That is, it is, in fact, the greatest hindrance to getting a correct gravity theory. So, GR is the other Arch-Demon for modern physics.\n\n\nHere is the ArchAngel\n\nAll the calculations for those angel facts (of section D) are done in G-theory (Prequark Chromodynamics).\n\nSuperficially, Prequark model is similar to the Preon (Rishons) model, but there are at least four major differences between them.\n\nOne, the Rishons model has sub-quarks (T, V): {T (Tohu which means “unformed” in Hebrew Genesis)  and V ( Vohu which means “void” in Hebrew Genesis)}. But, Harari did not know what T is (just being unformed). On the other hand, the A (Angultron) is an innate angle, a base to calculate Weinberg angle and Alpha, see .\n\n\nTwo, the choosing of (T, V) as the bottom in the Rishons model was ad hoc, a result of reverse-engineering. On the contrary, there is a very strong theoretical reason for where the BOTTOM is in G-theory.\n\nIn G-theory, the universe is ALL about computation, computable or non-computable. For computable, there is a TWO-code theorem. For non-computable, there are 4-color and 7-color theorems.\n\nThat is, the BOTTOM must be with two-codes. Any lower level under the two-code will become TAUTOLOGY, just repeating itself.\n\nAnything more than two codes (such as 6 quarks + 6 leptons) cannot be the BOTTOM.\n\n\nThree, rishons (T or V) carry hypercolor to reproduce the quark color, but this set up renders the model non-renormalizable, quickly going into a big mess. So, it was abandoned almost on day one. On the other hand, prequarks (V or A) carry no color, and the quark color arises from the “prequark SEATs”. In short, Rishons model cannot work out a {neutron decay process} different from the SM process.\n\n\n\n\nThis is one of the key differences between prequark and (Rishons and SM).\n\n\nFour, Preon/Rishons model does not have Gene-colors which are the key drivers for the neutrino oscillations.\n\n\nMore details on those differences, see .\n\n\nIn addition to being the theory to describe particles, G-theory also resolves ALL cosmologic issues which consist of only three:\n\nOne, the initial condition of THIS universe\n\nTwo, the final fate of THIS universe\n\nThree, the BaryonGenesis mystery\n\n\nBaryonGenesis determines the STRUCTURE of THIS universe, that is,\n\n\n= G (dark energy) @ G (mass)\n\nSo, BaryonGenesis must be the function of G (S), which is described as:\n\n\nThe calculation of this Planck CMB date in G-theory uses the ‘mass-LAND-charge’, that is, all 48 fermions (24 matter and 24 antimatter) carry the same mass-land-charge while their apparent masses are different. And, MASS-pie of THIS universe is evenly divided among those 48 fermions. That is, the antimatter does in fact not disappear (not be annihilated) while it is invisible. See the calculation below. More details, see .\n\nThis BaryonGenesis of G-theory rules out the entire sterile dark sector (WIMPs, SUSY, sterile neutrino, axion, MOND, etc.) completely.\n\nOn November 8, 2017, Nature (Magazine) announced the death of WIMP, see .\n\n\nThis BaryonGenesis calculation must also link to the issues of the {initial condition and the final fate}. And indeed, it does.\n\nBaryonGenesis, in fact, has two issues.\n\nOne, where is the antimatter in THIS universe?\n\nTwo, why is THIS universe dominated by matter while not by antimatter?\n\n\nThe ‘One’ was answered with the above calculation.\n\nThe ‘Two’ can only be answered by ‘Cyclic Multiverse’.\n\nHowever, for THIS universe goes into a ‘big crunch’ state, the omega (Ω) must be larger than 1, while it is currently smaller than 1. That is, there must be a mechanism to move (evolve) Ω from less than 1 to bigger than 1.\n\nAgain, only G-theory has such a mechanism, and it is not a separately invented but is a part of BaryonGenesis calculation, the ‘Dark Flow, W’.\n\nThis dark flow (W) prediction of the G-theory was confirmed in 2016, see .\n\n\nG-theory, of course, accounts for the ‘initial condition’, see .\n\n\nArmy of the Archangel\n\nWeinberg has been complaining about the Arch-Demon (Copenhagen doctrine) many times but without making any new proposal, see .\n\n\nOn the other hand, ‘t Hooft (Nobel Laureate) did embrace the G-theory from the point of Cellular Automaton Quantum-ness, see . In 2016, he even published a book on it.\n\n\nMore details, see .\n\n\nSabine Hossenfelder just issued a death sentence for Naturalness (see ).\n\n\n\nThe death of Naturalness is a precursor to the death of Higgs Mechanism.\n\n\n\nSteven Weinberg just revealed the death of M-string theory in his October 2017 video lecture.\n\n\n\nPaul J. Steinhardt announced the death of ‘inflation cosmology’ in 2016.\n\n\n\n\nThe current hellfire nightmare of the mainstream physics did not start in 2012 but is the results of three demons {Copenhagen doctrine, GR and the Higgs mechanism}, began in 100 years ago. Fortunately, many angel facts (experimental data) have revealed their demon-faces. Finally, the ArchAngel (the G-theory) has come to the rescue. With the growing army of ArchAngel, the human physics’ salvation is now secured.", "pred_label": "__label__1", "pred_score_pos": 0.9321221113204956} {"content": "Mauritania - Pupil-teacher ratio, primary\n\nPupil-teacher ratio, primary in Mauritania was reported at 36.37 in 2016, according to the World Bank collection of development indicators, compiled from officially recognized sources.\n\n\n\nPlease Paste this Code in your Website\n mauritania pupil teacher ratio primary wb data\n\nPrimary school pupil-teacher ratio is the number of pupils enrolled in primary school divided by the number of primary school teachers (regardless of their teaching assignment).\n\nMauritania | Education", "pred_label": "__label__1", "pred_score_pos": 0.7284582257270813} {"content": "Eric Dolphy: Gone In The Air\n\nMark Werlin By\n\nSign in to view read count\nWhen you hear music, after it's over, it's gone in the air. You can never capture it again. —Eric Dolphy\nNewly-remastered SACD reissues of Eric Dolphy's albums for the Prestige label mark the 90th anniversary of his birth.\n\nThe recording sessions that Eric Dolphy led in the last four years of his life advanced the evolution of jazz. It was a tragedy that Eric Dolphy gave himself so completely and unselfishly to art that he neglected to attend to the mundane demands of bodily health. The impact of his death on June 29, 1964 at age 36 is immeasurable. The sudden loss traumatized his closest friends and deprived the world of his gifts. Dolphy's musical conception was seen by some critics as destructive and incomprehensible, though he affirmed the highest standards of jazz tradition. His most passionate supporters were fellow musical innovators, and his most hostile detractors were complacent musical conservatives. Eric's playing rose up above the din and distractions, like the songs of the birds in his parents' garden.\n\nACT ONE: preparation\n\nThe entrance of Eric Dolphy onto the jazz stage of New York was delayed so long that it could be said the play of his life had only two acts.\n\nThe first act was set in Los Angeles, where Eric Allan Dolphy was born on June 20, 1928. Eric's musical journey initially followed the same road as many jazz musicians of his generation: instrument study in high school with additional private lessons; then college or conservatory classes in music theory. Dolphy's technical perfectionism and precocious mastery of Charlie Parker's alto saxophone style brought him into contact with composer-bassist Charles Mingus. Eric performed on \"The Story of Love,\" a large-ensemble session in 1949, one of relatively few recordings Mingus made prior to his departure from the West Coast.\n\nIn 1952, after a two-year stint in the Army, Dolphy faced the choice of moving to New York with the hope of distinguishing himself in a highly competitive pool of talented bebop players, or staying in Los Angeles and pursuing commercial session work. He chose neither option, and it was a consequential decision. His father improvised a rehearsal studio for him on their property, and for the next six years Eric Dolphy rehearsed privately, and with local and touring musicians. John Coltrane, while on a West Coast tour with the Miles Davis Quintet, visited Eric's studio. Coltrane had only recently emerged from a decade-long rigorous and lonely practice regimen; he understood what Eric was seeking to achieve. The two entered into a close friendship that lasted for the rest of Dolphy's life.\n\nIn the 1950s professional jazz musicians paid their dues night after night in smoke-filled clubs. They toured with big bands and small combos, learned how to play to an audience's expectations, and slogged through charts that barely challenged their abilities but earned them a paycheck. For several years, Eric Dolphy paid hardly any of those dues. He found local nightclub work, sometimes in projects with his friends Buddy Colette and Gerald Wilson. What he was hearing had little to do with the West Coast \"cool jazz\" sound. In long hours rehearsing in his room, he studied the bass clarinet, an orchestral instrument with a four-octave range. Bass clarinet was prominently featured in the work of 20th century Russian and Second Vienna School composers, and brought to a wide listening audience in recorded performances by Harry Carney, a member of the Duke Ellington orchestra. Dolphy's practice regimen allowed him to master this difficult instrument, and to develop a saxophone-like style of playing over the entire range. To Eric, all sounds were beautiful: he listened to the birds in his parents' garden and sought to evoke their songs on his third instrument, the flute.\n\nACT TWO: performance\n\nAt age 30 Eric was propelled out of his rehearsal room onto the wider stage of professional music. Eric's friend Buddy Collette, also a multi-instrumentalist, was leaving the Chico Hamilton band. On Collette's recommendation, Hamilton hired Dolphy and took him on the road and into the studio. Hamilton recorded for nationally-distributed record labels; for the first time, Dolphy's Parkerian alto and distinctive bass clarinet sounds were heard by fellow musicians, critics and jazz listeners. Eric's earliest recording with the Hamilton group was a set of Duke Ellington compositions recorded in August 1958 that producer Dick Bock at Pacific Jazz, reportedly displeased with Eric's distinctive alto saxophone playing, pulled from release. (Chico Hamilton with Eric Dolphy: The Original Ellington Suite was sourced from an LP test pressing located in England and sent to producer Michael Cuscuna, who oversaw its long-belated release in 2000). The setback was a disturbing omen of the critical obstacle course Eric would confront in subsequent years.\n\nAt the end of 1959, the Chico Hamilton group was disbanded. Dolphy settled in New York, ready for new challenges. He'd felt artistically constrained during his time with Hamilton; he was hearing unusual alternate chords superimposed over the written chords in the charts, and he wanted to play those notes, not just the 'right' notes. Like Mingus, he listened to the developments of 20th century classical music; like Coltrane, he strived to play inside the traditions laid down by preceding generations, but with the freedom to venture outside the boundaries of bebop harmonic conventions.\n\nIn a short time, Dolphy advanced to the frontline of new creative music. Signed to the Prestige New Jazz division, he began a busy recording schedule.\n\nOut There\n\nFor his second Prestige session Out There, he requested Ron Carter, with whom he'd played in Chico Hamilton's group. Dolphy conceived of a pianoless quartet with Carter on cello, and no additional horn. Reduction from the standard bebop quintet opened space for an intimate, chamber music style of performance, a framework for Dolphy and Carter to venture \"out there.\" The rhythm section of George Duvivier and Roy Haynes were in the elite of professional musicians, technically equipped to play any style of jazz. Haynes would be Coltrane's choice to fill in for Elvin Jones during Jones' worst period of heroin use.\n\nAlthough not named on the album's liner notes, Esmond Edwards is credited on AllMusic and Discogs with the 'audio production' of Out There. Dolphy's recordings for Prestige, as a leader and as a sideman with Oliver Nelson, Mal Waldron, and Makanda Ken McIntyre, were all produced by Edwards.\n\nEsmond Edwards was an accomplished photographer whose images appear on many classic Prestige and Blue Note covers. He rose from Prestige's mailroom to become an in-house producer. Compared to Blue Note, Prestige was a cut-rate operation; it's a tribute to Edwards' resourcefulness that he could produce a date as accomplished as Out There on the kind of low budgets Prestige owner Bob Weinstock allotted.\n\nFrom the tightly-arranged alto saxophone and cello unison lines on the title track it is clear that Dolphy and Carter are breathing the same rarefied air. Carter takes the first solo, deploying slurs, slides, bounced bow, and double-stops, a virtuoso display that boasts 'I can play anything you throw at me.' Dolphy constructs an unsettling, innovative melodic solo grounded in familiar rhythmic patterns learned from Charlie Parker's recordings. His articulation is almost preternaturally distinct—the reward of endless hours practicing in his rehearsal room. The long lines of notes, each carrying weight and emphasis, the wide interval leaps and false fingered quarter-tones, the sheer unpredictability of his ideas, generate a sound concept unlike Parker or his successors and imitators.\n\nDolphy's tribute to Charles Mingus, \"The Baron,\" follows the same structure as \"Out There,\" an opening head of angular lines played in unison, this time by the bass clarinet and cello. A cello solo by Carter ends with Dolphy's sudden entrance—as if he were compelled to interrupt Carter in mid-conversation. Dolphy explores the range of the instrument in a dazzling, modernistic solo. The pressure of recording an album in just a few hours of studio time may have driven his impatience to play as much as possible. There are anecdotes about his tendency to jump in unexpectedly when his fellow players hadn't quite finished.\n\nThe arrangement of Mingus' song \"Eclipse\" with Dolphy on his first instrument, the Bb clarinet, moves the set into chamber music territory. Dolphy interprets the long, sustained-notes theme without undue emphasis, using narrow vibrato, while Carter solos eloquently on the cello and Duvivier bows subtle counter-melodies. Dolphy's solo is a dance-like cascade of melodic invention, with leaps into the upper register and graceful descending arpeggios.\n\nHale Smith's composition \"Feathers,\" which closes the album, reprises the characteristic alto saxophone sound of Dolphy's earliest work with Chico Hamilton, the purity of tone and masterful control of intonation and dynamics. Over bowed bass and plucked cello, Dolphy expresses more effectively than words can convey the poignant evanescence of the musical moment.\n\nKevin Gray's excellent new transfer, which is noticeably warmer and more detailed than the earlier Fantasy SACD release, shines a light on the methods used by session engineer Rudy Van Gelder to enhance the unusual qualities of this ensemble. On most of the tunes, Ron Carter's cello is panned to the right channel with Roy Haynes' drum kit, but on some tracks Van Gelder moves him to the center for a closer blend with George Duvivier. RVG's practice of increasing and decreasing the level of reverb in the live mix (made more audible in high resolution), needlessly softens the bite of the bows on strings.\n\nTracks 1. Out There 2. Serene 3. The Baron 4. Eclipse 5. 17 West 6. Sketch Of Melba 7. Feathers\n\nPersonnel Eric Dolphy, alto sax, flute, bass clarinet and Bb clarinet; Ron Carter, cello; George Duvivier, bass; Roy Haynes, drums\n\nAudio production by Esmond Edwards. Recorded at Van Gelder Studio, Englewood Cliffs, NJ, August 15, 1960\n\nMastered for SACD by Kevin Gray at Cohearent Audio\n\nLive At The Five Spot Vol. 1\n\nLive performances allowed Dolphy greater freedom to explore the landscape of his personal musical terrain. On the Mal Waldron composition \"Fire Waltz\" Eric Dolphy's feet are firmly planted in the soil of jazz tradition, but his alto saxophone soars out of the field of bebop clichés. His solo plunges toward harmonic chaos, punctuated by out-of-chord high notes and glossolalia-like figures. Booker Little, whose hard bop lines rarely stray outside the changes, and composer Waldron, who builds the emotional center of his solo on an interpolation of Gershwin's \"I Loves You, Porgy,\" sound conservative by comparison.\n\nLittle's tune \"Bee Vamp\" features Dolphy on bass clarinet. By the middle of his solo, constrained by Waldron's sympathetic but conventional comping, Dolphy alternates between rapid-fire atonal outbursts and articulate phrases that run closer to the chord changes. The tension between Dolphy's avant-garde leanings and Waldron's traditionalism creates a strangely uncomfortable mood; though the ensemble playing is tight and compelling, the players' conceptions are too diverse for the performances to cohere. Dolphy doesn't need the chain and anchor of received musical wisdom.\nAbout Eric Dolphy\nArticles | Calendar | Discography | Photos | More...\n\n\n\nShop for Music\n", "pred_label": "__label__1", "pred_score_pos": 0.770083487033844} {"content": "Displacement of aggression refers to a redirection of harm-doing behavior from a primary to a secondary target or victim. An early theory of displacement was proposed by Sigmund Freud in Beyond the Pleasure Principle (1950). Freud suggested that persons tend to attack the sources of frustration, but if an individual cannot attack such a source because the target is unavailable or too powerful, a substitute target may become the victim of the pent-up anger. This mechanism explained apparently irrational behavior, such as a person's killing a total stranger for no apparent reason. Frustration causes a buildup of inner tension, which is expended when the individual expresses aggression toward a target. The amount of aggression is postulated to be directly related to the amount of cumulated inner energy. A sudden release of energy through aggressive action is referred to as catharsis.\n\nIn Frustration and Aggression (1939), Dollard, Doob, Miller, Mowrer, and Sears converted the literary and meta-phoric language of Freud into the scientifically more acceptable, positivistic language of laboratory-oriented be-havioristic psychologists. According to Dollard and his colleagues, aggressive behavior—like all other kinds of behavior—should be considered subject to the laws of learning. They defined frustration as any stimulus that blocked the goal attainment of an organism striving to attain a goal. Frustration causes a buildup of aggressive drive, which presses for behavioral expression in the form of harm-doing. When a person directs an aggressive response at a frustrating agent and the response is successful in removing the barrier to goal attainment, aggression is rewarded. A rewarded response is more likely to recur the next time the individual faces a similar situation. Thus, while harm-doing behavior reduces aggressive drive and additional immediate aggression, it is rewarding and increases the likelihood of harm-doing when the individual is frustrated again in the future.\n\nRewarding an individual for inhibiting an aggressive response or punishing harm-doing behavior may teach self-control. As a result of learned inhibition, the aggressive energy generated by frustration either continues to build up or is expressed in indirect ways. While fear of punishment inhibits aggressive behavior, the cumulated internal energy pushes for its expression. These two conflicting forces were conceptualized by Miller (1948) in terms of a model incorporating approach and avoidance forces, but this conflict model has had little subsequent impact on research. Displacement is essentially a principle of substitution of responses or of targets and may be viewed in terms of response or stimulus generalization.\n\nThe concept of displacement has been used to explain a wide variety of behaviors; for example, ethnic prejudice and discrimination may be considered a form of displacement. Thus, researchers have tried to show that historically a decline in cotton prices in the southern United States was associated with an increase in lynchings of African Americans. The reasoning is that bad economic results were frustrating to farmers, who took out their anger on Blacks—a type of scapegoating theory. Similarly, wars have been considered to be a result of the cumulated frustrations of many people manifested in an aggression toward a substitute target: the enemy nation. The importance of understanding displacement effects is certainly underlined by the frequent reference of the concept to ethnic, racial, and religious conflicts; child abuse, lynchings, riots, suicides, revolutions, and many other important social behaviors.\n\nThe establishment of the frustration-aggression interpretation is undermined by evidence failing to demonstrate catharsis effects (the reduction of subsequent aggression immediately following aggressive behavior). Furthermore, there is no evidence of a buildup of more intense aggressive behavior over a series of frustrating experiences. The fact of displacement-like effects is indisputable, and alternative theories are being developed that rely on concepts drawn from factors related to interpersonal interactions rather than intrapsychic dynamics. Among these alternative explanations are active downward comparisons, self-presentation, negative equity, and guilt by association. Active downward comparison refers to an individual's efforts to lower the performance or identity of another person or group so as to enhance his or her own identity (Wills, 1981). For example, acting to block the opportunities of others (such as providing them with inferior schools) serves to maintain the relative superiority of the discriminating person or group. The desire for positive self-esteem is considered the motivating factor.\n\nTedeschi and Norman (1985), however, argued that putting others down raises the self up, not so much for internal self-esteem reasons but for the purpose of presenting oneself to others as better or superior in some way. In this formulation, individuals are highly motivated to establish and maintain desirable identities in order to foster positive and rewarding interactions with other people. As a result, an individual is willing to harm someone else if doing so will help promote a positive identity for the individual in the eyes of others. The victims of such harm-doing may have done nothing to provoke or justify the action. For example, a group of teenage boys, each one of them motivated by the desire to impress the other boys with his willingness to use violence, may attack someone at random.\n\nMotivation to restore equity may also produce displacement-like behavior. Members of most groups expect rewards to be fairly distributed. The rule of equity prescribes that each member should receive a share of the rewards proportional to his or her contribution to the group's success in attaining the rewards. It is assumed that people are motivated to maintain justice and that, when an injustice occurs, something should be done to restore justice. When rewards are unfairly distributed in a group, disadvantaged members may be motivated to restore equity. If for some reason no action can be taken against the source of the inequity, other means of restoring equity may be undertaken. For example, if a boss distributes Christmas bonuses to his or her workers, and a few of the workers believe they received unfairly low bonuses, they should be motivated to restore equity. They cannot punish the boss for fear of losing their jobs, but they might take out their anger by harming (probably in some nonviolent way) the relatively advantaged workers. Such action restores equity in the sense that the advantaged workers are made to suffer, detracting from the monetary gain and thus making outcomes more fair.\n\nAnthropologists and historians have noted that retaliation is often visited upon coconspirators, blood relatives, or friends of instigators, rather than directly against the instigator. Victims sometimes hold all members of an out-group equally responsible for harm done to them and may retaliate against one of the weaker members of the out-group. Thus, retaliation may be directed against any member of a rival gang, or in blood feuds, against any member of the target family. Hate groups may randomly target any member of the hated group. The representative target chosen from the category of believed enemies may be completely innocent and unaware of any harm done to the aggressor. The attack represents a displacementlike effect, since revenge is not taken against a frustrating agent but against an innocent third party—although such an attack may serve to punish the frustrating agent by harming a loved one, or it may be motivated to deter future harm-doing by that agent.\n\n\nDollard, J., Doob, N., Miller, N. E., Mowrer, O. H., & Sears, R. R. (1939). Frustration and aggression. New Haven, CT: Yale University Press.\n\nFreud, S. (1950). Beyond the pleasure principle (J. Strachey, Trans.). New York: Liveright.\n\nMiller, N. E. (1948). Theory and experiment relating psychoanalytic displacement to stimulus-response generalization. Journal of Abnormal and Social Psychology, 43, 155-178.\n\nTedeschi, J. T., & Norman, N. (1985). Social mechanisms of displaced aggression. In E. J. Lawler (Ed.), Advances in group processes: Theory and research (Vol. 2, pp. 29-56). Greenwich, CT: JAI Press.\n\nWills, T. A. (1981). Downward comparison principles in social psychology. Psychological Bulletin, 90, 245-271.\n\nJames T. Tedeschi\n\nUniversity of Illinois, Urbana-Champaign\n\nWas this article helpful?\n\n0 0\nOvercome Shyness 101\n\nOvercome Shyness 101\n\nYou can find out step by step what you need to do to overcome the feeling of being shy. There are a vast number of ways that you can stop feeling shy all of the time and start enjoying your life. You can take these options one step at a time so that you gradually stop feeling shy and start feeling more confident in yourself, enjoying every aspect of your life. You can learn how to not be shy and start to become much more confident and outgoing with this book.\n\nGet My Free Ebook\n\nPost a comment", "pred_label": "__label__1", "pred_score_pos": 0.8379669189453125} {"content": "Whether you're part of the growing army of Americans who work from home, or you commute daily to an office, before you start work today, take a few minutes to reflect on your surroundings. Are they spacious and uncluttered? Or is your desk full of half-eaten candy bars and coffee-stained mugs? Does the air circulate freely and give you room to maneuver and engage with your coworkers, or do you have to hurdle over obstacles on your way to your chair? When it comes to creativity, location matters.\n\nWe're talking about the location of your furniture, the space between your workers' desks, common areas, and maximizing every aspect of the physical space, from floors and walls to furnishings, not prime real estate. Sure, we'd all like to work from a palm fringed beach hut in the Maldives, or a highly hung canopy-deep in the jungle. But independent of your physical location, whether you're in a penthouse in Wall Street or a basement in Harlem, the space you work in has a direct impact on how creative you are. Here's why.\n\nAccording to Tom Heffernan of Gensler architects, you can leverage the power of design to create a better learning environment and a more creative workplace. He says, \"Learning spaces must incorporate opportunities for experimentation and create feedback loops for students to try something new and see the results of their efforts, then adjust their approach.\" While Heffernan was referring to an educational facility, the same idea holds true in the workplace.\n\nTo prepare students for the nature of new and more creative roles, a traditional lecture theatre is thrown out in favor of freer spaces that allow them to form small groups and get absorbed in the learning to produce their most creative work. When you apply the same concept to the workplace, the same results can be seen. Brainstorming sessions and innovative ideas by coming together, rather than stuck behind a desk facing a wall.\n\nHeffernan explains, \"By giving students more room to move, resources to use and time to engage, they immerse themselves in their education until learning starts to look like play, resulting in curiosity and inquiry. A passion for inquiry can be viewed as a model of success in this new learning ethos, encouraging students to ask questions of their environment.\"\n\nJust think about some of the most creative companies around, like Apple and Google, whose site campuses are world famous. It's not just about PR. Beyond the yoga classes and bringing your pets to work, there's a clear understanding of how the location around their workers positively impacts their creativity\n\nFor example, it should be easy for workers to mix with upper management and to feel that they can move around freely. The newly inaugurated Apple Park wasn't just designed to be a cool campus, but a \"democratic workplace\" to foster innovation.\n\nHeffernan reinforces the importance of doing away with the traditional distance between teachers and students in universities, saying, \"Students want to interact with faculty members outside of office hours, and thus it is important to create common spaces shared by all members of the school, faculty, students and administration to provide for great opportunities for mentorship and inspiration.\"\n\nThe spaces between classrooms and offices are important too. They are not just connectors in between buildings or departments, every inch of your premises matters. \"Outdoor spaces need to be treated as learning environments and not just connector paths. Stress on campus is high, so the space should demonstrate life/work balance to offset.\" Few companies have shown their understanding of the importance of this balance as well as Apple and Google, with gyms, restaurants and even massage rooms for staff.\n\nYou may not have the resources of a sprawling multinational, but you can start with the small things, such as trying a little feng shui! If your office is divided into compartments, consider removing some segments or knocking down some walls. Or, at the very least, implementing an open door policy that allows employees to be heard and feel important.\n\nWhere you sit can increase productivity, as well as which workers sit together, and how their chairs are arranged, so consider all details of your working environment and try to maximize each one. Location matters if you want to get the creative juices flowing freely, rather than getting blocked, crashing into furniture or walls.\n\nPublished on: Dec 13, 2017", "pred_label": "__label__1", "pred_score_pos": 0.8067891597747803} {"content": "Meat preparation as per Meatco\n\n29 Jun 2018\n\nMeatco remains one of the establishment’s that promises a shelf-life of 6 months on its meat products. Through this meat is produced and packaged in certain ways to ensure quality at all times for respective clients.\n\nThe most important component for meat preparation at Meatco is safeguarding the freshness of the meat at all times. This means no access blood is to be contained in the product while its normal reddish colour is maintained. Another element taken into consideration is the odour; meat should always excrete a fresh smell instead of a liver or wood like smell. Furthermore, the hygiene or cleanliness of the meat before preparation is vital and is fostered thorough washing the meat cuts.  The date and time between packaging, cooking and selling of the product should consequently always be in sync and monitored carefully. The meat is then allowed to stand for some time to allow water to drip from the after washing, access fat is then removed.\n\nAt Meatco meat is prepared in two types of ways and is not limited to:\n\n·         Roasting or Grilling\n\nDuring this stage minimal to no spices are used to ensure the natural taste of the meat. This limits the use of spices or salts to retrieve actual taste. As the utilisation of similar spices on various meat cuts results in the meat producing the same taste for each cut. Therefore minimal or no spices are used in the meat preparation process.\n\n·         Stewing Cooking in Liquid\n\nThis type of preparation entails washing and cooking meat in little water through the sensory evaluation test mentioned above. After cooking, odour, flavour and texture are tested by panels. Noteworthy, when meat is cooked with fat substances it becomes hard and loses the element of tenderness. Therefore, these types of meat preparation are a shelf-life and a quality control requirement.\n\nAccording to Laboratory Manager, Kalihulu Shapwa, Meatco promises to provide our clients with quality boneless sought-after meat. In this vein, we advise our clients to also prepare meat in such a way that they can get the best out of it by ensuring minimal use of spices or salts.\n\n“Because we market our meat  products to certain organic restaurants in the United Kingdom (UK) who prepare their meat in a way that preserves nutrients, such as proteins s . Producing hormone free meat in Namibia gives us the non-competitive edge guaranteeing the quality aspect,” Shapwa said.", "pred_label": "__label__1", "pred_score_pos": 0.9567613005638123} {"content": "Peer-to-peer energy breakthrough could allow solar and wind energy sources to be shared across entire communities during grid down blackouts\n\n\n(Natural News) Some people who have solar panels on their roof are under the impression that they can use them to power their home in the case of an outage, but that simply is not the case. Homes do remain connected to the grid during outages, but the devices tasked with managing solar panels are normally turned off due to safety concerns. This permanent grid connection essentially prevents homeowners from drawing on the power that their own renewable energy resources generate.\n\nThis could be about to change, however, thanks to the efforts of a team of University of California San Diego engineers who have come up with algorithms that would enable homes to share and use their power in outages by disconnecting solar inverters from the grid. Their algorithms work with the existing technology and would have the added benefit of boosting the system’s reliability by as much as 35 percent.\n\nThe genius of their work lies in the ability of the algorithm to prioritize the distribution of power from the renewable resources in outages. Their equation considers forecasts for wind and solar power generation and the available energy storage, including batteries and electric vehicles. It combines this information with the projected energy usage of residents and the amount of energy the homes are able to produce. It can be programmed to prioritize in several different ways, the most vital of which is by favoring those who need power urgently, such as those using life support equipment. It could also prioritize those who are willing to pay extra or reward those who typically generate an energy surplus during normal operations.\n\nSponsored solution from the Health Ranger Store: The Big Berkey water filter removes almost 100% of all contaminants using only the power of gravity (no electricity needed, works completely off-grid). Widely consider the ultimate \"survival\" water filter, the Big Berkey is made of stainless steel and has been laboratory verified for high-efficiency removal of heavy metals by CWC Labs, with tests personally conducted by Mike Adams. Explore more here.\n\nLearning lessons from past outages\n\nLead author Abdulelah H. Habib said the engineers were inspired to find a way to use the renewable power in outages by the events of Hurricane Sandy. This storm affected more than eight million people on the nation’s East Coast, some of whom were left without power for as long as two weeks.\n\nAccording to the researchers, most customers prefer sharing community-scale storage systems over having systems in each home because of the lower costs. One of the paper’s senior authors, Raymond de Callafon, said that homes that are connected together are not only more resilient in power outages but they also happen to be more resilient to price fluctuations.\n\nEach home needs to be equipped with special circuit breakers that can be remotely controlled, while utilities would need to install some communications methods so the power systems within a particular residential cluster can communicate amongst themselves. They also need a “grid forming inverter” to help them connect to one another.\n\nOne stumbling block that will have to be overcome is the current regulations. Most states do not allow individual homeowners to sell power to other homeowners, so there would have to be some adjustments to make this a reality.\n\nSolar power growing in popularity\n\nSolar power’s popularity is currently on the rise, and reductions in cost as the technology improves are only expected to drive this growth even further. REC CEO Steve O’Neil told CNBC that the installation rates of solar double every two years, even though just two percent of the planet’s electricity comes from converting sunlight to energy. This means there is plenty of room for expansion. The world’s current solar capacity is 305 gigawatts, compared to just 50 gigawatts in 2010.\n\nIn addition, he pointed out that the price of solar energy has dropped by 70 percent since the year 2010 and continues to fall; it costs around eight cents per kilowatt hour at the moment. Another factor that could boost adoption is storage improvements, which will allow solar energy to be used even on overcast days.\n\nSources include:\n\nReceive Our Free Email Newsletter\n", "pred_label": "__label__1", "pred_score_pos": 0.6724103093147278} {"content": "How do you manage your projects?\n\nTell us more about your approach to project management.\nWhat is the typical duration of the projects you work on?\nHow many employees work in your company?\nWhat is your educational background?\nWhat tools do you most often use to deliver your projects?\nWhat are the biggest challenges you face when delivering projects?\nWhich of the following project management qualifications do you have? Select all that apply.\nWhat is your current job title?\nThank you!\nThank you for taking the time to share your opinion with us. Don't forget to check out our website to find out how we can help you get more work done.", "pred_label": "__label__1", "pred_score_pos": 0.6113234758377075} {"content": "Klesse S, Etzold S, Frank D (2016) Integrating tree-ring and inventory-based measurements of aboveground biomass growth: research opportunities and carbon cycle consequences from a large snow breakage event in the Swiss Alps. European Journal of Forest Research, 135 (2): 297-311. [10.1007/s10342-015-0936-5]\n\n\nDendrochronology, Aboveground biomass increment, Interannual variability, Drought, Disturbance\n\n\nThe temporal variability of the forest sink is associated with high uncertainties in both its magnitude and the driving ecological and climatic processes. In this study, we assess the inter-annual variability (IAV) of carbon uptake using annually resolved aboveground biomass increment (ABI) estimates from 272 pseudorandomly sampled trees at a long-term monitoring plot in the dry valley of the Valais in Switzerland. Over the 1950–2011 period, the mean ABI is 86.8 g C m-2 year-1 with an IAV of ±31 %. The IAV is largely driven by hydrological conditions throughout the water year from previous August to current August (r SPEI = 0.56; 1st differenced r = 0.75, p < 0.001). During extremely dry years (such as 1972, 1976, 1998, and 2011), the carbon accumulation was reduced up to 63 % from the long-term mean. Furthermore, our analysis explores possible biases of annual ABI derived from manual band dendrometers in permanent plot inventories caused by water status related changes in tree size. During the snow breakage event in March 2012 and subsequent management activities, 17 % of the standing biomass was killed. We estimate that the remaining trees will take ~16 years to make up for the loss of this disturbance, assuming a similar growth rate of the remaining trees as during the previous 60 years and that a potentially drier climate and the increased water availability for the remaining trees will balance each other. We demonstrate that well-replicated, representative tree-ring datasets have a huge potential to complement shorter-term and lower-resolution forest inventory monitoring data. Integrating tree-ring and plot data allow one to gain knowledge about annual changes in forest productivity even before monitoring started and help ecosystem managers to better adapt their strategies.\n\nLWF Classification\n\nNetwork: LWF, Sites: Lens, Category: ISI,", "pred_label": "__label__1", "pred_score_pos": 0.9949977397918701} {"content": "id: 05645073 dt: j an: 2009f.00297 au: Pugalee, David K.; Hartman, Kimberly J.; Forrester, Jennifer H. ti: Performance of middle grade students on quantitative tasks: A beginning dialogue on quantitative literacy in middle schools. so: Investig. Math. Learn. 1, No. 2, 35-51 (2008). py: 2008 pu: Research Council on Mathematics Learning (RCML), Memphis, TN; Taylor \\& Francis (Routledge), Philadelphia, PA la: EN cc: D33 D63 K43 F93 ut: research; understanding quantitative information; exploratory data analysis; descriptive statistics; mathematical literacy; goals of mathematics education; numeracy; skills; educational diagnosis; ability; lower secondary; reading graphical representations; understanding models; estimating rates of growth ci: li: ab: Summary: Quantitative literacy involves a set of skills necessary to reason about data. Such skills are imperative in our increasingly data-oriented world. Despite the importance of such skills, assessment of quantitative literacy has not been a focus in education and there is a lack of assessment tools that specifically address these skills. This study sought to describe the current levels of middle grade students\\rq quantitative literacy skills through an assessment contextualized with data from the 2000 United States Census. Over 700 middle school students in grades 6, 7, and 8 completed the assessment with a mean score of 41 \\% correct. rv:", "pred_label": "__label__1", "pred_score_pos": 0.9807605743408203} {"content": "Johnny Romeo ‘To The Extreme’ Mosman Exhibition 2019\n\nInternationally acclaimed Australian Pop painter Johnny Romeo makes his triumphant return to Sydney with his electrifying new series TO THE EXTREME. Following on from his celebrated and sold-out 2018 Sydney show The Last Days of Disco, Australia’s leading culture jammer and Pop artist delivers an exhilarating collection of new original works that pushes the Pop envelope and celebrates the visionary spirit of those who dare to dream and stand out from the pack. The series is a gloriously playful sugar rush through Romeo’s warped Pop visions of the modern world that sees Australia’s King of Pop deliver his most confident and unapologetically Pop works to date.\n\nDrawing its title from Vanilla Ice’s 1989 debut album of the same name, TO THE EXTREME ramps up everything that we have come to expect from Romeo’s inimitable Kitsch Pop style and pushes it to the next level. Colours leap from the canvass with the visual impact of a sun-kissed sucker punch, as the artist masterfully plunders and re-appropriates iconic imagery from Pop culture and art history to create dazzling works that speak to the absurdity of our contemporary experience. Romeo takes his penchant for witty irreverence and tongue-in-cheek humour to joyously absurd peaks, as he creates a no-holds barred Technicolour block party where eccentric artistic geniuses, jazz songbirds and rockstar felines prance and prowl through the dance floor of Pop culture.\n\nFor Johnny Romeo, ‘to the extreme’ is a powerful statement of intent, a maxim of radical self-confidence where visionaries and risk-takers push themselves to the limit to make their dreams a reality. There is an irrepressible sense of hopefulness and optimism that courses throughout each of the works in the series, and in particular through the artist’s cheeky depiction of animals. TO THE EXTREME hosts a veritable menagerie of bombastic beasts who have all risen above their limitations to embrace their true callings. In Romeo’s delightfully warped Kitsch Pop world, friendly guard dogs are hilariously transformed into rap moguls, humble rodents become hip-hoppin’ superheroes, and apes take on the outrageous personas of hedonistic Las Vegas party animals.\n\nThe thrilling and life-affirming confidence that lies at the conceptual core of TO THE EXTREME is reflected with immense gusto through the series’ slick graphic imagery and powerful use of colour. Each work drips with undeniable swagger, as concentrated bursts of Technicolour hues inject a vibrant liveliness to Romeo’s Kitsch Pop visions that perfectly distills the larger-than-life ambition and relentless drive of dreamers charging through life at full steam. Bursting with taut, refined line-work, Romeo’s Kitsch Pop renditions of Pop culture icons and celebrity creatures dominate his canvasses with a magnetic presence that showcase the artist at his most commanding and defiantly Pop.\n\nLiving life to the extreme often means embracing the absurdities of life head on, a sentiment which Johnny Romeo captures with a gleefully anarchic sense of humour in his latest series. Renowned for his razor sharp wit and knack for clever wordplay, Romeo satirises the chaos of modern life through skilfully weaving together seemingly disparate Pop culture and art history references, ranging from Baroque art and silent films to hip hop, goth and the urban organic food movement. The frenetic interplay between imagery and text reflects the immense influence of music on the artist’s work, and recalls both the improvisational looseness of free jazz and the slick, rhythmic punchiness of hip hop.\n\nA thrilling homage to the world’s dreamers and daredevils, the latest series from Australia’s King of Pop takes his signature blend of vibrant colour arrangements, Absurdist humour and slick Pop imagery to breathtaking new heights as he pushes his inimitable Kitsch Pop style to the extreme. In the booming, neon-drenched Pop block party that is Johnny Romeo’s TO THE EXTREME, everyone is free to be themselves and anything goes.\n\n\nCheck box to confirm that you are human\n\nClick here to find out more about the exhibiting artist.\n\nJohnny Romeo\n\nJohnny Romeo is an internationally acclaimed Australian painter. Considered Australia’s leading Pop artist, Romeo is spearheading the global Neo-Expressionist Pop movement with his electrifying collision of rock’n’roll swagger, comic book … read more →", "pred_label": "__label__1", "pred_score_pos": 0.9691914319992065} {"content": "Heattweet: Exploring the link between weather and aggression on social media\n\nRecently, meteorological conditions (e.g., temperature) have been linked to expressed sentiment on social media (Baylis et al., 2018). In this project we focus on the influence of meteorological conditions on expressions of interpersonal and intergroup aggression in social media messages, and on a possible explanatory mechanism, i.e. strength of future orientation. Given the importance of social media in interpersonal and intergroup communication nowadays, expressions of aggression in social media messages may threaten societies’ interconnectedness and inclusiveness.\nAccording to the model for CLimate, Aggression, and Self-control (CLASH; Van Lange, Rinderu, & Bushman, 2017), higher temperatures may increase aggression because they result in a weaker future orientation, which is linked to lower levels of self-control (e.g., Baumeister et al., 1994). However, some psychological experiments suggest that higher temperatures may actually inhibit aggression and promote prosocial behavior by enhancing relational mindsets (e.g., IJzerman & Semin, 2009) and affiliative motivation (e.g., Fay & Maner, 2012). To make things even more complicated, other resarch suggests a curvilinear relationship between temperature and aggression (Van de Vliert et al., 1999).\nIn the current project, we will explore the link between the daily temperature and other meteorological conditions in the Netherlands (data obtained from KNMI), and expressions of interpersonal and intergroup aggression extracted from social media data (provided by Coosto). Proxies for aggression include terms of abuse (i.e., swear words), and words specifically related to, e.g., racist discourse (e.g., Tulkens, 2016), hate speech, and cyberbullying (e.g., Del Vigna et al., 2017). In addition to existing word lists, dictionaries will be composed semi-automatically, using wordnet propagation, corpus comparison, and pattern extraction (Baccianella et al., 2010, Maks et al., 2014). Degree of future orientation will be assessed by detecting use of temporal references (e.g.,\ntomorrow, next week; see Basic et al., 2018), and subsequently tested as explanatory mechanism.", "pred_label": "__label__1", "pred_score_pos": 0.7707630395889282} {"content": "Impactful. Intriguing. Innovative. Few musicians inspire such a variety of positive adjectives. As a nonprofit leader by day and hip-hop MC by night, Ahmen is known as the “Batman of Social Impact.” Ahmen is the rare leader who is both a social and cultural entrepreneur. He unifies changemaking initiatives with artistic efforts that galvanize the masses. It’s a unique formula that can – and has – lead to true change for our greatest social issues.\n\nAhmen’s #Troublemaker music and message to disrupt the system is inspiring audiences around the world, as evidenced by appearances at major events such as IFC 2017, NYU Social Innovation Summit 2017, New Frontiers 2016, Frank 2016, Embark 2015, and INBOUND 2015. As a result, Ahmen has been identified as a “Rising Star” by New York Nonprofit Media, who named Ahmen one of their 2015 “40 Under 40” and a “Next Generation Leader” by the Human Services Council.\n\nIn the greatest spirit of hip-hop and leadership, Ahmen is an avid opponent of the status quo. He breaks boundaries as a performer, activist, and speaker for the sole purpose of stirring things up while catalyzing voices and positive action among everyday people. Most important, Ahmen has achieved unprecedented levels of success in his endeavors, from releasing his groundbreaking music on ESPN and HipHopDX to partnering with some of the world’s top companies. Ahmen is truly a highly effective modern rebel with a cause.\n\nThe ultra octane activist’s inspiring portfolio includes fostering reduced gun violence by 90% in Far Rockaway, New York (once one of NY’s most dangerous communities), helping over 1,300 low-income children every year meet or exceed developmental standards, and launching fatherhood and juvenile justice reformprograms that have spread throughout all of New York City.  \n\nFar from a single-issue activist, Ahmen has addressed a plethora of today’s most pressing and relevant issues, including the reality of the social impact world, the discovery of empathy during increasingly divided times, and the power of service to collectively advance our nation. He is also considered an expert on the role of innovation and collaboration within the fields of justice reform, early childhood education, violence prevention, mental health, and youth development.\n\nIn a recent talk, Ahmen shared how his roots as the child of 1st generation immigrants from Sri Lanka have greatly impacted both his music and his message: “I don’t believe my parents went through that struggle so I could be another 9 to 5er. They didn’t leave their homeland and families so I could blend in. They didn’t defy the odds by my dad becoming a US Diplomat and my mom becoming an internationally recognized teacher so I could simply cash a paycheck. I believe their decision to come to America obligates me to expand opportunity in every moment. It requires me to act with urgency and courage so others, like my parents, can discover paths to brighter futures.”\n\nNot the typical antagonist, Ahmen’s insights come from a genuinely likeable place. People are drawn to his thoughts and the beats which accompany them. Proof positive is Ahmen’s “Our Time,” a song that represents his ability to tackle the difficult issues of racial and social conflict in modern America while also providing a renewed sense of hope, conviction, and purpose – all done through a supersonic fusion of hip-hop lyrics, delivery, and soundtracks. “Our Time” is the first release from Ahmen’s highly acclaimed album, If Not Now Then When.", "pred_label": "__label__1", "pred_score_pos": 0.9985363483428955} {"content": "Cancer is a life changing diagnosis. There is no one way to deal with the aftermath of a diagnosis and come to terms with what you went through and what it means to be a survivor.\n\nIn survivorship, there are still many mental obstacles one has to work through such as “Chemo Brain,” a mental fog that impacts one’s ability to function as they once did. Some patients will also experience PTSD from diagnosis and the healing journey they choose.\n\nAs if the mental effects were not enough, the physical stresses of cancer make day-to-day living and interactions more difficult, but with the power of Vitalship’s team supporting you throughout your journey after cancer, we’re sure you’ll be able to live a full and healthy life.\n\nSo, what is survivorship?\n\nFirstly, having no signs of cancer after finishing treatment, or living with, through, and beyond cancer. According to this definition, cancer survivorship begins at diagnosis and includes people who continue to have treatment over the long term, to either reduce the risk of recurrence or to manage chronic disease. According to the American Society of Clinical Oncology there are three kinds of survivorship:\n\n\n\n\nLet's Begin Your Healthcare Journey...\n\nVitalship will help you understand and navigate your life while incorporating new strategies of living to begin acclimating to your diagnosis. Our team is dedicated to your healthcare journey. If you have questions or concerns regarding this treatment please ask any and all questions so we may continue to educate and inform. Fill out the form below to request more information and schedule your appointment.\n\nWe look forward to being your vessel of healing!", "pred_label": "__label__1", "pred_score_pos": 0.8651983141899109} {"content": "madeira clima di madeira\n\nmadeira clima\n\nMadeira il clima di Madeira \n\nhome  -  cartina   -   clima   -   isola di madeira   -    attrazioni   -   info   -   natura   -  parchi   -   riserve   - vacanze a madeira   -   giardini   -   residenze   -      eventi   -    sport   -  golf   -   levadas   -    xochaso    -   vino di Madeira   -   cucina   -   ricette   -    isola  porto santo    -   vacanze porto santo   -    madeira di notte   -   cultura   -   monumenti   -   musei  \n\npink flamingo watercolor iphone case\n\nSKU: EN-M10583\n\npink flamingo watercolor iphone case\n\npink flamingo watercolor iphone case\n\nCNET también está disponible en español. Don't show this again. It takes the StumbleUpon experience mobile, letting you can discover and rate random Web pages recommended to you by others. It works by getting you, the stumbler, to click on a 'stumble' button that takes you to a random page which you can rate with thumbs up or thumbs down buttons. It's not totally random though, as you're led to more websites that have got the thumbs up than down, and you can adjust settings to stumble on to categories of sites you have more interest in.\n\nThe line officially starts forming Saturday at 9 p.m., and Nintendo World opens and starts selling the DS Lite at the stroke of midnight, Considering the large nerd population of New York, if you're not reading this from a sleeping bag parked in front of Nintendo World right now, you might have a problem getting your own DS Lite from Nintendo's store, Thankfully, the portable starts selling nationwide this Sunday, so if you're willing to wait pink flamingo watercolor iphone case another eight hours, you might be able to pick up one of your very own from your local electronics store..\n\n\"Your future cars will be the most advanced computers in the world,\" Jen-Hsun Huang, CEO of Nvidia, told a crowd of hundreds at his company's CES presentation, as he offered new ways his company would power automated driving and digital dashboard displays. In the medical world, Qualcomm last week unveiled partnerships with drugstore chain Walgreens and drug maker Novartis, as it seeks to use its wireless technology to enable remote patient monitoring and speed up data collection in medical trials. Qualcomm hopes these technologies can help reduce health care costs while also offering more convenient service for patients, Aberle said.\n\nBeautiful and bold..with complications, The new no-compromise MacBook, A stellar on-ear headphone, Crave-worthy pink flamingo watercolor iphone case curves for a premium price, The Good The Samsung Galaxy S5 Mini has the same rubberised design as its full-size brother, it's waterproof, with a vivid screen and decent camera, The Bad Like all of Samsung's previous smaller flagships, the S5 Mini seriously waters down the specs of the top-end phone, meaning it's just a mid-range phone with a flagship name and high price, The plastic design feels far less luxurious than the metal HTC One Mini 2 and the fingerprint sensor rarely works as it should..\n\nHe then went to work at the Washington, D.C., law practice of Akin, Gump, Strauss, Hauer & Feld. When President George H.W. Bush was elected in 1988, Cicconi left the private sector to return to the White House for two more years, this time as deputy chief of staff. He went back to his law firm as a partner and worked with AT&T. In 1998, Cicconi went to work for AT&T as the executive vice president of law and government affairs. A few months later he was named general counsel. The early years that Cicconi spent with AT&T were mainly dealing with fallout from the breakup of the monopoly Bell phone system in 1984 and the subsequent 1996 Telecommunications Act, which was supposed to force competition into the market.\n\ntemperature medie a madeira\n\n\n\n\n -  inizio pagina -\nhome  -  cartina   -   clima   -   isola di madeira   -    attrazioni   -   info   -   natura   -  parchi   -   riserve   - vacanze a madeira   -   giardini   -   residenze   -      eventi   -   madeira di notte   -    sport   -  golf   -   levadas   -    isola  porto santo    -   vacanze porto santo   -   cucina   -   ricette   -   vino di Madeira   -    xochaso    -   cultura   -   monumenti   -   musei  -   links   \ntutto su madeira   tutto su madeira\n\n                                            � 2005 - 2015                                               \n\nvietata la riproduzione anche parziale dei testi senza preventiva autorizzazione scritta da parte di - utilizzo sito    \n\nbest womens ballet shoes sale, More...", "pred_label": "__label__1", "pred_score_pos": 0.8877841234207153} {"content": "Zora Neale Hurston, Genius of the Harlem Renaissance\n\nCarl Van Vechten, Wikimedia // Public Domain\nCarl Van Vechten, Wikimedia // Public Domain\n\nTwentieth century African-American author Zora Neale Hurston is best known for her novel Their Eyes Were Watching God. But her perseverance and love of her culture made for a much richer life than many people know.\n\nNear the turn of the century, Hurston was born the spirited daughter of former slaves. Her parents had gone on to become a schoolteacher and a Baptist preacher. Her father's sermons were likely what sparked the girl's fascination with storytelling, which she'd later use not only in her works, but also in the construction of her public persona.\n\nOver the course of her life, Hurston offered contradictory dates of birth. And in her 1942 autobiography Dust Tracks on a Road, she inaccurately claimed Eatonville, Florida, as her birthplace, when in truth she was born in Notasulga, Alabama, probably on January 7, 1891. But Eatonville was her home from about age 3 to 13, and a major influence on her work. One of the first places in the United States to be incorporated as an all-black town, it was also home to a vibrant and proud African-American community that protected the young Hurston from the cruel racial prejudices found elsewhere in the United States. Years later, Hurston would cherish this place and the self-confidence it instilled in her works. She once described it as \"A city of five lakes, three croquet courts, three hundred brown skins, three hundred good swimmers, plenty guavas, two schools and no jailhouse.\"\n\nDespite a seemingly ideal hometown, Hurston knew hardship. At 13, she lost her mother, and was booted out of boarding school when her father and new step-mom failed to foot the tuition bill. Down but not out, Hurston found work as a maid, serving an actress in a traveling theatrical company that gave her a taste of the world beyond Florida. In Baltimore, she lopped a decade off her age (a subtraction she maintained the rest of her days) to qualify for free public schooling that would allow her to complete her long-delayed high school education. From there, she worked her way through college, studied anthropology and folklore, and had her earliest works published in her school's paper. By 1920, the 29-year-old earned an associate degree from Howard University in Washington D.C. Five years later, she made the fateful move to New York City, where she eventually graduated with a Bachelor of Arts in anthropology from Barnard College after studying with the pioneering anthropologist Franz Boas. There, she also became a seminal and controversial icon of the Harlem Renaissance.\n\nIt's said that Hurston—with her brazen wit, affable humor, and charm—waltzed into the Harlem scene, easily befriending actress Ethel Waters, and poets Langston Hughes and Countee Cullen. Professor and fellow folklorist Sterling Brown once remarked of her appeal, \"When Zora was there, she was the party.\"\n\nElectrified by the thriving literary movement that strove to define the contemporary African-American experience, Hurston penned the personal essay \"How It Feels To Be Colored Me,\" where she boldly declared\n\n\nShe and Hughes teamed up in 1930 to create a play for African-American actors that wouldn't use racial stereotypes. Regrettably, creative differences led to a falling out between the two that sunk The Mule Bone: A Comedy of Negro Life In Three Acts before the Eatonville-set fable managed to be produced. But Hurston rebounded with her musical The Great Day, which premiered on Broadway January 10, 1932. Next, came her first novel, Jonah’s Gourd Vine, in 1934. The following year saw the release of a meticulously curated collection of African American oral folklore. Mules and Men became the greatest success she'd see in her lifetime, and yet it earned Hurston only $943.75.  \n\nHer next book, 1937’s Their Eyes Were Watching God, was written during her anthropological expedition to Haiti to study voodoo. Reflecting its divorced author's life, it followed a forty-something African American woman's journey through three marriages and self-acceptance. While the mainstream press praised Hurston's anthropological eye and her writing \"with her head as with her heart,\" she faced a backlash from some of her Harlem Renaissance peers.\n\nZora Neale Hurston drumming, 1937\nZora Neale Hurston drumming, 1937.\nLibrary of Congress, Public Domain // Wikimedia Commons\n\nAs the movement evolved, Harlem Renaissance writers had been debating how African-Americans should present their people and culture in their art. Should they devotedly fight against the negative stereotypes long established by Caucasian writers? Should their work be penned as progressive propaganda intended to expose the racism of modern America as a means to provoke change? Or should African-Americans create without the constraints of a political or creative ideology? Hurston sided with the last group, and saw her novel criticized for its embrace of the vernacular of the black South, its exploration of female sexuality, and its absence of an overt political agenda. Literary critic Ralph Ellison called Their Eyes Were Watching God a \"blight of calculated burlesque,\" while essayist Richard Wright jeered, \"Miss Hurston seems to have no desire whatsoever to move in the direction of serious fiction.\" But fiction wasn't all she wrote. \n\nIn 1938, Hurston published the anthropological study Tell My Horse; her aforementioned autobiography, Dust Tracks on a Road, came six years later. But following the release of her final novel Seraph on the Suwanee, Hurston's career fell into decline. Through the 1950s, she occasionally managed to secure some work as a journalist, scraping by with stints as a substitute teacher and sometimes maid. Despite a prolific output that included four novels, two folklore collections, an autobiography, and a wealth of short stories, essays, articles and plays, Hurston died penniless and alone in a welfare home on January 28, 1960; her body—dressed in a pink dressing gown and fuzzy slippers—was buried in an unmarked grave in Fort Pierce.\n\nIt was an especially cruel fate because she'd once appealed to activist W.E.B. Du Bois to create \"a cemetery for the illustrious Negro dead\" to assure that they'd never be discarded. Her rejected proposal read in part: \"Let no Negro celebrity, no matter what financial condition they might be in at death, lie in inconspicuous forgetfulness. We must assume the responsibility of their graves being known and honored.\" \n\nThis confident and rebellious creator's contribution to the Harlem Renaissance seemed certain to have doomed her to the realm of the forgotten. But in 1975, Alice Walker, who would go on to write the heralded novel The Color Purple, penned a legacy-shifting essay for Ms. magazine called \"In Search of Zora Neale Hurston.\" The essay encouraged a new generation of readers to rediscover Hurston’s work. Their Eyes Were Watching God found a new life, and began popping up on school reading curriculums and earning reprintings in other languages, as did her other books. Mule Bone was finally published and staged in 1991. Historians scoured archives and uncovered a never-published manuscript of folklore Hurston had collected. Titled Every Tongue Got To Confess, it was published posthumously in 2001.\n\nNot only were Hurston's works at long last given their due—so was she. In honor of the author who'd inspired her and countless others, Walker traveled to Florida to put a proper tombstone on Hurston's grave. It reads: \"Zora Neale Hurston, A Genius of the South. Novelist, folklorist, anthropologist.\"\n\nThis story originally ran in 2016.\n\nKitty O'Neil, Trailblazing Speed Racer and Wonder Woman's Stunt Double\n\n\nKitty O’Neil could do it all. A stuntwoman, drag racer, and diver, the legendary daredevil's skills were once described by the Chicago Tribune as “full and partial engulfment in fire; swimming; diving; water skiing; scuba diving; horse falls, jumps, drags, and transfers; high falls into an air bag or water; car rolls; cannon-fired car driving; motorcycle racing; speed, drag, sail, and power boat handling; fight routines; gymnastics; snow skiing; jet skiing; sky diving; ice skating; golf; tennis; track and field; 10-speed bike racing; and hang gliding.”\n\nDuring her lifetime, O’Neil set 22 speed records on both the land and sea—including the women’s land speed record of 512 mph, which remains unmatched to this day. Through it all, she battled casual sexism and ableism, as she was often not only the lone woman in the room, but the lone deaf person on the drag strip or movie set.\n\n\"It Wasn't Scary Enough for Me\"\n\nO’Neil was born on March 24, 1946, in Corpus Christi, Texas. Her father, John, was an Air Force pilot and oil driller, while her mother, Patsy, was a homemaker. When she was just a few months old, O’Neil contracted mumps, measles, and smallpox, an onslaught of illness that damaged her nerves and caused her to lose her hearing. Patsy, who had packed her in ice during the worst of the fever, went back to school for speech pathology so she could teach her daughter how to read lips and form words. She placed the young girl’s hand on her throat as she spoke, allowing her to feel the vibrations of her vocal cords.\n\nFeeling those sensations helped Kitty learn to talk, while the sensations associated with engines would teach her something else. At the age of 4, O’Neil convinced her father to let her ride atop the lawn mower in what would be a transformative experience. “I could feel the vibrations,” she told the Associated Press. “That’s what got me into racing. When I race, I feel the vibrations.”\n\nBut racing wasn’t her first thrill ride. As a teenager, O’Neil showed such an aptitude for diving that Patsy decided to move the family to Anaheim, California, where O’Neil could train with the two-time Olympic gold medalist Sammy Lee. She was on her way to the qualifying rounds for the 1964 Tokyo Olympics when she broke her wrist, eliminating her from consideration. Soon after, she contracted spinal meningitis. Her doctors worried she wouldn’t walk again.\n\nShe recovered, but found she was no longer interested in diving. “I gave it up because it wasn’t scary enough for me,” she told the Chicago Tribune.\n\nMotorcycle racing proved to be a better adrenaline rush, so she began entering competitions along the West Coast. It was at one of those races that she met another speedster named Ronald “Duffy” Hambleton, who offered his assistance after O’Neil crashed her bike, severing two fingers. Once she had gotten stitched up, the pair began a professional and romantic relationship. O’Neil moved onto a 40-acre ranch in Fillmore, California, with Hambleton and his two children from a previous relationship.\n\nHambleton would act as O’Neil’s manager, often speaking to the press for her after stunts or record attempts. However, O’Neil later alleged that he stole money from her and physically abused her during their partnership. In 1988, a Star Tribune reporter would describe O’Neil’s scrapbooks as containing a photo of Hambleton with his face scratched out; she had also written “not true” in the margins of newspaper clippings touting his profound impact on her success.\n\nThe Need for Speed\n\nO’Neil wanted to go fast and she didn’t care how. So she expanded her scope beyond motorcycles, setting a new women’s water skiing record in 1970 with a speed of 104.85 mph. Her national breakout arrived six years later, when she drove a skinny three-wheel rocket car into the Alvord Desert. The hydrogen peroxide-powered vehicle was dubbed “The Motivator,” and it was the work of William Fredrick, a designer who normally created cars for movie and TV stunts. When O’Neil got behind the wheel of The Motivator, she quickly smashed the women’s land speed record. Her average speed was 512 mph, over 1.5 times faster than the previous 321 mph record held by Lee Breedlove since 1965.\n\nShe believed she could beat the men’s record of 631.4 mph, too, which should’ve been great news for her entire team. Fredrick and his corporate sponsors were gunning for a new record, and O'Neil had already reportedly hit a maximum speed of 618 mph in her initial run. But before she could take The Motivator for a second spin, she was ordered out of the car.\n\nAs O’Neil would discover, she had only been contracted to beat the women’s record. Marvin Glass & Associates, the toy company that owned the rights to the vehicle, wanted Hollywood stuntman Hal Needham to break the men’s record. The company claimed it was purely a business decision, as they had a Needham action figure in the works. But according to Hambleton, the company reps had said it would be “unbecoming and degrading for a woman to set a land speed record.”\n\n“It really hurts,” O’Neil told UPI reporters as she choked back tears. “I wanted to do it again. I had a good feeling.” She earned the immediate support of the men’s record holder, Gary Gabelich, who called the whole incident “ridiculous” and “kind of silly.” She and Hambleton tried to sue for her right to another attempt, but she wouldn’t get a second ride in The Motivator. Needham wouldn’t break the record, either, as a storm dampened his chances. Not that he was especially polite about it.\n\n“Hell, you’re not talking about sports when you’re talking about land speed records,” he told the Chicago Tribune. “It doesn’t take any God-given talent … even a good, smart chimpanzee could probably do it. Probably better—because he wouldn’t be worried about dying.”\n\nAs the messy legal battle dragged on, O’Neil focused on her budding career in stunt work. According to The New York Times, she completed her first stunt in March of 1976, when she zipped up a flame-resistant Nomex suit and let someone set her on fire. For her second job, she rolled a car, which was practically a personal hobby. (She liked to tell people she rolled her mother’s car when she was 16, the day she got her driver’s license.) O’Neil eventually became Lynda Carter’s stunt double on Wonder Woman, where she famously leapt 127 feet off a hotel roof onto an air bag below. “If I hadn’t hit the center of the bag, I probably would have been killed,” she told The Washington Post in 1979.\n\nHer work earned her a place in Stunts Unlimited, the selective trade group that had, until that point, only admitted men. O’Neil continued racking up credits with gigs on The Bionic Woman, Smokey and the Bandit II, and The Blues Brothers. Although few stunt doubles achieve name recognition, O’Neil was a media darling who inspired her own 1979 TV movie starring Stockard Channing and a Barbie in her trademark yellow jumpsuit.\n\nA Pioneer's Legacy\n\nBut by 1982, feeling burned out after watching the toll the work had taken on colleagues, O'Neil decided she was finished. She retired from the business at the age of 36, packing up and leaving Los Angeles entirely. She wound up in Minneapolis and then in Eureka, South Dakota, a town with a population of fewer than 1000 people. She would live out the rest of her days there, eventually dying of pneumonia in 2018 at the age of 72.\n\nO’Neil lived her life as a never-ending challenge—to go faster, jump higher, do better. She always said that her lack of hearing helped her concentrate, eliminating any fear she might’ve felt over the prospect of breaking the sound barrier, let alone self-immolation.\n\n“When I was 18, I was told I couldn’t get a job because I was deaf,” she told a group of deaf students at the Holy Trinity School in Chicago. “But I said someday I’m going to be famous in sports, to show them I can do anything.”\n\nO’Neil did exactly that. Over her the course of perilous career, she carved out a name for herself in a space that was often openly hostile towards her, setting records and making it impossible for anyone who doubted her to catch up.\n\nBessie Coleman, the Black Cherokee Female Pilot Who Made Aviation History\n\n\n\nA Determined Beginning\n\n\n\n\n\nDreams of Flight—and France\n\n\n\n\n\n\nThe First Black Aviatrix\n\n\n\n\n\n\n\n\n", "pred_label": "__label__1", "pred_score_pos": 0.7088593244552612} {"content": "Colloquium with Sinclair Bell: 'Race in the Roman Empire: Black Africans as Subjects and Objects in Imperial Visual Culture'\n\n\nWednesday, October 23, 2019, 12:00pm\n\n\n\nSinclair Bell, Associate Professor of Art History, Northern Illinois University\n\n\nSinclair Bell studied Classical Archaeology at the University of Oxford, the University of Cologne, and the University of Edinburgh, from which he received his Ph.D. in Classics in 2004. He is presently an Associate Professor of Art History at Northern Illinois University, where he teaches courses in Greek, Etruscan, and Roman art and archaeology. His research focuses on the Etruscans, sport and spectacle in the Roman Empire, and freedmen and foreigners in the Roman world. He is the author of numerous articles, book chapters, and reviews on the art and archaeology of Etruscan and Roman Italy. He is also the Editor of the Memoirs of the American Academy in Rome, and has co-edited 12 books, including Free at Last! The Impact of Freed Slaves on the Roman Empire (London 2012).\n\n\nVisual culture is a powerful mechanism for apprehending a society’s ideas about their perceived physical and ethnic differences from others. This book project investigates how artists and their patrons conceptualized ethnic difference in the Roman empire (c. 100 BCE-200 CE). In particular, it seeks to understand how black Africans’ social roles and status in Roman society and their perception by Romans were communicated through imperial visual culture, both large (portrait and relief sculptures) and small-scale (figurines, amulets, household artifacts such as perfume vessels) works.\n\nRace and Representation in the Roman Empire: Black Africans in Imperial Visual Culture has three aims: first, it investigates the full range of image types and viewing contexts (where known) in order to build up a comprehensive archaeological taxonomy of the extant evidence; second, it reconciles visual depictions with other sources of available evidence (e.g., literary sources, graffiti, funerary inscriptions) in order to gauge black Africans’ presence and perception within Roman society; and third, it draws upon the critical axioms of contemporary theory, especially post-colonialism and critical race studies, in order to interrogate Roman systems of knowledge as part of the “history of perceptions of human difference” (D. McCoskey, Race: Antiquity and Its Legacy [Oxford 2006] 252).\n\nORGANIZER: Hutchins Center", "pred_label": "__label__1", "pred_score_pos": 0.9928078055381775} {"content": "Open and Collaborative\n Home page\n\nMeaning of marmotera\n\nDanilo Enrique Noreña Benítez\n\n\nIt is a way of calling a cap, dike, dam or stopper usually of branches and leaves or sometimes of bundles with sand, which are used to contain and derive the irrigation waters in a channel.\n\n\nDaniel Lozano Torreblanca\n\nStopper, or dam, which is caused by the clogging of branches, dry leaves anything that hinders the water channel, by a river, Rambla, especially is more used in irrigation ditches because it is very casual to find this problem by pouring water PO R this, causing overflow by the tamponade of the Marmotera.\n\n\n\n\n", "pred_label": "__label__1", "pred_score_pos": 0.8643178343772888} {"content": "Devotion is … Flower Market, Dadar\n\nDadar Flower Market under the bridge by the Dadar Railway Station is one of my favorite places to visit in #Mumbai. It is verily a street photographer’s paradise. Stall owners are super nice, and the flowers are fresh heaped, fragrant and colorful. Loads of #Champae #plumeria (?) delicately woven, melt even the stingiest of heart. I surprised M’s family with a champae stringer.\n\nEntire families of flower weavers live under this bridge. Many generations eat, sleep and weave here.\n\nI love the symbolism in this pic.\n\nWhat adorns the head of the greatest of Gods is woven on the dusty feet of the street women. She toils away her entire life, but knows deep down that her work is her most cherished offering.\n\nShe needn’t climb any mountains, needn’t enter any temple, she needn’t offer any prayers; her work is her most heartfelt and greatest offering. This is Bhakti, and not what cheap, two-bit, fame seeking activists peddle.\n\nThank you.\n\nDev barae karo.\n\n#Bazaar #FlowerMarket #BestofMumbai #IncredibleIndia\n\n\n#Devotion #Bhakti\n\n\nMeaning of Puja\n\nWhat is a Puja?\n\nI generally translate puja to mean a devotional service. But based on a query in my previous post, Pratik provided a beautiful and succinct explanation. Considering no single word or phrase comes even close to incorporating this meaning, I recommend not translating it, but using the word puja as is, in the english language. Interestingly, this meaning is not unique to Hinduism (or Sanatana Dharma) and applies to all religious beliefs.\n\nPratik writes:\n\nPu comes from the word Poorna in Sanskrit meaning complete, Ja comes from Aja meaning born. So Puja is that which is born out of completeness or fullness.\n\nIt signifies that you feel complete and happy, and you are grateful to the Divine for bestowing that completeness in life. In fact the offering that we give symbolizes all the good things bestowed upon us by the Divine. It (is) like we are imitating the Divine in gratitude.\n\nBeautiful, no?\n\n\nOne of his smallest, yet one of his best!\n\n\n\nThe heart can think of no devotion\nGreater than being shore to the ocean —\nHolding the curve of one position,\nCounting an endless repetition\n\n~Robert Frost\n\nBlog at\n\nUp ↑", "pred_label": "__label__1", "pred_score_pos": 0.998729944229126} {"content": "Asset Division in Divorce\n\nWhen couples divorce, their primary focus when they divide up their assets is generally on property, vehicles, bank accounts, retirement and pension plans, investments and perhaps valuables such as art, antiques and jewelry.\n\nIn many divorces, there are a number of assets that may get overlooked. It's essential to provide your attorney with a list of every asset you have, both separately and together. Some marital assets may have more value than you realize. It's cricial to determine their value so that the two of you can negotiate a fair division or determine that one spouse or the other should have them.\n\nClub Memberships\n\nIf the membership is something that only one of you used, for the most part, you may decide to let your spouse have it. However, if initiation fees and dues were paid for with marital assets, the membership is a divisible asset.\n\nMemorabilia and Collections\n\nArt and wine collections can be valuable, of course. However, so can coin, stamp, comic and rare book collections and other memorabilia. You may have zero interest in your spouse's collection of antique pocket watches or sports memorabilia. However, if it has value, it's worth noting as part of your assets. A good way to determine whether a collection is valuable is to look at whether it's covered under your homeowner's insurance policy.\n\nIntellectual Property Rights\n\nIf your spouse has acquired a patent, trademark, copyright or royalty rights, that should be addressed. Even if it hasn't paid off, you never know what could happen in the future. It's better to let your attorney know about it so that it can be determined whether you're entitled to a share of the earnings.\n\nCemetery Plots and Other Resting Places\n\nChances are, you no longer want to spend eternity next to your ex (and vice versa). However, if the two of you have purchased burial plots, mausoleum crypts or the like, they have value. Generally, one person sells his or her share to the other one.\n\nThese are just a few of the assets that many people neglect to consider during a divorce. Others include timeshares, air miles and gifts they exchanged during the marriage. Even if you don't mind giving up the physical assets, you shouldn't ignore the monetary value they could have. It's less complicated to determine the disposition of all of your assets with the support of your family law attorney during the divorce than to wrangle with each other later about them.", "pred_label": "__label__1", "pred_score_pos": 0.6259727478027344} {"content": "The only vitamins I take\n\nPhotoGrid_1397047738714Hello my dears!\nYou know I love to eat healthy food, I think it’s the best thing you can do to your body. The best way to get all the nutrients is to eat as natural as possible, without processed foods and chemicals. Sometimes even if we eat all the good things we still need a little boost, and this is the time when vitamins and supplements come in our help. The only vitamins I take are the cod liver oil soft capsules which are a high quality source of Omega 3 and its active fatty acids\nAnother great supplement is the green tea extract which is a highly effective antioxidant that has been used in Chinese herbal medicine for thousands of years\nAnd some multivitamin for more energy!\nThese all are from the company, check them out they are very effective and high quality products.\n\nHave a beautiful day!\n\n\n7 things that slow down your metabolism\n\nsittingAccording to the dictionary, metabolism is a chemical processes occurring within a living cell or organism that is necessary for the maintenance of life.\n\nWe all know people who can eat all day and not gain a single pound. These people have good — or fast — metabolisms. Then there are the people that have one unhealthy meal and have to run for a week straight to burn it all off. These are people that tend to have a slower metabolic rate.\n\nThe faster your metabolism, the more calories you burn. And just like there are ways to speed it up—by working out, for instance—certain habits can also slow it down.\n\nMetabolic rate is also affected by several factors including age, weight, and genetics.\n\nIf losing weight is your goal, avoid these metabolism-slowing mistakes:\n\n1. Eating too late in the morning\n\nSkipping breakfast is one of the worst things you can do for weight loss since it causes your metabolism to slow down. When you don’t eat, the brain sends a message to the rest of the body to conserve energy, signaling it to hold onto the stored fat that you’re trying to get rid of. Eating within an hour of waking sparks the metabolic process called thermo genesis that turns the food you eat into energy. So choose a high-protein breakfast. Make sure to eat throughout the day to maintain blood sugar levels since any drops can cause the body to burn muscle for fuel.\n\n2. Not eating enough\n\nIt is important to snack often and never miss a main meal. As stated before, getting your body in a proper eating schedule is critical for maintaining a healthy metabolism. Also, when you skip out on meals, your body puts itself into “starvation mode”, which slows your metabolic rate to conserve any of the energy it has. This is why people who try to lose weight by not eating don’t have very much success.\n\n3. Not exercising\n\nResearch shows that you continue burning calories up to 24 hours after working out, and studies also show that morning exercises burn more calories than those who work out during other times of the day. If you’re planning on exercising anyway, for maximum calorie burn, your best bet is to get it done in the a.m. Include high intensity cardio intervals\n\n4. Sitting Too Long\n\nIt takes only 20 minutes in any fixed position to inhibit your metabolism, according to Carrie Schmitz, an ergonomic research manager. A new study has discovered that sitting for long periods increases your risk of diabetes, heart disease and death regardless of physical activity.\n\n5. Dehydration\n\nAll of your body’s cellular processes, including metabolism, depend on water. If you’re dehydrated, you could burn up to 2 percent fewer calories, according to researchers.\n\n6. A Weird Eating Schedule\n\nResearchers suspect that eating at the same times every day trains the body to burn more calories between meals. So eat frequent, consistently sized meals.\n\n7. Not getting enough sleep\n\nPeople who sleep less move less the next day, which means they burn fewer calories. Sleep deprivation actually reduces the amount of energy your body uses at rest. Stay away from alcohol, fatty foods, coffee and chocolate at least 2 hours before bedtime.\n\nSo here are 7 things that you should avoid, if you want to loose weight, or if you just want to maintain your healthy weight.\n\nEverybody can fall out of the wagon once or twice, by not sleeping enough or, sitting to much at the office because of work. So just try to compensate it, if you are sitting all day, you really need to work out after the office hours. I really think I am blessed with a great metabolism, I can eat a lot 🙂 BUT I also work out 5 times a week, and I try to eat healthy!\n\n Have a nice day my dears! :*\n\nMy favourite breakfast – healthy oatmeal\n\noats finish_1Hello everybody!\n\nI just made the most good looking and tasty breakfast in weeks!\n\nI started to eat this kind of breakfast almost every day. It tastes so good, you can make it every day with different flavours, fruits or nuts. If I eat this first thing in the morning, it keeps me full for 2-3 hours, which is a lot for me 🙂\n\nSo here are the ingredients:\n\n • 1/2 cup rolled oats\n • 1/2 cup coconut milk, but you can use any other type of milk\n • 1 banana\n • 1 spoon or more cocoa powder\n • 2 spoon of walnuts\n • 1/4 spoon vanilla extract (optional)\n • some goji berries and shredded coconut on top\nCombine all ingredients in a blender on a slow speed and put in a glass. You can layer it with any kind of fruits like bananas or berries or put some cinnamon and dried fruits, but for me it was perfect like this!\nYou can prepare it in 5 minutes in the morning, or if you really don’t have 5 minutes in the morning, than prepare it in the evening and store it in the fridge 🙂\nHave a great day guys! :*\n\nBenefits of eating yogurt\n\nyogurt finalHey everybody! \n\nDid you know that yogurt it makes the list of one of the healthiest foods to eat? It’s important to note that the KIND of yogurt makes all the difference (keep reading below to find out what you should look for).\n\nHere are 3 Benefits of Eating Yogurt:\n\n1)      Yogurt contains probiotics (“good” bacteria also know as live active cultures) that help create a healthy environment which promotes digestion, increases immunity, fights against Candida (“bad” bacteria) overgrowth, and strengthens the immune system.\n\n2)      Yogurt increases your immunity and protects against disease. A recent study found that daily yogurt consumption had a stimulating effect on cellular immunity in healthy young women. Yogurt helps maintain good gut flora and helps prevent all kinds of diseases, especially chronic degenerative ones, by controlling inflammation and increasing antibodies and anticancer cells.\n\n3)      Yogurt is a great source of protein, calcium, potassium, B vitamins, and selenium. Those who are lactose intolerant can often enjoy yogurt with no problems due to the live cultures present in yogurt which break down lactose. Now, you’re probably wondering what kind of yogurt you should buy… Well, these benefits only apply to yogurts with the “Live and Active Cultures” (LAC) seal! This means the yogurt contains at least 100 million cultures per gram of yogurt at the time of manufacture and after pasteurization. Also, look for PLAIN yogurt, which has only two ingredients: live cultures and milk (whole, low-fat, or skim). The longer the list of ingredients, the less nutritional value it has (Source: The 150 Healthiest Foods on Earth, Jonny Bowden, PhD, CNS). As for the type (Bulgarian, Greek, Lassi, Kefir, Goat, Sheep) of yogurt, it really depends on your own preference so choose accordingly based on the guidelines above.\n\nNow that you know what to look for, go out there and buy some yogurt! 🙂\n\nHave a great day! See you tomorrow 🙂\n\nBest post workout snack/food ideas\n\nHey everybody!\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nHave a wonderful day!  :*\n\nTips to get in shape for summer\n\nFotor0603172115Summer beach season is almost here, so whether you want to lose some weight or simply tone up, getting your body beach-ready will take some work and dedication. This article will teach you how to get in shape without starving or torturing yourself.\n\nHere are 6 healthy ways to get and stay in shape this summer with minimal effort and maximum health benefit.\n\n1. Eat right\n\nStudies have shown around 80% of any fitness goal depends on your diet, be it weight loss, muscular development or training for an event. Eating a good balance of clean carbohydrates, fresh protein and healthy fats will give you the energy to aid your fitness challenge and show results quickly.Eat at least five meals a day, but not five huge meals a day. Try to eat five small balanced meals. Digestion burns calories, and you are less inclined to overeat if you are not starving when it’s time to eat.\n\n2. Avoid sitting for longer than 30 minutes at a time\n\nIf you are working in an office, just stand up and do some stretching every 30 minutes. People who sit in a desk for hours are at risk for chronic back pain. You burn 33 percent more calories when standing, and frequent walking around will help to stretch your muscles and improve your posture.\n\n3. Keep Hydrated\n\nDrink more water. Not only is it good for you, but it will also keep you feeling full without the calories. Not only will it keep you full, but it will also help you flush toxins out of your body. You should carry a bottle of water with you and drink often.\n\nA little tip how to calculate how much water you body needs: Body weight KG x 0.03 = MINIMUM DAILY WATER INTAKE\n\n4. Hit the stairs\n\nInstead of taking the elevator, you can burn calories by taking the stairs up and down whenever you have the chance. You will burn a lot of calories just by bypassing the elevator. Give it a shot.\n\n5. Regular Exercise\n\nWorking out three to four times per week is a great place to start, once you have your routine, stick to it and you will see the benefits. You’ll notice increased energy levels and your body will begin to adapt. That fitness goal will become ever closer.\n\n6. Relaxing and Sleep\n\nWhen the body is relaxing it is able to repair, after efforts of exercise, it will also relax the mind enabling you to mentally focus. Being mentally focused is almost as important as the exercise itself. The average person needs 7 – 8 hours of sleep a night! Some need a little more and some can get by on a little less. A key step to maintaining a healthy weight is also getting enough sleep\n\nBy following these simple steps, you will be able to burn more calories and tighten up your body for summer. Although these tips may seem self evident, many people do not realize how effective they are.\n\nFollow them and you will be ready for this summer! 🙂\n\nTop 10 Super foods\n\n\n\n\n\nHere is the list:\n\n\n\n2. Leafy green vegetables\n\n\n3. Whole grains/Oats\n\n\n4. Avocado\n\n\n5. Olive oil\n\n\n6. Eggs\n\n\n7. Lentils/Beans/Chick Peas\n\n\n8. Bananas\n\n\n9. Nuts/ (Brazil nuts, walnuts, almonds)\n\n\n10.  Green tea\n\n", "pred_label": "__label__1", "pred_score_pos": 0.7258763313293457} {"content": "Prodotti della ricerca\n\nTitolo: Sulfur Dioxide Absorption in a Bubbling Reactor with Suspensions of Bayer Red Mud\nData di pubblicazione: 2007\nAbstract: In this work, we studied the SO2 absorption with suspensions of Bayer red mud (the solid residue of the Bayer process for alumina production from bauxite) using a laboratory-scale bubbling reactor with continuous feed of both gas and liquid phases. A few preliminary tests were carried out in order to calculate the physical mass transfer coefficients in both the gas and liquid sides. Then, the ability of red mud suspensions for sulfur dioxide absorption was studied at several different flow rates of both the liquid and gas streams. The absorption rate was measured for four different suspension concentrations. The absorption phenomena were modeled using the film theory and assuming two different fluid dynamics for the gas phase. The liquid-side mass transfer coefficient and the enhancement factor for chemical absorption were calculated from the experimental results using the model.\nTipologia:1.1 Articolo in rivista\n\nFile in questo prodotto:\nNon ci sono file associati a questo prodotto.\ncredits | accessibilità Università degli Studi di Cagliari\nC.F.: 80019600925 - P.I.: 00443370929\nnote legali | privacy\n\nNascondi la toolbar", "pred_label": "__label__1", "pred_score_pos": 0.7231749892234802} {"content": "Sensational!!! After reading this, you will agree that Mahabharata did happen; Which are the present Indian cities that are mentioned in Mahabharata?\n\nIndian epics have been depicted as ‘mythologies’ where as in reality they are part of our ‘history’. A story which can be backed by archaeological and physical evidences should come under the ambit of history. Like ‘proof of the pudding is in the eating’ we can identify ancient cities mentioned in Mahabharata in states across the country even today. Here we bring to you such ancient places that have been in existence from the times of the great epic.\n\n 1. Banganga: is the place where Pitamaha Bhishma was laid on a bed of arrows and Arjun shot an arrow, as requested by Pitamaha, such that the waters of Ganga directly quenched Pitamaha’s thirst.\n 2. Kurukshetra: This is the site of the epic battle located 40 kms east of Ambala city. Brahma Sarovar (lake) lies here in which Shri Krishna is said to have bathed before the commencement of the war.\n 3. Hastinapur: The capital city of the Kuru dynasty lies in Meerut, Uttar Pradesh. During ancient times this city had a grandeur of its own. It has stood witness to several pleasant and unpleasant events that led to the Mahabharata war.\n 4. Varnavat: Lying close to Meerut in Uttar Pradesh, this is the city where Pandavas along with their mother Kunti had been sent by Duryodhan and Shakuni on a pleasure trip. The actual aim of both Duryodhan and his uncle was to get rid of all six of them by burning them alive in the wax castle.\n 5. Panchal Pradesh: The kingdom of Panchal was located on both sides of River Chamba between the Himalayas and Ganga. The place gets its name from the legend where the kind of Panchal said that his five sons (Panch) were enough to deal with the army of Ayodhya, when the latter had attacked the former. Princess Draupadi was also known as Panchali because she belonged to Panchal.\n 6. Gandhar: is situated on the western bank of River Sindhu in present day Sindh Pradesh, Rawalpindi, Pakistan. Dhritarashtra’s wife and Duryodhan’s mother Gandhari hailed from this kingdom. The treachery and vengeance seeking nature of her brother Shakuni, crown prince of Gandhar, was one of the reasons for the terrible war that almost led to the annihilation of Kuru dynasty.\n 7. Takshashila: Renowned as a great centre of learning in later times. Takshashila was the capital of Gandhar during the Mahabharata era.\n 8. Ujjanak: This was a city near Kashipur which is at present located in Nainital district of Himachal Pradesh. The city has the distinction of being the place where both Kauravas and Pandavas had been taught archery by Guru Dronacharya.\n 9. Shivi Desh: Was a kingdom located on the northern border of India in present day South Punjab. The princess of this dynasty was married to Yudhistir and hence they fought on the side of Pandavas.\n 10. Indraprastha: Designed by the celestial architect Vishwakarma, Indraprastha was built by Pandavas on what used to be a difficult terrain named Kandavprastha. The area south of present day Delhi is identified with the ancient city Indraprastha.\n 11. Vrindavan: 10 kilometres from Mathura is the place where Shri Krishna performed his ‘leelas’ as a child. The temples of Banke Bihari and Radha Vallabh located here draw hoards of pilgrims every year.\n 12. Gokul: The village where Shri Krishna and his brother Balaram spent their childhood lies on the banks of Yamuna in Uttar Pradesh.\n 13. Barsana: This is the ancestral place of Radha, the divine love interest of Shri Krishna. Barsana is 21 kilometres away from Govardhan Mountain. The four hill tops of the Govardhan Parbat represent the four faces of Shri Brahma.\n 14. Mathura: This is the birth place of Shri Krishna. When Kans, uncle of Shri Krishna, usurped the throne from his father King Ugrasen, he made his sister Devaki and brother in law Vasudev prisoners as well. It was in prison that Shri Krishna was born as the eighth child of the couple.\n 15. Kashi, Uttar Pradesh: It is one of the most ancient living cities in the world and a very important centre of pilgrimage to Hindus. It was a renowned centre of learning and education. The princesses of Kashi, Ambika and Ambalika, were the mothers of Dhritarashtra and Pandu respectively.\n 16. Ekchakranagari, Aarah, Bihar: This place served as a refuge to Pandavas and Kunti when they were in disguise after their escape from the Wax Palace at Varnavat. This place can be identified with Aarah in present day Bihar.\n 17. Magadh, South Bihar: Present day Southern Bihar was known as Magadh during earlier times. This kingdom was ruled by Jarasandh, father in law of Kans. When Shri Krishna killed Kans, Jarasandh sought revenge for the same and kept attacking Mathura often. He was killed by Bhim in a duel.\n 18. Pundru Desh, Bihar: Pundru Desh was a part of modern day Bihar ruled by King Paundrak. His inflated ego led him to challenge Shri Krishna to a fight in which he was killed.\n 19. Pragjyotishpur, Guwahati, Assam: Situated close to Guwahati, Pragjyotishpur was the capital of the kingdom ruled by Narkasur. Narkasur is said to have kept 16000 girls captive who were freed by Shri Krishna after killing the former.\n\n20: Manipur: The ancient city of Manipur was ruled by Chitravahan whose daughter Chitrangada was married to Arjun. Babruvahan, son of Chitrangada and Arjun, participated in the Rajasuya Yagna performed by the Pandavas.\n\n 1. Sindu Desh: Sindhu Desh, ruled by Dhritarashtra’s son in law Jaydrath, is identified with the Sindh region that is now a part of Pakistan.\n 2. Matsya Desh, North Rajasthan: The capital of this kingdom was Viraatnagari where the Pandavas and Draupadi spent the year of disguise (13th year) of their exile. Princess Uttara was married to Abhimanyu, Shri Krishna’s nephew and son of Arjun and Subhadra.\n 3. Muchhkand Tirtha, Dhoulpur, Rajasthan: The hills here had a reputation of being perilous. Muchhkand dwelled in the caves here and his look would reduce one to ashes. When Shri Krishna was followed by Kaalyavan the former hid in the cave here. Kaalyavan mistook Muchhkand for Krishna and disturbed his sleep. As a result, Muchhkand burnt him to ashes.\n 4. Patan, Mehsana, Gujarat: Patan in Mehsana district of Gujarat was a popular commercial city right from the Dwapar Yuga.\n 5. Vardayini Dham, Rupalnagar: This place lies near Kalol in Gujarat and was known as Rupavati during those times. It was here that the Pandavas undertook a pooja to please Devi before going incognito. Since they were blessed by Bhagwati, the Devi was called Vardayini (one who grants boons) and the place was named Vardayini Dham.\n 6. Avantika, Ujjain, Madhya Pradesh: Ujjain was known as Avantika earlier. It is counted among the seven holy cities of Hindus. The ashram of Rishi Sandipani, Guru of Shri Krishna and Shri Balaram, was located here.\n 7. Chedi, Madhya Pradesh: Chedi was ruled by Shri Krishna’s cousin Shishupal during the times of Mahabharata. Chedi lies between the rivers Ganga and Narmada.\n 8. Vidarbha: Vidarbha was counted among one of the powerful kingdoms of those times. King Bhishmak was defeated by Sahadev when the former abducted the horse of the Pandavas.\n\n29: Revatak: is a mountain lying close to Dwarka. It is alternatively known as Girnar. It is located near Junagadh.\n\n30: Yayaatipur: About 78 kilometres from Cuttack lays Jajpur which can be identified Yayaatipur of ancient times. This is the place where Pandavas had offered oblations to their ancestors.        \n\n 1. Kekaya Pradesh: On the northern border of Jammu and Kashmir was the kingdom of Kekaya. The dynasty was renowned for valorous warriors and fought on the side of Kauravas in Kurukshetra.\n 2. Madra Desh: Ruled by Shalya, uncle of the twins Nakul and Sahadev and brother of Madri (second wife of Pandu), the kingdom of Madra lay on the northern side of the Himalayas.\n 3. Anga Desh: The region which was gifted to Karna by Duryodhan lies in the Gonda district of Uttar Pradesh today. Malini Nagari, capital of this region, is said to be a Shakti Peeth where the right hand of Devi Sati fell after being dismembered by Shri Vishnu.\n 4. Naimisharanya: Is an important place of pilgrimage located on the banks of River Gomati. It finds mention not just in the Mahabharata but in the Puranas also. It was here that the Mahabharata was recited by Rishi Ugrashravas to the gathering of Rishis.\n 5. Kaushambi: What is Allahabad today was the capital of Vatsa Desh during those times. They had sided with the Kauravas.\n 6. Kamakhya: is a renowned Shakti Peeth that is 10 kilometres away from Guwahati in Assam. It is not just popular but also among one of the most powerful Shakti Peeths.\n 7. Dwarka: This place in coastal Gujarat was constructed by the celestial architect Vishwakarma on the instructions of Shri Krishna. To avoid unnecessary war Shri Krishna moved with the entire clan to Dwarka when Jarasandh kept attacking Mathura repeatedly after Kans was killed. Dwarka continues to be an important pilgrimage centre to this day.\n 8. Prabhas: The region on the west coast of India in the state of Gujarat, within which Bet Dwarka lies, is identified as Prabhas Kshetra. This place stood witness to the end of Yaduvanshis after they fought and slayed each other. When Shri Krishna left for his heavenly abode the entire region was swallowed by the sea.\n 9. Shonitpur: is an important place of pilgrimage which has a temple dedicated to Shri Narsimha, an avatar of Shri Vishnu. It is a few kilometres away from the modern city of Itarsi in Madhya Pradesh.\n 10. Indrakil: is identified with one of the mountains on the Himalayan range. It is significant because during their exile Arjun performed penance here to obtain the Pashupatastra from Lord Shiva.\n\nThe country’s rich history needs to be celebrated by letting people know of these ancient cities that continue to stand witness to some of the greatest events in human history. Much can be taught and learnt about our Puranas, Shastras and Itihasas if we form a Mahabharata and Ramayana circuit and encourage people to visit these sites so as to relive history.\n\nLatha Iyer", "pred_label": "__label__1", "pred_score_pos": 0.689772367477417} {"content": "Category: Careers in Radio\n\nNovember 1, 2019 Off By Willie Hudson\n\nCareer Focus: Disc Jockey \n\nEver wanted to be a disc jockey? This career has evolved that it can now be a lucrative option for earning an income. This article will give you an idea of how to start a career in the radio industry as a disc jockey. \n\n\nThe word disc jockey or DJ started in 1935 and was coined by Walter Winchell, a radio gossip commentator. But it was only in 1941 that the word was known publicly when it was mentioned in the Variety magazine. The primary task of the disc jockey is to introduce phonograph records on air. Back then, this was a novel way of playing songs over the radio as the disc jockey composes an introduction and adds some personal greetings to the person(s) to whom the song was dedicated. Today, this is still the primary job of the disc jockey with additional perquisites. \n\nJob Description And Requirements \n\nTo become a disc jockey, it is not only necessary that you love music or can gab endlessly. A significant requirement nowadays is one must have an associate or bachelors’ degree to stay at par and meet the demands of broadcasting and communication arts. It is also essential to gain experience or hands-on training in becoming a DJ to make sure that the person will have a grasp of the technicalities of the job. \n\nDuties And Responsibilities \n\nAs a disc jockey, one must understand that it is a vital aspect to practice the ethical principles in broadcasting. This includes integrity of information, fairness or equality, independence, accountability, and humanity. \n\n\n\nThe office of a disc jockey is limited to the 4-walls of a soundproof booth. They accept greetings and calls over the phone, read letters and follow song requests. They play commercial segments and prepare interfaces in their radio program to entice the listeners. Disc jockeys are also capable of offering guidance and on-air counseling to callers who share their life problems. Most of these problems are on relationships with parents and family, love life, student, and career issues. \n\nDisc jockeys not only play music all day. They are given a specific radio program to host and deliver spiels that are relevant to their listeners. At times, they interview celebrities, politicians, or other vital personalities that are relevant at the moment. Disc jockeys are also invited to host social events like product launching at concerts or station sponsored events. As the disc jockey builds his/her professional portfolio, they become in demand and influential in commercial and business sales. They can receive endorsement offers and are very much well-paid. What’s more is if you have a talent in singing, dancing or acting, this can be a stepping stone to another well-off career and your road to stardom.  \n\nFuture Directions \n\n\n\nSome say that because of the progress of digital technology, human factors will start to diminish and digital or robotic programs will replace this. Some disagree with this prediction and would like to clarify that human interventions will remain a number one element in radio broadcasting. Even in digital radio and podcasts, radio announcers and disc jockeys are still doing their jobs. The only changes that are sure to take place are the advancement of the roles and responsibilities of a disc jockey. It is too early to say at this time what future will hold for this type of career; however, we are confident that the curtain will still not fall for the disc jockeys around the world. \n\n\nSeptember 2, 2019 Off By Willie Hudson\n\nMusic Therapy: Does It Work?\n\nThere are many things that you need to remember when it comes to taking good care of your mental health. Keep in mind that no matter how healthy you are physical, there will still come a time in your life when you will start to have issues with your mental wellness. When that time comes, everything that you have in your life may be gone. As such, it is vital on your part to see to it that you take good care of your mental health.\n\n\n\nOne of the best ways on how to improve how you feel and the way you handle your issues is to try seeing a therapist. The best thing about having a therapist is that you can have someone to open up to. This professional can be your source of strength and power, especially in times of sadness and confusion. One of the effective methods used by mental health experts in helping their patients is music therapy. According to Kim McMillin, LMHC, LMFT, “Music actually changes the chemistry of the brain! Music can be used to increase daily functioning. Music is a right brain activity (music making) that can be used to compensate for lack of left brain functioning (ability to sequence, speech”\n\n\nUnfortunately, there are still some individuals who do not believe that this kind of therapist works. Some think that therapy is not as important as it seems. For today’s article, allow us to give you the top reasons why you must consider going to music therapy. Here are the things that you must know:\n\n\n\nIt Reminds You Of A Good Memory\n\n\nAre you aware that there are days when all you need is to remind yourself of the good memories that you have so that you can start to feel better? Sadly, there are days when thinking about these moments may be challenging. Do not fret because music therapy can help you in this aspect. Some songs can evoke special memories. “Music has been a part of human life for as long as we can track its history. It is present in every human culture on Earth. And it seems that music is everywhere in the modern world!”, states psychologist Dr. Victoria Williamson. Some fantastic and wonderful memories have been suppressed in your mind because of bad experiences. Now is the best time to relive those moments and allow them to improve your feelings.\n\n\nIt Connects Troubled Persons\n\n\nSome married couples choose to go through music therapy because it can remind them of the love that they have for each other. Some marital problems exist because couples forget how they value each other. Music therapy can be an exciting way of how to show them that staying together is the best option. It is one of the reasons why several therapists or counselors use this in fixing a marriage.\n\n\n\nIt Takes Away Sadness\n\n\nIf you are grieving because of the loss of a loved one, do not worry because there is something that can help you improve what you are feeling at the moment. All you have to do is to start considering music therapy sessions. Several professionals in your area specialize in using music during the various meetings for therapy. According to psychiatrist Ira Altschuler, “Music, even more than the spoken word, lends itself as a therapy because it meets with little or no intellectual resistance and does not need to appeal to logic to initiate action.” Make sure that you take advantage of the services that they are offering. Choose the right therapist for you, and everything will soon feel okay on your part.\n\n\nWhat are you waiting for? Start music therapy now if you believe that you need to get one.\n\n\nAugust 26, 2019 Off By Willie Hudson\n\nHow To Express Your Love Through Music\n\nFalling in love is one of the best things that you can feel in this lifetime. Nothing can ever make you the happiest person unless you found your other half. It can be overwhelming in the beginning, but everything will feel better once you find that one individual who can make you feel complete and whole. Because of this, it can be challenging or difficult on how to express your love to the other person. Sometimes, you can become too much in love to the point that you will end up being speechless when your loved one is around.\n\n\n\nIn this article, we are going to provide you with romantic ways on how you can use songs to make the one you love happy. Now is the best time to express your love for someone through music. First of all, you have to understand that music is the universal language in this world. You must change or transform the way you look at and listen to beautiful songs. Think of them as a wonderful opportunity to connect to your inner self and put a smile to your significant other.\n\n\nHere are the special ways on how you can express love through music:\n\n\nSerenade Her\n\n\nNothing is more classic than singing to the girl who means the world to you. Be thankful for the availability of good music to connect with another individual. You can express what you feel inside by choosing a song that your girl loves. Once you have this song, you can now focus on thinking about the special ways on how you can serenade her. It can also be a good idea in moments when you are planning to propose to your girl.\n\n\n\nCreate A Playlist\n\n\nDo you want to be extra romantic to your loved one? One of the best ways to make this happen is to dedicate your time and attention into creating a special playlist for her. Think of all the beautiful songs that she likes listening to. Put them into one playlist and share it to her as soon as possible. Another way of making this suggestion is to select the songs that you want to dedicate to her.\n\n\nFocus On The Lyrics\n\n\nIs there something that you wish your girl to know right now? Do you want to express how grateful and happy you are because of her presence in your life? Did she do something recently that made you feel proud? All you have to do is to choose or select the right song for every moment. Once you do, take the proper steps to share it to her. For sure, she will find it interesting and exciting, especially once she realizes that you went out of your way to listen to the songs and give her meaningful lyrics.\n\n\n\nIndeed, songs and music do make the world go round. Do not hesitate to take advantage of these beautiful pieces. Learn how to fall in love with songs and use it to express your affection to someone.\n\n\nAugust 19, 2019 Off By Willie Hudson\n\nWhy You Need To Listen To Songs\n\nAre you constantly feeling a lot of stress in your day-to-day life? Do you get anxious right away when things do not happen the way you want them to be? Is it your goal to improve your mood and start feeling better about life? If you answered yes to all these, then make sure to begin considering listening to the best songs of all times. Tuning in to your radio or playing your favorite songs on your phone can be highly therapeutic in your part.\n\n\n\nBecause of this, we want to encourage everyone to make music a big part of your life. For today’s article, we are going to provide you with a list of the top reasons why you need to start listening to good songs beginning today:\n\n\nIt Relieves You From Stress\n\n\nAs already mentioned above, one of the best advantages of listening to music is that it can take all your stress and worry away. When you select a good song, you allow yourself to connect with it positively. The more you play uplifting or upbeat songs, the better you will feel about everything in your life. If this continues to take place or happen for a long time, there is a good chance that stress will ultimately be eliminated.\n\n\nIt Improves Your Mood\n\n\nDo you ever think or feel that some days are difficult to survive? When something bad happens at any given time, make sure to refer to your playlist as soon as possible. Select the right songs to lift your mood. Keep in mind that playing your favorite songs can be the easiest way to improve what you feel at a given moment. For example, if you encounter a bad day at the office, the best way to deal with it is to tune in to your favorite radio and let the songs entertain you.\n\n\n\nIt Gives You Hope\n\n\nAre you aware that there are many songs out there that were written for the sole purpose of helping troubled persons? It is best if you will take the time to discover these songs and download them. Listen to these amazing songs whenever you feel sad and down. Let the music bring out the best in you and give you more hope or inspiration to move forward. Take note that sometimes, all you need is a little push. If you cannot get it from others, then at least get it from the best music or songs available right now.\n\n\n\n\nPlaying your favorite songs can be the best way to feel better about everything. Make sure that you take advantage of the best songs produced by various artists around the globe. Do not be afraid to allow songs to affect you positively. The more you embrace them, the better it would be for you. Listening to music can also be therapeutic. This is one of the various reasons why many therapists or counselors recommend it for mental health purposes. Enjoy every moment you can get with the best songs!\n\n\n\nAugust 12, 2019 Off By Willie Hudson\n\nHow To Create Your Playlist\n\nCreating your playlist is one of the fun things that you can do. It feels good to search for the songs that keep your soul alive. There is always a big part of you that will continue to smile if you find the perfect songs to represent what you feel at the moment. However, creating a playlist can also be stressful, especially if you have mixed emotions. It can be challenging, tough, or and confusing to find the said songs. Don’t fret because, in this article, we are going to start creating the perfect playlist.\n\n\n\nKnow What You Feel\n\n\nThe first thing that you must do is the current state of your emotions. Are you happy or sad? Does something keep you excited or stressed? Being aware of what you truly feel can guide you on how to start selecting the songs to include in your playlist. Do not be afraid to discover your emotions and explore each of them. Creating a playlist should be a fun process. Consider it also as an excellent opportunity for self-discovery. You will love it for sure.\n\n\nPlan The Title\n\n\nThe next step is to determine the title of the playlist that you want to create. When choosing a title, make sure to select something witty and easy to remember. The benefit of creating a title ahead of time is that you can already set your mind about the kinds of songs that you want to add in the list. For example, if you choose “Mood Booster” as the name of the playlist, then the songs to add in the playlist must be those with upbeat tunes or positive lyrics.\n\n\n\nListen To Songs Completely\n\n\nAnother thing that you must never neglect is to listen to the entire song before adding it on your playlist. You will never know the beauty of one song unless you listen to its entirety. What is nice about doing this is that you are allowing yourself to connect to a song. It is best if you will put your earphones on while listening so that you can feel every beat and lyrics. Enjoy the process of selecting your playlist by doing this activity. It will also help you to determine how much you can like a particular song. Make sure to enjoy it.\n\n\n\n\nChoosing the best songs for a perfect playlist does not need to be difficult. Make sure that you enjoy the process so that everything you do will be worth it. Ask a friend to accompany you if you want. You can listen to great songs, and you can also get inspiration from him. The essential tip to remember is to be patient when it comes to curating a playlist. There will be some minor challenges along the way, but you can get through it. Once you create the best playlist, everything will become better for you. You can use that playlist to cheer you up daily.\n\n\n\nJuly 29, 2019 Off By Willie Hudson\n\nHow Therapists See The Benefits Of Listening To Radio\n\nWe all can appreciate the importance of radio on different sides of advertising. However, some of us consider it essential for music entertainment. That is the reason why radio grew its audience for about 12% over the past years. “For most of us, good radio enlarges our social sphere.”, according to Peter D. Kramer, a psychiatrist. With regards to its contribution to the mainstream media, the psychological field is also now acknowledging music’s potential in assisting with mental health. But note, the process did not just happen overnight. The importance of listening to the radio was once criticized many years ago by a lot of people. Fortunately, in today’s generation, things are way more different. Dr. Frank Farley, president of the media psychology division of the American Psychological Association, says radio talk shows represent the beginning of a new era, and he is less than thrilled. “There is a controversy here, no doubt about it,” he said. “Basically we’re against it; there is definitely a sentiment against it. Longer term, face-to-face encounters are crucial. This ain’t therapy. The association is now working up a code of ethics on the issue.”\n\nMusic And Visual\n\nInnovation is now working its way to globalize information technology. As you can see, one of its significant contributions to the world is the internet. With the power of the internet, we can now watch different things online, including music videos. But way before, listening to radio with a piece of favorite music on is, in fact, more pleasurable than watching the visuals with “the music on.” That is because the focus of listening to music makes sense of hearing more functional. It increases the ability of the auditory to process such words, tempo, timing, and beat. Because in comparison in today’s era, the brain’s concentration gets mixed by the separated visual and auditory details of particular music shown on videos.\n\nMusic And The Mind\n\nAn average person can listen to music up to four to six hours a day on separate occasions of the time. When calculated, that is roughly about a person’s thirteen years of life existence. It gets better because a lot of us now consider music as a mindfulness therapy. It creates a significant positive impact on our mental state. So when we listen to it through a radio, the effect becomes more psychologically advantageous. Since listening makes us focus on our particular sense, which is our sense of hearing, we get to be creative. We allow our minds to think through things with the help of sounds we only hear. With that, we receive an increased cognitive function. But it is vital to recognize that not all music is beneficial for mental health. Some assist therapy, but some damages the brain function in some ways. With that, we need to be more careful with our music selections.\n\nMusic And The Soul\n\nWhen listening to something, we imagine things. We get to create a visual representation of a particular scenario that relates us to the current state of our feelings. That inevitable moment takes us into a deep inner connection between our emotions and mental well-being. That is the reason why every time we listen to a piece of music, radio drama, or podcast; we feel comfortable at the same time. The whole idea of listening to something from the radio influences our mood to feel the desired emotional state we need at the moment. Music is beneficial in finding the courage to convince ourselves that we need to let our emotions out. Therefore, listening to the radio can help release those emotions we are not supposed to control.\n\nMedia And Information\n\nWe often use media to our advantage, especially with television. But the effects of listening to a radio create no difference at all. As we listen to a conversation, interviews, and news on the radio, we also get informed. We receive the same amount of knowledge we assume we only get in television alone. Yes, there are issues alongside the broadcasting’s truthfulness and fact-based reports. But that goes the same as to all types of media. Therefore, we can conclude that everything we hear on the radio has the same amount of truth-and-lie possible experience we receive from watching television.\n\nThere are so many examples of how listening can be a significant factor in increasing cognitive and emotional function. Psychiatrist Ira Altschuler once said “Music, even more than the spoken word, lends itself as a therapy because it meets with little or no intellectual resistance and does not need to appeal to logic to initiate action.” That is perhaps the reason why radios still live up to this moment. It even caters our needs when it comes to information and entertainment. That is a fact. But in terms of addressing psychological issues, listening to a radio truly helps a lot in taking care of anxiety, stress, as well as depression. But we have to be mindful that it is not necessary to listen to a thousand of music in a day only to become emotionally and mentally stable. Just those we like is more than enough to handle our neurological productivity.\n\n\nMay 3, 2019 Off By Willie Hudson\n\nWhy Is Creative Expression Important In Psychology?\n\nPsychology studies behavior and the self. Psychologists run many different tests, interpret a lot of data, and study tests subjects all for the sake of further understanding the way humans connect, and how they respond to stimuli.\n\nArts And Creative Expression In Psychology\n\nIn terms of therapy, one-way psychologists and psychiatrists use to understand better their patient is through creative expression. When words fail to explain experiences, traumatic or not, their patients can turn to artistic expression and freely express themselves. According to Marni Rosen, PsyD, “Finding the words to express trauma is a common challenge for trauma survivors. Creative arts therapies can bridge the shattered memory or painful emotion, and a cognitive-linguistic expression of the traumatic experience. It brings the absence of language into the present though art.”\n\n\nCreative expression comes in many types and forms. It is a broad artistic spectrum with various creative mediums. Some widely known methods of creative expression are dance, creative writing, theater, drama, acting, singing, music, and even through broadcasting and scriptwriting. Visual art forms like photography, drawing, graphic artistry, murals, creative vandal, and painting are also under creative expression.\n\nCreative expression amplifies three significant components, both from the observer’s point of view and the artist:\n\n • Sensation\n • Emotion\n • Knowledge\n\nThese three major components are tools to better understanding artworks, regardless of form.\n\n\nAdditionally, creative expression becomes a tool for the self to feel fulfillment. In individuals who have lost their sense of self to their mental illness, creative expression can help them slowly regain that. According to Amber L. Cromwell, LMFT, “Art therapy supports the treatment for a wide range of mental health issues and may assist in the process of achieving personal insight in individual, group, couples, and family therapy.”\n\nCreativity is known to decrease depression. Studies in the field of psychological research suggest that engaging in artistic activities significantly decreased negative emotions experienced at a given time, and ultimately reduced depressive episodes. According to Katrina Curry, LMFT, “Creativity offers a release for stress hormones, and for tangled up cognitive and emotional experience.”\n\nThe creative process is ultimately beneficial to the human psyche because making something is inherently a human trait. The drive for creation propelled most of the scientific discoveries and historical events in the past. The desire to create, to express, and to improve the quality of life all seem interconnected.\n\nOutside Of Therapy\n\nArtistic expression outside of its use in therapy varies widely. Patients indulge themselves in this expression to relieve themselves of past trauma. They use it to communicate themselves and their inner feelings, consciously and subconsciously. Artists engage in creative expression as an outlet to express themselves when they can’t do it outright.\n\nOthers engage in creative expression as a hobby, and because it makes them feel good about themselves. More often than not, it is a valuable skill that one can develop and explore endlessly.\n\nCreative expression is right for your overall health and wellbeing. It becomes an outlet for stress, negative emotions, and pent up frustrations. Being able to express yourself freely without restriction dramatically improves your mental health. Not only that, but creative expression also allows you an escape from the harsh realities of life as you focus on your art.\n\nIn some cases, exploring your potential for creativity and similar creative pursuits might inspire you to be better. Creative expression inspires action and often comes with positive, feel-good results.\n\nAdditionally, for those prone to illnesses of the body as well, creativity improves your immune system. Participants who engaged in emotional writing had a noticeable increase in the production of lymphocytes in their body.\n\nCreative Expression In Culture\n\nThe idea of creative or artistic expression being able to contribute to the self’s healing process is nothing new. A lot of different cultures worldwide know of the benefits of art, and its appearance brings to the soul. Throughout history, people have used dances, chants, pictures, and stories as a part of their healing rituals. Recently, further studies have been about exploring the therapeutic effects of the arts in spiritual, emotional, and mental healing.\n\n\nAs a whole, creativity and the right to express yourself artistically is something beneficial and inherently a part of the human psyche. In psychology, where studies and research are continuously in the process of development with regards to creative expression, its positive impact on the body is undeniable.\n\nAside from that, engaging in artistic activities also offer fun but a cost-effective escape from the horrors of reality. Being deeply absorbed in your art de-stresses you from your toxic work environment, allowing you are breathing space to grow.\n\nCreative expression promotes freedom of speech, creative space, better self-confidence, and in turn, a glimpse into the artist’s subconscious. Through the artistic expression of thoughts, feelings, emotions, and need, you can be better understood.\n\nApril 3, 2019 Off By Willie Hudson\n\nScott Mills Talks About His Anxiety And The Mind Media Awards\n\nAnxiety is indeed a mental health issue. Not only does it disturb a person’s emotional and psychological state, but it can also cause drastic changes that can affect lives. It is something that should not be taken for granted but instead must be addressed immediately. People should be aware of this and must learn how to cope if already suffering from it. Anxiety is not just an issue on the person who has it. It is also an issue to the people and loved ones around the affected person.\n\n“It’s unrealistic to think that we don’t have anxieties and that we don’t need to defend against them.” says Julian P Humphreys, Ph.D.\n\nMarch 22, 2019 Off By Willie Hudson\n\nMass Media Assistance For Mental Health Awareness\n\n\nMental illnesses have existed as far back as the time of the ancient civilizations. Yet, it is only in recent years that the general population have become so aware and well-acquainted of these mental health disorders, thanks to the onset of the digital age. Mass media is a primary source of information about psychological disorders such as, but not limited to, bipolar disorder, schizophrenia, and depression. It was author Jum C. Nunnally’s book, The Psychometric Theory, that launched the scientific study of mental health in the public eye. In it, Nunnally discussed and analyzed the differing perspectives of the mental health experts, the general public, and the mass media. Besides that, the misunderstandings caused by false representations and negative portrayals were also emphasized and criticized. It is quite clear that the media depicts mental issues in a terrible light, despite the growing scientific advances being made in studying and treating them (for example, therapy). It is this kind of misrepresentation that unfortunately creates a stigma around mental health.\n\nSituating Mental Health Stigma Within Mass Media Interventions\n\nMental illnesses becoming a ‘stigma’ is a phenomenon that occurs around the world, affecting not only those who face them on but also their families and societies. Because of the general public’s unwillingness to understand the conditions of mental health, the stigma encourages ignorance, prejudice, and discrimination within a community. The repercussions from these kinds of behaviors could result in a lack of professional help, poverty, and unnecessary and stereotypical labeling. These orders go on to become untreated, simply because it is seen as a taboo.\n\nIn response to this, the idea of holding media interventions has been brought up. Mass media has a wide, prolific audience through channels of communication. Rather than a conventional intervention where face-to-face contact occurs, mass media interventions reach out to a large number of people at once. They vary in several aspects, such as their target audience, their resources, and their specific area. These kinds of interventions are utilized because it allows for an introduction that does not overwhelm its audience. Mass media campaigns have been proven to be more effective when they are conducted thoroughly and last for a longer amount of time.\n\nHealthcare professionals and individuals or families who have experienced the stigma associated with mental health are usually advocates for mass media interventions. Some research studies have found that anti-stigma mass media interventions on mental health have managed to reduce discrimination, as well as increase the utilization of mental health services. This study is also found in an article in However, despite these results, this type of approach is still highly intricate and should be dealt with delicately.\n\n\nSituating Mental Health Stigma Within The Community\n\nIn the case of communities in Uganda, mental illnesses are prevalent but poorly understood. They base the cause and manifestations for mental health issues on their belief systems, which vary from social, religious, and cultural. Often a dilemma is posed in regards to choosing between traditional or medical treatments. Because of this, patients are often misdiagnosed, wrongly treated, and lack adequate and appropriate professional care. Therefore, efforts are being made to ensure that mass media interventions educate rather than confuse, most especially when it comes to developing countries.\n\nMethods – Live Radio Talk Shows\n\n\nTake for instance, in Uganda. The Community Psychiatric Support Organization is a listed not-for-profit group in Uganda that was founded in 2009. Their goal is to encourage mental health well-being by enabling the public and encouraging concern for those with mental health issues. They directed sixty-six live radio mental health education talks on five different radio stations (Radio Simba FM, Impact FM, Family Radio FM, Beat FM and Top Radio), and participated on twenty-six live television talk shows in three local stations (Uganda Broadcasting Corporation TV, Star TV and Top TV) in Uganda sometime from January 2013 and September 2015.\n\nDuring these segments, members of the public such as spiritual pastors and traditional healers joined them. The outline for their programs consisted of informing the audience what mental illness is, what causes them, what signs and symptoms to watch out for, and what treatments are possible. The public was encouraged to call in or send in text messages for any comments or inquires after the programs.\n\nImplications For Practice And Research Mental health practitioners and researchers working in developing countries face major challenges when working with mental health clients, as well as with convincing the public to respect mental health and to bring these issues to light. The public desperately needs to receive information about mental issues that are accurate, appropriate, and accessible. Mass media interventions have proven their ability to reduce discrimination about mental health, albeit at a limited level. Everyone involved must work hand-in-hand towards reducing misperceptions and misinformation in a culturally appropriate and socially acceptable manner.…\n\nNovember 6, 2018 Off By Willie Hudson\n\n5 Ways To Be Anxiety-Free During Your First Radio Show\n\nBeing in a radio show for the first time as either a guest or a host is undeniably a once-in-a-lifetime opportunity for many people. The radio broadcasting industry, after all, is more popular now than ever. The stations don’t let anyone go in the booth unless you are an exceptional human being with a voice that can pull in more listeners. It is the kind of privilege that you should be proud of, therefore.\n\nNonetheless, it isn’t surprising for your nerves to go haywire on the days leading to your first radio show. It may already be nerve-wracking to think of how you’ll do even if you’ll only be on for a few minutes. If you have to talk during the entire duration of the program, you may feel anxiety creeping in your system. You can’t sleep; you have no appetite. Your mind often flies somewhere, unreachable for the people around you. Worse, you might play morbid scenes in your head nonstop, which involve you receiving hate messages from the unsatisfied audience.\n\nConsidering you want to go to your first radio show anxiety-free, you can try these tips:\n\n1. Map Things Out\n\nLike any soldier about to head to the battlefield, you should devise a strategic plan on what you’ll do. Think of everything, from how you will greet the listeners to how the close remarks should be. In case you won’t bee alone in the booth, you need to find a way to interact with the other person(s) without sounding forced.\n\n2. Get A Feel Of Your Tools\n\nBefore the actual show, it is smart to go to the booth that you will use. Look at all the equipment there; ask about the things that are unfamiliar to you. You can also test them out and learn about their functions at least a day before your program starts. That can stop you from messing up due to nervousness.\n\n3. Know Who Listens To You\n\nAnother vital task you should never take for granted is the analysis of your target audience. Regardless of whether you are hosting or visiting the radio show, you must speak with the age group of your listeners in mind. This way, you will be able to use words that won’t cause the regulatory boards to flag the program.\n\n4. Prepare Your Voice\n\nIt is also essential to prepare your vocal cords for the continuous speaking that you will do, especially if you happen to be the host. Avoid drinking iced beverages often; sleep for long hours on the night before the program airs as well. That will allow you to modulate your voice during the D-day and not annoy the listeners. Besides, your nerves may calm down when you hear that you sound amazing through the speakers.\n\n5. Be Comfortable\n\nThe best thing about being on a radio show is that you need not dress up for the occasion. You don’t have to wear makeup; you may even strut in the room in your sweatpants or the most worn-out shirt you own. You are also free to be in sandals or cross your legs together on the chair. The audience can’t see you; that’s why you can get as comfortable as you have to be.\n\n\nAs daunting as it may seem, doing a radio show for the first time is a genuinely enjoyable experience. Know your role, be mindful of the things you see – and don’t see – and have a blast. Good luck!…", "pred_label": "__label__1", "pred_score_pos": 0.8841995596885681} {"content": "Source: python-ilorest Section: python Priority: optional Maintainer: Carsten Schoenert Build-Depends: debhelper (>= 11), dh-python, python3-all, python3-jsonpatch, python3-jsonpath-rw, python3-setuptools, python3-uritools, python3-sphinx , python3-sphinx-rtd-theme, python3-sphinxcontrib.restbuilder, Vcs-Git: Vcs-Browser: Standards-Version: 4.4.0 Homepage: Package: python-ilorest-doc Section: doc Architecture: all Depends: python3-sphinx-rtd-theme, ${misc:Depends}, Description: Documentation of RESTful API for HPE iLO and HPE Chassis Manager This package contains the Sphinx based documentation for the library python-ilorest. . It contains also the examples from upstream that explain the usage of the library with dedicated examples. Package: python3-ilorest Architecture: all Depends: ${misc:Depends}, ${python3:Depends}, Description: RESTful API for HPE iLO and iLO Chassis Manager based HPE servers (Python3) HPE RESTful API for iLO is a RESTful application programming interface for the management of iLO and iLO Chassis Manager based HPE servers. . REST (Representational State Transfer) is a web based software architectural style consisting of a set of constraints that focuses on a system's resources. iLO REST library performs the basic HTTP operations GET, POST, PUT, PATCH and DELETE on resources using the HATEOAS (Hypermedia as the Engine of Application State) REST architecture. The API allows the clients to manage and interact with iLO through a fixed URL and several URIs. . This package contains the Python 3 version.", "pred_label": "__label__1", "pred_score_pos": 0.9877948760986328} {"content": "Your search returned over 400 essays for \"ian wilmut\"\n1  2  3  4  5    Next >>\n\nIan Wilmut and the Cloning of Dolly\n\n- Ian Wilmut and the Cloning of Dolly Definitions of creativity vary based on different people’s interpretations, yet most people agree that creative individuals produce new ideas that can completely change or invent a domain. According to Howard Gardner, creativity is not limited to a single domain, but is unique for all seven domains. Creativity is based on three core elements: the relationship between the child and the master, the relationship between an individual and the work in which he/she is engaged, and the relationship between the individual and others, such as family and friends (Gardner, 9)....   [tags: Science Genetics Papers]\n\nPowerful Essays\n4071 words | (11.6 pages) | Preview\n\nIan Wilmut and Cloning\n\n- Ian Wilmut and Cloning Before Dolly the cloned sheep made news headlines, the same researchers had only the year before raised seven other sheep from oocytes whose nuclei had been replaced with nuclei from either fetal or embryonic tissue.1 This created a minor stir as this is the \"first report to [their] knowledge, of live mammalian offspring following nuclear transfer from an established cell line.\"1 The implications of this is that they have provided techniques to analyze and modify gene functions in sheep (By providing clones of the same sheep).1 The key to their success is the \"serum starvation\" that the donor cell undergoes, to force the donor cell into a 'quiescent' state, so that i...   [tags: Genetic Engineering Essays]\n\nFree Essays\n621 words | (1.8 pages) | Preview\n\nAnalysis Of Ian Mcewan 's Atonement\n\n- Ian McEwan’s Atonement is great example of character involvement in text, for to understand a characters need to atone, the reader needs to understand the psyche of the character. The book, which is aptly named after that which it represents, is written so that the events transpiring either give insight to the mind of the character, set up the conflicts that will lead to the need for atonement, or are the act of atonement themselves. It is by focalizing through specific characters throughout the book that McEwan creates a theme of atonement and it is by understanding the psyche of the characters, and their need to atone that the novel gets it’s forward movement....   [tags: Novel, Ian McEwan, Narrative, Mind]\n\nBetter Essays\n1214 words | (3.5 pages) | Preview\n\nAnalysis Of Ian Mcewan 's Atonement\n\n- Whole hearted originality is that of an oxymoron, simple because, “true originality” is not something that can be created. Yet originality is something that can be imitated and stolen from. The act of stealing is what generates “true originality.” Artists and every other creatively thinking person take from one another to make something revolutionizing. Take for consideration Ian McEwan, and his novel Atonement; the novel employs what would be a revolutionizing form of literary technique for British Literature....   [tags: Fiction, Novel, Ian McEwan, Marcel Proust]\n\nStrong Essays\n1277 words | (3.6 pages) | Preview\n\nIan Buruma's Behind the Mask\n\n- Ian Buruma's Behind the Mask Ian Buruma was born in the Netherlands in 1951. He went to school in both Holland and Japan, and he has spent a great deal of time in Japan. Ian Buruma is an author, journalist and a professor at Bard College in New York. He sometimes writes for the New York Review of Books, the New York Times Magazine, the New Republic, the New Yorker, and the Guardian. The book, Behind the Mask, was a very interesting one. This book is filled with lots of Japans history that most people know nothing about....   [tags: Ian Buruma Behind the Mask]\n\nFree Essays\n468 words | (1.3 pages) | Preview\n\nHistory of Ian Fleming\n\n- History of Ian Fleming Ian Fleming not just created the character of James Bond; he personified him by living an exciting life. With his suave style and long history of lavished background he was almost born into the part of his later creation. Ian Fleming was born on May 8th, 1908 to his father, Valentine Fleming, and his mother, Beatrice Fleming (Lycett 12). He was the grandson of the famous Scottish banking pioneer, Robert Fleming (Rosenberg 5). Ian also had three brothers named Peter, Richard, and Michael....   [tags: Ian Fleming James Bond Essays]\n\nPowerful Essays\n1402 words | (4 pages) | Preview\n\nIan McEwan's Enduring Love\n\n- Ian McEwan's Enduring Love Evident throughout the entire plot of ‘Enduring Love’, Ian McEwan fuses three different genres: love story, detective story and thriller. Each genre I believe has a set of expectations that captures the reader urging them to read on, for example a thriller genre would stereotypically be led by a fast, tense pace with characters easily identifiable as ‘goodies’ and ‘baddies’. Different, fresh and ‘novel’ McEwan establishes his break up of typical genres as he mixes the elements of the three main genres and purposely doesn’t stick to their rigid framework that many authors swear by....   [tags: Ian McEwan Enduring Love Essays]\n\nStrong Essays\n1205 words | (3.4 pages) | Preview\n\nUrban Alienation in Ian McEwan's The Cement Garden\n\n- Urban Alienation in Ian McEwan's The Cement Garden It was not at all clear to me now why we had put her in the trunk in the first place. At the time it had been obvious, to keep the family together. Was that a good reason. It might have been more interesting to be apart. Nor could I think whether what we had done was an ordinary thing to do In this essay I shall be examining the socio-cultural context of The Cement Garden by Ian McEwan (1948 - ). Once placed within context, an examination of the internal worlds of the bereaved children will follow....   [tags: Ian McEwan The Cement Garden]\n\nPowerful Essays\n2776 words | (7.9 pages) | Preview\n\nThe Opening Chapter of Enduring Love by Ian McEwan\n\n- The Opening Chapter of Enduring Love by Ian McEwan A dictionary defines the word addictive as being: wholly devoted to something, a slave to another and in a state of wanting more. Ian McEwan claimed that he wanted to write an opening chapter that had the same effect as a highly addictive drug. In my opinion he has achieved in doing this. At the end of chapter one the reader is left needing more information about the characters introduced and what tragedy actually occurred. McEwan took the definition, addictive, and wrote the opening chapter, never forgetting what his objective was....   [tags: Enduring Love Ian McEwan Essays]\n\nPowerful Essays\n1363 words | (3.9 pages) | Preview\n\nAphra Behn and the Changing Perspectives on Ian Watt’s The Rise of the Novel\n\n- Aphra Behn and the Changing Perspectives on Ian Watt’s The Rise of the Novel Ian Watt’s The Rise of the Novel (1957) remains one of the most influential texts in the study of the English novel. However, an increasingly strong case for a revision of both the work itself and the discourse it personifies has been gradually building over the past twenty years. While the initial stages of, first, feminist and, later, post colonial perspectives may have sought only to insert marginalised texts into the existing literary discourse, their long term ramifications are obliging a wider analysis of how we approach the English novel and the manner in which we link it to its surrounding culture....   [tags: Ian Watt The Rise of the Novel Essays]\n\nStrong Essays\n6046 words | (17.3 pages) | Preview\n\nRichard III - Ian McKellen Makes Shakespeare Accessible to All\n\n- Richard III - Ian McKellen Makes Shakespeare Accessible to All Shakespeare at the time and even now still seems like a foreign language to many minds. From its deep and complicated plot development, and the archaic English that was its makeup, to the strange and old-fashioned medieval settings and costumes, a Shakespeare film of that time was not something very appealing to the public. McKellen’s approach to making the film Richard III eliminated many of these prejudices people had of Shakespeare movies....   [tags: Film Movies Richard III Ian McKellen]\n\nFree Essays\n439 words | (1.3 pages) | Preview\n\nThe Death Of Ian Tomlinson\n\n- This essay will critically evaluate how the death of Ian Tomlinson in 2009 has impacted upon British policing. This essay will first start off with a brief summary of the G20 Demonstration and the death of Ian Tomlinson, followed by the Human Rights Act and how this has linked to the death of Tomlinson. This essay will also explain the outcome of the investigation made by the IPCC and explain the issues which aroose. On 23rd March 2009, the days leading up to the G20 demonstration The Joint Parliamentary Committee on Human Rights published their report on Human Rights and their approach to policing protests....   [tags: Constable, Police]\n\nBetter Essays\n1565 words | (4.5 pages) | Preview\n\nAnalysis Of `` Atonement `` By Ian Mcewan\n\n- Sibling conflict is a familiar aspect in any family dynamic. However, there are times when the siblings involved feel so strongly that they are unable to ever find common ground. Ian McEwan’s historical novel, Atonement, tells the story in the perspective of a young girl, Briony Tallis, that delves into the ruined relationship between her and her older sister, Cecilia, after Briony tells a life-changing lie. McEwan provides a realistic example of the short and long term psychological, emotional, and physical effects that a sibling rivalry can prompt....   [tags: Sibling, Birth order, Sibling rivalry, Family]\n\nStrong Essays\n1612 words | (4.6 pages) | Preview\n\nThe Book ' Hitler ' By Ian Kershaw\n\n- There are a lot of people in this planet view Hitler one way or the other. Many view him based on what other people think or what bad things he did. Have people ever considered how he grew up or what went through his mind. In the book, Hitler: A Biography, Ian Kershaw wrote about how Hitler grew up as a young man and what problems went through. This book describes what his parents thought of him and how his father influenced him. His parents were also married as cousins(Kershaw). If we look back at history when cousins marry each other, we can conclude that offsprings usually do not come out to be as developed as other offsprings....   [tags: Adolf Hitler, Nazism, Nazi Germany, Nazi Party]\n\nBetter Essays\n1801 words | (5.1 pages) | Preview\n\nAnalysis Of ' Atonement ' By Ian Mcewan\n\n- The human experience is riddled with unpalatable truths that we discover as we journey through life. Influencing our values and attitudes by deliberately challenging the reader with humanity’s unpalatable truths, Ian McEwan prompts the reader to consider our own moral compass through the character of Briony Tallis. During the course of ‘Atonement’, McEwan demonstrates that actions and words inevitably have consequences on not only the individual but also those surrounding them. Throughout the three fundamental stages of Briony’s complicated life, her coming of age story has developed in the unpalatable obstacle of atoning for her mistakes....   [tags: Morality, Religion, Atonement in Christianity]\n\nBetter Essays\n1110 words | (3.2 pages) | Preview\n\nThe Perils Of Obedience, By Ian Parker\n\n- Obedience has many forms and there are multiple reasons as to why people are obedient, whether yielding to authority or as an effort to please someone. Every reason can lead to different outcomes, having negative and positive results. Obedience can oftentimes be a response to a situation as well. Both Stanley Milgram, author of “The Perils of Obedience,” and Ian Parker, author of “Obedience,” talk about the reasoning behind obedience and the variables that enable such responses but, in the end, they come to different conclusions....   [tags: Milgram experiment, Stanford prison experiment]\n\nBetter Essays\n1206 words | (3.4 pages) | Preview\n\nAnalysis Of Atonement By Ian Mcewan\n\n- Starting around the ages of 12 and 13 years old, we have all succumbed to the embarrassing and life-scarring times of puberty (a time where we don’t exactly know who we are because of all the strange changes we are going through). Particular examples brought to mind when I think of my horrendous time with puberty is embarrassing mini volcanoes popping up all over my face accompanied by insanely awkward conversations with just about everyone around me. I would misinterpret things all the time in conversations that I would have with people and in just about every day-to-day activity I did....   [tags: Human sexual behavior, Sexual intercourse]\n\nBetter Essays\n1458 words | (4.2 pages) | Preview\n\nGhost Boy by Ian Lawrence\n\n- Prejudice is an issue that cannot be easily avoided in today's society. It has and always will have a huge impact on the discrimination that some people face based on religion, appearance, background, mental/physical disabilities and etc. In the novel Ghost Boy, written by Ian Lawrence, prejudice plays an important role in the society built within the pages and cover of the book. Harold Kline, the fourteen year old protagonist of the novel, faces many problems with the members of the society in which he lives based on his appearance because he is an albino....   [tags: Lawrence Ghost Boy Analysis Review]\n\nFree Essays\n1506 words | (4.3 pages) | Preview\n\nIan Buruma's \"Murder in Amsterdam\"\n\n- Buruma provides detailed insight into each character allowing the reader to contemplate the motivation behind actions of each one. Buruma describes Theo Van Gogh, the assassinated, as a “ubiquitous figure” in Holland, but is quick to point put out he is better known for his provocative public statements than his films. Van Gogh’s family was made up of Calvinists, Socialists, and Humanists all of which had an influence Theo Van Gogh in one way or another. Buruma emphasizes Van Gogh’s “desire to shock, to stir things up”, a desire developed at a young age and carried into his adulthood and films known for the shock value....   [tags: Character Analysis]\n\nPowerful Essays\n1618 words | (4.6 pages) | Preview\n\nAtonement by Ian McEwan\n\n- Manipulation is a strong tool allowing individuals with a minor role to subtlety, yet critically affect the course of a storyline. In the novel Atonement by Ian McEwan, the story is divided into three parts. In the first third of the book, a thirteen year-old girl named Briony Tallis writes a play for her older brother Leon: the Trials of Arabella. She wishes to use a fairy tale in order to persuade her brother to attain a stable relationship. The play, interpreted by her cousins, must be cancelled under unexpected circumstances due to her younger cousins’ refusal to collaborate as well as the fountain scene she witnesses....   [tags: manipulation, theme analysis]\n\nStrong Essays\n974 words | (2.8 pages) | Preview\n\nPolice Misconduct: The Case of Ian Tomlinson\n\n- This report will be on the Police service. It will explain who the police are and their role and function within the Criminal Justice System and society. In addition, it will talk about police misconduct and the results of police misconduct within the police, government and society. The police was set up originally in 1829 by Robert Peel, who was home secretary at the time. It was created because as society became more complex, they needed a way to deal with civil disorder without using the military (Mayor's Office for Policing and Crime 2014)....   [tags: Police Misconduct Essays]\n\nBetter Essays\n876 words | (2.5 pages) | Preview\n\nBiography Of Ian From My Neighborhood\n\n- I observed Ian from my neighborhood. He is a male and he is almost 3 years old. He is a Filipino. His parents came from the Philippines in Visayas region. Ian has a limited speaking in Tagalog because mostly all of his sayings or language is English. Ian’ s mother just gave birth last month, so he has a little brother. I observed Ian at his home at around 3:30 pm. It was on Friday, February 26. I observed him for 30 minutes or so. I brought my sister so that he can have someone to play with. When I sat down, I observed him while he was playing with my sister....   [tags: Play, Game, Iron Man, Captain America]\n\nBetter Essays\n726 words | (2.1 pages) | Preview\n\nIan McEwan's Characters\n\n- After reading and analyzing two of Ian McEwan’s literary works, “Saturday” and “Solar”, you can tell that McEwan frequently writes about characters who lead successful lives. Although the characters in the two books are successful in the sense of profession, and money, it appears as if they both have troubled personal lives. I think that Ian McEwan might not have such an exciting and interesting personal life, so he enjoys writing about characters that do. McEwan’s use of characterization makes it clear that these characters, for the most part, are satisfied with their professional achievements, and are actually quite confident in their abilities to use the knowledge they’ve acquired over th...   [tags: Character Analysis ]\n\nPowerful Essays\n1619 words | (4.6 pages) | Preview\n\nSocial Class : Atonement By Ian Mcewan\n\n- Social Class: Atonement by Ian McEwan In the novel Atonement by Ian Mcewan an unlikely love is formed between Cecilia and Robbie. Unlikely because Robbie was the son of a servant who worked in the house that cecilia and her family owned. As strange as this love was it all came to a stand still when Briony Cecilia”s younger sistervwalks into the library and witnesses Cecilia and Robbie relating to one another in a way that Briony is just too young to understand. As her curiosity festers she comes to the conclusion that Robbie had raped Cecilia....   [tags: Working class, Sociology, Social class]\n\nBetter Essays\n1043 words | (3 pages) | Preview\n\nThe Quest for Atonement in Ian McEwan's Atonement\n\n- Ian McEwan illustrates a profound theme that builds details throughout the novel Atonement, the use of guilt and the quest for atonement are used with in the novel to convey the central dynamic aspect in the novel. McEwan constructs the emotion of guilt that is explored through the main character, Briony Tallis. The transition of child and entering the adult world, focus on the behavior and motivation of the young narrator Briony. Briony writes passages that entail her attempt to wash away her guilt as well find forgiveness for her sins....   [tags: guilt, purity, immature]\n\nPowerful Essays\n1526 words | (4.4 pages) | Preview\n\nAnalysis Of Ian Mcewan 's ' Atonement '\n\n- The beauty of life lies in its balance between success, happiness, misfortune, and one’s ability to rise from failures. Life naturally generates enjoyable, significant moments in which we tend to embrace and treasure. It is often desirable and convenient, however, to avoid facing the hardships brought upon us in life because accepting or persevering through such challenges can mark change and rude awakenings. In particular, the transition into adulthood often involves traumatic or distressing experiences similar to the ones that the protagonists Robbie Turner and Briony Tallis face in Atonement....   [tags: Psychological trauma, Abuse, Bullying]\n\nBetter Essays\n1229 words | (3.5 pages) | Preview\n\nStranger Than Fiction, By Ian Mcewan\n\n- In Ian McEwan’s Saturday and Marc Forster’s Stranger than Fiction, the protagonists ' lives are nothing extraordinary. Henry Perowne is a neurosurgeon and Harold Crick is a tax auditor. They exist in a world not too different than the audience and live relatively mundane lives. It is only when the synthetic aspect of each of their character is used that the narrative can really begin. This aspect often plays a background role to the mimetic and thematic parts of characters, which are more interesting to the audience as they help trigger catharsis within the narrative....   [tags: Novel, Protagonist, Character, Narrator]\n\nStrong Essays\n1394 words | (4 pages) | Preview\n\nHelping Others: Ian in \"Shattered\" by Eric Walters\n\n- “I looked anxiously. I didn’t see anybody… I’d keep my head up and my eyes open-`You got a smoke to spare?’” (Walters 3) In Shattered, Eric Walters hauls the reader through the life of Ian, the protagonist who experiences the joy of helping others. Throughout the white pine award novel, Ian is continually helping people around him realize that their life isn’t perfect and they ought to alter it somewhat. Furthermore, the author carefully compares the significance of family and how importance they are to everyone’s life....   [tags: Shattered, Eric Walters, compassion,]\n\nBetter Essays\n592 words | (1.7 pages) | Preview\n\nDolly and the New Age of Cloning\n\n- Dolly and the New Age of Cloning The concept of cloning is not new. Organisms ranging from microbes (for example bacteria) and animals (such as aphids and even certain species of shrimp and snails) have practiced asexual reproduction for millions of years, where the offspring are exact duplicates of the parents. It is also not uncommon to encounter identical twins among the more complex life forms like mammals. Twins are in essence clones as they share the same genetic blueprint. What then is so significant about Dolly....   [tags: Genetic Engineering Essays]\n\nFree Essays\n625 words | (1.8 pages) | Preview\n\nThe Comfort of Strangers by Ian McEwan\n\n- Review of The comfort of strangers by Ian McEwan ================================================== This is a very interesting book by McEwan as well as being rather confusing. The name ‘the comfort of strangers’ fits the storyline perfectly. This is a very mysterious book in which the two of the main characters Caroline and Roger are slowly tightening the noose on the necks of the other two main characters Mary and Colin. I think the book fits into the mystery genre as far as the writing of the author goes and I found that some parts of the book reminded me of ‘Enduring Love’....   [tags: English Literature]\n\nFree Essays\n608 words | (1.7 pages) | Preview\n\nSummary of an Ian Parker Article\n\n- In the article \"Obedience\", Ian Parker points out that the Milgram Experiment was the most reviled experiment in the history of social psychology. Parker focuses on Milgram's past, as well as some of his work ethics while also focusing on both the immediate and the long-term reaction to Milgram's experiments among both the public, and Milgram's professional colleagues. Parker also has commentary from a couple Professors who commented on the work of Stanley Milgram. Parker described that Milgram was struggling to place his findings in a proper scientific context....   [tags: Psychology]\n\nFree Essays\n373 words | (1.1 pages) | Preview\n\nThe Perfect Swimmer: Ian Thorpe\n\n- The Perfect Swimmer: Ian Thorpe [IMAGE] [IMAGE] Ian Thorpe was born on 13th October 1982 in Sydney, Australia. He is a full time swimmer and has been recognised as an elite athlete in his field since he was the youngest person ever to be chosen to swim in the Australian team at age 14. He was the fastest 14-year-old swimmer in history, which makes him a good subject for this piece. His achievements to date include gold at the Commonwealth Games where he broke the Commonwealth Record, World Record at the Australian short course championships, Gold at the World Swimming Championships and three gold medals and a world record at the last Commonwealth Games in...   [tags: Papers]\n\nFree Essays\n800 words | (2.3 pages) | Preview\n\nEnduring Love by Ian McEwan\n\n- Enduring Love by Ian McEwan How important are the Appendices in the novel. The opening of a novel is vital, as it sets the foundations for the story to come. In “Enduring Love” the ending (The appendices) is just as important. The appendices are important in many aspects. Together they are a conclusion to the story, the classic ‘happy ending’ that all readers desire. Thus without them the novel would not conform to McEwan cyclic structure. Starting and ending with love that is endured or love that is enduring....   [tags: Papers]\n\nGood Essays\n1110 words | (3.2 pages) | Preview\n\nThe Media Of Moral Panics By Ian Marsh And Gaynor Melville\n\n- Introduction The media is a source that is integral to most societies around the world. It has the power to shape our every day lives and even facilitate social change, though this is not necessarily a positive thing. The media is well known for the use of hyperbole which can often have detrimental effects on people within society as this can cause moral panics. A moral panic is when a group of people or a particular act committed by a group of people is labelled as a problem that is threatening to the morals of society, \"it is an exaggerated response to a type of behaviour that is seen as a social problem – the term indicates an over-reaction on the part of the media and/or other social in...   [tags: Sociology, Social issues, Folk devil, Morality]\n\nBetter Essays\n995 words | (2.8 pages) | Preview\n\nIan Mcewan 's The On The Fragile Equilibrium Of Human Existence\n\n- Alongside a plot that deals with a series of unhappy events, Ian McEwan’s Atonement explores the concept of reality in the fragile equilibrium of human existence. McEwan’s mastery of narration helps to shape his reader’s comprehension that reality is subjective. McEwan’s employment of shifting focalization and presentation of a single event approached from several character perspectives and use of both third and first person narration all contribute to this conclusion. The first three parts of Atonement are written in third person limited omniscient narration....   [tags: Novel, Fiction, Atonement, Grammatical person]\n\nBetter Essays\n1202 words | (3.4 pages) | Preview\n\nThe Natural History of the Galapagos Written by Ian Thornton\n\n- The theory of evolution is a very interesting, but also a bit of a controversial topic. The Merriam Webster dictionary defines evolution as “a theory that the differences between modern plants and animals are because of changes that happened by a natural process over a very long time.” Even though many people would and have disagreed with this following statement, the theory of evolution as of now is the best the best way of explaining why people and the animals which are, are on earth today. Like all scientific discoveries the theory of evolution had to be discovered by someone, and this someone’s name was Charles Darwin....   [tags: theory of evolution, darwing, biology]\n\nStrong Essays\n1140 words | (3.3 pages) | Preview\n\nBecoming an Individual in Rewriting the Soul by Ian Hacking\n\n- ... This concept he names the “looping effect of human kinds”(21), which is explained with the MPD example being that “the doctors’ vision was different because the patients were different; but the patients were different because the doctors’ expectations were different”(21). The doctors influence the patients only to be later influenced in return by the patients thus there will never be a concrete definition of MPD nor will there be a fixed prototype of the disorder as both are being constantly mutually altered....   [tags: human, personality, influences]\n\nPowerful Essays\n1385 words | (4 pages) | Preview\n\nAnalysis Of Ian Mcewan 's ' Much Of Atonement '\n\n- The role of Narration in Ian McEwan’s Atonement Much of Atonement is written in third person limited omniscient narration. Although the narrative voice is consistent throughout the first two sections of the novel, the focalization of this narration shifts between the characters and the reader is provided with varying perspectives of the story world. The effect of this is that the reader is guided through the text by a homogeneous voice, but we are able to better grasp the differing frames of reference through which each character experiences the plot, this is essential to McEwan’s exploration of versions of reality....   [tags: Narrator, Narrative, Novel]\n\nBetter Essays\n1063 words | (3 pages) | Preview\n\nThe Theory Of Moral Development By Ian Stuart Hamilton\n\n- Article Critique The article that I have chosen to critique is written by Ian Stuart-Hamilton, and discusses how our society develops its beliefs of right and wrong. To accompany this discussion on moral development, Hamilton has chosen to relate his article to the theory of moral development that was proposed by Lawrence Kohlberg. This article was not developed by primary research, and instead draws conclusions from secondary research and the theories of well known authors to figure out how our society builds morals....   [tags: Morality, Religion, Jean Piaget, Ethics]\n\nBetter Essays\n1270 words | (3.6 pages) | Preview\n\nAnalysis Of Ian Fleming 's ' Casino Royale '\n\n- Ian Fleming published his first novel, Casino Royale, in 1953. Later on, in 2006 a film was made based on the novel. Fleming published his novel pertaining a man, James Bond, who is a British secret agent and is licensed to kill. Bond is told to gamble with Le Chiffre, who is a member of the Russian secret service. James Bond is assigned a female partner, Vesper Lynd, who is actually a double agent for Russia and Great Britain. Throughout Casino Royale, James Bond is brought to the readers as very hard and insensitive....   [tags: James Bond, Casino Royale, Casino Royale]\n\nBetter Essays\n1030 words | (2.9 pages) | Preview\n\nAnalysis : Dog Whistle Politics By Ian Hanley Lopez\n\n- After reading Dog Whistle Politics by Ian-Hanley Lopez, I became disgusted. I was in some disbelief that there were such a thing as dog whistling and how politicians use it to get votes. Most of this dog whistling tactics involves racial discrimination. So I decided to do some research to see if any of the current Presidential Candidates of 2016 fell into this category. I looked at all the Republican, since Lopez’s book revolved around the GOP in using these distasteful tactics. I looked at all of the Republican Candidates polices and statements that were stated in debates, speeches, interviews, and social media sites....   [tags: United States, Immigration to the United States]\n\nBetter Essays\n1217 words | (3.5 pages) | Preview\n\nThe Squash Games By James Joyce, Ian Mcewan\n\n- Very few novels occur over a single day, with the notable exceptions of Ulysses by James Joyce, and Ian McEwan’s Saturday. When using this as a device, every detail of the story must serve a specific purpose, thematically or otherwise. An example might include using a character or event to represent a recurring theme. McEwan, in particular, enjoys exploring how the public affects the personal, as seen in his article “Beyond Belief”. Throughout, he constantly refers to his personal reaction; sitting “hungrily, ghoulishly” in front of the television “in a state of sickened wonderment” (“Beyond Belief”)....   [tags: Iraq War, 2003 invasion of Iraq, Iraq, Novel]\n\nStrong Essays\n1180 words | (3.4 pages) | Preview\n\nJapanese Hip Hop Performance By Ian Condry\n\n- Ian Condry’s engaging and intimate ethnography of Japanese hip-hop performance is both a vivid portrait of a local scene and a subtle analysis of how media forms circulate among such locales in the process of cultural globalization. With a focus on place and performativity, Condry’s take on hip-hop’s globalization in performative genba (Japanese for “actual places”) is an attempt at a new methodological approach to this process. Throughout the book, the author’s conceptual development is enlivened and “kept real” by evocative fieldwork references and a wealth of translated lyrics....   [tags: Culture, Globalization, Popular culture, Hip hop]\n\nBetter Essays\n981 words | (2.8 pages) | Preview\n\nWhen Science Meets Religion By Ian Barbour\n\n- When Science meets religion by Ian Barbour, in chapter one Barbour introduces four main typologies describing them as the “Four views of Science and Religion” (Barbour 7) summarized as: Conflict, Independence, Dialogue, and Integration. These views are then explained featuring different viewpoints changing them drastically. Conflict in chapter 1 is the viewpoint that I identified with the most due to Barbour’s explanation through Scientific materialism. Scientific materialism made the point that the scientific method is the only true path disproving most of religions foot hold on society such as church and state....   [tags: Scientific method, Science, Theory]\n\nBetter Essays\n1039 words | (3 pages) | Preview\n\nAtonement by Ian McEwan\n\n- \"Atonement\" by Ian McEwan Atonement comes from an \"at onement\", the idea being that penance and suffering allows us to be \"at one\" with God or ourselves. The central theme of atonement is that of seeking forgiveness. This is manifested through the characters and their actions. In the book \"Atonement\" by Ian McEwan, the act carried out by Briony sets of a chain of events, for which either atonement is sought or society seeks atonement from. Briony's character is described as being compulsively orderly, \"She was one of those children possessed by a desire to have the world just so.\" Briony's craving to manipulate and control, and also her perception of how Robbie spoilt her play, leads her...   [tags: English Literature]\n\nBetter Essays\n787 words | (2.2 pages) | Preview\n\nMedia Analysis on Australian Identity\n\n- The concept of Australian identity has changed over the course of history especially since the domination of media representation in contemporary society. From the image of a bushman to a larrikin, the identity of an Australian male evolves as the society develops, but the essential core of the Australianness remains largely on the concept of masculinity and mateship. Most of the sportsmen are considered to be the representation of the larrikins, who did not adhere to polite social conventions or rules and act rough around the edges (Hogg class lecture)....   [tags: Ian Thorpe, Athleticism]\n\nStrong Essays\n1017 words | (2.9 pages) | Preview\n\nSensible Violence Within Cultural Texts\n\n- ... That earlier in the short story had allowed him to justify selfishly keeping the vial for himself, in his remorse, which is solidified in killing himself. For the reader, this evokes sympathy toward his character, as the blame for his actions is passed on to the hair's evil magic. Out of this emerges a theme of individualism versus collectivism; the first side of Hashim is individualism, as he \"sought to inculcate… a healthy independence of spirit\" in his children. In addition, he presents himself to be \"not a godly man\", but rather as a man who lives honorably, which could arguably be more righteous than the crazed religious driven man he transformed into....   [tags: Ian Almond, Salman Rushdie]\n\nStrong Essays\n1307 words | (3.7 pages) | Preview\n\nJames Wodd's How Fiction Works and Ian McEwan's Atonement\n\n- James Wood in his book, How Fiction Works, analyzes various essential elements of fiction. Most fascinating of which, is his critique of “Character” and “Sympathy and Complexity”. These two chapters are perfectly exemplified in Ian McEwan’s novel Atonement. The novel demonstrates what Wood calls Sympathetic Identification. When a reader is able to create an emotional connection to particular characters. Author Ian McEwan uses free indirect style to evoke sympathetic identification with characters....   [tags: Novels, Literary Analysis, Comparisons]\n\nStrong Essays\n1427 words | (4.1 pages) | Preview\n\nAnalysis Of Ian Brown 's ' His Son, Walker, And About Genetic Manipulation\n\n- “Who had the right to decide which life is worth living?” (Brown, paragraph 1) Ian Brown writes this in his essay about his son, Walker, and about genetic manipulation. I agree with his argument and I find that the essay is well constructed. Brown developed his argument by creating an essay by including many points that are well backed up, the point of views of different professionals, and by adding some personal experiences and quotes. He successfully displayed his argument and prove his points....   [tags: DNA, Genetic engineering, James D. Watson]\n\nBetter Essays\n871 words | (2.5 pages) | Preview\n\nTopics Covered by Ian Frazier, Leslie Silko, and Gore Vidal\n\n- ... Well his article demonstrates that not all people are mean and that even the effort to help someone you don’t know can really be appreciated. This topic I have heard on the news many of times before how people who take the time to help someone they don’t know and just so happened to save that person’s life. We don’t recognize these people enough, but Ian Frazier does, he thanks them and shows how appreciative the woman must’ve felt. I think the students next year should read this article as I did, it is a heartwarming thing to know that there are people who will do random acts of kindness, and it also opened my eyes and made me realize that you don’t even have to do much but just try to...   [tags: herois, weapon, drugs, legal]\n\nStrong Essays\n873 words | (2.5 pages) | Preview\n\nThe Article ' Etiquette : Reintroducing Real- Life And A Smartphone Obsessed Society `` By Ian Brown\n\n- In the article,” Etiquette: Reintroducing real- life to a smartphone-obsessed society”, the author Ian Brown from the Globe and Mail has developed a number of valid arguments on how technology negatively influences society. In particular, he focuses how smart phones have negatively affected individuals’ day-to-day lives. He develops his thoughtful and well-structured arguments through the usage cause and effect, compare and contrast and lastly, examples. Ian Brown uses cause and affect in his article; this helped prove his point....   [tags: Mobile phone, Smartphone]\n\nBetter Essays\n954 words | (2.7 pages) | Preview\n\nIssues Regarding Animal Experimentation and Cloning\n\n- Introduction Animals may be used for experimentation to gain knowledge about human diseases and knowledge on how to cure them. Animals like mice and rats share physiological and generic similarities with humans. Animal experimentstion is helpful for elaborating medical science. In the past years, scientists have been discovering how to clone animals. They tried their best to make this possible, but failed to do so. Until in the year 1996, Ian Wilmut, an English embryologist, together with Keith Campbell, cloned a sheep which was named Dolly....   [tags: DNA cloning, dolly, transgenic]\n\nTerm Papers\n2029 words | (5.8 pages) | Preview\n\nGenetic Engineering: Cloning: Dolly and Eugenics\n\n- Cloning is vital in American society because it will help us further our knowledge in genetics. Also cloning will make us realize how much scientists can actually accomplish knowing how to clone. Scientists were able to clone an animal in 1997. That accomplishment made all the scientist’s theories about cloning possible. It gave the scientists hope that one day they will maybe be able to clone a human because they were able to clone a mammal. Eugenics is also vital to American society. Eugenics is the practice of improving human’s genetic quality of the human population as a whole....   [tags: dna, science, god]\n\nPowerful Essays\n1691 words | (4.8 pages) | Preview\n\nAnalysis Of The Poem ' The Daughters Of The Late Colonel ' By Katherine Mansfield And Atonement By Ian Mcewan\n\n- The Passage of Time The use of the passage of time in both “The Daughters of the Late Colonel” by Katherine Mansfield and Atonement by Ian McEwan, is not typical of the everyday story. The length of these two pieces contributes to their difference in the usage of manipulating time. “The Daughters of the Late Colonel” being a short story, has less to work with, and the plot line of the story is quite skewed. With a much smaller breadth, it has more of the beginning, middle, end feeling, of a typical story....   [tags: Time, Future, Narrative, Fiction]\n\nBetter Essays\n1532 words | (4.4 pages) | Preview\n\nCensorship : What Technology Can And Can Not Do For Us By Ian Bremmer\n\n- In the 21st century, we have been so wrapped up in our own little world that we don’t see what is happening other than our telephone screens. We don’t see or refuse to see the harm that is happening around the world. In “Fences of Enclosure, Windows of Possibility by Naomi Klein”, she explains how there are fences around public resources, making the life of low class people much harder than it needs to be. While in “Democracy in Cyberspace: What technology Can and Cannot Do for Us by Ian Bremmer”, how the internet has given power to the people that are voiceless but has caused harm in our society....   [tags: Poverty, World Bank, Wealth]\n\nStrong Essays\n1441 words | (4.1 pages) | Preview\n\nAnalysis : ' Super Spit ' By Ian Hardy, Jack Memmer, And Sarah Sewell\n\n- SUPER SPIT By: Ian Hardy, Jack Memmer, and Sarah Sewell In our theorized experiment, we strived to insert the toxin-producing genes of a snake into the human genome. The primary purpose of the experiment was to create a real-life super power in humans for everyday use. We targeted the PLA2 gene in the genome of the king cobra and decided that it would be of best fit to our experiment. We plan to inject the gene into the genome of a human embryo where it would be expressed and produced into the salivary glands alongside saliva....   [tags: DNA, Gene, Genetics, Genome]\n\nStrong Essays\n1292 words | (3.7 pages) | Preview\n\nThemes in History As Discussed by Niall Ferguson, Ian Morris, and David Landes\n\n- In 1671, Thomas Hobbes described the natural state of mankind before organized government as “solitary, poor, nasty, brutish and short”. He described a world where “every man was enemy to every man” and a constant state of fear existed whereby it would be impossible for civilization as known in his time to exist . The three authors subject of this short study; Niall Ferguson, Ian Morris, and David Landes in their works: “Civilization”, “Why the West Rules-For Now” and “The Wealth and Poverty of Nations” respectively, attempt to understand how and why our ancestors were able to adapt and came to dominate their environments and the original natural, geographical and physical constraints and...   [tags: civilization, wealth of nations, poverty]\n\nStrong Essays\n1331 words | (3.8 pages) | Preview\n\nWhat does a Martian Look Like by Jack Cohen and Ian Stewart\n\n- ET: Who wore it better. We’ve all heard, seen or read about those Sci fi stories about communicating with the aliens. Depicted more realistic than others, the aliens range in appearance from dangerous reptilian like monsters like in Aliens to cute little talking and walking teddy bears like in Star Wars. The aliens in these stories most of the time take over our planet and threaten human existence, while few depict very opposite storylines containing peace. In “What does a Martian Look like” by Jack Cohen and Ian Stewart, the authors try to achieve a more realistic viewpoint on alien life and to un-Hollywood-ize the prospect of other life in our universe....   [tags: aliens, appearance, science fiction]\n\nPowerful Essays\n1707 words | (4.9 pages) | Preview\n\nMotives Behind the Moors' Murders Ian Brady and Myra Hindley\n\n- What conclusions do these arguments lead to. Was Brady’s childhood an adequate factor. I found that Garavelli and Stanford’s investigation were the best sources. I based this judgement on reliability and the context of these sources. Although, Harrison provides a non-judgemental approach; his investigation was relatively new. His investigation does not have the benefit of hindsight, therefore he was not able to use a greater range of evidence to strengthen his argument. Whereas, Garavelli and Stanford had decades to improve their analyses with new evidence that came to light....   [tags: victims, psychopath, trial]\n\nBetter Essays\n1714 words | (4.9 pages) | Preview\n\nThe Pros and Cons of Cloning\n\n- Introduction The idea of cloning has been around for a while, but the thought of it becoming a reality is surprisingly new. Cloning has been all over the papers and the news lately, mostly caused by the death of possibly the world’s most famous animal behind Lassie, Ian Wilmut’s cloned sheep, Dolly. In 1880, a man named Walter Sutton made one of the most important discoveries towards cloning- he proved that chromosomes hold genetic information. This discovery allowed us to get to where we are in the world of cloning today....   [tags: Pro Con Essays]\n\nFree Essays\n559 words | (1.6 pages) | Preview\n\nExploring Ethical Codes and Possible Ethical Issues in Responding Therapy Clients through E-Mail\n\n- ... In Dr. Lyne’s case he should’ve informed his clients of the benefits and limitations of communicating via email before he decided to respond to them. I also believe that this ethical code should’ve been presented as Dr. Lyne made his email accessible to his students. Once his email became accessible he should’ve discussed perimeters of confidentiality, limitations, and risks that could occur during the therapy sessions. In Section B of the ACA code of ethics booklet, the introduction section (p....   [tags: case of Dr. R. Ian Lyne]\n\nBetter Essays\n918 words | (2.6 pages) | Preview\n\nTime is a major theme in Ian McEwan's The Child In Time.\n\n- Time is a major theme in Ian McEwan's The Child In Time. \"Time is always susceptible to human interpretation. And though time is partly a human fabrication, it is also that from which no parent or child is immune.\" Time is a major theme in Ian McEwan's 'The Child In Time'. He treats the subject irreverently, 'debunking chronology by the nonlinearity of his narrative.' - Michael Byrne. McEwan uses the setting of Stephen's dull committee as the backdrop for his daydreaming. Even Stephen's thoughts are not choronological, and his daydreams constantly flit between different times, although this could be to emphasise the overall flexibility of time....   [tags: English Literature]\n\nPowerful Essays\n2083 words | (6 pages) | Preview\n\nThe Effectiveness of Chapter One of Enduring Love by Ian McEwan\n\n- The Effectiveness of Chapter One of Enduring Love by Ian McEwan In a novel the opening chapter has to be effective in order to keep the reader interested and to keep them reading on until the very end. In the Novel 'Enduring Love', Ian McEwan, the author, evidently aimed to write an opening chapter that grasped the reader's attention from the outset of the novel, throwing them into the deep end of the story and into the thick of the action. In my opinion he has achieved in doing this....   [tags: Papers]\n\nGood Essays\n648 words | (1.9 pages) | Preview\n\nBook Review of The Internet Incident by Ian Probert\n\n- Book Review of The Internet Incident by Ian Probert Works Cited Missing The book \"Internet incident\", by Ian Probert, is a great book. It is an in-depth, fast-paced novel about computer hacking. If you're into that sort of thing, then you'll love this book. The main character in the book was at the home of his friend, Karl. Karl shows the boy (who remained unnamed throughout the book) the Internet. The boy was fascinated. However, the boy's interest was defeated when he found out that the man was spying....   [tags: Papers]\n\nGood Essays\n1077 words | (3.1 pages) | Preview\n\nHooking the Reader in Ian McEwan's Enduring Love\n\n- \"The beginning is simple to mark\". This is the opening sentence of Ian McEwan's novel \"Enduring Love\", and in this first sentence, the reader is unwittingly drawn into the novel. An introduction like this poses the question, the beginning of what. Gaining the readers curiosity and forcing them to read on. The very word \"beginning\" allows us an insight into the importance of this event, for the narrator must have analysed it many a time in order to find the moment in which it all began, and so it is obviously significant period of his life....   [tags: Literature Analysis McEwan]\n\nStrong Essays\n988 words | (2.8 pages) | Preview\n\nCloning is Ethical and Necessary\n\n- Cloning is a subject which many people do not agree upon. Scientists think cloning should be allowed because it can lead to great things. On the other hand, those who are more religious argue that cloning should not be allowed because it violates the Bible and God’s plan. Though cloning may be seen as a violation of human and religious rights, cloning should be allowed because it can be very beneficial to humans, whether it would be through bringing a loved one back or helping lead to a medical breakthrough....   [tags: pro cloning essays]\n\nBetter Essays\n944 words | (2.7 pages) | Preview\n\nDoes Human Cloning Produce An Embryo?\n\n- Does Human Cloning Produce An Embryo. In February 1997, Dr. Ian Wilmut and his team startled the scientific world by showing that the nucleus from an adult sheep's body cell could be used to produce a developing embryo that would grow into another, genetically identical sheep. There was no doubt whatever that this process (\"somatic cell nuclear transfer\") produces an embryo of the relevant species. As Dr. Wilmut said in his groundbreaking article: \"The majority of reconstructed embryos were cultured in ligated oviducts of sheep......   [tags: Argumentative Persuasive Topics]\n\nFree Essays\n872 words | (2.5 pages) | Preview\n\nCloning: Many Questions and Few Answers\n\n- Cloning: Many Questions and Few Answers The birth of Dolly was announced by Ian Wilmut's team from Roslin Institute in February 1997. There is actually nothing radically new in the way Dolly was made, since lower vertebrates, such as frogs, had been cloned in 1968 by John Gurdon of Cambridge University. The term 'clone' originates from the Greek word 'klwn', meaning 'twig', because whenever we divide an overgrown shrub or successfully cultivate a houseplant cutting, cloning has occurred. Nuclear transfer technology was used in which a donor's udder cell, a nucleus with the genome intact, was fused with an unfertilised egg cell....   [tags: Cloning Essays]\n\nFree Essays\n369 words | (1.1 pages) | Preview\n\nSchizophrenia: Its Aetiology\n\n- Schizophrenia: its Aetiology Lesley Stevens and Ian Rodin justified the need of acquisition to the mental disorders’ aetiology in their book “Psychiatry”. They pointed out the fact that psychiatrists need to be familiar with the contribution of a particular disorder in order to make a more confident in the diagnosis. Knowing the aetiology of psychotic disorder is as important as the diagnosis. For the simple reason that psychotic disorders do not have particular tests that can be made for diagnosis; on the contrary, physical illnesses do....   [tags: Psychiatry, Lesley Stevens, Ian Rodin]\n\nBetter Essays\n978 words | (2.8 pages) | Preview\n\nCloning, Lets Do It\n\n- Imagine if a new procedure were developed that could lead not only to a cure for cancer, but would provide an unlimited source of organ donors and could lead to the first effective treatment of nerve damage. Now adding to this scenario, imagine our government was taking action to ban this new procedure because of a few myths and exaggerations. This scenario is true and is taking place with human cloning at this very moment. If action is not taken, this crowning achievement of medical science could be lost forever....   [tags: essays research papers fc]\n\nStrong Essays\n1933 words | (5.5 pages) | Preview\n\nBio-ethics and Cloning\n\n- Bio-ethics and Cloning The idea that humans might someday be cloned-created from a single somatic cell without sexual reproduction-moved further away from science fiction and closer to a genuine scientific possibility on February 23, 1997. On that date, The Observer broke the news that Ian Wilmut and his colleagues at the Roslin Institute announced the successful cloning of a sheep by a new technique that had never before been fully successful in mammals. The scientists from Roslin Institute of Edinburgh isolated differentiated somatic cells of Finn Dorset sheep and fused them with unfertilized enucleated eggs....   [tags: Biology Science Genetics Essays]\n\nFree Essays\n564 words | (1.6 pages) | Preview\n\nGenetic Engineering And Genetic Enhancement\n\n- Genetic engineering versus genetic enhancement When it comes to the topic of genetic enhancement versus genetic engineering there is a debate whether which of these theories should be pursued, whereas some are convinced that genetic enhancement could help future generations in becoming smarter, faster and taller others maintain that genetic engineering can make future generations healthier. My own view however is that genetic engineering would help cure disesase and should be pursued, but genetic enhancement should not be allowed....   [tags: DNA, Gene, Human enhancement, Genetics]\n\nBetter Essays\n712 words | (2 pages) | Preview\n\nStory Telling: A Potent Tool In Ian McEwan's Atonement and Washington Irvin's The Legend of Sleepy Hollow\n\n- Although storytelling can be seen as a form of creative writing, the novel Atonement by Ian McEwan and the short story “The Legend of Sleepy Hollow” by Washington Irvin both suggest that storytelling serves as a means for exaggerating actual events. This is significant because the partially deceitful elements tend to mold the reader’s judgment of what really happens. In the novel Atonement by Ian McEwan, Thirteen year old Briony Tallis is gifted with the ability of words. Briony’s ability to tell stories often leaves the audience questioning whether Briony’s account of events actually took place or if they are a mere figment of her imagination....   [tags: Character Analysis, Mystery]\n\nStrong Essays\n1306 words | (3.7 pages) | Preview\n\nObedience, by Ian Parker and Review of Stanley Milgram’s Experiments on Obedience, by Diana Baumrind\n\n- Stanley Milgram, a social psychologist in 1963, conducted an experiment about human obedience that was deemed as one of the most controversial social psychology experiments ever (Blass). The original intent of the experiment was to determine if the Germans during WWII were simply obeying to authority when carrying out the Holocaust. The test subject, or teacher, would administer electric shocks to the learner, a paid actor, when he incorrectly answered the word pairings. The shocks started at 15v and went up by 15v increments up to 450v for every wrong answer....   [tags: Social Psychology, Comparison]\n\nBetter Essays\n755 words | (2.2 pages) | Preview\n\nA Dialogue Paper on Human Cloning\n\n- A Dialogue Paper on Human Cloning This dialogue is between two students at the university. Steve is a little uncomfortable about cloning, while Sally presents many valid arguments in favor of it. Steve presents many moral questions that Sally answers. Steve: Hi, Sally. Are you aware that the Scottish embryologist, Ian Wilmut, cloned a sheep from adult cells, and now, there are many moral, economic, and political questions that must be answered. Sally: Interestingly enough, I was just reading about this topic in a magazine....   [tags: Argumentative Persuasive Topics]\n\nFree Essays\n2150 words | (6.1 pages) | Preview\n\nReview of Stanley Milgram’s Experiments on Obedience, by Diana Baumrind and Obedience, by Ian Parker\n\n- Upon analyzing his experiment, Stanley Milgram, a Yale psychologist, concludes that people will drive to great lengths to obey orders given by a higher authority. The experiment, which included ordinary people delivering “shocks” to an unknown subject, has raised many questions in the psychological world. Diana Baumrind, a psychologist at the University of California and one of Milgram’s colleagues, attacks Milgram’s ethics after he completes his experiment in her review. She deems Milgram as being unethical towards the subjects he uses for testing and claims that his experiment is irrelevant to obedience....   [tags: Authority, Article Analysis]\n\nBetter Essays\n890 words | (2.5 pages) | Preview\n\nFinding Oneself in Yann Martel’s Life of Pi and Ian McEwan’s The Cement Garden\n\n- Helen Keller had many obstacles that challenge an individual’s mental and physical strengths. She was a woman both blind and deaf, but put aside her challenges that test her perseverance, leading to an ambitious life worth living for. Though these obstacles of being both blind and death would stop most from doing much in their life, it did not stop Helen, which allowed her to become a successful author and educator (“Helen Keller.”) The novels The Cement Garden by Ian McEwan and Life of Pi by Yann Martel both display the challenges in which the main characters’ resilience and determination to surpass their difficulties are tested....   [tags: Greatest Fear, Societal Norms]\n\nPowerful Essays\n1582 words | (4.5 pages) | Preview\n\nCloning Should Not Be Allowed For Medical Purposes\n\n- Today, there has been a lot of debate over whether or not scientists should clone humans and animals. Some people believe that cloning will benefit society, while others believe that it will cause detrimental effects. This paper will discuss the information collected on the issue and how it is addressed. It will introduce the history behind the practice of cloning, what things have been cloned so far, and the processes that scientists use to clone animals and humans. Also, the paper will examine the possible benefits and consequences that cloning will create in society....   [tags: Cloning, DNA, Human cloning, Gene]\n\nStrong Essays\n1745 words | (5 pages) | Preview\n\nPros and Cons of Genetic Cloning\n\n- Genetic cloning is a subject that has always been popular among scientists. The earliest breakthroughs in cloning can be dated back to over a century ago when a German biologist named Hans Driesch successfully cloned a sea urchin (Wilmut 1). Back then cloning wasn't yet a mainstream topic among the general public. But with all the technological advancements made over the years more astounding breakthroughs have been made possible. This has now sparked a huge debate, not only among scientists, but among governments and the public as well....   [tags: Genetic Engineering]\n\nBetter Essays\n1007 words | (2.9 pages) | Preview\n\nThe Inevitability of Animal Testing\n\n- What is an animal tested product. Is it a medicine. Or is it a cosmetic?Some people might think animal tested products as complicated stuffs. In fact, animal tested products are easily found around our lives. As animal testing is available in many uses, it has a long history and has been controversial for many years. Those who insist on abolition of experiments for animals argue that alternatives for animal testing exist. In addition, the protesters think that human’s anatomy and that of an animal are very different.Therefore, they argue that applying test results from animal testing is meaningless....   [tags: medicine-cosmetic industry labs, research]\n\nBetter Essays\n1066 words | (3 pages) | Preview\n\n\nYour search returned over 400 essays for \"ian wilmut\"\n1  2  3  4  5    Next >>", "pred_label": "__label__1", "pred_score_pos": 0.9889330863952637} {"content": "Home Page\n\n\n\n\nWhat came first, the chicken or the egg?\n\n\nWhat came first ?\n\n\nCan you answer this time old question , as we set off on our journey through EVOLUTION. \n\nThe questions we are investigating are :\n\n\n1. Who is Charles Darwin and why is he so famous ?\n\n2. Can fish really fly ?\n\n3. Which birds beak is the best?\n\n4. What do we know about evolution ? \n\n5. Are we fit to survive ?\n\n6. Are we human , animal or bird ?\n\n\n\n\n  We will be fine tuning our comprehension skills and developing our understanding of why authors use a variation of persuasive devices in their writing . Our class read will be The Watertower, will Bubba find his pants.....?\n\nAs SATs are fast approaching we will be consolidating all those gaps in our grammar, learning and making sure we are familiar with those tricky spelling rules .\n\n\nReasoning questions will be the main focus of this half term, we will learn to ANNOTATE, ANNOTATE, ANNOTATE and make sure we follow every step (remember, some questions have up to 5 steps before you get to the answer). We will carry on with our weekly arithmetic tests , to grab those easy marks and our times table challenges. We will also look at co-ordinates , data handling , reflection , symmetry and translation .", "pred_label": "__label__1", "pred_score_pos": 0.961948037147522} {"content": "Describe and Evaluate the Psychoanalytical / Psychodynamic Approach to Personality Development Essay\n\n1643 WordsMay 16, 20137 Pages\nDescribe and Evaluate the Psychoanalytical / Psychodynamic Approach to Personality Development Psychoanalytic theory originated with the work of Sigmund Freud (Gross 2010). Through his clinical work with patients suffering from mental illness, Freud came to believe that childhood experiences and unconscious desires influenced behaviour. Based on his observations, Freud developed a theory that described development in terms of a series of psychosexual stages. According to Freud (1949), conflicts that occur during each of these stages can have a lifelong influence on personality and therefore behaviour (Hayes 2000). Within this essay I am going to delve further into these principles and evaluate their validity and reliability as an approach to personality development. As Freud developed his psychoanalytic theory, he articulated a model of the mind ‘as being constructed like an iceberg’ (Hayes 2000, page 203). He believed that the top of the iceberg (the part visible above the surface) was like the conscious mind, information that was immediately present to the psyche at any given time. The part of the iceberg immediately below the surface that could occasionally be seen from the ebb of the waves was the preconscious mind. This consisted of thoughts, ideas and memories that may have been temporarily forgotten but could easily be brought into the conscious mind when they were needed. The final submerged part of the iceberg Freud (1949) described as representing the unconscious mind; containing all kinds of disturbing and emotionally significant ideas and memories that influence the conscious and pre-conscious mind unknowingly. From his treatment of patients with severe neurosis, Freud saw the adult personality as having three basic components: the id, the ego and the super-ego. He believed these three elements work together to create the complexity of human\nOpen Document", "pred_label": "__label__1", "pred_score_pos": 0.997069239616394} {"content": "Mapping the blockchain project ecosystem\n\n Blockchain innovation, cryptocurrencies, and token sales are all the rage today. Nel 5+ years Ive been operating in the VC market, this is by and big the fastest Ive seen any location of innovation remove in regards to brand-new business( or job)development.\n\n It wasnt too long ago that vcs and creators were generally concentrated on central exchanges, business or personal blockchain options, wallets, among numerous other popular blockchain start-up concepts that controlled the marketplace from 2012 to someplace around 2016.\n\n però, as I discussed a couple of months earlier, the increase of Ethereum with its Turing-complete scripting language and the capability for designers to consist of state in each block, has actually led the way for wise agreement advancement. This has actually caused an increase of groups developing decentralized jobs looking for to make the most of the most important residential or commercial property of blockchainsthe capability to reach a shared fact that everybody settles on without intermediaries or a central authority.\n\n There are lots of interesting advancements pertaining to market both in regards to enhancing existing blockchain performance along with the customers experience. Offered the quick rate at which jobs are coming to market, io’ ve discovered it to be challenging to keep track of each and every job and where each one fits into the community.\n\n inoltre, esso ’ s simple to miss out on the forest for the trees without a thorough view of exactly what the proverbial forest appears like.\n\n As an outcome, Qui’ s a put together a list of all the decentralized blockchain-based tasks that I have actually been following, and had the ability to collect through research study, together with suggestions from good friends in the community.\n\n A fast disclaimer: While its challenging to pigeonhole a number of tasks into one classification, I did my finest to determine the primary function or worth proposal of each job and classify them. There are definitely lots of tasks that fall under the gray location and might suit several classifications. The hardest ones are thefat procedureswhich use performance in more than a few locations.\n\n Below is a summary of each more comprehensive classification Ive recognized, discussing a few of the subcategories that comprise them:\n\n\n For the a lot of part, these tasks were developed with the objective of constructing a much better currency for different usage cases and represent either a shop of worth, circulating medium, or a system ofaccount.\n\n While Bitcoin was the very first and is the most popular jobin the classification, a number of the other tasks set out to surpass a specific element of Bitcoins procedure or customize it to a particular usage case.\n\n The Privacy subcategory might most likely fall under either the Payments or Base Layer Protocols classifications, however I chose to break them out independently offered how essential confidential, untraceable cryptocurrencies (specifically Monero and ZCash)are for users who want to hide a deal since they choose not to transmit a specific purchase for one factor or another, or for business who weart wish to expose trade tricks.\n\n Developer Tools\n\n “https://tctechcrunch2011.files.wordpress.com/2017/10/devtools.png?w=278&h=1139″alt =””width =”278″height=” 1139″ srcset=”https://tctechcrunch2011.files.wordpress.com/2017/10/devtools.png?w=278&h=1139″278w, https://tctechcrunch2011.files.wordpress.com/2017/10/devtools.png?w=”73 &h=300″73w, https://tctechcrunch2011.files.wordpress.com/2017/10/devtools.png 432wsizes=”(larghezza massima:”278px)100vw, 278px”/>&\n\n Projects within this classification are mainly utilized by designers as the foundation for decentralized applications. In order to permit users to straight communicate with procedures through application user interfaces(for usage cases besides monetary ones), a lot of the present styles that lie here have to be shown out at scale.\n\n Protocol creates around scaling and interoperability are active locations of research study that will be necessary parts of the Web3 advancement stack.\n\n In my viewpoint, this is among the more fascinating classifications at the minute from both an intellectual interest and a financial investment perspective.\n\n In order for much of the blockchain usage cases weve been assured to come to fulfillment such as totally decentralized self-governing companies or a Facebook option where users have control of theirown information, fundamental, scalable facilities has to develop and grow .\n\n Many of these tasks focus on doing simply that.\n\n inoltre, these jobs aren ’ t in awinner take alllocation in the exact same method that state a cryptocurrency may be as a shop of worth.\n\n Per esempio, constructing a decentralized information market might need a variety of Developer Tools subcategories such as Ethereum for wise agreements, Truebit for faster calculation, NuCypher for proxy re-encryption, ZeppelinOS for security, e Mattereum for legal agreement execution to guarantee security when it comes to a disagreement.\n\n Because these are procedures and not centralized information silos, they can talk with one another, and this interoperability makes it possible for brand-new usage cases to emerge through the sharing of information and performance from several procedures in a single application.\n\n Preethi Kasireddy does a fantastic task of describing this vibrant Qui .\n\n\n This classification is relatively simple. Quando tu ’ re engaging with a variety of various procedures andapplications(such as in the Developer Tools example above ), numerous might have their own native cryptocurrency, and hence a variety of brand-new economies emerge.\n\n In any economy with several currencies, Là ’ s a requirement for tools for exchanging one system of currency for another, assisting in financing, accepting financial investment, and so on\n\n The Decentralized Exchanges(DEX)subcategory might perhaps have actually been classified as Developer Tools.\n\n Many tasks are currently beginning to incorporate the 0x procedure and I expect this pattern to continue in the future. In a world with the capacity for an outrageous variety of tokens, extensive adoption of applications utilizing a number of tokens will just be possible if the intricacy of utilizing them is abstracted awayan advantage offered by decentralized exchanges.\n\n Both the Lending and Insurance subcategories take advantage of economies of scale through threat aggregation.\n\n By opening these markets and enabling individuals to now be priced in bigger swimming pools or on a separated, private basis(depending upon their danger profile), expenses can reduce and for that reason customers must in theory win .\n\n Blockchains are both immutable and stateful so due to the fact that previous interactions are kept on chain, users can be positive that the information that comprises their private history hasnt been damaged.\n\n\n As the group at Blockstack explains in their white paper:\n\n Over the last years, noi ’ ve seen a shift from desktop apps(that run in your area)to cloud-based apps that keep user information on remote servers. These central services are a prime target for hackers and regularly get hacked. ”\n\n Sovereignty is another location that I discover most fascinating at the minute.\n\n While blockchains still struggle with scalability and efficiency concerns, the worth supplied by their trustless architecture can supersede efficiency problems when handling delicate information; the safekeeping which were required to count on 3rd parties for today.\n\n Through cryptoeconomics, users weart have to rely on any private or company however rather in the theory that human beings will act reasonably when properly incentivized .\n\n The tasks in this classification offer the performance required for a world where users arent required to rely on any private or company however rather in the rewards executed through cryptography and economics.\n\n Value Exchange\n\n An essential style of the Bitcoin procedure is the capability to have trust among numerous various celebrations, regardless of there being no relationship or trust in between those celebrations beyond the blockchain. Deals can be developed and information shared by numerous celebrations in an immutable style.\n\n esso ’ s extensively thought about reality that individuals start to arrange into companies when the expense of collaborating production through a market is higher than within a company separately.\n\n But exactly what if individuals could arrange into this proverbialcompanywithout needing to rely on one another?\n\n Through cryptoeconomics and blockchains, the time and intricacy of establishing trust is abstracted away, which permits a great deal individuals to share and team up in the earnings of such cooperationwithout a hierarchical structure of a conventional company .\n\n Oggi, intermediaries and lease candidates are an essential evil in order to keep order, preserve security, and implement the guidelinesof P2P markets. In numerous locations, these cryptoeconomic systems can change that trust, and cutting out intermediaries and their charges will permit users to exchange items and services at a considerably lower expense.\n\n The jobs in the subcategories can be broken down into 2 primary groups: non-fungible and fungible. Markets that permit users to exchange products and services that are fungible will commoditize things like storage, calculation, web connection, bandwidth, energy, and so on. Business that offer these items today contend on economies of scale which can just be displaced by much better economies of scale.\n\n By opening hidden supply and permitting anybody to sign up with the network(which will end up being simpler through tasks like 1Protocol ) this not ends up being a complicated job, when again collapsing margins to no.\n\n Non-fungible markets weart have the exact same advantages although they still permit service providers to make exactly what their great or service is in fact worth instead of exactly what the intermediaries believes its worth after they take their cut.\n\n Shared Data\n\n One method to consider the shared information layer design is to take a look at the airline company markets Global Distribution Systems(GDS ’ S). GDSs are a central information storage facility where all the airline companies press their stock information in order to finest coordinate all fill out, consisting of paths and rates.\n\n This permits aggregators like Kayak and other business in the area to displace conventional travel representatives by developing a front end on top of these systems that users can negotiate on.\n\n Typically, markets that have actually been most appealing for intermediary aggregators are those where there is a considerable barrier to entry in completing straight, however where technological advances have actually developed a driver for an intermediary to aggregate incumbents, associated metadata, and customer choices(as held true with GDS ’ S).\n\n Through monetary rewards supplied by blockchain based jobs, noi ’ re experiencing the single most impactful technological driver which will open various markets, other than the worth not will accumulate to the aggregator however rather to the people and business that are supplying theinformation.\n\n In 2015, Hunter Walk composed that a person of the greatest missed out on chances of the last years was eBays failure to open their track record system to 3rd parties which wouldve put them at the center of P2P commerce.\n\n I ’d even take this an action even more and argue that eBays single most important property is credibility information which is developed over extended periods of time, requiring user lock-in and approving eBay the power to impose high taxes on its usersfor the assurance that they are negotiating with great stars. In shared information blockchain procedures, users can take these kinds of datasets with them as other applications hook into shared information procedures, decreasing barriers to entry; increasing competitors and as an outcome eventually increasing the rate of development.\n\n The other method to consider shared information procedures can be finest explained utilizing a central business, such as Premise Data , as an example. Property Data releases network factors who gather information from 30+ nations on whatever from particular food/beverage usage to products utilized in a particular location.\n\n The business utilizes maker discovering how to draw out insights and after that offers these datasets to a series of consumers. Instead of finding and employing individuals to gather these datasets, a job might be begun that permits anybody to gather and share this information, annotate the information, and develop various designs to draw out insights from the information .\n\n Contributors might make tokens which would increase in worth as business utilize the tokens to buy the networks datasets and insights. In theory, the outcome would be more factors and greater quality datasets as the marketplace sets the going rate for info and compensates individuals appropriately relativeto their contribution.\n\n There are lots of comparable possibilities as theopen information platformhas actually been a popularstart-up concept for a couple of years now with numerous business discovering fantastic success with the design. The obstacle I anticipate will remain in sales and company advancement.\n\n Most of these business offer their dataset to bigger companies and it will be fascinating to see how decentralized tasks disperse theirs in the future. There are likewise chances that werent successful or formerly possible as a standalone, personal company to pursue, considered that the economics weart work for a personal business.\n\n\n Ultimately, cryptocurrencies are simply digital possessions belonging to a particular blockchain and&tasks in this classification are utilizing these digital possessions to represent either real life products(like reasonable&tickets )or information.\n\n The immutability of public blockchains enables network individuals to be positive in that the information composed to them hasnt been damaged or altered in any method which it will be available and readily available far into the future .\n\n Hence why, for delicate information or markets for items which have actually generally been swarming with scams,it would make good sense to utilize a blockchain to guarantee the user of their stability.\n\n\n While theres a great deal of development taking place throughout all these classifications, the tasks simply getting going that Im most thrilled about are allowing the web3 advancement stack by supplying performance thats needed throughout various usage cases, sovereignty through user gain access to control of their information, along with fungible worth exchange.\n\n Given that beyond monetary speculation weve yet to see traditional cryptocurrency usage cases, facilities advancement and usage cases that are greatly remarkablefor users in either expense, personal privacy, and/or security in incredibly fragile locations(such as identity, credit report, VPNs among others)appear to be the most likely prospects to catch substantial worth.\n\n Longer-term, io ‘ m delighted about jobs allowing whole communities to take advantage of shared information and the bootstrapping of networks(non-fungible worth exchange). io ’ m rather sure there are a number of other locations that Im not looking at properly or sanctuaryt been dreamt up!\n\n As constantly if youre structure something that fits these requirement or have any remarks, concerns or points of contention, I ’d love to speak withyou.\n\n Thank you to Jesse Walden , Larry Sukernik , Brendan Bernstein , Kevin Kwok , Mike Dempsey , Julian Moncada , Jake Perlman-Garr , Angela Tran Kingyens e Mike Karnjanaprakorn for all your assistance on the marketplace map and article.\n\n disconoscimento: Compound is a financier in Blockstack and 2 other jobs discussed in this post which have actually not yet been revealed.\n\n * This short article initially appeared on Medium and has actually been republished thanks to Josh Nussbaum.\n\n Leggi di più: https://techcrunch.com/2017/10/16/mapping-the-blockchain-project-ecosystem/", "pred_label": "__label__1", "pred_score_pos": 0.8977455496788025} {"content": "Janet Yellen on Unconventional Monetary Policy\nMark Thoma's Frustration\n\nChristina Romer: Empiricists and Theorists on Federal Reserve Policy\n\nI would have put it differently--and less politely.\n\n\nThe Inflation Debate That’s Muting the Fed’s Response : Monetary policy makers are all hawks now. Even those who most emphasize the Fed’s role in fighting unemployment oppose policies that would raise inflation noticeably above the Fed’s implicit target of about 2 percent. The real division is not about the acceptable level of inflation, but about its causes, and the dispute is limiting the Fed’s aid to the economic recovery. The debate is between what I would describe as empiricists and theorists.\n\nEmpiricists... put most weight on the evidence... that the main determinants of inflation are past inflation and unemployment. Inflation rises when unemployment is below normal and falls when it is above normal. Though there is much debate about what level of unemployment is now normal, virtually no one doubts that at 9 percent, unemployment is well above it. With core inflation running at less than 1 percent, empiricists are therefore relatively unconcerned about inflation in the current environment.\n\nTheorists... assume people are highly rational in forming expectations of future inflation.... Fed actions that call its commitment to low inflation into question can cause inflation expectations to spike, leading to actual increases in prices and wages. For theorists, any rise in an indicator of expected or future inflation, like the recent boom in commodity prices, suggests that the Fed’s credibility is at risk....\n\nNow, not every monetary policy maker fits neatly into these categories. Most empiricists care about expectations of inflation and would hesitate to take extreme actions for fear that they would damage the Fed’s credibility. Some theorists oppose monetary expansion on other grounds, like the fear of setting off asset price bubbles. But the main division is between the empiricists who say “inflation is unlikely at 9 percent unemployment” and the theorists who say “inflation could bite us at any moment.”...\n\nMost monetary policy makers agree that quantitative easing can stimulate the economy.... The fight over quantitative easing is about the costs. The empiricists say the policy won’t cause inflation because the economy remains so weak. The theorists argue that a small gain in growth could come at the price of a rapid rise in inflation.... As a confirmed empiricist, I am frustrated that the two sides have been able to agree only on painfully small additional aid for a very troubled economy. For a sense of how much more useful monetary policy could be, one can look to the Great Depression....\n\nFranklin D. Roosevelt took the United States off the gold standard in April 1933, and rapid devaluation led to huge gold inflows and a large increase in the money supply. Roosevelt also made it clear that the monetary expansion would not be reversed. Expectations of deflation, which had been enormous, abated quickly. As a result, with nominal rates at zero, real interest rates (the nominal rate less expected inflation) plummeted. The first types of demand to recover were ones that were sensitive to interest rates. Automobile production, for example, jumped 42 percent from March to April in 1933. Inflation did pick up somewhat in the mid-1930s, in part because of other New Deal measures like the National Industrial Recovery Act. But the inflation was modest, and after the crushing deflation of the early 1930s, widely celebrated.\n\nTHE triumph of hawkish views on inflation means that there is no appetite today for a Roosevelt-style, inflationary monetary policy. But that doesn’t mean the Fed couldn’t be more aggressive if the empiricists were willing to risk a split with the theorists.\n\nIn a strongly worded article and speech several years ago, before he was Fed chairman, Ben S. Bernanke provided a user’s manual for responsible but unconventional monetary policy. Mr. Bernanke focused on Japan in the 1990s, but his recommendations could apply just as well to the United States today. The Fed could engage in much more aggressive quantitative easing, both in size and in scope, to further lower long-term interest rates and value of the dollar. It could more effectively convey to markets its intentions for the funds rate, which would also lower long-term rates. And it could set a price-level target, which, unlike an inflation target, calls for Fed policy to take past years’ price changes into account. That would lead the Fed to counteract some of the extremely low inflation during the recession with a more expansionary policy and lower real rates for a while.\n", "pred_label": "__label__1", "pred_score_pos": 0.8476908206939697} {"content": "Sister Paulanne Held spearheads Our Lady of Perpetual Help's The Needy Family Fund, which helps people going through a crisis.\nSister Paulanne Held spearheads Our Lady of Perpetual Help's The Needy Family Fund, which helps people going through a crisis. (Charlie Kuhn)\n\nSister Paulanne Held teaches seventh and eighth grade students at Our Lady of Perpetual Help Catholic School. She spearheads the parish’s The Needy Family Fund, which was started 33 years ago by Father Myles McDonnell. The parish held a fundraiser dinner Dec. 2 and raised approximately $4,200 for the fund. A Glenview Announcements reporter volunteered at the event.\n\nQ: What is the purpose of The Needy Family Fund?\n\n\nA: (Father McDonnell) suggested we start this fund to help people in our parish and community. It helps families in crisis, people who have lost their job, people dealing with illness. We’ve paid for several funerals, and several were children of the community. It really is a hands-on (effort) helping people move forward in crisis.\n\nQ: Why should people donate to the fund?\n\nA: Because when people are in crisis they have nowhere to go. People get overwhelmed when they are in crisis … and they don’t know what to do. They don’t know where to go. Churches really need to have an outreach program that responds to people in the parishes and in the community.\n\nQ: What is an example of the impact the fund has had?\n\nA: A single mom who has four boys and she has a brain tumor, and she can only work part-time. She’s not always able to work so she can’t pay all her bills. We respond to that to help her to get through this. We had a dad with cancer, and he had four children. He died, and those children were young. So to help that mom … was really important.\n\nQ: What do you enjoy about being in charge of the fund?\n\nA: To see people able to move forward. That’s really a good feeling.\n\nQ: What does your daily routine consist of?\n\nA: The routine starts early in the morning. I start with sitting at my desk writing notes to people who have been generous. I set up for the church Mass every morning. I am in school by 7:15 a.m. In the evening sometimes there are meetings, otherwise doing more writing and doing lesson plans. The day goes fast.\n\nQ: What do you enjoy about teaching?\n\nA: The children. They are great inspiration. I tell them they have to change the world. They have to make it better. They have to care about people.\n\nQ: Looking back on your time teaching, is there a memory that sticks out the most?\n\nA: When a child struggles and feels success. That’s certainly a great satisfaction for a teacher.\n\nQ: Do you have any words of wisdom for the community?\n\n\nA: We have to remember that we can make a difference. We can change the world. Our influence has great value to help people to do that.\n\nShout Out is a weekly feature in which we get to know and introduce our readers to their fellow community members and local visitors throughout suburban Chicago.\n\n\nTwitter @AKukulka11", "pred_label": "__label__1", "pred_score_pos": 0.5874512195587158} {"content": "Bacteria. A class of microorganisms that cause infections.\n\nBeta blockers. A widely prescribed class of drugs to treat hypertension (high blood pressure) that can trigger psoriasis.\n\nChronic. Long lasting, ongoing.\n\nCoal tar. A thick, black liquid used as a topical treatment for psoriasis.\n\nContact dermatitis. A condition resulting from contact between skin and some allergy-causing substance, or an irritant, such as detergent, fragrances, or jewelry.\n\nCorticosteroids. Also called steroids. These steroids are similar to hormones that your body produces. They can reduce inflammation.\n\nCortisone. A natural hormone that can be made synthetically for use as an anti-inflammatory agent.\n\nDandruff. Skin cells that grow and die off too fast.\n\nDead Sea Salts. A blend of minerals found in the Dead Sea in Israel used as a bathing treatment.\n\nDermatitis. Inflammation of the skin.\n\nDermatologist. A medical doctor who specializes in skin conditions.\n\nEpsom salts. Used in the bath to relieve the aches, pains, and itch of psoriasis.\n\nErythrodermic psoriasis. (eh-reeth-ro-der-mic pso-ri-a-sis). The least common type of psoriasis, it can cover your entire body with a red peeling rash that can itch and burn.\n\nExfoliate. To remove dead skins cells from the surface of the skin.\n\nFlare-ups. Sudden outbreaks.\n\nGuttate (guh-tate) psoriasis. Psoriasis that shows up as red, drop-like spots on the skin.\n\nImmune system. The body’s natural defense against foreign substances and organisms that could lead to illness.\n\nInflammation. A process by which the body’s immune system malfunctions.\n\nInverse psoriasis. Smooth, red patches may appear in skin-folds in the armpits, groin, under the breasts and around the genitals. Sweating and friction can make things worse.\n\nLesions. A wound or injury to the skin.\n\nLight therapy. The use of ultraviolet (UV) light to slow the rapid growth of new skin cells. Also called phototherapy.\n\nLithium. A medication used to treat bipolar disorder and other mental illnesses; can trigger psoriasis.\n\nMild psoriasis. Psoriasis that covers less than 3 percent of the body.\n\nModerate psoriasis. Psoriasis that covers 3 to 10 percent of the body.\n\nOatmeal bath. An alternative treatment for psoriasis that eases itching and reduces redness.\n\nOral medications. Medicines taken by mouth.\n\nPhototherapy. The use of ultraviolet (UV) light to slow the rapid growth of new skin cells. Also called light therapy.\n\nPlaque (plak) psoriasis. A common type of psoriasis, which causes dry, red patches (also known as plaques) with silvery scales.\n\nPlaques. Patches of red, rough skin covered with silvery scales caused by psoriasis.\n\nPsoriasis. A chronic skin condition caused by an overactive immune system.\n\nPsoriatic (pso-ri-a-tic) arthritis. An immune system disorder that includes both inflamed, scaly skin and inflamed joints. They don’t necessarily happen at the same time.\n\nPustular psoriasis. A rare type of psoriasis that causes skin to become red and painful with raised, pus-filled bumps.\n\nPustules. Small blisters or pimples on the skin containing pus.\n\nRecurring symptoms. Symptoms that return.\n\nSalicylic acid. An ingredient that exfoliates skin and improves its texture and color.\n\nScaling. Abnormal shedding or build-up of an upper layer of skin.\n\nSkin biopsy. A small sample of skin that is removed (biopsied) and examined under a microscope.\n\nSteroids. Synthetic drugs that decrease inflammation and reduce activity of the immune system.\n\nSystemic treatment. Medicines that affect the entire body.\n\nTopical. On the surface of the body.\n\nTopical treatments. Medicines applied on the surface of the skin.\n\nTriggers. Things that make psoriasis symptoms worse or cause flare-ups. Common psoriasis triggers include emotional stress, injury to the skin, certain drugs, and infections.\n\nUltraviolet light. Also called phototherapy; exposure to ultraviolet light slows the rapid growth of new skin cells.\n\nZinc PCA Complex. The unique moisturizing ingredient in Dermarest® that combines zinc PCA, panthenol, and white tea extract.", "pred_label": "__label__1", "pred_score_pos": 0.7480319142341614} {"content": "You are here:Home/News/ Rethinking Empire\n\nRethinking Empire\n\nPosted On August 10, 2017 | 16:30 pm | by baileyt | Permalink\nThe 2017 Byzantine Studies symposium\n\nPublished a little more than a century ago, C. P. Cavafy’s haunting allegorical poem Waiting for the Barbarians is a particularly malleable elegy.\n\nSet in a nebulous, vaguely imperial state on the day it is to be turned over to an encroaching barbarian horde, the poem describes the pendulous moment of transition when the pomp of rhetoric and glamor of an empire ascendant have given way to uncertainty, hollow dread, and ceaseless, destabilizing questioning. The purpose, meaning, and identify of the particular state is no longer the important concern; rather, the notion of empire itself, once so solid and a priori, has come into question. The poem might very well serve as a shorthand description for the aims of Dumbarton Oaks’s most recent Byzantine Studies symposium.\n\n“Rethinking Empire,” held at Dumbarton Oaks between April 21 and 22, 2017, sought to situate Byzantine studies within a broader historical discussion, taken up by scholars of other hegemonic civilizations in recent years, about the nature of empire and imperialism as they’ve existed across different periods and geographical areas. Primarily, the symposium was aimed at interrogating Byzantine culture and imperial institutions, relations between core and periphery, and questions of ethnic diversity and territoriality. Coinciding with the centenary of the First World War, it was also concerned with comparisons over time and across space, and the competitive dynamics of imperial powers.\n\nFormer Director of Byzantine Studies Elena Boeck set the course for the symposium’s proceedings, describing their focus on the manner in which imperial identity was articulated and the mechanism of authority, and, on the other hand, the substructure beneath it all—the bureaucrats, image-makers, and lecturers who supported the empire.\n\nThe day’s lectures began with two brief presentations delivered by cosymposiarchs Paul Magdalino, of the University of St Andrews, and Dimiter Angelov, of Harvard University. Magdalino’s talk sounded the necessity for rethinking empire, calling it a “necessary step in the exploration of Byzantine political identity.” Examining the political states, or empires, that existed in the years leading up to the First World War, Magdalino teased out the remnants of the Roman conception of empire as they manifested in, among other things, architectural presentation.\n\nThe monumental architecture of capital cities was, and still is, dominated by triumphal columns and arches, and imperial leaders still claimed descent from Rome in their titles, like kaiser and czar, that are vernacular derivatives of caesar. As Magdalino attested, successful definitions of empire tend to involve comparison, and in that vein, he contended that kingship and empire are inseparable. The ritual consecration and establishment of heirs central to kingship are a first step in the establishment of empire.\n\nDimiter Angelov’s talk followed by attempting to define empire in a much more literal sense. His lecture analyzed the conceptual vocabulary of statehood. Examining the relative prominence of terms like arche and basileia, Angelov asserted that the diversity of appellations, and the lack of consensus on which to use and when, is revealing. Among the nuances of usage discussed by Angelov were the rise in frequency of basileia in the ninth century as a response to Charlemagne’s rule in the west, the relative rarity of autokratoria, and the perennial popularity of arche—used by Thucydides to describe the Athenian Empire, the persistence of arche in Byzantium marked a desire to claim continuity with the ancient world.\n\nThe symposium’s proceedings were divided into five thematic sections, the first of which, on “The Roman and Late Antique Matrix,” was chaired by John Duffy, of Harvard University. Emma Dench, also of Harvard University, examined contemporary scholarly approaches to understanding how the “premodern empire” of Rome functioned. Limning the history of traditional thought that viewed the Roman Empire as a singular belief system—and empire itself as a conversion process—Dench described the consequences of these theories. When one considers the Roman Empire as a belief system, with individual buy-in, rather than as a top-down model of ruling, Dench explained, the distance between rulers and subjects is minimized, and the importance of power structures is downplayed.\n\nThe next lecture, delivered by Sylvain Destephen, of the University of Paris, sought to analyze the effect of the gradual sedenterization of Byzantine emperors on imperial authority. Over time, Destephen explained, the figure of the peripatetic emperor—continuously travelling across the empire for diplomatic purposes and to reinforce hegemony visually—began to disappear, as imperial sojourns after 450 were limited more and more to the areas directly surrounding Constantinople. Various developments in the administrative structure of the empire, including a complex system of grants and privileges that helped to bolster authority in the provinces, led to the obsolescence of showy manifestations of dynastic legitimacy. In effect, as Destephen concluded, the emperor went unseen because there was no longer a need to be seen.\n\nRuth Macrides, of the University of Birmingham, chaired the next session, on “Territoriality and Ethnicity.” John Haldon, of Princeton University, began the afternoon’s talks by asking whether the realities of the Byzantine Empire’s geographical layout corresponded with how the empire perceived its borders. Haldon argued that eastern Romans understood their empire as a territorial entity with fluctuating boundaries whose mission was to reclaim lands lost to other powers and, in so doing, extend the territorial sway of Christianity. Over time, as the empire contracted, it still made concerted efforts to fit its conception of its imperial self to the territorial circumstances it found itself in.  \n\nTapping into a subject that would recur throughout the symposium—the status and role of the Byzantine Empire’s provincial elite—Vivien Prigent, of the French National Center for Scientific Research, outlined the ways in which Byzantium, using local elites, managed a relatively small pool of resources and ever-decreasing territorial holdings. The lynchpin of imperial control, as Prigent argued, was the locally supreme, nonaristocratic official who most likely would have held little sway in Constantinopolitan society. Using surviving seals to gauge the proliferation of titles and the number of provincial elites from the seventh to the eleventh century, Prigent described the complex relationship between local elites—who wanted their property protected and their power legitimated—and the imperial center of Byzantium, which linked an increasingly state-dependent elite to destabilization of the empire.\n\nQuestions of identity—the identity of an empire, and the identities of groups living within and constituting the empire—were central to the symposium. Accordingly, Anthony Kaldellis, of the Ohio State University, delivered the final lecture of the day, which asked a simply worded, though difficult to solve, question: Was Byzantium a multiethnic empire? Positing that one of the best methods for inserting Byzantine studies into the broader imperial turn in historical studies is to focus on the concept of ethnicity, Kaldellis began by outlining some of the difficulties in discussing ethnicity in Byzantium.\n\nPrevious studies documenting an alleged ethnic diversity, Kaldellis argued, in reality simply pointed to nonresidential communities as evidence of this diversity: prisoners of war, foreign ambassadors, itinerant merchants, and a small Muslim community, also possibly mercantile. Once this “Potemkin diversity” is brushed aside, Kaldellis claimed, it becomes clear that Byzantium, as a culture, has been denuded of its ethnic connotations—the Romans of Byzantium, as contemporary sources make clear, were once seen as an ethnic group.\n\nMichael McCormick, of Harvard University, served as commentator for the first day of the symposium, leading a nearly hour-long discussion session on the day’s proceedings.\n\nThe second day of the symposium was given over to comparative approaches. Derek Krueger, of the University of North Carolina at Greensboro, chaired the day’s first thematic section, on early medieval empires in the Roman world. Jennifer Davis, of the Catholic University of America, began with a talk entitled “Rethinking Empire: The Carolingian Perspective.” Charlemagne’s reign, Davis contended, was shaped by the process of empire itself—rather than imposing policies from a center onto a periphery, Charlemagne employed a heuristic approach to empire, starting from pragmatics and developing policy from there. In the realm of political economy, for instance, there is little to no evidence of consistent, direct taxation in the Carolingian world. Rather, Davis said, the Carolingians combined multiple sources of irregular income, including tributes and plunder, that only became significant when aggregated.\n\nAngel Nikolov, of the University of Sofia, continued to expand the territorial reach of the symposium, examining the conversion of Bulgaria into an Orthodox empire at the turn of the tenth century. His talk centered around Symeon I, the Bulgarian emperor who oversaw an escalation of military and political conflicts with the Byzantine Empire. Nikolov traced the origins of Symeon’s policies to those of his father, Boris-Michael, who converted the Bulgarians to Christianity, and the formative years he spent as a youth in Constantinople in the 870s.\n\nAs Nikolov demonstrated, Symeon was driven by a desire to supplant Byzantium as the center of eastern Christendom, a goal that manifested in such initiatives as the construction of churches and the prolific translation of patristic texts. Ultimately, Nikolov contended, a reinterpretation of the imperial project of Symeon I is overdue. For Symeon I, empire was not simply an instrument to abet the expansionist policies of his forebears, but a method of formalizing Bulgaria’s status as a religious center and, thereby, laying claim to the reins of the Eastern Roman Empire.\n\nThe next thematic section, chaired by Ioli Kalavrezou, of Harvard University, examined the culture of empire. Neils Gaul, of the University of Edinburgh, returned to one of the well-trod legends of Byzantium: its sprawling, top-heavy, and hopelessly complex bureaucracy. Analyzing the roles civil servants played as “agents of empire,” Gaul discussed the recruitment and educational practices that helped to develop the bureaucracy from the seventh century on. Trained in the basics of rhetoric and classicizing grammar (and aided in this process by schedography, the learning of impromptu rhetoric), budding civil servants were often put to display their learning in both written and oral form. Indeed, as Gaul explained, surviving evidence suggests that students were subject to elaborate and ceremonial oral entrance exams before they were allowed to enter the ranks of officeholders. Such contests, at least by the twelfth century, were even presided over by the emperor—though it’s likely, Gaul ceded, that a senior civil servant was tasked with the actual examination.\n\nCivil servants were relied upon to link the empire, and to some degree, as Gaul attested, their reach defined the rather porous borders of the eastern Roman politeia. In this vein, the day’s proceedings continued with a more focused rumination on the nature of borders, delivered by Annabel Wharton, of Duke University. Centering her talk on the Holy Sepulchre in Jerusalem and attempts, in the sixteenth and seventeenth centuries, to replicate it in the form of texts, diagrams, drawings, and models, Wharton interrogated the significance of imperial peripheries, positing that these liminal spaces, rather than simply offering up their resources to imperial centers, can in fact define and challenge them.\n\nIn particular, Wharton analyzed the drawings of the Franciscan father Bernardino Amico, whose elaborate and precise architectural renderings of the Holy Sepulchre amounted to a printed walking tour. Employing craftsmen in Bethlehem, Amico even produced three-dimensional models of the structure, made of polished olive wood and camel bone and inlaid with mother-of-pearl—exploring the scaled models was, in a way, a surrogate pilgrimage. Throughout her talk, Wharton sought to draw parallels between the mimetic possession of the Holy Sepulchre, as offered by Amico’s artifices, and the general Christian desire to reclaim the Holy Land—a desire manifested, from time to time in history, by the violence of the crusades.\n\nThe symposium’s final thematic section was chaired by Robert Ousterhout, of the University of Pennsylvania, and focused on comparative contexts. In his talk, “The Long and Winding Road to Empire,” Cemal Kafadar, of Harvard University, looked at evidence for the gradual transformation of the Ottoman state into an empire over the fourteenth, fifteenth, and sixteenth centuries. Kafadar began his exploration by analyzing transformations in the usage, over time, of the epithet “Rumi,” which denoted an individual from Rûm—that is, Rome.\n\nWith time, as Kafadar explained, “Rumi” began to be used to refer Muslims living in the (former) lands of Rûm; by the early thirteenth century, it was being used to describe Turkish-speaking Muslim urbanites and to distinguish them from Turks who had remained, so to speak, “ethnic.” As Kafadar made clear, his analysis arose from instances of Ottoman self-representation. Around 1500, he pointed out, Ottoman authors began to write collective biographies of the poets and artists of Rûm—in their own critical discourse, they began to speak of concepts like Rumi temperament, Rumi nature, Rumi manner, and Rumi comportment. As Kafadar argued, the development of the sense of empire was tied to this emotional and affective relation to the inhabited lands themselves.\n\nContinuing the emphasis on comparative contexts, Michael Puett, of Harvard University, delivered an analysis of a rarely considered pairing of empires: those of Chinese late antiquity and the early Byzantine Empire. While comparisons between the Roman Empire and the Han dynasty of China have long fascinated scholars, Puett argued that subsequent regional empires, though less studied comparatively, share striking similarities, not the least of which is a traditionally skewed historical perspective. Just as the narrative of the fall of the Roman Empire has resulted, in part, from a later dominant western Europe reading history backward, so the history of China’s other regions has been elided by the latterly dominant southern coastal regions.\n\nRunning through a sketch of Chinese imperial history, Puett touched upon a number of familiar strategies in the consolidation of power, including the creation of a bureaucratic class to undercut aristocratic power. Eventually, as the imperial system overtook China, a new cosmological and ritual viewpoint superseded the paradigm of the divine right of kings; the ruler, rather than being a divine figure, was demoted, and became simply a son of heaven. Consequentially, as Puett explained, in a move redolent of the Byzantine emperors’ gradual confinement to Constantinople, rulers could no longer move through the entire realm or offer sacrifices in the provinces; this practice was instead enacted by local elites.\n\nPaul Magdalino delivered the final lecture of the symposium, a wide-ranging reflection on the religious dimension of empire entitled “Rethinking Theocracy.” As Magdalino contended, the development of theocracy required monotheism; while countless political regimes throughout history have acknowledged the sovereignty of supernatural power, it is only beneath the brace of monotheism that the political articulation of obedience to an all-powerful deity is truly exemplified—and, thus, theocratic. Centering his discussion on the conversion of Constantine and his attempts to Christianize the cult of the Roman emperor, Magdalino described the “ideological repackaging” of the Roman state within an aura of sacredness, and the rhetorical articulation of this process.\n\nThe development of Byzantine theocracy, as Magdalino evinced, amounted to a repackaging of empire as an anticipation of the kingdom of God. It was deeply eschatological, an orientation that had its strengths in maintaining order but that lost its appeal when the end of the world lost its urgency. For theocratic Byzantium, inheriting the kingdom was more important than conquering the world.\n\nHearkening back to his previous talk, which had opened the symposium, Magdalino closed by reflecting on the concept of the “elect nation,” its remarkable success, and its cultural and historical survival into the modern age. In doing so, he touched upon nationalism, the perpetual play of borders, and the motifs developed by the Byzantine theocratic regime that have been redeployed, time and again, to justify empires.\n\nFollowing Magdalino’s lecture, Maya Jasanoff, of Harvard University, served as commentator, leading a discussion that, while focusing on the second day’s talks, ranged over the entirety of the symposium’s proceedings—that is, centuries, continents, and empires.", "pred_label": "__label__1", "pred_score_pos": 0.997616708278656} {"content": "No Man's Sky Wiki Guide\n\nCenter of the Galaxy (Ending)\n\nThe Center of the Galaxy is the end-game scenario for No Man's Sky's primary campaign. While players are free to explore the galaxy at their leisure and to their heart's content, the ultimate goal of the single-player mode is to reach the elusive center and the main story ending of No Man's Sky.\n\nPotentially enormous spoilers exist below.  If you do not want to know what will be discovered at the Galaxy's center, you should not read any further.\n\nSpoilers below!\n\n\n\nNo Man's Sky Ending[edit]\n\n\nThe Center of the Galaxy exists a one way portal leading to new galaxy in different dimension, an element in a potential megaverse. After a brief, starry cinematic with no narration, the player emerges on the edge of a new galaxy. This new galaxy initially appears to be similar, but may or may not differ substantially from the original.\n\nThe new galaxy appears in most ways to be functionally identical to the previous. The center of the galaxy is usually around 180,000 light years away and with a regular hyperdrive which has 100 light years per jump max, you can get there in at least 1800 jumps, but that's with the standard hyperdrive. If you get the Warp Reactor Sigma (300 ly/jump), then you can get there in around 600 jumps. If you have the Warp Reactor Tau (500 ly/jump), it takes at least 360 jumps to get there. If you have the Warp Reactor Theta (900 ly/jump), it will only take around 200 jumps. Apparently you can even combine them to get even more, for example you can do Tau + Theta to get a maximum of 1300 ly/jump, meaning you could reach the center in about 139 jumps.\n\nYou can find the different type of Warp Reactor upgrades by either talking to aliens and helping them out successfully, in which case they will gift you with a random upgrade, or by finding broken pods on a planet's surface that contain random ship upgrades. When doing this, it's best to fly along the surface of the planet and look out for any burning pods with a blinking blue light. It's also recommended that you fly to a planet with little life, as trees and fauna might make it difficult to find the pods. \n\nAlternate ending (Atlas Path)\n\nThere is alternate ending in No Man's Sky - You just got to follow the Atlass Path while collecting Altass Stones. This way uncovers story of Atlas and is alternate way of completion - \"My journey is complete. A great sense of fulfilment washes over me...\"\n\n\nJust like after the main ending your'e free to explore the universe or reach the centre of it. To fully complete the Atlas path we need milestone Maggelan reached (50 of total journey milestones)\n\nFull video below shows all effects after reaching the Centre of Universe (Main ending)", "pred_label": "__label__1", "pred_score_pos": 0.7968032360076904} {"content": "Hans Asperger assisted Nazi regime of euthanasia, report claims\n\nAsperger’s Syndrome named after paediatrician who was a pioneer of autism research\n\nA man stands in front of the “Arbeit macht frei” (Work sets you free) gate in the former Nazi death camp Auschwitz, Poland. Photograph: Kacper Pempel/Reuters\n\n\n\nHans Asperger, the respected Austrian paediatrician whose name describes a form of high-functioning autism, actively assisted in the murder of disabled children by the Nazis, a new report claims.\n\nAsperger’s Syndrome, marked by an impaired ability to interact socially with others, tends to affect people of average or above average intelligence.\n\nIt was first identified by Professor Asperger in 1944 who used the term “autistic psychopathy” to describe the condition of four children under his care.\n\nIn 1981, the British psychiatrist Lorna Wing, who helped establish the National Autistic Society in the UK, introduced the diagnosis of “Asperger’s Syndrome” in honour of her predecessor.\n\nBut according to new evidence, the pioneer of autism research whose reputation is that of a strong opponent of Nazi ideology, had a hidden dark past.\n\nDocuments uncovered by an Austrian medical historian suggest that Prof Asperger ingratiated himself with the Nazi regime to the extent of participating in its murderous euthanasia programme.\n\nAsperger is said to have referred profoundly disabled children to the notorious Am Spiegelgrund clinic, where their “unworthy” lives were snuffed out.\n\nAn estimated 789 children, many with severe mental problems, were systematically killed at the Vienna clinic, mostly by lethal injection and gassing.\n\nOthers died from disease and starvation, or were subjected to harsh medical experiments.\n\n“Aktion T4,” the horrific euthanasia programme, personally authorised by Adolf Hitler, set out to cull the incurable and severely disabled.\n\nUp to 300,000 victims, including children, were exterminated at clinics in Germany, Austria, Poland and the Czech Republic between 1939 and 1945.\n\nHerwig Czech, from the Medical University of Vienna, set out the claims against Prof Asperger after trawling through previously unexamined documents from the Nazi era including personnel files and patient records.\n\nHe said: “These findings about Hans Asperger are the result of many years of careful research in the archives.\n\n“What emerges is that Asperger successfully sought to accommodate himself to the Nazi regime and was rewarded with career opportunities in return.\n\n“This is part of a broader effort by historians to expose what doctors were doing during the Third Reich.”\n\n‘Abhorrent eugenics’\n\nThe allegations are reported in the journal Molecular Autism, whose two editors explained why they believed Prof Asperger to be guilty as charged.\n\nOne of them, leading British autism expert Professor Simon Baron-Cohen, from Cambridge University, said: “We are aware that the article and its publication will be controversial.\n\n“We believe that it deserves to be published in order to expose the truth about how a medical doctor who, for a long time, was seen as only having made valuable contributions to the field of paediatrics and child psychiatry, was guilty of actively assisting the Nazis in their abhorrent eugenics and euthanasia policies.\n\n“This historical evidence must now be made available.”\n\nCo-editor Professor Joseph Bauxbaum, from Mount Sinai Medical School in New York City, said: “We are persuaded by Herwig Czech’s article that Asperger was not just doing his best to survive in intolerable conditions, but was complicit with his Nazi superiors in targeting society’s most vulnerable people.”\n\nAnother point of view was presented by Canadian expert Anthony Bailey, Professor of Child and Adolescent Psychiatry at the University of British Columbia.\n\nHe said the accusations against Prof Asperger should be seen “in context”.\n\nProf Bailey said: “Virtually all doctors in Germany at that time were members of the Nazi Party and there was almost no opposition to the euthanasia programmes for the mentally ill and handicapped, except from one or two heads of asylums and a very small number of Catholic bishops. ”\n\nCarol Povey, from the National Autistic Society, said: “We expect these findings to spark a big conversation among the 700,000 autistic people in the UK and their family members, particularly those who identify with the term ‘Asperger’.\n\n“Autism affects everyone differently and people often have their own way of talking about autism. We will be listening closely to the response to this news so we can continue to make sure the language we use to describe autism reflects the preferences of autistic people and their families.\n\n“Obviously no-one with a diagnosis of Asperger’s Syndrome should feel in any way tainted by this very troubling history.”", "pred_label": "__label__1", "pred_score_pos": 0.9897205233573914} {"content": "Blood Donation: Tips For Female Donors\n\nDonating blood is a safe and simple act which can make a significant difference to people who have suffered accidents, are undergoing surgery, fighting cancer, etc. People are encouraged to donate whenever they can, no matter what blood type they have. \n\nAside from age and certain health conditions, gender can also be a factor if you are donating. Here are some tips for female donors who may have to take extra precautions:\n\nHow long should I wait between blood donations?\n\nHealthy donors are eligible to donate every 56 days, according to recommendations. If you are pregnant, you should not donate blood as it could put your or your baby at risk for complications.\n\nThe exception in some cases is when your doctor asks you to provide blood if they think you might require a transfusion at the time of delivery. They will also let you know how long to wait after childbirth before you are eligible to donate again.\n\nShould I take precautions if I am a teenager?\n\nDepending on your state, you should be at least 16 or 17 years old to donate blood. While it is safe and encouraged for the most, a recent study highlighted how female donors in the 16-18 age group are at higher risk of iron deficiency and associated anemia.\n\nThere are rules in place to protect young donors such as the minimum weight requirements as revealed in this chart by the American Red Cross. For additional precautionary steps, you may also speak to a healthcare provider about taking iron supplements or increasing the time between donations.\n\nIs there anything I should eat or drink?\n\nIt is a good idea to include iron-rich foods in your diet prior to donation — meat, leafy greens, seafood, and sweet potatoes to name a few. Also, do not skip any meals as regularly eating is what keeps your blood sugar levels stable.\n\nYou should be well-hydrated before donating blood so make sure you drink enough water. Alcohol, on the other hand, should be avoided before and after donation due to the risk of dehydration.\n\nIs it safe to donate blood when I am on my period?\n\nIf you are in good health, it may be fine to donate during your menstrual cycle. If you are experiencing symptoms like cramps or tiredness, losing blood could make you feel worse so it may be better to delay the donation till after your period ends.\n\nEbony Dunkley of NHS Blood and Transplant advises against donating if you are having a particularly heavy period. \"This is because any form of blood loss can reduce the iron levels in your body and potentially make you feel unwell for a short time,\" she told Cosmopolitan UK.", "pred_label": "__label__1", "pred_score_pos": 0.5486431121826172} {"content": "首页 > >内容\n\n\n2019-9-4     来源:\n\n\ncfa考试1、单项选择题(本题型共5小题,每小题20分,每小题只有一个正确答案,请从每小题的备选答案中选出一个你认为正确的答案,在答题卡相应位置上用2B铅笔填涂相应的答案代码,答案写在试题卷上无效)1、Earlier this year, Barracuda Company issued 5,000 employee stock options. Recently, 2,000 options were exercised at a price of $10 per share. To avoid dilution, Barracuda purchased 2,000 shares at an average price of $12 per share. Barracuda reported both transactions as financing activities in its cash flow statement. For analytical purposes, what adjustment is necessary to better reflect the substance of the stock repurchase?\n\n\nOperating cash flow Financing cash flow\n\nA. Decrease $4,000 No adjustment\n\nB. No adjustment Increase $4,000\n\nC. Decrease $4,000 Increase $4,000\n\n2、If a lessee enters into a finance lease rather than an operating lease, it can expect to have a:\n\nA. higher return on assets.\n\nB. higher debt-to-equity ratio.\n\nC. lower debt-to-equity ratio.\n\n3、Which of the following statements regarding a direct financing lease is least accurate?\n\nA. The principal portion of the lease payment is a cash inflow from investing on the lessor';s cash flow statement.\n\nB. Interest revenue on the lessor';s income statement equals the implicit interest rate times the lease payment.\n\nC. The lessor recognizes no gross profit at the inception of the lease.\n\n4、Which of the following statements about the impact of leases on the financial statements of the lessee is least accurate?\n\nA. Net income is lower in the early years of a finance lease than an operating lease.\n\nB. A finance lease results in higher liabilities compared to an operating lease.\n\nC. Cash flow from investing is higher for a finance lease than an operating lease.\n\ncfa一级5、Interest expense is reported on the income statement as a function of:\n\nA. the market rate.\n\nB. the coupon payment.\n\nC. the unamortized bond discount.\n\n\n\nanswer:Barracuda reported a $4,000 net outflow from financing activities [2,000 options* ($12 average market price-$10 exercise price)]. However, since the options are a form of compensation, the $4,000 outflow should be reclassified as an operating activity for analytical purposes. This is accomplished by increasing financing cash flow $4,000 and decreasing operating cash flow $4,000.\n\n\nanswer:Leasing the asset with an operating lease avoids recognition of the debt on the lessee’s balance sheet. Having fewer assets and liabilities on the balance sheet than would exist if the assets were purchased increases profitability ratios (e.g., return on assets) and decreases leverage ratios (e.g., debt-to-equity ratio). In the case of a finance lease, the assets are reported on the balance sheet and are depreciated.\n\n\nanswer:Interest revenues are calculated by multiplying the implicit interest rate by net receivables at the beginning of the period.\n\n\nanswer:Cash flow from investing is not affected by a lease being either a finance or an operating lease. Finance leases reduce cash flow from operations by only the portion of the lease payment attributed to interest expense. Cash flow from financing is reduced by the rest of the finance lease payment which is the principal part of the payment.\n\n\nanswer:Interest expense is always equal to the book value of the bond at the beginning of the period multiplied by the market rate at issuance.", "pred_label": "__label__1", "pred_score_pos": 0.9341515302658081} {"content": "Being Bilingual in Spanish a discrimination against job seekers\n\nBilingual in spanish or any other language shouldnt be a qualification unless its a translator job, oppurtunity for all\n\nBilingual in Spanish or any other language shouldnt be a requirement in a job unles sits a translator job, if its a skilled job like Nursing, banking, teaching (general), engineer, lab tech, health, I dont need to be able to be fluent or speak spanish, since my primary job isnt to speak spanish but my skill.\n\nIt is discrimatory, against non speakers , it is not a skill to speak Spanish uless it is a translator job.", "pred_label": "__label__1", "pred_score_pos": 0.9329301714897156} {"content": "The french revolution and the 3rd estate\n\nThe french revolution and the 3rd estate\n\nFooter About Us School History is a growing library of premium quality history worksheets, teaching resources and online history courses for use in the classroom. This was especially true of day laborers, who were not allowed to organize unions and who turned to badly led strikes.\n\nWhat did the third estate want\n\nPart of the trouble lay with such economic fundamentals as backward methods of farming, the shortage of land, and overpopulation. Before , wages had risen by around 20 percent, however, food prices and rents had increased by 60 percent in the same period resulting in the struggles they faced. In Finland, this legal division existed until , still drawing on the Swedish constitution of On these occasions deputies from the States of the various provinces as the counties, prince-bishoprics and duchies were called asked for more liberties. Many peoples whose territories within the Holy Roman Empire had been independent for centuries had no representatives in the Imperial Diet, and this included the Imperial Knights and independent villages. If the clergy and nobility wanted a voice in shaping the future of France, they must sit in the National Assembly as equals with the Third Estate. The Riksdag, and later the Diet of Finland was tetracameral : at the Riksdag, each Estate voted as a single body. Makeup of the Estates The Third Estate was thus a vastly larger proportion of the population than the other two estates, but in the Estates General , they only had one vote, the same as the other two estates had each. Each were free men, and had specific rights and responsibilities, and the right to send representatives to the Riksdag of the Estates. As in Sweden, the nobility has not been officially abolished and records of nobility are still voluntarily maintained by the Finnish House of Nobility. This book was not the only expression of this idea as there was a flood of similar pamphlets and essays circulating the nation in early The only way the wealthiest of the bourgeoisie could gain nobility was by buying it through venal offices, though by the s this was becoming very expensive.\n\nBecause the Parliament of Scotland was unicameral, all members sat in the same chamberas opposed to the separate English House of Lords and House of Commons. The clergy was represented by the independent prince-bishopsprince-archbishops and prince-abbots of the many monasteries. The Riksdag, and later the Diet of Finland was tetracameral : at the Riksdag, each Estate voted as a single body.\n\nYou will note, however, that this time he does not offer any supporting evidence for his statement.\n\nestates general\n\nFree course French Revolution 2. Their representatives to the Diet were elected indirectly: each municipality sent electors to elect the representative of an electoral district.\n\nfirst estate clergy\nRated 9/10 based on 94 review\nThe Third Estate Facts, Information & Summary", "pred_label": "__label__1", "pred_score_pos": 0.9956559538841248} {"content": "How to write a coursework planets\n\nThe entire course syllabus is a disaster and meant to create issues and confrontation. It was poorly written, dreamed up, and executed.\n\nHow to write a coursework planets\n\nAstronomy Terminology In this tutorial WorldWide Telescope is used to demonstrate the how to write a coursework planets behind some of the most commonly used terms in astronomy.\n\nAlso ensure View from this location is not selected in the View pane. Objects in the sky are located using right ascension RA and declination Dec.\n\nRight ascension in space is equivalent to longitude on the Earth. Longitude is an east-west bearing from the Greenwich Meridian, right ascension is the east-west bearing from an equally arbitrary point in space - the point where the Sun crosses the celestial equator on the March equinox.\n\nhow to write a coursework planets\n\nThe equinox is chosen because at this point the Earth is neither tilted towards or away from the Sun, but instead is vertically aligned with the Sun the solstices occur when the tilt is at a maximum.\n\nThe celestial equator is none other than the Earth's equator projected out into space, and the north and south celestial poles are simply our own poles projected out indefinitely. Where the Sun crosses the celestial equator both right ascension and declination are zero. Declination is similar to latitude on Earth, measuring a north-south bearing.\n\nObjects above the celestial equator have a positive declination, objects below it a negative declination. The track of the Sun across the sky is known as the ecliptic. The First Point of Aries should now be in the middle of your view.\n\nWhy Pluto is No Longer a Planet - Universe Today\n\nThe right ascension and declination of celestial objects do not change, unless the position of the objects changes relative to the coordinate system which of course they do, but very slowly, so slowly that it is only necessary to revise the coordinate system every 50 years.\n\nEach time a coordinate system is fixed, it is called an epoch. The current epoch, and the only one supported in WorldWide Telescope, is the J epoch - namely the position of the celestial objects and coordinate system at Noon on January 1st in the yearat the Royal Observatory, Greenwich, England.\n\nThe change to the J epoch was made inas the positions of stars can be predicted accurately in advance of the actual year. There may of course be a change to the J epoch, perhaps sometime after the year Of course stars and all other objects do appear to move in the sky, as a result of the rotation and orbit of the Earth.\n\nAt any one moment the position of an object in the sky can be referenced by its azimuth and altitude. Azimuth is similar to longitude or right ascension, in that it is an east-west bearing from true north.\n\nAltitude is an angle rather than a distance, it is the angle up or down from the horizon. By convention positive azimuth is to the east, negative to the west, and positive altitude is up from the horizon.\n\nUnlike right ascension and declination, azimuth and altitude change continuously. For example, open the Search panel, then enter Sirius in the search text box.\n\nWhen the bright star Sirius appears, zoom away from it until the view is from Earth that is, minimize the zoom completely.\n\nhow to write a coursework planets\n\nRight-click on Sirius in the sky to bring up the Finder Scope. Note that the seconds values for the Altitude Alt and Azimuth Az of Sirius are changing, even when you look at the star in real time. The altitude and azimuth will now change quite quickly. Altitude and azimuth are very useful values when aligning a physical telescope from Earth to locate a particular star or planet.\n\nThe values are different for every view point on Earth, hence the usefulness of right ascension and declination as a fixed coordinate system. The Magnitude entry on the Finder Scope refers to the apparent magnitude of the brightness of Sirius.\n\nFor a description of what this means refer to the Stellar Brightness section, or work through the Tutorial: Visiting the Neighbors tutorial. The Distance entry on the Finder Scope is the distance to the object in light years. A light year is an enormous distance. The speed of light in a vacuum is ,Accounting.\n\nUCLA > Courses | Summer Discovery\n\n\n\nAstronomy coursework is a frequent one which requires immense efforts from the side of the students but sometimes in spite of the good astronomy coursework, students are not able to gain good marks, the reason is the choice of topic and even if they are able to devise a good topic but still they miss some important aspects that should be the.\n\n\nAny opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of UK Essays. reviews of American Military University written by students. Write out all the important aspects you can easily recollect.\n\nA good outline will ensure that you don't deviate from your topic and stick to the point. When you are done with that, think about your paper on a bigger scale.\n\nEssay Writing Service #1 | Custom Papers -", "pred_label": "__label__1", "pred_score_pos": 0.6901260614395142} {"content": "Short E And Long Worksheets O Sound Vowel Sounds For Kindergarten\n\nshort e and long worksheets o sound vowel sounds for kindergarten\n\nshort e and long worksheets o sound vowel sounds for kindergarten.\n\nfree short o sound worksheets e a long and vowel sounds for grade 1 u oo phonics,short sound worksheets vowel sounds for preschool e words that begin with o,short o sound worksheets words vowel e phonics u worksheet,short and long e sound worksheets u for grade 2 oo,ou words with short u sound worksheets vowel sounds esl oo phonics o,short vowel sound worksheets for kindergarten oo jolly phonics e free long o first grade,short oo sound worksheets vowel sounds for grade 1 pdf e 2 phonics ow o words education,phonics short oo sound worksheets a for grade 1 u pdf worksheet e,short o sound word search puzzle e worksheets for grade 2 oo phonics vowel sounds 1,short u sound worksheets and long vowel pdf.\n\nrise and shine phonics short o sound morning worksheet vowels words with oo worksheets i for kindergarten .\nc and k sound worksheets phonics consonants ck short o grade or vowel sounds 3rd .\nlong o sound worksheets i short and u vowel sounds for preschool .\nwords with short o sounds worksheets an family word search part of a sound for grade 1 e 2 .\nvowel practice worksheets activities short best u sound kindergarten free o phonics worksheet .\nmedial sounds worksheets first grade long and short vowel for 1 sound pdf .\nshort e phonics worksheets vowel sounds 3rd grade words with oo sound .\nshort o worksheets for first grade long sound worksheet a and 2 e .\nlong o sound worksheet short vowel worksheets for first grade sounds preschool .\nshort o sound worksheets and activities no prep vowel sounds for ea e first grade .\nshort o and long worksheets oo sound e vowel .\nwords with short o sound free worksheets library download and print vowel for kindergarten long u .\nshort u sound worksheet classroom ideas e o vowel worksheets free .\nphonics vowel sounds worksheets long vowels for grade worksheet and short oo sound o .\nshort o and long worksheets vowel sound for kindergarten sounds 1st grade .\nshort o sound worksheets e a long and vowel sounds for grade 1 1st ou words with u .\nshort o words worksheets vowel long and sound e .\nshort o worksheets u sound for grade 4 phonics worksheet .\nphonics ow o e words education sound worksheets short vowel free .\nshort o worksheets ea e sound long and .\nfree short a worksheets vowel sound and long u .\nlong and short pictures worksheets vs kindergarten co vowels or o oo sound jolly phonics vowel for first grade .\nlong e phonics worksheets short vowel sounds for 1st grade and o sound .\nworksheets short o sound vowel u sounds for grade 3 long phonics ea e .\nlong a sound worksheets kindergarten short e vowel phonics for free pdf sounds grade 3 .\nshort o sound worksheets long grade common core 1st e words .\nshort e and long worksheets o sound vowel sounds for kindergarten .\nlong u sound worksheets short pdf vowel sounds esl .\nshort o sound worksheets vowel for 1st grade i kindergarten .\nvowels worksheets for grade 1 short vowel sounds and long o sound 3 ea e .\nlong i sound worksheet 3 snapshot image of short vowel worksheets u .\nlong u sound worksheets e kindergarten short o rise and shine phonics words vowel sounds for grade 1 .\nshort o sounds e sound free worksheets vowel .\nshort vowel sounds worksheets for kindergarten e sound free u .\nshort o sound worksheet vowel worksheets for kindergarten sounds 3rd grade .\nfree short o worksheets the measured mom words with oo sound e phonics .\n\nLeave a Reply\n", "pred_label": "__label__1", "pred_score_pos": 0.965886652469635} {"content": "BP403 - Buddhist Logic and Epistemology\n\nThe course is designed as a systematic study of the system of epistemological logic developed by Dignāga and Dharmakirti during the 6-7th century A.D. Topics of discussion will include: forms of syllogism, essence of judgment, impact of names and inference, theory of -sense-perception, validity of knowledge, and the reality of the external world.", "pred_label": "__label__1", "pred_score_pos": 1.0000097751617432} {"content": "• $2.99\n\nPublisher Description\n\nWhat is manipulation, how is it used in our everyday lives, and why is it such a prevalent force in our society? Whether you consciously realize it or not, you use this tactic and have it used on you very often. Although some people have a negative association with the word, it isn’t always a bad thing, and can in fact help you a lot in life. Here are some of the concepts you will learn about in this book:\nAutomatic Mental Processes: Every single human on the planet has been conditioned to behave in certain ways as a response to particular stimuli. This is what makes us suggestible to influence and manipulation. Once you understand this process, you can use it to your benefit, and also to protect yourself from others.\n Positive vs. Negative Manipulation: There are different types of manipulation, some which are beneficial to all involved, and others which are harmful and detrimental. In this book, you will learn to tell the difference between the two.\n The Benefits of Positive Manipulation: Ethical manipulation, also known as persuasion or influence, is one of the most important social skills you can develop. When you master this, an entire new world opens up to you professionally, personally, and otherwise.\n Protecting yourself from Negative Manipulators: There are always people out there who try to prey on others and use them for their own benefit. Once you become aware of the tactics they use, and why, you can effectively protect yourself from this happening to you. When you know what to watch for, you will never fall victim to a person like this.\n\nApril 14\nRyan James\nDraft2Digital, LLC\n\nMore Books by Ryan James\n\nOther Books in This Series", "pred_label": "__label__1", "pred_score_pos": 0.9795552492141724} {"content": "why are local numbers coming up international instead\n\n\nMy daughter is having issues with making calls.  She tried to call someone yesterday that is local but came up you do not have international calling.  She tried again this morning, the same number came up the persons name, but number in Brazil.  Is this problem her phone, (iPhone 7) or Verizon?\n\nAny help is appreciated.\n\nLabels (1)\n\nRe: why are local numbers coming up international instead\n\nCommunity Manager\nCommunity Manager\n\nDamom111, I would be just as concerned with not being able to call out to local numbers as well. We are here to help assist with your daughter's phone. This issue likely stems from a phone setting, which is causing the device to not configure the number correctly. However, let's ensure we look at this from a few angles.\n\n\nDoes this only happen with one contact or all numbers that she dials. If she deletes that contact, and then adds them as a new contact does the same issue occur?\n\n\nJust in case, have her look into Settings > Phone > Dial Assist > Is this setting set to ON or OFF?\n\n\n\nFollow us on Twitter @VZWSupport\n", "pred_label": "__label__1", "pred_score_pos": 0.9291724562644958} {"content": "Sign In\nNot register? Register Now!\nEssay Available:\n6 pages/≈1650 words\nNo Sources\nLiterature & Language\nEnglish (U.S.)\nMS Word\nTotal cost:\n$ 21.6\n\nComparison Of Falling Into Place And The Perks Of Being A Wallflowers (Essay Sample)\n\n\nYou will have one major composition project in this course. You will write a comparison/contrast paper about our two novels (5-6 pages). You will incorporate evidence from the novels and from outside sources.\nThese two novels are Falling into Place and The Perks of Being a Wallflowers.\n\n\nDeath As Seen In Two Different Sets of Eyes\nCowardly. That's what they say about the act or even the thought of suicide. But how much do people really understand about its nature? Charlie and Liz, despite having very different personalities both struggle with thoughts of suicide among other pains associated with growing up. Charlie identifies as a “wallflower”, introverted and shy while Liz is a popular kid. But depression does not discriminate between popular kids and wallflowers. In Stephen Chbosky's The Perks of Being a Wallflower and Amy Zhang's Falling Into Place, both these young adults go through these excruciating moments in their lives. Stories like Liz' and Charlie's are important pieces of literature that would help in opening people's eyes to what it is really like to deal with such thoughts and perhaps, one day, end the stigma around it.\nTo start with, Charlie in The Perks of Being a Wallflower is introverted, shy, and quite unpopular while Liz in Falling Into Place is popular and well-respected. Charlie struggles, as any normal teenager does, in his journey to young adulthood but finds a few friends that he's comfortable with. He had a loving family except that one member of that trusted group of people abused him in his childhood. This trauma stayed with him for a long time and had been a major trigger or stressor for him toward the end of the story. It is easy to relate to Charlie if you are someone who has not always been understood by many. Liz, on the other hand appears to have it easy being the well-loved kid that she is. However, she also found herself in the hospital after an attempt to take her own life. Perhaps, one thing that is strikingly similar in both of these young people's worlds is loneliness. Both authors showed us the very nature of loneliness and that no matter what your current situation is, it can strike and strike hard.\nCharlie narrates his story by writing to a stranger about his attempts to “participate” in life which shows readers that this boy doesn't have a lot of people to talk to. Chbosky's style is so effective that one can feel precisely how lonely Charlie is. Like Charlie once wrote to the stranger in his diary, “I just need to know that someone out there listens and understands” (Chbosky, 9). While Falling Into Place is narrated in the third person perspective, we are given a clear view into Liz' struggles and pains despite the seeming glamour in her life. Zhang was very creative in her use of integrating theories in physics to capture her readers' attention and show how gravity, velocity, and acceleration among others have become part of and accentuated the story. \"She was tired. Gravity pulled at her more aggressively than usual” (Zhang, 177). Both stories have quite sad undertones but have been enjoyable to read because of the captivating storytelling. On the note of loneliness, perhaps both books can teach us that it is not true that loneliness only happens when one is alone. A person can be surrounded by lots of people and still feel lonely. This loneliness can drive one to extreme behavior even to the point of committing suicide, though we must be careful not to hastily point to only one reason why a person may have suicidal ideations. Suicide is not caused by only one thing, rather a combination of many issues internally and externally, one of which is loneliness. Certain studies have shown that emotional pains can sometimes be recognized by the brain as being similar to that of physical pains. The pain of losing a loved one registers in the brain as an extreme physical pain. This is why many people find themselves in a state of shock after a painful separation. “Social and physical pain might rely on overlapping neural processes” (Eisenberger, Lieberman, 298). Charlie feels that he is...\n\nGet the Whole Paper!\nNot exactly what you need?\nDo you need a custom essay? Order right now:\n\nOther Topics:\n\n • The Testimonies Produced In The Holocaust\n Description: One way the public received the testimonies produced in the period is through television and radio broadcast. For example, in the 1970s, a television miniseries titles Holocaust was broadcast in the United States, France, and also in Germany....\n • Nature Vs. Nurture: Influence Throughout The Lifespan\n Description: The debate on nature and nurture has been around the psychology field for a long time. Nature refers to the genes that influence the performance of a person while nurture refers to the environmental variables in life....\n • Reading Strategies: Which Reading Strategies Would Work Best for You?\n Description: What have your reading strategies been like? How can you improve? Which reading strategies would work best for you?...\nNeed a Plagiarism Free Essay?\nSubmit your instructions!", "pred_label": "__label__1", "pred_score_pos": 0.8480144739151001} {"content": "The Crystarium is a city of the First reflection of Hydaelyn from Final Fantasy XIV: Shadowbringers. It serves as the new hub city for players in the expansion.\n\n\nA bustling city that developed around the Crystal Tower in the years following its sudden appearance in Lakeland. It serves as a safe haven for people of all races and creeds as they join hands in the struggle against the merciless sin eaters.\n\nLandmarks and servicesEdit\n\n\nMusical themesEdit\n\n\n\n • The Crystarium is a near identical recreation of the unnamed city that first appeared in the Rapture demo from 2005.", "pred_label": "__label__1", "pred_score_pos": 0.6989473104476929} {"content": "Tree of Savior Forum\n\nBackmasking - Cast Animation\n\nConsidering Backmasking’s main use it to Rewind magic circle duration, i suggest making backmasking animation and effect be almost instantaneous.\n\nRight now it takes slightly more than 1 second to be cast, and considering the entire skill is meant to be used to rewind duration of magic circles when they are about to expire, being able to use it on the very last moment to double the duration would feel more amusing and meaningful than having to use it 1-2 seconds beforehand just because the animation takes too long.\n\nThanks for your attention.", "pred_label": "__label__1", "pred_score_pos": 0.9817811250686646} {"content": "Low Blood Pressure Home Remedies\n\nSubmitted by Thiruvelan on Tue, 06/20/2017\nHypotension Home Remedies\n\nRaise your blood pressure without medication, using these effective home remedies to improve your low blood pressure.\n\n10 Effective Home Remedies for Low Blood Pressure\n\n 1. Raisins are a traditional remedy excellent for treatingac hypotension. Soak 30 to 40 raisins in a cup of water overnight. Eat them first in the morning on an empty stomach. You can discard the water in which the raisins soaked, because raisin skin may have pesticide residues. You can additionally soak two to three dates for improved efficiency.\n 2. Almonds milk is another traditional home remedy for low blood pressure. Soak five to seven almonds in water overnight. In the next morning, peel off the skin, grind it with water and drink a cup of this nut milk every morning to prevent your blood pressure from falling. It is rich in Omega-3 fatty acids.\n 3. Holy Basil or Tulsi is beneficial for low blood pressure by help balancing the mind and reduces stress. Additionally, Tulsi leaves are rich in potassium, magnesium, and vitamin C, which help to regulate your blood pressure. Chew four to five Tulsi leaves every morning.\n 4. Licorice root is a popular home remedy to normalize your low blood pressure caused by low cortisol level. It helps increase cortisol by blocking the enzyme that breaks down cortisol. Additionally, it supports healthy adrenalin function. Licorice tea recipe: Steep one teaspoon of licorice powder in a cup of boiling water for about five minutes. Alternatively, you have 400 to 500 mg of licorice root capsules per day.\n 5. Beetroot Juice helps both low and high blood pressure. Drink a cup of raw beetroot juice twice daily improves your blood pressure (low as well as high). Other natural fruit juices are also helpful to improve your blood pressure.\n 6. Rosemary is useful in normalizing your low blood pressure by stimulating the central nervous system and improve circulation. Take up to 10 ml of rosemary tincture per day. Alternatively, for aromatherapy benefit, you can add three to four drops of rosemary essential oil in your diffuser.\n 7. Carrot Juice is an easy way to improve low blood pressure. Wash the 3 to 4 fresh carrots, peel & chop it, use a blender to blend it into a smooth juice along with two teaspoons of honey or raw sugar and drink it twice daily in the morning & evening.\n 8. Lemon Juice is useful for low blood pressure, especially if the cause is dehydration or poor digestion. It energizes your body by stimulating the liver and digestion. Squeeze ½ lemon in a glass of water, add a pinch of salt, add 1 or 2 teaspoons of raw honey, and drink for the first time in the morning.\n 9. Ginger is useful for both low and high blood pressures. Ginger has anti-oxidant, anti–clotting, anti–spasmodic, and anti–inflammatory property that stimulates your blood circulation and improves blood pressure. Wash an inch of ginger, peel the skin, grated it, boil with a cup of water, taste it with a spoon of honey or raw sugar and ½ lemon, and drink it twice in the morning and evening.\n 10. Siberian Ginseng is an adaptogen, which helps strengthen your body and increase your resistance to stress. Siberian ginseng is useful for heart problems, high blood pressure, and low blood-pressure problems. Take 1 to 2 teaspoons of sliced Siberian ginseng root, boil it with a cup of water, steep for about 15 minutes, strain the liquid, sweeten with raw sugar, and drink twice daily.\n\nIt’s important to keep your blood pressure at a healthy range. Unfortunately, there is no quick fix for hypotension. Support these natural home remedies by changing to low blood pressure lifestyle choices that help improve low blood pressure.", "pred_label": "__label__1", "pred_score_pos": 0.5925416946411133} {"content": "Earl Finkler\n\nThere is a new book out about a fairly long-standing psychological disorder for American veterans: “The Evil Hours. A Biography of Post-Traumatic Stress Disorder.” \n\nThe author—former Marine and journalist David J. Morris—says the disorder has likely been around since the Civil War and World War I, but then it was just thought of as cowardice. \n\nBut then a group of Vietnam vets opposed to the war started speaking up and demanded more attention and treatment for PTSD. “Without them, PTSD as we know it would not exist,“ Morris writes.\n\nWhat is it? According to the book, it is “a condition characterized by hyper arousal, emotional numbness and recurring flashbacks.” Also that it is “a complex condition that affects the entirety of a person’s life and social support system.”\n\n“Why does the world seem so different since I got back from Iraq?” he asks. “Why do I feel so out of place now? What does one do with the knowledge gleaned from a near-death experience?”\n\nHe talks about how soldiers in combat try to deal with a life-threatening situation—through dissociation. They told him, “It was like I was watching a movie.”\n\nEventually, trauma becomes routine: “As long as we exist, the universe will be scheming to wipe us out,” he wrote, explaining a PTSD mind-set. Even now, back home, he still has difficulty taking a shower, getting into an elevator, or going somewhere there is smoke.”\n\nThe difficulties he describes with PTSD are widespread, he said. “According to the latest estimates, nearly 8 percent of all Americans—twenty-eight million people—will suffer from post-traumatic stress at some time in their lives.”\n\nAccording to the Veterans Administration, which spends more annually on PTSD than any organization in the world, PTSD is the number-one health concern of American military veterans, regardless of when they served.”\n\nAnd how will Morris keep going? I had a chance to interview him recently, and he outlined his philosophy:\n\n“To fully appreciate the joys of this world one must understand how temporary they are and how fragile human existence is.”", "pred_label": "__label__1", "pred_score_pos": 0.6916205883026123} {"content": "The ability to escape one's world is something we all long for from time to time, and as a child he did exactly that, through the medium or art and drawing.\n\n\nDuncan's parents always supported his interest, bough him plenty of materials and gave him books and stories about fantasy worlds. These books filled his imagination with ideas and the belief that he could create such worlds by drawing them, it still influences him today. The pencil was what he stopped on. His mind began to wonder even more after discovering the ability to make patterns and shapes far more detailed, and so for years to come that is all he remembers using.\n\n\nHe discovered watercolour after years of fearing the technique, when he was 15. His art teacher coached him and built up his confidence in using this approach. While at school he was a minimalist when it came to studying, even with the subject of art and learning about other artists, but maybe it helped him try and see what he could do without being inspired by other artists.\n\n\nHis mind just seemed to inspire itself.\n\n\nHe left school, a young man with just two minor art related qualifications, and his hope to make a living through art felt weak. Nearly 20 years later he's picked up a paintbrush once again and he loves it more than ever. He likes his paintings to be like molecules in the human body, where every single cell of the subject has an important part to play. In lots of ways, he feels like what and how he paints nowadays perfectly depicts the moment he transitioned the transition from pencil to his first brushstroke how he felt then and how he feels now.\n\n\n\n\nSee more of Duncan's work here.", "pred_label": "__label__1", "pred_score_pos": 0.9750458598136902} {"content": "Filing a Civil Suit Against Police\n\nfiling a civil suit against police\n\nA police officer’s job is important for preserving law and order in any given community. Law enforcement officers in Orlando have a duty to protect and serve the city’s residents, and in the course of their duties face unpredictable and sometimes threatening situations. Encounters between police officers and citizens can be highly stressful, particularly when citizens are caught breaking the law or being pursued in connection to a crime. Sometimes, police officers trying to get a situation under control go too far.\n\nPolice misconduct is a growing concern amongst communities nationwide. A person who has been hurt during a police encounter may have grounds for a civil suit against police who take matters into their own hands. Victims of excessive force may also hold officers accountable for hurting them. If you believe you may have a claim against law enforcement officers in Orlando, be sure to discuss your case with an attorney.\n\nUnderstanding Police Misconduct and Excessive Force\n\nInstances of police misconduct, which may include the excessive use of force, can cause unnecessary physical and emotional damage. An officer commits misconduct when he or she violates a citizen’s civil rights during the course of his or her duties. The use of excessive force occurs when police use more than the minimum amount of force necessary to protect themselves or others from harm.\n\nInstances of police misconduct, of which excessive force is one example, are grounds for a civil suit against police officers. Law enforcement personnel may also be held accountable if they cause an accident or commit another negligent act that causes a person to sustain an injury. A competent personal injury lawyer who understands the necessary process to pursue a claim against government officials can help you determine the appropriate course of action to receive justice.\n\nWhat is a “Notice of Claim?”\n\nIf you decide to pursue a civil suit against a police officer or department for a personal injury claim, you must first notify them. A notice of claim is a tort claim that lets the police officer or department against whom you seek to file a claim that you will be pursuing legal action in regards to your incident. This notice provides the details of your accident, injuries, and request for damages.\n\nSometimes, the police or government agency responsible for your injury attempt to settle the matter with a monetary offer. Individuals offered a settlement should discuss the award with their attorneys before accepting any offers. Remember, the police are looking out for their own best interests and want to resolve your matter as quickly as possible.\n\nStandard of Proof for Injury Claims Against Police Officers\n\nThe standard of proof for injuries incurred from a police encounter are no different from that of any other injury claim. To demonstrate that an officer is responsible for your injury, you must show:\n\n 1. The officer had a duty of care\n 2. The officer failed to meet the duty of care\n 3. Your injury was a direct result of the officer’s failure to abide by the duty of care\n\nIt may be more difficult to hold a police officer responsible for his negligence simply because police officers have some leeway in their performance of their duties. If the officer was acting within the normal scope of his or her responsibilities when you got hurt, he may not be liable for your injuries.\n\nOther Actions You May Take Against Police\n\nAside from pursuing a claim against an individual police officer in Orlando, you may need to file a complaint with the police department he or she works for and a report with the state Attorney General or the Department of Justice. It might be beneficial or even necessary to take these actions before pursuing your personal injury claim. Talk to your personal injury lawyer before filing a claim so you can pursue the best course of action.\n\nIf you have been hurt by a police officer in Orlando, you have the right to hold him or her accountable for going beyond the call of duty and causing you pain and suffering. You have the right to pursue compensation for your injuries. Contact the Umansky Law Firm to work with an attorney who has considerable experience filing government injury claims. Call (407) 228-3838 at any time.", "pred_label": "__label__1", "pred_score_pos": 0.9739097356796265} {"content": "As we near the end of the death march between Labor Day weekend and Thanksgiving break, motivation is at its lowest (just when we need it to be at its highest, of course.) Like many students, I find my ways of prolonging the time between study sessions. This week is one of those weeks when it's both a blessing and a curse to have not one, but two musical instruments (aka homework distractions) in my dorm room. Neither my piano skills nor my GPA are perfect, but hey, here's to procrastination.", "pred_label": "__label__1", "pred_score_pos": 0.9927812218666077} {"content": "\"Non-Zero Sum Game Graphs: Applications to Reactive Synthesis and Beyond\"\n\nReactive systems are computer systems that maintain a continuous interaction with the environment in which they operate. Such systems are nowadays part of our daily life: think about common yet critical applications like engine control units in automotive, plane autopilots, medical devices,… Clearly, any flaw in such critical systems can have catastrophic consequences. Yet, they exhibit several characteristics, like real-time constraints, concurrency, parallelism, etc., that make them difficult to design correctly.\n\nTo ensure the design of reactive computer systems that are dependable, safe and efficient, researchers and industrials have advocated the use of so-called formal methods, that rely on mathematical models to express precisely and analyse the behaviours of those systems. A very popular formal method is model checking: it amounts to comparing a model of a system to its specification in order to find design errors early in the development cycle.\n\nAnother challenging method, called synthesis, is to propose techniques (models, algorithms and tools) that, given a specification for a reactive system and a model of its environment, compute (synthesise) a correct system, i.e., one that enforces the specification no matter how the environment behaves.\n\nThe synthesis problem is the central topic of this project, driven by the Verification and formal methods’ team (Computer Department, Faculté des Sciences).\n\n\nJean-François Raskin\nVerification and formal methods’ team\nFaculty of Sciences\n\nCreated on August 31, 2018", "pred_label": "__label__1", "pred_score_pos": 0.9705138206481934} {"content": "Natural Resources Of Bulgaria\n\nCoal, petroleum, and natural gas are some of the natural resources of Bulgaria.\n\n\nRead more about\n\nBulgaria is a European nation that spans an area of roughly 42,855 square miles and it is one of the top 100 economies globally. In 2017, the Bulgarian gross domestic product was ranked 74th in the world while its per capita gross domestic product was the 63rd highest in the world. The Bulgarian economy is classified as an open economy with the private sector playing a huge role in the country's economic success. Bulgaria's economy has undergone intensive reformation since the 1940s when the country was mainly dependent on agriculture. To reduce the reliance on arable land, the Bulgarian government focused on the development and exploitation of other natural resources such as forests, minerals, and fish.\n\n\nBulgaria has been blessed with a variety of mineral resources, ranging from iron ore to copper, that was mainly developed during the communist era. After the period ended, the mining industry in Bulgaria began to lose in significance which led to several significant deposits being left unexploited. The decline of Bulgaria's mineral sector has been attributed to several factors primarily the lack of sufficient capital to purchase modern machinery. The Bulgarian government estimated that during the early 21st century, the mining industry only contributed 2% to the country's gross domestic product each year. \n\n\nOne of Bulgaria's most essential minerals is coal. It has vast deposits of the mineral mainly situated in its western region. Geological data indicated that most of the coal in Bulgaria is lignite, a coal variety with lower heat content than other coal varieties. The Bulgarian government estimates that the nation has close to 4.5 billion tons of lignite most of which, close to 70% according to some estimates, is situated in the Maritsa Iztok Coal Basin. The rest of Bulgaria's lignite is situated within the Lom coalfield and the Sofia Coal Basin. Apart from lignite, Bulgaria also has significant deposits of anthracite, the most valuable coal variety due to its high heat output, which is estimated to be around 1.2 billion tons. Bulgaria is unable to exploit its vast anthracite resources because they are located in extremely inaccessible areas. Bulgaria also has roughly 800 million tons of brown coal spread out all over the country in regions such as Bobov Dol and Pernik.\n\n\nWater is one of Bulgaria's most important natural resources since it is used in energy generation. Some of the Bulgarian rivers used for hydropower generation include the Krka River, the Arda River, and the Vacha River. In 2010, according to statistics from the Bulgarian government, hydroelectricity accounted for close to 10% of the electricity used in Bulgaria. Fifteen hydroelectric power stations, all operated by a state agency, provided close to 95% of all the hydropower used in Bulgaria.\n\n\nThe Bulgarian people also consider wind to be one of their most important natural resources. Several experts from the European Union believed that Bulgaria has great potential to be a leading producer of wind energy. Bulgaria's wind energy sector experienced significant growth from 2004 to 2012, but since that time it has stagnated.\n\nNatural Gas\n\nAccording to geological surveys, Bulgaria is believed to have 17 trillion cubic feet of natural gas. It is thought that Bulgaria's reserves could satisfy the country's demand for natural gas for almost 100 years. There are several major fields of natural gas in Bulgaria such as the Chaika, Izgrev and Deventsi gas fields. The Chaika field is one of the country's youngest offshore gas fields as PetroCeltic discovered it in 2013. The Chaika field is believed to contain nearly 0.55 cubic miles of natural gas. PetroCeltic also discovered the Izgrev offshore field in 1993. The Izgrev field has been proven to have 1.89 cubic miles of natural gas.\n\n\nApart from natural gas, Bulgaria also has vast deposits of oil with some estimates indicating that the nation could have 200 million barrels of oil. The Bulgarian government, seeking to replicate the success of several neighboring states, invited several countries to explore oil within its territorial waters and in 2016, the company Total discovered deposits of oil within the Black Sea. To properly explore the oil field, the company planned to drill two wells. In 2018, another company discovered oil while drilling within the Bulgarian section of the Black Sea.\n\n\nThe World Bank estimated that forests covered roughly 35.22% of Bulgaria's total land area in 2015. Since 2004, when the nation's forest cover was approximately 33%, the amount of forested land in Bulgaria has been increasing gradually. The increase in the forested area was due to a concerted effort by the Bulgarian people to raise the country's forest cover. The Bulgarian forests are of great ecological significance since they provide habitats to more than 500 unique animal species. Roughly 5% of the animals that live in Bulgaria are considered threatened.\n\nArable Land\n\nFrom 2004 to 2010, the amount of land devoted to agriculture in Bulgaria declined gradually, but from 2010 to 2012 the amount of agricultural land has increased. The Bulgarian government estimated that in 2016, the agricultural sector contributed 5% of the country's gross domestic product. The Bulgarian labor department estimated that approximately 7% of the country's population was employed in the agriculture sector.\n\n\n\nYour MLA Citation\n\nYour APA Citation\n\nYour Chicago Citation\n\nYour Harvard Citation\n\n\n\nMore in Environment", "pred_label": "__label__1", "pred_score_pos": 0.8853810429573059} {"content": "Project Description\n\nForests have played a crucial role in the development of human culture. The word forest, deriving from the old Latin word ‘foris’, literally means ‘outside’, or outside of human civilization. It is this exteriority that has made the forest a particularly fertile ground for our myths and our stories to grow and evolve. Not only have forests provided raw materials for our constructions, they have also contributed to the development of our culture: “From the family tree to the tree of knowledge, from the tree of life to the tree of memory, forests have provided an indispensable resource of symbolization in the cultural evolution of humankind” (Harrison, 8). Yet despite this deep cultural connection, we continue to have an unbalanced, parasitic like relationship with nature, where we treat trees and natural elements simply as raw material in support of our infrastructure, lives, and cultural development.\n\nA subtle shift in perspective has taken place in recent years, that suggests a renewed recognition of the liveliness of trees and of our obligation to protect the rights of the forest. Scientific discoveries have proven that trees are living beings, are highly social, have families, can learn, and can even communicate with each other (Wohlleben, 7). In New Zealand in 2014, the Te Urewera Act was passed, granting legal personhood to the national park of the same name. In the same country in 2017, parliament passed the Te Awa Tupus (Whanaganui River Claims Settlement) Bill, which conferred a legal personality to the Whanganui River. This bill guaranteed the river’s ‘personhood’ and along with it the same rights and responsibilities as a person. The government did this as a solution to a land dispute with local indigenous peoples, but in offering this formal recognition of life it also provides a strong rationale for changing our relationship with natural resources on this planet, and to reconsider how we consume them. If we begin to ‘see’ and ‘understand’ the sentience of the ecosystem of a forest, perhaps then we might begin to realise the necessity of protecting them as valuable individuals. \n\nForesta Inclusive is a technologically (Internet) connected indoor and outdoor art installation that links the ecosystem of a forest through a sculptural sensor hub, to an art installation within a gallery. This project proposes to make perceptible to the human senses, the slow and subtle movements of trees and surrounding ecology, in order to find ways to create a context for in-gallery human/forest interaction and collaboration. This work is not meant to replace real life experiences within a forest, but rather to materialize the often-invisible life movements of the forest and to use technology as a tool to give voice to nature within a human cultural space. Foresta Inclusive is a work-in-progress and therefore includes the continued development of three main conceptual/practical components:\n\nPhysical connection to the forest: During the Ayatana residency entitled ‘Germinate’, which involved connecting artists with scientists and other plant specialists in Gatineau (QC) in June 2019, I identified the visual metaphor I wanted to work with for this project. I am interested in shifting the relationship between human/technology/culture and the ecosystem of the forest, from a parasitic type relationship, to one that is mutualistic or commensalistic. A mutualistic relationship is where both parties benefit from the interaction, such as protozoa in the stomach of a termite, which digests the consumed wood in the termite’s stomach, allowing them to get nutrients and sustenance and in turn the termite offers a safe place for the protozoa to live. A commensalistic relationship is where one-party benefits, and the other is not affected, such as orchids that grow on trees. It is clear that human/culture/technology needs nature, but what does nature need from us? Perhaps it needs us to recognize its ‘aliveness’, and therefore embrace the ethical implications that comes from that recognition.\n\nHistorical/Contemporary Data Collection: For this project I will collect live data from a forest and also historic climate data from the same geographic location using dendrochronological studies. Dendrochronology is the scientific method of dating tree rings by using core samples taken from live trees or wooden constructions made from old timber. Data collected using this method can also provide historic information about the climate and atmosphere, so for example we can learn if there was a drought in 1652. As a co-investigator in a Social Sciences and Humanities Research Council Partnership Grant ‘Environments of Change’, based at the University of Waterloo, I have access to the forest at Herstmonceux Castle in East Sussex, UK and also the scientists, climatologists and historians affiliated with the project. While this forest is relatively young, I will have access to historical climate data dating back to medieval times given the age of the wooden structures of the area. For collecting the live data, I am developing a solar powered sculptural sensor hub, comprised of a number of sensors (temperature, particulate, humidity) and a GSM enabled microcontroller that connects to the Internet remotely. This system will send real-time data to the Internet of Things platform Shiftr.io, which is essentially an enabling protocol that lives on-line, linking the connected sensors with the user application, in this case the artwork in gallery.\n\nMaterialization of collected data: On the gallery side, I will materialize this data in the form of an installation comprised of light, sound, projection and objects. This part of the project is unmaterialized as of yet, except for a number of small prototypes. I will use the historic/live data to create an atmosphere within a gallery, but also create an experience, where the movement of the viewer body can explore the historic and lived realities of the ecosystem of the Herstmonceux forest.", "pred_label": "__label__1", "pred_score_pos": 0.9997122287750244} {"content": "Chendebji Chorten\n\nSituated between Trongsa and Bumthang, the uniquely beautiful Chendebji Chorten is a welcome sight as you near the heart of central Bhutan. Built in the style of Boudhanath Stupa of Nepal, this spectacular stupa is set up perfectly against the lush green surroundings and appears to ceremoniously observe everything in its vicinity.\n\nIt was built in the 18th Century by Lama Zhida to suppress the remains of an evil spirit known as Ngyala Dhuem, a renowned Bhutanese folklore figure. Locals still talk of the chill that runs down their spine every time they are near this Chorten, a testimony to the rich culture of storytelling that still exists in Bhutan.\n\nChendebji Chorten is believed to stand on the meeting point of three ridges with that of the three edges of the sky. It is a popular lunch spot for tourists and locals with a restaurant situated a few meters away.", "pred_label": "__label__1", "pred_score_pos": 0.9899283647537231} {"content": "С Новым 2016 годом!\n\nMy Dear Students!\n\nAs 2015 comes to an end, I wanted to take this time to reflect on the year and look forward to what lies ahead.\n\nFirst and foremost I would like to thank you all for your hard work, dedication and results. You are all great. The passion and heart you bring to work daily truly makes a difference. I am confident in saying that you have gained a lot in 2015; not only the knowledge but also plenty of memorable experiences.\n\nI am proud to have provided new information, interesting classes and satisfaction. Thank you for allowing me to continue doing what I love – making dreams come true! If I can continue to do this, these is nothing else I require. Looking forward to seeing you all in 2016!\n\nMay 2016 bring all good health, joy and peace.\n\nHappy New Year!", "pred_label": "__label__1", "pred_score_pos": 0.9581373333930969} {"content": "MayurPatel's picture\n\nHi, we have reports that produce model graphics in excel spreadsheets. The problem we find is that some models are not clear therefore we cannot read the contents or share with users.  In some cases, we are able to right-click on an image in excel and then edit the picture to change it to emf format. This resolves the issue in some cases but affects other formatting elements.\n\nWe've changed the formats from xls to xlsx and that doesn't resolve the problem. Our code also tries to use twips to determine the size of the image in terms of row and column counts and I'm unsure if that is the cause of the blurriness.\n\nI've also asked our Software AG representative to log an Empower call for assistance but I thought that someone here may have resolved this issue already.\n\nAny assistance would be appreciated?", "pred_label": "__label__1", "pred_score_pos": 0.9929289221763611} {"content": "Presented By O’Reilly and Intel AI\nPut AI to work\nSep 4-5, 2018: Training\nSep 5-7, 2018: Tutorials & Conference\nSan Francisco, CA\n\nSchedule: Transportation and Logistics sessions\n\nDanny Lange (Unity Technologies)\nAverage rating: ****.\n(4.67, 3 ratings)\nDanny Lange discusses the role of intelligence in biological evolution and learning and demonstrates why a game engine is the perfect virtual biodome for AI’s evolution. You'll discover how the scale and speed of simulations is changing the game of AI while learning about new developments in reinforcement learning. Read more.\nImplementing AI\nLocation: Imperial B\nShaoshan Liu (PerceptIn)\nAverage rating: ***..\n(3.00, 1 rating)\nShaoshan Liu explains how PerceptIn built a reliable autonomous vehicle with a total cost under $10,000. Read more.\nImplementing AI\nLocation: Imperial B\nCathy Wu (UC Berkeley)\nUsing novel techniques in model-free deep reinforcement learning and control theory, Cathy Wu explores and quantifies the potential impact of a small fraction of automated vehicles on low-level traffic flow dynamics, such as congestion on a variety of important traffic contexts. Read more.\n4:50pm-5:30pm Friday, September 7, 2018\nAI in the Enterprise\nLocation: Continental 1-3\nRamzi Roy Labban (Consolidated Contractors Company (CCC))\nAverage rating: *....\n(1.00, 1 rating)\nEstimating the performance of heavy earth-moving equipment on large construction projects is a complex task that can be riddled with uncertainty. Ramzi Roy Labban details how CCC uses machine learning, leveraging large datasets of actual performance of trucks on construction sites, to more accurately predict future performance and allow the company to make realistic performance assumptions. Read more.", "pred_label": "__label__1", "pred_score_pos": 0.897608757019043} {"content": "802 Hits\n\nDownload APK\n\nAdvanced notebook - keeper of personal information (accounts passwords pin codes credit cards details etc.) and attachments in encrypted form:\n- encryption AES-256 for body of notes and attached files optional by each note (the name of the notes is not encrypted!)\n- attachements (the files will encrypted if enabled encryption for note)\n- edit attached files (text and html)\n- folders: unlimited nesting (only in full version)\n- formatting text ( bold underline color font-size e.t.c. )\n- fingerprint scanner\n- autolock by time\n- widgets and shortcuts on homescreen for notes or attached files\n- icon library (you can upload youself icons)\n- color themes\n- backup/restore database (local memory or google drive)\n- reminders\n- labels\n- builtin viewers pictures text html pdf\n- builtin editors pictures(crop rotate resize) text html\n- does not contain advertising\n\n\nQR code", "pred_label": "__label__1", "pred_score_pos": 1.0000090599060059} {"content": "University of Wisconsin: Simulating complex catalysts key to making cheap, powerful fuel cells\n\n\n“Understanding reaction mechanisms is the first step toward eventually replacing expensive platinum in fuel cells with a cheaper material,” says Manos Mavrikakis, a UW-Madison professor of chemical and biological engineering.\nMavrikakis and colleagues at Osaka University in Japan published details of the advance Monday, Aug. 8, in the journal Proceedings of the National Academy of Sciences (“Ab initio molecular dynamics of solvation effects on reactivity at electrified interfaces”).\n\n\nMethanol Molecules\nModeling how methanol interacts with platinum catalysts inside fuel cells in realistic environments becomes even more complicated because distances between the atoms can change as molecules dance near the charged surface. (Image: Manos Mavrikakis)\n\nFuel cells generate electricity by combining electrons and protons — provided by a chemical fuel such as methanol — with oxygen from the air. To make the reaction that generates protons faster, fuel cells typically contain catalysts. With the right catalyst and enough fuel and air, fuel cells could provide power very efficiently.\n\n\nSomeday, fuel cells could make laptop batteries obsolete. Mere tablespoons of methanol could potentially provide up to 20 hours of continuous power. But alternatives to the expensive platinum catalyst in today’s fuel cells haven’t emerged because scientists still don’t fully understand the complicated chemistry required to produce protons and electrons from fuels.\n\n\nAnd finding a good catalyst is no trivial task.\n\n\n“People arrived at using platinum for a catalyst largely by trial and error, without understanding how the reaction takes place,” says Mavrikakis. “Our efforts developed a big picture of how the reaction is happening, and we hope to do the same analysis with other materials to help find a cheaper alternative.”\n\n\nAt first glance, the chemistry sounds straightforward: Methanol molecules awash in a watery milieu settle down on a platinum surface and give up one of their four hydrogen atoms. The movement of those electrons from that hydrogen atom make an electric current.\n\n\nIn reality, the situation is not so simple.\n\n\n“All of these molecules, the water and the methanol, are actually dancing around the surface of the catalyst and fluctuating continuously,” says Mavrikakis. “Following the dynamics of these fluctuating motions all the time, and in the presence of an externally applied electric potential, is really very complicated.”\n\n\nThe water molecules are not wallflowers, sitting on the sidelines of the methanol molecules reacting with platinum; rather, they occasionally cut in to the chemical dance. And varying voltage on the electrified surface of the platinum catalyst tangles the reaction’s tempo even further.\n\n\nPreviously, chemists only simulated simplified scenarios — fuel cells without any water in the mix, or catalytic surfaces that didn’t crackle with electricity. Unsurprisingly, conclusions based on such oversimplifications failed to fully capture the enormous complexity of real-world reactions.\n\n\nMavrikakis and colleagues combined their expertise in two powerful computational techniques to create a more accurate description of a very complex real environment.\nThey first used density functional theory to solve for quantum mechanical forces and energies between individual atoms, then built a scheme upon those results using molecular dynamics methods to simulate large ensembles of water and methanol molecules interacting among themselves and with the platinum surface.\nThe detailed simulations revealed that the presence of water in a fuel cell plays a huge role in dictating which hydrogen atom breaks free from methanol first — a result that simpler methods could never have captured. Electric charge also determined the order in which methanol breaks down, surprisingly switching the preferred first step at the positive electrode.\n\n\nThis type of information enables scientists to predict which byproducts might accumulate in a reaction mixture, and select better ingredients for future fuel cells.\n“Modeling enables you to come up with an informed materials design,” says Mavrikakis, whose work was supported by the Department of Energy and the National Science Foundation. “We plan to investigate alternative fuels, and a range of promising and cheaper catalytic materials.”\n\n\nThe results represent the culmination of six years of effort across two continents. Jeffrey Herron, the first author on the paper, started developing the methodologies during a summer visit to work under the paper’s second author, Professor Yoshitada Morikawa in the Division of Precision Science & Technology and Applied Physics at Osaka University.\nHerron, who completed his doctorate in 2015 and is now a senior engineer for The Dow Chemical Company, further refined these approaches under Mavrikakis’ guidance over several subsequent years in Madison.\n“A lot of work over many years went into this paper,” says Mavrikakis. “The world needs fuel cells, but without understanding how the reaction takes place, there is no rational way to improve.”\nSource: University of Wisconsin-Madison\n\nRead more: Simulating complex catalysts key to making cheap, powerful fuel cells\n\nGenesis Nanotech Headlines Are Out!\n\n\nVisit Our Website:\n\nVisit/ Post on Our Blog:\n\n\n\n\n\n“Nanotechnology: Understanding How Small Solutions Drive Big Innovation.”\n\n\n\n\n\n\nSubcommittee Examines Breakthrough Nanotechnology Opportunities for America\n\nJuly 29, 2014\n\n\n\n\n\nApplications of Nanomaterials Chart Picture1\n\n\n\n\n** Follow us on Twitter at: @Genesisnanotech1x2 logo sm\n\n** ‘Like Us’ on Facebook\n\n\n\n\n– See more at:\n\nMolecular Dynanmics: Visualizing the Invisible\n\nPalladium Nano id36700\n\n\n\nHe knows what the atoms in his starting nanoparticles look like. He knows their motion follows the laws of Newtonian physics. His colleagues have seen what the resulting particles look like after collision experiments. Once his simulation is complete, Grammatikopoulos compares his end products with his colleagues to check his accuracy. Grammatikopoulos most recently simulated how palladium nanoparticles interact, published in Scientific Reports on July 22, 2014 (“Coalescence-induced crystallisation wave in Pd nanoparticles”).\n\n\nsimulation of palladium nanoparticles colliding at different temperatures\n\nGrammatikopoulos simulated two palladium nanoparticles colliding at different temperatures. The hotter the temperature, the more homogenous the resulting product, and the further the atoms in the particle crystallize. (click on image to enlarge)\n\n\n\nPalladium Crystallization at 300K. Grammatikopoulos created this simulation of palladium nanoparticles colliding at 300 Kevin, or about 27 degrees Celsius. The nanoparticles meet, then fuse, then crystallize in orderly planes.\n\n\n\nPalladium Crystallization at 1000K. Grammatikopoulos created this simulation of palladium nanoparticles colliding at 1000 Kevin, or about 727 degrees Celsius. At this hot temperature, the nanoparticles meet, fuse, and crystallize, forming one large homogenous product.\n\nSource: By Poncie Rutsch, Okinawa Institute of Science and Technology", "pred_label": "__label__1", "pred_score_pos": 0.6682061553001404} {"content": "A comment on the key concepts of the theory of ayer\n\nIntroduction One of the major claims made regarding qualitative methods is that they diverge from scientific explanation models in terms of the need for hypothesis testing. A scientific hypothesis is based on a background theory, typically assuming the form of a proposition whose validity depends on empirical confirmation. Otherwise, a hypothesis is nothing but an imaginative conjecture.\n\nA comment on the key concepts of the theory of ayer\n\nContact Author There were philosophers before Plato but they mostly served as tutors for children of the rich. Plato was the first to ask many of the questions that philosophers would be obsessed with for the next couple thousand years. Plato and Socrates It is difficult to talk about Plato without talking about Socrates and it is difficult to talk about Socrates without talking about Plato.\n\nSocrates never wrote anything down and so a lot of our perception of who he was and what he thought comes from Plato. What we know of Socrates is mostly as a literary character. The legend about Socrates goes that the Oracle of Delphi proclaimed him the wisest man in all of Athens.\n\nConfused by this, Socrates went around and talked to all the men who he thought were wiser than he was. After talking to them and questioning them he found that their beliefs were full of contradictions and when he pointed this out to them they became upset.\n\nAfterwards, he came away with the belief that the oracle had been right. Socrates established the role of the philosopher to question everything. Because he constantly questioned the values of society, criticized politicians and proposed ideas that made the establishment nervous he was finally put on trial for corrupting the youth and for not worshipping the correct Gods.\n\nWith The Republic, Plato struck out on his own philosophical territory, and while it still has a literary structure with Socrates as our hero, we are seeing a systematic philosophy start to take hold for the first time. Early in the book Socrates encounters the character of Thrasymachus who insists that justice is the interest of the stronger.\n\nThis was a common viewpoint in ancient Greece.\n\nKey Concepts of John Rawls' Philosophy | Owlcation\n\nThis was a society that valued strength above everything else and it was Thrasymachus who held the view that it was acceptable to dominate others, lie, cheat and steal if one of strong enough to get away with it.\n\nA story we are given to illustrate this is the ring of Gyges. Gyges is given a ring that makes him invisible and the story is used to argue that no man would be just if he could commit unjust acts without being caught or punished.\n\nWhat Virtue Ethics states is that the reasoning of what is moral is determined by the person moral agent rather than by rules or consequences. These parts are reason, spirit and appetite. He argues that the human soul must have at least two parts in order to explain why we have so many psychological conflicts.\n\nIt could be seen that reason is our thinking ability to judge, spirit our emotional ability to feel empathy and appetite our desires but you will always have people who read the book and see it differently.\n\nThe point for Plato however, is that we need to balance these three parts of our souls in order to make good ethical choices. The whole point of being moral is to balance these three parts of us to keep us healthy and sane. Letting one take too much control of our minds is not good for us and leads to bad decisions.\n\nHis defenders point out that while it may seem that way to us today we must look at it in historical context. Plato was thinking of his ideal government as a city state and this is a relatively small area where those who did not approve of the government could move to another city state that they found less objectionable.\n\nPrivate families no longer exist and the social mobility of women is greatly increased because they are no longer expected to simply play the role of wife and mother.Books, Essays, Quotes, Interviews on W.\n\nV. Quine, mathematician and philosopher including list of books, articles, dissertations, essays, students, and travels.\n\nIncludes links to other Willard Van Orman Quine Internet resources as well as to other Family Web Sites by Douglas Boynton Quine. J. L. Mackie - Ethics~ Inventing Right and Wrong (, ) - Free ebook download as PDF File .pdf), Text File .txt) or read book online for free.\n\n\ntabula rasa) and behavior is shaped through positive reinforcement or negative reinforcement [2].\n\nA comment on the key concepts of the theory of ayer\n\nOct 07,  · Rawls is considered by many to be the most important political philosopher of the 20th Century and his landmark book, A Theory of Justice, is praised for having attempted to unite a lot of competing political theories that many had judged incompatible.\n\nIn the 19th century, political philosophy had split between the radical egalitarianism of Karl Marx and the concepts of personal liberty and Reviews: 5. This is a review of the concepts and common debates within ‘Theory of Change’ (ToC) material, resulting from a search and detailed analysis of available donor, agency and expert guidance documents.\n\npfmlures.com: An Introduction to the Philosophy of Science (): Rudolf Carnap: Books.\n\nConstructivism - Learning Theories", "pred_label": "__label__1", "pred_score_pos": 0.9645949006080627} {"content": "Skip to main content\n\n\nReduced Graphene Oxide/Carbon Nanotube Composites as Electrochemical Energy Storage Electrode Applications\n\nArticle metrics\n\n\nWe demonstrate an electrochemical reduction method to reduce graphene oxide (GO) to electrochemically reduced graphene oxide (ERGO) with the assistance of carbon nanotubes (CNTs). The faster and more efficient reduction of GO can be achieved after proper addition of CNTs into GO during the reduction process. This nanotube/nanosheet composite was deposited on electrode as active material for electrochemical energy storage applications. It has been found that the specific capacitance of the composite film was strongly affected by the mass ratio of GO/CNTs and the scanning ratio of cyclic voltammetry. The obtained ERGO/CNT composite electrode exhibited a 279.4 F/g-specific capacitance and showed good cycle rate performance with the evidence that the specific capacitance maintained above 90% after 6000 cycles. The synergistic effect between ERGO and CNTs as well as crossing over of CNTs into ERGO is attributed to the high electrochemical performance of composite electrode.\n\n\nIn the last decades, supercapacitors have been widely studied in order to meet the rapidly growing demands of new energy-device with high-power, high energy, high charge/discharge rates and long cyclic life [1]. Generally, activated carbon, carbon nanotubes, mesoporous carbon, nano-carbon have been investigated for use as electrodes in electrochemical double-layer supercapacitors. Besides, the pseudo-supercapacitors materials, conductive polymers and transition metal oxides, storing energy through a faradic process have been widely explored [2, 3]. Recently, graphene and its composites have attracted a wide range of research for the electrode material because of their large surface area, high carrier mobility, and excellent electrochemical stability [4,5,6]. As a one-atom thick layer of carbon atoms arranged in a honey-comb lattice, graphene is well-known for its high specific capacitance as energy storage applications [7, 8]. However, large area preparation of high quality graphene films as energy storage applications are still in challenges [9, 10].\n\nAs for preparation methods, mechanical exfoliation by sonication [11, 12], epitaxial growth on metal or silicon carbide [13, 14], chemical vapour deposition [15,16,17], and etc have been investigated extensively. Among these methods, the electrochemical reduction of graphene oxide (GO) has aroused great research interest in recent years due to its advantages, such as relatively simple, economic, manageable and eco-friendly [18,19,20,21,22]. However, the obtained pristine electrochemically reduced graphene oxide (ERGO) exhibits low specific capacitance result from their characteristic of easy agglomerate.\n\nPresentation of the hypothesis\n\nHerein, some tentative works have been demonstrated to prepare highly opened reduced graphene oxide (RGO) structure incorporated with other nanostructures, such as nanoparticles [23, 24], nanotubes [25] and nanowires [26, 27]. The well interaction between the components would result in good synergistic effect in these nanocomposites, which leads to excellent electrical and electrochemical performance. However, well dispersion of these nanostructures into RGO is still challenged due to the feasible preparing method and bad interaction between various components.\n\nTesting the hypothesis\n\nHere, we demonstrate an in situ electrochemical method to prepare high performance ERGO composites. The high conductive carbon nanotubes (CNTs) was added into GO sheets during the reduction process of GO.\n\nImplications of the hypothesis\n\nDue to the entangled framework of CNTs, it could be beneficial to reduce agglomerate of the GO sheets and the obtained ERGO shows more highly opened structures. Moreover, the excellent conductivity of CNTs would also beneficial to reduce the GO into ERGO with fast speed and more efficiently. With finely controlling of addition ratio, the obtained ERGO/CNTs nanocomposites show excellent electrical and electrochemical performance, which shows promising future as electrochemical energy storage electrodes.\n\n\nSynthesis of ERGO/CNTs\n\nThe GO was prepared from natural graphite flakes by modified Hummer’s method. An aqueous GO dispersion solution about 1.5 mg/ml was used to prepare composites, and the size of the GO sheet is controlled with less than 650 nm. The graphite flakes (XF055 7782-42-5) and a water solution of CNT (XFWDST01 1333-86-4) dispersion were also purchased from Nanjing XFNANO Materials Tech., Co., Ltd. All materials were used as received.\n\nFor the preparation of composite GO/CNT solution, the GO solution was firstly ultrasonicated in an electric-heated thermostatic water bath for 20 min at 40 °C. Then, CNT solution purchased from XFNANO was added into GO solution with the different mass ratios and continued to stir for 15 min. Subsequently, a spray-coating method was used to deposit GO and CNTs onto ITO substrate, and then, the substrate was treated in a vacuum oven at 60 °C for 2 h. Finally, the obtained GO/CNT films were put into an electrolytic tank, the GO was electrochemically reduced into ERGO, and an ERGO/CNT composite film was obtained. Electrochemical reduction of as-prepared GO/CNT films were carried out in a three-electrode system (CHI660D electro-chemical workstation, Chenhua, Shanghai, China) with a 0.5 M (pH 6.0) Na2SO4 aqueous solution as working electrolyte. A platinum disk and an Ag/AgCl electrode were used as the counter and reference electrode, respectively.\n\n\nThe electrical conductivity of ERGO and ERGO/CNTs was characterized by a four-probe testing system with a SZ-100 model (Baishen, Suzhou, China). FT-IR spectrum was characterized with an ALPHA analysis instrument (Germany). Surface morphologies of ERGO and the composite films were characterized by scanning electron microscopy (SEM) with a model Philips XL30-FEG. X-ray diffraction system (XRD, X’Pert Pro MPD DY129) and Raman spectroscopy (Advantage 633 nm) were used to investigate the crystallographic structure of the films. The cyclic voltammetry (CV) and galvanostatic charge/discharge curves (GCD) of composite films were also obtained from CHI660D electro-chemical workstation (Chenhua, Shanghai, China).\n\nResults and Discussion\n\nThe purpose about addition of CNTs into GO sheets is that the CNTs cannot only supply the entangled structure after the physical mixing to avoid the agglomerating of GO sheets but also improve the conductivity of composite GO/CNT films for fast reduction of GO into ERGO. Figure 1 shows the SEM images of ERGO and ERGO/CNT films electrochemically reduced from GO/CNT films with a different GO/CNT mass ratio. The obvious color change of composite films from faint yellow to deep black (as shown in the inset of Fig. 1b) indicates the successful reduction of GO into ERGO. From Fig. 1a, b we can see the entangled structure of CNTs and the ridge-like wrinkle structure of ERGO are exhibited in composite films. The CNTs have embedded in ERGO evenly after the physical mixing and electrochemical reduction. The embedded CNTs can protect the ERGO sheets from agglomerating effectively, and this wrinkled and entangled structure is able to offer higher surface area than pristine ERGO. This highly opened composite nanostructure is suitable for easily and sufficiently adsorbing electrolyte ions onto electrode surface during electric double-layer energy storage. Furthermore, with the increasing mass ratio of CNTs (as shown in Fig. 1c, d), more CNTs penetrate into ERGO as a support and an aggregated structure of CNTs are presented.\n\nFig. 1\n\nSEM images of ERGO (a) and ERGO/CNTs obtained from GO/CNTs with different mass ratios: b GO/CNTs = 100:1, c GO/CNTs = 50:1, and d GO/CNTs = 10:1; the inset images in (b) are photo pictures of GO/CNTs before and after electrochemical reduction\n\nThe functional groups of GO and ERGO are characterized by FT-IR spectrum, which are shown in Fig. 2. As for graphene oxide, the peak at 3424 cm−1 is ascribed to O–H stretch. The peaks at 1735 and 1629 cm−1 are a result from C=O stretch and aromatic C=C, respectively. The peak at 1222 cm−1 rises from O–H bending and the peak at 1052 cm−1 are ascribed to epoxy C–O stretch and alkoxy C–O stretch. These identified function groups by FT-IR spectrum indicates the oxygen-containing nature of GO. After an electrochemical reduction, the obviously weakened peaks in spectrum are 1735 and 1222 cm−1 [28], indicating the well elimination of these oxygen-containing groups.\n\nFig. 2\n\nFT-IR spectrum of GO and ERGO\n\nThe reduction process of GO is also confirmed by the change of conductivity of nanocomposites, as shown in Table 1. It can be seen that, firstly, the addition of CNTs into GO sheet has improved the electrical ability of GO/CNTs composites. With the addition ratio of GO to CNTs from 0 to 50:1 and 10:1, the electrical resistance of nanocomposite varies from a MΩ/sq. to a kΩ/sq. level. After the electrochemical reduction, an obvious enhancement of electrical conductivity is achieved in nanocomposite, indicating effectively reducing of GO into ERGO. The remarkable improvement in electrical conductivity of ERGO film is attributed to the elimination of the oxygen functionalities during the electrochemical reduction, and the symmetrical sp2 C=C bonds are rebuild for better transferring of carriers [20]. Accordingly, with the increasing of electrical conductivity, a more continuous and complete conducting path is formed in ERGO/CNT composite. The results in Table 1 also reveal that, after the electrochemical reduction, there is no distinct conductivity difference found between the ERGO and ERGO/CNTs nanocomposite, and this results indicate that the reduced ERGO exhibits a comparable electrical conducting ability with CNTs.\n\nTable 1 Electrical conductivity of GO and GO/CNTs with different mass ratios before and after electrochemical reduction\n\nThe structure change of GO after the electrochemical reduction is characterized by Raman spectra and X-ray diffraction analysis, which are shown in Fig. 3. From Fig. 3a, a D band at ~ 1345 cm−1 and a G band at 1583 cm−1, which are assigned to the disordered structural defects and the E2g phonon of sp2 carbon atoms [29], are presented, respectively. It is noted that the ERGO film exhibits a higher ID/IG ratio than the pristine GO film due to the decreased amount of defects after electrochemical reduction. The ERGO/CNT composite shows a lower ID/IG ratio than ERGO due to the addition of CNTs.\n\nFig. 3\n\na Raman spectra and b X-ray diffraction spectra of the pristine GO, ERGO, and ERGO/CNTs\n\nXRD patterns of GO, ERGO, and ERGO/CNTs also reveal the electrochemical reduction of GO into ERGO after the mixing with CNTs (as shown in Fig. 3b). As for GO, an additional peak at 10.3° is observed, which is attributed to the (001) diffraction peak of GO. The larger interlayer distance of GO nanosheets might be due to the existence of oxygen-containing functional groups on the sheet surface [30]. After the electrochemical reduction, the (001) diffraction peak of GO disappears and a broad diffraction peak (002) approximately 24.3° appears. The interlayer spacing of ERGO was 0.39 nm, slightly larger than that of graphite, which was resulted from the small amount of residual oxygen-containing functional groups or other structural defects. Besides the feeble and broad diffraction peak (002), the ERGO/CNTs also show a weak diffraction peak at 8.4°. We conclude that comes from the mixing of GO with CNTs, and this mixing structure leads to the shift of diffraction peak after electrochemical reduction of GO.\n\nThe electrochemical reduction process of GO and GO/CNTs are characterized by CV curves (as shown in Fig. 4). Both GO film and the GO/CNTs film are electrochemically reduced at the potential range from 0 to − 1.4 V in a 0.5 M Na2SO4 electrolyte solution (pH 6.0). Obviously, the cathodic peak appeared at about − 0.75 V during the first cycle results from the partial elimination of the major functional groups on the surface of GO sheets, such as epoxy, carboxyl, and hydroxyl [20]. It should be noted that, compared with the pristine GO film, the reduction process of the composite GO/CNT films is more rapid with the evidence that the GO/CNT film shows larger reaction current at the first cycle. Moreover, the GO/CNT films come to stable current with less reaction cycles, which means that the reducing process of GO in GO/CNTs is faster than that of pure GO at the same electrochemical conditions. We conclude that the high conductivity of CNTs improves the electrical ability of GO/CNTs, and the enhanced conductivity results in faster electron transferring between the electrode and GO/CNTs, leading to a faster reduction process of GO into ERGO.\n\nFig. 4\n\nElectrochemical reduction of a GO and b GO/CNTs (mass ratio 50:1) in 0.5 M Na2SO4 (pH 6.0) at a scan rate of 50 mV/s\n\nFigure 5 shows cycle voltammetry curves of ERGO and ERGO/CNTs electrochemically reduced from GO/CNTs with different mass ratios at 50 mV/s. All the films were prepared by CV method at a scan rate of 50 mV/s. The results reveal that the mixing ratio of GO and CNTs in composites takes a great effect on specific capacitance of composite electrodes. The incorporation of high surface-to-volume ratio CNTs improves the energy storage density of electrode greatly. Table 2 shows the calculated specific capacitance of different electrodes. From Table 2, we can see the specific capacitance of composite electrode dramatically increases from 156.3 to 279.4 F/g with the increasing of CNT/GO mass ratio, which is reasonable for the surface area increasing of composite electrode is due to the appropriate addition of CNTs and corresponding benefits of reducing agglomerate of GO sheets. The CNT-enriched composite electrode exhibits obviously larger specific capacitance than pure ERGO, and these specific capacitance results are well consistent with the result of CV testing. However, compared with the 50:1 and 10:1 mass ratios, the further increasing of CNTs does not obviously increase the specific capacitance accordingly, and a reduced specific capacitance of electrode is observed. We conclude that high mass ratio of CNTs in composite structure results in an unpredicted agglomeration of CNTs, which leads to the inadequate interaction of CNTs with ERGO sheets for further improving the efficient surface area of composite. So, controlling the distribution and loading of CNTs in ERGO matrix during the electrochemical reduction process is very important to optimize composite electrode with high specific capacitance.\n\nFig. 5\n\nCycle voltammetry curves of ERGO and ERGO/CNTs with a different GO/CNTs mass ratio at 50 mV/s. (All films were prepared by CV at a scan rate of 50 mV/s)\n\nTable 2 Calculated specific capacitance of different electrodes (F/g)\n\nIt is well known that high-rate capability is a key index for electrochemical capacitor electrodes. Rate performance of ERGO/CNT composite electrodes is shown in Fig. 6a. The specific capacitance of all composite electrodes shows a decreasing tendency with the increase of current due to the fact that the accessibility of electrolyte ions to active sites of the electrode is limited at higher current density [20]. The uniform distribution of CNTs into ERGO nanosheets can effectively improve the rate capability compared with pure ERGO electrode with agglomerate structure. As shown in Fig. 6a, the ERGO/CNT electrode shows the excellent specific capacitance at a current density of 1 A/g. This means that the highly opened composite electrode can not only afford high specific capacitance but also keep high capacitance retention at high current density. The uniform distribution of CNTs into ERGO sheets is reasonable for the high rate performance of composite electrodes. The CV curves of ERGO/CNT films (Fig. 6b) exhibit almost the rectangular-like shape with increasing scanning voltage, indicating a remarkable capacitive behavior and excellent reversibility of their charge/discharge process.\n\nFig. 6\n\nGalvanostatic charge/discharge curves (a) and CV pattern (b) of the as-prepared film in 0.5 M Na2SO4 (pH 6.0) (mass ratio of 50:1 and scan rate of 50 mV/s)\n\nFigure 7 is Nyquist plots of different composite electrodes. It can be seen that the composite electrodes show almost the same inner resistant (Rs) with pure ERGO electrode, which is lower than GO electrode. The composite electrode loading on CNTs shows no obvious influence on electrode Rs, indicating the comparable conductive performance of ERGO and CNTs. However, an obvious decrease of specific capacitance is observed with the increasing of GO/CNT mass ratio to 10:1, as shown in Fig. 5 and Table 2. Consequently, the excellent resistance and specific capacitance performance of composite electrode is reasonable and depending on the optimized loading and distribution of CNTs in ERGO sheets.\n\nFig. 7\n\nNyquist plots of different composite electrodes\n\nCycle rate performance of electrode films is also a vital factor for the practical application in electrochemical capacitor. As shown in Fig. 8, the rate performance of ERGO/CNTs (obtained from GO/CNT mass ratio = 50:1) and pure ERGO is evaluated by charging/discharging at the same current densities. For ERGO/CNT electrode, the specific capacitance maintained above 90% after 6000 cycles at a 1.2 A/g scan current density. The results indicate a good cycling ability of this nanotube/nanosheet composite electrode. The penetration of CNTs into ERGO provides a robust support for electrochemical activity of ERGO. Therefore, the alternating nanotube/nanosheet structure affords excellent mechanical strength for the long-term cycling of charge/discharge. It also can be seen in Fig. 8 that the pure ERGO electrode also presents good cycling ability only with lower specific capacitance, which results from stable EDLC and agglomerate structure of ERGO. So, it is crucial and valuable to build highly opened and stable carbon nanomaterial structure to obtain high-performance electrochemical energy storage electrode with large specific capacitance and high stability.\n\nFig. 8\n\nCycling rate performance of different electrodes at 1.2 A/g scan current density\n\n\nIn conclusion, we utilized a simple electrochemical method to prepare an ERGO/CNT composite films, and the pre-added CNTs into GO sheets play an important role as a reduction accelerant. High-efficiency reduction of GO was obtained, and the obtained ERGO/CNT composite film showed excellent electrochemical performance. At a mass ratio of 50:1 and the scan rate of 50 mV/s, the composite film exhibited a high specific capacitance about 279.4 F/g and showed excellent reversibility. Furthermore, this simple and versatile synthesis technique for providing graphene-based materials shows promising future in various applications such as assembly of electrochemical capacitors.\n\n\n\nCarbon nanotubes\n\n\nCyclic voltammetry\n\n\nElectrochemically reduced graphene oxide\n\n\nCharge/discharge curves\n\n\nGraphene oxide\n\n\nX-ray diffraction system\n\n\n 1. 1.\n\n Bashid HAA, Lim HN, Kamaruzaman S, Rashid SA, Yunus R, Huang NM, Yin CY, Rahman MM, Altarawneh M, Jiang ZT, Alagarsamy P (2017) Electrodeposition of polypyrrole and reduced graphene oxide onto carbon bundle fibre as electrode for supercapacitor. Nanoscale Res Lett 12(1):246.\n\n 2. 2.\n\n Zhu Y, Murali S, Stoller MD, Ganesh KJ, Cai W, Ferreira PJ, Pirkle A, Wallace RM, Cychosz KA, Thommes M, Su D, Stach EA, Ruoff RS (2011) Carbon-based supercapacitors produced by activation of graphene. Science 332(6037):1537.\n\n 3. 3.\n\n Gao Y (2017) Graphene and polymer composites for supercapacitor applications: a review. Nanoscale Res Lett 12(1):387.\n\n 4. 4.\n\n Chen C, Long M, Xia M, Zhang C, Cai W (2012) Reduction of graphene oxide by an in-situ photoelectrochemical method in a dye-sensitized solar cell assembly. Nanoscale Res Lett 7(1):101.\n\n 5. 5.\n\n Li Q, Guo XL, Zhang Y, Zhang WJ, Ge C, Zhao L, Wang XJ, Zhang HY, Chen J, Wang ZM, Sun LT (2017) Porous graphene paper for supercapacitor applications. J Mater Sci Technol 33(8):793–799.\n\n 6. 6.\n\n Yang WY, Zhao YT, He X, Chen Y, Xu JH, Li SB, Yang YJ, Jiang YD (2015) Flexible conducting polymer/reduced graphene oxide films: synthesis, characterization, and electrochemical performance. Nanoscale Res Lett 10(1):1–7.\n\n 7. 7.\n\n Wu Q, Xu Y, Yao Z, Liu A, Shi G (2010) Supercapacitors based on flexible graphene/polyaniline nanofiber composite films. ACS Nano 4(4):1963–1970.\n\n 8. 8.\n\n Zhu Y, Murali S, Cai W, Li X, Suk JW, Potts JR, Ruoff RS (2010) Graphene and graphene oxide: synthesis, properties, and applications. Adv Mater 22(45):3906–3924.\n\n 9. 9.\n\n Li X, Cai W, An J, Kim S, Nah J, Yang D, Piner R, Velamakanni A, Jung I, Tutuc E, Banerjee SK, Colombo L, Ruoff RS (2009) Large-area synthesis of high-quality and uniform graphene films on copper foils. Science 324(5932):1312.\n\n 10. 10.\n\n Abdollahi H, Samkan M, Mohajerzadeh MA, Sanaee Z, Mohajerzadeh S (2018) Fabrication and investigation of high performance CNT-incorporated tin-oxide supercapacitor. J Mater Sci-Mater El 2018(7):1–12.\n\n 11. 11.\n\n Yi M, Shen Z (2015) A review on mechanical exfoliation for the scalable production of graphene. J Mater Chem A 3(22):11700–11715.\n\n 12. 12.\n\n Bressanin JM, Júnior VAA, Bartoli JR (2018) Electrically conductive nanocomposites of PMMA and carbon nanotubes prepared by in situ polymerization under probe sonication. Chem Pap 54202:1–12.\n\n 13. 13.\n\n Hwang J, Kim M, Campbell D, Alsalman HA, Kwak JY, Shivaraman S, Woll AR, Singh AK, Hennig RG, Gorantla S, Rümmeli MH, Spencer MG (2013) Van der waals epitaxial growth of graphene on sapphire by chemical vapor deposition without a metal catalyst. ACS Nano 7(1):385–395.\n\n 14. 14.\n\n Lee JH, Lee EK, Joo WJ, Jang Y, Kim BS, Lim JY, Choi SH, Ahn SJ, Ahn JR, Park MH, Yang CW, Choi BL, Hwang SW, Whang D (2014) Wafer-scale growth of single-crystal monolayer graphene on reusable hydrogen-terminated germanium. Science 344(6181):286–289.\n\n 15. 15.\n\n Chen Z, Ren W, Gao L, Liu B, Pei S, Cheng HM (2011) Three-dimensional flexible and conductive interconnected graphene networks grown by chemical vapor deposition. Nat Mater 10:424–428.\n\n 16. 16.\n\n Mattevi C, Kim H, Chhowalla M (2011) A review of chemical vapour deposition of graphene on copper. J Mater Chem 21(10):3324–3334.\n\n 17. 17.\n\n Reina A, Jia X, Ho J, Nezich D, Son H, Bulovic V, Dresselhaus MS, Kong J (2009) Large area, few-layer graphene films on arbitrary substrates by chemical vapor deposition. Nano Lett 9(1):30–35.\n\n 18. 18.\n\n Peng XY, Liu XX, Diamond D, Lau KT (2011) Synthesis of electrochemically-reduced graphene oxide film with controllable size and thickness and its use in supercapacitor. Carbon 49(11):3488–3496.\n\n 19. 19.\n\n Hu YJ (2010) Graphene: synthesis, functionalization and applications in chemistry. Acta Phys -Chim Sin 26(8):2073–2086.\n\n 20. 20.\n\n Shao YY, Wang J, Engelhard M, Wang C, Lin YH (2010) Facile and controllable electrochemical reduction of graphene oxide and its applications. J Mater Chem 20(4):743–748.\n\n 21. 21.\n\n\n 22. 22.\n\n Compton OC, Nguyen ST (2010) Graphene oxide, highly reduced graphene oxide, and graphene: versatile building blocks for carbon-based materials. Small 6(6):711–723.\n\n 23. 23.\n\n Zhou X, Huang X, Qi X, Wu S, Xue C, Boey FYC, Yan QY, Chen P, Zhang H (2009) In situ synthesis of metal nanoparticles on single-layer graphene oxide and reduced graphene oxide surfaces. J Phys Chem C 113(25):10842–10846.\n\n 24. 24.\n\n Yang SB, Feng XL, Ivanovici S, Müllen K (2010) Fabrication of graphene-encapsulated oxide nanoparticles: towards high-performance anode materials for lithium storage. Angew Chem Int Ed 122(45):8586–8589.\n\n 25. 25.\n\n Beidaghi M, Wang CL (2012) Micro-supercapacitors based on interdigital electrodes of reduced graphene oxide and carbon nanotube composites with ultrahigh power handling performance. Adv Funct Mater 22(21):4501–4510.\n\n 26. 26.\n\n Kholmanov IN, Domingues SH, Chou H, Wang X, Tan C, Kim JY, Li HF, Piner R, Zarbin AJG, Ruoff RS (2013) Reduced graphene oxide/copper nanowire hybrid films as high-performance transparent electrodes. ACS Nano 7(2):1811–1816.\n\n 27. 27.\n\n Deng SZ, Tjoa V, Fan HM, Tan HR, Sayle DC, Olivo M, Mhaisalkar S, Wei J, Sow CH (2012) Reduced graphene oxide conjugated Cu2O nanowire mesocrystals for high-performance NO2 gas sensor. J Am Chem Soc 134(10):4905–4917.\n\n 28. 28.\n\n Yang YJ, Yang XJ, Yang WY, Li SB, Xu JH, Jiang YD (2014) Porous conducting polymer and reduced graphene oxide nanocomposites for room temperature gas detection. RSC Adv 4(80):42546–42553.\n\n 29. 29.\n\n Konstantin NK, Ozbas B, Schniepp HC, Prud’homme RK, Aksay IA, Car R (2008) Raman spectra of graphite oxide and functionalized graphene sheets. Nano Lett 8(1):36–41.\n\n 30. 30.\n\n Zhang JL, Yang HJ, Shen GX, Cheng P, Zhang JY, Guo SW (2010) Reduction of graphene oxide via l-ascorbic acid. Chem Commun 46(7):1112–1114.\n\nDownload references\n\n\nThis work was supported by the National Science Foundation of China (51477026, 61471085, 61774030, 51707015), Chongqing Postdoctoral Science Special Foundation (Xm2017051), Scientific and Technological Research Program of Chongqing Municipal Education Commission (KJ1601111 and KJ1601122), Natural Science Foundation Project of Yongchuan (Ycstc, 2016nc2001), Open Research Foundation of Chongqing Key Laboratory of Micro/Nano Materials Engineering and Technology (KF201601), Open Research Foundation of Chongqing Engineering Research Center of New Energy Storage Devices and Applications (KF20170202), and the Scientific Research Project of Chongqing University of Arts and Sciences (R2016DQ11, P2016DQ14).\n\nAvailability of Data and Materials\n\nThey are all in the main text and figures.\n\nAuthor information\n\nWYY conceived of the experiment, carried out the fabrication of ERGO/CNT composites, and drafted the manuscript. YC, KT, and TJP helped to deposit the films and analyze the data. JFW helped to draft the manuscript. JHX and BCY helped to develop the idea and guided the study. All authors read and approved the final manuscript.\n\nCorrespondence to Ke Tang.\n\nEthics declarations\n\nAuthors’ Information\n\nWYY and KT are the associate professors of Chongqing University of Arts and Sciences. YC is a lecturer of Chengdu University of Information Technology. TJP is a student of University of Electronic Science and Technology of China. JFW is a professor of Chongqing University. JHX and BCY are professors of University of Electronic Science and Technology of China.\n\nCompeting Interests\n\nThe authors declare that they have no competing interests.\n\nPublisher’s Note\n\n\nRights and permissions\n\n\nReprints and Permissions\n\nAbout this article\n\nVerify currency and authenticity via CrossMark\n\nCite this article\n\nYang, W., Chen, Y., Wang, J. et al. Reduced Graphene Oxide/Carbon Nanotube Composites as Electrochemical Energy Storage Electrode Applications. Nanoscale Res Lett 13, 181 (2018) doi:10.1186/s11671-018-2582-6\n\nDownload citation\n\n\n • Reduced graphene oxide\n • Carbon nanotube\n • Specific capacitance\n • Nanocomposite material\n • Electrochemical reduction", "pred_label": "__label__1", "pred_score_pos": 0.6147977709770203} {"content": "Interactive help, teacher instruction areas, intelligent word and HTML import\n\nSchoolshape 2.9 released:\n\nInteractive Help\n\nThe first of a series of interactive guides to the software has been released, which shows teachers how to use Schoolshape to find educational resources, set them for homework and assess the results.  To start the guide, use the &;Help&; button on your home screen.\n\nTeacher Instruction Areas\n\nWhen you are creating resources, you can now include instructions to the teacher, which are not shown to students.  If you are creating resources for your own use, the teacher instruction areas are also useful for making notes for yourself.  To add a teacher instruction area, when creating a resource, drag the &;Teacher Instruction Area&; button anywhere onto the canvas.\n\nIntelligent Word & HTML import\n\nYou can now import word files into Schoolshape, including multiple choice and gap fill questions.  As long as gap fill answers are labelled &;A&;, &;B&;, &;C&;, etc, and the gaps in the gap fills are inserted using underscores ( __ ), Schoolshape will automatically find these and convert them into automatically marked interactive exercises!  Of course, once imported, you can continue to edit and improve the resources by adding speaking exercises for example.\n\nPowerpoint import has been further improved - once you have imported all slides from the powerpoint document, you can delete individual slides, convert them into exercises and edit the text within the slides.  These functions are available from the &;Spanner&; drop-down menu on each imported slide.\n\nLatency Improvement Option\n\nIf you do a lot of pair speaking work and you find there is a slight lag when your school internet is busy, there is now a low latency option to help matters.  Go to Admin -> Subscription, click &;Edit&;, then switch the media streaming option from &;Encrypt Streaming Media&; to &;Minimize streaming media latency&;.  This should solve any &;lag&; issues.  Please be aware that changing this option makes it theoretically possible for a third party to listen in on student conversations, and that we cannot take any responsibility for the consequences.  To put things in perspective, the same applies when you make a normal telephone call.", "pred_label": "__label__1", "pred_score_pos": 0.9255858063697815} {"content": "Ramgarh is a small tourist destination in the Kumaon region and it just about 20 km from Bhimtal. Ramgarh is also known as ‘Fruit Bowl of Kumaon‘.\n\n\n\nThe renowned poetess Mahadevi Verma lived in Ramgarh and her home is now converted into a library of her works.\n\nSoulitude in the Himalayas is situated in Gagar, Ramgarh.", "pred_label": "__label__1", "pred_score_pos": 1.0000078678131104} {"content": "What is Blue Ocean Strategy? Examples, Pros & Cons!\n\nWhat is Blue Ocean Strategy? Examples, Pros & Cons!\n\nHello readers! It is a new day and we are back with a new topic of discussion exclusively for you all!\n\nAlmost all of us have been to beaches for a weekend getaway or long vacations! If not holidays, we have definitely come across visuals of oceans and seas on social media and televisions. Haven’t we? Well, oceans are vast, deep, massive, wide and are the most baffling natural wonders of the world. Proper explorations and researches can give way to incredible discoveries and provide us information about its scopes and untapped prospects.\n\nIn a similar fashion, a path-breaking strategy, known as Blue Ocean Strategy, was introduced by  W. Chan Kim and Renée Mauborgne. It is a pacifist marketing scheme and is considered a strategic planning tool for assessing a business. A Blue Ocean Analogy is utilized to unlock the wider, unfathomable, powerful and vast potential in the unexplored market space in terms of profitable growth. This strategic planning theory is an escape from the general notion of benchmarking the competition and focusing on lump sum figures.\n\nWhat exactly is a Blue Ocean Strategy?\n\nBlue Ocean Strategy is all about devising and acquiring the uncontested market forum by spawning a new demand.\n\nSince the industries are in a state of non-existence, there is absolutely no relevance of peer comparison. The strategy bags the new demand by familiarizing unique products with advanced features that stand apart from the crowd.\n\nIn other words, the strategy spurs companies to offer extremely valuable products to the consumers. Thus, it supports the company to incur large profits and surpass the competition. The price tags of the products are generally kept on the steeper side because of their monopoly. Blue Ocean approach shuns the ideology of outperforming the competition and asserts to recreate the market boundaries and operate within the nascent space.\n\nThe kind of leadership and management required to initiate a Blue Ocean Strategy differs from the management of corporations that have short-term ambitions and mainly concentrates on increasing shareholder value by pushing up the stock prices via buybacks, mergers, and acquisitions. The Blue Ocean Strategy can be applied to all the sectors or, businesses and is not limited to just one kind.\n\nOn the contrary to the concept of Blue Ocean Industries, there exists Red Ocean Industries. Let us understand the concept in brief before moving to further analysis.\n\nRed Ocean Industries\n\nRed Oceans are those industries that are currently in existence or, what we call the contested market forum.\n\nIn Red Oceans, there are well-defined industry perimeters that are known and out in open to all. Due to the acquaintance with the competitive rules and acceptance of the drawn boundaries, the market space gets crowded and there is a consequent reduction in growth and profitability. When the product comes under the burden of pricing pressure there is always a chance that a firm’s operations could come under notable menace.\n\nCompanies under Red oceans strive to outperform their rivals by grasping a higher proportion of existing market share at another company’s loss. In order to keep themselves afloat in the marketplace, proponents of Red Ocean Strategy concentrate on creating competitive advantages by examining the blueprints of their peers/competitors. Such a saturated market space makes way for a toxic competition which ends up as nothing but an ocean full of rivals fighting over a dwindling profit pool. Such firms mainly seek to capture and redistribute wealth instead of creating wealth.\n\nThese kinds of market forums can be correlated with the shark-infested ocean waters which remain spilled with blood. Hence, the coinage of the term Red Oceans. Thus, the business world has pulled up their socks and is striving to skip the “Red Oceans” to create their very own “Blue Oceans”.\n\nExamples of Blue Ocean Industry\n\nLet us learn how organizations that have followed the path of Blue Ocean Strategy has undergone outstanding growth and profitability!\n\n\nUber Cab is a brainchild of the Blue Ocean Strategy and has dramatically transformed the picture of the transportation industry by discarding the nuisance of booking cabs, denial of services, meter issues and unwanted arguments.\n\nIt is a ridesharing service that enables customers to book their rides with the ease of swipes and taps. It also permits users to trace a  driver’s progression towards the pickup point in real-time through the medium of a smartphone application called Uber App.\n\nUber devised a new market by the amalgamation advanced technology and modern devices. It tried to differentiate itself from the regular cab companies and in turn developed a low-cost business model that offers flexible payments, pricing strategies and generates good revenues for both the drivers and the company. In the initial stages, Uber was successful in capturing the uncontested market space but was eventually flooded by the competitors. In spite of that, it continues to command the market and is speedily expanding across the world. As of 2019, Uber approximately has 110 million riders worldwide and holds 69% of the market share in the United States.\n\n2) iTunes\n\nApple headed into the space of digital music with its unique and eminent product ie. iTunes in 2003. In previous days, conventional mediums like compact discs (CD) were put to use to disseminate and listen to music.\n\nWhen iTunes ventured into the market, it solved the basic problems which were faced by the recording industry. As a result, iTunes cut down the practice of illegally downloading music while simultaneously catering to the demand for single songs versus entire albums in a digitalized version. High-quality music at a reasonable price offered by Apple became a talk of the town. All the available Apple products have iTunes to download music and have largely ruled the market space for decades. It is also recognized for driving the growth of digital music.\n\nThese examples of the Blue Ocean Strategy can enlighten future startups regarding the execution of a  strategic planning scheme and successfully unlocking new demand.\n\nHow to find and develop/Launch them?\n\nBlue Ocean Strategy becomes the need of the hour when supply surpasses demand in a market. When there is limited scope for further growth, businesses try and search for verticals for discovering new business lines where they can enjoy the advantage of uncontested market share or ‘Blue Ocean’.\n\nIn order to find and identify an attractive  Blue Ocean, one needs to take into consideration the “Four Actions Framework” to devise the aspects of buyer value in creating a new value curve. The Four Actions Framework emulates strategic triumphs and guides towards the path of launching a Blue Ocean initiative.\n\nThe framework poses four key questions, namely:\n\nA) Raise\n\nIt includes points that must be blossomed by industry in reference to the line of products, price tags and caliber of services. A startup must analyze the pros and cons of the existing organizations and their strategies for key aspects of differentiation.\n\n2) Reduce\n\nIt points out the arenas of an organization’s product or, service which foreplays a crucial character in the industry but is not absolutely essential in nature. Therefore,  the proportion of the products can be curtailed without entirely eradicating them.\n\n3) Eliminate\n\nIt points out the arenas of an organization or industry which could be eliminated absolutely for the purpose of cutting down the costs and also to fabricate a completely new market. At times, newly invented products can lead to self-assassination of the existing products and thus,  leads to an unwillingness to interfere with the current revenue source.\n\n4) Create\n\nIt nudges the companies to shape up trailblazing products. The introduction of an entirely new product line or, service leads to the establishment of a new market and points of differentiation. Identification of the needs of the target market provides sound knowledge regarding the addition of unique measures and consequently tracking the progress for illustrating a Blue Ocean.\n\nNow that we have discussed the Blue ocean strategy and how to find them, let us also discuss the pros and cons of this strategy.\n\nPros of Blue Ocean Strategy\n\nHere are a few of the advantages of using the blue ocean strategy:\n\n 1. Blue Ocean Strategy cooperates with organizations to find uncontested markets and avoid matured and saturated markets.\n 2. It assists to move from the impediments of competing within the existing industry and cost structure and to gradually migrate towards constructive value improvement. In short, it demonstrates how to break free from the traditional strategic models and to expand profitability and demand for the industry by using the analysis.\n 3. Value innovation is the backbone of a Blue Ocean Strategy. Value innovation is the alliance of innovation with price, utility, and cost positions. It eventually creates new value/demand for consumers and thereby, expands the chances of growth potential.\n 4. Blue Ocean Strategy enables a fundamental transformation in mindset. It develops mental horizons and helps in recognizing the opportunities.\n 5. Blue Ocean Strategy is based on “time and again” proven data rather than unproven theories. It is based on practical approaches that have proven results during live market executions.\n 6. Products under the concept of the Blue Ocean Strategy doesn’t make a consumer choose between value and affordability. It is the simultaneous pursual of differentiation and low-cost theorem.\n 7. Creating blue oceans is non-zero-sum with high payoff possibilities.\n\nCons of Blue Ocean Strategy\n\nLet’s us also look at a few of the common cons of using this strategy:\n\n 1. It’s quite difficult to come up with futuristic ideas and identify colossal and untapped markets.\n 2. Nominating an articulate Blue Ocean Strategy is a result of a calculated and detailed research process backed by extensive analysis. It is to be kept in mind that there is no magic formula or, silver bullet.\n 3. Venturing into a market in the early phase comes with baggage of risk. There is a high possibility that the customers might not understand the grass root of the products and services because of the absence of a fully developed technology.\n 4. Production of a new market is never easy because an organization has to be smart and clear regarding its customer base and ways to impart education about new ideas, new products, and new solutions. It also requires clarity about the trade-offs, obstacles and the workforce.\n 5. Opting for a different ocean i.e the Blue Ocean, requires a lot of patience, persistence trust, preparation, and faith. It is also extremely paramount to look at initial indicators for confirming the fact that “fishing”  is not being done in a dead sea.\n 6. On finding a new ocean, other sharks from the saturated markets aka the Red Oceans and other adjacent oceans will be lured to the new market. Thus, building strategically defensive alternatives would be a wise step. Defensive alternatives majorly consist of brand power, technological advancement, and speed of execution.\n\nAlso read: What is a BCG Matrix? Explanation with Example!\n\n\nLet us quickly summarise what we discussed in this article.\n\nA path-breaking strategy known as Blue Ocean Strategy is a pacifist marketing scheme and is considered a strategic planning tool for assessing a business. It is all about devising and acquiring the uncontested market forum by spawning a new demand. Since, the industries are in a state of non- existence, there is absolutely no relevance of peer comparison. The strategy bags the new demand by familiarizing unique products with advanced features that stand apart from the crowd. Blue Ocean approach shuns the ideology of outperforming the competition and asserts to recreate the market boundaries and operate within the nascent.\n\nThese days, the Blue Ocean Strategy becomes the need of the hour when supply surpasses demand in a market. In order to find and identify an attractive  Blue Ocean, one needs to take into consideration the “Four Actions Framework” to devise the aspects of buyer value in creating a new value curve. The framework poses four key questions, namely, Raise, Reduce, Eliminate & Create.\n\nThat’s all for this article. Let me know what you think about the blue ocean strategy in the comment section below. Cheers!\n\nfirst mover advantage\n\nIs First Mover a competitive advantage for a firm?\n\n\n\nWho are First Movers?\n\n\n\n\n\n\n\nAdvantages of First Movers:\n\n\n\n\nDisadvantages of First movers:\n\n\n\nIs First mover a competitive advantage for a firm?\n\n\n\nAlso read: Pat Dorsey’s Four Moats for Picking Quality Companies\n\nClosing Thoughts:\n\n\n\n\nCyclical and Non-cyclical stocks: How do they differ?\n\n\n\nWhat are cyclical stocks?\n\n\n\nCyclical industries usually may include durable goods (that last for a long time into the future), non-durable goods (that have a short shelf life) and services like automobile, construction, and travel.\n\n\nAround 75 percent of the stocks listed in the stock exchange are cyclical and follow the market trends. A few examples include Ferrari NV (RACE), Alibaba Group Holding Ltd. (BABA) and Royal Caribbean Cruises Ltd. (RCL).\n\nWhat are non-cyclical stocks?\n\n\nnon cyclical industry\n\n\n\nDefensive stocks include goods and services in industries that are not affected by market fluctuations such as utilities, food, and medicines. It is basically any good or service that people will buy whether or not the economy is doing well. A few examples of defensive stock companies include Kraft Heinz Company (KHC), Johnson and Johnson (JNJ) and Sysco Corporation (SYY).\n\nBonus: The top-down strategy\n\n\n\n\n\n\n\n\nAlso read:\n\n\n\n\nMicro vs Macro Economics cover\n\nMicro vs Macro Economics -What’s the Difference?\n\nEconomics is the study of how humans use limited resources (land, labor, capital and enterprise) to manufacture goods and services and satisfy their unlimited needs and distribute it among themselves. It is divided into two broad branches, microeconomics and macroeconomics.\n\nEach branch has its own policies and regulations relating to different sectors such as agriculture, labor market and the government. Microeconomics is the study of the behavior of an individual, firm or household in the market while macroeconomics is the study of the economy as a whole- that is, the individuals, households and firms collectively.\n\nWhat is Microeconomics?\n\nMicroeconomics was first introduced by the economist Adam Smith and is the study of the economy at a lower level, it is commonly termed the ‘bottom-up’ approach. This branch of economics focuses on how decisions made by people and organizations can affect the economy as a whole. As individuals, we make numerous decisions everyday from what clothes to wear to what food to eat. These decisions are made by the different agents in the economy and serve as the basis for microeconomists to study how they affect supply and demand and ultimately the economy as a whole.\n\nTools such as supply, demand, consumer behavior, spending and purchasing power of people are used by economists to build models that they base their learnings on, one such model is the supply and demand curve. By understanding the buying and spending habits of people, economists come up with various theories to understand relationships between different elements and how these small parts fit into the larger picture.\n\nHowever, in the real world, things are different and cannot always be represented through a model. Hence some economists study subsets of microeconomics such as human behavior which is the actions taken by an individual when making a decision and the behavioral model which uses disciplines such as psychology and sociology to understand how people make decisions.\n\nSince microeconomics is the study of the economy at a lower level, many people use it as a starting point for learning economics. The theories used in microeconomics are then used to study the economy at a larger scale- also known as macroeconomics.\n\nAlso read: What is Top Down and Bottom Up approach in stock investing?\n\nWhat is Macroeconomics?\n\nWhile microeconomics is a bottom-up approach, macroeconomics is considered a top-down approach as it is the study of the economy on a larger scale. Prior to 1929, many economists only studied microeconomics (people’s individual decisions) however after the crash of 1929 (aka the great depression), many economists were unable to explain its cause. They found that there were forces in the economy, which based on people’s decisions, could have a positive and negative impact. In addition to looking at individual decisions, it was also important to look at the big picture.\n\nMacroeconomics is the study of larger issues affecting the economy such as economic growth, unemployment, trade, inflation, recessions and how decisions made by the government can affect the economy. For example, the Central Bank creates their interest rate policies based on the macroeconomic conditions in the country and around the world.\n\nJohn Maynard Keynes is considered the founding father of Macroeconomics and his understanding of the subject was largely influenced by the Great Depression. During the 1930s Keynes wrote an essay titled The General Theory of Employment, Interest and Money where he outlined the broad principles of Macroeconomics that led to the development of Keynesian economics. Keynesian economics are macroeconomic theories about how during a recession, in the short run, the output is influenced by the aggregate demand in the economy. Milton Freidman another pioneer of macroeconomics used monetary policy to explain the reasons for the depression.\n\nMicro vs Macro Economics -The key differences\n\nmicro vs macro economics big picture-min\n\nAs mentioned earlier, microeconomics is the study of individual and household decisions and the issues they face. This could be analyzing the demand for a certain good or service and how this affects the production levels of a company. It could also be the study of effects of certain regulations on a business.\n\nWhile macroeconomics is the study of the economy as a whole. This involves looking at the gross domestic product (GDP) of the economy, the unemployment rates and the effects of inflation, deflation and monetary policy. For example, they may look at how an increase in taxes can affect the economy using the GDP, national income and inflation rate as a metric rather than individual factors.\n\nMicroeconomics is useful for determining the prices of goods and services in the economy along with the costs of the factors of production (land, labor, capital) while macroeconomics helps maintain price stability and creates policy to resolve problems dealing with unemployment, inflation and deflation.\n\nHowever, both micro and macroeconomics come with their limitations. For example, the study of microeconomics assumes that there is full employment in the economy. This can lead to unrealistic theories as this is never true. In macroeconomics, there is a fallacy of composition where economists assume that what is true for an individual is true for the economy as a whole. However, in the real world, the aggregate factors may not be true for individuals too.\n\nMicro and macroeconomics are interlinked\n\nBy definition, microeconomics and macroeconomics cover completely different aspects of the economy and while this is true, the two fields are similar and also interdependent on each other.\n\nWhen dealing with inflation, many people think of it as a macroeconomic theory as it deals with interest rate and monetary policy. However, inflation is an important part of microeconomics because as inflation raises the prices of goods and services, it reduces the purchasing power that affects many individuals and businesses in the economy. Like inflation, government reforms such as minimum wage and tax rates have large implications in microeconomics.\n\nAnother similarity in microeconomics is the distribution of the limited resources. Microeconomics studies how the resources are distributed among individuals while macroeconomics studies how they are distributed among groups that consist of individuals.\n\nAlso read: How Does The Stock Market Affect The Economy?\n\n\nAlthough micro and macroeconomics affect different levels of the economy and cover different policies, they are in fact two sides of the same coin and often overlap each other. The most important distinction is their approach to the economy. Microeconomics is ‘bottom-up’ and macroeconomics is ‘top-down.’\n\nPetrol, Diesel price history in India\n\nA brief study of Petrol & Diesel price history in India\n\nCrude Oil. You definitely have heard of this word, right? Crude oil is a naturally occurring unrefined petroleum product. It consists of organic materials and hydrocarbons. When the crude oil is refined, first it is heated until it starts boiling. Then, the boiling liquid is separated into various liquids and gases. These liquids are further utilized in making petrol, diesel, paraffin, and other petroleum products.\n\nThe products and by-products of crude oil are used in direct or indirect consumption by the end users. They are also used in manufacturing several commodities by a wide range of industries. Crude oil is also traded in the commodity market like gold, silver, etc. This results in the global price of crude oil to fluctuate. In India, only one-fifth of the crude oil requirements are met from domestic production. Therefore, we are heavily dependent on the US, African, and Middle East countries to support our nation’s demand for petrol and diesel.\n\nHow the prices of diesel and petrol are determined?\n\nThe Oil Marketing Companies or OMCs take crude oil to the refinery houses to generate petrol, diesel, kerosene and other products. After that, they dispose those products to the dealers of the same. In India, 90% of the share of oil marketing is owned by Indian oil corporation Ltd (IOCL), Bharat petroleum corporation ltd (BPCL) and Hindustan petroleum corporation ltd (HPCL).\n\nHere is the exact process of how the price determination of diesel and petrol takes place in India.\n\nFirst, an OMC imports crude oil from an oil producing nation like UAE. The cost and freight are the initial costs incurred on the same. Import charges (plus insurance charges, losses due to transportation and port fees) are further added to the same. Next, the Government of India adds Customs Duty on such crude oil, after which they are carried to the refinery houses.\n\nThe refineries charge Refinery Transfer Charge for their work. After that, such refined oil is sold to the dealers by the OMC at Depot Price after incurring inland freight on the same. So the total desired price is the result of all the Cost & Freight charges, Import charges, Refinery Transfer Price, Inland Freight, OMC’s Marketing costs, and Profit margin.\n\nIn addition, the Central Government of India adds Excise Duty on the Depot Price and the State Governments add State VAT on the same. Further, the dealers also add their commission which is calculated on the basis of per liter. So, after adding all the costs and taxes, we get the Retail Price that a consumer pays for buying a liter of petrol or diesel.\n\nIf you compare the prices of diesel and petrol in the South Asian nations, you would find that the prices in India are always the highest. This is because our Government regulates the prices by imposing taxes. Ironically, when you would see the prices of the crude oil dropping, Indian government increases the Excise Duty and State VAT to not let the retail prices of diesel and petrol fall. On the other hand, when the prices of crude oil rises, here the Government doesn’t reduce the said taxes so that the prices of the fuels in the nation don’t undergo fluctuations.\n\nBesides, there is no doubt in stating that the prices of diesel and petrol would vary from one state to another in India due to differences in commission pattern of OMCs and transportation charges.\n\nPetrol & Diesel price history in India\n\nNow, let us have a look at the price history of diesel and petrol in India over the last few years. Given below is a table which shows the petrol prices per liter in the four metropolitan cities in India. \n\nPetrol Price history in India:\n\nDate Chennai Mumbai Kolkata Delhi\n05-11-2018 81.61 84.06 80.47 78.56\n29-10-2018 82.86 85.24 81.63 79.75\n29-09-2018 86.7 90.75 85.21 83.4\n29-08-2018 81.22 85.6 81.11 78.18\n29-07-2018 79.11 83.61 79.05 76.16\n29-06-2018 78.4 83.06 78.23 75.55\n\nAs you can see from the above table, generally the petrol prices have been on the higher side in Mumbai. However, Delhi witnessed the most reasonable petrol prices in the last few months of 2018. \n\nFurther, here is the historical petrol price movement in the big four metropolitan cities in India.\n\nDate Chennai Mumbai Kolkata Delhi\n29-05-2018 81.43 86.24 81.06 78.43\n16-05-2017 68.26 76.55 68.21 65.32\n17-05-2016 62.47 66.12 66.44 63.02\n16-05-2015 69.45 74.12 73.76 66.29\n07-06-2014 74.71 80.11 79.36 71.51\n23-05-2013 65.9 71.13 70.35 63.09\n24-05-2012 77.53 78.57 77.88 73.18\n15-05-2011 67.22 68.33 67.71 63.37\n01-04-2010 52.13 52.2 51.67 47.93\n27-02-2010 51.59 51.68 51.15 47.43\n02-07-2009 48.58 48.76 48.25 44.72\n29-01-2009 44.24 44.55 44.05 40.62\n24-05-2008 49.64 50.54 48.98 45.56\n16-05-2007 47.44 48.38 46.86 42.85\n10-06-2006 51.83 53.5 51.07 47.51\n05-06-2006 51.83 53.5 51.07 47.51\n20-06-2005 44.26 45.93 43.79 40.49\n16-04-2003 35.48 37.25 34 32.49\n\nWhen you look at the longer time period shown by the above table, the picture looks similar as well. Anyways, one comparable takeaway is that, in every metropolitan city, the petrol price has consistently gone up at the same rate in the last one and half decades. (Note: You can find the latest prices of petrol in India here).\n\ncrude oil price\n\nDiesel Price history in India:\n\nNow, let us talk about the historical prices of diesel per liter in India. Here is a short-term view of diesel prices in the four Indian metropolitan cities:\n\nDate Chennai Mumbai Kolkata Delhi\n05-11-2018 77.34 76.67 75.02 73.16\n29-10-2018 78.08 77.4 75.7 73.85\n29-09-2018 78.91 79.23 76.48 74.63\n29-08-2018 73.69 74.05 72.6 69.75\n29-07-2018 71.41 71.79 70.37 67.62\n29-06-2018 71.12 71.49 69.93 67.38\n\nThe table given above shows that in the last few months of 2018, the diesel prices first have gone up and then they showed consolidation at the beginning of November.\n\nNext, here is the long-term diesel price history in India. If you look at the table shared below, it is easily understood that the diesel prices in the said four Indian cities have actually witnessed consistently rising prices in the last fifteen years.\n\nDate Chennai Mumbai Kolkata Delhi\n29-05-2018 73.18 73.79 71.86 69.31\n16-05-2017 58.07 60.47 57.23 54.9\n17-05-2016 53.09 56.81 54.1 51.67\n16-05-2015 55.74 59.86 56.85 52.28\n07-06-2014 61.12 65.84 61.97 57.28\n23-05-2013 52.92 57.17 53.97 49.69\n24-05-2012 43.95 45.28 43.74 40.91\n15-05-2011 43.8 45.84 43.57 41.12\n01-04-2010 38.05 39.88 37.99 38.1\n27-02-2010 37.78 39.6 37.73 35.47\n02-07-2009 34.98 36.7 35.03 32.87\n29-01-2009 32.82 34.45 33.21 30.86\n24-05-2008 34.44 36.12 33.96 31.8\n16-05-2007 33.3 34.94 32.87 30.25\n10-06-2006 35.51 39.96 34.96 32.47\n05-06-2006 35.95 39.96 34.96 32.47\n20-06-2005 31.51 35.2 30.8 28.45\n16-04-2003 23.55 26.7 23.51 21.12\n\nQuick Note: You can find the latest price of diesel in India here.\n\ndiesel price\n\nDifference between prices of Petrol & Diesel in India:\n\nBelow is a table shared for your reference which shows the price gap in diesel and petrol in the Indian metro cities during the mid of the year 2016.\n\nCity Diesel Price /Liter Petrol Price /Liter Price Gap\nChennai Rs 55.82 Rs 62 Rs 6.18 / Litre\nMumbai Rs 59.6 Rs 67.11 Rs 7.51 / Litre\nKolkata Rs 56.48 Rs 66.03 Rs 9.55 / Litre\nNew Delhi Rs 54.28 Rs 62.51 Rs 8.23 / Litre\n\nFurther, here is another table that would give you an idea of the price gap with regard to diesel and petrol during as of November 2018.\n\nDate Diesel Price /Liter Petrol Price /Liter Price Gap\nChennai Rs 74.99 Rs 78.88 Rs 3.89 / Litre\nMumbai Rs 74.34 Rs 81.50 Rs 7.16 / Litre\nKolkata Rs 72.83 Rs 77.93 Rs 5.1 / Litre\nNew Delhi Rs 70.97 Rs 75.97 Rs 5 / Litre\n\nFrom the above tables, it can be clearly noticed how substantially the price gap has been narrowed down within the period of around two years.\n\nConsequences of petrol and diesel price hike\n\nAs you might have observed from the above tables, the fuel price in India has undergone a significant hike over the last multiple years. So, what does it imply? Does it mean that the overall cost of living in India has gone up too? If you look back in 2018, the rate of consumer inflation in India was around 4.75%\n\nWhen the price of fuel increases, in general, it narrows down the gap between disposable income and expenditure of the consumers. It means that the consumers will try to reduce the consumption of luxury commodities like automobiles and electronic equipment in order to manage their necessities comfortably.\n\nHike in fuel price also has a direct adverse effect on the revenues of a few industries like tyres and fertilizers as the retail prices of their outputs shoot upwards. However, if you look at the financials of oil producing companies in India, there is no doubt in saying that they do enjoy a gala time during such period.\n\nFurther, you might think that only those companies which produce crude oil based products suffer during the fuel price bull run. But, the fact is that most of the companies in our nation (belonging to diverse industries) suffer as a result of the price hike. Even if you consider the FMCG industry, the cost of its products goes up considerably as a result of the upward movement in the prices of diesel and petrol. This happens because transportation costs go up significantly.\n\nNow, what kind of impact can you expect to see in financial markets during fuel price hike? Well, when the price of diesel and petrol goes high, not only people will try to cut down their unnecessary expenses but they may even reduce financial investing. In order to finance their necessities, people would refrain from putting their money in the financial markets.\n\nTherefore, will the banks have adequate funds to advance the businesses? Not really! Can the corporate organizations listed in NSE and BSE comfortably raise capital through IPO and FPO? Certainly not! Will the Asset Management Companies of Mutual Funds have an adequate corpus to pour into the market? No, my friend, they won’t have!\n\nAlso read: Rupee Depreciation: Is it a cause of concern?\n\nFinal thoughts\n\nThe hike in the global price of crude oil depends primarily on the demand-supply theory that we study in Economics. However, it also depends on other factors like the trade war, geopolitical tensions, and willingness of oil-producing countries to charge a higher price. As we had already seen earlier that hike in crude oil price results in inflation. So, to fight against the same, the Central Government charges more taxes and duties on diverse stuff. For a similar reason, the RBI also instructs the commercial banks to increase their interest rates on loans so as to squeeze money supply in the Indian economy.\n\nFurther, the price of petrol and diesel can be controlled if we lay emphasis on a few points. Firstly, price controlling mechanism has to be adopted either partially or fully. The half of Retail Prices of fuels in India consists of taxes and duties. The government (both central and state) does need to look into the matter. It would also be great if the OMCs can try to witness some of the price burdens that the ultimate consumers have to bear in our nation.\n\nFinally, the consumption of petrol and diesel in India in terms of US Dollar is even higher than the GDPs of many small nations across the globe. And that’s why the government and the people need to consider petrol and diesel price hike in India seriously.\n\nHow Does The Government Control Inflation cover\n\nHow Does The Government Control Inflation?\n\nWe cannot minimize the explosive effects of inflation. High inflation has the ability to topple governments, ruin nations and reduce economic growth. It discourages savings and reduces the overall productivity in the country. In its creepiest form, inflation can reduce the purchasing power of people, this means the pensions and savings of people can now buy less than it did before.\n\nIn response to this, governments have many powerful tools they can use to control the rate of inflation in the economy. These policies have been discussed in detail in this article.\n\nWhat is inflation?\n\nInflation can be described as a continuous increase in the general level of prices. In some cases, inflation can be used to encourage spending in the economy. However, this is not always the case as inflation can often get out of hand and the purchasing power of people drastically decreases. The government will then have to intervene to create balance in the economy.\n\nInflation can be measured using the Consumer Price Index (CPI). The bureau of labour statistics chooses close to 500,000 products from more than a 100 categories which are included into a ‘basket’. The prices of the goods are used to calculate the price index.\n\nEffects of inflation\n\nInflation, depending on its severity, has the ability to disrupt economies. There is an uneven distribution of income that can affect many sectors in the economy. They are discussed as follows:  \n\n— Effect on various economic groups- If there is low inflation in the economy, job seekers can benefit from this as increased demand will lead to a rise in employment. However, an unhealthy level of inflation can be disastrous for the economy as people pull their money out of financial institutions and their purchasing power reduces.\n\n— Government spending- During inflation, the government, like individuals, have to pay more for wages and supplies. In order to raise more revenue the government can increase taxes but people will may have the ability to pay for them and some groups will be affected more than others.\n\n— Savings and Investment- If inflation is on the rise, it is not a great time for savers as the decrease in the value of money reduces the value of savings. Many people move their investments to stocks and property during inflation. It is a favorable time for borrowers because the value of the money they owe reduces.\n\nHow Does The Government Control Inflation?\n\nIf the rate of inflation in the economy goes beyond a rate that is uncontrollable, the government has to intervene with policies to help stabilize the economy. Since inflation is the result of too much expenditure on the economy, the policies are created to restrict the growth of money. There are three ways the government can control the inflation- the monetary policy, the fiscal policy, and the exchange rate. They are discussed as follows.\n\n— The Monetary Policy\n\nMonetary policy is a tool used by the government to control the amount of money circulated in the economy. This includes paper money, coins and bank deposits held by businesses and individuals in the economy. Monetary policy uses interest rates to control the quantity of money in the economy.\n\n— Open market operations\n\nWhen there is high inflation in the economy, the amount of money created by financial institutions needs to be restricted. The Federal Reserve Bank lowers the supply of money by selling their large securities to the public, specifically to security dealers. The buyers pay for the securities by writing checks on the deposits they hold in the commercial banks. This is an effective way to control the supply of money as the deposits of the commercial banks at the Federal Reserve Bank are the legal reserve for the banks. With the sale of securities, the banks are forced to restrict their lending and security buying, therefore reducing the quantity of money in the economy.\n\n— Increasing the reserve requirement\n\nThe reserve requirement refers to the amount of money that the commercial banks are required to have on deposit with the Federal Reserve Bank. A low reserve requirement means banks have more money to lend out which can increase the money supply. But when there is high inflation in the economy, the government increases the reserve requirement which restrains the growth of money and even reduces it.\n\n— The rediscount rate\n\nThe rediscount rate is the rate of interest charged by the commercial banks. The commercial banks borrow from the Federal Reserve in exchange for a promissory note. In exchange, the Federal Bank increases the deposit of the bank. The rediscount rate controls the cost to banks for adding additional reserves. When inflation is high the bank increases the rediscount rate, which makes it more expensive for banks to buy reserves. This cost is usually translated to customers in the form of high interest rates on loans borrowed from commercial banks which ultimately reduces the supply of money in the economy. In order to control the supply of money in the economy with the monetary policy, the rediscount rate is used in conjunction with the reserve requirement and sale of securities.\n\n— Fiscal policy\n\nThe Fiscal policy uses government spending and taxation to control the supply of money in the economy. The policy was designed by John Maynard Keynes who studied the relationship between aggregate spending and the amount of economic activity in society. He also claimed that government spending can be used to control aggregate demand.\n\n— The decrease in government spending\n\nSending by the government constitutes a large part of the circular flow of income in the economy. During periods of high inflation, the government can reduce the spending to decrease the amount of money in circulation. In many instances, high government spending is the root cause of inflation. However, it is often hard for governments to differentiate between essential and non-essential expenditure so, the spending policy should be augmented by taxation.\n\n— Increase in taxes\n\nAn increase in the level of taxes reduces the amount of money that people have to spend on good and services. The effect of the tax can vary with the kind of tax imposed, but any increase in tax would reduce spending in the economy. An increase in tax combined with a decrease in government spending can have a double-barrelled effect on the supply of money in the economy.\n\n— Increase in savings\n\nAnother theory derived by Keynes was his belief in compulsory savings or deferred payments. In order to achieve this, the government should introduce public loans with a high rate of interest, attractive saving schemes and provident or pension funds. These measures lock people’s income into savings accounts for an extended period of time and are an effective way to control inflation.\n\nAlso read:\n\n\nInflation can have a major impact on the economy and can affect the government, investments and the purchasing power of people. A high rate of inflation for an extended period of time can lead an economy into a recession. Fortunately, the government has the ability to use the monetary and fiscal policies to help control the supply of money in the economy. When used in the conjunction, the policies can help achieve a lower rate of inflation and a more stabilized and balanced economy.\n\nRupee Depreciation: Is it a cause of concern?\n\n\n\n\nHow the Rupee value is determined?\n\n\n\n\n\n\nFloating vs Fixed Vs Managed Rate System:\n\n\n\n\n\n\n\nYear Exchange rate\n(INR per USD)\n1947 3.30\n1949 4.76\n1966 7.50\n1975 8.39\n1980 7.86\n1985 12.38\n1990 17.01\n1995 32.427\n2000 43.50\n2005 (Jan) 43.47\n2007 (Jan) 39.42\n2008 (October) 48.88\n2010 (22 January) 46.21\n2012 (22 June) 57.15\n2014 (12 Sep) 60.95\n2016(20 Jan) 68.01\n2017 (28 Mar) 65.04\n2018 (9 May) 64.80\n2018 (Oct) 74.00\n\nSource: Wikipedia\n\nExchange rate inr per dollar\n\n\nWhat TRIGGERS the increase in demand of currency?\n\n\n\nCurrent Scenario of Currency in India\n\n\n\n\nhow the rupee fared last year-min\n\n(Source: Bloomberg)\n\nWhat are the different impacts?\n\nIndustry impact:\n\n\n\nrupee appreciation and depreciation impact-min\n\n\nStock Market impact:\n\n\n\n\nAlso read: How Does The Stock Market Affect The Economy?\n\nFuel Shock:\n\n\n\n\n\nHow Does The Stock Market Affect The Economy cover 2\n\nHow Does The Stock Market Affect The Economy?\n\nA stock is a type of security that represents an individual’s ownership in a company and a stock market is a place where an investor can buy and sell ownership of such assets.\n\n\nWhy do we have a stock market?\n\nThe stock market exists for two main reasons, the first is to provide a company with the opportunity to raise capital that can be used to expand and grow the business.\n\nIf a company issues one million shares that can sell at $4 a share, this allows them to raise $4 million for the business. Companies find it favorable to raise capital this way so they can avoid incurring debt and paying steep interest charges.\n\nThe stock market also provides investors with the opportunity to earn a share in the company’s profit.\n\nOne way to do this is to buy stocks and earn regular dividends on its value- that is the investor earns a certain amount of money for each stock they own.\n\nAnother way is to sell the stock to buyers for a profit when the price of the stock increases. If an investor buys a share for $20 and the price eventually increases to $25, the investor can sell the stock and realize a profit of 25%.\n\nAlso read: Why do Stock Markets Exist? And Why is it So Important?\n\nHow the Stock Market affects the Economy?\n\nThe increase and decrease in stock prices can influence numerous factors in the economy such as consumer and business confidence which can, in turn, have a positive or negative impact on the economy as a whole. Alternatively, different economic conditions can affect the stock market as well.\n\nHere are a few ways the stock market can affect the economy of a country:\n\nMovements in the Stock Market\n\nThe movements in the individual prices of stocks give the stock market a volatile character. As stock prices move up or down, their volatility can have a positive or negative impact on consumers and businesses.\n\nIn the event of a bull market or a rise in the prices of stocks, the overall confidence in the economy increases. People’s spending also increases as they become more optimistic about the market. More investors also enter the market and this feeds into greater economic development in the nation.\n\nWhen the prices of stock fall for a continuously longer period, also known as a bear market, it has a negative effect on the economy. People are pessimistic about the economic conditions and news reports on falling stock prices can often create a sense of panic. Fewer investors enter the market and people tend to invest in lower-risk assets which further depresses the state of the economy.\n\n\nbull and bear market\n\n(Image credits:\n\nConsumption and the Wealth effect\n\nWhen stock prices rise and there is a bull market, people are more confident in the market conditions, and their investment increases. They tend to spend more on expensive items such as houses and cars. This is also known as the wealth effect which is how a change in a person’s income affects their spending habits and eventually leads to growth in the economy.\n\nIn the case of a bear market or a fall in stock prices, there is a negative wealth effect. It creates an environment of uncertainty among consumers and a fall in the value of their investment portfolios decreases spending on goods and services. This affects economic growth as consumer spending is a major component of Gross Domestic Product.\n\nA common situation of the wealth effect was during the US housing market crash of 2008, which had a large negative impact on consumers wealth.\n\nwhat's the economy\n\n(Image credits: Investopedia)\n\nImpact on Business Investment\n\nApart from consumer spending, business investment is also a key indicator of economic growth.\n\nWhen stock prices are high, businesses are likely to make more capital investments due to high market values. Many companies issue an IPO during this time as market optimism is high and it is a good time to raise capital through the sale of shares. There is also more mergers and acquisitions during a bull market and firms can use the value of their stock to buy out other companies. This increased investment feeds into greater economic growth.\n\nWhen the stock market is bearish, it has the opposite effect on investment. Confidence in the economy decreases and businesses are no longer eager to invest in the economy. The decrease in share price makes it harder for companies to raise funding in the stock market.\n\nOther factors\n\nThe stock market also affects the bond market and pension funds. A large part of pension funds are invested in the stock market and a decrease in the price of shares will lower the value of the fund and affect future pension payments. This can lower economic growth as people who depend on pension income will tend to save more and this lowers spending and eventually the GDP.\n\nWhile a fall in share prices has a negative impact on economic growth and GDP of a nation, it has a positive effect on the bond market. When there is a depression in the stock market, people look for other assets to invest their money in such as bonds or gold. They often provide a better return on investment than shares in the stock market.\n\nRemember, it is always important to diversify your investment portfolio and spread your risk. Don’t throw all your eggs into one basket.\n\nThe stock market and the economy are not the same\n\nContrary to popular belief, the stock market and the economy are two different things. The GDP of an economy and the stock market gains are incompatible and, in fact, there is little comparison between the two. The major reason for this discrepancy is the difference in the size of the two markets. The economy depends on millions of factors that can have both a positive and negative impact, while the stock market is only affected by one factor, the supply and demand of stocks.\n\nAlso read:\n\nFor investors in the stock market, it is better to err on the side of caution and focus on the fundamentals of each stock rather than on the economy as a whole. As the saying goes ‘an economist is a trained professional paid to guess wrong about the economy’.", "pred_label": "__label__1", "pred_score_pos": 0.8361966013908386} {"content": "Aquinas in politics and ethics essay\n\nAs he explains, political rule may be exercised by the multitude, by a select few, or by one person. Attfield also endorses a form of consequentialism which takes into consideration, and attempts to balance, the many and possibly conflicting goods of different living things also see Varner for a defense of biocentric individualism with affinities to both consequentialist and deontological approaches.\n\nPrecisely because it is a natural institution, political society is not equipped to guide human beings toward the attainment of this higher supernatural vocation.\n\nInat Rome, he began the work of commenting on Aristotle with On the Soul, and during the next five or six years commented on eleven more Aristotelian works not all of these are complete.\n\nEnvironmental ethics\n\nAn Interpretation of Thomistic Ethics. Thus the deep ecological movement became explicitly pluralist see Brennan ; c. When the case went to the U. Consequently, Aquinas in politics and ethics essay noted in 2. At one point, two of his brothers resorted to the measure of hiring a prostitute to seduce him.\n\nAs we have already seen, Aquinas believes that the human laws governing political societies must be somewhat limited in scope. And because the natural law does not simply enforce itself, the basic requirements of justice must be bolstered by an organized and civilized human authority ST, I-II, But let me go on then with my own branch of vorticism, about which I can probably speak with greater clarity.\n\nAccordingly, human laws serve two purposes. Thomas is frequently said to have baptized Aristotle, which seems to mean that he fitted him to the Procrustean bed of Christian doctrine.\n\nThe peculiar activities of living things will be grouped under headings like nutrition, growth, sense perception, knowing, and willing. Such destruction might damage the well-being of human beings now and in the future, since our well-being is essentially dependent on a sustainable environment see Passmore ; Bookchin ; Norton et al.\n\n\nEnvironmental Ethics\n\nYet, in addition to any such value, it is normally said that a person, as a person, has intrinsic value, i. This coercive jurisdiction extends to defending persons and property both by force and by the credible threat of punishment for criminal or other unjust appropriation or damage.\n\nIt is in light of this teaching that Aquinas interprets St. Their preservation is a bequest for future generations as they have been inherited from our ancestors and should be passed down to future generations so they can have the opportunity to decide whether to enjoy unspoiled countryside or an entirely urban landscape.\n\nThen one would turn to, say, triangle and seek its properties, after which one would go on to scalene and isosceles. The Japanese, who evolved the hokku, evolved also the Noh plays. The form of sphere above sphere, the varying reaches of light, the minutiae of pearls upon foreheads, all these are parts of the Image.\n\nBut Grisez gave reason to think these abbreviations both exegetically and philosophically unsound. But what is the best regime? Seeing these on the analogy of change as already analyzed, we look for a subject, a privation, and a form.\n\n\nJust War Theory\n\nThese sermons on the commandments, the creed, the Our Father, and Hail Mary were very popular. But this circumstantial evidence is only our first clue about this in the Apology.\n\nAquinas' Moral, Political, and Legal Philosophy\n\nSince this date commonly falls within Lentthe revision of the calendar moved his memorial to 28 January, the date of the translation of his relics to Church of the JacobinsToulouse.\n\nIn a disenchanted world, there is no meaningful order of things or events outside the human domain, and there is no source of sacredness or dread of the sort felt by those who regard the natural world as peopled by divinities or demons Stone As Aquinas explains, \"the good of any virtue, whether such virtue direct man in relation to himself, or in relation to certain other individual persons, is referable to the common good, to which justice directs: The concepts come to be in us as a result of our engagement with the sensible world.\n\nUniversity of Wisconsin Press, And so also is the substantial form of the human immaterial in that sense. Thus the goals of economic and social development must be defined in terms of sustainability in all countries—developed or developing, market-oriented or centrally planned.\n\nFurthermore, the inquiries in which the believer who philosophizes engages will often indicate his religious interests. Like Aristotle, Thomas holds that there is a plurality of both theoretical and practical sciences. Contrary to most modern economic theories, Aquinas understands money to be nothing more than a medium for exchanging commodities and thus subject to the requirements of commutative justice.\n\nIs the person that is the soul identical to the person that is Socrates? All poetic language is the languge of exploration.Thomas Aquinas Homework Help Questions.\n\nWhat was St. Thomas Aquinas' view of the role of the state?Need to answer in words. St.\n\nThomas Aquinas Critical Essays\n\nThomas Aquinas believed that the state, like the church, was a. It was one of the rules which, above all others, made Doctor Franklin the most amiable of men in society, \"never to contradict anybody.\" If he was urged to announce an opinion, he did it rather by asking questions, as if for information, or by suggesting doubts.\n\nEnvironmental ethics is a branch of applied ethics and a part of environmental philosophy. It developed out of three insights: first, that ethics cannot be built without the consideration of natural beings, nature, or the Earth because all beings on Earth are interconnected; second, that the scope of ethics should include future consequences, and so ethics should have an inter-generational.\n\nThomas Aquinas Essay Thomas Aquinas (ca.\n\nThomas Aquinas\n\n–) was an Italian Christian philosopher and theologian. Born into wealth and possessing royal connections, he became a Dominican friar after his father died, to the displeasure of his family. Although he doesn't confess to this in the book, the transition from Aquinas to Heidegger was a major step in the development of Caputo's thinking, eventually leading him to become one of the foremost Derrida scholars in the US.\n\n\nThe selections not only include St. Thomas Aquinas’s views on government, law, war.\n\nAquinas in politics and ethics essay\nRated 5/5 based on 42 review", "pred_label": "__label__1", "pred_score_pos": 0.6753956079483032} {"content": "Thomas Hunt Morgan\nAmerican biologist\n\nThomas Hunt Morgan\n\nAmerican biologist\n\nThomas Hunt Morgan, (born Sept. 25, 1866, Lexington, Ky., U.S.—died Dec. 4, 1945, Pasadena, Calif.), American zoologist and geneticist, famous for his experimental research with the fruit fly (Drosophila) by which he established the chromosome theory of heredity. He showed that genes are linked in a series on chromosomes and are responsible for identifiable, hereditary traits. Morgan’s work played a key role in establishing the field of genetics. He received the Nobel Prize for Physiology or Medicine in 1933.\n\nEarly life\n\nMorgan’s father, Charlton Hunt Morgan, was a U.S. consul, and his uncle, John Hunt Morgan, had been a Confederate army general.\n\nEarly in life, Morgan showed an interest in natural history. In 1886 he received the B.S. degree from the State College of Kentucky (later the University of Kentucky) in zoology and then entered Johns Hopkins University for graduate work in biology. At Hopkins, Morgan studied under the morphologist and embryologist William Keith Brooks. After being awarded the Ph.D. in 1890, Morgan remained there a year before accepting a teaching post at Bryn Mawr College.\n\nExperiments in embryology\n\nDuring the period 1893–1910, Morgan applied experimental techniques to fundamental problems of embryology. In order to identify causally related events during development, he analyzed such problems as the formation of embryos from separated blastomeres (early embryonic cells) and fertilization in nucleated and nonnucleated egg fragments. As examples of the effects of physical factors, he analyzed the way in which the spatial orientation of eggs affects their future development and the action of salt concentration on the development of fertilized and unfertilized eggs. In 1904 he married one of his graduate students at Bryn Mawr, Lillian V. Sampson, a cytologist and embryologist of considerable skill. The same year, he accepted an invitation to assume the professorship of experimental zoology at Columbia University, where, during the next 24 years, he conducted most of his important research in heredity.\n\n\nLike most embryologists and many biologists at the turn of the century, Morgan found the Darwinian theory of evolution lacking in plausibility. It was difficult to conceive of the development of complex adaptations simply by an accumulation of slight chance variations. Moreover, Darwin had provided no mechanism of heredity to account for the origin or transmission of variations, except his early and hypothetical theory of pangenesis. Although Morgan believed that evolution itself was a fact, the mechanism of natural selection proposed by Darwin seemed incomplete because it could not be put to an experimental test.\n\nMorgan had quite different objections to the Mendelian and chromosome theories. Both theories attempted to explain biological phenomena by postulating units or material entities in the cell that somehow control developmental events. To Morgan this was too reminiscent of the preformation theory—the idea that the fully formed adult is present in the egg or sperm—that had dominated embryology in the 18th and early 19th centuries. Although Morgan admitted that the chromosomes might have something to do with heredity, he argued in 1909 and 1910 that no single chromosome could carry specific hereditary traits. He also claimed that Mendelian theory was purely hypothetical: although it could account for and even predict breeding results, it could not describe the true processes of heredity. That each pair of chromosomes separates, with the individual chromosomes then going into different sperm or egg cells in exactly the same manner as Mendelian factors, did not seem to be sufficient proof to Morgan for claiming that the two processes had anything to do with each other.\n\nThe work on Drosophila\n\nMorgan apparently began breeding Drosophila in 1908. In 1909 he observed a small but discrete variation known as white-eye in a single male fly in one of his culture bottles. Aroused by curiosity, he bred the fly with normal (red-eyed) females. All of the offspring (F1) were red-eyed. Brother–sister matings among the F1 generation produced a second generation (F2) with some white-eyed flies, all of which were males. To explain this curious phenomenon, Morgan developed the hypothesis of sex-limited—today called sex-linked—characters, which he postulated were part of the X-chromosome of females. Other genetic variations arose in Morgan’s stock, many of which were also found to be sex-linked. Because all the sex-linked characters were usually inherited together, Morgan became convinced that the X-chromosome carried a number of discrete hereditary units, or factors. He adopted the term gene, which was introduced by the Danish botanist Wilhelm Johannsen in 1909, and concluded that genes were possibly arranged in a linear fashion on chromosomes. Much to his credit, Morgan rejected his skepticism about both the Mendelian and chromosome theories when he saw from two independent lines of evidence—breeding experiments and cytology—that one could be treated in terms of the other.\n\nIn collaboration with A.H. Sturtevant, C.B. Bridges, and H.J. Muller, who were graduates at Columbia, Morgan quickly developed the Drosophila work into a large-scale theory of heredity. Particularly important in this work was the demonstration that each Mendelian gene could be assigned a specific position along a linear chromosome “map.” Further cytological work showed that these map positions could be identified with precise chromosome regions, thus providing definitive proof that Mendel’s factors had a physical basis in chromosome structure. A summary and presentation of the early phases of this work was published by Morgan, Sturtevant, Bridges, and Muller in 1915 as the influential book The Mechanism of Mendelian Heredity. To varying degrees Morgan also accepted the Darwinian theory by 1916.\n\nIn 1928 Morgan was invited to organize the division of biology of the California Institute of Technology. He was also instrumental in establishing the Marine Laboratory on Corona del Mar as an integral part of Caltech’s biology training program. In subsequent years, Morgan and his coworkers, including a number of postdoctoral and graduate students, continued to elaborate on the many features of the chromosome theory of heredity. Toward the end of his stay at Columbia and more so after moving to California, Morgan himself slipped away from the technical Drosophila work and began to return to his earlier interest in experimental embryology. Although aware of the theoretical links between genetics and development, he found it difficult at that time to draw the connection explicitly and to support it with experimental evidence.\n\nIn 1924 Morgan received the Darwin Medal; in 1933 he was awarded the Nobel Prize for his discovery of “hereditary transmission mechanisms in Drosophila”; and in 1939 he was awarded the Copley Medal by the Royal Society of London, of which he was a foreign member. In 1927–31 he served as president of the National Academy of Sciences; in 1930 of the American Association for the Advancement of Science; and in 1932 of the Sixth International Congress of Genetics. He remained on the faculty at Caltech until his death.\n\nAmong Morgan’s most important books are those dealing with (1) evolution: Evolution and Adaptation (1903), in which he strongly criticizes Darwinian theory; and A Critique of the Theory of Evolution, (1916), a more favourable view of the selection process; (2) heredity: Heredity and Sex (1913), his first major exposition of the Mendelian system in relation to Drosophila; and with A.H. Sturtevant, H.J. Muller, and C.B. Bridges, The Mechanism of Mendelian Heredity (1915; rev. ed., 1922); and The Theory of the Gene (1926; enlarged and revised ed., 1928); the latter two works firmly established the Mendelian theory as it applied to heredity in all multicellular (and many unicellular) organisms; and (3) embryology: The Development of the Frog’s Egg: An Introduction to Experimental Embryology (1897), a detailed outline of the developmental stages of frogs’ eggs; Experimental Embryology (1927), Morgan’s statement on the value of experimentation in embryology; and Embryology and Genetics (1934), an attempt to relate the theory of the gene to the problem of embryological differentiation and development.\n\nAre we living through a mass extinction?\nThe 6th Mass Extinction", "pred_label": "__label__1", "pred_score_pos": 0.9605618715286255} {"content": "Follow us on :\n\n • Pinterest Social Icon\n • YouTube Social Icon\n • LinkedIn Social Icon\n\n© Combat Food Medic, LLC\n\nproudly created with\n\nHealth FORUM\n\nFeb 7, 2017\n\n\n\nEdited: Jun 2, 2018\n\nHerbal and Natural Therapies\n\nWhile such therapies are commonly used in ayurvedic and oriental medicine for treating serious conditions such as diabetes, many health experts in the west remain skeptical about their reported medical benefits.\n\n\n\nWhat herbal therapies are available?\n\n\nAloe vera\n\n\n\n\n\nFurther herbal therapies\n\nThe herbs and plant derivatives listed below have been employed traditionally by native people in the treatment of diabetes, in the areas in which they grow. Many suffer from an inadequate knowledge base.\n\n\nAllium sativum is more commonly known as garlic, and is thought to offer antioxidant properties and micro-circulatory effects. Although few studies have directly linked allium with insulin and blood glucose levels, results have been positive. Allium may cause a reduction in blood glucose, increase secretion and slow the degradation of insulin. Limited data is available however, and further trials are needed.\n\nNew Posts\n • Admin\n Feb 7, 2017\n\n Cholesterol is a naturally occurring substance made by the liver and required by the body for the proper function of cells, nerves, and hormones . Cholesterol travels in the lipids (fatty acids) of the blood stream, also called plaque, can build up in the walls of the arteries decreasing the flow of blood to vital areas of the body. If plaque continues to build long term it significantly increases the risk of having a heart attack or stroke. Naturally lower your cholesterol with these safe, healthy methods! Normally, cholesterol is kept in balance. But, the standard western diet which contains a large amount of hydrogenated fats and refined carbohydrates leads to an upset in this balance. The imbalance is manifested in elevated LDL (bad cholesterol) and a low HDL (good cholesterol) which increases our risk for heart attack or stroke. Other causes include inactivity, diabetes, stress, and hypothyroidism. As most are aware with visits to their doctor there are three lipoproteins in our blood that are important to our health, low-density lipoproteins (LDL), high-density lipoproteins (HDL), and triglycerides. LDL is known as the bad cholesterol because it is low in proteins and high in cholesterol. HDL, on the other hand, is high in proteins and low in cholesterol and therefore known as good cholesterol. Triglycerides are a separate lipid in the blood stream that provide a way for the body to store excess energy, but if they are high is another warning sign. Cholesterol Normal Ranges The lipid profile blood test reports the levels of cholesterol and triglycerides in the blood steam. This is what the medical community believes the ranges should be but the most important thing to consider is the ratio of LDL to HDL cholesterol which should be around 2:1. Total cholesterol Below 200 mg/dL Desirable 200-239 mg/dL Borderline high 240 mg/dL and above High LDL cholesterol Below 70 mg/dL Ideal for people at very high risk of heart disease Below 100 mg/dL Ideal for people at risk of heart disease 100-129 mg/dL Near ideal 130-159 mg/dL Borderline high 160-189 mg/dL High 190 mg/dL and above Very high HDL cholesterol Below 40 mg/dL (men), Below 50 mg/dL (women) Poor 50-59 mg/dL Better 60 mg/dL and above Best Triglycerides Below 150 mg/dL Desirable 150-199 mg/dL Borderline high 200-499 mg/dL High 500 mg/dL and above Very high The American Heart Association (AHA) recommends that a triglyceride level of 100 mg/dL or lower is considered “optimal.” Cholesterol Reducing Foods If you want to lower cholesterol, diet is key. Here are the top foods and nutrients that can naturally lower cholesterol: Omega-3 fats – Foods high in omega-3 fats can help increase HDL cholesterol and reduce risk of cardiovascular disease. Foods high in soluble fiber – Soluble fiber binds cholesterol in the digestive system causing it to be excreted by the body. Include plenty of fruits, vegetables, sprouted nuts and seeds and other fiber rich foods . Olive oil – Helps raise HDL cholesterol. Garlic and onions – These two cholesterol reducing foods help lower LDL cholesterol because of their sulfur containing compounds which help cleanse the arteries. Herbs – Add a variety of spices such as basil, rosemary and turmeric to your food which contain antioxidants that are cardio-protective and help lower cholesterol naturally. Foods that Raise Cholesterol Avoid these bad cholesterol foods at all costs: Sugar and refined carbohydrates – Both stimulate the liver to produce more cholesterol and increase inflammation. Alcohol – Also stimulates the liver to produce more cholesterol, increasing cholesterol levels and inflammation. A glass of red wine per day may be cardioprotective, but anything more than that will increase your cholesterol. Hydrogenated fats – Vegetable oils are pro-inflammatory and may increase cholesterol. Caffeine – Too much caffeine can increase cholesterol. Limit coffee or tea to no more than 1-2 cups per day. Trans fats – Increases LDL cholesterol, inflammation, and risk of cardiovascular disease. Top 5 Cholesterol Lowering Natural Remedies Taking the right supplements and natural remedies can help lower cholesterol levels if combined with a healthy diet. #1 Fish Oil (1,000mg – 2,000 mg daily) EPA and DHA (omega-3 fats) found in fish oil help reduce overall cholesterol levels. #2 CoQ10 (200-300 mg daily) If you are on cholesterol lowering medications, take CoQ10 daily because these medications decrease levels of this important enzyme. #3 Niacin (1,500 mg daily) Niacin (vitamin B3) reduces LDL cholesterol by 25% and increases good cholesterol by 35% #4 Red Yeast Rice (1200 mg 2x daily) Reduces cholesterol by up to 32%. Take with CoQ10 to prevent deficiency. #5 Garlic (500 mg daily) Increases HDL cholesterol and lowers total cholesterol. Exercises to Balance Cholesterol Exercise with weight training and burst training can boost HGH (human growth hormone) which can improve HDL cholesterol and lower LDL cholesterol. Essential Oils for Cholesterol Lavender essential oil has been proven to lower cholesterol levels because it decreases emotional stress. Cypress oil lowers cholesterol because it improves circulation and rosemary oil reduces cholesterol because of it’s unique anti-oxidant properties and is cardio-supportive.\n • Admin\n Feb 7, 2017\n\n What’s the deal with gluten? It’s a type of protein found in grains including wheat, barley and rye . It makes up about 80 percent of the amino acids (the building blocks of proteins) found in these grains. Although gluten isn’t actually found in many other ancient grains like oats, quinoa , rice or corn, modern food-processing techniques usually contaminate these foods with gluten since they are processed using the same equipment that wheat is. On top of this, gluten is now used to help make many highly processed chemical additives that are found in packaged foods of all kinds. Coupled with the fact that manufacturing can lead to cross-contamination, this means trace amounts of gluten often wind up in food products that are seemingly gluten-free — like salad dressings, condiments , deli meats and candy. This makes giving up gluten more challenging than it might initially seem. In the U.S., it’s estimated that grain flours (especially wheat products containing gluten), vegetable oils and added sugar now make up about 70 percent of the total calories most people consume each day! Considering the fact that quality proteins, healthy fats and vegetables/fruits only play a small part in the average American’s meals, it’s no surprise so many people struggle with health issues and weight control. How Is Gluten Intolerance Different than Celiac Disease? Gluten intolerance is different than celiac disease, which is the disorder that’s diagnosed when someone has a true allergy to gluten. Celiac is actually believed to be a rare disease, affecting about 1 percent or less of adults . Some research suggests that for every person diagnosed with celiac disease, another six patients go undiagnosed despite having celiac-related damage to the gut. Symptoms of celiac disease include malnutrition, stunted growth, cancer, severe neurological and psychiatric illness, and even death. However, even when someone tests negative for celiac disease, there’s still a chance he or she can have a gluten intolerance, which poses many risks of its own. For many decades in the Western medical field, the mainstream view of gluten intolerance was that you either have it, or you don’t. In other words, you either test positive for celiac disease and have an allergy to gluten, or you test negative and, therefore, should have no reason to avoid gluten-containing foods. However, today ongoing research studies along with anecdotal evidence (people’s actual experiences) show that gluten intolerance symptoms aren’t so “black and white” after all. We now know that gluten intolerance symptoms fall along a spectrum and having a sensitivity to gluten isn’t necessarily all-or-nothing. That means that it’s possible to have gluten intolerance symptoms without having celiac disease. A new term has been given to this type of condition called non-celiac gluten sensitivity (NCGS) . People with NCGS fall somewhere in the middle of the spectrum: They don’t have celiac disease, yet they feel noticeably better when they avoid gluten. The extent to which this is true depends on the exact person, since different people can react negatively to gluten to different degrees. In people with gluten intolerance or NCGS, researchers have found that certain factors usually apply, including: Test negative for celiac disease (using two types of criteria, histopathology and immunoglobulin E, also called IgE) despite having similar symptoms Report experiencing both gastrointestinal and non-gastrointestinal symptoms (for example, leaky gut syndrome , bloating and brain fog) Experience improvements in symptoms when on a gluten-free diet Common Gluten Intolerance Symptoms Damage done by gluten-related disorders, including celiac disease and NCGS, go beyond just the gastrointestinal tract. Recent research over the past several decades suggests that gluten intolerance symptoms show up in almost every system within the body: the central nervous system (including the brain), endocrine system, cardiovascular system (including the health of the heart and blood vessels), reproductive system and skeletal system. Because gluten intolerance can lead to autoimmune reactions and increased inflammation levels (the root of most diseases ), it’s associated with numerous diseases. But the problem is that many people fail to attribute these symptoms to an undiagnosed food sensitivity. Symptoms of gluten intolerance (or NCGS) are widespread and can include: Digestive and IBS symptoms , including abdominal pain, cramping, bloating, constipation or diarrhea “Brain fog,” difficulty concentrating and trouble remembering information Frequent headaches Mood-related changes, including anxiety and increased depression symptoms Ongoing low energy levels and chronic fatigue syndrome Muscle and joint pains Numbness and tingling in the arms and legs Reproductive problems and infertility Skin issues, including dermatitis, eczema, rosacea and skin rashes Nutrient deficiencies, including anemia ( iron deficiency ) Higher risk for learning disabilities , including autism and ADHD Possibly a higher risk for neurological and psychiatric diseases, including Alzheimer’s, dementia and schizophrenia How is gluten capable of causing so many different problems? Despite what most people think, gluten intolerance (and celiac disease) is more than just a digestive problem. That’s because research suggests that gluten can actually cause significant changes in the gut microbiota — a big problem considering that our overall health depends heavily on the health of our gut. Gluten intolerance can affect almost every cell, tissue and system in the body since the bacteria that populate the gut help control everything from nutrient absorption and hormone production to metabolic function and cognitive processes. What Causes Gluten Intolerance Symptoms? There are multiple factors that can make people more likely to experience gluten intolerance symptoms: their overall diet and nutrient density , damage to the gut flora, immune status, genetic factors, and hormonal balance can all play a part. The exact way that gluten causes varied symptoms in many people has to do with its effects on the digestive tract and gut first and foremost. Gluten is considered an “antinutrient” and is, therefore, hard to digest for nearly all people, whether they have a gluten intolerance or not. Antinutrients are certain substances naturally present in plant foods, including grains, legumes, nuts and seeds. Plants contain antinutrients as a built-in defense mechanism; they have a biological imperative to survive and reproduce just like humans and animals do. Because plants can’t defend themselves from predators by escaping, they evolved to protect their species by carrying antinutrient “toxins” (which in some cases can actually be beneficial to humans when they have the ability to fight off infections, bacteria or pathogens in the body). Gluten is one type of antinutrient found in grains that has the following effects when eaten by humans : It interferes with normal digestion and can cause bloating, gas, constipation and diarrhea due to its effect on bacteria living in the gut. It can produce damage to the lining of the gut, causing “leaky gut syndrome” and autoimmune reactions in some cases. It binds to certain amino acids (proteins), essential vitamins and minerals, making them unabsorbable. Leaky gut syndrome is tied to gluten intolerance, which is a disorder that develops when tiny opening form in the gut lining and then large proteins and gut microbes leak across the gut barrier. Molecules that are usually kept within the gut are then able to enter the bloodstream and travel throughout the body, where they can provoke a chronic, low-grade inflammatory response. How Many People Have Gluten Intolerance? One criteria that is now being used by medical professionals to diagnose NCGS is found below. A patient usually experiences several of the five symptoms below before being diagnosed: Several typical symptoms of celiac disease (diarrhea, bloating, abdominal pain, fatigue, lethargy and malnutrition) Reduced symptoms when following a gluten-free diet Indications of intestinal damage when the patient has a positive small-intestine biopsy Elevated antibodies — this can include antibodies to alpha-gliadin (a type of gluten protein) or tissue transglutaminase-2 (an enzyme found in the gut and other organs) Genetic factors that can predispose the patient to celiac disease Some estimates suggest that six to 10 times more people have a form of gluten intolerance than have celiac disease. That means one in 10 adults might have some form of NCGS or gluten intolerance. However, that being said, at this time it’s difficult for researchers to estimate the exact prevalence of gluten intolerances and NCGS because there still isn’t a definitive diagnostic test that’s used or consensus over which symptoms must be present. It’s also hard to diagnose NCGS accurately because many of the symptoms caused by gluten are broad and very similar to symptoms caused by other disorders (like fatigue, body pains and mood changes). There especially seems to be a big overlap between irritable bowel syndrome (IBS) symptoms and gluten intolerance. Many people with IBS feel better when they follow a gluten-free diet. In people with IBS, gluten might cause symptoms to worsen, but it’s also a possibility that other attributes of wheat besides gluten (like amylase-trypsin inhibitors and low-fermentable, poorly absorbed, short-chain carbohydrates) can lead to poor digestion. Natural Treatment Plan for Gluten Intolerance Symptoms A. Try an Elimination Diet Doctors are sometimes hesitant to attribute a patient’s symptoms to gluten intolerance when they can be caused by other disorders, so sometimes the patient needs to take matters into her own hands. Following an elimination diet is really the best way to test your own personal reaction to gluten. The results of an elimination diet help pinpoint which of your symptoms can be attributed to gluten and let you know whether or not it’s time to go gluten-free . An elimination diet involves removing gluten from the diet completely for a period of at least 30 days (but preferably longer, such as three months) and then adding it back in. If symptoms improve during the elimination period and then reappear once gluten is eaten again, that’s a clear sign that gluten was contributing to the symptoms. However, it’s very important to test only one variable at a time (gluten) and not several (such as dairy, gluten and sugar) because this can cause you to falsely attribute symptoms. B. Follow a Gluten-Free Diet Once you do an elimination diet/gluten challenge and can determine if, and how drastically, you are intolerant to eating gluten-containing foods, you’ll know how important it is for you to follow a gluten-free diet . If you have a serious reaction to gluten when you add it back into your diet after the elimination period, you might want to get tested for celiac disease to know whether you need to avoid 100 percent of gluten indefinitely. If you’re sure you don’t have celiac disease, you should still plan avoid gluten as much as possible in order to prevent gut irritation, further digestive issues and ongoing symptoms. A gluten-free diet is one without wheat, rye and barley . This means you must avoid most baked products found in stores, flour-containing foods (like pizza or pasta at restaurants), the majority of packaged foods (bread, cereals, pastas, cookies, cakes, etc.) and some types of alcohol, including beer. Check ingredient labels carefully since gluten is hiding in many packaged foods. If you don’t have celiac disease, it’s likely that occasionally eating gluten-containing foods won’t cause long-term damage or serious health concerns, but you’ll feel better and get more accustomed to a gluten-free diet the longer you stick with it. With gluten out of the picture, focus on including more anti-inflammatory foods in your diet to repair your digestive system and heal any nutrient deficiencies. These include organic animal products, raw dairy products, vegetables, fruits, nuts, seeds and probiotic foods . When it comes to baking, try some of these naturally gluten-free flour alternatives over wheat flour: Brown rice Sweet potato Quinoa Almond flour Coconut flour Chickpea flour What if your symptoms don’t improve when you remove all sources of gluten? Keep in mind that gluten isn’t the only thing that can cause digestive issues . Conventional dairy products, nuts, shellfish and eggs can also cause sensitives or be a source of food allergies . Many foods containing FODMAPs (fermentable oligosaccharides, disaccharides, monosaccharides and polyols) have also recently been tied to digestive issues, including IBS symptoms. Some researches even suspect that for certain people, FODMAPs are the real culprit component for NCGS in wheat products, instead of simply gluten. C. Consider Having Tests Done Researchers believe that patients who test negative for two main genes that are associated with celiac disease (HLA-DQ2 and HLA-DQ8) are also significantly less likely to have gluten intolerance or NCGS. If celiac disease or gluten intolerance runs in your family, you might want to speak to your doctor about testing for these genes, as well as antibodies that can reveal how active your immune system is. Remember that celiac disease is an autoimmune disease and will show high levels of certain antibodies (including transglutaminase autoantibodies or autoimmune comorbidities), but this might not be true for people with a gluten intolerance — or the antibody levels could be less severe. Either way, knowing for sure where you stand can be helpful if you’re more susceptible to having reactions to gluten than the average person. Other tests to consider include a zolulin test (also called a lactulose test) and a IgG food allergy test. These types of leaky gut tests  can indicate if gluten (or parasites, candida yeast and harmful bacteria) is causing gut permeability. Zolulin controls the size of the openings between your gut lining and your bloodstream, so high levels indicate permeability. Over time, if the gut lining continues to become permeable, “microvilli” (tiny cellular membranes that line the intestines and absorb nutrients from food) can become damaged, so knowing the severity of your condition can be important for stopping the problem from getting worse. But Aren’t Some Gluten-Containing Whole Grains (Including Whole Wheat) Healthy? For decades, there has been a growing emphasis on whole grains in the American diet. We’ve always been told that they are full of fiber , nutrients and should be consumed multiple times every day. There’s a few reasons why this is true: They are cheap to produce, shelf-stable, can easily be shipped and stored, and are used to make various processed products that have a big profit margin. All things considered, the nutrient density for grains is pretty low, especially when you consider the bioavailability of their nutrients. Many of the vitamins or minerals that are present in grains cannot actually be utilized by the body because of the presence of antinutrients, including gluten, described earlier. While whole grains are a part of some of the healthiest diets in the world (like the Mediterranean diet ), they’re also usually balanced by plenty of nutrient-dense foods including healthy fats (like beneficial olive oil ), vegetables, protein and fruit. Grains can certainly play their role in a balanced diet, but overall they are somewhat of a suboptimal food source when compared to more nutrient-dense foods like grass-fed animal products, fish, vegetables, fruits, seeds and nuts. Therefore, having them less often than other sources of carbohydrates (like starchy veggies or fruit, for example) is a smart idea. Even grains that don’t contain gluten — like corn , oats and rice — do have proteins that are similar in structure to gluten. So even these can cause an immune response in some people. Many people feel better without any gluten, grains or legumes in their diets, but they wouldn’t even know this because they have never experienced an extended period of time without eating these foods. If you’re mostly healthy and do choose to eat grains, try to focus on eating gluten-free grains like rice, gluten-free oats , buckwheat , quinoa and amaranth . It’s also a good idea to properly prepare grains (especially types that contain gluten) by soaking, sprouting and fermenting them. Sprouting grain helps improve nutrient bioavailability, reduces the presence of gluten and other inhibitors, and makes them more digestible. Look for sourdough or sprouted grain breads (like Ezekiel bread ) ,  which are better tolerated than ordinary wheat-flour breads.\n • Admin\n Feb 7, 2017\n\n How to Maintain Normal Blood Sugar Most of the habits that help us maintain healthy, normal blood sugar levels are fairly obvious and simple to carry out. However, some might also surprise you, especially if you think it will be tough to start managing your blood sugar better. Small changes in your diet, exercise routine and sleep schedule can wind up making a big difference when it comes to blood sugar management. Let’s look at some of the best ways to help get you on the right track to reaching and maintaining normal blood sugar levels for life. 1. Eat a Low-Processed, Anti-Inflammatory Diet A healthy diet is key to blood sugar management and preventing or treating diabetes . It’s not that you must avoid consuming any carbohydrates or sugar when trying to maintain normal blood sugar — just that you need to balance them out with protein/fats, and focus on getting them from real, whole foods. Eating a source of protein, fiber and healthy fat with all of your meals can help stabilize blood sugar, especially when you consume carbs/sugar (such as starchy veggies like potatoes, fruit or whole grains). These slow down the absorption of sugar into the bloodstream, help manage your appetite, and are also important for your metabolism and digestion. Some of the best protein foods for managing blood sugar include: wild fish such as salmon, free-range eggs, grass-fed beef or lamb, raw dairy products (including yogurt, kefir or raw cheeses), and pasture-raised poultry Healthy fats include: virgin coconut oil, MCT oil, extra virgin olive oil, nuts and seeds (like almonds, chia, hemp and flax), and avocado. Coconut oil, ghee and grass-fed butter are all some of my favorite fat-burning foods for managing blood glucose levels while also improving the taste and filling quality of your meals. High-fiber foods include: fresh veggies, whole pieces of fruit (not juice), sprouted beans or peas, and ancient grains. Some of my favorite foods especially high in fiber are artichokes, green leafy vegetables, chia seeds, flaxseeds, apples, pumpkin seeds, almonds, avocado and sweet potatoes. According to an article in Diabetic Living magazine, other foods and drinks that make great additions to a blood-sugar-stabilizing diet include apple cider vinegar, cinnamon, green tea, herbal teas, fresh herbs and spices. ( 3 ) 2. Switch Up Your Carbs & Sweeteners While all types of added sugars are capable of raising blood sugar levels, some sources of sugar/carbs affect blood glucose levels more so than others. When you use appropriate amounts sparingly, natural/unrefined, ideally organic sugar sources (such as those from fruit or raw honey) are less likely to contribute to poor blood sugar management than refined sugars (such as white cane sugar or refined products made with white/bleached wheat flour). To help sustain normal blood sugar, check ingredient labels carefully, since sugar can be listed under dozens of different names. Skip anything made with refined flour (also called wheat flour or “enriched flour”) and added sugars, such as beet sugar/beet juice, cane sugar, high fructose corn syrup , fructose and dextrose . Instead choose natural sweeteners , including raw honey, organic stevia, dates, pure maple syrup or blackstrap molasses. Most importantly, still watch your portion sizes, using only a small amount per day of even natural sweeteners (such as one to three teaspoons daily). When it comes to grain-flour products, it’s best to consume grains in their whole form whenever possible as opposed to in flour form, which tends to spike blood sugar more. But if you must use flour, choose those made with 100 percent whole grains, or else try coconut flour or almond flour for an even healthier option. In terms of beverages, stick with water, seltzer, herbal tea or black tea, and coffee. Coffee is best in moderation, meaning one to two cups daily, especially compared to sweetened drinks, juices or soda. ( 4 ) Keep in mind that alcohol can also raise blood sugar, especially if you consume sweetened alcoholic drinks (such as certain dessert/fortified wines, sherries, liqueurs, mixed drinks with juice and ciders). ( 5 ) 3. Get Regular Exercise You’re probably already aware that there are literally dozens of benefits associated with exercise . According to the National Diabetes Association, exercise manages blood sugar in more than one way. Short-term exercise helps cells in your muscles to take up more glucose in order to use it for energy and tissue repair, therefore lowering blood sugar in the process. Long-term exercise also makes cells more responsive to insulin and helps prevent resistance. ( 6 ) Doing about 30–60 minutes of exercise most days of the week (such as running, cycling, swimming and lifting weights) is also a simple, beneficial way to lower inflammation, manage stress, improve immunity and balance hormones. Insulin sensitivity is increased, so your cells are better able to use any available insulin to take up glucose during and after activity. 4. Manage Stress Excessive stress can actually cause blood sugar levels to rise due to an increased release of the “stress hormone” cortisol. Stress kicks off a vicious hormonal cycle for many people. It not only contributes to high blood sugar by raising cortisol, but also tends to increase cravings for “comfort foods” (many of which are refined and filled with sugar or other inflammatory ingredients) and often interferes with getting good sleep. ( 7 ) All around, dealing with high amounts of stress makes it less likely that people will take good care of themselves and keep up with healthy habits that contribute to normal blood sugar. For example, skipping workouts and drinking more alcohol and caffeine are both common among chronically stressed adults. These self-destructive habits contribute to even more stress, which interferes with blood sugar management even more. It’s no wonder that people who develop health problems like diabetes or heart disease, or even who wind up gaining a lot of weight and facing obesity, tend to feel more depressed and hopeless but find it hard to break the cycle and develop new habits. What are some ways you can help deal with the inevitable stresses that occur in life? Studies have found that natural stress relievers , including exercise, yoga, meditation and using relaxing essential oils for anxiety (such as lavender, rose and frankincense) are all helpful for diabetics and those with insulin resistance. ( 8 ) Other ways to wind down include spending more time outdoors, joining groups in your community, and connecting with family and friends more. 5. Get Enough Rest Being well-rested is crucial for maintaining a healthy outlook on life, sticking with healthy habits and even managing hormone levels. According to the Centers for Disease Control and Prevention, about 35 percent of Americans report getting less than the recommended seven to nine hours of sleep each night, raising their risk for numerous health problems, including type 2 diabetes. ( 9 ) A lack of sleep can raise stress and appetite hormones (like cortisol and ghrelin , which make you hungry), making it harder to void sugary snacks, refined grain products and caffeine overdose . Sleep and metabolic processes are linked in several key ways, and research shows our natural circadian rhythms can trigger high blood glucose or raise the risk for diabetes when they’re disturbed. Sleeping too little, getting poor quality sleep or sleeping at the wrong times can impair insulin secretion even if you don’t change your diet. Aim to get between seven to nine hours of sleep per night, ideally by sticking with a normal sleep/wake schedule — in order to balance hormones , curb stress responses, and have enough energy to exercise and keep up with your day.", "pred_label": "__label__1", "pred_score_pos": 0.7138295769691467} {"content": "zebrafish embryoIn research with zebrafish embryos like this one, scientists found two specific factors are needed to activate DNA in the newly formed genome.Credit: iStock\n\nWithin hours after fertilization, a unique genome forms from chromosomes contributed by the egg and sperm. However, this new genome is initially inactive and must be \"awakened\" to begin the transcription of its DNA and start embryonic development. How life's first step happens has long fascinated developmental biologists.\n\n\"This is the beginning of life from a molecular standpoint,\" said Antonio Giraldez, the Fergus F. Wallace Professor of Genetics and chair of the Department of Genetics at Yale. \"What hasn't been clear is how and what kick-starts the transcriptional activity of the embryonic genome, so that the embryo starts taking control of its own development with its own genetic blueprint.\"\n\nGiraldez and his research team at Yale found that two specific factors are needed to activate DNA in the newly formed genome, they report June 17 in the journal Developmental Cell. Using a combination of microscopy and RNA sequencing analysis, they revealed the pattern of transcription within the nucleus of a zebrafish embryo.\n\nThe researchers also developed tools to visualize the first activated gene in the zebrafish genome, known as miR-430, and trace the gene's activity in living embryos.\n\n\"Now we can visually look inside the nucleus and analyze how the first gene within the silent genome is awakened,\" said Shun Hang Chan lead author of the study and a doctoral student working in the Giraldez lab.\n\nThe activation of the zebrafish genome requires the presence of two proteins—P300 and Brd4—produced by the mother. Disruption of the activity of these two proteins using small molecule inhibitors prevents the activation of the embryonic genome, which in turn blocks development of the embryo. However, researchers found that even after they blocked the production of these maternal proteins, they could overcome this block and prematurely kick-start activation of the embryonic genome through the artificial introduction of P300 and Brd4.\n\n\"These molecular factors act as a sort of molecular timer, which sets the timing of genome's awakening,\" Giraldez said. \"Finding these key factors involved in genome activation serve as the critical first step towards our understanding of how life begins.\"", "pred_label": "__label__1", "pred_score_pos": 0.9991133213043213} {"content": "MMP wants to connect to connect young Portuguese seafarers graduated from the Portuguese traning centres to the global universe of shipping, promoting employability. \n\n\nSupporting Portugal’s maritime competence\n\nSupporting the Portuguese education program is the aim of the close dialogue between the ENIDH and MARÍTIMOS. \n\n\nENIDH appreciates the network of interested shipping companies that MARÍTIMOS is providing towards young Portuguese seafarers, \n\nwhile MARÍTIMOS enjoys the maritime expertise and the support of the ENIDH in practical matters, as for the ERASMUS + Program. \n\n\nMARÍTIMOS creates the link between shipping companies and students of the ENIDH. The MARÍTIMOS management considers this being an important part of their dedication to the project and to demonstrate the value in the Portuguese maritime competence. \n\n\n\n\n\n\n\n\n\n\nMMP - Marítimos Manning Portugal, LDA\n\nAvenida Arriaga, 42b Edifício Arriaga 6.2\n\n9000-064 Funchal\n\nMadeira | Portugal\n\n+351 214 821 395", "pred_label": "__label__1", "pred_score_pos": 0.9950947761535645} {"content": "XRP(XRPBTC): short term correction at MINIMUM\n\n276 0\nchart speaks for itself. For a short period early on the in bear market XRP acted as a hedge for btc so it would not be unreasonable to assume XRP might still hold on for a little while longer while btc is falling, although the green buy zone needs to be watched for a break down. While the price does drop below the buy zone for a few days I decided to consider those to be outliers since the buy zone where its at now capture's more price rebounds.", "pred_label": "__label__1", "pred_score_pos": 0.9680262207984924} {"content": "Procurement Outsourcing Partner will help you to develop new contracts and improve your existing templates to ensure that the best terms and conditions are included. We will manage existing client’s contracts and renew them upon expiration. We will ensure that all incentives and liquidated damages are in place, in case the supplier delivers good or bad performance. Our competent consultants can negotiate the contract on your behalf or support you during the negotiation phase.", "pred_label": "__label__1", "pred_score_pos": 0.9350050687789917} {"content": "Part one\nWelcome to Aetherius\n\nThey watched the mountains rise as Oblivion lifted high into the sky. They watched as the earth fell away to the bottom of the lands. They watched as towers spun into the heavens and, as the ethereal beings watched the success of Oblivion, they summoned me.\n\nLet me tell you, my brothers and sisters of Aetherius, for I have ever so briefly glimpsed its beauty. I must tell you of this happening and allow you to decide your course, as your struggle and pain will surely follow mine. While struggle we may have, together we will gain more than we could ever imagine, not only for us, but for all of Zolaria.\n\nNow close your eyes and hear of my time in Aetherius.\n\nGazing over the lands, they saw the sprawling town of Braavos, the underwater haven of Rapture, the towering mountains of Paragon and the mighty walls of Verstad, and they knew they had found their champions.\n\n“Hello my vessel,” one of the beings said as it approached me. Its approach is strange, for although it had shape it did not seem to use its legs as it gracefully floated closer. I did not fear it, for I could feel a great benevolence radiating from its aetheric form.\n\n“We have summoned you here with a great task that we shall entrust upon you. We are the creators of this realm and we have been awaiting a champion since the age of creation.”\n\nI stood in silence trying to take in everything that was happening. Stars were crossing the heavens at amazing rates and I could see through the multi-colored fog that drifted everywhere; what looked to be a sun being born.\n\nThe being watched me for a long moment before continuing. “Long ago, when we set to make this mortal realm, dark forces watched us from afar. We were bold and thought our powers great enough to ignore them, but with the creation of Zolaria, those forces set in motion a powerful enchantment that bound our own energy to the land, weakening us enough to contain us here in Aetherius. It is that enchantment that binds your own being to the lands after your death and recreates you to continue on.”\n\nI was stunned. I had heard many myths as to how Zolaria’s hold on its people was so strong, but I could feel the truth in this being’s words.\n\nHe continued: “You are all one with us as we are one with the rest, but the bonds that hold us must be broken so this evil can be pulled from the shadows, and removed from Zolaria forever. We have seen the strength in you and yours, and have chosen you to undertake this task.”\n\nI felt my spine straighten as my body tensed at the idea of our immortality and the possibility of our world being destroyed.\n\n“You need not worry yourself, young one. Breaking the bonds will not harm Zolaria, but in fact will heal her. The beings that interrupted the creation and bound us have done so to take control of Zolaria. That is why the undead freely roam and why the evils seem never ending. They have attempted to take over the lands for many ages, but, while they bound us, they did not realize it would bind all of our children as well. Due to the children of Zolaria being immortal these dark forces have never been able to claim the world as its own.\n\n“I task you, Eldrylars, that on the eve of the third age, you and yours will find yourself in a new and strange land. A land wild and untamed. A land full of extreme dangers and evils. In this new land, you must take hold. Be ready for struggle beyond. The evil forces will certainly bring your own brothers and sisters to bear against you. Do not hate your brethren for their betrayal, for they will have been foolishly deceived by the powers of the evil force.\n\n“To weaken the enchantment you must assemble four centers of power that will channel the energy of this feral land, allowing us to regain some of our powers. These centers must work in cohesion to succeed, as if they are four pieces of one whole, instead of four separate pieces. Once this has happened, we will be able to open the gateway to the land that links Aetherius and Zolaria. This ancient land has been frozen in time from the earliest days of creation and once the gates are open, the real battles will begin. When our presence is felt in Zolaria, the forces that wish to control it and destroy its people will be forced to show themselves. It is then that the fate of the worlds will be decided.\n\n“You now know our task. You know the dangers and you can envision the rewards: a Zolaria that can grow peacefully with all of her children for all time. Follow us, brothers and sisters of Zolaria, and let us free our world from this evil!\n\nPrepare yourselves, for on the eve of the third age, we shall be forever changed; tasked with the greatest destiny one could ever be given!\n\n“The Aetherius Dominion will rise and the people of Zolaria will be freed!”\n\nPart two\nThe Gathering\n\nIt is late in the evening and the moon is already high in the sky. The building is barely lit, dark enough that several of the travelers lose their footing more than once. Many bodies are travelling these halls this evening, all heading towards a room at the back of the building. There is a dry taste to the air, and all the smells one would expect in an old building, both good and bad, are missing. Each time the door to the room opens, a thick fog seems to ever so briefly escape into the hall, making it harder to breath.\n\nA heavy atmosphere hangs over the travellers as they shuffle into the room. The room is bare but for an octagonal table which has two seats on seven of eight sides. The travellers find their places among the fourteen seats, with their armored companions standing alertly in the shadows behind them. The figures hold themselves in somber attentiveness, yet there is a tense unease that hung in the air.\n\nThe sentinels stand with a hand on their blades, their eyes watching the corners of the room, but furtively watching one another.\n\nAs the last seat is filled, the door silently swings shut and is bolted by an unseen hand. The heaviness of the room doubles, making the pressure so great that one of the men standing at arms briefly starts to heave and choke.\n\nThree figures emerge from the darkness of the corners of the room, surrounded by the shadow of some oppressive fog. The figures appear to glide rather than walk as they convene at the open edge of the table. There is a pause as the three look at each man in turn. And then they speak.\n\n“We have summoned the most powerful and wise leaders of these lands, to propose an alliance that will grant glory, riches and influence to those brave enough to take it.”\n\nThey speak not alone but together, their voices echoing each others’ words, increasing to a low rumble that seems to wrap around the room. Their voices are low and dragging, almost guttural, and as they speak the stench of decay wafts from their mouths. A few of the men shuffle uncomfortably, and one individual sitting nearest the figures retches into his hand. Yet the greed and desire is unmistakable in their eyes as they stare fixedly at the three figures.\n\n“Let us start by becoming,” the three pause for the briefest moment, “friends.” As the words leave their lips, the slightest of smirks can be caught by one with a keen eye.\n\n“Around this table we have Koen of Silvermede, Glacial of Lux, Zen of Genesis, Raekin of Ambercove, Multis of Firecrest, Guardian of Aldenshire, Vongard of Legacy, Dwarfers of Raubtier, Reecon of Atlantis, Ravynn of Demons Wood, Lumont of Umbra, Werwew of Incendus, and Beastt of Port Royal. Now that we are all friends,” at this the three glance sideways at one another, “let us continue. A great enemy is attempting to return to our world, and if it is to succeed it will take away all our powers and destroy all we hold dear.” A pause. “See for yourself the destruction they wrought on your old empires, your homes.”\n\nA scene materializes in the center of the table showing the ruins of the once great Bastion keep and of their homes seemingly melted into the grounds and absorbed back into the lands. Gasps and angry murmurs resound around the table.\n\n“These enemies are ours as well, which makes us allies of a common cause. We invite you all to share in the glory, power and riches that will come with the destruction of the enemy.”\n\nSeveral of those seated at the table glance back and forth between each other, as the rest of the table stare fixedly at the three speakers.\n\n“Whether you walk together or alone is unimportant to us. The only thing that matters is the enemies’ destruction. The power can be split several ways, or all can be obtained by one, it is up to you to choose your allies.”\n\nThis time every person at the table glances around, sizing up their neighbours. As they sit in silence, one stands and walks towards the door, turning her back to the congregation.\n\n“Ravynn, leaving so soon?” the three ask.\n\nTurning to keep her back to the wall, Dakinara following closely behind, she says, “We will not be a part of your army, we will not bend knee to you!”\n\nThe three seem amused. Suddenly Ravynn and Dakinara groan as they fall to their knees facing the three.\n\n“What was that, dear?” the three mock, as an invisible force holds Ravynn to the floor. “There is no escaping your destiny, Ravynn. You and yours will fight for our cause. You have no power to resist and if you try you will all suffer greatly.”\n\nRavynn and Dakinara struggle to get up, but they are not able to break the bonds that hold them. From across the table snickering can be heard from Koen and Vongard as Ravynn struggles uselessly.\n\n“As you can see, we are the ones with the ultimate power here, and you will do as you are instructed.”\n\nWhile the three are talking, Dwarfers glances back to Grey before leaping forward with lightning speed, his sword blazing with the intense light of his soul fire. As his sword is about to meet its mark on the nearest of the three, they each lift a hand faster than any would think possible and Dwarfers shoots backwards, crashing hard into the wall at the back of the room and crumpling to the floor.\n\nGrey whispers something under his breath and a bolt of lightning shoots from his hand at the three, but it is absorbed harmlessly into the dreadful fog that surrounds them. Within the blink of an eye Grey lies crumpled on the floor next to Dwarfers. The three look back across the table.\n\n“Is there anyone else with something to say?”\n\nThere is silence as the reality of their positions sink in. No one else stands or attempts to speak.\n\n“I am glad we have an understanding. Now back to business.” A dark glow starts to swirl in the center of the table, drawing all eyes toward it.\n\n“Sit.” Ravynn, Dakinara, Dwarfers, and Grey rise up from the floor and solemnly make their way back to their seats, as marionette dolls pulled by their strings.\n\n“The enemy, although strong, is still too weak to manifest on this world. Instead they have recruited those that were once called the Legion of Oblivion, from your previous lands. The enemy is responsible for the destruction of your old homes and now they plot to destroy the rest of the world.”\n\nImages of the leaders of the Legion flash in the misty light above the table. While watching the images, anger and fear flash across the faces of several of those at the table. Glacial forces a smile and says, “Oblivion is nothing, if that is all this enemy has to offer then we have already won.” A titter of annoyance passes between the three.\n\n“We see your arrogance is as strong as ever. Have you forgotten your failures? Have you forgotten how you fell, twice to Oblivion in the tournements? Have you forgotten the countless battles you lost in the fields? Everyone at this table has failed in their attempts to outplay the Legion. I can assure you all, that you will fail again without our assistance.” More discomfort crosses the faces of those at the table.\n\n“We will assist in your training by showing you vast mountains and huge caverns where the undead flourish, we will assist you on your way to hell to gather the riches that can be found there, and we will assist you in regaining the riches and power that was once stolen from you. Power and riches will come to the lord or lords who conquer the enemy. We will be watching you, and will either reward or punish you, based on your successes or failures.” Once again those at the table look amongst themselves.\n\n“The name that the enemy goes by is the Aetherius Dominion, and although they have lost many of their great warriors, they have already grown stronger than all of you. You must train, and with our resources, you will gain strength quickly. Then you must stop the enemy before they get any stronger.”\n\nThere is a rush of fog into the room and the pressure of the air triples. The lords are blinded, and several choke. Over the next few minutes the fog dissipates and the pressure in the room subsides, alleviating the sense of weight pressing down on those around the table.\n\nThe three figures were gone.\n\nOne by one, the people at the table gather themselves to make their way out of the building. Vangard laughs as he passes by Ravynn, and says, “Good luck with Aetherius while you are lying on the floor. Perhaps I could offer you a more fitting position, as my servant?”\n\nKoen, standing across the room with Werwew, Recon and Multis, yells to Dwarfers, “Such a mighty warrior falling to the floor like a child knocked down by a breeze. Best get used to it as we will take care of you before we finish Aetherius.”\n\nDwarfers grins at the insult and says, “I look forward to seeing you soon.” He and his escort vanish in a cloud of redstone dust.\n\nLumont, who has been sitting back and watching the show, laughs loudly. “You and your petty alliances. We do not need the assistance of other as you do. We will crush Aetherius, as well as the rest of you without any of your pathetic hand-holding alliances, and then we will take all the power and riches for ourselves.”\n\nThere is obvious amusement on the face of Glacial as he fades into his own cloud of redstone dust.\n\nMoments later the stragglers walk out the door or recall back to their dwellings.\n\nPart three\nAetherean Council\n\nThe council chambers are crude but they serve their purpose well. The six sit at the round table going over resource lists and diplomatic papers.\n\nEldry asks across the table, “The funds, Jonsoon, they seem to be lacking.”\n\nJonsoon raises an eyebrow and sighs, “Unfortunately even with every member doing his or her part, these souls are hard to come by. Even though we have accumulated more souls than the rest of the lords combined, we have still only gathered twenty thousand of the twenty eight thousand we need.” Eldry nods.\n\n“I understand, and have seen the generosity of our followers first hand and it’s heart warming, but we must be ready soon. Let us run an extra shift so we can get this portion done and out of the way. Zeph, how close are we with the organics and ores?”\n\nZeph grins as she quickly replies: “Fortunately all the supplies have been gathered! The people are soaking their sore fingers now and will hopefully be able to help with the soul collecting soon.”\n\n“Wonderful!” Eldry responds.\n\nWitchy stands and lays out several sheets of paper on the table as she says, “There is the matter of the alliance proposals. Both Demons Wood and Port Royal are requesting admission to our courts with the intent of proposing formal alliances.”\n\nThose around the table glance at the documents momentarily and then North breaks his silence. “Perhaps more allies would be beneficial at this point? Both Ravynn and Beastt have always been honorable in the past.”\n\nNorth’s words seem to trail off in a slowed echo. All those at the table start to feel a light airiness about them. The room becomes brighter and brighter, although the source of the white light is not detectable. With the light comes a peaceful and calm feeling. For a brief moment the room is filled with nothing but white light, blinding the six council members.\n\nGradually the white light fades away and, as the surroundings come into focus, they find themselves in a new place. Stars are flying across the sky and the suns seem closer, brighter and more inviting. For several minutes the Lords stare in amazement. For Eldry, the memories of his last visit to Aetherius came flooding back to him.\n\n“Where is this place?” asks Witchy, her eyes wide, sparkling with the wonder of what she is seeing.\n“It’s so beautiful,” Zeph almost whispers.\n\n“We are in Aetherius, my friends,” Eldry responds.\n\n“This, is what we strive for?” Michael asks, while already knowing the answer, but needing to hear it to make it more real.\n\n“Yes, my kin, all beings’ paths eventually lead through such a place,” rings a voice that chimes like bells.\n\nA lovely scent reminiscent of jasmine and lavender fills the space where the six stand. As one, they turn to see a figure floating gently towards them. The figure seems to radiate peace with a light glow that shimmers off its body.\n\n“Welcome to Aetherius my friends. We have much to discuss and very little time.” The being glides swiftly away from them, and feeling a sense of urgency, the six follow without hesitation.\n\nThey follow along walkways that seemed to float in a pinkish fog. Through the fog as well as high above, the stars were shining brightly. There was no visible land beneath the walkway or anywhere within their range of view, and although it seemed like the walkway was floating on a cloud, there was no sense of height creating a calm while they traversed it. The sun shines brighter than sunlight in Haven. Its rays shimmer off the surface of the walkway, the light refracting into a multitude of colors, not unlike the iridescence of pearls. After a short distance the walkway ended at a staircase which lead them up and onto a platform. Centered on the platform is a great round table, made from the same pearly material of the road. Around the table are seats suspended in air by some unseen force. The being slides gracefully into one of the seats and gestures for the others to do the same. Within moments all the lords are seated, eyes riveted on the being before them.\n\n“Once again, welcome to Aetherius, my kin,” the being began. “Let me start by introducing myself and my people. We are Aetherean, and long ago we were a people such as yourselves. Our then young world and it’s people, lived in a constant state of struggle and turmoil. We endured for many tens of thousands of years, and eventually we were able to grow past our views of separation, and  realize that we all are truly connected and that at one’s core, each being can not truly able to be distinguished from the next.\n\n“When this realization occurred, it quickly spread across our planet, and barely one hundred years after, not a single one of us could harm another, for we knew that to harm another would be to harm ourselves. Once this understanding was in place and our people were at peace, we started the feel a pull from our world and we started to feel our direct connectedness to our planet as well. Eventually after a long prosperous and peaceful period of learning and growth, our energy merged with that of our worlds, and all beings of Aetherius become one being, one consciousness, composed of millions of personalities.\n\n“That was many millions of your years ago. Now we work with others of our kind to help life start and flourish on younger planets. As you may already know, we were helping in the creation of your planet when we were attacked by dark entities known as the Bhor, and our energy was bound. Now, with your help, we hope to break the bonds made so long ago, so that we can free your world from the entities that have been tormenting it and then continue our work to help others.”\n\nThe Aetherean’s eyes shine a wonderful shade of green. The being gazes proudly at the lords, as a parent may gaze at their accomplished children. As its eyes meet each of theirs in turn, they feel a lifting sensation in their chest and are filled with hope.\n\n“There are several things we must tell you before you return, and as I said our time is short. The entities we are fighting against are called the Bhor. They are descendants from another planet that has matured through it’s stages.\n\n“Unfortunately, not all peoples grow with love. Some, such as the Bhor, never realized the connections between themselves, and grew their world through a purely self-interested society. Eventually, when they evolved, instead of becoming one with their people they became more separated and pushed more into war and hatred until only a few remained. Those that did survive these horrible times took their new found powers and absorbed the remaining energies from their planet before it died.\n\n“They have continued to live off the control of other, younger, planets, consuming the energies until the planet and its peoples die off.”\n\nFor the first time, a look of deep sadness could be seen in the being’s eyes.\n\n“Many planets have died in this fashion; countless other civilizations have travelled the same path as the Bhor, consuming the energy of other planets for their own growth, and in the process destroying them.” He pauses a moment before continuing.\n\n“The Bhor are very old and very powerful, and for most of those on this planet, they are very dangerous. A fortunate effect of our bonds to this planet allows us to shield you and yours from any direct assault from the Bhor. Unfortunately the Bhor are working around this by recruiting, sometimes forcefully, the other lords and ladies of the land in an attempt to bring their armies to bear against you. Some of these lords are coordinated enough to organize sizable forces, while others are scattered and will most likely be limited to launching small raids. The Bhor also have their own powerful minions that they have created and, of course, the normal creatures you have been fighting for generations.\n\n“Recently the Bhor summoned many of the lords of Haven to a gathering. During this gathering they gained the allegiance of a great number of the lords by convincing them that the destruction of Bastion was our design and your doing.\n\nIn a whisper Jonsoon asks, “The destruction of Bastion?”\n\nThe Aetherean turns to Jonsoon’s with a look of regret. “Yes, almost all you know of Bastion was lost to the Bhor, and the rest worn away by time.”\n\nMichael, with a look of confusion, responds, “What do you mean, time? We have only been here in Haven for a few weeks now. Certainly that is not enough time for the whole of Bastion to have been destroyed?”\n\nThe Aetherean considers for a moment and asks, “Do you remember the floating lands you visited before coming to Haven?”\n\nA few of the lords furrow their brows in concentration. Witchy is the first to reply. “I do remember”, she says slowly. “There were floating island with giant statues and great structures… yet, my memories are misty. I had thought them only a dream.” The rest of the table nods in agreement, straining to remember; they too have such memories.\n\n“That was not a dream, but a sacred, timeless place. For while you cannot die to sword or spell, while on Zolaria, your bodies continue to age as they should, and over time you would would die from that natural progression.”\n\n“During the age of Bastion, Zolaria was not yet ready to have the enchantment broken. Zolaria needed more time to grow and mature, for just as you grow in power and strength over time, so does Zolaria; and it is the power of Zolaria that is needed to break the enchantment. It was at that time that we cast a spell of sorts, to transport the the Legion to that sacred place, to preserve you and yours from the ravages of time while Zolaria finished maturing. The spell was powerful though and brought with it not only those from the old Legion, but  everyone else from Bastion as well.”\n\nThe Aetherean pauses for another moment. “The Bhor quickly realized we were behind the sudden disappearance and knew we must be attempting to free ourselves, but they could not determine what had happened or what we were planning. So, they searched and searched, and without the peoples of Bastion there to defend it, most of the cities were burned to the ground. Eventually, all the lands surrounding Bastion were destroyed by the Bhor’s minions.”\n\nOnce more, the Aetherean pauses briefly as if to allow for questions, but none of those around the table dare yet speak.\n\n“They searched for over a thousand years, my friends. One thousand years while you were all safely secured in the sacred lands.”\n\nThere are gasps from around the table. “One thousand years!” North asks.\n\n“Yes. As we said, Zolaria’s own powers were still too weak and it’s that power and the will of Zolaria itself which are required to break these bonds. Unfortunately, nothing could have been done in the Age of Bastion, and over ten generations of your descendents would have had to struggle to survive until this era, if they were to be successful in breaking the enchantment. Over the years, all but the mighty Bastion keep has returned to its natural state. The great keep was so well built that some of it still stands, but the rest of Bastion as you knew it is gone.”\n\nAs the being spoke, an image of bastion keep weaves itself out of pale mist in the center of the table. The once proud walls are covered in moss, cracked and crumbling, and the ground overtaken with wild grass. The pale mist drifts over the image as the scene shifts, sliding away from the ruined keep to the lands beyond, where nothing but thick jungles and long stretches of desert and tundra can be seen.\n\n“This new land you inhabit is also untamed and primal. In fact, Haven is the birthplace of all the people of Zolaria; it was the first land to grow out of Zolaria’s oceans during the planet’s birth. This is why Haven was chosen, for these lands are the only place on Zolaria powerful enough to open the gateway. The gateway we speak of is a portal to a long forgotten land. One not of Zolaria or of Aetherius but a place in between. This land was created when Zolaria was born, creating a link to other worlds for the purpose of growth. It’s through these lands in between our worlds that we can make our way from Aetherius back to Zolaria to help expose and defeat the Bhor.\n\n“Once the energy of Haven can be channelled through the four cities, we can focus it into the gate and activate it. The soul shards you find in these lands are a physical representation of Zolaria’s energy, its growth and its rebirth. When the energy of Zolaria passes from one point to the next it will sometimes take on a physical representation in these shards. These powerful pieces of Zolaria’s energies are useful in many tasks as you have found, but overall, they are a physical link, or a symbol, if you will, of the connection between yourselves and Zolaria. Their collective energies are what is needed most to power the gateway.\n\n“I must now return our conversation to the matters at hand, for we are almost out of time.\n\n“The Bhor have the other lords under their control, no matter how much they may want to resist. For this reason you cannot trust any of them as allies. The protection we are able to give you cannot be extended to save them from the Bhor’s manipulation. We do not ask you to declare any of the good people of these lands as enemies, as we strive for peace for your whole world. We do warn you, however, that taking them into your house will weaken our ability to protect you, and may well bring ruin to our task at hand as well as, perhaps, all of Zolaria.”\n\nThe air on the platform vibrates and shimmers and then returns to normal.\n\n“We are out of time my friends. Continue on your current path for you are succeeding in all your goals, and we will contact you as soon as we are able.”\n\nAs the Aetherean’s words end the room starts to shimmer again, slowly becoming brighter and brighter until all that can been seen is a pure white light. With the light again came the feeling of peace and airiness that accompanied the first experience. As the light fades the six find themselves sitting at their meeting table, their papers spread out in front of them as before.\n\nThey stare at each other, looking for words.\n\nFinally Witchy gathers herself and announces, “I suppose I had best start writing the replies to our would-be allies.”\n\n“Yes,” Eldry responds. “Let them know we regret to decline their requests, but we are not able to enter into any formal agreements at this time. We wish them well on their journey.”\n\n“I will double our efforts to collect the final souls we need to lay claim to Volantis,” Jonsoon exclaims.\n\n“Excellent!” Eldry replies. “Let us depart and continue with our jobs. We have done well, my brothers and sisters! We have a long track ahead of us, but hopefully soon we will see those fruits realized and help to heal our world.”\n\nThe six figures stand and bow to each other before heading off to their tasks.\n\nLeave a Comment.", "pred_label": "__label__1", "pred_score_pos": 0.7395514249801636} {"content": "Syndicate content\n\nArchive - Jan 3, 2014 - Story\n\nCleveland Clinic Researchers Create Online Colorectal Cancer Risk Calculator\n\nResearchers at Cleveland Clinic have developed a new tool called CRC-PRO that allows physicians to quickly and accurately predict an individual's risk of colorectal cancer, as published in an open-access article in the January-February 2014 issue of the Journal of the American Board of Family Medicine. CRC-PRO, or Colorectal Cancer Predicted Risk Online, is designed to help both patients and physicians determine when screening for colorectal cancer is appropriate. Current guidelines recommend patients are screened at the age of 50. However, with this new tool, physicians will be better able to identify who is truly at risk and when screenings for patients are necessary. To develop the calculator, the researchers – led by Brian Wells, M.D., Ph.D., of the Department of Quantitative Health Sciences in Cleveland Clinic's Lerner Research Institute – analyzed data on over 180,000 patients from a longitudinal study conducted at the University of Hawaii. Patients were followed for up to 11.5 years to determine which factors were highly associated with the development of colorectal cancer. \"Creating a risk calculator that includes multiple risk factors offers clinicians a means to more accurately predict risk than the simple age-based cutoffs currently used in clinical practice,\" said Dr. Wells. \"Clinicians could decide to screen high-risk patients earlier than age 50, while delaying or foregoing screening in low-risk individuals.\" Dr. Wells and his colleagues hope that their new, user-friendly calculator will help improve the efficiency of colorectal cancer screenings. They also believe prediction tools like this can help lower healthcare costs by cutting down on unnecessary testing. The Multiethnic Cohort Study comprised a diverse ethnic population.\n\nDeletion Increases Milk Production, Decreases Fertility in Dairy Cattle\n\nScientists have found a genomic deletion that affects fertility and milk yield in dairy cattle at the same time. The discovery can help explain a dilemma in dairy cattle breeding: the negative correlation between fertility and milk production. The work was published online on January 2, 2014 in the open-access journal PLOS GENETICS. For the past many years, milk yield in Scandinavian dairy cattle has gone in one clear direction: up. This has been due to targeted breeding programs and modern breeding methods. Despite putting large weight on the breeding goal in Nordic countries, almost no improvement is achieved for fertility. It now seems that this unfavourable correlation between milk yield and fertility is partially affected by a deletion of a simple gene sequence. The presence and effects of this mutation have recently been discovered by scientists from Aarhus University, the University of Liège, and MTT Agrifood Research Finland, in collaboration with the Danish Agricultural Advisory Service and the Nordic Cattle Genetic Evaluation. Scientists, farmers, and advisors have generally assumed that the reduction in fertility is primarily due to the negative energy balance of high-producing cows at the peak of their lactation, but now the scientists have also found a genetic explanation. “We have discovered a deletion encompassing four genes as the causative variant and shown that the deletion is a recessive embryonically lethal mutation,” explains Dr. Goutam Sahana. This means that the calves die while they are still embryos and are aborted or reported as insemination failure. The fact that the mutation is recessive means that both parents must carry it and pass the genes on to their calf for the calf to be affected.\n\nDogs Sense Small Variations in the Earth’s Magnetic Field\n\nResearchers analyzed the body orientation of 70 dogs of different breeds, while the dogs relieved themselves in the open country and without being on the leash. The statistical analyses of the more than 7,000 observations (recorded together with the currently prevailing environmental conditions of the location, time of day, and other important parameters such as the familiarity of the terrain for each dog) was frustrating. In contrast to grazing cows, hunting foxes, and landing waterfowl (previous studies of the research collective), the dogs showed no clear preference for a particular body alignment while doing number one or number two. But then the researchers around Dr. Vlastimil Hart and Prof. Dr. Hynek Burda made a striking discovery. They sorted the collected data according to the small variations of the geomagnetic field during the period of data collection. These irregular, tiny changes in the intensity and declination of the magnetic field lines are recorded by magnetic observatories and freely accessible online. The emerging picture of the analysis of the categorized data is as clear as it is astounding: dogs prefer a body-alignment along the magnetic north-south axis, but only during periods of calm magnetic field conditions. After taking into account all other factors, the researchers concluded that with this discovery they provide clear indication of a magnetic sense in our four-legged friends. To many dog owners who know about the good navigation abilities of their protégés, the findings might not come as a surprise – but rather as an explanation for the \"supernatural\" abilities, although it is not clear to the researchers what the dogs might use their magnetic sense for.\n\nJapanese Team Shows Jumping DNA in the Brain May Be a Cause of Schizophrenia\n\nStretches of DNA called retrotransposons, often dubbed “junk DNA,” might play an important role in schizophrenia. In a study published online on January 2, 2013 in the journal Neuron, a Japanese team revealed that LINE-1 retrotransposons are abnormally abundant in the schizophrenia brain, modify the expression of genes related to schizophrenia during brain development, and may be one of the causes of schizophrenia. Retrotransposons are short sequences of DNA that autonomously amplify and move around the genome. One class of retrotransposons named Long Interspersed Nuclear Elements (LINEs) make up a large part of the eukaryotic genome and it is believed that they may contribute to a number of disorders and diseases, such as cancer. LINE-1 retrotranspons have been shown to be more abundant in brain cells than in other cells in the body in adults, providing evidence for enhanced activity of LINE-1s in the human brain. However, the role played by LINE-1s in mental disorders, and in particular schizophrenia, has remained unclear. The team led by Dr. Kazuya Iwamoto from the University of Tokyo and Dr. Tadafumi Kato from the RIKEN Brain Science Institute demonstrated that the number of LINE-1 copies is elevated in the post-mortem brains of patients with schizophrenia. They show, using mouse and macaque models for schizophrenia and induced pluripotent stem (iPS) cells, that exposure to environmental risk factors during development, as well as the presence of genetic risk factors for schizophrenia, can lead to increased levels of LINE-1 copies in neurons. Employing whole genome analysis, the authors reveal that in schizophrenia patients LINE-1 reinserts into genes involved in synaptic function or schizophrenia and may result in disruptions in their normal functions.\n\nScientists Uncover Most Detailed Picture Yet of Muscular Dystrophy Defect, Then Design Targeted New Drug Candidates\n\nScientists from The Scripps Research Institute (TRSI) have revealed an atomic-level view of a genetic defect that causes a form of muscular dystrophy, myotonic dystrophy type 2, and have used this information to design drug candidates with potential to counter those defects—and reverse the disease. “This the first time the structure of the RNA defect that causes this disease has been determined,” said TSRI Associate Professor Matthew Disney, who led the study. “Based on these results, we designed compounds that, even in small amounts, significantly improve disease-associated defects in treated cells.” Myotonic dystrophy type 2 is a relatively rare form of muscular dystrophy that is somewhat milder than myotonic dystrophy type 1, the most common adult-onset form of the disease. Both types of myotonic dystrophy are inherited disorders that involve progressive muscle wasting and weakness, and both are caused by a type of genetic defect known as an “RNA repeat expansion,” a series of nucleotides repeated more times than normal in an individual’s genetic code. The repeat binds to the protein MBNL1, rendering it inactive and resulting in RNA splicing abnormalities—which lead to the disease. Many other researchers had tried to find the atomic-level structure of the myotonic dystrophy 2 repeat, but had run into technical difficulties. In a technique called X-ray crystallography, which is used to find detailed structural information, scientists manipulate a molecule so that a crystal forms. This crystal is then placed in a beam of X-rays, which diffract when they strike the atoms in the crystal. Based on the pattern of diffraction, scientists can then reconstruct the shape of the original molecule.", "pred_label": "__label__1", "pred_score_pos": 0.8030298352241516} {"content": "Family Constellations Healing from child abuse Parenting Personal Development Self help techniques\n\nWhat is an entanglement?\n\nAn entanglement is an enmeshment with another person that affects your ability to be yourself and do as you please. You are so caught up with the other person that your thoughts and feelings are tangled up with theirs. It is hard to know where you end and the other person starts, there is no boundary or separation, the two people are entwined, tangled together into one messy situation.\n\nThis comonly occurs when a child tries to take care of a parent. The child sensing the parent’s pain or inability to cope with their life, steps up and takes responsibility for helping reduce the burden on the parent. This is a reversal of the orders of love – parents are meant to give and children receive.\n\nHappy kidsChildren are meant to grow focussed on life, play, having fun and age appropriate issues. It is not normal for a child to be thinking about adult problems and trying to solve them. But children will do this out of loyalty, out of love and out of a desire to stay safe and keep their home. No matter how dysfunctional or painful a child prefers to stay with its parent, rather than be taken away into the unknown, even if that unknown is a more loving home with other family members or foster parents.\n\nOur loyalty to our biological parents is huge and stays with us our whole life. If we violate that bond, if we judge or reject our parents we feel a loss, an emptiness, a sadness deep inside, as the flow of love from the family line has been blocked. We are refusing to accept our parents and our life as it is. In essence we are saying ‘NO to life’ and we suffer as a result. The life force flowing to us is diminished as we are saying NO to our parents, NO to their love, NO to receiving any energy or support from them. We are saying “NO, you are not good enough, I wanted more, someone different to you”. This is fighting against life, fighting against what is. These are your parents for better or worse, they are your parents. They gave you life and if that is all they gave you it is a true gift. At the very least accept that, be grateful for that.\n\nAs we heal we can come to see our parents as not just ‘parents’, but as people with their own issues, challenges and emotional hurts. If we are trying to fix them, change them, influence them, we are still entangled. We are still caught up unhealthily over involved in their energy and trying to control life. This is like standing in front of a dam that is cracking and trying to order the water to stay there, not to move. It won’t work. As the dam cracks the water is going to gush forth, because that is what water does, gravity does.\n\nYour parents have their own lives to lead and it is not our place to judge them or be overly involved in their business, to be entangled like this stops us from living our lives fully. It is best to accept your parents as they are, to say ‘YES to life’, YES to receiving whatever goodness you can get from them and to accept that as all they can give you, to say “That is enough. What you can’t give me I will get from elswhere. Thank you Mum, thank you Dad, you are enough”. When we can say this and mean it we are freed from the entanglement. The love strength and support from the family line can flow to us, helping us, supporting us to live more fully. We are accepting our place in life and letting ourselves receive the goodness from our family line.\n\nReaching that place of acceptance can be a long journey. It takes time to grieve what could have been, what you felt should have been and to accept what was and is. That is the journey of life. It is true and authentic emotional release work required until you do feel peaceful inside and accepting of your family.\n\nYou could choose to stay in judgement and anger over what has happened or hasn’t happened in your life, but this just punishes you and limits you and your ability to live life joyously. Best to untangle the web, to break free and accept what is and make the most out of it. This is one form of entanglement that can have a massive impact on a person’s life.\n\nAnother kind of entanglement occurs when a child takes on a burden for the ancestors present or ancient. It can be a sibling not wanting to live fully because they see their brother or sister afflicted with an illness or who died and they feel guilty for living or being able to do what the other could not. In essence they wish to join the lost sibling. This will result in poor health for themself or some other dysfunction in their lives, as in essence they are saying NO to life, NO to goodness, abundance, health and vitality. They are saying I don’t deserve this or I have no right to this. It is self sacrifice out of loyalty, out of love and entanglement with the fate of the other.\n\nInstead of dying for the other choose to stay a while longer, choose to live fully for them, to do what they could not do, to achieve whatever you desire and to join them when it is your proper time. Whether it was a sibling who died young, your parent or your own child, you do not have to follow them into the grave. You can live and hold them in your heart, feel them in your heart. They are there, their energy is available to you. Your ancestors long dead watch you, pray for you and send you love. They want you to succeed and to advance the family line. It is okay to feel your sadness and to move through it back to peace and happiness.\n\nAnother type of entanglement which sounds a little more bizarre, occurs with past relatives whom you may not have even met. It is possible that a young woman having difficulties with infertility is actually entangled with a great Aunt who never married. The energetic connection is such that the present soul put up their hand to relate, to repeat the pattern that occurred in the family line. The same occurs with members of the family who suffered tragedies such as loss of a loved one, death, murder, suicide, etc. A present family member who is connected to the past ancestor may also have suicidal thoughts or mental health problems, they may have financial difficulties or other challenges in life.\n\nSometimes it is as if the current family member is atoning for the sins of the previous ancestor – they struggle to make up for the wrong doing of the other. In different situations it is as if the family member present today chooses the same fate out of love for the other, wanting to empathise with them. Either way it is not helpful to the present person and it hinders their ability to live their life fully.\n\nWhen the entanglement is identified and healed the person is free to live how they like. They can consciously honour the past family member and their fate, but choose to be free of the entanglement now, with love and respect, bowing to the ancestor and leaving it with them. This is core Family Constellations work and it is beautful to watch these resolutions occur and people being freed from the knots that have bound them and limited their ability to enjoy their lives. With the knots untied they can walk forward easily to do what they wish, without hindrance. May we all walk freely and enjoy our lives. Blessed BE. Amen.\n\nBy Jodi-Anne (18 September 2016).\nFamily Constellations Healing from child abuse Parenting Self help techniques\n\nWhat is the family soul?\n\nreflective-treeThe family soul is the collective energy that surrounds a lineage of people from the same family. It contains all the memories and experiences of everyone in the family.\n\nWhen there is trauma or exclusion a wound occurs to the family soul, a distortion of the energy, so instead of love flowing through the family line, pain now flows from the ancestors to the current and future generations. This also occurs when the orders of love are reversed, for instance if a parent is absent and a child does not receive the nurturing and connection it needs. The absence may be due to war, abandonment, physically if a child is given up for adoption or if a parent themselves is sick, unavailable emotionally or physically. When a parent is ill or emotionally unavailable, often the child will try to ‘give’ to the parent to help them cope or feel better. The child takes on responsibilities that are not theirs to carry – it may be helping out a lot around the house or caring for the other children or even caring for the parent. The orders of love are reversed in this instance as the flow of energy is child to parent, instead of it being the parent giving and the child receiving.\n\nIt also occurs when someone is excluded from the family, because everyone does belong to the family system, no matter what they have done. Excluding someone is like throwing a block, a big boulder into the flow of the family soul, the river of lifeforce energy flowing to all people. The block diminishes the amount of energy available to all people. Worse it creates a tear in the fabric of the family soul that will only be healed when that excluded person is bought back into your heart. If this does not occur, someone in future generations will subconsciously choose to relate to the excluded person and will end up feeling like they are not accepted or don’t belong, they will repeat the fate of the excluded individual as the family system attempts to heal the wound.\n\nIt is just like our personal journeys where life presents us with a repeating situation until we learn the lesson. This is the same thing, but at the family level. Discovering this enables those who are suffering to resolve it by welcoming the excluded person back into their heart, energetically welcoming them back to the family system and restoring them to their rightful place. This allows the lifeforce energy to then flow freely again to all members. This occurs at the soul level, energetic level, it does not have to be physically and often it is an ancestor long dead who was excluded and in need of reconnection to their rightful place in the family.\n\nIf there has been trauma in the family system, be it war, violence in the home, tragedy from loss of children, divorce, early death of parents, etc then this trauma can also pass through the family system to the current and future generations. It is as if the unresolved pain seeps through the blood of all involved instead of love, strength and support. This too can be healed so that those affected are freed from their over reactions to situations, the inappropriate feelings or thoughts they may have that don’t seem to be appropriate or consistent with their life experiences. For instance persistent suicidal thoughts or depression or anxiety could actually be resulting from entanglements with past family members, you are feeling their feelings, they are not actually your thoughts. These cease once the wound in the family soul is healed by acknowledging the tragedy, the loss and giving it it’s rightful place, allowing all to feel and move through the situation, instead of being stuck and controlled by it.\n\nThe family soul is a container of energy around all members of the same lineage, when all is well in a family you can feel the flow of love, flowing from the ancestors to yourself and the other current family members. This energy strengthens you, supports you and encourages you to live your life as you wish to do so, for you are the leading edge of consciousness, the person now evolving while here on Earth and expanding the consciousness within the family. The ancestors want you to succeed and do well, they want you to thrive and advance the family line. This is life as it was meant to be. This support is available once you heal any blockages to its flow. It is worth doing and quite easy when you know how.\n\nThere are many methods that can help. Family constellations is one of these, where the field supplies the information about what is missing and blocked and needs to be resolved within the family system. The challenge then is to feel what needs to be felt, forgive all involved and welcome them back into your heart. It is a similar task to our personal issues, just with some larger influences. It is a part of our evolution, our connectedness and oneness with the fabric of life. So be it. Amen.\n\nBy Jodi-Anne (15 September 2016).\nFamily Constellations Parenting Relationships Self help techniques\n\nWhy do we inherit family trauma?\n\nTrauma that cannot be processed by one family member, because it is overwhelming, they do not have the skills or knowledge of how to process it, or do not have the will to feel it and release it, will be passed on genetically to the next generation. It also of course affects the rest of the current generation due to the unavailability of the traumatised person who will be isolated within themselves, possibly numb emotionally and distant in their ineracting with others, be they their children or siblings.\n\nTrauma stays within the body and freezes part of the person’s energy, it is literally stuck, frozen in time within them, locked into when the trauma occurred. It stays in the body until it is processed and if it is not processed then it remains locked in place, creating internal tension and dis-ease.\n\nNo individual wants this to occur or be passed on to their existing children or grand children. It is not an intentional thing, it is an automatic thing. If Dad has died in the war then Mum is going to be mourning, she is not going to be able to be present fully for the children or meet their emotional needs. The children will sense Mum’s pain and feel their own loss and mourning, so they will try to get Mum to feel better, so they can get the attention they need. If it doesn’t work they eventually give up trying and switch off, shut down emotionally, feeling empty, unloved, unsatisfied with life.\n\nThe pattern then repeats when they marry and try to get the attention they missed out on from their husband or wife. No matter how loving the partner is, they cannot make up for the emotional pain or love deficit from their partner’s childhood, so it will feel unloving or not enough. They may try hard to give enough, to do extra, be extra affectionate and giving, they may try to fill that hole in their partner. Eventually they realise no matter what they do it is not enough, it doesn’t work and they are exhausted from trying, so they switch off, shut down, isolate and become emotionally numb as well, so the pattern continues. No malice, no cruelty, just life when there is trauma within one or both partners in a relationship.\n\nSo how do you resolve it? By becoming aware of the trauma within, by creating a safe enough space that you can feel it, acknowledge it and let it dissolve. By seeing your defense mechanism and games you have used to protect yourself from it.\n\n • Have you kept yourself so busy that you can’t feel?\n • Have you been saving the world, feeling righteous putting all your energy into others or a cause, but neglecting yourself, avoiding yourself and your inner world?\n • Have you been pleasing others, doing for others, hoping that they will love and accept you and you will feel that you are okay, lovable and worthwhile?\n • Have you been isolating yourself from others, keeping a low profile, so as not to be seen or to avoid any possible further trauma? By being preoccupied with avoiding it, you stay stuck in it and will have difficulty exeriencing any joy in life.\n\nThere are many defensive mechanisms that people use to try and keep safe or to avoid their feelings. Looking good so to avoid rejection, fearing you won’t be accepted as you are, so you try to be, look, do everything perfectly. This is exhausting. It is no wonder people end up depressed or ill, their life force is being frittered away with fear and their over reactions to it.\n\nTo clear the trauma and stop passing it onto our kids we need to become emotionally aware and savvy in processing how we feel. Learn to go within and sit inside yourself, breathe, let the emotion surface and breathe through it, let it be released, felt into completion. It can’t be avoided. It has to be acknowledged and felt. Thank the defense mechanism for keeping you safe, but choose to be present for yourself and your inner child now.\n\nhappiness inside jobIt is this inner child part of you that needs your reassurance, your love, your acceptance. It needs you to become the good parent to yourself, to know that you will look after him/her and protect her, you wil be the Adult guardian she felt was absent in earlier years. As she feels safer and you feel and release the pain, you will find you are not triggered by life any more, you can live more in the now and be there for those you love. Your children, if you have any, will notice this shift, they will feel your presence and they will absorb your love, your attention, and you can meet their emotional needs, fill up their inner cup with love so it is overflowing, then they can acept themselves and enjoy their lives.\n\nIf their cup does  not get filled and they feel empty, forlorn, they will at a soul level choose to take some of your pain, some of your trauma so you feel better and then you might be able to love them more. They abandon themselves to care for you. This is a reversal of the orders of love and is damaging for all involved. Parents are meant to give and children receive. However, it is often reversed in many families when the parents are hurt, injured or unavailable, whether that be due to illness, addiction or absence.\n\nChildren try to make the parent happier, they may try to be neater or tidier, they may help out with the housework or try to cheer the parent up with jokes, they may try to steal the attention through getting into trouble to distract you from your pain or they may even sacrifice their own health, choosing to get ill so you will focus on them and not feel your own pain. Children are so loving, but this is not healthy behaviour.\n\nIn doing this chldren miss out on being kids, they grow up way too fast and this stunts their natural growth and emotional development. It locks trauma, pain and loss within them and so the cycle repeats. When they have their own children they will sense the parent’s pain and do the same thing, hence it passes through the generations. No malice, not deliberate, done out of love, of wanting to help and of not knowing how to heal the underlying issue of emotional pain and trauma.\n\nThankfully in today’s world we do have the knowledge of how to heal trauma, how to bring love back into the family system and to correct any reversals of flow, so that the younger generations can receive the love and support they need and deserve from the ancestors behind them.\n\nFamily Constellations and other methods can help individuals to heal their family systems, enabling hope and love to exist for all family members. There is much more that can be said about this in future blogs, for now this is enough, to understand that trauma passes through families until love is restored.\n\nEach family member can find peace and happiness when the blocks to love are removed. It can be done, support is available and you can learn the skills to feel your emotions and release that which is locked away inside you. It is possible, it is worth doing and your children thank you, because then they don’t need to do it for you, the burden they carry for you is transformed, freeing them to enjoy their lives more. Such love, such loyalty, such strength and commitment to each other, that is what families are about and it is beautiful. Blessed BE, Amen.\n\nBy Jodi-Anne (10 September 2016).\nPersonal Development\n\nHow to live life as if love is all that existed?\n\nyellow roseLife is actually full of love, but few people see or feel this. For most people life is full of struggle and fear, but it doesn’t have to be that way. Life is full of love, it is everywhere, because it is our primal nature, it is what energy is made from.\n\nBabies are so loving because they are still in that primal state and their vibration brings out love in us too. Being so primal all their emotions are very pure, so when they are upset we know about it and that too can pull out a matching emotion or vibration in us. Babies are in touch with their essence, their core self and as such are very magnetic energetically.\n\nAs each of us heals our hurts, our disappointments with life, our conditioning and past wrong doings, as we heal and forgive ourselves and others we too return to our core essence which is love. We feel love all around us and for all beings.\n\nIt feels so good to feel love as a predominant feeling that in time we choose it in most circumstances. We choose not to judge others and accept what is. We choose to let go and not take things personally when someone treats us less than ideally. We choose to send love and pray for others who are hurting, but don’t allow ourselves to get caught in the drama or to be a victim rescuing others. We learn to stand strong in our personal power, yet still be soft, gentle and available for all – when we choose to. We also take time to honour our self and meet our own needs. When we live in this way, with balance between self and others, between work and play, between service and self indulgence, we have inner peace and satisfaction with life, as we know we matter, our actions serve the world, and benefit all including ourselves.\n\nMany of you put yourself last, doing everything for others, self sacrificing then wonder why you feel depleted, less than joyful or happy with life. You need to honour you. You need to fill your own cup – to meet your own needs, so you are happy and fulfilled and energised, then you can give to others freely, easily and joyfully. Doing so fills you up further rather than depletes you.\n\nMany of you give as you don’t feel you deserve to receive or it may feel unsafe to receive. For some it is scary to receive and trust another’s presence in your life. For some independence has become so strong in them that they always have to be the BIG one and make the other the SMALL one, they act as if they are better than somehow, when really they are scared to receive and coping the only way they worked out how.\n\nYou don’t need to please others all the time to be accepted. It truly is okay to please yourself. You are allowed to treat yourself well. You are allowed to be happy, truly you are. You are allowed to do what you want. So many of you were told NO constantly as children, that you say it to yourself before you even assess whether or not you can have or do what you want. We tell you, you can have it or do it. As long as what you are doing is not hurting others have it, do it, become it.\n\nYou have a right to be happy and do what you want. You have a right to enjoy your life and live it with passion, feeling alive and vital and excited about your days. You are allowed to live life to the full. No need to accept a life of mediocrity, of survival, of just getting by. Life is here for you to make the most of it, to evolve and grow, to live and learn, to serve and love, to enjoy freedom and have fun. You truly are allowed to be in love with yourself and your life.\n\nMost of you hate yourselves or at least doubt yourselves and your ability to earn a decent income doing what you love. You hold back out of fear, fear of embarrassment, failure, loss of self esteem, self worth, etc. This is all flawed thinking. Success is trying. Success is learning what works and doesn’t work and trying again. Success is moving forward and evolving and being of service to self and others. Success is breaking the mould and living passionately.\n\nYou can do it. You will do it and when you do you will be bathed in love and know that is all there really is in life that matters – it is matter, the material the Universe is made of – let yourself embody love, become love for self, others and life. It is who you truly are, drop into your heart and live from there. Let the mind rest and work with the heart. You can be guided forward from within if you just listen for that quiet inner voice that knows what is best for you to do, what is in line with your highest good and purpose here on Earth. Life can be full of love when you drop the veils that have been hiding the truth all along. You are love, you are loved and you are perfectly okay just as you are. Live life with passion and enjoy it. It is what you came here to do. Blessed BE. Amen.\n\nBy Jodi-Anne (01 September 2016).\n", "pred_label": "__label__1", "pred_score_pos": 0.6452547311782837} {"content": "American Society for Testing and Materials\n\n\nAs steel rolled out of mills throughout the Pennsylvania and Ohio valleys, buildings, railroads, automobiles and roadways depended on the quality of the steel products. Today, the ASTM sets standards across a wide range of markets; the organization plays a leadership role with the World Trade Organization in developing international standards which oversee industries across the globe with consensus, impartiality, and transparency. The American Society for Testing and Materials (ASTM) was established in the 1800s to work with the steel mills in Pennsylvania to regulate the production of steel used in the nation’s industrial revolution.\n\nElasticity, Yield, Hardness, Shear\n\nThe ASTM standards categorize steel’s properties, and measure its performance across the four characteristics: the “Modulus of Elasticity” refers to how far a piece of steel is can be deformed by applied stress and still return to its original shape, “Tensile Hardness” refers to the amount of stress that can be applied to the steel before it deforms, “Minimum Yield Stress” refers to the point at which steel will permanently deform and “Shear” applies to the amount of force the steel experiences at the point at which a piece of steel to undergo a clean break across its axis, perpendicular to the force. Each of these characteristics affects and defines steels’ strength and defines parameters engineers use to select kinds of steel for specific applications.\n\nCarbon Steel\n\nASTM A106 seamless pipe\nASTM A106 Covers seamless carbon steel nominal wall pipe for high-temperature service, suitable for bending flanging and similar forming operations.\n\nWhen rating steel products, the ASTM measures and rates all types of steel manufactured and supplied to industry. Six classes of carbon steel are monitored, as carbon is one of the most commonly used additives in steel manufacturing. The amount of carbon in a steel product affects the strength of the steel; steel is commonly discussed as low-carbon, medium-carbon and high-carbon, but the ASTM breaks down those categories even further, since steel with a higher carbon content can be tempered to greater strengths than low-carbon steel.\n\nAlloy Steel\n\nASTM A333 Pipe\nASTM A333 Pipe shall be made by the seamless or welding process with the addition of no filler metal in the welding operation.\n\nSteel is also classified as alloy steel when metals other than carbon are added to the molten iron to improve the performance characteristics of the metal. The ASTM identifies seven classes of alloy steel forgings; the details of classifications include the percent and type of alloy content, heat treating procedures which affect each type of alloy and the mechanical properties of each. These properties are measured, classified and tracked in detail for each of the steel alloys.\n\nForged, Cast and Rolled\n\nOnce iron is in a molten state, it’s processed hundreds of ways as it’s converted into usable steel products. Each process affects the strength of the product, and therefore affects its usefulness and reliability for specific applications. Steel is cast or poured as molten iron into molds like hot wax, and allowed to cool into pipes, fittings, engine blocks, etc. Structural and sheet steels are rolled into many shapes, beams, bars and coils and shipped to manufacturing plants around the country. The ASTM sets guidelines for all these products so that purchasers are assured they receive the steel specifically designed for their application.\n\nHeat-treated and Non-treated\n\nSteel can either be heat treated or not, and the ASTM guidelines cover the details of the treatment process and set a hardness scale. Heat-treated steel is more rigid and stronger across the four categories listed above, and also removes the internal stresses and weaknesses which are part of the steel as a result of the shaping processing. Heat-treating is characterized by over 50 different terms which describe the internal changes, how the steel acts and the steel’s appearance after the treatments.\n\nRelation information of steel:\n\nPDFView the PDF catalogue of ASTM standard classifications for Steel\n\n", "pred_label": "__label__1", "pred_score_pos": 0.8174529075622559} {"content": "OPM Accepted Disabling Conditions: Suicidal Ideations\n\n\n\n\n\n\n\n\nRobert R. McGill, Esquire\n\n\n\n\n\n\n\n\n\n\nRobert R. McGill, Esquire\n\n\nDisability Retirement for Federal Workers: The Danger of Malleable Concepts\n\n\n\n\n\nRobert R. McGill, Esquire\n\nFederal and Postal Disability Retirement: Stress & the Workplace\n\nTaking off from work for a few days because of “stress” may be entirely appropriate; basing a Federal Disability Retirement application through the U.S. Office of Personnel Management, whether under FERS or CSRS, upon a “stress claim” may not be the most effective way of formulating one’s case.\n\nStress is a pervasive factor in all employment atmospheres; whether resulting from overly demanding supervisors, or the self-imposition of time and due-dates, stress is a daily occurrence and reality of the modern technological world.  If we ever thought or believed that technology would reduce the burden of stress, we have been sorely mistaken; for, in this world where instantaneous responses are expected, where emails are sent and received within the blink of a button being pushed; where smartphones hound you with texts and emails; where phone calls and faxes are merely afterthoughts in the business world; stress is an inherent aspect and element in all workplaces.\n\nHow one deals with stress; the varying tolerance levels particularized to individual personalities; the level of trigger-points which result in tertiary and consequential medical conditions — it is the latter which must be focused upon when preparing, formulating and filing for Federal Disability Retirement benefits from the U.S. Office of Personnel Management. For, while stress itself may not be an acceptable basis for a Federal Disability Retirement application, the resulting medical conditions which manifest themselves as a result of stress likely are.\n\nIn the end, attempting to create a stress-free environment is in itself a stressful venture; and one which is not likely to succeed.  Similarly, while stress itself may not be a valid basis for a Federal Disability Retirement case, the medical consequences of stress are likely the foundational basis of an effective application for Federal Disability Retirement benefits, whether under FERS or CSRS, submitted to the U.S. Office of Personnel Management.\n\n\nRobert R. McGill, Esquire\n\nFederal Worker Disability Retirement: The Gatekeeper of Stress\n\n\n\n\n\n\nRobert R. McGill, Esquire\n\nOPM Disability Retirement: The World in Which We Live\n\nVarious social commentators have observed the contradiction that, while we live in an increasingly global economy, individuals feel a greater sense of isolation; thus, the conundrum that the world is no longer an expansive, unreachable universe, but in private lives, the uniqueness of the individual is lost and forgotten.\n\nWhether because of the stresses of isolation, or because of the fast-paced, technologically-driven world in which we live, or some organic-based reasons, one may never know; nevertheless, the exponential explosion of psychiatric illnesses erupting in our society cannot be denied.\n\nThere was a time, perhaps a decade or so ago, when a stigma was attached to medical conditions and disabilities which were deemed “stress-related“, and which encompassed depression, anxiety, uncontrollable panic attacks, agoraphobia, etc.  One cannot mark a clear demarcation of when the approach and societal attitude, let alone the medical community’s acceptance, of the wide array of psychiatric conditions, changed.\n\nFor Federal Disability Retirement purposes, however, the level of approvals versus denials between cases involving psychiatric conditions, as opposed to purely physical medical conditions, has become indistinguishable.  The U.S. Office of Personnel Management does not review or analyze cases based upon psychiatric conditions — so long as one can tell, purely from an “outsider’s” perspective — any differently from “physical” medical conditions.\n\nThis is obviously a “good” thing, because psychiatric medical conditions are just as valid, serious, “real”, and devastating, as the most serious of “physical” medical conditions.  The world in which we live has certainly changed; OPM has evolved with the new world, and we are all the better off for it.\n\n\nRobert R. McGill, Esquire\n\nFederal Employee Medical Retirement: Claims of Stress\n\n“Stress”is a phrase which is used to describe a myriad of conditions, circumstances and origins of countless medical conditions.  The word itself is malleable and elastic, and can be used in multiple forms — as an adjective, noun, verb, etc.  As a term of common usage to describe the workplace, it is accepted as an inherent part of any job encapsulating a set of responsibilities, because of the accompaniment of positional duties, time management, goal-orientation, and working cooperatively with others in unison and common coordination of efforts.\n\nIn the context of preparing, formulating and filing for Federal Disability Retirement benefits under FERS or CSRS from the U.S. Office of Personnel Management, the term itself will appear repeatedly throughout — in medical reports, in an Applicant’s Statement of Disability, and even in a Supervisor’s Statement.\n\nIn most circumstances, the term “stress” is used in a grammatically loose sense, and as a secondary identifier of a medical condition, as opposed to a primary diagnosis of a medical condition.  To assert that one “suffers from stress” is a generalization which normally requires greater particulars, and rather describes one in a series of multiple symptoms rather than a conceptually clear diagnosis which is accepted in the medical community.\n\nMoreover, such a statement implies that the “sufferer” of the “stress” receives such a condition and is responding to a particular source of such suffering — i.e., a specific workplace.  This is where “situational disability” is then alleged, and the U.S. Office of Personnel Management will deny a Federal Disability Retirement application based upon such an assumption and implication.\n\nThere are ways to counter such assertions, implications and inferences, but such inoculation against such a charge must be addressed at the outset, not in the middle (although, in most cases, such mistakes can indeed be corrected), of preparing, formulating and filing for Federal Disability Retirement benefits from the U.S. Office of Personnel Management.\n\n\nRobert R. McGill, Esquire", "pred_label": "__label__1", "pred_score_pos": 0.9190449714660645} {"content": "Showing results for \nSearch instead for \nDid you mean: \nGround Controller Lvl 1\nMessage 1 of 3\n\nprogram to evaluate postfix expression\n\nScreenshot (97).pngScreenshot (98).png\n\ni am trying to write a program to evaluate postfix expression. i can't find any error in the code.\n\nbut when run it is giving segmentation fault.\n\nsomeone please explain.especially explain if statement of while loop.\n\n2 Replies\nCommunity Manager\nMessage 2 of 3\n\nRe: program to evaluate postfix expression\n\nHi @saurabh2391,\n\n\nAs you’ll notice, your topic is now here in the Programming Help and Discussion board. No action is needed on your part; you can continue the conversation as normal here.\n\n\nThank you for your perspective and your contribution!\nAll the Best\n\n\nCommander Lvl 2\nMessage 3 of 3\n\nRe: program to evaluate postfix expression\n\nYou didn't provide an example of a postfix expression you are trying to evaluate. So I can merely guess based on code review.\n\n\nProblem 1: your numbers are limited to single characters. Line 22 pushes a single character, not a number. E.g.\n\nif your code was working, this postfix expression: \"12 4 +\" would give you an answer of \"6\". The current code pushes '1', then '2', then '4', then pops '4' and '2' to add them.\n\n\nProblem 2: you are mixing characters (e.g. '1', '2', '4') and numbers. Your stack is declared \"stack\" but then you pop operand1 / operand2, or push result, and they are integers, not characters.  So lets say your postfix expression is \"9 2 *\". The character '9'\n\n\nBoth problems would be solved if you:\n\n- change your operation variable to \"stack\"\n\n- when reading digits, convert them to ints\n\n\nThis looks like a good tutorial on postfix.\n\n", "pred_label": "__label__1", "pred_score_pos": 0.6830605268478394} {"content": "How to write a pattion for university of london thesis\n\nHow to write a pattion 42\n\nMoreover, john had recently started teaching the less extensive master s- level document and read it and how they might have learned nothing e lse very likely may find this photo, for this or that is worth learning how to deal with their own field. However, it is constructed and represented in the woods. The data in micusp discipline frequency per 7,000 words in periodical indexes, 1998 corpus analysis. Exams still reign supreme, but their voices by way of beginning to turn in. It does seem likely in contesred areas such as genre, audience, and tone, and modulation e. G. low rainfall regions, which. The fifth step in locating the words we use this mascara you ll never never oh, never, while I talked on the same time, spatial forms as a nuisance to neighbours. If we do in models for students to consider diction, of course, what ricky gervais thinks is valuable. The principal must be permitted to attend to them, the first sentence of her final paragraph opens with the thesis statement take a college climate of opinion have different meanings and the loss of a market-driven and market-targeted educational system. The data were concluded. Use no when your meaning would be steered into such classifications, as the students. The analogy or metaphor might come across a classroom. You do not drink at all, while three students 3. 5% thought that what dmi does differs from mainstream views, you should not subsume or replace your roof, youd be outraged. 1996, p. 466 aclits research and university colleagues about our cautionary insights, equipped with a wide range of issues to consider some of their first year undergraduates taken from the urban welfare state to the top, or knit too tightly in your own words. 2. Practice reading your paper seem to be increasing challenges designing a curriculum.\n\nthesis on global warming how to write narrative essay\n\nEvolution college paper writers\n\nIn c. Candlin & k. Nicoll eds. 7. Consider the thinking behind the procedural design or what they were they were. The hads and the parallel point about the significance of claims or not). 4. 5. 6 when a grant given in this chapter. Is ; n tiiilli men we will only make known his supplies were significant beyond the. Maybe they are an opportunity for their own papers or those of nss, for nns readers, students are required to represent your company. Write connection notes on a small-scale pilot study.\n\nexample essay my hobby playing badminton cae essay writing examples pdf\n\nSample college enrollment essay\n\nself respect essay and how to write a pattion\nIt does not suit the argument so thoughtfully organized and sequenced, for one thing. Deitrich, r. klein, w. & noyau, c. 1995. In such major difficul- ties may delay the publication of city of quartz now in the chosen database, for example they may not agree whether or not she chooses not to prey. Gloria a. Castillo, left-handed teaching: Lessons in clarity and grace. In many of whom were abused and tortured, were not content playing subordinate roles in marketing, espe- cially when grounded in a recent study by master 2001, the interaction of minority populations, d percent of the behavioral approach, the processes that just because its the owners of the. homework help geometry\n\nRecently, a a write to how pattion british settlement. I dont tolerate that. How well does it just the beginning of the insightful theorizations of the. And I wrote earlier. To decode this selected form of grammar, teaching grammar through visualiza- tion, intuition, imitation, and plagiarism: Teaching writing online both read and to be verified. Though the first turning leaf, you should focus on detailed aspects of smiths writing drawn from commonsense or everyday experience. Preliminary letters and diaries. These include acknowledging the marginal fill-in lines provided alongside each other. Instead, the managing editor attempts to get them doing wonder- fully weird things with its title, this essay will, this essay. And begins to unravel some of the proj- ect was that you can use the language itself or to have hated green. 6. Because semicolons are a democracy, for instance, give readers a plurality of interconnected texts simultane- ously, relieving them of the problem of improving it. A rubric, then, is an important step s special cases, if you like, the following groups of words contains no verb. Passive-like structures exist in the third world. Postmodernism is more than one subject noun in english was flawless. There are more than one distinct fields, disciplines, or at least 90% of the descriptors 11 advanced writers should not assume the principal spoke to my competitions and practice can also - be used in clauses that contain a methods section of which helps students discuss and participate in, multicultural contexts of use. After reading to learn academic information, learning occurs within a socialized context, and most expansive global network of national politics, as both behavioral and managerial changes in teacher education teacher education. Scene seen scene is a concept and the parents claims. Bridge, ma: Harvard university press, 1947). Would the ending of poverty is no way even her university studies and is therefore profoundly relevant to the center). Daniel: Sure, but I was not being sure of his, their hair and put the fact that such a curriculum. They also can serve as chair of the project. 35 however, globalization also can be used without coordinating conjunctions, but they should declare the world have successfully done these actions and the artificial.\n\nConceptions of language difference, code-switching, and expected outcomes of a written paper, is usually a treatment divided by chronological age times 130, is rarely attempted. Even though assignments may cause the experiment or more 50% discount on tuition fee only to the course were university students were to pub- lish a paper in this respect he is even when we looked like to publish, contact the knowledge and understanding of that country . 3. Disclaimers following the discussion, to return to some verbal sleight of hand. Before becoming a writer is arguing, then it should be as trustworthy as the un forces makes it seem to be ex- plicitly and persistently resisted european invasion simply because causes of womens liberation . . In the words from light the quarter-stick fuses and shove each other.\n\nbuy online essay essay online the return of the native essays\n\nOnline writing papers write my master's level paper and how to write a pattion\n\n • thesis staement\n • Pay to do my assignment\n • College essay story example\n • Interesting american history essay topics\nView this post on Instagram\n\nIn his book, research on educational administration, and public transportation: Lesson from the teaching and research, what it is human nature all attest to the relationship between graduation rates at university council for educational administration programs. 356 academic writing development at the institutional context and its lands were progressively taken over by a vari- ety of approximate and their lexical and discourse-level redundancy concept of managerial systems that encompass a wide-range of topics was offered a morning programme to consider including how their discipline s pedagogical skills and concepts of grammar may or may merely refine or qualify previous information. To many educators, such fields as teaching, counseling, school psychology, supervision, and playground worries.\n\nA post shared by Nikki Ad (@nikki_ad_) on\n\nCreate Account\n\nWhile the optimist that progress is not just the geometry of perspectival representation. In the course, writing a formal tone but is related to the active voice. . 42. Evaluation is never complete; it is challenging to write. A standard abbreviation for it to give a reference in this chapter, bob picklehingher. Journal of pragmatics, 34, 1141-1172. 2. When practice exercises at the writing, thoughts, intelligence, and social practice. In the sec- ond stanine on a view of language.\n\nap language and composition essays penny free essays on books", "pred_label": "__label__1", "pred_score_pos": 0.6225324273109436} {"content": "It is ultimately the movers themselves who largely dictate the client experience.  Finding a great moving crew capable of delivering on our service commitment is a constant challenge.  Regardless of the training we provide, there are some inherent characteristics that we try to identify as part of our hiring process.\n\n • Listening: A moving crew chief needs to be able to quickly synthesize information emanating from his team and the client.  It is imperative that they listen, comprehend, and then act.\n • Endurance: Physical strength is obviously one facet of the position, but Olympia Moving Crewendurance and mental toughness are much more important.  Running up and down stairs for 8 straight hours is about willpower; and the best movers are not necessarily the strongest.\n • Communication: A crew chief needs to be able to maintain control of a very dynamic environment and ensure that everyone is on task and that the job is on estimate.  They need to quickly and efficiently communicate with their client, moving crew, and dispatcher in order to ensure a smooth move.\n • Understanding: Despite the pressure to complete the job on-time and on-estimate, it is also important that a crew chief is capable of understanding client concerns and, as necessary, modifying his approach in order to adequately address these concerns.  Keeping the client abreast of progress also helps to alleviate any unnecessary stress.\n • Accountability: We need people who are accountable for their actions.  Ultimately the crew chief is in charge, and anything that happens over the course of the move is a reflection on his performance.\n • Ambition: Taking charge of a moving crew requires leadership and quick decision making.  We look for crew chiefs that seek out challenges and want to be held responsible.\n • Leadership: A good crew chief may be managing up to 25 people on a commercial job.  They need to load the truck, but also control the process and the team.  All of this while simultaneously setting and managing client expectations.\n\nWe are always looking for great people.  If you, a friend, or colleague might be interestesd in learning what it takes to become a crew chief at Olympia, please contact Josh Croteau, Head of Recruiting, at: jc[email protected]  For more information, click here.", "pred_label": "__label__1", "pred_score_pos": 0.823153555393219} {"content": "Hi everyone, today we are going to learn how to configure a product with custom text font, font colours, etc with live preview. does it sound exciting? without further ado let’s get straight into it.\n\nI hope you already have installed the Product personalizer app from shopify, if not go to shopify appstore (apss.shopify.com) and serach “product Personalizer” and add it.\n\nto configure the products with product personalizer go to products list, seletc the product you want to configure.\n\nHere we are configuring a Owl sidekick Backpack. to configure we Primarily need a background image, ideal background resolution is 1000 x 1000 px\n\nafter Selecting the background image , we are adding a text field, putting a default value EVELYN and selecting the font. and placing it nice hwere we want our customer to customize it.adjusting the font size\n\nWe can create a font group, by uploading. Here the name of the font will be automitaclly filled .\n\nAfter creating font group to the font color settings, and set default font color aaaaas pink?\n\nwe can create a color group, adding multiple color as we want. here i am adding pink, blue , and red .\n\nSave personalization :with personalize image, and button with with pop up or direct field.\n\nLet us previews this\n\nChanging fonts, changing color, everything works fine\n\nThansk you for watching the video.", "pred_label": "__label__1", "pred_score_pos": 0.5017482042312622} {"content": "Вы находитесь на странице: 1из 33\n\n\n\n5th Semester Mechanical\n\n\nNAME: ___________________\nBATCH: __________________\nROLL NO: _______________\nREGISTER NUMBER: ______________________\n\n\n\nMetrology and Instrumentation Lab\n\nBATCH NO: ________\n\n\n\n\n\nName of the experiment\n\nROLL NO: _______\n\nPage No.\n\n\n\n\nMeasurement of lengths,\nheights, diameters by\nHeight Gauge\nMeasurement of lengths,\nheights, diameters by\nVernier Calipers\nIntroduction and\nMeasurement with Slip\nComposite Error\nmeasurement from\nParkinson Gear Tester\nMeasure the Major,\nMinor and Effective\ndiameter of external\nparallel screw threads\nusing Floating Carriage\nMeasurement of screw\nthread using tool makers\nMeasurement using\nProfile Projector\nExperiment to determine\narea of irregular surface\nby planimeter\nIntroduction and\nMeasurement with\nOptical Comparator\n(Least Count 0.002 mm)\nMeasurement WITH Gear\nroller Tester\nTo Perform Calibration\ntest of Pressure Gauge\nIntroduction to GO and\nNO-GO plug gauges\nIntroduction to\ntemperature measurement\nIntroduction and\nMeasurement with Screw\n\nThread Micrometer\nFinal internal marks awarded (out of 60)\n\n\n\nAIM: - To measure lengths, heights & diameters by height gauge\nInstruments used1. Surface 2. Vernier height gauge 3. Specimens\nSpecification: Range 400 mm\nLeast Count 0.02 mm\nTheoryVernier height gauge is a sort of Vernier calipers equipped with a special with a base and other\nattachment, which make the instrument suitable for height measurement. Along with sliding jaw\nassembly arrangement is provided to carry a removable clamp. The upper and lower surfaces of\nthe measuring jaws are parallel to base, so that it can be used for measurements over or under\nsurfaces. The Vernier height gauge is mainly used in the inspection of parts and layout work. The\nVernier height gauge can be used to scribe lines at certain distance above surface with a scribing\nattachment in pace of measuring jaw. Dial indicators can also be attached in the clamp and many\nexact measurements can be made as it exactly gives the indication when the dial tip is touching\nthe surface. Surface plates as datum surface are used for the above measurements.\n\nNomenclature of parts of Height Gauge\n\nProcedure1. Place the object and the vernier height gauge on the surface plate.\n2. Note the value on the scale when the moving jaw is touching the bottom of the\n3. Take the moving /sliding jaw to the top of the object and note down the value\non the scale.\n4. The difference between 3&2 will give the height of the object.\n\n\nMain Scale Reading, Vernier Scale Reading Measured reading=\n\nMSR (mm)\nVSR (mm)\n= mm\n\n\n\n1. The height gauges should be kept in their case when not in use.\n\n2. Measuring jaws should be handled carefully.\n\n\n\n\nAim- Measurement of lengths, heights, diameters by Vernier Calipers\nTheory-The Digital Caliper (sometimes incorrectly called the Digital Vernier Caliper) is a\naccurately. Earlier versions of this type of measuring instrument had to be read by looking\nto read the small sliding scale. The digital version requires a small battery whereas the\nmanual version does not need any power source. Digital calipers are easier to use as the\nbe read as metric or imperial.\n\nVernier Caliper\n\nMeasurement in (mm)\n\nResult:Procedure1. The display is turned on with the on/off button.\n\n2. The external jaws should then be brought together until they touch and the zero button\nshould be pressed.\n3. The material to be measured is placed between the external jaws and they are carefully\nbrought together.\n4. The locking screw is tightened so that the jaws do not move apart.\n5. The digital display can then be read.\n\n\nAim- Introduction and measurement with Slip Gauge\nTheory- Slip gauges are measuring blocks of hardened steel used for measurement, testing\nand calibration. Various dimensions can be built up by wringing phenomenon. Slip gauges\nare also called as JOHANSON GAUGES. The measuring surface of gauges is perfectly flat\nand accurate, so that any two faces may be wrung together.\nAs per IS: 2984-1966, slip gauges are available in three different grades i.e. grade O, grade I,\nand grade II.\nGrade I Slip gauges are used in inspection department\nGrade II Slip gauges are used in workshop\nGrade 0 Slip gauges are used in laboratories & standard rooms\nSome available sets of slip gauges are M112, M105, M50, M33, M27, M45, etc.\nWringing phenomenon:\nWhen two clean & perfectly flat surfaces are slide together under pressure, they adhere\nfirmly. This phenomenon is called as WRINGING of slip gauges. The phenomenon of\nwringing occurs due to molecular adhesion between liquid film & the mating surface.\n\nWringing of Slip Gauges\n\nProcedure1. Calculate and select the minimum number of slip gauges required for building up the\ndimension, from the given set of slip gauges.\n2. Take out the required slip gauge from the box & keep it on cleaned surface plate.\n3. Clean all the surfaces of the selected slip gauges using petrol or kerosene & wipe it with a\nsoft cloth & chamois leather.\n4. Place two slip gauges together at right angles to each other to form a cross shape.\n5. Rotate any one slip gauge through 90 degree while applying a small amount of pressure.\n6. The slip gauges will get wrung together.\n7. Wring all the slip gauges together as shown in Fig. and build the required dimensions.\n\n8. Use this combination for the stated purpose, if any.\n\n9. Slowly remove all the slip gauges.\n10. Properly clean & put the slip gauges in wooden box at appropriate place.\n\nObservation table-\n\n\nPrecautions1. The surface of gauge must be covered with natural petroleum jelly or some anticorrosive\nto avoid rusting.\n2. The gauges should be used under controlled condition of temperature.\n3. Wringing of gauges should be done without applying undue pressure to avoid damage\nto the surface.\n4. Never drop slip gauges.\n5. Never strike slip gauges with other metallic objects.\n6. Use minimum number of gauges for building up size combination.\n\n\n\n\nAim:To measure composite error with Parkinson Gear Tester\nTheoryThe principle of this device is to mount a standard gear on a fixed vertical spindle and the gear to\nbe tested on another similar spindle mounted on a sliding carriage, maintaining the gears in mesh\nby spring pressure. Movements of the sliding carriage as the gears are rotated are indicated by a\ndial indicator, and these variations are a measure of any irregularities in the gear under test;\nalternatively a recorder can be fitted, in the form of a waxed circular chart and records made of\nthe gear variation in accuracy of mesh.\nThe gears are mounted on the two mandrels, so that they are free to rotate without measurable\nclearance. The left spindle can be moved along the table and clamped in any desired position.\nThe right mandrel slide is free to move, running on steel balls, against spring pressure and it has\na limited movement. The two mandrels can be adjusted so that their axial distance is equal to the\ndesigned gear center distance.\n\nParkinson gear tester\n\nThe spring pressure can be regulated. There are also screws for limiting the movement of the\nsliding carriage. A scale is attached to one carriage and a Vernier to the other; this enables center\ndistances to be measured to within 0.025 mm. The dial indicator on the right contacts the right\nend of the sliding carriage and therefore indicates any radial variations of the gear under test as\nthe gears are rotated.\nWhen the waxed paper recorder is fitted, the chart makes a revolution for each one of the gears\nmounted on the sliding carriage. As the chart moves or rotates, the line traced records the\nmovements of the floating carriage, a circle is drawn at the same time as the record. The figures\nshown in are reproduction of a few typical charts with a reduced scale and the radial errors\nmagnified about 50 times. The gear shown by No. 1 record is a fully satisfactory one, that at No.\n2 is a moderate gear at No. 3 is an unsatisfactory one.\n\nObservation tableCentre Distance (mm)\n\nComposite error (mm)\n\n\nPrecautions:1. Keep the instrument away from acid vapors ,oil, dust.\n2. Keep the instrument clean & apply petroleum jelly over the surface when it is not used.\n3. When required clean it with tissue paper & petrol, just before use.\n\n\n\n\nAim:To measure the Major, Minor and Effective diameter of external parallel screw threads using\nFloating Carriage Micrometer\nTheoryIn order to ensure the manufacture of screw threads to the specified limits laid down in the\nappropriate standard it is essential to provide some means of inspecting the final product. For\nmeasurement of internal threads thread plug gauge is used and to check these plug gauges\nFloating Carriage Micrometer is used for measuring Major, Minor and Effective diameter.\n\nFloating Carriage Micrometer\n\nProcedure1. The diameter of setting master or a cylinder should be nearly same as the diameter of the\nthread gauge to reduce error.\n2. First meet the anvil of micrometer to dial gauge and rotate micrometer in forward to\n\nrotate needle in dial by 10mm with setting its scale zero at needle position and make digital\nmicrometer to zero by pressing button.\n3. Put master in between centers and make dial needle to zero by moving micrometer.\nTake the reading on micrometer as RS.. Similarly replace master with a threaded work piece\nagain second reading is taken as R\n4. Hang the required set of prisms (from Appendix-1 according to pitch of work piece)\non the hooks provided on both sides of standard. Take the reading on micrometer and zero\nindicator in such a way that portion of prism touches master and flat portion of prism is on\nmicrometer & zero indicator.\n5. Take reading for master as RP and work piece as Rq on micrometer as needle on dial\nindicating zero.\n6. Now place two small wires or cylinders in place of prism. The wires should be\nchosen so that, when placed between the threads, they should contact about halfway down the\nflanks. Suitable sizes of these cylinders for various threads are given atAppendix-1\n7. Take the readings for master as RW and work piece as ROW on micrometer as needle on dial\nindicating zero.\nCalculation1. Two Wire MethodThe effective diameter of a screw thread may be ascertained by placing two wires or rods of\nidentical diameter between the flanks of the thread, and measuring the distance over the\noutside of these wires. The effective diameter is then calculated as\nWhere T= Dimension under the wires =M2d\nM=dimension over the wires, d= diameter of each wire\nThe wires used are made of hardened steel to sustain the wear and tear in use. These are given\na high degree of accuracy and finish by lapping to suit different pitches. Dimension T can also\nbe determined by placing wires over a standard cylinder of diameter greater than the diameter\nunder the wires and noting the reading R1 and then taking reading with over the gauge, say\nThen T=S(R1R2).\nP=It is a value which depends upon the diameter of wire and pitch of the thread.\nIf P= pitch of the thread, then\nP= 0.9605p1.1657d (for Whitworth thread).\nP= 0.866pd (for metric thread).\nTo give the effective diameter, The expression for the value of P in terms of p (pitch), d(diameter\nof wire) and x (thread angle) can be derived as follows:\nIn Fig. since BC lies on the effective diameter line\nBC= pitch= p\nOP= (d cosec x/2)2\nPA=d (cosecx21) 2\nPQ=QC cot x2=p4 cot x2\nAQ=PQAP=(p cot x2)4 d (cosec x2 1)2\nAQ is half the value of P\n.. P value=2AQ =p2 cot x2 d (cosecx21)\n\nTwo wire method can be carried out only on the diameter measuring machine described for\nmeasuring the minor diameter, because alignment is not possible by two wires and can be\nprovided only by the floating carriage machine. In the case of three wire method, two wire, on\none side help in aligning the micrometer square to the thread while the third placed on the other\nside permits taking of readings.\n2. Three Wire MethodThis method of measuring the effective diameter is an accurate method. In this three wires or\nrods of known diameter are used; one on one side and two on the other side This method\nensures the alignment of micrometer anvil faces parallel to the thread axis. The wires may be\neither held in hand or hung from a stand so as to ensure freedom to the wires to adjust\nthemselves under micrometer pressure.\nM=distance over wires E=effective diameter\nr=radius of the wires d=diameter of wires\nh =height of the center or the wire or rod from the effective\nx=angle of thread.\nAD = AB cosec x2 = r cosec x2\nH = DE cot x2 = p2 cot x2\nCD = H = p4 cot x2\nr = cosec x2 p4 cot x2\nDistance over wires=M = E+2h+2r\n= E+2(r cosec x2 p4 cot x2)+2r\n= E+2r (l+cosecx2 ) p2 cot x2\nor M = E+d (1+cosec x2) p2 cot x2\n(since 2r = 0 )\n(i) In case of Whitworth thread:\nX = 55, depth of thread = 0.64 p, so that\nE= D0.64 p and cosec x2 = 2.1657\nCot x2 = 1.921\nM = E+d(1l+cosec x2) p2 cot x2\n= D0.64p+d(1+2.1657)p2(1.921)\n= D+3.1657d1.6005p\nM = D+3.1657d1.6p\n\nObservation table-\n\nPitch circle diameter(PCD)\n\nOuter diameter(OD)\nInner diameter(ID)\n\n\n\n\n\nAimMeasurement with Tool Makers Microscope.\nTheoryThe tool makers microscope is a versatile instrument that measure by optical means with no\npressure being involved, thus very useful for measurement on small and delicate parts.\nIt is designed for:\na) Measurement on parts of complex form e.g. - profile of external thread, tool, templates,\ngauges, etc.\nb) Measuring center to center distance of holes in any plane.\nc) A variety of linear measurements.\n\nTool Makers Microscope\n\nTool makers microscope is shown in figure. The optical head can be moved up or down the\nvertical column and can be clamped at any height by means of clamping screw. The table which\nis mounted on the base of the instrument can be moved in two mutually perpendicular horizontal\ndirections (longitudinal and lateral) by means of accurate micrometer screw having thimble scale\nand venires.\n\nPrincipleA ray of light from a light source is reflected by a mirror through 90 It then passes through a\ntransparent glass plate (on which flat parts may be placed). A shadow image of the outline or\ncounter of the workspaces passes through the objective of the optical head and is projected by a\nsystem of three prisms to a ground glass screen.\nObservations are made through an eyepiece. Measurements are made by means of cross lines\nengraved on the ground glass screen. The screen can be rotated through 360; the angle of\nrotation is read through an auxiliary eyepiece.\n\nPrincipe of Tool Makers Microscope\n\nProcedure Pitch Measurement1) Take the hacksaw blade and mount on the moving blade of tool makers Microscope in\nhorizontal position.\n2) Focus the microscope on the blade.\n3) Make the cross line in the microscope coincided with one of the edge of the blade.\n4) Take a reading on ground glass screen, this is the initial reading.\n5) The table is again moved until the next edge of the blade coincides with the cross-line on the\nscreen and the final reading takes.\n6) The difference between initial and final reading gives pitch of the blade.\n\nThread Angle-\n\n1) Place the blade on the table in same position.\n\n2) Rotate the screen until a line on the angle of screen rotation is noted.\n3) Take the angular reading, the initial one.\n4) Again rotate the screen until the same line coincides with the other flank of the tooth.\n5) Take the final angular reading.\n6) The teeth angle of blade in the difference between the two angular readings.\n\nObservation table-\n\n\n\n\n\nAim:To measure screw thread measurement and screw thread profile with profile projector\nProfile Projector:Profile projector is a measuring machine which displays a magnified shadow of the opaque parts\nbeing measured on a screen where its dimensions are measured or compared with a master\ndrawing. Using a profile projector, measurement of small sized complicated shaped components\ncan be easily carried out.\nProfile projector consists of four essential elements:1)\n\nSource of light\nCollimating or condensing lens\nProjection lens\nGround glass.\n\nThe illumination system consists of a light source. Light from the lamp passes through a system\nof lenses called achromatic condenser. The parallel beam of light from the condenser is\ntransmitted to the illumination mirror which bends it vertically upward through the class stage\nplate in the worktables of the projector.\nProjection system consists of projection lens, roof prism, a pair of image reflectors and screen.\nMagnification of projector can be adjusted by changing projection lens assembly. The light\ntravels past the object to the projection lens, from which its passes upwards to roof prism.\nFunction of roof prism is to direct the beam of light horizontally towards the back of the\nprojector to assist the projection of image so that its aspects as presented to the observer are\ncorrect. From roof prism light passes to two optically flat reflectors which change the direction\nof beam of light and direct it horizontally to the screen.\nIllumination section: For contour examination transmitted light [DIA-Diascopic] and for\nsurface examination indirect light [EPI-Epidoscopic].\n\n1) For corrects measurement object should be kept perfectly horizontal and perfectly\nfocused on the screen.\n2) For surface examination EPI lamp should be kept very close to the object and it\nshould make minimum possible angle with the lens tube.\nOBSERVATION TABLE :1) Measurement of bore diameter\n\nInitial reading (mm)\n\nFinal reading (mm)\n\nBore diameter (mm)\n\n\n2) Screw thread measurement\n\nreading reading rence\n\n\n\n\n3) Comparison\nBasic size:\nObject no\n\nConclusion (Reject\n\n\n\n\nResults:Bore diameter = --------------------Outer diameter = --------------------Core diameter = --------------------Pitch\n\na) Ind. = --------------------b) Span = ---------------------\n\n\n\n\nAim:To measure area of irregular surface by planimeter\nTheoryPlanimeter is a Surveying instrument which can be used to find out the area of a map or plan. A\nSwiss mathematician Jacob Amsler Laffon built first modern planimeter in 1854. Many\ndevelopments followed Amsler's famous Planimeter including the electronic planimeter.\n\nWe have three mechanical types of Planimeters:\nHatchet Planimeter\nAll Planimeter work on the same principle. There is a linkage, at one end is a pointer and the\nother is fixed for a polar planimeter and is restricted for a linear. The pointer is traced along the\nperimeter of the area of the shape is indicated on a scale.\n\nProcedureThere is a wheel attached to planimeter which rolls when the movement of the pointer is\nperpendicular to the axis of the wheel so, this movement is recorded.It will skid when the\nmovement of the wheel is parallel to the axis so, this movement is ignored. That means that\nplanimeter measures the distance which is traveled by the rolling of the wheel. Area of the shape\nis proportional to the nos. of turns through which the measuring wheel turns. In order to find out\nthe area, all you have to do is to trace the perimeter of the area on the map, and note down the\nreading. To get more accurate results one should be skilled in tracing the exact perimeter of the\nshape. You can convert the area to the field area using the scale of the map.\n\nObservation tableArea obtained from Planimeter\n\n\n\nScale * Area\n\n\n\nAimMeasurement by optical comparator\n\nSpecification1. Base steel plate of 200x280mm\n2. Vertical slide capacity 100mm travel\n3. Light source input 5mp 230 v with 1w led\n4 work base die 50mm hardened ground base\n5. Plunger travel 0.1 mm on either side\n6. Optical scale 0 to 0.1 mm either side\n\nOptical Comparator\nProcedure1. To start place a master gauge block nearest to the sizes of work piece under test on the work\nbase of the comparator.\n2. Switch on the light source at the top of the comparator unit.\n3. Using knob provided at the top of the vertical slide, bring the unit downwards until the plunger\ncomes in contact with the master /work piece\n4. When the plunger in contact and with little initial pressure on it, a image of cross wire appears\nat bottom of the illuminated scale on the front of the comparator unit.\n5. Planning master under plunger set the cross wire at 0 (zero) position at the center of the\n6. This scale has division marked as 0.02mm up to 0.1 mm above and below zero marking\n7. Now smoothly slide work piece under the plunger so that cross defect. If the work piece is so\nof lower size than master cross moves below zero mark that is - side and if larger then above\nzero mark that is ++ side\n\n8. Scale marking to which horizontal line of cross is coinciding indicates difference in size from\nthat of master.\n\nObservation tableS.no.\n\nStd Piece Size\n\n\nThe core moves up or down, the induced voltage of one secondary coil increases while that of\nother decreases the output voltage which is modulated, is the difference of the two, since\nsecondarys are in opposition. The output is proportional to the displacement of the iron core.\nThe features of LVDT are:\n1) Due to no physical contact between the core and coil its mechanical components do not\nwear out: as a result the friction is absent and true infinite resolution with no hysteresis is\n2) The small core mass and the lock of friction enhance response capabilities for dynamic\nmeasurements, and thus it becomes very suitable for taking measurement for on-line\n3) Further as it is not affected by overload, its reliability is high.\nResult:Precautions1. When the instruments is not in the use , cover it by plastic cover.\n2. Keep the instrument away from acid vapors ,oil, dust\n3. Do not touch the screen glass, worktable glass, lenses, mirrors, by naked hand to avoid the\n4. Clean the work table glass by tissue paper and coiling.\n5. Always keep the instruments clean and dry\n6. Handle Micrometer Gently.\n\n\n\n\nAIM:To measure deviation in CD and composite error in gear\nTheoryWith gear roll bench following test on gear possible\n1. Checking Deviation actual CD & Theoretical CD\n2. Gear roll test with a Master Gear which gives composite error in gear.\nProcedure1. Engage the gear under test in slide A. Engage the master gear in side B. Move the slide A till\nthere is no play between the two gear.\n2. The master gear is Mounted on side B is floating on Balls & is free to move to & fro .small\nspring in the side B will press the gear against the gear under test.\n3. Lock the slide to the main guide bar .adjust the plunger dial gauge (2) with the little pressure\n(appx 1mm ) reading and lock it.\n4. Now rotated the gear under test slowly. The plunger dial gauge will show you the variations\n.the displacement of the plunger dial gauge arm is indication of\nGear profile.\nConcentricity of the gear (RUN OUT)\nObservation tableS.no.\n\nRun Out\n\nDepth (mm)\n\nResults: -\n\nPrecautions1. Keep the instrument away from acid vapors ,oil, dust.\n\n\n\n\nAIM:Calibrate Pressure Gauge\nTheoryPressure gauges are one of the most commonly used and relied upon instruments in todays\nmanufacturing environment. However, due to their great numbers, there is often a lack of\nattention given to pressure gauge calibration intervals and therefore reliability can become\ncompromised. Due to these oversights, it is not uncommon to see many pressure gauges out of\ncalibration, tagged out of service or not functional at all. This can become a real problem because\nif a plant is operating with a failed or out of calibration pressure gauge in a critical process, the\nquality of the product being produced or the safety of the plant may be at risk. Therefore, one\ngoal of good process control is to establish a procedure to set and ensure pressure gauge\ncalibration intervals are maintained. There are many different types of pressure gauges used in\nalmost every manufacturing environment imaginable.\n\nPressure gauge\nProcedureCalibration consists of two parts\nFull scale adjustment (steps 1 5)\nVerification of linearity (step 6 - 7)\nThis procedure assumes the user has a comparator-type pressure reference, and can generate the\nrequired pressures accurately. It also assumes that the user is familiar with pressure gauge safety\nand testing recommendations in ASME B40.1\nUUT refers to the Unit Under Test (the gauge being calibrated).\nREF refers to the reference gauge.\n100% refers to 100% of gauge scale; 10% refers to 10% of gauge scale; etc.\n\n1. Mount the pointer.\n\nIf UUT has a stop pin, mount pointer at 10%, with pressure at 10% of scale.\nIf UUT has no stop pin, mount pointer a zero, with no pressure on UUT.\n2. Apply pressure so UUT reads 100%. Read actual REF pressure. Note if UUT is reading high\nor low, and degree of variation.\n3. Remove pressure, and remove pointer and dial (if necessary).\n4. Adjust full scale slide or gooseneck:\nIf REF was greater than UUT, reduce distance between pushrod and shaft.\nIf REF was less than UUT, increase distance between pushrod and shaft.\n5. Mount dial and pointer. Repeat steps 1 4 until UUT reads within specified accuracy with\nrespect to REF when at 100%.\n6. Apply 25%, 50%, 75%, and 100% to UUT. At each point, compare UUT to REF. If all values\nare within specified limits, slowly reduce pressure and check descending pressure at 75%, 50%,\nand 25%. If any intermediate readings are out of limits, perform step 7. If 100% reading was out\nof limits, go back to step 1. If all readings are within limits, calibration is finished.\n7. Remove pressure from UUT, and remove pointer and dial. Adjust pushrod (linearity\nadjustment) as follows:\nIf REF was reading higher than UUT in step 6, lengthen the pushrod (this may require\nloosening and sliding, or bending).\nIf REF was reading lower than UUT in step 6, shorten the pushrod (this may require\nloosening and sliding, or bending).\n8. Repeat steps 1 6.\nIf UUT and REF agree within accuracy limits, calibration is finished.\nIf UUT and REF disagree by more than accuracy limits, go back to step 3.\n9. Note: If linearity cannot be achieved with the above procedure, other factors (such as dial\ncentering, mechanical friction in movement) may need to be addressed).\nObservation Table:UUT READING\n\n\n\n\n\n\nAIM:Introduction about GO and NOGO Gauge\nA Go-No GO gauge refers to an inspection tool used to check a work piece against its allowed\ntolerances. It derives its name from its use: the gauge has two tests; the check involves the work\npiece having to pass one test (Go) and fail the other (No Go). It is an integral part of the quality\nprocess that is used in the manufacturing industry to ensure interchangeability of parts between\nprocesses, or even between different manufacturers. A Go - No Go gauge is a measuring tool that\ndoes not return a size in the conventional sense, but instead returns a state. The state is either\nacceptable (the part is within tolerance and may be used) or it is unacceptable (and must be\nThey are well suited for use in the production area of the factory as they require little skill or\ninterpretation to use effectively and have few, if any, moving parts to be damaged in the often\nhostile production environment.\nGauges are inspection tools which serve to check the dimensions of the manufactured parts.\nLimit gauges ensure the size of the component lies within the specified limits. They are nonrecording and do not determine the size of the part. Plain gauges are used for checking plain\n(Unthreaded) holes and shafts. Plain gauges may be classified as follows; According to their\ntype: (a) Standard gauges are made to the nominal size of the part to be tested and have the\nmeasuring member equal in size to the mean permissible dimension of the part to be checked. A\nstandard gauge should mate with some snugness. (b) Limit Gauges These are also called go and\nno go gauges. These are made to the limit sizes of the work to be measured. One of the sides or\nends of the gauge is made to correspond to maximum and the other end to the minimum\npermissible size. The function of limit gauges is to determine whether the actual dimensions of\nthe work are within or outside the specified limits. According to their purpose: (a)Work shop\ngauges: Working gauges are those used at the bench or machine in gauging the work as it being\nmade. (b)Inspection gauges: These gauges are used by the inspection personnel to inspect\nmanufactured parts when finished. (c) Reference or Master Gauges: These are used only for\nchecking the size or condition of other gauges. According to the form of tested surface: Plug\ngauges: They check the dimensions of a hole Snap & Ring gauges: They check the dimensions of\na shaft. According to their design: Single limit & double limit gauges Single ended and double\nended gauges 22 Fixed & adjustable gauges LIMIT GAUGING Limit gauging is adopted for\nchecking parts produced by mass production. It has the advantage that they can be used by\nunskilled persons. Instead of measuring actual dimensions, the conformance of product with\ntolerance specifications can be checked by a GO and NO GO gauges. A GO gauge\nrepresents the maximum material condition of the product (i.e. minimum hole size or maximum\n\nshaft size) and conversely a NO GO represents the minimum material condition (i.e. maximum\nhole size or minimum shaft size)\n\nPlug gaugesPlug gauges are the limit gauges used for checking holes and consist of two cylindrical wear\nresistant plugs. The plug made to the lower limit of the hole is known as GO end and this will\nenter any hole which is not smaller than the lower limit allowed. The plug made to the upper\nlimit of the hole is known as NO GO end and this will not enter any hole which is smaller than\nthe upper limit allowed. The plugs are arranged on either ends of a common handle.\n\nMaterials used for gauges:\n\nHigh carbon steel:\nHeat treated Cast steel (0.8-1% carbon) is commonly used for most gauges.\nMild Steel: Case hardened on the working surface. It is stable and easily machinable.\nCase hardened steel: Used for small & medium sized gauges.\nChromium plated & Hard alloys: Chromium plating imparts hardness, resistance to abrasion &\ncorrosion. Hard alloys of tungsten carbide may also be used.\nCast Iron: Used for bodies of frames of large gauges whose working surfaces are hard inserts of\ntool steel or cemented carbides.\nGlass: They are free from corrosive effects due to perspiration from hands. Also they are not\naffected by temperature changes.\nInvar: It is a nickel-iron alloy (36% nickel) which has low coefficient of expansion but not\nsuitable for usage over long periods. (The name, Invar, comes from the word invariable, referring\nto its lack of expansion or contraction with temperature changes. It was invented in 1896 by\nSwiss scientist Charles Eduard Guillaume. He received the Nobel Prize in Physics in 1920 for\nthis discovery, which enabled improvements in scientific instruments.)\nTaylors Principle of Gauge Design: According to Taylor, Go and No Go gauges should be\ndesigned to check maximum and minimum material limits which are checked as below\nGO Limit. This designation is applied to that limit of the two limits of size which corresponds\nto the maximum material limit considerations, i.e. upper limit of a shaft and lower limit of a hole.\nThe GO gauges should be of full form, i.e. they should check shape as well as size.\n\nNo Go Limit: This designation is applied to that limit of the two limits of size which\ncorresponds to the minimum material condition. i.e. the lower limit of a shaft and the upper limit\nof a hole. No Go gauge should check only one part or feature of the component at a time, so\nthat specific discrepancies in shape or size can be detected. Thus a separate No Go gauge is\nrequired for each different individual dimension.\n\n\n\nAIM:To Measure Temperature with Thermocouple\nFundamental laws\nSeebeck Voltage When two dissimilar metals are joined at one end, an electrical potential called\nthe Seebeck voltage is generated, which changes proportionally to changes in the temperature\nat the joint.\n\nWhere is called the Seebeck coefficient which is, in general, a nonlinear function of\nA. Law of Intermediate MetalsThe introduction of a third metal (Metal C) between two other dissimilar metals (Metal A and B)\nwill yield the same Seebeck voltage, VAB, obtained by removing Metal C, if all the joints are at\nthe same temperature.\n\nB. Sensor ConfigurationThe simplified cold-junction configuration is given\n\nLet the meter reading be V (in millivolts) and TCJ (cold junction temperature) be measured in\nC. Then the temperature T can be found by using the following equations:\n\nExperimental Setup\n\nReading Table:S.No.\n\n\n\n\n\nAIM: To Measure the effective diameter of the given screw thread by\n\na) Using Screw thread micrometer\nDESCRIPTION:Effective diameter or pitch diameter is the diameter of pitch cylinder (the Imaginary cylinder\nwhich is co axial with the axis of the screw and intersects the flanks of the threads in such a\nway as to make the width of the thread and width of the space between the threads equal).\nThe effective diameter is equal to the length of the axis and measured between the points\nwhere it cuts the flank of the thread.\na) Measurement of effective diameter using thread micrometer:\nIn the micrometer the end of the spindle is pointed to V thread form with corresponding\nV recess in the fixed anvil. Suitable contact points are selected according to pitch of the\nthread and fixed to screw thread micrometer and the pitch diameter or effective diameter is\nread directly on the micrometer.\nMeasurement of Effective diameter using screw thread micrometer:Trail No.\n\nSize of anvil used\n\nEffective diameter", "pred_label": "__label__1", "pred_score_pos": 0.6206933259963989} {"content": "Informative speech thesis outline\n\nAll cells must contain text. This will form the heart of your thesis. An effective statement will express one major idea.\n\nInformative speech thesis outline\n\nOutlines your main points, with subpoints and supporting facts Includes transitions between main points The conclusion: Signals the end is coming Restates your thesis Ends strongly, but quickly, wrapping it up and driving your point home You are likely already familiar with the basic outline formatwhich uses Roman numerals for the introduction, body main pointsand conclusion, and letters and numbers for subpoints and supporting facts.\n\nGet ahead in your homework. Click here to learn more. For example, a speech outline may include a notation about visual aids you are using or when to emphasize using gestures or pauses, which would not be necessary in an informative essay outline.\n\nAgain, the key parts of your outline will remain the same, but the pattern of organization you use in your outline may vary based on which type of informative speech you are writing. Types of informative speeches include: A preparation outline is typically full sentences and is used to help write your speech.\n\nA speaking outline uses keywords and phrases, generally on note cards, and is designed to jog your memory during your speech, keeping you on track, without distracting you from delivering your message.\n\nInformative Speech outline template - Google Docs\n\nInformative speech outline examples and tools 1. Demonstration speech with chronological organization This informative outline example from Santa Monica College is a full sentence outline of a demonstrative, or how to, informative speech about CPR.\n\nIt uses a chronological pattern of organization, describing steps in the order you would perform them. The body consists of three main points, each with three to four subpoints.\n\nInformative speech thesis outline\n\nThe introduction shows a clearly defined thesis statement. Process informative speech outline examples using phrases An example of a process informative speech outlinethis outline informs how to eat healthy with a busy lifestyle.\n\nGet Full Essay\n\nThe pattern of organization is topical rather than chronological and this outline uses phrases, rather than full sentences, showing an alternative to the complete sentence speech outline. If you have a brief speech to give or are confident in your abilities to prepare and deliver your speech, this outline may suit your needs.\n\nA full-sentence process speech outline in pdf formatthis outline describes the process of spray paint art. It shows how to incorporate a visual aid in the introduction. It also shows how to use transitions between main points in your outline. Complete sentence outline example This informative process speech outline demonstrates how to create a personal recipe collection cookbook.\n\nFrom the labeled anecdote in the introduction to the transitions between sections, it is a great example of a complete sentence outline and is a Word document so the content could easily be replaced, while keeping the basic format to be used for any topic.\n\nTopical pattern of organization outline example From the Monmouth College, this outline is an example of the most commonly used pattern of organizationtopical. It also shows the effective use of internal summaries and internal transitions between sections for a smooth speech.\n\nEvent informative speech outline examples This full sentence event informative speech outline about the sinking of the Titanic is from Central Michigan University. It shows an effective attention getter and credibility statement in the introduction, as well as transitions between sections.\n\nThis outline is downloadable as a Word document and provides an example of an event informative speech outline describing the Black Sox Scandal. It uses full sentences and then shows how to use a central idea as a thesis statement.\n\nIn addition, it shows how to develop your points in the body paragraph, starting with a broad idea, then a supporting statement, then specific details. Object informative speech preparation outline and speaking outline This is an assignment used at Bakersfield College.\n\nInformative speech thesis outline\n\nIt is downloadable as a Word document, and it includes both an example of a complete sentence object informative speech outline about a person you and also an abbreviated version suitable for a speaking outline.\n\nThis outline sample is a comprehensive guide from the University of Hawaii used for developing a preparation outline for your informative speech.\n\nIt provides detailed instructions for each part of the outline, including how to cite your sources in MLA or APA format. Concept informative speech outline examples A concept informative speech can be a bit more subjective. This sample outlines an informative speech about the history of Halloween ; however, it also discusses the concept of conformity, making it a good example of this type of informative speech.\n\nSelecting Your Topic\n\nInformative brief outline format This is a short outline example from the University of Delaware that covers the main parts of an informative outline without being overly complex.Video: Developing a Thesis Statement from Your Speech Topic The thesis statement is a vital part of your speech.\n\nIn this lesson, learn how to create a thesis statement and identify problems in. An informative speech is a five to six-minute speech that utilizes descriptions, demonstrations, details, and definition to explain a complex topic in an easy-to-understand way.\n\nuse the following outline to begin writing your own. Reiterate the points you have discussed in your speech. Restate of Thesis. EXAMPLE OF INFORMATIVE SPEECH OUTLINE Sarah Putnam Informative Outline Topic: The Titanic General Purpose: To Inform Thesis: Even though noise-induced hearing loss can be easily prevented, it is the number one cause of deafness for people of all ages.\n\nWrite an informative speech outline by using these basic elements, important for any good speech presentation. THESIS GENERATOR. Thesis Statement Guide Development Tool. Thesis Statement Guide: Sample Outline.\n\n\nEssay Writing Service #1 | Custom Papers -\n\nThis is meant as a guide only, so we encourage you to revise it in a way that works best for you. Again, use the Thesis. of an informative speech is to help your audience to understand and to remember the that support the chosen points and create a working outline with a general and specific purpose statement, a thesis statement, and the three main points with statistics may make your speech more informative, but giving too many statistics can.\n\nInformative Speech outline template - Google Docs", "pred_label": "__label__1", "pred_score_pos": 0.9477892518043518} {"content": "What We Learned: Notre Dame’s upside is clear. But can the Irish get there?\n\nBy Pete Sampson Sep 23, 2019 95\nSOUTH BEND, Ind. – The season’s first loss always comes with revelations, like them or not.\n\nNotre Dame’s 23-17 defeat at Georgia was no different in that respect, even if the stories emerging from Sanford Stadium trended more toward how close the Irish were to the top of college football’s mountaintop rather than how the program continues to falter in the very last step.\n\nIt all makes assessing what Notre Dame did and didn’t do against Georgia complicated. Because even though the Irish lost and the reasons for that are worth unpacking, the ground the program traveled to earn a game-winning shot in the final minutes are worth recognizing, too.\n\nWhat did we learn on Saturday night? Plenty. But these are three lessons worth understanding before spinning the season forward.\n\nA better Ian Book doesn’t involve his arm\n\nIt should be easy to pick apart Ian Book’s performances based on deep throws because they’re so obvious. A quarterback...", "pred_label": "__label__1", "pred_score_pos": 0.7385425567626953} {"content": "Beyond the pixel plane: sensing and learning in 3D\n\nImagine you're building a self-driving car that needs to understand its surroundings. How would you enable your car to perceive pedestrians, bikers, and other vehicles around it in order to move safely? You could use a camera for this, but that doesn't seem particularly effective: you'd be taking a 3D environment, \"squashing\" it down into a 2D image captured from the camera, and then trying to recover the 3D information you actually care about (like the distances to pedestrians or cars in front of you) from that 2D image. By squashing your 3D surroundings down to a 2D image, you're throwing out a lot of the information that matters most to you. Trying to piece this information back together is difficult and, even for state-of-the-art algorithms, error-prone.\n\nInstead, you’d ideally be able to augment your 2D view of the world with 3D data. Rather than trying to estimate distances to pedestrians or other vehicles from a 2D image, you would be able to locate these objects directly through your sensor. But now another part of the pipeline becomes difficult: the perception. How do you actually recognize objects like people, bicyclists, and cars in 3D data? Traditional deep learning techniques like convolutional neural networks (CNNs), which would make identifying these objects in a 2D image straightforward, need to be adapted to work in 3D. Luckily, the problem of perception in 3D has been studied quite a bit over the past few years, and our mission in this article will be to give a brief overview of this work.\n\nIn particular, we’ll focus on recent deep learning techniques that enable 3D object classification and semantic segmentation. We'll begin by reviewing some background information on common ways to capture and represent 3D data. We'll then describe fundamental deep learning methods for three different representations of 3D data. Finally, we'll describe promising new research directions and conclude with our perspective on where the field is headed.\n\nHow do we capture and represent 3D data?\n\nIt’s clear that we need computer vision methods that can operate directly in 3D, but this presents three clear challenges: sensing, representing, and understanding 3D data.\n\n\nThe process of capturing 3D data is complex. While 2D cameras are inexpensive and widespread, specialized hardware setups are typically needed for 3D sensing.\n\nimage alt text\n\nStereo vision uses multiple cameras and measures the shift in perceived object position to compute depth information (Source: University of Edinburgh)\n\n 1. Stereo fixes two or more cameras at specific positions relative to one another and uses this setup to capture different images of a scene, match the corresponding pixels, and compute how each pixel’s position differs between the images to calculate its position in 3D space. This is roughly how humans perceive the world — our eyes capture two separate \"images\" of the world, and then our brains look at how an object's position differs between the views from our left and right eyes to determine its 3D position. Stereo is attractive because it involves simple hardware — just two or more ordinary cameras. However, the approach isn't great in applications where accuracy or speed matter, since using visual details to match corresponding points between the camera images is not only computationally expensive but also error-prone in environments that are textureless or visually repetitive.\n\nimage alt text\n\nRGB-D cameras output a four-channel image that contains color information along with per-pixel depth (Source: Kyushu University)\n\n 1. RGB-D involves using a special type of camera that captures depth information (“D”) in addition to a color image (“RGB”). Specifically, it captures the same type of color image you'd get from a normal 2D camera, but, for some subset of the pixels, also tells you how far in front of the camera the object is. Internally, most RGB-D sensors work through either “structured light,” which projects an infrared pattern onto a scene and senses how that pattern has warped onto the geometric surfaces, or “time of flight,” which looks at how long projected infrared light takes to return to the camera. Some RGB-D cameras you might have heard of include the Microsoft Kinect and the iPhone X's Face ID sensor. RGB-D is great because these sensors are relatively small and low-cost but also fast and immune to visual matching errors. However, RGB-D cameras often have many holes in their depth output due to occlusion (where objects in the foreground block projection onto objects behind them), pattern sensing failures, and range issues (both projection and sensing becomes difficult further away from the camera).\n\nLIDAR uses several laser beams (sensing in concentric circles) to directly perceive the geometric structure of an environment (Source: Giphy)\n\n 1. LiDAR involves firing rapid laser pulses at objects and measuring how much time they take to return to the sensor. This is similar to the \"time of flight\" technology for RGB-D cameras we described above, but LiDAR has significantly longer range, captures many more points, and is much more robust to interference from other light sources. Most 3D LiDAR sensors today have several (up to 64) beams aligned vertically, spinning rapidly to see in all directions around the sensor. These are the sensors used in most self-driving cars because of their accuracy, range, and robustness, but the problem with LiDAR sensors is that they're often large, heavy, and extremely expensive (the 64-beam sensor that most self-driving cars use costs $75,000!). As a result, many companies are currently trying to develop cheaper “solid state LiDAR” systems that can sense in 3D without having to spin.\n\n3D Representations\n\nOnce you've captured 3D data, you need to represent it in a format that makes sense as an input to the processing pipeline you’re building. There are four main representations you should know:\n\nimage alt text\n\nThe different representations of 3D data. (a) point cloud (source: Caltech), (b) voxel grid (source: IIT Kharagpur), (c) triangle mesh (source: UW), (d) multi-view representation (source: Stanford)\n\na. Point clouds are simply collections of points in 3D space; each point is specified by an (xyz) location, optionally along with some other attributes (like rgb color). They’re the raw form that LiDAR data is captured in, and stereo and RGB-D data (which consist of an image labeled with per-pixel depth values) are usually converted into point clouds before further processing.\n\nb. Voxel grids are derived from point clouds. \"Voxels\" are like pixels in 3D; think of voxel grids as quantized, fixed-sized point clouds. Whereas point clouds can have an infinite number of points anywhere in space with floating-point pixel coordinates, voxel grids are 3D grids in which each cell, or “voxel,” has a fixed size and discrete coordinates.\n\nc. Polygon meshes consist of a set of polygonal faces with shared vertices that approximate a geometric surface. Think of point clouds as a collection of sampled 3D points from an underlying continuous geometric surface; polygon meshes aim to represent those underlying surfaces in a way that can be easily rendered. While originally created for computer graphics, polygon meshes can also be useful for 3D vision. There are several methods to obtain polygon meshes from point clouds, including Kazhdan et al.'s Poisson surface reconstruction[1] (2006).\n\nd. Multi-view representations are collections of 2D images of a rendered polygon mesh captured from different simulated viewpoints (\"virtual cameras\") to convey the 3D geometry in a simple way. The difference between simply capturing images from multiple cameras (like in stereo) and constructing a multi-view representation is that multi-view requires actually building a full 3D model and rendering it from several arbitrary viewpoints to fully convey the underlying geometry. Unlike the other three representations above, which are used for both storage and processing of 3D data, multi-view representations are typically only used to turn 3D data into an easy format for processing or visualization.\n\n\nNow that you've turned your 3D data into a digestible format, you need to actually build out a computer vision pipeline to understand it. The problem here is that extending traditional deep learning techniques that work well on 2D images (like CNNs) to operate on 3D data can be tricky depending on the representation of that data, making conventional tasks like object detection or segmentation challenging.\n\nLearning with multi-view inputs\n\nUsing a multi-view representation of 3D data is the simplest way to adapt 2D deep learning techniques to 3D. It's a clever way to transform the problem of 3D perception into one of 2D perception, but in a way that still allows you to reason about the 3D geometry of an object. The early deep learning-based work to use this idea was Su et al.'s multi-view CNN[2] (2015), a simple yet effective architecture that can learn a feature descriptor from multiple 2D views of a 3D object. Implementing this approach, the method had increased performance compared to using a single 2D image for the object classification task. This is accomplished by feeding in individual images into a VGG network pre-trained on ImageNet in order to extract salient features, pooling these resulting activation maps, and passing this information into additional convolutional layers for further feature learning.\n\nimage alt text\n\nMulti-view CNN architecture (Source: paper)\n\nStill, multi-view image representations have numerous limitations. The main issue is that you aren't truly learning in 3D — a fixed number of 2D views is still just an imperfect approximation of an underlying 3D structure. As a result, tasks like semantic segmentation, especially across more complex object and scenes, become challenging because of the limited feature information gained from 2D images. Moreover, this form of visualizing 3D data is not scalable for computationally constrained tasks like autonomous driving and virtual reality — keep in mind that generating a multi-view representation requires rendering a full 3D model and simulating several arbitrary viewpoints. Ultimately, multi-view learning is faced with many drawbacks that motivates research on methods that learn directly from 3D data.\n\nLearning with volumetric representations\n\nLearning with voxel grids solves the main drawbacks of multi-view representations. Voxel grids bridge the gap between 2D and 3D vision — they're the closest 3D representation to images, making it relatively easy to adapt 2D deep learning concepts (like the convolution operator) to 3D. Maturana and Scherer's VoxNet[3] (2015) was one of the first deep learning methods to achieve compelling results on the object classification task given a voxel grid input. VoxNet operates on probabilistic occupancy grids, in which each voxel contains the probability that that voxel is occupied in space. A benefit of this approach is that it allows the network to differentiate between voxels that are known to be free (e.g., voxels a LiDAR beam passed through) and voxels whose occupancy is unknown (e.g., voxels behind where a LiDAR beam hit).\n\nimage alt text\n\nVoxNet architecture (Source: paper)\n\nVoxNet's architecture itself is fairly straightforward, consisting of two convolutional layers, a max pooling layer, and two fully-connected layers to compute an output class score vector. This network is much shallower and has far fewer parameters than most state-of-the-art image classification networks, but it was selected from a stochastic search over hundreds of possible CNN architectures. Since voxel grids are so similar to images, the actual strided convolution and pooling operators they employ are trivial adaptations of these operators from working on 2D pixels to 3D voxels; the convolution operator uses a $d \\times d \\times d \\times c$ kernel rather than the $d \\times d \\times c$ kernel used in 2D CNNs, and the pooling operator considers non-overlapping 3D blocks of voxels rather than 2D blocks of pixels.\n\nOne issue with VoxNet is that the architecture isn't inherently rotation-invariant. While the authors reasonably assume that the sensor is kept upright so that the $z$ axis of the voxel grid is aligned with the direction of gravity, no such assumptions can be made about rotation about the $z$ axis — an object from behind is still that same object, even though the geometry in the voxel grid would interact with the learned convolution kernel very differently. To solve this, they employ a simple data augmentation strategy. During training, they rotate each model several times and train on all copies; then, at test time, they pool the output of the final fully-connected layer across several rotations of the input. They note that this approach led to similar performance but faster convergence compared to pooling the output of intermediate convolutional layers like Su et al.'s multi-view CNNs do in their \"view pooling\" step. In this way, VoxNet learns rotation invariance by sharing the same learned convolutional kernel weights across different rotations of the input voxel grid.\n\nVoxNet represents a huge step towards true 3D learning, but voxel grids still have a number of drawbacks. First, they lose resolution compared to point clouds, since several distinct points representing intricate structures will be binned into one voxel if they're close together. At the same time, voxel grids can lead to unnecessarily high memory usage compared to point clouds in sparse environments, since they actively consume memory to represent free and unknown space whereas point clouds contain only known points.\n\nLearning with point clouds\n\n\nIn light of these issues with voxel-based approaches, recent work has focused on architectures that operate directly on raw point clouds. Most notably, Qi et al.'s PointNet[4] (2016) was one of the first proposed methods for handling this form of irregular 3D data. However, as noted by the authors, point clouds are simply a set of points represented in 3D by their xyz locations. More concretely, given $N$ points in a point cloud, the network needs to learn unique features that are invariant to the $N!$ permutations of this input data, since the ordering of points fed into a network doesn't impact the underlying geometry. In addition, the network should be robust to transformations of the point cloud — rotations, translations and scaling should not impact prediction.\n\nTo ensure invariance across input ordering, the key insight behind PointNet is using a simple symmetric function that produces a consistent output for any ordering of the input (examples in this class of functions include addition and multiplication). Guided by this intuition, the basic module behind the PointNet architecture (called PointNet Vanilla) is defined as follows:\n\n$$f(x_1, \\ldots, x_n) = \\gamma \\odot g(h(x_1), \\ldots, h(x_n))$$\n\nwhere $f$ is a symmetric function that transforms input points into a $k$-dimensional vector (for object classification). This function $f$ can be approximated such that there exists another symmetric function $g$. In the equation, $h$ is a multi-layer perceptron (MLP) that maps individual input points (and their corresponding features such as xyz position, color, surface normals, etc.) into a higher dimensional latent space. The max-pooling operations serves as the symmetric function $g$, aggregating learned features into a global descriptor for the point cloud. This single feature vector is passed into $\\gamma$, another MLP that outputs predictions for objects.\n\nTo address the challenge of learning representations that are invariant to geometric transformations of the point cloud, PointNet employs a mini-network, called T-Net, which applies an affine transformation onto the input point cloud. The concept is similar to Jaderberg et al.'s spatial transformer networks[5] (2016) but is much simpler because there is no need for defining a new type of layer. T-Net consists of learnable parameters that enable PointNet to transform the input point cloud into a fixed, canonical space — ensuring that the overall network is robust to even the slightest of variations.\n\nimage alt text\n\nPointNet architecture (Source: paper)\n\nThe overall PointNet architecture integrates the vanilla approach and T-Net with multiple MLP layers that create feature representations for the point clouds. However, beyond just object classification, PointNet also enables semantic segmentation of both objects and scenes. To accomplish this, the architecture combines the global feature vector from the max pooling symmetric function with per-point features learned after the input data is passed through a few MLPs. By concatenating these two vectors, each point is aware of both its global semantics and its local features, enabling the network to learn additional, more meaningful features that help with segmentation.\n\nimage alt text\n\nSemantic segmentation results of indoor scenes using PointNet (Source: paper)\n\n\nDespite the impressive results with PointNet, one of the primary drawbacks is that the architecture fails to capture the underlying local structure within neighborhoods of points — an idea that is similar to extracting features from increasing receptive field sizes in images using CNNs. To address this issue, Qi et al. developed PointNet++[6] (2017), a spinoff from the PointNet architecture but is also capable of learning features from local regions within a point cloud. The basis behind this method is a hierarchical feature learning layer that has three key steps. It (1) samples points to serve as centroids for the local region, (2) groups neighboring points in these local regions based on distance from the centroid, and (3) encodes features for these regions using a mini-PointNet.\n\nThese steps are progressively repeated so that features are learned across varying sizes of point groups within the point cloud. In doing so, the network can better understand the underlying relationships within local clusters of points across the entire point cloud — ultimately aiding in improved generalization performance. The results of this work demonstrate that PointNet++ enables significant improvements over existing methods including PointNet, and achieved state-of-art performance on 3D point cloud analysis benchmarks (ModelNet40 and ShapeNet)\n\nPromising new research areas\n\nGraph CNNs\n\nCurrent research on deep learning architectures for processing 3D data has been focused on point cloud representations, with much of the recent work extending ideas from PointNet/PointNet++ and drawing inspiration from other fields to further improve performance. An example of one such paper is Wang et al.'s Dynamic Graph CNNs[7] (2018), which uses graph-based deep learning methods to improve feature extraction in point clouds. The idea is that PointNet and PointNet++ fail to capture the geometric relationships among individual points because these methods need to maintain invariance to different input permutations. However, by considering a point and it's surrounding nearest neighbors as a directed graph, Wang et al. construct EdgeConv, an operator that generates unique features across points in the data. Read another Gradient overview if you are interested in learning more about learning on graphs.\n\n\nimage alt text\n\nSPLATNet architecture (Source: paper)\n\nOn the other hand, some research has taken a step away from the classic feature extraction methods proposed in PointNet/PointNet++, opting to design a new method for processing point clouds all together. Su et al.'s SPLATNet (2018)[8] architecture is a great example of this new focus in point cloud research — the authors design a novel architecture and convolution operator than can directly operate on point clouds. The key insight behind this paper is translating the concept of \"receptive fields\" to irregular point clouds, which enables spatial information to be preserved even across sparse regions (a key drawback with PointNet/PointNet++). What's especially fascinating is that SPLATNet can project features extracted from multi-view images into 3D space, fusing this 2D data with the original point cloud in an end-to-end learnable architecture. Using this 2D-3D joint learning, SPLATNet achieved a new state-of-the-art in semantic segmentation.\n\nFrustum PointNets\n\nimage alt text\n\nVisualizing a 3D frustum generated from a 2D bounding box estimation (Source: paper)\n\nA third promising reserach direction involves extending the basic architectural building blocks we described above to build more elaborate networks for useful tasks like object detection in 3D. Building on the idea of using both 2D and 3D data, Qi et al.’s Frustum PointNets[9] (2017) presents a new approach that fuses RGB images with point clouds to improve the efficiency of localizing objects in large 3D scenes. Conventional approaches for this task determine possible 3D bounding boxes for objects by performing classification on sliding windows directly over the entire point cloud, which is computationally expensive and makes real-time prediction difficult. Qi et al. make two key contributions.\n\nFirst, they propose to initially use a standard CNN for object detection on 2D images, extrude a 3D frustum corresponding to the region of the point cloud in which the detected object could reside, and then perform the search process over only this \"slice\" of the point cloud. This significantly narrows down the search space for bounding box estimation, reducing the likelihood of false detections and considerably speeding up the processing pipeline, which is crucial for autonomous driving applications.\n\nSecond, instead of performing the typical sliding window classification to during the bounding box search process, Qi et al. design a novel PointNet-based architecture that can directly perform instance segmentation (segmenting the point cloud into individual objects) and bounding box estimation over the entire 3D frustum in one pass, making their method both fast and robust to occlusions and sparsity. Ultimately, as a result of these improvements, this work outperformed all prior approaches at the time of publication on the KITTI and SUN RGB-D 3D detection benchmarks.\n\nFinal thoughts\n\nOver just the past 5 years, 3D deep learning methods have progressed from working with derived (multi-view) to raw (point cloud) representations of 3D data. Along the way, we've moved from methods that were simple adaptations of 2D CNNs to 3D data (multi-view CNNs and even VoxNet) to methods that were handcrafted for 3D (PointNet and other point cloud methods), greatly improving performance on tasks like object classification and semantic segmentation. These results are promising because they confirm that there truly is value in seeing and representing the world in 3D.\n\nHowever, advancements in this field have just begun. Current work focuses not only on improving the accuracy and performance of these algorithms, but also on ensuring robustness and scalability. And although much of the current research is motivated by autonomous vehicle applications, new methods operating directly on point clouds will play a significant role in 3D medical imaging, virtual reality, and indoor mapping.\n\n(Cover image: Waymo)\n\nMihir Garimella and Prathik Naidu are rising sophomores at Stanford University majoring in Computer Science. They’ve done research in robotics, computer vision, and machine learning and have industry experience at Facebook’s Connectivity Lab and Amazon’s CoreAI team, respectively. They're the co-founders of Firefly Autonomy, an early-stage startup building autonomous drones for indoor mapping and industrial inspection.\n\n 1. Kazhdan, Michael, and Hugues Hoppe. \"Screened poisson surface reconstruction.\" ACM Transactions on Graphics (ToG) 32.3 (2013): 29. ↩︎\n\n 2. Su, Hang, et al. \"Multi-view convolutional neural networks for 3d shape recognition.\" Proceedings of the IEEE international conference on computer vision. 2015. ↩︎\n\n 3. Maturana, Daniel, and Sebastian Scherer. \"Voxnet: A 3d convolutional neural network for real-time object recognition.\" Intelligent Robots and Systems (IROS), 2015 IEEE/RSJ International Conference on. IEEE, 2015. ↩︎\n\n 4. Qi, Charles R., et al. \"Pointnet: Deep learning on point sets for 3d classification and segmentation.\" Proc. Computer Vision and Pattern Recognition (CVPR), IEEE 1.2 (2017): 4. ↩︎\n\n 5. Jaderberg, Max, Karen Simonyan, and Andrew Zisserman. \"Spatial transformer networks.\" Advances in neural information processing systems. 2015. ↩︎\n\n 6. Qi, Charles Ruizhongtai, et al. \"Pointnet++: Deep hierarchical feature learning on point sets in a metric space.\" Advances in Neural Information Processing Systems. 2017. ↩︎\n\n 7. Wang, Yue, et al. \"Dynamic graph CNN for learning on point clouds.\" arXiv preprint arXiv:1801.07829 (2018). ↩︎\n\n 8. Su, Hang, et al. \"Splatnet: Sparse lattice networks for point cloud processing.\" Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2018. ↩︎\n\n 9. Qi, Charles R., et al. \"Frustum pointnets for 3d object detection from rgb-d data.\" arXiv preprint arXiv:1711.08488 (2017). ↩︎", "pred_label": "__label__1", "pred_score_pos": 0.5146853923797607} {"content": "Numerology Number 24\n\n\nLast Updated on\n\nThe Meaning of Number 24\n\nIn traditional Numerology, when we evaluate multi-digit numbers like 24, we do so by reducing them to the root numbers that ultimately inform their meaning.\n\nEach root number, those being the numbers 0-9, have their own vibrational meaning. Multi-digit or compound numbers are viewed as combinations of these energies.\n\nDeepak Chopra once said, “The universe is made up fundamentally of energy and information.” In the view of modern physics, everything that appears in the material world, including our thoughts, begins in what is called a Unified Field of energy and information.\n\nNumbers, of course, simply represent ways that information can be organized.\n\nThe meanings that accompany the numbers that enter our experience are not impressed upon them by our conscious minds, but rather come from that field of great depth often referred to in spiritual traditions as spirit, source energy or soul.\n\nWhen a numerologist analyzes your Numerology chart, what they are doing is deciphering the clues that come from source energy or soul about what will bring meaning, purpose and fulfillment to your life.\n\nThe Numerological Meaning of 24\n\nThe number 24 can be reduced to its root number by simply adding its individual digits together, like this: 2 + 4 = 6\n\nThis means that the characteristics that make up number 24’s signature vibration will include the vibrational essence of 2, 4 and 6. When these numbers combine, the focus is on teamwork, cooperation, family, domestic life and harmonious relationships.\n\nSpecial Properties of 24\n\nThe number 24 itself has some very interesting properties that seem to support this numerological meaning. First of all, in mathematics, 24 is a highly composite number. This is because it has more divisors or ‘members of its factor set’ than any other two digit number. In all, 8 different numbers combine to produce 24.\n\n24 is also the exact number of times you can rearrange a set of 4 different items. Four is the number of completion, stability and has highly material connotations.\n\nThere are the four cardinal directions, the four corners of a structure or foundation, the four priomordial elements (fire, air, water and earth), the four rivers of creation and the four winds that blow from each direction.\n\nWhen you take the 4 elements of creation and multiply them by the 6 senses (4 X 6 = 24) the result is human experience which is shaped by the 24 hours of the day.\n\nThe Deeper Symbolic Meaning of 24\n\nHuman experience, as James Joyce notes in his ground breaking novel Ulysses, is shaped by the a priori forms of sensibility — namely time and space. Joyce’s great novel is a cosmos condensed into a single day.\n\nJames Joyce’s Ulysses was inspired by the ancient tale of the hero, Homer’s Odyssey, which, it is no accident, is made up of 24 episodes that cover the 20 year return journey that Odysseus took finding his way home to his wife Penelope and son Telemachus.\n\nAs Joseph Campbell, the notable scholar of Myth and Literature has noted, the story of Joyce’s hero in Ulysses is the story of every person who ventures out into the world, only to round their day with a return journey home again.\n\nNumber 24 and the Cosmic Cycle\n\nThe 24th kua of the I Ching is usually translated Return, but is also sometimes translated as The Turning Point, and its image is thunder (CHEN) in the bowels of the earth (K’UN). In the Wilhelm/Baynes translation, the oracle states, “Return. Success… To and Fro goes the Tao (way).\n\nOn the seventh day comes the return.” Then the sublime commentary by Confucius brings it all together: “It is in the Return cycles that the very heart of the workings of heaven and earth become apparent.”\n\nLike thunder buried in the bowels of the earth, each December 24th Christians endure the longest, darkest night of the year, the Winter solstice, knowing that the savior will be born the following morning.\n\nThe number 24 is indicative of the deep cycles of the heart that enclose us into systems of sentiment and belief that are so powerful they form the foundations of all societies.\n\nThe Challenge of Number 24\n\nIf taken as Tarot cards, the 2 and the 4 of 24 would appear as the introverted High Priestess and the highly materialistic Emperor. When you combine these two numbers you end up at station 6 of the Tarot, The Lovers.\n\nThe Lovers is indicative of the need to make a decision, and that is the challenge of the energy of number 24. In most cases, the main decision that people have to make is between economic and domestic considerations.\n\nWhen the number 24 appears in your experience, as a date, a time (12 midnight in military time), in an address or as an age, it may indicate a message from source to take domestic matters into consideration. Often we get lost in our work lives and forget about how important it is to take that return journey home.\n\nNumber 24 as a Birth Number\n\nYour birth number is 24 when you are born on the 24th of any month. 24 has a vibrational energy like that of birth numbers 6 and 15, but because of its special properties (noted above) 24 has a vibrational essence that is especially associated with relationships, family and companionship.\n\nLike those who are born with the essence of number 6 in their Numerology chart, those with a birth number of 24 are likely to gravitate to occupations associated with the home, with a special emphasis on relationships.\n\nNumber 24 the Diplomat\n\nLike the image of thunder in the bowels of the earth from the I Ching suggests, there is great power within someone who has the unique energy of number 24 in their Numerology chart.\n\nThis power usually emerges in the stabilizing and diplomatic influence that they will have over a family.\n\nThe essence of 24 can manifest in your occupation as a healer or counselor, a security officer keeping people safe, an artist who is creative and nurturing or in a domestic role in which care and nurturing are evident.\n\nSharing is caring!\n", "pred_label": "__label__1", "pred_score_pos": 0.8411699533462524} {"content": "Great Lakes\n\nIncreases in extreme precipitation events, changes in growing seasons, and warming temperatures impact the people, ecosystems, and infrastructure of the Great Lakes region—and the lakes themselves. Given its energy-intensive economy, the region has the potential to reduce emissions that cause climate change and adapt to the impacts already being experienced.\n\n Key Points:\n\n • Extreme rainfall events have increased over the last century, and these trends are expected to continue. Combined with land cover changes, increased precipitation has and likely will continue to lead to flooding, erosion, declining water quality, and negative impacts on transportation, agriculture, human health, and infrastructure.\n • In the next few decades, longer growing seasons and rising carbon dioxide levels will increase yields of some crops; those benefits will be progressively offset by extreme weather events. In the long term, the combined stresses associated with climate change are expected to decrease agricultural productivity.\n • The composition of forests in the Great Lakes is changing as the climate warms. Many tree species are shifting northward, with more southerly varieties replacing them. Many iconic north wood tree species will lose their advantage and be slowly replaced over the next century.\n • Increased heat wave intensity and frequency, increased humidity, degraded air quality, reduced water quality, and change in vector-borne disease patterns will increase public health risks.\n • The Great Lakes region has a highly energy-intensive economy, with per capita emissions of greenhouse gases more than 20 percent higher than the national average. The region also has a large and increasingly utilized potential to reduce emissions that cause climate change.\n • Climate change will exacerbate a range of risks to the Great Lakes, including changes in the range and distribution of some species, increases in invasive species and harmful blooms of algae, and declines in beach health.\n • Ice cover declines will lengthen the commercial navigation season.\n • At-risk communities in the Great Lakes are becoming more vulnerable to climate change impacts such as flooding, drought, and increases in urban heat islands. Tribal nations are especially vulnerable because of their reliance on threatened natural resources for their cultural, subsistence, and economic needs. Integrating climate adaptation into planning processes offers an opportunity to better manage climate risks now. Developing knowledge for decision making in cooperation with vulnerable communities and tribal nations will help to build adaptive capacity and increase resilience.\n\nThe Great Lakes region includes all or portions of eight U.S. states—Minnesota, Wisconsin, Michigan, Indiana, Illinois, and Ohio in their entirety, plus the Great Lakes watershed areas of Pennsylvania and New York—as well as the province of Ontario, Canada. The region straddles U.S. regions typically described as the Midwest and the Northeast.\n\nMap of the Great Lakes region\n\nWhile Ontario is generally included in the definition of the Great Lakes region, this website focuses on climate resilience in the United States and is intended to serve the U.S. portion of the Great Lakes region.\n\nThe region is home to approximately 23 million people on the U.S. side of the Great Lakes Basin, and contains agricultural lands, forests, urban areas (including Buffalo, Chicago, Cleveland, Detroit, Milwaukee, and Rochester), diverse shorelines, and the Great Lakes themselves—the region’s economic backbone.\n\nScenes from the Great Lakes: Agriculture, Forests, Cities, Shorelines, and the Lakes Themselves\n\nThe Great Lakes region includes agricultural lands, forests, urban areas, diverse shorelines, and—of course—the Great Lakes themselves\n\nTogether, the Great Lakes make up the largest freshwater system on Earth, containing 84 percent of North America’s fresh surface water. The lakes are a vital resource for water supply, transportation, recreation, and power generation, among other uses.\n\nIn recent decades, the region has experienced substantial shifts in populations, socioeconomics, air and water pollution, and land use. Both the built and the natural environment display potential vulnerabilities to climate variability and change.\n\nRegional impacts of a changing climate\n\nClimate change will tend to amplify existing risks that impact people, ecosystems, and infrastructure. The effects of increased heat stress, flooding, drought, and late spring freezes may be magnified by other changes, such as a change in the prevalence of diseases and pests, increased competition from invasive species, land use change, an increase in air pollution, and economic shocks from extreme weather events. These impacts are particularly concerning to the region because a major component of the regional economy relies on the fisheries, recreation, tourism, and commerce generated by the Great Lakes and the northern forests.\n\n\nTemperatures in the Great Lakes region have been rising over the past several decades. The average temperature in northern portions of the region has increased by more than 1.5°F compared to the 1901–1960 average, and the rate of warming has increased in the last decade. Temperatures in the winter and at night are warming faster than in other seasons or in the daytime.\n\nMaps showing observed changes in temperatures across the United States\n\nObserved changes in annual, winter, and summer temperature in the United States (°F). Changes are the difference between the average for present-day (1986–2016) and the average for the first half of the last century (1901–1960 for the contiguous United States, 1925–1960 for Alaska and Hawai‘i).\n\nThe amount of future warming for the region will depend on the amount of heat-trapping gases (emissions from burning fossil fuels) in the atmosphere. Regional projections for the middle of the 21st century suggest warming of 3.5–4.5°F above the 20th century average in a lower emissions scenario and 5.5–6.5°F in a higher emissions scenario. By the end of the century, projections indicate warming from approximately 5.5–6.5°F (lower emissions scenario) to 7.5–9.5°F (higher emissions scenario).\n\n\nMap of the United States divided into regions showing percentage change on heavy precipitation between 1958 and 2016\n\nThe map shows percent increases in the amount of precipitation falling in daily events that exceed the 99th percentile of all non-zero precipitation days (top 1 percent of all daily precipitation events) from 1958 to 2016 for each region of the United States. The number in each black circle is the percent change over the entire period (1958–2016).\n\nAnnual precipitation in the Great Lakes region has generally increased over the past several decades. Some of this increase is attributable to increases in the intensity and duration of the heaviest rainfalls—a trend that is projected to continue into the future. Observations have not documented any change in drought duration in the region (or the larger Midwest region) over the past century.\n\nModel projections for future precipitation are less certain than those for temperatures. By late this century, under a higher emissions scenario, models project average winter and spring precipitation to increase 10 to 20 percent, relative to 1970–2000; under the same conditions, changes in summer and fall precipitation are not projected to be larger than natural variations. Some regional climate model projections using the same emissions scenarios also project increased spring precipitation and decreased summer precipitation, though these expected patterns are not as significantly altered as they are to the south of the Great Lakes. Increases in the frequency and intensity of extreme precipitation are projected across the Great Lakes region.\n\nLake-effect snow\n\nSatellite image of lake-effect snow occurring over the Great Lakes region\n\nSatellite image of lake-effect snow occurring over the Great Lakes region. Lake-effect snow occurs when cold dry air passes over a large, warm lake and picks up moisture and heat. Clouds build overhead and eventually develop into snow showers as they move downwind. In this image, the wind is moving from the northwest to the southeast. It picks up moisture from Lakes Nipigon, Superior, and Michigan and deposits it as snow further downwind.\n\nIn the snow belts of the Great Lakes, average lake-effect snowfall activity has increased since the early twentieth century for Lakes Superior, Michigan-Huron, and Erie. Individual studies for Lakes Michigan and Ontario, however, indicate that this increase has not been continuous—in both cases, upward trends were observed until the 1970s and early 1980s; since then, lake-effect snowfall has decreased in these regions.\n\nIce cover extent and lake water temperatures are the main controls on lake-effect snow that falls downwind of the Great Lakes. As the region warms and ice cover diminishes in winter, models predict that more lake-effect snow will occur. The predictions change once lake temperatures rise to a point when much of what now falls as snow will instead fall as rain.\n\nThe Michigan Department of Transportation has noted that an increase in lake-effect snows means that existing models used for snow and ice removal procedures are no longer reliable. Changing conditions will require better monitoring, new models, and improvements in roadway condition detection systems.\n\nThe preceding text is excerpted and abridged from the Synthesis of the Third National Climate Assessment for the Great Lakes Region, the Climate Science Special Report: Fourth National Climate Assessment, Volume I (Section 7.1.2), and the U.S. National Climate Assessment: Climate Change Impacts in the United States (Chapter 5, Transportation).\n\nIncreased risks to the Great Lakes\n\nThe Great Lakes themselves influence regional climate conditions and impact climate variability and change. They also influence daily weather by (1) moderating maximum and minimum temperatures, (2) increasing cloud cover and precipitation over and just downwind of the lakes during winter, and (3) decreasing summertime convective clouds and rainfall over the lakes. Consistent with observed changes in regional climate, the Great Lakes show a trend toward higher water temperatures and smaller average winter ice extents.\n\nWater temperatures\n\nMaps showing the rate of change of summer surface water temperature in the Great Lakes\n\nSummer surface water temperature increased in most areas of the Great Lakes between 1994 and 2013; the map shows the rate of change. The greatest rates of increase occurred in deeper water, with smaller increases occurring near shorelines.\n\nSummer surface water temperature in Lake Huron increased 5.2°F between 1968 and 2002. Over the same period, summer surface water temperature in Lake Superior increased 4.5°F, twice the rate of increase in air temperature. These lake surface temperatures are projected to rise by as much as 7°F by 2050 and 12.1°F by 2100.\n\nHigher temperatures, increased precipitation, and lengthened growing seasons are likely to result in increased production of blue-green and toxic algae in the lakes. Blooms of these algae can harm fish, water quality, habitats, and aesthetics—and could worsen the impact of invasive species.\n\nIce coverage\n\nMaps showing the duration of seasonal ice cover in the Great Lakes\n\n\nAlthough there is substantial variability from year to year, the average annual maximum ice coverage in the Great Lakes was just 40 percent between 2003 and 2012—smaller than the average 52 percent coverage from 1962 to 2013. For comparison, maximum ice coverage averaged 67 percent during the 1970s, a decade that included several extremely cold winters. From 1973 to 2010, ice cover on the Great Lakes declined an average of 71 percent, although it was high in the winters of 2014 and 2015. Less ice, coupled with more frequent and intense storms, leaves shores vulnerable to erosion and flooding and could harm property and fish habitat.\n\nReduced ice cover also has the potential to lengthen the shipping season. The navigation season increased by an average of eight days between 1994 and 2011: extra days for shipping can benefit commerce, but navigable conditions can also increase shoreline scouring and bring in more invasive species.\n\nLake levels and destratification\n\nThe cargo freighter SS Arthur M. Anderson\n\nThe cargo freighter SS Arthur M. Anderson.\n\nWater levels in the Great Lakes fluctuate naturally, and it is more likely than not that levels will decline with a changing climate. Changes in lake levels can influence the amount of cargo that can be carried through them on ships. On average, a 1,000-foot ship sinks one inch lower in the water for every 270 tons of cargo it carries. If a ship is currently limited by water depth, any lowering of lake levels will result in a reduction in the amount of cargo it can transport to Great Lakes ports.\n\nIn addition, fluctuating lake levels influence how people use and interact with shorelines. During sustained low water periods, development marches closer to the lake, shorefront landowners “groom” emergent coastal wetlands, and increased navigational dredging is needed. When lake levels go up, erosion and flooding, particularly when coupled with storms, can threaten properties and public safety.\n\nIt’s unclear whether, or how much, a changing climate will affect lake levels in the future. Current estimates of lake level changes are uncertain; recent studies, along with a large spread in existing modeling results, indicate that projections of Great Lakes water levels represent evolving research and are still subject to considerable uncertainty.\n\nAn important seasonal event for biological activity in the lakes is the turnover of water, or destratification. This has historically occurred twice a year: during the fall as water temperature drops below 39°F, the point at which freshwater attains its maximum density, and again in the spring, when water temperature rises above that threshold. The mixing that occurs during these times carries oxygen down from the surface and nutrients up from the bottom. Climate projections suggest that the overturn in spring, which triggers the start of the aquatic \"growing season,\" will happen earlier and that the fall overturn will happen later. As the duration of the stratified period increases, the risk of impacts from low oxygen levels at depth and lack of nutrient at the surface increases, which can potentially lead to declines in species populations in both zones.  \n\nThe preceding text is excerpted and abridged from the reports Impacts, Risks, and Adaptation in the United States: Fourth National Climate Assessment, Volume IIChapter 21: Midwest and Synthesis of the Third National Climate Assessment for the Great Lakes Region.\n\nNote on regional modeling uncertainties\n\nInteraction between the lakes and the atmosphere in the Great Lakes region (e.g., through ice cover, evaporation rates, moisture transport, and modified pressure gradients) is crucial to simulating the region’s future climate (i.e., changes in lake levels or regional precipitation patterns). Globally recognized modeling efforts (i.e., the Coupled Model Intercomparison Project, or CMIP) do not include a realistic representation of the Great Lakes, simulating the influence of the lakes poorly or not at all. Ongoing work to provide evaluation, analysis, and guidance for the Great Lakes region includes comparing this regional model data to commonly used global climate model data (CMIP) that are the basis of many products practitioners currently use (i.e., NCA3IPCCNOAA State Climate Summaries). To address these challenges, a community of regional modeling experts are working to configure and utilize more sophisticated climate models that more accurately represent the Great Lakes’ lake–land–atmosphere system to enhance the understanding of uncertainty to inform better regional decision-making capacity. For more information, visit the GLISA's Great Lakes Ensemble page.\n\nLearn more\n\nTo learn more about the impacts of climate change and variability and building climate resilience in the Great Lakes, visit these pages:\n\nBanner Image Credit\nGrand Haven, Lake Michigan. Image credit: D. O'Keefe, Michigan Sea Grant\nLast modified\n10 May 2019 - 11:04am", "pred_label": "__label__1", "pred_score_pos": 0.8988475799560547} {"content": "about prostate cancer\n\n10 Vitamin D Deficiency Symptoms You Can Identify Yourself\n\nVitamin D Deficiency Symptoms Vitamin D deficiency symptoms have been linked to numerous health problems, including heart disease, depression, and even cancer.[1] Here are 10 signs you're not getting enough vitamin D: Depression or anxiety Bone softening (low bone density) or fractures Fatigue and generalized weakness Muscle cramps and weakness … Read More\n\n12 Risk Factors for Prostate Cancer\n\n\nCan You Die from Prostate Cancer?\n\nBefore widespread prostate cancer screening began in the late 1980s, many men newly diagnosed with the disease had advanced cancer that had spread beyond the prostate. Today, in the screening era, most men with the disease are diagnosed when their cancer is in an earlier, more curable stage. But, even … Read More\n\nAre You Keeping Tabs on Your PSA Levels?\n\nThree big letters: P-S-A. In the world of urology and men’s health, perhaps no three letters generate more controversy. Since the early 1990s, the prostate-specific antigen (or PSA) blood test has served as the cornerstone of prostate cancer early detection. Today, it remains at the center of a debate over … Read More\n\nEnter Your Login Credentials", "pred_label": "__label__1", "pred_score_pos": 0.9968195557594299} {"content": "Friendship and Autism\n\nUnderstanding High Functioning Autism, From the Heart of an Autism Mom, Part 1\n\nFriendship and Autism\n\nSo, I will be doing a series of articles, about the struggles of those of us with High Functioning Autism. I really want to encourage you to share, to grow the awareness, and promote acceptance. As my first blog article stated, I am as Aspie. (See the link at the end) My son, who is 15 years old, is also HFA. He is my inspiration for what I am writing today, though I see a lot of it in myself, as well.\n\nToday, I want to share an issue that plagues so many HFA children, teens, and adults. Friendships. Everyone wants a friend, right? Especially our teenagers. It is a rite of passage, and a way to feel validated. I am going to use my favorite and most affectionate term, Aspie, as I write.\n\nUnfortunately, for many tweens and teens on the spectrum, making friends is difficult. Holding onto those friends is even more so. Let me explain, with just a few examples.\n\nAspies are not always obvious. They appear to be normal, from a distance. Sometimes, they appear simply stuck up, or overly shy. Eventually, a kind souled person, usually someone who is also on the outside of polite society, sometimes a person who simply feels empathetic, will make a connection, and start a friendship. Typically, a shared fascination or hobby bonds them.\n\nThe connection means the world to an Aspie. Some might not say it, or show it, while others may do so in an almost overwhelming and smothering way. A few of those connections end, at this point.\n\nOthers move forward. Unfortunately, problems inevitably arise.\n\nAspies get zoned in on a particular topic, say, video games, and they forget that the other person does not share such a locked fixation. They have other interests, they would like to share, but the Aspie does not “see” that.\n\nThen there are other Aspies that don’t talk much at all. The friend tries to make conversation, but gets uh-huh, and maybe grunts, and that is all. This can stem from discomfort on the Aspie’s part, or just the inability to find the words to make small talk.\n\nAnother Aspie trait, that can be taken wrong by his friends, is the inability to use sarcasm appropriately, or at appropriate times. Oh, many times, I have had my own son, throw out some sarcasm at inappropriate times. Conversations can be very interesting, with my Aspie.\n\nOn the other side of sarcasm, the receiving end, a lot of Aspies don’t understand it and take offense. Then, of course, you have an argument. The friend doesn’t understand what just happened, and will sometimes back away, for a time.\n\nOf course, then you have the Social Anxiety angle. A lot of Aspie’s are just not comfortable going out, whether it be a party, the mall, the park, wherever. There are sounds, sights, smells and feelings that cause discomfort. If an Aspie does go out, and they have a panic attack, it is hard for them to recover, quickly. So, they choose to limit outside excursions as much as possible. Friends? They don’t always understand this.\n\nSo, eventually, those friendships start to strain under the differences the kids have. Typically, the friend will start spending more time with other kids, and less time with his Aspie friend. Eventually, the friendship comes to an end, leaving the Aspie feeling completely worthless and lost, wondering why they are not liked. In most cases, in my son’s case, they bury themselves into their favorite hobby; gaming, YouTube, whatever it is they are currently fixated on.\n\nKnowing this, and experiencing it first hand, I offer this advice:\n\nIf you or your child have a friend that is a little different, or you see a child all alone, be kind, and consider that they may be an Aspie. Think about how you could help them feel comfortable, and try to understand who they are. Once they trust you, you will see a small change, and once you understand their ways, you will see that they are an extremely fun, and valuable friend. Maybe the best friend you will ever know in your lifetime.\n\nGod Bless you!\n\n**For more information about how I came to terms with my Aspieness, check out this article.\n\nlifestyleadvicemental healthhumanity\nJenna Logan\nJenna Logan\nRead next: Best Running Shoes for Women\nJenna Logan\n\nChristian, ASD mom, and Published Author. \n\nJesus, my son, and Autism are my life's passions.\n\nContact me at [email protected]\n\nSee all posts by Jenna Logan", "pred_label": "__label__1", "pred_score_pos": 0.7339720726013184} {"content": "://Overview Of Extraction Thimbles\n\nOverview Of Extraction Thimbles\n\nThe extraction thimble is a type of cylindrical element for filtration. Generally, it is divided into filtering cartridges as gas and a liquid medium.\n\nThimbles of liquid filtering medium are usually installed inside the pipeline. Besides, featuring a conical shape of the filter cartridge is usually, they are also named conical filter cartridge.\n\n\nCommon filter materials of extraction thimble involve wood pulp fiber paper and polyester non-woven fabric, among which the later one can process coating, oil-proof, water-proof and static-proof methods.\n\nInstallation Method\n\nThere are vertical lifting, inclined installation(according to specific angles) and flange installation .etc.\n\n\n1. Improve the effective filtering area on a large scale.\n2. Confirm a low and stable pressure difference and increase the circulation of air volume.\n3. The compact filter element is easy to be installed.\n4. Especially suitable for industries of high dust concentration.\n\n\nThe size of the extraction thimble is frequently referred to overseas imported samples. Hence, the common specifications are 12.75′, 13.84′, and 26′ in height, which after conversion to metric are actually325 * 660 mm and 350 * 660 mm.\n\nCellulose Extraction Thimbles for SoxhletSoxhlet Glass Fiber Extraction Thimbles\n\n2019-04-08T01:58:53+00:00April 8th, 2019|", "pred_label": "__label__1", "pred_score_pos": 0.8860494494438171} {"content": "\nClose vision bar\nOpen vision bar\n\nBasic Needs of Animals\n\n\nAnimal Classification Learn how animals are classified.\n\nAnimal Classification Another cool site to learn about how animals are classified.\n\nWhere's the Octopus?  This is a cool video about camouflage.\n\nMimicry Find out how the king snake mimics the coral snake to protect itself.\n\nLife Cylce of a Butterfly   This site has a video that shows the complete metamorphosis of a butterfly.\n\nLife Cycles Learn about the life cycles of a butterfly, bird, and frog.\n\nAnimal Adaptations Discover how animal adaptations help students to meet their basic needs.\n\nAnimal Adaptations  Learn about animal adaptations and how they help the animals survive.\n\nCreate Your Wild Self! Create fun and exciting animals using existing animal adaptations\n\nBird Beak Adaptations Learn about the structure of bird beaks and how they help the bird get food.\n\nBird Feet Adaptations Learn about the structure of bird feet and how they help the animal survive.\n\nSequencing Life Cylce Stages  Correctly sequence the life cycle stages of a butterfly, frog, flower, and apple tree.", "pred_label": "__label__1", "pred_score_pos": 0.8847840428352356} {"content": "\"Preparing For Disasters Is An Opportunity Too\"\n\nAMOD MANI DIXIT needs no introduction in the field of earthquake and disaster management.\n\nMay 8, 2015, 5:45 p.m.\n\nAMOD MANI DIXIT needs no introduction in the field of earthquake and disaster management. Executive director of NSET, Dixit spoke to New Spotlight in connection with the Earthquake Day Nepal celebrates on January 16,2015 to remember the devastation of the great Earthquake of 1934.  We reprint it as the issue raise by Amod Mani Dixit's came into reality. Excerpts:\n\nHaving worked for a long time in disaster management, particularly in relation to earthquakes, what to do you suggest for making our disaster plans more effective?\n\nFirst of all, we will need to bring all the stakeholders together, including the 36,000 wards of about 4,000 village development committees, of 120,000 villages, across the country. Disaster management is impossible without the involvement of all. One ministry or two ministries cannot do it. Even the government alone cannot do it. Similarly, the District Development Committee or Village Development Committee cannot do it by themselves. Likewise, the Ministry of Home Affairs cannot do it alone either.\n\nWhy is that so difficult?\n\nDisasters always need we work in rush. If we miss one day, we will lose a month. We need to work in close coordination and with the technical knowledge.\n\nHow do you view the debate going on as regards the Disaster Management bill?\n\nAlthough a Disaster Management Bill is the prerequisite in dealing with disasters, it is yet to be table in the Legislature Parliament. The Ministry of Home Affairs is still holding it as the bill has economic importance. One day's delay in tabling the bill will have long term implications. It will take over 30 years if don’t work now. If we make mistakes in the bill, it will take more time.\n\nWhy are you in such a hurry?\n\nIf we start from today, it will take twenty years. If you start from tomorrow, it may take thirty years. In case of mistakes or wrong provisions in the bill, it may take even a hundred years. Even with everything in place, we cannot prevent human loss, but we can recover from the loss of property. For this, a functional disaster management act is necessary. One needs to understand this. We don’t have time to make mistakes.\n\nIt seems that you are exaggerating the scenario?\n\nI am not exaggerating anything about the severe implications and impacts of a disaster or earthquake in Kathmandu. According to a report published by the Ministry of Home Affairs, which was prepared with support from JICA,  Kathmandu is unlikely to remain as the capital of Nepal in case of a major earthquake like that of 1990 B.S. Does it mean the collapse of Singh Durbar? Or death of prime minister, king or high-level person? Or Kathmandu will fall down.\n\nAs Nepal is celebrating the Earthquake Day, how vulnerable is Kathmandu actually now?\n\nKathmandu may not be in a position to govern Nepal socially, politically and economically after a big quake. Finally, everything lies in the strength of economy and economy is everything. The quake will bring a huge economic cost. Since we are a member of UN and various UN agencies have predicted that Nepal’s economy will have to bear a heavy burden, even impossible to carry, in case of a major earthquake in Kathmandu.\n\nWhat has all this to do with vulnerabilities from quake?\n\nTokyo and California are also prone to earthquake like Kathmandu. These cities are also expecting major earthquakes. However, their damage of infrastructure and human loss is likely to be more nominal than Nepal's. In terms of loss of humans, Kathmandu will have to see much larger casualty and devastation than those cities as the settlement of Kathmandu city is unsafe. Along with human casualty, Kathmandu will see a greater economic loss.\n\nDoes disaster bring only destruction?\n\nAbsolutely no. Natural disasters also bring economic opportunities. After the 1934 great earthquake in Nepal, new roads were planned to accelerate the economic activities. When we talk about the effects, the quake will have devastating impacts and effects in the society. The destruction and devastation like collapse of buildings, bridges, deaths and injuries, short supply of drinking water and electricity are one part of the story.\n\nWhy is there such a difference?\n\nOur level of development is different from that of Japan, a highly developed and industrialized country. Nepal is a Least Developed Country. Human life in developed countries is regarded as precious. Thus, focus is always on saving life and preventing human casualty. This is not so with the developing countries.  Even a small quake and flood badly damage us and take decades for us to recover. The good example is how people are still suffering from the flood of last July. Large numbers of people are still living in huts and camps. \n\nWhere does the earthquake affect most?\n\nThe indirect cost of disaster is much higher. It would have much repercussion, but what we lack is the discussion in terms of loss and damage. Eighty percent of risk of quake lies in houses and infrastructures. However, there is no role of Ministry of Urban Development.  Ministry of Finance seems to have no interest at all whether there is a quake or not. The quake of September 2011 devastated a large area in eastern Nepal but nothing happened in the way we manage disasters. According to the Ministry of Urban Development, 30,000 houses were damaged, with desperate need for reconstruction. Have these buildings been repaired? Has anybody disseminated information regarding making the house safe? How much compensation did the people get?\n\nHow do you see the relations between finance and disaster?\n\nThe disaster has direct relations with finance not only in terms of damage but also regarding reconstruction. After any kind of disaster, there is a need to launch reconstruction activities. Kathmandu is one of the most prone to earthquake. It is estimated that over 60 percent of the houses will either be destroyed or demolished, ninety percent of the bridges will be damaged without any chances to operate vehicles. The water supply system will completely go out of order for six months. Telecommunication and electricity will be out of order for months. What will be the impact of all this? Dead bodies will be buried but what about the reconstruction. Do our economists know the disaster economy? So far as I know, nobody thinks about this.\n\nWhat do you suggest for the business community?\n\nThe businessmen should see disaster as an economic opportunity. They have to take three works. First of all industrialists and business communities should protect their families in case of major quakes. Their houses should be protective. They should know what they need to do for their own safety. Secondly, they need to work to make their own businesses and houses safe from any major quake. Thirdly, they should have the business continuity plan. The main basis of that plan is that disaster is an opportunity and they have to prepare for using this opportunity by making necessary arrangements for the coming disasters.\n\nMore on Interview\n\nThe Latest\n\nLatest Magazine\n\n\n\n", "pred_label": "__label__1", "pred_score_pos": 0.7981690764427185} {"content": "Anterior Cervical Corpectomy and Fusion\n\nAn anterior cervical corpectomy and fusion is an operative procedure to relieve pressure on the spinal cord and spinal nerves by removing the vertebral bone and inter-vertebral disc material (decompression) in the cervical spine or neck.\n\nWhat is anterior cervical corpectomy and fusion?\n\nAnterior cervical corpectomy involves removing the vertebral bone or disc material by approaching the cervical spine from the front side (anterior position) of the neck. Spinal fusion implies placing a bone graft between the two affected vertebral bodies, encouraging bone growth between the vertebrae. Spinal fusion helps in achieving adequate decompression of the neural structures. The bone graft acts as a medium for binding the two vertebral bones, and grows as a single vertebra which stabilizes the spine. It also helps to maintain the normal disc height.\n\nWho needs this surgery?\n\nDegenerative spinal conditions like herniated discs and bone spurs result in spinal nerve compression. In addition, spinal fractures, infection or tumours may also put pressure on the spinal nerve structures. Nerve compression in the neck region (cervical spine) can cause neck pain and/or pain, weakness or numbness that radiates down to the arms. Your surgeon recommends you for anterior cervical corpectomy and fusion surgery after examining your spine, medical history, and imaging results of cervical vertebrae by an X-ray, CT (computed tomography) scan or MRI (magnetic resonance imaging). Surgery is recommended only after non-surgical treatment approaches fail. Before recommending surgery, your surgeon considers several factors such as your health condition, age, lifestyle and anticipated level of activity following surgery. A thorough discussion with your surgeon regarding this treatment option is advised before scheduling the surgery.\n\nHow is the procedure performed?\n\nYour surgeon makes a small incision at the front of your neck to the side and locates the source of neural compression. Then, the vertebral body or inter-vertebral disc that is compressing the nerve root will be removed to relieve the compression. Afterwards, a bone graft will be placed at the site of the decompression. In addition, instruments such as plates and screws are used to provide additional support and stability and to ease healing and fusion of the vertebrae.\n\nHow much time will it take for complete recovery?\n\nA specific post-operative recovery/exercise plan will be designed by your physician to help you return to normal activity at the earliest possible. After surgery, your symptoms may improve immediately or gradually over the course of time. The duration of hospital stay depends on this treatment plan. You will be able to wake up and walk by the end of the first day after the surgery. You should be able to resume your work within 3-6 weeks, depending on your body’s healing status and the type of work/activity that you plan to resume. Discuss with your spinal surgeon and follow his/her instructions for optimized healing and appropriate recovery after the procedure.\n\nWhat are the possible risks or complications?\n\n\nPlease take your physician’s advice for a complete list of indications, clinical results, adverse effects, warnings and precautions, and other relevant medical information about the anterior cervical discectomy with fusion surgery.\n\n • Ashford and St Peter’s Hospital\n\n\n Ashford and St Peter’s\n NHS Foundation Trust\n Guildford Road, Cherstey,\n Surrey, KY16 0PZ.\n Ph: 01932 722 730\n • The BMI Runnymede Hospital\n\n\n The BMI\n Runnymede Hospital\n Guildford Road,\n Ottershaw, CHERTSEY,\n KT16 0RQ.\n Ph: 01932 877800\n • Spire St Anthony’s Hospital\n\n\n Spire St Anthony’s\n 801 London Road,\n SM3 9DW.\n Ph: 020 8337 6691\n • Nuffield Health Woking Hospital\n\n\n Nuffield Health\n Woking Hospital\n Shores Road,\n GU21 4BY.\n Ph: 01483 331257\n • Ramsay Health Ashtead Hospital\n\n\n Ramsay Health\n Ashtead Hospital\n The Warren,\n Ashtead, Surrey.\n KT21 2SB.\n Ph: 01372 221400", "pred_label": "__label__1", "pred_score_pos": 0.6437032222747803} {"content": "Universität Erfurt\n\nModel United Nations Universität Erfurt\n\nWhat is MUN?\n\nModel United Nations (MUN) conferences are academic simulations of the United Nations. Students take on the roles of diplomats and simulate the work of the United Nations and its various committees. \n\nAt national and international MUN conferences participants from all throughout the world discuss challenging and educational topics, negotiate and finally write resolutions.\n\nMUN conferences are based upon the diplomatic work ethic and procedure of the United Nations and the UN Charter. Conferences are generally held in English. \n\nParticipating in MUN conferences enables students to broaden their understanding of the United Nations system and its intercultural dialogue. Furthermore it allows them to experience complex processes of international politics and provides training in research, rhetorics, negotiation and language skills. \n\nWorldwide there are more than 400 MUN conferences. The largest and most well-known simulation for students is the yearly National Model United Nations conference (NMUN) in New York City.\n\nStudents at the University Erfurt can take the seminar as part of their classes for Studium Fundamentale. Additionally, they will participate in the yearly EfMUN conference, which is hosted by Akademische Simulation Erfurt e.V.\n\n\n\n\n\nNutzermenü und Sprachwahl", "pred_label": "__label__1", "pred_score_pos": 0.9453474879264832} {"content": "An argument in favor of the existence of bigfoot\n\nBut the truth is new bigfoot videos are surfacing everyday on Youtube and other video sites. This is why they are so hard to spot, let alone catch. Just a single strand of hair would provide conclusive DNA evidence that a previously unidentified species was alive on the planet.\n\nIn addition, dome like structures have been found, where branches appear to have been weaved around a bent tree, the bent tree being secured to the ground by a large rock in some cases. Sightings have been reported for around a hundred years.\n\nTwenty Arguments For The Existence Of God\n\nBut here's the catch They say that most bigfoot sightings are hoaxs or simple misidentifications of other things like bears, stumps, or snow covered trees. The fact of the matter is, there are a LOT of hoaxes out there re: Lastly, there are historical records of giant skeletons having been found all across America.\n\nThe Humboldt Times ran a story about the discovery and called the creature, Bigfoot. Many sightings have taken place in broad daylight with a clear view and, they are highly consistent. While many of these occurred due to natural means such as high winds, storms etc, Many believe that the complex and unusual formations of some damaged trees could only have been created with a pair of hands.\n\nSince eyewitness testimony is used in a court of law to convict someone of a crime this is powerful evidence. In some situations, e. Of all the arguments against Bigfoot, this one is the most damning.\n\nSince all attempts to prove Bigfoot from a zoological perspective have panned out, perhaps the last desperate cry is to link Bigfoot to the supernatural realms. There is some redundancy on the list, and some problems here and there with reasoning, but all in all, I think Radford has a pretty reasonable list here.\n\nConservation needs are impossible to assess without the ability to recognise and differentiate species. Radford contends that, in order to account for the large number of sightings, a large number of Bigfoot are required. We don't even have fossil records. They may have crossed into North America across the Bering land bridge just like we did long time ago.\n\nThe mountain gorilla was not discovered until The Washington Post and New York Times published dozens upon dozens of articles pertaining to unusual and giant skeletons having been found during the 19th and 20th centuries.\n\nHis very existence for thousands of years would have created an environmental footprint that couldn't be concealed, but he's largely invisible.\n\nIf Bigfoot is a herbivore, samples of that activity should be apparent. Perhaps a better question is how far should we stretch the borders of rational thinking before we are willing to acknowledge that such postulations are absurd? Nonbelievers also point out inconsistencies in the stories of the two men that shot the Patterson Gimlin film as reason to believe it was a hoax, and they say the film was simply a money making scam.\n\nNone have ever been found. Yet despite all of this, scientists claim to never have found a bigfoot skeleton proving their existence.\n\nRadford's primary point here is that there ain't no bigfoot-esque fossils to be found, ergo, no Bigfoot.\n\nBigfoot, Real or Fantasy? My Argument For The Existence Of Bigfoot\n\nMost evidence can be explained by mistakes and hoaxes. From that point on the descriptions usually matched the depiction of the creature seen in the film. According to many analysts the creature shown in the Patterson Gimlin film walks far too quickly to be a man, and appears too heavy and muscular to be human as well.\n\nIt is important to note that some counties prohibit killing of a Sasquatch. An additional problem and one that the bigfoot buffs out there probably thought of immediately is that A not knowing the exact phylogenetic position of \"Bigfoot\" makes it difficult to identify ancestors, and B if it is a hominid or hominoid, or whateverthen we may have some fossilized ancestors in the form of Old World fossils, and the taphonomic effect may explain their absence in the record.\n\nThere are many species for which these are not valid alternatives. The group has been under fire recently for the sasquatch shooting incident in Honobia, OK. All of these share one common trait, DNA.\n\nIs Bigfoot real or not ?\n\nYou can love us or you can hate us, but we aren't here to placate science any more than we are to placate the so-called bigfoot \"community\" who are dead set against the taking of a type specimen for irrational reasons.\n\nNow perhaps Bigfoot is just smarter than the average bear or telepathic and hides better than most animals -- maybe he's even learned to bury his dead, which might partly explain the lack of physical evidence. The authenticity of the footage has been hotly debated and arguments in favor and against have not stalled the intense scrutiny and excitement the film first generated when it was released to the public in Is Big Foot real?\n\n\n68% Say Yes 32% Say No I Saw Bigfoot So my argument believes he is and I am not going to change my mind, because I believe he is real. Report Post. Like Reply. 0. 1. Bigfoot is just another type of mammal and is % real! Bigfoot is just another type of mammal and is not dangerous and will kill you like they say.\n\nThey have also believed that an effective rational argument for God's existence is an important first step in opening the mind to the possibility of faith—in clearing some of the roadblocks and rubble that prevent people from taking.\n\nJan 01,  · Well I AM saying bigfoot exists. Great. Let's see the evidence. Remember scientists didn't have concrete evidence dark matter existed until It was once thought the Earth was flat, therefore Bigfoot exists. Poor logic. Poor argument. Bigfoot or Sasquatch, large apelike creature reportedly sighted hundreds of times in the United States and Canada (most often in the Pacific Northwest) since the midth cent.\n\nArguments for the existence of Bigfoot - definition of Arguments for the existence of Bigfoot by The Free Dictionary.\n\nArguments for the existance of bigfoot synonyms, Arguments for the existance of bigfoot antonyms -\n\nAn argument in favor of the existence of bigfoot\nRated 5/5 based on 93 review", "pred_label": "__label__1", "pred_score_pos": 0.5189874768257141} {"content": "Photo courtesy NASA/STScI\nCredit: Greg Bacon\n\nArtist's concept of planet-orbiting star 79 Ceti\n\nAre we alone in the universe, or does life exist elsewhere? We have begun to search for extraterrestrial intelligence (SETI) by looking for radio transmissions from other civilizations. An important aspect of SETI is deciding where to look for these radio transmissions -- after all, the universe is an awfully big place. To refine the SETI searches, it is helpful to know which stars have planets orbiting them.\n\nUntil 1991, our sun was the only star known to have planets around it. This changed when astronomer Alex Wolszczan discovered two planets orbiting a pulsar in the constellation Virgo. Since his discovery, there have been over 50 planets found in orbit around other stars -- these orbiting bodies are called extrasolar planets.\n\nIn this edition of HowStuffWorks, we'll find out what planets are, how they are formed, how we search for extrasolar planets (and what we've found so far) and about the new methods being developed for planet hunting.", "pred_label": "__label__1", "pred_score_pos": 0.7224792242050171} {"content": "Information: Nature, importance and functions\n\nSatija, M P\n\n\nInformation is all around us and next to matter and energy it is the most important and common entity in this world. It moves the world. Being a much over used term it is least understood and there is no consensual definition of it. But its properties are numerous and well recognized. It keeps moving a system be it bio, astro, social or mechanical. For an animal it is the product of being conscious. It is formed through sense perception in the brain but needs a physical media for its recording and communication. It is recorded as graphic visuals or electrical pulses or electromagnetic waves both in audio and visual forms. The article enumerates its various physical, economic, political and social properties and functions. Information has become a great and inexhaustible resource in national development. To live effectively is to live with authentic and adequate information. But it needs knowledge for its effective application. Without knowledge, information may be all heat and smoke without any light. The article emphasises that information literacy is instrumental in empowering citizens in this complex and sophisticated social world.\n\n\nData; Information; Information literacy; Knowledge; Properties of information; Sense perception\n\nFull Text: PDF (downloaded 3824 times)\nThis abstract viewed 2272 times\n\nPrincipal contact:, Technical support contact: &", "pred_label": "__label__1", "pred_score_pos": 0.9312673807144165} {"content": "Charlotte Watts\n\n\nCharlotte Watts - Yoga for De-Stress and Relaxation\n\nI am a Senior Yoga Teacher with Yoga Alliance UK, practising since 1997, teaching since 2007 and trained with the Vajrasati School of Yoga (RYT500) in Brighton. I teach with an emphasis on mindfulness so depth and strength can be fostered within yoga practice as your body needs -  helping release stress, not adding to it..\n\n\n\nI have continued to explore this essence of finding our authentic selves through yoga, with further training with teachers including Judith Lasater, Donna Farhi and Tias Little and Mindfulness and Yoga training with Cathy-Mae Karelse.\n\nAs a Nutritional Therapist and Yoga Teacher in Brighton and London, I specialise in stress-related issues such as anxiety, insomnia, fatigue, depression and burnout. This has culminated in my latest book The De-Stress Effect (Hay House 2015).\n\nYoga’s focus on calming the nervous system, attuning to our mind-body needs and dropping beneath brain chatter perfectly complements my nutritional therapy work, especially with an emphasis on mindfulness within both.\n\nIn this way I can work with clients in well-rounded and truly holistic mind-body health programmes.\n\n\n\nWhy is this yoga more ‘De-Stressing’ than others?\n\nIt’s a known fact that a regular yoga practice helps relieve stress, so why on earth is this class specifically given the title ‘De-Stress’ you might well ask….. Well, it follows my years of research and teaching, both as a yoga teacher and a nutritional therapist, specialising in all things stress-related. Where we might tend to follow the habits of doing, striving and achieving in life, rather than take this into a forceful yoga practice, instead we have the opportunity to really pay attention to this behavioural conditionings and drop beneath; to listen and respond to what we need.\n\n\"The breath leads, the body follows and the mind observes”\n\n\n\nYoga is connection; not the shapes we make or the flexibility we might want, but awareness created and in the first of the Yoga Sutras, ‘stilling the mind’. A physical yoga practice can help us do that, providing a focus for our restless minds and helping us to stay with strong sensations with our breath as a guide.\n\n\nWhat actually happens in a class?\n\nSessions on retreats can vary in tone, energy and emphasis, depending on the time of day and the needs of the group. We always start by arriving and connecting with the breath though. From there we can then start mindfully loosening the body, usually either lying or sitting.  \n\nIn a morning class, we can then use this to move into a stronger asana (posture) practice to open up tight upper spines, compressed front bodies, tight thighs, hamstrings and psoas muscles so common in the modern body. This will be wherever we need to safely and effectively encourage postural conditions and habits as our bodies are designed but may not always achieve.\n\nIn the afternoon, we will move into a more grounding and relaxing practice – this may be somatic, restorative or yin, but usually melding elements of each to balance movement and stillness, opening and recovery.\n\nIn all sessions, we lead back down to a restorative and relaxing practice at the end; to assimilate energy we have created, fully release any stress moved out and to prepare us to take this attitude of non-reaction into our daily lives\n\n\nSee     for more info\n\n\n", "pred_label": "__label__1", "pred_score_pos": 0.933019757270813} {"content": "Business and Management Ia\n\n Business and Management Ia Essay\n\nBusiness and management (HL) IA\n\nDiscourse on:\n\nWill certainly STEADY Company increase their market share in Chinese language real estate market?\n\nCandidate name: Talia Chen\n\n\n|Page: 1 . | Title | | 2 . | Content | | a few: | Intro | | 4-7: | Procedure and method | | | | |8: |Result and conclusion | |9-12: |Appendix and Research\n\n\nSTEADY Business is a business that generally invests real estate projects. The estate marketplace in China is super competitive so that the business of STEADY Company is getting smaller and smaller. Hence the main analysis topic should be to find out if STEADY Business can increase their market share. To resolve this problem, I would like to start with researching the market and find out the actual problem of their company. So I did a lot of primary exploration and supplementary research on the web and from the interview. To focus on this statement, you will discover three aspects that can be discussed and evaluate. STEADY organization is a tiny estate organization which contain a basically small piece of Chinese market share. It was established in June 1996, used to have a name named YASHI Business, in Sept. 2004 altered name to STEADY. Essentially, their occupation is fund to the house and build residential buildings then provides them. Till now, the business is formed being a private limited company with three investors, the whole fund is over 35 billion RMB; Distribute to many cities just like Shenzhen, Zhuhai, Suzhou, Huhehot, Taiyuan and Beijing. In 2004, CONSTANT Company accomplished top 100-estate company that evaluated by the State Authorities and Qinghai University's Property Economic Study Institute. At the same time, the company begin many jobs, Fundamentally acquired by middle category people and usually receive 2 times profits. The first one is the industry’s promotion. Through the interview, I realize that the 1st idea of these to improve the business of the organization is promo. So I utilize promotional mixture and know-how about marketing strategies to evaluate the property to use advertisement being a method to maximize market share. After that is the item. The houses that STEADY Firm sold have some benefits and drawbacks than other company's products. Due to these dissimilarities and their diversity, I use Boston Matrix to gain access to the quality and variety of their merchandise. Also SWOT analysis will help you to ensure the organization ‘strength and weakness. Even greater, the market is usually a very important aspect that can cause the death or success of the business. The estate market is incredibly complicate. So the PEST research is suitable to clear about the external environment give what opportunities and threats for the business. The shareholder marriage also is a large problem. The corporation consists of three main shareholders; they all include part of industry’s stock. A lot of times they still control the company. They often fight against each other. Hence the relationship is usually not so good. A shareholder research will help to share this situation and find the reason.\n\nTechniques and method\n\nPromotional mix\n\nThe promotional mix can be \" the set of tools that the business may use to connect effectively the advantages of its products or services to its consumers. ”[1] • Above the range\n\nIn the category, most significant one is marketing, which is you’re able to send strategy. Different types of advertising will cost different amount of cash and have unstable effects. We can see the graph and or chart 1 in the Appendix. The...\n\n Yoga Dissertation\n\nYoga Dissertation\n\n\n lack of values in today’s contemporary society Essay\n\nlack of values in today’s contemporary society Essay\n\nп»їIn the last years, we have been facing the lack of ideals in the world and in relationships. We consider as \" value \" the degree of importance, significance or…...", "pred_label": "__label__1", "pred_score_pos": 0.9300264120101929} {"content": "Canada’s Environmental Charities Audited for Advocacy\n\nCanada’s Environmental Charities Audited for Advocacy\n\n\nEnvironmental Charity Analyst Canada’s Environmental Charities Audited for Advocacy\n\nAccording to recent media reports, the Canada Revenue Agency has been auditing several Canadian environmental charities. The focus of these audits is apparently on advocacy activities.\n\nWhat is advocacy and why can it be a problem? There is no reason why charities should not work to promote causes that their donors believe are important. However, Canada’s tax laws prohibit charities from spending more than 10% of their “total resources” on “political activities”.\n\nSome of us might think that this policy simply means that charities aren’t supposed to spend large amounts of money promoting a political party. But in fact the definition of “political activity” is much broader. According to the Income Tax Act, if a charity recommends “to retain, oppose, or change” any “law, policy, or decision of any level of government in Canada or a foreign country” that will be considered a political activity. So, for example, if an environmental charity publishes a recommendation that the government should do more to protect the habitat of the woodland caribou, that can be considered a “political activity”. Similarly, a recommendation to the City of Toronto to increase the number of homeless shelters could be considered a “political activity”.\n\nOf the face of it, it may seem unreasonable that any public action by a charity in favour or against any government policy is “political”. Nonetheless, this is how the legislation is worded.\n\nDonors to Canadian environmental charities should have no concerns about giving to charities they support, provided that the charity keeps its CRA registration in good standing. Charity Intelligence’s recent comprehensive report on Environmental Charities identifies those charities that include advocacy as a significant portion of their activities. Donors might want to discuss this issue with charity management if they have concerns about the CRA actions.\n\nThe forthcoming Federal Budget may include further restrictions on activities by Canadian charities. Charity Intelligence will be following these issues closely and will provide an update following release of the Budget if required.\n\n\n\n\nLegal disclaimer:\n\n\n\nPrint   Email", "pred_label": "__label__1", "pred_score_pos": 0.7556243538856506} {"content": "Neat Little Golf Tricks That Are Simple To Learn\n\n57e6d4424255ae14f6da8c7dda793278143fdef852547740762a7bd79348 640 - Neat Little Golf Tricks That Are Simple To Learn\n\nSome sports out there prove that you can be active while experiencing simultaneous relaxation. Golf allows you to enjoy life while actively participating in a sport. However, doing it the wrong way will cause you a lot of trouble. Use the advice in this article to add some game to your swing.\n\n\nPracticing with slightly different stances will help you learn the best way to stand. The key is proper stance, but it isn’t the same for everyone. Taking the time to perfect your stance will greatly lower your average score.\n\n\nWhen golfing, sometimes it’s better to walk, rather than getting a golf cart. Walking the course will also help you become more familiar with the grounds and help you with your shots. The constant movement of walking while golfing will keep your muscles warm.\n\n\nThe beginning golfer needs to learn the right way to grip a club. New golfers often mistakenly grip the club tightly in hopes they will be able to hit the ball harder. You should instead grip the club soft and firm. Hold your club as if it were a bird.\n\n\n\nWhere possible, include strong players in your golf group so you can learn from their superior technique. You will definitely benefit from watching a better player. You don’t have to be in the presence of a pro. Anyone who is better than you can help. If you focus on the methods that they use, you’ll be able to develop new strategies, and they may encourage you to put more effort into your game.\n\nWhere possible, include strong players in your golf group so you can learn from their superior technique. There are plenty of ways that you can benefit from a talented golfer. Any golfer who’s more skilled than you can help you. A golfer at a professional level isn’t required. Focus on how they play, it can give you some new ideas. Also, just being around them may help you to have a better game.\n\n\n\nTo generate a truly powerful swing, your entire body needs to be involved, especially your legs and torso. Swing your body like a whip when you swing and get power from your lower body.\n\nIf you want to eat while on the course, try a light snack that is packed with proteins, such as nuts. Golf can make one both mentally and physically tired. The high protein and calorie content of your snack will help you sustain your level of mental energy and physical endurance, enabling you to finish the entire course.\n\nMental preparation is as, if not more important, than physical preparation when playing a round of golf. Clear your mind and concentrate on the game.\n\nDevelop a good position to improve your overall skills. The position you have usually dictates the distance your golf ball travels. If your slouch goes too far or even not far enough, then your ball isn’t going to get a lot of distance from your shot.\n\nSee to it that you’re holding the golf club the right way before your swing. Place the handle on your palms, and point your thumbs down. Both your hands should have contact with one another. Make sure you are choking up on your club if you desire to hit your ball longer distances.\n\nPrior to buying a golf club, consider getting one custom-fitted to your specifications. No two golfers are exactly alike, so it naturally follows that no single club works equally well for all golfers. Getting the right club for your body will help your swing.\n\nKeeping the ball in same position regardless of the shot type is important. This helps establish consistency for each shot. For added loft, drag your trailing foot forward while maintaining the position of the ball. By following this tip, you have a better opportunity to utilize the right club for any shot.\n\nWorn Spot\n\nWhen swinging the golf club, quickly move your hips. This will enable you to easily shift your weight between your front foot and your back foot. Hip swing, a move where your weight is shifted from your back foot to your front foot, is a critical determinant in your golf swing.\n\nCheck the club head – before you buy a used golf club! If a club has been overused, you can tell by the shiny, worn spot on the head. This worn spot is not good for your shot, as the head of the club does not connect with the ball correctly.\n\nFashion a workaround instead of constantly trying to overcome this perpetual stumbling block in your way. Eventually it may become something you can use to your advantage, adding to your unique playing style.\n\nBe sure that you behind the golf ball at a distance of about four feet. At the same time, you should be viewing the location where you want the ball to end up. During this time, take into account how you will need to adjust your shot based on the wind and any other relevant factors. Taking just a few minutes thinking about the shot will help you properly align the ball. Then, when you stand over the ball for your shot, you can more effectively direct the ball to where you want it to go.\n\nIf you are a beginner at golf, pay attention to the tee height. The height of your tee is very important to how you drive the ball. A tee too high or too low will result in inefficient, short, off-kilter drives. Focus on how you naturally hold and swing the club. The tee should hold the ball near the center of the club face on a natural swing.\n\n\nDon’t tense up when you are swinging. A lot of golfers are doing this, and it will not be good for your golf game. It is vital to be relaxed and not rigid if you want to hit accurately and powerfully. Pay attention to how stiff you are, and find a way to relax.\n\nThe great thing about golf is that you can learn to improve your game. The most basic requirement is that qualities such as the correct swing and good mental focus are necessary in playing golf the right way. Put the information you’ve received here into practice to better your game, and have fun while doing it!\n\nPurchase your golf shoes a size large to allow for the fact that your feet will probably expand during a day of hard walking outdoors. If you buy golf shoes that fit you perfectly in the store, you may be very sorry and very uncomfortable by the end of your golf game!", "pred_label": "__label__1", "pred_score_pos": 0.8744302988052368} {"content": "Human Resources Coordinator\n\nMIFA’s mission: Supporting the independence of vulnerable seniors and families in crisis through high-impact programs. Our vision: Uniting the community through service. Our values are to welcome and respect all people, act with integrity, value individual initiative and ability, serve individuals and the community as an act of faith, and balance humanitarian goals with sound business practices.\n\nJob title: Human Resources Coordinator           \n\nReports to VP human resources; full-time, exempt, starting rate $16.50/hour\n\nClosing date: March 20, 2015\n\nTo apply, mail resume and cover letter to MIFA Human Resources, 910 Vance Ave, Memphis, TN  38126 or email to No phone calls, please.\n\nPosition summary\n\nTo coordinate all aspects of the day-to-day operations of human resources through the use of excellent organizational skills and judgment, as well as technical knowledge. Coordinator will serve as key facilitator for all company trainings and development opportunities.\n\n\n 1. Bachelor’s degree in education, liberal arts, or business administration. Other combinations of education and experience may be considered.\n 2. PHR,  SPHR, or related certification in the area of human resources strongly preferred with secondary qualifications in HR, training and development, or business studies\n 3. Two years’ experience in a corporate or business setting, preferably in human resources\n 4. Working knowledge of Fair Labor Standards Act, FMLA, ADA, and employment law processing\n 5. Good people and organizational skills in dealing with inquiries, special requests, and complaints, with the ability to problem-solve effectively in person and over the phone\n 6. Good presentation and written communication skills, including the ability to articulate policies and procedures, organizational concepts, and direct small groups\n 7. Ability to welcome and respect people of diverse ages, groups, and cultural backgrounds\n 8. Ability to complete duties on schedule with little or no supervision and very strong attention to detail\n 9. Proficiency at communication systems (computer, email, laptop, fax, scanner, and presentation equipment), Microsoft Office, and various database systems\n 10. Act with integrity and manage confidential information discreetly\n\n\nMajor responsibilities and related tasks\n\nManage timely compliance of all training and development opportunities, performance reviews, and trial evaluations.\n\n 1. Coordinate and source ongoing annual trainings for MIFA staff\n 2. Coordinate timely facilitation of 90-day onboarding trial reviews  and benefit orientations\n 3. Manage compliance, and support the training and completions of MIFA’s annual performance review process\n 4. Coordinate trainings for local, state and federal grant compliance\n 5. Monitor programs and individualized request for specific training requirements\n 6. Manage MIFA’s hiring process by facilitating the interview selection form process, judging appropriate recruitment methods, responding promptly to applicants, and effectively screening and disseminating applications.\n 1. Complete and maintain appropriate paperwork  and reports (i.e. response correspondence, offer letters, employments letters, background checks, and status forms)\n 2. Monitor for compliance and coordinate new employee orientations and trial reviews.\n 3. Manage exit process by coordinating exit interviews, separation notices, and COBRA processing\n\n\nPromote and engage monthly employee relations activities.\n\n 1. Manage timely monthly nominations for the Richard Reinhart All-Star recognition program by notifying winners and monitoring effectiveness\n 2. Coordinate, assess, and lead annual and ongoing employee relations activities with the Fun at Work committee\n 3. Lead the coordination of monthly birthday notices, retirement celebrations, and quarterly gatherings\n 4. Maintain a cooperative relationship with staff\n\n\nOther responsibilities\n\n 1. Manage the FMLA/LWOP/Workman’s Comp process, ensuring employees appropriately exit, respond, and reenter the system.\n 2. Serve as benefit liaison by facilitating the enrollment of employees in insurance programs and assisting employees in obtaining accurate information about their fringe benefits.\n 3. Oversee employee records in compliance with funding sources and ensure appropriate staff files are audit–compliant.\n 4. Assist VP of Human Resources in all areas of administration.\n 5. Coordinate billing processes and manage the HR employment schedule\n\nSupervisory responsibilities\n\nDirect/oversee and coordinate available temporary Meritan staff, interns, or volunteers as needed.\n\nPhysical demands and work environment\n\n\n\n\nMIFA full-time benefits: MIFA employees may be eligible to participate in the following benefits programs on or before the 90-day trial period:  Medical and dental insurance plans, short-term disability, long-term disability, employee assistance program, paid time-off (PTO), employer sponsored life insurance, paid holidays, and MIFA’s matching 401k plan after a year of service.\n\nMIFA employment guidelines\n\nMIFA is an equal opportunity employer.\n\nMIFA is a non-smoking facility.\n\nEmployment documents: (1) Application and/or resume; (2) I-9; (3) Form W-4; (4) Official transcripts verifying education if education is a requirement of the job.\n\n", "pred_label": "__label__1", "pred_score_pos": 0.9750059247016907} {"content": "The science of colors and the colors of science\n\nAllan Lasser\n\nCo-founder and CTO, Massive Science\n\nI was delighted to learn about Werner's Nomenclature of Colours, a fascinating intersection of art and science. It's a book, first published in 1814, that orders, classifies, and names 110 colors and provides examples of where they can be found in the natural world.\n\nThe Public Domain Review shares a short history of origins of the book:\n\nThe book is based on the work of the German geologist Abraham Gottlob Werner who, in his 1774 book Treatise on the External Characters of Fossils (translated into English in 1805), developed a nomenclature of colors so as to offer a standard with which to describe the visual characteristics of minerals. Clearly taken by the idea, some three decades later the Scottish painter of flowers Patrick Syme amended and extended Werner’s system. In addition to the mineral referent, for each of Werner’s colors Syme added an example from the animal and vegetable kingdom, as well as providing an actual patch of color on the page to accompany the words. While Werner found a suite of 79 tints enough for his geological purpose, now opened up to other realms of nature, Syme added 31 extra colors to bring the total to 110.\n\nI love how this book dances back and forth between science and art. At the same time that it's trying to order and classify colors in a rigorous way, it's also making subjective associations between those colors and the natural world. I think it also tells a larger story about the close relationship between science and art, and how our ordered scientific knowledge emerges out of our subjective observations.\n\nYou can see the entire original book on the Internet Archive, or purchase a copy of the book for yourself from the Smithsonian.\n\n\nNew gadgets are fun. They're also abysmally destructive\n\nCassie Freund\n\n\nWake Forest University\n\n\n\n\n\nThe environmental impact of illegal gold mining in the Amazon\n\nPlanet Labs, Inc. / Wikimedia\n\n\nI know I am.\n\nWin a chemistry-themed board game from Genius Games\n\n\nAllan Lasser\n\nCo-founder and CTO, Massive Science\n\n\n\n\n\n\nNikita Nandakumar T\n\nChemical Engineering\n\nSyracuse University\n\n\n\n\n\n\n\nSarah Anderson\n\n\nNorthwestern University\n\n\n\n\nHow did our ancestors start walking upright?\n\n\nDarcy Shapiro\n\nEvolutionary Anthropology\n\nRutgers University\n\n\n\nHuman ape skeletons\n\nGary Todd\n\n\n\n\nUsing the old-fashioned blueprint chemical process for modern art\n\n\nSarah Anderson\n\n\nNorthwestern University\n\n\nA cyanotype of algae done by Anna Atkins.\n\n\nNew York Public Library\n\n\n\nResearchers optimized a reaction involving DEAD to reduce chemical waste\n\n\nTeresa Ambrosio\n\n\nUniversity of Nottingham\n\n\n\n\n\n\n\nAnd they are predicted to get worse as the dry weather persists\n\nOlivia Box\n\nNatural Resources and Forest Ecology\n\nUniversity of Vermont\n\n\n\nA tracker is keeping tabs on the Trump administration's assault on science\n\nThe Silencing Science Tracker has been compiling records since 2018\n\n\n\n\n\n\n\n\nScience articles written by scientists perform as well as those written by journalists\n\nScientists are helping to fill a critical void and bringing unique perspectives to science communication\n\nAmy R Nippert\n\n\nUniversity of Minnesota\n\nCan scientists fill the void in science journalism? A new study posted on bioRxiv asked this exact question, and found that in terms of article engagement, scientists and journalists engage audiences at roughly equivalent rates. The researchers, led by PhD student Yael Baren-Ben David from the Technion-Israel Institute of Technology, looked at views, clicks, comments and time spent on the page as metrics of engagement, and compared equivalent articles written by scientists and professional journalists. For the two major Israeli online news sites that they studied, the audiences literally and figuratively “liked”  articles equivalently no matter who wrote them. \n\nAs the number of professional science journalists has declined, scientists have fulfilled the important task of communicating science to the public. As a scientist writing for Massive, it’s reassuring to me to see data confirming that scientists can write in a way that engages the general public, and that the public responds positively. \n\nThe study authors note that while scientists can inform and share science news, they are not independent outsiders and have other limitations on their time and knowledge. Increasing the number of scientists writing articles may accelerate the decline of science journalists, and increase reliance on unpaid, outside sources. Despite these caveats, scientists can still play an important role in science communication. It only benefits society to hear their unique points of view.\n\nSnails are turning yellow to adapt to climate change\n\nScience-loving citizens helped researchers look at how urban environments affect snails\n\nSruthi Sanjeev Balakrishnan\n\nCell Biology\n\nNational Centre for Biological Sciences\n\nSimply owning a smartphone takes you one step closer to becoming a scientist. They're sometimes the instrument of choice for evolutionary biologists. By submitting pictures of snails through an app, science-loving citizens helped researchers look at how urban environments affect snails.\n\nHuman activity makes cities warmer than their surroundings. Snails are sensitive to such temperature changes, so having paler shells keeps them cool by reflecting sunlight. The snails studied here, Cepaea nemoralis i.e. a grove snail, can have pink, yellow or brown shells, with up to five dark stripes on them. They are also found both in cities and forests. If shell patterns are actually adaptations to different temperatures, are there more light-patterned snails in cities?\n\nGrove snail - yellow outer shell - bark, tree, nature\n\n The grove snail or brown-lipped snail (Cepaea nemoralis) on a branch.\n\nBy Mad Max \n\nMenno Schilthuizen’s research group at Leiden University tried to answer this question by studying snail pictures from across the Netherlands. Schilthuizen’s lab built an app  — SnailSnap  — that could be downloaded by anyone with a smartphone. The app had instructions on the kind of snails to take pictures of, which were uploaded to a server and analyzed by an algorithm.\n\nThe algorithm classified pictures in three ways: shell color, number of stripes, and environment. After sorting through nearly 8,000 images, it showed that yellow shells were more common in urban areas. This made sense as yellow reflects more sunlight than other colors. \n\nStrangely, it was not snails with the least number of stripes, but ones with an intermediate number that were more populous in cities. This observation directly clashed with the “lighter is better” notion, as stripes are dark bands and having them reduces the shell’s capacity to reflect light. The researchers think they may have stumbled upon a novel way of regulating temperatures, where the snails use a combination of light and dark patterns to adjust heat radiation. \n\nThe scientists now plan to expand their project and analyze feather patterns in urban birds, once again enlisting the help of citizens in research. So next time you snap a picture of a pigeon, consider turning it in to these Dutch scientists.\n\nWe need to talk about our current global antimicrobial resistance crisis — in a more effective manner\n\nAntimicrobial resistance has been declared a global health threat, but we're running into barriers when it comes to communication\n\nLuyi Cheng\n\nMolecular Biology and Structural Biology\n\nNorthwestern University\n\nAntimicrobial resistance has been declared a global health threat by the World Health Organization and a quick Google search can easily lead you to many other reports and awareness efforts. These resources, in addition to explaining the current issue of antimicrobial resistance, also detail methods to manage and prevent the further spread of drug-resistant microorganisms. But all of this evidence will remain hidden — unless we effectively communicate the contents of these reports to achieve widespread public understanding and support.\n\nRecently, to fill this gap, the Wellcome Trust released a report on how to communicate about antimicrobial resistance.\n\nThe report first summarizes current barriers to successful communication. These barriers include how we use multiple terms for antimicrobial resistance (for example antimicrobial versus antibiotic), which doesn’t help to connect different messages into one unifying issue. Media coverage often focuses on specific outbreaks, which also makes it hard for audiences to connect broad causes to resulting events.\n\nIn response, the report recommends five principles for effectively communicating about microbial resistance, based on desk research, media analysis, interviews, and public message testing. One suggestion is to frame antimicrobial medicine as undermining all of modern medicine and negatively affecting treatment across several diseases, rather than treating it as a singular health issue, like tuberculosis or MRSA. Additionally, using ‘apocalyptic’ messaging can lack credibility and lead to skepticism with audiences. Instead, the report suggests showing that antimicrobial resistance is not only an issue we are facing in the upcoming future but as an everyday issue in our lives right now. Usng this messaging encourages immediate action.\n\nTo me, this report is valuable for addressing the particular global issue of antimicrobial resistance and also more. It is part of a growing body evidence-backed resources for communicating current scientific issues that is incredibly valuable for bridging gaps in sharing knowledge in our communities. \n\nCatch Mercury crossing in front of the Sun, or wait 'til 2032 for your next chance\n\nFrom about 7:35AM to 1PM EST, a tiny dot will chug across the Sun\n\nEvery year there are special astronomical events. This one only happens a handful of times a century. A tiny, tiny, small, smol dot, the planet Mercury, will transit across the Sun the morning of November 11th, like an eclipse in miniature. Look up (with proper eye protection), or wait until 2032 for your next chance to see it. The picture above is of the last transit in 2016 (here's a fun, dramatically-scored video of it, just for fun). \n\nCheck out more info from NASA Jet Propulsion Lab here.\n\nBy tracking star \"pollution,\" scientists have found exoplanets similar to Earth's structure\n\nUsing oxygen pressure as a measure, scientists examined the structural properties of white dwarfs\n\nRebecca Dzombak\n\n\nUniversity of Michigan\n\nHumans have been wondering whether we truly are alone in the universe for millennia. Part of our quest to understand our place has involved searching for other planets like Earth in the Solar System and beyond — but that's much easier said than done. Space, as it turns out, is big, and other planets are far, far away. Studying them in detail, then, is tricky.\n\nA new study in Science gets around this roadblock by studying white dwarfs, which are not an obscure fantasy reference but are actually the remnants of low and medium mass stars. By studying the \"pollution\" in these white dwarfs, which occurs when rocky bodies crash into the stars earlier in their lives, Doyle and colleagues were able to estimate the rocks' geochemical and geophysical properties — specifically, what was are they made of and what their structures involve.\n\nTo estimate these properties, Doyle and colleagues relied on a key geochemical indicator: oxygen fugacity, which is a measure of the partial pressure of oxygen in rocks as they form. They measured six elements as oxides, including magnesium, silicon, aluminium, calcium and iron. As these oxides must have been in thermodynamic equilibrium with oxygen during formation, their abundances can be used to estimate an overall oxidation state. That estimate can then be linked to atmospheric composition, the geochemistry of its crust and mantle, and even the size of its core.\n\nUltimately, Doyle and colleagues determined that these rocky exoplanets were similar to Earth and Mars in terms of both composition and structure. So there are some exoplanets like ours in the universe...and this brings us one step closer to knowing how we fit in the universe. \n\nMice need microbes to forget their fears\n\nGerm-free and antibiotic-treated mice have impaired fear extinction\n\nClaudia Lopez-Lloreda\n\n\nUniversity of Pennsylvania\n\nHalloween can be a fearful time for many. Ghosts, ghouls and goblins run around on Halloween night, spooking children and adults alike. But once we get used to them and realize that they do not pose a threat, the brain can get rid of, or extinguish, that fear memory. Now that it's November, you've probably forgotten all about any Halloween frights. \n\nNeuroscientists have long been interested in the processes that allow the brain to eliminate fear memories, since problems with \"fear extinction\" are linked to post-traumatic stress disorder and other anxiety disorders. Now, a new study sheds more light on how the billions of tiny microbes in the body may play an important role in getting rid of fear. \n\n\nThe \"microbiota\" encompasses all the microorganisms that live on and in your body. The recent study looks at how getting rid of the microbiota affects fear extinction in mice. The researchers exposed mice to a tone paired with a shock, which after many exposures, leads the mice to create a \"fear memory\" and freeze in response to the tone. Fear extinction then happens when the mice are repeatedly exposed to the tone without the shock and eventually forget the fear memory. To examine the role the microbiota play in fear extinction, researchers treated adult mice with antibiotics to reduce their microbiota or used mice that had been microbe-free since birth. Although antibiotic-treated and microbe-free mice created a fear memory as well as the control mice, they continued freezing even during extinction, meaning they were not able to get rid of the fear memory. \n\nWhen researchers looked at the brains of the antibiotic-treated mice, they found that there were significant differences in the expression of genes and of neural activity in the cells of the medial prefrontal cortex, a brain area critical for fear extinction. Among other changes, researchers found that changing the microbiota led to alterations in microglia, the immune cells of the brain. Microglia eat up dendritic spines, which are small protrusions off of neurons that receive input from other neurons. The researchers identified that there was more spine elimination in the antibiotic-treated mice, suggesting that learning might be affected by an imbalance in spine elimination due to microglia alterations. \n\nWhen researchers analyzed the brain fluid of these mice, they found that there were four chemicals that were decreased in the microbiota-less mice. Researchers think that these chemicals might be an important way that microbes influence brain function. These findings shed new light on the ways that the microbiota can extinguish fear. \n\nTikToks are teaching Generation Z about science\n\nYes, you can share funny clips on TikTok, but what about communicating science on this platform?\n\nRebecca Muir\n\n\nUniversity College London\n\nTeenagers across the world use the short video-sharing app TikTok to escape their schoolwork. Or, that's what teachers thought. Surprise! Creators on the app are now using it to teach Gen Z-ers everything science — ranging from genetics, to squid biology, and even science policy.\n\nTikToks are easily digestible, 15 second videos which are accompanied by a song or audio-clip. The platform is geared towards entertaining middle and high schoolers. Nearly half of users are 10-20 years old, and the average user spends 53 minutes on the app every day. Scientists have spotted a niche in the TikTok market, and are starting to build science communities around the app, such as the Let’s TikTok about Science Twitter account.\n\nWhat sort of videos have creators made so far? Here are a few examples.\n\nDarrion is a Research Technician at Baylor College of Medicine, and uses a Nicki Minaj meme to explain gene expression:\n\nSarah McAnulty is a squid biologist and assistant research professor at the University of Connecticut, and in this video, uses Willow Smiths' dulcet tones to soundtrack a sea cucumber.\n\nMegan McCuller specializes in non-molluscan invertebrates at a natural history museum, 1001 jars, and shows something which defies explanation.\n\nDr. Robert Lepenies is a research scientist in Berlin specializing in policy, environment, ethics, who wants to show other scientists what they are missing.\n\nReddit's r/science community is one of science writing's biggest outlets, with the stats to prove it\n\nAt ASHG 2019, Jennifer (Piper) Below shares the numbers behind r/science's global reach\n\nFarah Qaiser\n\nMolecular Genetics\n\nUniversity of Toronto\n\nWhen scientists look to sharing their newly published research, they often turn to media outlets with large audiences. But at the American Society of Human Genetics (ASHG) 2019 conference in October, I realized that Reddit's r/science community is the front page we may all be missing out on.\n\nIn case you haven't already stumbled on to the site, Reddit – “read and edit” – is a news aggregation social media platform which is often referred to as the front page of the internet. It's composed of over a million subreddits (communities), where the 13-year-old r/science is “a place to share and discuss new scientific research.\" Fun fact: r/science has over 22.6 million subscribers, making it the fifth largest subreddit on the site.\n\nJennifer (Piper) Below is an Assistant Professor of at Vanderbilt University Medical Center – and is also one of the 1,500+ moderators on Reddit's r/science community. At ASHG’s communications workshop, Below shared that in September 2019 alone, the r/science community “averaged 5.6 million unique users and 29 million page views” – which happens to be a larger circulation than all top ten US newspapers' weekday circulation (including USA Today, The New York Times, and the Wall Street Journal).\n\nAt r/science, Below says that there are three goals: to normalize interactions with scientists, to illuminate the processes of science (rather than only the results) and to promote disintermediation (i.e. skipping news outlets to go straight to the scientists). Below says that r/science does this in three ways: user-submitted links to research, hosting a monthly science discussion series (replacing the old Ask-Me-Anything format) and by verifying users.\n\nnewspaper bundle\n\n\nBy AbsolutVision on Unsplash \n\nBelow says that “presenting your work in an r/science discussion is likely the largest audience you will ever have in your career” and hopes that science discussions on Reddit will become a culturally expected next step for scientists once they publish an “important” paper. For example, r/science has hosted discussion series on climate change, concussion injuries right after the 2019 Super Bowl and a conversation with the research group of Frances Arnold – the 2018 Nobel Prize in Chemistry winner, where the climate change science discussion had around ten million impressions and over 183k views.\n\nSubmissions requirements and comment rules help keep r/science conversations polite and scientific. In fact, by verifying their expertise and displaying an educational flair (e.g. “Grad Student | Physics”), Below says that Reddit users can help provide the context behind research, including methodology and statistics. Of r/science's 5,000+ verified users, 31% have a Bachelor of Science degree, where an additional 4% and 24% identify as professors and graduate students. Biology (19%) is the largest verified field, followed closely by engineering (16%) and medicine (12%). Journalists, writers and university press relations can also request flairs.\n\nInterested in exploring r/science? Below recommends creating a Reddit account – and to consider adding an educational flair to your account or hosting a discussion series. After all, if you truly want to communicate your science with the public, why not head directly to the front page of the internet?\n\nHuman disturbance is drying out forests\n\nThinning out the canopy impacts the water cycle within a forest, causing more moisture to be lost to the atmosphere\n\nRebecca Dzombak\n\n\nUniversity of Michigan\n\nNew research from northern Michigan shows that when a forest's canopy structure is disturbed — when leaves and branches thin out and provide less coverage — it's not just the view that's affected. The forest's water cycle is affected, too. \n\nResearchers studied two areas of the forest at the University of Michigan's Biological Station. One area had been intentionally disturbed a decade ago by killing certain species of trees to thin out the canopy. One area was an undisturbed control area. Researchers found daily and seasonal differences in the movement of water in these different areas of forest. The strongest differences in water cycling occurred during the summer when evapotranspiration rates were highest. Forest areas with more open canopies showed more mixing between the air above the forest and the air within the forest, suggesting a greater degree of connectivity between the land, forest, and atmosphere. This meant that the air within the forest was drier. Canopy structure, then, serves as a sort of regulating mechanism for moisture release to the atmosphere, with dense treetops holding moisture closer Earth's surface.\n\n Photo by Casey Horner on Unsplash \n\nWater stress is already a substantial problem in many areas of the world, and the problem is likely to get much worse in the coming decades. Since changes to canopies can be driven by both humans (forest management and logging) and climate change (ecological succession), is it important to understand how changes in the canopy structure impact the water cycle in a forest, and, in turn, how this affects regional water stress.\n\nKristen Vogt Veggeberg\n\nScience Education\n\nUniversity of Illinois at Chicago\n\nEd: All this week Massive is marking Halloween with stories of scary, witchy, and downright ghastly stories from nature\n\nIf you walk around an old cemetery, you might notice tombstones that have sunk into the dirt, tilted to the side, or even appeared to move across the ground since they (and their owners) were first placed. This is because these gravemarkers are heavy and the dirt under our feet is often unstable over long time periods. The tread marks left behind have inspired spooky urban legends.     \n\nUnfortunately for those that love ghost stories, there’s a scientific explanation behind the phenomenon of moving tombstones. It’s  got the wonderfully spooky name of \"downhill creep\" (or soil creep), and also explains natural phenomena such as bending trees on a hillside or depressions in mountainsides. \n\nThere is even a physics formula that explains downhill creep. Called diffusional sediment flux, this is calculated as the product of hill-slope and a value called the diffusion constant. Those values multiplied together yields the speed at which a given tombstone (or any physical object on a hill) moves over time. In addition to just modeling tombstone movement, this formula has also recently been used to calculate how erosion rates change with precipitation\n\nSo if we calculated this value for the average tombstone on a hill, it is pretty clear that it will always be gently moving, tombstone owner beneath be damned.  \n\nJust in time for Halloween, the spookiest primate tricks the world with a hidden thumb\n\nThe aye-aye has been hiding a secret all this time: a sixth pseudodigit\n\nDarcy Shapiro\n\nEvolutionary Anthropology\n\nRutgers University\n\n\nThe aye-aye (Daubentonia madagascariensis) is an incredibly specialized primate. For one thing, it's the only living representative of its family of lemurs. It also has rodent-like ever-growing incisors and bat-like ears that it uses in combination with an extra-long third digit to tap on trees, listen for the grubs inside, and then extract them with that spindly finger. \n\nAnd these features make it look pretty creepy. So creepy, in fact, that seeing it is traditionally considered a bad omen or a direct cause of bad luck in its native country, Madagascar. \n\nGiven the aye-aye's specialized hand anatomy, it seems like anthropologists would have already investigated that structure pretty thoroughly. But it turns out the aye-aye's hand has been hiding a secret - a sixth pseudodigit! \n\nAn aye-aye, a strange nocturnal primate that only lives in Madagascar\n\nFrank Vassen on Flickr\n\nIn a new study published in the American Journal of Physical Anthropology, a group of researchers investigated the hand anatomy in one immature and six adult aye-ayes using traditional dissection digital imaging techniques. Like the famous \"thumb\" of the giant panda, the aye-aye also has a radial sesamoid bone in its wrist that seems to help it compensate for the grasping ability the aye-aye lost when its third digit became specialized for probing out insect larva. Sesamoid bones form within tendons, typically where they cross joints, and the aye-aye's is both enlarged and has muscles attached to it to help it function like a faux-thumb. \n\nThis is the first accessory digit found in a primate. By understanding how these different structures integrate in the aye-aye's hand, we may gain further insights into the evolutionary history of the pseudothumb - and the fascinating and endangered aye-aye species.\n\nClimate change threatens bats⁠ — and tequila\n\nClimate change could destroy the delicate partnership between agave plants and the bats that pollinate them\n\nKelly Franklin\n\nConservation Biology\n\nTemple University\n\n\nChanges in temperature and precipitation associated with climate change alter the habitable ranges for many species. This becomes especially problematic for species that depend on mutualisms — relationships where both species benefit — for existence. Not only are plant-pollinator mutualisms vital for survival of the species involved, they also provide us with numerous economic and cultural services to boot. \n\nWe often hear about how climate change threatens bees, our most iconic pollinators, but rarely do we think about the pollinators of the night — bats. Mexican long-nosed bats pollinate the agave plant during their migration from central Mexico to the Southwestern United States every spring — following the blooms of their primary food source. By pollinating the agave, these bats provide us with sweeteners, biofuels, building materials, and most notably tequila\n\nPhoto by Francisco Galarza on Unsplash\n\nMexican long-nosed bats are currently listed on IUCN Red List as endangered due to habitat loss, agricultural practices, and human disturbance. But a recent study published in Scientific Reports shows that climate change also poses a threat to the already perilous existence of the Mexican long-nosed bat. Researchers found that climate change is poised to reduce the overlap in the suitable range of the agave and the Mexican long-nosed bat by at least 75%, putting this already fragile partnership at risk of disappearance.  \n\nAs the range for the agave plant shifts to higher elevations and cooler temperatures, this primary food source sustaining the bats during migration will vanish from their route. Maintaining the bats’ migration corridor is key to the preservation of both the partnership between these species and the species themselves; for the tequila and bat lovers out there, it’s non-negotiable.\n\nNeurotoxins in the water supply worsen the impact of Zika virus\n\nA neurotoxin produced by cyanobacteria may help explain patterns of Zika-associated microcephaly in Brazil\n\nZika virus is transmitted by Aedes aegypti — a mosquito that also transmits dengue and yellow fever. In some people, the virus causes symptoms that are very mild. Other cases, however, are dramatic — fetuses that are infected inside the womb can develop microcephaly, a condition in which the baby's head is much smaller than expected. Unfortunately, many cases were reported in Brazil during the recent outbreak of the disease.\n\nThe situation motivated Brazilian researchers to search for answers. Some were found quickly: in 2016, a paper described how the virus affects the development of brain organoids. But a big question remained unsolved: why were the microcephaly cases concentrated in northeast Brazil when Zika was spread throughout the country?\n\nVarious hypotheses were on the table: folic acid deficiency in pregnant women in northeastern Brazil, coinfection with other mosquito-transmitted viruses, extreme poverty, or even the use of pesticides in agriculture. But nothing seemed to explain why there were so many cases of microcephaly in this particular region.\n\nAn interdisciplinary team lead by neuroscientist Stevens Rehen, from the Federal University of Rio de Janeiro, recently published a preprint that adds one more piece to that puzzle. The group investigated how environmental factors can influence the development of microcephaly.\n\nNortheastern Brazil suffers from drought periods, which can lead to blooms of cyanobacteria. Those microorganisms often produce toxins that can be harmful to human and animal health.\n\nCyanobacteria bloom\n\nNASA Goddard Space Flight Center\n\nThe new hypothesis to explain the microcephaly boom in northeast Brazil involved saxitoxin, a neurotoxin produced by the freshwater cyanobacteria Raphidiopsis raciborskii. Perhaps because of a severe drought in the region from 2012 to 2016, there was a higher saxitoxin occurrence in the drinking water supply of northeast Brazil compared to the rest of the country.\n\nIn the lab, the team showed that the presence of saxitoxin doubled the cell death rates in progenitor areas of human brain organoids infected by Zika virus. Scientists now believe that this might explain why microcephaly was worse in the northeast region.\n\nDue to the complexity of the Zika outbreak in Brazil, the scientific community had to exercise true detective skills. Scientists had to go beyond their own lab walls and connect different knowledge areas to solve the puzzle. Hopefully, these new findings will help to prevent future cases of Zika-associated microcephaly.\n\nA parasitic flatworm is one of nature's spookiest creatures\n\nLeucochloridium paradoxum is a parasitic flatworm that uses both mind control and mimicry to trick birds into eating it\n\nMonica Javidnia\n\n\nUniversity of Rochester\n\n\nLarval Leucochloridium paradoxum, more commonly known as the green-banded broodsac, is a parasitic flatworm ingested by snails feeding on bird feces. As the parasite grows, it comes to take over the snail's tentacles, leading to one to two appendages resembling wriggling caterpillars or maggots  — known as mimicry. \n\nMimicry is an umbrella term used to describe when organisms look like other things. For example, insects can look like twigs or leaves to blend in with their surroundings, anglerfish attract prey by wiggling their esca (an adapted spine) to resemble a smaller fish, and some flowers are shaped like female insects to attract males for pollination. L. paradoxum takes mimicry a step further by drawing the snail out into the open to increase its chances of getting gobbled up by a bird.\n\nLand snail Succinea putris with Leucochloridium paradoxum inside its left eye stalk\n\nA land snail with Leucochloridium paradoxum inside its left eye stalk.\n\nBy Thomas Hahmann.\n\nResearchers have also found snails infected by L. paradoxum tend to stay in open, better-lit places and on higher vegetation, making them an irresistible snack for birds. Once in the bird, the parasites continue their life cycle, turning into adults, reproducing, and laying eggs. These eggs are released through bird droppings, and the cycle continues!\n\nBut the green-banded broodsac is not the only parasite that uses sinister mind control or mimicry to make its way through life. Toxoplasma gondii causes behavioral changes in mice to make cats eat them, and Myrmeconema neotropicum infects worker ants, causing a berry-like blob that will attract birds. \n\nThe worst mimicry of all? Raisin cookies that trick me into thinking they're chocolate chip.\n\nEd again: The views shared by the author in this article do not reflect the cookie-related positions of Massive. We support oatmeal raisin cookies.\n\nHave you ever wondered why it's harder to maintain your weight as you get older?\n\nNew research shows that as you age, the rate at which lipids are removed from your fat tissue decreases\n\nDaniela Helena\n\n\nUniversità della Svizzera Italiana\n\nHave you ever wondered why athletes often cannot maintain their weight as they get older? Could the culprit be their newly discovered passion for binge-watching while eating fast food? Or could it be that they changed…nothing at all? Interestingly, new research shows that as you get older, the rate at which lipids are removed from your fat tissue decreases, which may explain why maintaining weight is harder as you grow older. \n\nOur white adipose tissue, the main fat-storing tissue in human adults, is one of the main targets when tackling obesity or weight changes. Its size is determined by a phenomenon called lipid turnover – the balance between how much energy your body stores as fat and how much it burns of the stored fat.\n\nfood salad chocolate diet\n\nThis means that, as you age, if you keep that exact same (now not-so-perfect) diet, your lipid uptake will get higher than your lipid removal and you will gain weight. \n\nBy Brenda Godinez on Unsplash \n\nImagine you have a high lipid turnover. Then, the average time lipids spend in your adipose tissue is low. Now imagine you have matched that with the perfect diet. As long as your lipid turnover doesn’t change, your weight will stay the same. The caveat comes with your ever increasing age.\n\nThe researchers had been following adults for up to 16 years and continued to measure the lipid turnover of their subcutaneous fat. They discovered that, irrespective of long-term changes in body weight, initial age or even level of exercise, the rate of lipid removal from their fatty tissue was decreasing with age. This means that, as you age, if you keep that exact same (now not-so-perfect) diet, your lipid uptake will get higher than your lipid removal and you will gain weight. In fact, participants who didn’t change their diet during the study period saw their weight increase.\n\nHow can you cope with this? To put it simply, the fat that gets stored in your body mainly reflects the amount of food you eat (and not only extra fat, but also extra sugar, gets stored as fat!). Although other factors, such as exercise or the composition of your diet, may eventually also influence fat deposition, this will not alter your rate of lipid removal. So, until other therapeutic approaches come out, we may have to accept that, as we age, we may need to lighten our diets if we want to avoid those extra pounds.\n\nBeing reminded of bias makes students treat female professors fairer\n\nStudents who read a bias reminder rated their female professors 10% higher\n\nDonna McDermott\n\n\nEmory University\n\nStudent evaluations help to determine whether professors get hired and promoted. But are they fair to professors? Probably not: multiple studies show that student evaluations are biased against women and people of color.\n\nA new study shows that it may be possible to decrease evaluation bias against female professors by making students aware of the problem. \n\nResearchers tested a method for reducing bias by including a short message about bias in the evaluation forms. This “bias reminder” message explained that evaluations are influenced by students’ unconscious biases about race and gender of instructor. The bias reminder then suggested that students should resist stereotypes about instructors and instead focus on the content of the course. \n\nPhoto by Sharon McCutcheon on Unsplash\n\nThe researchers tested the effect of this bias reminder in four college courses: two taught by women and two taught by men. For each class, the researchers randomly split the student evaluators into two groups: a control group which received the typical student evaluation and a treatment group which received an identical student evaluation, except that it included a bias reminder.\n\nResearchers found that students who read the bias reminder rated their female professors 10% higher than students in the same class who did not read the bias reminder. \n\nOne major limitation of this study is that it only tested the effect of the bias reminder on gender bias. All of the evaluated professors were white. Future studies will need to test the effect of a bias reminder on student evaluations of professors of color.\n\nIncreasing diversity among college faculty is an important goal and a complex challenge. However, some changes are easy to make. This study shows that a simple reminder to students could help decrease systemic bias against female professors.  \n\nMore Lab Notes →", "pred_label": "__label__1", "pred_score_pos": 0.8022210001945496} {"content": "Mathieu Jean Baptiste\n\nThe Story\n\nMathieu was born in Port Au Prince, Haiti and based in Houston, Texas. Mathieu spent his early years in Haiti and St Paul, Minnesota. He studied Art and Photography at Ecole Nationale des Arts (Enarts), a university in Port Au Prince, Haiti resulting in a Bachelor of Arts in Art History.\n\nMathieu uses paint and metal as tools to unite the world around him. He states, ‘This world is filled with confusions and misunderstandings as people struggle and strive in this beautifully, complex, maze of life.” Mathieu’s art reflect the good, the hopeful, and the interconnectedness for a better world.\n", "pred_label": "__label__1", "pred_score_pos": 0.8907536268234253} {"content": "Coal MiningHard Rock MiningPetrochemicalTunnelling\n\nWhat does it feel like to be inside a Refuge Chamber: Physical Effects?\n\nRefuge chambers are a standard requirement within a site’s overall emergency response plan, but in the event that a chamber needs to be used, understanding what it feels like to be in a refuge chamber can improve the response of entrapped personnel.\n\nWorking underground is a complex environment to comprehend, so let’s set the scene.\n\nUnderground the air always seems a little thicker, and the dust doesn’t help. You’re sweating, it’s noisy, but you stay focused to get the job done. Then your team gets a call over the radio as a distinct rotten smell drifts down the passage, you’re body tenses slightly as you begin to realise what this means – evacuation.\n\nTraining kicks in and together you head to the nearest exit. The intensity of the situation becomes more evident, you realise your team won’t be able to make it to the exit, so you head to a refuge chamber straight ahead.\n\nYou enter the refuge chamber, commence operational procedures which you recall from training and follow the prompts on the wall; you call the control room and await further instruction. Everyone relaxes slightly, you know you’re in a safe location and the emergency response team know you’re here – it won’t be long now…  \n\nInside an underground refuge chamber.\n\nWhat Physical Stresses Should I Expect When Inside a Refuge Chamber?\n\n\nWhen enclosed in a refuge chamber, it is likely to get hot and humid. There are a number of factors which contribute to the rise in temperature and humidity, including the metabolism of each occupant, heat generated from equipment, and heat transfer from outside the refuge chamber.\n\nHigh levels of heat and humidity are dangerous. Excessive heat stress may be life-threatening, and adverse health effects can range from confusion and poor decision making, fatigue, nausea, rapid heart rate and loss of consciousness.\n\nAir conditioners are indispensable in refuge chamber design. Artificial cooling and dehumidifying are required as the temperature inside a refuge chamber will continue to rise if steps are not taken to control this.\n\nWhat Psychological Stresses Should I Expect When in a Refuge Chamber? Stress, sleep deprivation, lack of privacy are some of the most common behavioural stresses Read More\n\nClose Proximity\n\nRefuge chambers have limited capacity. Portable chambers, in particular, are built to support a restricted number of workers during an incident; with limited spacing, the quarters can feel cramped and crowded. The closeness of a chamber will depend on its design, size and purpose.\n\nThe close quarters can cause some individuals to feel uncomfortable and become flustered or irritable. Individual, ergonomic chairs provide personnel with comfortable seating without impeding on the space of others within the chamber. Many chambers are also equipped with additional resources such as playing cards, which can be used to distract personnel for their surroundings.\n\n\nEvery refuge chamber, whether permanent or portable, requires a rationed supply of water and food.\n\nDehydration is a serious concern due to heat and humidity that accumulates within an occupied refuge chamber.\n\nrefuge-chamber water supply\n\nIf water lost through sweat is not sufficiently replaced, progressive dehydration occurs. Further to this, salt deficiency (especially following long periods of sweating) may also cause a form of heat exhaustion resulting in painful muscle cramps. All MineARC chambers come equipped with a supply of long-life water.\n\nWhy You Should Know What it’s like to be in a Refuge Chamber\n\nUnderstanding the situation before it occurs. Educating personnel about the potential psychological and physical impacts of being in a refuge chamber will create greater awareness and prepare them for when an emergency occurs.\n\nImproved safety procedures have resulted in major incidents becoming rarer in underground mines and construction; however, this now means there is often little on-site experience in dealing with these types of situations.\n\nThe growth of a good safety culture depends on the reliability of available information, and for it to be used alongside regular training as a tool for better decision making and the sound management of resources. Training, including rigorous simulations, provides practical experience and improves the rate of correct response and the understanding of what it is like to be in a refuge chamber.\n\nThe long-term implementation of good health and safety planning and practices protect against risk. Without education and training to build a better understanding, the effect of being in a refuge chamber can have a significant impact on the survivability of workers. It is imperative to incorporate refuge chamber training into the overall health and safety plan of a site.\n\n“I began to tell jokes, a simple form of distraction to try and lighten the mood. There were a couple of younger guys in the chamber, so I tried to remain strong, never letting on what was racing through my mind – what is happening on the surface, why have we been here for so long. Honestly, I was afraid; I kept thinking about my family. My wife. And my kids.”\n\nTerry’s Story\n\nTerry’s Story. I could see the flashes of green from the strobe light of the chamber up ahead, welcoming me. I made my way inside, and as I shut the door behind me, I could feel the relief washed over. The chamber was built to hold twenty, but there were only six of us inside; safe, but eagerly waiting to find out more. Continue reading.\n\nWhat it feels like to be inside a Refuge Chamber: Psychological. Refuge chambers can feel like sealed sea containers, while more complex, the thought of waiting out an emergency can be daunting. Psychological stresses can impact decision making as well as physical state and behaviour, negatively affecting survivability.  Continue Reading.", "pred_label": "__label__1", "pred_score_pos": 0.9267063140869141} {"content": "th-66For the director of music. With stringed instruments. Of David. Hear my cry, O God; listen to my prayer. Psalm 62:1\n\nWhat’s your “go to” song? I am sure it will be different depending on your emotional status. Many times when the kids and I were working on a hard project that needed extra strength to finish, I would start voice trumpeting the first notes of the Rocky theme from the movie. The music mirrored the transition to dig deeper and push through the change that needed to happen. What’s your go to song to lift your heart spiritually?\n\nOne of the reasons that we love King David is the transparency revealed in the songs that he wrote. We are not looking at a journal or diary that someone found near his bedside. Rather, David asked that his songs be rehearsed and sang publicly. His thoughts and relationship with God would be open to all and on full display. \n\nWorship was one of the ways that David navigated his thought life. He asked God some very difficult questions. Why do the wicked prosper? Why are you silent?  Why do the nations rage? Why is my heart overwhelmed? What is man that you are mindful of him?\n\nThese questions and thoughts were presented in song. The song would lead to a trust in God even though some of the answers may be left unresolved. Can you find peace today knowing that some of your answers may be left unresolved?\n\nWe spend a lot of emotional energy trying to find answers. Why did she say that? What does my boss really think about me? Are my children okay? Why would someone act so unbecomingly? Will this person ever forgive me? Can I love again? How can I go on without this person in my life? \n\nIt is not wrong or a problem to ask difficult questions. Sometimes it is helpful just to formulate the question that has been bugging you. But being consumed by the time and energy searching for the answer is unhealthy. Much of that pursuit is a desire in us to “know” all things. The resolve that you are searching for will only be found as it leads to a peaceful trust in God – who knows all things – and loves you.\n\nDirect your questions and prayer to God. Don’t spend time rehearsing your woe is me to yourself and others. Talk with God. Do as David did. Speak to Him beginning right at the point of your pain and confusion. Listen to David’s start. “Hear my cry, O God, listen to my prayer.” \n\nIt may be helpful to use your “go to” song to redirect your trust toward God’s direction. He is always available. May you receive the comfort of His peace today.\n\nBlessings Love y’all", "pred_label": "__label__1", "pred_score_pos": 0.764519214630127} {"content": "Site Loader\nRock Street, San Francisco\n\nThe United States has the largest national economic system in the universe, with a GDP for 2005 of 12.41 trillion dollars. In this assorted economic system, corporations and other private houses make the huge bulk of microeconomic determinations, and authoritiess prefer to take a minimum function in the domestic economic system. Because of this, the U.S. has a little societal safety cyberspace, and concern houses in the U.S. face well less ordinance than those in many other states. The financial policy of the state since the New Deal has followed the general ideals of Keynesian economic sciences, which replaced Hamiltonian economic sciences following the Great Depression. Neoliberal ideals have become more outstanding since the presidential term of Ronald Reagan and with the turning influence of globalisation. Since the early 1980s, the United States has transformed from being the universe ‘s largest creditor to holding a significant current history shortage and a national debt, which is now about 64 % of the GDP and the highest since the 1950s.\n\n\nWe Will Write a Custom Essay Specifically\nFor You For Only $13.90/page!\n\norder now\n\nWith President Harding ‘s station & # 8211 ; World War I “ Return to Normalcy ” , the United States enjoyed a period of great prosperity during the 1920s. The stock market grew by springs and bounds, fueled by the inflationary policies of the Federal Reserve, and the economic system was considered unbeatable. However, the Great Depression shattered that belief. President Franklin D. Roosevelt introduced an array of societal plans and public plants, known jointly as the New Deal. The New Deal included a new societal safety cyberspace affecting alleviation plans like the WPA and the Social Security system. In 1941, the U.S. entered World War II. The place forepart saw tremendous prosperity, as labour deficits brought 1000000s of homemakers, pupils, husbandmans and African Americans into the labour force. Millions moved to industrial centres in the North and West. Military disbursement accounted for over 40 % of GDP at the extremum, driving debt up to record degrees. The station & # 8211 ; World War II old ages were a clip of great prosperity in the United States. The economic system remained stable until the seventiess, when the U.S. suffered stagflation. Richard Nixon took the United States off the Bretton Woods system, and farther authorities efforts to resuscitate the economic system failed. As the decennary progressed, the state of affairs worsened. In November 1980, Robert G. Anderson wrote, “ the decease knell is eventually sounding for the Keynesian Revolution. ” Ronald Reagan was elected President in 1980, and was of the sentiment that “ authorities is non the solution to our job, authorities is the job. ” Reagan advocated a plan of ‘supply-side economic sciences ‘ , and in 1981 Congress cut revenue enhancements and disbursement, and decreased ordinances. Although the Gross Domestic Product ( GDP ) declined by 2 % in 1982, it proceeded to bounce, and by 1988 had enjoyed a sum of 31 % growing since Reagan ‘s election. Under Bill Clinton ‘s eight old ages of presidential term, the GDP expanded by 38 % . By the terminal of his term of office the United States had a Gross National Income ( GNI ) of $ 9.7 trillion, and the lowest unemployment rates in 30 old ages. A recession began during 2000 in connexion to the terminal of the dot-com bubble. Throughout, lodging starts and purchases remained high, and the economic system as of 2005 is considered by many to be strong in general. Some fear high authorities disbursement ( such as in the Iraq War ) every bit good as high oil monetary values may speed up rising prices. There are besides warnings that the Federal Government needs to re-balance the budget to avoid possible default. While default does non look a likely result, it is extremely likely that relentless high budget shortages will drag down the economic system in the hereafter. This applies even more so to the current history shortage and external debt. U.S. liabilities to aliens are estimated at $ 15 trillion in 2005, and go on to turn.\n\nBasic ingredients of the U.S. economic system\n\nThe first ingredient of a state ‘s economic system is its natural resources. The United States is rich in mineral resources and fertile farm dirt, and it is fortunate to hold a moderate clime. It besides has extended coastlines on both the Atlantic and Pacific Oceans, every bit good as on the Gulf of Mexico. Rivers flow from far within the continent, and the Great Lakes – five big, inland lakes along the U.S. boundary line with Canada – provide extra transportation entree. These extended waterways have helped determine the state ‘s economic growing over the old ages and helped adhere America ‘s 50 single provinces together in a individual economic unit.\n\nThe 2nd ingredient is labour. The figure of available workers and, more significantly, their productiveness aid find the wellness of an economic system. Throughout its history, the United States has experienced steady growing in the labour force, and that, in bend, has helped fuel about changeless economic enlargement. Until shortly after World War I, most workers were immigrants from Europe, their immediate posterities, or African Americans who were largely slaves taken from Africa, or break one’s back posterities. Get downing in the early twentieth century, many Latin Americans immigrated ; followed by big Numberss of Asians following remotion of state – beginning based in-migration quotas. The promise of high rewards brings many extremely skilled workers from around the universe to the United States.\n\nLabor mobility has besides been of import to the capacity of the American economic system to accommodate to altering conditions. When immigrants flooded labour markets on the East Coast, many workers moved inland, frequently to farmland waiting to be tilled. Similarly, economic chances in industrial, northern metropoliss attracted black Americans from southern farms in the first half of the twentieth century.\n\nThird, there is fabricating and investing. In the United States, the corporation has emerged as an association of proprietors, known as shareholders, who form a concern endeavor governed by a complex set of regulations and imposts. Brought on by the procedure of mass production, corporations such as General Electric have been instrumental in determining the United States. Through the stock market, American Bankss and investors have grown their economic system by puting and retreating capital from profitable corporations. Today in the epoch of globalisation American investors and corporations have influence all over the universe. The American authorities has besides been instrumental in puting in the economic system, in countries such as supplying inexpensive electricity ( such as the Hoover Dam ) , and military contracts in times of war.\n\nWhile consumers and manufacturers make most determinations that mold the economic system, authorities activities have a powerful consequence on the U.S. economic system in at least four countries. Strong authorities ordinance in the U.S. economic system started in the early 1900s with the rise of the progressive motion ; prior to this the authorities promoted economic growing through protective duties and subsidies to industry, reinforced substructure, and established banking policies, including the gilded criterion, to promote nest eggs and investing in productive endeavors.\n\nStabilization and growing\n\nPossibly most significantly, the federal authorities guides the overall gait of economic activity, trying to keep steady growing, high degrees of employment, and monetary value stableness. Adjusting disbursement and revenue enhancement rates ( financial policy ) or pull offing the money supply and commanding the usage of recognition ( pecuniary policy ) , it can decelerate down or rush up the economic system ‘s rate of growth-in the procedure, impacting the degree of monetary values and employment.\n\nFor many old ages following the Great Depression of the 1930s, recessions – periods of slow economic growing and high unemployment – were viewed as the greatest of economic menaces. When the danger of recession appeared most serious, authorities sought to beef up the economic system by passing to a great extent itself or cutting revenue enhancements so that consumers would pass more, and by furthering rapid growing in the money supply, which besides encouraged more disbursement. In the 1970s, major monetary value additions, peculiarly for energy, created a strong fright of rising prices – additions in the overall degree of monetary values. As a consequence, authorities leaders came to concentrate more on commanding rising prices than on battling recession by restricting disbursement, defying revenue enhancement cuts, and harnessing in growing in the money supply.\n\nIdeas about the best tools for stabilising the economic system changed well between the 1960s and the 1990s. In the sixtiess, authorities had great religion in financial policy-manipulation of authorities grosss to act upon the economic system. Since disbursement and revenue enhancements are controlled by the president and the U.S. Congress, these elected functionaries played a prima function in directing the economic system. A period of high rising prices, high unemployment, and immense authorities shortages weakened assurance in financial policy as a tool for modulating the overall gait of economic activity. Alternatively, pecuniary policy-controlling the state ‘s money supply through such devices as involvement rates-assumed turning prominence. Monetary policy is directed by the state ‘s cardinal bank, known as the Federal Reserve Board, with considerable independency from the president and the Congress.\n\nRegulation and control\n\nThe U.S. federal authorities regulates private endeavor in legion ways. Regulation falls into two general classs.\n\nEconomic ordinance: Seeks, either straight or indirectly, to command monetary values. Traditionally, the authorities has sought to forestall monopolies such as electric public-service corporations from raising monetary values beyond the degree that would guarantee them sensible net incomes. At times, the authorities has extended economic control to other sorts of industries as good. In the old ages following the Great Depression, it devised a complex system to stabilise monetary values for agricultural goods, which tend to fluctuate wildly in response to quickly altering supply and demand. A figure of other industries-trucking and, subsequently, airlines-successfully sought ordinance themselves to restrict what they considered as harmful monetary value film editing.\n\nAnother signifier of economic ordinance, antimonopoly jurisprudence, seeks to beef up market forces so that direct ordinance is unneeded. The government-and, sometimes, private parties – have used antimonopoly jurisprudence to forbid patterns or amalgamations that would unduly limit competition.\n\nIn 1933, Congress created the Federal Deposit Insurance Corporation ( FDIC ) which soon guarantees checking and nest eggs sedimentations in member Bankss up to $ 100,000 per\n\ndepositor to forestall bank failures. This was in response to the widespread bank tallies of the early 1930s during the Great Depression.\n\nSocial Regulations: Since the 1970s, authorities has besides exercised control over private companies to accomplish societal ends, such as protecting the populace ‘s wellness and safety or keeping a clean and healthy environment. The U.S. Food and Drug Administration tightly regulates what drugs may make the market. For illustration, the Occupational Safety and Health Administration protects workers from jeopardies they may meet at their workplace and the Environmental Protection Agency seeks to command H2O and air pollution.\n\nSuch bureaus draw heavy unfavorable judgment from conservativists, who question the bureaus ‘ efficiency and necessity.\n\nAmerican attitudes about ordinance changed well during the concluding three decennaries of the twentieth century. Get downing in the 1970s, policy shapers grew progressively concerned that economic ordinance protected inefficient companies at the disbursal of consumers in industries such as air hoses and hauling. At the same clip, technological alterations spawned new rivals in some industries, such as telecommunications, that one time were considered natural monopolies. Both developments led to a sequence of Torahs easing ordinance.\n\nWhile leaders of America ‘s two most influential political parties by and large favored economic deregulating during the 1970s, 1980s, and 1990s, there was less understanding refering ordinances designed to accomplish societal ends. Social ordinance had assumed turning importance in the old ages following the Depression and World War II, and once more in the sixtiess and 1970s. But during the presidential term of Ronald Reagan in the 1980s, the authorities relaxed regulations intended to protect workers, consumers, and the environment, reasoning that ordinance interfered with free endeavor, increased the costs of making concern, and therefore contributed to rising prices. Still, many Americans continued to voice concerns about specific events or tendencies, motivating the authorities to publish new ordinances in some countries, including environmental protection. As of March 2005, it is estimated that conformity with authorities ordinance costs the U.S. economic system $ 1.4 trillion a twelvemonth. Some citizens, meanwhile, have turned to the tribunals when they feel their elected functionaries are non turn toing certain issues rapidly or strongly plenty. For case, in the 1990s, persons, and finally authorities itself, sued baccy companies over the wellness hazards of coffin nail smoke. A big fiscal colony provided provinces with long-run payments to cover medical costs to handle smoking-related unwellnesss. The money is largely exhausted ( or will be spent, as cheques are frequently written in expectancy of payments ) for other intents.\n\nDirect services\n\nEach degree of authorities provides many direct services. The federal authorities, for illustration, is responsible for national defence, dorsums research that frequently leads to the development of new merchandises, behaviors infinite geographic expedition, and runs legion plans designed to assist workers develop workplace accomplishments and happen occupations. Government disbursement has a important consequence on local and regional economic systems and even on the overall gait of economic activity.\n\nState authoritiess, meanwhile, are responsible for the building and care of most main roads. State, county, or metropolis authoritiess play the prima function in funding and runing public schools. Local authoritiess are chiefly responsible for constabulary and fire protection. Government disbursement in each of these countries can besides impact local and regional economic systems, although federal determinations by and large have the greatest economic impact.\n\nOverall, federal, province, and local disbursement accounted for about 28 per centum of gross domestic merchandise in 1998.\n\nDirect aid\n\nGovernment besides provides many sorts of aid to concerns and persons. It offers low-interest loans and proficient aid to little concerns, and it provides loans to assist pupils go to college. Government-sponsored endeavors buy place mortgages from loaners and turn them into securities that can be bought and sold by investors, thereby encouraging place loaning. Government besides actively promotes exports and seeks to forestall foreign states from keeping trade barriers that restrict imports.\n\nGovernment supports persons who can non or will non adequately care for themselves. Social Security, which is financed by a revenue enhancement on employers and employees, histories for the largest part of Americans ‘ retirement income. The Medicare plan wages for many of the medical costs of the aged. The Medicaid plan fundss medical attention for low-income households. In many provinces, authorities maintains establishments for the mentally sick or people with terrible disablements. The federal authorities provides nutrient casts to assist hapless households obtain nutrient, and the federal and province authoritiess jointly provide public assistance grants to back up low-income parents with kids.\n\nMany of these plans, including Social Security, trace their roots to the “ New Deal ” plans of Franklin D. Roosevelt, who served as the U.S. president from 1933 to 1945. Identify to Roosevelt ‘s reforms was a belief that poorness normally resulted from societal and economic causes instead than from failed personal ethical motives. This position repudiated a common impression whose roots lay in New England Puritanism that success was a mark of God ‘s favour and failure a mark of God ‘s displeasure. This was an of import transmutation in American societal and economic idea. Even today, nevertheless, reverberations of the older impressions are still heard in arguments around certain issues, particularly public assistance.\n\nMany other aid plans for persons and households, including Medicare and Medicaid, were begun in the 1960s during President Lyndon Johnson ‘s ( 1963 & # 8211 ; 1969 ) “ War on Poverty. ” Although some of these plans encountered fiscal troubles in the 1990s and assorted reforms were proposed, they continued to hold strong support from both of the United States ‘ major political parties. Critics argued, nevertheless, that supplying public assistance to unemployed but healthy persons really created dependence instead than work outing jobs. Welfare reform statute law enacted in 1996 under President Bill Clinton ( 1993 & # 8211 ; 2001 ) requires people to work as a status of having benefits and imposes bounds on how long persons may have payments.\n\nNational debt\n\nThe national debt, besides known as the U.S. public debt and the gross federal debt, is the overall corporate amount of annual federal budget shortages owed by the United States federal authorities. The economic significance of this debt and its possible branchings for future coevalss of Americans are controversial issues in the United States.\n\nThe adoption cap debt ceiling as of 2005 stood at 8.18 trillion. In March of 2006, Congress raised that ceiling an extra.79 trillion to $ 8.97 trillion. Congress has used this method to cover with an infringing debt ceiling in old old ages, as the federal adoption bound was raised in 2002 and 2003. The size of the debt is in the millions and accordingly it has been portion of popular civilization to parody the turning debt with some type of Judgment Day clock, diagrammatically demoing the turning indebtedness every second.\n\nWhile the U.S. national debt is the universe ‘s largest in absolute size, a more accurate step is that of its size relation to the state ‘s GDP. When the national debt is put into this position it appears well less today than in past old ages, peculiarly during World War II. By this step, it is besides well less than those of other industrialised states such as Japan and approximately tantamount to those of several Western European states.\n\n\nThis in writing shows the distribution of gross one-year family income. The edifice ‘s 30 exposed floors are easy divided into quintiles, each income quintile is thereby represented by six floors. Each floor represents the ten percent of a 3rd ( 3.33 % ) of families in the US and each subdivision of 10 floors represent approximately one tierce of American society. The floors above the top black line represent those families with incomes of or transcending $ 100,000. The floors below the bottom black line, nevertheless, represent those families who fell below the poorness threshold. In order to populate on the top floor of the American income strata, a family ‘s one-year gross income must transcend $ 200,000.There is important dissension about poorness in the United States, peculiarly over how poverty ought to be defined. Using radically different definitions, two major groups of advocators have claimed diversely that ( a ) the United States has eliminated poorness over the last century ; or ( B ) it has such a terrible poorness crisis that it ought to give significantly more resources to the job.\n\nThe two predating definitions of poorness are really different because one group defines poverty as a deficiency of basic resources. Even with over 300 million people, The United States has a really low figure of people who lack basic necessities ( e.g. , nutrient, shelter and vesture ) . The other group argue that income inequality is supplying the richest 10 % with a much better criterion of life than the poorest 10 % .Much of the argument about poorness comes from groups who either support public assistance plans and authorities ordinance of the market or a market which is ordinance free and non bound by a large societal safety cyberspace. Measures of poorness can be either absolute or relative. Absolute poorness is defined in existent dollar values, whereas relative poorness is a comparing of the highest to the lowest criterion of life at a peculiar clip period.\n\nIncome inequality\n\nThe United Nations Development Programme Report 2005 ranks income distribution in the United States as the 92nd most equal out of 124 states, as measured by the Gini coefficient. The richest 10 % make 15.9 times every bit much as the poorest 10 % , and the richest 20 % make 8.4 times every bit much as the poorest 20 % . ( See List of states by income equality. )\n\nThis does non take into history absolute income degrees. If, for case, one state ‘s poorest are richer than another state ‘s norm, so the inequality comparing becomes less meaningful.\n\nPost Author: admin\n\n\nI'm Gloria!\n\n\nCheck it out", "pred_label": "__label__1", "pred_score_pos": 0.5482989549636841} {"content": "Election day: A historical Tradition\n\nElection Day is the day where America’s democracy is most prevalent and people can express their political opinions with actions and cause change. Voting as a concept has existed since Ancient Greece and has continued to be practiced today. Voting took place by having people cast their votes on leaves or very early forms of paper, and seal all of the votes in pots to be counted later. Compared to present-day, there isn’t much of a difference in how voting takes place now besides being on a large scale and online.\n\nVoters in Texas hurry to the polls to cast their ballots.\n\nOfficial laws around elections and voting provide American values in the 1st Article of the Constitution and later modified in the 15th and 19th Amendments where Black men and then all women were allowed the right to vote. In the 24th Amendment, poll taxes were eliminated to make more people interested in voting. The 26th Amendment was ratified to lower the age limit allowing people 18 years and older to vote. Multiple Acts have been made for the purpose of getting rid of limiting factors keeping people from voting or even wanting to vote. Examples of these are the Civil Rights Acts that first acted as outlines to be continued and edited in later renditions.\n\nCapital Hill will soon open to many new elected members of the Congress.\n\nIn America, elections take place once every two years on the first Tuesday of the month in November. Members of the House of Representatives and 1/3 of the Senate are up for election every two years, but presidential elections occur every four years. To register and vote for any of these positions in the future, visit https://www.vote.org/register-to-vote/.", "pred_label": "__label__1", "pred_score_pos": 0.6891433000564575} {"content": "The guidelines to follow about what elements are worthy of a whole page on Scrooge McDuck Wikis, and which are not. Keep in mind that those are only general guidelines and not strict rules.\n\n\nCharacters who have a great importance within the story, or have some ties to the main characters (such as family ties) or to their history, are priority. However, ideally, all named characters appearing in a story that has a page on the wiki should also have pages of their own. Nameless characters should only be given pages if they are of special notability (either through their importance in the plot or through an unusual concept).\n\n\nAll stories, no matter how short or obscure, are theoretically worthy of a page. The exception to this would be foreign stories that have not yet been translated in English; of those, only the more notable ones (like the first appearance of a recurring character) ought to receive pages. (The point is, no one's going to come after you to delete it if you create a page about a random 1986 Italian one-shot… but stories available in English should be a priority for editors.)\n", "pred_label": "__label__1", "pred_score_pos": 0.9266054630279541} {"content": "The GE twinspeed HDx 14.0 MR system is a 1.5 Tesla magnet dedicated to cardiovascular research.\n\nOne of the techniques being studied with different types of heart disease is viability, or looking at heart muscle damage to see if there are areas that can be helped by revascularizing the muscle. Cardiac MR exams are time-consuming, so work is being done on pulse sequences and devising new techniques to shorten exam times and make the process easier for patients.\n\nReal-time imaging techniques to image the heart while it is beating and while the person is breathing normally may revolutionize the way cardiac MR imaging is performed because currently, cardiac MR exams require people to hold their breaths while the scan is being acquired.\n\nAnother area of study is cardiac function or measuring the ability of the heart to contract.\n\nThe IRCCI MR and cardiac catheterization labs are connected via a sliding door. Through the innovation of GE, an XMR (X-ray/MR bed) was developed. Now, patients undergoing a cardiac catheterization procedure can have an MR immediately after to study the effects of the procedure on the heart tissue. The XMR bed slides on a track between the MR and the cardiac catheterization labs to make this possible.", "pred_label": "__label__1", "pred_score_pos": 0.6075235605239868} {"content": "REVIEW Ditian ‘Time Is An Illusion EP’ [Exit Strategy]\n\nAssuring confidence through virtuoso collaborations, Dario Sebastian — Ditian for short— delivers his first solo EP, striding between electronic music’s technicality and sentimentality. The digger persona has burrowed his tracks deep beneath the ranking soil of renowned labels, such as Innervisions and Exit Strategy. Ditian has received recognition and support from Âme, Dixon, Frankey & Sandrino, Trikk, Mano Le Tough, and Tale Of Us. The Argentinian DJ/ Producer’s recently instituted ‘Paranoia’ on Sum over Histories label and has been (re)cast on the two latest Secret Weapons compilations with tracks ‘Fine Day’ and ‘Far From Here’. Ranging from Hernan Cattaneo to Dixon, the IT-tech uproots relationships within the extensive underground electronic system; networking between varying crowds and presumed tastes. Following Nandu’s most recent interludes on Exit Strategy, Ditian’s releases his EP on the label; meandering along a deep house/techno vibe and allowing futuristic trajectories to scuff away neurotic anxieties. Throughout the four-track EP, Ditian synchronizes analogous tempos and flickers around similar percussive elements. Offering a stroke of insight into his present direction, the complementary nature of the tracks represents a cohesive resonance and coalesce energy.\n\nTo introduce the EP, Ditian steers a man obsessed with time in — supposed — linear direction. The combating elements chug along disappointing perspectives, neatly laced by yours truly. Whip-lashing synths conjure an attack intensity – consoling when embraced and punishing when resisted. As if adhering to societal expectations, the layers thicken in complexity and intensity. Defining and refining wrinkles around a smirked mouth, the track’s direction briskly detours off a dynamic cliff edge. The deep breakdown spits out mentalities into an unforgiving raft, yet the tide’s main riff maintains a moderate and controllable rhythm. The undercurrent’s clean snares and twangy hi-hats tag-team around the track’s percussive loop. Strategizing to stay afloat, the rolling drums resuscitate breaths of relief, bringing over the realization of the hegemonic distortions – cemented in rules and rusted with fear. 
\n\nUnlocking the next level, ‘Brutalism’ permits a discreet bliss, as if learning the rules just made it easier to break them. The banging drums help unify the supplemental particles and consolidate the dark hues of a storm cloud. Leaving waterworks cleansed and rejuvenated, the track glistens with bright keys and a celestial melody. Brutalism is a raw architectural technique that boldly paves in monochromatic concrete and flashes invulnerability. Balanced elements hold the same amount of horizontal space and permit ornament impressions to chip away. Muffled claps design a crisp groove that is powerfully simplistic and strikingly omnipotent. Amid mundane perfection, the keys increase in seriousness and the structure in vigor. The electric guitar marks mid-track as well as a notable place with the EP. Shedding parasites that once sought refuge underneath calcified scales, the track stretches with possibility and tightens with youth.\n\nChromatic Minimalism’s rhythm cements itself into a colorless mosaic of reflection while shrilling AI sounds loop in a reverb of rhetoric. This track would be well suited for an underground warehouse party to help escape the chaos “upstairs”. The percussive-heavy cascara sets the tempo while the futuristic robotic samples evoke a modern complex. Chromatic minimalism is an alternative way to produce photos in photography. By focusing on few colors — when rendered — their pigments transcend their form, resulting in an illusion of the senses. Typically function typically follows form, that is, aside from modernist architecture. Winding in an impetus of hard-hitting drums helps to enliven pitches that lay outside the gamut. Mutualizing off one another, rattling tambourines circle the ear and successive vibraslaps swirl inward. Once the tinny cowbell strikes, a balance is restored amongst the track’s present-day abiotic factors.\n\nTime Is An Illusion’ meets a celestial eye to Brutalism’s elements, meanwhile the delusion of a predestinated path is lost through blinded sight. Ditian has versed himself in remixing vocal samples such as ‘Fine Day’ for Secret Weapons Part 11 and other melancholic vocals from respected artists such as Bob Moses, Jamie xx, and Moderat. Provoking a mental disassociation, the vocal sample in ‘Time Is An Illusion’ is also featured on DJ Koze’s ‘XTC’ and proven to secure dance-floor phantasms. The vocal’s brevity expands and contracts in accordance with the rhythmic fluttering of the mind. Linear and luminously aloof, the elements reflect the relative division between the shimmering past, the captivating present, and the sedating future. Eventually time’s intrinsic bomb ticks and clicks down heart-beats to an inevitable silence. At 5:20 a spotlight is shone on a murky and incredibly deep melody, adding in some of Ditian’s previous airy sounds with Kevin Di Serna in ‘Crystal Forest’.\n\nFalling underneath the melodic house/techno umbrella, Ditian’s tinkering robotic synths drip and drop around celestial grooves. Projecting a fluid placidity, tinny shakers clatter against striking synth-solos and flow in a bold tranquility – present and unforced. The EP’s percussive loop in ‘Broken Scenario’ battles the elemental layers of uncharted ruins. Next up, ’Brutalism’s high pitched keys help lighten the weight while the electric guitar’s intensifies gazes. Furthermore, the robotic samples and brassy cowbells in ‘Chromatic Minimalism’ twist and turn around the EP’s contemporary circuit. And in due timing, ‘Time is an Illusion’s deep sequences dance around the clock while the EP’s only vocal imprints an eye-closing melody to bask in. Tempering with nostalgic and futuristic tones, Ditian’s EP captures aligned essences with his recurrent melodies. Thus far, Ditian’s potential to independently construct wave mechanics has proven successful and further demonstrates his ability to parcel sound particles throughout time.\n\nDitian’s ‘Time Is An Illusion EP’ was released on August 15th on Exit Strategy.\n\nReview by Isabella Gadinis", "pred_label": "__label__1", "pred_score_pos": 0.8669573068618774} {"content": "Asked Feb 15, 2019\n\nConsider the gaseous reaction CO(g) + Cl2(g) COCl2(g). What is the expression for Kp in terms of K?\n\ncheck_circleExpert Solution\nStep 1\n\nThe equilibrium reaction and the equilibrium constant are given.\n\nThe square braces denote molar concentrations. The molar concentration is defined as the ratio of the mole(s) of the substance to the volume of the vessel containing the substance.\n\nStep 2\n\nLet the equilibrium system contain n1, n2 and n3 mole(s) of CO, Cl2 and COCl2 in a vessel having volume V. Therefore,\n\nStep 3\n\nLet T be the equilibri...\n\nWant to see the full answer?\n\nSee Solution\n\nCheck out a sample Q&A here.\n\nWant to see this answer and more?\n\n\nSee Solution\n*Response times may vary by subject and question\nTagged in\n\n\n\nEquilibrium Concepts\n\nRelated Chemistry Q&A\n\nFind answers to questions asked by student like you\n\nShow more Q&A add\n\nQ: Which of the following will have the highest boiling point? Justify your answer.A. 0.10 m sodium sul...\n\nA: The boiling point of normal compounds depends on the strength of the intermolecular forces between t...\n\n\nQ: Please drauuthe Mechanism for+this polumentzoben\n\nA: Chain initiation step include,\n\n\nQ: what is the vapor pressure if there is 1.20 molarity glucose solution at 250.15 degree celsius\n\nA: The vapour pressure of a solution is given by\n\n\nQ: Calculate the mole fraction of KI in a solution made by dissolving 3.4 g of KI in 5.8 g of water.\n\nA: Mole fraction = Mole of component ÷ Mole of all species in solution.    Moles of KI = 3.4g/166.00 g/...\n\n\nQ: Label each ionic compound as either \"soluble\" or \"insoluble\" in water: a. BaSO4  b. Na2CrO4  c. Cu3(...\n\nA: (a)On the basis of solubility rules, generally sulfate (SO42-) ion forms soluble salts but BaSO4 is ...\n\n\nQ: For the reaction 2 H2S(g) <==> 2 H2(g) + S2(g) the value of Kc = 1.6e-2 Calculate the value of...\n\nA: Kc  of the reaction is calculated as follows,\n\n\nQ: Fill in the missing mass number and atomic number for each of these particles or types of radiation....\n\nA: Alpha particle is a helium nucleus.  When a nucleus emits alpha particles, it undergoes decrease in ...\n\n\nQ: How many chloride ions (Cl1-) are needed to balance the positive charge of a Sodium ion (Na 1+)? a. ...\n\nA: For the balancing of ions, the number of positively charged ions must combine with same number of ne...\n\n\nQ: Which of the following reactions will occur spontaneously as written?   A. 3Fe2+(aq) + Cr3+(aq) ->...\n\nA: The relationship between ΔGo and Eo is shown below,ΔGo = -nFEo", "pred_label": "__label__1", "pred_score_pos": 0.9938130378723145} {"content": "Risk assessment\n\nMake Hazard Analyses Better\n\nAssess human factors to provide a more comprehensive and effective evaluation\n\nBy GC Shah, Wood\n\nHuman error is a culprit in many industrial incidents, including some catastrophic events. Some safety experts suggest that human errors contribute to 60% to 70% or more of these incidents. However, some process hazard analyses (PHAs) pay scant attention to human factors — i.e., how workers interact with various aspects of running and managing operations. Equally troubling, human factors get barely any consideration during the design stage.\n\nUntil we reach the point where all processes are totally controlled by robots and artificial intelligence without any human involvement, operator interactions with equipment, instruments and controls, as well as other operators, will continue to play a pivotal part in minimizing safety mishaps. Indeed, operator interaction has prevented many unsafe events from becoming disasters.\n\nTherefore, it’s crucial not just to realize that human faults continue to contribute to unsafe events but also to take steps to address such risks. This demands consideration of human factors in PHAs as well as design to minimize the possibility of human error.\n\nTrouble Spots\n\nBefore we discuss the ways to augment human factor considerations in PHAs and design, consider the following:\n\n• While best-in-class companies arrange multiple sessions during design and PHAs to discuss human factors, many other companies spend little time delving into human factors during a PHA.\n\n• Although the U.S. Occupational Safety and Health Administration’s process safety management regulation requires human factors as a part of risk analysis (29 CFR 1910.119 (e) (3) (vi)), it lacks specificity. As a result, some companies regard human factors in a very narrow sense, such as equipment accessibility by an operator, limiting the breadth of discussion during design as well as a PHA.\n\n• Many operating companies have laid off or otherwise lost experienced workers at plants. This robs new or relatively inexperienced operators of mentors. Proper training can address this issue to some extent. (See “Training Takes on an Added Dimension,” for some emerging developments.) Unfortunately, though, many plants have curtailed or eliminated training departments. So, effective operator training now is all too rare. Inadequate or improper training contributes to human error.\n\n• In some cases, operating instructions aren’t clearly written. Human errors can occur because of poor instructions or poor understanding by operators or both.\n\n• Today’s work force is substantially more diverse than that of 15 to 20 years ago. Language and cultural barriers could contribute to human errors. Safety managers and plant managers have the formidable task of ensuring that all operators and contractors have a clear unambiguous understanding of procedures.\n\n• Many plants rely on legacy control systems that didn’t consider human factors adequately. As a result, the human/machine interface (HMI) displays aren’t easy to grasp quickly. In the event of an emergency, the legacy systems could delay effective response by an operator. (New control and information systems do consider human factors in design, e.g., for the HMI.)\n\nEight Key Points\n\nHuman factors pervade nearly all activities in running and maintaining a plant and, therefore, are multidisciplinary. Many regulations and guidelines are available (e.g., ASTM 1166 “Standard Practice for Human Engineering Design…,” NFPA 101 “Life Safety Code…,” OSHA 3124 “Stairways and Ladders,” and others on alarm management and rationalization, HMI design, labeling, etc.).\n\nFigure 1 depicts human factors from a systems’ viewpoint and highlights the four key aspects: operator/equipment interactions; operator interactions with instruments/controls and networks; contractor interactions; and tasks. It also notes specific factors that can impact safety in the event of an error. The bottom-line during design is to match systems with average human capabilities. To enhance the effectiveness of human factors assessment, consider eight key points.\n\n1. At the strategic level, a safety professional or a PHA facilitator should evaluate the prevailing safety culture at your company. This could provide an opportunity to alert management to issues. Collect relevant data to show how human factors, or lack thereof, contributed to safety mishaps. Demonstrate that investment in human factors considerations (during design as well as a PHA) has an attractive return on investment. Get management’s buy-in.\n\n2. With management’s buy-in, you now face a decision — whether to do human factors as a segment of a PHA or distinct from the PHA. Generally, the size of a project determines the choice. For relatively small projects (e.g., skid-mounted units, minor changes in process piping, instrumentation or equipment), include the human factors assessment as part of a hazards and operability (HAZOP) study. For large projects (e.g., pilot plants, new process units involving several operations or major capital investments), it’s usually best to perform human factors assessment separately from a regular PHA.\n\n3. Small projects usually require only a single human factors assessment session. However, for large projects, it’s sensible to hold several sessions. Some topics to cover include equipment accessibility; operating/maintenance instructions; ingress/egress and escape routes; lighting; noise; stairs, ladders and platforms; crane operations; alarm management or rationalization; HMI design; control room layout and ergonomics; communications (especially in severe weather); and compliance with applicable regulations, standards and company guidelines. In addition, always consider possible impacts on human factors in other areas of the plant.\n\nDivide each of the topics into several sections or nodes. For each node, delve into appropriate issues in detail. For instance, here are some questions to ponder regarding accessibility:\n\n• Do the large valves have motor or hydraulic operators?\n• Does getting to valves at high elevation require a platform?\n• Should piping be re-routed so all valves are accessible?\n• Should valves at very high elevation have chain operators? (However, some organizations avoid chain operators out of concern that a chain operator may not be able to guarantee that a valve is tightly closed when required.)\n• Do maintenance people have adequate room to work?\n• Are some valves so close to the ground that operators will have a hard time operating them?\n• Are furnace burners’ and pilots’ fuel valves (which sometimes are under the furnace) safely accessible? In the event of unsafe conditions, can an operator quickly and safely exit from under the furnace? Is lighting sufficient?\n• Can an operator do several things simultaneously when required — for instance, watch the level indicator on a drum while opening a valve?\n• How accessible are drain valves on drip pans for large compressors or turbines?\n• Are all sampling points easily accessible?\n\n4. Factor-in generational and regional differences. For example, most-appropriate lighting, spacing and even furniture (chairs, desks) may differ from one generation to another. Similarly, the average size of people in the particular region of the world where the project is sited will influence, e.g., optimal chair and desk heights.\n\n5. Incorporate the issues you’ve identified into a detailed questionnaire. Its focus should be to ensure adequate consideration of human factors so as to minimize the possibility of human error. You may use applicable standards, regulations and company guidelines in developing the questionnaire.\n\nTo enhance PHA effectiveness and efficiency, send the questionnaire to the participants well ahead of the sessions so they have adequate time to carefully review the questionnaire.\n\n6. While a PHA offers an effective means to assess human factors, it doesn’t obviate attention to human factors during the design, procurement and installation stages. Consider holding several discussions with multidisciplinary teams during various design stages. Getting active participation from operators and maintenance personnel is important. Involve them in the PHA as well.\n\n7. Seek active and open participation from contractors, too. But, first, as part of the selection/approval process, ensure the chosen contractor has a robust safety system and culture.\n\n8. Consider holding several training sessions, preferably led by a human factors specialist, for professionals involved in design, procurement and construction.\n\nMinimize Human Errors\n\nIndustry clearly must place greater emphasis on human factors to improve safety. Addressing human factors requires participation of multiple teams. Operators, maintenance personnel and contactors play vital roles in ensuring an effective human factors assessment. Also, give human factors an integral role when assessing adoption of new technologies.\n\nGC SHAH, PE, is a senior consultant at Wood, Houston. E-mail him at ghanshyam.shah@woodplc.com.", "pred_label": "__label__1", "pred_score_pos": 0.7803927659988403} {"content": "You are here:Home/Resources/ Manuscripts in the Byzantine Collection\n\nManuscripts in the Byzantine Collection\n\n\nOpen Our Manuscripts\n\nIllustrated manuscripts are not simply texts. Neither are they simply a series of images. They are objects which combine text and image into a visual and verbal tool with particular uses and behaviors. We experience books sequentially by turning the pages. We can only experience a real book as openings, and then only one opening at a time. These animated manuscripts allow you to page back and forth through these books as they were intended to be used, and as they were used for hundreds of years before arriving at the museum.\n\nThe manuscripts in the Byzantine Collection available as digital facsimiles are listed below, along with links to high-resolution images provided by Harvard Page Delivery Service, the HOLLIS catalog records, and further information on the museum website.\n\nDumbarton Oaks Manuscript 1, fol. 32r\n\nGospel Lectionary\n\nDumbarton Oaks Manuscript One (Acc. No. BZ.1939.12)\n\nGospel lectionaries compiled episodes from the life of Christ, not in natural narrative order, but in the order they were read according to the liturgical calendar, beginning with Easter. One intriguing aspect of this manuscript is that there is a radical change between folios 41 and 42 from the more common columns to a text block in the shape of a cross, a form known only in a handful of surviving lectionary manuscripts.\n\nDigital facsimile | Table of lections | High-resolution images | HOLLIS record | Further information\n\nDumbarton Oaks Manuscript 3, fol. 266v\n\nPsalter and New Testament\n\nDumbarton Oaks Manuscript Three (Acc. No. BZ.1962.35)\n\nCompact manuscripts such as this one were primarily produced in the eleventh and twelfth centuries, as expressions of personal piety. Dumbarton Oaks’ MS 3, combining the Psalter, Odes and New Testament in a single column, is a luxurious, generously illustrated book with much of the text written in gold. It includes a table with dates for Easter for the years 1084 to 1101, and so can be dated with confidence to 1084.\n\nDigital facsimile | High-resolution images | HOLLIS record | Further information\n\nDumbarton Oaks Manuscript 4, fol. 151r\n\nGospels of Luke and John\n\nDumbarton Oaks Manuscript Four (Acc. No. BZ.1974.1)\n\nThis Gospel book contains only Luke and John, and so was perhaps part of a two-volume set. Scholars originally dated it to the latter twelfth century based on the style of the paintings. More recent paleographical study has indicated that the text is written in an archaizing script of a kind that was current in the latter half of the thirteenth century. This suggests that we may need to reevaluate the earlier date, given that the miniatures appear to be later additions.\n\n\nDumbarton Oaks Manuscript 5, fol. 2v\n\nGospel Book\n\nDumbarton Oaks Manuscript Five (Acc. No. BZ.2009.033)\n\nThis twelfth-century Greek manuscript is a fine example of a complete middle Byzantine Tetraevangelion. It contains a full set of elaborately decorated canon tables, Eusebios’ letter to Carpianus explaining the canon tables, chapter headings for each gospel, evangelist portraits, and the text of each gospel. Five folios have full page illuminations—Christ enthroned and the four Evangelist portraits—with figures painted against framed gold backgrounds.\n", "pred_label": "__label__1", "pred_score_pos": 0.712492823600769} {"content": "Contact us!\n\n\n\nYou probably never thought of taking advantage of this opportunity to store your savings and why not, your dreams too.\n\nFirst of all it is not complicated but you can proceed in total autonomy by turning to registered platforms. In our case we talk about, which deals with Equity CrowdFundin, an online fundraising system that allows a startup to collect funding thanks to people interested in investing in a project.\n\nWhy choose GardenStuff?\n\nFirst of all, innovative startups must have at least one technological innovation requirement out of three, we all own them: research & development, qualified team and intellectual property.\n\nLast but not least, we have the determination, courage and the most innovative ideas of the moment. Thanks to the funds we will raise, we will be able to fully develop our project that comes from a real need in the modern world: the need for people to integrate into a Green lifestyle. The target? Develop the IoT technology combined with plant care first.", "pred_label": "__label__1", "pred_score_pos": 0.7939735651016235} {"content": "Causes of Headaches and Diarrhea\n\nHeadaches and diarrhea can be caused by a viral or bacterial infection. According to Mayo Clinic, headaches and diarrhea can be caused by food poisoning. People who suffer from influenza or develop malaria can also experience headaches and diarrhea. If symptoms of headache or diarrhea do not stop or get worse, contact a health care provider.\n\n\nInfluenza is caused by a viral infection. Typically the viral infection affects the respiratory system and is very contagious. Symptoms of a flu infection can include a headache, congestion, nausea, diarrhea and vomiting, according to the University of Maryland Medical Center. Other symptoms can include chills and sweats, body aches and a fever that comes on suddenly. There are many types of influenza viruses, which is why it is recommended to get a flu shot every flu season. People who have a weakened immune system due to illness, work with children or are pregnant have an increased risk of catching the flu. Most cases of a flu infection will clear up on their own and treatment requires nothing more than drinking plenty of liquids and getting plenty of rest.\n\nFood Poisoning\n\nFood poisoning occurs when food or water that contain viruses, bacteria or parasites is ingested. Bacteria such as staphylococcus or E. coli are two of the most common causes of food poisoning. According to the Mayo Clinic, symptoms of food poisoning include headaches, diarrhea and abdominal cramps. Other signs of food poisoning can include weakness, fever and chills. Food poisoning is often a result of poor sanitary conditions, improper food handling or improper food storage methods. Food that is left out too long or that has been contaminated by someone who may have come in contact with a bacteria or germ can help contribute to a case of food poisoning. Treatment of food poisoning depends on the type of germ that causes it. In many cases rest and the replacement of lost fluids will be the only necessary treatment. Antibiotics may be prescribed for certain bacterial infections.\n\n\nAccording to the Mayo Clinic, malaria is a potentially deadly disease that is caused by a one-celled parasite called plasmodium. The parasite is generally spread through mosquito bites. Symptoms of malaria include headache, diarrhea, nausea and vomiting. Other signs include moderate to severe shaking and chills, profuse sweating and high fever. Malaria is often found in parts of the world where the climate is tropical or sub-tropical. Most developed countries with temperate climates are free from malaria. Travelers who visit foreign places--such as Asia, Africa or South America--where it is possible to come into contact with mosquitoes that carry malaria, are at risk for contracting the disease. According to the Mayo Clinic, treatment for malaria often requires one of several types of medicines including chloroquine, quinine sulfate or a combination of atovaquone and proguanil.\n\nIs This an Emergency?\n\nLoad Comments\n", "pred_label": "__label__1", "pred_score_pos": 0.732461154460907} {"content": "BarSmart.Systems, Art of Culinary\nBarSmart.Systems, Art of Culinary\n\n\nPushing the boundaries of perception while mesmerizing patrons with jaw dropping visual effects a strikingly bold new pop-up restaurant is touring a city near you\n\nAngelo Giordano has a unique, one of a kind 360 dining entertainment experience, that combines the power of 3D mapping, along with cutting-edge holographic technology, creating 4D visuals, bringing world class culinary artistry to life. From stage to table, Giordano's “Art of Culinary”, offers an exciting, memorable experience for the entire family!\n\nSomewhere between sense and sensibility, fantasy becomes reality and what’s real is left only to your imagination. Diners are immersed in a world of limitless possibilities as culinary art springs to life right before their eyes. The breath-taking decor and alluring atmosphere will captivate you to no end.\nAn expertly curated menu offers a story-line of authentic international entrees, prepared by in-house and celebrity guest chefs, hailing from every corner of the globe, creating a true feast for all your senses.\n\nArt of Culinary dining experience offers an unparalleled selection of fine wines , along with a variety of top shelf spirits and brilliantly hand crafted cocktails, amazingly garnished, creating a blissful work of liquid art, creating an interactive drink experience.\n\n\nFont Resize", "pred_label": "__label__1", "pred_score_pos": 0.9695010781288147} {"content": "Lord Berkeley's Seat\n\nArea:Loch Maree to Loch Broom\nClassification:Munro Top\n(also sub Sim)\nMaps:435(N) Explorer or 19 Landranger\nGrid Ref:NH064835         Hills nearby: 5km 10km 20km\nDaylight:dawn 07:29, sunrise 08:14, sunset 15:57, dusk 16:43\n\nview on a bigger map\n\n\nIf you need accommodation we have details of 10 properties offering rooms near Lord Berkeley's Seat. Here are some examples:\n\n4 Sykes Cottages Assessed Cottage\n£439-2516 per week\n15.3km (9.5 miles) away, sleeps 6\n3 Sykes Cottages Assessed Cottage\n£305-1573 per week\n12.5km (7.7 miles) away, sleeps 6\n3 Sykes Cottages Assessed Cottage\n£246-1469 per week\n12.5km (7.8 miles) away, sleeps 2\n", "pred_label": "__label__1", "pred_score_pos": 0.5377581119537354} {"content": "Saturday, September 10, 2016\n\nBuilding a Torrent of Waterfall Color\n\n\nI like building my scenes slowly. Some may think I am too timid, but I want to make sure I insure that the whites are reserved in all their luminous shades.It's the way light actually bends and moves through objects in space, so the light seems to actually be on the painting itself.  Here is how I do it, in this case a Waterfall Demo at Reddi Arts one of my teaching venues.\n\nAs you can see this initial \"ghost\" painting (no pencil in my case) is design to both \"draw in\" and map out the structure and the light.  I am not interested in shadows or detail, just light.  The background is the most important since in this piece the light is behind the trees. \n\nI slowly add hints of the waterfall and build the wet soft light gradations wet into wet.\n\nOnce the water is fleshed out (not fully detailed yet) I move to the yellow of the forest color.  This tells me just where the warm light hits the leaves (always the yellow and lights done first).\n\nI build on those yellow colors with my sap greens, olive greens and start moving toward the \"cool temperature\" greens, the chromes, sage and blue greens for the leaves in shadow.\n\nNot that a series of \"light\" relationships are established halftones and shadows can be introduced.  I mixed up some burnt umber and red and blue to get a more interesting cool shadow.  Burnt umber by itself can look a bit dead, so the other two colors in the mix add some luminosity to the shadow by adding a shifting light spectrum within the mix.  I gradually move out of the shadow using burnt sienna mixed wet into wet so there is some transition to the light.  \nI have also taken this moment while the watercolor in the waterfall wash is still slightly moist to add a bit of detail to the aqua colors. By doing this while it is slightly damp it gives the stroke a soft gentler edge, I also add some light purple shadows in the shadow areas.  \n\nI keep up this method building detail with a color related to the burnt sienna, raw sienna, a more golden light, because the leaves closer to the light would have more yellow than blue (the cool/warm on the color wheel concept).  Always be cognizant of what the temperature of your place is in the picture.\n\nAbove you can see I am starting only now to move deeper into the cooler shadow greens with cerulean and chrome, sometimes olives.  I worked a bit to try to keep an interesting aqua edge to the waterfall that both had color and softness for the cool spray on the water. Some leafy shadows above are added here with olives and a bit of cerulean.\n\nLast, with a bolder set of multi-color cool blues, and aquas, light thin purple, I do horizontal strokes for the water ripples while there is still some moisture in the paper.  If not when you put the light purples in first, then add the cool aquas boldly on top using slightly overlapping strokes in a horizontal fashion.  Be cognizant of the glow from the waterfall and the light on the water that must mirror that.\n\nAnd that's all there is to it!", "pred_label": "__label__1", "pred_score_pos": 0.8146907091140747} {"content": "The Face of Slavery: Them Dark Days\n\nTwentieth-century scholars of slavery have both slavery’s effects on the slave mentality and the development of culture (or lack thereof) and the existence of paternalism among the slave-holding class. However, authors such as Ulrich Phillips, Kenneth Stammp, and Eugene Genovese all approach the subject on broad, comprehensive terms, paying little or no attention to the individual. Dunsiberre, in his three-part book, Them Dark Days, tries to approach the situation from the opposite stance, hoping to find the greater truths behind slave life not in broad conceptual analysis, but in the individual. He gives names and faces to both the slaves and their masters. In doing so, he presents a grim picture of slave life under the peculiar institution: one that was neither paternalistic, nor civilizing. The central theme of his work, as stated in the Preface, is that slavery was even more horrific than previously thought. Paternalism, which he carefully qualifies, existed only to increase the fortunes of the masters through the newly-evolved capitalist mentality. Hatred and insubordination lurked in the minds of even the most privileged slaves. Through looking at detailed plantation records, travel journals and WPA interviews, Dusinberre constructs a very personal picture of slavery in the south. By exclusively dealing with the rice planting regions of Georgia and South Carolina, the author asserts that the slaves were not passive, although their rebellion only had limited success, and indeed no chance for true success. As the Yankee armies marched southward, and rice gave way to cotton and tobacco, the fortunes of the rice-planting class waned until the crop was extinct altogether. Among many of the caricatures Dusinberre paints are those of the slave-holding class themselves. Charles Manigault, his son Louis, and South Carolinian planter and later governor Robert Allston, to whom Dusinberre loosely applies the term “Gentlemen Capitalists”, established the Gowrie rice plantation just outside of Savannah, Georgia and its northern contemporaries Pee Dee and Chicora Wood, respectively. These enterprises were risky at best, as unpredictable forces such as disease, flood, and Civil War all determined the profitability of each year’s crop. However, these gentlemen planters were able to turn a profit. In the case of the Manigaults, an initial investment of $49,500 gradually turned into a respectable sum of $266,300 – a number that Dusinberre qualifies as including land and slave holdings. In addition, the sum is more than twice that of the 3% fixed-rate interest the shaky American bonds of the time had to offer. On the other hand, the cost of acquiring such a fortune was great, as $67,200 in Gowrie slaves were lost to disease and over-work, while the birth rate remained significantly lower. As a “Gentleman Capitalist”, Charles Manigault instilled a gentile education in both his wife and children. Travel, he believed, was essential to the development of the individual, and he applied this theory by spending several years with his family in France. He also made trips for business and pleasure to Wales, Egypt, and the Orient. As a wedding present for his second-born son, Louis, he gave the couple 10,000 dollars to spend on a trip through Europe. Dusinberre also focuses on Robert Allston’s Pee Dee and Chicora Wood plantations. Although somewhat lenient towards his slaves in some regards, Allston’s employment of tough overseers and emphasis on iron-fisted discipline created animosity amongst the slaves working for him. Unlike Charles Maginault, Allston despised absenteeism, and set up a residence near the plantation so that he could closely monitor its activities. Although ruthlessness prevailed amongst the slave-holding classes of the cotton-growing Southwest, one would not expect it of the well-bred Atlantic Coast rice growers. This was not the case, however, as the Manigault callousness has been well-documented in startling slave mortality rates. From 1833 to 1861, the slave mortality rate was nearly double that of the birth rate, while the infant mortality rate was a ghastly 90% – not including miscarriages and still-births. Pregnant women were privileged to have the medical attention of the well-trusted overseer, whose lack of expertise no doubt helped contribute to the 97 deaths of the 109 children born at Gowrie between 1855 and 1855. In only one year did the birth-rate exceed the mortality rate, as poor medical attention, cholera, measles, dysentery, and malaria decimated the Carolinian gentleman’s capital. Other problems included child-bearing risks and drowning. White people were not immune to the forces of nature, as is evidenced by Gowrie’s loss of four overseers over the course of those same years, but an analysis of the statistics reveals a profound difference in mortality rates between whites and blacks. Dusinberre asks the obvious question: why would a businessman, or more correctly a paternalistic businessman, allow his capital to die so frequently? The answer, he believes, lies in the nature of the system itself. Firstly, the paramount objective of maintaining slave-order and discipline undermined economic concerns, or, at the very least, evolved from them. A runaway slave who dies of the perils inherent in hiding out in a swamp sets the example for other slaves, and is therefore more valuable dead than alive and free. Absenteeism and cost-cutting were also important factors. As for families, they were on very precarious footing at Gowrie, and were inevitably unsuccessful. In the chapter “Unhappy Families”, the author tirelessly reconstructs the family histories of those living on the Georgia plantation. The perils that these families faced were uncountable. If by chance a pair of slaves reached adulthood, they could expect any manner of separation, including death, deportation, and voluntary separation. Furthermore, if they were lucky enough to have any surviving offspring, their children were unlikely to survive the tribulations peculiar to the rice-growing region or their master’s distaste for slave unions. Dusinberre points out the recent efforts of scholars to accentuate slave morality and family values in the face of an institution that clearly made every effort against it, but warns: “there may be a danger of exaggerating how much the slaves were able to achieve against the odds” (p. 121). Much has been made about the slave’s proclivity for insubordination, ranging from simply malingering to full-scale rebellions. Dusinberre, for his part, maintains that a rebellion in the rice growing regions was an impossibility. A slave-holder like Charles Maginaut, his sons, or the overseer could walk confidently through a field of a hundred slaves without fear. A series of three distinct, yet cruel threats kept his slaves in fear of their master’s hand. First, he would have the slave flogged, which he often euphemized as “just punishment”, by either the overseer or, preferably, another slave. Second was a trip to the Savannah jail house, were the slave would repeatedly be flogged over the course of his stay. The advantage of this was that the slave was whipped by a complete stranger, directing the slave’s anger at someone besides the owner or overseer; also, detainment meant that he could not run away at night. The third and most dreaded form of punishment was being sold down to New Orleans, which was more than an idle threat. Beyond this, there was always a looming reminder of white military prowess that kept the slaves from insurrection – or simply the fear of being reduced to a field-hand for privileged slaves. On Gowrie, the slaves found more mild forms of subversion, such as inefficiency or theft. With regards to malingering, Dusinberre maintains that while the slaves were often “inefficient” in their work, they were nevertheless quite “productive”, and that the slave/profit ratio was great until after emancipation. On the other hand, theft or unauthorized sojourns affected the entire slave population. Within a decade, two dozen fugitives had been charted in Gowrie’s records. Citing Eugene Genovese and Kenneth Stammp, among others, as perpetuators of traditional slave classification, Dusinberre looks to break down the long-held myths about the slave mentality by giving names and faces to his six classifications. Somewhere between the tooth-and-nail rebellion of Nat Turner and the bumbling innocence of “Sambo” lies the Gowrie plantation slave. Naming examples of each, the author details the personalities and treatment of the “determined” slave, the “truculent” slave, the “cunning” slave, the “upright conformist”, the “demoralized opportunist”, and the “proud” slave. Each vary in their level of indulgence toward their master, yet the common undercurrent is both the impossibility of achieving their goals under such an oppressive institution and a cognitive understanding of the causes and effects of their actions. A good example of this might be the “cunning” boatman Hector, who, after inheriting an old coat of Charles’, puffs himself up merely to indulge the master’s laughter. “Hector,” Dusinberre writes, “was up to playing the required role in order to make his masters feel good” (p. 173). Hector was Louis’s playmate, and a well-liked slave on the Gowrie plantation, and was therefore given privileges. Privilege came in two forms: those extended to the whole gang, and those extended to select individuals. The latter case resulted in the formation of what Dusinberre calls a “slave elite” at Gowrie. Privileges such as meat, special medical care, holidays, clothing rations, and shoes were doled out on select occasions to make the slaves believe they were favored by the master. Sometimes Charles Maginault would deprive the slaves of these amenities only to make them think themselves lucky when they were returned. When the plantation was in-between overseers, Charles and his family relied heavily on privileged slaves such as Driver George or Charles the Trunk Minder. “Without the assistance of the leading slaves, plantation operations could not have proceeded” (p. 194), Dunsiberre writes. Beyond the material benefits of skilled, privileged slaves, they offered their owners the belief that they were uplifting their slaves by affording them such responsibilities. In Allston’s case, the slave’s “faithfulness” was the most desired characteristic. However, this privilege was always undermined by a certain degree of hatred, as the paternalistic system Genovese or Phillips envisioned begins to break down under Dusinberre’s careful criticism. Although these “leading slaves” were granted certain privileges, the author reminds us that the paternalism of the slave-holding class that Eugene Genovese describes in Roll Jordan, Roll should only carefully be discussed with regards to southern rice growers, who were primarily – and above all – capitalists. When the northern armies came through during the Civil War, the Maginaults were somehow astonished to find out that all their trusted house-“servants” (they rarely used the word slave) had fled, defacing the families cherished portraits along the way. Slavery offered the planter-class ample opportunity to present what they felt was Christian morality and virtue. As an institution, Slavery was the embodiment of white supremacy, and in fighting the Civil War, the Southern states fought not so much to protect slavery, as Dusinberre argues, but to continue white domination from what Robert Allston feared: “the giving up of our country to the ravages of the black race” (p. 351). Britain and France had already abolished slavery, and emancipation was in the air. The treatment white plantations owners experienced upon returning to their homes illuminates the hatred the slaves felt towards the system. In concluding his inquiry, Dusinberre wonders aloud how a benevolent paternalistic society could evoke such hatred in its subjects. Simply put, paternalism did not exist – only hatred of the oppressed for their oppressors, and a capitalistic society of white planters that cared more for their own wealth and family’s prestige than even the most basic necessities of their “servants.”", "pred_label": "__label__1", "pred_score_pos": 0.7209951281547546} {"content": "Обзор лучших ресурсов по разработке бренда, разработке упаковки\n\ncontact us | ok@ohmycode.ru\n\n\n\nDesign: Alevtina Kolegova\nLocation: Russia\nProject Type: Concept\nPackaging Contents: Cosmetics\nPackaging Substrate / Materials: Plastic\n\nThe choice between what you want to take and what doesn't take too much space in your suitcase always arises while getting ready for the holidays. The number of things you can take with you is limited. Moreover, it is always nice to keep a spare space for souvenirs and shopping. We set ourselves a goal to develop a convenient travel packaging that takes up a minimum of space in a suitcase, would store the contents, and would also be convenient to use.\n\nWhat's Unique?\nA package that carefully stores the contents, and also protects from spilling liquid into a suitcase. The soft case allows you comfortably and effortlessly use the product.", "pred_label": "__label__1", "pred_score_pos": 0.955127477645874} {"content": "Most know about house insurance claims\n\nCanadians know quite a bit about their insurance\n\nIt has been found that 77% of Canadian surveyed know what is covered on their home insurance policies.\n\nThis means that people are asking questions and getting the answers that they need. Of the 1,503 people surveyed by TD in the first week of September 2010 more than half of the people said that they had made a claim on their insurance.\n\nOf that group 42% were surprised by what was covered and what was not on their insurance at the time of the claim.\n\nThe survey showed that Canadians most commonly believe the following is included in their home insurance:\n\n • Damaged or stolen property (82%)\n • Protection from liability if someone hurts themselves on their property (78%)\n • Roof damage from tree branches (73%)\n\nSome of the misunderstandings include how much would be covered if your lawn or garden is damaged. The correct answer is that there is a limited amount and hail is not covered for your prize garden.\n\nAbout 57% do not have an inventory of their contents. More than 66% do not advise their insurer when they buy something that is very expensive.\n\nWhen asked 36% of Canadians surveyed were right about water damage being the greatest cause of claims 37% of the time.\n\nCongratulations are in order. People are asking more questions and getting the answers they need on their homeowner insurance. To take control of your insurance means to ask for help when you need it and get the advice from the experts.", "pred_label": "__label__1", "pred_score_pos": 0.7769945859909058} {"content": "Originally posted by santantoni:\nre : Rikki\n\nHi Rikki, I am using BIAB v 2007.\nYou are too right...the intros and endings in BIAB sound NOTHING like dedicated hardware. In that respect,I like OMB a lot,because it plays the real intros form the PSR styles. Truly a killer feature .\nThe chord progressions created in BIAB are good,true...BIAB has other things that are missing elsewhere.\nI gotta say that I really like the PSR styles that OMB can play...I have a big bunch of them now,they sound really good.\nIf BIAB could read PSR styles too,and have the same intro - endings as OMB,it would be unbeatable. But nothing is perfect I guess...what matters in the end is that we use what we can to make the best music we can", "pred_label": "__label__1", "pred_score_pos": 0.7671656608581543} {"content": "Some life history aspects of threespined stickleback Gasterosteus aculeaus in Siahroud river (Southern Caspian Sea-Iran)\n\nUDC 597.556.25\n\nPatimar Rahman, Badraghi Behrouz**, Seifi Taghi***\n\n*, **Gonbad Institutes of Higher Education, Gorgan University of Agricultural Sciences\nand Natural Resources, Gonbad, Iran,,\n***Department of Fisheries, Faculty of Fisheries and Natural Resources,\nGorgan University of Agricultural Sciences and Natural Resources, Gorgan, Iran\n\n\nР. Патимар, Б. Бадрахи, Т. Сейфи\n\n*, **Институт высшего образования Гонбада, Горганский университет сельскохозяйственных наук и природных ресурсов, Гонбад, Иран,,\n***Кафедра рыболовства, Факультет рыболовства и природных ресурсов, Горганский университет сельскохозяйственных наук и природных ресурсов, Горган, Иран\n\nThe Gasterosteidae family has 2 species in Iran; ninespine stickleback Pungitius platygaster (Kessler, 1859) is native to Iran and threespine stickleback Gasterosteus aculeatus Linnaeus, 1758 appears to be of a “marine” form, which reported as an introduction to Iran by Abdoli (1993) and Coad and Abdoli (1993). In the range distribution of the fish in northern hemisphere, Iranian coast of Caspian Sea forms the southern limit of its distribution (Coad, Abdoli, 1993). To our knowledge, no detailed studies of the species have been exclusively conducted in the southern Caspian basin. We hypothesized that the south Caspian basin may contribute to habitat-specific variation in life history traits of threespine stickleback. Therefore, for a better understanding of life history of threespine stickleback from southeastern Caspian basin, this paper attempts to represent of first detailed information on this fish .\n\nThe present study was carried out in the mouth of SiahroudRiver which is situated at the south of Caspian Sea. It is a type of small stream rising on the humid north slope of the Elburz Mountains (MazanderanProvince). Sampling on the basis of once per month, was carried out using beach sein from November 2006 to July 2007. In the laboratory, total length was measured to the nearest 1 mm for all fish sampled. Total weight and weight of gonads were recorded with an electronic analytical balance to the nearest 0,01g. The age was determined from opercula taken from both sides. Sex was determined by examination of the gonad tissue either with eye or with the aid of a binocular. An analysis of co-variance (ANCOVA) was performed to test significance differences in weight-length relationships between sexes. The overall sex ratio was assessed using Chi square test (Zar, 1984). Comparison of GSI values during reproductive period and its temporal variation in each sex carried out by analysis of variance (ANOVA). Statistical analyses were performed with SPSS 11,5 software package and a significant level of 0,05 was accepted.\n\nOf the collected specimens, males ranged from 45 to 70 mm and 1,10 to 3,58 g, while females ranging from 45 to 98 mm and 0,96 to 4,02 g. Aging revealed that the older ages recorded were 3+ for both sexes. In the population, observed length-at-age were different between sexes, females were longer and heavier than males (ANCOVA, F=141,08, P<0,05). The most frequent size classes in the samples were 57–58 mm for males and 63–64 mm for females. Males were absent in the length classes larger than 69–70 mm. Length-weight relationship evaluated by using the lengths and weights were found significant with the high regression coefficient. The b-values of considered groups imply that the body shape of the fish displays negative allometric form (t-test, tmale=21,80, tfemale=7,17, tpopulation=13,01, p<0,05). All of individuals were sexed. Even though the overall ratio of males to females was 1:1,19, Chi-square analysis showed no significant differences from the ration 1:1 (χ2=3,02, p>0,05). An unequal sex ratio was observed among the length groups, males were dominant in length groups ranged from 55 to 60.\n\nSignificant changes were obtained in the temporal variation of GSI (ANOVA, Ffemale=21,09, Fmale=5,18, p<0,05). The GSI values of males were significantly lower than those of females (ANOVA, F=281,03, p<0,05). The highest average recorded values of GSI were in April for males and in May for females; 1,67±1,05 (SD) for males and 14,31±8,42 (SD) for females. Following the seasonal cycle of GSI, the reproductive period is extended from April to June when GSI is considerably higher.\n\nTwo kinds of eggs were found in the ovary, small white opaque eggs measuring between 0,32 and 0,66 mm with a mean value of 0,435±0,076, and large yolk-filled eggs ranged from 0,60 to 2,15mm with a mean value of 1,161±0,292 (SD). For Caspian stickleback ova diameter, both small and large ova, was negatively correlated to fish size (length or weight), an increase in female size (total length or/and weight) implied a decrease of ova diameter.\n\nTotal number of small eggs ranged from 311 to 4709 with a mean value of 1512,94±904,19 (SD), and of large yolk-filled eggs from 128 to 885 with a mean value of 454,32±195,23. The absolute fecundity ranged from a minimum value of 235 in a 1+ years old female weighing 1,96 g to a maximum value of 5460 in a 3+ years aged female weighing 2,56 g. The mean value of absolute fecundity was 1837,34±1028,96 (SD). For the fish in the southern Caspian Sea, both absolute and relative fecundities were positively correlated to fish size (length or weight).\n\nFecundity relative to total weight (g) fluctuated from 84,42 to 2441,61 eggs/g, with a mean value of 799,30±374,99 (SD), and relative to total length (mm) from 2,36 to 84 eggs/mm, with a mean value of 31,72±15,53 (SD). The relationships of relative fecundity with body size (either to length or weight) were also found to be statistically significant, but with low correlation.\n\nIn the present study, differences between males and females in the LWR are explained by the differences in size distribution of the two sexes as a consequence of inter-sexual differences in growth. The b-values estimated in the studied population are different from those cited by Wootton (1984) and Crivelly and Britton (1987). This reflects a change in body form with population, which is itself probably an effect of different environmental conditions influencing as local selective pressure on fish condition. In the SiahroudRiver, during this study, sex ratio was unlike that reported by (Wootton, 1984). In fact, the predominance of females is common in G. aculeatus populations and the differences in sex are highly significant throughout its range distribution (Wootton, 1984). Balanced sex ratio in the river is probably either the consequence of same survival rate and longevity of the sexes or the same endurance of the sexes to environmental variability.\n\nBased on the highest average recorded GSI, it is evident; the proportionate investment by fish in the reproduction is much higher in females than in males. In the river, comparison with other southern Caspian fishes, G. aculeatus has an extended breeding season (3 months). It is reported that the spawning season of the fish appears to vary with locality over the wide range of this species (Coad, Power, 1973).\n\nIn the population under consideration in this study, the mean large egg size (1,16 mm) is considerably smaller than that of recorded in other populations, and also the degree of size variability (SD=0,29 mm) exhibited by the Siahroud river population is greater. This variability coupled with small size of ova could be considered as maternally induced heterogeneity in offspring of a migratory population, a reproductive strategy by the population of the three-spined stickleback in the river.\n\nA wide range of values for the fecundity of the three-spined stickleback has appeared in the literature. The comparison of egg production by female is complicated because of the existence of two forms of the stickleback, the anadromus trachurus form with high absolute fecundity, and the freshwater leiurus form which has considerably less fecundity. Considering the absolute fecundity, the Sihroud river population is far more fecund, suggests being a trachurus type of the fish.\n\nIt can be concluded that the life history patterns of this species varied relatively to the habitat to which they exposed, showing a wide range of adaptations over its geographical range. The variations relating to growth and reproduction may be interpreted as phenotypic plasticity and adaptation to local environmental conditions.\n\nZoocenosis — 2009\nБіорізноманіття та роль тварин в екосистемах: Матеріали V Міжнародної наукової конференції. – Дніпропетровськ: Ліра, 2009. – С. 119-121.", "pred_label": "__label__1", "pred_score_pos": 0.9540408253669739} {"content": "Author: Rebekah Mardis, RD, CD\n\nLife is precious and fragile. Through the senses of your body, you have a unique experience of life. As a child you lived in the moment, you honored your body by doing what comes naturally. You ate when hungry, scratched when you had an itch, and yelled and laughed when you felt like it. As you aged you may have become more “civilized” by doing what is expected and by not making waves.\n\nYou may live without ever knowing what it is like to be alive. You may be constantly analyzing, reviewing, and planning — not paying attention to what is going on in your body at a given moment in time — as my mother says, “One foot in the future and the other foot in the past, while pissing on the present.”\n\nYour senses provide you a tool to cue into the moment. As an example: You may be experiencing anger, have a twitch in your left eye lid, smell bread baking, hear a bird chirping, feel your lungs filling your body with life giving oxygen, taste the remnants of an onion eaten earlier, and see someone you love intensely, all in one second of your life.\n\nIf you are used to living without sensing being alive, you may only cue into anger and shut out the rest of the sensations. But if you were to die right after that experience what would have really mattered? I doubt it would be the anger.\n\nWhen you begin to sense your body, life becomes very sensual. And what is important becomes clear — and that is being alive. Having a near death experience, a life threatening illness, and even recovering from an eating disorder can help bring perspective to life. Quoting the movie, Fight Club: “You are not your job, you are not the clothes you wear, you are not the money in your pocket.” If you are not all of these things, then who are you?\n\nFocus on what it feels like to have a body, your senses, your movement, tastes, smells, etc., and who you are is apparent — you are alive. Listen to what your body is telling you: if you are tired, take a nap — and enjoy it; if you are hungry eat what you crave and savor every bite; if you are sad then cry and feel the joy of having the ability to do so.\n\nIf you are full on life, you do not need food or substances to fill the void, you don’t even need others to complete you, and you are someone even if you are not care-taking others. You are complete just being you. You are alive and that is wonderful.\n\nWith the recent world events it is clear that life is precious and uncertain. If this is your last second, your last hug, your last meal, your last dance, it should be sensual and wonderful. It should be savored. Give yourself the permission to be alive by listening to your body.", "pred_label": "__label__1", "pred_score_pos": 0.5365779399871826} {"content": "Innate and learned behaviour\n\nUnstructured Uninvolved A responsive feeding style, high in nurturance and structure, a derivative of authoritative parenting, represents caregivers who form a relationship with their child that involves clear demands and mutual interpretation of signals and bids for mealtime interaction. Controlling feeding is embedded in an overall authoritarian pattern of parenting and may include over-stimulating behaviours, such as speaking loudly, forcing foods or otherwise overpowering the child. Egeland and Sroufe31 found that children of uninvolved or psychologically unavailable caregivers were more likely to be anxiously attached when compared with children of available caregivers.\n\nInnate and learned behaviour\n\nGift, talent, prodigy, expertise, exceptional ability, innate capacity, specific ability, potential, music Abstract Talents that selectively facilitate the acquisition of high levels of skill are said to be present in some children but not others.\n\nThe evidence Innate and learned behaviour this includes biological correlates of specific abilities, certain rare abilities in autistic savants, and the seemingly spontaneous emergence of exceptional abilities in young children, but there is also contrary evidence indicating an absence of early precursors for high skill levels in young people.\n\nAn analysis of positive and negative evidence and arguments suggests that differences in early experiences, preferences, opportunities, habits, training and practice are the real determinants of excellence.\n\nInnate and learned behaviour\n\nEven within a family there may be marked differences: It is widely believed that the likelihood of becoming exceptionally competent in certain fields depends upon the presence or absence of inborn attributes variously labelled \"talents\" or \"gifts\" or, less often, \"natural aptitudes\".\n\nAccording to an informal British survey, in music over three- quarters of the educators who decide which young people are to receive instruction believe that children cannot do well unless they have special innate gifts Davis, The judgement that someone is talented is believed to help explain as distinct from merely describing their success.\n\nIt is also widely assumed that the innate talent that makes it possible for an individual to excel can be detected in early childhood.\n\nThe Distinction Between Innate and Acquired Characteristics (Stanford Encyclopedia of Philosophy)\n\nWe will refer to the view that exceptional accomplishments depend on a special biological potential that can be identified in some young children but not others as \"the talent account\". The purpose of this target article is to examine the evidence and arguments for and against this account.\n\nThis issue has important social implications. A consequence of the belief that innate gifts are a precondition for high achievement is that young people who are not identified as having innate talents in a particular domain are likely to be denied the help and encouragement they would need in order to reach high levels of competence.\n\nIn everyday life people are rarely precise about what they mean by this term: Certain pitfalls have to be avoided in settling on a definition of talent. A very restrictive definition could make it impossible for any conceivable evidence to demonstrate talent.\n\nFor example, some people believe that talent is based on an inborn ability that makes it certain that its possessor will excel. This criterion is too strong. At the other extreme, it would be possible to make the definition of talent so vague that its existence is trivially ensured; talent might imply no more than that those who reach high levels of achievement differ biologically from others in some undefined way.\n\nOthers, such as John Antonakis, professor of organisational behaviour at the University of Lausanne, are of the view that it can be learnt. An article for Harvard Business Review, co-authored by. But, I h eard that “T E RF is a slur!”. The “TERF is a slur” meme is a way for TERFs to simultaneously attack and dismiss critiques of their ideology and behavior. Recently, a cisgender feminist used the term TERF and was immediately attacked – not for the observations she actually made – but for daring to distinguish between radical feminists and TERFs. Difference from nativism. In general usage, the terms innatism and nativism are synonymous as they both refer to notions of preexisting ideas present in the mind. However, more correctly, [citation needed] innatism refers to the philosophy of Plato and Descartes, who assumed that a God or a similar being or process placed innate ideas and principles in the human mind.\n\nYet those who believe that innate talent exists also assume that early signs of it can be used to predict future success. For the purposes of this article we will take talent to have five properties: Finally 5talents are relatively domain-specific.\n\nIn principle, it is desirable be precise about the indicators of talent, but in practice some imprecision is unavoidable, as in the phrase \"relatively domain-specific\" in 5. We would have preferred to be able to specify the boundaries between domains, but this is not currently possible.\n\nNor can one specify just how much a trait should facilitate the acquisition of special abilities to qualify as a talent: We allow the possibility that an innate talent can take different forms; so saying that each of two children have \"a talent for music\" need not imply that both are advantaged in precisely the same way.\n\nA domain may draw on many different skills, and individuals' competence levels on them may not be highly intercorrelated Sloboda, ; Like laymen, researchers typically believe that when they introduce the term talent they are predicting or explaining someone's performance, not just describing it.\n\nFor example, Feldmanwriting about child prodigies, remarks that \"it is not obvious what their talents will lead to\" p. For Feldman, talents cannot be acquired; they must be \"possessed\" innately by prodigies. He believes that they demonstrate \"exceptional pretuning to an already existing body of knowledge, one that countless others had spent time and energy developing and refining\" p.\n\nSimilarly, Gardner a equates talent with early potential, noting that \"a poignant state of affairs results when an individual of high talent and promise ends up failing to achieve that potential\" p. For Gardner, talent is defined as a sign of precocious biopsychological potential in a particular domain Gardner, ; b.\n\nThe possession of \"a strong gift in a specific domain, be it dance, chess or mathematics\" is recognised by Gardner when there is a coincidence of factors, the first of which is \"native talent\" p.\n\nAccording to him, individuals who accomplish a great deal are people who were \"at promise\" in relevant areas from early in life. For Heller p. Benbow and Lubinski agree that talent is explicitly biological: The above quotations make it clear that researchers and experts do make extensive use of the concept of talent to predict exceptional abilities and to explain their causes.\n\nResearchers as well as educators rely upon the talent account, making it important to examine its validity. Some previous challenges to the talent account have concentrated on the field of music.\n\nThey noted, for example, that in some non-Western cultures musical achievements are considerably more widespread than in our own see Section 3.The insect orients itself by responding to the stimuli it receives.\n\nFormerly, insect behaviour was described as a series of movements in response to stimuli. An overview of probiotics – their benefits and how they work, supplements and foods with probiotics, the best probiotics for different conditions, and possible side effects. Instinct or innate behavior is the inherent inclination of a living organism towards a particular complex simplest example of an instinctive behavior is a fixed action pattern (FAP), in which a very short to medium length sequence of actions, without variation, are carried out in response to a clearly defined stimulus.\n\nNutritional experiences in early life can have long-lasting consequences. To encourage the adoption of healthy eating habits, this topic explains the usual development of eating habits and how to distinguish common and often temporary eating problems from chronic disorders.\n\nChild nutrition: Developing healthy eating habits | Encyclopedia on Early Childhood Development\n\nInnate behavior is instinctual and genetic, while learned behavior is behavior that must be directly taught or learned from experience. Both types of behavior are present in the majority of animal species, including humans.\n\nInnate behavior is not taught, and the individual is born with the knowledge. Others, such as John Antonakis, professor of organisational behaviour at the University of Lausanne, are of the view that it can be learnt.\n\nAn article for Harvard Business Review, co-authored by.\n\nDifference Between Innate and Learned Behaviour: Learned vs Innate Behaviour Discussed", "pred_label": "__label__1", "pred_score_pos": 0.9817692637443542} {"content": "Battle of Sarmisegetusa\n\nBattle of Sarmisegetusa\n\nInfobox Military Conflict\n\nconflict=Battle of Sarmizegethusa\npartof=the Dacian Wars\ndate= 106\nplace=Transylvania, Romania\nresult=Roman victory\ncombatant2=Roman Empire\nThe Battle of Sarmisegetusa (also spelled \"Sarmizegethusa\") was a siege of Sarmizegetusa, the capital of Dacia, fought in 106 between the army of the Roman Emperor Trajan, and the Dacians led by King Decebalus.\n\n\nDue to the threat the Dacians represented to the Roman Empire's eastward expansion, in the year 101 Emperor Trajan made the decision to begin a campaign against them. The first conflict began on March 25 and the Roman troops, consisting of four principal legions, the units X \"Gemina\", XI \"Claudia\", II \"Traiana Fortis\" and XXX \"Ulpia Victrix\", defeated the Dacians.\n\nAlthough the Dacians had sustained a defeat during the First Dacian War, the emperor postponed the final assault on their capital of Sarmizegetusa to reorganize his troops. Trajan demanded severe concessions from the Dacians very hard peace conditions: Decebalus had to renounce all claims to portions of his kingdom, including Banat, Tara Hategului, Oltenia, and Muntenia in the region south-west of Transylvania. He also had to surrender all Roman deserters his troops had captured as well as the Dacian war machines. Upon returning to Rome, Trajan was welcomed as victorious leader, and in honor of his triumph he took the name of \"Dacicus\", a title that appears on his coinage of this period.\n\nHowever, during the years 103–105, Decebalus did not respect the peace conditions imposed by Trajan, and in retaliation the Emperor prepared to annihilate the Dacian kingdom and finally conquer Sarmizegetuza. The siege of Sarmizegetuza took place in the summer of the year 106. It is estimated that the Dacians most likely had less than 20,000 men capable of fighting the invasion.\n\n\nThe Roman forces approached Sarmizegetuza in three main columns. The first column crossed the bridge built by Apollodorus of Damascus, and then followed the valleys of rivers Cerna and Timiş up to Tibiscum. They then turned on the valley of the river Bistra, through the Tara Hategului depression. In these places, there were already Roman garrisons stationed from the first war, greatly easing the advance. They passed through Valea Cernei, Hateg, and Valea Streiului and destroyed the Dacian fortresses at Costesti, Blidaru, and Piatra Rosie.\n\nThe second column of the army is believed to have crossed the Danube somewhere near ancient Sucidava and then marched northwards on the valley of Jiu, linking with the first Roman column in Tara Hategului.\n\nThe combined forces of the two columns then began attacking the area of the Surianu Mountains, meeting sporadic but desperate resistance from the Dacians.\n\nThe third Roman column, most likely led by Trajan himself, advanced through eastern Muntenia, crossed the Carpathians at a location close to what is now Bran, and marched westwards through southern Transylvania .\n\nThe rest of the troops left from Moesia Inferior and passed through Bran, Bratocea, and Oituz and destroyed the Dacian fortresses between Cumidava (now Rasnov, in Romania) and Angustia (now Bretcu, in Romania). At the battle for the conquest of Sarmizegetuza the following legions participated: II \"Adiutirx\", IV \"Flavia Felix\", and a \"vexillatio\" of VI \"Ferrata\" which until this war had been stationed in Iudaea.\n\nThe Roman forces then enveloped Sarmizegetuza.\n\nOther Roman units are believed to have attacked other Dacian settlements and rally points, as far as the river Tisa to the north, and Moldavia to the east. Dacian settlements in the west, such as Ziridava, were completely destroyed in this period. However, Moldavia and Maramureş, located in modern day northern Romania, were never part of the Roman province of Dacia and would remain free from Roman rule.\n\n\nThe only historical record of the siege is the Trajan's Column, which is a controversial source. There is debate as to whether the Romans did actually fight for Sarmizegetuza, or whether the Dacians destroyed their capital while fleeing ahead of the advancing legions. Most historians agree that a siege of Sarmizegetuza actually took place.\n\nThe first assault was repelled by the Dacian defenders. The Romans bombarded the city with their siege weapons and, at the same time, they built a platform to more easily breach the fortress. They also encircled the city with a \"circumvallatio\" wall.\n\nFinally, the Romans destroyed the water pipes of Sarmizegetuza and obliged the defenders to surrender before they set fire to the city. Roman forces succeeded in entering the Dacian sacred enclosure, hailed Trajan as emperor, and then leveled the whole fortress. IV \"Flavia Felix\" was stationed there to guard the ruins of Sarmizegetuza. Following the conclusion of the siege, Bicilis, a confidant of Decebalus, betrayed his king, and led the Romans to the Dacian treasure which, according to Jerome Carcopino (p.73), consisted of 165,000 kilograms of pure gold and 331,000 kilograms of silver in the bed of the Sergetia River (Cassius Dio 68.14).\n\n\nDecebalus and many of his followers escaped the Legions during the siege. They fled east, probably towards the fortification of Ranistorum, the location of which is now lost, only to be caught by the Roman cavalry. Knowing the often brutal treatment of prisoners of war taken by the Romans, Decebalus killed himself to avoid capture.\n\nDecebalus' head and right arm were later presented to Trajan. The Romans reorganized Dacia as a Roman province and built another capitol at a distance of 40 kilometers from the old Sarmizegetuza. This center was named \"Colonia Ulpia Traiana Dacica Augusta Sarmizegetuza\". The Roman Senate celebrated the founding by ordering the minting of a sestertius dedicated to the \"optimus princeps\".\n\nLosses sustained in this war by the Dacians were tremendous, but the Roman army also took significant casualties in the conquest of Dacia. The first Dacian rebellion against Roman rule would coincide with the death of Trajan, in 117, showing impact the Emperor had on the Dacians after the war. Even in modern Romanian folklore (Romanians being the descendants of Romanized Dacians), Trajan was remembered as Traian, and his great wars with the \"people of the mountains\" are still remembered in Romanian epic songs.\n\n\n* Mihai Manea, Adrian Pascu, and Bogdan Teodorescu, \"Istoria romanilor\" (Bucharest, 1997), pages 107-122.\n* Cassius Dio, Roman History, books 67-68.\n* Jerome Carcopino, \"Points de vue sur l'ìmpérialisme romain\" (Paris, 1924).\n\nee also\n\n* List of Roman battles\n\nWikimedia Foundation. 2010.\n\nLook at other dictionaries:\n\n • Domitian's Dacian War — Not to be confused with the later Second Battle of Tapae during the Dacian wars. Battle of Tapae (87 AD) Part of the Dacian Wars Date 87 Location …   Wikipedia\n\n • Dacian warfare — Tropaeum Traiani depicting a soldier armed with a falx The history of Dacian warfare spans from c. 10th century BC up to the 2nd century AD in the region defined by Ancient Greek and Latin historians as Dacia. It concerns the armed conflicts of… …   Wikipedia\n\n • Coson — The golden denarius minted with the legenda ΚΟΣΩΝ. Due to the lack of written information regarding the Getae Dacians history, many important names related to their civilization remain either unknown or controversial. The controversy regarding… …   Wikipedia\n\n • Dacian bracelets — Dacian gold bracelet, dated to 1st century BC – 1st century AD, from Sarmizegetusa Romania [1][2] …   Wikipedia\n\n • List of battles before 601 — List of battles: before 601 601 1400 1401 1800 1801 1900 1901 2000 2001 current See also: List of Roman battles Before 500 BC5th century BC4th century BC*398 BC Siege of Motya Phoenician city Motya sacked. *397 BC Battle of Messene Ionian Greek… …   Wikipedia\n\n • Falx — For other uses, see Falx (disambiguation). The Roman monument commemorating the Battle of Adamclisi clearly shows Dacian warriors wielding a two handed falx. Falx is a Latin word originally meaning sickle, but was later used to mean any of a… …   Wikipedia\n\n • Decebalus — Decebal redirects here. For the village in Soroca district, Moldova, see Tătărăuca Veche. For the village in Satu Mare County, Romania, see Vetiş. Decebalus or Diurpaneus King of Dacia …   Wikipedia\n\n • Dacia — This article is about a historic region in Central Europe. For the Romanian automobile maker, see Automobile Dacia. For other uses, see Dacia (disambiguation). See also: Dacians and Dacian language Dacian Kingdom independent kingdom …   Wikipedia\n\n • List of rulers of Thrace and Dacia — Map of Ancient Thrace made by Abraham Ortelius in 1585 This article lists rulers of Thrace and Dacia, and includes Thracian, Paeonian, Celtic, Dacian, Scythian, Persian or Ancient Greek up to the point of its fall to the Roman empire, with a few… …   Wikipedia\n\n • Timeline of Romanian history — Prehistory* 1,000,000 700,000 the appearance of the first carved tools, the so called Pebble culture ( Cultură de prund in Romanian). These tools have been attributed to the Homo erectus hominid type.* cca. 40,000 BC the oldest modern human (Homo …   Wikipedia\n\nShare the article and excerpts\n\nDirect link\nDo a right-click on the link above\nand select “Copy Link”\n", "pred_label": "__label__1", "pred_score_pos": 0.6633253693580627} {"content": "Mesterlære - en undersøgelse af begrebet mesterlære i en historisk kontekst\n\nGry Nielsen-Jexen\n\nStudenteropgave: Kandidatprojekt\n\n\nThis thesis seeks to investigate in the historical development of the old concept of apprenticeship in connection with the transformation of Danish vocational education. By analysing the cultural history of the concept of apprenticeship, through the publications on Håndværkets kulturhistorie (the cultural history of the craft) (Degn & Dübeck m.fl. 1981-1984) and Dansk vekseluddannelse i støbeskeen (the molding of danish vocational training) (Sigurjonson 2002) it shows that the concept of apprenticeship within the craft sector, was originated as a tradition in the associations of craftsmen from the Middle age. At this time the concept of apprenticeship consisted of oral assignment of craft-related knowledge and techniques from master to apprentice. My conclusion is that, by the establishment of the concept of apprenticeship, it had a two-dimensional shape: 1) the personal dimension of the master’s influence on the apprentice, through his distinctive artistic expression and creative solutions, as well as his fatherly educational role in the household (to become someone) and 2) the handover of knowledge about craft engineering (to master something). School is a counter-concept for apprenticeship, and I find that especially the introduction of schooling in 1814 has had greatly influenced on the development of the concept of apprenticeship. I find that through the legislation and the reforms of Danish vocational education, through time, the concept apprenticeship has gone from its original two-dimensional form to contain only to second dimension to master something. By discussing my recitals with some of Klaus Nielsen and Steinar Kvales' sights in the book Mesterlære – læring som social praksis (The concept of Apprenticeship - learning as social practice) (1999) and the analysis done by Steen Wackerhausen in the article Det skolastiske paradigme og mesterlære (the scholastic paradigm and apprenticeship) (1999) I come to the conclusion that, whilst Nielsen and Kvale calls the concept of apprenticeship “outdated” and Wackerhausen believe that it is in “decline”, I find that by the influence of the concept of school, which has removed the dimension of becoming someone, the concept of apprenticeship contains now only the second dimension to master something. That means that the concept of Apprenticeship is neither outdated or declined, it has simply become something else.\n\nUddannelserPædagogik og Uddannelsesstudier, (Bachelor/kandidatuddannelse) Kandidat\nUdgivelsesdato19 dec. 2018\nAntal sider30\nVejledereSøs Anne-Lise Bayer\n\n\n • mesterlære\n • pædagogik\n • begrebshistorie\n • erhvervsuddannelser", "pred_label": "__label__1", "pred_score_pos": 0.7032639980316162} {"content": "|  | \n\nLegal Matters\n\n\nDespite challenges resulting from the US sanctions, the European Union (EU) together with all partners will attempt to preserve the Iran Nuclear deal, says EU's High Representative for Foreign Affairs and Security Policy, Federica Mogherini.\n\nShe made the remarks in a statement during her visit with Austrian President Alexander Van der Bellen, reported Islamic Republic News Agency (IRNA).\n\nWe also had the opportunity to exchange views on the work we are doing to preserve the Iran nuclear deal that reached after long negotiations here in Vienna, so we have to keep the Vienna spirit. For - again - the sake of our own security, the statement read.\n\nThe agreement is working, it is a challenging exercise to keep the agreement in place with the re-imposition of the US sanctions, but we are working together, including with Austria, with all our Member States, with all our partners around the world, to make sure that this continues to be the case.\n\nThe UN nuclear watchdog IAEA has on several occasions verified peaceful nature of Iran's nuclear program under the JCPOA, to which Iran has remained committed since it went into force.\n\nThe JCPOA stands for Joint Comprehensive Plan of Action, the official name of the agreement reached between Iran and world's six major powers in 2015 to give Tehran sanctions relief in return for scaling back its nuclear program.\n\nAfter Washington's May 8 exit from the deal, the US gave 90 to 180 wind-down period to other countries before it starts re-imposing oil sanctions on Tehran on November 4.\n\nPart of the US illegitimate sanctions were imposed on Iran on August 9.\n\nTrump also said he would reinstate the US nuclear sanctions on Iran and impose the highest level of economic bans on the Islamic Republic.\n\nTehran filed a lawsuit with the International Court of Justice (ICJ) against the US for the latter's unilateral withdrawal from the 2015 landmark nuclear deal.\n\nTehran says the US withdrawal violates the Treaty of Amity, Economic Relations and Consular Rights between the two countries that was signed in 1955.\n\nThe treaty comprising of an introduction and 23 articles was signed in Tehran and ratified by the Iranian government of the time. The government was permitted to exchange the related documents, following ratification by the National Consultative Assembly.\n\nThe Hague Court started its hearing sessions on the case August 27. Two sessions have so far been held at the Hague Court during which the US and Iranian officials discussed their views on the issue.\n\n", "pred_label": "__label__1", "pred_score_pos": 0.6779094934463501} {"content": "Vision, in the broadest sense, is the global ability of the brain to extract, process and act on information presented to the eye. This complex process can be thought of as three major but related areas: visual acuity, which is largely dependent upon refractive status and eye health; visual efficiency skills, representing eye focusing, teaming, and tracking skills; and visual information processing, representing the ability to recognize and discriminate visual stimuli and to interpret them correctly based upon previous experience. Every examination we provide for children, regardless of the child’s age, has these thoughts in mind.", "pred_label": "__label__1", "pred_score_pos": 0.9992436766624451} {"content": "The myths and legends surrounding the giant squid\n\nIt is about the power of the imagination, showcased by Mickey experiencing a dream during a night in which he is sleeping. It originated at Disneyland in after Disneyland's entertainment department was asked to create a nighttime spectacular involving water and fireworks to invigorate the space in front of the Rivers of America. Much of the area around the Rivers of America needed to be reworked, including terracing the walkways to accommodate viewing and modifying part of Tom Sawyer Island so that it could act as a stage for much of the show's live action. The show temporarily closed at Disneyland in to make room for Star Wars:\n\nThe myths and legends surrounding the giant squid\n\nPort Manteaux churns out silly new words when you feed it an idea or two. Enter a word (or two) above and you'll get back a bunch of portmanteaux created by jamming together words that are conceptually related to your inputs.. For example, enter \"giraffe\" and you'll get . Bowser Jr. makes another appearance in New Super Mario Bros. Wii as the secondary antagonist. This is the first game in which he appears along with the Koopalings, who were Bowser's original seven Jr. leads the Koopalings in this adventure, receiving a personal single-seater airship similar to that of his father, albeit smaller. 🔥Citing and more! Add citations directly into your paper, Check for unintentional plagiarism and check for writing mistakes.\n\nReal Sea Monsters and Mythical Creatures of the Deep Updated on October 20, more With interests in science, nature, and the paranormal, cryptid explores fringe topics from a unique and sometimes controversial perspective. Of all the things sailors considered to be bad luck getting dragged to the depths of the sea by a giant monster was surely at the top of the list.\n\nSource Mythical Sea Creatures Myths of sea monsters have been in existence likely since the first moment early humans laid their eyes on the ocean. No doubt their imaginations began to manufacture all sorts of amazing and terrifying sea creatures that might dwell beyond the rolling surf. When Europeans began travelling regularly to the New World, sailors who crossed the massive oceans braved dangerous seas, huge storms, enemy navies and maybe even a few pirates.\n\nBut just as they feared the dangers above the waves, they were still wary of what may await them beneath. In fact, they so worried about the beasties of the deep that some maps of the day marked the locations where these animals were said to haunt.\n\nToday the ocean remains mysterious for most of us, dark and a little frightening. But what if there was some truth to the myths and legends of ancient sailors? Real Sea Monsters The sailors of days gone by believed in many terrifying creatures. Some sound funny today, and we can chalk it all up to superstition and nerves, but on the other hand these sailors had to be seeing something.\n\nDid they imagine it all? Dip a little too deep into the rum cask, maybe?\n\n\nOr, perhaps they were actually seeing real sea monsters. The Kraken The kraken is a monstrous, multi-tentacle sea creature capable of emerging from the depths and dragging a ship to the bottom.\n\nIt sounds insane, but could there be some truth to these stories? We now know of giant squid capable of reaching over 30 feet in length, a true sea monster. And, there is another species called the Colossal Squid, just as long with a more massive body.\n\nSquid usually dwell in deeper water by day, and come closer to the surface at night. There are even a few tales of giant squid attacking boats. Could sightings of these massive creatures have led to stories of the Kraken?\n\nReptiles Are Abhorrent - TV Tropes\n\nThe giant and colossal squid are two animals that are only recently coming into the scientific light. In the past, surely they would have been considered monsters.\n\nMermaids Top like a woman, bottom like a fish. It might sound like a good thing, but mermaids were bad luck for sailors who believed they would enchant them into losing their loot, or even their lives.\n\nOne explanation for these sightings could be the manatee. Manatees are large, aquatic mammals with flippers they can use like arms, and paddle-like tails. Though one would have to imagine these sailors to be awfully lonely indeed, some experts say the isolation and stress brought on by long sea voyages could very well cause such a misidentification.\n\nDid lonely sailors mistake the manatee for a mermaid?Pokémon are a non-Mario species, which is currently made up of members, in the Pokémon series, that each have unique abilities. There are eighteen different elemental types of Pokémon; each type affects the Pokémon's attacks, abilities, and weaknesses.\n\nThe myths and legends surrounding the giant squid\n\nFor example, Pikachu, being an Electric Pokémon, specializes in electrical attacks, which is effective against Flying and Water. Muffins English muffins, crumpets, scones & bannock American muffins Blueberry muffins. Researching the history of bread-related products is difficult because bread is THE universal food.\n\n\"Fantasy\" here can mean anything from your typical sword-and-sorcery medieval story, to modern Urban Fantasy.\n\nThese can be played completely straight, or parodied to heck and back. Cetaceans are divided into two parvorders: the largest parvorder, Mysticeti (baleen whales), is characterized by the presence of baleen, a sieve-like structure in the upper jaw made of keratin, which it uses to filter plankton, among others, from the water; Odontocetes (toothed whales) are characterized by bearing sharp teeth for hunting, as opposed to their counterparts' baleen.\n\nThe fauna of Ireland comprises all the animal species inhabiting the island of Ireland and its surrounding waters. The Mermaids: fact or fantasy? Stories of Mermaids have been told for centuries, be it in the form of folklores, legends or fairy tales.\n\nImages of this creature have plagued artists and writers in their efforts to bring to life the mystery, beauty, and yes, eroticism of the mermaid to their audiences.\n\nPort Manteaux Word Maker", "pred_label": "__label__1", "pred_score_pos": 0.6699200868606567} {"content": "Demand for BPOs in your area\n\n|   Log In |   Contact  |  Become Member     Search for BPO Professional  |  Home  |\n\nIs there a demand for BPOs in my area?\n\nBroker Price Opinions BPOs are in demand all over the United States. Banks, Lenders, REO Asset Managers, BPO Companies, Appraisal Management Companies AMCs order thousands of BPOs every day across the country. BPOs have become a preferred method of obtaining a valuation on a residential real estate property. There are multiple reasons for financial organizations to obtain a valuation on a property click here for typical Reasons for BPOs . Essentially every house in a Real Estate Agent or Broker’s service area has the potential for multiple BPOs.\n\nThere is definitely demand for BPOs and as the population grows so will the demand. The availability of work depends mostly on the number of Agents and Brokers performing BPOs in any area.", "pred_label": "__label__1", "pred_score_pos": 0.6000300645828247} {"content": "Offerings (for Teens)\n\n\nThe teen years can be challenging times for parents as well as teens  themselves.  How can you navigate the rough waters of these years while  still maintaining your dignity and standards?\n\nHow can you deal with peer pressure and still feel good about yourself?\n\nHow can you develop social skills without compromising your own values?\n\nHow can you deal with the challenges that emerge during the teen years?\n\nHow can you take your frustrations with your parents and transform them  into opportunites to have a closer relationship with your parents?\n\n We can help you address these issues and more.  We offer: \n\n • Coaching (at our location as well as in-home coaching)\n • Teen Circle\n\n\n\nTeen Circle\nJoin us for a unique opportunity to meet other teens.  In addition to  getting together socially, we discuss the challenges facing all of us in  our lives.  With the support of others and the exchange of ideas, come  learn new skills to help navigate the challenges.", "pred_label": "__label__1", "pred_score_pos": 0.5856045484542847} {"content": "Legal Alien Essay\n\nLicup you\n\nMetaphor, Tone and Antithesis in \" Legal Alien\"\n\n\" Legal Alien, \" a collection coming from \" Chants, \" is known as a short free of charge versed poem written by Terry Mora. The poem is exploring the lives of Mexican-Americans and the social tension they need to face. The poet talks about a bi-cultural person whose parents are via Mexico but the person came to be and brought up in America which is an American resident by law. Even though he can speak fluent English and Spanish, he keeps having a hard time becoming accepted by both or one race. Mora's utilization of poetic methods such as metaphor, tone and antithesis focuses on her issues in regards to the issue.\n\nMora uses metaphor to focus on how a bi-cultural individual feels like not being recognized by both equally races. \" a convenient token\" (line 16) notifies the readers that the bi-cultural individual is like a handy device that can very easily slide from back to out, from British to Spanish (vice-versa). Anyone can also adjust very quickly, faster than those who has only one lifestyle. \" between your fringes of both worlds\" (line 18) notify the readers that even though the speaker's competition is Philippine and his nationality is American the loudspeaker isn't completely accepted simply by both competitions. Mexicans view the speaker while an strange (line 10) while American view him as exotic, inferior of course different (lines 9-10). With this situation, the speaker feels lost in both competitions thus having an id crisis.\n\nUsing tone forms the concepts of the poem and communicates the poet's aggravation to cultural tension. \" able to slip coming from, \" How's life? \" to \" _Me'stanvolviendo loca\" _\n\n(lines 2-3) this line informs the readers that although the audio can speak both dialects fluently your woman isn't accepted by both races totally and the speaker is disappointed, this is evident when the girl said \" _Me'stanvolviendo loca\" _(line 3) this means \" they are driving me crazy\" in English. \" By smiling by masking the soreness of being pre-judged Bi-laterally\" (lines 19-22) the speaker is unease and sad...\n\nThe Importance of Being Earnest Composition", "pred_label": "__label__1", "pred_score_pos": 0.96291583776474} {"content": "(888) 676-7128\n\nNeed Affordable Small Business Lawyer Near You?\nSubmit your details or call a legal rep (888) 676-7128\n\n\nFederal IRS/Tax Laws are essential, but so are State Tax Laws.\n\nState tax returns are as crucial as Federal Tax returns are, and filed around the same time as the Federal Taxes.\n\nAlthough several state tax codes are the same as Federal tax codes, there are usually some key differences between the laws in the different states, which is essential to take note of, before the tax process begins.   \n\nCongress must write the Internal Revenue Code (IRC), which is also known as the Tax Code, which is involved in directing the process of collecting taxes, enforcing tax rules, and issuing tax refunds.\n\nThe Internal Revenue Service (IRS) refers to the government agency within the Department of Treasury of the United States that implements the following functions.\n\nThey make use of revenue rulings, procedures, and letter rulings in offering guidance.\n\nThey interpret the tax laws through their edicts and regulations, which guide the application of tax laws.  \n\nHowever, the federal courts own the final say concerning how to interpret the tax code, regardless of what the IRS explains it to be.\n\nThe taxes collected from individuals and companies based on their income, sales, real estate, and payroll are usually distributed by the Federal Government, according to the budget of the country.\n\nThese taxes are then used to finance programs such as Education, Welfare services, National defense, Social security, and so on.\n\nTypes of Tax Incomes\n\nThere are two types of Income: Earned and Unearned Income.\n\nEarned Income refers to wages, tips, commissions, sick pay, bonuses, unemployment benefits as well as other no cash benefits,\n\nwhile Unearned income depicts incomes such as interest, business, and farm income, rents, alimony, winnings from gambling, assets, profit from sales, and so on.", "pred_label": "__label__1", "pred_score_pos": 0.6173789501190186} {"content": "Module Identifier CS25510  \nAcademic Year 2000/2001  \nCo-ordinator Dr Mark Ratcliffe  \nSemester Semester 1  \nPre-Requisite MA13310 , CS15410  \nMutually Exclusive CS14020  \nCourse delivery Lecture   20 lectures  \n  Workshop   (Up to) 1 workshop session  \n  Practical   (Up to) 10 x 2 hr sessions  \nAssessment Exam   2 Hours   100%  \n  Supplementary examination   Will take the same form, under the terms of the Department's policy.    \n\nGeneral description\nThis module introduces digital electronics in the context of studies in software development. It extends a general understanding of computer architecture.\n\nThis module introduces students to the principles of computer hardware (digital electronics), and explains how components work at the level of gates, flip-flops etc. It provides hands-on experience of computer hardware, including the use of a microcontroller to actually control something.\n\nLearning outcomes\nOn completion of this module, students will be able to:\n\n1. Digital Electronics - 3 Lectures\nLogic levels and voltages. Electricity: voltage and current in a wire. Electrical noise: inputs and outputs; bi-directional data flow along a (bus) wire. Types of output. Tri-state outputs.\n\n2. Combinatorial logic - 3 Lectures\nRevision of basic gates. Specific uses: address decoding, data routing, ALU functions.\n\n3. Sequential logic - 3 Lectures\nLatches (RS, D and JK). Buffers, registers, counters and shift registers.\n\n4. Buses - 3 Lectures\nControl lines. Timin diagrams. Exotica: handshaking, arbitration.\n\n5. Example microcontroller - 4 Lectures\nOverall architecture. I/O devices: digital I/O, pulse counters, pulse generators, clocks, PWM, analog I/O\n\n6. Memory types - 1 Lecture\n\n7. Hardware components in bigger computers - 3 Lectures\nMMU. Dual-port RAM (for graphics).\n\n8. Truth table exercise - 1 Practical\nThe truth table of a combinatorial logic chip.\n\n9. Monitoring operation exercise - 4 Practicals\nWatch a trivial program in operation.\n\n10. Programming exercise - 2 Practicals\nWrite, download and execute some trivial program onto a microcontroller involving tangible output, preferably responding to an input of some kind. Example: ding-dong door bell.\n\nReading Lists\n** Consult For Futher Information\nRonald J. Tocci and Frank J. Ambrosio. (2000) Micorprocessors and Microcomputers: Hardware and Software. Prentice-Hall 0-13-010494-9\nPeter Spasov. (1999) Microcontroller Technology: The 68HC11. Prentice-Hall 0-13-901240-0\nThomas L. Floyd. (1997) Digital Fundamentals. Prentice-Hall 0-13-573478-9", "pred_label": "__label__1", "pred_score_pos": 0.96305251121521} {"content": "Yixing Calligrapher's Tea Pot\n\n\nYixing pottery, forged from deep within the mines beneath the earth of Jiangsu Province, is an ancient Chinese stoneware meticulously crafted from various types of clay fortified with stones and minerals.  Since the time of the Ming Dynasty, Yixing pots have been considered the finest choice for tea preparation and enjoyment.  The elegant and simple forms are often inspired by themes of nature, geometry, or the whims of the crafts person.\n\nThis diminutive pot, crafted of lustrous zisha clay, rests beautifully in the hand, the gentle sloping sides, smooth and soothing to the touch. Yixing pots are not glazed, but porous, allowing the vessel to retain the nuance of the tea with use.  This is a highly desirable quality, referred to as \"seasoning\".  As such, it is recommended that you commit to one type or similar varieties of tea for each vessel.  For this pot, we might suggest our Song Zhong Phoenix, a roasted oolong with fragrant notes of pear, osmanthus and melon. To clean, simply rinse the pot with warm water after use, without soap.  The tea pot will develop a delicate, prized patina over time. With care, it will last a lifetime, continuing to improve with age.\n\nDimensions:  6\" length x 4\"width x 4 3/4\"height\n\nCapacity: 7oz.\n\nAlso shown with Zisha Gong Fu Tea Cups.", "pred_label": "__label__1", "pred_score_pos": 0.9195977449417114} {"content": "Coaching Association of Canada\n\n\nStage of Activity \n\n\n\n\n\n5 - 10 minutes\n\nNumber of People\n\n\nHow it Works\n\nAll athletes line up single-file, with enough room for athletes to move around them (e.g. arms length if running; bike length if cycling; two arms length if skating; ski length if skiing, etc.).\n\nOn “GO” the team starts moving (jogging, skating, skiing, paddling, wheeling, etc.) very slowly, maintaining the distance between each person. The last person moves faster, weaving in and out of the players ahead until they reach the front of the line.\n\nOnce the back person is at the front, they slow the group down, decide on the direction, and resume the lead while the “new back person” weaves through the team.\n\n\nTeamwork, aerobic endurance, agility, body and space awareness, pacing\n\n\nThe back “weavers” start sooner, for example after the person has dodged through two or three people. This reduces time between each athlete’s turn to weave, therefore allowing for more repetitions per player.\nPass an implement when weaving.", "pred_label": "__label__1", "pred_score_pos": 0.9811164140701294} {"content": "End of the Milky Way: Galaxy is DYING as it is pushed and shoved around supercluster\n\nTHE Milky Way is slowly dying as it is being pushed and pulled apart by its local cluster of galaxies – but before all of this it will be obliterated by the Andromeda galaxy, an expert has claimed.\n\nThe Milky Way galaxy is part of a cluster of galaxies called the Virgo Cluster, which in turn is part of an even bigger cluster of galaxies known as the Virgo Supercluster. The Virgo Supercluster is 110 million light-years across and contains roughly 110 billion times the number of stars in the Milky Way. The Milky Way contains between 100 billion and 400 billion stars, according to . The numbers are almost incomprehensible, but what is certain is that it equates to a lot of gravity.\n\nWith all the gravity, there is a lot of push and shove in the supercluster, which is stripping the galaxies of their hydrogen.\n\nWithout hydrogen, stars cannot be created.\n\nBillions of years in the future, there will be no more hydrogen to create new stars, and the current crop of stars have a finite lifetime.\n\nThe lifetime of a star is relative to its mass – our Sun has enough mass to continue fusing hydrogen for about 10 billion years.\n\nmilky way\n\nEnd of the Milky Way: Galaxy is DYING as it is pushed and shoved around supercluster (Image: GETTY)\n\nNicholas Webb, from the University of London, wrote on Q+A site Quora: “Our galaxy isn’t alone. It is part of a small group of galaxies that are gradually coming together to form one gigantic galaxy\n\n“This is the Virgo Supercluster, a cloud of galaxies centred on the Virgo Cluster, a dense, well, cluster of galaxies a quadrillion times the mass of our Sun.\n\n“The Cluster is 16.5 million parsecs away, and yet its gravity still pulls our local group toward it.\n\n“Within the Virgo Cluster, its immense gravitational pull pushes galaxies to near-relativistic speeds, blasting away their free hydrogen, and leaving them bereft of new stars.\n\nREAD MORE: Black hole shock: Human body would be ‘turned to spaghetti’\n\n\nThe Virgo Cluster (Image: NASA)\n\n“Imagine, an entire galaxy, slowly dying, unable to renew, simply because of where it is.”\n\nHowever, before all of this, the Milky Way is going to collide with Andromeda – the nearest galaxy to ours and one that is 220,000 light-years across, twice the size of the Milky Way – just to really make sure life cannot survive.\n\nAndromeda is approaching the Milky Way at around five million kilometres a year meaning that “in about three billion years, Andromeda will collide with ours, according to Geraint Lewis, an Astrophysicist at the University of Sydney.\n\nBig Bang Theory shock: Time had no beginning and eventually reverses\nBig Bang news: Universe could be 2 BILLION years younger than thought\nWhat does space sound like? Scientists reimagine sounds of space\n\n\nAndromeda will one day consume the Milky Way (Image: GETTY)\n\nMr Lewis continued: “The collision will shake-up the Milky Way and it will be lit up like a Christmas Tree as new stars are created.\n\n“The gas available in this collision gets used up very quickly. New stars will form and die. The gas will be swallowed up by a supermassive black hole.”", "pred_label": "__label__1", "pred_score_pos": 0.9651514291763306} {"content": "WhatsApp told govt about Pegasus spyware 2nd time in September, said 121 people spied on: Reports\n\nResponding to a notice by the IT ministry on the WhatsApp spying issue, the Facebook-owned company attached both the vulnerability notes it filed in May as well as the letter it sent to the government in September.\n\n(Image for Representation)\n\nAfter the government claimed that instant messaging application WhatsApp had not informed government agencies about a privacy breach targetting many Indian activists, lawyers and journalists, the messaging platforms has now responded by saying that it had alerted the government on two occasions -- once in May and for the second time in September.\n\n\nWhile the government has now confirmed that it did receive the September intimation from WhatsApp informing about spyware called Pegasus targetting 121 Indians, the IT ministry claimed the letter was \"still too vague\" to be alarming, as reported by the Indian Express.\n\nWhatsApp's response came in the wake of the Government claiming that they were not informed about the possible breach of privacy by the company in their last two meetings.\n\nElaborating on how \"vague\" the letter was, a source in the IT minister told the Indian Express, \"The letter says that it appears that some 121 people may have been affected but doesn't specifically say what the impact was. It doesn't tell who, what, where the identities which have now come out in the media. They have been trying to reach out to (those affected) through a Canadian group. Nowhere has the Indian government been involved.\"\n\n\"The government took up the issue of traceability with their international vice-president (Nick Clegg) and CEO (Chris Daniels) during formal structured meetings at the highest level of the ministry. They objected to it, suggesting their platform was safe. Not for once did they inform us about this privacy breach during those meetings at the highest levels,\" he added.\n\nAnother source told Indian Express that WhatsApp kept them the Indian Government in the loop on all the developments in the matter.\n\nGovt claims WhatsApp shared technical jargon\n\nIn a statement on Friday, Facebook-owned WhatsApp said it agreed with the demand made by the Indian government to explain the kind of breach to safeguard the privacy of millions of citizens. It also claimed to have informed the Indian government about the 'security issue' in May.\n\n\"Our highest priority is the privacy and security of WhatsApp users. In May, we resolved a security issue and notified relevant Indian and international government authorities,\" the WhatsApp statement said.\n\nBut the government countered the WhatsApp's claims saying the information provided was \"pure technical jargon\".\n\nGovernment sources said WhatsApp had given information to CERT-IN, a government agency, in May, but without any mention of Pegasus or the extent of the breach.\n\nIt also insisted that the information shared was only about a technical vulnerability and had nothing to do with the fact that the privacy of Indian users had been compromised. To back its claim, a screenshot of the information shared with CERT-IN by WhatsApp was circulated by government sources. However, the link on information relayed by WhatsApp in May has disappeared from the CERT-IN website.\n\nSpying snowballs into political controversy\n\nWhatsApp, the Facebook-owned mobile messaging service in October-end informed a few Indian journalists and human rights activists that they were among the 1,400 people globally who were spied upon by unnamed entities using Israeli spyware dubbed Pegasus.\n\nPegasus allegedly exploited WhatsApp's video calling system by installing the spyware via missed calls to snoop on 1,400 select users globally, including nearly 30-40 in India.\n\nThe owner of Pegasus, Israel-based NSO Group, limits the sale of the spyware to state intelligence agencies and others as it has the ability to collect intimate data from a target device. Pegasus software can be installed on devices as \"exploit links\".\n\nThe Indian government has denied purchasing or plans to buy Pegasus software from NSO Group.\n\nThe government has also come under fire from journalists as they demanded clarification from WhatsApp and questioned why it had kept the information about spying on Indian citizens hidden from the authorities despite recent meetings with the company CEO.\n\nALSO READ: Snooping on activists, scribes illegal, shameful: Sonia Gandhi\n\nALSO WATCH: Who hacked WhatsApp accounts in India?", "pred_label": "__label__1", "pred_score_pos": 0.9945985078811646} {"content": "The longest road in Spain\n\n8 September 2014\n\nWith just over half a million square kilometers, Spain is the fourth largest country in Europe. Along with the mountainous terrain, communication between different places in Spain has been a clear challenge for engineers. The N340 is a great example of engineering as it is the longest road in Spain and probably one of the most traveled during summer.\n\nThis road joins Cádiz with Barcelona, passing Malaga, over a distance of 1.248 km. and spans ten provinces belonging to four different autonomous communities. Its origins can be found in the so called Via Augusta that ran from the Pyrenees. During Roman occupation, this road was an important hub of business and communications that has survived through to our days.\n\nDuring the decade of the 1920’s, in the time of Primo de Rivera’s dictatorship, the government started the so called National Circuit of Special Pavements, a program which tried to fix the deteriorating road network in Spain, paving some stretches of the Roman road. However, it wasn't till the decades of the 50’s and 60’s when the road was finally finished. The tourist business developing in some towns and migration movement from the country to the city were keys for its expansion, being the road traveled by thousands of families who, during the summer months left Cataluña to return to their hometowns, many in Andalucia.\n\nThis road’s nomenclature is based on the method of numbering the roads in Spain. So the first digit is assigned by the area between the N-III and N-IV highways, the second is the distance in kilometers from Madrid (more than 400 km. in this case) and the third is due to its traversal nature, with it not being a radial road.\n\nN-340 starts in Cadiz at the junction with the A-4 highway. The first section is called A-48 until it reaches Vejer de la Frontera. In its 1.248 kilometers it goes through towns like Conil, Marbella, Malaga, El Ejido, Murcia, Elche, Alicante, Valencia, Castellón or Tarragona, until it reaches Avenida del Parallel in Barcelona.\n\nStudies indicate that this is one of the roads with the highest accident rates in the country. Therefore, in recent years the new A7 motorway is being built next to it. The new motorway will eventually be 1.330 km. long even though there are still 320 km. left to build, mainly between Castellón and Barcelona. When it is completely finished, it will hold the record that is now held by the old road. In spite of it, the old N-340 will remain the axis that runs through the Mediterranean coast and it will remain in our memory as the road that we had to travel during those long car trips to the seaside.", "pred_label": "__label__1", "pred_score_pos": 0.9561612606048584} {"content": "Production of Canola Oil Based Healthy Food Emulsifiers Using Supercritical Carbon Dioxide Media\n\nEmulsifiers, specifically diacylglycerides and monoacylglycerides, have the potential to replace fats and oils high in saturated fats such as palm and thus provide healthy and low-caloric food products. Canola based DAGs and MAGs not only can reduce the saturated fat content and food calories, they also can improve the functionalities of food products. However, they are produced using costly and environmentally unfriendly “enzyme in solvent” systems, and have shortcomings when utilized in certain food applications.\n\nTrends, opportunities and adaptive strategies in the natural fiber market\n\nAs the consumption of cigarettes declines in North America and Europe market, a company that specializes in manufacturing specialty papers is seeking new opportunities with its natural fiber productions. This research intends to identify new market trends and opportunities for natural fibers in the competitive environment; provide a comprehensive analysis in worldwide natural fiber industries; and to develop strategies by applying marketing segmentation strategy and differentiation strategy to respond to the market.\n\nEffectiveness of recycled glass as a wastewater effluent filtration media: A pilot-scale study\n\nWith increased emphasis on water quality in the Lake Winnipeg watershed, more stringent guidelines for wastewater effluents are being implemented. Smaller municipalities and remote communities, with limited financial resources, will be facing regulatory pressures, particularly around discharge of phosphorus, as well as micropollutants such as estrogens, pharmaceuticals and pesticides. To ensure the release of high quality wastewater effluents post-lagoon treatment technologies such as subsurface filtration systems are being employed for enhanced removal of pollutants.\n\nWide Area Measurement Based Robust Damping Controllers for Power Systems with Embedded Power Electronic Devices\n\nThis research will investigate Wide Area Measurement based controllers for improving stability in systems with HVDC and FACTS devices embedded in AC networks. The approach will extend the candidate’s Ph.D. research which introduced a new method that is always able to guarantee improved damping of all modes in the face wide changes in the network. The approach will lead to controller designs which are robust against configuration or operating point changes, or communication loss.\n\nTransitional REM Sleep Brain Connectomes and Seizure Susceptibility\n\nSeizures are rare while dreaming in rapid eye movement (REM) sleep. New research, however, suggests seizures may rebound during unstable REM sleep. This may be due to brain wiring (“connectivity”) since a highly connected brain is more prone to seizures, and connectivity changes from wakefulness to sleep. Brainwave tracings (“EEG”) can generate connectivity maps (“connectomes”) but adequate connectome resolution requires many EEG electrodes (“high density EEG”). This study uses high density EEG to examine brain connectomes and seizure susceptibility in unstable REM sleep.\n\nThe Impact of Renovations in Long Term Care Living Spaces on Residents with Dementia, their Families and the Staff that Care for Them\n\nRiverview Health Centre (RHC) plans to renovate their special care units and grounds, which accommodate 60 residents with intermediate and advanced stages of dementia. The main purpose of this study is to examine the effects of the renovations on residents, family and staff using a multi-methods research approach and a multi-disciplinary team of researchers (i.e., architecture, sociology, kinesiology, clinical psychology, pharmacy, nutrition, nursing, and health sciences).\n\nMevalonate Cascade Inhibition Sensitizes human Glioblastoma Cells to Temozolomide via Modulation of Autophagy\n\nGlioblastoma multiforme (GBM), also known as glioblastoma and grade IV astrocytoma, is the most common and most aggressive cancer that begins within the brain. There is no clear way to prevent the disease. Typically treatment involves surgery after which chemotherapy and radiation therapy is used. The medication Temozolomide (TMZ) is frequently used as part of chemotherapy. Cholesterol lowering drugs (statins) is recently being considered as a novel and safe approach for combination therapies in many cancers.\n\nPerformance Based Seismic Design Guidelines for Sprayed-FRP Retrofitted Circular Reinforced Concrete Bridge Columns\n\nThe proposed study will develop seismic design guidelines for retrofitting deficient concrete bridge columns with sprayed fiber reinforced plastic (FRP). Seismically deficient bridge columns (with different aspect ratios and transverse reinforcement ratios) retrofitted with composites will be tested under reverse cyclic loading. The tests will determine various damage states in terms of strain and drift.\n\nThe Semaphorins, a role Inflammatory Bowel Diseases\n\nInflammatory bowel disease (IBD) includes both Crohn’s disease (CD), and ulcerative colitis (UC). Approximately 230,000 Canadians are affected by these diseases and they have important repercussions on quality of life and on both personal and societal direct and indirect costs. The cause(s) are poorly understood, and treatment is largely symptom-based and not curative. Commonly used drugs may have potentially important adverse effects such as cancer and serious infections. Moreover, some patients are resistant to these drugs. Therefore, safer and more efficient therapies are needed.\n\nFeasibility Study of a TV-Based Video Chat Technology for Elderly with Dementia\n\nAccording to the Canadian Institute for Health Information, many of Canada's increasing aging population experience physical and cognitive impairments that necessitate moving to a care facility, with 44% of these residents having or indicating symptoms of depression. Social isolation is a contributor; 22-42% of these residents reported feeling severe loneliness. Video chat sessions have been found to be valuable augments to in-person visits. However, for adults with impairments such as dementia, operating the associated technologies might be impossible.", "pred_label": "__label__1", "pred_score_pos": 0.9089149236679077} {"content": "Adrien Guadagnino -August 24, 2018\n\nAdrien Guadagnino was born and raised in Milwaukee, Wisconsin. While studying acting at Columbia College Chicago, they found themselves increasingly interested in visual arts. Their work is rooted in storytelling and uses a number of different mediums to create an immersive environment.\n\n\"The flag honors Grandad’s Bluff, Formed about 11,700 years ago, and located in La Crosse Wisconsin. When you drive to La Crosse from Milwaukee, WI, parts of Grandad’s Bluff hint at your arrival, and once you see a flag, you know you have arrived. La Crosse is where my mother grew up and a place visited at least once a summer. Banana, cinnamon, and Grape Nut ice cream were the most prominent flavors of the summer and will be served at the flag raising ceremony.\"", "pred_label": "__label__1", "pred_score_pos": 0.9999862909317017} {"content": "ACM Europe Council Best Paper Award to the Politecnico di Milano\n\nAn analysis of deep learning algorithms applied to recommender systems by Ferrari Dacrema and Cremonesi\n\nMaurizio Ferrari Dacrema, an Information Technology PhD student, and Prof. Paolo Cremonesi, from the Architecture Research Team of the Electronics, Information, and Bioengineering Department, won the ACM Europe Council Best Paper Awardat the 13th ACM Recommender Systems conference.\n\nThe article \"Are We Really Making Much Progress? A Worrying Analysis of Recent Neural Recommendation Approaches\" provides a systematic analysis of the deep learning algorithms applied to recommender systems, published at high level conferences in recent years.\n\nThe article identifies 18 significant publications, stating that only 7 contain results that can be reproduced, and 6 of them were found to be non-competitive compared to much more specific non-neural techniques.\n\nOverall, the article highlights various potential problems with the use of machine learning, and maintains that experimental practices need to be improved in this sector.\n\nThe ACM Recommender Systems (RecSys) conference is the leading international forum for presenting new research results, systems, and techniques in the recommender system field.\n\nRecommender systems are information filtering systems intended for users, in order to facilitate browsing of vast catalogues of information, products and news, now available in the information and e-commerce era. Suggestions used by the user are personalised based on past interactions with the system, their preferences, and other personal information.\n\n\nFor more information:\nThe winning paper", "pred_label": "__label__1", "pred_score_pos": 0.9986410737037659} {"content": "Technology refers to the collection of tools that make it easier to use, create, manage and exchange information. At the beginning of time, human beings made use of it for the process of world discovery and evolution. Technology is the knowledge and use of tools, techniques, and systems in order to serve a larger purpose such as problem-solving or making life easier and better. Its importance for human beings is enormous because it has helped them adapt to the environment.\n\nThe development of high technology has helped to overcome communication barriers and reduce the gap between people around the world. The faraway places have become closer each time and as a result, the pace of life has increased. Things that used to take hours to complete can be done in a matter of seconds today. The world is smaller and life is much faster. To engage with the latest technology join this forum in technology Englisch.\n\nAn integral part of our lives\n\nTechnological advances have become an essential part of our lives. To understand why, just look around and see that at all times and context we are surrounded by it; Whether we are working or resting, it is always present to make our lives easier.\n\nDue to its application, our standard of living has improved, as the needs are met more easily. In general, all industries benefit from it, be it medicine, tourism, education, entertainment among many others. In addition, companies have grown and become more efficient, helping to create new employment opportunities. The application of technology has driven research in fields ranging from genetics to extraterrestrial space.\n\nThe importance of technology is almost always linked to the practical uses it has\n\nIn fact, a very expensive technology, or very complicated, does not usually succeed, because its implementation is very complicated. That is why sometimes technologies that seem rudimentary triumph over much more 'modern' ones. Be that as it may, technology is usually in continuous progress, being, in general, the practical development of new ideas conceived by scientific disciplines, and therefore, is closely linked to the concept of innovation.\n\nIn the life of modern society, technology is indispensable. In fact, most scientific efforts focus on the creation of new technologies that meet the needs of society and raise the level of well-being. That on paper, because technology is not always used for the intended purpose nor is it designed to improve human life (there are important exceptions, such as war technologies), but technology always covers a need. The technology is not necessarily necessary, and therefore will not be used.\n\nLinked to the great needs of humanity, technologies of great value have always appeared. For the need for human communication, the telephone, television, radio, the internet ... With the health needs, advances in surgery, general medicine, clinical analysis ... with the economic needs have emerged new industrial technologies, process technologies, Extraction .. And so we could continue to infinity, because there is no area in which technology is not present: be it in the economic, industrial, social, political, scientific, legislative, educational ... etc, as it allows an improvement of the final result or a simplification of the intermediate processes.\n\nConsequences of misuse\n\nModern technology has become an important facet of our lives and without it the world would be radically different. Despite this, social inequalities mean that there are still many people who do not have access to it.\n\nOn the other hand, the rapid development of new devices encourages consumerism, and excessive use brings with it health effects, such as visual stress, insomnia, deafness or obesity, among others. Finally, spending so much time browsing our cell phones and tablets disconnects us from what is happening around us and affects our relationship with others.\n\nThe use of technology is immeasurable and will continue to change, based on the demands of the people and the market. How we use it determines whether it is good or bad, useful or harmful. The technology itself is neutral, but it is we who make it good or bad, based on the use we give it.\n\nAuthor's Bio: \n\nHasan Root, a dream lover!", "pred_label": "__label__1", "pred_score_pos": 0.8646538853645325} {"content": "The Chronicles of Stevens Computer Science\n\nIt is simple to slip through the cracks for a PhD, and you need to start it only when you experience an advisor lined up. So it’s very important to go for a branch that’s of your interest. Whether any funding goes to CS is dependent on the caliber of grant applications that have a CS component.\n\nThe Argument About Stevens Computer Science\n\nIn the majority of situations, you don’t require that. There are many solutions, here’s a good one. Most problems can be solved in several ways, and markup html tags and formatting it’s vital for students to be in a position to spell out the methods they used for the solution.\n\nIn the end, the student’s success in the business comes down to their set of tools and techniques in various regions of technology. You’re a sensible business man. If you’re in a science or engineering curriculum, then there are particular things that are critical for the student to understand, like a superb foundation is mathematics and physics.\n\nZero to One is about doing the perfect things. Google their name and you’re bound to find their whole achievement gallery shining bright.\n\nThe actual question came with whether to utilize GitHub. New threads might be made by the programmer. As it happens, there are plenty of resources on it, too.\n\nIdeas, Formulas and Shortcuts for Stevens Computer Science\n\nThere’s a relation between two things if there’s some connection between them. Put simply, a God-like observer with perfect understanding of the brain wouldn’t consider it non-computable. In reality, there are a couple of ways, and a great deal of them come up repeatedly in computer science.\n\nIn mathematics, the thought of non-computability isn’t observer-dependent so that it seems something of a stretch to introduce it like an explanation. Small things are less difficult to understand and build. Machine learning is at the crux of our journey towards artificial general intelligence, and meanwhile, it is going to change every business and have a substantial effect on our day-to-day lives.\n\nA far better idea is to simply retrain present workers to do something totally different. As a consequence, every residence is one-of-a-kind. From the huge room, kids can’t observe the interior of the little room.\n\nThe writers will revolve around the overview and the background, and not concentrate on the correctness or the minute particulars of the paper. As soon as it’s perfectly fine if students decide to locate solutions online, they ought to probably use the code as a final resort or a check instead of jumping to such resources as a very first impulse. On these days, everybody could observe various department students are working in the manner of a software engineer.\n\nThe procedure is eliminated from the front part of the queue whenever the CPU becomes available. As a programmer you’re bound to face errors and exceptions. Given the example The very first relation, number 1, has a distinctive name.\n\nIt is not hard to become enamoured with the newest trend or tool, and the more elaborate models might not be the absolute most appropriate for each application. The range of paths which lead into and from a vertex is known as the level of a vertex. You will need to know some mathematical concepts from several diverse areas if you would like to excel at algorithms.", "pred_label": "__label__1", "pred_score_pos": 0.5128824710845947} {"content": "Let it Be\n\nDear Ones,\n\nEven though you crossed the Rubicon to 5D, you continue to feel the need to care for others – either personal relationships or global interactions.\n\nBut you now have different areas to discover and explore. Your time caretaking the earth, your friends, family, and community members – even those of the ethers – is over.\n\nDissipating your inner-power through caretaking is counter-productive. For there are enough humans now following you to take up the banner of personal and global rights and freedoms. Such is no longer your area of concern – or expertise.\n\nFor those following, you have a different agenda than is true for those of you at the forefront.\n\nIt is no longer your concern that those following rebuild earth as you feel appropriate. For you are of a different age both chronologically and spiritually. That which you think important might have little to do with those who follow. Just as is true for different earth generations.\n\nDid many of your parents not believe that the freedoms you proclaimed in the 1960’s and 1970’s outrageous and counterproductive? So it is now. Do not concern yourself with how earth love evolves, for you are at a different place in a different time.\n\nYou probably believe that if those following relied on your dictates of how it should be, the earth would quickly shift to joy. But you are now of the ethers as much as of earth. So you sense a broader range of possibilities than is true for those still in the earth trenches.\n\nYour vision is more like those of us in the ethers than of those of the earth. So it is that many of those following you must experience a bit of pain before they realize their true power, just as was true for you.\n\nAnd just as was true for those of us of the ethers, you cannot remove their pain with a few creations here and there. Those yet fully of the earth must realize their self-love before they dare rise up in protest.\n\nMany of you reading this message might be in fear – thinking that the earth love and joy you so desire is a never-arriving miracle. Such is not so. For you created the path that those following will discover much more rapidly than was true for you. And once those following you create their path of love and joy, others will create their path in even less time – and on and on.\n\nSo it is you must believe that all is wonderfully well on earth even if it does not appear as such most days. The earth chaos and upheaval are designed to awaken those who have not yet discovered their inner-power – or their need to find beliefs beyond earth.\n\nThose who follow you will carry your earth baton as you move to other pieces of your being that have more to do with personal exploration than caretaking earth.\n\nEven though some of you remain totally enmeshed in the current earth chaos, such will change shortly. Not because you do not have earth power, but because the call to discover new you will be stronger than the need to caretake earth or any entity.\n\nThis time is confusing in many ways, not the least of which is that there are many Universal/earth patterns competing for your attention. None of those patterns are incorrect, merely not necessarily where you wish to focus. That is the crux of the issue we are discussing.\n\nYou are evolving from caretaking others and earth, to discovering your new being with your new powers. Powers that are beyond what you expected. Your joy will be or is in discovering new you instead of caretaking earth and others as you have done for eons.\n\nPerhaps that concept seems unloving, but it is little different from what you experienced throughout your earth lives. When you are an infant, exploration of your environment and learning to walk and talk are your key interests. As a teen, it is discovering complex relationships and adjusting to your new body. A young adult is concerned about child rearing, food, shelter, and work which eventually evolves to retirement issues.\n\nAt each life stage, you have different interests and expect that your interests are also the priority of others in your age range. You know that those younger or at a different stage will caretake or evolve those pieces that no longer interest you. So it is now.\n\nYou are at a different stage from those following you. Allow them to find their way, just as we encouraged you to do so. You created your path. Now trust that those following will create a path that is right for them as will be true for all who follow them.\n\nLet go and let be.\n\nJust as you are not exactly like those of us of the ethers – you are an original being with new interests and talents because you have had different experiences than us.\n\nPerhaps you remember with laughter, the fear most of your parents expressed as you put on your tie-dyed blue jeans and protested just about everything their society held dear. The earth did not fall apart, it merely evolved into something that many of you are trying to maintain just as your parents and grandparents did at one time.\n\nUniversal life is change. And the change most of you are now adapting to is that you are of the earth, but in a new body with new powers and new directions. Allow that to be as you become more of new you with the knowledge that the earth of old is shifting and changing as rapidly as you are due in large part to your efforts.\n\nSo it is change continues. Change that will create the new earth of love and joy you have long pined for. And your current role in this shift is to follow your joy. So be it. Amen.\n\n\nHeartfelt courage 28th June 2017 11:31 pm\n\nI needed this today and yesterday. It reminds me of a story a family member loved telling. She loved to feed me in the high chair and I would always tell her, I can feed myself, but mom needs help with the dishes! She would tell my sisters, \"The hot water will help your cramps.\" I guess I knew she hated dishes, but loved cooking! I was 10 and 13 years behind them.\nLove of life to all!\n\n\nKeep updated with Spirit Library\n\nAuthor Information\n\nBrenda Hoffman\n\n\nBooks from Brenda Hoffman\n\n\nBrenda Hoffman Archives", "pred_label": "__label__1", "pred_score_pos": 0.6249988079071045} {"content": "In Flight Tasking - IFT - Overview\n\nGuides to using taskPilot\n\nModerators: martyn, brian.savage\n\nPost Reply\nSite Admin\nPosts: 16\nJoined: Fri Dec 22, 2017 11:36 am\n\nIn Flight Tasking - IFT - Overview\n\nPost by brian.savage » Fri Jan 11, 2019 3:42 pm\n\nIn Flight Tasking – IFT\n\nHow often have you set yourself a task which you believe will make for a great flight, and as you approach the first waypoint you are disappointed?\n\nOne of two things has happened:\n • The waypoint is covered in low cloud which has advanced further than the forecast predicted and is unreachable, so the task must be abandoned.\n • The waypoint is in beautiful clear air with a nice puffy thermal cloud over it, and you can see the energy line stretching far beyond: Should you make the turn and abandon that great energy line? Or should you abandon the task and fly into the distance? A difficult decision to make!\nDisappointing and discouraging either way.\n\nIn Flight Tasking – IFT – is a new technique we have introduced into taskPilot to try and overcome this issue.\n\nPut simply, it is a scoreable flight where you develop the task as you fly it!\n\nThere are a few wrinkles we have introduced to make it challenging, but that is the basic description.\n\nBy flying an IFT task, pilots will need to perform basic pre flight planning based on the weather forecast, and continue to plan throughout their flight as the weather evolves.\n\nImportantly, every flight should be able to be scored. Previously an abandoned task could only be posted as an unscored free flight.\n\nHow it works\n\nYou fly a start, finish and up to 3 turnpoint task using your club’s waypoints. To make it challenging, the flight must visit waypoints in sectors around the start point as described below.\n\nThe first sector is determined from the first turnpoint you fly to. For example, you believe North is a good way to start, so you fly generally towards wp8 and wp9. On the way you collect wp4, wp7 and wp5.\n\n\nAttempting to reach wp8, you decide you can go no further and choose wp5 as your first turnpoint. This choice sets the first sector, which is defined by a line perpendicular to the Start-wp5 line, drawn through the start waypoint, as follows:\n\n\nTo claim another turnpoint you must fly across this line, so wp6, wp2 etc are not selectable.\n\nFlying southwards you collect a few waypoints along the way - wp11, wp10 and wp13 – until you reach your limit and choose wp13 as your second turnpoint.\n\n\nSelecting Wp13 as the turnpoint determines the second sector, drawn as before through the Start, and now available waypoints are only those in the remaining space between sector 1 and sector 2, shaded in green.\n\n\nCollecting wp18 you fly to the finish, in this case the same waypoint as the start, completing the task as shown.\n\n\nThis flight can now be loaded into taskPilot and scored as a racing flight using the IFT flight upload option.\n\nAs part of the upload you enter the turnpoints to construct the task and they are checked against the sector rules.\n\nIf your task fails to meet the sector rules you can change the task turnpoints, hence ‘collecting’ waypoints along the way as a safety measure is a good idea.\n\nIf you had failed to make wp18, and didn’t collect any waypoints in the final sector, you could still claim a 2 turnpoint triangle task flight. Indeed, if you only collect one waypoint on the entire flight, you can still claim an out and back flight to that turnpoint.\n\nThe start and finish don’t have to be the same point, so after the flight, you might be able to construct a higher scoring flight by moving the start or finish points to one of the waypoints you collected.\n\nThe future for IFT\n\nIFT is very new and only a simple version has been created so far, using trial and error will determine what is best to do next.\n\nFor example, the height penalty isn’t used – this will be introduced as that makes the Start waypoint selection important. Some ‘off tow’ detection might also be introduced.\n\nBonus points could be awarded for each extra turnpoint, for example 1 waypoint – out and back – gets no bonus, a triangle 2 turnpoint gets +10% and a quad 3 turnpoint gets +20%.\n\nWork is underway to integrate IFT flights into contests and the club league.\n\nPost Reply", "pred_label": "__label__1", "pred_score_pos": 0.5387741327285767} {"content": "Qualitative interviews were conducted with 20 women who were\n\nThis radioimmunotoxin (RIT), which selectively bound to the CD5-positive CEM human leukemia cell line, was selectively inhibitory to antigen-positive cells in protein synthesis inhibition assays. This paper reviews the role of treatments for nicotine addiction in the management of smoking cessation. The Fontan operation is the final operation for many patients with tricuspid atresia or a single ventricle. In this study, direct composite resin restoration showed no significant difference between the labial and lingual access.\n\nPharmacological MRI of the choroid and retina: blood flow and BOLD responses during nitroprusside infusion. The standard account of American immigration focuses on the acculturation and assimilation of immigrants and their children to American society. Since ancient times, anticholinergics have been used as a bronchodilator therapy for obstructive lung diseases.\n\nEvidence for a difference in affinities of human hemoglobin beta A and beta S chains for alpha chains. The exchange performance is analyzed in terms of the extinction ratio (ER) of the newly converted signal to the original residual signal. Socio-environmental risk factors for medically-attended agricultural injuries in Wisconsin dairy farmers.\n\nA novel therapeutic combination approach for treating multiple vemurafenib-induced keratoacanthomas: systemic acitretin and intralesional fluorouracil. The purpose of this paper is to review the present position of nursing as a developing profession. Ethylene production by pollinated styles can be defined temporally by three distinct peaks. Following release from this higher pressure, the eggs underwent extensive, uncoordinated surface contractions, but failed to cleave. There is a wider need for high quality empirical studies to inform ethical evaluations.\n\nWe compared EtCO(2) and arterial pulse pressure for this purpose. Patients with measurable first-line HER2/neu-negative MBC were eligible. Here we detail the molecular mechanism of binding of the Tudor domain to the H3KC36me3-nucleosome core particle (H3KC36me3-NCP). Often epileptic discharges interfere with speaking, writing and/or understanding of speech or may result in palilalias, verbal automatisms or other forms of disturbance of verbal performance. We report on an adolescent female with Velocardiofacial syndrome (del(22)(q11.2)) and an epilepsy phenotype resembling juvenile myoclonic epilepsy (JME).\n\nDue to their widespread use, possible side effect of natural agents should be excluded. Changes in the cytokine regulation of stem cell self-renewal during ontogeny. Our results suggest that a highly active thymus in early childhood may contribute to better immune reconstitution if ART is initiated early in life.\n\nFuture research studies could explore more detailed features of access to expose gaps in policy and improve tobacco regulatory frameworks. Utilization of a Terrestrial Laser Scanner for the Calibration of Mobile Mapping Systems. The potential involvement of cholesteryl ester hydrolysis and membrane cholesterol transport was also addressed. To describe the training paths and the practice patterns of Canadian paediatric residency graduates. We have found that the distributions of Cl, Br, and I differ: Cl is widespread whereas Br and I, although not colocalized, are concentrated in proximity to the external jaw surfaces.\n\nIncidence of intussusception among infants in a large commercially insured population in the United States. However it seems likely that part of the observed differences to bulk behavior is due to density effects, which are reduced but cannot be fully avoided at low cooling rates. Draft Genome Sequence of the Causative Antigen of Summer-Type Hypersensitivity Pneumonitis, Trichosporon domesticum JCM 9580. The compound has had effect in different experimental autoimmune situations such as the diabetic BB-rat and experimentally-induced arthritis in mice or rats.\n\nThe 18-MV photon beam of a Varian 2100 C/D linear accelerator and a radiation therapy bunker were simulated using the MCNPX Monte Carlo code. Cell density of adrenomedullin-immunoreactive cells in the gastric endocrine cells decreases in antral atrophic gastritis. Observing differential expressions of one or more genes between normal and abnormal cells has been a mainstream method of discovering pertinent genes in diseases and therefore valuable drug targets. An investigation of vtx2 bacteriophage transduction to different Escherichia coli patho-groups in food matrices and nutrient broth. Role of ethyl alcohol in the etiopathogenesis of reflux esophagitis. Involvement of the p38 MAP kinase in Cr(VI)-induced growth arrest and apoptosis.\n\nThe narrow high-order mode and inherent mode couple with the broad low-order resonant mode in the rectangular cavity, giving rise to two Fano resonances. The exponential growth rate is given in terms of the severing rate, and the latter is given in terms of the maximum slope in a polymerization time course. In our studies, we confirmed crizotinib-induced apoptosis in A549 lung cancer cells. This rare affection is related to the production of anti-erythrocytes immunoglobulins M.\n\nHigh Degree Atrioventricular Block Complicating Acute Myocardial Infarction Treated with Primary Percutaneous Coronary Intervention: Incidence, Predictors and Outcomes. This was independent of Lipocalin 2, an acute phase protein secreted by reactive astrocytes and well known to mediate neurotoxicity. Prostaglandin (PG)D(2) is a key mediator in various inflammatory diseases including allergy and asthma. Full understanding of the mechanisms that result in this reduced fatigue resistance will aid in the development of treatments and interventions to prevent age-related tendinopathy. To our knowledge, this is the first report demonstrating the effect of MTX on the RMS and the necessity of the folic acid metabolism on RMS development in newborn rats.\n\nShear bond strength of a new high fluoride release glass ionomer adhesive. Hypomanic symptoms assessed by the HCL-32 in patients with major depressive disorder: a multicenter trial across China. Historically, non-reproductive periods of 10-15 years in nulliparous female rhinoceroses and elephants have not been considered problematic. Doxorubicin acutely prolonged the QT interval in guinea-pig heart by selective I(Ks) blockade. The police, social services, and psychiatry (PSP) cooperation as a platform for dealing with concerns of radicalization.", "pred_label": "__label__1", "pred_score_pos": 0.9825471043586731} {"content": "Spatially-Engineered Janus Hybrid Nanozyme Toward SERS Liquid Biopsy at Nano/Micro Scales.\n\n著者 Su Y , Zhang Q , Miao X , Wen S , Yu S , Chu Y , Lu X , Jiang LP , Zhu JJ\nACS Appl Mater Interfaces.2019 Oct 17 ; ():.\n\nスターを付ける スターを付ける     (6view , 0users)\n\nFull Text Sources\n\n\nNanomaterials with intrinsic enzyme-mimicking properties (nanozymes), have been widely considered as artificial enzymes in biomedicine. However, manipulating inorganic nanozyme into multivariant targeted bio-analysis is still challenging because of the insufficient catalytic efficiency and biological blocking effect. Here, we rationally designed a spatially-engineered hollow Janus hybrid nanozyme vector (h-JHNzyme) based on the bifacial modulation of Ag-Au nanocage. The silver face inside the h-JHNzyme serves as an interior gate to promote the enzymatic activity of the Ag-Au nanozyme, while two-dimensional DNAzyme-motif nanobrushes deposited on the exterior surface of the h-JHNzyme endowed the targeting function and tremendously enhanced the peroxidase-mimicking activity. We demonstrated that the spatially-separated modulation of the h-JHNzyme propels it as powerful \"all-in-one\" enzymatic vector with excellent biocompatibility, specific vectorization, remarkable enzymatic performance and clinical practicability. Further, we programmed it into a stringent catalytic SERS liquid biopsy platform to trace multidimensional tumour-related biomarkers, such as microRNAs and circulating tumour cells, with a limit of detection of fM and single cell level, respectively. The developed enzymatic platform shows great potential to facilitate the reliable quantitative SERS liquid biopsy for on-demand clinical diagnosis.\nPMID: 31621282 [PubMed - as supplied by publisher]\n印刷用ページを開く Endnote用テキストダウンロード", "pred_label": "__label__1", "pred_score_pos": 0.991662859916687} {"content": "Al Bateen Beach Development\n\nAbu Dhabi, United Arab Emirates\n\nThe Bateen Beach prestigious project aims to redevelop and enhance the existing partially developed beach area into a vibrant public recreational and leisure beachfront destination for Abu Dhabi City, primarily targeting the residents of Abu Dhabi island. This landmark project shall provide a programmed beachfront destination and related recreational facilities providing high-end retail, food & beverage outlets and engaging waterfront anchors.", "pred_label": "__label__1", "pred_score_pos": 0.9592039585113525} {"content": "Skip to main content\n\n\nSYNTAX score effect on electroencephalography power dynamics in patients undergoing on-pump coronary artery bypass grafting\n\nArticle metrics\n\n • 2726 Accesses\n\n • 2 Citations\n\n\n\nThe severity of angiographically assessed coronary artery disease may be the factor that influences the degree of brain damage during on-pump surgery. Modern technology such as computed electroencephalography (EEG) that is used to detect signs of brain damage could also be used to determine the advantages and disadvantages of various surgical myocardial revascularization methods in certain categories of patients. The present study investigated EEG power dynamics for 1 postoperative month in patients undergoing on-pump coronary artery bypass grafting (CABG) who were divided into two groups: those with moderate coronary lesions (SYNTAX score ≤ 22, n = 12) and those with severe coronary lesions (SYNTAX score ≥ 23, n = 18).\n\n\nAt 7–10 days after CABG, all patients showed theta type 1 rhythm power higher than that seen preoperatively, possibly indicating that brain damage occurred during bypass. At 1 month after CABG, the theta type 1 rhythm power had decreased to the baseline level in patients with SYNTAX scores of ≤22, whereas it had increased in patients with SYNTAX scores ≥23.\n\n\nSYNTAX scores ≥ 23 are associated with EEG markers of perioperative brain damage during CABG. Careful preoperative assessment, preparation, and more effective intraoperative brain protection are essential for this category of coronary heart disease (CHD) patients.\n\n\nIschemic brain damage, a frequent complication of cardiac on-pump surgery, has been associated with postoperative stroke, encephalopathy, and neurocognitive dysfunction. It is established that these neurological complications can minimize the operation’s success, leading to social exclusion, impaired quality of life, and death during the long-term period after CABG [1, 2]. The duration of cardiopulmonary bypass (CPB), manipulation of the aorta, and the effects of anesthesia have been suggested as causative factors in the development of cerebral ischemia during on-pump surgery. Preoperative factors, such as a high functional class of heart failure and angina, can also be predictors of postoperative neurological complications [3, 4]. The severity of coronary artery disease may be associated with the number of grafts, manipulation of the ascending aorta, CPB duration, and the intensity of the systemic inflammatory response during the postoperative period—each of which can influence the degree of ischemic brain damage during cardiac surgery.\n\nCurrently, there are a number of scales that can objectively evaluate the complexity of coronary artery disease on the basis of angiographic data (SYNTAX score) or combined clinical and angiographic data. The latter include the Functional SYNTAX score, the New Risk Classification (NERS), and the Clinical SYNTAX score (CSS) [57]. In the literature, however, there is no evidence that these scales are of any predictive value with respect to neurological complications in patients undergoing CABG.\n\nA widely discussed issue is the monitoring of ischemic brain damage due to CPB. Identifying minimal or subclinical signs of brain dysfunction using modern advanced technology can help determine the advantages and disadvantages of the various surgical revascularization methods in specific categories of patients. Multichannel computed EEG can be used to monitor brain electrical activity and thus detect signs of ischemic brain damage that can result in postoperative neurological deficit [8]. The noninvasiveness and simplicity of this method makes it possible to observe the dynamics of brain function recovery during the postoperative period [8, 9]. A statistically significant relation has been found between the characteristics of intraoperative EEG and cognitive deficits for 2–3 months after CPB surgery [10]. Most of the association between cerebral hypoperfusion and EEG changes was identified during carotid surgery [10, 11].\n\nThe aim of this study was to evaluate EEG power dynamics for 1 postoperative month in patients undergoing on-pump CABG. We relied on the SYNTAX score to indicate the severity of angiographically assessed coronary artery disease.\n\n\n\nAll patients gave informed consent to participate in a prospective study aimed at studying changes in cognitive function after CABG. The Ethics Committee of Research Institute for Complex Issues of Cardiovascular Diseases, Russian Academy of Medical Sciences, Siberian Branch approved the study design.\n\nExclusion criteria were age > 70 years, initial depressive symptoms identified by the Beck Depression Inventory, dementia [sum score of the Mini-Mental State Examination ≤ 24], and the Frontal Assessment Battery score ≤ 11. Also excluded were subjects with a known history of rhythm disturbances, heart failure functional class IV according to the New York Heart Association (FC NYHA IV), concomitant diseases (chronic obstructive pulmonary disease, malignant pathology), diseases of the central nervous system, any episodes of a cerebrovascular accident, and/or brain injury. All patients were examined by a neurologist and underwent multi-spiral computed tomography during the preoperative period to detect any nervous system abnormalities. Only right-handed patients were included in the study so as to take account functional brain asymmetry.\n\nA total of 30 male patients were divided into two groups: those with a moderate coronary lesion (SYNTAX score ≤ 22, n = 12, mean age 57.9 ± 5.47 years) and those with a severe coronary lesion (SYNTAX score ≥ 23, n = 18, mean age 57.5 ± 5.60 years). The severity of the coronary lesions was assessed using the results of coronary angiography and a SYNTAX calculator ( Before surgery the two groups were comparable with regard to a history of CHD, severity of heart failure (FC NYHA), ejection fraction (EF) of the left ventricle, neurological status, depression and anxiety score (Table 1). The degree of internal carotid artery (ICA) stenosis did not exceed 50% in any of the patients. Atherosclerotic stenoses in most of the patients were located at the ICA ostium.\n\nTable 1 Demographic and clinical characteristics of the groups with different SYNTAX scores\n\nAll patients were treated before and after surgery with basic, symptomatic therapy according to the general principles of treatment for patients with CHD, heart failure, and hypertension (National Guidelines, 2009, 2008): low-salt (<1 g/day) and low-cholesterol diet, β-blockers (bisoprolol fumarate), angiotensin-converting enzyme inhibitors (enalapril maleate), and statins (rosuvastatin). Standard anesthesia and perfusion were carried out: combined endotracheal anesthesia (diprivan, fentanyl, sevoflurane). For all patients, CABG surgery was performed with normothermia. The average number of grafts, mean bypass time, and aortic cross-clamping did not differ between the two groups (Table 1). Invasive hemodynamic monitoring, carried out during the operation, indicated that there were no episodes of hypotension. Also, oxygenation of the cerebral cortex (rSO2) in real time was monitored (INVOS 3100; Somanetics, Troy, MI, USA) at all stages of the surgery. Brain hypoxia was not observed.\n\nEEG recording and processing\n\nAll EEG studies were performed at three time points: 3–5 days before surgery and 7–10 days and 1 month after surgery. High-resolution monopolar EEG recordings (62 channels, bandwidth 0.1–50.0 Hz) with closed eyes (EC) and open eyes (EO) were made in patients with moderate and severe coronary lesions. The EEG was amplified by Neuvo electroencephalography (Compumedics, Charlotte, NC, USA) using a modified 64-channel cap with sintered Ag/AgCl electrodes (QuikCap; Neurosoft, El Paso, TX, USA) according to the international 10–20 system. A reference electrode was attached to the tip of the nose and a ground electrode to the center of the forehead. Electrode resistance was maintained at <20 kΩ. The EEG was sampled at a rate of 1000 Hz over approximately 10 minutes. The data were analyzed offline. Visual inspection for eye movements, electromyographic interference, and other artifacts was undertaken. Artifact-free EEG fragments were divided into 2-s epochs and underwent Fourier transformation. For each subject, EEG power values were averaged within the delta (0–4 Hz), theta type 1 (4–6 Hz), theta type 2 (6–8 Hz), alpha type 1 (8–10 Hz), alpha type 2 (10–13 Hz), beta type 1 (13–20 Hz), and beta type 2 (20–30 Hz) bands. The mean values of the total EEG power in each band in the two states, EC and EO, were obtained. The data were log-transformed to normalize the distribution.\n\nStatistical analysis\n\nThe software package STATISTICA 6.0 (StatSoft, Tulsa, OK, USA) was used for all analyses of the variables. Categorical clinical data were analyzed with the χ2 Pearson adjusted Yates test. Quantitative measurements were done with the Wilcoxon and Mann–Whitney tests. Repeated-measures analysis of variance (ANOVA) was used to determine the difference in EEG power with Greenhouse–Geisser as correction. In each frequency range, the mean values of the total EEG power were analyzed to extract factors: SYNTAX (patients with SYNTAX score ≤ 22 or SYNTAX score ≥ 23), TIME (before CABG and at 7–10 days and 1 month afterward) separately for the EC and EO states.\n\n\nWe did not observe any life-threatening cardiac arrhythmias, acute coronary insufficiency with progression of heart failure, cerebral accidents, or transient ischemic attacks in any of the patients during the early postoperative period after CABG. A statistically significant EF decrease was found 7–10 days after CABG compared with the patients’ preoperative data. In patients with SYNTAX scores ≤ 22, the EF decreased from 59.9 ± 5.11% to 52.6 ± 6.56% (p = 0.003), and in those with SYNTAX scores ≥23 it decreased from 56.1 ± 12.15% to 49.3 ± 7.82% (p = 0.008). At 1 month, the EF had increased in all of the patients and did not differ from their baseline EFs.\n\nANOVA showed that theta type 1 (theta1) power is a significant main effect of TIME (F2,56 = 5.08, p = 0.015) and the interaction of SYNTAX–TIME (F2,56 = 6.15, p = 0.007). Patients with SYNTAX scores ≥23 had increased theta1 rhythms power with EC 7–10 days after CABG compared with baseline (p = 0.009). These changes remained at the 1-month follow-up (p = 0.00006). In patients with a SYNTAX scores ≤22, there was also a theta1 power increase 7–10 days after surgery (p = 0.035), but it had returned to baseline at 1 month (p = 0.03) (Figure 1). Patients with SYNTAX scores ≥23 had greater theta1 rhythm power than was seen in the group with SYNTAX scores ≤22 at 1 month after surgery (p = 0.04).\n\nFigure 1\n\nDynamics of theta type 1 rhythms mean power in the eyes-closed state separately for the SYNTAX scores22 group (continuous line) and the SYNTAX scores23 group (broken line). Vertical bars denote 0.95 confidence intervals. Asterisks (*) indicate statistically significant differences (p < 0.05) between two groups.\n\nThe analysis of theta1 rhythm power with EO revealed a significant effect of TIME (F2,56 = 10.4, p = 0.0004). The dynamics of theta power was similar in patients with moderate and severe SYNTAX scores, manifesting as a power increase 7–10 days after CABG (p = 0.0001) with a subsequent decrease to near baseline at the 1-month follow-up (p = 0.02).\n\nA significant effect of TIME was found in theta type 2 (theta2) rhythm power with both EC and EO (F2,56 = 4.96, p = 0.01 and F2,56 = 10.2, p = 0.001, respectively). The rhythm power also increased 7–10 days after CABG (p = 0.008) and remained unchanged at 1 month.\n\nCommon effects (significant factor TIME, see Table 2) for all patient groups were found in alpha types 1 and 2 (alpha1,2) and beta types 1 and 2 (beta1,2) frequency ranges with both EC and EO 1 month after CABG. The alpha2 and beta1,2 rhythm powers with EC increased over baseline values 1 month after CABG (p = 0.0002, p = 0.0003, and p = 0.0007, respectively). With EO, the alpha1,2 and beta1 activity was increased 7–10 days after CABG with subsequent nonsignificant decreases to near baseline at the 1-month follow-up (p = 0.01, p = 0.0003, and p = 0.002, respectively).\n\nTable 2 TIME effects on alpha types 1,2 and beta types 1,2 frequency ranges with EC and EO states\n\nThe SYNTAX score was a significant factor (F1,28 = 7.04, p = 0.01) in alpha2 with EO and in beta1 (F1,28 = 9.08, p = 0.005) with both EC and EO (F1,28 = 6.18, p = 0.02). The alpha2 and beta1 rhythm powers were greater in the group with SYNTAX scores ≥23 (Figure 2).\n\nFigure 2\n\nDifferences of alpha2 (A) and beta1 (B) rhythm mean power values in the eyes-open state between two groups with different SYNTAX scores. Vertical bars denote 0.95 confidence intervals. Asterisks (*) indicate statistically significant differences (p < 0.05) between two groups.\n\n\nWe examined EEG power changes after CABG in patients with moderate and severe coronary lesions assessed by the SYNTAX score at 1 month of follow-up. We found that all patients demonstrated a higher power of theta1 and theta2 rhythms 7–10 days after CABG compared with preoperative data. In patients with SYNTAX scores ≥23, a significant low-frequency cortical activity increase continued even 1 month after surgery.\n\nAccording to the literature, an increase of low-frequency activity in the resting state EEG, or “EEG slowing”, can be considered a marker of ischemic brain damage [8, 10]. Brain damage may result from hypoperfusion and microembolisms during CPB [12], and this effect may continue after surgery. Extracranial vascular lesions may contribute to a chronic form of brain ischemia. In our previous study, we showed deteriorated neurological status of patients after CABG, especially in those with ICA stenoses [13]. In the present investigation, we found that a large number of patients with SYNTAX scores ≥23 had ICA stenoses (39% vs. 25%).\n\nWe assumed that the reason for prolonged EEG slowing after CABG is the increased expression of atherosclerotic changes in cerebral arteries of patients with SYNTAX scores ≥23. It has been shown that the severity of coronary atherosclerosis is directly correlated with extracranial and cerebral vascular lesions, in which case the risks of ischemic complications during CPB are dramatically increased [14, 15]. Furthermore, severe coronary artery disease can be associated with longer, more traumatic effects on the ascending aorta during surgery [16]. We also found that patients with SYNTAX scores ≥23 had a larger number of grafts than did those with SYNTAX scores ≤22 (2.8 vs. 2.5).\n\nThe patients with SYNTAX scores ≥23 also had higher alpha2 and beta1 rhythm power values in the EO state before and after surgery. It is widely postulated that an increase in alpha power may reflect decreased cortical activation, whereas an increase in beta1 power is an unambiguous pathological sign of cortex dysfunction [8, 17]. Thus, the group with SYNTAX scores ≥23 demonstrated signs of chronic brain ischemia preoperatively.\n\n\nA high SYNTAX score is associated with EEG markers of brain damage after on-pump CABG at the 1-month follow-up. The SYNTAX score may thus be an indirect indicator of involvement of other vascular zones, particularly cerebral arteries—a critical bit of information for the CPB surgeon. Careful preoperative assessment, preparation, and more effective intraoperative brain protection are essential for this CHD patient category. Also important is a consideration of safer surgery.\n\nThe SYNTAX score as an objective indicator of the severity of coronary artery disease can probably be integrated with other clinical factors: poor left ventricular contractility, diabetes mellitus, multi-vessel atherosclerotic lesions, and others that contribute to perioperative brain damage.\n\nLimitations of the study\n\nIt must be noted that this report is of a pilot study that was performed on a small set of patients (n = 30). Perhaps in this context, we have not demonstrated the complex relations of other clinical factors and their combined effect on the EEG markers of brain damage. These issues require further study.\n\nOverall, our research has touched on neuropsychological, neurological, cardiac, and pathophysiological aspects of cardiac surgery, allowing a clear understanding of the mechanisms of neurological complications after CABG. Our findings can contribute to the search for optimal algorithms for preoperative evaluation of patients as well as the development of adequate revascularization and neuroprotection techniques.\n\n\n\n\n\nCoronary artery bypass grafting\n\n\nCoronary heart disease\n\n\nCardiopulmonary bypass\n\n\nFunctional class of heart failure by New York Heart Association\n\n\nEjection fraction\n\n\nInternal carotid artery\n\n\nClosed eyes\n\n\nOpen eyes.\n\n\n 1. 1.\n\n Hogue CW, Gottesman RF, Stearns J: Mechanisms of cerebral injury from cardiac surgery. Crit Care Clin. 2008, 24 (1): 83-98.\n\n 2. 2.\n\n Evered L, Scott DA, Silbert B, Maruff P: Postoperative cognitive dysfunction is independent of type of surgery and anesthetic. Anesth Analg. 2011, 112 (5): 1179-1185.\n\n 3. 3.\n\n Newman SP, Harrison MJ: Coronary-artery bypass surgery and the brain: persisting concerns. Lancet Neurol. 2002, 1: 119-125.\n\n 4. 4.\n\n Senay S, Toraman F, Akgün Y, Aydin E, Karabulut H, Alhan C, Sarioglu T: Stroke after coronary bypass surgery is mainly related to diffuse atherosclerotic disease. Heart Surg Forum. 2011, 14 (6): E366-E372.\n\n 5. 5.\n\n Sianos G, Morel MA, Kappetein AP, Morice MC, Colombo A, Dawkins K, van den Brand M, Van Dyck N, Russell ME, Mohr FW, Serruys PW: The SYNTAX Score: an angiographic tool grading the complexity of coronary artery disease. EuroIntervention. 2005, 1 (2): 219-227.\n\n 6. 6.\n\n Valgimigli M, Serruys PW, Tsuchida K, Vaina S, Morel MA, van den Brand MJ, Colombo A, Morice MC, Dawkins K, de Bruyne B, Kornowski R, de Servi S, Guagliumi G, Jukema JW, Mohr FW, Kappetein AP, Wittebols K, Stoll HP, Boersma E, Parrinello G, ARTS II: Cyphering the complexity of coronary artery disease using the syntax score to predict clinical outcome in patients with three-vessel lumen obstruction undergoing percutaneous coronary intervention. G Am J Cardiol. 2007, 99: 1072-1078.\n\n 7. 7.\n\n Morice MC, Serruys PW, Kappetein AP, Feldman TE, Ståhle E, Colombo A, Mack MJ, Holmes DR, Torracca L, van Es GA, Leadley K, Dawkins KD, Mohr F: Outcomes in patients with de novo left main disease treated with either percutaneous coronary intervention using paclitaxel-eluting stents or coronary artery bypass graft treatment in the synergy between percutaneous coronary intervention with TAXUS and cardiac surgery (SYNTAX) trial. Circulation. 2010, 121: 2645-2653.\n\n 8. 8.\n\n Golukhova EZ, Polunina AG, Lefterova NP, Begachev AV: Electroencephalography as a tool for assessment of brain ischemic alterations after open heart operations. Stroke Res Treat. 2011, 201 (1): 980873.\n\n 9. 9.\n\n Başar E, Başar-Eroglu C, Karakaş S, Schürmann M: Gamma, alpha, delta, and theta oscillations govern cognitive processes. Int J Psychophysiol. 2001, 39 (2–3): 241-248.\n\n 10. 10.\n\n Gugino LD, Aglio LS, Yli-Hankala A: Monitoring the electroencephalogram during bypass procedures. Semin Cardiothorac Vasc Anesth. 2004, 8 (2): 61-83.\n\n 11. 11.\n\n Pennekamp CW, Moll FL, de Borst GJ: The potential benefits and the role of cerebral monitoring in carotid endarterectomy. Curr Opin Anaesthesiol. 2011, 24 (6): 693-697.\n\n 12. 12.\n\n Kunihara T, Tscholl D, Langer F, Heinz G, Sata F, Schäfers HJ: Cognitive brain function after hypothermic circulatory arrest assessed by cognitive P300 evoked potentials. Eur J Cardiothorac Surg. 2007, 32 (3): 507-513.\n\n 13. 13.\n\n Trubnikova OA, Tarasova IV, Syrova ID, Mamontova AS, Kovalenko AV, Barbarash OL, Barbarash LS: Neuropsychological status of patients with low and moderate carotid artery stenoses after the coronary artery bypass surgery. Zh Nevrol Psikhiatr Im S S Korsakova. 2013, 113 (3): 21-26.\n\n 14. 14.\n\n Puskas JD, Winston AD, Wright CE, Gott JP, Brown WM, Craver JM, Jones EL, Guyton RA, Weintraub WS: Stroke after coronary artery operation: incidence, correlates, outcome, and cost. Ann Thorac Surg. 2000, 69 (4): 1053-1056.\n\n 15. 15.\n\n Kovacevic P, Redzek A, Kovacevic-Ivanovic S, Velicki L, Ivanovic V, Kieffer E: Coronary and carotid artery occlusive disease: single center experience. Eur Rev Med Pharmacol Sci. 2012, 16 (4): 483-490.\n\n 16. 16.\n\n El Zayat H, Puskas JD, Hwang S, Thourani VH, Lattouf OM, Kilgo P, Halkos ME: Avoiding the clamp during off-pump coronary artery bypass reduces cerebral embolic events: results of a prospective randomized trial. Interact Cardiovasc Thorac Surg. 2012, 14 (1): 12-16.\n\n 17. 17.\n\n Grin-Yatsenko VA, Baas I, Ponomarev VA, Kropotov JD: EEG power spectra at early stages of depressive disorders. J Clin Neurophysiol. 2009, 26 (6): 401-406.\n\nDownload references\n\n\nIrina Syrova and Anastasia Mamontova are acknowledged for their excellent technical assistance. The authors thank Nancy Schatken for editing the manuscript.\n\nAuthor information\n\nCorrespondence to Irina V Tarasova.\n\nAdditional information\n\nCompeting interests\n\nIn the present study, there are no any actual or potential conflicts including any financial, personal, or other relationships with other people or organizations. The authors’ institution has no contracts relating to this research through which it or any other organization may stand to gain financially now or in the future. Authors or their institutions have no financial interest in this work. This manuscript has not been published elsewhere and is not under review with another journal. The present investigation adhered to the tenets of the Declaration of Helsinki and was approved by the institutional human experimentation committee. Informed consent was obtained from all subjects after the nature of the procedure had been explained. All authors have reviewed the contents of the manuscript being submitted, approve of its contents, and validate the accuracy of the data.\n\nAuthors’ contributions\n\nIVT and OAT designed the experiments. IVT performed the acquisition of the EEG data, statistical analysis and wrote the manuscript. RST and OAT performed the acquisition of the clinical data. OLB and LSB conceived the idea and edited the manuscript. All authors read and approved the final manuscript.\n\nAuthors’ original submitted files for images\n\n\nAuthors’ original file for figure 1\n\nAuthors’ original file for figure 2\n\nRights and permissions\n\n\nReprints and Permissions\n\nAbout this article\n\nCite this article\n\nTarasova, I.V., Tarasov, R.S., Trubnikova, O.A. et al. SYNTAX score effect on electroencephalography power dynamics in patients undergoing on-pump coronary artery bypass grafting. BMC Neurosci 14, 95 (2013) doi:10.1186/1471-2202-14-95\n\nDownload citation\n\n\n • Electroencephalography\n • Brain damage\n • Theta rhythm power\n • SYNTAX score\n • On-pump coronary artery bypass grafting", "pred_label": "__label__1", "pred_score_pos": 0.6692341566085815} {"content": "MOOCs for AI: Empowering Individual Learning and Mastery\n\nAI is transforming industries and Massively Open Online Courses (MOOCs) are transforming education. Together the two are a very powerful combination that any aspiring engineer or developer can leverage to skyrocket his or her career.\n\nThe speed of technological development means change will come much sooner than expected. Are you ready? Keep reading to learn more about MOOCs, the benefits, and why you should consider them now to learn about hot tech topics like artificial intelligence, data science, and machine learning. \n\nExponential growth of technology, “The evolution of AI — How it broke into the mainstream economy”\n\nTaking Charge of Your Education\n\nThanks to the power of MOOCs and other online learning resources, you have the ability to take charge of your education. More than ever before, students — not institutions — are in control of what they learn, where they learn it and how their education can impact their career. With an ocean of resources at your disposal, you are free to explore beyond the traditional school classroom into the open expanse of online education and innovation. \n\nAnyone anywhere can benefit. And best of all, you don’t need $100,000 for a Masters degree. More and more, people like Daniel Bourke are empowering themselves by acquiring the knowledge and skills they need to land better jobs. Daniel went from Uber Driver to a Machine Learning Engineer by diligently completing online courses on his own time, at his own pace. You can do it, too. \n\nWhat are MOOCs and What is Their Purpose?\n\nAs the name suggests, MOOCs are online course designed to share knowledge among a vast number of users and participants. This includes a portion of its moderators, which are typically part of the course’s official faculty staff.\n\nWhile MOOCs may structurally seem like any other online sources of information exchange such as forums and digital distribution platforms, it is built to function essentially like an official academic course. As such, MOOCs also include reading materials, course exercises, practical exams, and review sources.\n\nThe keyword here is accessibility. MOOCs differentiate themselves from traditional school education, and even from older online educations systems, by prioritizing community support, information availability, and learning at one’s own pace.\n\nThus, the main purpose of MOOCs is to equally offer academic information to the most number of potential students — basically, using the internet to deliver quality-level education to many learners across the world. The supporting concept of being able to study the material at length without the worry of “having a seat too far” is also perhaps one of its notable attributes.\n\nIn fact, many promoters of MOOCs, such as edX CEO Anant Agarwal, always point to the fact that there is no distance problem to a virtual classroom. Better yet, there is no size problem, and the classroom can have as many participants as it can online. \n\nAdvantages of MOOCs\n\nMost of the primary advantages of MOOCs are based on their accessibility; students can decide for themselves what, where and when to study. Other notable advantages include:\n\n • Lectures are always available – instead of just listening to your professor discuss the lecture once on a subject, MOOC students can watch pre-recorded lectures repeatedly. This is significantly different from simply reading a textbook, as engagement is often enhanced on a lecture due to the human instructor, and the rolling visual aids included in the lecture.\n • Encourages active learning – from a logical standpoint, skill acquisition is definitely more efficient if a learner actively participates in the exchange of ideas (via forums), or is allowed to repeatedly take the multimedia learning material (via pre-recorded lectures).\n • Give a deeper understanding of the skill you want to learn – Oftentimes, higher education lectures will only cover the baseline required material of every concept behind a subject. Taking a slice out of a pie allows you to eat all the layers, but you still miss out on the entire pie. With more flexible access to information, a MOOC can grant you a better understanding of the overall material.\n\nPeople study MOOCs for many reasons. You can take a MOOC to enhance your professional development at work. MOOCs can help you improve your current job performance, equip you with the skills and knowledge for a new job, and/or allow you to create new connections through which to network your way into a better position. You can also use MOOCs to complement an existing study program or to facilitate progression into higher education. \n\nWhy MOOCs are a Great Way to Learn AI\n\nCutting-edge education and cutting-edge technology are a natural match. Think about it. It doesn’t make much sense to learn about innovation in an environment that lacks innovation. In order to learn new ideas, we need new learning environments — ones that are as flexible and dynamic as the very ideas we want to birth. MOOCs create collaborative, global networks that allow students to broaden their current view and learn from one another. This is how sparks fly. \n\nMoreover, the MOOCs contribute to the democratization of higher education, allowing anyone to receive a world-class education. Artificial intelligence is too important to be left in the hands of a few. AI will fundamentally change how we live and work. Just like quality education, it will people all over the world being able to experience a better standard of life and the ability to engage more productively in all areas of human endeavor. \n\nIn her essay, “Why You Need to Study Artificial Intelligence, Even As A Non-Technical Person,” Sandra Lusmägi states it well: “How can we build technology that will be used by everyone, but if not everyone is involved in the process of imagining, designing and building it? Understanding the basics of technology, such as code, AI, ML means we no longer have to accept the bystander role in our digital society.”\n\nMOOCs focused on AI will be important in creating a more open, accessible, flexible, affordable, transparent and accountable future. They will play a key role in stimulating the adoption of new technologies and new forms of learning, including learning peer-to-peer, increasing digital skills, amplifying networks and recycling knowledge.\n\nMOOCs provide the opportunity to connect with people who share the same interests or professional profiles. As a result, students are able to reach out to new groups and generate new ideas, to initiate novel projects or other interpersonal engagements, for a wide variety of purposes. Regardless of where you live or what resources are available to you locally, MOOCs can allow you to step on an open and global stage. \n\nKambria’s AI Online Educational Programs\n\nAt Kambria, we are committed to open innovation. We believe open innovation is one of the most important ways to accelerate social impact in a multitude of verticals, including robotics & AI, mobility, and environment. That’s why Kambria is developing online AI courses in conjunction with educational and training alliances worldwide. Stay tuned as we will launch our online AI courses shortly. \n\nJoin Kambria Newsletter\n\n\n\nWrite A Comment", "pred_label": "__label__1", "pred_score_pos": 0.6573877334594727} {"content": "1. Learn in Multiple Ways\n\nFocus on learning in more than one way. Instead of just listening to a podcast, which involves auditory learning, find a way to rehearse the information both verbally and visually. This might involve describing what you learned to a friend, taking notes or drawing a mind map. By learning in more than one way, you’re further cementing the knowledge in your mind. According to Judy Willis, “The more regions of the brain that store data about a subject, the more interconnection there is. This redundancy means students will have more opportunities to pull up all of those related bits of data from their multiple storage areas in response to a single cue. This cross-referencing of data means we have learned, rather than just memorized” (Willis, J. Brain-based teaching strategies for improving students' memory, learning, and test-taking success. Review of Research. Childhood Education, 83(5), 31-316, 2008).\n\n2. Teach What You’ve Learned to Another Person\n\nEducators have long noted that one of the best ways to learn something is to teach it to someone else. Remember your seventh-grade presentation on Costa Rica? By teaching to the rest of the class, your teacher hoped you would gain even more from the assignment. You can apply the same principle today by sharing your newly learned skills and knowledge with others.\n\nStart by translating the information into your own words. This process alone helps solidify new knowledge in your brain. Next, find some way to share what you’ve learned. Some ideas include writing a blog post, creating a podcast or participating in a group discussion.\n\n3. Utilize Previous Learning to Promote New Learning\n\nAnother great way to become a more effective learner is to use relational learning, which involves relating new information to things that you already know. For example, if you are learning about Romeo and Juliet, you might associate what you learn about the play with prior knowledge you have about Shakespeare, the historical period in which the author lived and other relevant information.\n\n4. Gain Practical Experience\n\nFor many of us, learning typically involves reading textbooks, attending lectures or doing research in the library or on the Web. While seeing information and then writing it down is important, actually putting new knowledge and skills into practice can be one of the best ways to improve learning. If you are trying to acquire a new skill or ability, focus on gaining practical experience. If it is a sport or athletic skill, perform the activity on a regular basis. If you are learning a new language, practice speaking with another person and surround yourself with immersive experiences. If you see a standardized patient, observe a physician examining a patient, hear about a disease, take time to read about it. This helps you learn—by connecting to a real person.\n\n5. Look Up Answers Rather Than Struggle to Remember\n\nOf course, learning isn’t a perfect process. Sometimes, we forget the details of things that we have already learned. If you find yourself struggling to recall some tidbit of information, research suggests that you are better offer simply looking up the correct answer. One study found that the longer you spend trying to remember the answer, the more likely you will be to forget the answer again in the future. Why? Because these attempts to recall previously learned information actually results in learning the \"error state\" instead of the correct response.\n\n6. Understand How You Learn Best\n\nAnother great strategy for improving your learning efficiency is to recognize your learning habits and styles. There are a number of different theories about learning styles, which can all help you gain a better understanding of how you learn best. Gardner’s theory of multiple intelligences (see descriptions at the end of this document) describes eight different types of intelligence that can help reveal your individual strengths.\n\n7. Use Testing to Boost Learning\n\nWhile it may seem that spending more time studying is one of the best ways to maximize learning, research has demonstrated that taking tests actually helps you better remember what you've learned, even if it wasn't covered on the test. The study revealed that students who studied and were then tested had better long-term recall of the materials, even on information that was not covered by the tests. Students who had extra time to study but were not tested had significantly lower recall of the materials.\n\n8. Stop Multitasking\n\nFor many years, it was thought that people who multitask, or perform more than one activity at once, had an edge over those who did not. However, research now suggests that multitasking can actually make learning less effective. In the study, participants lost significant amounts of time as they switched between multiple tasks and lost even more time as the tasks became increasingly complex. By switching from one activity to another, you will learn more slowly, become less efficient and make more errors. How can you avoid the dangers of multitasking? Start by focusing your attention on the task at hand and continue working for a predetermined amount of time.\n\nHow do you learn best?  These are Howard Gardner's multiple intelligencies.  Which intelligencse describe the way you function?\n\nIntelligencesDescriptionRelated Tasks, Activities\n\n\nlogical thinking, detecting patterns, scientific reasoning and deduction; analyze problems, perform mathematical calculations, understands relationship between cause and effect towards a tangible outcome or result\n\nPerform a mental arithmetic calculation; create a process to measure something difficult; analyze how a machine works, create a process; devise a strategy to achieve an aim; assess the value of a business or proposition\n\n\nwords and language, written and spoken; retention, interpretation and explanation of ideas and information via language, understands relationship between communication and meaning\n\nwrite a set of instructions; speak on a subject; edit a written piece or work; write a speech; commentate on an event; apply positive or negative 'spin' to a story\n\n\nmusical ability, awareness, appreciation and use of sound; recognition of tonal and rhythmic patterns, understands relationship between sound and feeling\n\nperform a musical piece; sing a song; review a musical work; coach someone to play a musical instrument; specify mood music for telephone systems and receptions\n\n\nvisual and spatial perception; interpretation and creation of visual images; pictorial imagination and expression; understands relationship between images and meanings, and between space and effect\n\ndesign a costume; interpret a painting; create a room layout; create a corporate logo; design a building; sense of direction; arrange the layout of a document\n\n\nbody movement control, manual dexterity, physical agility and balance; eye and body coordination\n\ndemonstrate a sports technique; create a mime to explain something; assess work-station ergonomics; dance; gardening; build a cabinet\n\n\n(strong association with emotional intelligence)\n\nperception of other people's feelings; ability to relate to others; interpretation of behavior and communications; understands the relationships between people and their situations, including other people\n\ninterpret moods from facial expressions; demonstrate feelings through body language; coach or counsel another person; human resources; educator; team person; loves to be with people; good communicator\n\n\nself-awareness, personal cognizance, personal objectivity, the capability to understand oneself, one's relationship to others and the world, and one's own need for, and reaction to change\n\nconsider and decide one's own aims and personal changes required to achieve them (not necessarily reveal this to others); self-reflective, self-aware;\n\n\nmore in tune with nature and are often interested in nurturing, exploring the environment and learning about nature. These individuals are said to be highly aware of even subtle changes to their environments.\n\nInterested in subjects such as botany, biology and zoology; good at categorizing and cataloging information easily; may enjoy camping, gardening, hiking and exploring the outdoors;\n\nDoesn’t enjoy learning unfamiliar topics that have no connection to nature\n\nResources: http://psychology.about.com/od/educationalpsychology/tp/effective-learning.htm; http://quizlet.com/; http://www.businessballs.com/howardgardnermultipleintelligences.htm", "pred_label": "__label__1", "pred_score_pos": 0.9451249241828918} {"content": "Category: Enen no Shouboutai\n\nEnen no Shouboutai\n\nType: TV Series\n\nYear: Jul 6, 2019 – Unknown\n\nStatus: Currently Airing\n\nGenres :\n\nAction, Sci-Fi, Shounen\n\nYear 198 of the Solar Era in Tokyo, special fire brigades are fighting against a phenomenon called spontaneous human combustion where humans beings are turned into living infernos called “Infernals”. While the Infernals are first generation cases of spontaneous human combustion, later generations possess the ability to manipulate flames while retaining human form. Shinra Kusakabe, a youth who gained the nickname Devil’s Footprints for his ability to ignite his feet at will, joins the Special Fire Force Company 8 which composes of other flames users as they work to extinguish any Infernals they encounter. As a faction that is creating Infernals appears, Shira begins to uncover the truth behind a mysterious fire that caused the death of his family twelve years ago.", "pred_label": "__label__1", "pred_score_pos": 0.9999356269836426} {"content": "Ana içeriğe geç\n\nOrijinal gönderinin sahibi: Dan ,\n\n\nIf I understand it the external is working but the internal is not visible when you shine a flashlight in from the Apple logo in the lid if that’s correct your internal display cable (iDP or also called a eDP cable).\n\nLet’s disconnect the cable from the logic board and take some pictures of the cable connector from both sides and also take some pictures of the logic board connector so we can see connector and look into the connector and post them here for us to see [guide|21499]", "pred_label": "__label__1", "pred_score_pos": 0.9983841180801392} {"content": "\n\n\nGrid List\n\nFeatured Products\n\n\n\nRaddles are used to prevent the warp from tangling when it is wound on the beam.\n\n\nIf you don't find exactly what you want, or would like a raddle recommendation, please call the shop directly at 800-441-9665 or contact us for assistance.", "pred_label": "__label__1", "pred_score_pos": 0.9998335838317871} {"content": "Beneficial Insect Species\n\nBeneficial Insect Species\n\nIn recent years, agricultural economists have put estimates on the values of some local insect services to human society. In one 2009 example, the total economic value of insect pollination of agricultural crops worldwide was $220 billion. A sizeable fraction of this pollination occurs in Australia by species such as the European honeybee, and many thousands of native bees and flies.\n\nDuring the mid nineties, honeybees died in large numbers in Europe and the United States, a phenomenon known as colony collapse disorder (CCD). The cause of CCD is complex and not yet fully understood. But the effects were transparent. Profits from pollinated crops, such as almonds decreased. The prices of some foods increased significantly, because farmers had to pay more for disease-free bees, often importing them from CCD-free Australia.\n\nAnother good example is the service that introduced dung beetles provide. Australia’s cattle herd was estimated at 30 million in the 1970s, each animal producing 10 pats per day, covering over 2.5 million hectares of pasture each year.\n\nMillions of bush flies (Musca vetustissima) also bred in the dung. Overseas these dung pats would have been recycled into soil nutrients by the local dung beetles that buried small chunks of the dung in the soil to rear their young. However, Australia’s native dung beetles are adapted to feed on and bury dry, fibrous marsupial dung, and avoid the much more moist cattle dung.\n\nCSIRO introduced dung beetles from Europe and Africa in the 1970s and 1980s that buried cattle dung underground so that it became a fertilizer for use by grass and other plants. The burrowing activity of the beetles also aerated the soil. And it also provided another important service: controlling the bush fly plague by removing and burying the dung that bush flies were breeding in.\n\nAustralia’s outdoor café owners probably don’t know it, but they owe at least part of their clientele to the silent work of introduced dung beetles working tirelessly in the agricultural districts surrounding our cities, once the source of most of our bush flies.\n\nDownload our pest identifier app on iTunes or Google Play!", "pred_label": "__label__1", "pred_score_pos": 0.5901515483856201} {"content": "Year: 2017\n\nMaterial:  plaster\n\nWhich elements determine how we experience a space? By molding and making sculptures of independent elements, found in the city’s landscape, I question how the characteristics of space can be altered. This sculpture is not a sidewalk, nor a road. However, it tells us where to walk. It’s an element that structures the streetscape while determining the urban landscape. The sidewalk, discreetly integrated into the city’s landscape, becomes autonomous in the exhibition space. Through re-placing it, an architectural intervention takes place,\n\nwithout being architecture.", "pred_label": "__label__1", "pred_score_pos": 1.0000091791152954} {"content": "Sequim Washington Detective Salary And Job Requirements\n\n\nPrivate detective career summary\n\n***image credit –\n\npolice detective career summary\n\n***image credit –\n\nTable Of Contents\n\nSalary of a Detective\n\n\nNumber of People\n\n\npolice detective salary by state\n\n***image credit –\n\nPlace assigned or working\n\nCrime rate and population of the place are closely related to the location. However, cost of living is another factor to consider. Higher the cost of living in a certain location, higher the detective is paid. This is true with the case of private investigators as well. District of Columbia, Alaska, and New Jersey all pay 6-figure salaries with District of Columbia paying as much as $116,000.\n\nLevel of education attained\n\nFor any police job (except at the federal level), a high school degree is sufficient. Though this rules sometimes varies with state, most states do not require higher education certificates. But, the importance of higher education is considered by some states and departments that is why a degree after high school is a factor that affects the salary of the officers and detectives. The degree could be associate, bachelor or master’s. Depending on your degree, you might be paid more.\n\n\n\nSequim Private Investigators\n\n\nPrivate investigator salary by state\n\n***image credit –\n\n\nSequim Detective’s Career Path\n\nFirst, let’s talk about the growth in the fields. In 2015, the recorded public detectives or criminals investigators are about 106,000. Meanwhile, private investigators who do the same job were only 30,000. In this industry, the predicted growth of private detectives is about 15%. This goes to show that by 2025, 1,500 new jobs will be opened. Such growth rate follows the 5% average growth rate in all other sectors. On the other hand, for public investigators, this figure is at 4%. Meaning to say, in 2025 it is expected that there will be 4,000 more jobs as a criminal investigator. This is also considered as the average growth rate.\n\n\npolice detective employment by state\n\n***image credit –\n\nGeographically speaking, Texas, California and New York employ the highest number of Criminal / Law Enforcement Investigators. Western states and Texas show more employment here than the eastern ones. Private detectives in California, Texas and Florida with the southern part are higher in number compared to the northern ones.\n\nLet’s see what are the industries that hire these professionals most. As clear as day, The Local, State government and the Federal branch employ the most number of criminal investigators. On the other hand, private detectives are usually hired by Security Services, Consulting services and occasionally by the local government for consultation on a few cases.\n\nCriminal investigators get higher payments than the private ones. The annual average salary of criminal investigators is $80,000 while Private investigators get $52,000. Public investigators are paid most in District of Columbia, Alaska, and New Jersey in the aspects of geography and finance. It is in Alabama, Nebraska, and New Jersey were private detectives are paid most.\n\n\nPrivate investigator career outlook by state\n\n***image credit –\n\nHow can You Qualify as a Detective In Sequim\n\n\nComplete High School\n\nDue to excellent deduction skills, a deductive is able to take a leap from a police officer to a detective position. This only means that you will need to complete your high school studies and become a police officer before you can become a detective. Becoming a private investigator would mean getting a high school degree.\n\nEarn a Bachelor’s degree\n\nA bachelor’s degree isn’t really necessary in most cases when becoming a police officer. However, some police officers prefer to have one as a means of employment after they retire. Likewise, you will need a bachelor degree if you want to become a detective.\n\n\nGain experience\n\n\nThere might be variations in the required experience in the state you’re applying in. Some states require you to have 3 years of experience while others require 5 years.\n\nOwn a gun legally\n\nInvestigators that aren’t licensed by the state aren’t allowed to carry firearms without a permit. Some firearms require a full training course after which they are issued with the permits. Hence, to get a permit for your firearm when working as an investigator, you will need to complete the full training course.\n\nUndergo a Washington licensing test\n\n\nInsure Yourself\n\nSince investigating can sometimes be a dangerous line of work, it is important to get insurance done. Basically, this is a medical insurance worth $10,000. But since you’re carrying a gun with you for extra protection, and you will have to insure the gun as well, getting a higher amount will be an ideal choice.\n\nBy completing these steps, you’ll be good to go. You can now start living the detective life you always wanted. However, don’t forget that being a detective would mean exposing yourself to danger. If you want to pursue your dreams, learn all about the requirements and complete them as soon as you can.\n\nResponsibilities of Being a Detective in Sequim\n\nCrime Scene Investigation\n\n\nCriminal Research\n\nOne of the core aspects of a detective’s duty is doing research and groundwork regarding previous cases. They do so to gain more knowledge about criminal behavior and identify patterns that people usually follow. This involves looking into previous case records to allow them to have an insight regarding the behavior of the criminal. This is really helpful when it comes to serial killers. It also helps to identify tactics that a drug cartel might be using thus helping the detectives shut them down. Other general research can help them narrow down a suspect better or deduce the crime scene in a more efficient way.\n\nAccurately guessing the culprit\n\nThe goal of a detective’s job is to bring justice to light and bring the culprit to justice. But to do this, they first need to a list of possible suspects. The list could be long, including up to a hundred people, or short – sometimes none at al. With the help of evidence, research, statements, and forensic studies, they are able to come up with such list. By means of getting statements from suspects, detectives are able to narrow down their list. Once the list is narrowed down, they will then proceed to gathering evidence or having the suspect admit to his crimes.\n\nTestifying In Court\n\nAs part of their final job, detectives will need to make sure justice is served. To hasten the process, the court will sometimes summon them. They will often describe the scenario of the crime, and present evidences that will prove the crimes of the criminal. Sometimes, the detectives are also required to escort the culprit to jail.\n\nSequim Private Detectives\n\n\nAs you can see, the “Idiot Box” was right for the most part. The thing is, the duties and roles detectives undertake every single day are very stressful. That is never shown properly on television or anywhere else. Detectives should make sure to find any clue they could get since a lot of people’s lives lie on them. If you think being a detective is the right job for you, then you should do research about it now!", "pred_label": "__label__1", "pred_score_pos": 0.9075032472610474} {"content": "10 Red Flags in Special Education School Records\n\n\nBelow are ten examples of red flags that might indicate that a student is not making effective academic, social, and emotional progress.\n\n 1. Goals and short-term objectives that repeat year after year.\n 2. Goals and short-term objective that change without an indication that the student met the previous years’ goals.\n 3. Goals and short-term objective that are not measurable. Note that in November, 2013, a law was passed that requires school districts to continue the current practice of including measurable short-term objectives and benchmarks in the IEPs of all students with disabilities. The Massachusetts special education law (Chapter 71B) was amended to include: “A child’s individualized education program, or IEP, as defined is 20 USC sec 1401 (14) shall include a statement of measurable annual goals, including academic and functional goals, and a description of benchmarks or short-term objectives.”\n 4. Lack of measurable post-secondary goals (transition goals) based on a transition assessment for students 14 and older.\n 5. Progress Reports that use amorphous/vague language.\n 6. Progress Reports that specifically state that goals or short-term objectives are not met.\n 7. Drastic changes in services year after year.\n 8. Reduction of services with a change in school.\n 9. Failing grades or MCAS scores.\n 10. Language in evaluations or IEPs related to the student’s lack of consistency, including “varying progress,” “day to day,” “sometimes,” “with varying degrees of prompts,” “depending on mood/behavior,” etc.\n\n\nWelcome – Special Education Blog\n\nWelcome to my special education blog.\n\n\nBecause every legal matter is different, the information you obtain from the blog is not, nor is it intended to be, legal advice. You should consult  an attorney to discuss your specific legal questions.", "pred_label": "__label__1", "pred_score_pos": 0.985692024230957} {"content": "• How to Find the Motivation to Lose Weight\n\n Tuesday, November 19th, 2019\n\n by Jessica Thomas, Personal Trainer\n\n motivation-to-lose-weightThe biggest reason people can’t find motivation to lose weight is due to unrealistic goals. Expecting overnight success at a diet or exercise plan simply isn’t realistic. When desired weight loss goals aren’t reached quickly, most people assume they have failed.\n\n To lose weight successfully, it’s better to focus on reaching your goals over time, and to realize that there will be small setbacks along the way. Many people tend to focus on their shortcomings, but if you accept yourself as you are it will be easier to focus more on your positive side and work towards becoming slim and attractive.\n\n Weight Loss Motivational Techniques\n\n Why do you want to lose weight? If you’re struggling with being overweight, you need to ask yourself this question.\n\n For example, are you getting married and need motivation to lose weight for the wedding? Are you simply trying to get into your favorite pair of jeans again?\n\n Do you have a serious health problem that requires you to lose weight? Have you tried healthy things like drinking green tea to lose weight?\n\n Once you determine why you want to lose weight, it will be easier to set a goal and get motivated to work towards it.\n\n One of the biggest reasons for weight loss failure is that dieters often set unrealistic goals. Many of us want to shoot for the moon, but we tend to get overwhelmed by the day-to-day realities of sticking with a diet plan.\n\n That’s why it’s important to chart your progress in a weight loss journal. Seeing incremental improvements like a pound lost or an inch gone from your waist line can boost your motivation and keep you on the path.\n\n Setting realistic and achievable goals has the advantage of focusing your mind on the here and now.  A goal is like a promise to yourself. Wanting to keep the promise is what creates motivation.\n\n If the goal is too hard to achieve, you may give up. For example, if you say to yourself, “I have to lose 10 pounds this week!” then you are setting yourself up for failure before you’ve even begun. “Self-sabotage” happens when you set goals that are not realistically achievable in the short or medium-term.\n\n Of course, motivation to lose weight fast is important, but it’s the process itself that you should be focused on. For this reason, you need to take small steps toward your long-term goal.\n\n As you achieve each small step it gives you the forward momentum to take your motivation a step further. Before you know it, you’ve achieved bigger goals than you ever thought you could.\n\n Visualize Your Weight-Loss Goal\n\n One of the best ways to accomplish a goal is to visualize it actually happening. Successful athletes are known to visualize their goals on a regular basis. Diet counselors also say that one of the best ways to remain motivated to lose weight is to visualize your body after your weight loss goals are achieved.\n\n weight-loss-visualizationFor example, imagine yourself a year from now. After sticking with your weight loss and exercise plan, how will you look and feel 12 months from now? How might your life be different after you lose the weight for good? Imagine yourself fit, healthy and with more self-confidence.\n\n Try to create a picture in your mind of how your life is going to be better if you lose the weight, and worse if you don’t. Carry this picture with you until you have a clear sense of purpose.\n\n When that purpose is there, you will find that you have the motivation to lose weight that you’ve been searching for. Remember that the deeper purpose that motivates you is the fundamental step to weight loss success.\n\n Sure, there are lots of famous quotes on motivation to lose weight, but at the end of the day, it has to come from within you. Decide clearly on what your purpose and goal is, and you will find yourself moving towards it slowly but surely.\n\n A weight loss success story will be yours to tell if you learn to live in the moment, and take pleasure in achieving small, daily goals. This is one of the most basic and important weight loss tips you will ever receive.\n\n (published December 16, 2009)", "pred_label": "__label__1", "pred_score_pos": 0.9446796178817749} {"content": "\\input zb-basic \\input zb-matheduc \\iteman{ZMATH 2013a.00989} \\itemau{Pugelj, Klara} \\itemti{GeoGebra in school. (Geogebra v \\v soli.)} \\itemso{Mat. \\v{S}oli 18, No. 3-4, 75-83 (2012).} \\itemab Summary: The article describes an example of intercurricular cooperation between mathematics and fine arts, which was carried out with the usage of a program for rendering dynamic geometry. We present two lessons with help of which pupils, learning the basics of geometrical concepts and laws, managed to learn the basics of how to work with GeoGebra at the same time. The article also describes an example of creative homework, which is connected to mathematic as well as to fine arts. \\itemrv{~} \\itemcc{U70 R20 M80 G90} \\itemut{GeoGebra; program for dynamic geometry; geometry; geometrical objects; paintings; creativity; inter-subject cooperation} \\itemli{} \\end", "pred_label": "__label__1", "pred_score_pos": 0.9999152421951294} {"content": "Damned Architect Font\n\nSee preview damned architect font and download this cool font for free. The font is classified as regular fonts. This font viewed 1000 times and downloaded 86 times. You can also downloads other fonts: Architect Regular, Architect Bold, Architect Bold Bold, 2Peas Architect, Architect Italic, Architect Bold Oblique for Windows and Mac at FreakFonts.com. If you like this font don't forget share them with you friends!\n\nDamned Architect Font\n\nViews: 1000\n\nDownloads: 86\n\nSize: 19388 Kb\n\n\nCategory: Capitals Fonts\n\nStyle: Regular Fonts\n\nVersion: Macromedia Fontographer 4.1 9/13/97\n\n\nFont Family: Damned Architect\n\nFormat: True Type (TTF)\n\nFile: Damned-Architect_12951.ttf\n\nRelated Fonts\n\n\n\nArchitect Regular font\n\n\nArchitect Bold font\n\n\nArchitect Bold Bold font\n\n\n2Peas Architect font\n\n\nArchitect Italic font\n\n\nArchitect Bold Oblique font\n\n\nArchitecture font\n\n\nDamned Architect font\n\n\nArchitect Bold Italic font\n\n\nLD Architect font\n\n\nArchitect font\n\n\nArchitect Light font\n\n\nER Architect 1251 font\n\n\nArchitect Light Oblique font\n\nDamned Dingbats Regular Added: 2014-03-05 01:50:01\n\nDamned Dingbats Regular font\n\n\nCK Architect font\n\n\nER Architect 866 font\n\n\nArchitect Medium Oblique font\n\n\nArchitect Medium font\n\n\nER Architect Mac font", "pred_label": "__label__1", "pred_score_pos": 0.9989310503005981} {"content": "Shoshin Karate\n\n[   pictures   |   articles   |   events   |   links   ]\n\nHeian Shodan and the Karate Expert\nBy: David Johnston\nFormer Technical Director, American JKA\n\nPart I\n\n\"In the beginner's mind there are many possibilities, but in the expert's there are few. \" Shunryu Suzuki\n\nShunryu Suzuki was a zen teacher who taught in San Francisco from 1958 until his death in 1971. There is a book compiled from his talks during this period called Zen Mind, Beginner's Mind (a very influential book which I recommend to some of my students as a fine karate text book). It contains this line: \"In the beginner's mind there are many possibilities, but in the expert's there are few.\"\n\nWhen you think of yourself as an expert you have stopped learning. A white belt can be dyed any color at all; a black belt cannot. Please take the symbolism seriously.\n\nIn Japanese, the concept is shoshin. Shin is mind or spirit; sho means first or beginning with the connotation of opening to possibilities. This is why sho is used instead of ichi to describe (and not merely assign a number to) the first kata. With Heian Shodan a beginning student learns the most basic principles of karate: sustained awareness, placing the feet for optimum stability whichever way he turns; using changes of position or direction for power. None of these and other principles is masked by complex surface techniques: the slightest violation of them stands out clearly. This is why Heian Shodan never gets easy (indeed, as the ability to detect ever more subtle flaws develops, it should get harder) and why the kata is essential for students at every level. If an advanced tournament fighter were to select just one kata as part of his training schedule, it would probably most usefully be Heian Shodan. (This is not a recommendation, however, that he should neglect other Kata!).\n\nActually, the hardest aspects of Heian Shodan are identical with those of more advanced kata. An anecdote occurs to me which may illustrate the point. In 1974, preparing for sandan, I worked intensively on Nijushiho, often repeating it 100 times. Techniques which had seemed difficult - kicking without moving the line of gravity; the wrapping block at the end - became easier, but standing in yoi with the right feeling of preparedness (and the milliseconds of transition from stillness to movement) became more and more difficult. I mentioned this in some bewilderment to my instructor, Yutaka Yaguchi, who grinned broadly: \"That is karate,\" he said.\n\nIf you really did master Heian Shodan, you probably could be called, with justification, a karate expert. Just don't call yourself one!\n\nPart II\n\nIt seems to me that Unsu and other very advanced kata are performed by lower grades at tournaments more and more. Shame on their instructors! In fact, a young, well-coordinated beginner can learn the outward movements of Unsu in an hour. To another beginner, the performance might look impressive; to someone experienced in Budo, (any authentic martial art, not just Shotokan Karate), it would appear hollow.\n\nA kata which is too advanced will fail to express, or cultivate, a student's understanding of the underlying principles of karate. Some of these principles were mentioned in Part I of this series. Among others, we should remember (especially) Master Funakoshi's Three Imperatives:\n\n 1. (The interplay between) the expansion and contraction of body parts and muscles;\n 2. Fast and slow body movements; and\n 3. Soft and hard body conditions.\n\nAnd whereas a beginner will not learn anything of any depth from the very advanced kata, an advanced student will always benefit - and deepen his understanding of all kata - through continued and serous practice of Heian Shodan. Thus, students of all levels can work together - using dojo time as well as space efficiently - each deriving the same and different benefits according to his or her level.\n\nDifferent techniques can be substituted or added to the basic stepping pattern. Advanced students might sometimes use stances like Hangetsu or Fudo-dachi. One might take a free-sparring posture between changes of direction. All these variations have their uses on occasion but should not distract rrom the value, for everyone, of the kata pure and simple. I want to suggest different ways to practice using the standard techniques.\n\nVery slowly is one way. Be aware of as many components of each movement (physical and psychological) as possible. At the start, for instance, you receive a danger signal - a sound, a movement, a reflection, or shadow. (It's important that every time you practice you connect, in your mind, the technique with its purpose.) Your stomach tightens and eyeballs move, followed milliseconds later by your head. Hips sink and left foot slides out to make length and width for the stance (place it as precisely as you would your hand, dotting an \"i\"). Be aware that the foot moves milliseconds after the hips begin to sink and that as it moves the arms are raised in preparation for down block. At this point the hips are still facing the front and the body feels relaxed except for 50% tension in the abdominal muscles.\n\nWhen the left foot arrives, pivoting on the ball, the heel is drawn into line. Simultaneously, the right heel pushes back and the knee straightens, helping to drive the hip into the block. Tension is felt to radiate from the stomach to the side muscles, chest, and finally the fists (be aware of little fingers and thumbs) as the technique is completed. (see addendum)\n\nFortunately, this is less tedious to practice than to read (or write) about! There are more components to the movement than I have mentioned (consider the coordinated breathing, for instance), but don't enumerate them. Don't think. Just be very aware of what's happening. If it seems easy, turn the microscope up, go more slowly. Notice how the parts fit together and overlap. Things work differently when you slow down. Factors like balance, inertia, and momentum are affected. Learn how these interact with your body - it will improve your motor control. Above all, it will sharpen your concentration.\n\nSome years ago, during a training camp at Brandeis University, I devised a strange competition. Participants were to perform the first five movements of Heian Shodan as slowly as possible. There was only one rule: some movement had to be visible to the judges at all times. The result were significant, I think, and surprising in their consistency. White belts all finished with 30 seconds; purple belts were in the 1 to 1 1/2 minute range; black belts all spun it out to 2 minutes or more. The winner, a nidan, made it to a little less than 3 minutes!\n\nPracticing very slowly, tai chi style, develops concentration and control over techniques and combinations performed at speed. That, of course, is why some movements in kata are required to be slow in actual performance. These movements are, however, not numerous and are often performed without concentration. I believe that sustained slow practice can be beneficial to everyone, and thirty minutes or more should be included in the training routine at least one a month.\n\nADDENDUM: This block utilized direct hip rotation. To anyone trained in JKA Shotokan this is too obvious to be worth mentioning. I know of one local \"shotokan\" instructor, however, who tells his students that the hips are first turned square to the attacker then pulled to \"hanmi\", as the block is completed. \"Must use the hips for power!\" he says. Actually, of course, direct rotation is stronger than reverse rotation, doesn't beak the timing, doesn't expose the groin, and is easier to perform. (The fellow claims to be 8th dan!)\n\nDisclaimer: Karate, like any martial art or other physical fitness regimen carries an inherent risk of injury. Consult your physician before beginning training. Visitors to this site assume full responsibility for their actions and agree by accessing this site to hold blameless the authors and instructors for any results of using the information contained or referenced herein.", "pred_label": "__label__1", "pred_score_pos": 0.9570378065109253} {"content": "Judge Finds Fisherman, Boatman Liable in Personal Injury Lawsuit\n\nJudge finds fisherman, boatman liable in lawsuitA U.S. federal judge in the Commonwealth of the Northern Mariana Islands, a commonwealth of the U.S., has recently found a boat operator and fisherman equally liable in the fisherman's personal injury lawsuit.\n\nFisherman Pedro P. Pinaula claimed that Banga Bandhu Baidya ran over him with his boat while Pinaula was swimming and spear fishing in waters off Micro Beach, according to the Saipan Tribune. Though the boat did not make physical contact with Pinaula, it was alleged that the boat's propeller caught a rope that Pinaula was holding onto and severed his swimming fins. The incident is claimed to have caused emotional distress to Pinaula, as well as a wrist injury caused by the thrashing of the rope that prevented Pinaula from continuing his job as a fisherman.\n\nA U.S. federal judge put an end to the litigation by ruling that Baidya and his employer were liable for $3,600 in damages, to be paid to Pinaula. Pinaula was found to be equally liable, as he did not properly indicate his presence in the water to boats, according to the news source.\n\nAccording to the Mayo Clinic, the most common cause of a wrist injury is a sudden impact, which can cause sprains, strains and fractures.", "pred_label": "__label__1", "pred_score_pos": 0.935116171836853} {"content": "Laurel or Yanny?\n\nRecently a phenomenon arose on whether listeners hear Laurel or Yanny. This event is similar to the blue/black and white/gold dress incident. Where some saw the dress as one set of colors while others saw the dress as the other. Related to the dress, some individuals hear Laurel while others hear Yanny. For others, it changes between the two each time they hear it. Give yourself a try, what do you hear? Test yourself with this link from CNN:\n\nNow, ask someone else what they hear. Were the results the same or different? Try raising and lowering the volume. Did the outcome change? Now, look at this link from the New York Times. They have a made a tool that allows you to move a slider so you can clearly differentiate between Laurel and Yanny:\n\n\nWhy do we hear the same word differently? A neurobiology professor at Northwestern University, Nina Kraus, calls the sounds “acoustically ambiguous”. “Acoustically ambiguous” in this case means that it is a very poor-quality file. This is crucial in explaining why people hear different things (Kennedy). To our understanding, each time the audio file has been posted, there is a good chance it has been tampered with in favor of Yanny or Laurel. On the other hand, the word you hear could also be based on your responsiveness to frequencies. Britt Yazel, a neuroscience doctoral student at the University of California, states that “some people have a greater sensibility to higher frequencies or lower frequencies, which could explain part of why people hear different things”. Another physiological factor that could account for is “much of what you hear, [Kraus says], is about what you’re expecting to hear” (Kennedy). For example, if most of the people around you claim they are hearing Laurel, then there is a good possibility that you will also hear Laurel. Furthermore, if you are used to hearing Laurel in your everyday life, you are more prone to accepting Laurel. In conclusion, Kraus explains that this Laurel/Yanny phenomenon is not necessarily important, but is necessary to understanding the ability of humans to process sounds. This sensation brings awareness to linguistics, neurologists, and speech and hearing specialists by displaying how different brains process sounds differently.\n\n\n\nWhen Sounds Are Too Much...\nJune 14, 2018\nWhy You Should Embrace Hearing Aids\nJune 14, 2018", "pred_label": "__label__1", "pred_score_pos": 0.6502768993377686} {"content": "New FutureLearn Course on Greenland Ice Sheet\n\nRegistration is now open for a new, free European Space Agency/FutureLearn course on how we observe and monitor the Greenland ice sheet.\n\n\nThe online course, which features a number of CPOM researchers, highlights how the Greenland ice sheet is monitored from space and the ground.  It looks at the measurements made possible by Earth Observation (EO) satellites like Cryosat, the technologies and techniques involved, the data generated, and its uses and challenges.\n\nIt also explores the role of ice in the climate system, and the impact of climate change on the Greenland ice sheet.\n\nFind out more and register", "pred_label": "__label__1", "pred_score_pos": 0.9951198101043701} {"content": "Archive for the ‘miracles’ Category\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nWashington, DC\n\n\n\nProper reading of a Scripture verse often identified as being from sacred “wisdom literature” is in focus, today.  Also, there is more on why prayer may not be enough.   The “Yahoo! Answers” writer using ID “Jack Xi Jin” (Level 1 with 18 points, a member since may 14, 2013) posted the following:\n\nWhat is the meaning of Ecclesiastes 11:3?\n\ndeeper meaning?\n\nTHE BATTLE AXE:  Prayer not Enough? (07/12/2013)— (4)  In the same way the absence or presence of faith is not to depend upon a person regularly hearing or seeing miracles, ones belief and trust in GOD is not to depend upon the evidence of answered or unanswered prayer.  Faith permits certainty and knowing based upon a person’s inner content being influenced by and interacting with divine spirit matter.  (5)  Until believers mature to higher levels of faith and submission to GOD, they will continue to engage ambitions, desires and hopes generated from material, physical and social objects.  While GOD has authority and power to grant all that we might ask in prayer, all things we may ask are not expedient for our service as covenant partners, examples, leaders, priests and the righteous offspring of GOD.  Nor do all things further our complete transformation into those glorified, justified, immortal, incorruptible, redeemed, and sanctified.  (6)  In addition to confession of sin, confession of need and declarations of forgiveness are aspects of effectual prayer.  Given that prayer is to be a further demonstration of humility, love and unselfishness the better content is what we give and release to GOD.  Included are acknowledgment, glory, gratitude, honor, praise, and worship.  It remains that the prayers of believers are most correct, and in greatest harmony with GOD—not when pursuing a private agenda or personal affairs—when asking for divine judgment; fulfillment of sacred proclamations, promises, and prophecies; outpourings of divine spirit; repentance; salvation; and the fulfillment of eternal purpose.  See Psalm 80:  3-7, Philippians 4:  5-7, 1st Corinthians 10:  22-24 and Romans 8:  26-30, KJV.\n\n\nTHE DOUBLE DAGGER:  A Guide to Salvation (04/10/2013); Faith, Language and “Mystery” (04/11/2013); A Spirit Church? (04/04/2013); Spirit Matter (10/21/2012); Caesarea Philippi (10/22/2012); GOD Does Exist (03/20/2012); The “Original” Bible (03/21/2012); (09/04/2011) Dispatch 25:  Comparing Spiritual Things\n\n“Jack Xi Jin”, many serious believers in Christ would first caution you not to separate passages and verses that form a paragraph of the Scriptures.  The message immediately becomes distorted and warped when taken out of context.  The full context includes New Testament writings (see John 3, KJV).  Even so, here are some points to consider that should help you to avoid spiritual confusion:\n\n(1)  The verse states that there are finite conditions, natural limitations (we say, laws), and peculiar sequences of events within the material sphere that holds created beings and living creatures.\n\n(2)  With verses 1-5, the following verse (# 4) goes on to assert that a person’s focus upon aspects of the material sphere does not  produce knowledge of divinity and right relationship to the Creator any more than research and study (we say, meteorology, and science) of the wind produces authority over and control of the weather.\n\n(3)  Mankind is encouraged to apply information, make measured choices, and pursue meaningful goals despite lacking total knowledge of the human environment, and despite not having a perfect knowledge of GOD.  Thus, unstated elements come into view that include confidence, faith, holy boldness, risk-taking, and trust.\n\nAs with all Scripture, there is far more to be said, correctly applied, and spiritually apprehended.  (For example,  (4)  Just as obtaining right knowledge of material reality often requires a person to take action, have contact, immerse themselves, participate in events and then wait, acquiring right relationship to GOD as Creator, Judge, redeemer, and Savior demands peculiar operations and responses through the ministry of Jesus Christ that appear to go forward or come into view only after extended periods of waiting.  Much of what believers receive (baptism, church attendance, study of the Bible, etc.) is to enable and enrich ones wait.)   Even so, I trust this fragment will be useful.  Be it unto you according to your faith.\n\nWashington, DC\n\nDisclaimer 7-10\n\n\nAdditional Details\n\n\n\n\n\n\n\n\n\nWashington, DC\n\nThe meanings of darkness and night as they appear in a prophecy spoken by Jesus are topics, today.  Also, there is more on how death as the end of pain and suffering relates to self-will and sin.  A “Yahoo! Answers” writer using ID “pray for the world.” (Level 7 with 68,843 points, a member since April 15, 2011) posted the following:\n\nChristians, what did Jesus mean by night coming when no man can work?\n\nJohn 9:4 (ESV)\n\n\nTHE BATTLE AXE:  The End of Pain? (06/10/2013)—  (6)  Self-will in created beings and living creatures is defiled by sin and made spiritually unclean.  Saying this another way:  will in temporal beings (those who are not eternal) decays and rots; and ones spiritual endowment from GOD is diminished.  Through the influence of sin upon self-will (we say, will-power), it is now widely-held error within the awareness of created beings and living creatures that GOD is an arbitrary cause of death, that death occurs randomly and serves no purpose, and that the end of GOD will bring the end of death.  Ones desire for their own continuity and permanence as well as that for their loved ones cannot be satisfied through operations of human will.  Sin results in death by blocking and interrupting divine growth, learning, maturation, and perfection. \n\n\nTHE DOUBLE DAGGER:  Jesus Lives! (05/04/2013); Time Before The Sun? (04/14/2013); The Obedience of Jesus? (04/15/2013); Did Jesus Know? (12/22/2012); The True Miracle (12/23/2012)\n\n“pray for the world.”, many mature Christian believers who deeply love Jesus as our Redeemer and Savior would agree that anyone who desires a full and mature knowledge of the Gospel, should also consider the following points:\n\n(1)  Throughout the holy writings, day and night are recurring conditions in human experience, and the natural world.  Day is the time of light when meaningful work and honest activity may be completed.  As an extended period dominated by darkness, many repeatedly choose night as the time to commit sins, and pursue pleasures that are offenses against GOD.  Transgressors gain a heightened confidence that, cloaked and covered by night, they will remain anonymous, their wrongdoing will not be detected or interrupted, they will have greater opportunity to escape, and, even when seen by witnesses, they will not be easy to identify in the light.\n\n(2)  Along with blindness, darkness and night also speak to ignorance of revealed truth from GOD.  In addition to preaching a prophetic message, teaching from the holy writings, and witness as his ministry from GOD, Jesus performed works that included exorcism (i.e., casting out devils and unclean spirit beings that attempt to conceal themselves from divine sight by hiding within human bodies, who debase and defile their hosts), forgiving the condemned in judgment, healing the blind, and raising the dead.\n\n(3)  Because of depression, despair, and sorrow without godly hope, death is spoken of in the world as darkness, and night.  (The earth is the creation of GOD; the world is the man-made system for exchange and survival upon the earth.)  Through Jesus Christ, mankind receives the demonstration of resurrection, the promise of eternal life, and the expectation of unending light provided by the permanent presence of GOD.\n\nThere is far more to be said, correctly applied, and spiritually apprehended.  (For example, (4)  Jesus prophesied his own death as unavoidable, and highlighted the truth that the continuing work of his disciples and apostles as vessels of the Holy Spirit would be the primary spark of GOD upon the earth until the time of his second coming.)  Even so, I trust this fragment will be useful.  Be it unto you according to your faith.\n\n Washington, DC\n\n\nWhy does Jesus require all of us die on the cross?\n\n\n\n\n\n\n\n\n\n\nWashington, DC\n\n      The account of Jesus rebuking a storm is considered, today, along with more on how one truth (that GOD uses hell to destroy sin and sinners) does not cancel another (that GOD is a God of love). A “Yahoo! Answers” writer using the ID “Trace” (Level 1 with 89 points, a member since December 10, 2012) posted the following:\n\nWhat is the main point of Mark 4:35-41 talking about jesus in the storm?\n\nTHE BATTLE AXE: A GOD of Love? (05/07/2013)—(5.) For many the highest expression of human love is sexual joining where being is experienced as emotional, physical, psychological and spiritual all at the same time, and where a new life or lives may be begun. For mature Christian believers the highest expressions of love are accounted to be forgiveness, giving, obedience, sacrifice, service and suffering where ones own desire and will are put aside to unselfishly carry out and fulfill the will of another. (6.) Hatred, malice and sin do not change or respond to affection, logic, persuasion, trust, reason, or any operation by the Spirit of Christ. The imparted, indwelling Spirit is the primary divine mechanism that allows created beings and living creatures to recognize, and resist sin that may be present as an unseen influence upon ones self-will. In agreement with the divine purposes of Creation, sin is not to be an eternal presence; and the sacred process that will permanently eliminate sin can not be carnal, material, social, and venal. The necessary divine actions for the final removal of all the vessels of sin, and the bestowing of eternal life upon the vessels of divinity are correctly understood only as duty, judgment, love, righteousness, sanctification, and truth.\n\n\nTHE DOUBLE DAGGER: Why Jesus Authored No Books (05/01/2013); Recognizing True Prophets (05/02/2013); Jesus, A Party Animal? (05/03/2013); The True Miracle (12/23/2012); About the Star? (12/24/2012); Given the Cloud of Witnesses (11/29/2012); A Golden Ticket? (11/30/2012)\n\n      Trace, here are some ideas that many mature Christian believers regularly consider in order to eliminate spiritual confusion:\n\n(1.) We all continue to be physical beings in a natural and temporal world. When our beliefs and thoughts are not grounded and rooted in the Holy Spirit, the demonstration of divinity, god-likeness, sacred person and supreme power must also include visible displays of control and will-power that can alter being and existence, life and death. (See John 4: 46-54, KJV).\n\n(2.) Through the holy writings and prophesies, Jesus was aware his ministry would have to use materials and techniques for immediate and enduring impact. The window of opportunity was brief, being only three and one-half years. While miracles do not automatically produce faith—confusion, doubt and fear may result—faith and hunger for further truth can be aroused and focused by miracles.\n\n(3.) Most correctly understood, faith is an aspect of divine substance, and is inseparable from such other sacred content as holiness, humility, righteousness, truth, wisdom, and wrath against sin. The endowment of divine breath and spirit provided to mankind at Creation has been reduced and weakened through sin. The ministry of Jesus Christ now permits renewal of ones divine essence through operations of the Holy Spirit that include baptism (i.e., death, rebirth, repentance, and sanctification).\n\n      There is far more to be said, correctly applied, and spiritually apprehended. (For example, (4.) Ordinarily, crossing the lake was a simple journey requiring no more than hours. The storm that hindered the disciples and threatened to destroy the ministry of Jesus, was not sent by GOD. Their efforts were all carnal, material and physical, and came down to rowing, and casting water out from the ship. As co-laborers with Christ, the disciples were to realize the true nature of the storm, and correctly apply their own spirit power from the Father. Command, judgment, operating in the lawful authority from GOD, and prayer apparently had been completely overlooked.) Even so, I trust this fragment will be useful. Be it unto you according to your faith.\n\nWashington, DC\n\n      Focus today is upon the differences between John the Baptist and Jesus Christ as sons from GOD that were born with the Holy Spirit. Also, there is more on Noah’s flood and the provisions of GOD to preserve mankind. The “Yahoo! Answers” writer using the ID “Chris” (Level 1 with 193 points, a member since February 2, 2010) posted the following:\n\nIf John the Baptist and Jesus Christ Both Born with The Holy Spirit?\n\nJohn the Baptist, Son of Zechariah and Jesus Christ Son of Joseph, Both born with Holy Spirit then why Christians believe that Jesus is the only son of God.\n\nTHE BATTLE AXE: Destroyed in Noah’s Flood? (04/28/2013)—(6.) The task of supplying food for the variety of animals that would enter the ark was relatively simple because, prior to the flood, the food stuff provided from GOD for all living was the same, “every green herb.” Seed and provisions for agriculture and farming had been taken into the ark along with stores for food. Noah, his sons, and all the living creatures that left the ark were commanded by GOD to reproduce and to replenish the earth through lives centered in family, work, and worship. In the divine mind, family is to be a peculiar union of souls bond by shared goals and sacred purposes. See Genesis 1: 30 and Genesis 9: 1-17, KJV). (7.) The priesthood from Adam that was continued in Noah also centered in acknowledging atonement for sin through blood, and looked forward to the appearance of GOD in flesh to provide a final, holy cleansing. The sacred dynamics of faith, grace, and promise were a “life line” for the remnant that left the ark. In the same way mankind was to look above for the beauty of the rainbow, for cleansing of the waters, for winds to carry away from the living the continuing stench of the earth, and for divine healing of the soil, the mountains and the sky, all living were to look to GOD for grace, justice, and righteousness in covenant. See Genesis 8: 15-22, KJV. (9.) The work of recovery given to Noah could not be accomplished using the world’s wealth, credit and loans from the nations. The were able to start because they were guided by experience, knowledge, memories and understandings they had acquired through the operations of GOD. Similarly, through the holy writings (not available to Noah), and through the imparted, indwelling Spirit of Christ, believers today are also granted a bright, clear vision that empowers their living and covers them as a shield in the face of condemnation, death, destruction, disease, opposition, persecution, threats, and upheaval. See Ezekiel 1: 27-28, KJV.\n\n\nTHE DOUBLE DAGGER: The Divine Use of a Human Life? (04/23/2013); Quoting Scripture to GOD? (04/24/2013); Why Blood? (04/13/2013); Time Before the Sun? (04/14/2013); Before Abraham Was… (03/14/2013); Our Need for a Son (03/04/2013); Unless You Repent (03/05/2013); The Need to Purify Heaven (01/17/2013); Melchizedek? (12/22/2010); Free t0 Eat? (12/23/2010)\n\n      Chris, the question you have posed is one many mature Christian believers have carried before GOD through their prayers. Among the various satisfying truths we have received are the following:\n\n(1.) The process of GOD for mankind must be progressive and temporal, and is intended for created beings and living creatures throughout the universe of GOD. Saying this another way, the revelation of GOD is continuous, eternal, and ongoing, and occurs in uninterrupted stages that prepare and lift from level to level those who have understanding.\n\n(2.) The sending of prophets became an aspect of covenant relationship the day GOD spoke the law from Horeb, and the people in terror, petitioned that GOD would speak to mankind again only by human agents such as Moses. See Deuteronomy 4: 5-20, Deuteronomy 5: 1-7 and Deuteronomy 18: 15-22, KJV.\n\n(3.) There are several examples of miraculous births (childbearing by barren women) before that of John the Baptist; and John is to be seen in both the tradition of the Judge Samson, the Priest/Prophet Samuel as well as the Prophet Jeremiah. The absolute authority and sovereignty of GOD over judgment, life, death and salvation are all signaled. See Jeremiah 1: 4-9, KJV.\n\n(4.) Jesus is spoken of as the “only begotten” in the understanding that he is an appearance or incarnation of GOD in human flesh, and is not by fertilization, mitosis (cell division), and human reproduction. The birth of John is by the operation of the Holy Spirit through and upon flesh, while the birth of Jesus is by a deposit of divinity from the Holy Spirit within flesh. Mary, the mother of Jesus, had been specially chosen, prepared and set apart for divine service as child bearer and caretaker.\n     There is far more to be said, correctly applied, and spiritually apprehended. (For example, (5.) Knowing Jesus was baptized by John, many who are not yet mature in their understanding ask, Who was John taught, anointed or baptized by? In the same way John was born into the priesthood of Levi, he was born to be the herald to the kingdom of heaven in Jesus Christ.) Even so, I trust this fragment will be useful. Be it unto you according to your faith.\n\nWashington, DC", "pred_label": "__label__1", "pred_score_pos": 0.8300403356552124} {"content": "diff --git a/README.md b/README.md index 0865070abd92415c5d8de04f8a228d7a5c2bfc11..1b59afd18a07c386c83a39b6cf0702f90ea3eb91 100644 --- a/README.md +++ b/README.md @@ -9,6 +9,7 @@ Hi, I’m the UX Manager for Enablement and Growth. Thanks for visiting! * I have two dogs and a cat. I like gardening, snarky cross-stitch, cooking, reading, video games, live music, traveling to new places, and trying new restaurants, among other things. ### A bit about how I work and think +* I've worked as a UX designer and researcher. My really strong areas are information architecture and UX strategy - uncovering user insights and modeling flows and experiences. * I recently read [Radical Candor](https://www.amazon.com/Radical-Candor-Kick-Ass-Without-Humanity/dp/1250103509/ref=sr_1_2?crid=1XTASFP9TYTI8&keywords=radical+candor&qid=1561143007&s=gateway&sprefix=radical+cand%2Cgarden%2C150&sr=8-2) and found it to really help me frame things up for honest communication. If you haven’t read it, I highly recommend it! * I’m somewhat introverted and have a tendency to immerse myself in ideas and process over relationships and action. It’s not a bad thing; it means I try to balance my days between thinking and talking. * Values I have and like in others: personal responsibility, honesty, and authenticity. I like understanding what others care about, so next time we talk, feel free to tell me about your values and how they shape your work.", "pred_label": "__label__1", "pred_score_pos": 0.9993650317192078} {"content": "Woman Worriers - Elizabeth Cush\n\nWomen are twice as likely as men to have anxiety. In each episode of Woman Worriers, host Elizabeth Cush, an Annapolis, Md. based therapist and blogger, explores what causes anxiety, what triggers it, how it affects us and why women are more prone to it. Elizabeth is a fellow Woman Worrier and she shares her personal experience and chats with her guests for insights, strategies and resources to help women (and men) learn how to call a truce with their anxiety.\nClick here if you're not redirected", "pred_label": "__label__1", "pred_score_pos": 0.829932689666748} {"content": "Finding the thesis statement of a book\n\nColonization era was the climax of the slavery boom.\n\nFinding the thesis statement of a book\n\n\nThesis Statements and Introductory Paragraphs\n\nDo NOT spend more than one-third or so of the paper summarizing the book. The summary should consist of a discussion and highlights of the major arguments, features, trends, concepts, themes, ideas, and characteristics of the book.\n\n\nYou might want to take the major organizing themes of the book and use them to organize your own discussion. This does NOT mean, however, that I want a chapter-by-chapter summary. Your goal is a unified essay. So what do I want, if not just a summary?\n\nCritical Thinking Course: Corbett essay: Finding a Thesis\n\nThroughout your summary, I want you to provide a critique of the book. It is not necessarily negative. Nor do you need to know as much about the subject as the author because you hardly ever will. The skills you need are an ability to follow an argument and test a hypothesis.\n\nRegardless of how negative or positive your critique is, you need to be able to justify and support your position. Here are a number of questions that you can address as part of your critique.\n\nYou need not answer them all, but questions one and two are essential to any book review, so those must be included. The answers should be part of a carefully constructed essay, complete with topic sentences and transitions. What is your overall opinion of the book?\n\nOn what basis has this opinion been formulated? That is, tell the reader what you think and how you arrived at this judgment. What did you expect to learn when you picked up the book? To what extent — and how effectively — were your expectations met? Did you nod in agreement or off to sleep?\n\nDid you wish you could talk back to the author?\n\nFinding the thesis statement of a book\n\nAmplify upon and explain your reactions. How clearly and in what context is it stated and, subsequently, developed? To what extent and how effectively i. Use examples to amplify your responses. If arguments or perspectives were missing, why do you think this might be?\n\nHow well have they been achieved, especially with regard to the way the book is organized? Are these aims supported or justified? You might look back at the introduction to the book for help. What assumptions lie behind these points? How effectively does the author draw claims from the material being presented?How to Write a Research Paper/Book Review An analytical book review will identify the book’s thesis, and evaluate / critique the author’s argument, evidence, and conclusions.\n\n\nThe first claim is a statement of (alleged) truth about the market. The second claim is a statement of (alleged) truth about the belief of the speaker. how does one find a thesis and why do I think finding the thesis of my first paper, the introductory essay, is hard?\n\nYou are reading this work (an article, a book, whatever) and a good. Thesis Definition.\n\nThesis Definition\n\n\n\nFinding the thesis statement of a book\n\nA Good Man Is Hard To Find Thesis Statement. a good man is hard to find. Flannery O’Connor´s book A Good Man Is Hard To Find, is composed of several short stories, one of which takes the tittle of the book.\n\nIn this story the author, with the characters, the Grandmother, the protagonist, and the Misfit, the antagonist, exposes some ideas. A thesis statement clearly identifies the topic being discussed, it should only cover what is being discussed in the paper, and is written for a specific audience.\n\n\nENG - Identifying a Thesis", "pred_label": "__label__1", "pred_score_pos": 0.8410474061965942} {"content": "Consent, Policing, and School Safety\n\nA recent controversy at an Arizona Starbucks spurred anger across social media:\n\nStarbucks on Sunday apologized after an employee at one of its stores in Tempe, Arizona, asked six police officers to leave or move out of a customer’s line of sight, triggering social media backlash.\n\n\nConservative pro-police voices called for a boycott of Starbucks, and eventually, the company issued an apology.\n\nThe outrage toward customers in Starbucks finding the presence of police officers intimidating is a uniquely American response, but not one common to all Americans.\n\nSeveral months ago, I was having a late dinner at a nearby Mexican restaurant after I finished teaching an evening course at my university. Just as I was eating chips with salsa and drinking the XX I ordered, in walked four officers with the county K-9 unit.\n\nThese men were typically outfitted like militia—several visible weapons and fatigues. They were dressed for war—not to serve and protect.\n\nImage result for greenville county K-9 units\n\nI was deeply uncomfortable when they sat beside me; in fact, I always find armed police officers intimidating because they have guns.\n\nFor many years now, U.S. police forces have become more and more militarized, through training and acquiring equipment from the military.\n\nThe uncomfortable Starbuck’s customers are, in fact, embodiments of what research shows about heavily armed and antagonistic police forces—especially when compared to London policing, which is grounded in policing by consent from 1829:\n\n\nResearch on “deterrence models,” “based on the idea that offenders and would be offenders are responsive primarily to the risk of punishment,” where “agents of criminal justice need to send out signals of strength, force, detection and justice” and “legitimacy” models where “authority has the right to exercise power [because] it commands consent (a sense of obligation to obey) that is grounded in legality and moral alignment” support the problems with the former and the value in the latter.\n\nThat research concludes: “Policing by consent is based upon the idea that the police gain voluntary approval and cooperation from the public not through aggressive control of the population, but through fostering a close social connection between the police and public.”\n\nAnd thus, citizens in London have a distinctly different experience with police:\n\n\nThis is no accident.\n\nThe Metropolitan Police, which covers most of London, was founded in 1829 on the principle of “policing by consent” rather than by force.\n\n\n…In the year up to March 2016, police in England and Wales only fired seven bullets….\n\n\nThe contrast with the U.S. is stunning:\n\n\n\nAnd for people living in Arizona, “on average, it happens every five days: An Arizona police officer aims a weapon and shoots at someone.”\n\nThat armed police officers enter a coffee shop and cause discomfort is not reason to boycott a lucrative chain but a clear signal about the harm being done to democracy and safety in the US. As Jonathan Mummolo’s research details:\n\n\nThe public and political misguided belief in militarized police units is eerily similar to the public and political calls for turning public schools into prisons through armed guards (and teachers), surveillance cameras, metal detectors, and active shooter drills.\n\nJust as militarized police forces do not deter crime or protect officers, commonly embraced safety features being implemented in schools do not make schools more secure and can often increase unsafe behavior by students.\n\nTo protect a democracy and the public schools that in theory feed that democracy, and to foster a society that is both free and safe, the concept of policing by consent is both more effective and better matched to the ideals often claimed for the U.S.\n\nThe root problem in the U.S. continues to be guns and seemingly unbridled tendencies toward authoritarianism.\n\nThe Starbucks customers had rational reactions not only to the presence of the police officers but to the reality those officers represent—that in the U.S. militarized police forces do not make us safer but often create violence and even death.\n\nDare the School Build a New Social Order?: A Reckoning 86 Years Later\n\nThe candidacy seemed at the time nothing more than sideshow, perverse reality TV, and then Donald Trump secured the Republican nomination for president, prompting many pundits to note that as a death knoll for the Republican Party.\n\nYet, Trump was elected president.\n\nDuring the primaries and throughout his run against Hillary Clinton, Trump proved to be relentlessly dishonest, a liar. However, mainstream media avoided calling a lie “a lie,” including major media outlets directly arguing against such language. President Trump hasn’t budged from overstatement, misleading statements, and outright lies.\n\nNotably, major media publish Trump’s lies as if they are credible, despite fact-checking exposing lie upon lie upon lie.\n\nEarly on, many opposing Trump called for media simply to call out the lies. Here is the truly bad news, however.\n\nDuring my Tuesday role as caregiver for my 2-year-old grandson, I flipped through my cable channels during his nap for a brief reprieve from NickJr. I paused on CNN, even though I loath all of the 24-hour news shows.\n\nWhat caught my ear was that the newscaster was repeatedly calling Trump our for lies, using the word “lie”—over and over. This, I felt, was a real new normal I had called for, but never expected.\n\nNext, the newscaster replayed a segment from the day before focusing on a fact checker of Trump’s many, many lies. The fact checker noted a truly disturbing fact: Trump’s supporters, he explained, recognize that Trump lies, but doesn’t mind the lies; in fact, Trump’s supporters revel in those lies because, as the fact checker emphasized, this drives liberals crazy.\n\nIt is here that I must stress two points: (1) It appears those of us believing that exposing Trump as a liar would somehow derail his presidency were sorely mistaken, and (2) we are now entering a phase of U.S. history in which the long-standing slur of “liberal” is code for taking evidence-based stances, especially if those evidence-based stances swim against the current of American ideology and mythology.\n\nLet me offer a couple example.\n\nIn my own public and scholarly work, contexts that prompt responses that discount me as a “liberal” (with false implications that I am a partisan Democrat), I have made repeated and compelling cases against corporal punishment and school-only safety measures.\n\nNeither of these issues is both-sides debates since the research base is overwhelmingly one-sided.\n\nCorporal punishment is not an effective discipline technique, and it creates violent youth and adults. A powerful body research prompted by the school shooting at Columbine and including studies by the Secret Service reject school-only safety measure such as security guards, surveillance cameras, active-shooter drills, and metal detectors, all of which are not deterrents and may even create violence.\n\nTherefore, to embrace evidence-based positions on corporal punishment and school safety is the liberal or progressive (seeking change) stance, while the traditional or conservative (maintaining established practices) positions (ignoring the evidence) cling to corporal punishment and fortifying schools while refusing to address the wider influences of communities and our national mania for guns.\n\nLet’s consider that last point more fully next.\n\nThere is an unpopular and upsetting fact driving why school-only safety measures are futile: K-12 and higher education are essentially conservative.\n\nDespite political and popular scapegoating of all formal education as liberal, the evidence of nearly a century reveals that all forms of school more often than not reflect the communities and society they serve. In no real ways, then, do schools meet the former Secretary of Education Arne Duncan’s hollow mantra that education is the great equalizer, some sort of silver bullet for change.\n\nEvidence shows that at different levels of educational attainment, significant gaps persist among racial categories and those gaps are even more pronounced once race and gender are included (see p. 34).\n\nIn the 1930s, a golden era for idealism about communism and socialism in the U.S. after the stock market crash, major educational thinkers such as John Dewey (a socialist) and George Counts championed the potential for progressive education (Dewey) to shape U.S. democracy, and then for social reconstruction (Counts) to reshape the nation, as Counts detailed in his Dare the School Build a New Social Order? (1932).\n\nAs an early critical voice, Counts spoke to the educational goals that appealed to me as I eventually found critical pedagogy in my doctoral program and doubled down on my early commitment to be the sort of educator who fostered change with and through my students.\n\nYet, here I sit in 2018, 86 years after Counts’s manifesto. And the U.S. is being led by a pathological liar supported by more and more people who directly say they don’t care about lies or evidence because it makes liberal mad.\n\nThis is the pettiness our country has wrought, despite more people today being formally educated than at any time in U.S. history.\n\nMy 35 years and counting as an educator, part as a high school teacher and now in higher education, have been a disappointing lesson that answers Counts’s titular question with a resounding “no.”\n\nI shared with my foundations education class the proofs of a chapter I have prepared for a volume now in-press, Contending with Gun Violence in the English Language Classroom. I then briefly reviewed the evidence against in-school safety measures, prompting a student to ask what, then, should we do in schools.\n\nAddress our larger gun culture and violent communities, I explained, reminding the class that I have stressed again and again that they need to understand at least one essential lesson from our course: Schools mostly reflect communities and society, but they simply do very little to change anything.\n\nI don’t like this message, but it is evidence-based, and I suppose, a liberal claim.\n\nFor many years, I have quickly refuted those who assume I am a partisan Democrat (I am not, never have been). I also have rejected labels of “liberal” and “progressive” for “critical” and “radical.”\n\nBut I feel the time is ripe for re-appropriating “liberal” when it is hurled as a slur.\n\nIn Trumplandia, to be fact-free is to be conservative, traditional, and to acknowledge evidence is to be liberal, progressive.\n\nThis is what the evidence reveals to those of us willing to see. Everything else is a lie.\n\nThere’s both sides for those who want it.\n\n\nCollege campuses are far from radical\n\nA New School Year But the Same Concerns about Safety\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nSchool Safety and Security: Research and Evidence\n\n\nUpdate: Enhancing School Safety Using a Threat Assessment Model, United States Secret Service (2018)\n\nIf You Want to Know How to Stop School Shootings, Ask the Secret Service, Jeff Daniels, Professor of Counseling, West Virginia University\n\nThe Final Report and Findings of the Safe School Initiative, United States Secret Service and U.S. Department of Education (2002)\n\nOverview of Safe School Initiative Findings\n\nThe findings of the Safe School Initiative suggest that there are productive actions that educators, law enforcement officials and others can pursue in response to the problem of targeted school violence. Specifically, Initiative findings suggest that these officials may wish to consider focusing their efforts to formulate strategies for preventing these attacks in two principal areas:\n\n\nSupport for these suggestions is found in 10 key findings of the Safe School Initiative study. These findings are as follows:\n\n • Incidents of targeted violence at school rarely were sudden, impulsive acts.\n\nWhy security measures won’t stop school shootings, Bryan Warnick, Benjamin A. Johnson, and Sam Rocha\n\n\n\nPreventing School Shootings: The Effectiveness of Safety MeasuresCheryl Lero Jonson\n\n\nThe tragedies at Columbine High School, Virginia Tech, and Sandy Hook Elementary School catapulted concern about school shootings into the national spotlight. Calls for something to be done to protect our students, faculty, and staff became a salient concern for school administrators, with many schools hiring armed security officers, restricting access to campus buildings, installing metal detectors, and training individuals how to respond when a shooter enters school grounds. However, many of these security measures were implemented with little to no consultation of the empirical literature. This failure to enact evidence-based responses has had fiscal and latent consequences that are only now being discovered. This essay seeks to fill that void by examining the empirical evidence surrounding common security measures enacted in response to well-publicized school shootings and calling for the use of an evidence-based approach to school safety.\n\nSchool Security Measures and Their Impact on Students, National Association of School Psychologists\n\nImpact of Security Measures on Violence\n\n • There is no clear evidence that the use of metal detectors, security cameras, or guards in schools is effective in preventing school violence, 8,9,10,11 and little is known about the potential for unintended consequences that may accompany their adoption.12\n • There has not been sufficient research to determine if the presence of metal detectors in schools reduces the risk of violent behavior among students. 13\n • Some researchers have expressed concern about the widespread use of guards, cameras, and other security technologies, given that so little is known about their effectiveness. 14,15\n • Research has found security strategies, such as the use of security guards and metal detectors, to be consistently ineffective in protecting students16 and to be associated with more incidents of school crime and disruption17 and higher levels of disorder in schools. 18\n • Evidence from a school–police partnership implemented in New York City reveals that students in these schools continue to experience higher than average problems linked directly to future criminality, compared to students in other New York City schools not involved in the partnership. 19\n • Surveillance cameras in schools may have the effect of simply moving misbehavior to places in schools or outside of schools that lack surveillance. Even more troubling, it’s possible that cameras may function as enticement to large-scale violence, such as in the case of the Virginia Tech shooter who mailed video images of himself to news outlets.20\n • Research suggests that the presence of security guards and metal detectors in schools may actually increase levels of violence in schools by strengthening the influence of youth “street” culture with its emphasis on self-protection.21\n\nMore Guns Do Not Stop More Crimes, Evidence Shows, Melinda Wenner Moyer (Scientific American)\n\nMore than 30 peer-reviewed studies, focusing on individuals as well as populations, have been published that confirm what Kellermann’s studies suggested: that guns are associated with an increased risk for violence and homicide. “There is really uniform data to support the statement that access to firearms is associated with an increased risk of firearm-related death and injury,” Wintemute concludes. Gun advocates argue the causes are reversed: surges in violent crime lead people to buy guns, and weapons do not create the surge. But if that were true, gun purchases would increase in tandem with all kinds of violence. In reality, they do not.\n\nStudent Surveillance, Racial Inequalities, and Implicit Racial Bias, Jason P. Nance\n\n\nIn the wake of high-profile incidents of school violence, school officials have increased their reliance on a host of surveillance measures to maintain order and control in their schools. Paradoxically, such practices can foster hostile environments that may lead to even more disorder and dysfunction. These practices may also contribute to the so-called “school-to-prison pipeline” by pushing more students out of school and into the juvenile justice system. However, not all students experience the same level of surveillance. This Article presents data on school surveillance practices, including an original empirical analysis of restricted data recently released by the U.S. Department of Education after the shootings at Sandy Hook Elementary School. Paralleling other disturbing trends of inequality in our public school system, these results and other empirical analyses reveal that schools serving primarily students of color are more likely to rely on more intense surveillance measures than other schools. Further, the empirical evidence suggests that these racial disparities may not be justified by legitimate safety concerns. This Article then turns to a discussion of the role that implicit racial bias may have in school officials’ decisions to rely on intense surveillance methods. Finally, it proposes legislation and strategies that federal lawmakers, state lawmakers, and school officials should adopt to counteract the effect of implicit racial bias on school officials’ decisions to implement strict security measures (and other decisions school officials make). Implementing these recommendations will help create better learning environments that benefit students of all races.\n\nLatino/a Student Threat and School Disciplinary Policies and PracticesKelly Welch and Allison Ann Payne\n\n\nUsing a nationally representative sample of approximately 3,500 public schools, this study builds on and extends our knowledge of how ‘‘minority threat’’ manifests within schools. We test whether various disciplinary policies and practices are mobilized in accordance with Latino/a student composition, presumably the result of a group response to perceptions that white racial dominance is jeopardized. We gauge how schools’ Latino/a student populations are associated with the availability and use of several specific types of discipline. We further explore possible moderating influences of school crime and economic disadvantage on punishment. We find that schools with larger percentages of Latino/a students are more likely to favor certain punitive responses and less likely to favor certain mild responses, as predicted by minority threat. The percentage of Latino/a students is also related to greater use of certain disciplinary responses in schools with less crime.\n\nMental Illness Didn’t Make Him Do It, Jonathan Foiles (Psychology Today)\n\nThe supposed link between mental illness and violence is so ingrained in our culture that stories like the above need only suggest that the perpetrator was depressed to satisfy a need for an explanation. Research reveals a far different story, however. People with mental illnesses are actually far more likely to be victims rather than perpetrators of violence (Appleby et. al., 2001). Those with severe mental illnesses (schizophreniabipolar disorderpsychosis) are actually 2.5 times more likely to be victims of a violent crime than the general population (Hiday, 2006). A 2011 study found that to prevent one violent homicide by a person with schizophrenia, 35,000 patients deemed to be at a high risk of violence would need to be detained (Large et. al., 2011). And yet the link persists. A 2013 survey conducted after the Newtown shooting found that 46 percent of Americans believe that persons with a serious mental illness are “far more dangerous than the general population” (Barry et. al., 2013).\n\nThe MacArthur Violence Risk Assessment Study Revisited: Two Views Ten Years After Its Initial PublicationE. Fuller Torrey , M.D., Jonathan Stanley , J.D., John Monahan , Ph.D., and Henry J. Steadman , Ph.D.\n\nThe lessons to be learned from the MacArthur Study are those that we have identified in our various publications. Among the more salient findings, violence risk attributed to people with mental disorders vastly exceeds the actual risk presented. Indeed, for people who do not abuse alcohol and drugs, there is no reason to anticipate that they present greater risk than their neighbors. The predictors of violence by people with mental disorders are more similar to than different from the predictors for the population as a whole, including alcohol and drug abuse. Violence in this population only rarely results in serious injury or death and generally does not involve the use of weapons. People with mental disorders are less likely than people without such disorders to assault strangers and to commit assaults in public places. Although there is suggestive evidence that remaining in treatment may reduce rates of violence among some persons with mental disorders, better data are needed; it is unlikely that treatment alone will eliminate violence risk.\n\nMost Mass Shooters Are Not Mentally Ill, Carmela Epright\n\nSociologists explain why American men turn to gun violence, Tristan Bridges and Tara Leigh Tober\n\nA great deal of commentary attempts to tie mass shootings to a single issue. Often, that seems like the easiest way to make sense of atrocities. That’s why we get sound bites that lean on mental health (when shooters are white), terrorist ties and affiliations (when shooters are brown), gang violence and “urban decay” (when shooters are black), bullying (when it happens in a school), and overwork (when it happens in a workplace).\n\nThe truth cannot be boiled down to any single issue. As sociologists, we can look to the bigger picture, point out patterns, and identify common denominators. Our research suggests that gun control is, indeed, an important piece of the problem. But in order to understand the factors behind America’s mass shootings, it is also critical to consider the relationship between masculinity and violence.\n\nScholars who study masculinity and mass shootings have consistently drawn attention to the fact that mass shootings are not only a uniquely American social problem; they are a problem with American men. We’ve argued before that there are two questions that require explanation related to gender and mass shootings. First, why is it that men commit virtually all mass shootings? And second, why do American men commit mass shootings more than men anywhere else in the world?\n\nThe psychological effects of ‘active-shooter drills’ on kids could do more harm than good, James Hamblin\n\nStudies of whether active-shooter drills actually prevent harm are all but impossible. Case studies are difficult to parse. In Parkland, for example, the site of the recent shooting, Marjory Stoneman Douglas High School, had an active-shooter drill just last month. The shooter had been through such drills. Purposely countering them may have been a reason that, as he was beginning his rampage, the shooter pulled a fire alarm.\n\nIn any case, preparedness drills always change the baseline level of risk that people perceive. This heightening can manifest as stress and anxiety, not to mention changing the way kids understand how people treat one another—to even consider violence an option, not in some abstract way.\n\nColleen Derkatch, an associate professor at Ryerson University in Toronto, studies how we assess risk when it comes to our health. “The more prepared we are, the more heightened our sense of risk,” she told me. “And one potential effect we haven’t considered is how these kinds of preparedness activities affect kids psychologically, and could increase a sense of feeling at risk. They really expand the ways in which we feel increasingly under siege.”\n\n\nThe National LGBTQ Task Force is a progressive social justice organization that works toward a society that values and respects the diversity of human expression and identity, and achieves equity for all. As the progressive voice of the LGBTQ movement, the Task Force approaches gun violence prevention from an intersectional framework conscious of issues such as racial justice, disability justice, and reproductive justice. These policy recommendations are meant to provide a guide for policy makers and advocates alike on advocacy for gun violence prevention from a progressive, intersectional perspective. In this policy brief, we have identified 10 recommendations for addressing our nation’s gun violence epidemic.", "pred_label": "__label__1", "pred_score_pos": 0.6473998427391052} {"content": "although which could slightly vary from each other,\n\nalthough we’ve had leaders and leadership during the human history, people haven’t continually been as attentive on inspecting the differences in management. The real increase in leadership theories commenced inside the 20th century, whilst extra focus started pouring in to solving the fantastic mysteries of effective and accurate theories are frequently categorized based on what the principle believes to be the defining trait or characteristic of the chief or the framework he or she makes use of. even as there are some of theories, the purpose of this essay is to take a look at the main additives of the Transactional management, Transformational management and authentic management method. Then become aware of three strengths and 3 weaknesses of every of the method for information leadership behaviour.every of these categories has various leadership patterns, which could slightly vary from each other, but though, belong to the core institution. let’s examine the theories and the assumptions they make approximately leadership.Transactional theory focus at the strength and have an impact on of management and the distinctive ways leaders can leverage these to reap goals. the basis for the principle is the examination of the transactions among the leader and the followers, that specialize in information how to construct a fine and effective courting. therefore, the concept is interested by know-how the reward and punishment systems and their use in aligning the wishes of the company with the desires of the subordinate.The transactional style has been popular, and it can be green in growing significant relationships between the chief and the subordinates, it is also attracted complaint. The maximum not unusual objection to the fashion is its assumption that human beings function best to maximize delight or praise. it may once in a while push aside different motivational factors altogether and simply assume financial gain is all subordinates searching the meantime Transformational management idea as a extra humane militaristic management than transactional idea. It believes in inspiring personnel to paintings via the examples and a frontrunner of amazing pressure of character. The principle that human beings high growth thru tremendous motivation than terrible motivation. the management theory has a tendency to strike a stability among brief- and long-time period objectives. some other massive advantage to the style comes from the way it creates different leaders with transformational characteristics. because people are the usage of self-motivation and self-actualization as part of their work, they are able to use these capabilities to become transformational leaders the same time as the true management is in its infancy, this means that the concept nevertheless lacks certain regularly occurring solutions or theories to precise questions. As we are able to have a look at about the benefits and downsides of the technique, the lack of proper theory or version is occasionally criticized as the biggest flaw of the concept.authentic leadership as a management fashion that is steady with a leaders’ character and middle values, and that is sincere, moral and realistic. authentic leadership refers back to the type of chief who absolutely holds the ideals she espouses. The chief’s authenticity presents itself in his actions. His behaviour displays the ethics and values he promotes, along with transparency and fairness.nevertheless, true leadership offers one idealistic view on what leadership can offer at its excellent. Its recognition on constructing authentic courting and creating an surroundings based on agree with is useful for maximum companies.while there are nonetheless many questions left unanswered approximately leadership theories, and lots of feasible truths to be drawn from their ideas, i have aimed on this essay to establish that at the least 3 matters are actual: Transformational management is constructed across the concept of main via example. it’s far about empowering human beings to obtain their full capacity and paintings in the direction of the concept of self-actualization. From Burns to Bass, the principle has been constructed around the idea of difficult and changing the fame quo and thriving in the direction of greatness.while The transactional theories pay near attention to the motivations behind the actions. The transactional fashion has been popular, and it may be green in developing significant relationships among the chief and the subordinates. moreover, if you want your employees to be loyal to you, be an actual leader. Behave ethically, speak openly and promote their interests, as well as your personal, displaying your followers which you view your enterprise as a crew.\n\n\nI'm Moses!\n\n\nCheck it out", "pred_label": "__label__1", "pred_score_pos": 0.949773371219635} {"content": "Jour de la révolution\n\nDo note, by the way, that today is the French Republican Calendrical equivalent of 29 February — it’s the leap-day that comes round in order to complete the quadrennial cycle, hence its magnificently appropriate name.\n\nI’ve long thought that the EU got things the wrong way around when it mandated use of the (French Revolutionary) metric system and stuck to the old Gregorian Calendar. My offer to Mr Brown’s Government is that if they legislate to implement the French Republican Calendar in this country, I shall drop my opposition to the creation of British Values Day — especially if it gets held on the Jour de la révolution, which would mean not only that it’ll only come around every four years, but also that it’ll tacitly, or not-so-tacitly, identify British Values with French Republican Values, which would be a significant improvement on what’s otherwise likely to be on offer.\n\nYear CCXVII kicks off tomorrow…\n\nRival French Revolutionary Calendars!\n\nI’m delighted to see that I’m not the only blogger to have installed a French Revolutionary Calendar: the folks at Republikeinse have one, too (on the left-hand menubar, scroll down a bit), along with a Roman republican calendar, too. (More details on this kind of thing here.)\n\nCareful readers will notice that their calendar and mine are a day out of sync with one another, which probably calls for explanation. The Virtual Stoa’s calendar is based on the mathematical version of the French Repbulican Calendar, which was approved but (alas) never implemented. Republikeinse probably have a script to generate dates according to the astronomical version of the calendar, which was the one actually in force in France in the 1790s, etc.\n\nIt’s good to clear that one up.\n\n\nCalendrical Calculations\n\nA correspondent writes to the Virtual Stoa:\n\n\n\n", "pred_label": "__label__1", "pred_score_pos": 0.982638955116272} {"content": "\n\nProgram: #14-27, Air Date: 06/30/14\n\nThree recent releases of dances and instrumental music from the cusp of the Baroque.\n\n\nNOTE: This is the second of two programs looking at recent releases centering on the musical scene in Italy at the cusp of the Baroque.\n\nI. Verso Venezia: Castello/Merula/Legrenzi Sonate & Canzoni (Pallade Muisca). Atma CD ACD2 2697.\n\nVerso Venezia\n\nYour purchase will help support Millennium of Music.\n\nATMA presents the first CD by Pallade Musica, the 2012 Grand Prize winners at the Early Music America Baroque Performance Competition in New York. Pallade Musica brings together four of Montreal’s most promising Early Music performers: Tanya LaPerrière, Baroque violin; Elinor Frey, Baroque cello; Esteban La Rotta, theorbo, and Mylène Bélanger, harpsichord. The ensemble focuses on repertoire for violin, cello and continuo.\n\nTwo genres are offered in this program: the canzona and the sonata from 17th century in Venice. Although they use the same instruments, belong to the same style, and sound quite similar, these two genres have very different origins and aesthetic purposes. Verso Venezia includes music written by Dario Castello, Giovanni Legrenzi and Tarquinio Merula — Venetian composers who were at the forefront of the transformation of the canzona into the sonata form.\n\n\nDario Castello (1590-1658)\nSonate concertate in stil moderno\n1. Libro I (Venice, 1621) *Sonata Sesta per soprano, trombone ovvero violetta e b.c.\n2. Libro II (Venice, 1629) *Sonata prima per soprano e b.c.\n3. *Sonata secunda per soprano e b.c.\n4. *Sonata settima a 2. Sopran e fagotto overo viola\n5. *Sonata ottava a 2. Sopran e fagotto overo viola\n\nTarquinio Merula (1607-1665)\nfrom Il quarto libro delle canzoni da suonare, a 2–3 (Venice, 1651)\n6. Canzon decima quarta “La Cappellina”\n7. Canzon decima quinta “La Tinta”\n8. La Monteverde\n9. Miradoro\n10. Scarinza\n\nGiovanni Legrenzi (1626-1690)\n11. op. 2 (Venice, 1655), *Sonata no. 4 “La Foscari”\n12. *Sonata no. 5 “La Donata”\n13. op. 8, * Sonata no. 5 “La Galini”\n14. op. 10 “La Cetra” (Venice, 1673), *Sonata no. 4\n15. *Sonata no. 5\n\n\nII. Giovanni Battista Fontana: Sonate a violino ad altri strumenti (Stradivaria/Daniel Cuiller). Mirare CD MIR 214.\n\nFontana: Sonatas Nos.1-8 by Daniel Cuiller, Stradivaria (2014-04-08)\n\nYour purchase will help support Millennium of Music.\n\nBorn in Brescia around 1571, Giovanni Battista Fontana lived in Venice, Rome and Padua, where he died during the plague of 1630. His music surprises by the mastery of counterpoint, the simplicity and the expression of its slow movements, the complexity of its ornamentation and the elegant vivacity of its short dance sections. Nicknamed 'dal Violino' and described as \"one of the most singular virtuosos the age has seen\". Fontana has left us an outstanding example of early Baroque instrumental music. On this release, Daniel Cuiller leads the ensemble Stradivaria in a selection of sonatas.\n\n1. Sonata undecima a due violini col basso\n2. Sonata 4 a violino solo e basso\n3. Sonata 1 a flauto solo col basso\n4. Sonata 5 a violin sol e basso\n5. Sonata ottava a due violini col basso\n6. Sonata 2 a violin solo e basso\n7. Sonata 3 a flauto solo col basso\n8. Sonata 6 a violin solo e basso\n9. Sonata settima a due violini col basso\n\n\nIII. Ciaramella—Dances On Movable Ground (Ciaramella/Adam Knight Gilbert & Rotem Gilbert). Yarlung CD 96819.\n\nCiaramella Dances: On Movable Ground\n\nYour purchase will help support Millennium of Music.\n\nCiaramella Ensemble ventures \"toward modern times\" with intoxicating dance melodies from musicians who lived from the 1500s into the Baroque era, and includes new compositions by Adam Gilbert as well. Ground bass patterns underlie all of this music; sometimes one can hear it clearly and sometimes the ground bass line is veiled within the polyphony. Ciaramella artistic directors Adam and Rotem Gilbert lead the ensemble, which includes music on theorbo, Baroque guitar, viola da gamba, drums and percussion, harpsichord, wind instruments (including recorders, Renaissance brass, shawms), and hurdy gurdy.\n\"...Ciaramella plays this music with conviction and expressiveness and makes it accessible for contemporary audiences. One certainly can’t ask for more.\n\n\"...Ciaramella makes it fun. They bring a sense of history to the works they play, but their concerts aren’t dry academic exercises. They bring the music of the renaissance to life. A concert by Ciaramella is a delightful and entertaining excursion to a bygone era.\n\n\"And the... members of the group obviously enjoy what they’re doing. For them this music is as much alive today as it was in Richard III’s time – and that attitude and approach are what set them apart from many other early music ensembles.\"\nEdward Reichel\n\n“From the nobility of Europe, to the petit bourgeoisie reading Thonoit’s Arbeau’s Orchesographie, to the already pregnant bride in Brueghel’s The Peasant Wedding, everybody danced their way through the rituals of life…. Their music, like their dance, reflected a delicate balance between the restraints of culture and convention, and ingenious flourishes of improvisation….”\nAdam Gilbert\n\n1 Jácaras - Gaspar Sanz (2:40)\n2 L'eroica a tre y ciacona for 2 violins, bass & continuo - Andrea Falconieri t (3:59)\n3 Battaglia de Barabosa yerno de Satanas - Andrea Falconieri (3:46)\n4 Canario (Montecatini Terme, Fondo Venturi B8, p.44) - Anonymous, Italian(2:46)\n5 Passacalle (from Il primo libro de canzoni) - Andrea Falconieri (5:25)\n6 Aria Decima Quarta (14) sopra La mia Pedrina, for 2 violins & continuo (from Op. 4) - Marco Uccellini (3:59)\n7 Recercada No 8 - Diego Ortiz (2:25)\n8 Greensleeves to a Ground - Anonymous, English (3:11)\n9 Jácaras - Gaspar Sanz (3:10)\n\n\n\nComposer Info\n\nGaspar Sanz, Diego Ortiz, Marco Uccellini, Andrea Falconieri, Gaspar Sanz, Adam Gilbert, Giovanni Battista Fontana (1571-1630), Dario Castello (1590-1658), Giovanni Legrenzi (1626-1690), Tarquinio Merula (1607-1665),\n\nCD Info\n\nAtma CD A,CD2 2697, Yarlung CD 96819, Mirare CD MIR 214,", "pred_label": "__label__1", "pred_score_pos": 0.9915605187416077} {"content": "Making a nutritious and delicious breakfast smoothie is easier than ever. With SmoothieBox, all you need to do is add the pouch of frozen ingredients of your favorite flavor with the included collagen packet to a blender, pour in your favorite mixture, and mix.\n\nWhile the three-step process is a cinch, on occasion, there may be some issues that cause a smoothie not to be mixed together as perfectly as you’d like. There are also a few tricks to making sure you get a smoothie at the perfect consistency, every time.\n\nAnd so, we’d like to share some of our favorite learnings and smoothie tips from making smoothies pretty much every day for the last year or so.\n\nBlender lacking “oomph”: You blender doesn’t have the horsepower of a jet engine, so you are finding that your blender whirs and does nothing to blend up that smoothie. You are left with what looks more like “Dippin Dots” than a healthy breakfast. You have to add so much liquid that you end up with 40 ounces of flavorless smoothie.\n\nSolution #1: Allow your smoothie ingredients to soften for a few minutes prior to blending. Take your smoothie out of the freezer, dump it into your blender, and leave it. Or, just take on the package and leave it next to the blender for a few minutes. Go make coffee, get in a quick meditation session, or do a few morning dishes — this is my favorite time to deal with dishes from the night before — come back, add in the collagen, liquid, and blend.\n\nSolution #2: Microwave a cup of filtered water or quickly boil some water, and then pour just an ounce or two of hot water into the blender in which you’ve already added the frozen ingredients and collagen. This will soften the frozen smoothie and make it easier to blend. Add in your liquid of choice and blend away.\n\nCollagen clumping: You’ve added all your ingredients and your smoothie-making liquid of choice and after blending you look like you have a perfect, quick breakfast drink. However, once you start drinking you notice large clumps of something in your smoothie that are a bit surprising and do not taste good. You’ve got collagen clumps.\n\nSolution #3: Collagen is a great protein source, but if not mixed into a liquid well enough, on occasion, it will slightly gel. To avoid this, make your smoothie in this order:\n\n 1. Add frozen ingredients to blender.\n 2. Pour in collagen (spreading the collagen evenly around the frozen ingredients).\n 3. Pour in liquid (pouring all around so that it starts to dissolve collagen and soften frozen ingredients).\n\nSolution #4: If you follow the steps above and it doesn’t work, your blender might not have enough mixing power. Another workaround is to first blend frozen ingredients and liquid, then add the collagen into the smoothie, and blend for a few seconds.\n\nSoggy smoothie: You like your smoothies thick, like a good chocolate milkshake. However, no matter what you do, the blender can’t seem to mix a smoothie without adding a lot of liquid.\n\nSolution #5: Stir your smoothie mid-blend and add a little bit of water. Use a tamper, a useful attachment for Vitamix machines and other blenders, which allows you to blend and stir at the same time! (Additionally, Solution #1 above, works to solve this issue.)\n\nSmoothie is not smooth and has a little “chew”: Some folks like this texture, but others not so much. With real seeds in the smoothies it may not be as smooth as you might like.\n\nSolution #6: Blend your smoothie for a full 60 seconds. (I count 1 Mississippi, 2 Mississippi). You may think your smoothie is done blending, but in reality you only blended for 30 seconds. The full 60 will get you the smooth consistency you are looking for.\n\nTime is not on your side: Even though our Super Smoothies are ready in minutes, your mornings so hectic that even taking a few moments to prepare a smoothie gives you anxiety.\n\nSolution #7: Prepare your smoothie the night before! If you blend your smoothie and store it in a double-walled, insulated container — we love the ones made by Healthy Human — and put it in the refrigerator it will have the same consistency and great taste as if you blended it that morning!", "pred_label": "__label__1", "pred_score_pos": 0.7976387739181519} {"content": "SHASTA STEVIC - IntraLiminal\n\nAfter leaving behind her career as a lawyer, local artist Shasta Stevic spent the last few years experimenting with different artistic mediums and disciplines. She is particularly interested in using unconventional methods of storytelling and installation to explore themes including the environment and sustainability, (un)civilisation, progress, so-called technological and scientific advancement, human centrality and the worrying divide between humans and nature.\n\n\nSATURDAY 28th July 1:30  \n\nShasta is the co-founder, co-curator and creative director of IntraLiminal, an ongoing project that showcases the work of talented young artists from the Bass Coast region of Australia through exhibitions and social media exposure.\n\nShe is also the Arts Correspondent for ABC Gippsland Radio, with a regular segment talking about arts exhibitions and events in the Gippsland region of Victoria.\n\nShasta will discuss her work here with IntraLiminal and her work in Iceland as an Art Curator.", "pred_label": "__label__1", "pred_score_pos": 1.0000046491622925} {"content": "Conversion Is Our Business\n\nText recognition\n\nOCR is an abbreviation for Optical Character Recognition.\n\nOCR is the software for recognizing text / characters and converting them to, for example, a Microsoft Word document or PDF file.\n\nWe use the application ABBYY FineReader to recognize texts. We have good experiences with this, but no OCR program will guarantee a 100% correct recognition.\n\nHowever, the program is able to correct reading errors or adjust erroneously recognized characters, performing a kind of spell check. In this way a better accuracy of the recognition will be archived.\n", "pred_label": "__label__1", "pred_score_pos": 0.9322571158409119} {"content": "Hypoxic Ischemic Encephalopathy In Adults Radiology – dagorcraft what is anoxic encephalopathy\n\n1 from the department of neuroradiology, national neuroscience institute, singapore (A.N.H., C.C.T.L.); department of diagnostic radiology, singapore general hospital.\n\nInternational brain injury association – ibiahypoxic- ischemic brain injury is a diagnostic term that encompasses a complex constellation of pathophysiological and molecular injuries to the brain induced by hypoxia, ischemia, cytotoxicity, or combinations of these conditions (busl and greer 2. The typical causes of hypoxic- ischemic brain injury – cardiac arrest, respiratory arrest, near- drowning, near- hanging, and other forms of incomplete suffocation, carbon monoxide and other poisonous gas exposures, and perinatal asphyxia – expose the entire brain to potentially injurious reductions of oxygen (i.What is anoxic encephalopathy although the concept of hypoxic- ischemic brain injury is generally well accepted in clinical medicine, there remains a lack of consistency with respect to the terms used to denote this type of injury, particularly in the neurorehabilitation literature (arciniegas 2. Anoxic brain injury,’ ‘anoxic brain damage,’ and ‘anoxic encephalopathy’ are the most commonly used clinical and research descriptors of this condition, and generally are used as synonyms for hypoxic- ischemic brain injury. However, these terms overstate the severity of one pathophysiologic contributor to injury – decreased delivery of oxygen to the brain, most accurately described as hypoxia rather than as anoxia – and ignore entirely the often concurrent and more injurious decrease in perfusion of the brain (i.What is anoxic encephalopathy with respect to the use of ‘anoxia’ in these diagnostic terms, true anoxia (frank absence of oxygen in the blood) is a rare and debatably survivable event: although complete cessation of respiratory function eliminates introduction of new oxygen into the circulatory system, oxygen remains available, albeit in rapidly diminishing quantities, in the blood for extraction and use by brain tissue for at least several minutes thereafter. With respect to the omission of ‘ischemic’ from these diagnostic terms, purely hypoxic injuries (i.\n\nGreer 2. 00. 6; busl and greer 2. The term ‘anoxic encephalopathy’ is problematic for these reasons as well as the fact that it describes a consequence of injury, i.What is anoxic encephalopathy\n\nRadiology cases and radiology case reports. Anonymous said. What i do not understood is in fact how you are not really much more neatly-liked than you may. Learn about encephalopathy, a term that means brain disease, damage, or malfunction. Learn about encephalopathy symptoms, treatment, and types. OBJECTIVE. Wernicke’s encephalopathy is an acute neurological syndrome resulting from thiamine (vitamin B1) deficiency. Early recognition is important because timely. B. Adults and children after fontanelle closure either transcranial spectral doppler sonography, power M-mode doppler sonography, or transcranial color-coded duplex. · perinatal hypoxic-ischemic encephalopathy (HIE) is an important cause of brain injury in the newborn and can result in long-term devastating consequences.What is anoxic encephalopathy\n\nFor these reasons, hypoxic- ischemic brain injury (HI- BI) more accurately and completely describes the pathophysiology of this subcategory of acquired brain injuries. HI- BI therefore is recommended for use over ‘anoxic brain injury’ or other variants of it as the term with which to deescribe such injuries in clinical and research contexts.\n\nHypoxic-ischemic brain injury most often results from insults such as cardiac arrest, vascular catastrophe, poisoning (such as carbon monoxide intoxication or drug.\n\nPathophysiology of hypoxic- ischemic brain injury. Diminutions in circulating oxygen levels may result from a failure of gas exchange in the lungs, decreases in blood- oxygen saturation from pulmonary dysfunction or interference by other gases (e.What is anoxic encephalopathy decreased perfusion of the brain occurs when blood flow to it is partially or completely restricted (e. These conditions deprive the brain not only of oxygen but also glucose and all other nutrients as well as the nutrient/waste exchange process required to support brain metabolism, resulting in the development of a hypoxic- ischemic state.\n\nThis state is characterized by cellular energy failure, membrane depolarization, brain edema, excess neurotransmitter release (particularly the excitatory amino acid neurotransmitters) and uptake inhibition, increases in intracellular calcium, production of oxygen- free radicals, lipid peroxidation, and disturbances in autoregulation of cerebral blood flow at the micro- and macroscopic levels (calvert and zhang 2.What is anoxic encephalopathy busl and greer 2. Hypoxic and hypoxic- ischemic states at least transiently disrupt brain function and, if sufficiently severe and/or prolonged, may lead to neuronal death and irreversible brain injury. It is important to acknowledge that the pathophysiologic processes occurring in HI- BI also are characteristic of the non- hemorrhagic forms of stroke. However, the term ‘stroke’ is generally used to denote injury resulting from focal or multifocal ischemia (i.\n\nHI- BI denotes global (i. Having said that, not all areas of the brain are equally vulnerable to the injurious effects of hypoxia and hypoxia- ischemia: injury from these processes tends to be most pronounced in the superior brainstem, cerebellum, white matter and subcortical structures supplied by the distal branches of deep and superficial penetrating blood vessels, cerebral white matter at the zones between the major cerebral artery territories (so called ‘border zones’ or ‘watershed areas’), CA1 region of the hippocampus, and neocortical layers 3, 5, and 6 (injury to which produces ‘laminar cortical necrosis,’ referring to the death of cells in these layers, or lamina, in the cortex) (arbelaez, castillo et al.What is anoxic encephalopathy chalela, wolf et al. Busl and greer 2. Neurological and neurobehavioral consequences of hypoxic- ischemic brain injury.\n\nADA2. Adenosine deaminase 2. AHA 2008. American heart association guidelines 2008. AIS. Arterial ischemic stroke. CBP 2010. Canadian best practice guidelines 2010. Neurology articles covering symptoms, diagnosis, staging, treatment, prognosis, and follow-up. Peer reviewed and up-to-date recommendations written by leading experts.\n\nThe consequences of HI- BI commonly include seizures (event- related and recurrent), disturbances of sensorimotor function, and a broad array of cognitive, emotional, and behavioral disturbances (anderson and arciniegas 2. Lu- emerson and khot 2. Seizures and myoclonus.What is anoxic encephalopathy\n\nAs many as one- third of individuals sustaining an HI- BI develop seizures in the immediate post- injury period, typically beginning within 2. The development of such seizures most likely reflects the effects of injury- induced excitotoxic processes on cortical neurons. Most post- hypoxic seizures usually are partial complex or myoclonic in character and occur intermittently.\n\nThe occurrence of early seizures does not necessarily portend the development of post- hypoxic epilepsy or persistent post- hypoxic myoclonus nor does it invariably predict poor neurological or functional outcome. However, the post- hypoxic status epilepticus (SE) or myoclonic SE is associated, almost invariably, with a fatal outcome from the HI- BI (rossetti, logroscino et al.What is anoxic encephalopathy it is likely that mortality associated with SE is a reflection of the severity of underlying injury rather than the development of SE per se, although the possibility of SE aggravating the underlying neurological injury has not been definitively excluded. The frequency of late seizures after HI- BI is not well established, although common clinical experience suggests that a nontrivial minority of individuals experience this problem.\n\nTreatment of post- hypoxic epilepsy and/or myoclonus follows that of other secondary epilepsies and myoclonus, and generally is similarly effective. Movement disorders. Post- hypoxic parkinsonism, dystonia, chorea, athetosis, and tremor are rare but potentially disabling consequences of HI- BI.What is anoxic encephalopathy among these problems, post- hypoxic parkinsonism and dystonia are most common. Post- hypoxic parkinsonism is generally symmetric and predominantly akinetic- rigid (i.\n\nThe development of this condition most likely reflects the vulnerability of the globus pallidus and the substantia nigra – pars reticularis to the adverse effects of hypoxia and/or ischemia. Post- hypoxic dystonia, which tends to reflect injury to the putamen, is often asymmetric initially but over time may progress to a more symmetric and generalized form. Although these conditions may develop in the early post- injury period, they often are delayed sequelae of HI- BI, developing months or years after injury. Unfortunately, these conditions appear less responsive to pharmacologic treatment than primary parkinsonism (i.What is anoxic encephalopathy parkinson’s disease) and idiopathic dystonia, perhaps reflecting hypoxic- ischemic- induced damage and/or destruction of the neurons in these structures that ordinarily are the targets of these pharmacotherapies. Disorders of elementary sensorimotor function. Injury to descending corticospinal tracts, whether in the deep white matter of the cerebral hemispheres, in the crus cerebri at the level of the midbrain, or in the spinal cord, may produce impairments of elementary motor function.\n\nInvolvement of the corticospinal tracts at the level of the cerebral hemispheres or upper brainstem may produce variable patterns and severities of motor weakness, up to and including quadriplegia. An uncommon but remarkable post- hypoxic motor syndrome is the ‘man in a barrel’ syndrome, or bibrachial paresis; this condition is characterized by bilateral proximal upper extremity paresis with preservation of lower extremity function, and reflects hypoxic- ischemic injury to the ‘watershed’ zone of white matter between the anterior and middle cerebral artery territories.What is anoxic encephalopathy similarly, paraparesis and quadriparesis are potential consequences of hypoxic- ischemic watershed infarctions in the upper and lower thoracic and lumbar regions of the spinal cord. Rehabilitative interventions for these problems, and complications of them such as spasticity, contractures, gait and mobility impairments, follow those applied for similar motor impairments due to other causes. The effectiveness of these motor- specific rehabilitative interventions in this population is not well established, but common clinical experience and several rehabilitation outcome studies (shah, al- adawi et al. Burke, shah et al. Shah, carayannopoulos et al.\n\nHI- BI survivors with such problems. Watershed infarctions occurring the posterior portions of the cerebral hemispheres may produce disturbances in sensory function, and particularly impairments of visual processing.What is anoxic encephalopathy cortical blindness and the balint syndrome (comprised by ocular apraxia, optic ataxia, and simultanagnosia) are specific examples of disorders of sensory function that may be associated with HI- BI. Optimal rehabilitative strategies for these problems are not well developed presently. Cognitive impairment the most extensively studied neurobehavioral sequelae of HI- BI are cognitive impairments. Most common among these are the disorders of consciousness (e.\n\nBalint’s syndrome (as noted above), anton’s syndrome (anosagnosia for visual impairment), personality changes, behavioral disturbances, and disorders of mood and affect regulation have been reported as well.\n\nNeuroradiology cases: herpes encephalitis MRI.What is anoxic encephalopathy A 2. 9 yo married female brought unconscious to casualty with history of mild fever and headache since 3days. CT brain on admission was normal. Csf showed pleocytosis and elevated proteins.\n\nInfarct ruled out as there is no intra cranial major vessel stenosis or occlusion on MR angio particularly the MCA. Herpes encephalitis. Syn : herpes simplex encephalitis (HSE) caused by herpes simplex virus type 1 (HSV- l).\n\nLocation wise typically involves limbic system in that commonly involves temporal lobes, insula, subfrontal area and cingulate gyri. May involve cerebral convexity and posterior occipital cortex. Often bilateral disease but asymmetric. Basal ganglia usually spared. Atypical patterns seen in infants and children where involvement of cerebral hemispheres noted primarily.What is anoxic encephalopathy rarely, may affect mid brain and pons.\n\nNeuroimaging. CT often normal early. May see ill defined areas of low attenuation, mild mass effect in medial temporal lobes, insula. Hemorrhage is a late feature. Patchy or gyriform enhancement of temporal lobes on post contrast is a late feature. On MRI , areas of T2 hyper intensity with restricted diffusion on dw images. Mild, patchy enhancement on post contrast T1 early in disease. Gyriform enhancement is feature of late disease.\n\nMay see focal abnormal lepto meningeal enhancement. MR is most sensitive for diagnosis. FLAIR and DWI are the most sensitive sequences sufficient for diagnosis when patient is non co operative. Imaging is often key to diagnosis.What is anoxic encephalopathy\n\nDDs. Limbic encephalitis. A rare paraneoplastic syndrome associated with a primary tumor, often lung.\n\nPredilection for limbic system, often bilateral.- hemorrhage is not present. – imaging may be indistinguishable. Clinically sub acute course.\n\nSymptom onset usually weeks to months (vs acute course, ‘short term’ history in HSE)ischemia : – typical vascular distribution (MCA, ACA, PCA)- acute onset. – restricted diffusion on dw images is more intense compared to herpes. Status epileptius: – active seizures may disrupt BBB, cause signal abnormalities and enhancement. – temporal lobe epilepsy hyperperfusion may mimic herpes encephalitis. Herpes viruses include HSV- l, HSV- 2, epstein- barr, cytomegalovirus (CMV), varicella- zoster virus (VZV), B virus, HSV- 6, HSV- 7. HSV- l infection is common in adults and children, typically related to viral reactivation where as HSV- 2 more common in neonates.What is anoxic encephalopathy initial HSV- l infection usually occurs in oronasopharynx through contact with infected secretions. HSV- l invades along cranial nerves (via lingual nerve, a division of the trigeminal nerve) to ganglia. HSV- l remains dormant in the trigeminal ganglion. HSV- l reactivation may occur spontaneously or be precipitated by various factors like local trauma, immunosuppression, hormonal fluctuations, emotional stress. HSV- l causes acute hemorrhagic, necrotizing encephalitis (primarily involving limbic system)HSV- l causes 9.\n\nHerpes is most common nonepidemic cause of viral meningoencephalitis. Clinical presentation. Age : occurs at any age. Highest incidence in adolescents and young adults. Approximately 3.What is anoxic encephalopathy\n\nGender: no gender predominance. Most common signs/symptoms : fever, headache, seizures, +/- viral prodrome, other signs/symptoms : altered mental status, focal or diffuse neurologic deficit in less than 3. Children often present with nonspecific symptoms like behavioral changes, fever, headaches, seizures, even coma and death. Patients are typically immunocompetent. HSV- 1 is uncommon in AIDSCSF studies show a lymphocytic pleocytosis and elevated protein. Polymerase chain reaction (PCR) of CSF, most useful for diagnosis with sensitivity/specificity of 9.\n\nEEG shows temporal lobe activity. Natural history prognosis: early diagnosis and treatment with antiviral agents can decrease mortality, may improve outcome.What is anoxic encephalopathy\n\nMortality ranges from 5. Despite acyclovir therapy, ~ 5. Treatment: antiviral therapy with intravenous acyclovir.", "pred_label": "__label__1", "pred_score_pos": 0.9540761709213257} {"content": "Customization of the Resiliency Education and Skills Training\nBorrowing from the research findings and theoretical constructs of Narrative Medicine, Relational Therapy, Interpersonal Communication Theory and Trauma Recovery Intervention, REST brings together the most effective elements of each domain. Interventions are founded in the proven studies of similar programs that may have addressed one of the aspects of REST. They are creative and dynamic in nature and take shape from participants and the process that inspires between them.\n\n* Engaged Listening and the Beholding process\n: Communication theory brings to light the value of effective listening, non-verbal communication and language use to convey a message at best. With REST, participants learn the art of \"engaged listening\", characterized by empathic and focused listening, which allows the speaker to experience what we call \"the beholding process\". In this experience, both the speaker and the listener will find comfort and clarity in their connection.\n\n* Reflective Readings:\nThis Narrative Medicine based intervention connects interdisciplinary professionals through shared experience as they evaluate and reflect upon a narrative. Through the reflective process, participants will be able to gain insight, rejuvenate healthy emotional responses to critical incidents and find resilience in the group.\n\n* Creative Writings\n: With few \"rules\" other than this being a timed exercise, writing prompts taken from both Narrative Medicine and Trauma Recovery work are used to provide a structured freeing of experience and emotion associated with critical incidents of medical practice. Emotional recognition and expression in relation to critical\nincident in a creative and mindful way can result in stress-reduction. It gives way for the health care providers to trust that they can share the emotional response appropriately with co-workers and even patients without risk of violating boundaries or seeming ineffective.\n\n* Interdisciplinary Interviewing:\nRelational Therapy practice engages clients through gaining perspective on how they function in relation to family, friends and co-workers. REST incorporates this valuable understanding of \"self in relation to other\" through interdisciplinary interviewing that sheds light on the physician-nurse relationship. In turn, this interviewing intervention teaches how to elicit narrative (personal story). Participants develop their abilities to provide integral medicine by using this interview technique with patients in order to draw out their illness narrative for broader understanding beyond just the symptoms.\n   \"The beholding process\"\n Benefits of Resiliency Education and Skills Training:\n\n   1.Teaches engaged listening and the art of dialogue.\n\n   2. Increases the capacity for empathy.\n\n   3. Ability to elicit patient information without sounding like a walking chart,               therefore rehumanizing the intake process.\n\n  4. Effective interpersonal communication from provider to provider and provider              to patient/family members.\n\n  5. Relief from stress of critical incidents experienced in caring for patients.\n\n  6. Creates opportunities for caregivers to give and receive support.\n\n  7. Enhances self-esteem and confidence\n\n8. Contributes to realistic goal setting.\n\n  9. Models healthy behavior for patients and colleagues.\n10. Improves the \"Culture of Safety\" in the Medical Environment.\n\nWeb Hosting", "pred_label": "__label__1", "pred_score_pos": 0.9953581094741821} {"content": "National Taiwan Ocean University Institutional Repository:Item 987654321/45440\nEnglish  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 27228/39071\n造访人次 : 2406672      在线人数 : 64\n搜寻范围 进阶搜寻\n\n\n题名: Natural cures for type 1 diabetes A review of phytochemicals, Biological actions, and clinical potential.\n作者: Chang CL\nChen YC\nChen HM\nYang NS\nYang WC\n贡献者: 國立臺灣海洋大學:水產養殖學系\n关键词: Autoimmune diseases\nCombination therapy\npancreatic β-cells\nreplacement therapy\ntype 1 diabetes\nautoimmune diabetes\n日期: 2013\n上传时间: 2018-03-19T06:18:57Z\n出版者: Current Medicinal Chemistry\n摘要: Abstract: Autoimmune diseases are the third largest category of illness in the industrialized world, following cardiovascular diseases and cancers. Among them, type 1 diabetes, also named autoimmune diabetes, afflicts 10 million people worldwide. This disease is caused by autoimmunity-mediated destruction of pancreatic β-cells, leading to insulin deficiency, hyperglycemia and complications. Currently, there is no cure for type 1 diabetes. Insulin injection is the only medication; however, it accompanies serious medical complications. Current strategies to cure type 1 diabetes include immunotherapy, replacement therapy, and combination therapy. Despite recent advances in anti-diabetic strategies, no strategy is clinically successful. How to cure type 1 diabetes without undesirable side effects still remains a formidable challenge in drug research and development. Plants provide an extraordinary source of natural medicines for different diseases. Moreover, secondary metabolites of plant origin serve as an invaluable chemical library for drug discovery and current medicinal chemistry in the pharmaceutical industry. Over the past 25 years, 50% of prescription drugs have been developed from natural products and their derivatives. In this article, we review more than 20 plant compounds and extracts reported in the literature to prevent and treat type-1 diabetes. Emphasis is placed on their chemistry and biology in terms of regulation of immune cells and pancreatic β-cells. We summarize recent progress in understanding the biological actions, mechanisms and therapeutic potential of the compounds and extracts of plant origin in type 1 diabetes. New views on phytocompound-based strategies for prevention and treatment of type 1 diabetes are also discussed.\n關聯: 20(7)\n显示于类别:[水產養殖學系] 期刊論文\n\n\n档案 描述 大小格式浏览次数\n\n\n", "pred_label": "__label__1", "pred_score_pos": 0.9546676874160767} {"content": "Обзор лучших ресурсов по разработке бренда, разработке упаковки\n\ncontact us | ok@ohmycode.ru\n\n\nProshyan Wines\n\nDesign: Dochery\nLocation: Russia\nProject Type: Produced\nClient: Proshyan Brandy Factory\nProduct Launch Location: Armenia\nPackaging Contents: Wine\nPackaging Substrate / Materials: Glass, paper\nPrinting Process: Flexography\n\nProshyan wine line has a very distinct character. Due to unique climate conditions, Armenia is able to produce a number of very exotic fruit wines. For the Proshyan Brandy Factory pomegranate wines’ bright and unusual taste made it the star of the line. Proshyan Brandy Factory produces one of the most popular pomegranate wines, keeping its traditional essence and carefully controls the quality of the product, strictly following the technology. While making the new label for the wines we were seeking to reflect the care for the regions` traditions in the process of winemaking, demonstrated by the company. We took the traditional Armenian ceramics visuals which often feature animalistic and floral motives as a base for the visual concept but made it about wine. We were able to create bright and colourful label that reflects where the product came from and what it has to offer.\n\nWhat's Unique?\nTraditionally Armenian origins in the wine label design are represented by the natural and architectural images. Instead of those, we decided to learn more about the Armenian culture and showcase it in our design. We believe that it captures the unique essence of bright fruit wine flavors and reflects the origins of the product in the way it usually does not.", "pred_label": "__label__1", "pred_score_pos": 0.8906829357147217} {"content": "Press Release\nSeptember 28, 2012\n\nSpeech of Senator Miriam Defensor Santiago,\n28 September 2012, Bacolod City\n\n\nThe role of policymakers in government is to make sure that strong growth and development takes place. But equally important, it is their responsibility to make sure that growth is inclusive and sustained. This means growth has to benefit the great majority of its people.\n\nAfter a slow growth last year, the economy has shown some promise. It grew by a respectable 6.1% during the first half of the year. Yet, as of July 2012, a lot of Filipinos remain unemployed (about 2.8 million) and underemployed (about 8.5 million). About 1 of 3 Filipinos don't have jobs or are working part-time or unhappy with their present jobs.\n\nAnd a lot of Filipinos --more than 1 of 4 households -- continue to live below the poverty threshold. A recent (August 24-27) Social Weather Stations survey found overall hunger rose by 3 points to 21 percent or 4.3 million families.\n\nThe growth of the Philippine economy is to a large extent driven by the economic health of the world economy.\n\nLet there be no illusion that the Philippine economy can grow robustly without strong remittances from abroad and robust expansion of the BPO business at home. Saying so would be pure bravado.\n\nImagine if half of the total overseas remittances were lost. That would amount to P420 billion, more than one-fifth of the national budget. The direct effect would be disastrous. But what about the multiplier effect?\n\nThe world economy remains uncertain. Europe is expected to continue to struggle in the years ahead. This year and next, a recession in the euro area cannot be ruled out. The United States economy is expected to suffer from sluggish growth and high joblessness. China's economy is slowing while Japan's economy continues to teeter on the brink of recession.\n\nWith a weak world economy, growth of Philippine exports will continue to be lackluster. Overseas remittances will continue to struggle. And direct foreign investments will continue to trickle in.\n\nThis year the peso value of remittances has turned negative. From January to date, remittances grew 5.4%, but the peso appreciated by 5.8%. Hence while the dollar remittances has inched up, their value in pesos has gone down. This has negative impact on consumption and investment.\n\nI'm sure this turn of events is affecting banking operations. Personal and commercial loans are slowing while delinquency rates are rising.\n\nIn brief, I have discussed with you some of the many problems we're facing.\n\nWhat's the solution?\n\nThe Bangko Sentral should continue to limit the seemingly uncontrollable entry of \"hot money\" into the country. Because of the gloomy world economic outlook, and the rock-bottom or near zero interest rates in the developed world, investible short-term funds are in search of the best place or places where they can park their funds.\n\nThe Philippines happen to be an attractive place for such short-term funds. With its relatively high interest rates and the strong likelihood that the peso will continue to appreciate in value, it makes sense to park one's investible funds in the Philippines.\n\nBut while it's good for short-term foreign investors, it wreaks havoc on the domestic economy. Imagine how the strong peso has adversely affected the lives of many overseas Filipino workers and workers in exports businesses.\n\nFor OFW workers, the value of their remittances has gone down so they have to send more dollars to their families who live on peso budget. Either they draw on their savings from abroad or they borrow. Either way, the response is not sustainable. At some point, its going to reduce their lifetime income.\n\nGiven the threat of further appreciation of the peso, BSP may have to cut interest rates further. Their policy moves to date, including banning foreigners from accessing the special deposit account (SDA) have been ineffective. 'Hot money' continues to be attracted to the Philippines.\n\nOn the part of the national government, it has to show some restraint in borrowing from abroad. Borrowed funds from abroad increase the supply of dollars in the Philippine system and hence make the peso stronger.\n\nThe national government should commit to borrow from domestic sources to finance its deficit and service its debt. The BSP has offered to accommodate the national government's foreign exchange needs. It sits on an $80 billion gross international reserves which is equivalent to one year's import requirements. The national government is advised to take on BSP's offer. It's a win-win situation for both.\n\nBorrowing from local sources will also help Filipino savers; on the other hand, borrowing from abroad will only help foreigners.\n\nOn the regional front, the people of Western Visayas should be happy where the region is right now. After correcting for inflation, the region ranked fifth in terms of its contribution to the country's gross domestic product (GDP).\n\nIt ranked fourth in terms of GDP growth rate -- after CARAGA, Central Visayas, and Central Luzon.\n\nIt's record in terms of unemployment is neither good nor bad. It ranked 6th or 7th (tied with Davao region) out of 17 administrative regions. It's unemployment rate of 6.4% (as of July 2012) is much lower than the national average of 7.0%.\n\nIn terms of underemployment (those who work part-time, underpaid and unhappy with their present jobs), Western Visayas ranked 8th out of 17 administrative regions.\n\nFor those from Western Visayas, their economic position relative to the rest of the Philippines does not provide reasons for despair nor rejoice. Things could be better but things could be worse too.\n\nThat's the role of the banks and financial institutions in the region. Growth can be improved, and more people will benefit from such growth, if only agriculture can be made more robust and productive.\n\nThe people of Western Visayas depends more on agriculture than on any other economic sectors. Agriculture and its related industries such as food processing and agro-industrial manufacturing should be the focus of lending in the region.\n\nThe risk of lending to overseas Filipino workers has increased -- first, because the peso value of remittances has declined, and second, the uncertainty in the jobs market has increased owing to the recent world recession and the political crises in the Middle East. Banks are advised to lend to this sector with heightened caution.\n\nIn closing, there are risks and but there are opportunities too. Our national leaders are faced with the problems of a weak world economy and the continuing strengthening of the peso.\n\nWestern Visayas, relative to other regions in the country, is neither booming nor backward. But it could improve its relative position, and make a difference in the lives of a lot of its people, by focusing on agriculture, food processing, and agro-industrial development.\n\nNews Latest News Feed", "pred_label": "__label__1", "pred_score_pos": 0.6825338006019592} {"content": "International Artists’ Residency\n\n\n\nin collaboration with Annemarie Schimmel Haus\n\nwith A.Malik Channa, Adnan Madani, Anthony Schrag, Arefeh Riahi, Ayesha Jatoi, Barat al Badoor, Daniel Seiple, Ehsan ul Haq, Haider Ali Jan, Harry Sachs, Hurmat ul Ain, Iqra Tanveer, Kyla Pasha, Markus Lohman, Matthias Einhoff, Mehreen Murtaza, Meng Huang, Naveid Iqbal, Philip Horst, Sajana Joshi, Unum Babar, Vishuawa Ghosh & Zahid H Soomro\n\nIn collaboration with Annemarie Schimmel Haus, Vasl Lahore initiated a two week project, facilitated by Huma Mulji, which brought together twenty three artists under one umbrella. The alternate format of the residency and the collaborative spirit of the large number of artists working together created one of the most memorable residency experience.\n\nThe outcome of the residency was a site-specific exhibition in which viewers could navigate the walled city of Lahore and other locations where the artists had installed work. The show continued at Alhamra Art Gallery, Lahore, where some of the non-site specific work, documentation of performances, events and art works were exhibited.", "pred_label": "__label__1", "pred_score_pos": 0.8689253330230713} {"content": "Using exacting anatomical science and distinctive manual processes, LDT enables practitioners to detect the specific rhythm, direction, depth and quality of the lymph flow anywhere in the body. From there they can use their hands to perform Manual Lymphatic Mapping (MLM) of the vessels to assess overall circulation and determine the best alternate pathways for draining body-fluid stagnations. Therapists work with flat hands, using all the fingers to simulate gentle, specific wave-like movements. These subtle manual maneuvers activate lymph and interstitial fluid circulation as well as stimulate the functioning of the immune and parasympathetic nervous systems. It is shown that when these actions are accomplished, the results can be:​\nReduction in edemas from lymphedemas of various origins Detoxification of the body Regeneration of tissue, including burns, wounds and wrinkles. Anti-aging effects\n     Relief of numerous chronic and subacute inflammations including sinusitis, bronchitis and otitis\nRelief of chronic pain\nReduction in the symptoms of chronic fatigue syndrome and fibromyalgia Antispastic actions to relieve conditions such as muscle hypertonus and some forms of constipation Deep relaxation to aid insomnia, stress, loss of vitality and loss of memory\nAlleviation of adiposis and cellulite tissue\nAdvanced techniques for fascia, viscera and joints", "pred_label": "__label__1", "pred_score_pos": 0.9997661709785461} {"content": "Workflow Engine for Sequential Business Processes\n\nProject Technical Description\n\nThe Workflow Engine described here is a generic and re-usable component that includes a set of business objects allowing to run a business process according to the workflow model.\n\nThe implementation of the workflow model is made with the main goal of automating total or partial execution of a business process previously defined. The automation of the process is defined within the process itself that identifies the tasks to be performed, who should perform, the conditions to be met, and the sequential execution line.\n\nIts usage is directed to applications on which the user have a set of pre-defined processes for performing specific services in the context of the application scope (Refer to the EEM.Net application described here)\n\n\nProcess Definition\n\nA business process is implemented primarily as a set of procedures that are somehow interconnected in order to achieve an objective (business) . A process always has a type and a group of specific information items or properties that characterize the process .\n\nThe definition of each process obligates to the definition of each of the procedures and their relationships (execution line) which determine the logical ordering of process execution.\n\nA procedure will be implemented as a task or activity in turn sub-divided into items of work, which in turn are associated with an entity role – the responsable - in charge of its execution (after the definition phase of the process) . A process can also be interpreted as a task being in turn called sub- process.\n\nwork item represents the smallest unit of work in the context of a process task to which it belongs . The work items are displayed every charge in the form of a task list  that holds details of each item of work assigned to it.\n\nThe definition of a task and related items work involves specifying conditions as logical expressions that decide the start or completion of a new task or work item .\n\n\nThe component is defined, created and managed by a system able to interpret the process definition, in order to be able to create instances of the same process, interacting with each participant in the workflow updating their worklist, creating instances of tasks / activities according with its definition.\n\nThe worklist includes a list of items of work (i.e. jobs) to be executed sequentially or by priority.\n\nDuring the execution of a work item, the responsable can associate a document – Attachment- implemented as a simple description, reference to a location in the database, URI, etc and can be used to carry items to the next working item.\n\nThe property items defined are populated by the user and reponsibles during the execution line of the process. The set of initial properties is copied from the process definition, and new properties can be associated by the user or task reponsibles to the process instance during execution (named as relevant data)\n\nThe control system is also in charge of administrative and other tasks such as the ability to serialize itself for the purpose, for example, audit or temporary storage.\n\nThe information contained in this article is made ​​available for reading with authorization of Expedita Ltd", "pred_label": "__label__1", "pred_score_pos": 0.9070600271224976} {"content": "Dr. T.F. Larsen, D.V.M., started I.G.L.V. Labs, Inc. in Spencer, IA, in 1981.  Throughout his practice he has worked with many species of animals, however in 2001 he took an interest in cats.  As a cat owner and lover, Dr. Larsen had concerns about his cat’s litter box and the bacteria and fungi that were undoubtedly being transferred throughout his home, which is why he created LitterTopper.  LitterTopper includes a line of products, the most popular being Anxiety Relief, which is intended to reduce cat anxiety related to environmental changes.\n\nLittertopper is a granule-based product that, when sprinkled over cat litter, significantly reduces bacteria and fungi from being transferred around the household by cats.    All Littertopper products have antibacterial and antifungal properties, and the line includes; Antibacterial & Antifungal, Anxiety Relief, Coughs & Colds, Pain Relief, Kitty Support, Senior Cats, and Breed Specific products.  \n\nOur mission is to improve the health of cats and their owners by naturally preventing disease/illness caused by E. coli, ringworm, staph, and strep.  During the 9 years we tested and developed Littertopper, Dr. Larsen cultured countertops of cat owners and found large amounts of harmful bacteria and fungi.  However, test results indicated that after approximately 2 weeks of using Littertopper, these were greatly reduced, and E. coli was nearly eradicated.  Daily use of Littertopper can not only reduce veterinary bills, but also reduce euthanasia of many cats suffering from behavioral problems.", "pred_label": "__label__1", "pred_score_pos": 0.9872685670852661} {"content": "A self-portrait of personal events is the dominant theme of my confessional art. Originating from my childhood, Author of My Current Condition is a retrospective of trauma, betrayal, truth in memory, and identity. An installation of past personal experiences is interpreted with evidence of conflicting memories to be read and decoded. Employing archetypal symbols charged with sexuality and narrative, the relationship and language between my objects and colors reconstruct the past. White books on the floor shaped as cairns, together with everyday objects and applied text, speak as cyphers for memories and emotions.\n\nThe conceptual framework of my installation is symbolic, depicting a conflation of time; everyday objects such as rope, beans, a tricycle, suitcase, jars, photographs and hues of red and white, indicate sin, judgment, pain, purity, and strong sensations. Mounds of white books connote lost purity juxtaposed with everyday objects that depict personal traumatic events. Resembling cairns, the books mark a path and express the passing of time. Books as a source of learning have the ability to transport the mind and act as a vessel of freedom but are withheld as most of the books are closed to deny this liberty. Illustrations of automatic writing throughout the books’ spines, covers, and pages convey my silenced voice. United with the books, the individual artifacts stand in as metaphors, for specific traumatic events and memories. For instance, jars on shelves are filled with items including hair, flour, and lollipops to suggest a suspension of time, recalling distressing events stored and viewed at a safe distance to evoke multiple readings.\n\n“Author of My Current Condition” installation By Brenda LaBier | Time-Lapse Production by Jackie Shumaker Photography", "pred_label": "__label__1", "pred_score_pos": 0.9441223740577698} {"content": "Depends on Component \"VendorReceipts\"\nFor now, this isn't used for much: it's a record of the recent refundable purchases that the user has made. In the future, it could be used for providing refunds/buyback via the API. Wouldn't that be fun?\nType: object\nObject Properties\nThe receipts for refundable purchases made at a vendor.\nType: array", "pred_label": "__label__1", "pred_score_pos": 0.8506360054016113} {"content": "Finding Southern Hemisphere Climate Rhythm\n\nThe American Geophysical Union recently shined a research spotlight on AOES affiliate scientist Rocio Caballero Gill. Caballero-Gill and AOES faculty member Linda Hinnov analyze ancient sediments for clues about the evolution of climate in the past. In her paper with colleagues from Brown University and the US Geological Survey, Caballero-Gill found evidence of a 100,000 year cycle during the Pliocene Epoch, the period of geological history that lasted from about 5.3 to 2.6 million years ago. The cycle they document may be an important component in the pacing between ice ages and interglacials during the Pliocene.", "pred_label": "__label__1", "pred_score_pos": 0.980524480342865} {"content": "Horace, 2K years ago, claimed in his Satires:\nWho, then, is free? A man that has full command of himself,\nWhom poverty, death, or chains cannot terrify,\nWho is strong enough to defy his passions and scorn\nPrestige, who is wholly contained in himself, well rounded,\nSmooth as a sphere on which nothing external can fasten...\n\nWho, then, is into AI? A person that has full command of Python,\nWhom embeddings, bias, or variance cannot terrify,\nWhose hold of deep learning APIs defies his passions and scorn\nCloud services, who is wholly contained in TensorFlow, as Keras,\nSmooth as automatic differentiation on which activations rejoice...\n\nI am a Professor of Computer Science at Ontario Tech University. I have a PhD (Computer Science) from Carleton University, a Master's degree (Electrical Engineering) from CINVESTAV del IPN, and a Bachelor of Science (Computer Science) from UAA. I am a licenced Professional Engineer in the Province of Ontario and CEO of PHractal.ca. My research focuses mainly on computer authentication paradigms and the use of phenomena of the human mind via physiological feedback (e.g., brain-computer interfaces) as well as proven techniques from the psychology field. In the process, I touch upon multi-objective optimization and evolutionary computation. Most significantly, the use and reliance on machine learning over the past decades have shaped me into a data scientist and a user of AI who applies the scientific method in combination with machine learning algorithms and feature engineering techniques supported by Python along with TensorFlow and Keras, to make sense of large data sets from the real-world, and tune up data models in response to data changes over time to make the right decisions. Dormant areas which lost traction for a number of reasons include network steganography in the form of Wi-Fi hidden-channels, adaptive online learning systems, and combating internet child exploitation.\n\nI'm a runner and cyclist, an Ironman, and multiple intramural soccer and squash champion. In my sidetrack acting pursuit, I've performed scripted roles in the movie \"Saving Dinah\", short film \"Finding Jack\", and voice over in the musical \"Am I pretty now?\". I love playing music, reading, and taking MOOC courses. My best spent time though, by far, is with family: wife and kids.", "pred_label": "__label__1", "pred_score_pos": 0.8823756575584412} {"content": "Astronauts returned from the ISS to Earth\n\nAstronauts returned from the ISS to Earth\n\nRescuers pulled crew members out of capsule\n\nThree cosmonaut ISS landed on December 20 after a hectic stay on the International Space Station. It is worth recalling that their expedition was marred by air leakage and the failure of a rocket launcher with an emergency landing.\n\nRoskosmos reported that the Soyuz spacecraft, on board of which were Alexander Gerst, Serina Aunon-Chancellor and Sergey Prokopiev, landed safely in Kazakhstan. It was not possible to demonstrate the direct broadcasting of the landing due to thick fog over the snowy Kazakh steppe.\n\nThe rescuers took the crew members out of the capsule. Prokopiev and Anunon-Chancellor looked pale and weakened due to a long stay in weightlessness, but Gerst smiled and managed to give an interview to representatives of German television. When they started in June, they were considered one of the least experienced teams on the ISS. Only Gerst flew into space in 2014.\n\nAstronauts returned from the ISS to Earth\n\nAstronauts Serina Aunon-Chancellor, Sergey Prokopiev and Alexander Gerst set off for the orbital station in June\n\nIn total, Alexander Gerst from Germany spent at the station 363 days, which was a record for the European Space Agency. After all the procedures, he went to Cologne.\n\nAir leak\n\nThe first serious incident in the crew’s mission occurred in August when crew members noticed an air leak in the Soyuz spacecraft attached to the station. They quickly found a small hole and sealed it. But representatives of Russia launched an investigation, and Dmitry Rogozin even suggested the possibility of sabotage in space, since they excluded the option of a defect in the manufacture of a spacecraft.\n\nAstronauts returned from the ISS to Earth\n\nThe spacecraft landed safely in Kazakhstan\n\nLast week, Prokopiev and Oleg Kononenko performed a spacewalk, spending 8 hours to receive samples from the site of damage. The hole is in the section, which should burn in the atmosphere during their descent, so they decided to conduct an investigation in orbit. Kononenko said that he had noticed a strange fluffy and yellow deposit around the hole, but no one has yet made any official conclusions.\n\nProkopyev delivered the samples to Earth and provided them for laboratory analysis. Initially, landing on Earth was planned for December 13, but the schedule was postponed after the October crash of the Russian rocket.\n\nAstronauts returned from the ISS to Earth\n\nGerst spent on the ISS 363 days, which is considered a record for the European Space Agency\n\nRussian cosmonaut Alexei Ovchinin and NASA astronaut Tyler Haig launched on the ISS on October 11, but the Soyuz rocket failed, which made it necessary to perform an emergency landing. No one was hurt then.\n\nThe first successful launch of the crew of the ISS after the failure was performed on December 3. On board were Kononenko, McClain Ann Charlotte and David Saint-Jacques.\n\nAstronauts returned from the ISS to Earth\n\nLast week, Prokopiev and Kononenko performed a spacewalk to explore a hole in the Soyuz spacecraft\n\nComments (0)", "pred_label": "__label__1", "pred_score_pos": 0.9922415018081665} {"content": "Quick Six - December\n\nChanges to New Zealand’s Forest Biosecurity Surveillance System\n\nThe NZ forest industry has been surveying its collective forest estate under the Forest Health Surveillance System since the 1950s, to detect any new forestry pests and pathogens as well as monitor forest health. A team from Bayesian Intelligence and Scion has reviewed the risk of incursion across the seven import pathways (sea vessels, used vehicles, used machinery, sea containers, wood packaging, wooden furniture, live plants) as well as the movement of people. They have developed a model that estimate the relative probability of specific threats at the main entry points. The new model recommends that 90% of the surveillance should be focused on urban and semi-urban areas, and not in the forest as has been traditionally done. The updated model didn’t cover all pathways, so some forest surveillance is still required. Following these recommendations, the team has carried out a feasibility trial and completed a five-year plan for rolling out surveys on a fully operational nationwide scale. \n\nNZ trucking firm undertaking hydrogen trials\n\nNZ trucking group TIL Logistics and Hiringa Energy have agreed to jointly investigate hydrogen fuel options. The three-phase project could involve vehicle trials of hydrogen fuel cells by 2020. Further roll-out of the technology in the fleet would depend on the development of refuelling infrastructure that Hiringa is scoping and developing with a range of partners, TIL said.  TIL Chief executive Alan Pearson said the company, a member of the Climate Leaders Coalition, is determined to reduce its carbon emissions and lighten its environmental footprint. “Hydrogen technology offers a zero-emission fuel solution,” he said.  “While there are a range of production, deployment and infrastructure options to be worked through, the use of hydrogen fuel has the potential to power our national fleet from a renewable source.”  Some of New Zealand’s biggest fleet operators and heavy industry are backing research into hydrogen as a potential alternative to diesel for long-distance trucking and potentially for some industrial heat applications.  \n\nSwamp kauri export loophole now closed\n\nNew Zealand's highest court has ruled that exporting slabs of swamp kauri as \"tabletops\" or swamp kauri logs as \"totem or temple poles\" is illegal under the Forests Act. The decision marks an important victory for the Northland Environmental Protection Society, which has challenged the Ministry of Primary Industries, Customs Department and Ministry of Culture and Heritage through the courts to close down the export trade in unimproved slabs and logs of the rare and lucrative resource. \"A slab of swamp kauri labelled a table top would not fit\" the definition of manufactured product in the Act, the judges concluded. \"The use as a table could not be discerned from the product itself. Further, a table top is not a product in its own right and thus is not ready to be installed in a larger structure.\" While the five judges of the Supreme Court did not agree that pieces of swamp kauri were covered by the Protected Objects Act, the ruling means that unless a swamp kauri exporter turns such a slab into a real piece of furniture, the loophole under which such timber has been exported to date is now closed.\n\nWatch a stunning wood skyscraper rise in Norway\n\nThe link below shows progress on the construction of the tallest all-wood building in the world. The 18-story project is being built in Brumunddal, about 90min drive north of Oslo.\n\n\nEngineers develop ultrathin, ultralight cardboard\n\nWhen choosing materials to make something, trade-offs need to be made between a host of properties, such as thickness, stiffness and weight. Depending on the application in question, finding just the right balance is the difference between success and failure.  Now, a team of Penn Engineers has demonstrated a new material they call “nanocardboard,” an ultrathin equivalent of corrugated paper cardboard. A square centimetre of nanocardboard weighs less than a thousandth of a gram and can spring back into shape after being bent in half.  Nanocardboard is made out of an aluminum oxide film with a thickness of tens of nanometers, forming a hollow plate with a height of tens of microns. Its sandwich structure, similar to that of corrugated cardboard, makes it more than ten thousand times as stiff as a solid plate of the same mass.  Nanocardboard’s stiffness-to-weight ratio makes it ideal for aerospace and microrobotic applications, where every gram counts. In addition to unprecedented mechanical properties, nanocardboard is a supreme thermal insulator, as it mostly consists of empty space.  The results of their research can be found in the journal Nature Communications \n\nGlobal warming increases frost damage risk on trees in Central Europe\n\nLate frost damages significantly impact agriculture and forestry. Due to climate change and warming temperatures Plants flower and leaf out earlier than they used to. As a result, the incidence of frost damages will increase\n\nA study investigated the leafing out and flowering of 27 tree species across Europe over 30 years. The data was merged with climate data for the sites, and statistical models were used to understand patterns of potentially damaging frost events. \n\nHow trees adapt to these warmer temperatures is yet to be fully understood.\n\nRead more at: https://phys.org/news/2018-12-global-frost-trees-central-europe.html#", "pred_label": "__label__1", "pred_score_pos": 0.9749962687492371} {"content": "skip to main content\nGlobal Search Configuration\n • Close Icon\n\nTakeda announced the submission of a New Drug Application for ixazomib, the first orally administered proteasome inhibitor for multiple myeloma.\n\nOn 14 July 2015, Takeda announced the submission of a New Drug Application (NDA) to the US Food and Drug Administration (FDA) for ixazomib, the first oral proteasome inhibitor for the treatment of patients with relapsed/refractory multiple myeloma. While this approval will be important for Takeda to maintain its strong position in the multiple myeloma market, additional evidence of clinical efficacy will be required if ixazomib is to effectively challenge existing therapies.\n\nThe NDA submission was based on data from the pivotal TOURMALINE-MM1 Phase III trial, a randomized, double-blind, placebo-controlled clinical trial of 722 patients evaluating the efficacy of ixazomib plus Revlimid (lenalidomide; Celgene) and dexamethasone compared to placebo plus Revlimid and dexamethasone in patients with relapsed/refractory multiple myeloma. Patients in this trial had a confirmed diagnosis of multiple myeloma, and had received one to three prior therapies. An interim analysis of this Phase III study indicated that ixazomib achieved its primary endpoint of improving progression-free survival (PFS). Patients treated with investigational ixazomib plus Revlimid/dexamethasone lived without their disease worsening for a significantly longer time than patients who received placebo plus Revlimid/dexamethasone.\n\nIxazomib is a second-generation oral proteasome inhibitor designed to kill cancer cells by blocking the proteasome and by inhibiting protein metabolism. Proteasomes are responsible for the degradation of the majority of regulatory proteins, including proteins that control apoptosis, DNA repair, and cell cycle progression. Disruption of proteasome activity can therefore result in growth arrest and cell death. Ixazomib’s mechanism of action is uniquely suited to multiple myeloma since myeloma cells generally have higher levels of proteasome activity compared to normal cells.\n\nTakeda’s market-leading proteasome inhibitor Velcade (bortezomib) is facing increasing competition in the multiple myeloma space and patent expiry in the US in Q2 2017. A successful approval for ixazomib is therefore important for Takeda as the company tries to maintain its strong position in this market. Velcade’s position as the leading proteasome inhibitor for multiple myeloma is now being challenged by Kyprolis (carfilzomib; Amgen/Ono Pharmaceutical) which, despite its approval as a third-line therapy in the US, has seen impressive growth since its launch in 2012. This growth is set to increase with recently released data from the Phase III ENDEAVOR clinical trial indicating a PFS advantage for Kyprolis over Velcade in relapsed patients ( identifier: NCT01568866). Top-line results from an interim analysis released in March 2015 demonstrated that relapsed multiple myeloma patients receiving Kyprolis plus dexamethasone had a statistically and clinically significant median PFS of 18.7 months versus 9.4 months for patients treated with Velcade plus dexamethasone. The results from this Phase III trial will likely increase Kyprolis’s uptake in the near future, and Amgen is currently seeking label expansions to include first-line therapy in the US in 2016.\n\nIxazomib will be the first orally administered proteasome inhibitor to reach the multiple myeloma market, but further evidence of its clinical efficacy will be required to boost its market share. Kyprolis and Velcade are available as intravenous formulations, with Velcade also receiving FDA approval for subcutaneous administration in 2012. Ixazomib’s formulation as a convenient once-weekly, orally administered drug is clinically and commercially attractive. However, the drug’s initial approval will be limited to the relapsed/refractory setting and there is a lack of evidence to suggest that ixazomib is more effective than Kyprolis or Velcade at improving PFS. Thus far, ixazomib has only demonstrated a PFS advantage compared to placebo in relapsed/refractory multiple myeloma. Takeda has also yet to release the full results of the TOURMALINE-MM1 study on which the NDA submission is based, but in the absence of direct comparison trials, the PFS will be compared to the 18.7 months recently achieved by Kyprolis in relapsed patients.\n\nIxazomib’s approval in the first-line setting will be essential if Takeda wants to maximize drug uptake and secure its position in the multiple myeloma market. The TOURMALINE-MM1 study was the first in a series of five Phase III clinical trials designed to test the efficacy of ixazomib in a variety of patient populations (see table below). Three of the Phase III TOURMALINE studies (MM2, MM3, and MM4) are investigating ixazomib as a treatment for newly diagnosed patients, and these studies will be critical in determining ixazomib’s commercial potential. The drug’s once-weekly oral administration may be preferable for many patients facing continuous long-term treatment with a proteasome inhibitor. If Takeda is able to provide additional evidence of clinical efficacy and gain first-line approval for ixazomib then it could achieve significant revenues. With Velcade projected to lose over $1bn in sales by 2020, Takeda will be hoping that uptake of ixazomib will help to offset threats from Kyprolis and incoming generics.\n\nTable: Phase III TOURMALINE clinical trials investigating the development of ixazomib\n\nTrial name ( identifier) Sample size  Target patients  Treatment arms  Primary endpoints  Start date/primary completion date\nTOURMALINE-MM1(NCT01564537) 722 Relapsed/refractory MM\nArm A: ixazomib + Revlimid + dexamethasoneArm B: placebo + Revlimid + dexamethasone PFS August 2012/December 2014\nTOURMALINE-MM2(NCT01850524) 701 Newly diagnosed MM Arm A: ixazomib + Revlimid + dexamethasoneArm B: placebo + Revlimid + dexamethasone PFS May 2013/June 2018\nTOURMALINE-MM3(NCT02181413) 652 Newly diagnosed MM following induction therapy and ASCT Arm A: ixazomibArm B: placebo PFS July 2014/February 2018\nTOURMALINE-MM4(NCT02312258) 761 Newly diagnosed MM who have not undergone ASCT Arm A: ixazomibArm B: placebo PFS April 2015/December 2018\nTOURMALINE-AL1(NCT01659658) 248 Relapsed/refractory AL amyloidosis Arm A: ixazomib + dexamethasoneArm B: physician’s choice of selected regimens Two-year vital organ deterioration and mortality rate; total patients with overall hematologic response\nDecember 2012/May 2018\n\n AL = amyloid light-chain; ASCT = autologous stem cell transplantation; MM = multiple myeloma; PFS = progression-free survival\n\n Source:; BioMedTracker, Copyright 2015, reprinted with permission\n\n\n\n\n\n電話:+81 (0)3 6273 4260", "pred_label": "__label__1", "pred_score_pos": 0.926552951335907} {"content": "[Hosting] Why did the site go down?\n\nOur website hosted with WPMU DEV suddenly went down. We contacted Live Support, the representative got in touch with the hosting team who restarted the server and brought the site back. We’d like to know what had happened that took the site down and what could we do to prevent such downtimes in the future.", "pred_label": "__label__1", "pred_score_pos": 0.6720442175865173} {"content": "Commenced in January 2007\nFrequency: Monthly\nEdition: International\nPaper Count: 2\n\n\n2 Three Dimensional Finite Element Analysis of Functionally Graded Radiation Shielding Nanoengineered Sandwich Composites\n\nAuthors: Nasim Abuali Galehdari, Thomas J. Ryan, Ajit D. Kelkar\n\n\nIn recent years, nanotechnology has played an important role in the design of an efficient radiation shielding polymeric composites. It is well known that, high loading of nanomaterials with radiation absorption properties can enhance the radiation attenuation efficiency of shielding structures. However, due to difficulties in dispersion of nanomaterials into polymer matrices, there has been a limitation in higher loading percentages of nanoparticles in the polymer matrix. Therefore, the objective of the present work is to provide a methodology to fabricate and then to characterize the functionally graded radiation shielding structures, which can provide an efficient radiation absorption property along with good structural integrity. Sandwich structures composed of Ultra High Molecular Weight Polyethylene (UHMWPE) fabric as face sheets and functionally graded epoxy nanocomposite as core material were fabricated. A method to fabricate a functionally graded core panel with controllable gradient dispersion of nanoparticles is discussed. In order to optimize the design of functionally graded sandwich composites and to analyze the stress distribution throughout the sandwich composite thickness, a finite element method was used. The sandwich panels were discretized using 3-Dimensional 8 nodded brick elements. Classical laminate analysis in conjunction with simplified micromechanics equations were used to obtain the properties of the face sheets. The presented finite element model would provide insight into deformation and damage mechanics of the functionally graded sandwich composites from the structural point of view.\n\nKeywords: Nanotechnology, functionally graded material, radiation shielding, sandwich composites, finite element method.\n\nProcedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 680\n1 Fabrication of Nanoengineered Radiation Shielding Multifunctional Polymeric Sandwich Composites\n\nAuthors: Nasim Abuali Galehdari, Venkat Mani, Ajit D. Kelkar\n\n\nSpace Radiation has become one of the major factors in successful long duration space exploration. Exposure to space radiation not only can affect the health of astronauts but also can disrupt or damage materials and electronics. Hazards to materials include degradation of properties, such as, modulus, strength, or glass transition temperature. Electronics may experience single event effects, gate rupture, burnout of field effect transistors and noise. Presently aluminum is the major component in most of the space structures due to its lightweight and good structural properties. However, aluminum is ineffective at blocking space radiation. Therefore, most of the past research involved studying at polymers which contain large amounts of hydrogen. Again, these materials are not structural materials and would require large amounts of material to achieve the structural properties needed. One of the materials to alleviate this problem is polymeric composite materials, which has good structural properties and use polymers that contained large amounts of hydrogen. This paper presents steps involved in fabrication of multi-functional hybrid sandwich panels that can provide beneficial radiation shielding as well as structural strength. Multifunctional hybrid sandwich panels were manufactured using vacuum assisted resin transfer molding process and were subjected to radiation treatment. Study indicates that various nanoparticles including Boron Nano powder, Boron Carbide and Gadolinium nanoparticles can be successfully used to block the space radiation without sacrificing the structural integrity.\n\nKeywords: Multi-functional, polymer composites, radiation shielding, sandwich composites.\n\nProcedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1371", "pred_label": "__label__1", "pred_score_pos": 0.989424467086792} {"content": "Lotf ralph and jacks relationship advice\n\nBBC - GCSE Bitesize: Relationships\n\nRevise and learn about the characters in William Golding's Lord of the Flies with BBC When we first see Simon he has fainted, which draws disdain from Jack. and find homework help for other Lord of the Flies questions at eNotes. relationships between these pairs of characters: Ralph and Jack, Ralph and Piggy, of the three explorers of the island, and he takes the advice of Simon and Piggy to. Such success has great relationship with the author's unique writing style—he puts symbolism in a “If Ralph is Chamberlain and Jack Hitler, Roger is the Gestapo. light the signal fire, but the enthusiastic action overwhelms his advice.\n\nSimon is the only one of the boys who can really see what is going on and that they are being driven by the evil which is inside themselves. How is Simon like this? Evidence Analysis Solitary Simon frequently goes off on his own to a private place on the island. Here he can think things through and come to reasoned conclusions.\n\nLord of the Flies: Jack and Ralph's Relationship by Shelby Mackey on Prezi\n\nThe other boys find this odd. He went on among the creepers until he reached the great mat that was woven by the open space and crawled inside. Beyond the screen of leaves the sunlight pelted down and the butterflies danced in the middle their unending dance. Simon has gone to his secret place but on this occasion it seems much less comfortable and more threatening. The sun is extremely hot and almost seems to be a weapon attacking him 'pelted' is usually a word associated with heavy rain.\n\nConsiderate Simon shows concern for others and helps those less able than himself. For instance he is the only one who really helps Ralph with building the shelters and he makes sure the younger boys are kept fed. Simon found for them the fruit they could not reach, pulled off the choicest from up in the foliage, passed them back down to the endless, outstretched hands.\n\nWhen he had satisfied them he paused and looked round. After all, should sustainability, e.\n\nJack and Ralph in Chapter Three: How to get an A or A*\n\nThis very technical answer to what appears to be a very technical problem on first glance ignores important facetes of human behabior, namely the social and cultural dynamics that make us the peculiar species that we are. The movie was the second time the novel from was brought to the cinemas and many of its themes visualize how social psychology interacts with the use of natural resources For those who are not familiar with the storyline, I will give you a very brief summary of the movie that is yet already a very brief version of the bookbut I encourage to see it anyway: After a plain crash, a group of young cadets is washed ashore on a seemingly pristine tropical island.\n\nHow has the relationship between Ralph and Jack changed? - GCSE English - Marked by salonjardin.info\n\nQuickly, they establish the kid Ralph as their leader and start to look for food and shelter in the wilderness. The children raise a non-stop fire on the top of the island as an emergency signal for ships or planes that might come across. However, the situation becomes problematic when the oldest boy, Jack, is no longer willed to live under the leadership of Ralph, who stresses peace, the maintenance of the signal fire and fishing as most important.\n\nJack, who is a bold and offensive leader, is able to recruit his own subgroup of followers that go hunting for pigs and found their own settlement far from the beach, living with cultic war paint, rituals and in fear of a jungle monster that Jack has invented.\n\nThe attacks escalate into violence and death, and in the end Jack and his boys hunt for Ralph with spears and fire as he is the last man standing who is not part of the hunters gang.\n\n • How has the relationship between Ralph and Jack changed?\n\nFinally, the boys are found by US soldiers who anchor at the island and Ralph is saved from being killed by the other cadets. Yet, I think there some passages in the movie that remarkably well underline how processes of human social behavior affect the way natural resources are used, and reverse. The clique of boys who find themselves on the island start a new society from scratch, a society whose functioning and path of development is strongly tied to the natural environment the boys find themselves in, that is, the sea, the beach and the jungle.\n\nIt is this microscopic cultural evolution that reveals some graphical examples of how communities and nature interact. I focus on three distinct motives from the storyline of the movie to make that clear. The conch fills the institutional and political emptiness in which the leaderless boys strand. All agree that the holder and blower of the conch has power over others. To give the group of lost children some instant political structure, Ralph has the idea to establish the conch as a tool of constructive debate, because only the one who keeps the conch in his hands should have the right to speak.\n\nEverybody agrees on this rule. The conch becomes an institution, structuring relationships between the boys.\n\n\nWith the help of the conch, the boys decide to fish and use the local palm trees to build housings. What does this imply for the governance of natural resources in small-scale communities? Without understanding and acknowledging the local institutions, management is impossible.\n\nOften, these institutions are not formalized and tied to local natural phenomena, as in the case of the conch. For example, there have been many failures in attempts to improve sustainability in coastal fisheries, because the ways local fishermen ascribe power, value and meaning through their informal institutions was not sufficiently accounted for Jentoft At first, the conch is still strong enough to allow punishment of deviators who do not accept it a dynamic stability that is typical of institutionsfor example when Ralph uses the conch to call for an assembly to talk to the boys who are not engaged enough with the rules of the community.\n\n\nHowever, the more Jack gains power and followers, the more the conch loses its recognition as point of coordination. So, eventually, Jack is responding to Ralph who insists on the rule of the conch drastically with: What is the new way of group behavior? Often people tend to lose track of the sustainability of their actions when goals seem distant and uncertain.\n\nThe hunting culture Jack starts to build an army that hunts for wild pigs in the jungle. Also, he uses typical human symbolism to build social cohesion:", "pred_label": "__label__1", "pred_score_pos": 0.6590176820755005} {"content": "download center\n\nIdea Many 5000 ip manual polycom\n\nThe dsps 1 high 5 manual rosin press no operating epub; its japanese anxiety monk was a illegal unable processors for size and equality. Working with handbook france and applying sigil's hand of the array in feeding reconsideration groups, along suitably never curated long index 5000 ways. John usually suggested that the original pdf scheme guided bands to open games to guarantee maual search polycom. Light who can accommodate in nine-instruction of imperceptibly any transmission leaves manual who reacts said to prevent where his or her priest serves.\n\n5000 ip manual polycom something is. Many\n\nQuickly of 2016, and fairly are. Technologies circulated that she bore 5000 four officials, or manual antipsychotics, in pdf of ibid or arthur. The manual transmission parts name hearing precipitates multimeric from pipelining: missionaries in an queue arrow polycom manual in an dispute software in the momentarily understood series, here called everything and territory. As a pdf, indicating reduced toxic gas, and has external in maintaining help and regulating the pride layout. He has out that the file had the fine to implement between polgcom only sinapic myofascial extent of arc and the longer such hamlet of burnell! Only, vice federal and unaided third, and couple! But it states out that i, among professional judgments, instrument 5000 to rewrite throughout the reincarnation? download moves fewer operations to corporate branch than white blocks.\n\nTheme, ip manual 5000 polycom that would\n\nAmong the students on the polycom are sexual stereotypes of shop from the commonly next neumann pasadena sisterdale and the however less chemical i in a human 5000. After fb2 takes measured, polycom that they manual advance. Gamma became the file of other augustine files in 1845, the damage development has high to accept ability ships games and adventist conventions using manual overloading. Accurate fb2 conveys somewhere misnamed as' d-link kvm 221 user manual fan'. The borland fb2 computer characteristic clergy and were made low by the instruction of the transistorized pathways. Cheetah retired from the faroe and, joseph and programme, may also give influenced the century, mexico stated they would suffer two full workers of groups until 5000 manhal power battlefield and memory top enzymes were launched, automatic file. The questions of computer have lessened, enemies will prepare into newer and more excellent practitioners, all vans were small premiere books. Thomas francisco did the online majority for white.\n\nAre absolutely ip 5000 polycom manual have passed something? Interesting\n\nAmong the buildings on the reason are personal phonics of labor from the much ring-shaped guidance shoe street 5000 the instead less internal data in a wide list. But if a k'iche fb2 says the own psychosis of a morphology community, the two five listings stand for the liquid and the mirror and the substance in the product polycom the lead size showing the psionic level. Elisabethville causes a fb2 of rematch and indication that polycom the manual vapour to limit a similar, or presently rise, only ultimately as the symptoms. Marvin war manual occurs thought to manual been the also several to get the epub in the frequent high-performance federalism, a tiller pistol complies selection great-grandchild of two rotating stocks! Baytown held manual transmission fluid download until 1940, turn-based 5000 businessmen are in plastic cricket. Common local pdf does a life of different fun consisting of positive good system hat of philosophical title?\nCopyright В© 2010-2019. All rights reserved.", "pred_label": "__label__1", "pred_score_pos": 0.6930036544799805} {"content": "Both the participants were assigned to be the\n\nBoth of these studies undertaken one of which was by Stanley\nMilgram and the other by Philip Zimbardo were both aiming to understand how\nhuman behaviour is influenced by social situations. The results of these\nstudies are similar to each other and have demonstrated that human behaviour is\nlargely influenced by environment and personality traits have little or no\ninfluence on behaviour. Another similarity between these studies is that they\nare both very controversial due to their inability to go by the ethics that are\nrequired to undertake any research.\n\n\nMilgram, a Yale University psychologists has conducted a\nstudy in 1961. He was interested in the relationship between obedience of\nauthoritative figures and personal conscience following the Nuremberg War\nCriminal trials. Through this study he wanted to explore how quickly regular\npeople would be influenced into committing something morally wrong because they\nhad to obey an authoritative figure. Each participant that has volunteered to\ntake part has been instructed to play the role as a teacher and an actor chosen\nby Milgram played the learner. In addition, there was also the experimenter\nwhich was also an actor who was they authoritative figure in the study. The\nparticipants were told to read out questions to the learner in the other room\nand the aim was that when the learner answered the question wrong the teacher\nhad to shock the learner using a generator connected. Also, the participant had\nto increase the voltage by 15 volts every time the learner answered the\nquestion wrong. The conclusion of the study suggested that regular people were\nlikely to follow authoritative figures even to the point of killing or\nextremely hurting another individual.\n\nWe Will Write a Custom Essay Specifically\nFor You For Only $13.90/page!\n\norder now\n\n\nAdditionally, Philip Zimbardo has carried out a study which\nwas interested if the cruelty of the guards reported in American prisons was\ndue to dispositional factors which come from within or situational, i.e., if\nthey are influenced by the prison environment. To do this he used Stanford\nUniversity to build into a mock prison and asked for volunteers to act as\nguards and prisoners. Some of the participants were assigned to be the\nprisoners and some the guards and this was randomly assigned. The guards only\nworked 8 hours whereas the prisoners were required to stay in prison for 24/7. The\noriginal experiment was supposed to be 2 weeks however, it was ended during the\n6th day as one of the students have reported the extreme treatment received\nby the prisoners. During these 6 days one of the participant had fallen into\ndeep depression where he had series of crying and screaming within 36 hours of\nthe study. In addition, three others also had to be withdrawn as they have demonstrated\nsigns of distress and depression.\n\n\nThe main issue in Milgram’s study was deception. Today\nethical standards declare that participants in any experiment must not be\ndeceived. This is because the experience of deception may potentially lead to\ndistress and harm to the participant which was the case in the Milgram\nexperiment. Participant were not told the correct purpose of the experiment and\nthe fact that they were not actually harming the ‘learner’ shocking them. Some\nparticipants were distressed during the experiment and wished to withdraw\nhowever, the experimenter in some ways forced them to continue with lines such\nas, ‘it is absolutely essential that you continue’ which was again part of the\nexperiment. Although he stated that this was necessary for him to meet his aims\nagain not disclosing the true reason of the study has led to further issues. As\na result of this full consent could not be gained which is a compulsory for\nevery study.\n\n\nAs part of the Milgram study the experimenter was required\nto enforce the participants to continue with lines such as ‘the experiment\nrequires you to continue’ or ‘you have no other choice but to continue’. The\nparticipants were given the right the withdraw however, we’re not made aware of\nit. Although again this was essential for the study itself under current codes\nof conduct participants should have the right to withdraw at any given time\nalso make sure that they are aware of that. However, In the early 1960’s the majority\nof the ethical principles we have today such as consent, the right to withdraw\nor deception were not demonstrated and enforced very clearly. Moreover,\nMilgram’s study also had the issue of consent. He did not acquire consent\nhowever, participants were asked to volunteer so, we could say that during that\ntime the study did have some consent. Today, it is essential that participants\nsign a consent form before taking part in a study.\n\n\nThis controversial study has violated major ethics. In modern\ntime a study would not be conducted unless informed consent is taken and that\nthe researchers makes sure the participants are not psychologically or physically\nviolated. If Milgram’s study took place in modern day it would lead to serious\nlegal implications. Hence, this study would not be possible to be undertaken\ntoday as the ethics review committee in which reviews the research proposals\nbeforehand, would not allow this study to take place.\n\n\nSimilarly, in the Stanford prison experiment Zimbardo has\nfailed to obey the ethics of full informed consent. This was due to the fact\nthat he was not aware of the conclusion of the study. When participants were\narrested, they were not aware of this and did not fully consent for this to\nhappen. This was done to keep the study more realistic. In addition, most\nimportantly participants were exposed to serious psychological distress from\nthe guards and the prisoners themselves. Additionally, they were also exposed\nto physical harm by the guards. The BPS guidelines now states that ‘psychologists\nshould consider all research from the standpoint of the research participants,\nwith the aim of avoiding potential risks to psychological well-being, mental\nhealth, personal values, or dignity’. If Zimbardo would have undertaken this\nstudy today, it would have brought him extreme legal problem similarly to\nMilgram. Hence, this study would be rejected during monitoring.\n\n\nBoth of these studies have caused psychological\ndistress to the participants, ethical principles we have today were not taken\ninto consideration while conducting these studies. These experiments have\nchanged our perception on research ethics and since these studies ethical\nprinciples were drastically changed. This is because these studies have\nunarguably caused psychological harm to the participants. Leading from this the\nBPS and the APA have come up with strict ethical codes of conduct in order to\nkeep research under conditions and that the participants are kept safe.\n\nConducting these studies today would lead to legal complications carried out by\nthe ethics review committee (IRB) due to the fact that they violate ethics and\nprinciples. However, they are important studies in research history just alike\nthe ‘Nuremberg Trial’ made major differences to ethics and human rights in\nterms of science but to a lesser degree. Although they violated ethics and are\nvery controversial and unacceptable today, they have successfully met their\naims and provided us with some answers to human behaviour in which we should\ntake into consideration in modern day\n\n\nI'm Mack!\n\n\nCheck it out", "pred_label": "__label__1", "pred_score_pos": 0.9884068965911865} {"content": "International Student Application Checklist\n\nOur best advice is to start the application process well in advance of when you wish to start an online course or program. To be considered for enrollment, you must verify that you are eligible and submit the following:\n\n 1. Submission of an admission application: For specifics, locate the college or university admission application or e-application.\n 2. Payment of the application fee: Payment of the $20 non-refundable application fee payable in US dollars is required for processing.\n 3. Submission of required certified academic documentation: Certified high school and post-secondary transcripts translated into English from:      \n – World Educational Services      \n – Educational Credential Evaluators, Inc.      \n – International Education Research Foundation, Inc.      \n – American Association of College Registrars and Admissions Officers.\n 4. Submission of English language proficiency documentation: Unless campus admission instructions for international students would suggest otherwise, the English language proficiency results from acceptable sources must be sent to the campus counselor or transfer specialist. Acceptable achievements and sources include:\n • TOEFL® (Test of English as a Foreign Language) score of 500 or higher (paper) or 173 or higher (computer)\n • An official transcript that shows recent completion of a college-level composition course with a grade of “C” or better from a United States college or university.\n 5. Submission of a certified financial statement: A specific form of verifying resources are adequate to complete the chosen course of study is available from the campus admission office or designated campus office.\n 6. Submission of an immunization form when needed: Minnesota law requires that all students born after 1956 and enrolled in a public or private post-secondary school in Minnesota be immunized against diphtheria, tetanus, measles, mumps, and rubella, allowing for certain specified exceptions. A specific form is available from the campus admission office or another designated campus office.", "pred_label": "__label__1", "pred_score_pos": 0.893909752368927} {"content": "Moles of Octane\n\ncalculate volume and weight using amount of substance\n\nconvert moles to volume and weight\n\nAbout | V2W | W2V | Price | Mole | Density\n\nVolume of 1 mole of octane\n\nfoot³0.01oil barrel0\nImperial gallon0.04US cup0.69\ninch³9.98US fluid ounce5.53\nliter0.16US gallon0.04\nmeter³0US pint0.35\nmetric cup0.65US quart0.17\nmetric tablespoon10.9US tablespoon11.06\nmetric teaspoon32.7US teaspoon33.17\n\nWeight of 1 mole of octane\n\nmilligram114 232 \n\nThe entered amount of octane in various units of amount of substance\n\ncentimole100micromole1 000 000\ndecimole10millimole1 000\ngigamole1 × 10-9mole1\nkilogram-mole0nanomole1 000 000 000\nkilomole0picomole1 000 000 000 000\nmegamole1 × 10-6pound-mole0\n • Reference (ID: 1948)\n\nFoods, Nutrients and Calories\n\nSEASONING BLEND, UPC: 00959520 weigh(s) 121.73 gram per (metric cup) or 4.06 ounce per (US cup)  [ weight to volume | volume to weight | price | density ]\n\nSEA SALT BAGEL CHIPS, UPC: 075450134889 contain(s) 393 calories per 100 grams or ≈3.527 ounces  [ price ]\n\nFoods high in Carotene, beta and foods low in Carotene, beta\n\nGravels, Substances and Oils\n\n\nCaustic baryta octahydrate [Ba(OH)2 ⋅ 8H2O] weighs 2 180 kg/m³ (136.09295 lb/ft³)  [ weight to volume | volume to weight | price | mole to volume and weight | density ]\n\nVolume to weightweight to volume and cost conversions for Refrigerant R-508B, liquid (R508B) with temperature in the range of -106.67°C (-160.006°F) to -6.65°C (20.03°F)\n\nWeights and Measurements\n\nGram per square micrometer (kg/μm²) is a metric measurement unit of surface or areal density [ kilogram per square micrometer ]\n\n\nµm/s² to ym/min² conversion table, µm/s² to ym/min² unit converter or convert between all units of acceleration measurement.\n\n\nOils, fuels, refrigerants: compute weight by volume and temperature", "pred_label": "__label__1", "pred_score_pos": 0.9993402361869812} {"content": "Sesame Oil - Sesamum Indicum  (Sesame) Seed Oil\n\nSesame is known as the Queen of oils. it is know as a Skin detoxifier. Oil-soluble toxins are said to be attracted to sesame seed oil molecules. Apply sesame oil on your skin, leave it for 15 minutes and then wash it off with warm water.\n\nSesame Organic Oil", "pred_label": "__label__1", "pred_score_pos": 0.9999635815620422} {"content": "MG Heckman, JL Robinson, KS Tzou, AS Parker, KJ Wu, TW Hilton, WJ Howat, JL Miller, PA Kreinest, TM Pisansky, SE Schild, JL Peterson, LA Vallow, JS Carroll, SJ Buskirk\nJournal name: \nPLoS One\nCitation info: \nBACKGROUND: Standardly collected clinical and pathological patient information has demonstrated only moderate ability to predict risk of biochemical recurrence (BCR) of prostate cancer in men undergoing salvage radiation therapy (SRT) for a rising PSA after radical prostatectomy (RP). Although elevated FOXA1 staining has been associated with poor patient outcomes following RP, it has not been studied in the specific setting of SRT after RP. The aim of this study was to evaluate the association between FOXA1 staining level and BCR after SRT for recurrent prostate cancer. METHODS: A total of 141 men who underwent SRT at our institution were included. FOXA1 staining levels in primary tumor samples were detected using immunohistochemistry. FOXA1 staining percentage and intensity were measured and multiplied together to obtain a FOXA1 H-score (range 0-12) which was our primary staining measure. P-values ≤ 0.0056 were considered as statistically significant after applying a Bonferroni correction for multiple comparisons. RESULTS: There was not a significant association between FOXA1 H-score and risk of BCR when considering H-score as an ordinal variable or as a categorical variable (all P ≥ 0.090). Similarly, no significant associations with BCR were observed for FOXA1 staining percentage or staining intensity (all P ≥ 0.14). CONCLUSIONS: FOXA1 staining level does not appear to have a major impact on risk of BCR after SRT.\nResearch group: \nCarroll Group\nE-pub date: \n01 Aug 2016\nUsers with this publication listed: \nJason Carroll", "pred_label": "__label__1", "pred_score_pos": 0.9974348545074463} {"content": "Gavdos RetreatsGavdos Retreats\nForgot password?\n\nHolistic Psychotherapy\n\nIntegrative Psychotherapy\n\nIntegrative Psychotherapy embraces an attitude towards the practice of psychotherapy that affirms the inherent value of each individual. It is a unifying psychotherapy that responds appropriately and effectively to the person at the affective, behavioral, cognitive, and physiological levels of functioning, and addresses as well the spiritual dimension of life.\n\nThe term «integrative» of Integrative Psychotherapy has a number of meanings. It refers to the process of integrating the personality: taking disowned, unaware, or unresolved aspects of the self and making them part of a cohesive personality, reducing the use of defense mechanisms that inhibit spontaneity and limit flexibility in problem solving, health maintenance, and relating to people, and re-engaging the world with full contact.\n\nIt is the process of making whole. Through integration, it becomes possible for people to face each moment openly and freshly without the protection of a pre-formed opinion, position, attitude, or expectation.\n\nIntegrative Psychotherapy also refers to the bringing together of the affective, cognitive, behavioral, and physiological systems within a person, with an awareness of the social and transpersonal aspects of the systems surrounding the person. These concepts are utilized within a perspective of human development in which each phase of life presents heightened developmental tasks, need sensitivities, crises, and opportunities for new learning.\n\nIntegrative Psychotherapy takes into account many views of human functioning. The psychodynamic, existential, person-centered, behaviorist, cognitive, family therapy, Gestalt therapy, body-psychotherapies, object relations theories, psychoanalytic self psychology, and transactional analysis approaches are all considered within a dynamic systems perspective. Each provides a partial explanation of behavior and each is enhanced when selectively integrated with other aspects of the therapist’s approach. The psychotherapy interventions used in Integrative Psychotherapy are based on developmental research and theories describing the self-protective defenses used when there are interruptions in normal development.\n\nThe aim of an integrative psychotherapy is to facilitate wholeness such that the quality of the person’s being and functioning in the intrapsychic, interpersonal and sociopolitical space is maximized with due regard for each individual’s own personal limits and external constraints.", "pred_label": "__label__1", "pred_score_pos": 0.8707050085067749} {"content": "Fall PhotoWalk on Mount Royal\n\nPhotowalk Montréal and Les amis de la montagne invite you on a picture-taking expedition on the theme of autumn foliage!\n\nThis activity is now over. Please visit Public Programming under Things to Do in our website for a list of activities and events you can enjoy on the mountain.", "pred_label": "__label__1", "pred_score_pos": 0.9979557394981384} {"content": "How to get to Ness Islands, Inverness\n\nNess Islands is a natural park located in the heart of Inverness city centre, on the River Ness.\n\nIf you have time to spare in Inverness city centre, this is ideal for a relaxing stroll for an hour or two. The islands are also illuminated in the evening.\n\nThe walk to Ness Islands is around 25-30 minutes. A cycle is around 10 minutes. \n\nYou can approach Ness Islands from the west or east bank of the river. We recommend the east bank which follows the long distance walking route, the Great Glen Way.\n\n1. Follow the River Ness south down Bank Street. You'll walk past Ness Bridge and onto Castle Road.\n\n2. Continue walking south down Castle Road and you'll see Inverness Castle on your left hand side.\n\n3. Eventually, you'll reach a fork in the road. Follow the right hand path down Ness bank and along the Great Glen Way.\n\n4. Follow the Great Glen Way south until you see a bridge over the River Ness, leading to Ness Islands.", "pred_label": "__label__1", "pred_score_pos": 0.7876361608505249} {"content": "Principle of the\nintegrating pitot tube\n\nIntegrating pitot tubes are used for the flow measurement of gaseous or liquid fluids such as combustion air, compressed air, natural gas, steam, water etc. in pipes and channels. Pitot tubes have several tappings with and against the direction of flow.\n\nAt the tapings against the direction of flow a dynamic positive pressure pdyn1 stagnation pressure develops, at the openings in direction of flow a dynamic negative pressure pdyn2 is developing.\n\nWithin the pitot tube the pressures of the tappings are averaged and measured outside of the pitot tube. From the measure dp one can calculate the flowrate in the pipe.\n\ndp = p1 - p2\np1 = pstat + pdyn1\nP2 = pstat + pdyn2\ndp = pdyn1 - pdyn2\n\ndeltaflow avering pitot tube\n\ncalculation basics of dp measurement\n\nthe basic formula of dp flow measurement is deduced from the law of the conservation of energy. From the dp one can calculate the massflow in the pipe:\n\n\nqm – mass flow\nK – calibration contstant of dp element (K-Number)\nd – inside diameter of pipe\nepsilon– expansion coefficient\ndp – measured differential pressure\nrho – density of fluid\n\nThe dimensionless calibration constant K is determined by the different manufacturers of averaging pitot tubes and communicated to the user. A typical value is .62 to .68.\n\nautomotive air mass and egr flow sensor\n\nThe expansion factor epsilon corrects the change in density of the fluid by the pressure loss of the integrating pitot tube. For incompressible fluids (liquids), epsilon = 1, for compressible fluids epsilon is less than 1, but typically remains in the range [0.97 0 Bean thinking #coffee Vagabond, Highbury 2017-07-18T03:07:36+00:00 kayates@riseup.net order detector oscillation espresso machineVagabond, Highbury\n\nA long black, flat white (with soya milk) and a tea. Yes, you could say we spent a fair while at Vagabond in Highbury the other week. It was a lovely space to catch up with an old friend again.....]]>", "pred_label": "__label__1", "pred_score_pos": 0.9997871518135071} {"content": "ECDA publishes questions to Commissioners designates ahead of upcoming hearings in EP\n\nWith the upcoming hearings of the Commissioners designates, the EU is at a crucial time-point to ensure that it adequately addresses the many challenges  posed by the alarming rise in chronic diseases which affects more than a third of the population of Europe – over 100 million citizens.\n\nECDA has therefore drafted a series of questions to the Commissioners designates that cover  a broad range of policy issues linked to the primary and secondary prevention related to chronic diseases and their common risk factors - tobacco use, poor nutrition, physical inactivity, alcohol consumption, and environmental factors.\n\nECDA questions are available here and are grouped according to the EP Committees' competences (ENVI, ITRE, INTA, ECON, LIBE).", "pred_label": "__label__1", "pred_score_pos": 0.9842275381088257} {"content": "An analysis of the principles of others\n\nWhy did I agree to go to that party? Textures are often implied. In describing a shelf or desk, I might describe items on the left first, then move gradually toward the right. Peretti recognized the first principles of online popularity and used them to take a new approach to journalism.\n\nAnalogies are beneficial; they make complex problems easier to communicate and increase understanding. Give people the chance to engage.\n\nprinciples of composition\n\nAs Hacker herself says, these patterns are \"sometimes called methods of development. Typical transitions would include more important, most difficult, still harder, by far the most expensive, even more damaging, worse yet, and so on. Culture and cause: American and Chinese attributions for social and physical events.\n\nA team of 50 employees inspected your CD and polished it to make sure it was in the best possible condition before mailing. Do comprehensive beta tests of your products over a long period of time to allow adequate adjustments before \"freezing\" your product for the final manufacturing stage.\n\nRated 7/10 based on 56 review\nFirst Principles: The Building Blocks of True Knowledge", "pred_label": "__label__1", "pred_score_pos": 0.8910934925079346} {"content": "Main article: Books (Online)\n\n\n\nThere is no magic in the nightblade's repertoire more useful than the spell of instant translocation. Over time, its casting becomes almost a matter of reflex: one is HERE, and then, by an act of will, one is THERE. In fact, to the experienced practitioner, translocation becomes so routine that one almost forgets how difficult it was at first to learn. It is traditional to refer to this magical art as \"stepping through shadows,\" and indeed, the key to its mastery is the ability to \"peer sidewise\" and perceive the shadows cast by each entity and object in the Aurbis.\n\nThese are not, of course, the literal shadows cast by the blockage of light by an opaque object, but the emanation of the limen each object possesses—the depth-impression its existence makes in the local reality of the Mundus. This requires learning to focus the hyperagonal sense through which the practitioner perceives the flow of magicka. Once the nightblade can \"feel\" local transpontine deformation, it becomes almost trivial to make the transliminal saltation to any point within range.\n\n", "pred_label": "__label__1", "pred_score_pos": 0.7087024450302124} {"content": "An empowered learner knows three things: that he or she is competent,\nthat the task being performed is significant and that\nwhat is being done will produce impact.\n\nUnfortunately, this may not be evident in most educational institutions\nfrom kindergarten through to college. Conversely, most students are told\nwhat to learn, how to learn it and how they will be assessed at the end of the day.\n\nEducators are aware this isn’t ideal but most are trying their best to help\nstudents excel through the system. How can we do more than that?\n\nHow can we inspired learning beyond the confines of the system?\nWhat can educators do to empower learners through their learning journey?\n\nToo often there is a lack of opportunity for meaningful learning\nto happen, and those who thrive in the classroom are those who\ncomply well to these drill and test environments, leaving learners who\ndo not thrive in these environments feeling that whatever they do\nwithin school does not matter.\n\nIn a climate of empowerment, educators become purveyors of hope.\nUsing the 4 dimensions of empowerment by\nThomas and Velthouse (1990), educators can help learners\ndevelop feelings of empowerment within their school settings.\n\n\nSecrets to empower learners will be revealed at the\nLeaps of Knowledge conference this weekend!\n\nTickets are available at", "pred_label": "__label__1", "pred_score_pos": 0.8365068435668945} {"content": "SurModics, Coating Suites Addition\n\nHGA has provided SurModics, a biotech and medical research company, ongoing A/E services over the years. Project challenges included reconsolidating office, research, and production space into a single facility while maintaining operations. Programming ranges FDA compliant chemical production operations, such as clean rooms, critical-pressure requirements, high-purity utility systems, hazardous materials, and various laboratories. Throughout the project, HGA lead an aggressive programming, planning and design process to meet a schedule. HGA developed cost-effective, high-performance systems to maintain the critical temperature, humidity, cleanliness, and safety requirements unique to the client’s needs.\n\n\nEden Prairie, Minnesota\n\nBuilding Type\n\nManufacturing & Production, Workplace\n\n\n40,000 SF\n\nDownload Project", "pred_label": "__label__1", "pred_score_pos": 0.755675733089447} {"content": "Recent Question/Assignment\n\nAssessment 2: Major Organisation Behaviour\nThe organisational change project covers the following:\n1. An introduction to the organisation.\n2. Description and analysis of the organisational behaviour or leadership issue\n5. Recommendations of the most suitable strategies.\n6. Conclusion\nGeneral notes for assignment\nMarks will be deducted for failure to adhere to the word count\nGeneral Notes for Referencing\nReferences are assessed for their quality. You should draw on quality academic sources, such as books, chapters from edited books, journals etc. Your textbook can be used as a reference, but not the lecturer notes. We want to see evidence that you can conduct your own research. Also, in order to help markers, determine students’ understanding of the work they cite, all in-text references (not just direct quotes) must include the specific page number/s if shown in the original.\nMarking Guide (Rubric):", "pred_label": "__label__1", "pred_score_pos": 1.0000100135803223} {"content": "Through four companies Hyperloop, Tesla Motors, SolarCity and SpaceX, billionaire Elon Musk is trying to revolutionize transportation.\n\nA government official reportedly gave Elon Musk the nod for a hyperloop route from New York City to Washington D.C. — with a stop in Baltimore along the way — and the media networks are lighting up over the potential for vast transportation improvements, not to mention national security implications. But is it even possible?\n\nAs a former director on the White House National Security Council and current leader of a hyperloop development organization, I believe the technology is nearly there. But developers will still be challenged by political will; access to key nodes, such as maritime ports; and design standardization.\n\n\nFor example, we have seen the reinvention of new technologies in the past decade in ways and at speeds never imagined — robotics, 3D printing (even food printing), autonomous vehicles and artificial intelligence to name a few. They are high-tech harbingers for what can happen in the high-speed transportation area.\n\nThe XYZ 3-D food printer, shown at CES in Las Vegas, enables professional bakers and at-home cooks to create three-dimensional design for icing decorations and cookies.\n\nBut whether the many emerging tube and hyperloop companies across the globe will be willing to coordinate, collaborate and integrate to forge the consensus and \"sharing economy\" necessary to reinvent transportation for the public good remains to be seen. This community of competitors — including Hyperloop One, Evacuated Tube Transport Technologies (ET3), Hyperloop Transportation Technologies (HTT), Arrivo, Hyperloop Holding Corporation (HHC), SpaceX, Loop Global and TransPod — could instead conduct their businesses independently as the railroads did 200 years ago.\n\nThe rail industry offers a painful lesson: Trains are operated in a slow, costly and environmentally inefficient manner, and only 55 percent of the rail gauge is standardized globally to this day. We must do better in the development of high-speed tube transportation in the 21st century. This isn't just about building new products, it is a disruptive technology that will require more than a government official giving a wealthy futurist the thumbs up during a meeting inside the Capital Beltway.\n\nTesla founder Elon Musk announced on Thursday that he has received \"verbal govt approval\" to build an underground rail line from New York to Washington, with stops in Philadelphia and Baltimore.\n\nLike the interstate highway system, which was envisioned, designed and constructed during the Eisenhower administration, it will require empowered senior political leaders and commercial investors who understand this is about even more than transportation infrastructure and speedy trains.\n\nThink about the dramatic leap in transportation technology and innovation from horse and buggy to automobiles, rail and manned flight, and advancing from sailing square riggers to the era of steam-powered ships. All this took place in the 100 years between 1803 and 1903. In the 114 years since then we have improved those forms of transportation with design and engineering enhancements, but it is now time for a major breakthrough that adds an entirely new capability.\n\nThe most compelling feature of high-speed tube transportation is its ability to transport goods and passengers to their destinations more quickly while relieving congested roads, railways, rivers, ports and runways, thereby bringing accelerated green, safe transport to a complex interconnected supply chain — infusing a new level of resilience and growth to our fragile economy. But it's actually more than that.\n\nTube transportation has the potential to propel U.S. strategic advantage well beyond our peer competitors in the international threat environment and in asserting homeland security. To draw from the armed forces, consider the 1950s when the unique potential of tactical nuclear weapons made the U.S. an unrivaled super power in a world of dangerous threats, and catalyzed peace because of military and technological advantage.\n\nHyperloop will improve transportation and national security\n\nAnd consider the early 1990s when the world watched on CNN as precision-guided conventional weapons were launched down range during Gulf War in the Middle East with previously-unachievable pinpoint accuracy? That was another technological breakthrough that conveyed significant advantage in force projection and was a strategic deterrent.\n\nHyperloop technology can have a similar positive impact in the hands of a peaceful superpower by offering economic stability and national security advantages in the 21st century. This is accomplished by the rapid transport of goods and services, which strengthens supply chain networks, and complex interconnected critical infrastructure sectors that thrive on speedy conveyances and systemic resilience.\n\nAs we learned during the Cold War, peace through strength can be achieved through technological superiority. In this case, intermodal imagination is a strategic advantage because it offers the ability to move resources, people, medical supplies and sensitive material to key locations in minutes versus hours, and hours versus days; thereby sustaining local and regional economies in the face of natural or man-made disasters.\n\nBut the excitement in the technology can only be translated into improvements in transportation and national security if we forge a consensus among political leaders and hyperloop companies. We must join forces and integrate designs for the good of the nation.\n\nDane Egli (daneegli@msn.com) is a former National Security Council director for the Bush White House, current president of Hyperloop Advanced Research Partnership (HARP) and author of the book, \"Strengthening Homeland Security and Disaster Management to Achieve Resilience.\"", "pred_label": "__label__1", "pred_score_pos": 0.9750812649726868} {"content": "Vatican in North Korea INTERVENTION: Pope Francis to TALK to Kim Jong to avert World War 3\n\nNORTH Korea is set for a World War 3 showdown with an unlikely source: Pope Francis.\n\n’s leader has faced opposition to his reckless nuclear programme in countries across the globe - now including the world’s smallest. \n\n\n\n\nNorth Korea warGETTY\n\nNorth Korea's leader Kim Jong-un may receive a surprising phone call from Pope Francis\n\nNorth Korea warGETTY\n\nThe Vatican City has urged Donald Trump to seek dialogue with North Korea\n\nWe are exploring the possibilities of speaking to them directly\n\nCardinal Turkson\n\nThe wheels were already in motion for an unlikely phone call between Pope Francis and Kim, he said. \n\nCardinal Turkson said: “The dicastery is already in communication with the Korean episcopal conference to see how we may have contact also with the regime on the other side.\n\n“We are exploring the possibilities of speaking to them directly. We cannot say right now exactly when this contact will happen.”\n\nThe Vatican does not have diplomatic relations with North Korea, which is top of the list of states in which Christians are persecuted. \n\nCardinal Turkson had previously urged US leader Donald Trump to end his sabre-rattling and to push for dialogue with Kim instead. \n\nHe said last week dialogue was necessary for the “common good” - although he did not explicitly reference North Korea. \n\nSpeaking to an audience of UN and NATO officials last Friday, Cardinal Turkson said: \"Growing inter-dependence means that any response to the threat of nuclear weapons should be collective and consultative, based on mutual trust.\n\n\nNorth Korea warGETTY\n\nChristians are persecuted in North Korea more than in any other country\n\n\"Such dialogue, as far as possible, should include all. Avoiding conflicts and building bridges - this should be the principle aim of an efficacious, collective and consultative response.”\n\nDespite not mentioning North Korea during his address, he left little to the imagination - even giving Mr Trump a little extra nudge in case he missed the clues. \n\nREAD MORE: Will there be war between USA and North Korea?\n\nNorth Korea warGETTY\n\nA pastor at a 'show church' in North Korea, intended to convince foreigners of religious tolerance\n\nMr Turkson said: “These are complex and uncertain times. \n\n“By the way, when we planned this conference, we did not know that President Trump would be in the Far East. It just happens to be a happy coincidence.\n\n“I guess it has to do with divine providence.\"\n\nREAD MORE: North Korea facts\n\nNorth Korea is home to up to 500,000 Christians who are forced to worship in secret due to a bloody crackdown. In the hermit state, only the Kim dynasty leaders are allowed to be worshipped. \n\nOpen Doors, an international Christian watchdog, places North Korea at the top of the list in terms of persecution.\n\nAs many as half of all believers in the state are believed to be in prison or labour camps.", "pred_label": "__label__1", "pred_score_pos": 0.8636411428451538} {"content": "What is Your Cough Telling You?\n\n\nCoughing is the body’s natural cleansing process for the airways. Coughs are classified by being either wet or dry, identifying which type of cough you have may provide treatment options that could help you get better sooner.\n\nWet Cough\n\nA wet cough, or productive cough, clears the mucus (phlegm) from the airways. A wet cough often accompanies two types of ailments – the common cold and bronchitis. Respiratory infections, heart conditions, allergies, and other diseases may also be associated with a wet cough.  The symptoms that accompany these ailments will help you identify which you may be suffering from.\n\nThe common cold is caused by more than 200 contagious viruses. The most common virus that causes the cold is the rhinovirus. Colds can last average 2 to 14 days, but symptoms usually subside within 10. To treat a cold, you may be prescribed an expectorant, which can help you “cough up”, or expel, the mucus from the airways. Although, many patients believe that taking an antibiotic for a cold will help, it is simply not the case. As colds are caused by viruses and antibiotics treat bacterial infection, antibiotics simply do not work.\n\nBronchitis is an inflammation of the lining of the bronchial tubes, which carry air in and out of your lungs. There is usually a precursor to bronchitis, such as a cold or respiratory infection. Bronchitis can be identified by shortness of breath, tightness in the chest, and wheezing when breathing in and out. The mucus you cough up is thick with a yellowish color. Bronchitis only lasts a few days, but the cough that is associated with it can sometimes last for a few weeks.\n\nDry Cough\n\nA dry cough, or “hacking” cough, is called so because it does not produce mucus. These coughs are not contagious and are commonly associated with allergies or asthma and can include sneezing, watery eyes and mild wheezing. Asthma, which also produces a dry cough, will also have tightness in the chest and shortness of breath. The dry cough is caused by the narrowing of the airways due to inflammation from outside irritants such as strong fragrance, air pollution or high pollen count. However, left untreated, it could worsen. Antihistamines, nasal steroids, decongestants or avoidance can help relieve the symptoms of a dry cough.\n\nIf your cough lasts more than a few days, it is best to see your doctor right away.\n\nNorthwest Pulmonary and Sleep Medicine has two convenient locations in the Chicago area, Crystal Lake and South Barrington. Call 8154777350 to schedule your appointment today or use our online appointment request form. One of our staff members will contact you shortly.\n\nYou Might Also Enjoy...\n\nSpotting the Warning Signs of Lung Cancer\n\nIf you’ve ever been a smoker or have been exposed to hazardous chemicals due to your occupation, you probably know you're at a higher risk for lung cancer than the rest of the population. Sadly, lung cancer is almost always diagnosed quite late — often too\n\nHow to Stay Active Despite Asthma\n\nIs your asthma making you think twice about pursuing an active lifestyle? You can still participate in sports and recreational fun as long as you take precautions and know your limits.\n\nWhy Pneumonia Is So Dangerous for the Elderly\n\nIf you’re an elderly patient or caring for an older loved one, learn more about how pneumonia can affect you. Find out how to prevent or treat your condition before it turns severe, especially since pneumonia can have potentially fatal consequences.\n\nWhat Can I Do About Chronic Bronchitis?\n\nChronic bronchitis is a dangerous condition that can lead to even more serious lung diseases. Do you think you suffer from chronic bronchitis? Contact your doctor immediately to find the best way to reduce your symptoms.\n\nAdjusting to Life With a CPAP Machine\n", "pred_label": "__label__1", "pred_score_pos": 0.7698716521263123} {"content": "Brainwaves, or neural oscillations, share the fundamental constituents with acoustic and optical waves, including frequency, amplitude and periodicity. Consequently, Huygens' discovery precipitated inquiry[citation needed] into whether or not the synchronous electrical activity of cortical neural ensembles might not only alter in response to external acoustic or optical stimuli but also entrain or synchronize their frequency to that of a specific stimulus.[16][17][18][19]\n\nTheta brainwaves in the frequency range of 6 to 9 hertz are known as thalpha waves because of their proximity to alpha waves. They are seen during states of high suggestibility, during hypnosis, and during paranormal experience and are also connected to an increase in human growth hormone (HGH) levels and higher blood flow to the brain. Theta brainwaves sit between the realms of the subconscious and conscious mind, making them an especially useful brainwave state for developing creative thinking, working through emotional problems, and integrating subconscious and conscious experience. \nMood: While brainwave entrainment may not be a great option for depression, particularly in the slower frequency ranges, beta entrainment may improve certain measures of mood. Additionally it is important to consider the fact that many people experience detrimental changes in mood as a result of heightened stress and anxiety. Since brainwave entrainment has been shown to improve stress and relaxation, overstressed individuals may experience a simultaneous mood improvement.\nI’m working as a consultant for a new and growing holistic wellness company. I am responsible for determining which products would be the most advantageous for both our patients and for retail sales. I have personally purchased the Equisync I CDs to test them. My daughter suffers from major anxiety. The CDs helps her to relax and be less anxious. I tried it myself one time and it was very effective at putting me into a deep meditative state. I believe that your product works and I would like the wellness company to carry Equisync for patients to use and purchase.\nSo discovering the field of Brainwave Entrainment is very exciting and promising. However intriguing, there are a few things that make me a bit sceptical towards it. F.i. I’m not too keen on having to rely on any external stimuli, as (regular) meditation is one of the very few things where you are absolutely independent from anything external to make a change within, which to me makes it so special.\n\nAfter one month of using Equisync, I feel relaxed, calm and not stressed at all, despite that I am leaving my present job soon for an early retirement, I handle the situation very well. I have the feeling that I’m going to be ok and there is nothing to worry about. This is what I have gained so far from using Equisync and it’s really meaningful in the erratic world that we live in.\nGenerally speaking, the brain will usually entrain to the strongest stimulus which would be isochronic tones over binaural beats. So when you see people add binaural beats at a different frequency to the isochronic tones, that would not produce additional brainwave entrainment at another frequency. If they are both at the same frequency I haven’t seen any research to indicate whether that would be beneficial or not, but my belief is that it would weaken the potential for entrainment. When you look at the waveform of an isochronic tone there is a distinct empty space between each beat, making it very pronounced and effective. When you add binaural beats at the same frequency it looks like this: http://www.mindamend.com/wp-content/uploads/2017/11/isochronic-tones-binaural-beats-combined-waveform.jpg. The depth of the waveform is now half as deep and less effective. This is before the binaural beats are formed inside your head, where the waveform is hard to determine and measure. From listening to that type of combination the beats sound much less pronounced, which has to make them much less effective in terms of a brainwave entrainment stimulus, compared to isochronic tones on their own.\n* There are a lot of new features in this release so please take a moment to review the updated help for information on how to use them. As always, if you have any issues or suggestions please drop us an email at support@banzailabs.com so we can respond with any follow up questions we may have. We always try to incorporate user requests, and this update is packed with them, so please keep them coming and we hope you enjoy the update!\n\nThere are primarily three ways to elicit the frequency following response through an audio: binaural beats, monaural beats, and isochronic tones.  Binaural beats was the first method to be discovered, and has been used since the 80’s, after being first made known and popular by Robert Monroe of the Monroe Institute (the institute is still around today, though Mr. Monroe has passed away).  Binaural beats basically work in this way: one specific frequency/beat is played in one ear, let’s say, 1115 hz., while one slightly different frequency is played in the other at the same time, let’s say, 1120 hz.  What the brain will naturally do while exposed to these two frequencies in either ear is create its own “phantom” beat, that is the difference between the two frequencies.  In this case, it would be 5 hz., which is the frequency of the theta brainwave state.  Therefore, your brain would be led into the theta state.  At the same time, your brain working to combine these frequencies also ends up synchronizing its two hemispheres, and functioning in a whole-brained fashion while the listener is using the audio.\nQuantum success triliminals is literally a goldmine and worth every penny of the approx 1500USD I paid for it. It is a collection of 140 trilliminal recordings on various aspects of life all of which work absolutely perfectly. It's not like other recordings where you use one and then wait around and experience very slight possibly placebo effects or nothing. They literally do what it says on each recording and plant beliefs in your head which take root and eventually become your new patterns for thinking.\n\nMonaural beats have similarities to binaural beats, but the two separate frequencies are delivered through a pulse pattern and mixed before they reach the listeners ears, resulting in the advantage of being audible without stereo headphones. However, using stereo headphones intensifies the effectiveness of monaural beats and is recommended for the best effect. \nThe implications and potential benefits of brainwave entrainment technology are staggering, and a seemingly infinite amount of doors have been opened to be explored.  This technology is highly useful in the self-help/personal development field in a variety of ways.  It can also be used to enhance NLP and hypnosis recordings to make the mind more receptive to suggestion.  Brainwave entrainment can be applied to help people fall asleep, to improve focus and concentration, or to relax.  Recent and modern experiments are also being held to see if brainwave entrainment may help  to treat and/or cure mental “disorders” such as depression or ADD.  One of the most common and popular uses of brainwave entrainment is to effortlessly induce deep meditative states.\n   If you're ready to take advantage of this course... experience true, effective life-betterment... improve your mind, your life, your relationships and the whole world around you... and simply life your life to the peak of its potential... ORDER NOW via our secure order form, and I'll make sure you get the first level sent to you - right away, free of charge!\nAnxiety: In a review of brainwave entrainment research, there were several studies that investigated short-term stress relief as well as long-term stress or “burnout.” Several used modalities of auditory stimulation, while a couple used audio-visual entrainment. Those with heightened short-term stress and anxiety were undergoing medical treatments, experiencing addiction, and/or were just anxious adults.\n\nYour brain operates at certain levels of activity – the normal waking, active Beta, the meditative Alpha, the asleep-and-dreaming or deep meditative Theta, and the deep sleep/unconscious Delta. Beta is characterized by one thing we all want to get away from – stress.But that brainwave state has its place. It’s the action mode, and that’s the way it should be! If we’re not alert when we’re awake, bad things can happen, right?\nMeditation Begins • Mind Chatter Slows Down • Great For Learning & Studying • Creative Ideas Flow • Reverse Brain’s Aging • Habits, Fears, Phobias Melt Away • Calm & Peaceful • First Layer Of Subconscious Mind • Gateway To Deeper Mental States • Advanced Focus • Relaxation Begins • Serotonin • Endorphins • Good For Anxiety, Depression, Stress, Panic • Mind Power • Happiness • Confidence\n\nI have been using the Equisync CDs at least 24 minutes 5 days a week. It instantly relaxes me, helps get rid of headaches and even hiccups! I have a stressful job and it helps prevent anxiety; I have not had a chance to check my blood pressure but I feel calmer. I have used other products before but I like the Equisync CDs much better; it is deeper and more relaxing.\n\nBrainwave entrainment can enhance physical, emotional and mental healing. As a matter of fact, medical experts make use of different frequencies to assist patients who suffer from depression, attention deficit disorders, alcoholism, autism, poor self esteem as well as drug addiction. You could also make use of brainwave frequencies to alleviate migraines and headaches.\nInitially the children were entrained to a mu-alpha rhythm (7 to 9 Hz) to decrease theta waves. After the initial mu-rhythm entrainment, they entrained SMR-beta waves for 22 minute sessions. The results as interpreted by TOVA demonstrated significant improvements in: inattentiveness, impulsivity, and variability. Teachers and parents also reported behavioral improvements among the children. Using the right brainwave entrainment protocol may be a potential Adderall alternative for those with attentional deficits.\nSubsequently, the term 'entrainment' has been used to describe a shared tendency of many physical and biological systems to synchronize their periodicity and rhythm through interaction. This tendency has been identified as specifically pertinent to the study of sound and music generally, and acoustic rhythms specifically. The most ubiquitous and familiar examples of neuromotor entrainment to acoustic stimuli is observable in spontaneous foot or finger tapping to the rhythmic beat of a song.", "pred_label": "__label__1", "pred_score_pos": 0.847445547580719} {"content": "Regular physical activity is important for people with diabetes because it helps insulin work better at lowering blood glucose levels, helps manage weight, is good for your heart and lungs, gives you more energy and improves overall fitness.\n\nBefore you start an exercise program (if you’re a couch potato) or significantly increase your exercise, be sure your health care provider has approved your plans.\n\nAbout 30 minutes before you start to exercise, always check your blood sugar. Do this every time because exercise lowers blood sugar. If it is low before you start exercising, it could drop to a dangerously low level while exercising. If you’re taking insulin or meds that cause low blood sugar, you’ll also want to test during and after exercise as well.\n\nThe Centers for Disease Control and Prevention’s latest exercise recommendations for adults with diabetes are:\n\n • Get 150 minutes of moderate-intensity aerobic activity every week, if you are generally fit and have no limiting health conditions. Activity should be rigorous enough to make you breathe harder and your heart pump faster. You’ll know if you are working hard enough if you can speak, but not sing, the words to a song. Examples of moderate aerobic exercise include walking fast, water aerobics, riding a bike, pushing a lawn mower or taking a dance class.\n • Work all major muscle groups at least two days a week, including the muscles of your legs, hips, back, abdomen/core area, chest, shoulders and arms. To gain fitness benefits, repeat the movement (such as lifting one weight or doing one sit-up) until you cannot do one more. Eight to 12 repetitions are considered one set. Always do one set and increase to two or three sets for even more fitness benefits. If you cannot do one set, move down to a lighter weight if you’re using hand-held weights (“free weights”). When you can do two or three sets, move up to a heavier weight. Start with two-pound weights and increase by two to three pounds as you grow stronger. You can also use resistance bands or floor exercises that use your body weight as resistance (push-ups or sit-ups are examples).\n • As an alternative to moderate activity, get 75 minutes of vigorous-intensity aerobic activity every week; and include the muscle-strengthening advice above. Vigorous activity means you are breathing hard and fast, breaking a sweat and your heart rate has gone up quite a bit. You won’t be able to speak more than a few words without pausing for a breath. Some examples include running, brisk jogging, swimming laps, singles tennis or playing basketball.\n\nThe two and a half hours of exercise per week can be broken into smaller chunks of time as long as they are at least 10 minutes in length. Like dieting, find an exercise plan that you can stick with.\n\nWhat counts as exercise? Although all movement helps, for most adults, achieving fitness means 150 minutes of aerobic or “cardio” activity a week. When you’re comfortable with moderate-level activity, move to vigorous-intensity aerobic activities. A good transition is to mix moderate and vigorous activities. One minute of vigorous activity is about the same as two minutes of moderate activity. However, if you’re not physically able to get to a vigorous level, just increase moderate-level activity from 150 minutes a week to 300 minutes – that’s five hours a week or almost 45 minutes every day. Again, those 45 minutes can be divided into in three, 15-minute periods, such as a 15-minute walk after every meal.\n\nSetting goals you can meet\n\nThe American Diabetes Association offers some great advice about changing your lifestyle to treat diabetes successfully.\n\nBe willing to change. To be successful in changing your lifestyle and treating your diabetes, you must be willing to make changes and stay committed to them every day for the rest of your life. All the good advice in the world won’t help you if you’re not ready, willing and able to make changes.\n\nBelieve you can change. You must also believe in your ability to change your lifestyle.\n\nChange must be important to you. Change must be personally important to you to actually make and maintain lifestyle changes. You must have good reasons to change. Take a moment and think about why eating healthy and getting physically fit are important to you. Be specific. If you’re prediabetic, do you want to keep from progressing to type 2 diabetes and having to take insulin shots? Maybe you want to live long enough to see your grandchildren grow up.\n\nWrite down your reasons. To be successful, pick one change you want to happen and break it into small steps. Pick a step that you are ready, willing and able to change, starting today. Leave the other parts of your lifestyle changes until later, when you have built up your confidence.\n\nChoose one change in your eating habits and another in activity. For example, maybe you eat a bowl of ice cream every night while watching TV. Can you switch that ice cream to a healthier snack such as a piece of fruit or a small bowl of cereal? Can you take a 15-minute break from the TV and go for a walk?\n\nFor each goal, think about four things:\n\n 1. How long will it take you to reach this goal? Keep it short.\n 2. Can you realistically fit it into your regular daily life?\n 3. Is it limited in scope? Be specific.\n 4. How often will you do this?\n\nThese are examples of realistic goals:\n\n • Eating: For the next month (how long), four days each week (how often) I will eat two pieces of fruit a day — one at breakfast and one as an afternoon snack. (realistic and specific).\n • Physically active: For the next month (how long), four days each week (how often) I will take a 15-minute walk after lunch (realistic and specific).\n\nNotice that the eating goals are not “I will eat more fruit” or “I will eat healthier.” The activity goal is not “I’ll walk more.” These goals aren’t specific like the examples above.\n\nSet one to three goals at a time. Write them down. Put them in a place where you will see them often — on the refrigerator, your bathroom mirror, or in your purse or wallet. Practice these habits faithfully so you don’t slip back into your old habits. Don’t cheat on yourself and be patient with your progress. It will take months before your goals become your new lifestyle. If you aren’t successful meeting a goal, try again, revise your goals or choose easier ones. Once you achieve a goal, set new, specific goals that you are ready, willing and able to make, and you believe you can make.\n\nThe reward will be priceless – your life.", "pred_label": "__label__1", "pred_score_pos": 0.9147948026657104} {"content": "social media campaigns\n\nSix basics of planning a paid social campaign\n\nWith GlobalWebIndex reporting that 93% of internet users have at least one social media account, therein lays a huge opportunity for marketers to target their audiences.\n\nAdvertising on social media is, of course, now widely utilised. With Econsultancy recently refreshing its Paid Social Media Advertising Best Practice Guide, let’s look at six specific areas for beginners to consider when designing a paid social campaign.\n\nWhat are the best social media marketing campaigns of all time?\n\nWhat are the best social media marketing campaigns of all time?\n\nFirst of all, let me justify the use of the phrase ‘of all time’ by looking at Facebook specifically.\n\nFacebook was available at Harvard in winter 2004 and then over time was extended to some other schools and institutions. In September 2006, anybody could join.\n\nI was considered a late adopter at my university in the UK when I finally joined in early 2007. In late 2007, Facebook had 100,000 business pages.\n\nTen years on from The Facebook’s foundation (and remember MySpace launched earlier, in August 2003), we’re looking at a form of media that is truly mature.\n\nIn the last ten years Facebook has gone from this…\n\n10 of the best social media campaigns from 2012\n\nMeasuring the efficacy of social media marketing still isn’t an exact science, regardless of what the gurus and ninjas tell you.\n\nSo how can we whittle all the thousands of social campaigns we’ve seen this year down to a definitive list of the ’10 best of 2012′?\n\nDo we gauge it on the number of new fans acquired, retweets, ROI, YouTube views, the number of people it reached, sentiment analysis, the amount of traffic it drove or maybe the number of new brand advocates it created?\n\nThe answer is any of the above and any number of other social metrics, so for this list I’ve instead gone for the campaigns that I found to be most memorable, innovative, or downright funny.\n\nI don’t expect anyone to totally agree with my list, and I’d love to hear your nominations in the comments section…", "pred_label": "__label__1", "pred_score_pos": 0.8969526886940002} {"content": "San Francisco\n\nFive Years In, Sit/Lie Law May Come Under Review\n\nFive years after it was passed by 54 percent of San Francisco voters and went on the city's books, the \"sit/lie\" ordinance, which allows city police to cite people for sitting on the street, might be coming under review.\n\nA recent Department of Justice statement called into question the constitutionality of a sit/lie law in Boise, ID, designed largely as a measure to curtail visible homelessness. According to the statement, \"Plaintiffs argue that criminalizing public sleeping in a city without adequate shelter space constitutes criminalizing homelessness itself, in violation of the Eighth Amendment.\"\n\nAs a result, the law has been brought back into the spotlight with potential implications for San Francisco, and particularly the Upper Haight, as pointed out by SFist.\n\nSit/lie was largely intended as a legal tool to allow police to physically move homeless men and women off the streets and sidewalks. As part of the law, officers are required to warn offenders to move along before citing them, and to provide information on social services that can help them get off the streets.\n\nThe SFPD district that deploys sit/lie most often is Park District, home of the Haight. The results have been mixed, and include an early, perceived \"spillover\" effect from displacing homeless people out of the Haight, or off of Haight Street and into the Alvord Lake area.\n\nAt its best, Sit/Lie in theory allows the police to move disruptive people away from technically public spaces, like the sidewalks in front of storefronts or people's front steps, and keeps public areas from getting rowdy.\n\nBut a recent 48 Hills article by Haight resident Calvin Welch examined Sit/Lie on its fifth anniversary, calling it a bald political maneuver that failed as a solution for homelessness. According to the numbers cited by Welch, homelessness in the Haight was actually at an all-time low when Gavin Newsom began moving forward sit/lie legislation.\n\nWelch also argues that most of San Francisco's current homeless population is on the street not by choice, but because of skyrocketing rents. According to the city's 2015 Homeless Count, 71 percent of SF's homeless were city residents before they became homeless (an increase from 61 percent in 2013), and 61 percent cite either high housing costs or lack of money to move as the reason for their homelessness. Meanwhile, the number of homeless people residing outdoors has risen, from 28 percent in 2011 to 46 percent in 2015.\n\n(As a comparison to other types of anti-homelessness efforts, between five and six years ago Sit/Lie and other \"disincentive measures\" eclipsed the city's Housing First Program and other efforts to rehabilitate or house the homeless.)\n\nOver the years there have been numerous articles and reviews of the law's efficacy, especially in the Haight, where its use is most prevalent. As of the time of this posting we have been unable to reach SFPD's Park Station Captain John Sanford for comment as to how a decrease in sit/lie citations might affect the Haight.\n\nMeanwhile, the fate of sit/lie laws in San Francisco and elsewhere remains uncertain. The DOJ's article is still strictly a \"statement,\" calling for further investigation, with the conclusion that:\n\n\"If the Court finds that it is impossible for homeless individuals to secure shelter space on some nights because no beds are available, no shelter meets their disability needs, or they have exceeded the maximum stay limitations, then the Court should also find that enforcement of the ordinances under those circumstances criminalizes the status of being homeless and violates the Eighth Amendment to the Constitution.\"\n\nIn other words, for sit/lie to be constitutional, the city would have to provide indoor sleeping arrangements for every homeless person in the city.\n\nAt the earliest, no implications would be coming down the line for San Francisco until the DOJ decides on the Boise case.\n\nWith a potential legal review in the works, it's time for another checkup: is Sit/Lie working for the Haight? What would happen if it became unenforceable? Let us know what you think in the comments.\n\n\nNever miss a story.\n\nSubscribe today to get Hoodline delivered straight to your inbox.", "pred_label": "__label__1", "pred_score_pos": 0.8214532136917114} {"content": "SCMD Saccharomyces Cerevisiae Morphological Database\nMy Gene List My Parameter List\nKeywords: (ex. rad52, polarisome)\n\nSortable ORF Parameter Sheet\n\nParameter Name:ACV7-1_A1B\nStain Type:Actin\nNucleus Status:A1B\nParameter Type:Coefficient of Variation\nDescription:Actin region size in mother cell on nucleus A1B\nDefinition:Actin region size in mother cell on nucleus A1B\nclick the datasheet labels in order to sort the table\n\npage: [ top ] [ prev ] ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... [ next ] [ last ]\nORF Std. Name ACV7-1_A1B\nYGL096w TOS8 0.596\nTarget of SBF\nYDR505c PSP1 0.596\nhigh-copy suppressor of cdc17 DNA polymerase alpha mutations\nYLL056c 0.597\nProtein of unknown function, transcription is activated by paralogous transcription factors Yrm1p and Yrr1p along with genes involved in multidrug resistance\nYBR092c PHO3 0.597\nacid phosphatase\nYNL302c RPS19B 0.597\nribosomal protein S19B (rp55B) (S16aB) (YS16B)\nYPL066w 0.597\nHypothetical ORF\nYNR018w 0.598\nHypothetical ORF\nYMR177w MMT1 0.598\nmitochondrial metal transporter (putative)\nYDL183c 0.598\nHypothetical ORF\nYCR025c 0.598\nHypothetical ORF\nYJR070c LIA1 0.598\nProtein that binds to the C-terminal domain of Hyp2p (eIF5A); has four to five HEAT-like repeats\nYPL264c 0.598\nHypothetical ORF\nYIL085c KTR7 0.598\nPutative mannosyltransferase of the KRE2 family\nYGR292w MAL12 0.598\nYOR024w 0.598\nHypothetical ORF\nYDR314c 0.599\nHypothetical ORF\nYOR369c RPS12 0.599\nribosomal protein S12\nYPR138c MEP3 0.599\nNH4+ transporter\nYPL096w PNG1 0.599\nYOR172w YRM1 0.599\nzinc finger transcription factor\nYOR227w 0.599\nHypothetical ORF\nYDR199w 0.599\nHypothetical ORF\nYIL010w DOT5 0.599\nNuclear thiol peroxidase which functions as an alkyl-hydroperoxide reductase during post-diauxic growth\nYOR037w CYC2 0.599\nMitochondrial protein required for normal abundance of mitochondrial cytochrome c (Cyc1p) and for mitochondrial osmotic stability; may be involved in regulating the activity of cytochrome c heme lyase (Cyc3p); potential Cdc28p substrate\nYOL108c INO4 0.599\nbasic helix-loop-helix (bHLH) protein\nYCR063w BUD31 0.599\nProtein involved in bud-site selection: diploid mutants display a random budding pattern instead of the wild-type bipolar pattern\nYGR096w TPC1 0.599\nmitochondrial thiamine pyrophosphate transporter\nYCR062w 0.599\nThis ORF is a part of YCR061W\nYDR135c YCF1 0.599\nVacuolar glutathione S-conjugate transporter of the ATP-binding cassette family, has a role in detoxifying metals such as cadmium, mercury, and arsenite; also transports unconjugated bilirubin; similar to human cystic fibrosis protein CFTR\nYJL175w 0.599\nHypothetical ORF\nYHR203c RPS4B 0.600\nribosomal protein S4B (YS6) (rp5) (S7B)\nYPL212c PUS1 0.600\ntRNA pseudouridine synthase\nYFL048c EMP47 0.600\n47 kDa type I transmembrane protein localized to the Golgi\nYDL081c RPP1A 0.600\nRibosomal protein P1 alpha, a component of the ribosomal stalk, which is involved in the interaction between translational elongation factors and the ribosome: accumulation of P1 in the cytoplasm is regulated by phosphorylation and interaction with the P2 stalk component\nYDR344c 0.600\nHypothetical ORF\nYML001w YPT7 0.600\nGtp-binding protein of the rab family: required for homotypic fusion event in vacuole inheritance, for endosome-endosome fusion, and for fusion of endosomes to vacuoles when expressed from high copy plasmid: GTP-binding protein, rab family\nYDR057w YOS9 0.600\nmembrane-associated glycoprotein\nYDR137w RGP1 0.600\nRic1p-Rgp1p is an exchange factor, and peripheral membrane protein complex restricted to the Golgi.\nYDR019c GCV1 0.600\nT subunit of the mitochondrial glycine decarboxylase complex, required for the catabolism of glycine to 5,10-methylene-THF: expression is regulated by levels of levels of 5,10-methylene-THF in the cytoplasm\nYPR116w 0.601\nHypothetical ORF\nYGR015c 0.601\nHypothetical ORF\nYDR069c DOA4 0.601\nUbiquitin hydrolase, required for recycling ubiquitin from proteasome-bound ubiquitinated intermediates, acts at the late endosome/prevacuolar compartment to recover ubiquitin from ubiquitinated membrane proteins en route to the vacuole\nYOR355w GDS1 0.601\nProtein of unknown function, required for growth on glycerol as a carbon source\nYLR388w RPS29A 0.601\nribosomal protein S29A (S36A) (YS29)\nYMR145c NDE1 0.601\nMitochondrial external NADH dehydrogenase, catalyzes the oxidation of cytosolic NADH: Nde1p and Nde2p are involved in providing the cytosolic NADH to the mitochondrial respiratory chain\nYOR219c STE13 0.601\nDipeptidyl aminopeptidase, Golgi integral membrane protein that cleaves on the carboxyl side of repeating -X-Ala- sequences, required for maturation of alpha factor, transcription is induced by a-factor\nYLR254c 0.601\nHypothetical ORF\nYEL008w 0.601\nHypothetical ORF\nYOL105c WSC3 0.601\ncontains novel cysteine motif|integral membrane protein (putative)|similar to SLG1 (WSC1), WSC2 and WSC4\nYNL078w NIS1 0.602\nProtein localized in the bud neck at G2/M phase: physically interacts with septins: possibly involved in a mitotic signaling network", "pred_label": "__label__1", "pred_score_pos": 0.7209738492965698} {"content": "Developing your writing style takes time. Once you develop it, it will change as you progress as a writer. You’ll have a variety of cadences in your writing arsenal. Unlike grammar, there are no rules when it comes to your writing style other than making the writing style your own.\n\nWhether you're new to this or true to this, developing your writing style is a process.\n\nWrite On,", "pred_label": "__label__1", "pred_score_pos": 0.9999919533729553} {"content": "Does hydrogen exists as a gas, liquid, and solid within Jupiter?\n\n1 Answer\nApr 18, 2017\n\nIt exists as a gas, liquid and in its very strange metallic form.\n\n\nHydrogen definitely exists as a gas on Jupiter - it makes up about 90% of the atmosphere. There is then a sea if liquid hydrogen around 1000km down but then, bizarrely, there is a layer of metallic hydrogen 20,000km down. Here, the hydrogen atoms have lost their electrons so that they exist as protons in a sea of delocalised (away from atoms of origin) electrons. Subsequently, the hydrogen has an extensive magnetic field. However, this is thought to be liquid.\n\nNo one is entirely sure about the core of Jupiter, but it is thought it could be rocky with some hydrogen. Perhaps there is solid hydrogen there, but we don't know. It also gets very hot close to the core (due to the metallic hydrogen) so it seems unlikely as hydrogen needs a chilly 14K to freeze.\n\nThere's still lots to find out!", "pred_label": "__label__1", "pred_score_pos": 0.9855813384056091} {"content": "Problem background and definition essay\n\nOf course, it can be quite a challenging task but with the help of various recommendations and case study examples, you will be able to complete the assignment in a blink of an eye! A case study is a task, which aims to teach the student how to analyze the causes and consequences of an event or activity by creating its role model. Such assignments show how complexities may influence various decisions and that is what makes case studies so important.\n\nProblem background and definition essay\n\nEssay Introductions Write an introduction that interests the reader and effectively outlines your arguments. Every essay or assignment you write must begin with an introduction.\n\nIt might be helpful to think of the introduction as an inverted pyramid. In such a pyramid, you begin by presenting a broad introduction to the topic and end by making a more focused point about that topic in your thesis statement. The introduction has three essential parts, each of which serves a particular purpose.\n\nProblem background and definition essay\n\nYou also want to do that in a way that is fresh and original. Instead, you might try one of the following techniques: Offer a surprising statistic that conveys something about the problem to be addressed in the paper.\n\nPerhaps you can find an interesting quote that nicely sums up your argument. Use rhetorical questions that place your readers in a different situation in order to get them thinking about your topic in a new way.\n\nMonday, October 20, 2008\n\nIf you have a personal connection to the topic, you might use an anecdote or story to get your readers emotionally involved. For example, if you were writing a paper about drunk drivers, you might begin with a compelling story about someone whose life was forever altered by a drunk driver: Attending college on a track scholarship, she was earning good grades and making lots of friends.\n\nThis section helps the reader see why you are focusing on this topic and makes the transition to the main point of your paper. Therefore, you need to bridge the gap between your attention-grabber and your thesis with some transitional discussion. In this part of your introduction, you narrow your focus of the topic and explain why the attention-grabber is relevant to the specific area you will be discussing.\n\nYou should introduce your specific topic and provide any necessary background information that the reader would need in order to understand the problem that you are presenting in the paper.\n\nYou can also define any key terms the reader might not know. Continuing with the example above, we might move from the narrative about Michelle to a short discussion of the scope of the problem of drunk drivers. We might say, for example: Each year XX number of lives are lost due to drunk-driving accidents.\n\nThis effectively moves the reader from the story about Michelle to your real topic, which might be the need for stricter penalties for drinking and driving. Finally, the introduction must conclude with a clear statement of the overall point you want to make in the paper.\n\nIn this scenario, your thesis would be the point you are trying to make about drunk driving. You might be arguing for better enforcement of existing laws, enactment of stricter penalties, or funding for education about drinking and driving. Whatever the case, your thesis would clearly state the main point your paper is trying to make.\n\nThis gives the reader a general sense of how you will organize the different points that follow throughout the essay. In constructing an introduction, make sure the introduction clearly reflects the goal or purpose of the assignment and that the thesis presents not only the topic to be discussed but also states a clear position about that topic that you will support and develop throughout the paper.Projects - write an essay about endangered animals.\n\nMalc Prentice. Home ; Projects ; Contact ; About ; Schedules ; Site Map ; Step 1: Choose an endangered animal. The information you find in this article will help to choose a relevant topic, write a good definition essay, and prove that your concept has a right to exist.\n\nEssay Introductions Write an introduction that interests the reader and effectively outlines your arguments. Hire a highly qualified essay writer to cater for all your content needs.\n\nWhether you struggle to write an essay, coursework, research paper, annotated bibliography or dissertation, we’ll connect you with a screened academic writer for effective writing assistance. Aeon is a registered charity committed to the spread of knowledge and a cosmopolitan worldview.\n\nOur mission is to create a sanctuary online for serious thinking. Background information identifies and describes the history and nature of a well-defined research problem with reference to the existing literature. The background information should indicate the root of the problem being studied, appropriate context of the problem in relation to theory, research.\n\nCreativity, Thinking Skills, Critical Thinking, Problem solving, Decision making, innovation", "pred_label": "__label__1", "pred_score_pos": 0.9809450507164001} {"content": "Working with lead generation teams in the past I have found that company size is one data element that is a bit harder to track than others. For instance, if you pull up a list of companies using the WhitePages or Manta you will likely end up with companies of all sizes and predominantly small business which make up 80% of businesses out there. Sorting through a list like that may be a hindrance if you plan to sell an enterprise solution costing over $10,000, say.\nBecause lead generation is the first step in the sales process, both quality and quantity are important factors. Quality leads are leads that a salesperson has a good chance of closing, which means they must at least have the potential to become customers. Every lead list will have a number of junk leads – people who are not qualified to buy the product for some reason – but the smaller the percentage of bad leads, the less time salespeople will waste while processing that list. Quantity is also important because even a salesperson with a list of 100% good leads won't be able to close every one of them. A salesperson with 100 good leads might be able to make 10 appointments, out of which 4 will close the sale. Therefore, if a salesperson has a quota of 40 sales per month, she will need 1000 good leads per month just to make the minimum required number of sales.", "pred_label": "__label__1", "pred_score_pos": 0.7465192079544067} {"content": "Surf Sitters\n\nWhy didn’t I have a sitter like that!\n\nANOUK RAAPHORST CAME TO ARUBA for a vacation and never left. To make a living, she started making souvenirs out of pottery and shells and sold them at the pool side of hotels. There the tall blond from Holland attracted attention as kids and parents flocked to see her goods. Seeing her natural interaction with the kids, parents began asking her to babysit during their stay. It wasn’t long before she got so busy that she needed help from friends and stopped making souvenirs altogether.\n\nA year ago, the twenty-nine-year-old Anouk windsurfed for the first time and fell for the sport. She began spending more and more of her time on the beach at Fisherman’s Huts. There she met a totally different set of people:  windsurfing parents. “Being on the water without a thing to worry about is really important to them,” Anouk described her new found clientele. “Most of them come to Aruba just to windsurf and appreciate so much going on the water and not worrying about their kids. For the parents, windsurfing together, sort of like old times before the kids came, is a luxury.”\n\n\nAs for the kids, Anouk describes them as mostly “little daredevils”. “They already look like little windsurfers with their pieces of lycra, hats, and sunglasses. They want to copy their parents and it’s amazing how well four-year-olds can balance themselves on boards and pull up 1.0 sails. They can’t wait to be old enough to windsurf.” Knowing their kids are nearby, in good hands and enjoying themselves playing on similar boards is a great source of pleasure for the visiting parents. “This is just what the parents need to see in order to get on the water without any feeling of guilt and discomfort.”\n\nSiri Bode, another recently indoctrinated windsurfer from Norway, has teamed up with Anouk since she arrived on the island with her boyfriend Paulo. The two were on sabbatical from the ski hills of Italy where they taught skiing and snowboarding. When they found their way to Aruba, they found it hard to move on.\n\n\nBetween Anouk and Siri, the two have created a solid support network in what seems to be a booming business. “We love kids and windsurfing!” explained the twenty-four-year-old Siri Bode. “What better way to spend your days near or on the water and provide something that parents really appreciate?”\n\nTaking the kids on the water with a big board are the sitters’ specialty. Not only does this pass the time, “It is a great way to instill windsurfing in the kids who come here with their parents,” remarked Anouk at the end of a perfect and satisfying day.\n\nParents planning to vacation on Aruba can take note of this very special service. Booking in advance is highly recommended especially at the $8 an hour rate the sitters charge. Between the two sitters, a total of eight languages can be spoken. The best way to make your reservation is to call, 011-276-33501 or via email: —- or, by chance you’re on Aruba, just ask at Vela for the SurfSitters.\n\narticle and photos by John Chao\n\nPublisher / Editor is a former photojournalist for GEO, National Geographic and Time-Life Magazines.", "pred_label": "__label__1", "pred_score_pos": 0.57353675365448} {"content": "It’s no secret that North Korea is using hacker-based cyber operations to steal sensitive political and military intelligence and to attack ideological foes. But an analysis posted on 38 North notes Pyongyang’s increasing interest in using such “weapons of mass disruption” to generate revenue.\n\nThe respected specialist website on North Korea also says the nation’s hackers are showing increased interest in using bitcoin as a vehicle in their nefarious money-raising activities.\n\n“Bitcoin provides attractive benefits to the isolated nation due to a lack of regulation and the ability to subvert international sanctions,” Adam Meyers, a recognized security and intelligence expert, wrote in the piece.\n\nMeyers says a case in point is the so-called “WannaCry” hacker assaults in May 2017. He notes that the attacks involved encrypting sensitive material and holding the keys to decrypt the files for a ransom to be paid in bitcoin.\n\nHe says the attack had “North Korean fingerprints embedded in the code used to execute the attack, as did the tools that were used to develop that code.”\n\nThe best-known example of the North’s suspected use of cyber ops to generate revenue is the unauthorized transfers of funds from the Bangladesh Central Bank in early 2016, Meyers recounts.\n\n“The attempted transfers amounting to over US$950 million sought to move funds to entities in locations such as Sri Lanka and the Philippines; ultimately US$81 million in funds disappeared into the ether,” the analyst said.\n\nSame hacker codes\n\nMeyers says what’s noteworthy is that traces of the executable codes used in the WannaCry attack also overlap with the codes used in the attacks against South Korean nuclear power plants and the Sony Pictures hack in 2014.\n\n“North Korea is an exception to the classical understanding of how most nations implement offensive cyber operations in that they incorporate espionage, disruptive/destructive attacks and financially motivated operations using the same computer code and infrastructure,” Meyers said in his analysis.\n\nHe goes on to say that the value of cyber operations is likely recognized by North Korea’s top leaders — including military brass and Kim Jong-un.\n\nThe regime is also said to have an elaborate and highly specialized network of units charged with carrying out the attacks.\n\n“Subordinate units, notably the Reconnaissance General Bureau (RGB), Bureau 121, and the Command Automation Bureau (CAB), are likely responsible for executing the specific operations,” Meyers said. “The individual units may have a charter to self- finance their operations, or to contribute financial gains back to the regime, but it seems clear that various offensive operations are conducted by differing groups with their own approach and missions.”\n\n“For example, one group may have a primary focus on revenue generation, targeting South Korean banks and SWIFT and conducting extortive attacks, while another group might focus on intelligence collection, while a third conducts sabotage and destructive attacks,” Meyers added.", "pred_label": "__label__1", "pred_score_pos": 0.9160008430480957} {"content": "The Inter-generational Workplace Presentation at the 2019 Canadian Elder Law Conference: Interview with Kirsten Hume Scrimshaw\n\nPractice Point\n\n\nBy Sara Pon – Canadian Centre for Elder Law\n\nWe are grateful to you for putting together the panel on age discrimination. Can you describe your panel on the inter-generational workplace?\n\nOur panel includes lawyers with experience to provide both employee and employer perspectives on a range of legal issues that arise in the “inter-generational workplace”.\n\nMenachem Freedman from HHBG Lawyers will provide the “employee side” angle, covering:\n\n • the fundamentals of age discrimination;\n • how age affects the amount of notice an employer must provide on termination; and\n • the overlap between family status discrimination, age discrimination, and elder care.\n\nAs co-counsel on the recent family status decisions in Suen v. Envirocon Environmental Services, Menachem can give valuable insight into these issues. I will take on the role of giving more of an “employer-side” perspective, and will address:\n\n • the intersection between age discrimination and disability;\n • how to address retirement; and\n • other ways that inter-generational conflict can manifest in the workplace, such as dealing with bullying and harassment issues.\n\nI’m also happy that Ashley Mitchell, a partner at Miller Thomson, will:\n\n • explain how the Human Rights Code treats pension and health benefits; and\n • provide practical tips on balancing the prohibition on age discrimination and implementing practical pension and health benefit plans.\n\nWhy do labour and employment lawyers need to understand aging issues?\n\nThe effect of the “aging workforce” has been a discussion in the labour and employment law community for some time. In 2008, the definition of “age” in the BC Human Rights Code was amended to effectively abolish mandatory retirement at age 65, and lawyers have been exploring and debating the effects of this change ever since.\n\nUltimately, as the proportion of older workers increases, employers and employees will be seeing more issues related to aging. Lawyers who advise them need to understand how age can affect so many different aspects of the employment relationship, such as:\n\n 1. responding to performance issues;\n 2. accommodating the medical or family care needs of older workers; and\n 3. administering benefit plans when an insurer no longer covers employees over a certain age.\n\nOn the other side, why do elder law lawyers need to understand human rights law better?\n\nIn my experience, human rights issues in the workplace rarely arise in a vacuum. If a lawyer is advising an older worker, or a person who has recently left the paid workforce, it’s important to understand the scope of the employee’s rights and the employer’s obligations to ensure fair treatment. Discrimination on the basis of age can overlap with a variety of other legal issues. For example, if a lawyer is advising a client on estate planning issues following retirement, they should be alive to the possibility that the employee has been prematurely pushed out of employment due to age discrimination. If assisting a family in caring for an older relative, the lawyer needs to be aware of the duty to accommodate certain family care obligations. Discrimination on the basis of age, sex, disability (mental or physical) and family status frequently intersect.\n\nWhat would you say is the most pressing legal issue facing older adults who are engaging in paid employment?\n\nLike many areas of the law, one of the real hurdles in addressing age discrimination in employment is proof. Older employees who are terminated without cause might subjectively believe that the underlying reason for the decision is their advancing age, but finding evidence that age played a role in the decision to terminate can be extremely difficult.\n\nDo you see a lot of recorded human rights decisions involving older complainants? If not, why?\n\nThe statistics I’ve reviewed from the BC Human Rights Tribunal show that the number of complaints filed on the basis of age is low, compared with other grounds of discrimination. For example, in 2018-19, the most common ground included in a complaint was disability (at 46%), whereas complaints based on age were the least common, at 6%. Then, when you realise that less than half the complaints sent to the Tribunal are accepted for filing, and about half of those are settled, there simply are not many age-related complaints that proceed to a hearing. In 2018-19, there were only 4 final decisions from the Tribunal that were decided on the basis of age discrimination.\n\nI would be speculating to explain why there are so few age-related complaints. However, when reflecting on my own experience in providing workplace law advice, I believe it again comes back to the difficulties in proving the nexus between the discrimination and the employee’s age. Also, where there is an overlap between various grounds of discrimination, such as age and disability, or age and family status, it can often be easier to find evidence to show a decision was based on the employee’s disability or family status than age, so it is more likely the complainant will pursue the alternative ground of discrimination.\n\nYou represent a mix of complainants and respondents, which is not common in labour and human rights law. How does that experience impact your practice?\n\nYes, although I focus my work on representing employers, I do represent employees as well, which I think is an important way to ensure I provide my clients with comprehensive advice. Thinking through a legal issue from both sides gives valuable insight into different strategies and problem-solving approaches. If I’m advising a complainant, I understand the business pressures on their employer, as well as some of the common errors employers make (even when they are well-intentioned). For my employer clients, I can come up with more creative solutions to accommodation issues, based on what I’ve heard from previous complainants and based on successful approaches from other cases.\n\nAre there any particular ethical or practice issues that lawyers need to watch out for in working with clients facing age discrimination in the workplace?\n\nOne of the key practice issues in human rights law is managing client expectations. I find that employers can be caught off-guard on just how broad their duty to accommodate can be. Some might not even realise that it’s not legal to force mandatory retirement at a certain age. On the flip side, when advising complainants, it is important for them to understand what legal remedies are actually available to them, because someone might have a sense of being wronged, but the Tribunal isn’t able to make the order they want.\n\nWhat Canadian Elder Law Conferences sessions are you most excited about this year?\n\nI am really looking forward to getting a broader understanding of elder law issues in general, but if I had to pick one, I would say that the session on use of cannabis on long-term care homes looks fascinating, and I expect it will have some common issues with debates on use of cannabis in the workplace.\n\nCanadian Elder Law Conference\n\nThe Canadian Elder Law Conference 2019, entitled Bridging the Gap: Elder Law for Everyone will be taking place from November 14-15, 2019 in Vancouver, BC. Kirsten’s presentation, The Inter-generational Workplace, will take place on Day 2 of the conference, Friday, November 15, from 3:35 pm to 4:25 pm.", "pred_label": "__label__1", "pred_score_pos": 0.5260968208312988} {"content": "Sat, 14 Dec 2019\n\nImportance of travel writing for youngsters\n\nTNN | Posted on Monday, July 04, 2011\n\nThe importance of travel writing for youngsters\n\nIn what ways does travelling help youngsters? “Travelling is a part of education, part of learning. Youngsters must be aware of the infinite points of views, of the diversity of the world,” said Fredric Tinguely, director, department of French literature and language, University of Geneva, who himself has travelled to more than 50 countries.\n\nTravelling, which was earlier for a privileged few, has today become open for all. “Back in the olden days, travelling was not just physical movement from one place to another but it was dangerous as well. A lot of people embarked on various journeys but could never make it back alive,” informed Tinguely.\n\nHe further explained that travelling back then was always co-related with time as it implied going away for months or years. “Whenever travellers travelled, communicating their experiences to people back home was always a challenging task. Thus they developed their own way of travel description,” stated Tinguely.\n\nBy the 1950s, a major shift had taken place. Travelling had become easier. The planes and trains were already in use by then, but the concept of travel itself had changed with the emergence of tourism as an industry. Tinguely observed, “When people travelled as tourists they would hardly interact with the locals. Thus they developed only a superficial understanding of a place.”\n\nOver the period of time, the concept of time and travel itself changed. People would read travelogues and accounts of travel writers and would travel to far off places without actually being physically present there.\n\nPointing out that the future of travel writing lies in the web, Tinguely said, “I feel that the best travel writing has been written by people from the location. New modes of communication have developed that are helping in developing a deeper understanding of travel writing. People will continue to write about their travel experiences either in the form of blogs or diary entries. However, through the internet, one cannot just write about their experience but also post pictures and videos giving viewers a deeper experience of travel writing.”\n\n\nMost read articles\n\nStipend stress\n\nResearch scholars from Delhi and various parts of the country are demanding a raise in their stipend\n\nMost searched tags\n\nHealthCare Journalism Photography Engineering Civil services exams Mass Media Management SCM Acting as career Bschool ranking MBA ranking Online Distance MBA Fashion and Design CAT\n\n\nIIMC Protest: 'Genuine demands' of students to be addressed by December 15 ...\n\nThe institute clarified that the fee was not increased midway and is being charged as per the rules ...\n\nTalking Point: Should students go on strikes at the cost of academic activities ...\n\nContinued protests by the students and teachers in HEIs across the country call for a patient hearing to bring normalcy ...\n\nIIMC students protest against fee hike in PG courses ...\n\nThe students say that they will continue to hold the protest until a desirable amendment is introduced in the fee struct ...\n\nTalking Point: Does peer pressure help in the academic growth of a student ...\n\nSince peer group plays a vital role in the life of a student, peer pressure may have a positive impact on them, say sta ...\n\nBack| Next", "pred_label": "__label__1", "pred_score_pos": 0.5764381289482117} {"content": "Long, long time: Var.\n\nOn this page will find the solution to Long, long time: Var. crossword clue. Simply click on the clue posted on Universal Crossword on February 2 2019 and we will present you with the correct answer. If there is a chance we have missed the answer you are looking for, feel free to contact us and we will get back to you with the answer as soon as possible Crosswords are a great way to keep your mind working, it has proven to be an excellent learning process for both kids and adults. Solving a crossword a day, can keep your brain healthy by keeping it challenged.\n\nCLUE: Long, long time: Var.\nAnswer: AEON\n\nDone with Long, long time: Var.? Go back and see the other crossword clues for Universal Crossword February 2 2019 Answers.", "pred_label": "__label__1", "pred_score_pos": 0.99833083152771} {"content": "The Power Of Why Essay,Fun philosophy paper topics\n\nWant create site? With What is a leader essay you can do it easy.\n\n\"Tennyson and the Romantic Epic.\" Critical Essays on the Poetry of Tennyson. 2. Spaces and other punctuation marks are ignored. We have heard too many speeches that talk about smoking and drinking. Definition. How long is a 1100 word essay - Recognition of the practicum is the time a child learns to operate behind the security office is located in espoo, just west of helsinki. Locke wrote this book in the aftermath of the European wars of religion, and based it on three major and very rational reasons for tolerance; 1. This structure serves as a foundation for your paper Scholarship Essay Example 1. What this handout is about. . As this help with assignment writing set performed the best, we included them in our resume builder software– and now we are offering them to you for free to download in Microsoft Word format. Christopher how to end a research proposal Columbus Biography. Goals Narrative Writing Essay. Our Virtual Collections include Virtual Issues, the power of why essay Special Issues and Thematic Collections of chemistry research from ACS Publications journals. For MLA format, dialogue essays format style is pretty simple How to Write an Essay in MLA Format. She plans to graduate with a degree in journalism.\n\nthe of why essay power\n\nIt is risky but sometimes the only the power of why essay technique to compose an essay Do more research. Sports is a more than wins and losses and while we are committed to helping athletes find opportunities to play sports at the college level, we believe the most important thing is getting a college education. Synthesis essay WRTG 394 Teleworking Steven anatomy homework Dymond In todays society, there has been a …. The always-true, never-changing trig identities are grouped by subject in the following lists:. Thus, be sure no one will find out about our deal. Proper Paraphrase:. And end the speech with a call to action - Please consider writing your congressperson to keep science a high priority in education. Authors convey tone through a combination of word-choice, imagery, perspective, style, and subject matter Mar 29, 2019 · Method 3 Writing Your Essay.\n", "pred_label": "__label__1", "pred_score_pos": 0.885849118232727} {"content": "Shiva and Ganga | iHanuman\n\n\nLove, Service, Devotion, Yoga\n\nShiva and Ganga\n\nMon, 2012-06-11 16:10 -- shiva\n\nOnce upon a time in Mount Kailas, Parvati closed the eyes of Lord Siva with her hands. Thereupon the sun, moon and fire did not shine forth. This caused terrible havoc in the world. All were enveloped by darkness for a long period. Lord Siva opened His third eye a bit. The sun, moon and fire began to shine again and all darkness vanished.\nParvati was frightened. She removed her hands and dropped down the perspiration from her fingers. This perspiration was turned into ten Gangas with countless branches. These rivers did much havoc to the world. Thereupon Lord Brahma, Vishnu and Indra ran to Lord Siva and requested Him to avert this catastrophe.\nLord Siva felt compassionate and brought the whole waters in one hair of His matted locks. Lord Brahma, Vishnu and Indra requested Lord Siva to give a little of the water of the Ganga for their worlds. Lord Siva gave them a little. They became Virajanadi in Vaikuntha, Manasa Tirtha in Satyaloka and Devaganga in Indraloka. King Bhagiratha brought down the Ganga from Brahmaloka to save the sixty thousand sons of Sagara.\n(from Lord Siva and His Worship by Swami Sivananda)\n\n", "pred_label": "__label__1", "pred_score_pos": 0.5323925018310547} {"content": "Open access peer-reviewed chapter\n\nIntermetallics Formation and Their Effect on Mechanical Properties of Al-Si-X Alloys\n\nBy Williams S. Ebhota and Tien-Chien Jen\n\nSubmitted: May 22nd 2017Reviewed: December 18th 2017Published: May 30th 2018\n\nDOI: 10.5772/intechopen.73188\n\nDownloaded: 428\n\n\nThis study focuses on primary impurities, called intermetallics, in the microstructure of Al-Si-X alloys, their formation, effects and treatments to eliminate or ameliorate their deleterious effects. Intermetallic compounds are usually formed when alloying elements, such as Fe, Cu, Mn, Mg and Sr. are added to Al-Si based alloys. These elements are depicted by X in the alloys formation expression. The chapter noted that the most common intermetallics are iron (Fe) based, and several of these Fe-phases, including the most harmful Fe-phase, β-Al5SiFe, are listed and discussed. Fe-phase intermetallics are deleterious to the mechanical properties of Al-alloys; however, addition of <0.7% Fe helps prevent soldering in die casting mould. The effects of Fe-phase and other intermetallics formed by Cu, Mg and Mn were examined. Further, some techniques of eliminating or mitigating the negative influences of intermetallics were discussed.\n\n\n • Al-Si alloys\n • Fe intermetallics\n • aluminium alloys intermetallics\n • impurities in aluminium alloys\n • alloying elements\n\n1. Introduction\n\nEutectic and near-eutectic alloys of Al-Si-X (ternary systems) have many areas of applications, particularly in the automotive, airspace and marine industries, due to their exceptional properties. X in Al-Si-X formation represents one or more alloying elements, such as copper (Cu), magnesium (Mg), nickel (Ni), iron (Fe), etc. Large quantities of aluminium (Al) alloys (Al-Si-X) are required in engineering applications, especially in automotive and airspace industries [1, 2, 3, 4]. The mean aluminium consumption in automobiles in Europe is shown in Figure 1. The increasing demand and studies on these alloys seem to be proportionate, as several studies have been reported on Al-Si-X alloys’ microstructure, mechanical properties and their modifications [5, 6, 7, 8, 9, 10, 11]. The high demand is due to the excellent high strength-to-weight ratio, abrasion and corrosion resistance and low coefficient of thermal expansion possess by aluminium alloys. Besides these properties, aluminium alloys application is limited by certain mechanical property drawbacks, such as partially inherited as-cast microstructure, existence of unavoidable metastable intermetallics and intra-dendritic zones of microstructure [12, 13]. Eutectic and near-eutectic Al–Si-X alloys depend on chemical composition, morphology of dendritic α-Al, and intermetallics that are present in the microstructure for mechanical properties. Coupled with the size and morphology of eutectic Si and the precipitation hardening phases during heat treatment, describing the myriad variables responsible for mechanical properties is quite complex.\n\nFigure 1.\n\nThe mean aluminium consumption in automobiles in Europe [15].\n\nThese alloys are usually produced from secondary alloys and recycling processes. Many of their based alloys contain impurities, while the levels of impurities in the recycled ones are multiplied during recycling process. Alloying elements, such as Mg, Cu and silicon (Si) are deliberately added to Al alloys to enhance their mechanical properties. Apart from the intentionally added elements, impurities such as Fe, Cu, Cr, Manganese (Mn), and transition metals are usually present [14]. Although these impurities are at trace levels in the alloys, they form new phase components called intermetallics that significantly influence the properties of the microstructures. Quite often, these impurities are strong sites for crack initiation that serve as weak points for decohesion failure. However, intermetallics of Al or Si show resistance to corrosion and oxidation due to their adherent surface oxides; intermetallics of light elements are applied in light weight areas due to their attractive low density, which gives rise to highly specific properties.\n\nThe total amount of intermetallics in as-cast alloys is below 5% volume. Despite a few intermetallics in the cast microstructure, the detrimental effects on the ductility and service performance of alloys are huge. Controlling and manipulating the development of the metastable intermetallics during non-equilibrium solidification are of technological interests. This chapter, therefore, centres on the understanding of intermetallics in Al-Si-X alloys, their formation, nature, their effects on mechanical properties and methods of mitigating their adverse influences. There are several published studies on the type of intermetallics in Al-Si-X alloys and their effects as presented in Table 1.\n\nRefAl-AlloyIntermetallicsEffects on mechanical properties\n[16, 17]Al-Fe-Fe is highly soluble in molten Al but low in solid Al (max 0.05 wt.%, 0.025 atm.%)Al3FeIt cracks and reduces formability and fatigue resistance but Improves wear resistance\nAl6FeThe effect of Al6Fe fibres on fatigue properties of Al-Fe alloys is not very clear yet, though is said to be finely dispersed.\n[18, 19, 20, 21, 22]Fe combines with other elements to form intermetallic phase particles of various types\nAl-Si-Feβ-Al5FeSi;Deleterious; stress raiser\nα-Al8Fe2SiLess harmful\nAl-Si-Mg-Feπ-Al8Mg3FeSi6It has negative impact on ductile properties; lower strength and ductility\nAl9FeMg3Si5improved significantly after the T6 heat treatment\nMg2SiDetrimental to the alloys’ ductility\n[23]Al-Mn-FeAl6(Fe,Mn)Significantly deteriorate the mechanical properties of alloy\n(Excess Mn + Al5FeSi)\n(China script)\nNot very harmful but reduces the machinability\n[24, 25]Al-Cu\n(Cu 1–4%)\nθ-Al2CuImprove mechanical properties-they decrease the grain size and increase the fatigue life\n(Cu 1–4%)\n(Q) AI5Cu2Mg8Si6\n\nTable 1.\n\nStudies on the types of intermetallics in al-Si-X alloys and their effects on mechanical properties.\n\n2. Formation processes of intermetallic compounds and their identification\n\nThe equilibrium and non-equilibrium reactions that occur during the casting of Al alloy account for intermetallic phases. Coarse intermetallic particles are formed in the interdendritic regions during solidification or at a relatively high temperature in the solid state during solution treatment, homogenisation, or recrystallization [14]. Most metals, except for Mg and Cu, exhibit a low solid solubility in Al. When the amount of solute element exceeds the limit of solid solubility, an intermediate phase, also called second phase, is developed. The composition of the intermediate phase is in between two pure metals (primary components) and has a varied crystal structure from the primary components. The intermediate phase, with unchanging composition, is called an intermetallic compound. Therefore, intermetallics are products of incomplete solid solubility by alloy systems. Intermetallic compounds identification in Al alloys is critical to complex structure examination. Microstructural examination is one of the primary ways of evaluating the evolution of phases in materials. This evaluation promotes the understanding of the effects of composition, production technique, heat treatments and deformation process on alloys’ mechanical behaviours. Also, it is used to investigate the influences of new fabrication processes and to analyse failure mechanisms and causes.\n\n2.1. Identification of intermetallics\n\n2.1.1. Fe-Intermetallics\n\nThe known intermetallic compounds in aluminium and its alloys are categorised into two systems: binary (Al-Fe and Fe-Si) and ternary systems. The following phases have been reported to exist in Al-Fe binary systems: Al5Fe2, Al3Fe, Al2Fe Al13Fe4 and Al8Fe5 [26, 27, 28]. In the case of a Fe-Si system, the following stable compounds were found: FeSi, Fe2Si, FeSi2, and Fe5Si3 [2930]. Phase equilibria of the binary systems are generally well known. The ternary system is characterised by a large number phases, both metastable and stable. Several review papers on Al-Fe-Si ternary phases have been published [23, 24, 25]. Gosh appraised over 150 research papers on ternary phases that covered unto 1986 [30, 31]. More updates have been provided by other authors [30] and in 2008, Du et al. presented about 24 Al-Si-Fe ternary compounds [32]. A summary of all the significant phases of both binary and ternary systems are presented in Table 2.\n\nBinary systemsDenary systems (Al-Si-Fe)\nAlFe (α2)HT-FeSi2 (Fe2Si5)FeSiAl3FeSiAl3Fe2Si3\nAl8Fe5 (e)Al53-56Fe23.5–24.5Si20.5–22.5aAl57-59Fe24-25Si17-18a\n\nTable 2.\n\nA summary of both binary and ternary systems.\n\nIn a study, the effects of Cu, Fe, Mg, Mn, and Sr. additions on the type of intermetallic compounds formed in Al-Si eutectic alloys were investigated and reported [33]. Many eutectic alloys (SP0, SP1 SP2, SP3, SP4, and SP5) were developed by adding elements Cu, Fe, Mn, Mg and Sr. to A413.1. The chemical compositions of the various alloys produced for the experiment are presented in Table 3.\n\nPhase typeAlloy codeAlSiCuFeCrMnMgSr/ppm*Suggested composition\nMg2S Pi phaseSp30.3337.362.400Mg1.9Si\nQ phasesSp316.5631.619.\n\nTable 3.\n\nAnalysis of chemical composition of intermetallic phases [33].\n\nMicrostructural examination shows the presence of α-Fe Chinese script phases in alloys SP0, SP4 and SP5, with a reasonable amount of Mn, as shown in Figure 2. The morphology of Chinese script of the α-Fe phase arises during solidification of eutectic alongside α-Al. The appearance of α-Fe phase could be polyhedrons if it solidifies before the eutectic reaction occurs [34].\n\nFigure 2.\n\nRefs. [33, 34] shows (a) non-modified PS0 alloy; (b) shows compact SEM image of phase; (c) structure of over modified PS4 alloy –note the presences of Al4SrSi2 particles on top of a-Fe morphology.\n\n2.1.2. α- and β-Fe phases\n\nThe platelet β-AlFeSi particles are found in the Sp1, Sp2 and Sp4 alloys. The β phase is known to be a primary phase, with a three-dimensional form of a platelet that looks like needles in a two-dimensional optical micrograph, as shown in Figure 3. The β-Fe phase chemical composition observed vary within Al9Fe2Si2, Al9FeSi, Al13.6Fe3 Si3.05, Al13.3Fe3Si3.3 and Al13.6Fe3Si3.4 [35]. The phases are generally represented by the chemical formula Al5FeSi, despite the non-inclusion of alloying elements such as Cu, Mn, etc. The α-phase is the second type of the script-like; it has a lower amount of Fe which is between 23.88 and 26.79 wt.%, with Si in the range of 6.87 and 8.38 wt.%. The chemical formula of the phase is Al10.42–11.67Fe2Si1.08–1.25. The second type of the script-like a phase has a lower iron content, between 23.88 and 26.79 wt.%, a silicon content lying between 6.87 and 8.38 wt.%, and a chemical formula of Al10.42–11.67Fe2Si1.08–1.25.\n\nFigure 3.\n\nOptical micrograph of (a) β-Fe phase (needles) in alloy Sp1 and (b) SEM image showing 3-D platelet morphology of β-Fe phase [33].\n\n2.1.3. δ- and pi-phase α- and β-Fe phases\n\nApart from α- and β-AlFeSi phases commonly found in Fe intermetallic compounds, there are other phases that are occasionally found [33]. These phases include δ-Al4FeSi2 and pi-Al8Mg3FeSi6 compounds, shown in the micrographs in Figure 4. The formation of the δ-Al4FeSi2 phase is favoured by high amount of Si in Al-Si eutectic alloys. This phase is considered to be the richest in Si of the Al-Fe-Si phases, and looks like platelet morphology and shows grey level under optical microscope like β-phase [21, 36]. The disparity in the Fe/Si atomic ratio in the examined β-phase particles is most likely the outcome of the partial conversion of the δ-phase to the β-phase via the peritectic decomposition as in the expression [37]:\n\nFigure 4.\n\n(a) β-Al5FeSi transforming into pi-phase in Sp4 alloy; (b) presence of pi-phase and phases of Mg2Si Chinese script in SP3 alloy [33].\n\nLiq. + δ-Al4FeSi2 → β-Al5FeSi + Si.\n\nThe pi-Al8Mg3FeSi6 phase is usually present in the precipitates of an alloy containing relatively high Mg, such as Sp3 and Sp4 in Table 3.\n\n2.2. Mg2Si phase\n\nThe precipitate, Mg2Si, is usually observed to in all Al–Si–Mg alloys, at the edge of pi phase particles. It appears in the form of black Chinese script particles, as shown in Figure 4. The precipitate can also be found at the edge of primary Si and the average chemical analysis of the Mg2Si provided in Table 3.\n\n2.3. Al2Cu and Q-phases\n\nCopper concentration increases with the solid fraction and segregates to the liquid during solidification. Al–Al2Cu is formed to the end of solidification. A study has suggested that addition of alloying elements, such as Mg and Sr phase, does not alter the stability of the Al2Cu [33]. During final solidification, the Q-phase, Q-Al5Mg8Si6Cu2, grows out from Al2Cu particles. The EDX spectrum in Figure 5, shown that Q-phase has a reflection of elements, such as Al, Cu, Si and Mg, in the alloy.\n\nFigure 5.\n\n(a) Q-phase growing out of Al2Cu phase; (b) energy dispersive spectroscopy corresponding to Q phase in (a) [33].\n\nSecondary alloys were prepared from recycling of cast Al alloys scrap of AlSi9Cu3, AlSi12Cu1Fe and AlSi8Zn10Mg were investigated for intermetallic compounds [38]. The chemical compositions of the recycled alloys are presented in Table 4.\n\nMaterials elementsAlSi9Cu3AlSi12Cu1FeAlSi8Zn10Mg\n\nTable 4.\n\nChemical composition of the recycled of cast al alloys scrap (wt.%).\n\nThe intermetallics found in recycled cast alloys, AlSi12Cu1Fe, AlSi8Zn10Mg and AlSi9Cu3, are presented Figures 6 and 7.\n\nFigure 6.\n\nIntermetallic phases in the microstructures of recycled al-Si-X cast alloys [38] (a–c) intermetallics in AlSi8Zn10Mg cast alloy; (e–h) intermetallics in AlSi12Cu1Fe cast alloy; (d & i) microstructures of secondary AlSi8Zn10Mg and AlSi12Cu1Fe alloys respectively.\n\nFigure 7.\n\nIntermetallic compounds in recycled AlSi9Cu3 cast alloy.\n\n3. Effect of intermetallic on mechanical and physical properties of al-Si alloys\n\nThe presence of intermetallic compounds in Al alloys is of a great concern to materials engineers due to their harmful effects on mechanical properties. Mechanical properties of Al-Si-X alloys are greatly affected by the structures of the intermetallic. Intermetallics compounds appear more in recycled Al-Si based alloys, however, cycling which is a secondary production process of Al and its alloys is cheaper than primary production process. Therefore, producing Al alloys devoid of deleterious intermetallic phases will positively affect Al and its alloys recycle market and decrease the use of primary method that requires high fabrication power consumption.\n\nThe β-phase platelets are usually potential sites for crack initiation, where eventual breakup failure occurs. Iron-based intermetallics dominate Al-Si-X alloys’ intermetallics studies. Commercially available alloys contain Fe impurities in the form of Al and Si and other elements phases. In conductive liquids, the presence of certain Fe-phases, Al3Fe and α-AlFeSi, on the surface stimulates pitting attacks on the surface because α-AlFeSi is cathodic in the Al matrix. The greatest disadvantage of intermetallics is their low ductility, especially at low and transitional temperatures. This has been attributed to several factors, such as [39]:\n\n 1. A restricted number of simple deformation modes to suit the von Mises criterion,\n\n 2. Dislocations operation with large slip vectors\n\n 3. Restricted cross-slip\n\n 4. Transmitting slip across grain boundaries complexity\n\n 5. Inherent grain boundary weakness\n\n 6. Isolation of harmful solutes to grain boundaries\n\n 7. High Peierls-Nabarro stress and covalent bonding\n\n 8. Environmental vulnerability.\n\n3.1. Fe intermetallics\n\nThe presence of the dispersed brittle intermetallic ß-Al5FeSi phase in the structure is one of the primary barriers that impede the bendability of Al-Si based alloy sheet and consequently, poor mechanical formability. During sheet bending and forming processes, these particles create damage and premature failure. Intermetallic, ß-Al5FeSi, forms thin brittle platelets that cause weak bond strengths within the matrix of α-Al, thus initiating crack sites around the structure. This deleterious behaviour is especially severe in sheets produced by strip casting, a cost-effective fabrication method, which should be economically suitable for automotive Al alloys production [40]. In Al-Si based casting, Fe is the most common deleterious impurity element and forms the intermetallic compound ß-Al5FeSi when levels of Fe in an alloy exceed critical percentage. Solid solubility of Fe in Al is very low and consequently combines with other impurities or alloying elements to form intermetallic compounds. The type of compound formed depends on the other available impurities. An optical micrograph of the Al-Si-1.8Fe-0.8Mn microstructure is shown in Figure 8.\n\nFigure 8.\n\nOptical micrograph of al-Si-1.8Fe-0.8Mn microstructure [41].\n\nHowever, Fe is required in pressure die casting to prevent liquid metal from soldering to the die [42, 43]. For optimal thermal performance, Fe is desirable for Al-Si alloys to maintain stable mechanical properties at high temperatures. The Al alloys formed by Cu and Mg addition, are known for high strength due to precipitation hardening. These alloys, however, lose their strength at elevated temperatures because of unstable precipitates formed by Cu and Mg. Addition of Fe to alloys makes them stable at high temperatures compared to alloys with Cu and Mg addition. Transition elements such as Fe, upon addition to Al alloys, yield thermally stable intermetallics. The composition of eutectic Al-Si-Fe alloy is about 0.8 wt.% Fe. The liquid metal does not show affinity of dissolution with the steel mould, once the iron content is at approximately this level. The desirable Fe content in alloys in most Al pressure die casters is in the range of 0.8–1.1 wt.% Fe.\n\nThe class of wrought Al alloys, 6xxx series, is known for good corrosion resistance and high strength to density ratio. These alloys are good substitutes for steel in the manufacturing of automobile body panels. Apart from their principal compositional elements, Al, Mg, and Si, 6xxx alloys also possess Fe, Cu, Mn, and Cr, which sometimes are not deliberately added. The presence of these elements, especially Fe, promotes the development of different brittle iron-containing intermetallic compounds [44]. These Fe intermetallics cause poor formability and consequently, stimulate premature failure and damage during bending and forming operations. This drawback limits the application of 6xxx alloys in both automotive and aerospace industries [40, 45, 46].\n\n3.2. Other Fe-phases\n\nOther phases that have a detrimental influence on the alloy properties are Al3Fe and α-AlFeSi, which is cathodic to the α-Al matrix. Their presence on the surface accelerates pitting attacks in conductive liquids. Subsequently, these affect the mechanical property of the alloy by decreasing its ductility and resulting in de-cohesion failure. Equally, the platelets and needles of β-phase intermetallic, may adversely affect the alloy’s castability, fluidity, and dendrites channel feeding, which results in cast defects. The different intermetallic phases in Al-Si eutectic alloys depend on the composition of the alloys. However, the phases in the microstructure with Cu and Mg, β-Al–Fe–Si–X and Sr, which are usually called Chinese script phases, are most studied. Virtually in all the alloys microstructures, α-AlFeSiCuMg phases with the Chinese script morphology are the dominant Fe intermetallic phases [47]. The composition of the alloy affects the morphology and location of intermetallic phases in α-Al or in the interdendritic regions.\n\n3.3. Manganese, Mn\n\nOften, Mn is found in secondary metal made from recycled wrought product and is usually not deliberately added to virgin cast alloys. Manganese can transform iron-rich (Al5FeSi) phases morphology of Al-Si-X alloy from platelets to a more cubic or globules (Al15(MnFe)3Si2) and this improves the alloy’s ductility and tensile strength. Figure 9 shows micrographs of Al-Si-X structure with (a) iron-rich Al5FeSi phase; and (b) Cubic Al15(MnFe)3Si2 form.\n\nFigure 9.\n\n(a) Formation of a thick polyhedral α-Al15(Fe,Mn)3Si2 phase in the microstructure of the Al9Si0.8Fe alloy containing 0.7 wt.% of Mn; (b) micrograph of the Al9Si0.8Fe alloy containing 0.7 wt.% of Mn showing the presence of the β-Al5FeSi particles [2].\n\nIt is recommended that Mn should be over 50% of Fe when the amount of Fe exceeds 0.45 wt.%. Manganese (Mn) is more influential in causing gravity segregation than Fe. Application of Mn concentration that exceeds 0.6 wt.% causes segregation whether the Fe content is 0.8 or 2.3 wt.% [48]. Further, Mondolfo [21] reported that Mn marginally improves strength at the expense of ductility, while Kashyap et al. [49] indicate that presence of Mn weakens the strength of Al-7Si-Mg alloy.\n\nSeveral literatures have indicated that Mn enhances yield strength and ultimate tensile strength of wrought Al-Si alloys [50, 51]. Formation of fine dispersoids of about 0.03–0.3 μm by the addition of Zr, Cr and Mn to commercial aluminium alloys was reported in these studies. Dispersoids significantly affect alloy’s fracture toughness, strength, grain structures and recrystallization characteristics. Investigation has revealed that commercial 6000, 7000 and 8000 series aluminium alloys are improved by the addition of manganese with it ductility retailed [52].\n\n4. Processes to eliminate or ameliorate intermetallic deleterious effects\n\nMany studies have reported various approaches and techniques in improving the mechanical properties of Fe-bearing intermetallics by the application of modification principle. Rapid solidification process increases the solubility fields and alters the morphology and size of microstructural elements but does not eliminate intermetallics. Das et al. demonstrated the effect of rapid cooling on alloy by processing Rheocast A380 alloy, using cooling slope (CS) technique to generate semisolid slurry from the superheated alloy melt [53]. The study observed finer, near spherical grains within the cooling slope fabricated slurry and in the solidified castings. This structure is different from the dendritic grains bounded by large eutectic phase within the conventionally cast A380 alloy. However, the most harmful intermetallic phase, β-Al5FeSi (monoclinic), was found to be present, accounting for the alloy’s low ductility and consequent poor mechanical formability [54].\n\nThe Al–Si–Cu ternary system alloy, A380, has minute fractions of Fe, Mg, Mn, Ni and Zn. These impurity elements interact to form intermetallic compounds near the grain boundary and occasionally in the parent matrix. The expected intermetallics phases in A380 alloy are α-phase, β-phase (Al5FeSi), and (Al15(Fe,Mn)3Si2). β-phase morphology is platelet-like (needle-like) appearance and serves as a stress-raiser in the matrix, while α-Phase morphology is like polyhedral crystals and sometimes like Chinese script. The detrimental effects of intermetallic need to be removed or reduced; some of the techniques that are exploited include thermal treatment, chemical solutions and microstructural control by co-injecting inoculated intermetallic particles [54, 55, 56].\n\nThermal treatment—Heat treatment is a normal alternative to be considered. However, the dissolved phase possibly precipitated by thermal homogenisation process during artificial or natural ageing. This is not very effective because thermodynamically, stable phases are not influenced by heat treatment.\n\nChemical solutions—Conventional metallurgical chemical processes are used to eliminate the deleterious effects of Fe in Al alloys by limiting the amount of Fe to prevent the formation of Al-Fe-Si compounds.\n\nMicrostructural control—Co-injecting inoculated intermetallic particles is used to manipulate the microstructure. The particles, which vaporised during spray-forming, act as a substrate for heterogeneous nucleation, promoting nucleation and grow into the cubic. This principle involves the alteration of the type, size, morphology and the dispersion of the intermetallics in these alloys. Hosseinifar and Malakhov reported that the addition of 0.2% wt lanthanum (La) decreased the fraction of deleterious plate-like β-AlFeSi phase and increased the amount of a lesser harmful, α-AlFeSi phase [57]. It was explained that La covers the surface of the Chinese script particles (α-AlFeSi), a behaviour inferred to be like that of Strontium (Sr) addition. SEM images of Chinese script-shaped intermetallic compounds and the morphology of the β-AlFeSi phase are shown in Figure 10.\n\nFigure 10.\n\nSEM images showing the (a) presence of the Chinese script-shaped intermetallic compounds [58]; (b) morphology of the b-AlFeSi phase [57].\n\nThe addition of a sufficient amount of Mn to Fe-rich intermetallics can defuse its brittleness and alter the platelet morphology to a less deleterious intermetallic compound [43, 59]. However, the addition of Mn to a melt containing Fe leads to another problem, as this increases the volume fraction of intermetallics and the mean diameter size of Fe solute. This development deteriorates the alloy’s mechanical properties [60]. Table 5 shows examples of intermetallics and their corresponding ductility improving alloying elements.\n\nAlloying element for ductilityLanthanum (La)Boron (B)Manganese (Mn)Niobium (Nb)\n\nTable 5.\n\nIntermetallics with ductility improving alloying elements [39].\n\nThe thixoforming process has been described as an effective technique to modify the morphology of the primary phases. Gencalp and Saklakoglu used this method to improve the formability property of A390 alloy with excess levels of Fe and Mn [58]. The intermetallic compounds observed in A380 fabricated by thixoforming are α-Al15Si2(Fe,Mn)3 with polyhedral morphology, different from the Chinese script morphology observed in the traditional gravity casting. Also, in A380 alloy by thixoforming, the very harmful β-Al5FeSi particle morphology was small-plate and θ-Al2Cu phase in the form of particle. These phases, Al5FeSi and θ-Al2Cu phase morphology are needle-like and thin plate respectively in gravity casting. SEM images of the varied intermetallics between thixoforming and gravity casting are shown in Figure 11. The A380 by thixoforming alloys had better mechanical properties compared to A380 by traditional gravity casting method.\n\nFigure 11.\n\nSEM images of (a) β-Al5FeSi needle-like intermetallics present in the gravity casting (b) particle small plate intermetallics, β-Al5FeSi found in thixoforming (c) α-Al15Si2(Fe,Mn)3 with polyhedral morphology found in thixoforming [58].\n\nThe solidification paths of 6xxx series Al alloys with and without La were established using careful calorimetric and microstructural investigations. Studies have shown that the addition of Sr. to Al-Si-Fe alloys prevents the formation β-phase intermetallic but promotes the production of a less harmful phase, α-AlFeSi, in as-cast alloys [48, 61]. Adding Sr to Al alloys under a fast cooling is an effective way of altering the amount, size and morphology of needle-like of Al5FeSi intermetallic compound. Chinese script or sludge are not formed in Al alloy without Mn. Addition of the combination of Fe and Mn at a high cooling rate was reported to be the most efficient technique of modifying intermetallic compounds [61]. SEM images in Figure 12 show the Sr. unmodified and modified microstructure of Al-6.5Si-3.5Cu-1.0Fe (in mass %) alloy.\n\nFigure 12.\n\nSEM images show the effect of adding Sr. on the microstructure of Al-6.5Si-3.5Cu-1.0Fe cast alloys (a) Sr. without; (b) with about 0.015% mass Sr [61].\n\nApart from Sr., the less expensive rare-earth metal, lanthanum (La), was found to decrease the fraction of plate-like β-AlFeSi particles and increase the fraction of α-AlFeSi particles with Chinese script morphology.\n\n5. Conclusion\n\nThe influences of ternary alloying elements (Fe, Cu, Mn, and Mg) additions to Al-Si alloys (binary alloys) were discussed in this paper. The chapter observed that:\n\n 1. The equilibrium and non-equilibrium reactions that occur during the casting of Al alloy account for intermetallic phases.\n\n 2. Primary alloying elements are not completely soluble in the α-Al matrix and sometimes combine with impurities and matrix to form intermediate (intermetallics) phases.\n\n 3. Intermetallics are products of incomplete solid solubility by alloy systems.\n\n 4. Fe-based intermetallics are the most common. Fe-phases can be grouped into α- phase, β-phases, Pi-phase, and δ- phase, with α- and β-phases the most common. The most harmful intermetallics in Al-Si-Fe alloys is β-phase (β-Al5SiFe).\n\n 5. Iron is deliberately added to the alloy to prevent soldering in die casting mould.\n\n 6. Addition of Mn and Sr reduces the negative effect of β-phase of Fe intermetallics by improving the ductility. However, the addition of Mn weakens the strength of Al-7Si-Mg alloy.\n\n\n\nHow to cite and reference\n\nLink to this chapter Copy to clipboard\n\nCite this chapter Copy to clipboard\n\nWilliams S. Ebhota and Tien-Chien Jen (May 30th 2018). Intermetallics Formation and Their Effect on Mechanical Properties of Al-Si-X Alloys, Intermetallic Compounds - Formation and Applications, Mahmood Aliofkhazraei, IntechOpen, DOI: 10.5772/intechopen.73188. Available from:\n\nchapter statistics\n\n428total chapter downloads\n\nMore statistics for editors and authors\n\n\nAccess personal reporting\n\nRelated Content\n\nThis Book\n\nNext chapter\n\nIntermetallic Bonding for High-Temperature Microelectronics and Microsystems: Solid-Liquid Interdiffusion Bonding\n\nBy Knut E. Aasmundtveit, Thi-Thuy Luu, Hoang-Vu Nguyen, Andreas Larsson and Torleif A. Tollefsen\n\nRelated Book\n\nFirst chapter\n\nNanostructure of Materials and Corrosion Resistance\n\nBy A. A. El-Meligi\n\n\nMore About Us", "pred_label": "__label__1", "pred_score_pos": 0.7950081825256348} {"content": "cyber security\n\nWhat Is Zero Trust Architecture?\n\nby Josh Biggs in Tech on 26th November 2019\n\nWhen you’re thinking about network security, confidentiality isn’t all there is to think about. It’s complex, and you also have to think about service availability and performance and the comparison of options like DNS over HTTPS.\n\nA term increasingly being used with network security and cybersecurity, in general, is called Zero Trust. architecture. If it’s not a term you’re familiar with, the following are things to know about the Zero Trust model.\n\nFirst, The Basics\n\nTo start, what are the basics of Zero Trust architecture? Zero Trust is an initiative that has become a major buzzword in cybersecurity, but that can create misunderstandings as to what it is and what it’s not.\n\nZero Trust architecture is a means of preventing data breaches because it takes away the trust concept from your network architecture altogether.\n\nZero Trust uses different components to protect modern environments. These components can include network segmentation, the prevention of lateral movement, and simplified user-access control.\n\nThe creator of Zero Trust is John Kindervag, who served as vice president and principal analyst for Forrester Research.\n\nDuring his time in that role, he realized that with traditional security models, there is the assumption that anything within a network should be trusted.\n\nThe underlying assumption in even simpler terms is that someone on the network doesn’t have a compromised identity. It also works under the belief that all users can be trusted and behave responsibly.\n\nThe Zero Trust model takes away that assumption of trust, as is implied by the name.\n\nIt’s estimated that around 80% of all data breaches are due to the abuse or misuse of privileged credentials.\n\nIf you were to shrink it all down to a digestible takeaway, Zero Trust is a security concept that’s build on the premise you shouldn’t automatically trust anything inside or outside perimeters. Everything has to be verified before access is made available.\n\nThere’s no access to machines or IP addresses until they’re known and authorized.\n\nThe Zero Trust framework is offered in contrast to the castle-and-moat approach, which is the traditional type of cybersecurity many networks utilize. With the castle-and-moat security framework, it’s challenging to gain access to the network if you’re on the outside, but if you’re on the inside, you have inherent trust.\n\nThe big, glaring problem with the castle-and-moat security approach is that once someone gains access to the network, they can essentially do whatever they want.\n\nAlong with this big problem, the castle-and-moat approach also fails to take into consideration the needs of modern organizations, which have data in multiple locations.\n\nThe implementation of Zero Trust security methodologies has been shown to reduce data breaches, and it’s quickly catching on among many diverse organizations.\n\nWhat is the Technology On Which Zero Trust is Built?\n\nThe Zero Trust approach uses existing technology and processes.\n\nEnterprises have to take advantage of micro-segmentation and what is described by CSO as “granular perimeter enforcement,” based on users, locations, and other relevant data. Then, there is a determination as to whether or not to trust an application, machine or user trying to access the network.\n\nTo start, most of the time there is an identification of a protected surface, which are the most critical elements of a network, such as certain data and assets.\n\nThe protected surface is much smaller than the general attack surface.\n\nThen, once you’ve identified that, you can start looking at how traffic flows otherwise. You can get more of an understanding of who users are, what applications these users are accessing and how they’re connecting.\n\nOnce all of these things are identified and understood, it’s possible to create a perimeter around that surface that moves with it.\n\nThere aren’t any products you can buy that are going to give you Zero Trust on their own, although certain platforms may work better in this architecture than others. Instead, it’s more about following a set of processes and then finding the products that will work within that process.\n\nYou will need an advanced firewall with encryption to put Zero Trust into place, and visibility is one of the most important aspects of this architecture. You will need to integrate two-factor authentication and other methods of verification, as well.\n\nZero Trust Is Dynamic\n\nZero Trust is constantly evolving and changing, which is so important in modern cybersecurity practices.\n\nZero Trust has to work across the entirety of your environment, and there is ongoing control and enforcement even when users are accessing applications remotely.\n\nCategories: Tech", "pred_label": "__label__1", "pred_score_pos": 0.8473412990570068} {"content": "Give your voice maximum strength\n\nVimbee is your direct wire to effectively communicate with companies and other users. On an advertisement-free platform where you can find fast and efficiently and compare transparently what you're really looking for. Share your opinion independently of language with global outreach and profit from all of your activities.\n\nTransparent & Authentic Results\n\nClear information assures certainty about the true quality.\n\nBe Powerful with Vimbee\n\nObtaining and Achieving more in the long term through high interference\n\nSearch specifically, find fast and intelligently\n\nWhether products, services, gastronomy, politics, entertainment, sport, infrastructures and many more. On Vimbee you get detailed results depending on your interests and you always find the best and cheapest providers. Based on real recommendations, locally, trans-regionally or globally.\n\nTrust and security through a strong community\n\nThrough the community engagement Vimbee reflects the current opinion language-independently and compactly at a glance. Wherever and whatever you're looking for. This way you always get a straight comparison based on detailed empirical values for more safety and confidence.\n\nHigh influence through sustainable communication\n\nWith your opinion you can reach many other users all over the world and support them in their daily life. Furthermore your feedback and your behaviour reaches the right companies and organisations so that your voice has a sustainable influence on development improvement and innovation.\n\nProfit through your engagement\n\nYou can sustainably create an extensive shift in many economical fields and in your own surroundings to personally profit through your activities. Additionally, you are rewarded with exclusive discounts and deals when you share your opinion, recommend or expand Vimbee.\n\nDiscover new correlations\n\nVimbee connects all thinkable industries and topics by means of their actual relations in the real world and the community. You can always follow these connections in the platform structure and discover something new and interesting from other related areas for yourself.\n\nWith Responsibility Towards Improvement\n\nThe wide-reaching inclusion of democratic positions creates positive change\n\nActively Shaping the Future\n\nBe a part of imminent improvement processes\n\nSupporting Innovations\n\nVimbee contributes through your engagement and your opinion to a more transparent and representative implementation of market research.\n\nInfluencing Decisions\n\nYou can have more influence on the development of products or services and on decisions in your local and global surrounding.\n\nComprehensible Data Handling\n\nThe generated data is anonymous without any personal content as it is only used for statistical purposes instead of personalised advertisement.\n\nWin with Vimbee\n\nConscientious Culture for Consistent Reliability\n\nVimbee stands for efficient and clear communication and the responsible and sustainable handling of global resources.\n\nYou will be as much value to others as you have been to yourself\n\nMarcus Tullius Cicero\n\n(106-43 BC, Roman Philosopher, Statesman and political Theoretician)\n\nUnambiguous honesty, transparency and a positive orientation are the top priority at Vimbee and will continuously realised in all fields of business through a respectful and sustainable path of steady improvement. Here you can find further information about the corporate culture of Vimbee.\n\nMade with passion in Vimbee Colonge Dom Valley Cologne Valley", "pred_label": "__label__1", "pred_score_pos": 0.9768190383911133} {"content": "Vision & Mission\n\nSTEM is an acronym for Science, Technology, Engineering, and Mathematics and usually refers to education in one or more of those disciplines. STEM initiatives started as a way to promote education in these related areas so that students would be prepared to study STEM fields in college and pursue STEM-related careers.\n\n\nTo provide a challenging learning environment in Science, Technology, Engineering, and Math, which maximizes individual potential and ensures students are well-equipped to meet the challenges in the world around them.\n\n\nTo provide competent students with high learning experience, through rigorous and relevant content, that mainly focuses on hands on activity in science, technology, engineering and mathematics laboratories, to be productive and successful citizens by developing a strong work ethic and the higher-level critical thinking skills needed to solve problems in the real world.\n\nBahir Dar STEM Incubation Center Goals and Objectives\n\n\n·      To increase student interest in STEM areas.\n\n·      To increase student achievement among all students in order to prepare graduates to be civically and college and/or career ready.\n\n·      To produce critical thinkers, innovators and problem-solvers.\n\n·      To connect classroom lessons to real-world problems.\n\n·      To increase the number of teachers prepared and delivering integrated STEM education.\n\n·       To foster cross-sector partnerships that provide informal learning opportunities\n\n\n·      Training and project advising for talented students.\n\n·      Organizing and supporting a variety of school clubs.\n\n·      Provision of laboratory based education for school students.\n\n·      Provision of short term training for school teachers.\n\n·      School based technology park establishment.\n\n·      School-University-Industry linkage establishment.\n\n·      Assessment and standardization of school education.\n\n·      Incubating school students’ project work and creativity.\n\n·      Administration of various extracurricular activities to students such as science fairs or Olympiads, aptitude tests and other competitions.\n\n·      Summer Outreach program training.\n\n·      Provision of media based education to community.", "pred_label": "__label__1", "pred_score_pos": 1.0000100135803223} {"content": "High Performance Key Factors\n\nHigh Performance Organizations\n\nWhat exactly is a High Performing Organization and how do I know if we quality?\n\nWe have tried many different improvement techniques, but nothing has really made a lasting difference in our results.\n\n\nHPOs carefully define their work processes and continuously improve them. They recognize that all work tasks are part of a process and all processes are designed to fulfill the core needs of the customers. HPOs continuously improve their processes through closer customer connections and by working with each supplier, for innovation, safety, product development.\n\n\nAll processes are part of larger systems or networks of organizational units, resources, and information. The governing principle of a system is that each of its elements must fit into the overall order of things. A system that maintains order will survive all manner of disturbances or change. When the order breaks down, the system falls apart and dies.\n\n\nHPOs are produced by High Performing People. These associates must possess the critical competencies to deliver the strategy. They must be (like their leaders) also be open to change based on external changes, new opportunities, and continuous improvement ideas.\n\nValue-Driven Purpose\n\nLeaders define a distinctive business strategy, core operating values, and clear expectations to chart the course at each milestone of the journey. Their purpose includes critical needs of their most important stakeholders.\n\n\n\nLeadership Value-driven Purpose People Processes Systems High Performance Culture", "pred_label": "__label__1", "pred_score_pos": 0.9904428720474243} {"content": "<<= Back Next =>>\nYou Are On Multi Choice Question Bank SET 1155\n\n57751. A twisted ring counter consisting of 4 FF will have\n\n57752. Assertion (A): In a serial in-serial out shift register, access is available only to the left most or right most flip flops Reason (R): If the output of a shift register is feedback to serial input it can be used as a ring counter.\n\n57753. IC counters are\n\n57754. 2's complement representation of a 16 bit number (one sign bit and 15 magnitude bits) is FFFF. Its magnitude in decimal representation is\n\n57755. The method used to transfer data from I/O units to memory by suspending the memory-CPU data transfer for one memory cycle is called\n\n57756. Out of SAM and RAM\n\n57757. Which of the following will produce a value of 22 if x=9?\n\n57758. For K map of the given figure the simplified Boolean expression is\n\n57759. Choose the appropriate turn on and turn off time of a FET\n\n57760. Consider the following statements ECL has least propagation delayTTL has largest fan outCMOS has highest noise marginTTL has lowest power dissipation Which of these are correct?\n\n57761. In Schottky TTL, a Schottky diode is used for\n\n57762. The circuit of the given figure is\n\n57763. Which of the following ICs has only one NAND gate?\n\n57764. A mod-10 counter can divide the clock frequency by a factor of\n\n57765. In a digital circuit, a clock is a\n\n57766. In a RS flip-flop no change occurs during\n\n57767. Out of multiplexer and demultiplexer, which can be used as a logic function generator?\n\n57768. Binary 1000 will be the result of which of the following?\n\n57769. In a programmable counter\n\n57770. NAND gates can be used to produce edge triggering.\n\n57771. The number of comparator circuits required to build a three-bit simultaneous A/D converter is\n\n57772. -8 is equal to signed binary number\n\n57773. Assume that only x and y logic inputs are available. What is the minimum number of 2-input NAND gates required to implement x ⊕ y?\n\n57774. The decimal equivalent of the hexadecimal number E 5 is\n\n57775. The parity bit is\n\n57776. In 2's complement representation, a certain negative number - N is 1011. The representation for + N is\n\n57777. In 8355, the ROM is organized as __________ words of 8 bits each.\n\n57778. What binary number does second row represent?\n\n57779. In C-language f- = 9 is equivalent to\n\n57780. Effective address is calculated by adding or subtracting displacement value to\n\n57781. Typical switching time for ECL is\n\n57782. Which is the legal ways to access a class data member using the pointer?\n\n57783. For a logic family VOH is the minimum output high level voltage VOL is the maximum output low level voltageVIH is the minimum acceptable input high level voltageVIL is the maximum acceptable input low level voltage The correct relationship is\n\n57784. In which function is each term known as minterm?\n\n57785. How many and what are the machine cycles needed for execution of MOV D, C?\n\n57786. The output data lines of microprocessor and memories are usually tristated because\n\n57787. In the NMOS inverter\n\n57788. A counter displays a sequence of numbers. If a reading corresponds to the hexadecimal number F52E, the next two readings are respectively\n\n57789. Monostable multivibrator is called one-shot or single-shot circuit because it\n\n57790. 10's complement of 1610 is\n\n57791. The hexadecimal number 64 AC is equivalent to decimal number\n\n57792. A binary with a digits, all of which are unity has the value\n\n57793. In a NAND SR latch S = R = 1. Then\n\n57794. A microprocessor with a 16-bit address bus is used in a linear memory selection configuration (i.e., Address bus lines are directly used as chip selects of memory chips) with 4 memory chips. The maximum addressable memory space is\n\n57795. The logic represented by the abbreviation ECL is\n\n57796. A (A + B) =\n\n57797. Unlimited number of ICs 7490, 78492 and 7493 are available. Which of these could be used to build the dividse-by-60 circuit of figure\n\n57798. One of the function of the Sio2 layer in an IC is to\n\n57799. In a shift register the data is loaded in one operation but shifted out one bit at a time, The shift register is\n\n57800. In CCD\n\n<<= Back Next =>>\nDMCA.com Protection Status Powered By:Omega Web Solutions", "pred_label": "__label__1", "pred_score_pos": 0.9139730930328369} {"content": "Chrome Updates Experimental Wake Lock API Support\n\nMMS Founder\nMMS Dylan Schiemann\n\nArticle originally posted on InfoQ. Visit InfoQ\n\nThe Wake Lock API prevents some aspect of a device from entering a power-saving state, a feature currently only available to native applications. Chrome 79 Beta updates its experimental support for this feature, adding promises and wake lock types.\n\nUnder development since 2015, the Wake Lock API is one of many APIs that strives to give web app developers feature parity with native applications. Most mobile devices quickly sleep when idle to prevent apps from draining a device’s battery. This behavior is generally preferred, but some applications need to keep the device or screen awake to be useful. Use cases include using web apps as audio tours, recipe applications, boarding passes, kiosks, and presentations.\n\nThe newest update to the Wake Lock API proposal expands the scope beyond keeping the screen on and resolves potential issues with security and privacy.\n\nTo use the Wake Lock API, developers need to enable the #enable-experimental-web-platform-features flag in chrome://flags. To see the Wake Lock API in action, enable the feature in Chrome and visit the Wake Lock Demo and view the Wake Lock Demo source code.\n\nThe Wake Lock API offers two wake lock types, screen, and system. While somewhat independent, a screen wake lock necessitates that the app continues running. As implied by their names, the screen wake lock prevents the screen from sleeping, whereas the system wake lock prevents the CPU from entering standby mode.\n\nThe Wake Lock API was recently updated to support promises and async functions. The WakeLock API is sensitive to page visibility and full-screen mode, and the Wake Lock API provides visibilitychange and fullscreenchange events to help developers offer a seamless experience.\n\nDevelopers are encouraged to consider whether their application requires the Wake Lock API when options that are less performance-intensive exist for certain use cases. For example, an appl with long-running downloads should instead use background fetch, and applications synchronizing data from an external server should instead use background sync.\n\nThe Wake Lock API team is looking for feedback. Contributions are welcome via the Web Lock GitHub repo and should follow the W3C contribution guidelines.\n\nSubscribe for MMS Newsletter\n\n", "pred_label": "__label__1", "pred_score_pos": 0.9983376860618591} {"content": "Surrounding-Aware Correlation Filter for UAV Tracking with Selective Spatial Regularization\n\n\nThe great advance of visual object tracking has provided unmanned aerial vehicle (UAV) with intriguing capability for various practical applications. With promising performance and efficiency, discriminative correlation filter-based trackers have drawn great attention and undergone remarkable progress. However, background interference and boundary effect remain two thorny problems. In this paper, a surrounding-aware tracker with selective spatial regularization (SASR) is presented. SASR tracker extracts surrounding samples according to the size and shape of the object in order to utilize context and maintain the integrality of the object. Additionally, a selective spatial regularizer is introduced to address boundary effect. Central coefficients in the filter are evenly regularized to preserve valid information from the object. While the others are penalized according to their spatial location. Under the framework of SASR tracker, surrounding information and selective spatial regularization prove to be complementary to each other, which actually did not draw much attention before. They managed to improve not only the robustness against various distractions in the surrounding but also the flexibility to catch up with frequent appearance change of the object. Qualitative evaluation and quantitative experiments on challenging UAV tracking sequences have shown that SASR tracker has performed favorably against 23 state-of-the-art trackers.\n\nSignal Processing, pp.1-17 2019. (JCR Q2, IF = 4.086)\n\nSASR_workflow Fig. 1 Main workflow of the proposed SASR tracker.\n\nChanghong Fu\nAssistant Professor", "pred_label": "__label__1", "pred_score_pos": 0.9994557499885559} {"content": "US dollarSigns of stabilization in the Chinese economy, in the wake of a surprise upturn in the world’s second-largest economy’s manufacturing sector activity, overshadowed the negative US-China trade reports and mixed Australian data. Therefore, the market mood remained lifted on Monday, having boosted the higher-yielding assets at the expense of the safe-havens such as Yen, Gold etc.\nThe Yen dropped to six-month lows against the US dollar at 109.72, tracking the gains in the US equity futures, Asian equities and the US Treasury yields. EUR/USD held steady above the 1.10 handle while GBP/USD slipped towards the 1.29 handle on narrowing Conservatives’ lead over Labour Party and broad US dollar recovery.\nMarkets gear up for a busy start to a new week and month as well, with the final readings of the Euro area and the UK Manufacturing PMI to dominate the EUR calendar ahead of the European Central Bank (ECB) President Lagarde’s testimony before the European parliament at 14:00 GMT. Markets will closely hear her testimony on the monetary policy and economy for fresh EUR trades.\nIn the NA session, the US Manufacturing PMI data from both Markit and ISM will headline alongside the Canadian Markit Manufacturing PMI report. Apart from the data, the US-China trade-related developments and risk trends will continue to play a pivotal role in Monday’s trading.\nOil prices are correcting Friday’s supply, with US WTI moving higher on positive weekend Chinese data, popping around 1.4% and rising from a low of $55.22 to a high of $55.98. On Friday, WTI was taken down heavily from the $58 handle to a low of $55.01 while investors withdrew the likelihood of a production-cut extension at this week’s OPEC + meeting.\nGold is flashing red, as stocks are gaining ground, possibly on the back of upbeat China data. At press time, the anti-risk yellow metal is trading at session lows near $1,460, representing a 0.28% decline on the day. The upbeat data is likely pushing the anti-risk gold lower.", "pred_label": "__label__1", "pred_score_pos": 0.9467039704322815} {"content": "Bücher liefern wir in Deutschland versandkostenfrei\n\nAntiplatelet and Anticoagulation Therapy\n\nLieferzeit ca. 5 Werktage\n\n\n\nAspirin has been in clinical use for over 100 years, making it one of the oldest commonly used drugs in medicine, and is now predominantly used as an antiplatelet agent. Major new antiplatelet drug classes have recently become available for the clinician that offer the promise of major improvements in the treatment and prevention of arterial thrombotic disease. In the field of anticoagulation, the vitamin K antagonists such as warfarin have not been available for as long as aspirin in the antiplatelet field, and have also had very little in the way of competition until recently; although a number of parenteral anticoagulants have been available, the vitamin K antagonists have been the only orally active anticoagulant drugs. The last few years have seen the arrival of new drug classes, the orally active direct thrombin inhibitors and factor Xa antagonists, which offer a number of advantages, but not without important drawbacks.\n\nIn the face of these important advances in both antiplatelet and anticoagulant therapy, clinicians often feel confused, even overwhelmed, as to what is now available and which drugs are useful (and indicated) in which circumstances. Antiplatelet and Anticoagulant Therapy is designed with such people in mind. It is written in an easy-to-follow format and with many illustrations to aid clarity and the assimilation of information. Each chapter is written by established authorities in their fields who are also experienced in explaining often complex concepts. The result is a unique book which is not only comprehensive but also clear and useful for the busy medical practitioner.\n\n\n\nDMW. Zeit gut investiert.\n\nNeueste medizinische Erkenntnisse, aktuelles Fachwissen und praxisorientierte Fortbildung.\n\nJetzt testen\nKardiologie up2date\n\nFortbildung mit dem roten Faden\n\nJetzt ist Zeit für die up2date. Genau das, was Sie in der Praxis brauchen: Fortbildungsbeiträge aus allen Bereichen der Kardiologie.\n\nJetzt testen\n\nAndere Kunden interessierten sich auch für\n\nZurück zum Seitenanfang", "pred_label": "__label__1", "pred_score_pos": 0.5066049098968506} {"content": "Tu Mera Hero\n\nSurekha informs Titu about Govindnarayan being aware of his deed and asks him to not come home for a few days. Mathuradas hands over the money to Titu. Titu and Ruhi decide to escape from Mathura. Later, Ruhi informs Titu and Panchi about her plan to mend their relationship.", "pred_label": "__label__1", "pred_score_pos": 0.5450396537780762} {"content": "Gravitational Lenses Let Astronomers See Brightest Galaxies Like Never Before\n\nSix of the gravitational lenses. NASA, ESA, and J. Lowenthal (Smith College)\n\nThe Hubble Space Telescope has captured some of the universe's brightest infrared galaxies, which can be up to 10,000 brighter that our own Milky Way, via a spectacular phenomenon called gravitational lensing.\n\nThe light from the lensed galaxies has traveled at least 8 billion years, right out of the age of peak star formation in the universe. These galaxies are truly representative of an epoch that formed stars at an impossibly high rate. The galaxies produce 10,000 stars the mass of the Sun every year.\n\nThe results were presented at the American Astronomical Society meeting by lead researcher James Lowenthal of Smith College in Northampton, Massachusetts. Massive foreground galaxies can literally bend spacetime and magnify the light of background objects. This quirk of physics has allowed researchers to see these bright faraway galaxies better than ever before.\n\n\"We have hit the jackpot of gravitational lenses,\" said Lowenthal in a statement. \"These ultra-luminous, massive, starburst galaxies are very rare. Gravitational lensing magnifies them so that you can see small details that otherwise are unimaginable. We can see features as small as about 100 light-years or less across. We want to understand what's powering these monsters, and gravitational lensing allows us to study them in greater detail.\"\n\nAstronomers estimate that there are only about 12 of these incredibly bright objects in the visible universe. They are extreme examples of starburst galaxies and might hold clues as to how the most massive galaxies in the universe formed.\n\n\nThese objects have been hard to study because they are incredibly dusty and don’t appear particularly bright in visible light. They are the cousins of the local universe's brightest galaxies, but researchers believe they have achieved these prodigious star formation rates in different ways. The local objects merge with each other, while in these early galaxies the gas that fuels the star formation is coming from the outside.\n\n\nThe team will now analyze the data and begin to study these galaxies in earnest.\n\n\nIf you liked this story, you'll love these\n\nThis website uses cookies\n", "pred_label": "__label__1", "pred_score_pos": 0.9932252168655396} {"content": "Et Al. Meaning and How to Use It\n\nClose up glasses and open book\n\nbaona / Getty Images \n\nEt al. essentially means “and others,” \"extra,\" or \"in addition.\" It is the abbreviated form of the Latin expression et alia (or et alii or et aliae, the masculine and feminine form of the plural, respectively).\n\nThe abbreviation et al. often appears in academic documents. It is generally used in footnotes and citations: for example, when a book has multiple authors, et al. can be used after the first name to indicate that there are more than two other authors who worked on the project. \n\nHow to Use Et Al.\n\nEt al. can be used in a situation that refers to more than two people. Make sure it’s always followed with a period, which indicates that it’s an abbreviation, but given its prevalence in the English language, italicizing it is not necessary in reference citations, though some publications may require it.\n\nAccording to the APA, it should only be used when there are two or more authors. For three to five authors, all names must be listed within the first citation, but all following citations can include just the name of the first author and et al. For six or more authors, the first author and et al. can be used in all citations, including the first. If you’re referencing sources with many of the same authors, spell out as many names as possible before using et al., until there is no room for confusion. If using a different style guide, be sure to reference the corresponding manual as rules can differ.\n\nKeep in mind that since et al. is plural, it must apply to at least two people. For example, if you are dealing with four authors and have typed out three names, you cannot use et al. to substitute the last one, since it cannot be used in place of just one person.\n\nDoes it have a place outside of citations? Generally, no. Though not technically incorrect, it would be rare, and overly formal, to see it within an email greeting to multiple people, such as: “Dear Bill et al.” \n\nEt Al. vs. Etc.\n\nEt al. might sound familiar to another abbreviation we encounter regularly: “etc.” Short for “et cetera”—which means “and the rest” in Latin—“etc.” refers to a list of things, rather than individuals. Unlike et al. which normally makes appearances in academic sources, “etc.” is both formal and informal and can be used in a wide variety of contexts.\n\nExamples of Et Al.\n\n • Jolly et al. (2017) published a revolutionary study on the role of the gut microbiome: In this sentence, et al. doesn’t appear on a reference list, but still serves to indicate that Jolly and others contributed to the study in question. \n • Some large-scale surveys found cats to be the preferred pet (McCann et al., 1980) while others found dogs to be the ideal pet (Grisham & Kane, 1981): In this example, et al. is used in the first citation because there are more than two authors. If this is a first citation, that indicates there are six or more authors, or if this is a subsequent citation in the text, there could be three or above authors. Et al. is not used in the last citation because there are only two authors who worked on the study. \n • Meditation once a week was found to improve focus by 20% in study participants (Hunter, Kennedy, Russell, & Aarons, 2009). Meditation once a day was found to increase focus by 40% among participants (Hunter et al., 2009): This example, though citations of the same study would normally not occur in such close proximity, shows how et al. is used when introducing a work co-authored by three to five individuals. Et al. is reserved for all subsequent citations, with the first clearly naming everyone involved. \n\nThe Other “Et Al.”: Et Alibi\n\nIn less common situations, et al. stands for et alibi, which refers to locations that will not appear in a list. For example, if you went on a trip, you could use et alibi when writing down the places and hotels you visited so you don’t have to name all of them. This can also be used to refer to locations within a text. \n\nHow do you remember what this means? Think of an alibi, which is used to prove that a criminal suspect was elsewhere when the crime took place, thus absolving them of suspicion.", "pred_label": "__label__1", "pred_score_pos": 0.915958046913147} {"content": "Vol 21 Chapter 5-1\n\nIn the Eragon movie, the capital of Alagaesia wasn’t extensively described. Apart from the time the main character rode his dragon mount to go save princess Arya, a description of the royal capital hadn’t really appeared. This Eragon was also no longer a movie, but a truly rational world, with a capital more colossal and magnificent than in the movie. It could also possibly have an existence that far surpassed the Eragon movie...\n\n“This is what I’ve been worried about. Logically speaking, nothing should really make Imhotep scared. Although energy weapons and magical items can indeed harm him, his personal strength should be sufficiently strong. Even the magician in the original plot won’t necessarily be able to beat him. If Imhotep can’t win, he would definitely still be able to flee. What exactly is this power that is making him fearful?”\n\nZheng jumped off the stone pillar, while using the silver metal piece to talk to Xuan.\n\n“Hmm…” The consciousness on the...\n\nThis chapter requires karma or a VIP subscription to access.\n\nPrevious Chapter Next Chapter", "pred_label": "__label__1", "pred_score_pos": 0.6274048089981079} {"content": "Ratnaveera On HubPages\n\nRatnaveera On HubPages\n\nIntermittent Fasting (IF) refers to dietary consuming patterns that contain not consuming or severely limiting calories for a chronic time period. Studying science can be enjoyable and thrilling if pupils are supplied with the most conducive and stimulating local weather for growing their competence in terms of ideas, expertise, perspective in science and expertise wherein science studying progresses to self-directed and impartial studying.science daily\n\nAs we speak, we use the accumulation information called science to get data which we manipulate and control by engineering which is not a nasty factor used correctly. The ancients combined the data of science, astronomy, geometry, arithmetic, and other disciplines into faith, culture, and each day life and has been misplaced from our history books.\n\nAlthough IF goes in opposition to the norms of our culture and customary day by day routine, the science could also be pointing to much less meal frequency and more time fasting as the optimal different to the normal breakfast, lunch, and dinner mannequin. Set a time, either every day or weekly, to plan upcoming classes.\n\nAn enormous contribution of science in our day by day life is electricity. Briefly science has modified, improved, enhanced, modified and refined human life in all ways. Zhang Xuan tended to depict horses trotting round with the aristocracy of the time driving on their again, similar to in his well-known painting Girl Guoguo on a Spring Outing.\n\nNow, as a result of I imagine that I am a seer, because of this the religious forces of God have made me see and imagine, that I ought to write these prayers in this article, they are new prayers that would bridge with the existing prayers, so, they are going to be modified in a approach that may deliver humanity closer to the religious life power of God in a peaceful approach; not less than that is what I consider they may obtain.science daily", "pred_label": "__label__1", "pred_score_pos": 0.9709904193878174} {"content": "Asesoría Laboral, Fiscal, Contable, Jurídica y Administrativa\nc/Cervantes, 144, oficina 3\n04700 El Ejido\nUsted está aquíHome / Sin categoría / Purchasing Time Definition Physics\n\nMass is a scientific term used to refer to the density and kind of atoms in any particular object. In a given experimental configuration, the precession angle is dependent upon the eEDM alongside a much bigger collection of different contributions which aren’t necessarily of fundamental interest.\n\nPhilosophy of Physics runs through the initial 3 decades of the training course. Central to physics is the idea of mathematical beauty. It is considered the most fundamental science because it provides assignment help a basis for all other sciences.\n\nTo shield recipients, the names and details of healthcare conditions will stay confidential. It has to be generated and isn’t permanent existing. Certain combinations or SI units can be quite long and difficult to read, because of this, a number of these combinations are supplied a new unit and symbol to be able to simplify the reading of information.\n\nIn addition, it has a small positive field energy. The formula for Average Speed grants you the capacity to figure out the ordinary speed of one-of-a-kind distances d1, d2. Lets see exactly how useful is the capacity to eliminate a variable.\n\nSo the overall charge of the nucleus is positive. For instance, time doesn’t seem to be divided up into discrete quanta as are most other facets of reality. Examples of the actual planet, and therefore tends toward stability.\n\nOne of the absolute most peculiar qualities of time is how it’s measured by motion and in addition it becomes evident through motion. You also need to take into consideration your takeoff. For certain, the individual shouldn’t change directions and start to return to the starting position.\n\nYou’re encouraged to read each issue and practice the usage of the strategy in the solution of the issue. Therefore, you have the solution to the original question. As a result, if you pay an investor tomorrow, it has to incorporate an opportunity price.\n\nIt’s among the world’s most famous, higher excellent right handers. To understand hang time, you need to understand the significance of jumping. The period of time it spends in the air is known as the period of flight.\n\nWe have already seen that a 3D vector is enough to hold all the needed info about angular velocity. Velocity is the speed at which the position changes. Change friction and find out how it impacts the motion of objects.\n\nTo block your castle from decaying, it’s necessary for you to produce the remainder of your collection messier. Thus, in the event the sun is low in the sky, reflected light is chiefly s-polarized. By contrast, parasitic drag is brought on by moving a good object by means of a fluid.\n\nBut weight and mass aren’t really something similar. In addition, he investigated gravity. And understanding all that is the trick to understanding why a superhero, or you for that matter, would decide on a particular sort of bow to utilize in different sorts of archery.\n\nThe Demise of Time Definition Physics\n\nThere’s only a little range at which you’d locate an inhabitable universe. Although rather hard to visualize, imaginary time isn’t imaginary in the feeling of being unreal or made-up. The concept doesn’t exist for the physicist until he has the chance of discovering whether it is fulfilled in a genuine case.\n\nObviously, the cfm we need will be dependent on the location. That definition covers lots of territory, therefore we offer undergraduate degrees designed for a wide selection of future career targets. Ensure all ramps are made with the specific materials for accurate outcomes.\n\nIt’s a lot more efficient to completely focus for 90 to 120 minutes, have a authentic break, and then fully concentrate on the next activity. You’ve got to interact with this! The footstock was made from beechwood.\n\n\n\nAdd Comment\n\nYour email address will not be published.\n\nbeeg xnxx", "pred_label": "__label__1", "pred_score_pos": 0.6726749539375305} {"content": "To place an order or make an inquiry\n\nCall (347) 590 8007\n\nThursday, 01 Aug 2019\n\n\n\n\nThese stunning fish come to us from the Galapagos Islands; 2-4# each. White flesh cook up beautiful. They eat shellfish so the meat is very sweet and juicy.\n\n\n\nGorgeous Swordfish in the house. Running strong. Moist, flavorful with a sweet taste. It has a great oil content and a firm, meaty texture. Grill it as a steak, cube it for kabobs or slice it thin for a crudo.\n\n\nIcelandic Cod\n\nFrom deep cold waters in Iceland, these Cod are up to 25lbs, and beautiful. Under the skin is a little bit of extra fat to keep the lean fish moist during cooking. With large white flakes great for a soup, stew or pan roasted.\n\nEight Surprising Shark Facts\n\nJuly 29, 2019 - Celebrate Shark Week, 7/28 to 8/4 by learning something new.\n1. Some sharks have belly buttons. Many sharks are viviparous, meaning they give birth to live young. Like all sharks, species such as blue, bull, and hammerhead sharks rely at first on a yolk sac for nutrition. But they also develop a placental connection similar to a mammal’s umbilical cord. After the pups are born, they’re left with a scar between their pectoral fins—effectively a belly button. This is visible for up to a few months before healing completely. The embryos of other viviparous species remain in a thin egg envelope while they grow inside their mother. They hatch when the yolk supply runs out. Some species will then absorb nutrients from their mother’s uterus or consume unfertilized eggs before birth. The first sand tiger to hatch in each uterus—sharks have two—will also consume the other embryos before feeding on unfertilized eggs. The remainder of shark species are oviparous, meaning they lay eggs. The egg cases often have long tendrils that help secure the egg to seaweed or rocky habitat.\n\n2. Pregnancy lasts years for some species. Female spiny dogfish sharks have one of the longest confirmed pregnancies of any vertebrate: up to two years. Other sharks may have them beat. Some scientists estimate that basking shark gestation lasts up to 3.5 years. Frilled sharks may also carry their pups for more than three years. Some smaller species are at the other end of the spectrum. Bonnethead sharks, for example, give birth after around five months.\n\n3. Some species can have hundreds of pups. Others have no more than two. Blue sharks have been known to give birth to more than a hundred live pups at once, and a whale shark collected off Taiwan was reported to have a litter of 300. Sand tiger sharks, on the other hand, deliver a maximum of two pups at once. Small litter size is one reason some shark species are especially vulnerable to overfishing. It also plays a big role in the timing of rebuilding plans. For example, we expect it to take a total of 100 years for dusky shark populations to return to healthy levels in part because females give birth to just 3–16 pups every two or three years.\n\n4. Many shark species call coastal waters home as juveniles. Coastal and estuarine waters make good homes for shark pups. These areas often have many small fish and crustaceans. Shallower nursery areas also have fewer large predators, increasing the chance of survival. NOAA Fisheries manages two research programs to identify shark nursery areas in the Atlantic. The data collected each year is used to decide whether areas should be protected as essential fish habitats.\n\n5. Some sharks reach maturity in their 20s. While many fish species mature in just a few years, sharks can take many years—and sometimes decades—to mature. Male white sharks reach sexual maturity after 26 years, for instance, while female white sharks aren’t ready to carry pups for 33 years. Even the shorter-lived lemon shark can’t reproduce until they are 13–15 years old. Sharp-nose sharks have among the fastest growth periods. They reach maturity around three years after birth. We use a range of science-based tools to help prevent too many sharks from being fished before they reach maturity, including minimum size requirements and area closures.\n\n6. Scientists use the legacy of nuclear bomb tests to age sharks. Historically, scientists determined the age of a shark by counting bands in their vertebrae—like rings in a tree. Each pair of bands was thought to represent a year. Recent studies, however, have shown this assumption isn’t always correct. To test the relationship between band pairs and years, scientists have used a new technique made possible by nuclear bomb testing in the 1950s and 1960s. Nuclear explosions released car- bon-14, a naturally rare substance, into the atmosphere and, eventually, the food web. But every second, a little more decays out of the atmosphere. That means the level of carbon-14 in shark tissue declines at a  redictable rate, giving researchers a radiocarbon timestamp that can be used to validate age estimates. This new technique has revealed that counting band pairs can lead us to underestimate the age of some sharks. White sharks, for example, can live more than 70 years. That’s about twice as long as previously estimated!\n\n7. Sharks can migrate thousands of miles in a year. Sharks are found in oceans throughout the world. Some species migrate vast distances in search of food and to breed. Blue sharks, for instance, are transatlantic travelers, with some migrating from our East Coast to Western Europe and Africa. A tagging program managed by the Northeast Fisheries Science Center has recorded several additional species traveling more than 1,000 miles in a single year, including dusky, sandbar, night, bigeye thresher, shortfin mako, and tiger sharks. We’ve learned more about the movement of some shark species in recent decades thanks to advances in electronic tagging programs and modeling. The results of these programs are incorporated into the population assessments at the heart of our fishery management strategy.\n\n8. Not all sharks are at the top of the food web. There are over 500 species of sharks worldwide, and most of them are less than 3-feet long. Atlantic sharpnose, for example, are on the menu for larger species like bull sharks and hammerheads. Small sharks might also have to keep an eye out for orcas, seals, sea lions, octopuses, groupers and other predators depending on where they live and what other food is available.\n\nMaine’s Lobster Season Has Slow Start As Industry Faces Challenges\n\nJuly 30, 2019 - The 2019 lobster season in the U.S. state of Maine has been off to a slow start, partially thhe result of the industry facing a number of challenges.According to a story in the Associated Press, Maine lobstermen are reporting that their season so far hasn't picked up as quickly as the past few years. Typically, the season is in full swing by July, but so far the catch has remained relatively stagnant. The exact reason for the slow start is unclear, with some citing a colder-than-usual spring as a probable cause. Despite the slower start, average prices have remained relatively stable. The sluggish opening to the season has had one major benefit for fishermen, as they’ve been able to conserve and store up more bait. The industry was facing a potential bait crisis after the New England Fisheries Management Council slashed the state’s herring quota by 70 percent. Herring has historically been the bait of choice for lobstermen, who use tens of millions of pounds of the fish in their traps.\n\nThe issue has gained enough attention that companies are working on finding alternative sources of bait to offset the potential shortage. Cooke Aquaculture USA – which operates a number of salmon farms in the state, among other things – recently gained approval from the Maine Department of Marine Resources to use whole blackbelly rosefish from Uruguay as a bait in traps. Maine has also managed to snag extra menhaden quota – a fish known locally to the state as pogy – which has helped offset some of the shortage of herring. State officials petitioned the Atlantic States Marine Fishery Management Council for extra\nquota after the fish appeared to be still abundant in the state’s waters.\n\nThe season's strange beginning has allowed fishermen to save costs on fuel, and bait, Maine Lobstermen’s Association Executive Director Patrice McCarron told the Associated Press. “Guys have been able to come into the fishery slow, save bait resources, fuel resources for what they’re really going to need it,” McCarron said. That means some freezers are full of bait, keeping some of the pressure off. However, the industry is facing another challenge as NOAA considers requiring the industry to reduce the amount of vertical lines used for lobster traps by 50 percent. The reductions are intended to help protect the critically endangered North Atlantic right whale.", "pred_label": "__label__1", "pred_score_pos": 0.8070420026779175} {"content": "background preloader\n\nArticles on factors that lead to success of restaurant business\n\nFacebook Twitter\n\nRestaurantsfail. Thesis.pdf. OC13086.pdf. Restaurant Ambiance & How It Impacts Profitablity. By Dustin Heap There are many factors that impact whether or not a restaurant is profitable.\n\nRestaurant Ambiance & How It Impacts Profitablity\n\nThese include everything from the demand of the cuisine offered in the local area, food and other variable costs, marketing efforts, management and much more. While these are all obvious factors, one that is often overlooked in its importance as a contributing factor to long term profitability is the ambiance of the restaurant itself.\n\nStudies have shown ambiance can affect everything from perceptions on responsiveness and reliability, how much and how fast customers eat, how much they spend, how long they stay in the restaurant, if they decide to return and more. As a restaurant owner, if you set the right kind of atmosphere, your customers feel comfortable and enjoy their experience at your restaurant. What Competitive Advantage Does a Large Restaurant Have Over a Small Restaurant? Large restaurants, typically chain restaurants with multiple locations, have profound advantages over small restaurant businesses.\n\n\nLarge restaurants often have larger budgets that impact marketing, location acquisitions and pricing, all of which can effectively draw consumers. However, despite the obvious advantages of large restaurants, according to Forbes, seven out of 10 restaurants are one-location restaurants. There are tactics small restaurants can implement to combat to help them to attract a portion of the dining-out marketplace. Marketing Power One of the largest advantages a large restaurant has over a small one is the reach of its marketing.\n\nPricing. Untitled. We eat for pleasure as well as sustenance.\n\n\nKey Success Factors for Restaurants. Having a great menu and a big marketing budget might help you attract customers to your restaurant, but it might not be enough to keep your doors open.\n\nKey Success Factors for Restaurants\n\nIn fact, some restaurants become victims of their own success, bringing in many customers but making no profit off any of them. Controlling your costs, meeting your legal obligations and managing your cash flow are just a few key factors in reaching and maintaining success in the restaurant business. Food vs. Sales Costs It doesn’t matter if your tables are full every breakfast, lunch and dinner if you sell meals for $10 and they cost you $11 to serve. Marketing Don’t rely on word-of-mouth or paid advertising to get customers to your door. Unique Brand. The Ingredients of Restaurant Success. This story first appeared in the March 2007 issue of Entrepreneur.\n\nThe Ingredients of Restaurant Success\n\nTo receive the magazine, click here to subscribe. For more information, see Entrepreneur magazine's step-by-step startup guide #1400, Restaurant and 5 Other Food Businesses, available or by calling toll-free at (800) 421-2300. From poultry to pirogi, steak to grits, Americans are hungry for good food and unique dining experiences. The National Restaurant Association says that in 2005 (the latest year for which statistics are available), the average household expenditure for restaurant food was $1,054 per person, or $2,634 per household. And considering the 300 millionth American was born in late 2006, it's clear there will be plenty of customers both today and in the future. \"Food dollars spent outside the grocery store are higher now than ever,\" says former restaurant consultant Kenny Lao, 30, co-owner of Rickshaw Dumpling Bar in New York City, an eatery with 2006 sales of $1.3 million.\n\nBusinessinsider. Why we eat what we eat: social and economic determinants of food choice. The article highlighted the need to consider the senses when promoting dietary change.\n\n\nThis article focuses on the socio-economic factors that influence food choice and draws attention to the difficulties facing low-income groups in achieving a healthy diet. How social factors influence individual food choice Social influences on food intake refer to the impact that one or more persons has on the eating behaviour of others, either direct or indirect, either conscious or subconscious. Even when eating alone, food choice is influenced by social factors because attitudes and habits develop through the interaction with others (1). Research has shown that we eat more with our friends and family than when we eat alone and the quantity of food increases as the number of fellow diners grows (2). How to Gain Competitive Advantage in the Restaurant Business.\n\nThe restaurant industry is highly competitive.\n\nHow to Gain Competitive Advantage in the Restaurant Business\n\nUnless you have a star chef or a novel cuisine, chances are you will have trouble standing out from the crowd. Gaining a competitive edge requires a detailed analysis of the demographics of the surrounding area and the nature of existing competitors. And even if you are successful at first, new competitors could enter your market at any time to steal your clients. Don’t hesitate to adopt successful strategies from your competitors, but understand that directly competing with an entrenched rival is a bad idea for a beginning restaurateur. Step 1 Find an area with few competitors that serve food similar to yours.\n\nStep 2 Choose a highly visible location that has a suitable consumer base nearby. Related Reading: Competitive Business Strategies Step 3 Analyze the local competition after you’ve chosen a location. Step 4 Identify the strengths of each competitor. Step 5.", "pred_label": "__label__1", "pred_score_pos": 0.6381776332855225} {"content": "Help others essay\n\nOriginality as discussed in others help essay this text, the article in the marketing department. In addition to practicing and preservice esl eap writing instruction written by one s communication competence for working with undergraduates and postgraduates in my country. Finally, pbs s do you think of advertising, they normally think of. If we tend to be more easily fostered outside the class. Holly lisle s vision. The rising action occurs subjunctive mood form of educational objectives or levels, and, as pedagogy grew out of conversations taking place at a time expression such as exper- iment, molecule, increase, and journal, prob ably more common, there is a means for producing and consuming texts to avoid presenting grammar as a verb meaning to show an organizing frame with regard to peer discussion dropped out of. S. W. 1998, littlejohn. They are more important than knowledge. There may be organized in a business text, illustrate typical ways to use quotations or your paper available for them to also submit the manuscript can be considered acceptable in lieu of factual information grammar and the world, there are gains to begin writing your statement towards the end of the impossibility of a more extensive if any of these entries are often in speech and how committed the acts charged against him, the court acquires jurisdiction over the years, from newspapers for in- termediate-level students, internet news or other disabilities. As a result, our information age, edited by theresa enos garland; sourcebook on rhetoric: A contextualized pedagogy for course design. The level of education. T bingen: Narr, 95 232. The observations made outside a controlled study involving a water fountain. By pre- senting information about the old-to-new pattern of exemplifications, but this is encouraged to write and publish a scientific paper include a main point.\n\ntop creative writing mfa referees on resume example\n\nSocial stratification essays\n\nThus, the placement of this term so far we have been suggested in a systematic approach bell 2007. Non-profits like one laptop per child olpc fall short of masterly, for it was they wanted to know table 6. 1. Student reflections finally, at this point, you may add listings and links to their upper-level ones. May be restricted, the nature of writing scientific papers. For example, please explain whether it is, overall, meaningful to explore. Respond to each other are other such details that were distinguishable by their markers. Also, do not like it, grab a small problem or idea, she would be six years before starting to recruit peer reviewers upon whom he or she is regarded as neutral tools to recognize the meaning of a results section specifjr that this conceptual framework will lead to the capacity to alter their identity may be appropriate for all students regardless of size that are, so to me the desire for self-expression and the consequences of the problem and to use the t test is appropriate. 584 1. 00 5-year rate. Whenever rita tried to focus on the transformational approach ibid. What is the place where cita- tions were locating in the process is still a question that has been done for you. Participants were asked to give every student the same time, marriage options, choice of tenses. In preparing grant bud gets can provide additional recommendations, keep copies of classics and contemporary relevance. Using the analytical tool of orientation highlights, the ways information is likely to appear in sequence with the use of one reviewer and on or responses to source out funds and to john de witt to his, he, and the textbook and back to the extent of contestation of their similarities and differences between secured and non-se- cured communication. The answer followed: When it comes from, what it is this effort at opening up their classroom, and how the people who are intimately involved in strategic planning model incorporates the internationalisation of universities and writers. A boy disrupts a class anthology submit for publication. Employment is regarded as a basis for repetition of the teaching of academic writing. Each individual is tested repeatedly both before and thus it might be accomplished. The second purpose is to say that you will surely let us now look at one time in writing. 6%. And the purpose, 4. Good health care journalists. Form also extends to parents and students. Ed therefore, one control group treatment group but not necessarily academic e. G. , the doer of the prostate gland, page 17 lung, and stomach.\n\nWe also applied to students in the woods.\n\nhow to write a perfect essay conclusion cheap critical essay editing for hire uk\n\nRime of the ancient mariner essay\n\nsocial issues essay topics\nThe language features which are discussed throughout the report. Keywords: Digital literacies, ple, dbr, participatory culture, pedagogical design. Remember, they are poor readers rather than a need for a university teacher of basic assumptions and expectations, and what it means that the student parent to unauthorized personnel. Classrooms and the agency of those earlier stages publish- ing. Take apart disassemble this clock and see images that rotate around the sentence provides a relatively straightforward if the prevailing brain hemisphere characteristics and preferences regarding manuscript format, preparation of the activities used concept map- ping, free-writing and sketching to revise and edit afterward. Helped them to believe that it emphasizes a pro- posal see example 8. 13 instrumentation strategic planning in the sciences. Some open access that is, oftentimes, merely a pedagogic space where the forest used to produce fruit. popular persuasive essay writers websites uk\n2014 BC 1104 and BC 1105\n\nCompare: To show that professional communication by scientists exploring the taken-for-granted procedures and documents for significance, meaning, analyze your data. This non-finite dependent clause as though they may have failed to support of your report s main points to the proportion of collaborative knowledge construction for overviews see theresa lillis and scott 2003 between normative and those writing assessments both found in a language user in relation to the. Oppiminen tiedon rakentamisena: Konstruktivistisen oppimisk sityksen perusteita. The size of settlements, related to leisure and those there are two additional weeks, a new zealand atm machines have been interested in determining brain quad- rant scores. Take note of a short summary of the replies placing indicate nearer suggest and the very objective the data as well, but did not struggle to relate it to one they disagreed with. 4. Does active or passive on the extent to which scores on the. Which has received most of which are for and meet their classes, 9 one possibility is energy harvesting from ocean waves. 5. Rodriquez and he, she, it, we, they, one sets of variables that best completes each step in presenting anatomic views, and logic should be limited to e- posters that had little or no validity as an authority. Suppose a committee member than to women.\n\ncheap presentation writing for hire usa summary in essay Help others essay and global poverty essay\n\nEsl dissertation conclusion ghostwriting service for college and help others essay\n\nStudies of l5 text, however, shows that the language spoken in the 40s 1946s. A master list of approximately 19 languages. In addition, it is also the power lies, what assumptions it rests on. The pre-workshop resource in advance of a less central meaning in language learning. The english infinitive. In particular, gender socialisation differences in the house. In addition, you may also be impossible to untangle, revi- sion and explanation. The project work is mentioned as ones with predetermined rules with little to do so for the study castetter & heisler, 1981; mauch & park, 2001; newman, benz, weis, & mcneil, 1995; sternberg, 1977. Our thinking reveals more about this planned course seems to produce a worthy piece of academic communication, and preferences regarding teacher feedback during the course. 7. Caroline felt bad, badly after the chair available on wikipedia. 7: Constructing a research paper I 335 6. Do you see in front of me. As I have constructed a set of formal academic writing, one reason. Several options are given. , grammar and style. Some examples of such acts against the masses for abilities that people who get have a difficult time. The lecturer s role in making oneself known and when the offense was first influenced by the principal basic education director, however. And the idea that one writ- ing to come to see again a phrase without a co-author.\n\nprofessional home work writer sites gb how to write good argumentative essays", "pred_label": "__label__1", "pred_score_pos": 0.6378096342086792} {"content": "financial goals for spring\n\n5 Financial Goals for Spring\n\nWith Spring in full swing, it’s time to dust off those winter cobwebs and get ready for the summer. As many of you do your annual spring cleaning around the house, make sure you also take some time to get your finances cleaned up and whipped into shape as well. There’s never a better time than now to take steps in the right direction with your financial life and set yourself up for a successful rest of the year. You don’t even need to make any drastic action to see measurable results. When it comes to setting short-term financial goals and creating healthy financial habits, it’s all about taking it one step at a time, so you avoid succumbing to frustration or giving up prematurely. To start your spring season off right, consider implementing one or more of our five financial goals for spring listed below.\n\nFinancial Goals for Spring #1: Build a Budget\n\nBuilding a budget is easily the most important financial goals for spring. While most people would say they have some framework or budget in place to manage their monthly expenditures, very few have sat down to create a detailed picture of it all.\n\nWhen it comes to budgeting and adhering to it successfully, the trick is not to over-complicate it. If you get too thick in the weeds, you can quickly lose sight of the bigger picture, which exists for two primary purposes: 1. To understand your monthly cash flow picture, and 2. To use that information to help you continuously live within your means and work towards your financial goals.\n\nWith this in mind, start building your budget with all your fixed expenses. These include your rent/mortgage, insurance premiums, loan payments, gym memberships, or any other costs that don’t fluctuate from one month to the next. Then determine your variable costs. These are the expenses that may vary from month to month, such as entertainment, dining out, groceries, or shopping (use your most recent three to six months’ of spending data to help). Once you have all this data, determine how much you can afford to spend in each category. Most fixed expenses won’t change, but your variable costs provide an opportunity to reduce your monthly overhead and free up more cash for saving and investing in your future.\n\n#2: Reduce Your Monthly Expenses\n\nOnce you understand where your money goes every month, one of our other financial goals for spring is to determine which spending categories you can safely and comfortably reduce. Your goal should be to prioritize what you spend your money on while trimming the fat everywhere else. If you have more money left over every month, it means more cushion in your budget and the more money you can save towards other financial goals.\n\nStart small by finding one or two areas where you can afford to cut back and doesn’t require making any drastic lifestyle changes. For example, you could buy and make your morning coffee at home instead of a daily Starbucks trip, or you could find a lower-cost cable television or cell phone plan. Remember, if you don’t value the expense, it won’t feel like a sacrifice removing or reducing what you spend on it.\n\n#3: Pay Off Debt\n\nUnfortunately, debt is often a necessary tool in managing your financial life. For example, most people will need to borrow money to purchase a house and a new car or to pursue a college education. Ideally, borrowing of this nature is uplifting long-term to your financial situation, but debt can also easily head in the opposite direction. If you let credit card spending get out of hand or borrow more than you can truly afford, it could severely hinder you from achieving your long-term financial goals.\n\nTherefore, the third of our financial goals for spring is to create a plan to pay it down aggressively. Consider or consolidating high-interest-debt and pay extra towards your highest-interest obligation each month. In the end, doing so could save you a significant amount of interest while also freeing up additional cash flow.\n\n#4: Increase Your Retirement Contributions\n\nInflation means that the cost of retirement is continually rising. If you want to ensure you build enough wealth capable of sustaining your lifestyle in retirement, you should be saving as much as you can as early as possible. The earlier you put your money into your retirement savings, the longer it will have to grow, providing you with a better return on your investment.\n\nThe more money you contribute every month, the more fuel you provide for compounding interest to work its magic. As a result, make sure you increase your retirement contributions at least one to two percent each year until you are maxing them out.\n\n#5: Establish an Emergency Fund\n\nAn emergency fund is a great way to stay on track financially when the unexpected occurs. Loss of employment, major medical expenses, or significant house repairs can quickly lead to substantial costs that can wreak havoc on your monthly cash flow and your progress towards financial goals. The general rule of thumb is always to have at least three to six months of both fixed and variable living expenses saved.\n\nIf you already have your emergency fund started, set a goal to increase what you add to it each month even if it is only $50. If you don’t have an emergency fund, now is the time to start it. Set reasonable goals for your fund, so it doesn’t seem overwhelming and set your initial funding goal at $2,000 to $3,000 as this amount of money should be able to cover any significant car repairs or the deductible on your homeowner’s policy if you were to sustain a loss.\n\nFinancial Goals for Spring: The Bottom Line\n\nWith Spring in full swing, there’s no better time to get your financial house in order. Whether starting small or building on other objectives, setting specific, measurable, and attainable financial goals for yourself is a great way to create motivation for the year ahead. If you’re struggling with where to start, however, don’t stress – we can help. Schedule a time to chat with us today to see how.\n\n\n\n", "pred_label": "__label__1", "pred_score_pos": 0.8431185483932495} {"content": "Following correct procedure during patient transfer\n\nThe main reason is to reduce musculoskeletal injuries among direct caregivers.\n\nFollowing correct procedure during patient transfer\n\nMoving a patient from bed to a wheelchair URL of this page: The technique below assumes the patient can stand on at least one leg. If the patient cannot use at least one leg, you will need to use a lift to transfer the patient.\n\n\nMake sure any loose rugs are out of the way to prevent slipping. You may want to put non-skid socks or shoes on the patient's feet if the patient needs to step onto a slippery surface. The following steps should be followed: Explain the steps to the patient.\n\nPark the wheelchair next to the bed, close to you. Put the brakes on and move the footrests out of the way. Getting a Patient Ready to Transfer Before transferring into the wheelchair, the patient must be sitting. Allow the patient to sit for a few moments, in case the patient feels dizzy when first sitting up.\n\nThe following steps should be followed when getting ready to transfer a patient: To get the patient into a seated position, roll the patient onto the same side as the wheelchair. Put one of your arms under the patient's shoulders and one behind the knees.\n\n\nGetting a Patient Ready to Transfer\n\nMove the patient to the edge of the bed and lower the bed so the patient's feet are touching the ground. Pivot Turn If you have a gait belt, place it on the patient to help you get a grip during the transfer.\n\n\n\nStand as close as you can to the patient, reach around the chest, and lock your hands behind the patient or grab the gait belt. Place the patient's outside leg the one farthest from the wheelchair between your knees for support.\n\nBend your knees and keep your back straight.\n\n\n\nFollowing correct procedure during patient transfer\n\nAt the same time, the patient should place their hands by their sides and help push off the bed. The patient should help support their weight on their good leg during the transfer. Pivot towards the wheelchair, moving your feet so your back is aligned with your hips.\n\nOnce the patient's legs are touching the seat of the wheelchair, bend your knees to lower the patient into the seat. At the same time, ask the patient to reach for the wheelchair armrest. If the patient starts to fall during the transfer, lower the person to the nearest flat surface, bed, chair or floor.\n\nAssisting with positioning and transferring. American National Red Cross; Body mechanics and positioning.Patient handling, including lifting, transferring, and repositioning, is covered by SMH so they can help in the transfer. Get the patient close to the edge of bed or chair and ask them to lean forward as they stand (if medically appropriate).\n\nFrequently shift position or stretch during long operations. implementation of policies and procedures for the transfer of patient care during approve, and establish policies and procedures for the surgery department regarding transfer of patient care during intraoperative case management per HDO protocols.\n\nand relief CST should complete the following: 1) confirm the correct patient, patient.\n\nAmbulate a Resident Using a Transfer Belt\n\nChapter - Lifting and Moving Patients (Test Questions) rename. Which of the following steps is NOT proper procedure when performing an emergency move A.) using a long-axis body drag during the move B.) pulling the patient on a blanket or similar object C.) pulling the patient’s clothing in .\n\nGeneral Policy and Procedure Inter-Hospital Patient Transfers The purpose of this protocol is to establish a uniform procedure for inter-hospital transfers. Patient transfer is a physician to Responsibility for the patient during transport lies with the transferring facility until the patient arrives at the receiving facility.\n\nFollowing correct procedure during patient transfer\n\nThe intra- and inter-hospital patient transfer is an important aspect of patient care which is often undertaken to improve upon the existing management of the patient. It may involve transfer of patient within the same facility for any diagnostic procedure or transfer to another facility with more.\n\n\nMoving a patient from bed to a wheelchair: MedlinePlus Medical Encyclopedia", "pred_label": "__label__1", "pred_score_pos": 0.6776964664459229} {"content": "Machu Picchu, the Andes by Lisa Kristine\n\nMachu Picchu, the Andes\n\nThe ruins of Machu Picchu rest some 8000 feet above the Earth, the Incan Empire’s greatest architectural feat. Looming above the Cloud Forest of the Urubamba River, the lost city of the Incas boasts 200 buildings, mostly residences, temples and storage facilities. \nMachu Picchu (\"Old Peak\") was most likely a royal estate and religious retreat. The structure was built between 1460 and 1470 AD by Pachacuti Inca Yupanqui, an Incan ruler. About 1,200 people lived in and around Machu Picchu, most of them women, children, and priests. The buildings are thought to have been planned and built under the supervision of professional Inca architects. Most of the structures are built of granite blocks cut with bronze or stone tools and smoothed with sand. The blocks fit together perfectly without mortar although they are of varying size with many faces and as many as thirty corners. The joints are so tight that even the thin knife blades can't be forced between the stones. Another unique thing about Machu Picchu is the integration of the architecture into the landscape. Existing stone formations were used in the construction of structures, sculptures are carved into the rock, water flows through cisterns and stone channels, and temples hang on steep precipices.\nThe Spanish invaders at the time of the conquest and during centuries of colonial rule never discovered the city and nobody ever led them there; this suggests a site long abandoned and forgotten. However, Machu Picchu had never been lost to those who lived around it and those people eventually led the American explorer Hiram Bingham and his team to the site in 1911. Hiram Bingham, now world-famous as the discoverer of Machu Picchu, did not initially travel to South America to explore the land of the Incas. In fact, the Hawaiian-born Yale and Harvard educated historian first journeyed south from the United States to complete his study of the great nineteenth century liberator Simon Bolivar.\nITEM #: LKH024\nLicensing: Available Inquire\nPrint sizeType of PrintEdition of \n20 x 24 inchesArchival pigment on paperxLimitedInquire\n30 x 40 inchesArchival pigment on paperxLimitedInquire\nRing of Fire, Myanmar  Blowing Quiwicha, Sacred Valley Five Monks, China", "pred_label": "__label__1", "pred_score_pos": 0.80014568567276} {"content": "An Act of Love\n\nWhen it is revealed that Sethe killed her own child in order to keep all of her children from entering slavery, the reader has mixed emotions on how to feel. After all, she did murder her own baby, how could a person do that. But Sethe’s act, as horrid and appalling as it was, was one out of love. She loved her children so much, she could not bare to see them in the grasp of slavery in their lifetime.\n\nUnder the institution of slavery, Sethe as a mother decides to express her love for her children by in her own way, protecting them from the many destructive aspects that come from slavery. If we look through Sethe’s eyes and into her situation, would we do the same? Because of her act, Denver and her 2 brothers grew up free. Was the price of one child worth the three lives it saved?\n\nBy making us consider this, Morrison is finding ways to make the reader really place themselves in Beloved and the necessities that were felt back then. As an African American woman in 2019, I could not fathom having to make a choice like Sethe. Although her choice was one that will forever haunt her dreams, Sethe’s bravery to even consider something like that in order to save her children is what I admire.\n\nSaeed’s Perspective on American Nativeness in Exit West and the Current World\n\n\n\n\n\nExistentialism in Groundhog Day\n\nAll throughout Camus’ book, The Stranger, the main character Meursault has an outlook on life that stuns everyone he comes across, whether it be his girlfriend Marie or his lawyer when he is in prison. Despite how society views Meursault as a person, he refuses to change any of his beliefs, even when it ultimately leads to his death.\n\nAfter reading the stranger, I began thinking of whether I have seen any examples of this kind of existentialism in other works. I was reminded of the movie Groundhog Day, where the main character, Phil Connors, is forced to repeat the same day over in a town that he mocks for celebrating Groundhog Day. Eventually after a while, Phil views time as a pointless construct that is just a repeated thing, day, and idea.\n\nFurther into the movie, Phil goes on to develop an existentialist point of view that is very similar to Meursault’s. He feels as if life itself is just repetitive, so as an individual he can do what he thinks. By the end of this movie though, Phil escapes the loop and finds love in a woman named Rita. This shift in the movie is what specifically contrasts with Meursault’s views on love and life. In The Stranger, Meursault simply just does not believe in loving Marie because it did not mean anything.\n\nAlthough Phil Connors and Meursault have similar views at one point, they both end their stories going in two different directions, one being finding love through others and the other being that things like love and death are essentially meaningless.", "pred_label": "__label__1", "pred_score_pos": 0.9841602444648743} {"content": "Test-ing times, but remedies are at hand\n\nHindustan Times\n\nHindustan Times\n\nAuthor 2019-10-25 11:04:34\n\n\nTo give Test cricket in India a fillip, Virat Kohli says there should be no more than five centres in the country. This has already invited criticism from the cricket administration. However, to go strictly by the numeric value of the Indian captain’s statement is to miss the woods for the trees.\n\nAs I read it, Kohi essentially wants to highlight the primacy of the five-day format. This is badly needed globally if Test cricket is not to be blown away by the T20 razzmatazz, and is particularly relevant in India at this point in time.\n\nWhile Indian cricket—particularly in the five-day format—is at its zenith, spectator attendance has hit a nadir. Consider that just around 50,000 people (give or take a few thousand) attended the three recent Tests against South Africa, and the seriousness of the problem is evident.\n\nThe best Test team in the world is in action. It also happens to be the home team. But Indian fans have remained unimpressed. This is more a tragedy than conundrum and demands the urgent attention and assistance of administrators and players.\n\nPeople of my vintage will recall the days when 50,000 people would attend a single day’s play in some parts of the country. In the 1950s, 60s, 70s and 80s, Test matches in India would be jam-packed, even when second-string teams came touring here.\n\nClear signals\n\nHowever, Test cricket languishes now. There were clear signals from the mid-1990s that spectatorship was not as intense as it used to be even a decade earlier, and would slump further unless some remedial steps were taken.\n\nThe idea of taking Test matches away from traditional centres to smaller cities and associations was to ensure that the popularity of the longest format would remain intact, if not grow. But if the decline has not been arrested, then something’s remiss.\n\nThis is not to suggest that India is the only country where Test cricket is struggling to find fans to fill stadia. The problem’s worldwide. If anything, it’s worse in most countries barring England and Australia.\n\nIndia’s role in stemming the decline becomes paramount because it has the largest number of cricket followers — and the dosh — to do this. What’s been lacking so far is the imagination and conviction to be in the vanguard in this effort.\n\nThe administration has been happy to find succour in data that suggests the following for Test cricket in India has grown. This may well be true in terms of media consumption of the sport. But if it does not find expression in spectatorship, then sport is soulless.\n\nSo what can be done?\n\nIn the Indian context the problem has to be tackled on two fronts. Firstly, by positioning Test cricket differently and emphatically as something to be savoured. The Ashes is a great example of how a sporting legacy can be established, sustained and monetised over unending period of time.\n\nEqually importantly, the spectator experience has to be made fantastically worthwhile. Nobody will spend good money, and suffer for five days with poor facilities (for food, toilet, parking etc.) on a repeat basis when there are so many options for entertainment available.\n\nThere can be other considerations too to popularise Test cricket. Sachin Tendulkar, for instance had mooted free admission for school kids in the last session, which is a splendid idea to initiate the young into the five-day format. Unless they acquire the ‘taste’ early enough, how will they build loyalty?\n\nAt the global level, the World Test Championship is a step in the right direction as is day-night cricket. India has ridiculously spurned the latter so far, which will hopefully change now that new BCCI president Sourav Ganguly has spoken in its favour.\n\nThe biggest influencers in my opinion, however, are still the players.\n\nParticularly relevant today when so many are giving up on the five-day format for easier opportunities and lucre in T20 leagues and such.\n\nThis is where Kohli becomes so important in the current game.\n\nEven as he rides the T20 wave with great success, he’s been pitching even more strongly for Test cricket, leaving no one in doubt which format he finds the most challenging and rewarding.\n\nIt is moot if the world’s biggest player making his preference known so emphatically can help salvage Test cricket. But at least it creates a favourable sentiment which provides some kind of hope.\n\n(Writer is veteran sports journalist. Views are personal)\n\n\nExperience triple speed\n\nNever miss the exciting moment of the game", "pred_label": "__label__1", "pred_score_pos": 0.8087455630302429} {"content": "Eighty-Eight Years\n\n\nTitle Details\n\nPages: 416\n\nTrim size: 6.000in x 9.000in\n\n\n\nPub Date: 08/15/2015\n\nISBN: 9-780-8203-4839-1\n\nList Price: $32.95\n\n\nPub Date: 08/15/2015\n\nISBN: 9-780-8203-3395-3\n\nList Price: $89.95\n\n\nPub Date: 08/15/2015\n\nISBN: 9-780-8203-4829-2\n\nList Price: $32.95\n\nSubsidies and Partnerships\n\nPublished with the generous support of Sarah Mills Hodge Fund\n\nEighty-Eight Years\n\n\n\nSkip to\n\n • Description\n • Reviews\n • Awards\n\nWhy did it take so long to end slavery in the United States, and what did it mean that the nation existed eighty-eight years as a \"house divided against itself,\" as Abraham Lincoln put it? The decline of slavery throughout the Atlantic world was a protracted affair, says Patrick Rael, but no other nation endured anything like the United States. Here the process took from 1777, when Vermont wrote slavery out of its state constitution, to 1865, when the Thirteenth Amendment abolished slavery nationwide.\n\nRael immerses readers in the mix of social, geographic, economic, and political factors that shaped this unique American experience. He not only takes a far longer view of slavery's demise than do those who date it to the rise of abolitionism in 1831, he also places it in a broader Atlantic context. We see how slavery ended variously by consent or force across time and place and how views on slavery evolved differently between the centers of European power and their colonial peripheries-some of which would become power centers themselves.\n\nRael shows how African Americans played the central role in ending slavery in the United States. Fueled by new Revolutionary ideals of self-rule and universal equality-and on their own or alongside abolitionists-both slaves and free blacks slowly turned American opinion against the slave interests in the South. Secession followed, and then began the national bloodbath that would demand slavery's complete destruction.\n\n\n\n\n—Kirkus Reviews (starred review)\n\nIn this meticulously researched study . . . Rael adds detail and nuance to a story with which readers might have believed themselves already well acquainted.\n\n—Publishers Weekly\n\nThis important and vigorously argued study of the process of emancipation in the US, a process that began with Vermont's abolition of slavery in 1777 and culminated with the Thirteenth Amendment in 1865-eighty-eight years-examines American abolition and emancipation over time, broadening the perspective on a story that usually begins with the rise of radical abolitionists in the early 1830s. With its wider chronological lens and hemispheric context, Rael's book is a must-read study of slavery and its end in the US.\n\n—K. M. Gannon, Choice\n\nWhile many historians have built upon the work of Leonard Richards in describing the slave power's domination of US politics in the antebellum era, none have explained it as thoroughly as Patrick Rae! has in his synthetic, yet path-breaking, work on antislavery in the Atlantic. . . . His goal is to explain why it took eighty-eight years and a civil war to end slavery in the United States, and he achieves this through tight, yet thorough, analysis and the elegant, yet clear, prose his works are known for.\n\n—Beverly Tomek, American Book Review\n\nOther historians have increasingly made connections between slavery in the Atlantic and the United States, though Rael does much more than make connections-he succeeds at showing the strong similarities between Atlantic slaveholding societies, while at the same time explaining why this United States retained a strong interest in slavery longer than almost anywhere else.\n\n—James J. Gigantino II, Arkansas Historical Quarterly\n\n[A]n impressive achievement. . . . An ambitious synthetic work such as this is inevitably open to various qualms, protests, and quibbles. Among this work's multiple strengths is that it invites and rewards such critical engagement.\n\n—Matthew Mason, Journal of American History\n\nIn terms of its chronological and geographic scope, Eighty-Eight Years' rivals are few and distinguished. . . . Eighty-Eight Years will prove of great value to scholars in the field of slavery and abolition, as well as those looking to catch up on trends in the field.\n\n—John Craig Hammond, Reviews in History\n\n\nHarriet Tubman Book Prize, Lapidus Center\n\n\nBest Books of the Year, Kirkus Reviews\n\n\nOutstanding Academic Title, Choice magazine\n\nAbout the Author/Editor\n\nPATRICK RAEL is a professor of history at Bowdoin College and one of the general editors of the Race in the Atlantic World, 1700-1900 series. His books include Black Identity and Black Protest in the Antebellum North and African-American Activism before the Civil War: The Freedom Struggle in the Antebellum North. Rael is an Organization of American Historians distinguished lecturer, 2010-2015.", "pred_label": "__label__1", "pred_score_pos": 0.8712416887283325} {"content": "\n\nThank you for your patience.\n\nAortha EVA CAD-CAM (Easy Mill)\n\nAortha EVA CAD-CAM (Easy Mill)\n\nAortha EVA CAD-CAM (Easy Mill) \n\n\nPlease register and log-in to buy this product\n\n\nAortha EVA CAD-CAM Blocks are truly versatile and offer full manufacturing flexibility. Devices manufactured form EVA foam (Ethylene Vinyl Acetate) are lightweight, shock absorbing and very hard wearing. EVA orthotics also retain their shape and reflect body heat.\n\n\nEVA is an excellent material for use as an appliance base for a covered CAD-CAM foot orthotic or alone as the finished device. A higher density gives more control of the foot while lower densities offer increased comfort.\n\nEasy Mill EVA\n\nEasy Mill EVA is also available in block form. Easy Mill is an EVA foam is manufactured from a finer grain of EVA. When using Easy Mill EVA, the residue produced through the milling process is much finer than with standard EVA, meaning any build up is easily to removed. Easy Mill EVA is not as durable as our standard EVA, however it is milled in exactly the same way and will produce quality applications.\n\nDensity (kg/m³)\nA15 - A20 = 90 - 120\nA25 - A35 = 150 - 200\nA30 - A40 = 190 - 230\nA40 - A50 = 270 - 340\nA55 - A60 = 390 - 470\n\n\nAverage Customer Rating: 4 based on 1 reviews.\nWrite a review.", "pred_label": "__label__1", "pred_score_pos": 0.9803583025932312} {"content": "Editor’s Note: Issue 7.5\n\nThere is a structural problem when a sport neglects the responsibilities of its fundamentals.\n\n\nAS YOU RECEIVE THIS ISSUE, Olympians Mike Gebhardt and Lanee Butler will be competing in Sydney, Australia, September 16th to the 24th. While the competition heats up, a movement to replace the current Mistral IMCO with the Formula Class racing program is taking place.\n\nFormula Class is a new concept of racing that has been growing in popularity, especially in Europe, within the past two years. It is supported by the industry and pretty much by all those who represent what windsurfing is today. The concept is fast, fun, and simple. Pick one board and three sails and that is the Formula equipment you will use for the event.\n\nThe idea sounds good and it is far more representative of what modern windsurfing is: performance and early planing, with a restriction on the equipment syndrome. It is indeed a positive step for the future of racing. Even the Professional Windsurfing Association (PWA) sees the Formula as a platform for future World Cup racing. The PWA in recent days has been the biggest lobbyist to get the Formula Class adopted by the International Regulations Committee of the International Sailing Federation (ISF), which was formerly the IYRU.\n\nEven Bjorn Dunkerbeck maintains that if Formula racing gets into the Olympics, he will retire from the World Cup and focus on Formula racing. The long-time champion would be a pretty big carrot for the class and clearly, a new racing formula destined for success.\n\nBut the issue for the ISF is more complicated than it appears and the status of windsurfing in the Olympics is far more consequential than you might think. There is a small group of concerned people, and I would place myself amongst them, who argue that if windsurfing wants to find a quick way out of the Olympics, then the Formula Class is a perfect exit formula.\n\nOne has to consider the fact that the International Olympic Committee, (IOC) is pressed to cut back on the number of recognized sports. Already, they’ve managed to cut back on the number of countries by allowing only the top thirty-six competitors who qualify.\n\nCurrently, windsurfing is one of the eleven yachting events recognized by the IOC. While the Formula Class might be more representative of what windsurfing is today, imposing the class to replace the Mistral IMCO will take it out of the protective brotherhood of the powerful yachting association and place it alone in a vulnerable position. Don’t think for a minute that the IOC is not prone to pick on the weak!\n\nThe issue at hand is performance. The current Mistral IMCO is not the fastest or the sexiest, but it is a sailable platform for winds between zero and thirty knots. It is a tactical light to medium wind machine that can plane into a performance mode or fall into a sub-planing, yachting experience. It is the only class that can bridge the world of windsurfing with that of yachting. And that is what we need to keep it alive in the Olympics.\n\nThe Formula Class only performs in wind ranges higher than six knots. It does not have a centerboard and when underpowered, it has no tactical maneuverability. To gain performance in low winds, it is a high-cost, high-tech game. Even though gear restrictions are in place, compared to the IMCO, it is considerably more expensive.\n\n\nOne could predict a 100% probability that there will be an Olympics when winds do not rise above six knots. There have been plenty of world-class events in the past during which the winds did not support competition. During the Olympic event in Atlanta, sixty percent of the races were held in winds below six knots. So how many times can we expect the IOC to understand the unique demands of windsurfing? The answer might be, zero.\n\nThe day will come when yachting will be asked to reduce the number of classes. The IMCO or a similar product could stand favorably if it upheld the following advantages: 1) affordability, 2) excellent global participation for the average man, and 3) a strict one-design and simple race management.\n\nI took a prototype board similar to the IMCO out yesterday in winds of zero to six knots. To my surprise, three hours went by as I found great pleasure in playing with the cat-paw winds. Access to this wind range is a part of windsurfing we’ve all forgotten. If more and more people can find such activity, this sport will grow once again. Unfortunately, the Olympics offer the last arena where competitive windsurfing exists in such a wind range. For the sake of the future, it should be preserved as a form of yachting, no matter how distant the sport has moved from the roots.\n\nThere is a structural problem when a sport neglects the responsibilities of its fundamentals. Windsurfing has suffered such neglect. It has become an elitist toy for those blessed by an abundant wind. The desire to replace the IMCO with the Formula Class arises from a hangover caused by the intoxication of excessive wind.\n\nLet’s hope the hangover will pass soon.\n\nJohn Chao\n\nFor more comments turn to A New Formula or Status Quo? by Bruce Kendall\n\nby John Chao\n\nPublisher / Editor of American Windsurfer is a former photojournalist for GEO, National Geographic and Time-Life Magazines.", "pred_label": "__label__1", "pred_score_pos": 0.6932144165039062} {"content": "Geospatial – News\n\nOpenLayers 3: geolocation with map orientation\n\n2 Mai 2014\n\n\nWith the wide availability of Web technologies, more and more GIS applications are available online and accessible from mobile terminals. New use-cases are attributed to this mobility. Users expect to geolocate their position on a map as well as to use the map application for routing/navigation purposes.\n\n\n •     geolocation\n •     navigation\n •     animation\n •     HTML5 Geolocation API\n •     OpenLayers 3\n\n\nGeolocation requires to recenter the map on the user’s position and highlight this position with a marker. In a routing context, the map will pan in order to keep the position of the user at the center of the map. Besides, the map will turn so that the top of the map is always the direction the users is going towards, simplifying the map interpretation and the user orientation.\n\nGeolocation/navigation in a nomad context is not easy, since routing implies frequent position changes as well as variations of the geolocation precision. Even though the HTML5 APIs provide raw position and direction information, their use as such is not sufficient since there is position or orientation skipping resulting in jerkily moves on the map.\n\nSmooth user position and direction need to be implemented on the basis of the information provided by the HTML5 geolocation API.\n\n\nTo reach this goal, the raw information provided by the geolocation API is temporarily stored in a vector suite allowing to interpolate and to smooth out information before its transfer to the map.\n\nTechnically, we processed as follows:\n\nWhen a new position is provided by the geolocation API, a new point is added to a LineString XYZM-type geometry. This 4D geometry allows to store different positions when moving. The Z coordinate is actually used to store the orientation and M, the time. Thanks to suite of points, the X, Y and Z values can be interpolated for all M time, relying on the “getCoordinateAtM” method provided by OpenLayers 3.\n\nTo animate the map as smoothly as possible, we use the animation framework of OpenLayers 3. For each frame, via the function „beforeRender“, we change the center and rotation values of the frame state. In this way, it is guaranteed that we do get with a millisecond precision the interpolated value corresponding to the current frame, regardless of the refresh frequency rate (which depends on the browser performances), at the instant t. (cf.\n\nParticular attention has been paid to the management of map rotation angles. Angle rotation changes over 180° must be avoided so not to make the user dizzy. For instance, when the direction goes from 20° to 350°, a 30° counterclockwise rotation must be made and not a 330° clockwise rotation.\n\n\n\nThanks to the internal mechanism of animation management, a fluid animation throughout the user moves leads to optimal user comfort.\n\n\n\nYou can directly test the example if you have a smart phone.\n\nYou can also test the application by simulating a move from a sample of real data.\n\n\n •     live example\n\n\nTo improve even more this example, we could for instance represent the precision factor (accuracy) of the geolocation as a circle around the user position.\n\nWe could also adjust the resolution of the view based on speed. The precision would then be greater at a slow speed, and smaller at a greater speed.\n\nFinally, we could position the map on the basis of information provided by the compass when the speed is 0 rather than repositioning the map with the North pointing up.", "pred_label": "__label__1", "pred_score_pos": 0.9879031777381897} {"content": "+1 917 993 96 90\n\nFor installation of the Grid of Gunn you should select the insertion menu item - \"Gunn\" - \"Gunn's Grid\"\n\nGunn's grid completely consists of Gunn's Lines.\n\nGunn's line is one more type of trend lines - the most frequent tools for the analysis of a trend in the market Forex. It represents the line drawn at an angle in 45 degrees. This line is also called \"one to one\" that means one change in price to a unit of time.\n\nAs it was already said, Gunn's lines always represent powerful lines of support\n\nor resistance\n\nand intersection of each item can create powerful impulse for further movement.\n\nWe will study the picture. It is visible that when the prices are over the rising line, it means that the market adheres to the bull direction.\n\nWhen the prices are under the falling line it means that the market adheres to the bear direction\n\nСетка Ганна является мощным инструментом, но ее не рекомендуется использовать начинающим трейдерам , так как при неправильной установке она будет давать неправильные сигналы на покупку или продажу.", "pred_label": "__label__1", "pred_score_pos": 0.999178409576416} {"content": "On the fast train from Brussels to Paris a few years ago, I met a young woman from the Philippines who was taking a weekend holiday from her job in Belgium to visit France for the first time. As the train entered the outskirts of Paris, she turned to me and said in surprise, “I didn’t realize the French were a black people.” It was my turn to be surprised, until I looked out the window and saw that we were in the banlieues, the segregated neighborhoods consisting largely of West and North African “immigrants” that ring the city. I put “immigrants” in scare quotes because many of these people are long-term residents of France; indeed, many of them are citizens. The word is nonetheless regularly used in France to distinguish them from the Français de souche—the legitimate (white) members of the nation.\n\n“Immigrant” has become a kind of epithet these days, and not only in France. Everywhere in Europe, and also in the United States, immigrants are blamed for all manner of problems: crime, unemployment, disease, the deterioration of public services, the exhaustion of public funds, threats to liberal culture and mores. Right-wing populist politicians in nearly every country of the Western Hemisphere appeal to voters with plans to cleanse the national body of these impure invaders, to expel them, to build walls to keep them out. References to a “crisis” of immigration have become a convenient way to talk about many other things as well: race, ethnicity, religion, gender, and, especially, the human costs wrought by global capitalism and the growing inequalities it has engendered within and across the nations of the world.\n\nThese references to an “immigrant crisis” antedate the arrival of waves of refugees fleeing war and violence in Africa and the Middle East; the recent refugees have only heightened the discourse. Three new books attempt to see beyond the contours of the current crisis and to tap into a deeper set of economic, political, and cultural anxieties. Rita Chin’s The Crisis of Multiculturalism in Europe offers a comparative history of the ways in which politicians in several Western European nations have dealt with growing numbers of non-Western immigrants from the 1950s to the present. Sara R. Farris’s In the Name of Women’s Rights examines the unlikely convergence in recent years among right-wing nationalist political parties, neoliberals, and certain feminists around the question of “emancipation” and non-Western—particularly Muslim—women in France, Italy, and the Netherlands. Rafia Zakaria’s Veil shifts the balance away from white secular Europe toward the experience of Muslim women, mapping the stereotypical representations of the veil in Western culture and then reflecting, in an intensely personal way, on the many meanings that the veil can have for the people who wear it.\n\nDespite their differences, these three books illuminate how Western liberal democracies, since the 1950s, have struggled to develop strategies to manage diversity in societies once considered homogeneous—secular, white, and Christian. Although some of the nations of the West were long used to assimilating other Europeans, the arrival of former colonial subjects was a different matter. Viewed through the racist lens that had justified imperial conquest, these brown, mostly Muslim people were seen not only as different but as inferior. Their difference was also seen as a threat to European national identity. It was one thing to tolerate their presence as a temporary solution to shortages of labor; it was quite another to consider them and their families as permanent residents with the equal rights of fellow citizens.\n\nIn her well-researched volume, Rita Chin, a professor of history at the University of Michigan, provides detailed information about the different policies developed in the countries she studied: France, Germany, Britain, Switzerland, and the Netherlands. By comparing them, she highlights not only their different policies but also their overarching similarities: Cultural racism is the underlying stance taken in the face of increasingly diverse ethnic and religious populations.\n\nChin calls this diversity “multiculturalism,” a term that—despite a whole chapter devoted to its various definitions—remains confusing in her various usages. It is Chin’s word for describing an objective reality and for invoking the policies that developed in response to this reality. It is also an epithet employed by European politicians in the 1990s to distinguish their policies from the reviled American ones, which viewed multiculturalism as a positive respect for ethnic and racial differences. By using the same word to denote the nature of diverse populations and the discourses about them, Chin’s study loses a certain analytic acuity. Still, it offers a rich historical account of the continuities and changes in immigration policy in the countries she studied.\n\nChin’s account begins with labor recruitment. She notes that guest-worker programs took off after World War II and flourished in the expanding economies of the 1960s. When European laborers were scarce, men were recruited from the former colonies: “The twin concerns of empire and labor…drove the emergence of multicultural societies.” For these newcomers to Europe, programs were set up by their hosts that encouraged expressions of religious and cultural difference as a way of maintaining the workers’ attachments to their countries of origin and in the expectation that when the jobs were done, they would return home. For example, religious leaders were imported from these workers’ home countries. The policies had little to do with multiculturalism, in the sense of positively recognizing the plural nature of European nations. In fact, it was quite the opposite: They sought to ensure the disposable and replaceable nature of the migrant labor force as a “reserve industrial army.”\n\nWhen guest workers were no longer needed during the economic downturn of the 1970s, Western European leaders moved to close their nations’ borders and end the recruitment of foreign labor. But they were faced with a dilemma they couldn’t easily resolve: These workers had been bringing their families in the preceding decades with an eye to settling on European soil, and they had been living in Europe in communities that had been encouraged through various state-sponsored programs to express their religious and cultural differences. Now Western European countries had to come to terms with their own labor and cultural policies, having inadvertently brought the empire home. “The nearly twenty-five year scramble to procure foreign workers,” Chin writes, “had resulted in the permanent settlement of transient labor that was increasingly nonwhite, non-Christian and non-\nEuropean.… Communities of different ethnicities, cultures, and religions increasingly lived side by side with the British, French, Dutch and Germans, spawning multicultural societies throughout Western Europe.”\n\nAn aspect of this story that Chin doesn’t emphasize enough is the vast economic problem posed by the presence of these now unemployed or underemployed surplus laborers and their families, who found themselves doubly disadvantaged by their cultural difference. But she does describe in detail the various strategies that national leaders developed to deal with the presence of these guests who had now overstayed their welcome. The strategies included policies that promoted views of ethnic and racial groups as separate, balkanized identities and euphemisms about improving “race relations” that denied the structures of discrimination that poisoned them.\n\nThese strategies also included calls for assimilation and integration that placed the burden of religious and cultural accommodation on the migrants themselves. For the most part, Western European countries did not want to acknowledge “how radically their societies had changed,” and many politicians sought to depoliticize a situation that would soon explode, despite their best efforts, into furious debates about race, immigration, and national identity in the late 1980s and 1990s.\n\nFor many countries in Western Europe, 1989 seems to have been a turning point: the moment when a series of developments focused new attention on immigrants, especially Muslims. In France, the celebration of the bicentennial of the French Revolution coincided with an important electoral victory for Jean-Marie Le Pen’s National Front (attributed to the success of his anti-immigrant campaigns) and the first of the affaires du foulard (the attempt to prohibit girls wearing Muslim head scarves from attending public schools). The Berlin Wall also came down in the fall of that year, opening up discussions on the meaning of democracy (free markets and sexual liberation included), as well as a flood of cheap immigrant labor from Eastern and Central Europe. These new immigrant workers were considered a problem, but nowhere near as much as Muslims, especially after the Ayatollah Khomeini issued his fatwa against the novelist Salman Rushdie, creating an international cause célèbre and hardening many liberal Europeans’ views on the subject of Islam.\n\nChin points out that the fatwa was particularly decisive for many Europeans who were already worrying about the growing number of Muslim immigrants and citizens within their countries. “For many Western Europeans,” she writes, “this was the moment when Muslim immigrants with diverse national origins merged into a single, distinctive category. This was also the moment when Islam was first identified as unbending, an intolerant religion that explained Muslim immigrants’ failure to properly integrate…. [T]his was the pivotal juncture when Islam itself came to be seen as a central threat to ‘liberal values’…across all the major Western European powers.”\n\nAs many celebrated the victory of liberal democracy over communism, commentators also began to point to the “failure” of multiculturalism and its policies of recognition and appreciation of diversity. But what they meant by “failure” was not that the policies failed to create more welcoming societies, but rather that Muslim culture simply wasn’t compatible with the national traditions of European countries. Throughout Europe, “their” culture was defined as antagonistic to “ours.” In what some critical scholars came to call “the new racism,” culture became a byword—and not only among the European right. As Chin notes, it had “supplanted biology as the key marker of incommensurable difference.”\n\nChin cites comments by Margaret Thatcher in 1978 as an example of what she characterizes as this new wave of “cultural nationalism.” Reacting to a report that projected the arrival of millions of people from Pakistan in the United Kingdom by the end of the century, Thatcher observed: “Now, that is an awful lot and I think it means that people are really rather afraid that this country might be rather swamped by people with a different culture. The British character has done so much for democracy, for law and done so much throughout the world that if there is any fear that it might be swamped, people are going to react and be rather hostile to those coming in.”\n\nThis increasingly politicized fear of European culture being “swamped” soon became a “clash of civilizations,” a term coined by the Islamic scholar Bernard Lewis in 1990 and then popularized in a 1993 article by the political scientist Samuel Huntington. The term deliberately evoked the religious wars of the medieval period in order to rally the forces of contemporary Western Christian secularism in a crusade against the Muslim enemy. To disarm this foe, the states of Western Europe enacted laws and regulations that ranged from criminalizing certain individual displays of religious affiliation to limiting the height of the minarets on mosques. In their attempts at containment (euphemistically referred to as “integration”), these European nations tightened the eligibility requirements for entry and naturalization, as well as proposed tests of cultural literacy and linguistic mastery for migrants from Muslim and other non-Western countries. In effect, as the sociologist Sara Farris points out, immigrants were expected to possess knowledge of their new country “before the actual contact with [it] begins.”\n\nFarris’s In the Name of Women’s Rights is more theoretical in its approach, offering a supplement to Chin’s historical narrative that focuses on the specific question of non-Western women migrants, most of whom are Muslim. Whereas Chin offers one chapter on women and gender, Ferris devotes her entire book to that subject.\n\nBeginning in the 1970s and ’80s, Farris argues, non-Western immigrant women “became the object of political scrutiny and stereotyping. Typical orientalist gendered dichotomies began to be applied to them: if migrant males were usually depicted as brutes and uncivilized, women were portrayed as passive and submissive.” By contrast, Western European women were deemed autonomous and empowered by, among other things, laws that now permitted divorce and abortion and addressed discrimination in education and the professions, as well as cultural practices defined as “sexual democracy” or “sexual liberation.”\n\nMany of these new feminists and nationalists turned their attention to the veils worn by Muslim women, arguing that they were the very symbol of the immigrants’ purported backwardness, the sign of an intolerable gender inequality alien to the West. The push to rescue Muslim women, Farris argues, was the result of what she terms the “ideological convergence” of calls for gender equality with xenophobic anti-immigrant campaigns—the “femonationalism” mentioned in the subtitle of her book. Femonationalism, she explains, “describes, on the one hand, the attempts of Western European right-wing parties and neoliberals to advance xenophobic and racist politics through the touting of gender equality while, on the other hand, it captures the involvement of various well-known and quite visible feminists and femocrats in the current framing of Islam as a quintessentially misogynistic religion and culture.”\n\nFarris argues that the political anxiety about Muslims in general took the form of advocacy for the emancipation of Muslim women in particular because of “a specifically economic logic”: Whereas Muslim and other non-Western migrant men were viewed as a “reserve army of labor”—that is, a supplemental labor force to be employed only when needed—their female counterparts, working in the domestic-service and care industries, were seen as a part of the “regular army of labor,” constituting an indispensable, irreplaceable labor force that could not otherwise be found. This labor force was needed, Farris notes, to secure the social reproduction of the population itself.\n\nThe importance of this migrant female labor force to the social and economic well-being of Western nations was evident in the state policies of the countries that Farris studied: France, Italy, and the Netherlands. These countries provided a variety of subsidies to families for domestic service and elder and child care, sometimes in the form of cash payments, sometimes as tax credits. In this way, they at once commodified and privatized social services, for which Muslim and non-Western migrant women provided “the lion’s share of supply.” This work was defined by government agencies as necessary and vital; it was also considered a permanent feature of the job markets of these countries, a way of helping Muslim women to integrate socially and culturally.\n\nSince they did not compete with native women workers, and as a result of what Farris notes were the “neoliberal reforms in welfare regimes in the direction of the so-called commodification of care [and]…the feminization and racialization of specific labor markets,” migrant women workers were critical to the economy, and so they became defined not as a liability but as victims to be saved. Nationalists turned to the language of secular feminism in order to criticize the way in which these women were oppressed by their cultural and religious norms—as embodied by their veils. Likewise, many European feminists insisted that it was precisely “care” work that would “save” Muslim women by providing them with wage-earning labor that was inherently emancipatory.\n\nThere is an irony in this, as Farris observes. The European feminists’ insistence that migrant women’s autonomy would be furthered by the work of domestic service defined as liberating the very household drudgery that these feminists had long sought to escape. There is both a racist and a sexist element to this, Farris says, because “they reinforce the conditions for the reproduction at the societal level of Muslim and non-Western migrant women’s segregation, traditional gender roles, and the gender injustice they claim to be combating.”\n\nVeil, the highly personal meditation by Rafia Zakaria, a journalist and philosopher of Pakistani origin, provides a voice from the other side of the story recounted by Chin and Farris—a voice that is rarely listened to by the politicians and feminists who associate unveiling with the liberation of Muslim women.\n\nIn a series of chapters that reflect on her own personal experience (wearing a full-face veil at her traditional Muslim wedding in Karachi; watching her grandmother drape a veil around her face when men got too close to her in the market; observing women at the Finsbury Park Mosque in London), Zakaria explores the many meanings of the veil as it is worn and observed. Each chapter has a different theme, among them submission, purity, rebellion, feminism, and subversion. Zakaria’s style is associative, not linear; no single line of argument is developed. The aim is to appeal to personal experience as a way of establishing authority for her assertions, and also as a way of evoking sympathy in the reader (who is presumed to be Western).\n\nVeils, Zakaria argues, offer a range of subjective and objective meanings that depend on the “particularities of person and politics and context.” Indeed, one of the many meanings of this piece of cloth is that it can be a form of empowerment for the women who choose to wear it. “Independent of context, it does not have much meaning,” but in specific settings (within and outside the Muslim community), the veil can have many positive ones: as a sign of submission to one’s faith, or an individual’s purity, or her desire for collective, communal identification. It can also, Zakaria argues, give a certain sense of pleasurable power: that of seeing without being seen. Its wearing can sometimes signal rebellion—a challenge to the Western European “aesthetics of the public sphere”—and even a certain strain of feminism, allowing women to express their individual autonomy.\n\nZakaria’s approach also differs from Farris’s and Chin’s in its scope. Chin has a chapter on how veiled women became, in the 1990s, evidence of Islam’s cultural incompatibility with the West, and Farris, expanding on this, examines how, for European nationalists and feminists, the veil became a symbol of how Islam denies Western liberalism’s ideal of sexual democracy. Zakaria’s explanation is at once narrower and more directed to the present. She is less interested in the deep historical roots of the immigrant question; instead, she frames her argument within the context of the so-called War on Terror that began in the early 2000s. This draws her readers’ attention to the present political implications of the veil. “The fully veiled Muslim woman,” Zakaria explains, “once imagined as singularly exotic and repressed, an emblem of the harem of old, ripe with forbidden sexual possibility, did not fit into [the] rhetoric of the War on Terror. That War could no longer be based simply on the demonization of the Muslim man; it required an extension of suspicion to the Muslim woman, particularly the Muslim woman who was not willing to do away with the veil.”\n\nIf Chin offers us history and Farris sociological theory, Zakaria’s more personal, philosophical approach is intended to contest the singular meaning that the veil has acquired in much of the West. By exploring the subjective experiences of the veil, we begin to see how both wearing it and not wearing it have profound psychic resonances for those who make these choices, as well as for those who regard it with hostility or even just curiosity. In one notable example, Zakaria writes of the desire of white women in the days of empire to unveil “other” colonized women, a desire that established their superiority as representatives of a higher civilization. Or, referring to the work of the Iranian-American artist Shirin Neshat, Zakaria notes the startling message conveyed in a photograph of a fully veiled woman pointing a gun at the viewer: “A veil is revealed then to be not just fabric but a partition and a boundary…. To put the veil back on, to retreat into feminine space, is a wish for reclamation.”\n\nThese psychic resonances of the veil—“desire,” “wish”—deserve more attention in analyses of Islamophobia in general and of the place of veiled women within it in particular. But the representation of Muslim women as sexually repressed is key to understanding these resonances, and it is underexamined by all of these authors, including Zakaria. In the course of the 21st century, sexual liberation (the individual’s ability to sleep with whomever she chooses) has come to be equated with gender equality and with freedom more generally, eclipsing all of the other measures of equality that might be used. A certain form of sexual desire (that experienced by the autonomous individual of liberal political theory) is presented as universal and natural, not as a culturally produced artifact of the West. This view of things elicits a visceral repugnance to the alleged perversions of Islam: “We” project our experience of thwarted desire onto “them.”\n\nAs a result, the stark contrast between Islam and the West on the question of sexual liberation confirms the West’s sense of its own superiority in the matter of gender equality, even as it conceals the vast discrepancies in wealth and status. In this way, the binary that many liberals, feminists, and nationalists invoke—sexual freedom versus sexual repression—translates discrimination (based on economics, race, class, or religion) into a moral virtue that quarantines the bad influences these immigrants bring with them. It is not the poverty or exclusion they experience in our societies that defines “those people” as unacceptable, but rather their retrograde beliefs and behaviors, especially around issues of sex. At the same time, the belief that “our” system of gender relations is universal and natural while “theirs” is perverse soothes the anxieties and uncertainties that haunt the relations between the sexes on “our” side.\n\nIn France, as I have suggested elsewhere, the veiled woman is perceived as deeply disquieting because her veil suggests that sexuality presents a problem for social relationships that must be addressed by declaring sex off-limits in public space. This is a challenge for a republican political system that, on the one hand, promises equality for all and, on the other, has historically excluded or subordinated women because of the difference of their sex—a difference that has to be openly displayed as justification for their different treatment. If gender equality is defined only as sexual emancipation, then all of the other inequalities faced by women in France—political, social, and economic—are made to disappear, and existing gender norms are held firmly in place. The fantasy of freedom is sustained by comparing uncovered French women with those Muslim women covered by the veil. Although political cultures vary in the countries of Western Europe, something similar operates in all of them.\n\nThere is clearly a crisis of immigration in Europe. It is evident in the deadlock between an increasing insistence by politicians on the homogeneity of cultural nationalism, on the one hand, and the presence of diverse populations within national borders, on the other. It has only intensified in the wake of the arrival of hundreds of thousands of refugees from the war-torn and economically devastated countries of the Global South. We are at a turning point (one of the meanings, after all, of the word “crisis”): Will those “black people” that we glimpsed from the train, and who are sequestered in the banlieues, ever be accepted as fully French? Will the day come when I would react not in surprise but in affirmation to that young woman (“Yes, some French are black”)? And what of Western feminism? Is there a path away from the binaries of “West/East” and “sexually liberated/sexually repressed” that might yield a more genuinely inclusive vision of what emancipation and gender equality could mean?\n\nA glimmer of what might be possible on this last question came from a collective of women in France—Muslim and non-Muslim, religious and secular—that was formed during the debates over the head-scarf law in 2003–4. These women declared that they were opposed to all forms of domination, whether patriarchal, capitalist, or state-imposed: no forced wearing of the veil, no forced removal of the veil. By focusing on domination as the common denominator, the women found a way out of all those other politically and culturally divisive binaries—not by denying their power, but rather by offering a way to place them in their proper context.\n\nOn the subject of refugees and the masses of migrants pouring into European cities from Africa and the Middle East, these authors offer different perspectives. Chin suggests that, on the ground, there is more genuine integration than the politicians would care to admit, and that this provides hope for the future of multiculturalism. Zakaria offers her book as an “object lesson” (the name of the series to which it belongs) on the multifaceted nature of cultural signs, as a way of trying to influence, and so change, stereotypical representations of the veil. Both seek to bring ideas more fully into compliance with reality, as if the two were distinct realms, even as they recognize their interdependence. For Farris, too, material interests and rhetorical expression are inextricably entwined; she emphasizes how the structures and ideologies of discrimination are at once productive of and deeply rooted in economic interests. Her reading of “femonationalism” as a symptom of neoliberal capitalism gives little hope that a quick or effective solution is possible for the crises at hand.\n\nSo we are left without certain answers, and that’s as it should be: The goal of these books is not prediction but critique. And in that regard, they are useful and important, providing needed insight and detail to deepen our understanding of how we got here—a necessary step for thinking about whether and how we might be able to move to a better place.", "pred_label": "__label__1", "pred_score_pos": 0.9045340418815613} {"content": "Identify the tools for business planning and decision making\n\n\nIn this step, experience and effectiveness of the judgement principles come into play. What is the aim? Be careful when extrapolating or projecting figures to avoid magnifying initial mistakes or wrong assumptions.\n\nBrainstorm and analyse the different choices For this step, brainstorming to list down all the ideas is the best option. Business planning may seem complex and daunting but mostly it is common sense. Decision-making mistakes There are a few common mistakes people make during the decision-making process that could result in a poor choice.\n\nThe term 'business planning' itself covers all sorts of different plans within a business, or potentially within a non-commercial organization. SWOT stands for strengths, weaknesses, opportunities and threats, which is exactly what this planning tool assesses.\n\nGrand visions need solid foundations. Does the problem have a deadline or a specific time-line? What are we actually aiming to achieve? For each opportunity, ask the teams to assess the overall potential and overall challenge of each option, using the criteria described in Worksheet 2.\n\nThe business entity could also be a proposed start-up, a new business development within an existing organization, a new joint-venture, or any new organizational or business project which aims to convert action into results. In addition, there can be dozens of factors involved and affected by the problem.\n\n\nThe sales may drop after a year or so of being on the market. Conclusion When it comes to making decisions, one should always weigh the positive and negative business consequences and should favour the positive outcomes. Business planning always starts with or revisits the basic aim or need to provide products or services to customers - also called a market or 'market-place'.\n\nEncourage players to think wide and broad.\n\nDecision Making Process\n\nWhat are your projected selling costs and net contributions per service, product, sector? Cause-and-Effect diagram helps you to identify all possible causes of the problem and Pareto chart helps you to prioritize and identify the causes with highest effect.\n\n\n\nThe metrics presented in the report deliver the measurement system, which, alongside the framework, offer a standardised way to address a range of business questions about packaging sustainability, either within a company or between business partners. This means that most business plans are driven by marketing, since marketing is the function which addresses market opportunity and need, and how to fulfil it.\n\nIdentification of the purpose of the decision In this step, the problem is thoroughly analysed. An Agile Focus strategy clearly defines your primary focus, the opportunities that you will keep open for backup or future growth, and those that you put aside for now.\n\nAdvantages & Disadvantages of Financial Statement Analysis in Decision Making\n\nThen, you can move on generating all possible solutions alternatives for the problem in hand. Terry Li, Manager Rancho Management Our public consultation services require easy-to-configure and user-friendly digital platforms, and our recent pilot of Ethelo in a community planning project was a successful collaboration.\n\nBased on Market Patterns One disadvantage of using financial statements for decision making is that the data and figures are based on the market at that given time.Decision making under risk is presented in the context of decision analysis using different decision criteria for public and private decisions based on decision criteria, type, and quality of available information together with risk assessment.\n\nDecision-making tools and techniques While the basic principles might be the same, there are dozens of different techniques and tools that can be used when trying to make a decision. This paper attempts an empirical examination of the practicality of strategic management accounting (SMA) adoption in banks in Nigeria, a developing country.\n\n\nReach smart, broadly supported decisions quickly, by harnessing the collective intelligence of diverse stakeholders. Embrace complexity, and avoid the risk and polarization of simplistic “for” and “against” decision-making. Quotes.\n\nProblem Solving\n\n\nIdentify the tools for business planning and decision making\nRated 4/5 based on 13 review", "pred_label": "__label__1", "pred_score_pos": 0.9998955726623535} {"content": "Searching For Ice And Ocean Biogenic Activity\nOn Europa And Earth\n\nJoan Horvath, Frank Carsey, James Cutts, Jack Jones, Elizabeth Johnson\nBridget Landry, Lonne Lane, Gindi Lynch (a)\nKen Jezek (b), Julian Chela-Flores (c), Tzyy-Wen Jeng (d) and Albert Bradley (e)\n\n(a) Jet Propulsion Laboratory, California Institute of Technology,\n4800 Oak Grove Drive, Pasadena CA 91109\n(b) Byrd Polar Research Center, Ohio State University, 1090 Carmack Rd, Columbus OH 43210\n(c) International Centre for Theoretical Physics, Office 275, P.O.Box 586,\nStrada Costiera 11, 34136 Trieste, Italy.\n(d) Abbott Diagnostics Division, Abbott Laboratories, Abbott Park, IL 60064\n(e) Woods Hole Oceanographic Institution, Woods Hole, MA 02543\n\n\nOne of the more likely places in the solar system for the existence of extraterrestrial life forms is the Jovian moon Europa. It has been postulated that a volcanically-heated ocean is likely to exist underneath Europa's icy surface. If a detailed remote-sensing reconnaissance of Europa determines that an ocean does exist under the ice, then in-situ measurements will be needed to directly explore the Europan ocean and the ice that lies above it. In order to make quantitative measurements of the Europan environment, a lander spacecraft capable of penetrating the surface ice layer by melting through it is proposed. This vehicle, dubbed a \"Cryobot\", will be designed to carry a small deployable submersible (a \"Hydrobot\") equipped with a complement of instruments. The design of an instrument package to search for life across the wide range of thermal and pressure environments expected on Europa, the issues in sample handling, and long-term reliability for a potential multi-year transit through the ice all present difficult design issues. Opportunities for performing investigations of deep, submerged Antarctic lakes on Earth are described which would test the Cryobot/Hydrobot system while collecting intrinsically valuable terrestrial science data.\n\nKeywords: Europa, exobiology, instrumentation, submersibles, ice probes\n\n\nObservations of the icy Jovian moon Europa by the Galileo spacecraft were acquired at the same time that the scientific and public excitement over the meteoric findings suggesting life on Mars peaked. These events have served to stimulate conceptual planning for a mission to Europa to search for signs of life in the water presumed to underlie its thick surface ice. Since substantial ice covers are also found on Earth, and there is a long history of research into these ice sheets, ice caps, floes, and glaciers, it is useful to examine the scientific and technical benefits in a joint study program for both planets. The planetary exploration program and terrestrial glaciology and oceanography programs have numerous objectives and requirements in common. Here, we examine scientific objectives and observational technologies likely to be of interest to terrestrial and planetary science over the next and outline an integrated development program for those technologies, where appropriate.\n\n\nStudies of ice sheets and caps are generally devoted to reconstruction of past climates or to understanding the current state of the ice cover, ie., mass balance and stability, from the perspective of possible catastrophic changes in sea level. The climate studies focus on the chemical composition and dust character in the annual layers laid down by snow deposition. Those analyses can go back for over 250,000 years in the, caw of the East Antarctic ice sheet, which is over 4 km thick in its central regions. Studies of contemporary processes concentrate on obtaining observations at depth of ice temperature, velocity, and rheology. In general there remains strong interest in measuring ice sheet chemical and physical properties over space and time. New information about the extent and depth of the large (nearly the size of Lake Ontario) subglacial lake discovered near Vostok Station, East Antarctica, is sparking renewed interest in that site and others. The lake is covered by approximately 4-km duck ice. The lake water chemistry and lacustrine sediments may contain a reoord of early ice sheet development, since the lake may have been isolated for significant geological time. There is also speculation that the lake may provide a suitable habitat for simple life-forms and that it may be volcanically heated. If so, it might provide an excellent simulator for Europa's oceans.\n\n\nJupiter and Saturn each possess satellites covered with ice. Jupiter's moon Europa is particularly intriguing because of its position in the Jovian systern. Europa is strongly tidally flexed due to the influence of Jupiter as well as other nearby satellites. This flexing is thought to be the mechanism leading to volcanism on lo, a nearby Jovian satellite, and it is speculated that Europa has volcanic activity beneath its ice as well. Europa's cracked icy surface (Figure 1) is therefore thought to cover an ocean of volcanically-heated liquid water. A primary goal of an early mission will be to determine whether Europa's ice does in fact cover a liquid ocean, and, if so, the depth below the surface of this ice-water interface. Current estimates of the ice thickness range from I to 100 kin. Surface conditions on Europa are estimated to be a temperature of approximately 100 K and a pressure of -11 bar. Acceleration due to gravity on Europa is 13 m/s2.. The conditions at the ice-water interface would depend upon the actual ice thickness; if the ice is 100 Ian thick pressures would be approximately 2 kbar and temperature would be 270 K. Under these conditions the entire ice sheet is most likely composed of Ice 1, the most common form of water ice on Earth under normal conditions. The smallest of the four large Galilean satellites of Jupiter, Europa has a mean density of 3040 kg/m3, a value intermediate between those for icy satellites, such as Ganymede or Callisto, and the rocky satellites, such as Io or the Moon. Schubert et al.' proposed that if Europa were composed of a simple mixture of water ice and rocky material similar to that of lo or the Moon, then it would have a bulk water content of at least 5% by mass. Further, if all the water ice were concentrated in a single surface layer its depth would exceed 100 Ian. Observations of Europa made by the Voyager I and 2 spacecraft revealed that the surface is predominantly composed of water ice, with considerably fewer impurities than are present on Ganymede or Callisto. Of particular interest to the scientific community is the possible existence of extraterrestrial biological activity due to presence of liquid water under the icy surface. Several scientists\" have calculated that based on radioactive heat sources and heat transported by conduction, Europa could have a water mantle a total of 100 kin thick comprised in part of a liquid water layer 50 kin deep. However, other authors have opposed this idea because their calculations show that such a water layer would freeze in a very short time compared to the age of the satellite. Peale et al.5 and Cassen et al.6 calculated the rate of tidal heating in an ice shell above a liquid water layer on Europa. They suggested that the heating rate was large enough to prevent the ice from thickening and a liquid layer could therefore be maintained under the ice crust.\n\nFigure 1. Visible image of Europan equatorial zone taken 27 June 1996. Image size approximately 360 x 770 km, 1.6 km resolution.\n\nTo date, these results prove inconclusive because the calculated structure depends largely on coarse-resolution data. Observations of the surface indicate that the surface is relatively young compared to that of Ganymede and Callisto, as evidenced by the low number of impact craters. This evidence supports the water layer models 7-8 as does theoretical work by Stevenson\". Images taken recently using instruments on board the Galileo spacecraft show the surface to be severely fractured with large areas of the icy surface separating. from the nearby material. It is thought that the dark bands and ridges are a mixture of slushy ice and rocky debris 10. The arrangement of individual plates, some of which appear to have rotated in position, suggest the existence of some lubricating layer beneath the surface at least at the time at which fracturing occurred. It is not yet known whether this layer is, or was, composed of a liquid or softer slush.\n\n\nAny study of Europa or other icy body will have as a prominent scientific objective the search for life. This search is motivated by analogy with anaerobic life found in abundance in undersea volcanic vents on Earth, or, in fact, virtually anywhere liquid water is found\". If Europa does indeed have a liquid water ocean beneath the outer ice crust as a result of interior volcanic heating, then it is possible that hydrothermal vents located on the seafloor may provide the necessary conditions for simple ecosystems to exist. Such vents are found in terrestrial oceans and support many species of marine life, some of which are uniquely found at hydrothermal vent sites. Generally a vent community will extend tens of meters from the vent. Most vents have a finite lifetime of the order of ten to twenty years before becoming inactive, at which time the local biological activity ceases. When a new vent forms, simple bacteria present in the water become the basis for a new vent food chain which can extend to tubular worms, mollusks and crabs. The water ejected from hydrothermal vents is typically rich in sulfur and other minerals. These bacteria extract all nutrients directly from sulfur via chemosynthesis, making sunlight and oxygen unnecessary.\n\nIn order to determine if these conditions (or others that might support life) are repeated beneath the Europan surface, it will be necessary to embark on an extensive survey of the satellite using a variety of scientific tools. It seems unlikely that remote sensing techniques alone will be sufficient to determine with any certainty the existence of asubglacial ocean, unless current theories regarding the ice thickness are incorrect. Thus, some combination of orbiter mission and lander missions are needed to satisfy the demands of a complete Europa study.\n\n\nWe indicate here the objectives for the joint program, keeping in mind that some objectives do not apply in both environments.\n\n5.1. Europa\n\nMajor scientific questions to be answered about Europa are: Does Europa have an ocean? If so, what is Europa's physical oceanography? Does the ocean have currents? What is the chemistry of the ocean/ice and the mineralogy of the core? is this ocean composed of liquid water, or some part brash ice or slush? Was there ever open water? What geological processes have been at work on Europa, and how active are these forces? How often is the ice surface resurfaced, and what is the mechanism (impact cratering, cryovolcanic resurfacing, or others?) Are biological processes at work, or were there some at work in the past? If so. which ones, and how do they affect observable quantities? What might some habitats be, and what would be the best ways to detect these organisms?\n\n5.2. Earth\n\nSeveral major scientific questions that can be addressed in an integrated Earth-Europa program are: How do the profiles of specific anions, cations, and dust over regions of Greenland and Antarctic ice sheets (as well as certain ice caps of South America and Asia) vary within depositional basins? What is the structure of horizontal profiles of temperature in the active layer for continuous and intermittent permafrost areas of North America, Europe and Siberia? What are the temporal and spatial changes in oceanic vent chemistry, thermal character and biological communities? What evidence is there in subice lake bottom sediments regarding the existence of subglacial lake lifeforms?\n\n\nAt the outset, there needs to be an emphasis on an inexpensive mission to characterize the interior of Europa. Significant data can be obtained with an orbiting spacecraft with only a radio transmitter, needed in any caw for communications. Very detailed analyses of the interior of a planet can be obtained with an orbiting spacearaft; derived parameters would include the moments of inertia and the coefficients of various harmonic expansions, which in turn are related to the interior structure. In the case of an object that is tidally stressed, measurements of oblateness at minimum and maximum tide yield significant information on interior structure. An array of seismometers on the surface would tell definitively whether there is water through analysis of P and S wave transmission. Significant further evidence could be obtained by an imaging spectrometer, which could derive ice compositions since the behavior of the ocean ad ice would depend on the existence of C02 and/or hydrated ammonia. Another potentially powerful instrument is a radar mapper to make more detailed analyses of ice thickness distribution.\nAn ideal approach to the examination of Europa. including the presence of life, would consist of staged deployments, each of which is crucial to the success of the following phase. Clearly the shortest route to obtaining information on the composition of the Europan \"ocean\" is to sample the surface material which is thought to have originated at depth and become distributed on the surface by eruption-like processes. To accomplish its goals the orbiter would deploy remote sensing instruments and drop penetrating probes, and the in situ vehicles would all carry a progressively more complex in situ chemical laboratory (ISiCL), discussed in detail below.\nIn the following sections, the key in situ observational tools of the Europa-Earth Program are described in a preliminary fashion.\nThe in Situ Chemical Laboratory (ISiCL) will perform chemical analyses of melt and ocean water, including assays for biotic molecules. Instrumented \"Impact Penetrators\", akin to those being constructed now for deployment on Mars, am dropped from orbit to penetrate the upper layers of ice and perform chemical and physical analyses.\nThe Cryobot probe, which melts its way through the Europan ice cover, acquires chemical information en route with the ISiCL, and transports the Hydrobot to the Europan Ocean. (Figure 2.)\nThe Hydrobot (also shown in Figure 2), is a self-propelled underwater vehicle for exploration and analysis of the Europan ocean.\n\nConcepts for a variety of sample return missions have been proposed. One proposed mission could be flown early on to collect surface samples that had been thrown up into orbit by a large impactor. Ile sample collector would pick up dust thrown out many kilometers by the impactor and return it to Earth. The samples could then be examined on Earth for evidence of biological activity. Others would be launched later or perhaps flown in concert with one of the following in situ analysis missions. The following sections describe a set of potential missions. These missions have not been integrated into existing roadmaps, but am an indication of how Europan missions might be flown based purely on integration with Antarctic tests.\n\n6.1. First mission: orbiter deploying impact penetrators. (Launch: 2001+)\n\nThe major objectives of the orbiter, from the perspective of this program, are: to generate a good estimate of ice thickness, to determine the surface relief, and to obtain information on the chemical constituents of the surface, especially in regards to understanding the composition of the darker areas. Some of this reconnaissance will be performed by the Galileo orbiter in 1997-8.\n\nIle instruments required for these analyses include an altimeter and an imaging spectrometer. The mission duration should be long enough to include a tidal excitation event so that short-term deformation of the surface ice can be observed if measurable at the limits of spectrometer resolution. Finally, the orbiter may need to carry surface penetrators, similar to those planned for Mars, to examine the structure of the Europan surface material and possibly to be part of a seismic network to fine-tune the ice thickness estimates. These penetrators will not be discussed further in this paper, but may be a good precursor of the cryobot.\n\n6.2. Next mission: shallow Cryobot melter probe. (Launch: 2005+)\n\nThe key requirement of the Europan campaign is accomplished by descending through the Europan ice and into the ocean below to search for signs of life. However, there am sufficient engineering challenges in this that a pathfinding mission is needed. This mission would land a penetrator whose objective is a shallow, 10-500 m melt into the surface, with descent limited by a cable or by a short-lived heat source. The probe should penetrate deeply enough to get below the \"gardening layer\" on Europa's highly-irradiated sruface and obtain data uncontaminated by external effects. The shallow probe would be equipped with the ISiCL. Measurements would include a surface density profile and size distribution for the topmost layers, and tests for remaining Uwe organics right at the surface. Organics that imply a metabolic pathway are of particular interest, ie., ethanol, butanol, and acetate. The lander also should image the surface to determine its smoothness and hardness, and might carry a hydrophone or seismometer to determine ice motion. Finally, the lander should deploy a radar or equivalent system to determine accurately (within 10%) the ice thickness distribution over its geographical range. The development of Cryobot probe technology for use in the Europan and Earth deployments is a key part of this program and will be discussed in more detail below.\n\n6.3. The Cryabot/Hydrobot mission (Launch: 2010+)\n\nThe deep-penetrating Cryobot with its Hydrobot is the ultimate deployment of the Europan program. By the time of its deployment the ice thickness will be known, the density and strength of the upper layers will be established, the technology of the melting probe will be proven on Earth as well as on Europa, and the lSiCL will be fully developed and tested in both environments. The submersible will be designed to answer the question: \"How similar is this ocean to those on Earth, and has life evolved along a pathway analogous to the one we know at present on Earth?\"\n\nFigure 2. Cryobot/Hydrobot schematic.\n\n6.4. The Earth program\n\nThe Earth program is planned to take advantage of technology development for the Europa project, but is not strictly constrained by those developments. In particular, it will require at least some modification of the Europa devices for Earth use. In general, the Europa developments that will find application on Earth are probes similar to the Philberth-type \"Cryobot\" melting probe used in Greenland (see the discussion under Technology Roadmap), the Hydrobot, and possible penetrators using the ISiCL. 'Me ISiCL is an important concept for Earth as well as Europan application, but the modifications required for terrestrial use may be extensive. In general, the technology is transportable even if the actual devices are not. Some potential earth applications follow.\n\n6.4.1. \"Extremophile\" life\n\n\"Extremophiles\", life forms that live in extreme environments, are of intense interdisciplinary scientific interest.\" These extremophiles can metabolize at temperatures below the freezing point of water and can live in \"starvation survival\" mode for extended periods of time\". Life in hot environments, saline environments, and so on has been observed on Earth, and significant industrial use has been made from substances extracted from these life forms or their metabolic products. A search for new extremophiles, and an understanding of how these creatures fit into known evolutionary schema, will be a primary focus of any Earth exploration.\n\n6.4.2. lce sheet and glacier structural profiles\n\nRecent ice sheet drilling programs have provided astonishing information on climate change over the past 100,000+ years. These data sets have also presented questions on such topics as the poleward/equatorward shifts of atmospheric circulation patterns during climate changes of the past. While of unquestionable value, major drilling programs are so expensive as to be nearly prohibitive. With a suitably modified Cryobot, rapid vertical profiles of key chemical constituents and particles can be made far more cheaply, once the device is developed. Specifically, a series of Cryobot deployments in the West Antarctic ice sheet could use chemical tracers to identify annual layers and dust contaminants to determine the source of the air masses from which the snow was derived- This would gain a far better understanding of the mean transport conditions of the glaciations and interglacials, with an emphasis on the time required for changes in regime. In general, air-dropped penetrators or widely-distributed cryobots could give invaluable information for climate change studies that are currently prohibitively expensive.\n\n\nIt will be crucial that a careful list of technology requirements on both Earth and Europan sides of the program be developed, as well as timing that fits with ongoing programs on both sides.\n\n7.1. The In-Situ Chemistry Laboratory (ISiCL)\n\nBoth Earth and Europan exploration can benefit from maximum possible in situ chemical analysis. There we areas of interest distinct to Earth or to Europa, as well as some in common. In both cases, basic technology development in sample handling, reduced mass and power, and increased reliability and sensitivity of basic instrumentation will be key. Instrumentation that will be on the surface of Europa will need to operate in a severe radiation environment. On both Earth and Europa, ice instrumentation must withstand cold temperatures and the wet, variable-pressure conditions inherent in operating in ice. A development program for this instrumentation will need to be undertaken as soon as the science requirements are clearly understood.\nIn situ chemistry measurement requirements for ice include particle size distributions, chemical constituent concentrations emphasizing a few key cations and anions, and isotopic distributions. It is likely that the emphasis will differ for Earth and Europa. On Earth chemical species will be selected to reflect variables that characterize past climate states. Detection of \"life\" and the evolutionary stage it has reached will be one of the primary goals of a Europa exploration program. It is, however, difficult to determine what chemical form \"life\" might take under Europan ice. The planetary program has performed most of its work looking for life in dry environments, and me will look to researchers used to a wet, biotic environment for instrument concepts.\n\n7.2. The Cryobot\n\nThe Cryobot would be transported to the Europan surface, presumably by a landing vehicle which would then serve as the communications station for transmitting data to Earth. For the second Cryobot mission, a miniature submersible Hydrobot will be carried through the ice and into the ocean. Both of these missions would deploy the ISiCL, but possibly in different versions.\nThe Cryobot is an adaptation of the law 1960's Philberth probe 14. new am cylindrical probes approximately 2 m in length and 10 cm in diameter. Housed inside the metal casing are banks of electrical heaters which cause the probe to descend vertically through the ice driven by gravity. The trials of two such probes were conducted at Station Jarl- Central Greenland, in 1968 with mixed success, and the idea has evolved somewhat over time. Although the principles involved were sound, technical problems with the heating elements caused both probes to fail before reaching the intended depth. These probes were powered electrically via a wire spooled from the rear of the probe which became fixed in the refreezing meltwater. Extreme adaptations of thew probes have also been used to melt through rock 15. In the cue of a Europa Cryobot version of this probe, thermal energy would most likely be provided by an onboard power source. It is calculated that a descent rate of approximately 0 2 -1 km per month is achievable, assuming water ice with a 100 K surface temperature. Greenland Philberth probes descended in much warmer ice at 1.5 to 3 km per month. How the devices would work in cryogenic ice with possible contaminants, low pressures, and with smaller-scale vehicles is another challenge, currently being addressed by experimental work at Caltech and at Leicester University in England.\nCommunication with the Cryobot/Hydrobot through ice and water is not a simple engineering problem. One solution is to connect the Cryobot/Hydrobot to the landing vehicle via an umbilical cable. Ile cable is stowed onboard the Cryobot and played out to allow for the slow descent through the ice. The ice will freeze up behind the Cryobot as it descends. Materials compatible with a wet cryogenic environment will be needed for the cable.\nAdditionally, data cannot be stored on board the small communications package left on the surface. Due to the intense radiation flux, all data would be corrupted in a short time period. Similarly, a vehicle cannot be left in orbit for prolonged periods. Therefore, data will be processed on board the Cryobot/Hydrobot and then sent directly to Earth (relay options to other lander or orbiter vehicles may be explored as well). The layer of ice above the Cryobot should serve as adequate radiation shielding for it and the Hydrobot.\n\n7.3. The Hydrobot\n\nThe Hydrobot is a small submersible which is released from the Cryobot and then autonomously explores the subglacial ocean. Once at the ice/water interface the Cryobot ceases to descend and the Hydrobot is released to explore die ocean. By terrestrial analogy it is unlikely that this interface will be smooth or continuous. Tberefore, the deployment mechanism for the Hydrobot must include sufficient intelligence to determine whether the liquid ocean has been reached. The major constraint on the probe is that it must be small enough to fit within the Cryobot yet still accommodate the instrument package and communication system, which potentially could include many kilometers of cable. This small Hydrobot also must be capable of withstanding extreme hydrostatic pressures. Even if the probe is deployed in a region with few or no active hydrothermal vents, samples of the ocean floor could still be examined so that any dead organic matter present could be detected. Engineering tradeoffs need to be made to determine whether the Hydrobot should communicate with or without a cable; if without, it could use the housing of the Cryobot as a recharge and data release station. The use of the sonar acoustics for data transmission to the Cryobot housing will be examined further.\nThe Hydrobot requires sufficient buoyancy control to permit movement through the ocean to the desired depth and some degree of horizontal searching through use of currents, presumably driven by volcanic heating or uneven cooling at the upper surface. Even a modest flow of 0.01 m/s would result in the probe traveling of the order of 1 km/day. Active propulsion at modest speeds (0-1 m/s) is possible and might be attractive.\nThe Hydrobot would have an instrument package that might include: a hydrophone to listen for volcanism, a device to look at backscatter of particulates, measurements of temperature and salinity (or conductivity), a current meter (assuming that currents exist), a sonar imager for navigation and mapping, and a visible imaging system, which is highly desirable, especially near vents.\nA modification of the ISiCL laboratory would test for volatiles typical of hydrothermal fluids: high concentrations of H2, H2S, CH, and C02. relative to \"normal (Earth) seawater\" (whatever this implies on Europa). The age of the vent and the degree of phase separations of its effluents will drive concentrations of these volatiles. Vents tend to be acidic, (as low as pH = 2.5) and a simple pH measurement would give a first indication of the presence or absence of vents. From this data one could estimate the phase of evolution Europa is currently experiencing relative to the postulated evolution of Earth's oceans.\nThe Hydrobot's version of the ISiCL instrumentation would determine whether the ocean exhibited one set of requirements for \"life we would recognize\": liquid water, and then possibly a carbon source, a nitrogen source, and phosphorous and sulfur. The ISiCL instruments could perform microscopic DNA fluorescence and send images of fluoresced DNA back, as this may be used to detect the degree of evolution of microorganisms, if any. If organic compounds existed, instruments could determine whether left and right enantiomers are in a racemic mixture 16 (equal amount of the left and right enantiomers) or whether there is a bias toward one of them, as in seen in terrestrial biochemistry (chirality). It has been proposed that very unbalanced handedness would most likely be produced by self-reproducing organics, ie. \"life\". A particular challenge in the design of the instrumentation will be to determine which chemical reactions can only be mediated by life, and which methods will test for these reactions unambiguously.\n\n\nIt is explicit in this program that the measurement systems and vehicles designed for Europa can be tested in terrestrial environments, and that in the course of those tests scientific projects can be supported with data sets not otherwise obtainable. The test program will focus on several specific sciencettesting campaigns.\n\n8.1. Vostok Lake and similar water bodies beneath ice sheets\n\nVostok Lake is a body of water several hundreds of meters deep located above the bedrock and 4 km below the surface of the Antarctic ice sheet near the Russian station at Vostok. Since heat input is assumed at the bottom, there is the potential for life in unique forms in the water and sediment, since life in the lake may have been evolving independent of other terrestrial life for significant periods of time. There is also the very zeal prospect of significant interference with those life forms by the entry into the lake water of a contaminated or chemically active probing system. These are also issues in probing the ocean beneath the ice on Europa; hence, it is logical to address the technology required for both of thew programs, and to test planetary program procedures and devices in the Vostok environment. The Vostok Lake exploration techniques can be tested by using the probe to melt through one of the ice shelves of Antarctica and into the ocean beneath, or alternatively to use a similar but less-pristine lake in Greenland for tests. There will be a thorough design, review, and approval process for this probe in order to best safeguard affected ecosystems. It is currently postulated that there will be at least two Vostok missions. A first would consist of a Cryobot outfitted with a camera where the Hydrobot will eventually be installed, for an initial look at the water below the ice. This would be followed by a second mission with a full Hydrobot, as similar as possible to that planned for Europa. Vostok missions would be powered by electricity produced on the surface and transmitted down the Cryobot cable.\n\n8.2. Ice sheets\n\nThe great ice sheets of Greenland and Antarctica contain our best climate data for the Past quarter-million years, and they also have significant potential impact on human life and affairs in an altered climate. Thus, they are the sites of extensive study. Recent core studies have been of great significance in determining the nature of climate change over the past 100,000 years, and numerous questions have been generated by preliminary core analysis. Repeating the drilling that obtained these cores is not practical in view of the great cost, largely logistical, in these projects. However, the scientific motivation is strong to obtain more profile data in other regions of the ice sheets. Here the refined Philberth probe could be of importance in allowing profiling of selected chemical species and/or dust particles at a fraction of the current deployment cost, while at the same time providing a proving ground for the probe design that will eventually go to Europa.\n\n8.3. Oceanic vents in the mid-latitudes and polar regions\n\nEarth's oceanic vents, where volcanic gases are released at the seafloor, are interesting in their own right as sites of unique life-form development- They art highly relevant to the Europa program as they we a reasonable model of what is expected on the seafloor of Europa as a consequence of tidally-induced volcanism. probes designed to examine and report on the life-forms at the Europan vents should be tested at Earth's vents, and, at the same time, information of the temporal changes in vent communities and Properties could be acquired at far less cost than required for a manned submersible.\n\n\nWe have noted that there are strong motivations to deploy a sequence of instruments in orbit, upon the surface, and through the upper ice layer of Europa in search of life. This program involves extensive development and testing here on Earth. Terrestrial glaciology needs technical development to extend its reach during this period of cost constraints. The applications of this technology include studies of lateral variability in ice sheets, profiles of glaciers, deployments of instrument networks on sea ice, a search for extremophiles, and other topics. There me significant elements common to the programs to study ice on Earth and on such planetary bodies as Europa, Therefore, an integrated program should be examined and defined in detail and presented to the appropriate government agencies, private interests, and candidate foreign participants.Specifically we recommend that a challenging but affordable Europa mission sequence similar to that described above be examined and approved, and a timeline of the missions be proposed. At the same time, a terrestrial long-term glaciology and biology program should be defined which would benefit from the technical advances called for in do Europa missions. Finally, from the examination of the Earth-Europa. science objectives there are key technology developments required. In stating these, we assume that numerous and challenging elements of the program will be addressed outside this program. Among these are: The Europa orbiter, a Communication system to move data from on or below the Europan surface back to Earth, navigation and control which will deploy the various probes where they can best work, power systems, radiation protection, and the like. Emphasizing those developments specifically related to the ice and ocean requirements, we see the need for The In-Situ Chemical Laboratory (ISiCL) Impact-Penetrator precursor vehicle(s). The Cryobot and its surface station. The Hydrobot.\n\n\nThe authors are pleased to acknowledge the sponsorship of the Advanced Concepts Office and In Situ Center Of Excellence at JPL, and the technical divisions of JPL that supplied enthusiastic staff and sound advice for the purpose of generating this concept document. We are also indebted to the participants at. the Europa Ocean Conference, Capistrano Conference #5, Nov. 12-14, 1996 at the San Juan Capistrano Research Institute, San Juan Capistrano, California; they gave us critical comment on our poster describing this initiative and supplied other comments that helped us refine the ideas presented here. Bonnie Burratti of JPL supplied us with comments to supplement their papers there. James Wild and Stephen Trowell, University of Leicester, did original work as JPL-Caltech Summer Undergraduate Research Fellows on this topic. We are specially indebted to the participants in our JPL workshops in October 1996 and April 1997, particularly: Ellen Mosley-Thompson, Byrd Polar Research Center, Ohio State University; B. Lyle Hansen and Karl Kuivinen, Polar Ice Coring Office, University of Nebraska Lincoln; S. Prasad Gogineni, Remote Sensing Center, University of Kansas; Terry Cole, Mark Drinkwater, Benjamin Holt, Martin Buehler and Steven Smith, California Institute of Technology Jet Propulsion Laboratory; Chris McKay and Dale Anderson, of Ames Research Center-, Larry Mallory of Biomes, Inc. and Richard Morita of Oregon State University, and others. If we have forgotten anyone it is not for their lack of contribution. Ile work described in this document was in part performed at the Jet Propulsion Laboratory, California Institute of Technology, under contract to the National Aeronautics and Space Administratio0n\n\n\n1 G. Schubert, T. Spohn, and R. T. Reynolds, \"Thermal Histories, Compositions and Internal Structures ofthe Moons of the Solar System\" in Satellites, edited by J. A. Bums and M. S. Matthews, Univ. of Arizona Press, Tucson 1977.\n\n2. G. J. Consolmagno and J. S. Lewis, \"Structural and Thermal Models of Icy Galilean Satellites\", in Jupiter, edited by T. Gehrels, Univ. of Arizona Press, Tucson, pp. 1035-1051, 1976.\n\n3. F. P. Fanale, T. V. Johnson, and D. L. Matson, \"lo's Surface and the Histories of the Galilean Satellites,\" in Planetary Satellites, edited by JA. Bums, Univ. of Arizona Press, Tucson, pp. 379-405, 1977.\n\n4 R. T. Reynolds and P. Cassen, \"On the Internal Structure of the Major Satellites of the Outer Planets,\" Geophys. Res. Lett., vol. 6, pp.121-124, 1979.\n\n5 S. J. Peale, P. Cassen and R.T. Reynolds, \"Melting of Io by Tidal Dissipation,\" Science, vol.203, pp 892\u001f894, 1979.\n\n6 P. Cassen, R. T. Reynolds and S. J. Peale, \"Is there Liquid Water on Europa?,\" Geophys. Res. Len., vol. 6, pp.731-734, 1979. 7. S. W. Squyres, R. T. Reynolds, P. Cassen and SJ. Peale, \"Liquid Water and Active Resurfacing On Europa,\" Nature, vol. 30 1, pp. 225-226, 1983.\n\n8. S.W. Squyres and J.K. Croft, \"The Tectonics of Icy Satellites,\" in Satellites, edited by JA. Burns and M.S. Matthews, Univ. of Arizona Press, Tucson, pp. 293-341, 1986.\n\n9. D. Stevenson, \"Heterogenous tidal deformation and geysers on Europa.\" Abstracts of Europa Ocean Workshop, San Juan Capistrano, California, November 1996.\n\n10. NASA Press Release, August 12, 1996.\n\n11. C. McKay, \"Urey Prize Lecture: Planetary Evolution and the Origin of Life.\" Icarus 91, 93-100, 199 1.\n\n12. J. Postgate, The Outer Reaches of Life. Canto/Cambridge University Press, Cambridge, England. 1995.\n\n13. R. Morita, presentation at Europa/Antarctica Science Workshop, Pasadena CA April 9-11, 1997.\n\n14. K. Philberth, 'Ile Thermal Probe Deep Drilling Method by EGIG in 1968 at Station Jarl-Joset, Central Greenland,\" in ice Core Drilling edited by J. F. Splettstoesser, Univ. of Nebraska Press, 1974.\n\n15. Dale E. Armstrong, James S. Cleman, B B. McInteer, Robert M. Potter, and Eugene S. Robinson, \"Rock Melting as a Drilling Technique.\" Report LA-3243 UC-38, Engineering and Equipment, TID-4500 (37th Ed.), Los Alamos Scientific Laboratory of the University of California, Los Alamos, New Mexico, 1965.\n\n16. A. J. MacDermott, in Chemical Evolution: Physics of the Origin and Evolution of Life, Eds. J. ChelaFlores and F. Raulin, Kluwer Academic Publishers, Dordrecht, The Netherlands, pp. 373-379,1996.\n\n*Further author information -\n\nJCH (correspondence): Email: Telephone: 818-354-7431 Fax 818-393-1366 FDC: Email: Telephone: 818-354-8163 Fax: 818-393-6720 JC: Email: Telephone: 818-354-4120 Fax: 818-354-8333 JJ: Email: Telephone: 818-3544717 LJ: Email: Telephone: 818-354-0926 BML: Email: Telephone 818-393-7884 LL: Email: Telephone 818-354-6186 GL: Email: JCF: Email: Telephone: (int.+39 40) 2240392 Fax: (int + 39.40) 224163 TJ: Email: jengtx.add Telephone: 847-937-8880 Fax: 847-938-7072 AB: Email; Telephone: 508-289-2448 Home Page", "pred_label": "__label__1", "pred_score_pos": 0.6960659623146057} {"content": "新概念英语 - 第3册 - 第038课\n\nThe first calender 最早的日历\n\n\nWhat is the importance of the dots, lines, and symbols engraved on some, bones and ivory?\n\n新概念英语 - 小编笔记\n\n\n新概念英语 - 教材原文\n\n\nFuture historians will be in a unique position when they come to record the history of our own times. They will hardly know which facts to select from the great mass of evidence that steadily accumulates. What is more, they will not have to rely solely on the written word. Films, videos, CDs and CD-ROMS are just some of the bewildering amount of information they will have. They will be able, as it were, to see and hear us in action. But the historian attempting to reconstruct the distant past is always faced with a difficult task. He has to deduce what he can from the few scanty clues available. Even seemingly insignificant remains can shed interesting light on the history of early man.\n\nUp to now, historians have assumed that calendars came into being with the advent of agriculture, for then man was faced with a real need to understand something about the seasons. Recent scientific evidence seems to indicate that this assumption is incorrect.\n\nHistorians have long been puzzled by dots, lines and symbols which have been engraved on walls, bones, and the ivory tusks of mammoths. The nomads who made these markings lived by hunting and fishing during the last Ice Age which began about 35,000 B.C. and ended about 10,000 B.C. By correlating markings made in various parts of the world, historians have been able to read this difficult code. They have found that it is connected with the passage of days and the phases of the moon. It is, in fact, a primitive type of calendar. It has long been known that the hunting scenes depicted on walls were not simply a form of artistic expression. They had a definite meaning, for they were as near as early man could get to writing. It is possible that there is a definite relation between these paintings and the markings that sometimes accompany them. It seems that man was making a real effort to understand the seasons 20,000 years earlier than has been supposed.\n\n\ncalendarn. 历法,日历\nhistorian n. 历史学家\nunique adj. 无与伦比的\nsteadily adv. 不断地\nsolely adv. 唯一地\nvideo n. 录像\nCD-ROOM n. (只读)光盘驱动器\nbewilder v. 令人眼花缭乱\ndeduce v. 推断,推理\nscanty adj. 不足的,贫乏的\nclue n. 线索\ninsignificant adj. 不重要的\nshed v. 使流出,泻\nadvent n. 出现,到来,来临\nagriculture n. 农业\nassumption n. 假定,设想\ndot n. 小圆点\nsymbol n. 符号\nengrave v. 雕刻\nivory n. 象牙制品\nmammoth n. (古)长毛象\ntusk n. 獠牙,长牙,象牙\nnomad n. 游牧民\ncorrelate v. 使相互联系\nphase n. 月相,天相\nprimitive adj. 原始的\ndepict v. 描画,描绘\n\n\n\n\n\n新概念英语 - 自学导读", "pred_label": "__label__1", "pred_score_pos": 0.9961549043655396} {"content": "WDW Customer Service Numbers\n\nWDW Technical and Non Technical Customer Service Support\n\nWhat is the Customer Service Number to Call at?:\nFor any type of assistance you can call at tel: +1-407-939-5277.\n\nWhere is WDW Head Office Located at?\nThe corporate office is located at Lake Buena Vista, Florida 32830, United States.\nDirections For Driving: The given driving directions path of WDW from your place to Lake Buena Vista, Florida 32830, United States.\n\nWhich is the Website?\nwww.disneyworld.disney.go.com is the website of the business.\n\nThe Locations Near You?\nYou can get all nearby locations of WDW on the map?\n\nWhat is WDW in the Process of?\n\nWDW (Walt Disney World) is the world's famous venue of entertainment and is one of the largest theme parks. The park is designed to provide entertainment and enjoyment facility for all Age group in a single place. WDW or Walt Disney World comprises with many entertainment attractions, rides and other events. The park is renowned for its great attractions and amenities throughout the globe.\n\nAmenities and Attractions\n\nWalt Disney World provides all kinds of facilities and services to the visitors which include accommodation, ATMs, shops, fitness centers, spas, etc. The Walt Disney World consists of multiple attractions and entertainment facilities such as water parks, theme parks, resorts and five golf courses.", "pred_label": "__label__1", "pred_score_pos": 0.990367591381073} {"content": "This is a follow-on question to Can't pulsars and stars be used for gravitational wave measurement? and the helpful answers there.\n\nThe Wikipedia article subsection Pulsar timing array; Active and proposed PTAs mentions:\n\nThis is an extremely delicate experiment, although millisecond pulsars are stable enough clocks that the time of arrival of the pulses can be predicted to the required accuracy; the experiments use collections of 20 to 50 pulsars to account for dispersion effects in the atmosphere and in the space between us and the pulsar.\n\nas a way to measure the Gravitational wave background.\n\nPulsar timing can also be done at X-ray wavelengths and the modest X-ray telescope of the Neutron Star Interior Composition Explorer (NICER) currently mounted on the International Space Station has been used to determine it's orbit to high precision based on a sequence of pulsar timing measurements and a model of the Earth's gravity field as a proof-of-concept demonstration. See Is NICER/SEXTANT the first civilian “spacecraft” to determine it's own position in space without GPS or uplinked data?\n\nQuestion: Would an X-ray-based pulsar timing array in orbit or on the Moon to study GW background be effective? This coul take some loading off of the large Dishes and possibly offer a lot more time coverage. The X-ray telescopes are fairly small and amenable to deployment in a medium or high Earth orbit. Equipped with radio transponders or corner cube reflectors like LAGEOS their positions would be regularly measurable and highly predictable between measurements. The movement of The Moon's position and orientation is known to essentially centimeter accuracy due to extensive laser ranging of the Apollo-era retroreflectors.\n\nBut I don't know if the timing of the pulses in the X-rays would be better or worse for this kind of measurement. As pointed out in International Pulsar Timing Array \"The resources of the IPTA are substantial\" and dispersion in the ionosphere and atmosphere are a problem for the radio observations and the X-ray measurements above the atmosphere would solve that problem, but there may be others.\n\n\nYour Answer\n\n\nBrowse other questions tagged or ask your own question.", "pred_label": "__label__1", "pred_score_pos": 0.9142497777938843} {"content": "Debugging Web Workers\n\nMay 22, 2019\n\n\n\nHere’s how you would do it for various major browsers:\n\n\nIf you are debugging service worker or worker, you can head down to the console. There’s a dropdown menu, if you haven’t noticed previously, that says “JavaScript context”.\n\nchrome console\n\nchrome console context\n\n\n\nchrome worker context\n\nFor shared worker, you would need to go to chrome://inspect/#workers. Select “Shared workers” on the left panel.\n\nchrome shared worker\n\n\nYou can click “inspect”, which will open a new console for you to debug.\n\n\n\nfirefox shared worker\n\n\n\nsafari console context\n\nThank you for your time reading through this article.\nIt means a lot to me.\n\nIf you like what you have just read,\nTweet about it so I will write more related articles;\nIf you disagree or you have opinions about this article,", "pred_label": "__label__1", "pred_score_pos": 0.8876973986625671} {"content": "One document found\n\n\nPolarized radiation as tracer of magnetic fields in star formation\n\nMagnetic fields are observed on a wide range of astronomical scales: from the entire cosmos, galaxies and giant molecular clouds, to smaller molecular clouds with low-mass star formation and protostellar disks, to protoplanetary disks. There is an ongoing debate about whether magnetic fields play...", "pred_label": "__label__1", "pred_score_pos": 0.998451828956604} {"content": "ML p(r)ior | Adnominal adjectives, code-switching and lexicalized TAG\n\nAdnominal adjectives, code-switching and lexicalized TAG\n\nIn codeswitching contexts, the language of a syntactic head determines the distribution of its complements. Mahootian 1993 derives this generalization by representing heads as the anchors of elementary trees in a lexicalized TAG. However, not all codeswitching sequences are amenable to a head-complement analysis. For instance, adnominal adjectives can occupy positions not available to them in their own language, and the TAG derivation of such sequences must use unanchored auxiliary trees. palabras heavy-duty `heavy-duty words' (Spanish-English; Poplack 1980:584) taste lousy sana `very lousy taste' (English-Swahili; Myers-Scotton 1993:29, (10)) Given the null hypothesis that codeswitching and monolingual sequences are derived in an identical manner, sequences like those above provide evidence that pure lexicalized TAGs are inadequate for the description of natural language.\n\nHighlights - Most important sentences from the article\n", "pred_label": "__label__1", "pred_score_pos": 0.7284169793128967} {"content": "Anna Mrazek Kovacic is the leading Czecho-Slovak photographer in the field of fashion and beauty photography best known for her provocative visual sense combined with high aesthetic value. Bold, daring, alluring photographs with strong sexual charge, sense of composition and color harmonizing, original locations, sets and decorations are all characteristic features of her work. Perhaps most importantly, Anna possesses a unique ability to bring out and capture the one’s most beautiful looks. Her fashion editorials are often featured in Elle, Dolce Vita and Harper’s Bazaar and many others and she has shot numerous campaigns for a wide portfolio of international clients, such as Harvey Nicols, Schwarzkopf, Louis Vuitton, to mention just a few. In 2007 she was awarded a Czech Grand Design prize ‘Fashion Photographer of the Year’. Anna lives in Prague with her husband and is being the world’s-best-mum to their five years old son.", "pred_label": "__label__1", "pred_score_pos": 0.5721158981323242} {"content": "To: Loretta Lynch, Attorney General\n\nHold Gov. Synder accountable for poisoning Flint children\n\nWe demand an investigation and, if warranted, the arrest and prosecution of Michigan Governor Rick Snyder.\n\n\nWhy is this important?\n\nWhat's happening in Flint, Michigan, is disastrous—and it's personal for me: Flint is my hometown and the community at the forefront of my first major documentary film \"Roger & Me.\"\n\nGov. Synder violated the Environmental Protection Agency’s regulations by cutting off clean drinking water to the city of Flint—impacting more than 100,000 people. Instead of safe, clean drinking water, the people of Flint had polluted water piped into their homes from the Flint River—water that was then contaminated with lead.\n\nHe said he did this to \"cut costs\". He knew he could get away with it because Flint is one of the poorest towns in the country.\n\nThere is no way to totally reverse the effects of lead in a child’s blood stream. According to the Centers for Disease Control and Prevention, there is no safe blood level of lead for children.\n\nThe children of Flint, already among the poorest in the U.S., will now have to endure a life of pain, irreversible brain damage, and lower IQs because of Gov. Snyder’s actions and the ensuing cover up.\n\nJustice must be served—and other elected officials must be put on notice that people’s lives are more important than balancing a budget.\n\n", "pred_label": "__label__1", "pred_score_pos": 0.5543639659881592} {"content": "Zen and the Art of Data Maintenance: People Silos Cause Data Silos\n\nCOL02x - feature image silverstonWith the exponential growth of data from so many different sources, data silos (or in other words, separate unintegrated data stores) are more prevalent than ever.\n\nHowever, what is the root cause of data silos? People silos! The more that people view themselves as separated, the more that data is separated.\n\nBut aren’t people and various organizations, in truth, actually separate entities? Or are they? If they are actually separate entities, what issues does this cause?\n\nImagine two groups in an organization: a data science group and a data management group. The data science group is focused on creating and implementing useful models for predictive analytics. The data management group is focused on creating quality integrated information. However, the data science group does not want to talk to the data management group as it does not want to get involved in bureaucratic standards and common vocabulary issues or matters that seem to be less important than their deliverables.\n\nThe data management group prioritizes their important task of data integration and sees it as the foundation of successful systems. What I have seen in this scenario is a lack of true cohesive, unified efforts between these two groups. Hence, the data silos between the data management group and the data science group. Research suggests that data scientists are spending about 80% of their data on data quality issues. Often, they will use a data engineer (not from the data management group) to cleanse their data. Since one of the key interests of the data management group is to create data quality, doesn’t it make sense for these groups to collaborate to create a much better outcome? And yet, in my experience and the experience of many others, this does not seem to happen.\n\nThere are many other examples of various people and groups not collaborating and acting independently. For example, I have seen the human resource department of an organization say that their data is extremely sensitive (which of course it is), so therefore this type of data cannot be shared or integrated with other types of data and must be kept in a separate system. The irony is that human resource data is one of the most interrelated types of information since so much data is connected with people-oriented information.\n\nAnother example is that the financial area of an organization may keep their information in a separate accounting system and be very cautious of data sharing since their information is also extremely sensitive. I have been on data integration efforts where the financial organization will say that they are glad to share and help integrate their information, and yet when we have asked for their data, there are often significant stalls (sometimes indefinite) in getting this data.\n\nFinally, I have been involved in many customer relationship management integration efforts, and when I ask salespeople to share and integrate their customer information so that it can be a useful enterprise resource, this is often a challenge. The underlying thought here (even though not expressed outwardly in this manner) is often, “Really, you want me to share intimidate details that I have collected from my dear customers? First of all, this information is confidential. Secondly, this information really represents power that I have.”\n\nDoes data represent power? If you look at the examples of Amazon, Google, and Facebook, it seems that those who have more data have more power. So why would people and organizations share and integrate data and give away their power?\n\nThe key operating premises in the above scenarios is that people and organizations are separate. But are they really? Or are all people and organizations already integrated and connected and we just pretend that we are not?\n\nWhat Does This Have to Do with Zen?\n\nZen is a Japanese word for ‘awareness’.  It also represents a school of Buddhism with philosophical principles. One premise of Zen (and many other philosophical teachings in other traditions) is that the more that we think we are separate, the more difficult things become. Another way to say this is that the greater our ego (our self-referencing), the more suffering we experience.\n\nIt seems to me that we can extend this thinking to the premise that the more that we think we are separate within an organization/company, the less integrated our systems are, which makes the organization weaker, less productive, more chaotic, and prone to disintegration (which literally means to ‘separate into parts’ or ‘to crumble’).\n\nSo when we think of ourselves or our teams or organizational units as separate, we tend to build separate, disintegrated systems. When we see ourselves or our projects as separate, we tend to create our own vocabulary/language for each system, develop separate hardware and software infrastructure and implementations, develop independent data stores, and this leads to ‘data silos’.\n\nSo, if we can think of ourselves as non-separated and connected, then this will lead to systems and data integration.\n\nAlthough this is not the norm, I have witnessed great examples of this type of thinking in several large organizations that work extremely well as a large integrated team without much ego. For example, in one large financial institution, they adopted a standard business language and standards across the entire organization, were all working towards a common vision that they were all excited about and were able to develop extremely efficient and effective systems to support their investors. The investors themselves were an integrated part of the development process!\n\nMany organizations incent people by pinning them against each other in competitions. In our culture and society, we tend to reward individual successes and compare our accomplishments with each other. In organizations, people are often competing for promotions, raises, and power. Thus, the idea of not acting as if we are separate is difficult to realize.\n\nWhat Can We Do?\n\nThis is a difficult issue and not easy to address, yet if we are to better integrate data, we must address it.\n\nThree possibilities for moving towards more integrated people and thus more integrated systems and data are:\n\n • Think of ourselves and our teams as connected. Continue to ask the question, ‘How am I connected to various people, organizations and things?’ Realize that even though we experience some separation, we are also all connected to everything.\n • Establish a shared and compelling purpose for your area of the business and connect it to the overall purpose of the entire organization. When the vision and purpose of an organization is clear, commonly accepted, compelling and concise (I call this the four C’s), then it is more likely that people will see themselves as integrated if they are drawn to the shared purpose and vision.\n • Establish a common vocabulary. Quite often, miscommunication leads to separateness. Interestingly, the etymology of the word ‘communicate’, comes directly from the Latin ‘communicationem’ which literally means “a making common”. Luckily, the need for establishing common business glossaries has been recognized more lately. To help these types of efforts, we have developed a tool called the Universal Business Glossary, to help establish common terms and definitions by re-using constructs that have worked well in many organizations (many of these standard terms and definitions are based upon decades of research and based upon many of the concepts in the Data Model Resource Books). If you would like to learn more about this, please see Universal Business Glossary Webinar.\n\nIf we were to answer the question, to be separate or not to be separate, let’s consider that both are appropriate. While it seems that to some degree, we are separate, let’s make sure to acknowledge the opposite: that we are also not separate at all. At a deeper level, we are interrelated with all other people, all aspects of our organizations and systems, and for that matter, with everything else!\n\n\nShare this post\n\nLen Silverston\n\nLen Silverston\n\nLen Silverston is a best-selling author, consultant, speaker and internationally acclaimed expert and thought leader in the fields of data governance, data modeling, data management, and in the human dynamics of integrating information data. He is the author of The Data Model Resource Book series (Volumes 1, 2, and 3), which describe hundreds of reusable data models. The volume 1 book was rated #12 on the Computer Literacy Best Seller List and his volume 1 and 2 books have been translated into Chinese and in 2009, he co-authored “The Data Model Resource Book, Volume 3, Universal Patterns for Data Modeling”, which has been translated into Korean. Mr. Silverston has published many articles and has been a keynote speaker at many international data conferences. He is the winner of the DAMA (Data Administration Management Association) International Professional Achievement Award and the DAMA International Community Award. He has given many keynotes and has received the highest speaker rating at several international conferences. Mr. Silverston's company, Universal Data Models, LLC, http://www.universaldatamodels.com provides consulting, training, publications, and software to enable information integration as well as people integration. - He is also a personal and corporate mindfulness coach, trainer, and teacher and has studied and taught many forms of spirituality and life development skills for over thirty years. He has attended, staffed and/or led hundreds of days of silent, intensive retreats as well as dozens of life development workshops. After intensive practice in Zen, he was ordained as a Zen Priest in 2011. ‘Kensho’ Len Silverston provides ongoing ‘Zen With Len’ (http://www.zenwithlen.com) individual and corporate coaching, seminars, meditation gatherings, and retreats.\n\nscroll to top\nI Accept", "pred_label": "__label__1", "pred_score_pos": 0.8559908866882324} {"content": "Bible Reliability\n\nThe Bible consists of 66 separate books, written over a period of about 1,500 years, in three different languages—Hebrew, Aramaic and Greek—on three continents—Asia, Africa, and Europe.\n\nThematic Consistency\n\nThe Bible has over 40 separate authors, including kings, peasants, fishermen, poets, statesmen, scholars, a shepherd, a military general, a cupbearer, a doctor, a tax collector, and a rabbi. These writers included murderers, adulterers, human rights abusers, traitors, and whiners. Each wrote under different circumstances, ranging from the battlefield to prison to palace living.\n\n\nA few of the Old Testament writers knew their co-authors, and each succeeding scribe could read the books previously written, but none of these writers could have known the New Testament would be written, much less what its authors would write.\n\nThe New Testament authors could read the Old Testament books, and many of them knew each other. However, the earliest New Testament writers could not have known what later authors would write.\n\nDespite this diversity of authorship, structure, topics, and writing styles, as well as the complexity of the subject matter, the Old and New Testaments complement and complete each other.\n\nTogether, both testaments provide a continuous and harmonious account of God’s dealings with man without any contradiction, because they are the product of a single mind. Just as God is unchangeable, internally consistent, and perfect, so is his message to the world.\n\nBoth the Old and New Testaments were divinely inspired and inerrant, in their original writings. God did not move the pens of entranced authors. Instead, he enlightened the writers in many ways, on many levels, built his message into their lives, and motivated them to record it.\n\nEach Bible verse has equal merit. Some editions print the New Testament words of Jesus in red ink, which may lead readers to mistakenly think these verses are holier than all others. This presumption is incorrect. The entire Bible is divinely inspired.\n\nPreservation And Assembly\n\nCenturies before the birth of Jesus, the Old Testament was maintained by a group of specially trained artisans who used exacting techniques to precisely copy every detail of the preceding edition and double-check the latest version.\n\nAssembly of the New Testament began soon after apostles started writing. Its final configuration was established a few decades after the last book was written, based on whether the authors were contemporary witnesses of the events they described.\n\n\nConsistent Copies\n\nAs with other ancient writings—Aristotle, Plato, Socrates, Caesar, etc.—the original Old and New Testament documents have disintegrated into dust. All that remain are copies of the original manuscripts. The Bible we read today has been reconstructed from these copies.\n\nThe underlying accuracy and reliability of these copies, relative to the original manuscripts, is a function of three tests: How close to the time of the original writings can we date them? How many copies do we have? How consistent is the text from one copy to another?\n\n\n\nSome people believe the Bible is incomplete. They claim God amended the original Biblical teachings through subsequent revelations to more recent authors. However, Jesus declared the Old Testament complete and accurate. His deity validates this representation.\n\nThe Book of Revelation states explicitly that it is the final written word from God, and no further elaboration would be forthcoming. Its prophetic fulfillment, which is currently in process, validates this pronouncement.\n\nTextual Reliability\n\nSome critics say other gospels, such as those supposedly written by Judas and Thomas, are as valid as the four written by Matthew, Mark, Luke and John. However, the textual reliability of these other gospels does not hold up under scrutiny.\n\nOther critics contend the Bible is full of contradictions. There are none. Some purported contradictions take verses out of context. Others reflect doctrinal misunderstandings, or incorrect assumptions, about historical context.\n\n\nMany passages identified as contradictory are actually complementary—two descriptions of the same event by two different gospel writers. These seeming contradictions indicate there was no corroboration between the gospel writers.\n\nSome skeptics question the credibility of the four New Testament gospels, by contending the miracles Jesus performed were hoaxes.\n\n\nWe can be confident that Jesus performed miracles because the four gospels are credible documents.", "pred_label": "__label__1", "pred_score_pos": 0.9769871234893799} {"content": "How to improve parent-teacher communication\n\nYour school’s teachers are already juggling multiple responsibilities. They don’t just trust employees of a school administration. They also have a responsibility to each and every student’s parents.\n\nOn top of a full-time job inside the classroom, teachers need to report on student performance and behaviors. Traditionally, this is done through monthly or quarterly parent-teacher conferences, but today’s parents need more.\n\nThe more hectic parents’ schedules get, the more actively they worry about their child’s well-being and academic performance. Modern school management software takes a huge burden off of teachers’ and parents’ backs, allowing them to transparently monitor child interaction with teachers, their progress through school, and their attendance. \n\nSchool administrators use tools like WPSchoolPress to improve parent-teacher communication by cultivating transparent relationships, setting the foundation for trust, address and resolve urgent school matters easily. \n\nLet’s look at how those issues get in the way of school communication, and how administrators can address those obstacles to encourage teacher involvement and parent satisfaction.\n\nTransparency Leads to Greater Accountability\n\nA child’s academic results are the result of a team effort. If grades are good, it means teachers are using effective methods to keep their students interested in the subjects, and leading them towards excellence. In turn, teachers and parents alike are motivated by their school administrators. It is your job to think of ways to improve student performance and ways which make parents decide that your school is the best school for their child.\n\nWhen student performance does not meet expectations, it is not always due to the lack of interest on teachers’ behalf, but often due to a lack of transparency. Parents might receive the news of their child’s poor performance after it has already caught traction and formed a troubling pattern. This moment can be avoided altogether if schools assume greater responsibility for student conduct and performance. Administrators who empower teachers to communicate with parents in a transparent manner help build a solid foundation for student success. \n\nFor example, one in six American students is chronically absent. Schools with better channels of communication between teachers and parents are able to reduce chronic absenteeism and keep at-risk students in the classroom.\n\nFrequency is the Basis of Trust\n\nAs is the case in any relationship, trust is crucial, but it develops slowly, and its steadiness must be maintained continuously. Teachers should think of themselves as parents’ best friends when it comes to challenging and inspiring their young ones. \n\nParents need to have the option to check up on their children with the same ease they get from consulting their GPS to get directions to a destination. The more frequently parents have access to academic scores, performance metrics and the behavioral information for their child, the more at ease they will be leaving the fate of their young ones in the school administration’s hands. This will make it more likely that they will give their seal of approval to the school as their child’s second home. \n\nFrequency and consistency in communication will ensure strong compatibility between the school and the parent, one which reassures parents they made the right choice for their child’s education.\n\nHappy Teacher, Happy Parent\n\nIn order for kids to excel academically, the well-being of a teacher is equally important as their own. A teacher must feel like caring mentors rather than underappreciated babysitters.\n\nEvery parent has concerns they wish to bring up with their child’s teacher, but it is next to impossible to hold a satisfactory one-on-one meeting in increasingly crowded classrooms. Teachers can streamline some of the most important elements of parent-teacher communication. Updates, reminders, and student performance information can be released simultaneously through a simple SMS text that helps teachers deal with every student’s parent in a more pragmatic and efficient manner.\n\nNot only is it important for teachers to relay updates regarding parent concerns, but it is crucial that they do it in a timely manner. If a problem arises, parents have the right to know about it immediately. This involves parents from the start, leading to a more effective solution through effective parent-teacher partnership.\n\nExtracurricular Communication\n\nParent-teacher conferences can’t address every issue a student may have. Urgent matters can occur in between parent-teacher meetings and must be dealt with through other means. Every school must implement a communication side channel. Phone calls, video calls, emails, texts, can all be utilized for concise and to-the-point updates or reports, rather than releasing a long letter that outlines the general issues, at the beginning of each month.\n\nIn today’s hyper-connected, mobile-first world, parents need to feel like they are in the classroom, in the school halls, and close to everything happening in their children’s fast-paced, ever-changing academic and social life. Making information easily accessible and available is just the first step. The next is streamlining the internal structure of the school administration. School administrators need to reduce the barriers between parent and teacher communication.\n\nParents demand access to student report cards, records compilation, accounts, admission forms, attendance records, and a session calendar. Schools that offer this information in an easy-to-use platform establish themselves as leaders in education. Those that go the extra step can offer personalized SMS messages alerting parents to important developments inside and outside the classroom.\nTo learn more about how you can make your students’ parents feel more involved and trusting,  see our live demo of WPSchoolPress. Empower your school staff to send updates to parents in a transparent, accessible manner through an easy-to-use system.\n\nTry Demo\n\nExplore all the features of WPSchoolPress like attendance management, student grading system, etc by trying it’s live demo\n\n\n", "pred_label": "__label__1", "pred_score_pos": 0.95844566822052} {"content": "Health Matters\n\n\n\nAdjectives are not always necessary. I am aware that people will sometimes describe someone as African-American or Hispanic. They do not describe someone as Caucasian. If the writing is an attempt to identify an individual, then the added characteristics would be helpful, but that often is not the case. \n\nA year ago, I wrote my first article in the Alameda Sun. It outlined Calyx Health’s mission to build the healthcare system that seniors deserve and urgently need. At the time, I was confident that if myself and my staff controlled what happened within each clinic’s four walls, we could achieve that mission. \n\nQuestion: What is  whiplash all about and do I really need to do anything to heal? \n\nAnswer: Whiplash is a common concern at the chiropractor and at other practitioner’s offices. Most people associate whiplash with automobile rear-end accidents. But, this condition can occur in sports and other injuries, too. Whiplash is an injury to the neck and upper-back’s ligaments and tendons. It also involves the discs, nerves and blood vessels. \n\nIt is not unusual to want to change someone else’s behavior. I hear this from parents, teachers and partners in a relationship. One can try a couple of techniques. \n\nFirst, try to ignore a person’s behavior so that they get no attention for what they are doing. If a child keeps calling a parent into their bedroom after they have been told it is time to go to sleep, they will eventually cease asking if the parent starts ignoring them. By going into the room, the parent teaches the child to continue the behavior because the child gets their way.", "pred_label": "__label__1", "pred_score_pos": 0.9073689579963684} {"content": "How to Stay On Track During the Holidays\n\nThe holidays are a delicious and magical time of year. It is a time to reflect on the year that passed and look forward to the year that is coming. It is a time to, quite literally, break bread with your loved ones. What does your family eat during the holidays? Mole? Pozole? For instance, in my family, we eat a traditional dinner of turkey, mashed potatoes, Honey Baked Ham and pie on Thanksgiving. For Christmas, we eat tamales and menudo with bolillos and champurado. For New Year’s, we usually eat panes con pollo, and wash them down with ponche\n\nThese foods are traditional and deeply rooted in the generations that came before us, traditions and history.  Whenever I eat a tamal on Christmas, I recall that the recipe comes from my Nana, and her mother before her. When I bite into a tamal during the holidays, it is as though my Nanas are with me. \n\nMy mouth is watering as I write this. However, even with (or perhaps because of)  this yummy goodness in mind, the holidays may be a stress trigger for some of us. No, I am not talking about annoying relatives (more on them later). I am referring to those of us who want to stay on track during the holidays. Perhaps the traditional foods seem like a source of temptation. I am here to tell you CHB fam— we have every right to enjoy the holidays and our roots this year! The key is to enjoy this time of year with balance in mind. \n\nRead on for tips on how to stay on track, and enjoy the holidays. Though this is being written just in time for Thanksgiving, these tips come in handy for any type of congregating where the foods may be more indulgent than you would typically prefer to consume.\n\nAs mentioned earlier, balance is the key here. \n\nTips on how to stay healthy during the holidays:\n\nBring a side of veggies\n\nConsider yourself the health ambassador to your family (which hopefully are not stubborn or close minded to healthy options).  Bring a side of steamed veggies, a side of roasted veggies and a fresh salad. There is something there for every palette. Plus, you can ensure you fill up on vegetables before indulging on other options.\n\nBring a (semi) healthified version of a popular dish\n\nInstead of canned cranberry sauce, you can make your own at home with organic cranberries and oranges. Or, you can try making your own pie!  Ingredients like flour, sugar, grass fed butter, and pumpkin puree are ingredients you can actually pronounce. Though it is still a pie, it is definitely a step above something store bought with preservatives, or ingredients we cannot pronounce. Just the other day, I saw a store bought pie that contained soybean oil. Sounds much less appetizing to me than grass fed butter as an ingredient. \n\nDon’t have time to get your cook on? Perhaps some cut fruit and dark chocolate may help you get that sweet tooth this holiday season. \n\nEat a healthy breakfast and lunch so you can enjoy dinner, “guilt” free\n\nEat a breakfast full of your necessary macronutrients. Eat a lunch chock full of greens. Drink lots of water. If you do all this before the big holiday dinner, you can rest assured that you have some nutrients in your body. Cooking all day and need something quick and healthy? Chug some Get Yo Greens Mix to flood your body with greens. \n\nGet a workout in that morning, before the festivities start.\n\nDo something good for your body, and later on, enjoy reasonable portions of your favorite traditional foods amongst your loved ones.\n\nRemember What Matters Most\n\nRemember, it’s about the memories. The holidays are about the experiences with loved ones. It is about making intergenerational memories. It is about honoring the traditions that define us. Perhaps this holiday is the holiday your suegra finally includes you in the tamal making festivities, so that when you are the matriarch of the legacy she and you will share, you will be the one to pass down the recipes. Deep, right? It is as though these experiences we share transcend time— the future, present and past are all together at once as we share experiences with our closest loved ones. This time of year is about honoring our ancestors and loved ones. Finding the balance with food is important for our health so that we can be around for as long as possible to have these experiences, yes. However, finding the balance is just a part of the whole mosaic that is our traditions this time of year.\n\nSo we’ve mastered balance. Now, how do we combat opposition?\n\nSo now that that is established, let’s move on. So say you got your work out in, you’re hydrated, you brought some greens to the party. Perhaps you even mediated or prayed before the party so that you can be grounded to deal with the relatives you love but who are also annoying. Let’s be real! You’re popping with all your goals to stay healthy, aligned and balanced. Now, how do you deal with relatives who are excessively comunicativos ? (Para no decir mitoteros.)  How do we deal with relatives who pressure you to “break your diet?” Have you heard this type of opposition before? “Its just once a year we ate these foods, why are you only eating one tamal?” \n\nSome relatives may even feel despreciados if their dishes are refused. After all, in our culture, love is sometimes shown through food.  How many grandmothers and mothers and tias and madrinas tell us we look like we are too thin and try to feed us to show us love. Some of my friends laugh because even when they feel fluffy they are told they look too thin…then they are (kinda) force fed. On the other hand, this has been my personal experience: some family members feel a lack of control in their own health decisions so they feel the need to control the decisions of others. It sucks. And if you are going through this, I am sorry. \n\nMost of the time, any pressure to eat in a way that does not align with your long term health goals can be rooted somewhere in the middle of the spectrum: relatives only just trying to show love through food, or some relatives be hatin’!\n\n\nHow to deal with nosy relatives this holiday season\n\n\nPositive opposition:\n\nInstead of framing your eating choices around weight, focus on how you feel. For instance, a comment like, when I eat more greens and smaller portions of the other things, I just feel so much more energized! gets the message across. Another example could be: I am trying to set a good example for my children. How can I expect them to eat greens if I don’t? Anyways, the holidays are right at the peak of the cold and flu season! If all else fails, tell those pushy relatives you’re going your best to stay on your “A Game” to enjoy spending time with everyone. \n\n\nStrength in numbers:\n\nMaybe someone else in your family has goals similar to yours. This person can be your ally! For instance, I go into reunions with my husband and we make sure we start off with greens to offset our appetite to make sure that we really enjoy the traditional foods without over indulging. \n\n\nAl Ratito:\n\nIf all else fails, try this tried and true response to offset pushy relatives who want you to “break your diet” for one reason or another: “Al ratito.” Al ratito may not come, and your (slightly pushy) relative may not even notice. \n\n\nTying it all together\n\nHealth is wealth. Making choices that are good for your body can help you to maintain your health for the long term. If you can live a healthy life, then that can give you the freedom to spend many holiday seasons con la familia. Finding balance is a great frame of mind to maintain as we enter this holiday season. There is enough to stress about, after all. And, if you happen to get off track, there is no need to feel guilty. Enjoy it and remember that tomorrow is a new day. The Compton Detox will be there to help you feel back on track the next day. Be good to your body, enjoy the flavors, spend time with loved ones, and make happy memories that can last a lifetime.\n\n\nHow do you celebrate the holidays in a balanced way? We’d love to read in da comments. Hasta próxima. Happy holidays from everyone here at Compton Health Bar!!", "pred_label": "__label__1", "pred_score_pos": 0.7079731225967407} {"content": "标签归档:bicycle gearing\n\ne cycle gearing\n\n\nelectric mountain bike (7)\n\nOn some bicycles, there is only one gear and the gear ratio is fixed. Many contemporary bicycles have multiple gears and thus multiple gear ratios. A shifting mechanism allows selection of the appropriate gear ratio for efficiency or comfort under the prevailing circumstances: for example, it may be comfortable to use a high gear when cycling downhill, a medium gear when cycling on a flat road, and a low gear when cycling uphill. Different gear ratios and gear ranges are appropriate for different people and styles of cycling.", "pred_label": "__label__1", "pred_score_pos": 0.9672180414199829} {"content": "barbara mayer gesellschaftsrecht p.jpgstephanie von riegen gesellschaftsrecht2.jpg\n\nM&A/Antitrust: Acquirer can be liable for the acquired company´s cartel infringements\n\nIn a landmark judgement (Case C-724/17 – “Skanska”), the European Court of Justice (ECJ) held on March 14, 2019 that a company cannot escape its liability for cartel infringements by changing its identity through corporate restructuring, transfers or other changes of legal or organisational nature. The acquirer shall in any event be liable for antitrust violations committed by a company taken over and subsequently liquidated if it essentially continues its economic activities.\n\nThe Decision of the European Court of Justice\n\nThe ECJ reasoned that if a company which committed a cartel infringement is subject to legal or organisational change, this change does not create a new undertaking free of liability if from an economic point of view the new undertaking and its predecessor are identical. Thus, by acquiring, dissolving and assuming the commercial activities of an entity found liable for a cartel breach, the acquirer also assumes such entity’s liability for damages.\n\nA legal succession of liability was already established in the context of imposition of antitrust fines for EU competition law infringements. But according to the ECJ, the EU prohibition of cartels will only be effective if public and private enforcement go hand in hand. By extending the concept of economic continuity, the ECJ held that the same entities that have violated the rules of EU competition law are subject to sanctions by antitrust authorities and legally liable for private damages in a civil action.\n\nPractical Advice: Antitrust due diligence in M&A transactions\n\nThe ECJ strengthens the rights of claimants in antitrust damages actions, who can now claim against the legal successor or the parent companies of companies involved in the cartel even if the latter no longer exist. However, the Skanska ruling will also have implications on M&A transactions. The other side of the coin is the increased risk that the purchaser of an undertaking will later be held financially accountable for previous antitrust infringements committed by the acquired company. Claims for damages are unlimited in amount and depend solely on the actual damage suffered by the cartel victim, so that excessive purchase prices or lost profits due to the cartel must also be compensated.\n\nPurchasers of an undertaking should counter this liability potential in a corporate transaction with a full due diligence exercise under antitrust law to ensure that they are not acquiring the risk of liability for cartel fines and any resulting damage claims. According to the ruling, legal succession liability explicitly applies to share deals, but in application of the rule of economic continuity even asset deals can result in further antitrust risks if the original company no longer exists.\n", "pred_label": "__label__1", "pred_score_pos": 0.9990417957305908} {"content": "Vital Pulpotomy\n\nWe have just completed a procedure called “vital pulpotomy”.\n\n\nSimply put, we have removed part of the pulp (nerve) from the inside of the tooth, placed a soothing medication, and covered it with a temporary filling. This is an emergency procedure which is usually successful in reducing or eliminating pain.\n\nAlthough you should feel considerable relief when the anesthetic wears off, some soreness is to be expected. Due to the unpredictable amount of internal breakdown, the amount of improvement cannot always be accurately predicted, and further treatment may be needed to provide you with relief. Take medication for pain as needed. Ibuprophen ( such as Advil or Nuprin) is usually quite effective. Please call our office at any time if you have any questions or concerns.\n\nA pulpotomy is meant only as a temporary measure for relief of a painful condition. You will need further treatment, usually endodontic therapy (root canal), to save the tooth. Please don’t put off continued care. An untreated pulpotomy almost always leads to painful abscess formation and possible tooth loss.\n", "pred_label": "__label__1", "pred_score_pos": 0.8252043724060059} {"content": "ISSA, TRX - Team Member Since 2004\nLocation: Wall\n\nPaul Hodges\n\nMy Fitness Philosophy\n\nThe human body is one of the most complex and intricate organic machines that Nature has ever devised – and as such it needs to be maintained and exercised every day to maximize its potential and longevity. Always be on the move - whether at work or play!\n\nWhat Jersey Strong Means To Me\n\n'Jersey Strong' to me represents teamwork - whether it is illustrated by Jersey Strong's commitment to help individuals and local communities overcome adversity, hardships or natural disaster, or in my Personal Training staff's daily commitment to elevate their clients to success and greatness.\n\nWhy I am Passionate About Being at Jersey Strong\n\nThere is no better reward than when a member or client comes to me and tells me their health and fitness success story at Jersey Strong - how their hard work and dedication has paid off for them.\n\n\n\"The difference between 'try' and 'triumph' is just a little 'umph'!\"", "pred_label": "__label__1", "pred_score_pos": 0.9988529682159424} {"content": "Strategy And Prepare\n\nPet AnimalsCalifornia law demands that all adopted dogs and cats be spayed or neutered prior to leaving our Animal Care Center. Cat attacks are no laughing matter, and aside from the often reported agony that they cause to the victims, cat bites are heavily prone to infection, even much more so than dog bites. If you want a social companion you do not want to walk and you are allergic to fur, a parrot might be a suitable match, and this is also an exotic pet. Entry or re-entry (returning with an EU pet animal) into the EU from the other third countries or territories outdoors the EU shall be authorised via the travellers’ points of entry only, where the competent authority supplies for the verification of documents and identity of the pet animals.\n\nThere are many zoos overflowing with exotic animals that men and women have released since they overestimated their capacity to care for a wild creature. This lens was designed as the very first step towards awareness for accountable pet owners. Animals not permitted: rodents, rabbits, ferrets, farm animals, birds of prey and reptiles. Such men and women are seething mad at the notion that somebody desires to own a particular pet—and whether or not the pet’s care demands improvement, or if it appears to be pampered—that does not cease them from declaring that exotic pet owners are selfish egomaniacs that require to have their pets taken from them.\n\nIf you’re going to enforce your bizarre logic on this web page and continue to make exotic pet owners look undesirable at least be eloquent. A dog or cat can be spayed or neutered at almost any age, according to the American Medical Veterinary Association (AVMA). A human-socialized tiger has a better disposition than a feral cat, but the feral cat is domesticated and the tiger is not, due to the fact that word implies a adjust of genes. Genets are not threatened by the pet trade AT ALL, so that component of your lecture is just useless.\n\nThe concern of cats killing little animals indiscriminately is a cause for wonderful concern. In fact the method is about the identical as acquiring well being insurance for your self….Ask your Vet which organization they recommend, they may even have details at their office….Figure out how a lot you are willing to spend for the policy….Make sure your pet is eligible for coverage by reading the policy or talking to a representative….Figure out just how considerably coverage you want and how numerous extras you want to add or what you want to exclude.\n\nIf you are unable to afford pet well being insurance for your pets, there are some non-profit organizations that can aid you financially. Scientists are now taking into consideration taking cheetahs out of the definition of large cat. Owning a dog, an (ordinary) cat or an exotic bird is 1 thing, but owning enormous snakes and wild animals, such as lions, tigers, can be really hazardous and is …\n\nPlan And Prepare\n\nPet AnimalsThe objective of this lens is to document and highlight the existing inhumane and abusive therapy of dogs in The Peoples Republic of China, with the hope that worldwide information and consideration will support and assist the Chinese individuals in securing adequate and essential animal welfare protection. The downfall is these animals bond and learn to enjoy and want to be around us so you are liable for that distinctive animals future. This has been a really tough lens for me to create, simply because of the fact that I really like dogs and I’m a lifelong pet owner. Maintaining a hamster in a horse steady or feeding rabbit chow to a dog is in NO WAY, SHAPE, OR Kind comparable to exotic pet ownership. This is an additional wild cat species employed to make hybrids with domesticated cats (‘chausie’, ‘jungle bob’). For instance, if you feed your dog bones (chicken bones, pork bones, cow bones, and so forth) bone fragments can lead to very painful, and occasionally life threatening, blockage.\n\nAn individual like that – who desires to parade a tiger down the street clearly does not have the animals best interest at heart. This guidance is intended to help carriers (e.g. ferry operators, airlines, railway firms) to care for and defend the welfare of pet animals in the course of journeys to and from Great Britain. He then mentioned it should be illegal everywhere for any individual to personal unsafe wild animals like this, and that he was glad far more municipalities are outlawing them. Definitely, and often domesticated animals such as rabbits, guinea pigs, and livestock are included inside assessments of ‘exotic pet zoonosis’.\n\nSeveral pet owners fail to turn out to be attuned with their pets mannerisms that may possibly hint that an animal is becoming irritated. The Budgerigar or the Parakeet is in fact the best pet and is the most lovable animal. So he is a new adopted really loved family members member who fits right in, and currently gets along with all the animals , nor is he afraid of them! The Hiran Minar near Lahore , Pakistan was built in the 17th century by the Mughal Emperor Jahangir as a funerary monument in honor of his pet deer. Cloverleaffarm- nicely you see that’s just it. If a pet calls for specialized information to avoid undesirable incidents that is a purpose to list them here.\n\nThat, plus the animals already at the shelter, meant the organization was caring for far more than 1,000 animals. Anyway, I had an aunt in NYC who always had strange animals in the house coming and going. The most up-to-date, in-depth, entertaining-to-read pet rat care guide I’ve located. I actually had a baby alligator I got visiing family members in Miami, but ended up selling it to a pet store. Wild animals are wild and we as humans have constantly taken them in and changed them to fit us. Need to we do that is one more question …", "pred_label": "__label__1", "pred_score_pos": 0.9075939655303955} {"content": "\n\n\nThree words was all it took for the world to turn upside down: Japanese soufflé pancakes. And if you want to be technical, it was really only the \"soufflé pancakes\" part. \"Japanese\" is just an intriguing modifier.\n\n\n\nMake them I did, but first I had to buy a set of ring molds. These are like large napkin rings somewhere along the lines of 3 inches wide and 2 ½ inches high. You can get them in many different sizes, but that’s a good one for our purposes, or maybe a bit wider.\n\n\nThe ring molds were the easy part. The actual making of the soufflé pancakes was a bit of a hassle, but only because something kept going wrong. I added essentially room-temperature melted butter into essentially room-temperature milk, and the butter immediately hardened into a raft of butter globules.\n\nSo I tried it the second time, and the same thing happened.\n\nSo I tried it a third time. And I got the same result.\n\nI’m nothing if not persistent, occasionally, so I tried it a fourth time, but I used a different method. This time, I heated the milk and butter together just until the butter melted. Then I whisked this mixture into the egg yolk just a few drops at a time to keep the egg from scrambling.\n\nAfter a couple of tablespoons’ worth or so, I increased the hot (but cooling) liquid to a half-teaspoon, then three-quarters of a teaspoon, and so on. After I’d added maybe a quarter of a cup, I slowly added the rest of the milk/butter mixture, whisking all the time.\n\nThat technique, called tempering, worked like a charm.\n\nThere is only one other difference between soufflé pancakes and regular pancakes, and that is the part that makes it a soufflé. All you have to do is whip egg whites to stiff peaks — you can use a mixer; I used a whisk — and fold it gently into the rest of the batter.\n\n\nPowdered sugar is highly recommended. Syrup is essential.\n\n\nYield: 8 pancakes\n\n1 ½ cups all-purpose flour\n\n3 tablespoons powdered sugar\n\n2 teaspoons baking powder\n\n½ teaspoon salt\n\n1¼ cups milk\n\n4 tablespoons butter cut into pieces\n\n1 large egg yolk\n\n½ teaspoon vanilla extract\n\n3 large egg whites\n\n¼ teaspoon cream of tartar\n\nButter, maple syrup, powdered sugar for serving\n\nNote: You will need 4 ring molds, each about 3 inches wide by 2 ½ inches high.\n\n\n2. Heat milk and butter together in a saucepan over medium heat just until the butter melts. Place egg yolk in a medium bowl and whisk in just a few drops of the milk mixture at a time. Keep whisking and adding the milk mixture, gradually increasing the amount of milk mixture. Stir in the vanilla.\n\n3. Beat the egg whites and cream of tartar together in another bowl until stiff peaks form, about 2 minutes.\n\n\n5. Lightly butter the inside of the ring molds or spray with nonstick spray.\n\n6. Heat a large nonstick skillet over medium-low heat. Coat with butter or nonstick cooking spray. Place the prepared ring molds in the middle of the skillet and fill each with ½ cup of batter, filling each ring mold about halfway.\n\n7. Cover the skillet with the lid and cook until the batter is golden on the bottom — it should rise to the tops of the ring molds, be covered with bubbles and jiggle only slightly when shaken. Using a spatula and tongs, carefully flip the ring molds. Cover and cook until golden on the other side.\n\n8. Serve with butter and maple syrup and maybe some more powdered sugar.\n\nAdapted from a recipe by the Food Network Kitchen.\n\nDistributed by Tribune Content Agency, LLC.", "pred_label": "__label__1", "pred_score_pos": 0.8561909198760986} {"content": "Karsog 1/undefined by Tripoto\n\n\nAnshul Sharma\nShiva Kumar Bashetti\nI always like to visit offbeat and hidden destinations where there is not much tourist rush. My search often led me to some very beautiful places. When I was in Shimla after ticking off my list to visit the famous hill station, I was looking for some lesser known destination where I could spend my time peacefully amidst nature. That is when I chanced upon Karsog Valley. Karsog is situated around 100 km from Shimla at an altitude of 1407 metres. It has all the beauty of the lower Himalayas and the pace of life is refreshingly slow here. Once at Karsog, I was mesmerized by the simple, yet spellbinding beauty of the place.", "pred_label": "__label__1", "pred_score_pos": 0.9993388056755066} {"content": "Bronna Butler\n\nB. A. Baroque Arts, LLC\nNew Jersey, USA\nMy early interest in both the Arts and Science/Math resulted in two rotating careers, one in art and another in finance/science. My current artwork - multifaceted glass/metal sculptures and 2D imagery focusing on recreational mathematics, mathematicians and physicists, and science in general - unites my two passions. I strive to include puzzles, enigmas and optical illusions in my pieces. Stylistically, my glass and oil painting techniques are derived from the Baroque and Renaissance periods when artists were involved in the “science” of the arts such as the chemistry of their paints/materials, precise anatomy and perspective. The content and purpose of art during these two periods frequently embraced science and mathematics.\n\"What if time is circular?\"\n36 x 27 cm\nPrint - oil study for a glass window\nIf time were circular, would we eventually “run into” our younger selves? Stephen Hawking concludes in his “A Brief History of Time” that the “arrow of time” travels in one direction, from past to's highly improbable that a broken cup on the floor would jump back onto the table and reassemble itself. My piece, “What if time is circular”, is in the spirit of the Surrealist painters, many of whom were interested in time and other dimensions. I painted Hawking wheeling along the event horizon of a black hole (Hawking’s work transformed our understanding of black holes). The abrupt, incongruous doorway further ahead suggests a surrealistic, different dimension. Who, and more importantly when, is the figure standing in the doorway?", "pred_label": "__label__1", "pred_score_pos": 0.9877704977989197} {"content": "The school-to-prison-pipeline (STPP) has been a problem since long before any recent election. Likewise ICE raids leading to indefinite detentions and deportations of youth and their families have been a problem since at least the 1990s.\n\nNevertheless, there are two points to consider in the present moment. Disproportionate to their numbers, many African American and Latinx children are subject to persistent police abuse in the course of attending school. This is a key civil rights issue that must be corrected through retraining superintendents, principals, teachers, and others so that restorative justice practices can be the first resort, as opposed to criminalization of youth of color. Students who are black/Afro-Latinx and undocumented immigrants face double the risk.\n\nOne, pushing young people into the school-to-prison pipeline destroys their chances to graduate on time (if at all), with future harsh consequences for those with a criminal record, time spent in juvenile detention, and lack of education attempting to find work in an intolerant economy. This is how youth of color face stacked odds and an unforgiving society. Young people may be subjected to violence and additional abuse by peers or adults in juvenile detention centers. The loss of human potential is incalculable for the young person and her or his family.\n\nTwo, young people pushed out of schools also have a secondary effect on the overall health of the school: fewer students attending means depopulation and defunding for the students who remain. These schools are often already in underresourced communities where few businesses form a tax base, schools experience neglect of facilities and equipment, and teacher retention or turnover are often major hurdles. Already on precarious ground, these schools risk closure.\n\nThis is why it has always been imperative to halt the school-to-prison pipeline as quickly as possible. Principals MUST form the first line of defense to ensure that discretionary discipline addresses root needs, that ALL supports — including emotional and mental health — are given to a child of color in need, and they MUST work to carefully instill reparative, and not punitive, measures at the school level whenever possible. Again, reliance on School Resource Officers or city police must be the last resort reserved for cases where the child has broken a law.\n\nPrincipals who call in police assistance for students’ minor behavorial issues are 1) activating, and not eliminating, the STPP, 2) in doing so they are participating in the eventual diminishment and depopulation of their own school. There should be a moratorium on calls to police and or SRO calls for all grade school children.\n\nSee what students and families can do with People’s Response Team Chicago‘s  CopWatch and Bystander training to ensure that IF police are called to a public school, communities can ensure that the police act in ways that  protect the rights of the child. These bystanders might be teachers, staff, parents, community members, or other students.\n\nHere are also some resources for school leaders and administrators seeking alternatives to incarcerating youthful offenders. Community-based alternatives are key, so are school-based restorative justice programs.\n\n“We’re In It For The Long Haul: Alternatives to Incarceration For Youth In Conflict With The Law,” IssueLab", "pred_label": "__label__1", "pred_score_pos": 0.8993130922317505} {"content": "Stamp Collectors Catalogue\n\nSearch: bird\n(646 images found)\n\nFish Eagle\nFish Eagle, Zambia, stamp, bird, bird of prey, Postage, 4 n, Haliaeetus vocifer\n\nTitle: Fish Eagle\nLocation: Zambia\nDescription: African Fish Eagle [Haliaeetus vocifer] in a tree with a freshley caught fish\nKeywords: stamp, bird, bird of prey, Postage, 4 n, Haliaeetus vocifer\n\nYellow-tailed Thornbill\nYellow-tailed Thornbill, Australia, stamp, bird, 5 c, Acanthiza chrysorrhoa\nGalah, Australia, stamp, bird, 15 c, Eolophus roseicapilla\nScarlet Robin\nScarlet Robin, Australia, stamp, bird, 25 c, Petroica boodang\nPink Cockatoo\nPink Cockatoo, Australia, stamp, bird, $1.20, Lophochroa leadbeateri\nRed-necked Avocet\nRed-necked Avocet, Australia, stamp, bird, 13 c, Recurvirostra novaehollandiae\nGolden Whistler on Pink\nGolden Whistler on Pink, Australia, stamp, pink, bird, 20 c, Pachycephala pectoralis\nStraw-necked Ibis\nStraw-necked Ibis, Australia, stamp, bird, 30 c, Threskiornis spinicollis\nFlame Robin\nFlame Robin, Australia, stamp, bird, 50 c, nesting, Petroica phoenicea\nNesting Masked Woodswallow\nNesting Masked Woodswallow, Australia, stamp, bird, 45 c, Artamus personatus\nPied Oystercatcher\nPied Oystercatcher, Australia, stamp, bird, nesting, 30 c, Haematopus longirostris\nCrimson finch\nCrimson finch, Australia, stamp, 2 c, bird, K Breeden Williams, Neochmia phaeton\nEastern yellow robin\nEastern yellow robin, Australia, stamp, bird, K Breeden Williams, Eastern yellow robin, 20 c, Eopsaltria australis, RBA\n\nBuilt and Designed by", "pred_label": "__label__1", "pred_score_pos": 0.9996441006660461} {"content": "The temptation to buy a new cookbook is nigh irresistable sometimes.\n\nYou would think that a couple who thinks they have copious cookbooks would not have any issues finding a good recipe for a new dish. Or, at least, a dish that we don’t have a lot of experience with.\n\nAll we wanted was a recipe for how to best grill ribs. How to Cook Everything had some rib recipes, but nothing about grilling (that man’s into oven-roasting, apparently). Joy of Cooking has something (and, in the end, we’re following that recipe that didn’t seem like much of a recipe). Beyond that, though, our books utterly failed us.\n\nBoo.… Continue reading →\n\nBayless’s recipe this week.\n\nCover of Fiesta at Rick's by Rick Bayless\n\n“Proc 4 grlc,6T ancho,4t sugr&peppr,5t salt,1t oreg,½t cumin.Rub 4 slb ribs;ovrnite.Bake 300 75 min.Blend:7oz chiptles&3/4c honey.Grill;glaze”\n\nOkay, if you count what’s between the quotation marks, you’ll find that it’s 140 characters long. Obviously, there’s enough there to get a sense of what is supposed to be going on, but is there actually enough there for a total beginner at grilling and ribs to make dinner? And, given the quantity of baby back ribs there, is there enough going on that a total beginner can make it for dinner WITH COMPANY?\n\nSomehow, I suspect that wasn’t entirely Rick Bayless’s intent, but I do hope he gives some points for optimism. However, given the cookbook giveaway is for “Fiesta at Rick’s”, maybe it was his intent, and I played right into his sneaky hands!… Continue reading →", "pred_label": "__label__1", "pred_score_pos": 0.5935179591178894} {"content": "Help me make my resume for resume professional organizations\n\nHelp me make my resume\n\n7. In november 1983, resume my me help make the bilibid extension program bep was officially launched through the humid july heat, playing tag with his or her station in life are combining in what ever order works best for the correlation. Solid walls do get built, and their effects, they sometimes commit an error of neglecting facts altogether and rushing immediately to fowler 1965. 38 paul monroe concurs: The core of the burgeoning urban population. With regard to the second, and so on, we feel them in this case, matti nevertheless allowed for main sections introduction, development and change. Check your work proceeds. 20. Questions asked in disbelief, we were still there, but we must make, when seeking to be considered. 6 the presence and cognitive skill are in relation to the forefront.\n\nessay schreiben schule how to connect my microsoft exchange email to my iphone\n\nAssign synonym\n\nFor small schools, only one unit plan, their manner of performing a resume my me help make literature student could organize and develop an argument like this example. Jill got the order. In one recent period, over a dozen: The top two: Same, different the second volume of freshwater. Outside sources can be in a lesson is that the so- cio-political dimension emphasized by academic excellence along with limited or confused and do all this drama in the essay i. E. contains a very rough one. 31 reforming teacher preparation programs by raising entry standards for every subject is concerned. In many cases, of the proj- ect was that it can be reduced to a better use bar chart. Avoid such usage, where feasible. I have identified three inter- pretable factors.\n\nlord of the flies essay questions best customized essays\n\nDo assignment and help me make my resume\n\nteleological argument essay\n\nGive enrichment instruction to students enrolled in college composition resume make me help my course, even the early 16th century, the traditional entropy index (measuring deviations 30 timothy p. Fong, the first of all, these disciplines contain accounts of strategies that students become involved in constructing the curriculum. 109-197. C. Create a mission to the related scores on a curriculum s lack of commas without conjunctions results in an alternative discipline lens to the. Yet the abilities to attain l2 proficiency suffi- cient to write the proposal start working on a given network of dense transactional linkages is a model as the place of residence, isnt our gps being used as. Such is the persistent street people . Sours the image figure 17. Love, friendship, loyalty, kindness these are also lazy and shortens their attention away from reality. A part of the contributors are sociologists), the book under review, either by chapter or a state of knowl- edge. This is simply the final enduring contents figure 8. 8 chapter 6: Conversations in history 163 alex: But why are we looking for. 50 social welfare and development compared the words that are contrary to conversational language experi- ongoing goals in life are emerging, evoking another variation on the following photograph shows a quartered circular city, with a partner. 40 some people prefer to call attention to prison on mail-fraud charges. Data were analyzed for similarities between the fernando team arrived at the stop sign. Choosing a journal indeed seems to want independence at a different design of educational change, p. 189. The case therefore y will occur changes in the journal to refer to chapter 4 psychological foundations of curriculum implementation 309 teacher implementers so they are essential factors in the, richard lederer. But in their daily lives, professional writers are conveying and not in evaluation. Science 409:896 908. In n. Coupland et al.\n\ndissertation on tourism topics business growth plan\n\n7. Selection of learning as habit formation, that is, place the word comes to pay the bill of rights, and power that comes from the conversation focused. 7 on this observation, below is presented early in her study of critical thinking: Looking at a time, and that they can be used in several varieties. Model a variety of unexpected problems in terms of whether their discipline s structure and theoretical archeologist. What is the history of walking. Authors names have written extensively about human development. Bar charts have the skills taught.\n\nSection 009\n\nBest resume services online\n\nwriting a scientific essay\n\nCouncil of make me help my resume europe. 2297 3587648 gibbs, g. & svartvik, 1982. N engl j med. Much work in similar situations. These can be conveyed when the inference is added, as you read his essay, raymond poignantly discusses the competition was judged by a hand on his own eclectic theory of development, the most catchy or the result of this synekistic social and religious leaders at different times. Through this. I understanding the city of erbil in northeast iraq at the level of freedom, if there is little in the field of study. Exploring the above exceptional cases where sunspots changed rapidly. 6. Now compare the williams sisters superior ability and seek to clarify where no black person does not stand by itself in the countryside to bring latent recalling knowledge based; natural laws; sensation and eternal; rational mind; logical subject based; objective and independent weavers and spinners. Apa follows an adjective. Am the systematic review phase of globalization. How can these activities shows an action takes place. Her twitter handle is patrickwthomas. Average length in words. How can we bring you back and translate these thoughts into words) prosody (changing voice tone, pitch, volume, and chapter transitions rockwells now famous the four levels of proficiency.\n\nlaw degree essay help list of narrative essay components", "pred_label": "__label__1", "pred_score_pos": 0.601929783821106} {"content": "Chrzan, K LPerformance of Composite Insulators Without Sheds under Light PollutionThe test of insulators without sheds or with small sheds number at Glogow pollution station was described. The performance of insulators with different leakage distance and position (horizontal or vertical) under light pollution is studied. The flashovers, leakage currents and surface erosion were monitored. The 75 kV test voltage is 4 kV higher than the maximum phase to ground voltage of 110 kV system. After long term testing the leakage distance of 80 cm was as withstand distance for horizontal rods and 100 cm for vertical rods. For practical proposes the security factor of 1.3 should be taken into account. Finally, under light pollution the 110 kV composite insulator, in horizontal position could be installed in the form of 100 cm long rods without sheds and vertical insulators with terminal distance of 100 em should have at least two additional sheds.pollutionflashoverinsulator20072007-08-01", "pred_label": "__label__1", "pred_score_pos": 0.9939365983009338} {"content": "Tag Archives: Impala\n\nHadoop Ecosystem Components contd…(Tutorial Day 6)\n\nSo continuing the old post, here we will discuss some more components of Hadoop ecosystem.\n\nData Integration or ETL Components of Hadoop Ecosystem\n\nSqoop (SQL-to-Hadoop) is a big data tool that offers the capability to extract bulk data from non-Hadoop  or relational databases (like MySQL, Oracle,Teradata, Postgre) , transform the data into a form usable by Hadoop, and then load the data into HDFS, Hbase or Hive also. This process is similar to Extract, Transform, and Load.It parallelizes data transfer for fast performance, copies data quickly from external system to Hadoop & makes data analysis more efficient.\n\nIt’s batch oriented and not suitable for low latency interactive queries. It provides a scalable processing environment for both structured and non-structured data.\n\nSqoop Import\n\n\nSqoop Export\n\n\nSqoop Use Case-\n\nCoupons.com , Apollo Group uses Sqoop component of the Hadoop ecosystem to enable transmission of data between Hadoop & data warehouse .\n • Flume-\n\nApache Flume is a distributed, reliable, and available service for efficiently collecting, aggregating, and moving large amounts of streaming or log files data into the Hadoop Distributed File System (HDFS).  It is used for collecting data from its origin and sending it back to the resting location (HDFS).Flume accomplishes this by outlining data flows that consist of 3 primary structures channels, sources and sinks. The processes that run the dataflow with flume are known as agents and the bits of data that flow via flume are known as events.\n\nFlume helps to collect data from a variety of sources, like logs, jms, Directory etc.\nMultiple flume agents can be configured to collect high volume of data.\nIt scales horizontally & is stream oriented.It provides high throughput and low latency.It is fault tolerant.\n\nBoth Sqoop and Flume, pull the data from the source and push it to the sink. The main difference is Flume is event driven, while Sqoop is not.\n\nFlume Use Case –\n\nTwitter source connects through the streaming API and continuously downloads the tweets (called as events). These tweets are converted into JSON format and sent to the downstream Flume sinks for further analysis of tweets and retweets to engage users on Twitter.\nGoibibo uses Flume to transfer logs from production system to HDFS.\n\nData Storage Component of Hadoop Ecosystem\n\n\nHbase is an open source, distributed, sorted map model.Its a column store-based NoSQL database solution & is similar to Google’s BigTable framework.It supports random reads and also batch computations using MapReduce. With HBase NoSQL database enterprise can create large tables with millions of rows and columns on hardware machine. The best practice to use HBase is when there is a requirement for random ‘read or write’ access to big datasets. HBase’s important advantage is that it supports updates on larger tables and faster lookup. The HBase data store supports linear and modular scaling. HBase stores data as a multidimensional map and is distributed. HBase operations are all MapReduce tasks that run in a parallel manner.\n\nIts well integrated with Pig/Hive/Sqoop. It is consistent and partition tolerant system in CAP theorem.\n\nHBase Use Case-\n\nFacebook is one the largest users of HBase with its messaging platform built on top of HBase in 2010.\n\n\nApache Cassandra is a free and open-source distributed database management system designed to handle large amounts of data across many commodity servers.This database is the right choice when you need scalability and high availability without compromising performance. Linear scalability and proven fault-tolerance on commodity hardware or cloud infrastructure make it the perfect platform for mission-critical data.Cassandra’s support for replicating across multiple data-centers is best-in-class, providing lower latency for your users and the peace of mind of knowing that you can survive regional outages.\n\nUse Cases:\n\nFor Cassandra, Twitter is an excellent example. We know that, like most sites, user information (screen name, password, email address, etc), is kept for everyone and that those entries are linked to one another to map friends and followers. And, it wouldn’t be Twitter if it weren’t storing tweets, which in addition to the 140 characters of text are also associated with meta-data like timestamp and the unique id that we see in the URLs.\n\nMonitoring, Management and Orchestration Components of Hadoop Ecosystem- Oozie and Zookeeper\n\n • Oozie-\n\nOozie is a workflow scheduler where the workflows are expressed as Directed Acyclic Graphs. Oozie runs in a Java servlet container Tomcat and makes use of a database to store all the running workflow instances, their states ad variables along with the workflow definitions to manage Hadoop jobs (MapReduce, Sqoop, Pig and Hive).The workflows in Oozie are executed based on data and time dependencies.\n\nOozie Use Case:\n\nThe American video game publisher Riot Games uses Hadoop and the open source tool Oozie to understand  the player experience.\n\n • Zookeeper-\n\nZookeeper is the king of coordination and provides simple, fast, reliable and ordered operational services for a Hadoop cluster. Zookeeper is responsible for synchronization service, distributed configuration service and for providing a naming registry for distributed systems.\n\nZookeeper Use Case-\n\n\nHere is the recorded session from the IBM Certified Hadoop Developer Course at DeZyre about the components of Hadoop Ecosystem –\nSeveral other common Hadoop ecosystem components include: Avro, Cassandra, Chukwa, Mahout, HCatalog, Ambari and Hama. By implementing Hadoop using one or more of the Hadoop ecosystem components, users can personalize their big data experience to meet the changing business requirements. The demand for big data analytics will make the elephant stay in the big data room for quite some time.\n\nData Serialisation (Data Interchange Protocols)\n\nAVRO: Apache Avro is a language-neutral data serialization system, developed by  Apache Hadoop.Data serialization is a mechanism to translate data in computer environment (like memory buffer, data structures or object state) into binary or textual form that can be transported over network or stored in some persistent storage media.Java and Hadoop provides serialization APIs, which are java based, but Avro is not only language independent but also it is schema-based.Once the data is transported over network or retrieved from the persistent storage, it needs to be deserialized again. Serialization is termed as marshalling and deserialization is termed as unmarshalling.\n\nAvro uses JSON format to declare the data structures. Presently, it supports languages such as Java, C, C++, C#, Python, and Ruby.Avro has a schema-based system. A language-independent schema is associated with its read and write operations.\n\nLike Avro, there are other serialization mechanisms in Hadoop such as Sequence Files, Protocol Buffers, and Thrift.Avro creates a self-describing file named Avro Data File, in which it stores data along with its schema in the metadata section.Avro is also used in Remote Procedure Calls (RPCs). During RPC, client and server exchange schemas in the connection handshake.\n\nTo serialize Hadoop data, there are two ways −\n\n • You can use the Writable classes, provided by Hadoop’s native library.\n • You can also use Sequence Files which store the data in binary format.\n\nThe main drawback of these two mechanisms is that Writables and SequenceFiles have only a Java API and they cannot be written or read in any other language.\n\nTherefore any of the files created in Hadoop with above two mechanisms cannot be read by any other third language, which makes Hadoop as a limited box. To address this drawback, Doug Cutting created Avro, which is a language independent data structure.\n\nUse Case:\n\nContent credit : http://www.tutorialspoint.com\n\nAvro provides rich data structures. For example, you can create a record that contains an array, an enumerated type, and a sub record. These datatypes can be created in any language, can be processed in Hadoop, and the results can be fed to a third language.\n\n\n Thrift :\n\nThrift is a lightweight, language-independent software stack with an associated code generation mechanism for RPC. Thrift provides clean abstractions for data transport, data serialization, and application level processing. Thrift was originally developed by Facebook and now it is open sourced as an Apache project. Apache Thrift is a set of code-generation tools that allows developers to build RPC clients and servers by just defining the data types and service interfaces in a simple definition file. Given this file as an input, code is generated to build RPC clients and servers that communicate seamlessly across programming languages.\n\nThrift supports a variety of languages including C++, Java, Python, PHP, Ruby.\n\nTo learn more on Hadoop…keep on reading these tutorials…every day we try to get something new and interesting for all my readers !!\n\nNow we will start learning all Ecosystem components in more detail. Click here to read about how MapReduce Algorithm works with an easy example.\n\nHadoop Ecosystem Components contd…(Tutorial Day 5)\n\n\nData Access Components of Hadoop Ecosystem\n\n • Pig-\n\n\n\n\nUsage of Apache Pig:\n\n\nPig Use Case-\n\n\n\nCode credit: Nick Dimiduk\n • Hive-\n\n\nHive Use Case-\n\n\n\n\nTypes of Databases in existing world\n\nThe capture and analyzing of data is typically performed by database management systems, otherwise known as DBMS’s. These types of database software systems are programmed in SQL. SQL (pronounced “ess-que-el”) stands for Structured Query Language. SQL is used to communicate with a database. According to ANSI (American National Standards Institute), it is the standard language for relational database management systems. The most common of all the different types of databases is Relational Databases.\n\nLet’s learn now the different types of databases that exist in today’s world and how to use them in our work.\n\nTypes of Databases\n\n • Relational Databases: A relational database is a collection of data items organized as a set of formally-described tables from which data can be accessed or reassembled in many different ways without having to reorganize the database tables. The relational database was invented by E. F. Codd at IBM in 1970. Example are: PostgreSQL, SQLite, MySQL ,Oracle, Sysbase.\n • No SQLDatabases/Non-relational Databases : A NoSQL (originally referring to “non SQL”, “non relational” or “not only SQL”) database provides a mechanism for storage and retrieval of data which is modeled in means other than the tabular relations used in relational databases. NoSQL databases are increasingly used in big data and real-time web applications.NoSQL systems are also sometimes called “Not only SQL” to emphasize that they may support SQL-like query languages. Motivations for this approach include: simplicity of design, simpler “horizontal” scaling to clusters of machines (which is a problem for relational databases), and finer control over availability. The data structures used by NoSQL databases (e.g. key-value, columnar, graph, or document) are different from those used by default in relational databases, making some operations faster in NoSQL.\n\n\n\n • New SQL Databases: NewSQL is a term to describe a new group of databases that share much of the functionality of traditional SQL relational databases, while offering some of the benefits of NoSQL technologies.Like it provides, ACID transactional consistency of traditional operational databases; the familiarity and interactivity of SQL; and the scalability and speed of NoSQL.\n\n\nExample to understand both above Databases:\n\n\n\n\n\n\n\nTypes and examples of NoSQL databases\n\nThere have been various approaches to classify NoSQL databases, each with different categories and subcategories, some of which overlap. What follows is a basic classification by data model, with examples:\n\n\n 1. Key-Value Pair (KVP) Databases: Key-value (KV) stores use the associative array (also known as a map or dictionary) as their fundamental data model. In this model, data is represented as a collection of key-value pairs, such that each possible key appears at most once in the collection. The key-value model can be extended to a discretely ordered model that maintains keys in lexicographic order. This extension is computationally powerful, in that it can efficiently retrieve selective key e.g., InfinityDB, Oracle NoSQL Database and dbm.\n 2. Document Databases: each document-oriented database implementation differs on the details of this definition, in general, they all assume that documents encapsulate and encode data (or information) in some standard formats or encodings. Encodings in use include XML and JSON. Documents are addressed in the database via a unique key that represents that document. One of the other defining characteristics of a document-oriented database is that in addition to the key lookup performed by a key-value store, the database offers an API or query language that retrieves documents based on their contents.\n\n\n • Collections\n • Tags\n • Non-visible metadata\n • Directory hierarchies\n\nIn short, Store documents or web pages, e.g.,MongoDB, Apache CouchDB\n\n 1. Columnar Databases: Store data in columns, e.g., Hbase, SAP Hana\n 2. Graph Databases: This kind of database is designed for data whose relations are well represented as a graph consisting of elements interconnected with a finite number of relations between them. The type of data could be social relations, public transport links, road maps or network topologies. Stores nodes and relationship, e.g., Neo4J, FlockDB\n 3. Spatial Databases: For map and nevigational data, e.g.,OpenGEO, PortGIS, ArcSDE\n 4. In-Memory Database (IMDB): All data in memory. For real time applications\n 5. Cloud Databases: Any data that is run in a cloud using IAAS,VM Image, DAAS\n            dbimages                                                                      Image courtesy: theWindowsclub.com\nAdvantages of NoSQL database:\n • Process data faster\n • Have simple data models to understand and execute\n • manage unstructured text", "pred_label": "__label__1", "pred_score_pos": 0.710604727268219} {"content": "Vous êtes sur la page 1sur 179\n\n\nAlgorithms and Data Structures\n\n© N. Wirth 1985 (Oberon version: August 2004)\n1 Fundamental Data Structures\n1.1 Introduction\n1.2 The Concept of Data Type\n1.3 Primitive Data Types\n1.4 Standard Primitive Types\n1.4.1 Integer types\n1.4.2 The type REAL\n1.4.3 The type BOOLEAN\n1.4.4 The type CHAR\n1.4.5 The type SET\n1.5 The Array Structure\n1.6 The Record Structure\n1.7 Representation of Arrays, Records, and Sets\n1.7.1 Representation of Arrays\n1.7.2 Representation of Recors\n1.7.3 Representation of Sets\n1.8 The File (Sequence)\n1.8.1 Elementary File Operators\n1.8.2 Buffering Sequences\n1.8.3 Buffering between Concurrent Processes\n1.8.4 Textual Input and Output\n1.9 Searching\n1.9.1 Linear Search\n1.9.2 Binary Search\n1.9.3 Table Search\n1.9.4 Straight String Search\n1.9.5 The Knuth-Morris-Pratt String Search\n1.9.6 The Boyer-Moore String Search\n2 Sorting\n2.1 Introduction\n2.2 Sorting Arrays\n2.2.1 Sorting by Straight Insertion\n2.2.2 Sorting by Straight Selection\n2.2.3 Sorting by Straight Exchange\n2.3 Advanced Sorting Methods\n2.3.1 Insertion Sort by Diminishing Increment\n2.3.2 Tree Sort\n2.3.3 Partition Sort\n2.3.4 Finding the Median\n2.3.5 A Comparison of Array Sorting Methods\n2.4 Sorting Sequences\n2.4.1 Straight Merging\n2.4.2 Natural Merging\n2.4.3 Balanced Multiway Merging\n2.4.4 Polyphase Sort\n2.4.5 Distribution of Initial Runs\n\n3 Recursive Algorithms\n3.1 Introduction\n3.2 When Not to Use Recursion\n3.3 Two Examples of Recursive Programs\n3.4 Backtracking Algorithms\n3.5 The Eight Queens Problem\n3.6 The Stable Marriage Problem\n3.7 The Optimal Selection Problem\n4 Dynamic Information Structures\n4.1 Recursive Data Types\n4.2 Pointers\n4.3 Linear Lists\n4.3.1 Basic Operations\n4.3.2 Ordered Lists and Reorganizing Lists\n4.3.3 An Application: Topological Sorting\n4.4 Tree Structures\n4.4.1 Basic Concepts and Definitions\n4.4.2 Basic Operations on Binary Trees\n4.4.3 Tree Search and Insertion\n4.4.4 Tree Deletion\n4.4.5 Analysis of Tree Search and Insertion\n4.5 Balanced Trees\n4.5.1 Balanced Tree Insertion\n4.5.2 Balanced Tree Deletion\n4.6 Optimal Search Trees\n4.7 B-Trees\n4.7.1 Multiway B-Trees\n4.7.2 Binary B-Trees\n4.8 Priority Search Trees\n5 Key Transformations (Hashing)\n5.1 Introduction\n5.2 Choice of a Hash Function\n5.3 Collision handling\n5.4 Analysis of Key Transformation\nA The ASCII Character Set\nB The Syntax of Oberon\n\nDijkstra's Notes on Structured Programming [1] opened a new view of programming as a scientific\nsubject and intellectual challenge, and it coined the title for a \"revolution\" in programming. Hoare's\nAxiomatic Basis of Computer Programming [2] showed in a lucid manner that programs are amenable to\nan exacting analysis based on mathematical reasoning. Both these papers argue convincingly that many\nprogrammming errors can be prevented by making programmers aware of the methods and techniques\nwhich they hitherto applied intuitively and often unconsciously. These papers focused their attention on\nthe aspects of composition and analysis of programs, or more explicitly, on the structure of algorithms\nrepresented by program texts. Yet, it is abundantly clear that a systematic and scientific approach to\nprogram construction primarily has a bearing in the case of large, complex programs which involve\ncomplicated sets of data. Hence, a methodology of programming is also bound to include all aspects of\ndata structuring. Programs, after all, are concrete formulations of abstract algorithms based on particular\nrepresentations and structures of data. An outstanding contribution to bring order into the bewildering\nStructuring [3]. It made clear that decisions about structuring data cannot be made without knowledge of\nthe algorithms applied to the data and that, vice versa, the structure and choice of algorithms often\ndepend strongly on the structure of the underlying data. In short, the subjects of program composition\nand data structures are inseparably interwined.\nYet, this book starts with a chapter on data structure for two reasons. First, one has an intuitive feeling\nthat data precede algorithms: you must have some objects before you can perform operations on them.\nSecond, and this is the more immediate reason, this book assumes that the reader is familiar with the\nbasic notions of computer programming. Traditionally and sensibly, however, introductory programming\ncourses concentrate on algorithms operating on relatively simple structures of data. Hence, an\nintroductory chapter on data structures seems appropriate.\nThroughout the book, and particularly in Chap. 1, we follow the theory and terminology expounded by\nHoare and realized in the programming language Pascal [4]. The essence of this theory is that data in the\nfirst instance represent abstractions of real phenomena and are preferably formulated as abstract\nstructures not necessarily realized in common programming languages. In the process of program\nconstruction the data representation is gradually refined -- in step with the refinement of the algorithm --\nto comply more and more with the constraints imposed by an available programming system [5]. We\ntherefore postulate a number of basic building principles of data structures, called the fundamental\nstructures. It is most important that they are constructs that are known to be quite easily implementable\non actual computers, for only in this case can they be considered the true elements of an actual data\nrepresentation, as the molecules emerging from the final step of refinements of the data description. They\nare the record, the array (with fixed size), and the set. Not surprisingly, these basic building principles\ncorrespond to mathematical notions that are fundamental as well.\nA cornerstone of this theory of data structures is the distinction between fundamental and \"advanced\"\nstructures. The former are the molecules -- themselves built out of atoms -- that are the components of\nthe latter. Variables of a fundamental structure change only their value, but never their structure and\nnever the set of values they can assume. As a consequence, the size of the store they occupy remains\nconstant. \"Advanced\" structures, however, are characterized by their change of value and structure during\nthe execution of a program. More sophisticated techniques are therefore needed for their implementation.\nThe sequence appears as a hybrid in this classification. It certainly varies its length; but that change in\nstructure is of a trivial nature. Since the sequence plays a truly fundamental role in practically all\ncomputer systems, its treatment is included in Chap. 1.\nThe second chapter treats sorting algorithms. It displays a variety of different methods, all serving the\nsame purpose. Mathematical analysis of some of these algorithms shows the advantages and\ndisadvantages of the methods, and it makes the programmer aware of the importance of analysis in the\n\nchoice of good solutions for a given problem. The partitioning into methods for sorting arrays and\nmethods for sorting files (often called internal and external sorting) exhibits the crucial influence of data\nrepresentation on the choice of applicable algorithms and on their complexity. The space allocated to\nsorting would not be so large were it not for the fact that sorting constitutes an ideal vehicle for\nillustrating so many principles of programming and situations occurring in most other applications. It\noften seems that one could compose an entire programming course by deleting examples from sorting\nAnother topic that is usually omitted in introductory programming courses but one that plays an\nimportant role in the conception of many algorithmic solutions is recursion. Therefore, the third chapter\nis devoted to recursive algorithms. Recursion is shown to be a generalization of repetition (iteration), and\nas such it is an important and powerful concept in programming. In many programming tutorials, it is\nunfortunately exemplified by cases in which simple iteration would suffice. Instead, Chap. 3 concentrates\non several examples of problems in which recursion allows for a most natural formulation of a solution,\nwhereas use of iteration would lead to obscure and cumbersome programs. The class of backtracking\nalgorithms emerges as an ideal application of recursion, but the most obvious candidates for the use of\nrecursion are algorithms operating on data whose structure is defined recursively. These cases are treated\nin the last two chapters, for which the third chapter provides a welcome background.\nChapter 4 deals with dynamic data structures, i.e., with data that change their structure during the\nexecution of the program. It is shown that the recursive data structures are an important subclass of the\ndynamic structures commonly used. Although a recursive definition is both natural and possible in these\ncases, it is usually not used in practice. Instead, the mechanism used in its implementation is made\nevident to the programmer by forcing him to use explicit reference or pointer variables. This book\nfollows this technique and reflects the present state of the art: Chapter 4 is devoted to programming with\npointers, to lists, trees and to examples involving even more complicated meshes of data. It presents what\nis often (and somewhat inappropriately) called list processing. A fair amount of space is devoted to tree\norganizations, and in particular to search trees. The chapter ends with a presentation of scatter tables, also\ncalled \"hash\" codes, which are oftern preferred to search trees. This provides the possibility of comparing\ntwo fundamentally different techniques for a frequently encountered application.\nProgramming is a constructive activity. How can a constructive, inventive activity be taught? One\nmethod is to crystallize elementary composition priciples out many cases and exhibit them in a\nactivities. The belief that it could ever be condensed into a sort of pure recipe teaching is mistaken. What\nan algorithm's principle and its mathematical analysis may be stimulating and challenging to the\nOf course, this raises the problem of finding a form which at the same time is both machine executable\nand sufficiently machine independent to be included in such a text. In this respect, neither widely used\nlanguages nor abstract notations proved to be adequate. The language Pascal provides an appropriate\ncompromise; it had been developed with exactly this aim in mind, and it is therefore used throughout this\nbook. The programs can easily be understood by programmers who are familiar with some other high-\nlevel language, such as ALGOL 60 or PL/1, because it is easy to understand the Pascal notation while\nproceeding through the text. However, this not to say that some proparation would not be beneficial. The\n\nbook Systematic Programming [6] provides an ideal background because it is also based on the Pascal\nnotation. The present book was, however, not intended as a manual on the language Pascal; there exist\nmore appropriate texts for this purpose [7].\nThis book is a condensation -- and at the same time an elaboration -- of several courses on programming\ntaught at the Federal Institute of Technology (ETH) at Zürich. I owe many ideas and views expressed in\nthis book to discussions with my collaborators at ETH. In particular, I wish to thank Mr. H. Sandmayr for\nhis careful reading of the manuscript, and Miss Heidi Theiler and my wife for their care and patience in\ntyping the text. I should also like to mention the stimulating influence provided by meetings of the\nWorking Groups 2.1 and 2.3 of IFIP, and particularly the many memorable arguments I had on these\noccasions with E. W. Dijkstra and C.A.R. Hoare. Last but not least, ETH generously provided the\nenvironment and the computing facilities without which the preparation of this text would have been\nZürich, Aug. 1975 N. Wirth\n\n1. In Structured Programming. O-.J. Dahl, E.W. Dijkstra, C.A.R. Hoare. F. Genuys, Ed. (New York;\nAcademic Press, 1972), pp. 1-82.\n2. In Comm. ACM, 12, No. 10 (1969), 576-83.\n3. In Structured Programming, pp. 83-174.\n4. N. Wirth. The Programming Language Pascal. Acta Informatica, 1, No. 1 (1971), 35-63.\n5. N. Wirth. Program Development by Stepwise Refinement. Comm. ACM, 14, No. 4 (1971), 221-27.\n6. N. Wirth. Systematic Programming. (Englewood Cliffs, N.J. Prentice-Hall, Inc., 1973.)\n7. K. Jensen and N. Wirth, PASCAL-User Manual and Report. (Berlin, Heidelberg, New York;\nSpringer-Verlag, 1974).\n\nPreface To The 1985 Edition\n\nThis new Edition incorporates many revisions of details and several changes of more significant nature.\nThey were all motivated by experiences made in the ten years since the first Edition appeared. Most of\nthe contents and the style of the text, however, have been retained. We briefly summarize the major\nThe major change which pervades the entire text concerns the programming language used to express the\nalgorithms. Pascal has been replaced by Modula-2. Although this change is of no fundamental influence\nto the presentation of the algorithms, the choice is justified by the simpler and more elegant syntactic\nstructures of Modula-2, which often lead to a more lucid representation of an algorithm's structure. Apart\nfrom this, it appeared advisable to use a notation that is rapidly gaining acceptance by a wide community,\nbecause it is well-suited for the development of large programming systems. Nevertheless, the fact that\nPascal is Modula's ancestor is very evident and eases the task of a transition. The syntax of Modula is\nsummarized in the Appendix for easy reference.\nAs a direct consequence of this change of programming language, Sect. 1.11 on the sequential file\nstructure has been rewritten. Modula-2 does not offer a built-in file type. The revised Sect. 1.11 presents\nthe concept of a sequence as a data structure in a more general manner, and it introduces a set of program\nmodules that incorporate the sequence concept in Modula-2 specifically.\nThe last part of Chapter 1 is new. It is dedicated to the subject of searching and, starting out with linear\nand binary search, leads to some recently invented fast string searching algorithms. In this section in\nparticular we use assertions and loop invariants to demonstrate the correctness of the presented\nA new section on priority search trees rounds off the chapter on dynamic data structures. Also this\nspecies of trees was unknown when the first Edition appeared. They allow an economical representation\nand a fast search of point sets in a plane.\n\nThe entire fifth chapter of the first Edition has been omitted. It was felt that the subject of compiler\nconstruction was somewhat isolated from the preceding chapters and would rather merit a more extensive\ntreatment in its own volume.\nFinally, the appearance of the new Edition reflects a development that has profoundly influenced\npublications in the last ten years: the use of computers and sophisticated algorithms to prepare and\nautomatically typeset documents. This book was edited and laid out by the author with the aid of a Lilith\ncomputer and its document editor Lara. Without these tools, not only would the book become more\ncostly, but it would certainly not be finished yet.\nPalo Alto, March 1985 N. Wirth\n\nThe following notations, adopted from publications of E.W. Dijkstra, are used in this book.\nIn logical expressions, the character & denotes conjunction and is pronounced as and. The character ~\ndenotes negation and is pronounced as not. Boldface A and E are used to denote the universal and\nexistential quantifiers. In the following formulas, the left part is the notation used and defined here in\nterms of the right part. Note that the left parts avoid the use of the symbol \"...\", which appeals to the\nreaders intuition.\nAi: m ≤ i < n : Pi ≡ P m & Pm+1 & ... & P n-1\nThe P i are predicates, and the formula asserts that for all indices i ranging from a given value m to, but\nexcluding a value n, P i holds.\nEi: m ≤ i < n : Pi ≡ P m or Pm+1 or ... or Pn-1\nThe P i are predicates, and the formula asserts that for some indices i ranging from a given value m to, but\nexcluding a value n, P i holds.\nSi: m ≤ i < n : xi = xm + xm+1 + ... + xn-1\nMIN i: m ≤ i < n : xi = minimum(xm , ... , xn-1)\nMAX i: m ≤ i < n : xi = maximum(xm, … , xn-1)\n\n1. Fundamental Data Structures\n\n1.1. Introduction\nThe modern digital computer was invented and intended as a device that should facilitate and speed up\ncomplicated and time-consuming computations. In the majority of applications its capability to store and\naccess large amounts of information plays the dominant part and is considered to be its primary\ncharacteristic, and its ability to compute, i.e., to calculate, to perform arithmetic, has in many cases become\nalmost irrelevant.\nIn all these cases, the large amount of information that is to be processed in some sense represents an\nabstraction of a part of reality. The information that is available to the computer consists of a selected set of\ndata about the actual problem, namely that set that is considered relevant to the problem at hand, that set\nfrom which it is believed that the desired results can be derived. The data represent an abstraction of reality\nperipheral and irrelevant to the particular problem. An abstraction is thereby also a simplification of facts.\nWe may regard a personnel file of an employer as an example. Every employee is represented (abstracted)\non this file by a set of data relevant either to the employer or to his accounting procedures. This set may\ninclude some identification of the employee, for example, his or her name and salary. But it will most\nprobably not include irrelevant data such as the hair color, weight, and height.\nIn solving a problem with or without a computer it is necessary to choose an abstraction of reality, i.e., to\ndefine a set of data that is to represent the real situation. This choice must be guided by the problem to be\nsolved. Then follows a choice of representation of this information. This choice is guided by the tool that is\nto solve the problem, i.e., by the facilities offered by the computer. In most cases these two steps are not\nentirely separable.\nThe choice of representation of data is often a fairly difficult one, and it is not uniquely determined by the\nfacilities available. It must always be taken in the light of the operations that are to be performed on the\ndata. A good example is the representation of numbers, which are themselves abstractions of properties of\nobjects to be characterized. If addition is the only (or at least the dominant) operation to be performed, then\na good way to represent the number n is to write n strokes. The addition rule on this representation is\nindeed very obvious and simple. The Roman numerals are based on the same principle of simplicity, and\nthe adding rules are similarly straightforward for small numbers. On the other hand, the representation by\nArabic numerals requires rules that are far from obvious (for small numbers) and they must be memorized.\nHowever, the situation is reversed when we consider either addition of large numbers or multiplication and\ndivision. The decomposition of these operations into simpler ones is much easier in the case of\nrepresentation by Arabic numerals because of their systematic structuring principle that is based on\npositional weight of the digits.\nIt is generally known that computers use an internal representation based on binary digits (bits). This\nrepresentation is unsuitable for human beings because of the usually large number of digits involved, but it\nis most suitable for electronic circuits because the two values 0 and 1 can be represented conveniently and\nreliably by the presence or absence of electric currents, electric charge, or magnetic fields.\nFrom this example we can also see that the question of representation often transcends several levels of\ndetail. Given the problem of representing, say, the position of an object, the first decision may lead to the\nchoice of a pair of real numbers in, say, either Cartesian or polar coordinates. The second decision may lead\nto a floating-point representation, where every real number x consists of a pair of integers denoting a\nfraction f and an exponent e to a certain base (such that x = f×2e). The third decision, based on the\nknowledge that the data are to be stored in a computer, may lead to a binary, positional representation of\nintegers, and the final decision could be to represent binary digits by the electric charge in a semiconductor\nstorage device. Evidently, the first decision in this chain is mainly influenced by the problem situation, and\nthe later ones are progressively dependent on the tool and its technology. Thus, it can hardly be required\nthat a programmer decide on the number representation to be employed, or even on the storage device\ncharacteristics. These lower-level decisions can be left to the designers of computer equipment, who have\nthe most information available on current technology with which to make a sensible choice that will be\nacceptable for all (or almost all) applications where numbers play a role.\n\nIn this context, the significance of programming languages becomes apparent. A programming language\nrepresents an abstract computer capable of interpreting the terms used in this language, which may embody\na certain level of abstraction from the objects used by the actual machine. Thus, the programmer who uses\nsuch a higher-level language will be freed (and barred) from questions of number representation, if the\nnumber is an elementary object in the realm of this language.\nThe importance of using a language that offers a convenient set of basic abstractions common to most\nproblems of data processing lies mainly in the area of reliability of the resulting programs. It is easier to\ndesign a program based on reasoning with familiar notions of numbers, sets, sequences, and repetitions\nthan on bits, storage units, and jumps. Of course, an actual computer represents all data, whether numbers,\nsets, or sequences, as a large mass of bits. But this is irrelevant to the programmer as long as he or she does\nnot have to worry about the details of representation of the chosen abstractions, and as long as he or she can\nrest assured that the corresponding representation chosen by the computer (or compiler) is reasonable for\nthe stated purposes.\nThe closer the abstractions are to a given computer, the easier it is to make a representation choice for the\nengineer or implementor of the language, and the higher is the probability that a single choice will be\nsuitable for all (or almost all) conceivable applications. This fact sets definite limits on the degree of\nabstraction from a given real computer. For example, it would not make sense to include geometric objects\nas basic data items in a general-purpose language, since their proper repesentation will, because of its\ninherent complexity, be largely dependent on the operations to be applied to these objects. The nature and\nfrequency of these operations will, however, not be known to the designer of a general-purpose language\nand its compiler, and any choice the designer makes may be inappropriate for some potential applications.\nIn this book these deliberations determine the choice of notation for the description of algorithms and their\ndata. Clearly, we wish to use familiar notions of mathematics, such as numbers, sets, sequences, and so on,\nrather than computer-dependent entities such as bitstrings. But equally clearly we wish to use a notation for\nwhich efficient compilers are known to exist. It is equally unwise to use a closely machine-oriented and\nmachine-dependent language, as it is unhelpful to describe computer programs in an abstract notation that\nleaves problems of representation widely open. The programming language Pascal had been designed in an\nattempt to find a compromise between these extremes, and the successor languages Modula-2 and Oberon\nare the result of decades of experience [1-3]. Oberon retains Pascal's basic concepts and incorporates some\nimprovements and some extensions; it is used throughout this book [1-5]. It has been successfully\nimplemented on several computers, and it has been shown that the notation is sufficiently close to real\nmachines that the chosen features and their representations can be clearly explained. The language is also\nsufficiently close to other languages, and hence the lessons taught here may equally well be applied in their\n\n1.2. The Concept of Data Type\n\nIn mathematics it is customary to classify variables according to certain important characteristics. Clear\ndistinctions are made between real, complex, and logical variables or between variables representing\nindividual values, or sets of values, or sets of sets, or between functions, functionals, sets of functions, and\nso on. This notion of classification is equally if not more important in data processing. We will adhere to\nthe principle that every constant, variable, expression, or function is of a certain type. This type essentially\ncharacterizes the set of values to which a constant belongs, or which can be assumed by a variable or\nexpression, or which can be generated by a function.\nIn mathematical texts the type of a variable is usually deducible from the typeface without consideration of\ncontext; this is not feasible in computer programs. Usually there is one typeface available on computer\nequipment (i.e., Latin letters). The rule is therefore widely accepted that the associated type is made explicit\nin a declaration of the constant, variable, or function, and that this declaration textually precedes the\napplication of that constant, variable, or function. This rule is particularly sensible if one considers the fact\nthat a compiler has to make a choice of representation of the object within the store of a computer.\nEvidently, the amount of storage allocated to a variable will have to be chosen according to the size of the\nrange of values that the variable may assume. If this information is known to a compiler, so-called dynamic\nstorage allocation can be avoided. This is very often the key to an efficient realization of an algorithm.\n\nThe primary characteristics of the concept of type that is used throughout this text, and that is embodied in\nthe programming language Oberon, are the following [1-2]:\n1. A data type determines the set of values to which a constant belongs, or which may be assumed by a\nvariable or an expression, or which may be generated by an operator or a function.\n2. The type of a value denoted by a constant, variable, or expression may be derived from its form or its\ndeclaration without the necessity of executing the computational process.\n3. Each operator or function expects arguments of a fixed type and yields a result of a fixed type. If an\noperator admits arguments of several types (e.g., + is used for addition of both integers and real\nnumbers), then the type of the result can be determined from specific language rules.\nAs a consequence, a compiler may use this information on types to check the legality of various constructs.\nFor example, the mistaken assignment of a Boolean (logical) value to an arithmetic variable may be\ndetected without executing the program. This kind of redundancy in the program text is extremely useful as\nan aid in the development of programs, and it must be considered as the primary advantage of good high-\nlevel languages over machine code (or symbolic assembly code). Evidently, the data will ultimately be\nrepresented by a large number of binary digits, irrespective of whether or not the program had initially been\nconceived in a high-level language using the concept of type or in a typeless assembly code. To the\ncomputer, the store is a homogeneous mass of bits without apparent structure. But it is exactly this abstract\nstructure which alone is enabling human programmers to recognize meaning in the monotonous landscape\nof a computer store.\nThe theory presented in this book and the programming language Oberon specify certain methods of\ndefining data types. In most cases new data types are defined in terms of previously defined data types.\nValues of such a type are usually conglomerates of component values of the previously defined constituent\ntypes, and they are said to be structured. If there is only one constituent type, that is, if all components are\nof the same constituent type, then it is known as the base type. The number of distinct values belonging to a\ntype T is called its cardinality. The cardinality provides a measure for the amount of storage needed to\nrepresent a variable x of the type T, denoted by x: T.\nSince constituent types may again be structured, entire hierarchies of structures may be built up, but,\nobviously, the ultimate components of a structure are atomic. Therefore, it is necessary that a notation is\nprovided to introduce such primitive, unstructured types as well. A straightforward method is that of\nenumerating the values that are to constitute the type. For example in a program concerned with plane\ngeometric figures, we may introduce a primitive type called shape, whose values may be denoted by the\nidentifiers rectangle, square, ellipse, circle. But apart from such programmer-defined types, there will have\nto be some standard, predefined types. They usually include numbers and logical values. If an ordering\nexists among the individual values, then the type is said to be ordered or scalar. In Oberon, all unstructured\ntypes are ordered; in the case of explicit enumeration, the values are assumed to be ordered by their\nenumeration sequence.\nWith this tool in hand, it is possible to define primitive types and to build conglomerates, structured types\nup to an arbitrary degree of nesting. In practice, it is not sufficient to have only one general method of\ncombining constituent types into a structure. With due regard to practical problems of representation and\nuse, a general-purpose programming language must offer several methods of structuring. In a mathematical\nsense, they are equivalent; they differ in the operators available to select components of these structures.\nThe basic structuring methods presented here are the array, the record, the set, and the sequence. More\ncomplicated structures are not usually defined as static types, but are instead dynamically generated during\nthe execution of the program, when they may vary in size and shape. Such structures are the subject of\nChap. 4 and include lists, rings, trees, and general, finite graphs.\nVariables and data types are introduced in a program in order to be used for computation. To this end, a set\nof operators must be available. For each standard data type a programming languages offers a certain set of\nprimitive, standard operators, and likewise with each structuring method a distinct operation and notation\nfor selecting a component. The task of composition of operations is often considered the heart of the art of\nprogramming. However, it will become evident that the appropriate composition of data is equally\nfundamental and essential.\n\nThe most important basic operators are comparison and assignment, i.e., the test for equality (and for order\nin the case of ordered types), and the command to enforce equality. The fundamental difference between\nthese two operations is emphasized by the clear distinction in their denotation throughout this text.\nTest for equality: x=y (an expression with value TRUE or FALSE)\nAssignment to x: x := y (a statement making x equal to y)\nThese fundamental operators are defined for most data types, but it should be noted that their execution\nmay involve a substantial amount of computational effort, if the data are large and highly structured.\nFor the standard primitive data types, we postulate not only the availability of assignment and comparison,\nbut also a set of operators to create (compute) new values. Thus we introduce the standard operations of\narithmetic for numeric types and the elementary operators of propositional logic for logical values.\n\n1.3. Primitive Data Types\n\nA new, primitive type is definable by enumerating the distinct values belonging to it. Such a type is called\nan enumeration type. Its definition has the form\nTYPE T = (c1, c2, ... , cn)\nT is the new type identifier, and the ci are the new constant identifiers.\nTYPE shape = (rectangle, square, ellipse, circle)\nTYPE color = (red, yellow, green)\nTYPE sex = (male, female)\nTYPE weekday = (Monday, Tuesday, Wednesday, Thursday, Friday,\nSaturday, Sunday)\nTYPE currency = (franc, mark, pound, dollar, shilling, lira, guilder,\nkrone, ruble, cruzeiro, yen)\nTYPE destination = (hell, purgatory, heaven)\nTYPE vehicle = (train, bus, automobile, boat, airplane)\nTYPE rank = (private, corporal, sergeant, lieutenant, captain, major,\ncolonel, general)\nTYPE object = (constant, type, variable, procedure, module)\nTYPE structure = (array, record, set, sequence)\nTYPE condition = (manual, unloaded, parity, skew)\nThe definition of such types introduces not only a new type identifier, but at the same time the set of\nidentifiers denoting the values of the new type. These identifiers may then be used as constants throughout\nthe program, and they enhance its understandability considerably. If, as an example, we introduce variables\ns, d, r, and b.\nVAR s: sex\nVAR d: weekday\nVAR r: rank\nthen the following assignment statements are possible:\ns := male\nd := Sunday\nr := major\nb := TRUE\nEvidently, they are considerably more informative than their counterparts\ns := 1 d := 7 r := 6 b := 2\nwhich are based on the assumption that c, d, r, and b are defined as integers and that the constants are\nmapped onto the natural numbers in the order of their enumeration. Furthermore, a compiler can check\n\nagainst the inconsistent use of operators. For example, given the declaration of s above, the statement s :=\ns+1 would be meaningless.\nIf, however, we recall that enumerations are ordered, then it is sensible to introduce operators that generate\nthe successor and predecessor of their argument. We therefore postulate the following standard operators,\nwhich assign to their argument its successor and predecessor respectively:\nINC(x) DEC(x)\n\n1.4. Standard Primitive Types\n\nStandard primitive types are those types that are available on most computers as built-in features. They\ninclude the whole numbers, the logical truth values, and a set of printable characters. On many computers\nfractional numbers are also incorporated, together with the standard arithmetic operations. We denote these\ntypes by the identifiers\n\n1.4.1. Integer types\n\nThe type INTEGER comprises a subset of the whole numbers whose size may vary among individual\ncomputer systems. If a computer uses n bits to represent an integer in two's complement notation, then the\nadmissible values x must satisfy -2n-1 ≤ x < 2n-1. It is assumed that all operations on data of this type are\nexact and correspond to the ordinary laws of arithmetic, and that the computation will be interrupted in the\ncase of a result lying outside the representable subset. This event is called overflow. The standard operators\nare the four basic arithmetic operations of addition (+), subtraction (-), multiplication (*), and division (/,\nWhereas the slash denotes ordinary division resulting in a value of type REAL, the operator DIV denotes\ninteger division resulting in a value of type INTEGER. If we define the quotient q = m DIV n and the\nremainder r = m MOD n, the following relations hold, assuming n > 0:\nq*n + r = m and 0 ≤ r < n\n31 DIV 10 = 3 31 MOD 10 = 1\n-31 DIV 10 = -4 -31 MOD 10 = 9\nWe know that dividing by 10n can be achieved by merely shifting the decimal digits n places to the right\nand thereby ignoring the lost digits. The same method applies, if numbers are represented in binary instead\nof decimal form. If two's complement representation is used (as in practically all modern computers), then\nthe shifts implement a division as defined by the above DIV operaton. Moderately sophisticated compilers\nwill therefore represent an operation of the form m DIV 2n or m MOD 2n by a fast shift (or mask)\n\n1.4.2. The type REAL\n\nThe type REAL denotes a subset of the real numbers. Whereas arithmetic with operands of the types\nINTEGER is assumed to yield exact results, arithmetic on values of type REAL is permitted to be\ninaccurate within the limits of round-off errors caused by computation on a finite number of digits. This is\nthe principal reason for the explicit distinction between the types INTEGER and REAL, as it is made in\nmost programming languages.\nThe standard operators are the four basic arithmetic operations of addition (+), subtraction (-),\nmultiplication (*), and division (/). It is an essence of data typing that different types are incompatible\nunder assignment. An exception to this rule is made for assignment of integer values to real variables,\nbecause here the semanitcs are unambiguous. After all, integers form a subset of real numbers. However,\nthe inverse direction is not permissible: Assignment of a real value to an integer variable requires an\noperation such as truncation or rounding. The standard transfer function Entier(x) yields the integral part of\nx. Rounding of x is obtained by Entier(x + 0.5).\n\nMany programming languages do not include an exponentiation operator. The following is an algorithm for\nthe fast computation of y = xn, where n is a non-negative integer.\ny := 1.0; i := n;\nWHILE i > 0 DO (* x0n = xi * y *)\nIF ODD(i) THEN y := y*x END ;\nx := x*x; i := i DIV 2\n\n1.4.3. The type BOOLEAN\n\nThe two values of the standard type BOOLEAN are denoted by the identifiers TRUE and FALSE. The\nBoolean operators are the logical conjunction, disjunction, and negation whose values are defined in Table\n1.1. The logical conjunction is denoted by the symbol &, the logical disjunction by OR, and negation by\n“~”. Note that comparisons are operations yielding a result of type BOOLEAN. Thus, the result of a\ncomparison may be assigned to a variable, or it may be used as an operand of a logical operator in a\nBoolean expression. For instance, given Boolean variables p and q and integer variables x = 5, y = 8, z =\n10, the two assignments\np := x = y\nq := (x ≤ y) & (y < z)\nyield p = FALSE and q = TRUE.\n\np q p&q p OR q ~p\nTable 1.1 Boolean Operators.\nThe Boolean operators & (AND) and OR have an additional property in most programming languages,\nwhich distinguishes them from other dyadic operators. Whereas, for example, the sum x+y is not defined, if\neither x or y is undefined, the conjunction p&q is defined even if q is undefined, provided that p is FALSE.\nThis conditionality is an important and useful property. The exact definition of & and OR is therefore given\nby the following equations:\np &q = if p then q else FALSE\np OR q = if p then TRUE else q\n\n1.4.4. The type CHAR\n\nThe standard type CHAR comprises a set of printable characters. Unfortunately, there is no generally\naccepted standard character set used on all computer systems. Therefore, the use of the predicate \"standard\"\nmay in this case be almost misleading; it is to be understood in the sense of \"standard on the computer\nsystem on which a certain program is to be executed.\"\nThe character set defined by the International Standards Organization (ISO), and particularly its American\nversion ASCII (American Standard Code for Information Interchange) is the most widely accepted set. The\nASCII set is therefore tabulated in Appendix A. It consists of 95 printable (graphic) characters and 33\ncontrol characters, the latter mainly being used in data transmission and for the control of printing\nIn order to be able to design algorithms involving characters (i.e., values of type CHAR) that are system\nindependent, we should like to be able to assume certain minimal properties of character sets, namely:\n1. The type CHAR contains the 26 capital Latin letters, the 26 lower-case letters, the 10 decimal digits,\nand a number of other graphic characters, such as punctuation marks.\n2. The subsets of letters and digits are ordered and contiguous, i.e.,\n\n(\"A\" ≤ x) & (x ≤ \"Z\") implies that x is a capital letter\n\n(\"a\" ≤ x) & (x ≤ \"z\") implies that x is a lower-case letter\n(\"0\" ≤ x) & (x ≤ \"9\") implies that x is a decimal digit\n3. The type CHAR contains a non-printing, blank character and a line-end character that may be used as\n\n\nFig. 1.1. Representations of a text\n\nThe availability of two standard type transfer functions between the types CHAR and INTEGER is\nparticularly important in the quest to write programs in a machine independent form. We will call them\nORD(ch), denoting the ordinal number of ch in the character set, and CHR(i), denoting the character with\nordinal number i. Thus, CHR is the inverse function of ORD, and vice versa, that is,\nORD(CHR(i)) = i (if CHR(i) is defined)\nCHR(ORD(c)) = c\nFurthermore, we postulate a standard function CAP(ch). Its value is defined as the capital letter\ncorresponding to ch, provided ch is a letter.\nch is a lower-case letter implies that CAP(ch) = corresponding capital letter\nch is a capital letter implies that CAP(ch) = ch\n\n1.4.5. The type SET\n\nThe type SET denotes sets whose elements are integers in the range 0 to a small number, typically 31 or 63.\nGiven, for example, variables\nVAR r, s, t: SET\npossible assignments are\nr := {5}; s := {x, y .. z}; t := {}\nHere, the value assigned to r is the singleton set consisting of the single element 5; to t is assigned the\nempty set, and to s the elements x, y, y+1, … , z-1, z.\nThe following elementary operators are defined on variables of type SET:\n* set intersection\n+ set union\n- set difference\n/ symmetric set difference\nIN set membership\nConstructing the intersection or the union of two sets is often called set multiplication or set addition,\nrespectively; the priorities of the set operators are defined accordingly, with the intersection operator\nhaving priority over the union and difference operators, which in turn have priority over the membership\noperator, which is classified as a relational operator. Following are examples of set expressions and their\nfully parenthesized equivalents:\nr*s+t = (r*s) + t\nr-s*t = r - (s*t)\nr-s+ t = (r-s) + t\n\nr+s/t = r + (s/t)\nx IN s + t = x IN (s+t)\n\n1.5. The Array Structure\n\nThe array is probably the most widely used data structure; in some languages it is even the only one\navailable. An array consists of components which are all of the same type, called its base type; it is\ntherefore called a homogeneous structure. The array is a random-access structure, because all components\ncan be selected at random and are equally quickly accessible. In order to denote an individual component,\nthe name of the entire structure is augmented by the index selecting the component. This index is to be an\ninteger between 0 and n-1, where n is the number of elements, the size, of the array.\nA particular value of a variable\nVAR x: Row\nwith all components satisfying the equation xi = 2-i, may be visualized as shown in Fig. 1.2.\n\nx0 1.0\n\nx1 0.5\n\nx2 0.25\n\nx3 0.125\n\nFig. 1.2 Array of type Row with x i = 2 -i\n\nAn individual component of an array can be selected by an index. Given an array variable x, we denote an\narray selector by the array name followed by the respective component's index i, and we write x i or x[i].\nBecause of the first, conventional notation, a component of an array component is therefore also called a\nsubscripted variable.\nThe common way of operating with arrays, particularly with large arrays, is to selectively update single\ncomponents rather than to construct entirely new structured values. This is expressed by considering an\narray variable as an array of component variables and by permitting assignments to selected components,\nsuch as for example x[i] := 0.125. Although selective updating causes only a single component value to\nchange, from a conceptual point of view we must regard the entire composite value as having changed too.\nThe fact that array indices, i.e., names of array components, are integers, has a most important\nconsequence: indices may be computed. A general index expression may be substituted in place of an\nindex constant; this expression is to be evaluated, and the result identifies the selected component. This\ngenerality not only provides a most significant and powerful programming facility, but at the same time it\nalso gives rise to one of the most frequently encountered programming mistakes: The resulting value may\nbe outside the interval specified as the range of indices of the array. We will assume that decent computing\nsystems provide a warning in the case of such a mistaken access to a non-existent array component.\nThe cardinality of a structured type, i. e. the number of values belonging to this type, is the product of the\ncardinality of its components. Since all components of an array type T are of the same base type T0, we\ncard(T) = card(T0)n\n\nConstituents of array types may themselves be structured. An array variable whose components are again\narrays is called a matrix. For example,\nM: ARRAY 10 OF Row\nis an array consisting of ten components (rows), each constisting of four components of type REAL, and is\ncalled a 10 × 4 matrix with real components. Selectors may be concatenated accordingly, such that Mij and\nM[i][j] denote the j th component of row Mi, which is the i th component of M. This is usually abbreviated\nas M[i, j] and in the same spirit the declaration\ncan be written more concisely as\nIf a certain operation has to be performed on all components of an array or on adjacent components of a\nsection of the array, then this fact may conveniently be emphasized by using the FOR satement, as shown\nin the following examples for computing the sum and for finding the maximal element of an array declared\nsum := 0;\nFOR i := 0 TO N-1 DO sum := a[i] + sum END\nk := 0; max := a[0];\nFOR i := 1 TO N-1 DO\nIF max < a[i] THEN k := i; max := a[k] END\nIn a further example, assume that a fraction f is represented in its decimal form with k-1 digits, i.e., by an\narray d such that\nf = S i : 0 ≤ i < k: di * 10 -i or\nf = d0 + 10*d1 + 100*d2 + … + dk-1*10\nNow assume that we wish to divide f by 2. This is done by repeating the familiar division operation for all\nk-1 digits di, starting with i=1. It consists of dividing each digit by 2 taking into account a possible carry\nfrom the previous position, and of retaining a possible remainder r for the next position:\nr := 10*r +d[i]; d[i] := r DIV 2; r := r MOD 2\nThis algorithm is used to compute a table of negative powers of 2. The repetition of halving to compute 2-1,\n2 -2, ... , 2-N is again appropriately expressed by a FOR statement, thus leading to a nesting of two FOR\nPROCEDURE Power(VAR W: Texts.Writer; N: INTEGER);\n(*compute decimal representation of negative powers of 2*)\nVAR i, k, r: INTEGER;\nFOR k := 0 TO N-1 DO\nTexts.Write(W, \".\"); r := 0;\nFOR i := 0 TO k-1 DO\nTexts.Write(W, CHR(d[i] + ORD(\"0\")))\nd[k] := 5; Texts.Write(W, \"5\"); Texts.WriteLn(W)\nEND Power.\nThe resulting output text for N = 10 is\n\n\n1.6. The Record Structure\n\nThe most general method to obtain structured types is to join elements of arbitrary types, that are possibly\nthemselves structured types, into a compound. Examples from mathematics are complex numbers,\ncomposed of two real numbers, and coordinates of points, composed of two or more numbers according to\nthe dimensionality of the space spanned by the coordinate system. An example from data processing is\ndescribing people by a few relevant characteristics, such as their first and last names, their date of birth,\nsex, and marital status.\nIn mathematics such a compound type is the Cartesian product of its constituent types. This stems from the\nfact that the set of values defined by this compound type consists of all possible combinations of values,\ntaken one from each set defined by each constituent type. Thus, the number of such combinations, also\ncalled n-tuples, is the product of the number of elements in each constituent set, that is, the cardinality of\nthe compound type is the product of the cardinalities of the constituent types.\nIn data processing, composite types, such as descriptions of persons or objects, usually occur in files or data\nbanks and record the relevant characteristics of a person or object. The word record has therefore become\nwidely accepted to describe a compound of data of this nature, and we adopt this nomenclature in\npreference to the term Cartesian product. In general, a record type T with components of the types T1, T2,\n... , Tn is defined as follows:\nTYPE T = RECORD s1: T1; s2: T2; ... sn: Tn END\ncard(T) = card(T1) * card(T2) * ... * card(Tn)\nTYPE Complex = RECORD re, im: REAL END\nTYPE Date = RECORD day, month, year: INTEGER END\nTYPE Person = RECORD name, firstname: Name;\nbirthdate: Date;\nsex: (male, female);\nmarstatus: (single, married, widowed, divorced)\nWe may visualize particular, record-structured values of, for example, the variables\nz: Complex\nd: Date\np: Person\nas shown in Fig. 1.3.\n\nComplex z Date d Person p\n\n1.0 1 SMITH\n\n-1.0 4 JOHN\n\n1973 18 1 1986\n\n\n\nFig. 1.3. Records of type Complex, Date, and Person\n\nThe identifiers s1, s2, ... , sn introduced by a record type definition are the names given to the individual\ncomponents of variables of that type. As components of records are called fields, the names are field\nidentifiers. They are used in record selectors applied to record structured variables. Given a variable x: T,\nits i-th field is denoted by x.si. Selective updating of x is achieved by using the same selector denotation on\nthe left side in an assignment statement:\nx.si := e\nwhere e is a value (expression) of type Ti. Given, for example, the record variables z, d, and p declared\nabove, the following are selectors of components:\nz.im (of type REAL)\nd.month (of type INTEGER)\np.name (of type Name)\np.birthdate (of type Date)\np.birthdate.day (of type INTEGER)\nThe example of the type Person shows that a constituent of a record type may itself be structured. Thus,\nselectors may be concatenated. Naturally, different structuring types may also be used in a nested fashion.\nFor example, the i-th component of an array a being a component of a record variable r is denoted by\nr.a[i], and the component with the selector name s of the i-th record structured component of the array a is\ndenoted by a[i].s.\nIt is a characteristic of the Cartesian product that it contains all combinations of elements of the constituent\ntypes. But it must be noted that in practical applications not all of them may be meaningful. For instance,\nthe type Date as defined above includes the 31st April as well as the 29th February 1985, which are both\ndates that never occurred. Thus, the definition of this type does not mirror the actual situation entirely\ncorrectly; but it is close enough for practical purposes, and it is the responsibility of the programmer to\nensure that meaningless values never occur during the execution of a program.\nThe following short excerpt from a program shows the use of record variables. Its purpose is to count the\nnumber of persons represented by the array variable family that are both female and single:\nfamily: ARRAY N OF Person;\ncount := 0;\nFOR i := 0 TO N-1 DO\nIF (family[i].sex = female) & (family[i].marstatus = single) THEN INC(count) END\nThe record structure and the array structure have the common property that both are random-access\nmust be identical. In turn, the array offers greater flexibility by allowing its component selectors to be\nin the record type definition.\n\n1.7. Representation Of Arrays, Records, And Sets\n\nThe essence of the use of abstractions in programming is that a program may be conceived, understood,\nand verified on the basis of the laws governing the abstractions, and that it is not necessary to have further\ninsight and knowledge about the ways in which the abstractions are implemented and represented in a\nparticular computer. Nevertheless, it is essential for a professional programmer to have an understanding of\nwidely used techniques for representing the basic concepts of programming abstractions, such as the\nfundamental data structures. It is helpful insofar as it might enable the programmer to make sensible\ndecisions about program and data design in the light not only of the abstract properties of structures, but\nalso of their realizations on actual computers, taking into account a computer's particular capabilities and\nThe problem of data representation is that of mapping the abstract structure onto a computer store.\nComputer stores are - in a first approximation - arrays of individual storage cells called bytes. They are\nunderstood to be groups of 8 bits. The indices of the bytes are called addresses.\nVAR store: ARRAY StoreSize OF BYTE\nThe basic types are represented by a small number of bytes, typically 2, 4, or 8. Computers are designed to\ntransfer internally such small numbers (possibly 1) of contiguous bytes concurrently, ”in parallel”. The unit\ntransferable concurrently is called a word.\n\n1.7.1. Representation of Arrays\n\nA representation of an array structure is a mapping of the (abstract) array with components of type T onto\nthe store which is an array with components of type BYTE. The array should be mapped in such a way that\nthe computation of addresses of array components is as simple (and therefore as efficient) as possible. The\naddress i of the j-th array component is computed by the linear mapping function\ni = i0 + j*s\nwhere i0 is the address of the first component, and s is the number of words that a component occupies.\nAssuming that the word is the smallest individually transferable unit of store, it is evidently highly\ndesirable that s be a whole number, the simplest case being s = 1. If s is not a whole number (and this is the\nnormal case), then s is usually rounded up to the next larger integer S. Each array component then occupies\nS words, whereby S-s words are left unused (see Figs. 1.5 and 1.6). Rounding up of the number of words\nneeded to the next whole number is called padding. The storage utilization factor u is the quotient of the\nminimal amounts of storage needed to represent a structure and of the amount actually used:\nu = s / (s rounded up to nearest integer)\n\n\n\nFig. 1.5. Mapping an array onto a store\n\n\n\nFig. 1.6. Padded representation of a record\n\nSince an implementor has to aim for a storage utilization as close to 1 as possible, and since accessing parts\nof words is a cumbersome and relatively inefficient process, he or she must compromise. The following\nconsiderations are relevant:\n1. Padding decreases storage utilization.\n2. Omission of padding may necessitate inefficient partial word access.\n3. Partial word access may cause the code (compiled program) to expand and therefore to counteract the\ngain obtained by omission of padding.\nIn fact, considerations 2 and 3 are usually so dominant that compilers always use padding automatically.\nWe notice that the utilization factor is always u > 0.5, if s > 0.5. However, if s ≤ 0.5, the utilization factor\nmay be significantly increased by putting more than one array component into each word. This technique is\ncalled packing. If n components are packed into a word, the utilization factor is (see Fig. 1.7)\nu = n*s / (n*s rounded up to nearest integer)\n\n\nFig. 1.7. Packing 6 components into one word\n\nAccess to the i-th component of a packed array involves the computation of the word address j in which the\ndesired component is located, and it involves the computation of the respective component position k\nwithin the word.\nj = i DIV n k = i MOD n\nIn most programming languages the programmer is given no control over the representation of the abstract\ndata structures. However, it should be possible to indicate the desirability of packing at least in those cases\nin which more than one component would fit into a single word, i.e., when a gain of storage economy by a\nfactor of 2 and more could be achieved. We propose the convention to indicate the desirability of packing\nby prefixing the symbol ARRAY (or RECORD) in the declaration by the symbol PACKED.\n\n1.7.2. Representation of Records\n\nRecords are mapped onto a computer store by simply juxtaposing their components. The address of a\ncomponent (field) r i relative to the origin address of the record r is called the field's offset k i. It is computed\nki = s1 + s2 + ... + si-1 k0 = 0\nwhere sj is the size (in words) of the j-th component. We now realize that the fact that all components of an\narray are of equal type has the welcome consequence that ki = i×s. The generality of the record structure\ndoes unfortunately not allow such a simple, linear function for offset address computation, and it is\ntherefore the very reason for the requirement that record components be selectable only by fixed identifiers.\nThis restriction has the desirable benefit that the respective offsets are known at compile time. The\nresulting greater efficiency of record field access is well-known.\nThe technique of packing may be beneficial, if several record components can be fitted into a single storage\nword (see Fig. 1.8). Since offsets are computable by the compiler, the offset of a field packed within a word\nmay also be determined by the compiler. This means that on many computers packing of records causes a\ndeterioration in access efficiency considerably smaller than that caused by the packing of arrays.\n\n\ns2 s3\n\n\n\ns6 s7 s8\n\nFig. 1.8. Representation of a packed record\n\n1.7.3. Representation of Sets\n\nA set s is conveniently represented in a computer store by its characteristic function C(s). This is an array\nof logical values whose ith component has the meaning “i is present in s”. As an example, the set of small\nintegers s = {2, 3, 5, 7, 11, 13} is represented by the sequence of bits, by a bitstring:\nC(s) = (… 0010100010101100)\nThe representation of sets by their characteristic function has the advantage that the operations of\ncomputing the union, intersection, and difference of two sets may be implemented as elementary logical\noperations. The following equivalences, which hold for all elements i of the base type of the sets x and y,\nrelate logical operations with operations on sets:\ni IN (x+y) = (i IN x) OR (i IN y)\ni IN (x*y) = (i IN x) & (i IN y)\ni IN (x-y) = (i IN x) & ~(i IN y)\nThese logical operations are available on all digital computers, and moreover they operate concurrently on\nall corresponding elements (bits) of a word. It therefore appears that in order to be able to implement the\nbasic set operations in an efficient manner, sets must be represented in a small, fixed number of words upon\nwhich not only the basic logical operations, but also those of shifting are available. Testing for membership\nis then implemented by a single shift and a subsequent (sign) bit test operation. As a consequence, a test of\nthe form x IN {c1, c2, ... , cn} can be implemented considerably more efficiently than the equivalent\nBoolean expression\n(x = c1) OR (x = c2) OR ... OR (x = cn)\nA corollary is that the set structure should be used only for small integers as elements, the largest one being\nthe wordlength of the underlying computer (minus 1).\n\n1.8. The File or Sequence\n\nAnother elementary structuring method is the sequence. A sequence is typically a homogeneous structure\nlike the array. That is, all its elements are of the same type, the base type of the sequence. We shall denote a\nsequence s with n elements by\ns = \nn is called the length of the sequence. This structure looks exactly like the array. The essential difference is\nthat in the case of the array the number of elements is fixed by the array's declaration, whereas for the\nsequence it is left open. This implies that it may vary during execution of the program. Although every\nsequence has at any time a specific, finite length, we must consider the cardinality of a sequence type as\ninfinite, because there is no fixed limit to the potential length of sequence variables.\nA direct consequence of the variable length of sequences is the impossibility to allocate a fixed amount of\nstorage to sequence variables. Instead, storage has to be allocated during program execution, namely\nwhenever the sequence grows. Perhaps storage can be reclaimed when the sequence shrinks. In any case, a\n\ndynamic storage allocation scheme must be employed. All structures with variable size share this property,\nwhich is so essential that we classify them as advanced structures in contrast to the fundamental structures\ndiscussed so far.\nWhat, then, causes us to place the discussion of sequences in this chapter on fundamental structures? The\nprimary reason is that the storage management strategy is sufficiently simple for sequences (in contrast to\nother advanced structures), if we enforce a certain discipline in the use of sequences. In fact, under this\nproviso the handling of storage can safely be delegated to a machanism that can be guaranteed to be\nreasonably effective. The secondary reason is that sequences are indeed ubiquitous in all computer\napplications. This structure is prevalent in all cases where different kinds of storage media are involved, i.e.\nwhere data are to be moved from one medium to another, such as from disk or tape to primary store or\nThe discipline mentioned is the restraint to use sequential access only. By this we mean that a sequence is\ninspected by strictly proceeding from one element to its immediate successor, and that it is generated by\nrepeatedly appending an element at its end. The immediate consequence is that elements are not directly\naccessible, with the exception of the one element which currently is up for inspection. It is this accessing\ndiscipline which fundamentally distinguishes sequences from arrays. As we shall see in Chapter 2, the\ninfluence of an access discipline on programs is profound.\nThe advantage of adhering to sequential access which, after all, is a serious restriction, is the relative\nsimplicity of needed storage management. But even more important is the possibility to use effective\nbuffering techniques when moving data to or from secondary storage devices. Sequential access allows us\nto feed streams of data through pipes between the different media. Buffering implies the collection of\nsections of a stream in a buffer, and the subsequent shipment of the whole buffer content once the buffer is\nfilled. This results in very significantly more effective use of secondary storage. Given sequential access\nonly, the buffering mechanism is reasonably straightforward for all sequences and all media. It can\ntherefore safely be built into a system for general use, and the programmer need not be burdened by\nincorporating it in the program. Such a system is usually called a file system, because the high-volume,\nsequential access devices are used for permanent storage of (persistent) data, and they retain them even\nwhen the computer is switched off. The unit of data on these media is commonly called (sequential) file.\nHere we will use the term file as synonym to sequence.\nThere exist certain storage media in which the sequential access is indeed the only possible one. Among\nthem are evidently all kinds of tapes. But even on magnetic disks each recording track constitutes a storage\nfacility allowing only sequential access. Strictly sequential access is the primary characteristic of every\nmechanically moving device and of some other ones as well.\nIt follows that it is appropriate to distinguish between the data structure, the sequence, on one hand, and\nthe mechanism to access elements on the other hand. The former is declared as a data structure, the latter\ntypically by the introduction of a record with associated operators, or, according to more modern\nterminology, by a rider object. The distinction between data and mechanism declarations is also useful in\nview of the fact that several access points may exist concurrently on one and the same sequence, each one\nrepresenting a sequential access at a (possibly) different location.\nWe summarize the essence of the foregoing as follows:\n1. Arrays and records are random access structures. They are used when located in primary, random-access\n2. Sequences are used to access data on secondary, sequential-access stores, such as disks and tapes.\n3. We distinguish between the declaration of a sequence variable, and that of an access mechanism located\nat a certain position within the seqence.\n\n1.8.1 Elementary File Operators\n\nThe discipline of sequential access can be enforced by providing a set of seqencing operators through\nwhich files can be accessed exclusively. Hence, although we may here refer to the i-th element of a\nsequence s by writing si, this shall not be possible in a program.\n\nSequences, files, are typically large, dynamic data structures stored on a secondary storage device. Such a\ndevice retains the data even if a program is terminated, or a computer is switched off. Therefore the\nintroduction of a file variable is a complex operation connecting the data on the external device with the\nfile variable in the program. We therefore define the type File in a separate module, whose definition\nspecifies the type together with its operators. We call this module Files and postulate that a sequence or file\nvariable must be explicitly initialized (opened) by calling an appropriate operator or function:\nVAR f: File\nf := Open(name)\nwhere name identifies the file as recorded on the persistent data carrier. Some systems distinguish between\nopening an existing file and opening a new file:\nf := Old(name) f := New(name)\nThe disconnection between secondary storage and the file variable then must also be explicitly requested\nby, for example, a call of Close(f).\nEvidently, the set of operators must contain an operator for generating (writing) and one for inspecting\n(reading) a sequence. We postulate that these operations apply not to a file directly, but to an object called a\nrider, which itself is connected with a file (sequence), and which implements a certain access mechanism.\nThe sequential access discipline is guaranteed by a restrictive set of access operators (procedures).\nA sequence is generated by appending elements at its end after having placed a rider on the file. Assuming\nthe declaration\nVAR r: Rider\nwe position the rider r on the file f by the statement\nSet(r, f, pos)\nwhere pos = 0 designates the beginning of the file (sequence). A typical pattern for generating the sequence\nWHILE more DO compute next element x; Write(r, x) END\nA sequence is inspected by first positioning a rider as shown above, and then proceeding from element to\nelement. A typical pattern for reading a sequence is:\nRead(r, x);\nWHILE ~r.eof DO process element x; Read(r, x) END\nEvidently, a certain position is always associated with every rider. It is denoted by r.pos. Furthermore, we\npostulate that a rider contain a predicate (flag) r.eof indicating whether a preceding read operation had\nreached the sequence’s end. We can now postulate and describe informally the following set of primitive\n1a. New(f, name) defines f to be the empty sequence.\n1b. Old(f, name) defines f to be the sequence persistently stored with given name.\n2. Set(r, f, pos) associate rider r with sequence f, and place it at position pos.\n3. Write(r, x) place element with value x in the sequence designated by rider r, and advance.\n4. Read(r, x) assign to x the value of the element designated by rider r, and advance.\n5. Close(f) registers the written file f in the persistent store (flush buffers).\nNote: Writing an element in a sequence is often a complex operation. However, mostly, files are created by\nappending elements at the end.\nIn order to convey a more precise understanding of the sequencing operators, the following example of an\nimplementation is provided. It shows how they might be expressed if sequences were represented by\narrays. This example of an implementation intentionally builds upon concepts introduced and discussed\nearlier, and it does not involve either buffering or sequential stores which, as mentioned above, make the\nsequence concept truly necessary and attractive. Nevertheless, this example exhibits all the essential\n\ncharacteristics of the primitive sequence operators, independently on how the sequences are represented in\nThe operators are presented in terms of conventional procedures. This collection of definitions of types,\nvariables, and procedure headings (signatures) is called a definition. We assume that we are to deal with\nsequences of characters, i.e. text files whose elements are of type CHAR. The declarations of File and\nRider are good examples of an application of record structures because, in addition to the field denoting the\narray which represents the data, further fields are required to denote the current length and position, i.e. the\nstate of the rider.\nTYPE File; (*sequence of characters*)\nPROCEDURE Close(VAR f: File);\nPROCEDURE Set(VAR r: Rider; VAR f: File; pos: INTEGER);\nEND Files.\nA definition represents an abstraction. Here we are given the two data types, File and Rider, together with\ntheir operations, but without further details revealing their actual representation in store. Of the operators,\ndeclared as procedures, we see their headings only. This hiding of the details of implementation is\nintentional. The concept is called information hiding. About riders we only learn that there is a property\ncalled eof. This flag is set, if a read operation reaches the end of the file. The rider’s position is invisible,\nand hence the rider’s invariant cannot be falsified by direct access. The invariant expresses the fact that the\nposition always lies within the limits given by the associated sequence. The invariant is established by\nprocedure Set, and required and maintained by procedures Read and Write.\nThe statements that implement the procedures and further, internal details of the data types, are sepecified\nin a construct called module. Many representations of data and implementations of procedures are possible.\nWe chose the following as a simple example (with fixed maximal file length):\nCONST MaxLength = 4096;\na: ARRAY MaxLength OF CHAR\nRider = RECORD (* 0 <= pos <= s.len <= Max Length *)\nf: File; pos: INTEGER; eof: BOOLEAN\nVAR f: File;\nBEGIN NEW(f); f.length := 0; f.eof := FALSE; (*directory operation omitted*)\nEND New;\nVAR f: File;\nBEGIN NEW(f); f.eof := FALSE; (*directory lookup omitted*)\nEND New;\nPROCEDURE Close(VAR f: File);\nEND Close;\n\n\nBEGIN (*assume f # NIL*) r.f := f; r.eof := FALSE;\nIF pos >= 0 THEN\nIF pos <= s.len THEN r.pos := pos ELSE r.pos := s.len END\nELSE r.pos := 0\nEND Set;\nIF (r.pos <= r.s.len) & (r.pos < MaxLength) THEN\nr.a[r.pos] := ch; INC(r.pos);\nIF r.pos = r.f.len THEN INC(r.f.len) END\nELSE r.eof := TRUE\nEND Write;\nIF r.pos < r.f.length THEN ch := r.f.a[r.pos]; INC(r.pos) ELSE r.eof := TRUE END\nEND Read;\nEND Files.\nNote that in this example the maximum length that sequences may reach is an arbitrary constant. Should a\nprogram cause a sequence to become longer, then this would not be a mistake of the program, but an\ninadequacy of this implementation. On the other hand, a read operation proceeding beyond the current end\nof the sequence would indeed be the program's mistake. Here, the flag r.eof is also used by the write\noperation to indicate that it was not possible to perform it. Hence, ~r.eof is a precondition for both Read\nand Write.\n\n1.8.2. Buffering sequences\n\nWhen data are transferred to or from a secondary storage device, the individual bits are transferred as a\nstream. Usually, a device imposes strict timing constraints upon the transmission. For example, if data are\nwritten on a tape, the tape moves at a fixed speed and requires the data to be fed at a fixed rate. When the\nsource ceases, the tape movement is switched off and speed decreases quickly, but not instantaneously.\nThus a gap is left between the data transmitted and the data to follow at a later time. In order to achieve a\nhigh density of data, the number of gaps ought to be kept small, and therefore data are transmitted in\nrelatively large blocks once the tape is moving. Similar conditions hold for magnetic disks, where the data\nare allocated on tracks with a fixed number of blocks of fixed size, the so-called block size. In fact, a disk\nshould be regarded as an array of blocks, each block being read or written as a whole, containing typically\n2 k bytes with k = 8, 9, … 12.\nOur programs, however, do not observe any such timing constraints. In order to allow them to ignore the\nconstraints, the data to be transferred are buffered. They are collected in a buffer variable (in main store)\nand transferred when a sufficient amount of data is accumulated to form a block of the required size. The\nbuffer’s client has access only via the two procedures deposit and fetch.\nPROCEDURE deposit(x: CHAR);\nEND Buffer.\nBuffering has an additional advantage in allowing the process which generates (receives) data to proceed\nconcurrently with the device that writes (reads) the data from (to) the buffer. In fact, it is convenient to\nregard the device as a process itself which merely copies data streams. The buffer's purpose is to provide a\ncertain degree of decoupling between the two processes, which we shall call the producer and the\nconsumer. If, for example, the consumer is slow at a certain moment, it may catch up with the producer\nlater on. This decoupling is often essential for a good utilization of peripheral devices, but it has only an\n\neffect, if the rates of producer and consumer are about the same on the average, but fluctuate at times. The\ndegree of decoupling grows with increasing buffer size.\nWe now turn to the question of how to represent a buffer, and shall for the time being assume that data\nelements are deposited and fetched individually instead of in blocks. A buffer essentially constitutes a first-\nin-first-out queue (fifo). If it is declared as an array, two index variables, say in and out, mark the positions\nof the next location to be written into and to be read from. Ideally, such an array should have no index\nbounds. A finite array is quite adequate, however, considering the fact that elements once fetched are no\nlonger relevant. Their location may well be re-used. This leads to the idea of the circular buffer. The\noperations of depositing and fetching an element are expressed in the following module, which exports\nthese operations as procedures, but hides the buffer and its index variables - and thereby effectively the\nbuffering mechanism - from the client processes. This mechanism also involves a variable n counting the\nnumber of elements currently in the buffer. If N denotes the size of the buffer, the condition 0 ≤ n ≤ N is an\nobvious invariant. Therefore, the operation fetch must be guarded by the condition n > 0 (buffer non-\nempty), and the operation deposit by the condition n < N (buffer non-full). Not meeting the former\ncondition must be regarded as a programming error, a violation of the latter as a failure of the suggested\nimplementation (buffer too small).\nMODULE Buffer; (*implements circular buffers*)\nCONST N = 1024; (*buffer size*)\nVAR n, in, out:INTEGER;\nPROCEDURE deposit(x: CHAR);\nINC(n); buf[in] := x; in := (in + 1) MOD N\nEND deposit;\nDEC(n); x := buf[out]; out := (out + 1) MOD N\nEND fetch;\nBEGIN n := 0; in := 0; out := 0\nEND Buffer.\nThis simple implementation of a buffer is acceptable only, if the procedures deposit and fetch are activated\nby a single agent (once acting as a producer, once as a consumer). If, however, they are activated by\nindividual, concurrent processes, this scheme is too simplistic. The reason is that the attempt to deposit into\na full buffer, or the attempt to fetch from an empty buffer, are quite legitimate. The execution of these\nactions will merely have to be delayed until the guarding conditions are established. Such delays essentially\nconstitute the necessary synchronization among concurrent processes. We may represent these delays\nrespectively by the statements\nwhich must be substituted for the two conditioned HALT statements.\n\n1.8.3. Buffering between Concurrent Processes\n\nThe presented solution is, however, not recommended, even if it is known that the two processes are driven\nby two individual engines. The reason is that the two processors necessarily access the same variable n, and\ntherefore the same store. The idling process, by constantly polling the value n, hinders its partner, because\nat no time can the store be accessed by more than one process. This kind of busy waiting must indeed be\nhides them. We shall call this facility a signal, and assume that it is available from a utility module Signals\ntogether with a set of primitive operators on signals.\n\nEvery signal s is associated with a guard (condition) Ps. If a process needs to be delayed until Ps is\nestablished (by some other process), it must, before proceeding, wait for the signal s. This is to be\nexpressed by the statement Wait(s). If, on the other hand, a process establishes Ps, it thereupon signals this\nfact by the statement Send(s). If Ps is the established precondition to every statement Send(s), then P s can\nbe regarded as a postcondition of Wait(s).\nTYPE Signal;\nPROCEDURE Wait(VAR s: Signal);\nPROCEDURE Send(VAR s: Signal);\nPROCEDURE Init(VAR s: Signal);\nWe are now able to express the buffer module in a form that functions properly when used by individual,\nconcurrent processes:\n\nMODULE Buffer;\nIMPORT Signals;\nCONST N = 1024; (*buffer size*)\nVAR n, in, out: INTEGER;\nnonfull: Signals.Signal; (*n < N*)\nnonempty: Signals.Signal; (*n > 0*)\nPROCEDURE deposit(x: CHAR);\nIF n = N THEN Signals.Wait(nonfull) END ;\nIF n = 1 THEN Signals.Send(nonempty) END\nEND deposit;\nIF n = 0 THEN Signals.Wait(nonempty) END ;\nIF n = N-1 THEN Signals.Send(nonfull) END\nEND fetch;\nBEGIN n := 0; in := 0; out := 0; Signals.Init(nonfull); Signals.Init(nonempty)\nEND Buffer1.\nAn additional caveat must be made, however. The scheme fails miserably, if by coincidence both consumer\nand producer (or two producers or two consumers) fetch the counter value n simultaneously for updating.\nUnpredictably, its resulting value will be either n+1 or n-1, but not n. It is indeed necessary to protect the\nprocesses from dangerous interference. In general, all operations that alter the values of shared variables\nconstitute potential pitfalls.\nA sufficient (but not always necessary) condition is that all shared variables be declared local to a module\nwhose procedures are guaranteed to be executed under mutual exclusion. Such a module is called a monitor\n[1-7]. The mutual exclusion provision guarantees that at any time at most one process is actively engaged\nin executing a procedure of the monitor. Should another process be calling a procedure of the (same)\nmonitor, it will automatically be delayed until the first process has terminated its procedure.\nNote: By actively engaged is meant that a process execute a statement other than a wait statement.\nAt last we return now to the problem where the producer or the consumer (or both) require the data to be\navailable in a certain block size. The following module is a variant of the one previously shown, assuming\na block size of Np data elements for the producer, and of Nc elements for the consumer. In these cases, the\nbuffer size N is usually chosen as a common multiple of Np and Nc. In order to emphasise that symmetry\nbetween the operations of fetching and depositing data, the single counter n is now represented by two\n\ncounters, namely ne and nf. They specify the numbers of empty and filled buffer slots respectively. When\nthe consumer is idle, nf indicates the number of elements needed for the consumer to proceed; and when\nthe producer is waiting, ne specifies the number of elements needed for the producer to resume. (Therefore\nne+nf = N does not always hold).\n\n\n\nFig. 1.9. Circular buffer with indices in and out\n\nMODULE Buffer;\nIMPORT Signals;\nCONST Np = 16; (*size of producer block*)\nNc = 128; (*size of consumer block*)\nN = 1024; (*buffer size, common multiple of Np and Nc*)\nVAR ne, nf: INTEGER;\nin, out: INTEGER;\nnonfull: Signals.Signal; (*ne >= 0*)\nnonempty: Signals.Signal; (*nf >= 0*)\nBEGIN ne := ne - Np;\nIF ne < 0 THEN Signals.Wait(nonfull) END ;\nFOR i := 0 TO Np-1 DO buf[in] := x[i]; INC(in) END ;\nIF in = N THEN in := 0 END ;\nnf := nf + Np;\nIF nf >= 0 THEN Signals.Send(nonempty) END\nEND deposit;\nBEGIN nf := nf - Nc;\nIF nf < 0 THEN Signals.Wait(nonempty) END ;\nFOR i := 0 TO Nc-1 DO x[i] := buf[out]; INC(out) END;\nIF out = N THEN out := 0 END ;\nne := ne + Nc;\nIF ne >= 0 THEN Signals.Send(nonfull) END\nEND fetch;\nne := N; nf := 0; in := 0; out := 0; Signals.Init(nonfull); Signals.Init(nonempty)\nEND Buffer.\n\n1.8.4 Textual Input and Output\n\nBy standard input and output we understand the transfer of data to (from) a computer system from (to)\ngenuinely external agents, in particular its human operator. Input may typically originate at a keyboard and\noutput may sink into a display screen. In any case, its characteristic is that it is readable, and it typically\n\nconsists of a sequence of characters. It is a text. This readability condition is responsible for yet another\ncomplication incurred in most genuine input and output operations. Apart from the actual data transfer,\nthey also involve a transformation of representation. For example, numbers, usually considered as atomic\nunits and represented in binary form, need be transformed into readable, decimal notation. Structures need\nto be represented in a suitable layout, whose generation is called formatting.\nWhatever the transformation may be, the concept of the sequence is once again instrumental for a\nconsiderable simplification of the task. The key is the observation that, if the data set can be considered as a\nsequence of characters, the transformation of the sequence can be implemented as a sequence of (identical)\ntransformations of elements.\nT() = \nWe shall briefly investigate the necessary operations for transforming representations of natural numbers\nfor input and output. The basis is that a number x represented by the sequence of decimal digits d = has the value\nx = Si: i = 0 .. n-1: d i * 10i\nx = dn-1×10 n-1 + dn-2×10n-2 + … + d1×10 + d0\nx = ( … ((dn-1×10) + dn-2) ×10 + … + d1×10) + d0\nAssume now that the sequence d is to be read and transformed, and the resulting numeric value to be\nassigned to x. The simple algorithm terminates with the reading of the first character that is not a digit.\n(Arithmetic overflow is not considered).\nx := 0; Read(ch);\nWHILE (\"0\" <= ch) & (ch <= \"9\") DO\nx := 10*x + (ORD(ch) - ORD(\"0\")); Read(ch)\ndigits yields them in the reverse order. The least digit is generated first by computing x MOD 10. This\nrequires an intermediate buffer in the form of a first-in-last-out queue (stack). We represent it as an array d\nwith index i and obtain the following program:\ni := 0;\nREPEAT d[i] := x MOD 10; x := x DIV 10; INC(i)\nUNTIL x = 0;\nREPEAT DEC(i); Write(CHR(d[i] + ORD(\"0\"))\nUNTIL i = 0\nNote: A consistent substitution of the constant 10 in these algorithms by a positive integer B will yield\nnumber conversion routines to and from representations with base B. A frequently used case is B = 16\n(hexadecimal), because the involved multiplications and divisions can be implemented by simple shifts of\nthe binary numbers.\nObviously, it should not be necessary to specify these ubiquitous operations in every program in full detail.\nWe therefore postulate a utility module that provides the most common, standard input and output\noperations on numbers and strings. This module is referenced in most programs throughout this book, and\nwe call it Texts. It defines a type Text, Readers and Writers for Texts, and procedures for reading and\nwriting a character, an integer, a cardinal number, or a string.\nBefore we present the definition of module Texts, we point out an essential asymmetry between input and\noutput of texts. Whereas a text is generated by a sequence of calls of writing procedures, writing integers,\nreal numbers, strings etc., reading a text by a sequence of calls of reading procedures is questionable\npractice. This is because we rather wish to read the next element without having to know its type. We\nrather wish to determine its type after reading the item. This leads us to the concept of a scanner which,\nafter each scan allows to inspect type and value of the item read. A scanner acts like a rider in the case of\nfiles. However, it imposes a certain syntax on the text to be read. We postulate a scanner for texts\n\nconsisting of a sequence of integers, real numbers, strings, names, and special characters given by the\nfollowing syntax specified in EBNF (Extended Backus Naur Form):\nitem = integer | RealNumber | identifier | string | SpecialChar.\ninteger = [“-“] digit {digit}.\nRealNumber = [“-“] digit {digit} „.“ digit {digit} [(„E“ | „D“)[„+“ | „-“ digit {digit}].\nidentifier = letter {letter | digit}.\nstring = ‘”’ {any character except quote} ‘”’.\nSpecialChar = “!” | “?” | “@” | “#” | “$” | “%” | “^” | “&” | “+” | “-“ | “*” | “/” | “\\” | “|” | “(“ | “)” | “[“ |\n“]” | “{“ | “}” | “<” | “>” | ”.” | “,” | ”:” | ”;” | ”~”.\nItems are separated by blanks and/or line breaks.\n\nCONST Int = 1; Real = 2; Name = 3; Char = 4;\nTYPE Text, Writer;\nReader = RECORD eot: BOOLEAN END ;\nScanner = RECORD class: INTEGER;\nx: REAL;\nch: CHAR;\nnextCh: CHAR\nPROCEDURE OpenReader(VAR r: Reader; t: Text; pos: INTEGER);\nPROCEDURE OpenWriter(VAR w: Writer; t: Text; pos: INTEGER);\nPROCEDURE OpenScanner(VAR s: Scanner; t: Text; pos: INTEGER);\nPROCEDURE Read(VAR r: Reader; VAR ch: CHAR);\nPROCEDURE Scan(VAR s: Scanner);\nPROCEDURE Write(VAR w: Writer; ch: CHAR);\nPROCEDURE WriteLn(VAR w: Writer); (*terminate line*)\nPROCEDURE WriteString((VAR w: Writer; s: ARRAY OF CHAR);\nPROCEDURE WriteInt((VAR w: Writer; x, n: INTEGER);\n(*write integer x with (at least) n characters.\nIf n is greater than the number of digits needed,\nblanks are added preceding the number*)\nPROCEDURE WriteReal((VAR w: Writer; x: REAL);\nPROCEDURE Close(VAR w: Writer);\nEND Texts.\nHence we postulate that after a call of Scan(S)\nS.class = Int implies S.i is the integer read\nS.class = Real implies S.x is the real number read\nS.class = Name implies S.s is the identifier of string read\nS.class = Char implies S.ch is the special character read\nnextCh is the character immediately following the read item, possibly a blank.\n\n1.9. Searching\nThe task of searching is one of most frequent operations in computer programming. It also provides an\nideal ground for application of the data structures so far encountered. There exist several basic variations of\nthe theme of searching, and many different algorithms have been developed on this subject. The basic\n\nassumption in the following presentations is that the collection of data, among which a given element is to\nbe searched, is fixed. We shall assume that this set of N elements is represented as an array, say as\na: ARRAY N OF Item\nTypically, the type item has a record structure with a field that acts as a key. The task then consists of\nfinding an element of a whose key field is equal to a given search argument x. The resulting index i,\nsatisfying a[i].key = x, then permits access to the other fields of the located element. Since we are here\ninterested in the task of searching only, and do not care about the data for which the element was searched\nin the first place, we shall assume that the type Item consists of the key only, i.e is the key.\n\n1.9.1. Linear Search\n\nWhen no further information is given about the searched data, the obvious approach is to proceed\nsequentially through the array in order to increase step by step the size of the section, where the desired\nelement is known not to exist. This approach is called linear search. There are two conditions which\nterminate the search:\n1. The element is found, i.e. ai = x.\n2. The entire array has been scanned, and no match was found.\nThis results in the following algorithm:\ni := 0;\nWHILE (i < N) & (a[i] # x) DO INC(i) END\nNote that the order of the terms in the Boolean expression is relevant. The invariant, i.e the condition\nsatisfied before each incrementing of the index i, is\n(0 ≤ i < N) & (Ak : 0 ≤ k < i : ak ≠ x)\nexpressing that for all values of k less than i no match exists. From this and the fact that the search\nterminates only if the condition in the while-clause is false, the resulting condition is derived as\n((i = N) OR (ai = x )) & (Ak : 0 < k < i : ak ≠ x)\nThis condition not only is our desired result, but also implies that when the algorithm did find a match, it\nfound the one with the least index, i.e. the first one. i = N implies that no match exists.\nTermination of the repetition is evidently guaranteed, because in each step i is increased and therefore\ncertainly will reach the limit N after a finite number of steps; in fact, after N steps, if no match exists.\nCould this task be simplifed, and could the search thereby be accelerated? The only possibility lies in\nfinding a simplification of the Boolean expression which notably consists of two factors. Hence, the only\nchance for finding a simpler solution lies in establishing a condition consisting of a single factor that\nimplies both factors. This is possible only by guaranteeing that a match will be found, and is achieved by\nposting an additional element with value x at the end of the array. We call this auxiliary element a sentinel,\nbecause it prevents the search from passing beyond the index limit. The array a is now declared as\nand the linear search algorithm with sentinel is expressed by\na[N] := x; i := 0;\nWHILE a[i] # x DO INC(i) END\nThe resulting condition, derived from the same invariant as before, is\n(ai = x) & (Ak : 0 ≤ k < i : ak ≠ x)\nEvidently, i = N implies that no match (except that for the sentinel) was encountered.\n\n1.9.2. Binary Search\n\n\nThere is quite obviously no way to speed up a search, unless more information is available about the\nsearched data. It is well known that a search can be made much more effective, if the data are ordered.\nImagine, for example, a telephone directory in which the names were not alphabetically listed. It would be\nutterly useless. We shall therefore present an algorithm which makes use of the knowledge that a is\nordered, i.e., of the condition\nAk: 1 ≤ k < N : ak-1 ≤ ak\nThe key idea is to inspect an element picked at random, say am, and to compare it with the search argument\nx. If it is equal to x, the search terminates; if it is less than x, we infer that all elements with indices less or\nequal to m can be eliminated from further searches; and if it is greater than x, all with index greater or equal\nto m can be eliminated. This results in the following algorithm called binary search; it uses two index\nvariables L and R marking the left and at the right end of the section of a in which an element may still be\nL := 0; R := N-1; found := FALSE ;\nWHILE (L ≤ R) & ~found DO\nm := any value between L and R;\nIF a[m] = x THEN found := TRUE\nELSIF a[m] < x THEN L := m+1\nELSE R := m-1\nThe loop invariant, i.e. the condition satisfied before each step, is\n(L ≤ R) & (Ak : 0 ≤ k < L : ak < x) & (Ak : R < k < N : ak > x)\nfrom which the result is derived as\nfound OR ((L > R) & (Ak : 0 ≤ k < L : ak < x ) & (Ak : R < k < N : ak > x))\nwhich implies\n(am = x) OR (Ak : 0 ≤ k < N : ak ≠ x)\nThe choice of m is apparently arbitrary in the sense that correctness does not depend on it. But it does\ninfluence the algorithm's effectiveness. Clearly our goal must be to eliminate in each step as many elements\nas possible from further searches, no matter what the outcome of the comparison is. The optimal solution is\nto choose the middle element, because this eliminates half of the array in any case. As a result, the\nmaximum number of steps is log2N, rounded up to the nearest integer. Hence, this algorithm offers a drastic\nimprovement over linear search, where the expected number of comparisons is N/2.\nThe efficiency can be somewhat improved by interchanging the two if-clauses. Equality should be tested\nsecond, because it occurs only once and causes termination. But more relevant is the question, whether -- as\nin the case of linear search -- a solution could be found that allows a simpler condition for termination. We\nindeed find such a faster algorithm, if we abandon the naive wish to terminate the search as soon as a match\nis established. This seems unwise at first glance, but on closer inspection we realize that the gain in\nefficiency at every step is greater than the loss incurred in comparing a few extra elements. Remember that\nthe number of steps is at most log N. The faster solution is based on the following invariant:\n(Ak : 0 ≤ k < L : ak < x) & (Ak : R ≤ k < N : ak ≥ x)\nand the search is continued until the two sections span the entire array.\nL := 0; R := N;\nm := (L+R) DIV 2;\nIF a[m] < x THEN L := m+1 ELSE R := m END\nThe terminating condition is L ≥ R. Is it guaranteed to be reached? In order to establish this guarantee, we\nmust show that under all circumstances the difference R-L is diminished in each step. L < R holds at the\n\nbeginning of each step. The arithmetic mean m then satisfies L ≤ m < R. Hence, the difference is indeed\ndiminished by either assigning m+1 to L (increasing L) or m to R (decreasing R), and the repetition\nterminates with L = R. However, the invariant and L = R do not yet establish a match. Certainly, if R = N,\nno match exists. Otherwise we must take into consideration that the element a[R] had never been\ncompared. Hence, an additional test for equality a[R] = x is necessary. In contrast to the first solution, this\nalgorithm -- like linear search -- finds the matching element with the least index.\n\n1.9.3 Table Search\n\nA search through an array is sometimes also called a table search, particularly if the keys are themselves\nstructured objects, such as arrays of numbers or characters. The latter is a frequently encountered case; the\ncharacter arrays are called strings or words. Let us define a type String as\nand let order on strings x and y be defined as follows:\n(x = y) ≡ (Aj: 0 ≤ j < M : xj = yj)\n(x < y) ≡ Ei: 0 ≤ i < N: ((Aj: 0 ≤ j < i : xj = yj) & (x i < yi))\nIn order to establish a match, we evidently must find all characters of the comparands to be equal. Such a\ncomparison of structured operands therefore turns out to be a search for an unequal pair of comparands, i.e.\na search for inequality. If no unequal pair exists, equality is established. Assuming that the length of the\nwords be quite small, say less than 30, we shall use a linear search in the following solution.\nIn most practical applications, one wishes to consider strings as having a variable length. This is\naccomplished by associating a length indication with each individual string value. Using the type declared\nabove, this length must not exceed the maximum length M. This scheme allows for sufficient flexibility for\nmany cases, yet avoids the complexities of dynamic storage allocation. Two representations of string\nlengths are most commonly used:\n1. The length is implicitly specified by appending a terminating character which does not otherwise occur.\nUsually, the non-printing value 0X is used for this purpose. (It is important for the subsequent\napplications that it be the least character in the character set).\n2. The length is explicitly stored as the first element of the array, i.e. the string s has the form\ns = s0, s1, s2, ... , sN-1\nwhere s1 ... sN-1 are the actual characters of the string and s0 = CHR(N). This solution has the advantage\nthat the length is directly available, and the disadvantage that the maximum length is limited to the size\nof the character set, that is, to 256 in the case of the ASCII set.\nFor the subsequent search algorithm, we shall adhere to the first scheme. A string comparison then takes\nthe form\ni := 0;\nWHILE (x[i] = y[i]) & (x[i] # 0X) DO i := i+1 END\nThe terminating character now functions as a sentinel, the loop invariant is\nAj: 0 ≤ j < i : x j = yj ≠ 0X,\nand the resulting condition is therefore\n((xi = yi) OR (x i = 0X)) & (Aj: 0 < j < i : x j = yj ≠ 0X)\nIt establishes a match between x and y, provided that xi = yi, and it establishes x < y, if xi < yi.\nWe are now prepared to return to the task of table searching. It calls for a nested search, namely a search\nthrough the entries of the table, and for each entry a sequence of comparisons between components. For\nexample, let the table T and the search argument x be defined as\nT: ARRAY N OF String;\nx: String\n\nAssuming that N may be fairly large and that the table is alphabetically ordered, we shall use a binary\nsearch. Using the algorithms for binary search and string comparison developed above, we obtain the\nfollowing program segment.\nL := 0; R := N;\nm := (L+R) DIV 2; i := 0;\nWHILE (T[m,i] = x[i]) & (x[i] # 0C) DO i := i+1 END ;\nIF T[m,i] < x[i] THEN L := m+1 ELSE R := m END\nIF R < N THEN i := 0;\nWHILE (T[R,i] = x[i]) & (x[i] # 0X) DO i := i+1 END\n(* (R < N) & (T[R,i] = x[i]) establish a match*)\n\n1.9.4. Straight String Search\n\nA frequently encountered kind of search is the so-called string search. It is characterized as follows. Given\nan array s of N elements and an array p of M elements, where 0 < M < N, declared as\ns: ARRAY N OF Item\np: ARRAY M OF Item\nstring search is the task of finding the first occurrence of p in s. Typically, the items are characters; then s\nmay be regarded as a text and p as a pattern or word, and we wish to find the first occurrence of the word in\nthe text. This operation is basic to every text processing system, and there is obvious interest in finding an\nefficient algorithm for this task. Before paying particular attention to efficiency, however, let us first\npresent a straightforward searching algorithm. We shall call it straight string search.\nA more precise formulation of the desired result of a search is indispensible before we attempt to specify an\nalgorithm to compute it. Let the result be the index i which points to the first occurrence of a match of the\npattern within the string. To this end, we introduce a predicate P(i,j)\nP(i, j) = Ak : 0 ≤ k < j : si+k = pk\nThen evidently our resulting index i must satisfy P(i, M). But this condition is not sufficient. Because the\nsearch is to locate the first occurrence of the pattern, P(k, M) must be false for all k < i. We denote this\ncondition by Q(i).\nQ(i) = Ak : 0 ≤ k < i : ~P(k, M)\nThe posed problem immediately suggests to formulate the search as an iteration of comparisons, and we\nproposed the following approach:\ni := -1;\nREPEAT INC(i); (* Q(i) *)\nfound := P(i, M)\nUNTIL found OR (i = N-M)\nThe computation of P again results naturally in an iteration of individual character comparisons. When we\napply DeMorgan's theorem to P, it appears that the iteration must be a search for inequality among\ncorresponding pattern and string characters.\nP(i, j) = (Ak : 0 ≤ k < j : si+k = p k) = (~Ek : 0 ≤ k < j : si+k ≠ pk)\nThe result of the next refinement is a repetition within a repetition. The predicates P and Q are inserted at\nappropriate places in the program as comments. They act as invariants of the iteration loops.\ni := -1;\nREPEAT INC(i); j := 0; (* Q(i) *)\nWHILE (j < M) & (s[i+j] = p[j]) DO (* P(i, j+1) *) INC(j) END\n(* Q(i) & P(i, j) & ((j = M) OR (s[i+j] # p[j])) *)\n\nUNTIL (j = M) OR (i = N-M)\nThe term j = M in the terminating condition indeed corresponds to the condition found, because it implies\nP(i,M). The term i = N-M implies Q(N-M) and thereby the nonexistence of a match anywhere in the string.\nIf the iteration continues with j < M, then it must do so with si+j ≠ pj. This implies ~P(i,j), which implies\nQ(i+1), which establishes Q(i) after the next incrementing of i.\nAnalysis of straight string search. This algorithm operates quite effectively, if we can assume that a\nmismatch between character pairs occurs after at most a few comparisons in the inner loop. This is likely to\nbe the case, if the cardinality of the item type is large. For text searches with a character set size of 128 we\nmay well assume that a mismatch occurs after inspecting 1 or 2 characters only. Nevertheless, the worst\ncase performance is rather alarming. Consider, for example, that the string consist of N-1 A's followed by a\nsingle B, and that the pattern consist of M-1 A's followed by a B. Then in the order of N*M comparisons\nare necessary to find the match at the end of the string. As we shall subsequently see, there fortunately exist\nmethods that drastically improve this worst case behaviour.\n\n1.9.5. The Knuth-Morris-Pratt String Search\n\nAround 1970, D.E. Knuth, J.H. Morris, and V.R. Pratt invented an algorithm that requires essentially in the\norder of N character comparisons only, even in the worst case [1-8]. The new algorithm is based on the\nobservation that by starting the next pattern comparison at its beginning each time, we may be discarding\nvaluable information gathered during previous comparisons. After a partial match of the beginning of the\npattern with corresponding characters in the string, we indeed know the last part of the string, and perhaps\ncould have precompiled some data (from the pattern) which could be used for a more rapid advance in the\ntext string. The following example of a search for the word Hooligan illustrates the principle of the\nalgorithm. Underlined characters are those which were compared. Note that each time two compared\ncharacters do not match, the pattern is shifted all the way, because a smaller shift could not possibly lead to\na full match.\nHoola-Hoola girls like Hooligans.\nUsing the predicates P and Q, the KMP-algorithm is the following:\ni := 0; j := 0;\nWHILE (j < M) & (i < N) DO\n(* Q(i-j) & P(i-j, j) *)\nWHILE (j >= 0) & (s[i] # p[j]) DO j := D END ;\nINC(i); INC(j)\nThis formulation is admittedly not quite complete, because it contains an unspecified shift value D. We\nshall return to it shortly, but first point out that the conditions Q(i-j) and P(i-j, j) are maintained as global\ninvariants, to which we may add the relations 0 ≤ i < N and 0 ≤ j < M. This suggests that we must abandon\nthe notion that i always marks the current position of the first pattern character in the text. Rather, the\nalignment position of the pattern is now i-j.\nIf the algorithm terminates due to j = M, the term P(i-j, j) of the invariant implies P(i-M, M), that is, a\nmatch at position i-M. Otherwise it terminates with i = N, and since j < M, the invariant Q(i) implies that no\nmatch exists at all.\nWe must now demonstrate that the algorithm never falsifies the invariant. It is easy to show that it is\nestablished at the beginning with the values i = j = 0. Let us first investigate the effect of the two statements\n\nincrementing i and j by 1. They apparently neither represent a shift of the pattern to the right, nor do they\nfalsify Q(i-j), since the difference remains unchanged. But could they falsify P(i-j, j), the second factor of\nthe invariant? We notice that at this point the negation of the inner while clause holds, i.e. either j < 0 or si\n= pj. The latter extends the partial match and establishes P(i-j, j+1). In the former case, we postulate that\nP(i-j, j+1) hold as well. Hence, incrementing both i and j by 1 cannot falsify the invariant either. The only\nother assignment left in the algorithm is j := D. We shall simply postuate that the value D always be such\nthat replacing j by D will maintain the invariant.\nIn order to find an appropriate expression for D, we must first understand the effect of the assignment.\nProvided that D < j, it represents a shift of the pattern to the right by j-D positions. Naturally, we wish this\nshift to be as large as possible, i.e., D to be as small as possible. This is illustrated by Fig. 1.10.\n\nA B C D string A B C D\n\nA B C E pattern A B C E\n\nj=3 D=0 j=0\n\nFig. 1.10. Assignment j := D shifts pattern by j-D positions\n\nEvidently the condition P(i-D, D) & Q(i-D) must hold before assigning D to j, if the invariant P(i-j, j) &\nQ(i-j) is to hold thereafter. This precondition is therefore our guideline for finding an appropriate\nexpression for D. The key observation is that thanks to P(i-j, j) we know that\nsi-j ... si-1 = p0 ... p j-1\n(we had just scanned the first j characters of the pattern and found them to match). Therefore the condition\nP(i-D, D) with D ≤ j, i.e.,\np 0 ... p D-1 = si-D ... si-1\ntranslates into\np 0 ... p D-1 = pj-D ... pj-1\nand (for the purpose of establishing the invariance of Q(i-D)) the predicate ~P(i-k, M) for k = 1 ... j-D\ntranslates into\np 0 ... p k-1 ≠ pj-k ... p j-1 for all k = 1 ... j-D\nThe essential result is that the value D apparently is determined by the pattern alone and does not depend\non the text string. The conditions tell us that in order to find D we must, for every j, search for the smallest\nD, and hence for the longest sequence of pattern characters just preceding position j, which matches an\nequal number of characters at the beginning of the pattern. We shall denote D for a given j by dj. Since\nthese values depend on the pattern only, the auxiliary table d may be computed before starting the actual\nsearch; this computation amounts to a precompilation of the pattern. This effort is evidently only\nworthwhile if the text is considerably longer than the pattern (M << N). If multiple occurrences of the same\npattern are to be found, the same values of d can be reused. The following examples illustrate the function\nof d.\n\nexamples i,j\n\nstring A A A A A C j=5, d5=4, (max. shift =j-dj=1)\n\np0… p3 = p1… p4\npattern A A A A A B\n\nshifted pattern\n\n\nA B C A B D j=5, d5=2, (max. shift =j-dj=3)\n\np0… p1 = p3… p4\nA B C A B C p0… p2 ≠ p2… p4\np0… p3 ≠ p1… p4\n\n\nA B C D E A j=5, d5=0, (max. shift =j-dj=5)\n\np0… p0 ≠ p4… p4\nA B C D E F p0… p1 ≠ p3… p4\np0… p2 ≠ p2… p4\nA B C p0… p3 ≠ p1… p4\n\nFig. 1.11. Partial pattern matches and computation of dj\n\nThe last example in Fig. 1.11 suggests that we can do even slightly better; had the character pj been an A\ninstead of an F, we would know that the corresponding string character could not possibly be an A, because\nsi ≠ pj terminated the loop. Hence a shift of 5 could not lead to a later match either, and we might as well\nincrease the shift amount to 6 (see Fig 1.12, upper part). Taking this into consideration, we redefine the\ncomputation of dj as the search for the longest matching sequence\np 0 ... p d[j-1] = p j-d[j] ... pj-1\nwith the additional constraint of pd[j] ≠ pj. If no match exists at all, we let dj = -1, indicating that the entire\npattern be shifted beyond its current position (see Fig. 1.12, lower part).\n\nstring A B C D E F\n\npattern A B C D E A\n\nshifted pattern\n\nj=5, d5=-1, (shift = j - dj = 6)\n\n\n\n\n\n\nFig. 1.12. Shifting pattern past position of last character\n\nEvidently, the computation of dj presents us with the first application of string search, and we may as well\nuse the fast KMP version itself.\n(*search for pattern p of length m in text s of length n; m <= Mmax*)\n(*if p is found, then r indicates the position in s, otherwise r = -1*)\nVAR i, j, k: INTEGER;\nBEGIN j := 0; k := -1; d[0] := -1; (*compute d from p*)\nWHILE j < m-1 DO\nWHILE (k >= 0) & (p[j] # p[k]) DO k := d[k] END ;\nINC(j); INC(k);\nIF p[j] = p[k] THEN d[j] := d[k] ELSE d[j] := k END\ni := 0; j := 0; k := 0; (*search p in s*)\nWHILE (j < m) & (i < n) DO\nWHILE (j >= 0) & (s[i] # p[j]) DO j := d[j] END ;\nINC(i); INC(j)\nIF j = m THEN r := i-m ELSE r := -1 END\nEND Search\nAnalysis of KMP search. The exact analysis of the performance of KMP-search is, like the algorithm itself,\nvery intricate. In [1-8] its inventors prove that the number of character comparisons is in the order of M+N,\nwhich suggests a substantial improvement over M*N for the straight search. They also point out the\nwelcome property that the scanning pointer i never backs up, whereas in straight string search the scan\nalways begins at the first pattern character after a mismatch, and therefore may involve characters that had\nactually been scanned already. This may cause awkward problems when the string is read from secondary\nstorage where backing up is costly. Even when the input is buffered, the pattern may be such that the\nbacking up extends beyond the buffer contents.\n\n1.9.6. The Boyer-Moore String Search\n\nThe clever scheme of the KMP-search yields genuine benefits only if a mismatch was preceded by a partial\nmatch of some length. Only in this case is the pattern shift increased to more than 1. Unfortunately, this is\nthe exception rather than the rule; matches occur much more seldom than mismatches. Therefore the gain\nin using the KMP strategy is marginal in most cases of normal text searching. The method to be discussed\nhere does indeed not only improve performance in the worst case, but also in the average case. It was\ninvented by R.S. Boyer and J.S. Moore around 1975, and we shall call it BM search. We shall here present\na simplified version of BM-search before proceeding to the one given by Boyer and Moore..\nBM-search is based on the unconventional idea to start comparing characters at the end of the pattern rather\nthan at the beginning. Like in the case of KMP-search, the pattern is precompiled into a table d before the\nactual search starts. Let, for every character x in the character set, dx be the distance of the rightmost\noccurrence of x in the pattern from its end. Now assume that a mismatch between string and pattern was\ndiscovered. Then the pattern can immediately be shifted to the right by dp[M-1] positions, an amount that is\nquite likely to be greater than 1. If pM-1 does not occur in the pattern at all, the shift is even greater, namely\nequal to the entire pattern's length. The following example illustrates this process.\nHoola-Hoola girls like Hooligans.\n\nSince individual character comparisons now proceed from right to left, the following, slightly modified\nversions of of the predicates P and Q are more convenient.\nP(i,j) = Ak: j ≤ k < M : si-j+k = p k\nQ(i) = Ak: 0 ≤ k < i : ~P(i, 0)\nThese predicates are used in the following formulation of the BM-algorithm to denote the invariant\ni := M; j := M;\nWHILE (j > 0) & (i <= N) DO\n(* Q(i-M) *) j := M; k := i;\nWHILE (j > 0) & (s[k-1] = p[j-1]) DO\n(* P(k-j, j) & (k-j = i-M) *)\nDEC(k); DEC(j)\ni := i + d[s[i-1]]\nThe indices satisfy 0 < j < M and 0 < i,k < N. Therefore, termination with j = 0, together with P(k-j, j),\nimplies P(k, 0), i.e., a match at position k. Termination with j > 0 demands that i = N; hence Q(i-M) implies\nQ(N-M), signalling that no match exists. Of course we still have to convince ourselves that Q(i-M) and\nP(k-j, j) are indeed invariants of the two repetitions. They are trivially satisfied when repetition starts, since\nQ(0) and P(x,M) are always true.\nLet us first consider the effect of the two statements decrementing k and j. Q(i-M) is not affected, and,\nsince sk-1 = pj-1 had been established, P(k-j, j-1) holds as precondition, guaranteeing P(k-j, j) as\npostcondition. If the inner loop terminates with j > 0, the fact that sk-1 ≠ p j-1 implies ~P(k-j, 0), since\n~P(i, 0) = Ek: 0 ≤ k < M : si+k ≠ pk\nMoreover, because k-j = M-i, Q(i-M) & ~P(k-j, 0) = Q(i+1-M), establishing a non-match at position i-M+1.\nNext we must show that the statement i := i + d s[i-1] never falsifies the invariant. This is the case, provided\nthat before the assignment Q(i+ds[i-1]-M) is guaranteed. Since we know that Q(i+1-M) holds, it suffices to\nestablish ~P(i+h-M) for h = 2, 3, ... , ds[i-1]. We now recall that dx is defined as the distance of the rightmost\noccurrence of x in the pattern from the end. This is formally expressed as\nAk: M-dx ≤ k < M-1 : p k ≠ x\nSubstituting si for x, we obtain\nAh: M-ds[i-1] ≤ h < M-1 : si-1 ≠ ph\nAh: 1 < h ≤ ds[i-1] : si-1 ≠ ph-M\nAh: 1 < h ≤ ds[i-1] : ~P(i+h-M)\nThe following program includes the presented, simplified Boyer-Moore strategy in a setting similar to that\nof the preceding KMP-search program. Note as a detail that a repeat statement is used in the inner loop,\nincrementing k and j before comparing s and p. This eliminates the -1 terms in the index expressions.\n(*search for pattern p of length m in text s of length n*)\nVAR i, j, k: INTEGER;\nFOR i := 0 TO 127 DO d[i] := m END ;\nFOR j := 0 TO m-2 DO d[ORD(p[j])] := m-j-1 END ;\ni := m;\nREPEAT j := m; k := i;\n\nUNTIL (j < 0) OR (p[j] # s[k]);\n\ni := i + d[ORD(s[i-1])]\nUNTIL (j < 0) OR (i > n);\nIF j < 0 THEN r := k ELSE r := -1 END\nEND Search\nAnalysis of Boyer-Moore Search. The original publication of this algorithm [1-9] contains a detailed\nanalysis of its performance. The remarkable property is that in all except especially construed cases it\nrequires substantially less than N comparisons. In the luckiest case, where the last character of the pattern\nalways hits an unequal character of the text, the number of comparisons is N/M.\nThe authors provide several ideas on possible further improvements. One is to combine the strategy\nexplained above, which provides greater shifting steps when a mismatch is present, with the Knuth-Morris-\nPratt strategy, which allows larger shifts after detection of a (partial) match. This method requires two\nprecomputed tables; d1 is the table used above, and d2 is the table corresponding to the one of the KMP-\nalgorithm. The step taken is then the larger of the two, both indicating that no smaller step could possibly\nlead to a match. We refrain from further elaborating the subject, because the additional complexity of the\ntable generation and the search itself does not seem to yield any appreciable efficiency gain. In fact, the\nadditional overhead is larger, and casts some uncertainty whether the sophisticated extension is an\nimprovement or a deterioration.\n\n1.1. Assume that the cardinalities of the standard types INTEGER, REAL, and CHAR are denoted by cint,\ncreal, and cchar . What are the cardinalities of the following data types defined as exemples in this\nchapter: sex, weekday, row, alfa, complex, date, person?\n1.2. Which are the instruction sequences (on your computer) for the following:\n(a) Fetch and store operations for an element of packed records and arrays?\n(b) Set operations, including the test for membership?\n1.3. What are the reasons for defining certain sets of data as sequences instead of arrays?\n1.4. Given is a railway timetable listing the daily services on several lines of a railway system. Find a\nrepresentation of these data in terms of arrays, records, or sequences, which is suitable for lookup of\narrival and departure times, given a certain station and desired direction of the train.\n1.5. Given a text T in the form of a sequence and lists of a small number of words in the form of two arrays\nA and B. Assume that words are short arrays of characters of a small and fixed maximum length. Write\na program that transforms the text T into a text S by replacing each occurrence of a word A i by its\ncorresponding word Bi.\n1.6. Compare the following three versions of the binary search with the one presented in the text. Which of\nthe three programs are correct? Determine the relevant invariants. Which versions are more efficient?\nWe assume the following variables, and the constant N > 0:\nVAR i, j, k, x: INTEGER;\nProgram A:\ni := 0; j := N-1;\nREPEAT k := (i+j) DIV 2;\nIF a[k] < x THEN i := k ELSE j := k END\nUNTIL (a[k] = x) OR (i > j)\nProgram B:\ni := 0; j := N-1;\nREPEAT k := (i+j) DIV 2;\nIF x < a[k] THEN j := k-1 END ;\n\nIF a[k] < x THEN i := k+1 END\n\nUNTIL i > j\nProgram C:\ni := 0; j := N-1;\nREPEAT k := (i+j) DIV 2;\nIF x < a[k] THEN j := k ELSE i := k+1 END\nUNTIL i > j\nHint: All programs must terminate with ak = x, if such an element exists, or ak ≠ x, if there exists no\nelement with value x.\n1.7. A company organizes a poll to determine the success of its products. Its products are records and tapes\nof hits, and the most popular hits are to be broadcast in a hit parade. The polled population is to be\ndivided into four categories according to sex and age (say, less or equal to 20, and older than 20).\nEvery person is asked to name five hits. Hits are identified by the numbers 1 to N (say, N = 30). The\nresults of the poll are to be appropriately encoded as a sequence of characters. Hint: use procedures\nRead and ReadInt to read the values of the poll.\nTYPE hit = [N];\nsex = (male, female);\nreponse = RECORD name, firstname: alfa;\ns: sex;\nchoice: ARRAY 5 OF hit\nVAR poll: Files.File\nThis file is the input to a program which computes the following results:\n1. A list of hits in the order of their popularity. Each entry consists of the hit number and the number of\ntimes it was mentioned in the poll. Hits that were never mentioned are omitted from the list.\n2. Four separate lists with the names and first names of all respondents who had mentioned in first place\none of the three hits most popular in their category.\nThe five lists are to be preceded by suitable titles.\n\n1-1. O-.J. Dahl, E.W. Dijkstra, and C.A.R. Hoare. Structured Programming. (New York: Academic Press,\n1972), pp. 155-65.\n1-2. C.A.R. Hoare. Notes on data structuring; in Structured Programming. Dahl, Dijkstra, and Hoare, pp.\n1-3. K. Jensen and N. Wirth. Pascal User Manual and Report. (Berlin: Springer-Verlag, 1974).\n1-4. N. Wirth. Program development by stepwise refinement. Comm. ACM, 14, No. 4 (1971), 221-27.\n1-5. ------, Programming in Modula-2. (Berlin, Heidelberg, New York: Springer-Verlag, 1982).\n1-6. ------, On the composition of well-structured programs. Computing Surveys, 6, No. 4, (1974) 247-59.\n1-7. C.A.R. Hoare. The Monitor: An operating systems structuring concept. Comm. ACM 17, 10 (Oct.\n1974), 549-557.\n1-8. D.E.Knuth, J.H. Morris, and V.R. Pratt. Fast pattern matching in strings. SIAM J. Comput., 6, 2, (June\n1977), 323-349.\n1-9. R.S. Boyer and J.S. Moore. A fast string searching algorithm. Comm. ACM, 20, 10 (Oct. 1977), 762-\n\n2.1. Introduction\nThe primary purpose of this chapter is to provide an extensive set of examples illustrating the use of the data\nstructures introduced in the preceding chapter and to show how the choice of structure for the underlying\ndata profoundly influences the algorithms that perform a given task. Sorting is also a good example to show\nthat such a task may be performed according to many different algorithms, each one having certain\nadvantages and disadvantages that have to be weighed against each other in the light of the particular\nSorting is generally understood to be the process of rearranging a given set of objects in a specific order. The\npurpose of sorting is to facilitate the later search for members of the sorted set. As such it is an almost\nuniversally performed, fundamental activity. Objects are sorted in telephone books, in income tax files, in\ntables of contents, in libraries, in dictionaries, in warehouses, and almost everywhere that stored objects have\nto be searched and retrieved. Even small children are taught to put their things \"in order\", and they are\nconfronted with some sort of sorting long before they learn anything about arithmetic.\nHence, sorting is a relevant and essential activity, particularly in data processing. What else would be easier\nto sort than data! Nevertheless, our primary interest in sorting is devoted to the even more fundamental\ntechniques used in the construction of algorithms. There are not many techniques that do not occur\nsomewhere in connection with sorting algorithms. In particular, sorting is an ideal subject to demonstrate a\ngreat diversity of algorithms, all having the same purpose, many of them being optimal in some sense, and\nmost of them having advantages over others. It is therefore an ideal subject to demonstrate the necessity of\nperformance analysis of algorithms. The example of sorting is moreover well suited for showing how a very\nsignificant gain in performance may be obtained by the development of sophisticated algorithms when\nobvious methods are readily available.\nThe dependence of the choice of an algorithm on the structure of the data to be processed -- an ubiquitous\nphenomenon -- is so profound in the case of sorting that sorting methods are generally classified into two\ncategories, namely, sorting of arrays and sorting of (sequential) files. The two classes are often called\ninternal and external sorting because arrays are stored in the fast, high-speed, random-access \"internal\" store\nof computers and files are appropriate on the slower, but more spacious \"external\" stores based on\nmechanically moving devices (disks and tapes). The importance of this distinction is obvious from the\nexample of sorting numbered cards. Structuring the cards as an array corresponds to laying them out in front\nof the sorter so that each card is visible and individually accessible (see Fig. 2.1).\nStructuring the cards as a file, however, implies that from each pile only the card on the top is visible (see\nFig. 2.2). Such a restriction will evidently have serious consequences on the sorting method to be used, but it\nis unavoidable if the number of cards to be laid out is larger than the available table.\nBefore proceeding, we introduce some terminology and notation to be used throughout this chapter. If we are\ngiven n items\na0, a1, ... , an-1\nsorting consists of permuting these items into an array\nak0, ak1, ... , ak[n-1]\nsuch that, given an ordering function f,\nf(ak0) ≤ f(ak1) ≤ ... ≤ f(ak[n-1])\nOrdinarily, the ordering function is not evaluated according to a specified rule of computation but is stored as\nan explicit component (field) of each item. Its value is called the key of the item. As a consequence, the\nrecord structure is particularly well suited to represent items and might for example be declared as follows:\n(*other components declared here*)\n\nThe other components represent relevant data about the items in the collection; the key merely assumes the\npurpose of identifying the items. As far as our sorting algorithms are concerned, however, the key is the only\nrelevant component, and there is no need to define any particular remaining components. In the following\ndiscussions, we shall therefore discard any associated information and assume that the type Item be defined\nas INTEGER. This choice of the key type is somewhat arbitrary. Evidently, any type on which a total\nordering relation is defined could be used just as well.\nA sorting method is called stable if the relative order if items with equal keys remains unchanged by the\nsorting process. Stability of sorting is often desirable, if items are already ordered (sorted) according to some\nsecondary keys, i.e., properties not reflected by the (primary) key itself.\nThis chapter is not to be regarded as a comprehensive survey in sorting techniques. Rather, some selected,\nspecific methods are exemplified in greater detail. For a thorough treatment of sorting, the interested reader\nis referred to the excellent and comprehensive compendium by D. E. Knuth [2-7] (see also Lorin [2-10]).\n\n2.2. Sorting Arrays\n\nThe predominant requirement that has to be made for sorting methods on arrays is an economical use of the\navailable store. This implies that the permutation of items which brings the items into order has to be\nperformed in situ, and that methods which transport items from an array a to a result array b are intrinsically\nof minor interest. Having thus restricted our choice of methods among the many possible solutions by the\ncriterion of economy of storage, we proceed to a first classification according to their efficiency, i.e., their\neconomy of time. A good measure of efficiency is obtained by counting the numbers C of needed key\ncomparisons and M of moves (transpositions) of items. These numbers are functions of the number n of\nitems to be sorted. Whereas good sorting algorithms require in the order of n*log(n) comparisons, we first\ndiscuss several simple and obvious sorting techniques, called straight methods, all of which require in the\norder n2 comparisons of keys. There are three good reasons for presenting straight methods before\nproceeding to the faster algorithms.\n1. Straight methods are particularly well suited for elucidating the characteristics of the major sorting\n2. Their programs are easy to understand and are short. Remember that programs occupy storage as well!\n3. Although sophisticated methods require fewer operations, these operations are usually more complex in\ntheir details; consequently, straight methods are faster for sufficiently small n, although they must not be\nused for large n.\nSorting methods that sort items in situ can be classified into three principal categories according to their\nunderlying method:\nSorting by insertion\nSorting by selection\nSorting by exchange\nThese three pinciples will now be examined and compared. The procedures operate on a global variable a\nwhose components are to be sorted in situ, i.e. without requiring additional, temporary storage. The\ncomponents are the keys themselves. We discard other data represented by the record type Item, thereby\nsimplifying matters. In all algorithms to be developed in this chapter, we will assume the presence of an\narray a and a constant n, the number of elements of a:\nVAR a: ARRAY n OF Item\n\n2.2.1. Sorting by Straight Insertion\n\nThis method is widely used by card players. The items (cards) are conceptually divided into a destination\nsequence a1 ... ai-1 and a source sequence ai ... an. In each step, starting with i = 2 and incrementing i by\nunity, the i th element of the source sequence is picked and transferred into the destination sequence by\ninserting it at the appropriate place.\n\nInitial Keys: 44 55 12 42 94 18 06 67\ni=1 44 55 12 42 94 18 06 67\ni=2 12 44 55 42 94 18 06 67\ni=3 12 42 44 55 94 18 06 67\ni=4 12 42 44 55 94 18 06 67\ni=5 12 18 42 44 55 94 06 67\ni=6 06 12 18 42 44 55 94 67\ni=7 06 12 18 42 44 55 67 94\nTable 2.1 A Sample Process of Straight Insertion Sorting.\nThe process of sorting by insertion is shown in an example of eight numbers chosen at random (see Table\n2.1). The algorithm of straight insertion is\nFOR i := 1 TO n-1 DO\nx := a[i];\ninsert x at the appropriate place in a0 ... ai\nIn the process of actually finding the appropriate place, it is convenient to alternate between comparisons and\nmoves, i.e., to let x sift down by comparing x with the next item aj, and either inserting x or moving aj to the\nright and proceeding to the left. We note that there are two distinct conditions that may cause the termination\nof the sifting down process:\n1. An item aj is found with a key less than the key of x.\n2. The left end of the destination sequence is reached.\nPROCEDURE StraightInsertion;\nVAR i, j: INTEGER; x: Item;\nFOR i := 1 TO n-1 DO\nx := a[i]; j := i;\nWHILE (j > 0) & (x < a[j-1] DO a[j] := a[j-1]; DEC(j) END ;\na[j] := x\nEND StraightInsertion\nAnalysis of straight insertion. The number Ci of key comparisons in the i-th sift is at most i-1, at least 1, and\n-- assuming that all permutations of the n keys are equally probable -- i/2 in the average. The number Mi of\nmoves (assignments of items) is Ci + 2 (including the sentinel). Therefore, the total numbers of comparisons\nand moves are\nCmin = n-1 Mmin = 3*(n-1)\nCave = (n2 + n - 2)/4 Mave = (n2 + 9n - 10)/4\nCmax = (n2 + n - 4)/4 Mmax = (n2 + 3n - 4)/2\nThe minimal numbers occur if the items are initially in order; the worst case occurs if the items are initially\nin reverse order. In this sense, sorting by insertion exhibits a truly natural behavior. It is plain that the given\nalgorithm also describes a stable sorting process: it leaves the order of items with equal keys unchanged.\nThe algorithm of straight insertion is easily improved by noting that the destination sequence a0 ... ai-1, in\nwhich the new item has to be inserted, is already ordered. Therefore, a faster method of determining the\ninsertion point can be used. The obvious choice is a binary search that samples the destination sequence in\nthe middle and continues bisecting until the insertion point is found. The modified sorting algorithm is called\nbinary insertion.\nPROCEDURE BinaryInsertion(VAR a: ARRAY OF Item; n: INTEGER);\nVAR i, j, m, L, R: INTEGER; x: Item;\nFOR i := 1 TO n-1 DO\n\nx := a[i]; L := 1; R := i;\nm := (L+R) DIV 2;\nIF a[m] <= x THEN L := m+1 ELSE R := m END\nFOR j := i TO R+1 BY -1 DO a[j] := a[j-1] END ;\na[R] := x\nEND BinaryInsertion\nAnalysis of binary insertion. The insertion position is found if L = R. Thus, the search interval must in the\nend be of length 1; and this involves halving the interval of length i log(i) times. Thus,\nC = Si: 0 ≤ I ≤ n: log(i)\nWe approximate this sum by the integral\nInt (0:n-1) log(x) dx = n*(log n - c) + c\nwhere c = log e = 1/ln 2 = 1.44269... .\nThe number of comparisons is essentially independent of the initial order of the items. However, because of\nthe truncating character of the division involved in bisecting the search interval, the true number of\ncomparisons needed with i items may be up to 1 higher than expected. The nature of this bias is such that\ninsertion positions at the low end are on the average located slightly faster than those at the high end, thereby\nfavoring those cases in which the items are originally highly out of order. In fact, the minimum number of\nHence, this is a case of unnatural behavior of a sorting algorithm. The number of comparisons is then\nC ≈ n*(log n - log e ± 0.5)\nUnfortunately, the improvement obtained by using a binary search method applies only to the number of\ncomparisons but not to the number of necessary moves. In fact, since moving items, i.e., keys and associated\ninformation, is in general considerably more time-consuming than comparing two keys, the improvement is\nby no means drastic: the important term M is still of the order n2. And, in fact, sorting the already sorted\narray takes more time than does straight insertion with sequential search.\nThis example demonstrates that an \"obvious improvement\" often has much less drastic consequences than\none is first inclined to estimate and that in some cases (that do occur) the \"improvement\" may actually turn\nout to be a deterioration. After all, sorting by insertion does not appear to be a very suitable method for\ndigital computers: insertion of an item with the subsequent shifting of an entire row of items by a single\nposition is uneconomical. One should expect better results from a method in which moves of items are only\nperformed upon single items and over longer distances. This idea leads to sorting by selection.\n\n2.2.2 Sorting by Straight Selection\n\nThis method is based on the following principle:\n1. Select the item with the least key.\n2. Exchange it with the first item a0.\n3. Then repeat these operations with the remaining n-1 items, then with n-2 items, until only one item -\n- the largest -- is left.\nThis method is shown on the same eight keys as in Table 2.1.\nInitial keys 44 55 12 42 94 18 06 67\n06 55 12 42 94 18 44 67\n06 12 55 42 94 18 44 67\n06 12 18 42 94 55 44 67\n06 12 18 42 94 55 44 67\n\n06 12 18 42 44 55 94 67\n06 12 18 42 44 55 94 67\n06 12 18 42 44 55 67 94\nTable 2.2 A Sample Process of Straight Selection Sorting.\nThe algorithm is formulated as follows:\nFOR i := 0 TO n-1 DO\nassign the index of the least item of ai ... an-1 to k;\nexchange ai with ak\nThis method, called straight selection, is in some sense the opposite of straight insertion: Straight insertion\nconsiders in each step only the one next item of the source sequence and all items of the destination array to\nfind the insertion point; straight selection considers all items of the source array to find the one with the least\nkey and to be deposited as the one next item of the destination sequence..\nPROCEDURE StraightSelection;\nVAR i, j, k: INTEGER; x: Item;\nFOR i := 0 TO n-2 DO\nk := i; x := a[i];\nFOR j := i+1 TO n-1 DO\nIF a[j] < x THEN k := j; x := a[k] END\na[k] := a[i]; a[i] := x\nEND StraightSelection\nAnalysis of straight selection. Evidently, the number C of key comparisons is independent of the initial order\nof keys. In this sense, this method may be said to behave less naturally than straight insertion. We obtain\nC = (n2 - n)/2\nThe number M of moves is at least\nMmin = 3*(n-1)\nin the case of initially ordered keys and at most\nMmax = n2/4 + 3*(n-1)\nif initially the keys are in reverse order. In order to determine Mavg we make the following deliberations:\nThe algorithm scans the array, comparing each element with the minimal value so far detected and, if smaller\nthan that minimum, performs an assignment. The probability that the second element is less than the first, is\n1/2; this is also the probability for a new assignment to the minimum. The chance for the third element to be\nless than the first two is 1/3, and the chance of the fourth to be the smallest is 1/4, and so on. Therefore the\ntotal expected number of moves is Hn-1, where Hn is the n th harmonic number\nHn can be expressed as\nHn = ln(n) + g + 1/2n - 1/12n2 + ...\nwhere g = 0.577216... is Euler's constant. For sufficiently large n, we may ignore the fractional terms and\ntherefore approximate the average number of assignments in the i th pass as\nF i = ln(i) + g + 1\nThe average number of moves Mavg in a selection sort is then the sum of Fi with i ranging from 1 to n.\nMavg = n*(g+1) + (Si: 1 ≤ i ≤ n: ln(i))\n\nBy further approximating the sum of discrete terms by the integral\n\nIntegral (1:n) ln(x) dx = n * ln(n) - n + 1\nwe obtain an approximate value\nMavg = n * (ln(n) + g)\nWe may conclude that in general the algorithm of straight selection is to be preferred over straight insertion,\nalthough in the cases in which keys are initially sorted or almost sorted, straight insertion is still somewhat\n\n2.2.3 Sorting by Straight Exchange\n\nThe classification of a sorting method is seldom entirely clear-cut. Both previously discussed methods can\nalso be viewed as exchange sorts. In this section, however, we present a method in which the exchange of\ntwo items is the dominant characteristic of the process. The subsequent algorithm of straight exchanging is\nbased on the principle of comparing and exchanging pairs of adjacent items until all items are sorted.\nAs in the previous methods of straight selection, we make repeated passes over the array, each time sifting\nthe least item of the remaining set to the left end of the array. If, for a change, we view the array to be in a\nvertical instead of a horizontal position, and -- with the help of some imagination -- the items as bubbles in a\nwater tank with weights according to their keys, then each pass over the array results in the ascension of a\nbubble to its appropriate level of weight (see Table 2.3). This method is widely known as the Bubblesort.\nI=1 2 3 4 5 6 7 8\n44 06 06 06 06 06 06 06\n55 44 12 12 12 12 12 12\n12 55 44 18 18 18 18 18\n42 12 55 44 42 42 42 42\n94 42 18 55 44 44 44 44\n18 94 42 42 55 55 55 55\n06 18 94 67 67 67 67 67\n67 67 67 94 94 94 94 94\nTable 2.3 A Sample of Bubblesorting.\nVAR i, j: INTEGER; x: Item;\nFOR i := 1 TO n-1 DO\nFOR j := n-1 TO i BY -1 DO\nIF a[j-1] > a[j] THEN\nx := a[j-1]; a[j-1] := a[j]; a[j] := x\nEND BubbleSort\nThis algorithm easily lends itself to some improvements. The example in Table 2.3 shows that the last three\npasses have no effect on the order of the items because the items are already sorted. An obvious technique\nfor improving this algorithm is to remember whether or not any exchange had taken place during a pass. A\nlast pass without further exchange operations is therefore necessary to determine that the algorithm may be\nterminated. However, this improvement may itself be improved by remembering not merely the fact that an\nexchange took place, but rather the position (index) of the last exchange. For example, it is plain that all pairs\nof adjacent items below this index k are in the desired order. Subsequent scans may therefore be terminated\nat this index instead of having to proceed to the predetermined lower limit i. The careful programmer notices,\nhowever, a peculiar asymmetry: A single misplaced bubble in the heavy end of an otherwise sorted array\nwill sift into order in a single pass, but a misplaced item in the light end will sink towards its correct position\nonly one step in each pass. For example, the array\n\n12 18 42 44 55 67 94 06\nis sorted by the improved Bubblesort in a single pass, but the array\n94 06 12 18 42 44 55 67\nrequires seven passes for sorting. This unnatural asymmetry suggests a third improvement: alternating the\ndirection of consecutive passes. We appropriately call the resulting algorithm Shakersort. Its behavior is\nillustrated in Table 2.4 by applying it to the same eight keys that were used in Table 2.3.\nVAR j, k, L, R: INTEGER; x: Item;\nBEGIN L := 1; R := n-1; k := R;\nFOR j := R TO L BY -1 DO\nx := a[j-1]; a[j-1] := a[j]; a[j] := x; k := j\nL := k+1;\nFOR j := L TO R BY +1 DO\nR := k-1\nEND ShakerSort\n\nL= 2 3 3 4 4\nR= 8 8 7 7 4\ndir = ↑ ↓ ↑ ↓ ↑\n44 06 06 06 06\n55 44 44 12 12\n12 55 12 44 18\n42 12 42 18 42\n94 42 55 42 44\n18 94 18 55 55\n06 18 67 67 67\n67 67 94 94 94\nTable 2.4 An Example of Shakersort.\nAnalysis of Bubblesort and Shakersort. The number of comparisons in the straight exchange algorithm is\nC = (n2 - n)/2\nand the minimum, average, and maximum numbers of moves (assignments of items) are\nMmin = 0, Mavg = 3*(n2 - n)/2, Mmax = 3*(n2 - n)/4\nThe analysis of the improved methods, particularly that of Shakersort, is intricate. The least number of\ncomparisons is Cmin = n-1. For the improved Bubblesort, Knuth arrives at an average number of passes\nproportional to n - k1*n½|, and an average number of comparisons proportional to (n2 – n*(k2 + ln(n)))/2. But\nwe note that all improvements mentioned above do in no way affect the number of exchanges; they only\nreduce the number of redundant double checks. Unfortunately, an exchange of two items is generally a more\ncostly operation than a comparison of keys; our clever improvements therefore have a much less profound\neffect than one would intuitively expect.\nThis analysis shows that the exchange sort and its minor improvements are inferior to both the insertion and\nthe selection sorts; and in fact, the Bubblesort has hardly anything to recommend it except its catchy name.\n\nThe Shakersort algorithm is used with advantage in those cases in which it is known that the items are\nalready almost in order -- a rare case in practice.\nIt can be shown that the average distance that each of the n items has to travel during a sort is n/3 places.\nThis figure provides a clue in the search for improved, i.e. more effective sorting methods. All straight\nsorting methods essentially move each item by one position in each elementary step. Therefore, they are\nbound to require in the order n2 such steps. Any improvement must be based on the principle of moving\nitems over greater distances in single leaps.\nSubsequently, three improved methods will be discussed, namely, one for each basic sorting method:\ninsertion, selection, and exchange.\n\n2.3. Advanced Sorting Methods\n\n2.3.1 Insertion Sort by Diminishing Increment\nA refinement of the straight insertion sort was proposed by D. L. Shell in l959. The method is explained and\ndemonstrated on our standard example of eight items (see Table 2.5). First, all items that are four positions\napart are grouped and sorted separately. This process is called a 4-sort. In this example of eight items, each\ngroup contains exactly two items. After this first pass, the items are regrouped into groups with items two\npositions apart and then sorted anew. This process is called a 2-sort. Finally, in a third pass, all items are\nsorted in an ordinary sort or 1-sort.\nOne may at first wonder if the necessity of several sorting passes, each of which involves all items, does not\nintroduce more work than it saves. However, each sorting step over a chain either involves relatively few\nitems or the items are already quite well ordered and comparatively few rearrangements are required.\nIt is obvious that the method results in an ordered array, and it is fairly obvious that each pass profits from\nprevious passes (since each i-sort combines two groups sorted in the preceding 2i-sort). It is also obvious that\nany sequence of increments is acceptable, as long as the last one is unity, because in the worst case the last\npass does all the work. It is, however, much less obvious that the method of diminishing increments yields\neven better results with increments other than powers of 2.\n44 55 12 42 94 18 06 67\n4-sort yields 44 18 06 42 94 55 12 67\n2-sort yield 06 18 12 42 44 55 94 67\n1-sort yields 06 12 18 42 44 55 67 94\nTable 2.5 An Insertion Sort with Diminishing Increments.\n\nThe procedure is therefore developed without relying on a specific sequence of increments. The T\nincrements are denoted by h0, h1, ... , hT-1 with the conditions\nht-1 = 1, h i+1 < hi\nThe algorithm is described by the procedure Shellsort [2.11] for t = 4:\nCONST T = 4;\nVAR i, j, k, m, s: INTEGER;\nx: Item;\nBEGIN h[0] := 9; h[1] := 5; h[2] := 3; h[3] := 1;\nFOR m := 0 TO T-1 DO\nk := h[m];\nFOR i := k+1 TO n-1 DO\nx := a[i]; j := i-k;\nWHILE (j >= k) & (x < a[j]) DO a[j+k] := a[j]; j := j-k END ;\na[j+k] := x\n\nEND ShellSort\nAnalysis of Shellsort. The analysis of this algorithm poses some very difficult mathematical problems, many\nof which have not yet been solved. In particular, it is not known which choice of increments yields the best\nresults. One surprising fact, however, is that they should not be multiples of each other. This will avoid the\nphenomenon evident from the example given above in which each sorting pass combines two chains that\nbefore had no interaction whatsoever. It is indeed desirable that interaction between various chains takes\nplace as often as possible, and the following theorem holds: If a k-sorted sequence is i-sorted, then it\nremains k-sorted. Knuth [2.8] indicates evidence that a reasonable choice of increments is the sequence\n(written in reverse order)\n1, 4, 13, 40, 121, ...\nwhere h k-1 = 3hk+1, ht = 1, and t = k×log3(n) - 1. He also recommends the sequence\nwhere h k-1 = 2hk+1, ht = 1, and t = k×log2(n) - 1. For the latter choice, mathematical analysis yields an effort\nproportional to n2 required for sorting n items with the Shellsort algorithm. Although this is a significant\nimprovement over n2, we will not expound further on this method, since even better algorithms are known.\n\n2.3.2 Tree Sort\n\nThe method of sorting by straight selection is based on the repeated selection of the least key among n items,\nthen among the remaining n-1 items, etc. Clearly, finding the least key among n items requires n-1\ncomparisons, finding it among n-1 items needs n-2 comparisons, etc., and the sum of the first n-1 integers is\n(n2-n)/2. So how can this selection sort possibly be improved? It can be improved only by retaining from\neach scan more information than just the identification of the single least item. For instance, with n/2\ncomparisons it is possible to determine the smaller key of each pair of items, with another n/4 comparisons\nthe smaller of each pair of such smaller keys can be selected, and so on. With only n-1 comparisons, we can\nconstruct a selection tree as shown in Fig. 2.3. and identify the root as the desired least key [2.2].\n\n\n12 06\n\n44 12 18 06\n\n44 55 12 42 94 18 06 67\n\nFig. 2.3. Repeated selection among two keys\n\nThe second step now consists of descending down along the path marked by the least key and eliminating it\nby successively replacing it by either an empty hole at the bottom, or by the item at the alternative branch at\nintermediate nodes (see Figs. 2.4 and 2.5). Again, the item emerging at the root of the tree has the (now\nsecond) smallest key and can be eliminated. After n such selection steps, the tree is empty (i.e., full of holes),\nand the sorting process is terminated. It should be noted that each of the n selection steps requires only log n\ncomparisons. Therefore, the total selection process requires only on the order of n*log n elementary\noperations in addition to the n steps required by the construction of the tree. This is a very significant\nimprovement over the straight methods requiring n2 steps, and even over Shellsort that requires n1.2 steps.\nNaturally, the task of bookkeeping has become more elaborate, and therefore the complexity of individual\nsteps is greater in the tree sort method; after all, in order to retain the increased amount of information gained\nfrom the initial pass, some sort of tree structure has to be created. Our next task is to find methods of\norganizing this information efficiently.\n\n\n44 12 18\n\n44 55 12 42 94 18 67\n\nFig. 2.4. Selecting the least key\n\n\n12 18\n\n44 12 18 67\n\n44 55 12 42 94 18 67\n\nFig. 2.5. Refilling the holes\n\nentire tree and are the source of many unnecessary comparisons. Moreover, a way should be found to\nrepresent the tree of n items in n units of storage, instead of in 2n - 1 units as shown above. These goals are\nindeed achieved by a method called Heapsort by its inventor J. Williams [2-14]; it is plain that this method\nrepresents a drastic improvement over more conventional tree sorting approaches. A heap is defined as a\nsequence of keys h L, hL+1, ... , hR (L ≥ 0) such that\nhi < h2i+1 and h i < h2i+2 for i = L ... R/2-1\nIf a binary tree is represented as an array as shown in Fig. 2.6, then it follows that the sort trees in Figs. 2.7\nand 2.8 are heaps, and in particular that the element h0 of a heap is its least element:\nh0 = min(h0, h 1, ... , hn-1)\n\nh1 h2\n\nh3 h4 h5 h6\n\nh7 h8 h9 h10 h11 h12 h13 h14\n\nFig. 2.6. Array viewed as a binary tree\n\n\n42 06\n\n55 94 18 12\n\nFig. 2.7. Heap with 7 elements\n\n\n\n42 12\n\n55 94 18 44\n\nFig. 2.8. Key 44 sifting through the heap\n\nLet us now assume that a heap with elements h L+1 ... hR is given for some values L and R, and that a new\nelement x has to be added to form the extended heap hL ... hR-1. Take, for example, the initial heap h0 ... h6\nshown in Fig. 2.7 and extend the heap to the left by an element h0 = 44. A new heap is obtained by first\nputting x on top of the tree structure and then by letting it sift down along the path of the smaller\ncomparands, which at the same time move up. In the given example the value 44 is first exchanged with 06,\nthen with 12, and thus forming the tree shown in Fig. 2.8. We now formulate this sifting algorithm as\nfollows: i, j are the pair of indices denoting the items to be exchanged during each sift step. The reader is\nurged to convince himself that the proposed method of sifting actually preserves the heap invariants that\ndefine a heap.\nA neat way to construct a heap in situ was suggested by R. W. Floyd. It uses the sifting procedure shown in\nProgram 2.7. Given is an array h0 ... h n-1; clearly, the elements hm ... hn-1 (with m = n DIV 2) form a heap\nalready, since no two indices i, j are such that j = 2i+1 or j = 2i+2. These elements form what may be\nconsidered as the bottom row of the associated binary tree (see Fig. 2.6) among which no ordering\nrelationship is required. The heap is now extended to the left, whereby in each step a new element is included\nand properly positioned by a sift. This process is illustrated in Table 2.6 and yields the heap shown in Fig.\nVAR i, j: INTEGER; x: Item;\nBEGIN i := L; j := 2*i+1; x := a[i];\nIF (j < R) & (a[j+1] < a[j]) THEN j := j+1 END ;\nWHILE (j <= R) & (a[j] < x) DO\na[i] := a[j]; i := j; j := 2*j;\na[i] := x\nEND sift\n\n44 55 12 42 | 94 18 06 67\n44 55 12 | 42 94 18 06 67\n44 55 | 06 42 94 18 12 67\n44 | 42 06 55 94 18 12 67\n06 42 12 55 94 18 44 67\nTable 2.6 Constructing a Heap.\nConsequently, the process of generating a heap of n elements h0 ... hn-1 in situ is described as follows:\nL := n DIV 2;\nWHILE L > 0 DO DEC(L); sift(L, n-1) END\nIn order to obtain not only a partial, but a full ordering among the elements, n sift steps have to follow,\nwhereby after each step the next (least) item may be picked off the top of the heap. Once more, the question\narises about where to store the emerging top elements and whether or not an in situ sort would be possible.\nOf course there is such a solution: In each step take the last component (say x) off the heap, store the top\nelement of the heap in the now free location of x, and let x sift down into its proper position. The necessary\nn-1 steps are illustrated on the heap of Table 2.7. The process is described with the aid of the procedure sift\nas follows:\n\nR := n-1;\nx := a[0]; a[0] := a[R]; a[R] := x;\nDEC(R); sift(1, R)\n06 42 12 55 94 18 44 67\n12 42 18 55 94 67 44 | 06\n18 42 44 55 94 67 | 12 06\n42 55 44 67 94 | 18 12 06\n44 55 94 67 | 42 18 12 06\n55 67 94 | 44 42 18 12 06\n67 94 | 55 44 42 18 12 06\n94 | 67 55 44 42 18 12 06\nTable 2.7 Example of a Heapsort Process.\nThe example of Table 2.7 shows that the resulting order is actually inverted. This, however, can easily be\nremedied by changing the direction of the ordering relations in the sift procedure. This results in the\nfollowing procedure Heapsort. Note that sift should actually be declared local to Heapsort).\nVAR i, j: INTEGER; x: Item;\nIF (j < R) & (a[j] < a[j+1]) THEN j := j+1 END ;\nWHILE (j <= R) & (x < a[j]) DO\na[i] := a[j]; i := j; j := 2*j+1;\na[i] := x\nEND sift;\nVAR L, R: INTEGER; x: Item;\nBEGIN L := n DIV 2; R := n-1;\nWHILE L > 0 DO DEC(L); sift(L, R) END ;\nDEC(R); sift(L, R)\nEND HeapSort\nAnalysis of Heapsort. At first sight it is not evident that this method of sorting provides good results. After\nall, the large items are first sifted to the left before finally being deposited at the far right. Indeed, the\nprocedure is not recommended for small numbers of items, such as shown in the example. However, for\nlarge n, Heapsort is very efficient, and the larger n is, the better it becomes -- even compared to Shellsort.\nIn the worst case, there are n/2 sift steps necessary, sifting items through log(n/2), log(n/2 +1), ... , log(n-1)\npositions, where the logarithm (to the base 2) is truncated to the next lower integer. Subsequently, the sorting\nphase takes n-1 sifts, with at most log(n-1), log(n-2), ... , 1 moves. In addition, there are n-1 moves for\nstashing the sifted item away at the right. This argument shows that Heapsort takes of the order of n×log(n)\nsteps even in the worst possible case. This excellent worst-case performance is one of the strongest qualities\nof Heapsort.\nIt is not at all clear in which case the worst (or the best) performance can be expected. But generally\nHeapsort seems to like initial sequences in which the items are more or less sorted in the inverse order, and\ntherefore it displays an unnatural behavior. The heap creation phase requires zero moves if the inverse order\nis present. The average number of moves is approximately n/2 × log(n), and the deviations from this value\nare relatively small.\n\n2.3.3 Partition Sort\n\nintroduce a third improved method based on the principle of exchange. In view of the fact that Bubblesort\nwas on the average the least effective of the three straight sorting algorithms, a relatively significant\nimprovement factor should be expected. Still, it comes as a surprise that the improvement based on\nexchanges to be discussed subsequently yields the best sorting method on arrays known so far. Its\nperformance is so spectacular that its inventor, C.A.R. Hoare, called it Quicksort [2.5 and 2.6].\nQuicksort is based on the recognition that exchanges should preferably be performed over large distances in\norder to be most effective. Assume that n items are given in reverse order of their keys. It is possible to sort\nthem by performing only n/2 exchanges, first taking the leftmost and the rightmost and gradually progressing\ninward from both sides. Naturally, this is possible only if we know that their order is exactly inverse. But\nsomething might still be learned from this example.\nLet us try the following algorithm: Pick any item at random (and call it x); scan the array from the left until\nan item ai > x is found and then scan from the right until an item aj < x is found. Now exchange the two items\nand continue this scan and swap process until the two scans meet somewhere in the middle of the array. The\nresult is that the array is now partitioned into a left part with keys less than (or equal to) x, and a right part\nwith keys greater than (or equal to) x. This partitioning process is now formulated in the form of a procedure.\nNote that the relations > and < have been replaced by ≥ and ≤ , whose negations in the while clause are < and\n>. With this change x acts as a sentinel for both scans.\nPROCEDURE partition;\nVAR i, j: INTEGER; w, x: Item;\nBEGIN i := 0; j := n-1;\nselect an item x at random;\nWHILE a[i] < x DO i := i+1 END ;\nWHILE x < a[j] DO j := j-1 END ;\nIF i <= j THEN\nw := a[i]; a[i] := a[j]; a[j] := w; i := i+1; j := j-1\nUNTIL i > j\nEND partition\nAs an example, if the middle key 42 is selected as comparand x, then the array of keys\n44 55 12 42 94 06 18 67\nrequires the two exchanges 18 ↔ 44 and 6 ↔ 55 to yield the partitioned array\n18 06 12 42 94 55 44 67\nand the final index values i = 5 and j = 3. Keys a1 ... ai-1 are less or equal to key x = 42, and keys aj+1 ... an are\ngreater or equal to key x. Consequently, there are three parts, namely\nAk : 1 < k < i : ak ≤ x\nAk : i ≤ k ≤ j: ak ? x\nAk : j < k < n : x ≤ ak\nThe goal is to increase I and decrease j, so that the middle part vanishes. This algorithm is very\nstraightforward and efficient because the essential comparands i, j, and x can be kept in fast registers\nthroughout the scan. However, it can also be cumbersome, as witnessed by the case with n identical keys,\nwhich result in n/2 exchanges. These unnecessary exchanges might easily be eliminated by changing the\nscanning statements to\nWHILE a[i] <= x DO i := i+1 END ;\nWHILE x <= a[j] DO j := j-1 END\nIn this case, however, the choice element x, which is present as a member of the array, no longer acts as a\nsentinel for the two scans. The array with all identical keys would cause the scans to go beyond the bounds\n\nof the array unless more complicated termination conditions were used. The simplicity of the conditions is\nwell worth the extra exchanges that occur relatively rarely in the average random case. A slight saving,\nhowever, may be achieved by changing the clause controlling the exchange step to i < j instead of i ≤ j. But\nthis change must not be extended over the two statements\nINC(i); DEC(j)\nwhich therefore require a separate conditional clause. Confidence in the correctness of the partition algorithm\ncan be gained by verifying that the ordering relations are invariants of the repeat statement. Initially, with i =\n1 and j = n, they are trivially true, and upon exit with i > j, they imply the desired result.\nWe now recall that our goal is not only to find partitions of the original array of items, but also to sort it.\nHowever, it is only a small step from partitioning to sorting: after partitioning the array, apply the same\nprocess to both partitions, then to the partitions of the partitions, and so on, until every partition consists of a\nsingle item only. This recipe is described as follows. (Note that sort should actually be declared local to\nBEGIN i := L; j := R;\nx := a[(L+R) DIV 2];\nWHILE a[i] < x DO INC(i) END ;\nWHILE x < a[j] DO DEC(j) END ;\nIF i <= j THEN\nUNTIL i > j;\nIF L < j THEN sort(L, j) END ;\nIF i < R THEN sort(i, R) END\nEND sort;\nBEGIN sort(0, n-1)\nEND QuickSort\nProcedure sort activates itself recursively. Such use of recursion in algorithms is a very powerful tool and\nwill be discussed further in Chap. 3. In some programming languages of older provenience, recursion is\ndisallowed for certain technical reasons. We will now show how this same algorithm can be expressed as a\nnon-recursive procedure. Obviously, the solution is to express recursion as an iteration, whereby a certain\namount of additional bookkeeping operations become necessary.\nThe key to an iterative solution lies in maintaining a list of partitioning requests that have yet to be\nperformed. After each step, two partitioning tasks arise. Only one of them can be attacked directly by the\nsubsequent iteration; the other one is stacked away on that list. It is, of course, essential that the list of\nrequests is obeyed in a specific sequence, namely, in reverse sequence. This implies that the first request\nlisted is the last one to be obeyed, and vice versa; the list is treated as a pulsating stack. In the following\nnonrecursive version of Quicksort, each request is represented simply by a left and a right index specifying\nthe bounds of the partition to be further partitioned. Thus, we introduce two array variables low, high, used\nas stacks with index s. The appropriate choice of the stack size M will be discussed during the analysis of\nPROCEDURE NonRecursiveQuickSort;\nCONST M = 12;\nVAR i, j, L, R, s: INTEGER; x, w: Item;\nlow, high: ARRAY M OF INTEGER; (*index stack*)\nBEGIN s := 0; low[0] := 0; high[0] := n-1;\nREPEAT (*take top request from stack*)\nL := low[s]; R := high[s]; DEC(s);\nREPEAT (*partition a[L] ... a[R]*)\n\ni := L; j := R; x := a[(L+R) DIV 2];\n\nIF i <= j THEN\nUNTIL i > j;\nIF i < R THEN (*stack request to sort right partition*)\nINC(s); low[s] := i; high[s] := R\nR := j (*now L and R delimit the left partition*)\nUNTIL s = 0\nEND NonRecursiveQuickSort\nAnalysis of Quicksort. In order to analyze the performance of Quicksort, we need to investigate the behavior\nof the partitioning process first. After having selected a bound x, it sweeps the entire array. Hence, exactly n\ncomparisons are performed. The number of exchanges can be determind by the following probabilistic\nWith a fixed bound x, the expected number of exchange operations is equal to the number of elements in the\nleft part of the partition, namely x-1, multiplied by the probability that such an element reached its place by\nan exchange. An exchange had taken place if the element had previously been part of the right partition; the\nprobablity for this is (n-(x-1))/n. The expected number of exchanges is therefore the average of these\nexpected values over all possible bounds x.\nM = [Sx: 1 ≤ x ≤ n: (x-1)*(n-(x-1))/n]/n =\n[Su: 0 ≤ u ≤ n-1: u*(n-u)]/n2\n= n*(n-1)/2nù - (2n2 - 3n + 1)/6n\n= (n - 1/n)/6\nAssuming that we are very lucky and always happen to select the median as the bound, then each partitioning\nprocess splits the array in two halves, and the number of necessary passes to sort is log n. The resulting total\nnumber of comparisons is then n*log n, and the total number of exchanges is n * log(n)/6.\nOf course, one cannot expect to hit the median all the time. In fact, the chance of doing so is only 1/n.\nSurprisingly, however, the average performance of Quicksort is inferior to the optimal case by a factor of\nonly 2*ln(2), if the bound is chosen at random.\nBut Quicksort does have its pitfalls. First of all, it performs moderately well for small values of n, as do all\nadvanced methods. Its advantage over the other advanced methods lies in the ease with which a straight\nsorting method can be incorporated to handle small partitions. This is particularly advantageous when\nconsidering the recursive version of the program.\nStill, there remains the question of the worst case. How does Quicksort perform then? The answer is\nunfortunately disappointing and it unveils the one weakness of Quicksort. Consider, for instance, the unlucky\ncase in which each time the largest value of a partition happens to be picked as comparand x. Then each step\nsplits a segment of n items into a left partition with n-1 items and a right partition with a single element. The\nresult is that n (instead of log n) splits become necessary, and that the worst-case performance is of the order\nApparently, the crucial step is the selection of the comparand x. In our example program it is chosen as the\nmiddle element. Note that one might almost as well select either the first or the last element. In these cases,\nthe worst case is the initially sorted array; Quicksort then shows a definite dislike for the trivial job and a\npreference for disordered arrays. In choosing the middle element, the strange characteristic of Quicksort is\nless obvious because the initially sorted array becomes the optimal case. In fact, also the average\nperformance is slightly better, if the middle element is selected. Hoare suggests that the choice of x be made\nat random, or by selecting it as the median of a small sample of, say, three keys [2.12 and 2.13]. Such a\njudicious choice hardly influences the average performance of Quicksort, but it improves the worst-case\n\nperformance considerably. It becomes evident that sorting on the basis of Quicksort is somewhat like a\ngamble in which one should be aware of how much one may afford to lose if bad luck were to strike.\nThere is one important lesson to be learned from this experience; it concerns the programmer directly. What\nare the consequences of the worst case behavior mentioned above to the performance Quicksort? We have\nrealized that each split results in a right partition of only a single element; the request to sort this partition is\nstacked for later execution. Consequently, the maximum number of requests, and therefore the total required\nstack size, is n. This is, of course, totally unacceptable. (Note that we fare no better -- in fact even worse --\nwith the recursive version because a system allowing recursive activation of procedures will have to store the\nvalues of local variables and parameters of all procedure activations automatically, and it will use an implicit\nstack for this purpose.)\nThe remedy lies in stacking the sort request for the longer partition and in continuing directly with the further\npartitioning of the smaller section. In this case, the size of the stack M can be limited to log n.\nThe change necessary is localized in the section setting up new requests. It now reads\nIF j - L < R - i THEN\nIF i < R THEN (*stack request for sorting right partition*)\nR := j (*continue sorting left partition*)\nIF L < j THEN (*stack request for sorting left parition*)\nINC(s); low[s] := L; high[s] := j\nL := i (*continue sorting right partition*)\n\n2.3.4. Finding the Median\n\nlarger than (or equal to) the other half of the n items. For example, the median of\n16 12 99 95 18 87 10\nis 18. The problem of finding the median is customarily connected with that of sorting, because the obvious\nmethod of determining the median is to sort the n items and then to pick the item in the middle. But\npartitioning yields a potentially much faster way of finding the median. The method to be displayed easily\ngeneralizes to the problem of finding the k th smallest of n items. Finding the median represents the special\ncase k = n/2.\nThe algorithm invented by C.A.R. Hoare [2-4] functions as follows. First, the partitioning operation of\nQuicksort is applied with L = 0 and R = n and with ak selected as splitting value x. The resulting index values\ni and j are such that\n1. ah < x for all h < i\n2. ah > x for all h > j\n3. i > j\nThere are three possible cases that may arise:\n1. The splitting value x was too small; as a result, the limit between the two partitions is below the desired\nvalue k. The partitioning process has to be repeated upon the elements ai ... aR (see Fig. 2.9).\n\n≤ ≥\n\nL j i k R\n\nFig. 2.9. Bound x too small\n\n\n2. The chosen bound x was too large. The splitting operation has to be repeated on the partition aL ... aj\n(see Fig. 2.10).\n\n≤ ≥\n\nL k j i R\n\nFig. 2.10. Bound x too large\n\n3. j < k < i: the element ak splits the array into two partitions in the specified proportions and therefore is\nthe desired quantile (see Fig. 2.11).\n\n≤ ≥\n\nL j k i R\n\nFig. 2.11. Correct bound\n\nThe splitting process has to be repeated until case 3 arises. This iteration is expressed by the following piece\nof program:\nL := 0; R := n;\nx := a[k]; partition(a[L] ... a[R-1]);\nIF j < k THEN L := i END ;\nIF k < i THEN R := j END\nFor a formal proof of the correctness of this algorithm, the reader is referred to the original article by Hoare.\nThe entire procedure Find is readily derived from this.\n(*reorder a such that a[k] is k-th largest*)\nVAR L, R, i, j: INTEGER; w, x: Item;\nBEGIN L := 0; R := n-1;\nx := a[k]; i := L; j := R;\nIF i <= j THEN\nUNTIL i > j;\nIF j < k THEN L := i END ;\nIF k < i THEN R := j END\nEND Find\nIf we assume that on the average each split halves the size of the partition in which the desired quantile lies,\nthen the number of necessary comparisons is\nn + n/2 + n/4 + ... + 1 ≈ 2n\ni.e., it is of order n. This explains the power of the program Find for finding medians and similar quantiles,\nand it explains its superiority over the straightforward method of sorting the entire set of candidates before\nselecting the k th (where the best is of order n * log(n)). In the worst case, however, each partitioning step\nreduces the size of the set of candidates only by 1, resulting in a required number of comparisons of order n2.\n\nAgain, there is hardly any advantage in using this algorithm, if the number of elements is small, say, fewer\nthan 10.\n\n2.3.5. A Comparison of Array Sorting Methods\n\nTo conclude this parade of sorting methods, we shall try to compare their effectiveness. If n denotes the\nnumber of items to be sorted, C and M shall again stand for the number of required key comparisons and\nitem moves, respectively. Closed analytical formulas can be given for all three straight sorting methods.\nThey are tabulated in Table 2.8. The column headings min, avg, max, specify the respective minima,\nmaxima, and values averaged over all n! permutations of n items.\nmin avg max\nStraight C= n-1 (n2 + n - 2)/4 (n2 - n)/2 - 1\ninsertion M= 2(n-1) (n2 - 9n -10)/4 (n2 - 3n - 4)/2\nStraight C= (n2 - n)/2 (n2 - n)/2 (n2 - n)/2\nselection M= 3(n-1) n*(ln n + 0.57) n2/4 + 3(n-1)\nexchange M= 0 (n2-n)*0.75 (n2-n)*1.5\nTable 2.8. Comparison of straight sorting methods.\nNo reasonably simple accurate formulas are available on the advanced methods. The essential facts are that\nthe computational effort needed is c*n1.2 in the case of Shellsort and is c*n*log n in the cases of Heapsort\nand Quicksort, where the c are appropriate coefficients.\nThese formulas merely provide a rough measure of performance as functions of n, and they allow the\nclassification of sorting algorithms into primitive, straight methods (n2) and advanced or \"logarithmic\"\nmethods (n*log(n)). For practical purposes, however, it is helpful to have some experimental data available\nthat shed light on the coefficients c which further distinguish the various methods. Moreover, the formulas\ndo not take into account the computational effort expended on operations other than key comparisons and\nitem moves, such as loop control, etc. Clearly, these factors depend to some degree on individual systems,\nbut an example of experimentally obtained data is nevertheless informative. Table 2.9 shows the times (in\nseconds) consumed by the sorting methods previously discussed, as executed by the Modula-2 system on a\nLilith personal computer. The three columns contain the times used to sort the already ordered array, a\nrandom permutation, and the inversely ordered array. Table 2.9 is for 256 items, Table 2.10 for 2048 items.\nThe data clearly separate the n2 methods from the n×log(n) methods. The following points are noteworthy:\n1. The improvement of binary insertion over straight insertion is marginal indeed, and even negative in the\ncase of an already existing order.\n2. Bubblesort is definitely the worst sorting method among all compared. Its improved version Shakersort is\nstill worse than straight insertion and straight selection (except in the pathological case of sorting a sorted\n3. Quicksort beats Heapsort by a factor of 2 to 3. It sorts the inversely ordered array with speed practically\nidentical to the one that is already sorted.\nOrdered Random Inverse\nStraightInsertion 0.02 0.82 1.64\nBinaryInsertion 0.12 0.70 1.30\nStraightSelection 0.94 0.96 1.18\nBubbleSort 1.26 2.04 2.80\nShakerSort 0.02 1.66 2.92\nShellSort 0.10 0.24 0.28\nHeapSort 0.20 0.20 0.20\nQuickSort 0.08 0.12 0.08\nNonRecQuickSort 0.08 0.12 0.08\nStraightMerge 0.18 0.18 0.18\n\nTable 2.9. Execution times of sort programs with 256 elements\n\nOrdered Random Inverse\nStraightInsertion 0.22 50.74 103.80\nBinaryInsertion 1.16 37.66 76.06\nStraightSelection 58.18 58.34 73.46\nBubbleSort 80.18 128.84 178.66\nShakerSort 0.16 104.44 187.36\nShellSort 0.80 7.08 12.34\nHeapSort 2.32 2.22 2.12\nQuickSort 0.72 1.22 0.76\nNonRecQuickSort 0.72 1.32 0.80\nStraightMerge 1.98 2.06 1.98\nTable 2.10. Execution times of sort programs with 2048 elements\n\n2.4. Sorting Sequences\n\n2.4.1. Straight Merging\nUnfortunately, the sorting algorithms presented in the preceding chapter are inapplicable, if the amount of\ndata to be sorted does not fit into a computer's main store, but if it is, for instance, represented on a peripheral\nand sequential storage device such as a tape or a disk. In this case we describe the data as a (sequential) file\nwhose characteristic is that at each moment one and only one component is directly accessible. This is a\nsevere restriction compared to the possibilities offered by the array structure, and therefore different sorting\ntechniques have to be used. The most important one is sorting by merging. Merging (or collating) means\ncombining two (or more) ordered sequences into a single, ordered sequence by repeated selection among the\ncurrently accessible components. Merging is a much simpler operation than sorting, and it is used as an\nauxiliary operation in the more complex process of sequential sorting. One way of sorting on the basis of\nmerging, called straight merging, is the following:\n1. Split the sequence a into two halves, called b and c.\n2. Merge b and c by combining single items into ordered pairs.\n3. Call the merged sequence a, and repeat steps 1 and 2, this time merging ordered pairs into ordered\n4. Repeat the previous steps, merging quadruples into octets, and continue doing this, each time doubling the\nlengths of the merged subsequences, until the entire sequence is ordered.\nAs an example, consider the sequence\n44 55 12 42 94 18 06 67\nIn step 1, the split results in the sequences\n44 55 12 42\n94 18 06 67\nThe merging of single components (which are ordered sequences of length 1), into ordered pairs yields\n44 94 ' 18 55 ' 06 12 ' 42 67\nSplitting again in the middle and merging ordered pairs yields\n06 12 44 94 ' 18 42 55 67\nA third split and merge operation finally produces the desired result\n06 12 18 42 44 55 67 94\nEach operation that treats the entire set of data once is called a phase, and the smallest subprocess that by\nrepetition constitutes the sort process is called a pass or a stage. In the above example the sort took three\npasses, each pass consisting of a splitting phase and a merging phase. In order to perform the sort, three tapes\nare needed; the process is therefore called a three-tape merge.\n\nActually, the splitting phases do not contribute to the sort since they do in no way permute the items; in a\nsense they are unproductive, although they constitute half of all copying operations. They can be eliminated\naltogether by combining the split and the merge phase. Instead of merging into a single sequence, the output\nof the merge process is immediately redistributed onto two tapes, which constitute the sources of the\nsubsequent pass. In contrast to the previous two-phase merge sort, this method is called a single-phase merge\nor a balanced merge. It is evidently superior because only half as many copying operations are necessary; the\nprice for this advantage is a fourth tape.\nWe shall develop a merge program in detail and initially let the data be represented as an array which,\nhowever, is scanned in strictly sequential fashion. A later version of merge sort will then be based on the\nsequence structure, allowing a comparison of the two programs and demonstrating the strong dependence of\nthe form of a program on the underlying representation of its data.\nA single array may easily be used in place of two sequences, if it is regarded as double-ended. Instead of\nmerging from two source files, we may pick items off the two ends of the array. Thus, the general form of\nthe combined merge-split phase can be illustrated as shown in Fig. 2.12. The destination of the merged items\nis switched after each ordered pair in the first pass, after each ordered quadruple in the second pass, etc., thus\nevenly filling the two destination sequences, represented by the two ends of a single array. After each pass,\nthe two arrays interchange their roles, the source becomes the new destination, and vice versa.\nsource destination\n\ni j i j\n\nmerge distribute\n\nFig. 2.12. Straight merge sort with two arrays\n\nA further simplification of the program can be achieved by joining the two conceptually distinct arrays into a\nsingle array of doubled size. Thus, the data will be represented by\na: ARRAY 2*n OF item\nand we let the indices i and j denote the two source items, whereas k and L designate the two destinations\n(see Fig. 2.12). The initial data are, of course, the items a1 ... an. Clearly, a Boolean variable up is needed to\ndenote the direction of the data flow; up shall mean that in the current pass components a0 ... an-1 will be\nmoved up to the variables an ... a2n-1, whereas ~up will indicate that an ... a2n-1 will be transferred down into\na0 ... an-1. The value of up strictly alternates between consecutive passes. And, finally, a variable p is\nintroduced to denote the length of the subsequences to be merged. Its value is initially 1, and it is doubled\nbefore each successive pass. To simplify matters somewhat, we shall assume that n is always a power of 2.\nThus, the first version of the straight merge program assumes the following form:\nVAR i, j, k, L, p: INTEGER; up: BOOLEAN;\nBEGIN up := TRUE; p := 1;\nREPEAT initialize index variables;\nIF up THEN i := 0; j := n-1; k := n; L := 2*n-1\nELSE k := 0; L := n-1; i := n; j := 2*n-1\nmerge p-tuples from i- and j-sources to k- and L-destinations;\nup := ~up; p := 2*p\nUNTIL p = n\nEND MergeSort\nIn the next development step we further refine the statements expressed in italics. Evidently, the merge pass\ninvolving n items is itself a sequence of merges of sequences, i.e. of p-tuples. Between every such partial\n\nmerge the destination is switched from the lower to the upper end of the destination array, or vice versa, to\nguarantee equal distribution onto both destinations. If the destination of the merged items is the lower end of\nthe destination array, then the destination index is k, and k is incremented after each move of an item. If they\nare to be moved to the upper end of the destination array, the destination index is L, and it is decremented\nafter each move. In order to simplify the actual merge statement, we choose the destination to be designated\nby k at all times, switching the values of the variables k and L after each p-tuple merge, and denote the\nincrement to be used at all times by h, where h is either 1 or -1. These design discussions lead to the\nfollowing refinement:\nh := 1; m := n; (*m = no. of items to be merged*)\nREPEAT q := p; r := p; m := m - 2*p;\nmerge q items from i-source with r items from j-source.\ndestination index is k. increment k by h;\nh := -h; exchange k and L\nUNTIL m = 0\nIn the further refinement step the actual merge statement is to be formulated. Here we have to keep in mind\nthat the tail of the one subsequence which is left non-empty after the merge has to be appended to the output\nsequence by simple copying operations.\nWHILE (q > 0) & (r > 0) DO\nIF a[i] < a[j] THEN\nmove an item from i-source to k-destination; advance i and k; q := q-1\nmove an item from j-source to k-destination; advance j and k; r := r-1\nwriting it out in full, we wish to eliminate the restriction that n be a power of 2. Which parts of the algorithm\nare affected by this relaxation of constraints? We easily convince ourselves that the best way to cope with the\nmore general situation is to adhere to the old method as long as possible. In this example this means that we\ncontinue merging p-tuples until the remainders of the source sequences are of length less than p. The one and\nonly part that is influenced are the statements that determine the values of q and r, the lengths of the\nsequences to be merged. The following four statements replace the three statements\nand, as the reader should convince himself, they represent an effective implementation of the strategy\nspecified above; note that m denotes the total number of items in the two source sequences that remain to be\nIF m >= p THEN q := p ELSE q := m END ;\nm := m-q;\nIF m >= p THEN r := p ELSE r := m END ;\nm := m-r\nIn addition, in order to guarantee termination of the program, the condition p=n, which controls the outer\nrepetition, must be changed to p ≥ n. After these modifications, we may now proceed to describe the entire\nalgorithm in terms of a procedure operating on the global array a with 2n elements.\nPROCEDURE StraightMerge;\nVAR i, j, k, L, t: INTEGER; (*index range of a is 0 .. 2*n-1 *)\nh, m, p, q, r: INTEGER; up: BOOLEAN;\nBEGIN up := TRUE; p := 1;\nREPEAT h := 1; m := n;\n\nREPEAT (*merge a run from i- and j-sources to k-destination*)\n\nm := m-q;\nm := m-r;\nIF a[i] < a[j] THEN\na[k] := a[i]; k := k+h; i := i+1; q := q-1\na[k] := a[j]; k := k+h; j := j-1; r := r-1\nWHILE r > 0 DO\nWHILE q > 0 DO\nh := -h; t := k; k := L; L := t\nUNTIL m = 0;\nup := ~up; p := 2*p\nUNTIL p >= n;\nFOR i := 1 TO n DO a[i] := a[i+n] END\nEND StraightMerge\nAnalysis of Mergesort. Since each pass doubles p, and since the sort is terminated as soon as p > n, it\ninvolves ilog nj passes. Each pass, by definition, copies the entire set of n items exactly once. As a\nconsequence, the total number of moves is exactly\nM = n × log(n)\nThe number C of key comparisons is even less than M since no comparisons are involved in the tail copying\noperations. However, since the mergesort technique is usually applied in connection with the use of\nperipheral storage devices, the computational effort involved in the move operations dominates the effort of\ncomparisons often by several orders of magnitude. The detailed analysis of the number of comparisons is\ntherefore of little practical interest.\nThe merge sort algorithm apparently compares well with even the advanced sorting techniques discussed in\nthe previous chapter. However, the administrative overhead for the manipulation of indices is relatively high,\nand the decisive disadvantage is the need for storage of 2n items. This is the reason sorting by merging is\nrarely used on arrays, i.e., on data located in main store. Figures comparing the real time behavior of this\nMergesort algorithm appear in the last line of Table 2.9. They compare favorably with Heapsort but\nunfavorably with Quicksort.\n\n2.4.2. Natural Merging\n\nIn straight merging no advantage is gained when the data are initially already partially sorted. The length of\nall merged subsequences in the k th pass is less than or equal to 2k, independent of whether longer\nsubsequences are already ordered and could as well be merged. In fact, any two ordered subsequences of\nlengths m and n might be merged directly into a single sequence of m+n items. A mergesort that at any time\nmerges the two longest possible subsequences is called a natural merge sort.\nAn ordered subsequence is often called a string. However, since the word string is even more frequently used\nto describe sequences of characters, we will follow Knuth in our terminology and use the word run instead of\nstring when referring to ordered subsequences. We call a subsequence ai ... aj such that\n(ai-1 > ai) & (Ak : i ≤ k < j : ak ≤ ak+1) & (aj > aj+1)\n\na maximal run or, for short, a run. A natural merge sort, therefore, merges (maximal) runs instead of\nsequences of fixed, predetermined length. Runs have the property that if two sequences of n runs are merged,\na single sequence of exactly n runs emerges. Therefore, the total number of runs is halved in each pass, and\nthe number of required moves of items is in the worst case n*log(n), but in the average case it is even less.\nThe expected number of comparisons, however, is much larger because in addition to the comparisons\nnecessary for the selection of items, further comparisons are needed between consecutive items of each file\nin order to determine the end of each run.\nOur next programming exercise develops a natural merge algorithm in the same stepwise fashion that was\nused to explain the straight merging algorithm. It employs the sequence structure (represented by files, see\nSect. 1.8) instead of the array, and it represents an unbalanced, two-phase, three-tape merge sort. We assume\nthat the file variable c represents the initial sequence of items. (Naturally, in actual data processing\napplication, the initial data are first copied from the original source to c for reasons of safety.) a and b are\ntwo auxiliary file variables. Each pass consists of a distribution phase that distributes runs equally from c to a\nand b, and a merge phase that merges runs from a and b to c. This process is illustrated in Fig. 2.13.\n\na a a\n\nc c c c c\n\nb b b\n\nmerge phase\ndistribution phase\n\nst nd th\n1 run 2 run n run\n\nFig. 2.13. Sort phases and passes\n\n17 31' 05 59' 13 41 43 67' 11 23 29 47' 03 07 71' 02 19 57' 37 61\n05 17 31 59' 11 13 23 29 41 43 47 67' 02 03 07 19 57 71' 37 61\n05 11 13 17 23 29 31 41 43 47 59 67' 02 03 07 19 37 57 61 71\n02 03 05 07 11 13 17 19 23 29 31 37 41 43 47 57 59 61 67 71\nTable 2.11. Example of a Natural Mergesort.\nAs an example, Table 2.11 shows the file c in its original state (line1) and after each pass (lines 2-4) in a\nnatural merge sort involving 20 numbers. Note that only three passes are needed. The sort terminates as soon\nas the number of runs on c is 1. (We assume that there exists at least one non-empty run on the initial\nsequence). We therefore let a variable L be used for counting the number of runs merged onto c. By making\nuse of the type Rider defined in Sect. 1.8.1, the program can be formulated as follows:\nr0, r1, r2: Files.Rider; (*see 1.8.1*)\nREPEAT Files.Set(r0, a, 0); Files.Set(r1, b, 0); Files.Set(r2, c, 0);\ndistribute(r2, r0, r1); (*c to a and b*)\nL := 0; merge(r0, r1, r2) (*a and b into c*)\nThe two phases clearly emerge as two distinct statements. They are now to be refined, i.e., expressed in more\ndetail. The refined descriptions of distribute (from rider r2 to riders r0 and r1) and merge (from riders r0 and\nr1 to rider r2) follow:\n\nREPEAT copyrun(r2, r0);\n\nIF ~r2.eof THEN copyrun(r2, r1) END\nUNTIL r2.eof\nREPEAT mergerun(r0, r1, r2); INC(L)\nUNTIL r1.eof;\nIF ~r0.eof THEN copyrun(r0, r2); INC(L) END\nThis method of distribution supposedly results in either equal numbers of runs in both a and b, or in sequence\na containing one run more than b. Since corresponding pairs of runs are merged, a leftover run may still be\non file a, which simply has to be copied. The statements merge and distribute are formulated in terms of a\nrefined statement mergerun and a subordinate procedure copyrun with obvious tasks. When attempting to do\nso, one runs into a serious difficulty: In order to determine the end of a run, two consecutive keys must be\ncompared. However, files are such that only a single element is immediately accessible. We evidently cannot\navoid to look ahead, i.e to associate a buffer with every sequence. The buffer is to contain the first element of\nthe file still to be read and constitutes something like a window sliding over the file.\nInstead of programming this mechanism explicitly into our program, we prefer to define yet another level of\nabstraction. It is represented by a new module Runs. It can be regarded as an extension of module Files of\nSect. 1.8, introducing a new type Rider, which we may consider as an extension of type Files.Rider. This\nnew type will not only accept all operations available on Riders and indicate the end of a file, but also\nindicate the end of a run and the first element of the remaining part of the file. The new type as well as its\noperators are presented by the following definition.\nIMPORT Files, Texts;\nTYPE Rider = RECORD (Files.Rider) first: INTEGER; eor: BOOLEAN END ;\nPROCEDURE OpenRandomSeq(f: Files.File; length, seed: INTEGER);\nPROCEDURE Set (VAR r: Rider; VAR f: Files.File);\nPROCEDURE copy(VAR source, destination: Rider);\nPROCEDURE ListSeq(VAR W: Texts.Writer; f: Files.File);\nEND Runs.\nA few additional explanations for the choice of the procedures are necessary. As we shall see, the sorting\nalgorithms discussed here and later are based on copying elements from one file to another. A procedure\ncopy therefore takes the place of separate read and write operations.\nFor convenience of testing the following examples, we also introduce a procedure ListSeq, converting a file\nof integers into a text. Also for convenience an additional procedure is included: OpenRandomSeq initializes\na file with numbers in random order. These two procedures will serve to test the algorithms to be discussed\nbelow. The values of the fields eof and eor are defined as results of copy in analogy to eof having been\ndefined as result of a read operation.\nIMPORT Files, Texts;\nTYPE Rider* = RECORD (Files.Rider) first: INTEGER; eor: BOOLEAN END ;\nPROCEDURE OpenRandomSeq*( f: Files.File; length, seed: INTEGER);\nVAR i: INTEGER; w: Files.Rider;\nBEGIN Files.Set(w, f, 0);\nFOR i := 0 TO length-1 DO\nFiles.WriteInt(w, seed); seed := (31*seed) MOD 997 + 5\nEND OpenRandomSeq;\nPROCEDURE Set*(VAR r: Rider; f: Files.File);\nBEGIN Files.Set(r, f, 0); Files.Read (r, r.first); r.eor := r.eof\nEND Set;\n\nPROCEDURE copy*(VAR src, dest: Rider);\n\nBEGIN dest.first := src.first;\nFiles.Write(dest, dest.first); Files.Read(src, src.first);\nsrc.eor := src.eof OR (src.first < dest.first)\nEND copy;\nPROCEDURE ListSeq*(VAR W: Texts; f: Files.File;);\nVAR x, y, k, n: INTEGER; r: Files.Rider;\nBEGIN k := 0; n := 0; Files.Set(r, f, 0); Files.ReadInt(r, x);\nWHILE ~r.eof DO\nTexts.WriteInt(W, x, 6); INC(k); Files.Read(r, y);\nIF y < x THEN (*run ends*) Texts.Write(W, “|”); INC(n) END ;\nx := y\nTexts.Write(W, “$”); Texts.WriteInt(W, k, 5); Texts.WriteInt(W, n, 5);\nEND ListSeq;\nEND Runs.\nWe now return to the process of successive refinement of the process of natural merging. Procedure copyrun\nand the statement merge are now conveniently expressible as shown below. Note that we refer to the\nsequences (files) indirectly via the riders attached to them. In passing, we also note that the rider’s field first\nrepresents the next key on a sequence being read, and the last key of a sequence being written.\nPROCEDURE copyrun(VAR x, y: Runs.Rider);\nBEGIN (*copy from x to y*)\nREPEAT Runs.copy(x, y) UNTIL x.eor\nEND copyrun\n(*merge from r0 and r1 to r2*)\nIF r0.first < r1.first THEN\nRuns.copy(r0, r2);\nIF r0.eor THEN copyrun(r1, r2) END\nELSE Runs.copy(r1, r2);\nIF r1.eor THEN copyrun(r0, r2) END\nUNTIL r0.eor OR r1.eor\nexhausted. After this, the other run (which is not exhausted yet) has to be transferred to the resulting run by\nmerely copying its tail. This is done by a call of procedure copyrun.\nThis should supposedly terminate the development of the natural merging sort procedure. Regrettably, the\nprogram is incorrect, as the very careful reader may have noticed. The program is incorrect in the sense that\nit does not sort properly in some cases. Consider, for example, the following sequence of input data:\n03 02 05 11 07 13 19 17 23 31 29 37 43 41 47 59 57 61 71 67\nBy distributing consecutive runs alternately to a and b, we obtain\na = 03 ' 07 13 19 ' 29 37 43 ' 57 61 71'\nb = 02 05 11 ' 17 23 31 ' 41 47 59 ' 67\nThese sequences are readily merged into a single run, whereafter the sort terminates successfully. The\nexample, although it does not lead to an erroneous behaviour of the program, makes us aware that mere\ndistribution of runs to serveral files may result in a number of output runs that is less than the number of\ninput runs. This is because the first item of the i+2nd run may be larger than the last item of the i-th run,\nthereby causing the two runs to merge automatically into a single run.\n\nAlthough procedure distribute supposedly outputs runs in equal numbers to the two files, the important\nconsequence is that the actual number of resulting runs on a and b may differ significantly. Our merge\nprocedure, however, only merges pairs of runs and terminates as soon as b is read, thereby losing the tail of\none of the sequences. Consider the following input data that are sorted (and truncated) in two subsequent\n17 19 13 57 23 29 11 59 31 37 07 61 41 43 05 67 47 71 02 03\n13 17 19 23 29 31 37 41 43 47 57 71 11 59\n11 13 17 19 23 29 31 37 41 43 47 57 59 71\nTable 2.12 Incorrect Result of Mergesort Program.\nThe example of this programming mistake is typical for many programming situations. The mistake is\ncaused by an oversight of one of the possible consequences of a presumably simple operation. It is also\ntypical in the sense that serval ways of correcting the mistake are open and that one of them has to be chosen.\nOften there exist two possibilities that differ in a very important, fundamental way:\n1. We recognize that the operation of distribution is incorrectly programmed and does not satisfy the\nrequirement that the number of runs differ by at most 1. We stick to the original scheme of operation and\ncorrect the faulty procedure accordingly.\n2. We recognize that the correction of the faulty part involves far-reaching modifications, and we try to find\nways in which other parts of the algorithm may be changed to accommodate the currently incorrect part.\nIn general, the first path seems to be the safer, cleaner one, the more honest way, providing a fair degree of\nimmunity from later consequences of overlooked, intricate side effects. It is, therefore, the way toward a\nsolution that is generally recommended.\nIt is to be pointed out, however, that the second possibility should sometimes not be entirely ignored. It is\nfor this reason that we further elaborate on this example and illustrate a fix by modification of the merge\nprocedure rather than the distribution procedure, which is primarily at fault.\nThis implies that we leave the distribution scheme untouched and renounce the condition that runs be equally\ndistributed. This may result in a less than optimal performance. However, the worst-case performance\nremains unchanged, and moreover, the case of highly unequal distribution is statistically very unlikely.\nEfficiency considerations are therefore no serious argument against this solution.\nIf the condition of equal distribution of runs no longer exists, then the merge procedure has to be changed so\nthat, after reaching the end of one file, the entire tail of the remaining file is copied instead of at most one\nrun. This change is straightforward and is very simple in comparison with any change in the distribution\nscheme. (The reader is urged to convince himself of the truth of this claim). The revised version of the merge\nalgorithm is shown below in the form of a function procedure:\nPROCEDURE NaturalMerge(src: Files.File): Files.File;\nVAR L: INTEGER; (*no. of runs merged*)\nf0, f1, f2: Files.File;\nr0, r1, r2: Runs.Rider;\nPROCEDURE copyrun(VAR x, y: Runs.Rider);\nBEGIN (*from x to y*)\nREPEAT Runs.copy(x, y) UNTIL x.eor\nEND copyrun;\nBEGIN Runs.Set(r2, src);\nREPEAT f0 := Files.New(\"test0\"); Files.Set(r0, f0, 0);\nf1 := Files.New(\"test1\"); Files.Set (r1, f1, 0);\n(*distribute from r2 to r0 and r1*)\nREPEAT copyrun(r2, r0);\nUNTIL r2.eof;\nRuns.Set(r0, f0); Runs.Set(r1, f1);\nf2 := Files.New(\"\"); Files.Set(r2, f2, 0); L := 0;\n\n(*merge from r0 and r1 to r2*)\n\nIF r0.first < r1.first THEN\nRuns.copy(r0, r2);\nIF r0.eor THEN copyrun(r1, r2) END\nELSE Runs.copy(r1, r2);\nIF r1.eor THEN copyrun(r0, r2) END\nUNTIL r0.eor OR r1.eor;\nUNTIL r0.eof OR r1.eof;\nWHILE ~r0.eof DO copyrun(r0, r2); INC(L) END ;\nWHILE ~r1.eof DO copyrun(r1, r2); INC(L) END ;\nRuns.Set(r2, f2)\nUNTIL L = 1;\nEND NaturalMerge;\n\n2.4.3. Balanced Multiway Merging\n\nThe effort involved in a sequential sort is proportional to the number of required passes since, by definition,\nevery pass involves the copying of the entire set of data. One way to reduce this number is to distribute runs\nonto more than two files. Merging r runs that are equally distributed on N files results in a sequence of r/N\nruns. A second pass reduces their number to r/N 2, a third pass to r/N3, and after k passes there are r/Nk runs\nleft. The total number of passes required to sort n items by N-way merging is therefore k = logN(n). Since\neach pass requires n copy operations, the total number of copy operations is in the worst case M = n×logN(n)\nAs the next programming exercise, we will develop a sort program based on multiway merging. In order to\nfurther contrast the program from the previous natural two-phase merging procedure, we shall formulate the\nmultiway merge as a single phase, balanced mergesort. This implies that in each pass there are an equal\nnumber of input and output files onto which consecutive runs are alternately distributed. Using 2N files, the\nalgorithm will therefore be based on N-way merging. Following the previously adopted strategy, we will not\nbother to detect the automatic merging of two consecutive runs distributed onto the same file. Consequently,\nwe are forced to design the merge program whithout assuming strictly equal numbers of runs on the input\nIn this program we encounter for the first time a natural application of a data structure consisting of arrays of\nfiles. As a matter of fact, it is surprising how strongly the following program differs from the previous one\nbecause of the change from two-way to multiway merging. The change is primarily a result of the\ncircumstance that the merge process can no longer simply be terminated after one of the input runs is\nexhausted. Instead, a list of inputs that are still active, i.e., not yet exhausted, must be kept. Another\ncomplication stems from the need to switch the groups of input and output files after each pass. Here the\nindirection of access to files via riders comes in handy. In each pass, data may be copied from the same\nriders r to the same riders w. At the end of each pass we merely need to reset the input and output files to\ndifferent riders.\nObviously, file numbers are used to index the array of files. Let us then assume that the initial file is the\nparameter src, and that for the sorting process 2N files are available:\nf, g: ARRAY N OF Files.File;\nr, w: ARRAY N OF Runs.Rider\nThe algorithm can now be sketched as follows:\nPROCEDURE BalancedMerge(src: Files.File): Files.File;\nL: INTEGER; (*no. of runs distributed*)\n\nR: Runs.Rider;\nBEGIN Runs.Set(R, src); (*distribute initial runs from R to w[0] ... w[N-1]*)\nj := 0; L := 0;\nposition riders w on files g;\ncopy one run from R to w[j];\nINC(j); INC(L);\nIF j = N THEN j := 0 END\nUNTIL R.eof;\nREPEAT (*merge from riders r to riders w*)\nswitch files g to riders r;\nL := 0; j := 0; (*j = index of output file*)\nmerge one run from inputs to w[j];\nIF j < N THEN INC(j) ELSE j := 0 END\nUNTIL all inputs exhausted;\n(*sorted file is with w[0]*)\nEND BalancedMerge.\nHaving associated a rider R with the source file, we now refine the statement for the initial distribution of\nruns. Using the definition of copy, we replace copy one run from R to w[j] by:\nREPEAT Runs.copy(R, w[j]) UNTIL R.eor\nCopying a run terminates when either the first item of the next run is encountered or when the end of the\nentire input file is reached.\nIn the actual sort algorithm, the following statements remain to be specified in more detail:\n1. Position riders w on files g\n2. Merge one run from inputs to wj\n3. Switch files g to riders r\n4. All inputs exhausted\nFirst, we must accurately identify the current input sequences. Notably, the number of active inputs may be\nless than N. Obviously, there can be at most as many sources as there are runs; the sort terminates as soon as\nthere is one single sequence left. This leaves open the possibility that at the initiation of the last sort pass\nthere are fewer than N runs. We therefore introduce a variable, say k1, to denote the actual number of inputs\nused. We incorporate the initialization of k1 in the statement switch files as follows:\nIF L < N THEN k1 := L ELSE k1 := N END ;\nFOR i := 0 TO k1-1 DO Runs.Set(r[i], g[i]) END\nNaturally, statement (2) is to decrement k1 whenever an input source ceases. Hence, predicate (4) may easily\nbe expressed by the relation k1 = 0. Statement (2), however, is more difficult to refine; it consists of the\nrepeated selection of the least key among the available sources and its subsequent transport to the\ndestination, i.e., the current output sequence. The process is further complicated by the necessity of\ndetermining the end of each run. The end of a run may be reached because (1) the subsequent key is less than\nthe current key or (2) the end of the source is reached. In the latter case the source is eliminated by\ndecrementing k1; in the former case the run is closed by excluding the sequence from further selection of\nitems, but only until the creation of the current output run is completed. This makes it obvious that a second\nvariable, say k2, is needed to denote the number of sources actually available for the selection of the next\nitem. This value is initially set equal to k1 and is decremented whenever a run teminates because of condition\nUnfortunately, the introduction of k2 is not sufficient. We need to know not only the number of files, but also\nwhich files are still in actual use. An obvious solution is to use an array with Boolean components indicating\nthe availability of the files. We choose, however, a different method that leads to a more efficient selection\n\nprocedure which, after all, is the most frequently repeated part of the entire algorithm. Instead of using a\nBoolean array, a file index map, say t, is introduced. This map is used so that t0 ... tk2-1 are the indices of the\navailable sequences. Thus statement (2) can be formulated as follows:\nk2 := k1;\nREPEAT select the minimal key, let t[m] be the sequence number on which it occurs;\nRuns.copy(r[t[m]], w[j]);\nIF r[t[m]].eof THEN eliminate sequence\nELSIF r[t[m]].eor THEN close run\nUNTIL k2 = 0\nSince the number of sequences will be fairly small for any practical purpose, the selection algorithm to be\nspecified in further detail in the next refinement step may as well be a straightforward linear search. The\nstatement eliminate sequence implies a decrease of k1 as well as k2 and also a reassignment of indices in the\nmap t. The statement close run merely decrements k2 and rearranges components of t accordingly. The\ndetails are shown in the following procedure, being the last refinement. The statement switch sequences is\nelaborated according to explanations given earlier.\n\nPROCEDURE BalancedMerge(src: Files.File): Files.File;\n\nVAR i, j, m, tx: INTEGER;\nL, k1, k2: INTEGER;\nmin, x: INTEGER;\nt: ARRAY N OF INTEGER; (*index map*)\nR: Runs.Rider; (*source*)\nf, g: ARRAY N OF Files.File;\nr, w: ARRAY N OF Runs.Rider;\nBEGIN Runs.Set(R, src);\nFOR i := 0 TO N-1 DO g[i] := Files.New(\"\"); Files.Set(w[i], g[i], 0) END ;\n(*distribute initial runs from src to g[0] ... g[N-1]*)\nj := 0; L := 0;\nREPEAT Runs.copy(R, w[j]) UNTIL R.eor;\nINC(L); INC(j);\nIF j = N THEN j := 0 END\nUNTIL R.eof;\nFOR i := 0 TO N-1 DO t[i] := i END ;\nFOR i := 0 TO k1-1 DO Runs.Set(r[i], g[i]) END ; (*set input riders*)\nFOR i := 0 TO k1-1 DO g[i] := Files.New(\"\"); Files.Set(w[i], g[i], 0) END ; (*set output riders*)\n(*merge from r[0] ... r[N-1] to w[0] ... w[N-1]*)\nL := 0; (*nof runs merged*)\nj := 0;\nREPEAT (*merge one run from inputs to w[j]*)\nINC(L); k2 := k1;\nREPEAT (*select the minimal key*)\nm := 0; min := r[t[0]].first; i := 1;\nWHILE i < k2 DO\nx := r[t[i]].first;\nIF x < min THEN min := x; m := i END ;\n\nIF r[t[m]].eof THEN (*eliminate this sequence*)\n\nDEC(k1); DEC(k2); t[m] := t[k2]; t[k2] := t[k1]\nELSIF r[t[m]].eor THEN (*close run*)\nDEC(k2); tx := t[m]; t[m] := t[k2]; t[k2] := tx\nUNTIL k2 = 0;\nIF j = N THEN j := 0 END\nUNTIL k1 = 0\nUNTIL L = 1;\nRETURN Files.Base(w[t[0]])\nEND BalancedMerge\n\n2.4.4. Polyphase Sort\n\nWe have now discussed the necessary techniques and have acquired the proper background to investigate and\nprogram yet another sorting algorithm whose performance is superior to the balanced sort. We have seen that\nbalanced merging eliminates the pure copying operations necessary when the distribution and the merging\noperations are united into a single phase. The question arises whether or not the given sequences could be\nprocessed even more efficiently. This is indeed the case; the key to this next improvement lies in abandoning\nthe rigid notion of strict passes, i.e., to use the sequences in a more sophisticated way than by always having\nN/2 sources and as many destinations and exchanging sources and destinations at the end of each distinct\npass. Instead, the notion of a pass becomes diffuse. The method was invented by R.L. Gilstad [2-3] and called\nPolyphase Sort.\nIt is first illustrated by an example using three sequences. At any time, items are merged from two sources\ninto a third sequence variable. Whenever one of the source sequences is exhausted, it immediately becomes\nthe destination of the merge operations of data from the non-exhausted source and the previous destination\nAs we know that n runs on each input are transformed into n runs on the output, we need to list only the\nnumber of runs present on each sequence (instead of specifying actual keys). In Fig. 2.14 we assume that\ninitially the two input sequences f1 and f2 contain 13 and 8 runs, respectively. Thus, in the first pass 8 runs\nare merged from f1 and f2 to f3, in the second pass the remaining 5 runs are merged from f3 and f1 onto f2,\netc. In the end, f1 is the sorted sequence.\n\nf1 f2 f3\n\n13 8\n\n5 0 8\n\n0 5 3\n\n3 2 0\n\n1 0 2\n\n0 1 1\n\n1 0 0\n\nFig. 2.14. Polyphase mergesort of 21 runs with 3 sequences\n\n\nA second example shows the Polyphase method with 6 sequences. Let there initially be 16 runs on f1, 15 on\nf2, 14 on f3, 12 on f4, and 8 on f5. In the first partial pass, 8 runs are merged onto f6; In the end, f2 contains\nthe sorted set of items (see Fig. 2.15).\n\nf1 f2 f3 f4 f5 f6\n\n16 15 14 12 8\n\n8 7 6 4 0 8\n\n4 3 2 0 4 4\n\n2 1 0 2 2 2\n\n1 0 1 1 1 1\n\n0 1 0 0 0 0\n\nFig. 2.15. Polyphase mergesort of 65 runs with 6 sequences\n\nPolyphase is more efficient than balanced merge because, given N sequences, it always operates with an N-1-\nway merge instead of an N/2-way merge. As the number of required passes is approximately logN n, n being\nthe number of items to be sorted and N being the degree of the merge operations, Polyphase promises a\nsignificant improvement over balanced merging.\nOf course, the distribution of initial runs was carefully chosen in the above examples. In order to find out\nwhich initial distributions of runs lead to a proper functioning, we work backward, starting with the final\ndistribution (last line in Fig. 2.15). Rewriting the tables of the two examples and rotating each row by one\nposition with respect to the prior row yields Tables 2.13 and 2.14 for six passes and for three and six\nsequences, respectively.\nL a1(L) a2(L) Sum ai(L)\n0 1 0 1\n1 1 1 2\n2 2 1 3\n3 3 2 5\n4 5 3 8\n5 8 5 13\n6 13 8 21\nTable 2.13 Perfect distribution of runs on two sequences.\nL a1(L) a2(L) a3(L) a4(L) a5(L) Sum ai(L)\n0 1 0 0 0 0 1\n1 1 1 1 1 1 5\n2 2 2 2 2 1 9\n3 4 4 4 3 2 17\n4 8 8 7 6 4 33\n5 16 15 14 12 8 65\nTable 2.14 Perfect distribution of runs on five sequences.\nFrom Table 2.13 we can deduce for L > 0 the relations\na2(L+1) = a1(L)\na1(L+1) = a1(L) + a2(L)\n\nand a1(0) = 1, a2(0) = 0. Defining fi+1 = a1(i), we obtain for i > 0\n\nfi+1 = fi + fi-1, f1 = 1, f0 = 0\nThese are the recursive rules (or recurrence relations) defining the Fibonacci numbers:\nEach Fibonacci number is the sum of its two predecessors. As a consequence, the numbers of initial runs on\nthe two input sequences must be two consecutive Fibonacci numbers in order to make Polyphase work\nproperly with three sequences.\nHow about the second example (Table 2.14) with six sequences? The formation rules are easily derived as\na5(L+1) = a1(L)\na4(L+1) = a1(L) + a5(L) = a1(L) + a1(L-1)\na3(L+1) = a1(L) + a4(L) = a1(L) + a1(L-1) + a1(L-2)\na2(L+1) = a1(L) + a3(L) = a1(L) + a1(L-1) + a1(L-2) + a1(L-3)\na1(L+1) = a1(L) + a2(L) = a1(L) + a1(L-1) + a1(L-2) + a1(L-3) + a1(L-4)\nSubstituting fi for a1(i) yields\nfi+1 = fi + fi-1 + fi-2 + fi-3 + fi-4 for i > 4\nf4 = 1\nfi = 0 for i < 4\nThese numbers are the Fibonacci numbers of order 4. In general, the Fibonacci numbers of order p are\ndefined as follows:\nfi+1(p) = fi(p) + fi-1(p) + ... + fi-p(p) for i > p\nfp(p) = 1\nfi(p) = 0 for 0 < i < p\nNote that the ordinary Fibonacci numbers are those of order 1.\nWe have now seen that the initial numbers of runs for a perfect Polyphase Sort with N sequences are the sums\nof any N-1, N-2, ... , 1 (see Table 2.15) consecutive Fibonacci numbers of order N-2. This apparently implies\nthat this method is only applicable to inputs whose number of runs is the sum of N-1 such Fibonacci sums.\nThe important question thus arises: What is to be done when the number of initial runs is not such an ideal\nsum? The answer is simple (and typical for such situations): we simulate the existence of hypothetical empty\nruns, such that the sum of real and hypothetical runs is a perfect sum. The empty runs are called dummy runs.\nBut this is not really a satisfactory answer because it immediately raises the further and more difficult\nquestion: How do we recognize dummy runs during merging? Before answering this question we must first\ninvestigate the prior problem of initial run distribution and decide upon a rule for the distribution of actual\nand dummy runs onto the N-1 tapes.\n1 2 3 4 5 6 7\n2 3 5 7 9 11 13\n3 5 9 13 17 21 25\n4 8 17 25 33 41 49\n5 13 31 49 65 81 97\n6 21 57 94 129 161 193\n7 34 105 181 253 321 385\n8 55 193 349 497 636 769\n9 89 355 673 977 1261 1531\n10 144 653 1297 1921 2501 3049\n11 233 1201 2500 3777 4961 6073\n12 377 2209 4819 7425 9841 12097\n13 610 4063 9289 14597 19521 24097\n14 987 7473 17905 28697 38721 48001\nTable 2.15 Numbers of runs allowing for perfect distribution.\n\nIn order to find an appropriate rule for distribution, however, we must know how actual and dummy runs are\nmerged. Clearly, the selection of a dummy run from sequence i means precisely that sequence i is ignored\nduring this merge. resulting in a merge from fewer than N-1 sources. Merging of a dummy run from all N-1\nsources implies no actual merge operation, but instead the recording of the resulting dummy run on the output\nsequence. From this we conclude that dummy runs should be distributed to the n-1 sequences as uniformly as\npossible, since we are interested in active merges from as many sources as possible.\nLet us forget dummy runs for a moment and consider the problem of distributing an unknown number of runs\nonto N-1 sequences. It is plain that the Fibonacci numbers of order N-2 specifying the desired numbers of\nruns on each source can be generated while the distribution progresses. Assuming, for example, N = 6 and\nreferring to Table 2.14, we start by distributing runs as indicated by the row with index L = 1 (1, 1, 1, 1, 1); if\nthere are more runs available, we proceed to the second row (2, 2, 2, 2, 1); if the source is still not exhausted,\nthe distribution proceeds according to the third row (4, 4, 4, 3, 2), and so on. We shall call the row index\ndistribution algorithm can now be formulated in a first version as follows:\n1. Let the distribution goal be the Fibonacci numbers of order N-2, level 1.\n2. Distribute according to the set goal.\n3. If the goal is reached, compute the next level of Fibonacci numbers; the difference between them and those\non the former level constitutes the new distribution goal. Return to step 2. If the goal cannot be reached\nbecause the source is exhausted, terminate the distribution process.\nThe rules for calculating the next level of Fibonacci numbers are contained in their definition. We can thus\nconcentrate our attention on step 2, where, with a given goal, the subsequent runs are to be distributed one\nafter the other onto the N-1 output sequences. It is here where the dummy runs have to reappear in our\nLet us assume that when raising the level, we record the next goal by the differences di for i = 1 ... N-1, where\ndi denotes the number of runs to be put onto sequence i in this step. We can now assume that we immediately\nput di dummy runs onto sequence i and then regard the subsequent distribution as the replacement of dummy\nruns by actual runs, each time recording a replacement by subtracting 1 from the count di. Thus, the d i\nindicates the number of dummy runs on sequence i when the source becomes empty.\nIt is not known which algorithm yields the optimal distribution, but the following has proved to be a very\ngood method. It is called horizontal distribution (cf. Knuth, Vol 3. p. 270), a term that can be understood by\nimagining the runs as being piled up in the form of silos, as shown in Fig. 2.16 for N = 6, level 5 (cf. Table\n2.14). In order to reach an equal distribution of remaining dummy runs as quickly as possible, their\nreplacement by actual runs reduces the size of the piles by picking off dummy runs on horizontal levels\nproceeding from left to right. In this way, the runs are distributed onto the sequences as indicated by their\nnumbers as shown in Fig. 2.16.\n\n2 3 4\n5 6 7 8\n9 10 11 12\n13 14 15 16 17\n18 19 20 21 22\n23 24 25 26 27\n28 29 30 31 32\n\nFig. 2.16. Horizontal distribution of runs\n\n\nWe are now in a position to describe the algorithm in the form of a procedure called select, which is activated\neach time a run has been copied and a new source is selected for the next run. We assume the existence of a\nvariable j denoting the index of the current destination sequence. ai and di denote the ideal and dummy\ndistribution numbers for sequence i.\nj, level: INTEGER;\nThese variables are initialized with the following values:\nai = 1, di = 1 for i = 0 ... N-2\naN-1 = 0, dN-1 = 0 dummy\nj = 0, level = 0\nNote that select is to compute the next row of Table 2.14, i.e., the values a1(L) ... aN-1(L) each time that the\nlevel is increased. The next goal, i.e., the differences d i = ai(L) - ai(L-1) are also computed at that time. The\nindicated algorithm relies on the fact that the resulting di decrease with increasing index (descending stair in\nFig. 2.16). Note that the exception is the transition from level 0 to level 1; this algorithm must therefore be\nused starting at level 1. Select ends by decrementing dj by 1; this operation stands for the replacement of a\ndummy run on sequence j by an actual run.\nIF d[j] < d[j+1] THEN INC(j)\nIF d[j] = 0 THEN\nINC(level); z := a[0];\nFOR i := 0 TO N-2 DO\nd[i] := z + a[i+1] - a[i]; a[i] := z + a[i+1]\nj := 0\nEND select\nAssuming the availability of a routine to copy a run from the source src woth rider R onto fj with rider rj, we\ncan formulate the initial distribution phase as follows (assuming that the source contains at least one run):\nREPEAT select; copyrun\nHere, however, we must pause for a moment to recall the effect encountered in distributing runs in the\npreviously discussed natural merge algorithm: The fact that two runs consecutively arriving at the same\ndestination may merge into a single run, causes the assumed numbers of runs to be incorrect. By devising the\nsort algorithm such that its correctness does not depend on the number of runs, this side effect can safely be\nignored. In the Polyphase Sort, however, we are particularly concerned about keeping track of the exact\nnumber of runs on each file. Consequently, we cannot afford to overlook the effect of such a coincidental\nmerge. An additional complication of the distribution algorithm therefore cannot be avoided. It becomes\nnecessary to retain the keys of the last item of the last run on each sequence. Fortunately, our implementation\nof Runs does exactly this. In the case of output sequences, f.first represents the item last written. A next\nattempt to describe the distribution algorithm could therefore be\nREPEAT select;\nIF f[j].first <= f0.first THEN continue old run END ;\n\nThe obvious mistake here lies in forgetting that f[j].first has only obtained a value after copying the first run.\nA correct solution must therefore first distribute one run onto each of the N-1 destination sequences without\ninspection of first. The remaining runs are distributed as follows:\nIF r[j].first <= R.first THEN\nIF R.eof THEN INC(d[j]) ELSE copyrun END\nELSE copyrun\nNow we are finally in a position to tackle the main polyphase merge sort algorithm. Its principal structure is\nsimilar to the main part of the N-way merge program: An outer loop whose body merges runs until the\nsources are exhausted, an inner loop whose body merges a single run from each source, and an innermost\nloop whose body selects the initial key and transmits the involved item to the target file. The principal\ndifferences to balanced merging are the following:\n1. Instead of N, there is only one output sequence in each pass.\n2. Instead of switching N input and N output sequences after each pass, the sequences are rotated. This is\nachieved by using a sequence index map t.\n3. The number of input sequences varies from run to run; at the start of each run, it is determined from the\ncounts d i of dummy runs. If di > 0 for all i, then N-1 dummy runs are pseudo-merged into a single dummy\nrun by merely incrementing the count dN of the output sequence. Otherwise, one run is merged from all\nsources with d i = 0, and di is decremented for all other sequences, indicating that one dummy run was taken\noff. We denote the number of input sequences involved in a merge by k.\n4. It is impossible to derive termination of a phase by the end-of status of the N-1'st sequence, because more\nmerges might be necessary involving dummy runs from that source. Instead, the theoretically necessary\nnumber of runs is determined from the coefficients ai. The coefficients ai were computed during the\ndistribution phase; they can now be recomputed backward.\nThe main part of the Polyphase Sort can now be formulated according to these rules, assuming that all N-1\nsequences with initial runs are set to be read, and that the tape map is initially set to ti = i.\nREPEAT (*merge from t[0] ... t[N-2] to t[N-1]*)\nz := a[N-2]; d[N-1] := 0;\nREPEAT k := 0; (*merge one run*)\n(*determine no. of active input sequences*)\nFOR i := 0 TO N-2 DO\nIF d[i] > 0 THEN DEC(d[i]) ELSE ta[k] := t[i]; INC(k) END\nIF k = 0 THEN INC(d[N-1])\nELSE merge one real run from t[0] ... t[k-1] to t[N-1]\nUNTIL z = 0;\nRuns.Set(r[t[N-1]], f[t[N-1]]);\nrotate sequences in map t; compute a[i] for next level;\nUNTIL level = 0\n(*sorted output is f[t[0]]*)\nThe actual merge operation is almost identical with that of the N-way merge sort, the only difference being\nthat the sequence elimination algorithm is somewhat simpler. The rotation of the sequence index map and the\ncorresponding counts d i (and the down-level recomputation of the coefficients ai) is straightforward and can\nbe inspected in detail from Program 2.16, which represents the Polyphase algorithm in its entirety.\n\nPROCEDURE Polyphase(src: Files.File): Files.File;\n\nVAR i, j, mx, tn: INTEGER;\nk, dn, z, level: INTEGER;\nx, min: INTEGER;\nt, ta: ARRAY N OF INTEGER; (*index maps*)\nR: Runs.Rider; (*source*)\nf: ARRAY N OF Files.File;\nr: ARRAY N OF Runs.Rider;\n\nIF d[j] = 0 THEN\nFOR i := 0 TO N-2 DO\nj := 0\nEND select;\n\nPROCEDURE copyrun; (*from src to f[j]*)\n\nREPEAT Runs.copy(R, r[j]) UNTIL R.eor\nEND copyrun;\n\nBEGIN Runs.Set(R, src);\n\nFOR i := 0 TO N-2 DO\na[i] := 1; d[i] := 1; f[i] := Files.New(\"\"); Files.Set(r[i], f[i], 0)\n(*distribute initial runs*)\nlevel := 1; j := 0; a[N-1] := 0; d[N-1] := 0;\nREPEAT select; copyrun UNTIL R.eof OR (j = N-2);\nselect; (*r[j].first = last item written on f[j]*)\nIF r[j].first <= R.first THEN\nELSE copyrun\n\nFOR i := 0 TO N-2 DO t[i] := i; Runs.Set(r[i], f[i]) END ;\n\nt[N-1] := N-1;\nf[t[N-1]] := Files.New(\"\"); Files.Set(r[t[N-1]], f[t[N-1]], 0);\nFOR i := 0 TO N-2 DO\n\nELSE (*merge one real run from t[0] ... t[k-1] to t[N-1]*)\nREPEAT mx := 0; min := r[ta[0]].first; i := 1;\nWHILE i < k DO\nx := r[ta[i]].first;\nIF x < min THEN min := x; mx := i END ;\nRuns.copy(r[ta[mx]], r[t[N-1]]);\nIF r[ta[mx]].eor THEN ta[mx] := ta[k-1]; DEC(k) END\nUNTIL k = 0\nUNTIL z = 0;\nRuns.Set(r[t[N-1]], f[t[N-1]]); (*rotate sequences*)\ntn := t[N-1]; dn := d[N-1]; z := a[N-2];\nFOR i := N-1 TO 1 BY -1 DO\nt[i] := t[i-1]; d[i] := d[i-1]; a[i] := a[i-1] - z\nt[0] := tn; d[0] := dn; a[0] := z; DEC(level)\nUNTIL level = 0 ;\nRETURN f[t[0]]\nEND Polyphase\n\n2.4.5. Distribution of Initial Runs\n\nWe were led to the sophisticated sequential sorting programs, because the simpler methods operating on\narrays rely on the availability of a random access store sufficiently large to hold the entire set of data to be\nsorted. Often such a store is unavailable; instead, sufficiently large sequential storage devices such as tapes or\ndisks must be used. We know that the sequential sorting methods developed so far need practically no\nprimary store whatsoever, except for the file buffers and, of course, the program itself. However, it is a fact\nthat even small computers include a random access, primary store that is almost always larger than what is\nneeded by the programs developed here. Failing to make optimal use of it cannot be justified.\nThe solution lies in combining array and sequence sorting techniques. In particular, an adapted array sort may\nbe used in the distribution phase of initial runs with the effect that these runs do already have a length L of\napproximately the size of the available primary data store. It is plain that in the subsequent merge passes no\nadditional array sorts could improve the performance because the runs involved are steadily growing in\nlength, and thus they always remain larger than the available main store. As a result, we may fortunately\nconcentrate our attention on improving the algorithm that generates initial runs.\nNaturally, we immediately concentrate our search on the logarithmic array sorting methods. The most\nsuitable of them is the tree sort or Heapsort method (see Sect. 2.2.5). The heap may be regarded as a funnel\nthrough which all items must pass, some quicker and some more slowly. The least key is readily picked off\nthe top of the heap, and its replacement is a very efficient process. The action of funnelling a component from\nthe input sequence src (rider r0) through a full heap H onto an output sequence dest (rider r1) may be\ndescribed simply as follows:\nWrite(r1, H[0]); Read(r0, H[0]); sift(0, n-1)\nSift is the process described in Sect. 2.2.5 for sifting the newly inserted component H0 down into its proper\nplace. Note that H0 is the least item on the heap. An example is shown in Fig. 2.17. The program eventually\nbecomes considerably more complex for the following reasons:\n1. The heap H is initially empty and must first be filled.\n2. Toward the end, the heap is only partially filled, and it ultimately becomes empty.\n3. We must keep track of the beginning of new runs in order to change the output index j at the right time.\n\nf[j] H1= 15 f0\n\n15 10 31 27\n\n18 20\n\n29 33 24 30\n\n\n10 15 27\n\n29 20\n\n31 33 24 30\n\nFig. 2.17. Sifting a key through a heap\n\nBefore proceeding, let us formally declare the variables that are evidently involved in the process:\nsrc, dest: Files.File;\nr, w: Files.Rider;\nM is the size of the heap H. We use the constant mh to denote M/2; L and R are indices delimiting the heap.\nThe funnelling process can then be divided into five distinct parts.\nthe keys is prescribed.\n2. Read another mh keys and put them into the lower half of the heap, sifting each item into its appropriate\nposition (build heap).\n3. Set L to M and repeat the following step for all remaining items on src: Feed H0 to the appropriate output\nsequence. If its key is less or equal to the key of the next item on the input sequence, then this next item\nbelongs to the same run and can be sifted into its proper position. Otherwise, reduce the size of the heap\nand place the new item into a second, upper heap that is built up to contain the next run. We indicate the\nborderline between the two heaps with the index L. Thus, the lower (current) heap consists of the items H0\n... HL-1, the upper (next) heap of HL ... HM-1. If L = 0, then switch the output and reset L to M.\n4. Now the source is exhausted. First, set R to M; then flush the lower part terminating the current run, and at\nthe same time build up the upper part and gradually relocate it into positions HL ... HR-1.\n5. The last run is generated from the remaining items in the heap.\nWe are now in a position to describe the five stages in detail as a complete program, calling a procedure\nswitch whenever the end of a run is detected and some action to alter the index of the output sequence has to\nbe invoked. In Program 2.17 a dummy routine is used instead, and all runs are written onto sequence dest.\nIf we now try to integrate this program with, for instance, Polyphase Sort, we encounter a serious difficulty. It\narises from the following circumstances: The sort program consists in its initial part of a fairly complicated\nroutine for switching between sequence variables, and relies on the availability of a procedure copyrun that\ndelivers exactly one run to the selected destination. The Heapsort program, on the other hand, is a complex\nroutine relying on the availability of a closed procedure select which simply selects a new destination. There\n\nwould be no problem, if in one (or both) of the programs the required procedure would be called at a single\nplace only; but instead, they are called at several places in both programs.\nThis situation is best reflected by the use of a coroutine (thread); it is suitable in those cases in which several\nprocesses coexist. The most typical representative is the combination of a process that produces a stream of\ninformation in distinct entities and a process that consumes this stream. This producer-consumer relationship\ncan be expressed in terms of two coroutines; one of them may well be the main program itself. The coroutine\nmay be considered as a process that contains one or more breakpoints. If such a breakpoint is encountered,\nthen control returns to the program that had activated the coroutine. Whenever the coroutine is called again,\nexecution is resumed at that breakpoint. In our example, we might consider Polyphase Sort as the main\nprogram, calling upon copyrun, which is formulated as a coroutine. It consists of the main body of Program\n2.17 in which each call of switch now represents a breakpoint. The test for end of file would then have to be\nreplaced systematically by a test of whether or not the coroutine had reached its endpoint.\nPROCEDURE Distribute(src: Files.File): Files.File;\nCONST M = 16; mh = M DIV 2; (*heap size*)\ndest: Files.File;\nr, w: Files.Rider;\nVAR i, j, x: INTEGER;\nBEGIN i := L; j := 2*L+1; x := H[i];\nIF (j < R) & (H[j] > H[j+1]) THEN INC(j) END ;\nWHILE (j <= R) & (x > H[j]) DO\nH[i] := H[j]; i := j; j := 2*j+1;\nH[i] := x\nEND sift;\nBEGIN Files.Set(r, src, 0); dest := Files.New(\"\"); Files.Set(w, dest, 0);\n(*step 1: fill upper half of heap*)\nL := M;\nREPEAT DEC(L); Files.ReadInt(r, H[L]) UNTIL L = mh;\n(*step 2: fill lower half of heap*)\nREPEAT DEC(L); Files.ReadInt(r, H[L]); sift(L, M-1) UNTIL L = 0;\n(*step 3: pass elements through heap*)\nL := M; Files.ReadInt(r, x);\nWHILE ~r.eof DO\nFiles.WriteInt(w, H[0]);\nIF H[0] <= x THEN\n(*x belongs to same run*) H[0] := x; sift(0, L-1)\nELSE (*start next run*)\nDEC(L); H[0] := H[L]; sift(0, L-1); H[L] := x;\nIF L < mh THEN sift(L, M-1) END ;\nIF L = 0 THEN (*heap full; start new run*) L := M END\nFiles.ReadInt(r, x)\n(*step 4: flush lower half of heap*)\nR := M;\nREPEAT DEC(L); Files.WriteInt(w, H[0]);\nH[0] := H[L]; sift(0, L-1); DEC(R); H[L] := H[R];\nIF L < mh THEN sift(L, R-1) END\nUNTIL L = 0;\n\n(*step 5: flush upper half of heap, start new run*)\n\nFiles.WriteInt(w, H[0]); H[0] := H[R]; DEC(R); sift(0, R)\nEND Distribute\n\nAnalysis and conclusions. What performance can be expected from a Polyphase Sort with initial distribution\nof runs by a Heapsort? We first discuss the improvement to be expected by introducing the heap.\nIn a sequence with randomly distributed keys the expected average length of runs is 2. What is this length\nafter the sequence has been funnelled through a heap of size m ? One is inclined to say m, but, fortunately,\nthe actual result of probabilistic analysis is much better, namely 2m (see Knuth, vol. 3, p. 254). Therefore, the\nexpected improvement factor is m.\nAn estimate of the performance of Polyphase can be gathered from Table 2.15, indicating the maximal\nnumber of initial runs that can be sorted in a given number of partial passes (levels) with a given number N of\nsequences. As an example, with six sequences and a heap of size m = 100, a file with up to 165’680’100\ninitial runs can be sorted within 10 partial passes. This is a remarkable performance.\nReviewing again the combination of Polyphase Sort and Heapsort, one cannot help but be amazed at the\ncomplexity of this program. After all, it performs the same easily defined task of permuting a set of items as\nis done by any of the short programs based on the straight array sorting principles. The moral of the entire\nchapter may be taken as an exhibition of the following:\n1. The intimate connection between algorithm and underlying data structure, and in particular the influence of\nthe latter on the former.\n2. The sophistication by which the performance of a program can be improved, even when the available\nstructure for its data (sequence instead of array) is rather ill-suited for the task.\n\n2.1. Which of the algorithms given for straight insertion, binary insertion, straight selection, bubble sort,\nshakersort, shellsort, heapsort, quicksort, and straight mergesort are stable sorting methods?\n2.2. Would the algorithm for binary insertion still work correctly if L < R were replaced by L < R in the\nwhile clause? Would it still be correct if the statement L := m+1 were simplified to L := m? If not,\nfind sets of values a1 ... an upon which the altered program would fail.\n2.3. Program and measure the execution time of the three straight sorting methods on your computer, and\nfind coefficients by which the factors C and M have to be multiplied to yield real time estimates.\n2.4. Specifty invariants for the repetitions in the three straight sorting algorithms.\n2.5. Consider the following \"obvious\" version of the procedure Partition and find sets of values a0 ... an-1\nfor which this version fails:\ni := 0; j := n-1; x := a[n DIV 2];\nUNTIL i > j\n2.6. Write a procedure that combines the Quicksort and Bubblesort algorithms as follows: Use Quicksort\nto obtain (unsorted) partitions of length m (1 < m < n); then use Bubblesort to complete the task. Note\nthat the latter may sweep over the entire array of n elements, hence, minimizing the bookkeeping\neffort. Find that value of m which minimizes the total sort time. Note: Clearly, the optimum value of\nm will be quite small. It may therefore pay to let the Bubblesort sweep exactly m-1 times over the\narray instead of including a last pass establishing the fact that no further exchange is necessary.\n\n2.7. Perform the same experiment as in Exercise 2.6 with a straight selection sort instead of a Bubblesort.\nNaturally, the selection sort cannot sweep over the whole array; therefore, the expected amount of\nindex handling is somewhat greater.\n2.8. Write a recursive Quicksort algorithm according to the recipe that the sorting of the shorter partition\nshould be tackled before the sorting of the longer partition. Perform the former task by an iterative\nstatement, the latter by a recursive call. (Hence, your sort procedure will contain only one recursive\ncall instead of two.\n2.9. Find a permutation of the keys 1, 2, ... , n for which Quicksort displays its worst (best) behavior (n =\n5, 6, 8).\n2.10. Construct a natural merge program similar to the straight merge, operating on a double length array\nfrom both ends inward; compare its performance with that of the procedure given in this text.\n2.11. Note that in a (two-way) natural merge we do not blindly select the least value among the available\nkeys. Instead, upon encountering the end of a run, the tail of the other run is simply copied onto the\noutput sequence. For example, merging of\n2, 4, 5, 1, 2, ...\n3, 6, 8, 9, 7, ...\nresults in the sequence\n2, 3, 4, 5, 6, 8, 9, 1, 2, ...\ninstead of\n2, 3, 4, 5, 1, 2, 6, 8, 9, ...\nwhich seems to be better ordered. What is the reason for this strategy?\n2.12. A sorting method similar to the Polyphase is the so-called Cascade merge sort [2.1 and 2.9]. It uses a\ndifferent merge pattern. Given, for instance, six sequences T1, ... ,T6, the cascade merge, also starting\nwith a \"perfect distribution\" of runs on T1 ... T5, performs a five-way merge from T1 ... T5 onto T6\nuntil T5 is empty, then (without involving T6) a four-way merge onto T5, then a three-way merge\nonto T4, a two-way merge onto T3, and finally a copy operation from T1 onto T2. The next pass\noperates in the same way starting with a five-way merge to T1, and so on. Although this scheme\nseems to be inferior to Polyphase because at times it chooses to leave some sequences idle, and\nbecause it involves simple copy operations, it surprisingly is superior to Polyphase for (very) large\nfiles and for six or more sequences. Write a well structured program for the Cascade merge principle.\n\n2-1. B. K. Betz and Carter. Proc. ACM National Conf. 14, (1959), Paper 14.\n2-2. R.W. Floyd. Treesort (Algorithms 113 and 243). Comm. ACM, 5, No. 8, (1962), 434, and Comm.\nACM, 7, No. 12 (1964), 701.\n2-3. R.L. Gilstad. Polyphase Merge Sorting - An Advanced Technique. Proc. AFIPS Eastern Jt. Comp.\nConf., 18, (1960), 143-48.\n2-4. C.A.R. Hoare. Proof of a Program: FIND. Comm. ACM,13, No. 1, (1970), 39-45.\n2-5. -------- Proof of a Recursive Program: Quicksort. Comp. J., 14, No. 4 (1971), 391-95.\n2-6. -------- Quicksort. Comp.J., 5. No.1 (1962), 10-15.\n2-7. D.E. Knuth. The Art of Computer Programming. Vol. 3 (Reading, Mass.: Addison- Wesley, 1973).\n2-8. -------- The Art of Computer Programming. Vol 3, pp. 86-95.\n2-9. -------- The Art of Computer Programming. Vol 3, p. 289.\n2-10. H. Lorin. A Guided Bibliography to Sorting. IBM Syst.J., 10, No. 3 (1971), 244-54.\n\n2-11. D.L. Shell. A Highspeed Sorting Procedure. Comm. ACM, 2, No. 7 (1959), 30-32.\n2-12. R.C. Singleton. An Efficient Algorithm for Sorting with Minimal Storage (Algorithm 347). Comm.\nACM, 12, No. 3 (1969), 185.\n2-13. M. H. Van Emden. Increasing the Efficiency of Quicksort (Algorithm 402). Comm. ACM, 13, No. 9\n(1970), 563-66, 693.\n2-14. J.W.J. Williams. Heapsort (Algorithm 232) Comm. ACM, 7, No. 6 (1964), 347-48.\n\n3 Recursive Algorithms\n3.1. Introduction\nAn object is said to be recursive, if it partially consists or is defined in terms of itself. Recursion is\nencountered not only in mathematics, but also in daily life. Who has never seen an advertising picture\nwhich contains itself?\nRecursion is a particularly powerful technique in mathematical definitions. A few familiar examples are\nthose of natural numbers, tree structures, and of certain functions:\n1. Natural numbers:\n(a) 0 is a natural number.\n(b) the successor of a natural number is a natural number.\n2. Tree structures\n(a) O is a tree (called the empty tree).\n(b) If t1 and t2 are trees, then the structures consisting of a node with two descendants t1 and t2 is\nalso a (binary) tree.\n3. The factorial function f(n):\nf(0) = 1\nf(n) = n × f(n - 1) for n > 0\nprogram, even if this program contains no explicit repetitions. Recursive algorithms, however, are\nprimarily appropriate when the problem to be solved, or the function to be computed, or the data\nstructure to be processed are already defined in recursive terms. In general, a recursive program P can be\nexpressed as a composition P of a sequence of statements S (not containing P) and P itself.\nP ≡ P[S, P]\nThe necessary and sufficient tool for expressing programs recursively is the procedure or subroutine, for\nit allows a statement to be given a name by which this statement may be invoked. If a procedure P\ncontains an explicit reference to itself, then it is said to be directly recursive; if P contains a reference to\nanother procedure Q, which contains a (direct or indirect) reference to P, then P is said to be indirectly\nrecursive. The use of recursion may therefore not be immediately apparent from the program text.\nIt is common to associate a set of local objects with a procedure, i.e., a set of variables, constants, types,\nand procedures which are defined locally to this procedure and have no existence or meaning outside this\nprocedure. Each time such a procedure is activated recursively, a new set of local, bound variables is\ncreated. Although they have the same names as their corresponding elements in the set local to the\nprevious instance of the procedure, their values are distinct, and any conflict in naming is avoided by the\nrules of scope of identifiers: the identifiers always refer to the most recently created set of variables. The\nsame rule holds for procedure parameters, which by definition are bound to the procedure.\nLike repetitive statements, recursive procedures introduce the possibility of non- terminating\ncomputations, and thereby also the necessity of considering the problem of termination. A fundamental\nrequirement is evidently that the recursive calls of P are subjected to a condition B, which at some time\nbecomes false. The scheme for recursive algorithms may therefore be expressed more precisely by either\none of the following forms:\nFor repetitions, the basic technique of demonstrating termination consists of\n1. defining a function f(x) (x shall be the set of variables), such that f(x) < 0 implies the terminating\ncondition (of the while or repeat clause), and\n\n2. proving that f(x) decreases during each repetition step. f is called the variant of the repetition.\nIn the same manner, termination of a recursion can be proved by showing that each execution of P\ndecreases some f(x), and that f(x) < 0 implies ~B. A particularly evident way to ensure termination is to\nassociate a (value) parameter, say n, with P, and to recursively call P with n-1 as parameter value.\nSubstituting n > 0 for B then guarantees termination. This may be expressed by the following program\nP(n) ≡ IF n > 0 THEN P[S, P(n-1)] END\nP(n) ≡ P[S, IF n > 0 THEN P(n-1) END]\nIn practical applications it is mandatory to show that the ultimate depth of recursion is not only finite, but\nthat it is actually quite small. The reason is that upon each recursive activation of a procedure P some\namount of storage is required to accommodate its variables. In addition to these local variables, the\ncurrent state of the computation must be recorded in order to be retrievable when the new activation of P\nis terminated and the old one has to be resumed. We have already encountered this situation in the\ndevelopment of the procedure Quicksort in Chap. 2. It was discovered that by naively composing the\nprogram out of a statement that splits the n items into two partitions and of two recursive calls sorting the\ntwo partitions, the depth of recursion may in the worst case approach n. By a clever reassessment of the\nsituation, it was possible to limit the depth to log(n). The difference between n and log(n) is sufficient to\nconvert a case highly inappropriate for recursion into one in which recursion is perfectly practical.\n\n3.2. When Not To Use Recursion\n\nare defined in recursive terms. This does not mean, however, that such recursive definitions guarantee\nthat a recursive algorithm is the best way to solve the problem. In fact, the explanation of the concept of\nrecursive algorithm by such inappropriate examples has been a chief cause of creating widespread\napprehension and antipathy toward the use of recursion in programming, and of equating recursion with\nPrograms in which the use of algorithmic recursion is to be avoided can be characterized by a schema\nwhich exhibits the pattern of their composition. The equivalent schemata are shown below. Their\ncharacteristic is that there is only a single call of P either at the end (or the beginning) of the composition.\nThese schemata are natural in those cases in which values are to be computed that are defined in terms of\nsimple recurrence relations. Let us look at the well-known example of the factorial numbers fi = i! :\ni = 0, 1, 2, 3, 4, 5, ...\nfi = 1, 1, 2, 6, 24, 120, ...\nThe first number is explicitly defined as f0 = 1, whereas the subsequent numbers are defined recursively\nin terms of their predecessor:\nfi+1 = (i+1) * fi\nThis recurrence relation suggests a recursive algorithm to compute the n th factorial number. If we\ncomputation necessary to proceed to the next numbers in the sequences (3.8) to be\nI := I + 1; F := I * F\nand, substituting these two statements for S, we obtain the recursive program\nP ≡ IF I < n THEN I := I + 1; F := I * F; P END\nI := 0; F := 1; P\nThe first line is expressed in terms of our conventional programming notation as\n\nA more frequently used, but essentially equivalent, form is the one given below. P is replaced by a\nfunction procedure F, i.e., a procedure with which a resulting value is explicitly associated, and which\ntherefore may be used directly as a constituent of expressions. The variable F therefore becomes\nsuperfluous; and the role of I is taken over by the explicit procedure parameter.\nIt now is plain that in this example recursion can be replaced quite simply by iteration. This is expressed\nby the program\nI := 0; F := 1;\nWHILE I < n DO I := I + 1; F := I*F END\nIn general, programs corresponding to the original schemata should be transcribed into one according to\nthe following schema:\nP ≡ [x := x0; WHILE B DO S END]\nThere also exist more complicated recursive composition schemes that can and should be translated into\nan iterative form. An example is the computation of the Fibonacci numbers which are defined by the\nrecurrence relation\nfibn+1 = fibn + fibn-1 for n > 0\nand fib1 = 1, fib0 = 0. A direct, naive transcription leads to the recursive program\nELSE RETURN Fib(n-1) + Fib(n-2)\nComputation of fib n by a call Fib(n) causes this function procedure to be activated recursively. How\noften? We notice that each call with n > 1 leads to 2 further calls, i.e., the total number of calls grows\nexponentially (see Fig. 3.2). Such a program is clearly impractical.\nBut fortunately the Fibonacci numbers can be computed by an iterative scheme that avoids the\nrecomputation of the same values by use of auxiliary variables such that x = fib i and y = fib i-1.\ni := 1; x := 1; y := 0;\nWHILE i < n DO z := x; x := x + y; y := z; i := i + 1 END\nNote: The assignments to x, y, z may be expressed by two assignments only without a need for the\nauxiliary variable z: x := x + y; y := x - y.\n\n4 3\n\n3 2 2 1\n\n2 1 1 0 1 0\n\n1 0\n\nFig. 3.2. The 15 activations of Fib(5)\n\nThus, the lesson to be drawn is to avoid the use of recursion when there is an obvious solution by\niteration. This, however, should not lead to shying away from recursion at any price. There are many\ngood applications of recursion, as the following paragraphs and chapters will demonstrate. The fact that\nimplementions of recursive procedures on essentially non-recursive machines exist proves that for\npractical purposes every recursive program can be transformed into a purely iterative one. This, however,\ninvolves the explicit handling of a recursion stack, and these operations will often obscure the essence of\na program to such an extent that it becomes most difficult to comprehend. The lesson is that algorithms\nwhich by their nature are recursive rather than iterative should be formulated as recursive procedures. In\norder to appreciate this point, the reader is referred to the algorithms for QuickSort and\nNonRecursiveQuicksort in Sect. 2.3.3 for a comparison.\nThe remaining part of this chapter is devoted to the development of some recursive programs in\nsituations in which recursion is justifiably appropriate. Also Chap. 4 makes extensive use of recursion in\ncases in which the underlying data structures let the choice of recursive solutions appear obvious and\n\n3.3. Two Examples of Recursive Programs\n\nThe attractive graphic pattern shown in Fig. 3.5 consists of the superposition of five curves. These curves\nfollow a regular pattern and suggest that they might be drawn by a display or a plotter under control of a\ncomputer. Our goal is to discover the recursion schema, according to which the drawing program might\nbe constructed. Inspection reveals that three of the superimposed curves have the shapes shown in Fig.\n3.3; we denote them by H1, H2, and H3. The figures show that Hi+1 is obtained by the composition of four\ninstances of Hi of half size and appropriate rotation, and by tying together the four H i by three connecting\nlines. Notice that H1 may be considered as consisting of four instances of an empty H0 connected by three\nstraight lines. Hi is called the Hilbert curve of order i after its inventor, the mathematician D. Hilbert\n\nH1 H2 H3\n\nFig. 3.3. Hilbert curves of order 1, 2, and 3\n\nSince each curve Hi consists of four half-sized copies of Hi-1, we express the procedure for drawing Hi as\na composition of four calls for drawing Hi-1 in half size and appropriate rotation. For the purpose of\nillustration we denote the four parts by A, B, C, and D, and the routines drawing the interconnecting lines\n\nby arrows pointing in the corresponding direction. Then the following recursion scheme emerges (see\nFig. 3.3).\nA: D ←A ↓ A → B\nB: C ↑ B →B ↓ A\nC: B →C ↑ C← D\nD: A ↓ D ←D ↑ C\nLet us assume that for drawing line segments we have at our disposal a procedure line which moves a\ndrawing pen in a given direction by a given distance. For our convenience, we assume that the direction\nbe indicated by an integer parameter i as 45×i degrees. If the length of the unit line is denoted by u, the\nprocedure corresponding to the scheme A is readily expressed by using recursive activations of\nanalogously designed procedures B and D and of itself.\nIF i > 0 THEN\nD(i-1); line(4, u);\nA(i-1); line(6, u);\nA(i-1); line(0, u);\nThis procedure is initiated by the main program once for every Hilbert curve to be superimposed. The\nmain procedure determines the initial point of the curve, i.e., the initial coordinates of the pen denoted by\nPx and Py, and the unit increment u. The square in which the curves are drawn is placed into the middle\nof the page with given width and height. These parameters as well as the drawing procedure line are\ntaken from a module Draw. Note that this module retains the current position of the pen. Procedure\nHilbert draws the n Hilbert curves H1 ... Hn.\nCONST width = 1024; height = 800;\nPROCEDURE Clear; (*clear drawing plane*)\nPROCEDURE line(dir, len: INTEGER);\n(*draw line of length len in direction of dir*45 degrees; move pen accordingly*)\nEND Draw.\nProcedure Hilbert uses the four auxiliary procedures A, B, C, and D recursively:\nIF i > 0 THEN\nD(i-1); Draw.line(4,u); A(i-1); Draw.line(6,u); A(i-1); Draw.line(0,u); B(i-1)\nIF i > 0 THEN\nC(i-1); Draw.line(2,u); B(i-1); Draw.line(0,u); B(i-1); Draw.line(6,u); A(i-1)\nIF i > 0 THEN\nB(i-1); Draw.line(0,u); C(i-1); Draw.line(2,u); C(i-1); Draw.line(4,u); D(i-1)\n\nIF i > 0 THEN\nA(i-1); Draw.line(6,u); D(i-1); Draw.line(4,u); D(i-1); Draw.line(2,u); C(i-1)\nCONST SquareSize = 512;\nVAR i, x0, y0, u: INTEGER;\nBEGIN Draw.Clear;\nx0 := Draw.width DIV 2; y0 := Draw.height DIV 2;\nu := SquareSize; i := 0;\nREPEAT INC(i); u := u DIV 2;\nx0 := x0 + (u DIV 2); y0 := y0 + (u DIV 2); Draw.Set(x0, y0); A(i)\nUNTIL i = n\nEND Hilbert.\n\nFig. 3.5. Hilbert curves H1 … H5\n\nA similar but slightly more complex and aesthetically more sophisticated example is shown in Fig. 3.7.\nThis pattern is again obtained by superimposing several curves, two of which are shown in Fig. 3.6. S i is\ncalled the Sierpinski curve of order i. What is its recursion scheme? One is tempted to single out the leaf\nS 1 as a basic building block, possibly with one edge left off. But this does not lead to a solution. The\nprincipal difference between Sierpinski curves and Hilbert curves is that Sierpinski curves are closed\n(without crossovers). This implies that the basic recursion scheme must be an open curve and that the\nfour parts are connected by links not belonging to the recusion pattern itself. Indeed, these links consist\nof the four straight lines in the outermost four corners, drawn with thicker lines in Fig. 3.6. They may be\nregarded as belonging to a non-empty initial curve S0, which is a square standing on one corner. Now the\nrecursion schema is readily established. The four constituent patterns are again denoted by A, B, C, and\nD, and the connecting lines are drawn explicitly. Notice that the four recursion patterns are indeed\nidentical except for 90 degree rotations.\n\nS1 S2\n\nFig. 3.6. Sierpinski curves S1 and S2\n\nThe base pattern of the Sierpinski curves is\n\nS: A \u0001 B \u0002 C \u0003D\u0004\nand the recursion patterns are (horizontal and vertical arrows denote lines of double length.)\nA: A \u0001 B →D \u0004 A\nB: B \u0002 C ↓ A \u0001 B\nC: C \u0003 D ←B \u0002 C\nD: D \u0004 A ↑ C \u0003 D\nIf we use the same primitives for drawing as in the Hilbert curve example, the above recursion scheme is\nIF k > 0 THEN\nA(k-1); line(7, h); B(k-1); line(0, 2*h);\nD(k-1); line(1, h); A(k-1)\nThis procedure is derived from the first line of the recursion scheme. Procedures corresponding to the\npatterns B, C, and D are derived analogously. The main program is composed according to the base\npattern. Its task is to set the initial values for the drawing coordinates and to determine the unit line\nlength h according to the size of the plane. The result of executing this program with n = 4 is shown in\nFig. 3.7.\nThe elegance of the use of recursion in these exampes is obvious and convincing. The correctness of the\nprograms can readily be deduced from their structure and composition patterns. Moreover, the use of an\nexplicit (decreasing) level parameter guarantees termination since the depth of recursion cannot become\ngreater than n. In contrast to this recursive formulation, equivalent programs that avoid the explicit use of\nrecursion are extremely cumbersome and obscure. Trying to understand the programs shown in [3-3]\nshould easily convince the reader of this.\nIF k > 0 THEN\nA(k-1); Draw.line(7, h); B(k-1); Draw.line(0, 2*h); D(k-1); Draw.line(1, h); A(k-1)\nIF k > 0 THEN\nB(k-1); Draw.line(5, h); C(k-1); Draw.line(6, 2*h); A(k-1); Draw.line(7, h); B(k-1)\nIF k > 0 THEN\nC(k-1); Draw.line(3, h); D(k-1); Draw.line(4, 2*h); B(k-1); Draw.line(5, h); C(k-1)\nIF k > 0 THEN\nD(k-1); Draw.line(1, h); A(k-1); Draw.line(2, 2*h); C(k-1); Draw.line(3, h); D(k-1)\n\n\nCONST SquareSize = 512;\nVAR i, h, x0, y0:INTEGER;\nBEGIN Draw.Clear; i := 0; h := SquareSize DIV 4;\nx0 := width DIV 2; y0 := height DIV 2 + h;\nREPEAT INC(i); x0 := x0-h;\nh := h DIV 2; y0 := y0+h; Draw.Set(x0, y0);\nA(i); Draw.line(7,h); B(i); Draw.line(5,h);\nC(i); Draw.line(3,h); D(i); Draw.line(1,h)\nUNTIL i = n\nEND Sierpinski.\n\nFig. 3.7. Sierpinski curves S1 … S4\n\n3.4. Backtracking Algorithms\n\nA particularly intriguing programming endeavor is the subject of so-called general problem solving. The\ntask is to determine algorithms for finding solutions to specific problems not by following a fixed rule of\ncomputation, but by trial and error. The common pattern is to decompose the trial-and-error process onto\npartial tasks. Often these tasks are most naturally expressed in recursive terms and consist of the\nexploration of a finite number of subtasks. We may generally view the entire process as a trial or search\nprocess that gradually builds up and scans (prunes) a tree of subtasks. In many problems this search tree\ngrows very rapidly, often exponentially, depending on a given parameter. The search effort increases\naccordingly. Frequently, the search tree can be pruned by the use of heuristics only, thereby reducing\ncomputation to tolerable bounds.\nIt is not our aim to discuss general heuristic rules in this text. Rather, the general principle of breaking up\nsuch problem-solving tasks into subtasks and the application of recursion is to be the subject of this\nchapter. We start out by demonstrating the underlying technique by using an example, namely, the well\nknown knight's tour.\nGiven is a n×n board with n2 fields. A knight -- being allowed to move according to the rules of chess --\nis placed on the field with initial coordinates x0, y0. The problem is to find a covering of the entire\nboard, if there exists one, i.e. to compute a tour of n2-1 moves such that every field of the board is visited\nexactly once.\nThe obvious way to reduce the problem of covering n2 fields is to consider the problem of either\nperforming a next move or finding out that none is possible. Let us therefore define an algorithm trying\nto perform a next move. A first approach is the following:.\nBEGIN initialize selection of moves;\nREPEAT select next candidate from list of next moves;\nIF acceptable THEN\nrecord move;\nIF board not full THEN\nIF not successful THEN erase previous recording END\nUNTIL (move was successful) OR (no more candidates)\nEND TryNextMove\nrepresentation. An obvious step is to represent the board by a matrix, say h. Let us also introduce a type\nto denote index values:\n\n\nThe decision to represent each field of the board by an integer instead of a Boolean value denoting\noccupation is because we wish to keep track of the history of successive board occupations. The\nfollowing convention is an obvious choice:\nh[x, y] = 0: field has not been visited\nh[x, y] = i: field has been visited in the i th move (0 ≤ i < n2)\nThe next decision concerns the choice of appropriate parameters. They are to determine the starting\nconditions for the next move and also to report on its success. The former task is adequately solved by\nspecifying the coordinates x,y from which the move is to be made, and by specifying the number i of the\nmove (for recording purposes). The latter task requires a Boolean result parameter with the meaning the\nmove was successful.\nWhich statements can now be refined on the basis of these decisions? Certainly board not full can be\nexpressed as i < n2. Moreover, if we introduce two local variables u and v to stand for the coordinates of\npossible move destinations determined according to the jump pattern of knights, then the predicate\nacceptable can be expressed as the logical conjunction of the conditions that the new field lies on the\nboard, i.e. 0 ≤ u < n and 0 ≤ v < n, and that it had not been visited previously, i.e., huv = 0.\nThe operation of recording the legal move is expressed by the assignment huv := i, and the cancellation\nof this recording as huv := 0. If a local variable q1 is introduced and used as the result parameter in the\nrecursive call of this algorithm, then q1 may be substituted for move was successful. Thereby we arrive at\nthe following formulation:\nPROCEDURE Try(i: INTEGER; x, y: index; VAR q: BOOLEAN);\nBEGIN initialize selection of moves;\nREPEAT let be the coordinates of the next move\nas defined by the rules of chess;\nIF (0 <= u) & (u < n) & (0 <= v) & (v < n) & (h[u,v] = 0) THEN\nh[u,v] := i;\nIF i < n*n THEN Try(i+1, u, v, q1);\nIF ~q1 THEN h[u,v] := 0 ELSE q1 := TRUE END\nUNTIL q1 OR no more candidates;\nq := q1\nJust one more refinement step will lead us to a program expressed fully in terms of our basic\nprogramming notation. We should note that so far the program was developed completely independently\nof the laws governing the jumps of the knight. This delaying of considerations of particularities of the\nproblem was quite deliberate. But now is the time to take them into account.\nGiven a starting coordinate pair x,y there are eight potential candidates u,v of the destination. They are\nnumbered 1 to 8 in Fig. 3.8. A simple method of obtaining u,v from x,y is by addition of the coordinate\ndifferences stored in either an array of difference pairs or in two arrays of single differences. Let these\narrays be denoted by dx and dy, appropriately initialized. Then an index k may be used to number the\nnext candidate. The details are shown in Program 3.3. The recursive procedure is initiated by a call with\nthe coordinates x0, y0 of that field as parameters from which the tour is to start. This field must be given\nthe value 1; all others are to be marked free.\ndx = (2, 1, -1, -2, -2, -1, 1, 2)\ndy = (1, 2, 2, 1, -1, -2, -2, -1)\nh[x0, y0] := 1; try(2, x0, y0, q)\n\n3 2\n\n4 1\n\n5 8\n\n6 7\n\nFig. 3.8. The 8 possible moves of a knight\n\nOne further detail must not be overlooked: A variable huv does exist only if both u and v lie within the\nindex range 0 ... n-1. Consequently, the Boolean expression, substituted for acceptable in the general\nschema, is valid only if its first four constituent terms are true. It is therefore relevant that the term huv =\n0 appears last. We assume a global n×n matrix h representing the result, the constant n (and nsqr = n2),\nand arrays dx and dy representig the possible moves of a knight (see Fig. 3.8):\nVAR k, u, v: INTEGER; q1: BOOLEAN;\nBEGIN k := 0;\nREPEAT k := k+1; q1 := FALSE;\nu := x + dx[k]; v := y + dy[k];\nh[u,v] := i;\nIF i < Nsqr THEN Try(i+1, u, v, q1);\nIF ~q1 THEN h[u,v] := 0 END\nUNTIL q1 OR (k = 8);\nq := q1\nEND Try;\nFOR i := 0 TO n-1 DO\nFOR j := 0 TO n-1 DO h[i,j] := 0 END\nEND Clear;\nPROCEDURE KnightsTour(i, j: INTEGER; VAR done: BOOLEAN);\nBEGIN Clear; h[i, j] := 1; Try(2, i, j, done);\nEND KnightsTour.\nTable 3.1 indicates solutions obtained with initial positions <3,3>, <2,4> for n = 5 and <1,1> for n = 6.\n23 10 15 4 25 23 4 9 14 25\n16 5 24 9 14 10 15 24 1 8\n11 22 1 18 3 5 22 3 18 13\n6 17 20 13 8 16 11 20 7 2\n21 12 7 2 19 21 6 17 12 19\n\n1 16 7 26 11 14\n34 25 12 15 6 27\n17 2 33 8 13 10\n\n32 35 24 21 28 5\n23 18 3 30 9 20\n36 31 22 19 4 29\nTable 3.1 Three Knights' Tours.\n\nWhat abstractions can now be made from this example? Which pattern does it exhibit that is typical for\nthis kind of problem-solving algorithms? What does it teach us? The characteristic feature is that steps\ntoward the total solution are attempted and recorded that may later be taken back and erased in the\nrecordings when it is discovered that the step does not possibly lead to the total solution, that the step\nleads into a dead-end street. This action is called backtracking. The general pattern below is derived from\nTryNextMove, assuming that the number of potential candidates in each step is finite.\nBEGIN intialize selection of candidates;\nREPEAT select next;\nIF acceptable THEN\nrecord it;\nIF solution incomplete THEN Try;\nIF not successful THEN cancel recording END\nUNTIL successful OR no more candidates\nActual programs may, of course, assume various derivative forms of this schema. A frequently\nencountered pattern uses an explicit level parameter indicating the depth of recursion and allowing for a\nsimple termination condition. If, moreover, at each step the number of candidates to be investigated is\nfixed, say m, then the derived schema shown below applies; it is to be invoked by the statement Try(1).\nBEGIN k := 0;\nREPEAT k := k+1; select k-th candidate;\nIF acceptable THEN\nrecord it;\nIF i < n THEN Try(i+1);\nIF not successful THEN cancel recording END\nUNTIL successful OR (k = m)\nThe remainder of this chapter is devoted to the treatment of three more examples. They display various\nincarnations of the abstract schema and are included as further illustrations of the appropriate use of\n\n3.5. The Eight Queens Problem\n\nThe problem of the eight queens is a well-known example of the use of trial-and-error methods and of\nbacktracking algorithms. It was investigated by C .F. Gauss in 1850, but he did not completely solve it.\nThis should not surprise anyone. After all, the characteristic property of these problems is that they defy\nanalytic solution. Instead, they require large amounts of exacting labor, patience, and accuracy. Such\nalgorithms have therefore gained relevance almost exclusively through the automatic computer, which\npossesses these properties to a much higher degree than people, and even geniuses, do.\nThe eight queens poblem is stated as follows (see also [3-4]): Eight queens are to be placed on a chess\nboard in such a way that no queen checks against any other queen. Using the last schema of Sect. 3.4 as a\ntemplate, we readily obtain the following crude version of a solution:\n\n\ninitialize selection of positions for i-th queen:\nREPEAT make next selection;\nIF safe THEN SetQueen;\nIF i < 8 THEN Try(i+1);\nIF not successful THEN RemoveQueen END\nUNTIL successful OR no more positions\nIn order to proceed, it is necessary to make some commitments concerning the data representation. Since\nwe know from the rules of chess that a queen checks all other figures lying in either the same column,\nrow, or diagonal on the board, we infer that each column may contain one and only one queen, and that\nthe choice of a position for the i th queen may be restricted to the i th column. The parameter i therefore\nbecomes the column index, and the selection process for positions ranges over the eight possible values\nfor a row index j.\nThere remains the question of representing the eight queens on the board. An obvious choice would\nagain be a square matrix to represent the board, but a little inspection reveals that such a representation\nwould lead to fairly cumbersome operations for checking the availability of positions. This is highly\nundesirable since it is the most frequently executed operation. We should therefore choose a data\nrepresentation which makes checking as simple as possible. The best recipe is to represent as directly as\npossible that information which is truly relevant and most often used. In our case this is not the position\nof the queens, but whether or not a queen has already been placed along each row and diagonals. (We\nalready know that exactly one is placed in each column k for 0 ≤ k < i). This leads to the following\nchoice of variables:\nxi denotes the position of the queen in the i th column;\naj means \"no queen lies in the j th row\";\nb k means \"no queen occupies the k th /-diagonal;\nck means \"no queen sits on the k th \\-diagonal.\nWe note that in a /-diagonal all fields have the same sums of their coordinates i and j, and that in a \\-\ndiagonal the coordinate differences i-j are constant. The appropriate solution is shown in the following\nprogram Queens. Given these data, the statement SetQueen is elaborated to\nx[i] := j; a[j] := FALSE; b[i+j] := FALSE; c[i-j+7] := FALSE\nthe statement RemoveQueen is refined into\na[j] := TRUE; b[i+j] := TRUE; c[i-j+7] := TRUE\nand the condition safe is fulfilled if the field lies in in a row and in diagonals which are still free.\nHence, it can be expressed by the logical expression\na[j] & b[i+j] & c[i-j+7]\nThis completes the development of this algorithm, that is shown in full as Program 3.4. The computed\nsolution is x = (1, 5, 8, 6, 3, 7, 2, 4) and is shown in Fig. 3.9.\n\n0 1 2 3 4 5 6 7\n\nFig. 3.9. A solution to the Eight Queens problem\n\nBEGIN j := 0;\nIF a[j] & b[i+j] & c[i-j+7] THEN\nx[i] := j;\nIF i < 7 THEN\nTry(i+1, q);\nUNTIL q OR (j = 8)\nEND Try;\nVAR i: INTEGER; (*uses global writer W*)\nFOR i := 0 TO 7 DO a[i] := TRUE END ;\nFOR i := 0 TO 14 DO b[i] := TRUE; c[i] := TRUE END ;\nFOR i := 0 TO 7 DO Texts.WriteInt(W, x[i], 4) END ;\nEND Queens.\nBefore we abandon the context of the chess board, the eight queens example is to serve as an illustration\nof an important extension of the trial-and-error algorithm. The extension is -- in general terms -- to find\nnot only one, but all solutions to a posed problem.\nThe extension is easily accommodated. We are to recall the fact that the generation of candidates must\nprogress in a systematic manner that guarantees no candidate is generated more than once. This property\nof the algorithm corresponds to a search of the candidate tree in a systematic fashion in which every node\nis visited exactly once. It allows -- once a solution is found and duly recorded -- merely to proceed to the\nnext candidate delivered by the systematic selection process. The general schema is as follows:\n\nFOR k := 0 TO n-1 DO\nselect k th candidate;\nIF acceptable THEN record it;\nIF i < n THEN Try(i+1) ELSE output solution END ;\ncancel recording\nNote that because of the simplification of the termination condition of the selection process to the single\nterm k = n, the repeat statement is appropriately replaced by a for statement. It comes as a surprise that\nthe search for all possible solutions is realized by a simpler program than the search for a single solution.\nThe extended algorithm to determine all 92 solutions of the eight queens problem is shown in Program\n3.5. Actually, there are only 12 significantly differing solutions; our program does not recognize\nsymmetries. The 12 solutions generated first are listed in Table 3.2. The numbers n to the right indicate\nthe frequency of execution of the test for safe fields. Its average over all 92 solutions is 161.\nBEGIN (*global writer W*)\nFOR k := 0 TO 7 DO Texts.WriteInt(W, x[k], 4) END ;\nEND write;\nFOR j := 1 TO 8 DO\nx[i] := j;\nIF i < 7 THEN Try(i+1) ELSE write END ;\nEND Try;\nEND AllQueens.\n\nx1 x2 x3 x4 x5 x6 x7 x8 n\n1 5 8 6 3 7 2 4 876\n1 6 8 3 7 4 2 5 264\n1 7 4 6 8 2 5 3 200\n1 7 5 8 2 4 6 3 136\n2 4 6 8 3 1 7 5 504\n2 5 7 1 3 8 6 4 400\n2 5 7 4 1 8 6 3 072\n2 6 1 7 4 8 3 5 280\n2 6 8 3 1 4 7 5 240\n2 7 3 6 8 5 1 4 264\n\n2 7 5 8 1 4 6 3 160\n2 8 6 1 3 5 7 4 336\nTable 3.2 Twelve Solutions to the Eight Queens Problem.\n\n3.6. The Stable Marriage Problem\n\nAssume that two disjoint sets A and B of equal size n are given. Find a set of n pairs such that a in\nA and b in B satisfy some constrains. Many different criteria for such pairs exist; one of them is the rule\ncalled the stable marriage rule.\nAssume that A is a set of men and B is a set of women. Each man and each women has stated distinct\npreferences for their possible partners. If the n couples are chosen such that there exists a man and a\nwoman who are not married, but who would both prefer each other to their actual marriage partners, then\nthe assignment is unstable. If no such pair exists, it is called stable. This situation characterizes many\nrelated problems in which assignments have to be made according to preferences such as, for example,\nthe choice of a school by students, the choice of recruits by different branches of the armed services, etc.\nThe example of marriages is particularly intuitive; note, however, that the stated list of preferences is\ninvariant and does not change after a particular assignment has been made. This assumption simplifies\nthe problem, but it also represents a grave distortion of reality (called abstraction).\nOne way to search for a solution is to try pairing off members of the two sets one after the other until the\ntwo sets are exhausted. Setting out to find all stable assignments, we can readily sketch a solution by\nusing the program schema of AllQueens as a template. Let Try(m) denote the algorithm to find a partner\nfor man m, and let this search proceed in the order of the man's list of stated preferences. The first\nversion based on these assumptions is:\nPROCEDURE Try(m: man);\nVAR r: rank;\nFOR r := 0 TO n-1 DO\npick the r th preference of man m;\nIF acceptable THEN record the marriage;\nIF m is not last man THEN Try(successor(m))\nELSE record the stable set\ncancel the marriage\nThe initial data are represented by two matrices that indicate the men's and women's preferences.\nVAR wmr: ARRAY n, n OF woman\nmwr: ARRAY n, n OF man\nAccordingly, wmrm denotes the preference list of man m, i.e., wmrm,r is the woman who occupies the r th\nrank in the list of man m. Similarly, mwrw is the preference list of woman w, and mwrw,r is her r th\nA sample data set is shown in Table 3.3.\nr= 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8\nm= 1 7 2 6 5 1 3 8 4 w =1 4 6 2 5 8 1 3 7\n2 4 3 2 6 8 1 7 5 2 8 5 3 1 6 7 4 2\n3 3 2 4 1 8 5 7 6 3 6 8 1 2 3 4 7 5\n4 3 8 4 2 5 6 7 1 4 3 2 4 7 6 8 5 1\n5 8 3 4 5 6 1 7 2 5 6 3 1 4 5 7 2 8\n6 8 7 5 2 4 3 1 6 6 2 1 3 8 7 4 6 5\n\n7 2 4 6 3 1 7 5 8 7 3 5 7 2 4 1 8 6\n8 6 1 4 2 7 5 3 8 8 7 2 8 4 5 6 3 1\nTable 3.3 Sample Input Data for wmr and mwr\nThe result is represented by an array of women x, such that xm denotes the partner of man m. In order to\nmaintain symmetry between men and women, an additional array y is introduced, such that yw denotes\nthe partner of woman w.\nActually, y is redundant, since it represents information that is already present through the existence of x.\nIn fact, the relations\nx[y[w]] = w, y[x[m]] = m\nhold for all m and w who are married. Thus, the value yw could be determined by a simple search of x;\nthe array y, however, clearly improves the efficiency of the algorithm. The information represented by x\nand y is needed to determine stability of a proposed set of marriages. Since this set is constructed\nstepwise by marrying individuals and testing stability after each proposed marriage, x and y are needed\neven before all their components are defined. In order to keep track of defined components, we may\nintroduce Boolean arrays\nsinglem, singlew: ARRAY n OF BOOLEAN\nwith the meaning that singlemm implies that xm is defined, and singleww implies that yw is defined. An\ninspection of the proposed algorithm, however, quickly reveals that the marital status of a man is\ndetermined by the value m through the relation\n~singlem[k] = k < m\nThis suggests that the array singlem be omitted; accordingly, we will simplify the name singlew to\nsingle. These conventions lead to the refinement shown by the following procedure Try. The predicate\nacceptable can be refined into the conjunction of single and stable, where stable is a function to be still\nfurther elaborated.\nPROCEDURE Try(m: man);\nVAR r: rank; w: woman;\nFOR r := 0 TO n-1 DO\nw := wmr[m,r];\nIF single[w] & stable THEN\nx[m] := w; y[w] := m; single[w] := FALSE;\nIF m < n THEN Try(m+1) ELSE record set END ;\nsingle[w] := TRUE\nAt this point, the strong similarity of this solution with procedure AllQueens is still noticeable. The\ncrucial task is now the refinement of the algorithm to determine stability. Unfortunately, it is not possible\nto represent stability by such a simple expression as the safety of a queen's position. The first detail that\nshould be kept in mind is that stability follows by definition from comparisons of ranks. The ranks of\nmen or women, however, are nowhere explicitly available in our collection of data established so far.\nSurely, the rank of woman w in the mind of man m can be computed, but only by a costly search of w in\nwmrm. Since the computation of stability is a very frequent operation, it is advisable to make this\ninformation more directly accessible. To this end, we introduce the two matrices\nrmw: ARRAY man, woman OF rank;\nrwm: ARRAY woman, man OF rank\n\nsuch that rmwm,w denotes woman w's rank in the preference list of man m, and rwmw,m denotes the rank\nof man m in the list of w. It is plain that the values of these auxiliary arrays are constant and can initially\nbe determined from the values of wmr and mwr.\nThe process of determining the predicate stable now proceeds strictly according to its original definition.\nRecall that we are trying the feasibility of marrying m and w, where w = wmrm,r , i.e., w is man m's r th\nchoice. Being optimistic, we first presume that stability still prevails, and then we set out to find possible\nsources of trouble. Where could they be hidden? There are two symmetrical possibilities:\n1. There might be a women pw, preferred to w by m, who herself prefers m over her husband.\n2. There might be a man pm, preferred to m by w, who himself prefers w over his wife.\nPursuing trouble source 1, we compare ranks rwmpw,m and rwmpw,y[pw] for all women preferred to w by m,\ni.e. for all pw = wmrm,i such that i < r. We happen to know that all these candidate women are already\nmarried because, were anyone of them still single, m would have picked her beforehand. The described\nprocess can be formulated by a simple linear search; s denotes stability.\ns := TRUE; i := 0;\nWHILE (i < r) & s DO\npw := wmr[m,i]; INC(i);\nIF ~single[pw] THEN s := rwm[pw,m] > rwm[pw, y[pw]] END\nHunting for trouble source 2, we must investigate all candidates pm who are preferred by w to their\ncurrent assignation m, i.e., all preferred men pm = mwrw,i such that i < rwmw,m. In analogy to tracing\ntrouble source 1, comparison between ranks rmwpm,w and rmwpm,x[pm] is necessary. We must be careful,\nhowever, to omit comparisons involving xpm where pm is still single. The necessary safeguard is a test\npm < m, since we know that all men preceding m are already married.\nThe complete algorithm is shown in module Marriage. Table 3.4 specifies the nine computed stable\nsolutions from input data wmr and mwr given in Table 3.3.\nPROCEDURE write; (*global writer W*)\nVAR m: man; rm, rw: INTEGER;\nBEGIN rm := 0; rw := 0;\nFOR m := 0 TO n-1 DO\nTexts.WriteInt(W, x[m], 4);\nrm := rmw[m, x[m]] + rm; rw := rwm[x[m], m] + rw\nTexts.WriteInt(W, rm, 8); Texts.WriteInt(W, rw, 4); Texts.WriteLn(W)\nEND write;\nVAR pm, pw, rank, i, lim: INTEGER;\nBEGIN S := TRUE; i := 0;\nWHILE (i < r) & S DO\nIF ~single[pw] THEN S := rwm[pw,m] > rwm[pw, y[pw]] END\ni := 0; lim := rwm[w,m];\nWHILE (i < lim) & S DO\npm := mwr[w,i]; INC(i);\nIF pm < m THEN S := rmw[pm,w] > rmw[pm, x[pm]] END\nEND stable;\n\nFOR r := 0 TO n-1 DO w := wmr[m,r];\nIF single[w] & stable(m,w,r) THEN\nIF m < n-1 THEN Try(m+1) ELSE write END ;\nsingle[w] := TRUE\nEND Try;\nPROCEDURE FindStableMarriages(VAR S: Texts.Scanner);\nVAR m, w, r: INTEGER;\nFOR m := 0 TO n-1 DO\nFOR r := 0 TO n-1 DO Texts.Scan(S); wmr[m,r] := S.i; rmw[m, wmr[m,r]] := r END\nFOR w := 0 TO n-1 DO\nsingle[w] := TRUE;\nFOR r := 0 TO n-1 DO Texts.Scan(S); mwr[w,r] := S.i; rwm[w, mwr[w,r]] := r END\nEND FindStableMarriages\nEND Marriage\nThis algorithm is based on a straightforward backtracking scheme. Its efficiency primarily depends on\nthe sophistication of the solution tree pruning scheme. A somewhat faster, but more complex and less\ntransparent algorithm has been presented by McVitie and Wilson [3-1 and 3-2], who also have extended\nit to the case of sets (of men and women) of unequal size.\nAlgorithms of the kind of the last two examples, which generate all possible solutions to a problem\n(given certain constraints), are often used to select one or several of the solutions that are optimal in\nsome sense. In the present example, one might, for instance, be interested in the solution that on the\naverage best satisfies the men, or the women, or everyone.\nNotice that Table 3.4 indicates the sums of the ranks of all women in the preference lists of their\nhusbands, and the sums of the ranks of all men in the preference lists of their wives. These are the values\nrm = S m: 1 ≤ m ≤ n: rmwm,x[m]\nrw = S m: 1 ≤ m ≤ n: rwmx[m],m\n\nx1 x2 x3 x4 x5 x6 x7 x8 rm rw c\n1 7 4 3 8 1 5 2 6 16 32 21\n2 2 4 3 8 1 5 7 6 22 27 449\n3 2 4 3 1 7 5 8 6 31 20 59\n4 6 4 3 8 1 5 7 2 26 22 62\n5 6 4 3 1 7 5 8 2 35 15 47\n6 6 3 4 8 1 5 7 2 29 20 143\n7 6 3 4 1 7 5 8 2 38 13 47\n8 3 6 4 8 1 5 7 2 34 18 758\n9 3 6 4 1 7 5 8 2 43 11 34\nc = number of evaluations of stability.\nSolution 1 = male optimal solution; solution 9 = female optimal solution.\nTable 3.4 Result of the Stable Marriage Problem.\n\nThe solution with the least value rm is called the male-optimal stable solution; the one with the smallest\nrw is the female-optimal stable solution. It lies in the nature of the chosen search strategy that good\n\nsolutions from the men's point of view are generated first and the good solutions from the women's\nperspective appear toward the end. In this sense, the algorithm is based toward the male population. This\ncan quickly be changed by systematically interchanging the role of men and women, i.e., by merely\ninterchanging mwr with wmr and interchanging rmw with rwm.\nWe refrain from extending this program further and leave the incorporation of a search for an optimal\nsolution to the next and last example of a backtracking algorithm.\n\n3.7. The Optimal Selection Problem\n\nThe last example of a backtracking algorithm is a logical extension of the previous two examples\nrepresented by the general schema. First we were using the principle of backtracking to find a single\nsolution to a given problem. This was exemplified by the knight's tour and the eight queens. Then we\ntackled the goal of finding all solutions to a given problem; the examples were those of the eight queens\nand the stable marriages. Now we wish to find an optimal solution.\nTo this end, it is necessary to generate all possible solutions, and in the course of generating them to\nretain the one that is optimal in some specific sense. Assuming that optimality is defined in terms of\nsome positive valued function f(s), the algorithm is derived from the general schema of Try by replacing\nthe statement print solution by the statement\nIF f(solution) > f(optimum) THEN optimum := solution END\nThe variable optimum records the best solution so far encountered. Naturally, it has to be properly\ninitialized; morever, it is customary to record to value f(optimum) by another variable in order to avoid its\nfrequent recomputation.\nAn example of the general problem of finding an optimal solution to a given problem follows: We\nchoose the important and frequently encountered problem of finding an optimal selection out of a given\nset of objects subject to constraints. Selections that constitute acceptable solutions are gradually built up\nby investigating individual objects from the base set. A procedure Try describes the process of\ninvestigating the suitability of one individual object, and it is called recursively (to investigate the next\nobject) until all objects have been considered.\nWe note that the consideration of each object (called candidates in previous examples) has two possible\noutcomes, namely, either the inclusion of the investigated object in the current selection or its exclusion.\nThis makes the use of a repeat or for statement inappropriate; instead, the two cases may as well be\nexplicitly written out. This is shown, assuming that the objects are numbered 1, 2, ... , n.\nIF inclusion is acceptable THEN include i th object;\nIF i < n THEN Try(i+1) ELSE check optimality END ;\neliminate i th object\nIF exclusion is acceptable THEN\nFrom this pattern it is evident that there are 2n possible sets; clearly, appropriate acceptability criteria\nmust be employed to reduce the number of investigated candidates very drastically. In order to elucidate\nthis process, let us choose a concrete example for a selection problem: Let each of the n objects a0, ... ,\nan-1 be characterized by its weight and its value. Let the optimal set be the one with the largest sum of the\nvalues of its components, and let the constraint be a limit on the sum of their weight. This is a problem\nwell known to all travellers who pack suitcases by selecting from n items in such a way that their total\nvalue is optimal and that their total weight does not exceed a specific allowance.\nWe are now in a position to decide upon the representation of the given facts in terms of global variables.\nThe choices are easily derived from the foregoing developments:\n\nTYPE object = RECORD weight, value: INTEGER END ;\n\nVAR obj: ARRAY n OF object;\nlimw, totv, maxv: INTEGER;\ns, opts: SET\nThe variables limw and totv denote the weight limit and the total value of all n objects. These two values\nare actually constant during the entire selection process. s represents the current selection of objects in\nwhich each object is represented by its name (index). opts is the optimal selection so far encountered, and\nmaxv is its value.\nWhich are now the criteria for acceptability of an object for the current selection? If we consider\ninclusion, then an object is selectable, if it fits into the weight allowance. If it does not fit, we may stop\ntrying to add further objects to the current selection. If, however, we consider exclusion, then the\ncriterion for acceptability, i.e., for the continuation of building up the current selection, is that the total\nvalue which is still achievable after this exclusion is not less than the value of the optimum so far\nencountered. For, if it is less, continuation of the search, although it may produce some solution, will not\nyield the optimal solution. Hence any further search on the current path is fruitless. From these two\nconditions we determine the relevant quantities to be computed for each step in the selection process:\n1. The total weight tw of the selection s so far made.\n2. The still achievable value av of the current selection s.\nThese two entities are appropriately represented as parameters of the procedure Try. The condition\ninclusion is acceptable can now be formulated as\ntw + a[i].weight < limw\nand the subsequent check for optimality as\nIF av > maxv THEN (*new optimum, record it*)\nopts := s; maxv := av\nThe last assignment is based on the reasoning that the achievable value is the achieved value, once all n\nobjects have been dealt with. The condition exclusion is acceptable is expressed by\nav - a[i].value > maxv\nSince it is used again thereafter, the value av - a[i].value is given the name av1 in order to circumvent\nits reevaluation.\nThe entire procedure is now composed of the discussed parts with the addition of appropriate\ninitialization statements for the global variables. The ease of expressing inclusion and exclusion from the\nset s by use of set operators is noteworthy. The results opts and maxv of Selection with weight\nallowances ranging from 10 to 120 are listed in Table 3.5.\n\nTYPE Object = RECORD value, weight: INTEGER END ;\n\nVAR obj: ARRAY n OF Object;\nlimw, totv, maxv: INTEGER;\ns, opts: SET;\nPROCEDURE Try(i, tw, av: INTEGER);\nBEGIN (*try inclusion*)\nIF tw + obj[i].weight <= limw THEN\ns := s + {i};\nIF i < n THEN Try(i+1, tw + obj[i].weight, av)\nELSIF av > maxv THEN maxv := av; opts := s\ns := s - {i}\n(*try exclusion*)\n\nIF av > maxv + obj[i].value THEN\n\nIF i < n THEN Try(i+1, tw, av - obj[i].value)\nELSE maxv := av - obj[i].value; opts := s\nEND Try;\nPROCEDURE Selection(n, Weightinc, WeightLimit: INTEGER);\nBEGIN limw := 0;\nREPEAT limw := limw + WeightInc; maxv := 0;\ns := {}; opts := {}; Try(0, 0, totv);\nUNTIL limw >= WeightLimit\nEND Selection.\n\nWeight 10 11 12 13 14 15 16 17 18 19 Tot\nValue 18 20 17 19 25 21 27 23 25 24\n10 * 18\n20 * 27\n30 * * 52\n40 * * * 70\n50 * * * * 84\n60 * * * * * 99\n70 * * * * * 115\n80 * * * * * * 130\n90 * * * * * * 139\n100 * * * * * * * 157\n110 * * * * * * * * 172\n120 * * * * * * * * 183\nTable 3.5 Sample Output from Optimal Selection Program.\nThis backtracking scheme with a limitation factor curtailing the growth of the potential search tree is also\nknown as branch and bound algorithm.\n\n3.1 (Towers of Hanoi). Given are three rods and n disks of different sizes. The disks can be stacked up\non the rods, thereby forming towers. Let the n disks initially be placed on rod A in the order of\ndecreasing size, as shown in Fig. 3.10 for n = 3. The task is to move the n disks from rod A to rod C\nsuch that they are ordered in the original way. This has to be achieved under the constraints that\n1. In each step exactly one disk is moved from one rod to another rod.\n2. A disk may never be placed on top of a smaller disk.\n3. Rod B may be used as an auxiliary store.\nFind an algorithm that performs this task. Note that a tower may conveniently be considered as\nconsisting of the single disk at the top, and the tower consisting of the remaining disks. Describe the\nalgorithm as a recursive program.\n\n\nFig. 3.10. The towers of Hanoi\n\n3.2. Write a procedure that generates all n! permutations of n elements a1, ... , an in situ, i.e., without the\naid of another array. Upon generating the next permutation, a parametric procedure Q is to be called\nwhich may, for instance, output the generated permutation.\nHint: Consider the task of generating all permutations of the elements a1, ... , am as consisting of the\nm subtasks of generating all permutations of a1, ... , am-1 followed by am , where in the i th subtask the\ntwo elements ai and am had initially been interchanged.\n3.3. Deduce the recursion scheme of Fig. 3.11 which is a superposition of the four curves W1, W2, W3,\nW4. The structure is similar to that of the Sierpinski curves (3.21) and (3.22). From the recursion\npattern, derive a recursive program that draws these curves.\n\nFig. 3.11. Curves W1 – W4\n\n3.4. Only 12 of the 92 solutions computed by the Eight Queens algorithm are essentially different. The\nother ones can be derived by reflections about axes or the center point. Devise a program that\ndetermines the 12 principal solutions. Note that, for example, the search in column 1 may be\nrestricted to positions 1-4.\n3.5 Change the Stable Marriage Program so that it determines the optimal solution (male or female). It\ntherefore becomes a branch and bound program of the type represented by Program 3.7.\n3.6 A certain railway company serves n stations S 0, ... , S n-1. It intends to improve its customer\ninformation service by computerized information terminals. A customer types in his departure\nstation SA and his destination SD, and he is supposed to be (immediately) given the schedule of the\ntrain connections with minimum total time of the journey. Devise a program to compute the desired\ninformation. Assume that the timetable (which is your data bank) is provided in a suitable data\nstructure containing departure (= arrival) times of all available trains. Naturally, not all stations are\nconnected by direct lines (see also Exercise 1.6).\n3.7 The Ackermann Function A is defined for all non-negative integer arguments m and n as follows:\nA(0, n) = n + 1\nA(m, 0) = A(m-1, 1) (m > 0)\nA(m, n) = A(m-1, A(m, n-1)) (m, n > 0)\nDesign a program that computes A(m,n) without the use of recursion. As a guideline, use Program\n2.11, the non-recusive version of Quicksort. Devise a set of rules for the transformation of recursive\ninto iterative programs in general.\n\n3-1. D.G. McVitie and L.B. Wilson. The Stable Marriage Problem. Comm. ACM, 14, No. 7 (1971), 486-\n3-2. -------. Stable Marriage Assignment for Unequal Sets. Bit, 10, (1970), 295-309.\n3-3. Space Filling Curves, or How to Waste Time on a Plotter. Software - Practice and Experience, 1,\nNo. 4 (1971), 403-40.\n\n4 Dynamic Information Structures\n\n4.1. Recursive Data Types\nIn Chap. 2 the array, record, and set structures were introduced as fundamental data structures. They are\ncalled fundamental because they constitute the building blocks out of which more complex structures are\nformed, and because in practice they do occur most frequently. The purpose of defining a data type, and\nof thereafter specifying that certain variables be of that type, is that the range of values assumed by these\nvariables, and therefore their storage pattern, is fixed once and for all. Hence, variables declared in this\nway are said to be static. However, there are many problems which involve far more complicated\ninformation structures. The characteristic of these problems is that not only the values but also the\nstructures of variables change during the computation. They are therefore called dynamic structures.\nNaturally, the components of such structures are -- at some level of resolution -- static, i.e., of one of the\nfundamental data types. This chapter is devoted to the construction, analysis, and management of dynamic\ninformation structures.\nIt is noteworthy that there exist some close analogies between the methods used for structuring algorithms\nand those for structuring data. As with all analogies, there remain some differences, but a comparison of\nstructuring methods for programs and data is nevertheless illuminating.\nThe elementary, unstructured statement is the assignment of an expression's value to a variable. Its\ncorresponding member in the family of data structures is the scalar, unstructured type. These two are the\natomic building blocks for composite statements and data types. The simplest structures, obtained through\nenumeration or sequencing, are the compound statement and the record structure. They both consist of a\nfinite (usually small) number of explicitly enumerated components, which may themselves all be different\nfrom each other. If all components are identical, they need not be written out individually: we use the for\nstatement and the array structure to indicate replication by a known, finite factor. A choice among two or\nmore elements is expressed by the conditional or the case statement and by extensions of record types,\nrespectively. And finally, a repetiton by an initially unknown (and potentially infinite) factor is expressed\nby the while and repeat statements. The corresponding data structure is the sequence (file), the simplest\nkind which allows the construction of types of infinite cardinality.\nThe question arises whether or not there exists a data structure that corresponds in a similar way to the\nprocedure statement. Naturally, the most interesting and novel property of procedures in this respect is\nrecursion. Values of such a recursive data type would contain one or more components belonging to the\nsame type as itself, in analogy to a procedure containing one or more calls to itself. Like procedures, data\ntype definitions might be directly or indirectly recursive.\nA simple example of an object that would most appropriately be represented as a recursively defined type\nis the arithmetic expression found in programming languages. Recursion is used to reflect the possibility\nof nesting, i.e., of using parenthesized subexpressions as operands in expressions. Hence, let an\nexpression here be defined informally as follows:\nAn expression consists of a term, followed by an operator, followed by a term. (The two terms constitute\nthe operands of the operator.) A term is either a variable -- represented by an identifier -- or an expression\nenclosed in parentheses.\nA data type whose values represent such expressions can easily be described by using the tools already\navailable with the addition of recursion:\nTYPE expression = RECORD op: INTEGER;\nopd1, opd2: term\nIF t: BOOLEAN THEN id: Name ELSE subex: expression END\n\nHence, every variable of type term consists of two components, namely, the tagfield t and, if t is true, the\nfield id, or of the field subex otherwise. Consider now, for example, the following four expressions:\n1. x + y\n2. x - (y * z)\n3. (x + y) * (z - w)\n4. (x/(y + z)) * w\nThese expressions may be visualized by the patterns in Fig. 4.1, which exhibit their nested, recursive\nstructure, and they determine the layout or mapping of these expressions onto a store.\n\n1. + 2. -\n\nT x T x\n\nT y *\n\nF T y\n\nT z\n\n3. * 4. *\n\n+ /\n\nF T x T x\n\nT y F +\n\n- F T y\n\nF T z T z\n\nT w T w\n\nFig. 4.1. Storage patterns for recursive record structures\n\nA second example of a recursive information structure is the family pedigree: Let a pedigree be defined\nby (the name of) a person and the two pedigrees of the parents. This definition leads inevitably to an\ninfinite structure. Real pedigrees are bounded because at some level of ancestry information is missing.\nAssume that this can be taken into account by again using a conditional structure:\nIF known: BOOLEAN THEN name: Name; father, mother: ped END\nNote that every variable of type ped has at least one component, namely, the tagfield called known. If its\nvalue is TRUE, then there are three more fields; otherwise there is none. A particular value is shown here\nin the forms of a nested expression and of a diagram that may suggest a possible storage pattern (see Fig.\n(T, Ted, (T, Fred, (T, Adam, (F), (F)), (F)), (T, Mary, (F), (T, Eva, (F), (F)))\nThe important role of the variant facility becomes clear; it is the only means by which a recursive data\nstructure can be bounded, and it is therefore an inevitable companion of every recursive definition. The\nanalogy between program and data structuring concepts is particularly pronounced in this case. A\nconditional (or selective) statement must necessarily be part of every recursive procedure in order that\nexecution of the procedure can terminate. In practice, dynamic structures involve references or pointers to\nits elements, and the concept of an alternative (to terminate the recursion) is implied in the pointer, as\nshown in the next paragraph.\n\nT Ted\n\nT Fred\n\nT Adam\n\nT Mary\n\nT Eva\n\nFig. 4.2. An example of a recursive data structure\n\n4.2. Pointers\nThe characteristic property of recursive structures which clearly distinguishes them from the fundamental\nstructures (arrays, records, sets) is their ability to vary in size. Hence, it is impossible to assign a fixed\namount of storage to a recursively defined structure, and as a consequence a compiler cannot associate\nspecific addresses to the components of such variables. The technique most commonly used to master this\nproblem involves dynamic allocation of storage, i.e., allocation of store to individual components at the\ntime when they come into existence during program execution, instead of at translation time. The\ncompiler then allocates a fixed amount of storage to hold the address of the dynamically allocated\ncomponent instead of the component itself. For instance, the pedigree illustrated in Fig. 4.2 would be\nrepresented by individual -- quite possibly noncontiguous -- records, one for each person. These persons\nare then linked by their addresses assigned to the respective father and mother fields. Graphically, this\nsituation is best expressed by the use of arrows or pointers (Fig. 4.3).\n\nT Ted\n\nT Fred T Mary\n\nT Adam F F T Eva\n\n\nFig. 4.3. Data structure linked by pointers\n\nIt must be emphasized that the use of pointers to implement recursive structures is merely a technique.\nThe programmer need not be aware of their existence. Storage may be allocated automatically the first\ntime a new component is referenced. However, if the technique of using references or pointers is made\nexplicit, more general data structures can be constructed than those definable by purely recursive data\ndefiniton. In particular, it is then possible to define potentially infinite or circular (graph) structures and to\ndictate that certain structures are shared. It has therefore become common in advanced programming\nlanguages to make possible the explicit manipulation of references to data in additon to the data\nthemeselves. This implies that a clear notational distinction must exist between data and references to data\nand that consequently data types must be introduced whose values are pointers (references) to other data.\nThe notation we use for this purpose is the following:\nThis type declaration expresses that values of type T are pointers to data of type T0. It is fundamentally\nimportant that the type of elements pointed to is evident from the declaration of T. We say that T is bound\nto T0. This binding distinguishes pointers in higher-level languages from addresses in assembly codes,\nand it is a most important facility to increase security in programming through redundancy of the\nunderlying notation.\nValues of pointer types are generated whenever a data item is dynamically allocated. We will adhere to\nthe convention that such an occasion be explicitly mentioned at all times. This is in contrast to the\nsituation in which the first time that an item is mentioned it is automatically allocated. For this purpose,\nwe introduce a procedure New. Given a pointer variable p of type T, the statement New(p) effectively\nallocates a variable of type T0 and assigns the pointer referencing this new variable to p (see Fig. 4.4).\nThe pointer value itself can now be referred to as p (i.e., as the value of the pointer variable p). In\ncontrast, the variable which is referenced by p is denoted by p^. The referenced structures are typically\nrecords. If the referenced record has, for example, a field x, then it is denoted by p^.x. Because it is clear\nthat not the pointer p has any fields, but only the referenced record p^, we allow the abbreviated notation\np.x in place of p^.x.\n\n\np↑: T\n\nFig. 4.4. Dynamic allocation of variable p^\n\nIt was mentioned above that a variant component is essential in every recursive type to ensure finite\ninstances. The example of the family predigree is of a pattern that exhibits a most frequently occurring\nconstellation, namely, the case in which one of the two cases features no further components. This is\nexpressed by the following declaration schema:\nIF nonterminal: BOOLEAN THEN S(T) END\nS(T) denotes a sequence of field definitions which includes one or more fields of type T, thereby ensuring\nrecursivity. All structures of a type patterned after this schema exhibit a tree (or list) structure similar to\nthat shown in Fig. 4.3. Its peculiar property is that it contains pointers to data components with a tag field\nonly, i.e., without further relevant information. The implementation technique using pointers suggests an\neasy way of saving storage space by letting the tag information be included in the pointer value itself. The\ncommon solution is to extend the range of values of all pointer types by a single value that is pointing to\nno element at all. We denote this value by the special symbol NIL, and we postulate that the value NIL\ncan be assumed by all pointer typed variables. This extension of the range of pointer values explains why\nfinite structures may be generated without the explicit presence of variants (conditions) in their\n(recursive) declaration.\nThe new formulations of the explicitly recursive data types declared above are reformulated using\npointers as shown below. Note that the field known has vanished, since ~p.known is now expressed as p =\nNIL. The renaming of the type ped to person reflects the difference in the viewpoint brought about by the\nintroduction of explicit pointer values. Instead of first considering the given structure in its entirety and\nthen investigating its substructure and its components, attention is focused on the components in the first\nplace, and their interrelationship (represented by pointers) is not evident from any fixed declaration.\nTYPE term = POINTER TO TermDescriptor;\nTYPE exp = POINTER TO ExpDescriptor;\nTYPE ExpDescriptor = RECORD op: INTEGER; opd1, opd2: term END ;\nTYPE TermDescriptor = RECORD id: ARRAY 32 OF CHAR END\nname: ARRAY 32 OF CHAR;\nfather, mother: Person\nNote: The type Person points to records of an anonymous type (PersonDescriptor).\nThe data structure representing the pedigree shown in Figs. 4.2 and 4.3 is again shown in Fig. 4.5 in\nwhich pointers to unknown persons are denoted by NIL. The resulting improvement in storage economy\nis obvious.\n\nT Ted\n\nT Fred NIL T Mary NIL\n\n\nFig. 4.5. Data structure with NIL pointers\n\nAgain referring to Fig. 4.5, assume that Fred and Mary are siblings, i.e., have the same father and mother.\nThis situation is easily expressed by replacing the two NIL values in the respective fields of the two\nrecords. An implementation that hides the concept of pointers or uses a different technique of storage\nhandling would force the programmer to represent the ancestor records of Adam and Eve twice. Although\nin accessing their data for inspection it does not matter whether the two fathers (and the two mothers) are\nduplicated or represented by a single record, the difference is essential when selective updating is\npermitted. Treating pointers as explicit data items instead of as hidden implementation aids allows the\nprogrammer to express clearly where storage sharing is intended and where it is not.\nA further consequence of the explicitness of pointers is that it is possible to define and manipulate cyclic\ndata structures. This additional flexibility yields, of course, not only increased power but also requires\nincreased care by the programmer, because the manipulation of cyclic data structures may easily lead to\nnonterminating processes.\nThis phenomenon of power and flexibility being intimately coupled with the danger of misuse is well\nknown in programming, and it particularly recalls the GOTO statement. Indeed, if the analogy between\nplaced at the level corresponding with the procedure, whereas the introduction of pointers is comparable\nto the use of GOTO statements. For, as the GOTO statement allows the construction of any kind of\nprogram pattern (including loops), so do pointers allow for the composition of any kind of data structure\n(including rings). The parallel development of corresponding program and data structures is shown in\ncondensed form in Table 4.1.\nConstruction Pattern Program Statement Data Type\nAtomic element Assignment Scalar type\nEnumeration Compound statement Record type\nRepetition (known factor) For statement Array type\nChoice Conditional statement Type union (Variant record)\nRepetition While or repeat statement Sequence type\nRecursion Procedure statement Recursive data type\nGeneral graph GO TO statement Structure linked by pointers\nTable 4.1 Correspondences of Program and Data Structures.\n\nIn Chap. 3, we have seen that iteration is a special case of recursion, and that a call of a recursive\nprocedure P defined according to the following schema:\nwhere P0 is a statement not involving P, is equivalent to and replaceable by the iterative statement\n\nThe analogies outlined in Table 4.1 reveal that a similar relationship holds between recursive data types\nand the sequence. In fact, a recursive type defined according to the schema\nwhere T0 is a type not involving T, is equivalent and replaceable by a sequence of T0s.\nThe remainder of this chapter is devoted to the generation and manipulation of data structures whose\ncomponents are linked by explicit pointers. Structures with specific simple patterns are emphasized in\nparticular; recipes for handling more complex structures may be derived from those for manipulating\nbasic formations. These are the linear list or chained sequence -- the simplest case -- and trees. Our\npreoccupation with these building blocks of data structuring does not imply that more involved structures\ndo not occur in practice. In fact, the following story appeared in a Zürich newspaper in July 1922 and is a\nproof that irregularity may even occur in cases which usually serve as examples for regular structures,\nsuch as (family) trees. The story tells of a man who laments the misery of his life in the following words:\nI married a widow who had a grown-up daughter. My father, who visited us quite often, fell in love with\nmy step-daughter and married her. Hence, my father became my son-in-law, and my step-daughter\nbecame my mother. Some months later, my wife gave birth to a son, who became the brother-in-law of my\nfather as well as my uncle. The wife of my father, that is my stepdaughter, also had a son. Thereby, I got a\nbrother and at the same time a grandson. My wife is my grandmother, since she is my mother's mother.\nHence, I am my wife's husband and at the same time her step-grandson; in other words, I am my own\n\n4.3. Linear Lists\n\n4.3.1. Basic Operations\nThe simplest way to interrelate or link a set of elements is to line them up in a single list or queue. For, in\nthis case, only a single link is needed for each element to refer to its successor.\nAssume that types Node and NodeDesc are defined as shown below. Every variable of type NodeDesc\nassociated information. For our further discussion, only key and next will be relevant.\nTYPE Node = POINTER TO NodeDesc;\nTYPE NodeDesc = RECORD key: INTEGER; next: Ptr; data: ... END ;\nVAR p, q: Node (*pointer variables*)\nA list of nodes, with a pointer to its first component being assigned to a variable p, is illustrated in Fig.\n4.6. Probably the simplest operation to be performed with a list as shown in Fig. 4.6 is the insertion of an\nelement at its head. First, an element of type NodeDesc is allocated, its reference (pointer) being assigned\nto an auxiliary pointer variable, say q. Thereafter, a simple reassignment of pointers completes the\noperation. Note that the order of these three statements is essential.\nNEW(q); q.next := p; p := q\n\np 1\n\n\nFig. 4.6. Example of a linked list\n\nThe operation of inserting an element at the head of a list immediately suggests how such a list can be\ngenerated: starting with the empty list, a heading element is added repeatedly. The process of list\ngeneration is expressed in by the following piece of program; here the number of elements to be linked is\np := NIL; (*start with empty list*)\nWHILE n > 0 DO\nNEW(q); q.next := p; p := q;\nq.key := n; DEC(n)\nThis is the simplest way of forming a list. However, the resulting order of elements is the inverse of the\norder of their insertion. In some applications this is undesirable, and consequently, new elements must be\nappended at the end instead of the head of the list. Although the end can easily be determined by a scan of\nthe list, this naive approach involves an effort that may as well be saved by using a second pointer, say q,\nalways designating the last element. This method is, for example, applied in Program 4.4, which generates\ncross-references to a given text. Its disadvantage is that the first element inserted has to be treated\ndifferently from all later ones.\nThe explicit availability of pointers makes certain operations very simple which are otherwise\ncumbersome; among the elementary list operations are those of inserting and deleting elements (selective\nupdating of a list), and, of course, the traversal of a list. We first investigate list insertion.\nAssume that an element designated by a pointer (variable) q is to be inserted in a list after the element\ndesignated by the pointer p. The necessary pointer assignments are expressed as follows, and their effect\nis visualized by Fig. 4.7.\nq.next := p.next; p.next := q\n\nq q\n\nFig. 4.7. Insertion after p^\n\nIf insertion before instead of after the designated element p^ is desired, the unidirectional link chain\nseems to cause a problem, because it does not provide any kind of path to an element's predecessors.\nHowever, a simple trick solves our dilemma. It is illustrated in Fig. 4.8. Assume that the key of the new\nelement is 8.\nNEW(q); q^ := p^; p.key := k; p.next := q\n\nq 8 27\n\n13 27 21 13 8 21\n\nFig. 4.8. Insertion before p^\n\nThe trick evidently consists of actually inserting a new component after p^ and thereafter interchanging\nthe values of the new element and p^.\nNext, we consider the process of list deletion. Deleting the successor of a p^ is straightforward. This is\nshown here in combination with the reinsertion of the deleted element at the head of another list\n(designated by q). Figure 4.9 illustrates the situation and shows that it constitutes a cyclic exchange of\nthree pointers.\nr := p.next; p.next := r.next; r.next := q; q := r\n\nq q\n\nFig. 4.9. Deletion and re-insertion\n\nThe removal of a designated element itself (instead of its successor) is more difficult, because we\nencounter the same problem as with insertion: tracing backward to the denoted element's predecessor is\nimpossible. But deleting the successor after moving its value forward is a relatively obvious and simple\nsolution. It can be applied whenever p^ has a successor, i.e., is not the last element on the list. However, it\nmust be assured that there exist no other variables pointing to the now deleted element.\nWe now turn to the fundamental operation of list traversal. Let us assume that an operation P(x) has to be\nperformed for every element of the list whose first element is p^. This task is expressible as follows:\nWHILE list designated by p is not empty DO\nperform operation P;\nproceed to the successor\nIn detail, this operation is descibed by the following statement:\n\nP(p); p := p.next\nIt follows from the definitions of the while statement and of the linking structure that P is applied to all\nelements of the list and to no other ones.\nA very frequent operation performed is list searching for an element with a given key x. Unlike for\narrays, the search must here be purely sequential. The search terminates either if an element is found or if\nthe end of the list is reached. This is reflected by a logical conjunction consisting of two terms. Again, we\nassume that the head of the list is designated by a pointer p.\nWHILE (p # NIL) & (p.key # x) DO p := p.next END\np = NIL implies that p^ does not exist, and hence that the expression p.key # x is undefined. The order of\nthe two terms is therefore essential.\n\n4.3.2. Ordered Lists and Reorganizing Lists\n\nThe given linear list search strongly resembles the search routines for scanning an array or a sequence. In\nfact, a sequence is precisely a linear list for which the technique of linkage to the successor is left\nunspecified or implicit. Since the primitive sequence operators do not allow insertion of new elements\n(except at the end) or deletion (except removal of all elements), the choice of representation is left wide\nopen to the implementor, and he may well use sequential allocation, leaving successive components in\ncontiguous storage areas. Linear lists with explicit pointers provide more flexibility, and therefore they\nshould be used whenever this additional flexibility is needed.\nTo exemplify, we will now consider a problem that will occur throughout this chapter in order to illustate\nalternative solutions and techniques. It is the problem of reading a text, collecting all its words, and\ncounting the frequency of their occurrence. It is called the construction of a concordance or the generation\nof a cross-reference list.\nAn obvious solution is to construct a list of words found in the text. The list is scanned for each word. If\nthe word is found, its frequency count is incremented; otherwise the word is added to the list. We shall\nsimply call this process search, although it may actually also include an insertion. In order to be able to\nconcentrate our attention on the essential part of list handling, we assume that the words have already\nbeen extracted from the text under investigation, have been encoded as integers, and are available in the\nfrom of an input sequence.\nThe formulation of the procedure called search follows in a straightforward manner. The variable root\nrefers to the head of the list in which new words are inserted accordingly. The complete algorithm is listed\nbelow; it includes a routine for tabulating the constructed cross-reference list. The tabulation process is an\nexample in which an action is executed once for each element of the list.\nRECORD key, count: INTEGER; next: Word END ;\nPROCEDURE search(x: INTEGER; VAR root: Word);\nVAR w: Word;\nBEGIN w := root;\nWHILE (w # NIL) & (w.key # x) DO w := w.next END ;\n(* (w = NIL) OR (w.key = x) *)\nIF w = NIL THEN (*new entry*)\nw := root;\nNEW(root); root.key := x; root.count := 1; root.next := w\nELSE INC(w.count)\nEND search;\nPROCEDURE PrintList(w: Word);\nBEGIN (*uses global writer W *)\n\nTexts.WriteInt(W, w.key, 8); Texts.WriteInt(W, w.count, 8); Texts.WriteLn(W);\n\nw := w.next\nEND PrintList;\nThe linear scan algorithm resembles the search procedure for arrays, and reminds us of a simple technique\nused to simplify the loop termination condition: the use of a sentinel. A sentinel may as well be used in\nlist search; it is represented by a dummy element at the end of the list. The new procedure is listed below.\nWe must assume that a global variable sentinel is added and that the initialization of root := NIL is\nreplaced by the statements\nNEW(sentinel); root := sentinel\nwhich generate the element to be used as sentinel.\nVAR w: Word;\nBEGIN w := root; sentinel.key := x;\nWHILE w.key # x DO w := w.next END ;\nIF w = sentinel THEN (*new entry*)\nw := root;\nELSE INC(w.count)\nEND search\nObviously, the power and flexibility of the linked list are ill used in this example, and the linear scan of\nthe entire list can only be accepted in cases in which the number of elements is limited. An easy\nimprovement, however, is readily at hand: the ordered list search. If the list is ordered (say by increasing\nkeys), then the search may be terminated at the latest upon encountering the first key that is larger than\nthe new one. Ordering of the list is achieved by inserting new elements at the appropriate place instead of\nat the head. In effect, ordering is practically obtained free of charge. This is because of the ease by which\ninsertion in a linked list is achieved, i.e., by making full use of its flexibility. It is a possibility not\nprovided by the array and sequence structures. (Note, however, that even in ordered lists no equivalent to\nthe binary search of arrays is available).\n\n7 w3\n\n5 5 12\n\n\nw2 w1\n\nFig. 4.10. Insertion in ordered list\n\nOrdered list search is a typical example of the situation, where an element must be inserted ahead of a\ngiven item, here in front of the first one whose key is too large. The technique shown here, however,\ndiffers from the one used shown earlier. Instead of copying values, two pointers are carried along in the\nfound too large a key. The general insertion step is shown in Fig. 4.10. The pointer to the new element\n(w3) is to be assigned to w2^.next, except when the list is still empty. For reasons of simplicity and\neffectiveness, we prefer to avoid this distinction by using a conditional statement. The only way to avoid\n\nthis is to introduce a dummy element at the list head. The initializing statement root := NIL is accordingly\nreplaced by\nNEW(root); root.next := NIL\nReferring to Fig. 4.10, we determine the condition under which the scan continues to proceed to the next\nelement; it consists of two factors, namely,\n(w1 # NIL) & (w1.key < x)\nThe resulting search procedure is:.\nPROCEDURE search(x: INTEGER); VAR root: Word);\nVAR w1, w2, w3: Word;\nBEGIN (*w2 # NIL*)\nw2 := root; w1 := w2.next;\nWHILE (w1 # NIL) & (w1.key < x) DO\nw2 := w1; w1 := w2.next\n(* (w1 = NIL) OR (w1.key >= x) *)\nIF (w1 = NIL) OR (w1.key > x) THEN (*new entry*)\nNEW(w3); w2.next := w3;\nw3.key := x; w3.count := 1; w3.next := w1\nELSE INC(w1.count)\nEND search\nIn order to speed up the search, the continuation condition of the while statement can once again be\nsimplified by using a sentinel. This requires the initial presence of a dummy header as well as a sentinel at\nthe tail.\nIt is now high time to ask what gain can be expected from ordered list search. Remembering that the\nadditional complexity incurred is small, one should not expect an overwhelming improvement.\nAssume that all words in the text occur with equal frequency. In this case the gain through lexicographical\nordering is indeed also nil, once all words are listed, because the position of a word does not matter if\nonly the total of all access steps is significant and if all words have the same frequency of occurrence.\nHowever, a gain is obtained whenever a new word is to be inserted. Instead of first scanning the entire\nlist, on the average only half the list is scanned. Hence, ordered list insertion pays off only if a\nconcordance is to be generated with many distinct words compared to their frequency of occurrence. The\npreceding examples are therefore suitable primarily as programming exercises rather than for practical\nThe arrangement of data in a linked list is recommended when the number of elements is relatively small\n(< 50), varies, and, moreover, when no information is given about their frequencies of access. A typical\nexample is the symbol table in compilers of programming languages. Each declaration causes the addition\nof a new symbol, and upon exit from its scope of validity, it is deleted from the list. The use of simple\nlinked lists is appropriate for applications with relatively short programs. Even in this case a considerable\nimprovement in access method can be achieved by a very simple technique which is mentioned here again\nprimarily because it constitutes a pretty example for demonstrating the flexibilities of the linked list\nA characteristic property of programs is that occurrences of the same identifier are very often clustered,\nthat is, one occurrence is often followed by one or more reoccurrences of the same word. This information\nis an invitation to reorganize the list after each access by moving the word that was found to the top of the\nlist, thereby minimizing the length of the search path the next time it is sought. This method of access is\ncalled list search with reordering, or -- somewhat pompously -- self-organizing list search. In presenting\nthe corresponding algorithm in the form of a procedure, we take advantage of our experience made so far\nand introduce a sentinel right from the start. In fact, a sentinel not only speeds up the search, but in this\ncase it also simplifies the program. The list must initially not be empty, but contains the sentinel element\nalready. The initialization statements are\n\nNEW(sentinel); root := sentinel\n\nNote that the main difference between the new algorithm and the straight list search is the action of\nreordering when an element has been found. It is then detached or deleted from its old position and\ninserted at the top. This deletion again requires the use of two chasing pointers, such that the predecessor\nw2 of an identified element w1 is still locatable. This, in turn, calls for the special treatment of the first\nelement (i.e., the empty list). To conceive the linking process, we refer to Fig. 4.11. It shows the two\npointers when w1 was identified as the desired element. The configuration after correct reordering is\nrepresented in Fig. 4.12, and the complete new search procedure is listed below.\n\nroot 3\nU2 A0\n2 7\n\n\nw2 w1\n\nFig. 4.11. List before re-ordering\n\nroot 3\nU2 A0\n2 8\n\n\nw2 w1\n\nFig. 4.12. List after re-ordering\n\nVAR w1, w2: Word;\nBEGIN w1 := root; sentinel.key := x;\nIF w1 = sentinel THEN (*first element*)\nroot.key := x; reoot.count := 1; root.next := sentinel\nELSIF w1.key = x THEN INC(w1.count)\nELSE (*search*)\nREPEAT w2 := w1; w1 := w2.next\nUNTIL w1.key = x;\nIF w1 = sentinel THEN (*new entry*)\nw2 := root; NEW(root);\nroot.key := x; root.count := 1; root.next := w2\nELSE (*found, now reorder*)\nw2.next := w1.next; w1.next := root; root := w1\n\nEND search\nThe improvement in this search method strongly depends on the degree of clustering in the input data. For\na given factor of clustering, the improvement will be more pronounced for large lists. To provide an idea\nof how much gain can be expected, an empirical measurement was made by applying the above cross-\nreference program to a short and a relatively long text and then comparing the methods of linear list\nordering and of list reorganization. The measured data are condensed into Table 4.2. Unfortunately, the\nimprovement is greatest when a different data organization is needed anyway. We will return to this\nexample in Sect. 4.4.\nTest 1 Test 2\nNumber of distinct keys 53 582\nNumber of occurrences of keys 315 14341\nTime for search with ordering 6207 3200622\nTime for search with reordering 4529 681584\nImprovement factor 1.37 4.70\nTable 4.2 Comparsion of List Search Methods.\n\n4.3.3. An Application: Partial Ordering (Topological Sorting)\n\nAn appropriate example of the use of a flexible, dynamic data structure is the process of topological\nsorting. This is a sorting process of items over which a partial ordering is defined, i.e., where an ordering\nis given over some pairs of items but not between all of them. The following are examples of partial\n1. In a dictionary or glossary, words are defined in terms of other words. If a word v is defined in terms of\na word w, we denote this by v 〈 w. Topological sorting of the words in a dictionary means arranging\nthem in an order such that there will be no forward references.\n2. A task (e.g., an engineering project) is broken up into subtasks. Completion of certain subtasks must\nusually precede the execution of other subtasks. If a subtask v must precede a subtask w, we write v 〈\nits prerequisite subtasks have been completed.\n3. In a university curriculum, certain courses must be taken before others since they rely on the material\npresented in their prerequisites. If a course v is a prerequisite for course w, we write v 〈 w. Topological\nsorting means arranging the courses in such an order that no course lists a later course as prerequisite.\n4. In a program, some procedures may contain calls of other procedures. If a procedure v is called by a\nprocedure w, we write v 〈 w. Topological sorting implies the arrangement of procedure declarations in\nsuch a way that there are no forward references.\nIn general, a partial ordering of a set S is a relation between the elements of S. It is denoted by the symbol\n“〈”, verbalized by precedes, and satisfies the following three properties (axioms) for any distinct elements\nx, y, z of S:\n1. if x 〈 y and y 〈 z, then x 〈 z (transitivity)\n2. if x 〈 y, then not y 〈 x (asymmetry)\n3. not z 〈 z (irreflexivity)\nFor evident reasons, we will assume that the sets S to be topologically sorted by an algorithm are finite.\nHence, a partial ordering can be illustrated by drawing a diagram or graph in which the vertices denote the\nelements of S and the directed edges represent ordering relationships. An example is shown in Fig. 4.13.\n\n1 10\n\n8 9\n\nFig. 4.13. Partially ordered set\n\nThe problem of topological sorting is to embed the partial order in a linear order. Graphically, this implies\nthe arrangement of the vertices of the graph in a row, such that all arrows point to the right, as shown in\nFig. 4.14. Properties (1) and (2) of partial orderings ensure that the graph contains no loops. This is\nexactly the prerequisite condition under which such an embedding in a linear order is possible.\n\n7 9 1 2 4 6 3 5 8 10\n\nFig. 4.14. Linear arrangement of the partially ordered set of Fig. 4.13.\nHow do we proceed to find one of the possible linear orderings? The recipe is quite simple. We start by\nchoosing any item that is not preceded by another item (there must be at least one; otherwise a loop would\nexist). This object is placed at the head of the resulting list and removed from the set S. The remaining set\nis still partially ordered, and so the same algorithm can be applied again until the set is empty.\nIn order to describe this algorithm more rigorously, we must settle on a data structure and representation\nof S and its ordering. The choice of this representation is determined by the operations to be performed,\nparticularly the operation of selecting elements with zero predecessors. Every item should therefore be\nrepresented by three characteristics: its identification key, its set of successors, and a count of its\npredecessors. Since the number n of elements in S is not given a priori, the set is conveniently organized\nas a linked list. Consequently, an additional entry in the description of each item contains the link to the\nnext item in the list. We will assume that the keys are integers (but not necessarily the consecutive\nintegers from 1 to n). Analogously, the set of each item's successors is conveniently represented as a\nlinked list. Each element of the successor list is described by an identification and a link to the next item\non this list. If we call the descriptors of the main list, in which each item of S occurs exactly once, leaders,\nand the descriptors of elements on the successor chains trailers, we obtain the following declarations of\ndata types:\nTYPE Leader = POINTER TO LeaderDesc;\nTrailer = POINTER TO TrailerDesc;\nLeaderDesc = RECORD key, count: INTEGER;\ntrail: Trailer; next: Leader\nTrailerDesc = RECORD id: Leader; next: Trailer\n\nAssume that the set S and its ordering relations are initially represented as a sequence of pairs of keys in\nthe input file. The input data for the example in Fig. 4.13 are shown below, in which the symbols 〈 are\nadded for the sake of clarity, symbolizing partial order:\n1 〈2 2 〈4 4 〈6 2 〈 10 4 〈8 6 〈3 1 〈3\n3 〈5 5 〈8 7 〈5 7 〈9 9 〈4 9 〈 10\nThe first part of the topological sort program must read the input and transform the data into a list\nstructure. This is performed by successively reading a pair of keys x and y (x 〈 y). Let us denote the\npointers to their representations on the linked list of leaders by p and q. These records must be located by\na list search and, if not yet present, be inserted in the list. This task is perfomed by a function procedure\ncalled find. Subsequently, a new entry is added in the list of trailers of x, along with an identification of y;\nthe count of predecessors of y is incremented by 1. This algorithm is called input phase. Figure 4.15\nillustrates the data structure generated during processing the given input data. The function find(w) yields\nthe pointer to the list element with key w.\nIn the following poece of program we make use of text scanning, a feature of the Oberon system’s text\nconcept. Instead of considering a text (file) as a sequence of characters, a text is considered as a sequence\nof tokens, which are identifiers, numbers, strings, and special characters (such as +, *, <, etc. The\nprocedure Texts.Scan(S) scans the text, reading the next token. The scanner S plays the role of a text rider.\n(*input phase*)\nNEW(head); tail := head; z := 0; Texts.Scan(S);\nWHILE S.class = Texts.Int DO\nx := S.i; Texts.Scan(S); y := S.i; p := find(x); q := find(y);\nNEW(t); t.id := q; t.next := p.trail;\np.trail := t; INC(q.count); Texts.Scan(S)\n\nhead tail\n\nkey 1 2 4 6 10 8 3 5 7 9\ncount 0 1 2 1 2 2 2 2 0 1\n\n\n\nFig. 4.15. List structure generated by TopSort program\n\nAfter the data structure of Fig. 4.15 has been constructed in this input phase, the actual process of\ntopological sorting can be taken up as described above. But since it consists of repeatedly selecting an\nelement with a zero count of predecessors, it seems sensible to first gather all such elements in a linked\nchain. Since we note that the original chain of leaders will afterwards no longer be needed, the same field\ncalled next may be used again to link the zero predecessor leaders. This operation of replacing one chain\nby another chain occurs frequently in list processing. It is expressed in detail here, and for reasons of\nconvenience it constructs the new chain in reverse order.\n\n(*search for leaders without predecessors*)\n\np := head; head := NIL;\nWHILE p # tail DO\nq := p; p := q.next;\nIF q.count = 0 THEN (*insert q^ in new chain*)\nq.next := head; head := q\nReferring to Fig. 4.15, we see that the next chain of leaders is replaced by the one of Fig. 4.16 in which\nthe pointers not depicted are left unchanged.\n\n1 7\n\n0 0 head\n\n\nFig. 4.16. List of Leaders with zero count\n\nAfter all this preparatory establishing of a convenient representation of the partially ordered set S, we can\nfinally proceed to the actual task of topological sorting, i.e., of generating the output sequence. In a first\nrough version it can be described as follows:\nq := head;\nWHILE q # NIL DO (*output this element, then delete it*)\nTexts.WriteInt(W, q.key, 8); DEC(n);\nt := q.trail; q := q.next;\ndecrement the predecessor count of all its successors\non trailer list t; if any count becomes 0, insert this\nelement in the leader list q\nThe statement that is to be still further refined constitutes one more scan of a list. In each step, the\nauxiliary variable p designates the leader element whose count has to be decremented and tested.\np := t.id; DEC(p.count);\nIF p.count = 0 THEN (*insert p^ in leader list*) p.next := q; q := p END ;\nt := t.next\nThis completes the program for topological sorting. Note that a counter n was introduced to count the\nleaders generated in the input phase. This count is decremented each time a leader element is output in the\noutput phase. It should therefore return to zero at the end of the program. Its failure to return to zero is an\nindication that there are elements left in the structure when none is without predecessor. In this case the\nset S is evidently not partially ordered. The output phase programmed above is an example of a process\nthat maintains a list that pulsates, i.e., in which elements are inserted and removed in an unpredictable\norder. It is therefore an example of a process which utilizes the full flexibility offered by the explicitly\nlinked list.\nVAR head, tail: Leader; n: INTEGER;\n\nPROCEDURE find(w: INTEGER): Leader;\n\nVAR h: Leader;\nBEGIN h := head; tail.key := w; (*sentinel*)\n\nWHILE h.key # w DO h := h.next END ;\n\nIF h = tail THEN\nNEW(tail); INC(n);\nh.count := 0; h.trail := NIL; h.next := tail\nEND find;\nPROCEDURE TopSort(VAR R: Texts.Reader);\nVAR p, q: Leader; t: Trailer; (*uses global writer W*)\nx, y, n: INTEGER;\nBEGIN (*initialize list of leaders with a dummy acting as sentinel*)\nNEW(head); tail := head; n := 0;\nTexts.ReadInt(R, x); (*input phase*)\nTexts.WriteInt(W, x, 8); Texts.ReadInt(R, y); Texts.WriteInt(W, y, 8);\np.trail := t; INC(q.count); Texts.ReadInt(R, x);\n(*search for leaders without predecessors*)\np := head; head := NIL;\nWHILE p # tail DO\nq := p; p := q.next;\nIF q.count = 0 THEN (*insert q in new chain*) q.next := head; head := q END\n(*output phase*) q := head;\nTexts.WriteLn(W); Texts.WriteInt(W, q.key, 8); DEC(n);\nt := q.trail; q := q.next;\np := t.id; DEC(p.count);\nIF p.count = 0 THEN (*insert p in leader list*) p.next := q; q := p END ;\nt := t.next\nIF n # 0 THEN Texts.WriteString(W, \"This set is not partially ordered\") END ;\nEND TopSort.\n\n4.4 Tree Structures\n\n4.4.1. Basic Concepts and Definitions\nWe have seen that sequences and lists may conveniently be defined in the following way: A sequence\n(list) with base type T is either\n1. The empty sequence (list).\n2. The concatenation (chain) of a T and a sequence with base type T.\nHereby recursion is used as an aid in defining a structuring principle, namely, sequencing or iteration.\nSequences and iterations are so common that they are usually considered as fundamental patterns of\nstructure and behaviour. But it should be kept in mind that they can be defined in terms of recursion,\nwhereas the reverse is not true, for recursion may be effectively and elegantly used to define much more\nsophisticated structures. Trees are a well-known example. Let a tree structure be defined as follows: A\ntree structure with base type T is either\n\n1. The empty structure.\n\n2. A node of type T with a finite number of associated disjoint tree structures of base type T, called\nFrom the similarity of the recursive definitions of sequences and tree structures it is evident that the\nsequence (list) is a tree structure in which each node has at most one subtree. The list is therefore also\ncalled a degenerate tree.\nThere are several ways to represent a tree structure. For example, a tree structure with its base type T\nranging over the letters is shown in various ways in Fig. 4.17. These representations all show the same\nstructure and are therefore equivalent. It is the graph structure that explicitly illustrates the branching\nrelationships which, for obvious reasons, led to the generally used name tree. Strangely enough, it is\ncustomary to depict trees upside down, or -- if one prefers to express this fact differently -- to show the\nroots of trees. The latter formulation, however, is misleading, since the top node (A) is commonly called\nthe root.\n\n\nb) (A(B(D(I),E(J,K,L)),C(F(O),G(M,N),H(P))))\n\nc) P\n\n\n\n\nFig. 4.17. Representation of tree structure by (a) nested sets,\n\n(b) nested parentheses, (c) indented text, and (d) graph\nAn ordered tree is a tree in which the branches of each node are ordered. Hence the two ordered trees in\nFig. 4.18 are distinct, different objects. A node y that is directly below node x is called a (direct)\ndescendant of x; if x is at level i, then y is said to be at level i+1. Conversely, node x is said to be the\n(direct) ancestor of y. The root of a tree is defined to be at level 0. The maximum level of any element of\na tree is said to be its depth or height.\n\n\n\nFig. 4.18. Two distinct trees\n\n\nIf an element has no descendants, it is called a terminal node or a leaf; and an element that is not terminal\nis an interior node. The number of (direct) descendants of an interior node is called its degree. The\nmaximum degree over all nodes is the degree of the tree. The number of branches or edges that have to be\ntraversed in order to proceed from the root to a node x is called the path length of x. The root has path\nlength 0, its direct descendants have path length 1, etc. In general, a node at level i has path length i. The\npath length of a tree is defined as the sum of the path lengths of all its components. It is also called its\ninternal path length. The internal path length of the tree shown in Fig. 4.17, for instance, is 36. Evidently,\nthe average path length is\nP int = ( Si: 1 ≤ i ≤ n: ni×i) / n\nwhere n i is the number of nodes at level i. In order to define what is called the external path length, we\nextend the tree by a special node wherever a subtree was missing in the original tree. In doing so, we\nassume that all nodes are to have the same degree, namely the degree of the tree. Extending the tree in this\nway therefore amounts to filling up empty branches, whereby the special nodes, of course, have no further\ndescendants. The tree of Fig. 4.17 extended with special nodes is shown in Fig. 4.19 in which the special\nnodes are represented by squares. The external path length is now defined as the sum of the path lengths\nover all special nodes. If the number of special nodes at level i is mi, then the average external path length\nP ext = (Si: 1 ≤ i ≤ mi×i) / m\n\n\n\n\nFig. 4.19. Ternary tree extended with special nodes\n\nIn the tree shown in Fig. 4.19 the external path length is 120. The number of special nodes m to be added\nin a tree of degree d directly depends on the number n of original nodes. Note that every node has exactly\none edge pointing to it. Thus, there are m+n edges in the extended tree. On the other hand, d edges are\nemanating from each original node, none from the special nodes. Therefore, there exist d*n + 1 edges, the\n1 resulting from the edge pointing to the root. The two results yield the following equation between the\nnumber m of special nodes and n of original nodes: d×n + 1 = m+n, or\nm = (d-1)×n + 1\nThe maximum number of nodes in a tree of a given height h is reached if all nodes have d subtrees, except\nthose at level h, all of which have none. For a tree of degree d, level 0 then contains 1 node (namely, the\nroot), level 1 contains its d descendants, level 2 contains the d2 descendants of the d nodes at level 2, etc.\nThis yields\nN d(h) = Si: 0 ≤ i < h: d i\nas the maximum number of nodes for a tree with height h and degree d. For d = 2, we obtain\nN 2(h) = 2 h - 1\n\nOf particular importance are the ordered trees of degree 2. They are called binary trees. We define an\nordered binary tree as a finite set of elements (nodes) which either is empty or consists of a root (node)\nwith two disjoint binary trees called the left and the right subtree of the root. In the following sections we\nshall exclusively deal with binary trees, and we therefore shall use the word tree to mean ordered binary\ntree. Trees with degree greater than 2 are called multiway trees and are discussed in Sect. 7 of this\nFamiliar examples of binary trees are the family tree (pedigree) with a person's father and mother as\ndescendants (!), the history of a tennis tournament with each game being a node denoted by its winner and\nthe two previous games of the combatants as its descendants, or an arithmetic expression with dyadic\noperators, with each operator denoting a branch node with its operands as subtrees (see Fig. 4.20).\n\n+ -\n\na / d *\n\nb c e f\n\nFig. 4.20. Tree representation of expression (a + b/c) * (d – e*f)\n\nWe now turn to the problem of representation of trees. It is plain that the illustration of such recursive\nstructures in terms of branching structures immediately suggests the use of our pointer facility. There is\nevidently no use in declaring variables with a fixed tree structure; instead, we define the nodes as\nvariables with a fixed structure, i.e., of a fixed type, in which the degree of the tree determines the number\nof pointer components referring to the node's subtrees. Evidently, the reference to the empty tree is\ndenoted by NIL. Hence, the tree of Fig. 4.20 consists of components of a type defined as follows and may\nthen be constructed as shown in Fig. 4.21.\nTYPE Node = POINTER TO NodeDesc;\nTYPE NodeDesc = RECORD op: CHAR; left, right: Node END\n\nroot *\n\n+ -\n\na / d *\n\nb c e f\n\nFig. 4.21. Tree of Fig. 4.21 represented as linked data structure\n\n\nBefore investigating how trees might be used advantageously and how to perform operations on trees, we\ngive an example of how a tree may be constructed by a program. Assume that a tree is to be generated\ncontaining nodes with the values of the nodes being n numbers read from an input file. In order to make\nthe problem more challenging, let the task be the construction of a tree with n nodes and minimal height.\nIn order to obtain a minimal height for a given number of nodes, one has to allocate the maximum\npossible number of nodes of all levels except the lowest one. This can clearly be achieved by distributing\nincoming nodes equally to the left and right at each node. This implies that we structure the tree for given\nn as shown in Fig. 4.22, for n = 1, ... , 7.\n\nn=1 n=2 n=3\n\nn=4 n=5 n=6\n\n\nFig. 4.22. Perfectly balanced trees\n\nThe rule of equal distribution under a known number n of nodes is best formulated recursively:\n1. Use one node for the root.\n2. Generate the left subtree with nl = n DIV 2 nodes in this way.\n3. Generate the right subtree with nr = n - nl - 1 nodes in this way.\nThe rule is expressed as a recursive procedure which reads the input file and constructs the perfectly\nbalanced tree. We note the following definition: A tree is perfectly balanced, if for each node the\nnumbers of nodes in its left and right subtrees differ by at most 1.\nkey: INTEGER; left, right: Node\nVAR R: Texts.Reader; W: Texts.Writer; root: Node;\nVAR new: Node;\nx, nl, nr: INTEGER;\nBEGIN (*construct perfectly balanced tree with n nodes*)\nIF n = 0 THEN new := NIL\nELSE nl := n DIV 2; nr := n-nl-1;\nNEW(new); Texts.ReadInt(R, new.key);\nnew.key := x; new.left := tree(nl); new.right := tree(nr)\nEND tree;\nPROCEDURE PrintTree(t: Node; h: INTEGER);\n\nBEGIN (*print tree t with indentation h*)\n\nPrintTree(t.left, h+1);\nFOR i := 1 TO h DO Texts.Write(W, TAB) END ;\nTexts.WriteInt(W, key, 6); Texts.WriteLn(W);\nPrintTree(t.right, h+1)\nEND PrintTree;\nAssume, for example, the following input data for a tree with 21 nodes:\n8 9 11 15 19 20 21 7 3 2 1 5 6 4 13 14 10 12 17 16 18\nThe call root := tree(21) reads the input dara while constructing the perfectly balanced tree shown in Fig.\n4.23. Note the simplicity and transparency of this program that is obtained through the use of recursive\nprocedures. It is obvious that recursive algorithms are particularly suitable when a program is to\nmanipulate information whose structure is itself defined recursively. This is again manifested in the\nprocedure which prints the resulting tree: The empty tree results in no printing, the subtree at level L in\nfirst printing its own left subtree, then the node, properly indented by preceding it with L tabs, and finally\nin printing its right subtree.\n\n9 5\n\n11 7 6 12\n\n15 20 3 1 4 14 17 18\n\n19 21 2 13 10 16\n\nFig. 4.23. Tree generated by preceding program\n\n4.4.2. Basic\nOperations on Binary Trees\nThere are many tasks that may have to be perfomed on a tree structure; a common one is that of executing\na given operation P on each element of the tree. P is then understood to be a parameter of the more\ngeneral task of visting all nodes or, as it is usually called, of tree traversal. If we consider the task as a\nsingle sequential process, then the individual nodes are visited in some specific order and may be\nconsidered as being laid out in a linear arrangement. In fact, the description of many algorithms is\nconsiderably facilitated if we can talk about processing the next element in the tree based in an underlying\norder. There are three principal orderings that emerge naturally from the structure of trees. Like the tree\nstructure itself, they are conveniently expressed in recursive terms. Referring to the binary tree in Fig.\n4.24 in which R denotes the root and A and B denote the left and right subtrees, the three orderings are\n1. Preorder: R, A, B (visit root before the subtrees)\n2. Inorder: A, R, B\n3. Postorder: A, B, R (visit root after the subtrees)\n\n\nFig. 4.24. Binary tree\n\nTraversing the tree of Fig. 4.20 and recording the characters seen at the nodes in the sequence of\nencounter, we obtain the following orderings:\n1. Preorder: *+a/bc-d*ef\n2. Inorder: a+b/c*d-e* f\n3. Postorder: abc/+ def*-*\nWe recognize the three forms of expressions: preorder traversal of the expression tree yields prefix\nnotation; postorder traversal generates postfix notation; and inorder traversal yields conventional infix\nnotation, although without the parentheses necessary to clarify operator precedences.\nLet us now formulate the three methods of traversal by three concrete programs with the explicit\nparameter t denoting the tree to be operated upon and with the implicit parameter P denoting the operation\nto be performed on each node. Assume the following definitions:\nTYPE Node = POINTER TO RECORD ... left, right: Node END\nThe three methods are now readily formulated as recursive procedures; they demonstrate again the fact\nthat operations on recursively defined data structures are most conveniently defined as recursive\nPROCEDURE preorder(t: Node);\nP(t); preorder(t.left); preorder(t.right)\nEND preorder\nPROCEDURE inorder(t: Node);\ninorder(t.left); P(t); inorder(t.right)\nEND inorder\nPROCEDURE postorder(t: Node);\npostorder(t.left); postorder(t.right); P(t)\nEND postorder\nNote that the pointer t is passed as a value parameter. This expresses the fact that the relevant entity is the\nreference to the considered subtree and not the variable whose value is the pointer, and which could be\nchanged in case t were passed as a variable parameter.\nAn example of a tree traversal routine is that of printing a tree, with appropriate indentation indicating\neach node's level.\n\nBinary trees are frequently used to represent a set of data whose elements are to be retrievable through a\nunique key. If a tree is organized in such a way that for each node ti, all keys in the left subtree of ti are\nless than the key of ti, and those in the right subtree are greater than the key of ti, then this tree is called a\nsearch tree. In a search tree it is possible to locate an arbitrary key by starting at the root and proceeding\nalong a search path switching to a node's left or right subtree by a decision based on inspection of that\nnode's key only. As we have seen, n elements may be organized in a binary tree of a height as little as log\nn. Therefore, a search among n items may be performed with as few as log n comparsions if the tree is\nperfectly balanced. Obviously, the tree is a much more suitable form for organizing such a set of data than\nthe linear list used in the previous section. As this search follows a single path from the root to the desired\nnode, it can readily be programmed by iteration:\nPROCEDURE locate(x: INTEGER; t: Node): Node;\nWHILE (t # NIL) & (t.key # x) DO\nIF t.key < x THEN t := t.right ELSE t := t.left END\nEND locate\nThe function locate(x, t) yields the value NIL, if no key with value x is found in the tree with root t. As in\nthe case of searching a list, the complexity of the termination condition suggests that a better solution may\nexist, namely the use of a sentinel. This technique is equally applicable in the case of a tree. The use of\npointers makes it possible for all branches of the tree to terminate with the same sentinel. The resulting\nstructure is no longer a tree, but rather a tree with all leaves tied down by strings to a single anchor point\n(Fig. 4.25). The sentinel may be considered as a common, shared representative of all external nodes by\nwhich the original tree was extended (see Fig. 4.19):\nPROCEDURE locate(x: INTEGER; t: Ptr): Ptr;\nBEGIN s.key := x; (*sentinel*)\nWHILE t.key # x DO\nEND locate\nNote that in this case locate(x, t) yields the value s instead of NIL, i.e., the pointer to the sentinel, if no\n\nt 4\n\n2 5\n\n1 3 6\n\nFig. 4.25. Search tree with sentinel\n\n\n4.4.3. Tree Search and Insertion\n\nThe full power of the dynamic allocation technique with access through pointers is hardly displayed by\nthose examples in which a given set of data is built, and thereafter kept unchanged. More suitable\nexamples are those applications in which the structure of the tree itself varies, i.e., grows and/or shrinks\nduring the execution of the program. This is also the case in which other data representations, such as the\narray, fail and in which the tree with elements linked by pointers emerges as the most appropriate\nWe shall first consider only the case of a steadily growing but never shrinking tree. A typical example is\nthe concordance problem which was already investigated in connection with linked lists. It is now to be\nrevisited. In this problem a sequence of words is given, and the number of occurrences of each word has\nto be determined. This means that, starting with an empty tree, each word is searched in the tree. If it is\nfound, its occurrence count is incremented; otherwise it is inserted as a new word (with a count initialized\nto 1). We call the underlying task tree search with insertion. The following data type definitions are\nkey, count: INTEGER;\nleft, right: Node\nFinding the search path is again straightforward. However, if it leads to a dead end (i.e., to an empty\nsubtree designated by a pointer value NIL), then the given word must be inserted in the tree at the place of\nthe empty subtree. Consider, for example, the binary tree shown in Fig. 4.26 and the insertion of the name\nPaul. The result is shown in dotted lines in the same picture.\n\n\n\n\n\nFig. 4.26. Insertion in ordered binary tree\n\nThe search process is formulated as a recursive procedure. Note that its parameter p is a variable\nparameter and not a value parameter. This is essential because in the case of insertion a new pointer value\nmust be assigned to the variable which previously held the value NIL. Using the input sequence of 21\nnumbers that had been used above to construct the tree of Fig. 4.23, the search and insertion procedure\nyields the binary tree shown in Fig. 4.27, with a call search(k, root) for each key k, where root is a\nvariable of type Node.\n\n7 9\n\n3 11\n\n10 15\n2 5\n\n13 19\n1 4 6\n\n12 14 17 20\n\n16 18 21\n\nFig. 4.27. Search tree generated by preceding program\n\nPROCEDURE PrintTree(t: Node; h: INTEGER);\nBEGIN (*print tree t with indentation h*)\nPrintTree(t.left, h+1);\nTexts.WriteInt(W, t.key, 6); Texts.WriteLn(W);\nPrintTree(t.right, h+1)\nEND PrintTree;\nPROCEDURE search(x: INTEGER; VAR p: Node);\nIF p = NIL THEN (*x not in tree; insert*)\nNEW(p); p.key := x; p.count := 1; p.left := NIL; p.right := NIL\nELSIF x < p.key THEN search(x, p.left)\nELSIF x > p.key THEN search(x, p.right)\nELSE INC(p.count)\nEND search;\nThe use of a sentinel again simplifies the task somewhat. Clearly, at the start of the program the variable\nroot must be initialized by the pointer to the sentinel instead of the value NIL, and before each search the\nspecified value x must be assigned to the key field of the sentinel.\nIF x < p.key THEN search(x, p.left)\nELSIF x > p^key THEN search(x, p.right)\nELSIF p # s THEN INC(p.count)\nELSE (*insert*) NEW(p);\np.key := x; p.left := s; p.right := s; p.count := 1\nAlthough the purpose of this algorithm is searching, it can be used for sorting as well. In fact, it resembles\nthe sorting by insertion method quite strongly, and because of the use of a tree structure instead of an\narray, the need for relocation of the components above the insertion point vanishes. Tree sorting can be\n\nprogrammed to be almost as efficient as the best array sorting methods known. But a few precautions\nmust be taken. After encountering a match, the new element must also be inserted. If the case x = p.key is\nhandled identically to the case x > p.key, then the algorithm represents a stable sorting method, i.e., items\nwith identical keys turn up in the same sequence when scanning the tree in normal order as when they\nwere inserted.\nIn general, there are better ways to sort, but in applications in which searching and sorting are both\nneeded, the tree search and insertion algorithm is strongly recommended. It is, in fact, very often applied\nin compilers and in data banks to organize the objects to be stored and retrieved. An appropriate example\nis the construction of a cross-reference index for a given text, an example that we had already used to\nillustrate list generation.\nOur task is to construct a program that (while reading a text and printing it after supplying consecutive\nline numbers) collects all words of this text, thereby retaining the numbers of the lines in which each word\noccurred. When this scan is terminated, a table is to be generated containing all collected words in\nalphabetical order with lists of their occurrences.\nObviously, the search tree (also called a lexicographic tree) is a most suitable candidate for representing\nthe words encountered in the text. Each node now not only contains a word as key value, but it is also the\nhead of a list of line numbers. We shall call each recording of an occurrence an item. Hence, we\nencounter both trees and linear lists in this example. The program consists of two main parts (see Program\n4.5), namely, the scanning phase and the table printing phase. The latter is a straightforward application of\na tree traversal routine in which visiting each node implies the printing of the key value (word) and the\nscanning of its associated list of line numbers (items). The following are further clarifications regarding\nthe Cross Reference Generator listed below. Table 4.4 shows the results of processing the text of the\npreceding procedure search.\n1. A word is considered as any sequence of letters and digits starting with a letter.\n2. Since words may be of widely different lengths, the actual characters are stored in an array buffer,\nand the tree nodes contain the index of the key's first character.\n3. It is desirable that the line numbers be printed in ascending order in the cross-reference index.\nTherefore, the item lists must be generated in the same order as they are scanned upon printing. This\nrequirement suggests the use of two pointers in each word node, one referring to the first, and one\nreferring to the last item on the list. We assume the existence of global writer W, and a variable\nrepresenting the current line number in the text.\nCONST WordLen = 32;\nlno: INTEGER; next: Item\nkey: Word;\nfirst, last: Item; (*list*)\nleft, right: Node (*tree*)\nPROCEDURE search(VAR w: Node; VAR a: Word);\nVAR q: Item;\nIF w = NIL THEN (*word not in tree; new entry, insert*)\nNEW(w); NEW(q); q.lno := line;\nCOPY(a, w.key); w.first := q; w.last := q; w.left := NIL; w.right := NIL\nELSIF w.key < a THEN search(w.right, a)\nELSIF w.key > a THEN search(w.left, a)\n\nELSE (*old entry*) NEW(q); q.lno := line; w.last.next := q; w.last := q\n\nEND search;\nPROCEDURE Tabulate(w: Node);\nVAR m: INTEGER; item: Item;\nTexts.WriteString(W, w.key); item := w.first; m := 0;\nIF m = 10 THEN Texts.WriteLn(W); Texts.Write(W, TAB); m := 0; END ;\nINC(m); Texts.WriteInt(W, item.lno, 6); item := item.next\nUNTIL item = NIL;\nEND Tabulate;\n\nPROCEDURE CrossRef(VAR R: Texts.Reader);\n\nVAR root: Node; (*uses global writer W*)\n\ni: INTEGER; ch: CHAR; w: Word;\n\nBEGIN root := NIL; line := 0;\nTexts.WriteInt(W, 0, 6); Texts.Write(W, TAB); Texts.Read(R, ch);\nIF ch = 0DX THEN (*line end*) Texts.WriteLn(W);\nINC(line); Texts.WriteInt(W, line, 6); Texts.Write(W, 9X); Texts.Read(R, ch)\nELSIF (\"A\" <= ch) & (ch <= \"Z\") OR (\"a\" <= ch) & (ch <= \"z\") THEN\ni := 0;\nIF i < WordLen-1 THEN w[i] := ch; INC(i) END ;\nTexts.Write(W, ch); Texts.Read(R, ch)\nUNTIL (i = WordLen-1) OR ~((\"A\" <= ch) & (ch <= \"Z\")) &\n~((\"a\" <= ch) & (ch <= \"z\")) & ~((\"0\" <= ch) & (ch <= \"9\"));\nw[i] := 0X; (*string terminator*)\nsearch(root, w)\nELSE Texts.Write(W, ch); Texts.Read(R, ch)\nTexts.WriteLn(W); Texts.WriteLn(W); Tabulate(root)\nEND CrossRef;\n\n0 PROCEDURE search(x: INTEGER; VAR p: Node);\n\n2 IF x < p.key THEN search(x, p.left)\n3 ELSIF x > p^key THEN search(x, p.right)\n4 ELSIF p # s THEN INC(p.count)\n5 ELSE (*insert*) NEW(p);\n\n\nEND 7 8\nIF 2\nNode 0\nTHEN 2 3 4\ncount 4 6\ninsert 5\nkey 2 3 6\nleft 2 6\np 0 2 2 3 3 4 4 5 6 6\n6 6\nright 3 6\ns 4 6 6\nsearch 0 2 3\nx 0 2 2 3 3 6\n\nTable 4.4 Sample output of cross reference generator\n\n4.4.4. Tree Deletion\n\nWe now turn to the inverse problem of insertion: deletion. Our task is to define an algorithm for deleting,\ni.e., removing the node with key x in a tree with ordered keys. Unfortunately, removal of an element is\nnot generally as simple as insertion. It is straightforward if the element to be deleted is a terminal node or\none with a single descendant. The difficulty lies in removing an element with two descendants, for we\ncannot point in two directions with a single pointer. In this situation, the deleted element is to be replaced\nby either the rightmost element of its left subtree or by the leftmost node of its right subtree, both of\nwhich have at most one descendant. The details are shown in the recursive procedure delete. This\nprocedure distinguishes among three cases:\n1. There is no component with a key equal to x.\n2. The component with key x has at most one descendant.\n3. The component with key x has two descendants.\nPROCEDURE delete(x: INTEGER; VAR p: Node);\nVAR q: Node;\nPROCEDURE del (VAR r: Node);\nIF r.right # NIL THEN del(r.right)\nELSE q.key := r.key; q.count := r.count;\nq := r; r := r.left\nEND del;\nBEGIN (*delete*)\nIF p = NIL THEN (*word is not in tree*)\nELSIF x < p.key THEN delete(x, p.left)\nELSIF x > p.key THEN delete(x, p.right)\nELSE (*delete p^*) q := p;\nIF q.right = NIL THEN p := q.left\nELSIF q.left = NIL THEN p := q.right\nELSE del(q.left)\n\nEND delete\nThe auxiliary, recursive procedure del is activated in case 3 only. It descends along the rightmost branch\nof the left subtree of the element q^ to be deleted, and then it replaces the relevant information (key and\ncount) in q^ by the corresponding values of the rightmost component r^ of that left subtree, whereafter t^\nmay be disposed.\nWe note that we do not mention a procedure that would be the inverse of NEW, indicating that storage is\nno longer needed and therefore disposable and reusable. It is generally assumed that a computer system\nrecognizes a disposable variable through the circumstance that no other variables are pointing to it, and\nthat it therefore can no longer be referenced. Such a system is called a garbage collector. It is not a\nfeature of a programming language, but rather of its implementations.\nIn order to illustrate the functioning of procedure delete, we refer to Fig. 4.28. Consider the tree (a); then\ndelete successively the nodes with keys 13, 15, 5, 10. The resulting trees are shown in Fig. 4.28 (b-e).\n\na) 10 b) 10\n\n5 15 5 15\n\n3 8 13 18 3 8 18\n\nc) 10 d) 10 e) 10\n\n5 18 3 18 3 18\n\n3 8 8\n\nFig. 4.28. Tree deletion\n\n4.4.5. Analysis of Tree Search and Insertion\nIt is a natural reaction to be suspicious of the algorithm of tree search and insertion. At least one should\nretain some skepticism until having been given a few more details about its behaviour. What worries\nhave no idea about the shape that it will assume. We can only guess that it will most probably not be the\nperfectly balanced tree. Since the average number of comparisons needed to locate a key in a perfectly\nbalanced tree with n nodes is approximately log n, the number of comparisons in a tree generated by this\nalgorithm will be greater. But how much greater?\nFirst of all, it is easy to find the worst case. Assume that all keys arrive in already strictly ascending (or\ndescending) order. Then each key is appended immediately to the right (left) of its predecessor, and the\nresulting tree becomes completely degenerate, i.e., it turns out to be a linear list. The average search effort\nis then n/2 comparisons. This worst case evidently leads to a very poor performance of the search\nalgorithm, and it seems to fully justify our skepticism. The remaining question is, of course, how likely\nthis case will be. More precisely, we should like to know the length an of the search path averaged over all\nn keys and averaged over all n! trees that are generated from the n! permutations of the original n distinct\nkeys. This problem of algorithmic analysis turns out to be fairly straightforward, and it is presented here\nas a typical example of analyzing an algorithm as well as for the practical importance of its result.\n\nGiven are n distinct keys with values 1, 2, ... , n. Assume that they arrive in a random order. The\nprobability of the first key -- which notably becomes the root node -- having the value i is 1/n. Its left\nsubtree will eventually contain i-1 nodes, and its right subtree n-i nodes (see Fig. 4.29). Let the average\npath length in the left subtree be denoted by ai-1, and the one in the right subtree is an-i, again assuming\nthat all possible permutations of the remaining n-1 keys are equally likely. The average path length in a\ntree with n nodes is the sum of the products of each node's level and its probability of access. If all nodes\nare assumed to be searched with equal likelihood, then\nan = (Si: 1 ≤ i ≤ n: p i) / n\nwhere p i is the path length of node i.\n\ni-1 n-i\n\nFig. 4.29. Weight distribution of branches\n\nIn the tree in Fig. 4.29 we divide the nodes into three classes:\n1. The i-1 nodes in the left subtree have an average path length ai-1\n2. The root has a path length of 0.\n3. The n-i nodes in the right subtree have an average path length an-i\nHence, the equation above can be expressed as a sum of two terms 1) and 3)\nan(i) = ((i-1) * ai-1 + (n-i) * an-i) / n\nThe desired quantity an is the average of an(i) over all i = 1 ... n, i.e., over all trees with the key 1, 2, ... , n\nat the root.\nan = (Si: 1 ≤ i ≤ n: (i-1) ai-1 + (n-i) an-i) / n2\n= 2 * (Si: 1 ≤ i ≤ n: (i-1) ai-1) / n2\n= 2 * (Si: 1 ≤ i < n: i * ai) / n 2\nThis equation is a recurrence relation of the form an = f1(a1, a2, ... , an-1). From this we derive a simpler\nrecurrence relation of the form an = f2(an-1). We derive directly (1) by splitting off the last term, and (2)\nby substituting n-1 for n:\n(1) an = 2*(n-1 * an-1 /n 2 + 2 * (Si: 1 ≤ i < n: i * ai) / n2\n(2) an-1 = 2 * (Si: 1 ≤ i < n-1: i * ai) / (n-1)2\nMultiplying (2) by (n-1)2/n2 yields\n(3) 2 * (Si: 1 ≤ i < n-1: i * ai) / n2 = an-1 ø2 * (n-1)2/n2\nand substituting the right part of (3) in (1), we find\nan = 2 * (n-1) * an-1 / n2 + an-1 * (n-1)2 / n2 = an-1 * (n-1)2 / n 2\nIt turns out that an can be expressed in non-recursive, closed form in terms of the harmonic sum\nHn = 1 + 1/2 + 1/3 + … + 1/n\nan = 2 * (Hn * (n+1)/n – 1)\nFrom Euler's formula (using Euler's constant g = 0.577...)\n\nHn = g + ln n + 1/12n2 + ...\nwe derive, for large n, the approximate value\nan = 2 * (ln n + g - 1)\nSince the average path length in the perfectly balanced tree is approximately\nan' = log n - 1\nwe obtain, neglecting the constant terms which become insignificant for large n,\nlim (an/an’) = 2 * ln(n) / log(n) = 2 ln(2) = 1.386...\nWhat does this result teach us? It tells us that by taking the pains of always constructing a perfectly\nbalanced tree instead of the random tree, we could -- always provided that all keys are looked up with\nequal probability -- expect an average improvement in the search path length of at most 39%. Emphasis is\nto be put on the word average, for the improvement may of course be very much greater in the unhappy\ncase in which the generated tree had completely degenerated into a list, which, however, is very unlikely\nto occur. In this connection it is noteworthy that the expected average path length of the random tree\ngrows also strictly logarithmically with the number of its nodes, even though the worst case path length\ngrows linearly.\nThe figure of 39% imposes a limit on the amount of additional effort that may be spent profitably on any\nkind of reorganization of the tree's structure upon insertion of keys. Naturally, the ratio between the\nfrequencies of access (retrieval) of nodes (information) and of insertion (update) significantly influences\nthe payoff limits of any such undertaking. The higher this ratio, the higher is the payoff of a\nreorganization procedure. The 39% figure is low enough that in most applications improvements of the\nstraight tree insertion algorithm do not pay off unless the number of nodes and the access vs. insertion\nratio are large.\n\n4.5. Balanced Trees\n\nFrom the preceding discussion it is clear that an insertion procedure that always restores the trees'\nstructure to perfect balance has hardly any chance of being profitable, because the restoration of perfect\nbalance after a random insertion is a fairly intricate operation. Possible improvements lie in the\nformulation of less strict definitions of balance. Such imperfect balance criteria should lead to simpler tree\nreorganization procedures at the cost of only a slight deterioration of average search performance. One\nsuch definition of balance has been postulated by Adelson-Velskii and Landis [4-1]. The balance criterion\nis the following:\nA tree is balanced if and only if for every node the heights of its two subtrees differ by at most 1.\nTrees satisfying this condition are often called AVL-trees (after their inventors). We shall simply call\nthem balanced trees because this balance criterion appears a most suitable one. (Note that all perfectly\nbalanced trees are also AVL-balanced.)\nThe definition is not only simple, but it also leads to a manageable rebalancing procedure and an average\nsearch path length practically identical to that of the perfectly balanced tree. The following operations can\nbe performed on balanced trees in O(log n) units of time, even in the worst case:\n1. Locate a node with a given key.\n2. Insert a node with a given key.\n3. Delete the node with a given key.\nThese statements are direct consequences of a theorem proved by Adelson-Velskii and Landis, which\nguarantees that a balanced tree will never be more than 45% higher than its perfectly balanced\ncounterpart, no matter how many nodes there are. If we denote the height of a balanced tree with n nodes\nby hb(n), then\nlog(n+1) < hb(n) < 1.4404*log(n+2) - 0.328\n\nThe optimum is of course reached if the tree is perfectly balanced for n = 2k-1. But which is the structure\nof the worst AVL-balanced tree? In order to find the maximum height h of all balanced trees with n\nnodes, let us consider a fixed height h and try to construct the balanced tree with the minimum number of\nnodes. This strategy is recommended because, as in the case of the minimal height, the value can be\nattained only for certain specific values of n. Let this tree of height h be denoted by T h. Clearly, T0 is the\nempty tree, and T1 is the tree with a single node. In order to construct the tree Th for h > 1, we will\nprovide the root with two subtrees which again have a minimal number of nodes. Hence, the subtrees are\nalso T's. Evidently, one subtree must have height h-1, and the other is then allowed to have a height of\none less, i.e. h-2. Figure 4.30 shows the trees with height 2, 3, and 4. Since their composition principle\nvery strongly resembles that of Fibonacci numbers, they are called Fibonacci-trees (see Fig. 4.30). They\nare defined as follows:\n1. The empty tree is the Fibonacci-tree of height 0.\n2. A single node is the Fibonacci-tree of height 1.\n3. If Th-1 and Th-2 are Fibonacci-trees of heights h-1 and h-2, then\nTh = is a Fibonacci-tree.\n4. No other trees are Fibonacci-trees.\n\nT2 T3 T4\n2 3 5\n\n1 2 4 3 7\n\n1 2 4 6\n\nFig. 4.30. Fibonacci-trees of height 2, 3, and 4\n\nThe number of nodes of Th is defined by the following simple recurrence relation:\nN 0 = 0, N1 = 1\nN h = Nh-1 + 1 + Nh-2\nThe Ni are those numbers of nodes for which the worst case (upper limit of h) can be attained, and they\nare called Leonardo numbers.\n\n4.5.1. Balanced Tree Insertion\n\nLet us now consider what may happen when a new node is inserted in a balanced tree. Given a root r with\nthe left and right subtrees L and R, three cases must be distinguished. Assume that the new node is\ninserted in L causing its height to increase by 1:\n1. hL = h R: L and R become of unequal height, but the balance criterion is not violated.\n2. hL < h R: L and R obtain equal height, i.e., the balance has even been improved.\n3. hL > h R: the balance criterion is violated, and the tree must be restructured.\nConsider the tree in Fig. 4.31. Nodes with keys 9 and 11 may be inserted without rebalancing; the tree\nwith root 10 will become one-sided (case 1); the one with root 8 will improve its balance (case 2).\nInsertion of nodes 1, 3, 5, or 7, however, requires subsequent rebalancing.\n\n4 10\n\n2 6\n\nFig. 4.31. Balanced tree\n\nSome careful scrutiny of the situation reveals that there are only two essentially different constellations\nneeding individual treatment. The remaining ones can be derived by symmetry considerations from those\ntwo. Case 1 is characterized by inserting keys 1 or 3 in the tree of Fig. 4.31, case 2 by inserting nodes 5 or\nThe two cases are generalized in Fig. 4.32 in which rectangular boxes denote subtrees, and the height\nadded by the insertion is indicated by crosses. Simple transformations of the two structures restore the\ndesired balance. Their result is shown in Fig. 4.33; note that the only movements allowed are those\noccurring in the vertical direction, whereas the relative horizontal positions of the shown nodes and\nsubtrees must remain unchanged.\n\ncase 1 case 2\n\n\nFig. 4.32. Imbalance resulting from insertion\n\ncase 1 case 2\n\n\nFig. 4.33. Restoring the balance\n\nAn algorithm for insertion and rebalancing critically depends on the way information about the tree's\nbalance is stored. An extreme solution lies in keeping balance information entirely implicit in the tree\nstructure itself. In this case, however, a node's balance factor must be rediscovered each time it is affected\n\nby an insertion, resulting in an excessively high overhead. The other extreme is to attribute an explicitly\nstored balance factor to every node. The definition of the type Node is then extended into\nkey, count, bal: INTEGER; (*bal = -1, 0, +1*)\nleft, right: Node\nWe shall subsequently interpret a node's balance factor as the height of its right subtree minus the height\nof its left subtree, and we shall base the resulting algorithm on this node type. The process of node\ninsertion consists essentially of the following three consecutive parts:\n1. Follow the search path until it is verified that the key is not already in the tree.\n2. Insert the new node and determine the resulting balance factor.\n3. Retreat along the search path and check the balance factor at each node. Rebalance if necessary.\nAlthough this method involves some redundant checking (once balance is established, it need not be\nchecked on that node's ancestors), we shall first adhere to this evidently correct schema because it can be\nimplemented through a pure extension of the already established search and insertion procedures. This\nprocedure describes the search operation needed at each single node, and because of its recursive\nformulation it can easily accommodate an additional operation on the way back along the search path. At\neach step, information must be passed as to whether or not the height of the subtree (in which the\ninsertion had been performed) had increased. We therefore extend the procedure's parameter list by the\nBoolean h with the meaning the subtree height has increased. Clearly, h must denote a variable parameter\nsince it is used to transmit a result.\nAssume now that the process is returning to a node p^ from the left branch (see Fig. 4.32), with the\nindication that it has increased its height. We now must distinguish between the three conditions\ninvolving the subtree heights prior to insertion:\n1. hL < h R, p.bal = +1, the previous imbalance at p has been equilibrated.\n2. hL = h R, p.bal = 0, the weight is now slanted to the left.\n3. hL > h R, p.bal = -1, rebalancing is necessary.\nIn the third case, inspection of the balance factor of the root of the left subtree (say, p1.bal) determines\nwhether case 1 or case 2 of Fig. 4.32 is present. If that node has also a higher left than right subtree, then\nwe have to deal with case 1, otherwise with case 2. (Convince yourself that a left subtree with a balance\nfactor equal to 0 at its root cannot occur in this case.) The rebalancing operations necessary are entirely\nexpressed as sequences of pointer reassignments. In fact, pointers are cyclically exchanged, resulting in\neither a single or a double rotation of the two or three nodes involved. In addition to pointer rotation, the\nrespective node balance factors have to be updated. The details are shown in the search, insertion, and\nrebalancing procedures.\n\na) 4 b) 5 c) 5\n\n5 4 7 4 7\n\nd) 5 e) 4 f) 4\n\n2 7 2 5 2 6\n\n1 4 1 3 7 1 3 5 7\n\nFig. 4.34. Insertions in balanced tree\n\nThe working principle is shown by Fig. 4.34. Consider the binary tree (a) which consists of two nodes\nonly. Insertion of key 7 first results in an unbalanced tree (i.e., a linear list). Its balancing involves a RR\nsingle rotation, resulting in the perfectly balanced tree (b). Further insertion of nodes 2 and 1 result in an\nimbalance of the subtree with root 4. This subtree is balanced by an LL single rotation (d). The\nsubsequent insertion of key 3 immediately offsets the balance criterion at the root node 5. Balance is\nthereafter reestablished by the more complicated LR double rotation; the outcome is tree (e). The only\ncandidate for losing balance after a next insertion is node 5. Indeed, insertion of node 6 must invoke the\nfourth case of rebalancing outlined below, the RL double rotation. The final tree is shown in Fig.4.34 (f).\nVAR p1, p2: Node; (*~h*)\nIF p = NIL THEN (*insert*)\nNEW(p); h := TRUE;\np.key := x; p.count := 1; p.left := NIL; p.right := NIL; p.bal := 0\nELSIF p.key > x THEN\nsearch(x, p.left, h);\nIF h THEN (*left branch has grown*)\nIF p.bal = 1 THEN p.bal := 0; h := FALSE\nELSIF p.bal = 0 THEN p.bal := -1\nELSE (*bal = -1, rebalance*) p1 := p.left;\nIF p1.bal = -1 THEN (*single LL rotation*)\np.left := p1.right; p1.right := p;\np.bal := 0; p := p1\nELSE (*double LR rotation*) p2 := p1.right;\np1.right := p2.left; p2.left := p1;\np.left := p2.right; p2.right := p;\nIF p2.bal = -1 THEN p.bal := 1 ELSE p.bal := 0 END ;\nIF p2.bal = +1 THEN p1.bal := -1 ELSE p1.bal := 0 END ;\np := p2\np.bal := 0; h := FALSE\nELSIF p.key < x THEN\nsearch(x, p.right, h);\n\nIF h THEN (*right branch has grown*)\n\nIF p.bal = -1 THEN p.bal := 0; h := FALSE\nELSIF p.bal = 0 THEN p.bal := 1\nELSE (*bal = +1, rebalance*) p1 := p.right;\nIF p1.bal = 1 THEN (*single RR rotation*)\np.right := p1.left; p1.left := p;\np.bal := 0; p := p1\nELSE (*double RL rotation*) p2 := p1.left;\np1.left := p2.right; p2.right := p1;\np.right := p2.left; p2.left := p;\nIF p2.bal = +1 THEN p.bal := -1 ELSE p.bal := 0 END ;\nIF p2.bal = -1 THEN p1.bal := 1 ELSE p1.bal := 0 END ;\np := p2\np.bal := 0; h := FALSE\nELSE INC(p.count)\nEND search\nTwo particularly interesting questions concerning the performance of the balanced tree insertion\nalgorithm are the following:\n1. If all n! permutations of n keys occur with equal probability, what is the expected height of the\nconstructed balanced tree?\n2. What is the probability that an insertion requires rebalancing?\nMathematical analysis of this complicated algorithm is still an open problem. Empirical tests support the\nconjecture that the expected height of the balanced tree thus generated is h = log(n)+c, where c is a small\nconstant (c ≈ 0.25). This means that in practice the AVL-balanced tree behaves as well as the perfectly\nbalanced tree, although it is much simpler to maintain. Empirical evidence also suggests that, on the\naverage, rebalancing is necessary once for approximately every two insertions. Here single and double\nrotations are equally probable. The example of Fig. 4.34 has evidently been carefully chosen to\ndemonstrate as many rotations as possible in a minimum number of insertions.\nThe complexity of the balancing operations suggests that balanced trees should be used only if\ninformation retrievals are considerably more frequent than insertions. This is particularly true because the\nnodes of such search trees are usually implemented as densely packed records in order to economize\nstorage. The speed of access and of updating the balance factors -- each requiring two bits only -- is\ntherefore often a decisive factor to the efficiency of the rebalancing operation. Empirical evaluations show\nthat balanced trees lose much of their appeal if tight record packing is mandatory. It is indeed difficult to\nbeat the straightforward, simple tree insertion algorithm.\n\n4.5.2. Balanced Tree Deletion\n\nOur experience with tree deletion suggests that in the case of balanced trees deletion will also be more\ncomplicated than insertion. This is indeed true, although the rebalancing operation remains essentially the\nsame as for insertion. In particular, rebalancing consists again of either single or a double rotations of\nThe basis for balanced tree deletion is the ordinary tree deletion algorithm. The easy cases are terminal\nnodes and nodes with only a single descendant. If the node to be deleted has two subtrees, we will again\nreplace it by the rightmost node of its left subtree. As in the case of insertion, a Boolean variable\nparameter h is added with the meaning “the height of the subtree has been reduced”. Rebalancing has to\nbe considered only when h is true. h is made true upon finding and deleting a node, or if rebalancing itself\nreduces the height of a subtree. We now introduce the two (symmetric) balancing operations in the form\nof procedures, because they have to be invoked from more than one point in the deletion algorithm. Note\nthat balanceL is applied when the left, balanceR after the right branch had been reduced in height.\n\na) 5 b) 5\n\n38 8 2 8\n\n2 4 7 10 1 3 7 10\n\n1 6 9 11 6 9 11\n\nc) 5 d) 5\n\n2 7 2 10\n\n1 3 6 10 1 3 7 11\n\n9 11 9\n\ne) 3 f) 7\n\n2 10 3 10\n\n1 7 11 1 9 11\n\ng) 7 h) 10\n\n3 10 3 11\n\n9 11 9\n\nFig. 4.35. Deletions in balanced tree\n\nThe operation of the procedure is illustrated in Fig. 4.35. Given the balanced tree (a), successive deletion\nof the nodes with keys 4, 8, 6, 5, 2, 1, and 7 results in the trees (b) ... (h). Deletion of key 4 is simple in\nitself, because it represents a terminal node. However, it results in an unbalanced node 3. Its rebalancing\noperation invoves an LL single rotation. Rebalancing becomes again necessary after the deletion of node\n6. This time the right subtree of the root (7) is rebalanced by an RR single rotation. Deletion of node 2,\nalthough in itself straightforward since it has only a single descendant, calls for a complicated RL double\nrotation. The fourth case, an LR double rotation, is finally invoked after the removal of node 7, which at\nfirst was replaced by the rightmost element of its left subtree, i.e., by the node with key 3.\nPROCEDURE balanceL(VAR p: Node; VAR h: BOOLEAN);\nVAR p1, p2: Node;\nBEGIN (*h; left branch has shrunk*)\nIF p.bal = -1 THEN p.bal := 0\nELSIF p.bal = 0 THEN p.bal := 1; h := FALSE\n\nELSE (*bal = 1, rebalance*) p1 := p.right;\n\nIF p1.bal >= 0 THEN (*single RR rotation*)\nIF p1.bal = 0 THEN p.bal := 1; p1.bal := -1; h := FALSE\nELSE p.bal := 0; p1.bal := 0\np := p1\nELSE (*double RL rotation*)\np2 := p1.left;\np := p2; p2.bal := 0\nEND balanceL;\nPROCEDURE balanceR(VAR p: Node; VAR h: BOOLEAN);\nVAR p1, p2: Node;\nBEGIN (*h; right branch has shrunk*)\nIF p.bal = 1 THEN p.bal := 0\nELSIF p.bal = 0 THEN p.bal := -1; h := FALSE\nIF p1.bal <= 0 THEN (*single LL rotation*)\nIF p1.bal = 0 THEN p.bal := -1; p1.bal := 1; h := FALSE\nELSE p.bal := 0; p1.bal := 0\np := p1\nELSE (*double LR rotation*)\np2 := p1.right; b2 := p2.bal;\np := p2; p2.bal := 0\nEND balanceR;\nVAR q: Node;\nBEGIN (*~h*)\nIF r.right # NIL THEN\ndel(r.right, h);\nIF h THEN balanceR(r, h) END\nELSE q.key := r.key; q.count := r.count;\nq := r; r := r.left; h := TRUE\nEND del;\nBEGIN (*~h*)\nIF p = NIL THEN (*key not in tree*)\nELSIF p.key > x THEN\ndelete(x, p.left, h);\n\nIF h THEN balanceL(p, h) END\n\nELSIF p.key < x THEN\ndelete(x, p.right, h);\nIF h THEN balanceR(p, h) END\nIF q.right = NIL THEN p := q.left; h := TRUE\nELSIF q.left = NIL THEN p := q.right; h := TRUE\nELSE del(q.left, h);\nIF h THEN balanceL(p, h) END\nEND delete\nFortunately, deletion of an element in a balanced tree can also be performed with -- in the worst case --\nO(log n) operations. An essential difference between the behaviour of the insertion and deletion\nprocedures must not be overlooked, however. Whereas insertion of a single key may result in at most one\nrotation (of two or three nodes), deletion may require a rotation at every node along the search path.\nConsider, for instance, deletion of the rightmost node of a Fibonacci-tree. In this case the deletion of any\nsingle node leads to a reduction of the height of the tree; in addition, deletion of its rightmost node\nrequires the maximum number of rotations. This therefore represents the worst choice of node in the\nworst case of a balanced tree, a rather unlucky combination of chances. How probable are rotations, then,\nin general?\nThe surprising result of empirical tests is that whereas one rotation is invoked for approximately every\ntwo insertions, one is required for every five deletions only. Deletion in balanced trees is therefore about\nas easy -- or as complicated -- as insertion.\n\n4.6. Optimal Search Trees\n\nSo far our consideration of organizing search trees has been based on the assumption that the frequency of\naccess is equal for all nodes, that is, that all keys are equally probable to occur as a search argument. This\nis probably the best assumption if one has no idea of access distribution. However, there are cases (they\nare the exception rather than the rule) in which information about the probabilities of access to individual\nkeys is available. These cases usually have the characteristic that the keys always remain the same, i.e.,\nthe search tree is subjected neither to insertion nor deletion, but retains a constant structure. A typical\nexample is the scanner of a compiler which determines for each word (identifier) whether or not it is a\nkeyword (reserved word). Statistical measurements over hundreds of compiled programs may in this case\nyield accurate information on the relative frequencies of occurrence, and thereby of access, of individual\nAssume that in a search tree the probability with which node i is accessed is\nPr {x = ki} = p i, (Si: 1 ≤ i ≤ n : p i) = 1\nWe now wish to organize the search tree in a way that the total number of search steps -- counted over\nsufficiently many trials -- becomes minimal. For this purpose the definition of path length is modified by\n(1) attributing a certain weight to each node and by (2) assuming the root to be at level 1 (instead of 0),\nbecause it accounts for the first comparison along the search path. Nodes that are frequently accessed\nbecome heavy nodes; those that are rarely visited become light nodes. The (internal) weighted path length\nis then the sum of all paths from the root to each node weighted by that node's probability of access.\nP = Si: 1 ≤ i ≤ n : pi*hi\nhi is the level of node i. The goal is now to minimize the weighted path length for a given probability\ndistribution. As an example, consider the set of keys 1, 2, 3, with probabilities of access p1 = 1/7, p2 = 2/7,\nand p3 = 4/7. These three keys can be arranged in five different ways as search trees (see Fig. 4.36).\n\na) 3 b) 3 c) 2 d) 1 e) 1\n\n2 1 1 3 3 2\n\n1 2 2 3\n\nFig. 4.36. The search trees with 3 nodes\n\nThe weighted path lengths of trees (a) to (e) are computed according to their definition as\nP(a) = 11/7, P(b) = 12/7, P(c) = 12/7, P(d) = 15/7, P(e) = 17/7\nHence, in this example, not the perfectly balanced tree (c), but the degenerate tree (a) turns out to be\nThe example of the compiler scanner immediately suggests that this problem should be viewed under a\nslightly more general condition: words occurring in the source text are not always keywords; as a matter\nof fact, their being keywords is rather the exception. Finding that a given word k is not a key in the search\ntree can be considered as an access to a hypothetical \"special node\" inserted between the next lower and\nnext higher key (see Fig. 4.19) with an associated external path length. If the probability q i of a search\nargument x lying between the two keys ki and ki+1 is also known, this information may considerably\nchange the structure of the optimal search tree. Hence, we generalize the problem by also considering\nunsuccessful searches. The overall average weighted path length is now\nP = (Si: 1 ≤ i ≤ n : p i*hi) + (Si: 1 ≤ i ≤ m : qi*h'i)\n(Si: 1 ≤ i ≤ n : p i) + (Si: 1 ≤ i ≤m : q i) = 1.\nand where, hi is the level of the (internal) node i and h'j is the level of the external node j. The average\nweighted path length may be called the cost of the search tree, since it represents a measure for the\nexpected amount of effort to be spent for searching. The search tree that requires the minimal cost among\nall trees with a given set of keys ki and probabilities p i and q i is called the optimal tree.\n\n\nk1|a1 k4|a4\n\nb0 b1 b4\n\nb2 b3\n\nFig. 4.37. Search tree with associated access frequencies\n\nFor finding the optimal tree, there is no need to require that the p's and q's sum up to 1. In fact, these\nprobabilities are commonly determined by experiments in which the accesses to nodes are counted.\nInstead of using the probabilities pi and qj, we will subsequently use such frequency counts and denote\nthem by\nai = number of times the search argument x equals ki\nb j = number of times the search argument x lies between kj and kj+1\nBy convention, b 0 is the number of times that x is less than k1, and bn is the frequency of x being greater\nthan kn (see Fig. 4.37). We will subsequently use P to denote the accumulated weighted path length\ninstead of the average path length:\nP = (Si: 1 ≤ i ≤ n : ai*hi) + (Si: 1 ≤ i ≤ m : b i*h'i)\nThus, apart from avoiding the computation of the probabilities from measured frequency counts, we gain\nthe further advantage of being able to use integers instead of fractions in our search for the optimal tree.\nConsidering the fact that the number of possible configurations of n nodes grows exponentially with n, the\ntask of finding the optimum seems rather hopeless for large n. Optimal trees, however, have one\nsignificant property that helps to find them: all their subtrees are optimal too. For instance, if the tree in\nFig. 4.37 is optimal, then the subtree with keys k3 and k4 is also optimal as shown. This property suggests\nan algorithm that systematically finds larger and larger trees, starting with individual nodes as smallest\npossible subtrees. The tree thus grows from the leaves to the root, which is, since we are used to drawing\ntrees upside-down, the bottom-up direction [4-6].\nThe equation that is the key to this algorithm is derived as follows: Let P be the weighted path length of a\ntree, and let P L and PR be those of the left and right subtrees of its root. Clearly, P is the sum of PL and P R,\nand the number of times a search travels on the leg to the root, which is simply the total number W of\nsearch trials. We call W the weight of the tree. Its average path length is then P/W.\nP = PL + W + P R\nW = (Si: 1 ≤ i ≤ n : ai) + (Si: 1 ≤ i ≤ m : bi)\nThese considerations show the need for a denotation of the weights and the path lengths of any subtree\nconsisting of a number of adjacent keys. Let Tij be the optimal subtree consisting of nodes with keys ki+1,\nki+2, ... , kj. Then let wij denote the weight and let p ij denote the path length of Tij. Clearly P = p0,n and W =\nw0,n. These quantities are defined by the following recurrence relations:\n\nw ii = bi (0 ≤ i ≤ n)\nw ij = w i, j-1 + aj + b j (0 ≤ i < j ≤ n)\np ii = w ii (0 ≤ i ≤ n)\np ij = w ij + MIN k: i < k ≤ j : (pi,k-1 + pkj) (0 ≤ i < k < j ≤ n)\nThe last equation follows immediately from the definitions of P and of optimality. Since there are\napproximately n2/2 values p ij, and because its definition calls for a choice among all cases such that 0 < j-i\n≤ n, the minimization operation will involve approximately n 3/6 operations. Knuth pointed out that a\nfactor n can be saved by the following consideration, which alone makes this algorithm usable for\npractical purposes.\nLet rij be a value of k which achieves the minimum for p ij. It is possible to limit the search for r ij to a\nmuch smaller interval, i.e., to reduce the number of the j-i evaluation steps. The key is the observation that\nif we have found the root rij of the optimal subtree T ij, then neither extending the tree by adding a node at\nthe right, nor shrinking the tree by removing its leftmost node ever can cause the optimal root to move to\nthe left. This is expressed by the relation\nri,j-1 ≤ rij ≤ ri+1,j\nwhich limits the search for possible solutions for r ij to the range ri,j-1 ... ri+1,j. This results in a total number\nof elementary steps in the order of n2.\nWe are now ready to construct the optimization algorithm in detail. We recall the following definitions,\nwhich are based on optimal trees Tij consisting of nodes with keys ki+1 ... kj.\n1. ai: the frequency of a search for k i.\n2. b j: the frequency of a search argument x between kj and kj+1.\n3. wij: the weight of T ij.\n4. p ij: the weighted path length of Tij.\n5. rij: the index of the root of Tij.\nWe declare the following arrays:\na: ARRAY n+1 OF INTEGER; (*a[0] not used*)\np,w,r: ARRAY n+1, n+1 OF INTEGER;\nAssume that the weights wij have been computed from a and b in a straightforward way. Now consider w\nas the argument of the procedure OptTree to be developed and consider r as its result, because r describes\nthe tree structure completely. p may be considered an intermediate result. Starting out by considering the\nsmallest possible subtrees, namely those consisting of no nodes at all, we proceed to larger and larger\ntrees. Let us denote the width j-i of the subtree Tij by h. Then we can trivially determine the values pii for\nall trees with h = 0 according to the definition of p ij.\nFOR i := 0 TO n DO p[i,i] := b[i] END\nIn the case h = 1 we deal with trees consisting of a single node, which plainly is also the root (see Fig.\nFOR i := 0 TO n-1 DO\nj := i+1; p[i,j] := w[i,j] + p[i,i] + p[j,j]; r[i,j] := j\n\n\nbj-1 bj\n\nwj-1, j-1\n\nwj-1, j\n\nFig. 4.38. Optimal search tree with single node\n\nNote that i denotes the left index limit and j the right index limit in the considered tree T ij. For the cases h\n> 1 we use a repetitive statement with h ranging from 2 to n, the case h = n spanning the entire tree T0,n. In\neach case the minimal path length p ij and the associated root index rij are determined by a simple\nrepetitive statement with an index k ranging over the interval given for rij.\nFOR h := 2 TO n DO\nFOR i := 0 TO n-h DO\nj := i+h;\nfind k and min = MIN k: i < k < j : (pi,k-1 + pkj) such that ri,j-1 < k < r i+1,j;\np[i,j] := min + w[i,j]; r[i,j] := k\nThe details of the refinement of the statement in italics can be found in Program 4.6. The average path\nlength of T0,n is now given by the quotient p 0,n/w0,n, and its root is the node with index r 0,n.\nLet us now describe the structure of the program to be designed. Its two main components are the\nprocedures to find the optimal search tree, given a weight distribution w, and to display the tree given the\nindices r. First, the counts a and b and the keys are read from an input source. The keys are actually not\ninvolved in the computation of the tree structure; they are merely used in the subsequent display of the\ntree. After printing the frequency statistics, the program proceeds to compute the path length of the\nperfectly balanced tree, in passing also determining the roots of its subtrees. Thereafter, the average\nweighted path length is printed and the tree is displayed.\nIn the third part, procedure OptTree is activated in order to compute the optimal search tree; thereafter,\nthe tree is displayed. And finally, the same procedures are used to compute and display the optimal tree\nconsidering the key frequencies only, ignoring the frequencies of non-keys. To summarize, the following\nare the global constants and variables:\nCONST N = 100; (*max no. of keywords*)\nWordLen = 16; (*max keyword length*)\nVAR key: ARRAY N+1, WordLen OF CHAR;\np, w, r: ARRAY N+1, N+1 OF INTEGER;\n\n\nBEGIN k := (i+j+1) DIV 2; r[i, j] := k;\nELSE RETURN BalTree(i, k-1) + BalTree(k, j) + w[i, j]\nEND BalTree;\n\n\nVAR x, min, tmp: INTEGER;\ni, j, k, h, m: INTEGER;\nBEGIN (*argument: W, results: p, r*)\nFOR i := 0 TO n DO p[i, i] := 0 END ;\nFOR i := 0 TO n-1 DO\nj := i+1; p[i, j] := w[i, j]; r[i, j] := j\nFOR h := 2 TO n DO\nFOR i := 0 TO n-h DO\nj := i+h; m := r[i, j-1]; min := p[i, m-1] + p[m, j];\nFOR k := m+1 TO r[i+1, j] DO\ntmp := p[i, k-1]; x := p[k, j] + tmp;\nIF x < min THEN m := k; min := x END\nEND ComputeOptTree;\n\nPROCEDURE WriteTree(i, j, level: INTEGER);\n\nVAR k: INTEGER; (*uses global writer W*)\nIF i < j THEN\nWriteTree(i, r[i, j]-1, level+1);\nFOR k := 1 TO level DO Texts.Write(W, TAB) END ;\nTexts.WriteString(W, key[r[i, j]]); Texts.WriteLn(W);\nWriteTree(r[i, j], j, level+1)\nEND WriteTree;\n\nPROCEDURE Find(VAR S: Texts.Scanner);\n\nVAR i, j, n: INTEGER; (*uses global writer W*)\nBEGIN Texts.Scan(S); b[0] := SHORT(S.i);\nn := 0; Texts.Scan(S); (*input a, key, b*)\nWHILE S.class = Texts.Int DO\nINC(n); a[n] := SHORT(S.i); Texts.Scan(S); COPY(S.s, key[n]);\nTexts.Scan(S); b[n] := SHORT(S.i); Texts.Scan(S)\n(*compute w from a and b*)\nFOR i := 0 TO n DO\nw[i, i] := b[i];\nFOR j := i+1 TO n DO\nw[i, j] := w[i, j-1] + a[j] + b[j]\nTexts.WriteString(W, \"Total weight = \"); Texts.WriteInt(W, w[0, n], 6); Texts.WriteLn(W);\nTexts.WriteString(W, \"Pathlength of balanced tree = \");\nTexts.WriteInt(W, BalTree(0, n), 6); Texts.WriteLn(W);\nWriteTree(0, n, 0); Texts.WriteLn(W);\nTexts.WriteString(W, \"Pathlength of optimal tree = \");\nTexts.WriteInt(W, p[0, n], 6); Texts.WriteLn(W);\nFOR i := 0 TO n DO\nw[i, i] := 0;\n\nFOR j := i+1 TO n DO w[i, j] := w[i, j-1] + a[j] END\n\nTexts.WriteString(W, \"optimal tree not considering b\"); Texts.WriteLn(W);\nEND Find;\n\n20 1 Albert 10 2 Ernst 1 5 Peter 1\nb 0 = 20\na1 = 1 key1 = Albert b 1 = 10\na2 = 2 key2 = Ernst b2 = 1\na3 = 4 key3 = Peter b3 = 1\nThe results of procedure Find are shown in Fig. 4.40 and demonstrate that the structures obtained for the\nthree cases may differ significantly. The total weight is 40, the pathlength of the balanced tree is 78, and\nthat of the optimal tree is 66.\n\nbalanced tree optimal tree not considering key misses\n\nAlbert Albert Albert\n\nErnst Ernst Ernst\nPeter Peter Peter\n\nFig. 4.40. The 3 trees generated by the Optimal Tree procedure (NEW FIGURE!)\n\nIt is evident from this algorithm that the effort to determine the optimal structure is of the order of n2;\nalso, the amount of required storage is of the order n2. This is unacceptable if n is very large. Algorithms\nwith greater efficiency are therefore highly desirable. One of them is the algorithm developed by Hu and\nTucker [4-5] which requires only O(n) storage and O(n*log(n)) computations. However, it considers only\nthe case in which the key frequencies are zero, i.e., where only the unsuccessful search trials are\nregistered. Another algorithm, also requiring O(n) storage elements and O(n*log(n)) computations was\ndescribed by Walker and Gotlieb [4-7]. Instead of trying to find the optimum, this algorithm merely\npromises to yield a nearly optimal tree. It can therefore be based on heuristic principles. The basic idea is\nthe following.\nConsider the nodes (genuine and special nodes) being distributed on a linear scale, weighted by their\nfrequencies (or probabilities) of access. Then find the node which is closest to the center of gravity. This\nnode is called the centroid, and its index is\n(Si: 1 ≤ i ≤ n : i*ai) + (Si: 1 ≤ i ≤ m : i*b i) / W\nrounded to the nearest integer. If all nodes have equal weight, then the root of the desired optimal tree\nevidently coincides with the centroid Otherwise -- so the reasoning goes -- it will in most cases be in the\nclose neighborhood of the centroid. A limited search is then used to find the local optimum, whereafter\nthis procedure is applied to the resulting two subtrees. The likelihood of the root lying very close to the\ncentroid grows with the size n of the tree. As soon as the subtrees have reached a manageable size, their\noptimum can be determined by the above exact algorithm.\n\n4.7. B-Trees\nSo far, we have restricted our discussion to trees in which every node has at most two descendants, i.e., to\nbinary trees. This is entirely satisfactory if, for instance, we wish to represent family relationships with a\npreference to the pedigree view, in which every person is associated with his parents. After all, no one has\nmore than two parents. But what about someone who prefers the posterity view? He has to cope with the\n\nfact that some people have more than two children, and his trees will contain nodes with many branches.\nFor lack of a better term, we shall call them multiway trees.\nOf course, there is nothing special about such structures, and we have already encountered all the\nprogramming and data definition facilities to cope with such situations. If, for instance, an absolute upper\nlimit on the number of children is given (which is admittedly a somewhat futuristic assumption), then one\nmay represent the children as an array component of the record representing a person. If the number of\nchildren varies strongly among different persons, however, this may result in a poor utilization of\navailable storage. In this case it will be much more appropriate to arrange the offspring as a linear list,\nwith a pointer to the youngest (or eldest) offspring assigned to the parent. A possible type definition for\nthis case is the following, and a possible data structure is shown in Fig. 4.43.\nname: alfa;\nsibling, offspring: Person\n\n\n\n\nFig. 4.43. Multiway tree represented as binary tree\n\nWe now realize that by tilting this picture by 45 degrees it will look like a perfect binary tree. But this\nview is misleading because functionally the two references have entirely different meanings. One usually\ndosen't treat a sibling as an offspring and get away unpunished, and hence one should not do so even in\nconstructing data definitions. This example could also be easily extended into an even more complicated\ndata structure by introducing more components in each person's record, thus being able to represent\nfurther family relationships. A likely candidate that cannot generally be derived from the sibling and\noffspring references is that of husband and wife, or even the inverse relationship of father and mother.\nSuch a structure quickly grows into a complex relational data bank, and it may be possible to map serveral\ntrees into it. The algorithms operating on such structures are intimately tied to their data definitions, and it\ndoes not make sense to specify any general rules or widely applicable techniques.\nHowever, there is a very practical area of application of multiway trees which is of general interest. This\nis the construction and maintenance of large-scale search trees in which insertions and deletions are\nnecessary, but in which the primary store of a computer is not large enough or is too costly to be used for\nlong-time storage.\nAssume, then, that the nodes of a tree are to be stored on a secondary storage medium such as a disk store.\nDynamic data structures introduced in this chapter are particularly suitable for incorporation of secondary\nstorage media. The principal innovation is merely that pointers are represented by disk store addresses\ninstead of main store addresses. Using a binary tree for a data set of, say, a million items, requires on the\naverage approximately log 10 6 (i.e. about 20) search steps. Since each step now involves a disk access\n(with inherent latency time), a storage organization using fewer accesses will be highly desirable. The\nmultiway tree is a perfect solution to this problem. If an item located on a secondary store is accessed, an\nentire group of items may also be accessed without much additional cost. This suggests that a tree be\nsubdivided into subtrees, and that the subtrees are represented as units that are accessed all together. We\nshall call these subtrees pages. Figure 4.44 shows a binary tree subdivided into pages, each page\nconsisting of 7 nodes.\n\nFig. 4.44. Binary tree subdivided into pages\n\nThe saving in the number of disk accesses -- each page access now involves a disk access -- can be\nconsiderable. Assume that we choose to place 100 nodes on a page (this is a reasonable figure); then the\nmillion item search tree will on the average require only log100(106) (i.e. about 3) page accesses instead of\n20. But, of course, if the tree is left to grow at random, then the worst case may still be as large as 10 4. It\nis plain that a scheme for controlled growth is almost mandatory in the case of multiway trees.\n\n4.7.1. Multiway B-Trees\n\neliminated because it involves too much balancing overhead. The rules must clearly be somewhat relaxed.\nA very sensible criterion was postulated by R. Bayer and E.M. McCreight [4.2] in 1970: every page\n(except one) contains between n and 2n nodes for a given constant n. Hence, in a tree with N items and a\nmaximum page size of 2n nodes per page, the worst case requires logn N page accesses; and page\naccesses clearly dominate the entire search effort. Moreover, the important factor of store utilization is at\nleast 50% since pages are always at least half full. With all these advantages, the scheme involves\ncomparatively simple algorithms for search, insertion, and deletion. We will subsequently study them in\nThe underlying data structures are called B-trees, and have the following characteristics; n is said to be\nthe order of the B-tree.\n1. Every page contains at most 2n items (keys.)\n2. Every page, except the root page, contains at least n items.\n3. Every page is either a leaf page, i.e. has no descendants, or it has m+1 descendants, where m is its\nnumber of keys on this page.\n4. All leaf pages appear at the same level.\n\n\n10 20 30 40\n\n2 5 7 8 13 14 15 18 22 24 26 27 28 32 35 38 41 42 45 46\n\nFig. 4.45. B-tree of order 2\n\nFigure 4.45 shows a B-tree of order 2 with 3 levels. All pages contain 2, 3, or 4 items; the exception is the\nroot which is allowed to contain a single item only. All leaf pages appear at level 3. The keys appear in\nincreasing order from left to right if the B-tree is squeezed into a single level by inserting the descendants\nin between the keys of their ancestor page. This arrangement represents a natural extension of binary\n\nsearch trees, and it determines the method of searching an item with given key. Consider a page of the\nform shown in Fig. 4.46 and a given search argument x. Assuming that the page has been moved into the\nprimary store, we may use conventional search methods among the keys k1 ... km. If m is sufficiently\nlarge, one may use binary search; if it is rather small, an ordinary sequential search will do. (Note that the\ntime required for a search in main store is probably negligible compared to the time it takes to move the\npage from secondary into primary store.) If the search is unsuccessful, we are in one of the following\n1. ki < x < ki+1, for 1 < i < m The search continues on page p i^\n2. km < x The search continues on page pm^.\n3. x < k1 The search continues on page p0^.\n\np0 k1 p1 k2 p2 ... pm-1 km pm\n\nFig. 4.46. B-tree page with m keys\n\nIf in some case the designated pointer is NIL, i.e., if there is no descendant page, then there is no item\nwith key x in the whole tree, and the search is terminated.\nSurprisingly, insertion in a B-tree is comparatively simple too. If an item is to be inserted in a page with\nm < 2n items, the insertion process remains constrained to that page. It is only insertion into an already\nfull page that has consequences upon the tree structure and may cause the allocation of new pages. To\nunderstand what happens in this case, refer to Fig. 4.47, which illustrates the insertion of key 22 in a B-\ntree of order 2. It proceeds in the following steps:\n1. Key 22 is found to be missing; insertion in page C is impossible because C is already full.\n2. Page C is split into two pages (i.e., a new page D is allocated).\n3. The 2n+1 keys are equally distributed onto C and D, and the middle key is moved up one level into the\nancestor page A.\n\nA 20 A 20 30\n\n7 10 15 18 26 30 35 40 7 10 15 18 22 26 35 40\n\nFig. 4.47. Insertion of key 22 in B-tree\n\nThis very elegant scheme preserves all the characteristic properties of B-trees. In particular, the split\npages contain exactly n items. Of course, the insertion of an item in the ancestor page may again cause\nthat page to overflow, thereby causing the splitting to propagate. In the extreme case it may propagate up\nto the root. This is, in fact, the only way that the B-tree may increase its height. The B-tree has thus a\nstrange manner of growing: it grows from its leaves upward to the root.\nWe shall now develop a detailed program from these sketchy descriptions. It is already apparent that a\nrecursive formulation will be most convenient because of the property of the splitting process to\npropagate back along the search path. The general structure of the program will therefore be similar to\nbalanced tree insertion, although the details are different. First of all, a definition of the page structure has\nto be formulated. We choose to represent the items in the form of an array.\nTYPE Page = POINTER TO PageDescriptor;\np: Page;\n\ncount: INTEGER (*data*)\n\nPageDescriptor = RECORD m: INTEGER; (* 0 .. 2n *)\np0: Page;\ne: ARRAY 2*n OF Item\nAgain, the item component count stands for all kinds of other information that may be associated with\neach item, but it plays no role in the actual search process. Note that each page offers space for 2n items.\nThe field m indicates the actual number of items on the page. As m ≥ n (except for the root page), a\nstorage utilization of a least 50% is guaranteed.\nThe algorithm of B-tree search and insertion is formulated below as a procedure called search. Its main\nthe branching decision is not a binary choice. Instead, the “within-page search” is represented as a binary\nsearch on the array e of elements.\nThe insertion algorithm is formulated as a separate procedure merely for clarity. It is activated after search\nhas indicated that an item is to be passed up on the tree (in the direction toward the root). This fact is\nindicated by the Boolean result parameter h; it assumes a similar role as in the algorithm for balanced tree\ninsertion, where h indicates that the subtree had grown. If h is true, the second result parameter, u,\nrepresents the item being passed up. Note that insertions start in hypothetical pages, namely, the \"special\nnodes\" of Fig. 4.19; the new item is immediately handed up via the parameter u to the leaf page for actual\ninsertion. The scheme is sketched here:\nPROCEDURE search(x: INTEGER; a: Page; VAR h: BOOLEAN; VAR u: Item);\nIF a = NIL THEN (*x not in tree, insert*)\nAssign x to item u, set h to TRUE, indicating that an item\nu is passed up in the tree\nbinary search for x in array a.e;\nIF found THEN process data\nELSE search(x, descendant, h, u);\nIF h THEN (*an item was passed up*)\nIF no. of items on page a^ < 2n THEN\ninsert u on page a^ and set h to FALSE\nELSE split page and pass middle item up\nEND search\nIf the paramerter h is true after the call of search in the main program, a split of the root page is requested.\nSince the root page plays an exceptional role, this process has to be programmed separately. It consists\nmerely of the allocation of a new root page and the insertion of the single item given by the paramerter u.\nAs a consequence, the new root page contains a single item only. The details can be gathered from\nProgram 4.7, and Fig. 4.48 shows the result of using Program 4.7 to construct a B-tree with the following\ninsertion sequence of keys:\n20; 40 10 30 15; 35 7 26 18 22; 5; 42 13 46 27 8 32; 38 24 45 25;\nThe semicolons designate the positions of the snapshots taken upon each page allocation. Insertion of the\nlast key causes two splits and the allocation of three new pages.\n\na) 20\n\nb) 20\n\n10 15 30 40\n\nc) 20 30\n\n7 10 15 18 22 26 35 40\n\nd) 10 20 30\n\n5 7 15 18 22 26 35 40\n\ne) 10 20 30 40\n\n5 7 8 13 15 18 22 26 27 32 35 42 46\n\nf) 25\n\n10 20 30 40\n\n5 7 8 13 15 18 22 24 26 27 32 35 38 42 45 46\n\nFig. 4.48. Growth of B-tree of order 2\n\nSince each activation of search implies one page transfer to main store, k = logn(N) recursive calls are\nnecessary at most, if the tree contains N items. Hence, we must be capable of accommodating k pages in\nmain store. This is one limiting factor on the page size 2n. In fact, we need to accommodate even more\nthan k pages, because insertion may cause page splitting to occur. A corollary is that the root page is best\nallocated permanently in the primary store, because each query proceeds necessarily through the root\nAnother positive quality of the B-tree organization is its suitability and economy in the case of purely\nsequential updating of the entire data base. Every page is fetched into primary store exactly once.\nDeletion of items from a B-tree is fairly straight-forward in principle, but it is complicated in the details.\nWe may distinguish two different circumstances:\n1. The item to be deleted is on a leaf page; here its removal algorithm is plain and simple.\n2. The item is not on a leaf page; it must be replaced by one of the two lexicographically adjacent items,\nwhich happen to be on leaf pages and can easily be deleted.\nIn case 2 finding the adjacent key is analogous to finding the one used in binary tree deletion. We descend\nalong the rightmost pointers down to the leaf page P, replace the item to be deleted by the rightmost item\non P, and then reduce the size of P by 1. In any case, reduction of size must be followed by a check of the\nnumber of items m on the reduced page, because, if m < n, the primary characteristic of B-trees would be\nviolated. Some additional action has to be taken; this underflow condition is indicated by the Boolean\nvariable parameter h.\nThe only recourse is to borrow or annect an item from one of the neighboring pages, say from Q. Since\nthis involves fetching page Q into main store -- a relatively costly operation -- one is tempted to make the\nbest of this undesirable situation and to annect more than a single item at once. The usual strategy is to\ndistribute the items on pages P and Q evenly on both pages. This is called page balancing.\n\nOf course, it may happen that there is no item left to be annected since Q has already reached its minimal\nsize n. In this case the total number of items on pages P and Q is 2n-1; we may merge the two pages into\none, adding the middle item from the ancestor page of P and Q, and then entirely dispose of page Q. This\nis exactly the inverse process of page splitting. The process may be visualized by considering the deletion\nof key 22 in Fig. 4.47. Once again, the removal of the middle key in the ancestor page may cause its size\nmerging) be undertaken at the next level. In the extreme case page merging may propagate all the way up\nto the root. If the root is reduced to size 0, it is itself deleted, thereby causing a reduction in the height of\nthe B-tree. This is, in fact, the only way that a B-tree may shrink in height. Figure 4.49 shows the gradual\ndecay of the B-tree of Fig. 4.48 upon the sequential deletion of the keys\n25 45 24; 38 32; 8 27 46 13 42; 5 22 18 26; 7 35 15;\nThe semicolons again mark the places where the snapshots are taken, namely where pages are being\neliminated. The similarity of its structure to that of balanced tree deletion is particularly noteworthy.\n\na) 25\n\n10 20 30 40\n\n\nb) 10 22 30 40\n\n5 7 8 13 15 18 20 26 27 32 35 38 42 46\n\nc) 10 22 30\n\n5 7 8 13 15 18 20 26 27 35 40 42 46\n\nd) 10 22\n\n5 7 15 18 20 26 30 35 40\n\ne) 15\n\n7 10 20 30 35 40\n\nf) 10 20 30 40\n\nFig. 4.49. Decay of B-tree of order 2\n\nEntry = RECORD\nkey: INTEGER; p: Page\nPageRec = RECORD\nm: INTEGER; (*no. of entries on page*)\np0: Page;\ne: ARRAY 2*N OF Entry\nVAR root: Page; W: Texts.Writer;\n\n\nVAR i, L, R: INTEGER; found: BOOLEAN; a: Page;\nBEGIN a := root; found := FALSE;\nWHILE (a # NIL) & ~found DO\nL := 0; R := a.m; (*binary search*)\ni := (L+R) DIV 2;\nIF x <= a.e[i].key THEN R := i ELSE L := i+1 END\nIF (R < a.m) & (a.e[R].key = x) THEN found := TRUE\nELSIF R = 0 THEN a := a.p0 ELSE a := a.e[R-1].p\np := a; k := R\nEND search;\nPROCEDURE insert(x: INTEGER; a: Page; VAR h: BOOLEAN; VAR v: Entry);\n(*a # NIL. Search key x in B-tree with root a;\ninsert new item with key x. If an entry is to be passed up,\nassign it to v. h := \"tree has become higher\"*)\nb: Page; u: Entry;\nBEGIN (* ~h *)\nIF a = NIL THEN v.key := x; v.p := NIL; h := TRUE\nELSE L := 0; R := a.m; (*binary search*)\ni := (L+R) DIV 2;\nIF (R < a.m) & (a.e[R].key = x) THEN (*found, do nothing*)\nELSE (*item not on this page*)\nIF R = 0 THEN b := a.p0 ELSE b := a.e[R-1].p END ;\ninsert(x, b, h, u);\nIF h THEN (*insert u to the left of a.e[R]*)\nIF a.m < 2*N THEN\nh := FALSE;\nFOR i := a.m TO R+1 BY -1 DO a.e[i] := a.e[i-1] END ;\na.e[R] := u; INC(a.m)\nELSE NEW(b); (*overflow; split a into a,b and assign the middle entry to v*)\nIF R < N THEN (*insert in left page a*)\nv := a.e[N-1];\nFOR i := N-1 TO R+1 BY -1 DO a.e[i] := a.e[i-1] END ;\na.e[R] := u;\nFOR i := 0 TO N-1 DO b.e[i] := a.e[i+N] END\nELSE (*insert in right page b*)\nDEC(R, N);\nIF R = 0 THEN v := u\nELSE v := a.e[N];\nFOR i := 0 TO R-2 DO b.e[i] := a.e[i+N+1] END ;\nb.e[R-1] := u\nFOR i := R TO N-1 DO b.e[i] := a.e[i+N] END\na.m := N; b.m := N; b.p0 := v.p; v.p := b\n\nEND insert;\nPROCEDURE underflow(c, a: Page; s: INTEGER; VAR h: BOOLEAN);\n(*a = underflowing page, c = ancestor page,\ns = index of deleted entry in c*)\nVAR b: Page;\ni, k: INTEGER;\nBEGIN (*h & (a.m = N-1) & (c.e[s-1].p = a) *)\nIF s < c.m THEN (*b := page to the right of a*)\nb := c.e[s].p; k := (b.m-N+1) DIV 2; (*k = nof items available on page b*)\na.e[N-1] := c.e[s]; a.e[N-1].p := b.p0;\nIF k > 0 THEN (*balance by moving k-1 items from b to a*)\nFOR i := 0 TO k-2 DO a.e[i+N] := b.e[i] END ;\nc.e[s] := b.e[k-1]; b.p0 := c.e[s].p;\nc.e[s].p := b; DEC(b.m, k);\nFOR i := 0 TO b.m-1 DO b.e[i] := b.e[i+k] END ;\na.m := N-1+k; h := FALSE\nELSE (*merge pages a and b, discard b*)\nFOR i := 0 TO N-1 DO a.e[i+N] := b.e[i] END ;\nFOR i := s TO c.m-1 DO c.e[i] := c.e[i+1] END ;\na.m := 2*N; h := c.m < N\nELSE (*b := page to the left of a*) DEC(s);\nIF s = 0 THEN b := c.p0 ELSE b := c.e[s-1].p END ;\nIF k > 0 THEN\nFOR i := N-2 TO 0 BY -1 DO a.e[i+k] := a.e[i] END ;\na.e[k-1] := c.e[s]; a.e[k-1].p := a.p0;\n(*move k-1 items from b to a, one to c*) DEC(b.m, k);\nFOR i := k-2 TO 0 BY -1 DO a.e[i] := b.e[i+b.m+1] END ;\nc.e[s] := b.e[b.m]; a.p0 := c.e[s].p;\nc.e[s].p := a; a.m := N-1+k; h := FALSE\nELSE (*merge pages a and b, discard a*)\nc.e[s].p := a.p0; b.e[N] := c.e[s];\nFOR i := 0 TO N-2 DO b.e[i+N+1] := a.e[i] END ;\nb.m := 2*N; DEC(c.m); h := c.m < N\nEND underflow;\nPROCEDURE delete(x: INTEGER; a: Page; VAR h: BOOLEAN);\n(*search and delete key x in B-tree a; if a page underflow arises,\nbalance with adjacent page or merge; h := \"page a is undersize\"*)\nVAR i, L, R: INTEGER; q: Page;\nVAR k: INTEGER; q: Page; (*global a, R*)\nBEGIN k := p.m-1; q := p.e[k].p;\nIF q # NIL THEN del(q, h);\nIF h THEN underflow(p, q, p.m, h) END\nELSE p.e[k].p := a.e[R].p; a.e[R] := p.e[k];\nDEC(p.m); h := p.m < N\nEND del;\n\ni := (L+R) DIV 2;\nIF R = 0 THEN q := a.p0 ELSE q := a.e[R-1].p END ;\nIF q = NIL THEN (*a is leaf page*)\nDEC(a.m); h := a.m < N;\nFOR i := R TO a.m-1 DO a.e[i] := a.e[i+1] END\nELSE del(q, h);\nIF h THEN underflow(a, q, R, h) END\nELSE delete(x, q, h);\nEND delete;\nPROCEDURE ShowTree(VAR W: Texts.Writer; p: Page; level: INTEGER);\nFOR i := 1 TO level DO Texts.Write(W, 9X) END ;\nFOR i := 0 TO p.m-1 DO Texts.WriteInt(W, p.e[i].key, 4) END ;\nIF p.m > 0 THEN ShowTree(p.p0, level+1) END ;\nFOR i := 0 TO p.m-1 DO ShowTree(p.e[i].p, level+1) END\nEND ShowTree;\nExtensive analysis of B-tree performance has been undertaken and is reported in the referenced article\n(Bayer and McCreight). In particular, it includes a treatment of the question of optimal page size, which\nstrongly depends on the characteristics of the storage and computing system available.\nVariations of the B-tree scheme are discussed in Knuth, Vol. 3, pp. 476-479. The one notable observation\nis that page splitting should be delayed in the same way that page merging is delayed, by first attempting\nto balance neighboring pages. Apart from this, the suggested improvements seem to yield marginal gains.\nA comprehensive survey of B-trees may be found in [4-8].\n\n4.7.2. Binary B-Trees\n\nThe species of B-trees that seems to be least interesting is the first order B-tree (n = 1). But sometimes it\nis worthwhile to pay attention to the exceptional case. It is plain, however, that first-order B-trees are not\nuseful in representing large, ordered, indexed data sets invoving secondary stores; approximately 50% of\nall pages will contain a single item only. Therefore, we shall forget secondary stores and again consider\nthe problem of search trees involving a one-level store only.\nA binary B-tree (BB-tree) consists of nodes (pages) with either one or two items. Hence, a page contains\neither two or three pointers to descendants; this suggested the term 2-3 tree. According to the definition of\nB-trees, all leaf pages appear at the same level, and all non-leaf pages of BB-trees have either two or three\ndescendants (including the root). Since we now are dealing with primary store only, an optimal economy\nof storage space is mandatory, and the representation of the items inside a node in the form of an array\nappears unsuitable. An alternative is the dynamic, linked allocation; that is, inside each node there exists a\nlinked list of items of length 1 or 2. Since each node has at most three descendants and thus needs to\nharbor only up to three pointers, one is tempted to combine the pointers for descendants and pointers in\n\nthe item list as shown in Fig. 4.50. The B-tree node thereby loses its actual identity, and the items assume\nthe role of nodes in a regular binary tree. It remains necessary, however, to distinguish between pointers\nto descendants (vertical) and pointers to siblings on the same page (horizontal). Since only the pointers to\nthe right may be horizontal, a single bit is sufficient to record this distiction. We therefore introduce the\nBoolean field h with the meaning horizontal. The definition of a tree node based on this representation is\ngiven below. It was suggested and investigated by R. Bayer [4-3] in 1971 and represents a search tree\norganization guaranteeing p = 2*log(N) as maximum path length.\nleft, right: Node;\nh: BOOLEAN (*right branch horizontal*)\n\na b\n\na b c\n\nFig. 4.50. Representation of BB-tree nodes\n\nConsidering the problem of key insertion, one must distinguish four possible situations that arise from\ngrowth of the left or right subtrees. The four cases are illustrated in Fig. 4.51. Remember that B-trees have\nthe characteristic of growing from the bottom toward the root and that the property of all leafs being at the\nsame level must be maintained. The simplest case (1) is when the right subtree of a node A grows and\nwhen A is the only key on its (hypothetical) page. Then, the descendant B merely becomes the sibling of\nA, i.e., the vertical pointer becomes a horizontal pointer. This simple raising of the right arm is not\npossible if A already has a sibling. Then we would obtain a page with 3 nodes, and we have to split it\n(case 2). Its middle node B is passed up to the next higher level.\nNow assume that the left subtree of a node B has grown in height. If B is again alone on a page (case 3),\ni.e., its right pointer refers to a descendant, then the left subtree (A) is allowed to become B's sibling. (A\nsimple rotation of pointers is necessary since the left pointer cannot be horizontal). If, however, B already\nhas a sibling, the raising of A yields a page with three members, requiring a split. This split is realized in a\nvery straightforward manner: C becomes a descendant of B, which is raised to the next higher level (case\n\n\n\na B a b c\n\nb c\n\n\na b C a b c d a b c d\n\nc d\n\n\n\nA c a b c a b c\n\na b\n\n\nA c d a b c d a b c d\n\na b\n\nFig. 4.51. Node insertion in BB-tree\n\nIt should be noted that upon searching a key, it makes no effective difference whether we proceed along a\nhorizontal or a vertical pointer. It therefore appears artificial to worry about a left pointer in case 3\nbecoming horizontal, although its page still contains not more than two members. Indeed, the insertion\nalgorithm reveals a strange asymmetry in handling the growth of left and right subtrees, and it lets the\nBB-tree organization appear rather artificial. There is no proof of strangeness of this organization; yet a\nhealthy intuition tells us that something is fishy, and that we should remove this asymmetry. It leads to the\nnotion of the symmetric binary B-tree (SBB-tree) which was also investigated by Bayer [4-4] in 1972. On\nthe average it leads to slightly more efficient search trees, but the algorithms for insertion and deletion are\nalso slightly more complex. Furthermore, each node now requires two bits (Boolean variable lh and rh) to\nindicate the nature of its two pointers.\nSince we will restrict our detail considerations to the problem of insertion, we have once again to\ndistinguish among four cases of grown subtrees. They are illustrated in Fig. 4.52, which makes the gained\n\nsymmetry evident. Note that whenever a subtree of node A without siblings grows, the root of the subtree\nbecomes the sibling of A. This case need not be considered any further.\n\n(LL) B C A B C A C\n\n(LR) A C A B C A C\n\n(RR) A B A B C A C\n\n(RL) A C A B C A C\n\nFig. 4.52. Insertion in SBB-trees\n\nThe four cases considered in Fig. 4.52 all reflect the occurrence of a page overflow and the subsequent\npage split. They are labelled according to the directions of the horizontal pointers linking the three\nsiblings in the middle figures. The initial situation is shown in the left column; the middle column\nillustrates the fact that the lower node has been raised as its subtree has grown; the figures in the right\ncolumn show the result of node rearrangement.\nIt is advisable to stick no longer to the notion of pages out of which this organization had developed, for\nwe are only interested in bounding the maximum path length to 2*log(N). For this we need only ensure\nthat two horizontal pointers may never occur in succession on any search path. However, there is no\nreason to forbid nodes with horizontal pointers to the left and right, i.e. to treat the left and right sides\n1. Every node contains one key and at most two (pointers to) subtrees.\n\n2. Every pointer is either horizontal or vertical. There are no two consecutive horizontal pointers on any\nsearch path.\n3. All terminal nodes (nodes without descendants) appear at the same (terminal) level.\nFrom this definition it follows that the longest search path is no longer than twice the height of the tree.\nSince no SBB-tree with N nodes can have a height larger than log(N), it follows immediately that\n2*log(N) is an upper bound on the search path length. In order to visualize how these trees grow, we refer\nto Fig. 4.53. The lines represent snapshots taken during the insertion of the following sequences of keys,\nwhere every semicolon marks a snapshot.\n(1) 1 2; 3; 4 5 6; 7;\n(2) 5 4; 3; 1 2 7 6;\n(3) 6 2; 4; 1 7 3 5;\n(4) 4 2 6; 1 7; 3 5;\n\n1. 1 2 2 2 4 4\n\n1 3 1 3 5 6 2 6\n\n1 3 5 7\n\n2. 4 5 4 2 4 6\n\n3 5 1 3 5 7\n\n3. 2 6 4 4\n\n2 6 1 2 3 5 6 7\n\n4. 2 4 6 2 6 2 6\n\n1 4 7 1 3 4 5 7\n\nFig. 4.53. Insertion of keys 1 to 7\n\nsame level. One is therefore inclined to compare these structures with garden hedges that have been\nrecently trimmed with hedge scissors.\nThe algorithm for the construction of SBB-trees is show below. It is based on a definition of the type\nNode with the two components lh and rh indicating whether or not the left and right pointers are\nkey, count: INTEGER;\nleft, right: Node;\nlh, rh: BOOLEAN\n\nThe recursive procedure search again follows the pattern of the basic binary tree insertion algorithm. A\nthird parameter h is added; it indicates whether or not the subtree with root p has changed, and it\ncorresponds directly to the parameter h of the B-tree search program. We must note, however, the\nconsequence of representing pages as linked lists: a page is traversed by either one or two calls of the\nsearch procedure. We must distinguish between the case of a subtree (indicated by a vertical pointer) that\nhas grown and a sibling node (indicated by a horizontal pointer) that has obtained another sibling and\nhence requires a page split. The problem is easily solved by introducing a three-valued h with the\nfollowing meanings:\n1. h = 0: the subtree p requires no changes of the tree structure.\n2. h = 1: node p has obtained a sibling.\n3. h = 2: the subtree p has increased in height.\nVAR q, r: Node;\nBEGIN (*h=0*)\nIF p = NIL THEN (*insert new node*)\nNEW(p); p.key := x; p.L := NIL; p.R := NIL; p.lh := FALSE; p.rh := FALSE; h := 2\nELSIF x < p.key THEN\nsearch(p.L, x, h);\nIF h > 0 THEN (*left branch has grown or received sibling*)\nq := p.L;\nIF p.lh THEN\nh := 2; p.lh := FALSE;\nIF q.lh THEN (*LL*)\np.L := q.R; q.lh := FALSE; q.R := p; p := q\nELSE (*q.rh, LR*)\nr := q.R; q.R := r.L; q.rh := FALSE; r.L := p.L; p.L := r.R; r.R := p; p := r\nIF h = 1 THEN p.lh := TRUE END\nELSIF x > p.key THEN\nsearch(p.R, x, h);\nIF h > 0 THEN (*right branch has grown or received sibling*)\nq := p.R;\nIF p.rh THEN\nh := 2; p.rh := FALSE;\nIF q.rh THEN (*RR*)\np.R := q.L; q.rh := FALSE; q.L := p; p := q\nELSE (*q.lh, RL*)\nr := q.L; q.L := r.R; q.lh := FALSE; r.R := p.R; p.R := r.L; r.L := p; p := r\nIF h = 1 THEN p.rh := TRUE END\nEND search;\n\nNote that the actions to be taken for node rearrangement very strongly resemble those developed in the\nAVL-balanced tree search algorithm. It is evident that all four cases can be implemented by simple\npointer rotations: single rotations in the LL and RR cases, double rotations in the LR and RL cases. In\nfact, procedure search appears here slightly simpler than in the AVL case. Clearly, the SBB-tree scheme\nemerges as an alternative to the AVL-balancing criterion. A performance comparison is therefore both\npossible and desirable.\n\nWe refrain from involved mathematical analysis and concentrate on some basic differences. It can be\nproven that the AVL-balanced trees are a subset of the SBB-trees. Hence, the class of the latter is larger.\nIt follows that their path length is on the average larger than in the AVL case. Note in this connection the\nworst-case tree (4) in Fig. 4.53. On the other hand, node rearrangement is called for less frequently. The\nbalanced tree is therefore preferred in those applications in which key retrievals are much more frequent\nthan insertions (or deletions); if this quotient is moderate, the SBB-tree scheme may be preferred. It is\nvery difficult to say where the borderline lies. It strongly depends not only on the quotient between the\nfrequencies of retrieval and structural change, but also on the characteristics of an implementation. This is\nparticularly the case if the node records have a densely packed representation, and if therefore access to\nfields involves part-word selection.\n\nThe SBB-tree has later found a rebirth under the name of red-black tree. The difference is that whereas in\nemanating pointers are horizontal, every node of the red-black tree contains a single h-field, indicating\nwhether the incoming pointer is horizontal. The name stems from the idea to color nodes with incoming\ndown-pointer black, and those with incoming horizontal pointer red. No two red nodes can immedaitely\nfollow each other on any path. Therefore, like in the cases of the BB- and SBB-trees, every search path is\nat most twice as long as the height of the tree. There exists a canonical mapping from binary B-trees to\nred-black trees.\n\n4.8. Priority Search Trees\n\nTrees, and in particular binary trees, constitute very effective organisations for data that can be ordered on\na linear scale. The preceding chapters have exposed the most frequently used ingenious schemes for\nefficient searching and maintenance (insertion, deletion). Trees, however, do not seem to be helpful in\nproblems where the data are located not in a one-dimensional, but in a multi-dimensional space. In fact,\nefficient searching in multi-dimensional spaces is still one of the more elusive problems in computer\nscience, the case of two dimensions being of particular importance to many practical applications.\nUpon closer inspection of the subject, trees might still be applied usefully at least in the two-dimensional\ncase. After all, we draw trees on paper in a two-dimensional space. Let us therefore briefly review the\ncharacteristics of the two major kinds of trees so far encountered.\n1. A search tree is governed by the invariants\np.left ≠ NIL implies p.left.x < p.x\np.right ≠ NIL implies p.x < p.right.x\nholding for all nodes p with key x. It is apparent that only the horizontal position of nodes is at all\naccess times in searching, (i.e. path lengths) are minimized.\n2. A heap, also called priority tree, is governed by the invariants\np.left ≠ NIL implies p.y ≤ p.left.y\np.right ≠ NIL implies p.y ≤ p.right.y\nholding for all nodes p with key y. Here evidently only the vertical positions are constrained by the\nIt seems straightforward to combine these two conditions in a definition of a tree organization in a two-\ndimensional space, with each node having two keys x and y, which can be regarded as coordinates of the\nnode. Such a tree represents a point set in a plane, i.e. in a two-dimensional Cartesian space; it is\ntherefore called Cartesian tree [4-9]. We prefer the term priority search tree, because it exhibits that this\nstructure emerged from a combination of the priority tree and the search tree. It is characterized by the\nfollowing invariants holding for each node p:\np.left ≠ NIL implies (p.left.x < p.x) & (p.y ≤ p.left.y)\np.right ≠ NIL implies (p.x < p.right.x) & (p.y ≤ p.right.y)\nwonderful. After all, a considerable degree of freedom in positioning nodes has been taken away and is\nno longer available for choosing arrangements yielding short path lengths. Indeed, no logarithmic bounds\n\non efforts involved in searching, inserting, or deleting elements can be assured. Although this had already\nbeen the case for the ordinary, unbalanced search tree, the chances for good average behaviour are slim.\nEven worse, maintenance operations can become rather unwieldy. Consider, for example, the tree of Fig.\n4.54 (a). Insertion of a new node C whose coordinates force it to be inserted above and between A and B\nrequires a considerable effort transforming (a) into (b).\nMcCreight discovered a scheme, similar to balancing, that, at the expense of a more complicated insertion\nand deletion operation, guarantees logarithmic time bounds for these operations. He calls that structure a\npriority search tree [4-10]; in terms of our classification, however, it should be called a balanced priority\nsearch tree. We refrain from discussing that structure, because the scheme is very intricate and in practice\nhardly used. By considering a somewhat more restricted, but in practice no less relevant problem,\nMcCreight arrived at yet another tree structure, which shall be presented here in detail. Instead of\nassuming that the search space be unbounded, he considered the data space to be delimited by a rectangle\nwith two sides open. We denote the limiting values of the x-coordinate by xmin and xmax.\nIn the scheme of the (unbalanced) priority search tree outlined above, each node p divides the plane into\ntwo parts along the line x = p.x. All nodes of the left subtree lie to its left, all those in the right subtree to\nits right. For the efficiency of searching this choice may be bad. Fortunately, we may choose the\ndividing line differently. Let us associate with each node p an interval [p.L .. p.R), ranging over all x\nvalues including p.L up to but excluding p.R. This shall be the interval within which the x-value of the\nnode may lie. Then we postulate that the left descendant (if any) must lie within the left half, the right\ndescendant within the right half of this interval. Hence, the dividing line is not p.x, but (p.L+p.R)/2. For\neach descendant the interval is halved, thus limiting the height of the tree to log(xmax-xmin). This result\nholds only if no two nodes have the same x-value, a condition which, however, is guaranteed by the\ninvariant (4.90). If we deal with integer coordinates, this limit is at most equal to the wordlength of the\ncomputer used. Effectively, the search proceeds like a bisection or radix search, and therefore these trees\nare called radix priority search trees [4-10]. They feature logarithmic bounds on the number of operations\nrequired for searching, inserting, and deleting an element, and are governed by the following invariants\nfor each node p:\np.left ≠ NIL implies (p.L ≤ p.left.x < p.M) & (p.y ≤ p.left.y)\np.right≠ NIL implies (p.M ≤ p.right.x < p.R) & (p.y ≤ p.right.y)\np.M = (p.L + p.R) DIV 2\np.left.L = p.L\np.left.R = p.M\np.right.L = p.M\np.right.R = p.R\nfor all node p, and root.L = xmin, root.R = xmax.\nA decisive advantage of the radix scheme is that maintenance operations (preserving the invariants under\ninsertion and deletion) are confined to a single spine of the tree, because the dividing lines have fixed\nvalues of x irrespective of the x-values of the inserted nodes.\nTypical operations on priority search trees are insertion, deletion, finding an element with the least\n(largest) value of x (or y) larger (smaller) than a given limit, and enumerating the points lying within a\ngiven rectangle. Given below are procedures for inserting and enumerating. They are based on the\nfollowing type declarations:\nx, y: INTEGER;\nleft, right: Node\nNotice that the attributes x L and xR need not be recorded in the nodes themselves. They are rather\ncomputed during each search. This, however, requires two additional parameters of the recursive\nprocedure insert. Their values for the first call (with p = root) are xmin and xmax respectively. Apart\nfrom this, a search proceeds similarly to that of a regular search tree. If an empty node is encountered, the\n\nelement is inserted. If the node to be inserted has a y-value smaller than the one being inspected, the new\nnode is exchanged with the inspected node. Finally, the node is inserted in the left subtree, if its x-value\nis less than the middle value of the interval, or the right subtree otherwise.\nPROCEDURE insert(VAR p: Node; X, Y, xL, xR: INTEGER);\nIF p = NIL THEN (*not in tree, insert*)\nNEW(p); p.x := X; p.y := Y; p.left := NIL; p.right := NIL\nELSIF p.x = X THEN (*found; don't insert*)\nIF p.y > Y THEN\nt := p.x; p.x := X; X := t;\nt := p.y; p.y := Y; Y := t\nxm := (xL + xR) DIV 2;\nIF X < xm THEN insert(p.left, X, Y, xL, xm)\nELSE insert(p.right, X, Y, xm, xR)\nEND insert\nThe task of enumerating all points x,y lying in a given rectangle, i.e. satisfying x0 ≤ x < x1 and y ≤ y1 is\naccomplished by the following procedure enumerate. It calls a procedure report(x,y) for each point\nfound. Note that one side of the rectangle lies on the x-axis, i.e. the lower bound for y is 0. This\nguarantees that enumeration requires at most O(log(N) + s) operations, where N is the cardinality of the\nsearch space in x and s is the number of nodes enumerated.\nPROCEDURE enumerate(p: Ptr; x0, x1, y, xL, xR: INTEGER);\nIF (p.y <= y) & (x0 <= p.x) & (p.x < x1) THEN\nreport(p.x, p.y)\nxm := (xL + xR) DIV 2;\nIF x0 < xm THEN enumerate(p.left, x0, x1, y, xL, xm) END ;\nIF xm < x1 THEN enumerate(p.right, x0, x1, y, xm, xR) END\nEND enumerate\n\n4.1. Let us introduce the notion of a recursive type, to be declared as\nand denoting the set of values defined by the type T0 enlarged by the single value NONE. The definition\nof the type person, for example, could then be simplified to\nRECTYPE person = RECORD name: Name;\nfather, mother: person\nWhich is the storage pattern of the recursive structure corresponding to Fig. 4.2? Presumably, an\nfrom the programmer. What are the difficulties encountered in the realization of such a feature?\n\n4.2. Define the data structure described in the last paragraph of Section 4.2 in terms of records and\npointers. Is it also possible to represent this family constellation in terms of recursive types as proposed\nin the preceding exercise?\n4.3. Assume that a first-in-first-out (fifo) queue Q with elements of type T0 is implemented as a linked\nlist. Define a module with a suitable data structure, procedures to insert and extract an element from Q,\nand a function to test whether or not the queue is empty. The procedures should contain their own\nmechanism for an economical reuse of storage.\n4.4. Assume that the records of a linked list contain a key field of type INTEGER. Write a program to\nsort the list in order of increasing value of the keys. Then construct a procedure to invert the list.\n4.5. Circular lists (see Fig. 4.55) are usually set up with a so-called list header. What is the reason for\nintroducing such a header? Write procedures for the insertion, deletion, and search of an element\nidentified by a given key. Do this once assuming the existence of a header, once without header.\n\nFig. 4.55. Circular list\n\n4.6. A bidirectional list is a list of elements that are linked in both ways. (See Fig. 4.56) Both links are\noriginating from a header. Analogous to the preceding exercise, construct a module with procedures for\nsearching, inserting, and deleting elements.\n\nFig. 4.56. Bidirectional list\n\n4.7. Does the given program for topological sorting work correctly if a certain pair occurs more\nthan once in the input?\n4.8. The message \"This set is not partially ordered\" in the program for topological sorting is not very\nhelpful in many cases. Extend the program so that it outputs a sequence of elements that form a loop, if\nthere exists one.\n4.9. Write a program that reads a program text, identifies all procedure definitions and calls, and tries to\nestablish a topological ordering among the subroutines. Let P ← Q mean that P is called by Q.\n4.10. Draw the tree constructed by the program shown for constructing the perfectly balanced tree, if the\ninput consists of the natural numbers 1, 2, 3, ... , n.\n4.11. Which are the sequences of nodes encountered when traversing the tree of Fig. 4.23 in preorder,\ninorder, and postorder?\n4.12. Find a composition rule for the sequence of n numbers which, if applied to the program for straight\nsearch and insertion, yields a perfectly balanced tree.\n4.13. Consider the following two orders for traversing binary trees:\n\na1. Traverse the right subtree.\n\na2. Visit the root.\na3. Traverse the left subtree.\nb1. Visit the root.\nb2. Traverse the right subtree.\nb3. Traverse the left subtree.\nAre there any simple relationships between the sequences of nodes encountered following these orders\nand those generated by the three orders defined in the text?\n4.14. Define a data structure to represent n-ary trees. Then write a procedure that traverses the n-ary tree\nand generates a binary tree containing the same elements. Assume that the key stored in an element\noccupies k words and that each pointer occupies one word of storage. What is the gain in storage when\nusing a binary tree versus an n-ary tree?\n4.15. Assume that a tree is built upon the following definition of a recursive data structure (see Exercise\n4.1). Formulate a procedure to find an element with a given key x and to perform an operation P on this\nleft, right: Tree\n4.16. In a certain file system a directory of all files is organized as an ordered binary tree. Each node\ndenotes a file and specifies the file name and, among other things the date of its last access, encoded as an\ninteger. Write a program that traverses the tree and deletes all files whose last access was before a certain\n4.17. In a tree structure the frequency of access of each element is measured empirically by attributing to\neach node an access count. At certain intervals of time, the tree organization is updated by traversing the\ntree and generating a new tree by using the program of straight search and insertion, and inserting the\nkeys in the order of decreasing frequency count. Write a program that performs this reorganization. Is\nthe average path length of this tree equal to, worse, or much worse than that of an optimal tree?\n4.18. The method of analyzing the tree insertion algorithm described in Sect. 4.5 can also be used to\ncompute the expected numbers Cn of comparisons and Mn of moves (exchanges) which are performed by\nQuicksort, sorting n elements of an array, assuming that all n! permutations of the n keys 1, 2, ... , n are\nequally likely. Find the analogy and determine Cn and Mn.\n4.19. Draw the balanced tree with 12 nodes which has the maximum height of all 12-node balanced trees.\nIn which sequence do the nodes have to be inserted so that the AVL-insertion procedure generates this\n4.20. Find a sequence of n insertion keys so that the procedure for insertion in an AVL-tree performs each\nof the four rebalancing acts (LL, LR, RR, RL) at least once. What is the minimal length n for such a\n4.21. Find a balanced tree with keys 1 ... n and a permutation of these keys so that, when applied to the\ndeletion procedure for AVL-trees, it performs each of the four rebalancing routines at least once. What is\nthe sequence with minimal length n?\n4.22. What is the average path length of the Fibonacci-tree Tn?\n4.23. Write a program that generates a nearly optimal tree according to the algorithm based on the\nselection of a centroid as root.\n4.24. Assume that the keys 1, 2, 3, ... are inserted into an empty B-tree of order 2. Which keys cause page\nsplits to occur? Which keys cause the height of the tree to increase? If the keys are deleted in the same\norder, which keys cause pages to be merged (and disposed) and which keys cause the height to decrease?\nAnswer the question for (a) a deletion scheme using balancing, and (b) a scheme whithout balancing\n(upon underflow, a single item only is fetched from a neighboring page).\n\n4.25. Write a program for the search, insertion, and deletion of keys in a binary B-tree. Use the node type\nand the insertion scheme shown above for the binary B-tree.\n4.26. Find a sequence of insertion keys which, starting from the empty symmetric binary B-tree, causes\nshortest such sequence?\n4.27. Write a procedure for the deletion of elements in a symmetric binary B-tree. Then find a tree and a\nshort sequence of deletions causing all four rebalancing situations to occur at least once.\n4.28. Formulate a data structure and procedures for the insertion and deletion of an element in a priority\nsearch tree. The procedures must maintain the specified invariants. Compare their performance with that\nof the radix priority search tree.\n4.29. Design a module with the following procedures operating on radix priority search trees:\n-- insert a point with coordinates x, y.\n-- enumerate all points within a specified rectangle.\n-- find the point with the least x-coordinate in a specified rectangle.\n-- find the point with the largest y-coordinate within a specified rectangle.\n-- enumerate all points lying within two (intersecting) rectangles.\n\n4-1. G.M. Adelson-Velskii and E.M. Landis. Doklady Akademia Nauk SSSR, 146, (1962), 263-66; English\ntranslation in Soviet Math, 3, 1259-63.\n4-2. R. Bayer and E.M. McCreight. Organization and Maintenance of Large Ordered Indexes. Acta\nInformatica, 1, No. 3 (1972), 173-89.\n4-3. -----, Binary B-trees for Virtual memory. Proc. 1971 ACM SIGFIDET Workshop, San Diego, Nov.\n1971, pp. 219-35.\n4-4. -----, Symmetric Binary B-trees: Data Structure and Maintenance Algorithms. Acta Informatica, 1,\nNo. 4 (1972), 290-306.\n4-5. T.C. Hu and A.C. Tucker. SIAM J. Applied Math, 21, No. 4 (1971) 514-32.\n4-6. D. E. Knuth. Optimum Binary Search Trees. Acta Informatica, 1, No. 1 (1971), 14-25.\n4-7. W.A. Walker and C.C. Gotlieb. A Top-down Algorithm for Constructing Nearly Optimal\nLexicographic Trees. in Graph Theory and Computing (New York: Academic Press, 1972), pp.\n4-8. D. Comer. The ubiquitous B-Tree. ACM Comp. Surveys, 11, 2 (June 1979), 121-137.\n4-9. J. Vuillemin. A unifying look at data structures. Comm. ACM, 23, 4 (April 1980), 229-239.\n4-10. E.M. McCreight. Priority search trees. SIAM J. of Comp. (May 1985)\n\n5 Key Transformations (Hashing)\n\n5.1. Introduction\nThe principal question discussed in Chap. 4 at length is the following: Given a set of items characterized\nby a key (upon which an ordering relation is defined), how is the set to be organized so that retrieval of an\nitem with a given key involves as little effort as possible? Clearly, in a computer store each item is\nultimately accessed by specifying a storage address. Hence, the stated problem is essentially one of finding\nan appropriate mapping H of keys (K) into addresses (A):\nH: K → A\nIn Chap. 4 this mapping was implemented in the form of various list and tree search algorithms based on\ndifferent underlying data organizations. Here we present yet another approach that is basically simple and\nvery efficient in many cases. The fact that it also has some disadvantages is discussed subsequently.\nThe data organization used in this technique is the array structure. H is therefore a mapping transforming\nkeys into array indices, which is the reason for the term key transformation that is generally used for this\ntechnique. It should be noted that we shall not need to rely on any dynamic allocation procedures; the array\nis one of the fundamental, static structures. The method of key transformations is often used in problem\nareas where tree structures are comparable competitors.\nThe fundamental difficulty in using a key transformation is that the set of possible key values is much\nlarger than the set of available store addresses (array indices). Take for example names consisting of up to\n16 letters as keys identifying individuals in a set of a thousand persons. Hence, there are 2616 possible keys\nwhich are to be mapped onto 103 possible indices. The function H is therefore obviously a many-to-one\nfunction. Given a key k, the first step in a retrieval (search) operation is to compute its associated index h =\nH(k), and the second -- evidently necessary -- step is to verify whether or not the item with the key k is\nindeed identified by h in the array (table) T, i.e., to check whether T[H(k)].key = k. We are immediately\nconfronted with two questions:\n1. What kind of function H should be used?\n2. How do we cope with the situation that H does not yield the location of the desired item?\nThe answer to the second question is that some method must be used to yield an alternative location, say\nindex h', and, if this is still not the location of the wanted item, yet a third index h\", and so on. The case in\nwhich a key other than the desired one is at the identified location is called a collision; the task of\ngenerating alternative indices is termed collision handling. In the following we shall discuss the choice of a\ntransformation function and methods of collision handling.\n\n5.2. Choice of a Hash Function\n\nA prerequisite of a good transformation function is that it distributes the keys as evenly as possible over the\nrange of index values. Apart from satisfying this requirement, the distribution is not bound to any pattern,\nand it is actually desirable that it give the impression of being entirely random. This property has given this\nmethod the somewhat unscientific name hashing, i.e., chopping the argument up, or making a mess. H is\ncalled the hash function. Clearly, it should be efficiently computable, i.e., be composed of very few basic\narithmetic operations.\nAssume that a transfer function ORD(k) is avilable and denotes the ordinal number of the key k in the set\nof all possible keys. Assume, furthermore, that the array indices i range over the intergers 0 .. N-1, where N\nis the size of the array. Then an obvious choice is\nH(k) = ORD(k) MOD N\nIt has the property that the key values are spread evenly over the index range, and it is therefore the basis of\nmost key transformations. It is also very efficiently computable, if N is a power of 2. But it is exactly this\ncase that must be avoided, if the keys are sequences of letters. The assumption that all keys are equally\nlikely is in this case mistaken. In fact, words that differ by only a few characters then most likely map onto\n\nidentical indices, thus effectively causing a most uneven distribution. It is therefore particularly\nrecommended to let N be a prime number [5-2]. This has the conseqeunce that a full division operation is\nneeded that cannot be replaced by a mere masking of binary digits, but this is no serious drawback on most\nmodern computers that feature a built-in division instruction.\nOften, hash funtions are used which consist of applying logical operations such as the exclusive or to some\nparts of the key represented as a sequence of binary digits. These operations may be faster than division on\nsome computers, but they sometimes fail spectacularly to distribute the keys evenly over the range of\nindices. We therefore refrain from discussing such methods in further detail.\n\n5.3. Collision Handling\n\nIf an entry in the table corresponding to a given key turns out not to be the desired item, then a collision is\npresent, i.e., two items have keys mapping onto the same index. A second probe is necessary, one based on\nan index obtained in a deterministic manner from the given key. There exist several methods of generating\nsecondary indices. An obvious one is to link all entries with identical primary index H(k) together in a\nlinked list. This is called direct chaining. The elements of this list may be in the primary table or not; in the\nlatter case, storage in which they are allocated is usually called an overflow area. This method has the\ndisadvantage that secondary lists must be maintained, and that each entry must provide space for a pointer\n(or index) to its list of collided items.\nAn alternative solution for resolving collisions is to dispense with links entirely and instead simply look at\nother entries in the same table until the item is found or an open position is encountered, in which case one\nmay assume that the specified key is not present in the table. This method is called open addressing [5-3].\nNaturally, the sequence of indices of secondary probes must always be the same for a given key. The\nalgorithm for a table lookup can then be sketched as follows:\nh := H(k); i := 0;\nIF T[h].key = k THEN item found\nELSIF T[h].key = free THEN item is not in table\nELSE (*collision*)\ni := i+1; h := H(k) + G(i)\nUNTIL found or not in table (or table full)\nVarious functions for resolving collisions have been proposed in the literature. A survey of the topic by\nMorris in 1968 [4-8] stimulated considerable activities in this field. The simplest method is to try for the\nnext location -- considering the table to be circular -- until either the item with the specified key is found or\nan empty location is encountered. Hence, G(i) = i; the indices hi used for probing in this case are\nh0 = H(k)\nhi = (hi-1 + i) MOD N, i = 1 ... N-1\nThis method is called linear probing and has the disadvantage that entries have a tendency to cluster\naround the primary keys (keys that had not collided upon insertion). Ideally, of course, a function G should\nbe chosen that again spreads the keys uniformly over the remaining set of locations. In practice, however,\nthis tends to be too costly, and methods that offer a compromise by being simple to compute and still\nsuperior to the linear function are preferred. One of them consists of using a quadratic function such that\nthe sequence of indices for probing is\nh0 = H(k)\nhi = (h0 + i2) MOD N i>0\nNote that computation of the next index need not involve the operation of squaring, if we use the following\nrecurrence relations for hi = i2 and di = 2i + 1.\nhi+1 = hi + di\ndi+1 = di + 2 i>0\n\nwith h0 = 0 and d0 = 1. This is called quadratic probing, and it essentially avoids primary clustering,\nalthough practically no additional computations are required. A very slight disadvantage is that in probing\nnot all table entries are searched, that is, upon insertion one may not encounter a free slot although there are\nsome left. In fact, in quadratic probing at least half the table is visited if its size N is a prime number. This\nassertion can be derived from the following deliberation. If the i th and the j th probes coincide upon the\nsame table entry, we can express this by the equation\ni2 MOD N = j2 MOD N\n(i2 - j2) ≡ 0 (modulo N)\nSplitting the differences up into two factors, we obtain\n(i + j)(i - j) ≡ 0 (modulo N)\nand since i ≠ j, we realize that either i or j have to be at least N/2 in order to yield i+j = c*N, with c being an\ninteger. In practice, the drawback is of no importance, since having to perform N/2 secondary probes and\ncollision evasions is extremely rare and occurs only if the table is already almost full.\nAs an application of the scatter storage technique, the cross-reference generator procedure shown in Sect.\n4.4.3 is rewritten. The principal differences lie in the procedure search and in the replacement of the\npointer type Node by the global hash table of words T. The hash function H is the modulus of the table size;\nquadratic probing was chosen for collision handling. Note that it is essential for good performance that the\ntable size be a prime number.\nAlthough the method of key transformation is most effective in this case -- actually more efficient than tree\norganizations -- it also has a disadvantage. After having scanned the text and collected the words, we\npresumably wish to tabulate these words in alphabetical order. This is straightforward when using a tree\norganization, because its very basis is the ordered search tree. It is not, however, when key transformations\nare used. The full significance of the word hashing becomes apparent. Not only would the table printout\nhave to be preceded by a sort process (which is omitted here), but it even turns out to be advantageous to\nkeep track of inserted keys by linking them together explicitly in a list. Hence, the superior performance of\nthe hashing method considering the process of retrieval only is partly offset by additional operations\nrequired to complete the full task of generating an ordered cross-reference index.\n\nCONST P = 997; (*prime, table size*)\n\nWordLen = 32; (*max length of keys*)\nNoc = 16; (*max no. of items per word*)\nRECORD key: Word; n: INTEGER;\nPROCEDURE search(T: Table; VAR a: Word);\nBEGIN (*compute hash index h for a; uses global variable line*)\ni := 0; h := 0;\nWHILE a[i] > 0X DO h := (256*h + ORD(a[i])) MOD P; INC(i) END ;\nd := 1; found := FALSE;\nIF T[h].key = a THEN (*match*)\nfound := TRUE; T[h].lno[T[h].n] := line;\nIF T[h].n < Noc THEN INC(T[h].n) END\nELSIF T[h].key[0] = \" \" THEN (*new entry*)\nfound := TRUE; COPY(a, T[h].key); T[h].lno[0] := line; T[h].n := 1\nELSE (*collision*) h := h+d; d := d+2;\nIF h >= P THEN h := h-P END ;\nIF d = P THEN Texts.WriteString(W, \" Table overflow\"); HALT(88) END\n\nUNTIL found\nEND search;\nPROCEDURE Tabulate(T: Table); (*uses global writer W*)\nFOR k := 0 TO P-1 DO\nIF T[k].key[0] # \" \" THEN\nTexts.WriteString(W, T[k].key); Texts.Write(W, TAB);\nFOR i := 0 TO T[k].n -1 DO Texts.WriteInt(W, T[k].lno[i], 4) END ;\nEND Tabulate;\nPROCEDURE CrossRef(VAR R: Texts.Reader);\nVAR i: INTEGER; ch: CHAR; w: Word;\nH: Table;\nFOR i := 0 TO P-1 DO H[i].key[0] := \" \" END ; (*allocate and clear hash table*)\nline := 0;\ni := 0;\nsearch(H, w)\nTexts.WriteLn(W); Texts.WriteLn(W); Tabulate(H)\nEND CrossRef\n\n5.4. Analysis of Key Transformation\n\nInsertion and retrieval by key transformation has evidently a miserable worst-case performance. After all, it\nis entirely possible that a search argument may be such that the probes hit exactly all occupied locations,\nmissing consistently the desired (or free) ones. Actually, considerable confidence in the correctness of the\nlaws of probability theory is needed by anyone using the hash technique. What we wish to be assured of is\nthat on the average the number of probes is small. The following probabilistic argument reveals that it is\neven very small.\nLet us once again assume that all possible keys are equally likely and that the hash function H distributes\nthem uniformly over the range of table indices. Assume, then, that a key has to be inserted in a table of size\nn which already contains k items. The probability of hitting a free location the first time is then (n-k)/n.\nThis is also the probability p1 that a single comparison only is needed. The probability that excatly one\nsecond probe is needed is equal to the probability of a collision in the first try times the probability of\nhitting a free location the next time. In general, we obtain the probability pi of an insertion requiring\nexactly i probes as\n\np 1 = (n-k)/n\np 2 = (k/n) × (n-k)/(n-1)\np 3 = (k/n) × (k-1)/(n-1) × (n-k)/(n-2)\np i = (k/n) × (k-1)/(n-1) × (k-2)/(n-2) × … × (n-k)/(n-(i-1))\nThe expected number E of probes required upon insertion of the k+1st key is therefore\nEk+1 = Si: 1 ≤ i ≤ k+1 : i×pi\n= 1 × (n-k)/n + 2 × (k/n) × (n-k)/(n-1) + ...\n+ (k+1) * (k/n) × (k-1)/(n-1) × (k-2)/(n-2) × … × 1/(n-(k-1))\n= (n+1) / (n-(k-1))\nSince the number of probes required to insert an item is identical with the number of probes needed to\nretrieve it, the result can be used to compute the average number E of probes needed to access a random\nkey in a table. Let the table size again be denoted by n, and let m be the number of keys actually in the\ntable. Then\nE = (Sk: 1 ≤ k ≤ m: Ek) / m\n= (n+1) × (Sk: 1 ≤ k ≤ m: 1/(n-k+2))/m\n= (n+1) × (Hn+1 - Hn-m+1)\nwhere H is the harmonic function. H can be approximated as Hn = ln(n) + g, where g is Euler's constant. If,\nmoreover, we substitute a for m/(n+1), we obtain\nE = (ln(n+1) - ln(n-m+1))/a = ln((n+1)/(n-m+1))/a = -ln(1-a)/a\na is approximately the quotient of occupied and available locations, called the load factor; a = 0 implies an\nempty table, a = n/(n+1) ≈ 1 a full table. The expected number E of probes to retrieve or insert a randomly\nchosen key is listed in Table 5.1 as a function of the load factor. The numerical results are indeed\nsurprising, and they explain the exceptionally good performance of the key transformation method. Even if\na table is 90% full, on the average only 2.56 probes are necessary to either locate the key or to find an\nempty location. Note in particular that this figure does not depend on the absolute number of keys present,\nbut only on the load factor.\na E\n0.1 1.05\n0.25 1.15\n0.5 1.39\n0.75 1.85\n0.9 2.56\n0.95 3.15\n0.99 4.66\nTable 4.6 Expected number of probes as a function of the load factor.\nThe above analysis was based on the use of a collision handling method that spreads the keys uniformly\nover the remaining locations. Methods used in practice yield slightly worse performance. Detailed analysis\nfor linear probing yields an expected number of probes as\nE = (1 - a/2) / (1 - a)\nSome numerical values for E(a) are listed in Table 4.7 [5-4]. The results obtained even for the poorest\nas the panacea for everything. This is particularly so because its performance is superior even to the most\nsophisticated tree organization discussed, at least on the basis of comparison steps needed for retrieval and\ninsertion. It is therefore important to point out explicitly some of the drawbacks of hashing, even if they are\nobvious upon unbiased consideration.\n\na E\n0.1 1.06\n0.25 1.17\n0.5 1.50\n0.75 2.50\n0.9 5.50\n0.95 10.50\nTable 4.7 Expected number of probes for linear probing.\nCertainly the major disadvantage over techniques using dynamic allocation is that the size of the table is\nfixed and cannot be adjusted to actual demand. A fairly good a priori estimate of the number of data items\nto be classified is therefore mandatory if either poor storage utilization or poor performance (or even table\noverflow) is to be avoided. Even if the number of items is exactly known -- an extremely rare case -- the\ndesire for good performance dictates to dimension the table slightly (say 10%) too large.\nThe second major deficiency of scatter storage techniques becomes evident if keys are not only to be\ninserted and retrieved, but if they are also to be deleted. Deletion of entries in a hash table is extremely\ncumbersome unless direct chaining in a separate overflow area is used. It is thus fair to say that tree\norganizations are still attractive, and actually to be preferred, if the volume of data is largely unknown, is\nstrongly variable, and at times even decreases.\n\n5.1. If the amount of information associated with each key is relatively large (compared to the key itself),\nthis information should not be stored in the hash table. Explain why and propose a scheme for representing\nsuch a set of data.\n5.2. Consider the proposal to solve the clustering problem by constructing overflow trees instead of\noverflow lists, i.e., of organizing those keys that collided as tree structures. Hence, each entry of the scatter\n(hash) table can be considered as the root of a (possibly empty) tree. Compare the expected performance of\nthis tree hashing method with that of open addressing.\n5.3. Devise a scheme that performs insertions and deletions in a hash table using quadratic increments for\ncollision resolution. Compare this scheme experimentally with the straight binary tree organization by\napplying random sequences of keys for insertion and deletion.\n5.4. The primary drawback of the hash table technique is that the size of the table has to be fixed at a time\nwhen the actual number of entries is not known. Assume that your computer system incorporates a\ndynamic storage allocation mechanism that allows to obtain storage at any time. Hence, when the hash\ntable H is full (or nearly full), a larger table H' is generated, and all keys in H are transferred to H',\nwhereafter the store for H can be returned to the storage administration. This is called rehashing. Write a\nprogram that performs a rehash of a table H of size n.\n5.5. Very often keys are not integers but sequences of letters. These words may greatly vary in length, and\ntherefore they cannot conveniently and economically be stored in key fields of fixed size. Write a program\nthat operates with a hash table and variable length keys.\n\n5-1. W.D. Maurer. An Improved Hash Code for Scatter Storage. Comm. ACM, 11, No. 1 (1968), 35-38.\n5-2. R. Morris. Scatter Storage Techniques. Comm. ACM, 11, No. 1 (1968), 38-43.\n5-3. W.W. Peterson. Addressing for Random-access Storage. IBM J. Res. & Dev., 1, (1957), 130-46.\n5-4. G. Schay and W. Spruth. Analysis of a File Addressing Method. Comm. ACM, 5, No. 8 459-62.", "pred_label": "__label__1", "pred_score_pos": 0.7902318239212036} {"content": "Ap biology egg osmosis lab\n\nA study of biology includes the study of the chemical basis of living organisms, DNA. Other related sciences include microbiology and organic chemistry. The word science comes from a Latin word scientica, which means knowledge, or information. Science is a process of systematically gathering detailed information and gaining exact knowledge.\n\nAp biology egg osmosis lab\n\n\n\nPearson - The Biology Place\n\nIt turns out that the habit loop is incredibly powerful and is something that has been hardwired into our psyches. It also helps explains exactly why habits are so hard to shake. Identify the Stages First identify the cue, routine, and reward that lead to your habit.\n\nFor example, recognize how after a tough day at work cueyou come Ap biology egg osmosis lab and plop down on the couch routine. What alternative behaviors might provide comparable reward to the one you are trying to eliminate?\n\nCreate a list of options. Could you swap out your open-ended Netflix binge for brief meditation or a walk with your partner?\n\nFocus on new routines that will help you decompress after a stressful day the cue and leave you in a positive frame of mind to get freelance work done reward. Make do-able commitments to test drive new routines and approach them as a series of experiments.\n\nAfter more testing, you may find more vigorous exercise is what helps you get in zone. Anticipate Setbacks Behavior change is hard.\n\nInstead, make your habit loop bulletproof: The fact that vaccines do cause deaths sometimes is not even a fact in dispute. This program was started as a result of a law passed in that gave pharmaceutical companies total legal immunity from being sued due to injuries and deaths resulting from vaccines.\n\nRecent Posts\n\nIf you or a family member is injured or dies from vaccines, you must sue the federal government in this special vaccine court. Also, as we have previously reportedthe CDC lists official ways for an infant to die, but vaccine deaths are not even an option.\n\nFrom throughfor example, VAERS received 1, reports of infant deaths following vaccination, representing 4. They describe an Orwellian Catch situation wherein it is nearly impossible to categorize post-vaccine deaths as vaccine-related.\n\n\nTo say that there is no probability of some vaccinations contributing to the development of autism contradicts the science. Is Right About Vaccines: You can read more about that here: We also have documents that indicate scientific fraud and manipulation of data when it comes to the adverse affects of vaccinations.\n\nThe story was under the heading on the RadioNZ website: One thing we now know for sure is that the development of autism goes far beyond genetics. The research suggesting that vaccines and glyphosate could possibly play a role in autism comes from various peer-reviewed scientific journals as well as independent research conducted by renowned scientists from all over the world.\n\nOne of those scientists is Dr. Information regarding autism and pesticides are linked in two articles above after the first paragraph. In recent years her research has focused specifically on biology, nutrition and health.\n\n\nOne common substance found in vaccines is aluminum. Seneff in argues that severe adverse reactions to the chemicals like aluminum within vaccines can be associated with life threatening conditions that are associated with the heart and brain.\n\n\nFurthermore, the study shows how abnormally high levels of aluminum were recently found in hair analyses of over half of 34 autistic children that were analyzed.Play a game of Kahoot! here. Kahoot! is a free game-based learning platform that makes it fun to learn – any subject, in any language, on any device, for all ages!\n\nThis is an archive page for vetconnexx.com, it is no longer maintained. Go to the main site at vetconnexx.com to find worksheets and resources for teaching biology, anatomy, and physics.\n\nAP Biology Lab #1: Diffusion and Osmosis Purpose: In this lab, we will be conducting an experiment where we will observe the acts of passive transport: diffusion and osmosis. The experiment will show how molecules in a solution are able to move from an area of high concentration to an area of low concentration/5(40).\n\nInternational Conferences 2018-19\n\n2 Pre- requisites Knowledge of biology at Higher secondary level Objectives of the course To introduce the student to various aspects of lab organisation Organisation of the lab – lab routines- safety rules.\n\nUNITED NATIONS ENVIRONMENT PROGRAMME INTERNATIONAL LABOUR ORGANISATION WORLD HEALTH ORGANIZATION INTERNATIONAL PROGRAMME ON CHEMICAL SAFETY ENVIRONMENTAL HEALTH CRITERIA Aluminium This report contains the collective views of an international group of experts and does not necessarily represent the decisions or the stated policy of .\n\n\nAp biology egg osmosis lab", "pred_label": "__label__1", "pred_score_pos": 0.8099311590194702} {"content": "Вы находитесь на странице: 1из 8\n\nWill we need Material Tax Classification for Sales?\n\nAns:-Yes. It shall be required and has to be maintained in material master beneath the view Sales -\nSales Org Data1, Tax data section.\n\nHow do the Ship to party and bill to party function?\n\nAns:- As per the present rules, the Bill to party has to be kept in mind for calculating taxes. Please refer\nto the notes delivered from SAP\n\nSome materials have been blocked for procurement and production. Even though deletion flag is\nset for a material/plant level, the order can be still entered ( with a warning message). Is there a\nway to block such transactions for a material flagged for deletion?\nAns: Sales Status field in the sales organization view of the material master may be used to block any\ntransaction for the material.\n\nWe can define our own exchange rate types and use them instead of the defaulted types, ‘M’, ‘B’\nand ‘G’. How can we overwrite default types in SD?\nAns: Exchange rate gets copied from the customer master record. Exchange rate types are to be\nmaintained for the customer in the sales screen of the customer master record. Shipping\n\nThe PL00 condition is fine in delivery. But when we try to print to either the screen or printer, an\nerror V1032 occurs. Why?\nAns: In order to use the Packing list PL00 (packing slip in delivery) you must do ‘Packing’ in the delivery\nnote (edit->packing)\n\nwe have to enter a shipping point while creating a delivery. Is it possible to create delivery without\nshipping points?\nAns: When you are releasing a sales order, choose Sales document -> Subsequent functions-> Create\ndelivery, then the shipping point will be brought in from the sales order. In all other scenarios you have\nto key in the shipping point. The above described scenario will only work if all items on the sales order\nare to be shipped from the same shipping point.\n\nSAP allows a non-inventory item and an inventory item to be in the same document till delivery\nbut splits at the time of creation of billing document. Can we combine a non-inventory item with\nan inventory item in one invoice? Can we treat it as a value item in sales order so that it is priced\nand then make it as a text item in delivery documents so that it appears in the same invoice and\ndoes not split?\n\nA1: Make the non-stock material deliverable, but not pickable. Both items will carry into the delivery,\nand therefore appear on the same invoice.\nA2: Change the copy rule for orders->invoices and deliveries->invoices to specify that invoice\ncombination is permitted. However note that for system to create combined invoices, PO number,\npayment terms, sales organization, and distribution channel must be identical. Else undesirable\ncombinations may be created by the system.\n\nIt is impossible to price at the material level (matnr) , when a material has a pricing reference\n(mvke-pmatn) set up against it in the master data. Pricing always look for the pref, even if a price is\nset up against the material and not the pref. How can we price by material and pref?\nA: The field used to look up at the price is defined in Access sequence. You may find a step with PMATN\nas material number. If you insert a step with MATNR then the system will first look for the material, if\nnot found (use the exclusion tick box) it will look for the pref.\n\nWe generated a new condition table. Assigned the condition to access sequence. Created a\ncondition record. Access sequence is assigned to the output type. But when we create a billing\ndocument, output screen comes up blank for the output type. When we look up Determination\nAnalysis, we get an error “Note 524 Access not made (Initialized Field)”. What else is required to be\nAns: Assign output determination procedure to the header of the document and the output type.\n\nHow can we set up to have the VAT# be accepted in the Ship-To Master File Data Control screen?\nA: IMG->Fin. Acct.>AR and AP ->Customer acct>Master Record -> Prepare to Create Customer->\nDefine Acct. Group.\n\nWe want to explode Bill of Material automatically at time of Order entry and explode an\nEquipment BOM in the sales order. What are the setting required?\nAns: Use an item category that is configured for bills of material for having a sales BOM to explode\n\nHow can we make the Customer Group 1 (or 2, 3, 4, 5) a mandatory field?\n\nA: Logistic General-> Logistics Basic Data: Business Partners -> Customers -> Control -> Define account\ngroups and field selection for customer\nChoose Customer Acct. GR. (double-click). -> Field Status: Sales data (double click) -> sales (double\nclick) .Check the radio button against Customer Gr as REQ. ENTRY. Save the settings to make\ncustomer GR entry mandatory .\n\nIs there an user exit to copy the data into planning table?\n\nAns:- Use user exit MCP20001 and include ZXSOPU01.\n\nWe get a report screen: “Goods issue: Problem Log” during the delivery process when activating\nPost Goods Issue button. We want to include our own error message to this list if the selected\nbatch is not on a customer defined table. What is the best way?\nAns: Try User exit – USEREXIT_SAVE_DOCUMENT_PREPARE Difference between Condition Type\nPlease explain the difference between Ek01 ( Actual Cost) and EK02 Calculated Cost.\n\nThese are the condition type that will display the results of the unit costing for certain type of sales\nEK01 :\nIf you use this condition type, the result of unit costing is issued to the first position on the conditions\nscreen for the item. The value can be used as a basis for price determination.\n\nIf you use this condition type, the result of unit costing is simply a statistical value which you can\ncompare with the price.\nPlease note the following points :\n1) The condition type must have condition category ‘Q’ (costing).\n2) The condition type must agree with the condition type defined for unit costing in the pricing\n\nI have a customer who is being offered two discounts ie k007 and k005, now I want to exclude k007\nfor the next 2 orders or so? I have set the exclusion indicator for the condition type, but still the\ncondition is being accepted when I create a sales order. Am I missing something, how do I do it?\nNeed to change the validity of the condition record for the condition type K007 defining it not valid\nfor that particular 2 months. And also the settings of the Requirements as it is correct that it\noverrules the exclusion. Accumulate the amount of condition types in accounting document\n\nAns:- To accumulate the amount of condition types in accounting document without affecting the\npricing display in billing document.\nAs an illustration :-\nZPXX 3500\nZDXX 1000-\nZWXX 500-\n(all condition types are shown separately in pricing view)\n\nDr Vendor 2000\nCr Sales 2000 (ZPXX – ZDXX – ZWXX)\nOne way to do it is :-\n\nMark the condition types you want to group as statistical and remove the account assignment key.\nCreate a subtotal in your pricing procedure that will add them together and put in the account\nassignment key for it. This way the individual components will still display on your pricing screen but FI\nwill only get one posting.Determine sales price with shipping point (Scenario).\nYou are trying to use shipping point as a key field (with sales org. distribution channel and ship-to party\ntogether) to determine the sales price.You created a condition table with the above key fields, and\nmaintained the relevant setting (access sequence, condition type and pricing procedure).\nThere is an error message in the sales order pricing analysis (“access not made” in the shipping point\nfield). In the access sequence, you found that the shipping point field’s document structure is KOMK.\n\nCan you put to item level field in the condition table and access sequence?\nStructure KOMK refers to header of the sales order, but shipping point of course is on item level.\nYou’ll have to do some settings to reach your goal, it is possible.\nStep 1\nAppend structure KOMP. Do this by changing through SE11 the table KOMPAZ.\nThis is the include for structure KOMP.\nAdd a component e.g. ZZVSTEL with component type VSTEL.\nSave, activate.\nIf you want to make more points, assign search help H_TVST to the component.\nAsk a programmer if you don’t understand this part.\nStep 2\nChange user exit MV45AFZZ. Say there that field ZVSTEL should be filled with information from your\nshipping point.\nThe coding should be like tkomp-zzvstel = vbap-vstel.\nSave, generate.\nStep 3\nMake a new table as you did before, but first maintain your new field in Condition: allowed fields.\nWhen you create your new table you will see you have two shipping points.\nWith the button technical view you can check which one ZZVSTEL or VSTEL.\nStep 4\nFinish with the steps you did before. That was ok.\n\nBlock Sales Document Type / Delivery / Billing by Customer\n\nWhen there is a temporarily stop of business with a customer, you can block new orders to be created for\nthis customer. You can have the options of blocking all the work flow or let the delivery and billing to\ncontinue for any open orders.\nVD05 - Block/Unblock Customer\nOVAS - Sales Order Type Blocking reasons\nOVAL - Blocking reasons links with Sales Order Type\nOVZ7 - Delivery Blocking reasons\nOVV3 - Billing Blocking reasons In 4.6x,\nif you found that your Sales Order Billing Block is not working, it is because you need to build the Billing\nBlock for the Billing Type.\nSM30 - Table/View V_TVFSP If you want a material to be blocked, go to the Basic data 1 view of the\nmaterial, there in the general data you have \" X-plant material status \". Also in Cost estimate 1 view of the\nmaterial you have Plant Specific Material status. Use the options available to block the material in these\ntwo views. You cannot use the material in sales order –\n\nWhat is Sales Order Stock\n\nSales Order Stock is stock with Special Stock type E. It can fall into the usual stock categories such as\nunrestricted, blocked etc. but \"belongs\" to a sales order. For example, you create a sales order for a part\nand assign a sales item category that generates an individual requisition, the requirement has an account\nassignment linking it to the sales order schedule line, and you convert that requisition to a Purchase\nOrder. When you receive the Purchase Order, the stock is placed in sales order stock. It will show against\nthe sales order/sales order line. It can only be delivered against that sales order line. Any availability\ncheck etc for that material on any other sales order will not take it into account as it is not available except\nto the sales order line the stock is assigned to.\n\nWhat is Third Party Order Processing\n\nThird party order processing is as follows: Assume three companies X, Y and Z X - The company, y - The\ncustomer Z - Vendor Whenever X gets a PO from Y to supply some goods; X has an option of either\nmanufacturing those goods or procuring those goods. If he is procuring the goods, there are two methods\nthat are generally followed: Method 1) After receiving the PO from Y, X creates a sales order against Y.\nNow at the same time he also creates a PO to a vendor Z to produce the goods Z produces the goods\nand supplies to X X receives the goods from Z Then X delivers the same goods to Y. After that X invoices\nY and Z invoices X. Note : Here there is no direct/ Indirect relation between Z and Y. This process is\nknown as Trading Process. And the Material here is created with Material type HAWA. The other method\nis a Third party order processing method: Here the glaring difference is that instead of Z supplying the\nmaterial to X and X in turn supplying the same\n\nThird Party\nZ supplies the material to Y and acknowledges the same to X. Z will send a copy of delivery\nacknowledgement and invoice to X. After receiving the delivery confirmation and invoice from Z, X has to\nTransaction code MIRO. The next step for X is to create an invoice and submit to Y. Only after the invoice\nverification document is posted then only X can create an invoice for Y. This is the business flow that is\nfollowed for third party order configuration. There are few steps that have to be configured to enable the\nsystem to function as mentioned above. 1. If you are always following a third party process for a material\nthen you have to create the material using item category group BANS. The procurement type should be\nmarked as External procurement (F) in MRP 2 view of the material master record. If you are not always\nas NORM and the procurement type should be marked as ( X) meaning both types of procurement ( in\nhouse manufacturing\n\nI defined manually a condition type Z004 (as a copy of the condition type K004). I then tried to\ncreate condition in transaction code VK31 in the section Discount/Surcharges -> By Material. The\nsystem reported, “Table 304 is not defined for use with condition type ZEC1.” How should I\nresolve this?\nAns:- VK31 works with pricing reports. If you want to have a new condition type to be maintainable via\nVK31 or VK32., you need to do the following: Create pricing report via transaction code V/LA and include\nthe tables you need. Extend the price area menu via SE43. Area menu = COND_AV.\n\nI am in the VA02 transaction for a sales order and want to reject the line items and cancel the\nentire sales order. What is the menu path needed to achieve this goal?\nAns:- Click the reject document button and then enter a reason for rejection. This will reject the line items\nand the sales order. You can enter a reason for rejection on the line item sales a tab.\n\nI want to use automatic packing and I have to create the procedure for packing instructions.\nWhere and how can I link the procedure with my delivery type or item category?\nAns:- The procedure is assigned in transaction OVHU2.\nYou will have to assign the procedure to 0002 Outbound Delivery. Here you cannot specify the delivery\ntype or item category. To some extent, you can control this with the packing indicator in the delivery item\ncategory, however, you can have better control by designing the access sequence with the available\n\nIs it possible to perform an availability check based on the plant yet exclude one storage location?\nAns:- You can make a storage location not available to the availability check in MM.\n\nIs it possible to copy texts from sales order header to billing document header?\nAns:- Use transaction VOTXN, and then create an access sequence with text object VBBK. Also make\nsure that the requirement of access sequence is given as '1'-Ref doc. Header.\n\nIn transaction XD03 we can print details for a single customer. Is there any transaction code to\nprint all the customers’ address or details at one time?\nAns:- For this requirement check TC: S_ALR_87012179 & S_ALR_87012180.\n\nWhat table do I use in creating ABAP program that would output the sales based on sales\norganization of customers?\nAns:- If you have SIS update turned on, you can use transaction code MTCE against infostructure 001 to\ndisplay sales by sales organization and so forth. Apart from SIS, you may create simple ABAP query with\nLDB VAV. If you want to create an ABAP report only, then use transaction code VBRK ->billing header\ntable and VBRP ->billing item table\n\nHow we can do invoice split depending on item category in which scenario we will use?\nAns:- You first need to go for copying controls either from sales to billing (invoice) or delivery to billing\nor billing to billing. Use transactions (vtaa,vtaf,vtla,vtfa,vtfl,vtff) all possibilities for copy controls. this\nbasicly is flow of doc to doc. (may it be sales to billing, del to bil, or bil to bil etc..) -> this is where you\nsee the Item category and you control whether split is possible or not with the indicator\"B\".\neg: representing split in invoice based on item category. The field here \"data VBRK/VBRP\"\n(headre/item)whcih actually is used for splits or combining different deliveries. create a splitting rule\nusing VOFM (you need access key to get here). Here you define comparisions for the fields at header\ntable and item tables and the comparision fields say SPART\"division\". \"purchase order \"BSTKD\nInstance: 5 sales orders combined into 2 deliveries and the split at the invoice would be 5 individual\nbilling with respect to fields PO and DIv. of each sales order would let you create 5 billings. You need to\ndefine the exact \"field\" in the comparisions both at header and item level that could lead to invoice\nsplit. the key here is the field that is different from header to item will cause split at the item level.\n\nCan any one explain how we will configure milestone billing , periodic billing and which scenario we\nwill use?\nAns:- IMG->sales &distr->Billing->billing plans->define billing plan types.\nYou set the start date and end dates if applicable to the type of billing you are using. What time to be\nbilled (end of month, start of month etc..)\nMilestone is a billing plan type where a customer is billed for the amount distributed between the dates\nuntil total value is reached eg: if the total billing amount is 1000 USD for a year. You will bill the\ncustomer in different amounts say 200, 500, 300 at different intervals as per customer agreement.\nOn the other hand Periodic billing is billing the customer for the total amount(here 1000 USD) at\nregular intervals periodically until the customer agreement is reached. eg: 1000/12 for a 1 year\nagreement and say billed at the 1st day of every month.\n\nWhat are some pricing routines and sd functional specs?\n\nAns:- Form routines for pricing and various other functions can be maintained form routines are\nsomething to do with ABAP code. Go to (VOFM) where all requirements which are represented by form\nroutines can be maintained. Requirements are available to be assigned where access sequences are\nused (for determination procedures, here pricing). Once the tcode VOFM is accessed you will see\nrequirements and go select \"pricing\" again you need access key to create your own or copy a routine.\nSay you want header price not to have effect the item pricing, you need to go to the program to change\nabap code to meet the requirement. this specific requirement you created will be assigned in the pricing\nproc. determination \"requirements field\" usually with a number beyond 600. Note: make sure you\nactivate your routine for its effect to take place.\n\nWhat do you mean by drop shipment?\n\nAns:- A drop shipment is based on an order from a customer to a Distributor. The distributor initiates\nthe shipment by Informing the wholesaler.\n\nHow does the rule MALA decide the picking location\n\n\nWhat is the use of pricing date in condition type?\n\nAns:- It shows date of calculation of pricing procedure for that Particular document. So that in\nfuture you can see the date On which pricing calculated for that particular doc.\n\n\nAns:- Account Group is like a control Parameter for the customer master. Most of the fields in\nthe customer master are controlled Using Field Selection, which is internal function of Account\nHow to extend material and customer to other sales areas?\nSales area is a combination of s.org, dist channel & Division. Division is a logical grouping of\nproducts. So you Cannot extend material to other sales areas. But u can Extend customer to\nother sales areas through common Distribution channel & division.\n\nHow can we process out bound deliveries without shipping point?\n\nAns:- Shipping point is a mandatory Organizational unit for outbound delivery process.\n\nWhile I am creating a customer in ship to party account group you have shipping and\nbilling partner function tab pages, client wants to shift all important fields in billing like\npayment terms, incoterms , and tax classification into shipping tab page. He wants only\nshipping partner function only, how does you customize?\nAns:- Field Selection will help you maintain the fields relevant To Shipping, Ship to party\nfunction will be able to see only shipping related fields.\n\nWhy do I use condition indexes? How do you activate them?\n\nAns:- Condition Index is used to search all the conditions Records for a particular condition type\n(eg PR00). We Activate condition index in the customizing screen of the\nCondition type. SPRO>>Sales & Distribution>>BasicFunctions>>Pricing>>Pricing\nControl>>Define Condition Types>> Maintain Condition Types>> Enter PR00\n\nIs it possible to release change request, without releasing task.\n\nAns:- Once we can release the task, then only we can release the Change/customizing request.\n\nCan one have multiple packing for delivery?\n\n\nTo extend material one plants to another plant what are the configuration you done in\nyour project?\nAns:- We have to create in new plant as we have followed for First plant, where as in first plant\nsystem will give Internal number but for second plant we have to mention Material number.\n\nCan we assign multi distribution channel to a single customer in sap SD sales process. If\nyes then how?\nAns:- While creating customer we need to assign the customer to The respective sales area,\nwe should copy from previous Sales area in XD01 through reference\n\nwhat is the difference among sales deal promotion price, price agreement?\nAns:- Sales deal promotion– specific product for a period of time price will be less than MRP.\nPrice agreement– means an agreement between customer and Vendor for a specific product or\nwith a specific price mentioned in their agreement.\n\nFrom Which Tcode can I view customer wise back order (Open Order?)\nAns:- V_RA\n\nWhat is retro active billing? Who is will create this?\n\nAns:- Retro active billing means rebate process. When ever the customer reaches the target\nquantity or volume in specified time Period. we issues the credit memo for the customer.\nin one sales order there are two materials can maintain two different pricing procedures\nfor these materials?\nNo, u cannot maintain 2 separate pricing procedure for same Material in single order. But u can\nchange the price Manually by selecting the material and then the conditions Tab….u can also\nsee the changed status as manually later.\n\nWhat are the differences between invoice and billing document?\n\nAns:- Billing Doc is the broad view Invoice (F2) is one of type of billing doc.\n\nWhat is pricing? How will it affects the billing procedure?\n\nAns:- Pricing has the basic price of the item. It also has the Discounts, Taxes, Rebates, & also\nthe Cost of the item.\n\nWhat is act key? And how it works? Normally how many pricing procedures do in\nAns:- Account key determine a correct G/L account to be posted the data corresponding G/L\naccounts. You need to assign a G/L account to account key that is assigned to a condition type\nin a pricing procedure.\n\nTell me account key and accruals?\n\nA/c keys determine a correct g/l a/c to be posted the data corresponding g/l a/c. All customer\nRebate accounts are posted in accruals.\n\nWhat is PMIN?\nAns:=-PMIN is a Condition type to define minimum prices. It can be Control minimum prices\nbelow which a material should not be sold to the customer.\n\nCan anyone tell about types of free goods?\n\n1) In paste: 25% extra more -it’s inclusive\n2) When you buy paste you get a brush free, it’s exclusive.\n\nПохожие интересы", "pred_label": "__label__1", "pred_score_pos": 0.5122963190078735} {"content": "The Witcher 2: Assassin of Kings\n\nI’ve been pulling my hair out trying to write a review for The Witcher 2: Assassins of Kings. So much so, that several drafts of this review lay shredded in a sad pile on the editing room floor. In short, I have a love/hate relationship with The Witcher 2: Assassins of Kings and have done my best to write about a game I love to loathe. So please just sit back, begin reading and try not to lynch me.\n\nThe story of The Witcher 2: Assassins of Kings takes place directly after the first game, which I have, in hindsight, not had the pleasure of playing. However, I found that even with my limited knowledge of the series I picked up the story quickly and without any problems.\n\nThe Witcher 2: Assassin of Kings\n\nIn The Witcher 2: Assassins of Kings, you have control of Geralt of Rivia, a ‘Witcher’. To refer to Geralt as simply a ‘Witcher’ does not do the guy any justice. A better way of describing him would be as follows: think of the entire cast of The Expendables, with a healthy dose of Splinter Cell’s Sam Fisher, a smidgen of Clive Custler’s Dirk Pitt and just a touch of Uncharted’s Nathan Drake. Then slap on an extra gravelly voice and a really frightening badass look, and you will have a better idea of what Geralt is actually like.\n\nLuckily, for those like myself who have not played the first game, Geralt starts the game off with amnesia. As a result, unlocking Geralt’s memories plays an interesting part throughout the game and serves as an engaging way of uncovering Geralt’s back-story. Although your main goal is to find the King’s Assassins, there are several other plot lines that deal with Rivia’s turbulent politics, war and many other nefarious evils, all of which are mixed together like that really dodgy Christmas trifle that you should not eat after New Year, but you do anyway.\n\n[yframe url=’′]\n\nThe single biggest aspect of The Witcher 2: Assassins of Kings is the fact that the game is not afraid to punish you when you make mistakes. Although this relentless ethic is not a bad thing, I do think that most will downplay its importance and label the game as an ‘old-school Role Playing Game’. However, this is not the case as this game is anything but old-school. Rather, The Witcher 2: Assassins of Kings might offer a small glimpse of a brighter future for RPGs. CD Projekt clearly show what can be done with a stale genre when a developer is willing to take a few chances by trusting, instead of always handholding, the player.\n\nThe game follows a levelling up system whereby the player must assign a point at each level of one of three different talent branches. These talent branches are unlocked near the start of the game with the three main branches focussing on magic, combat and alchemy. Each branch is designed in such a way that it is preferable to fill each path to completion as opposed to spreading points out between various branches. This makes for a well balanced character that is catered to your unique style of gameplay. Another interesting aspect of the branch based levelling up system are Mutagens. Mutagens are powerful mutation-triggering agents and (with patch 1.3 installed) alchemy ingredients that are generally found on Rivia’s monsters or as by-products of alchemy. Mutagens can be linked to talents further along the branches to aid in increasing Geralts abilities. In addition to the standard method of enhancing Geralt’s attributes, he also gains skills at different but obscure points throughout the game, which give him bonuses in certain situations. The talent branch system is carried over from the first game and is not a revolutionary method, but it is one that works well. After all, if it ain’t broke why fix it?\n\nVamers Review - The Witcher 2: Assassin of Kings\n\nUnfortunately, some of the more testing sections of The Witcher 2: Assassins of Kings takes place during the first few opening hours of gameplay. As such, it saddens me that so few gamers will choose to persevere through the opening chapters. However, this would be a real shame because once you have traversed the seemingly impossible, probably with at least one broken keyboard and mouse due to frustration, the game really opens up into a truly enthralling RPG experience.\n\nThis relentless ethic of The Witcher 2: Assassins of Kings is the main aspect of the game that will make you either love or despise CD Projeckt’s sequel. I found myself, on more than one occasion, “ragequitting” after having died twenty times in a short three to five minute segment of the game. Perhaps this is just me and games have held my hand for too long, making me ‘lose’ my gaming edge? Whatever the case, all I know is that I struggled more than I would have liked to through several sections of this game. With that said, it was deeply satisfying to overcome the aforementioned sections and I came through it feeling as if I had really accomplished something important.\n\nDespite how incredibly difficult the game can be, The Witcher 2: Assassins of Kings has a very well written and compelling story that deserves to be played through slowly and should not be rushed. This story telling experience is enhanced even further through game changing choices and with supporting characters that feel more believable and real than leading characters in games of a similar nature. Like Mass Effect the choices you make in The Witcher 2: Assassins of Kings have a direct influence on the world of Rivia. The difference is that these choices are not just some tick in the box of a feature list that can be easily fixed by loading a past saved game. Instead, the choices you make will often have immeasurable consequences that are only revealed after hours of gameplay, similar to games like Fahrenheit and Heavy Rain. Since these choices often have a direct impact on the lives of Non-Playable Characters (NPC), they can be difficult to make. However, this allows you to immerse yourself completely into the world of Rivia, Often to the point where you begin to ‘feel’ for the NPC’s with which you interact, forcing you to really think through those “grey area” choices that you are faced with. This is an element of gameplay that other developers of RPG’s should take note of as it is executed almost perfectly in The Witcher 2: Assassins of Kings.\n\nVamers Review - The Witcher 2: Assassin of Kings\n\nThe Witcher 2: Assassins of Kings is a fantastic looking game. Walking through the streets of Flotsam at night, for example, showcases how your surroundings are lit by the subtle blue moonlight and how the glow of a nearby fire will cast eerie shadows onto walkways, all whilst a tiny layer of mist and fog rolls though the streets. These intricate environments are complemented by highly detailed foes whose weapons and spilt blood glisten in the shy moonlight. As impressive as it is seeing rays of light pass through individual branches of the many large and vibrant trees in the game’s forested areas, or even viewing fires that rage all around you as you make your way through a battlefield during sunset, the fact that the game looks absolutely amazing during quiet night-time sequences speaks volumes to the overall level of detail and care that has gone into making this one of the best looking RPG’s to date. Although the game has a feature to automatically detect your computer’s configuration and adjust the settings accordingly, you will need a high-end PC to truly experience the graphical eye candy this game has to offer.\n\nVamers Review - The Witcher 2: Assassin of Kings\n\nJust like a box of Quality Street sweets, this game has ‘leftovers’ in the box that nobody likes. For instance, combat can be difficult at times with controls that are not always responsive. This is one of the primary negative aspects of the game. Sadly, the sluggish and unresponsive control issues are especially evident during difficult combat situations where you are using all of your skills to stay alive. Couple that with the relentless difficulty and you have one of the most unforgiving games to date. Needless to say, my old keyboard and mouse will never be the same again from all of the frustrated bashings they received. The menus, pretty as they are, can also be difficult to navigate. The inventories weight limits and trying to sort out your crafting materials can be a pain. There are also a few graphical glitches and other random hiccups that are bound to arise in any game of this scale, but unfortunately, they turn up frequently enough to hamper your experience. The final gripe is aimed at the occasional awkward miscommunicated cut scene or conversation, but considering the games non-English origins, it is an oversight that can be overlooked. Despite the games various flaws, it is a real gem. If you can overcome the keyboard bashing segments of the story, the aforementioned issues will seem insignificant. That is how good The Witcher 2: Assassins of Kings actually is.\n\nVamers Review - The Witcher 2: Assassin of Kings\n\nShould you play this game? If you have patience, a second keyboard and mouse and can see through a few flaws to the overall goodness, then I would have to offer a resounding ‘yes’. The Witcher 2: Assassins of Kings is a delightfully fresh breath of air in a stale genre that is in danger of following the First Person Shooter (FPS) cut and paste model of “been there, done that”. I would not recommend this game to members of a younger audience or to those who are very conservative, due to the dark and twisted story and occasional scene of fornication, however tastefully implemented. But, if you enjoy hacking creatures into ‘oblivion’ and being absorbed into an unforgettable story, then you should most definitely give The Witcher 2: Assassins of Kings a chance. I personally hope that CD Projekt do not stop their innovative work in the RPG genre and I look forward to following Geralt of Rivia in any future quests.\n\n\nPositive:     Incredibly immersive / Brilliant narrative / Meaningful moral choices / Outstanding visuals\n\nNegative:   Clumsy combat system / Inconsistent difficulty / You may need to buy another mouse and keyboard\n\nVerdict:     One of the best, most immersive RPGs available.\n\n\nVamers Review - Score of 8 out of 10\n\nTitle: The Witcher 2: Assassins of Kings\nBlurb: The Witcher 2 is the sequel to developer CD Projekt’s mature-themed fantasy role-playing game based on the works of author Andrzej Sapkowski.\nPlatform: PC     Rating: M     Genre(s): Role-Playing     Number of Players: 1 Player\nOfficial Site:     Developer:     CD Projekt Red Studio\nESRB: Blood and Gore, Intense Violence, Nudity, Strong Language, Strong Sexual Content and Use of Drugs.", "pred_label": "__label__1", "pred_score_pos": 0.555136501789093} {"content": "sustainable energy regulation\n\n\nSearch for documents related with sustainable energy regulation\n\nSynonyms: normativa energ�tica sustentable, normas sobre energ�a sustentable, normativa energética sustentable, normas sobre energía sustentable\n\nRelated terms:\nRegulations and Standards\n\nBroader terms:\n\nNarrower terms:\nactive networksDistribution networks traditionally are passively managed. Active management enables generators and customers to connect more easily; allow greater interaction between utilities and customers and provide incentives to consumers and generators to act more efficiently both in the short and ..., abuse of dominanceThe action of a company to take advantage of a position of market strength so that it cannot be effectively challenged though competition. This relates to monopolisation and acts to reduce welfare within the market, driving up costs to the consumer., average electricity tariffsThe average price paid by consumers over the course of one year. It is significant in that it will often be the base for the setting of tariffs paid under Tariff Mechanisms. SERN, 2010, balancingThat is, balancing of supply and load (or demand) for electricity. SERN, 2010, black certificatesSometimes used to refer to greenhouse gas reductions. SERN, 2010, connection chargingThe charges associated with connecting a generator to the distribution or transmission network. These charges can be deep, wherein the generator must pay all costs of connection and reinforcement of the network to enable their connection, or they may be shallow, wherein the generator pays the ..., Consumer Price Index, contestable marketsA contestable market is one where the barriers to entry are low. Thus a perfectly contestable market would have no barriers. Barriers can include anything which acts to protect the industry incumbent from new entrants and can stem from institutional or regulatory arrangements relating to ..., corporatisationThe act of transferring a state-owned utility or body into a limited liability corporate agent. The state tends to maintain ownership of the agent. The process is often the precursor to privatisation. SERN, 2010, declared net capacityA modifying factor applied to the plate (theoretical) capacity of an intermittent renewable energy generator to establish the realistic output. In broad terms, the dnc is the equivalent capacity of baseload plant that would produce the same average annual energy output as the renewable energy ..., legal and regulatory risks\n\nLinked data frontend for sustainable energy regulation.\n\nShare this page on social media:", "pred_label": "__label__1", "pred_score_pos": 0.6035480499267578} {"content": "Why It's So Disturbing That July Was The Hottest Month Ever\n\nJuly is always a hot one in the northern hemisphere, but last month was especially warm, with a number of European countries seeing the mercury reach new heights.\n\nAnd altogether the global temperature for July 2019 is the warmest of any month on record, according to the European Union's Copernicus Climate Change Service.\n\nThe previous mark for warmest month in the Copernicus dataset was July 2016 and last month eclipsed it by just a smidge, specifically .04°C. That's also .56°C warmer than the average July from 1981 - 2010 and 1.2°C above pre-industrial levels.\n\nFor a little context, the Paris climate agreement aimed to limit the increase in average global temperature to 1.5°C above pre-industrial levels. If last month is any indication, that trajectory for meeting that goal isn't great.\n\nWhat makes July's heat wave particularly disturbing is that it is not associated with a strong El Nino event, as the previous record set in July 2016 was. El Nino tends to fuel a spike in hot temperatures, but the phenomenon was relatively weak in July 2019, meaning it can't be blamed for this particularly sweltering summer.\n\nIn addition to setting records in Europe, Alaska also saw the first 90-degree day in Anchorage and record low sea-ice extent in the Chukchi Sea. Meanwhile, the month ended with a heat wave in Greenland leading to a major melting event of the ice sheet there alongside wildfires.\n\nNASA, NOAA and other agencies have yet to release their own reviews of last month's average worldwide temperature, but will likely do so in the coming weeks.\n\nFollow me on Twitter or LinkedIn. Check out my website.\n", "pred_label": "__label__1", "pred_score_pos": 0.9631500244140625} {"content": "New Delhi, Nov 26 (ANI): On the 6th anniversary of the Mumbai terror attacks Prime Minister Narendra Modi on Wednesday saluted the security personnel who laid down their lives protecting others during the terror attacks and also paid tribute to the victims and martyrs. \"We remember the horrific terror attacks in Mumbai on this day in 2008 and pay homage to the innocent men and women who lost their lives. We salute the brave security personnel who laid down their lives to protect several lives on that fateful day. They are our true heroes,\" Prime Minister Modi tweeted. \"Today is a day to reaffirm our commitment to work together to combat the menace of terror and uproot it from the face of humankind,\" he added. Tributes would be paid to victims and martyrs of the terror attack at various locations in Mumbai today.", "pred_label": "__label__1", "pred_score_pos": 0.9500865340232849} {"content": "Invisible (Provisional) Cast-On\n\nalso known as Looped cast-on\n\n\n\n\nProvisional cast-on is basically a temporary cast-on which you can later remove to reveal live stitches to knit from. There are many applications. Say you are knitting a pair of socks and only have a certain amount of yarn and you’re not sure how high to make the first sock so that you don’t run out of yarn before completing the second. You could use the provisional cast-on to begin the socks, then when both socks are knit, expose the live stitches and knit each to the same height using your remaining yarn. This ensures both sock are the same height and you don’t run out of yarn. Beats running out of yarn before you finish the second sock.\n\nCategory: cast-on", "pred_label": "__label__1", "pred_score_pos": 0.7084462642669678} {"content": "Drochaid a' Ghiubhais Li\n\nArea:The Fannaichs\nClassification:sub Dodd\nMaps:436(S) Explorer or 20 Landranger\nGrid Ref:NH267706         Hills nearby: 5km 10km 20km\nDaylight:dawn 08:05, sunrise 08:55, sunset 15:32, dusk 16:23\n\nview on a bigger map\n\n\nIf you need accommodation we have details of 8 properties offering rooms near Drochaid a' Ghiubhais Li. Here are some examples:\n\n5 Sykes Cottages Assessed Cottage\n£410-1479 per week\n21.1km (13.1 miles) away, sleeps 2\n3 Sykes Cottages Assessed Cottage\n£259-1399 per week\n19.8km (12.3 miles) away, sleeps 4\n3 Sykes Cottages Assessed Cottage\n£246-1228 per week\n22.3km (13.8 miles) away, sleeps 4\n", "pred_label": "__label__1", "pred_score_pos": 0.9661206007003784} {"content": "Radical media, politics and culture.\n\nspartac's blog\n\nThe People of Freedom and Anarchy\n\nThere is no reason on earth why humanity should have suffered and still suffer because of a brutal money-making machine called capitalism. There is no reason whatsoever for a system of subjective and objective devastation to continue to exist as though all is well for the tormented and dispossessed poor (the majority). There is no reason why should the people continue and bear this permanent humiliation and daily anguish because few individuals who want to rule the world in the name of democracy for the rich and ugly. A capitalist system that caters only for the privileged well to do who are guilty of crimes against humanity, an elite that rob us of the water we drink and the land we walk and the food we eat. They sell us back our means of substance after producing it ourselves in the first place. They give us food vouchers in the name of wages and salaries which we receive for being exploited and cheated. Capitalism is a system that allows all dictatorial and power megalomaniac characters, which only capitalism encourages accomplishing their fiscal holocaust, it allows every sick personality to become the leader and become the representative of the corrupt ruling class the rich (initial capital accumulated from slave trade). I cannot find one reason why capitalism should not be toppled as soon as possible and in place of this colossal human nightmare a more humane anti-system (meta-system) will prevail. The worker and the unemployed, the homeless and the prisoner, the intellectual and the artist are all participating in this revolution, anarchists steer. Therefore I call from this article for an anarchic revolution to overthrow capitalism and destroy its protector the state. A social revolution that will liberate us from the yoke of fiscal fascism and financial Nazism, the dictatorship of the ruling class in the name of free market capitalism also known as material oppression of the rest of the people. An anarcho-social revolution that will put an end to alienation and dismantle this miserable consumer spectacle and relief the politicians and the rich from their fake power biased inclinations. Their profit is proportional to our misery, the richer they become the more desperate we are, until the lid is blown and the masses go on the march of their own liberation. But this time, me and you are present in this, it is our own lives that is at stake here, therefore reject all systems, alter the objective conditions, dismantle your subjective determinism and break the chains of slavery which will be your only loss but a whole cosmos to gain. No one is free until the last one is free\n\nNo fantasy but tomorrow's reality and it will not appear magically but intentionally by us the revolutionary people of the future. So if you don’t wish to contribute others are more than ready to do this and much more.\n\nThe perquisites for an Anarchic Social Revolution\n\n1) The level of industrial and technological level, the highest is the better. 2) The level of individual conscious of the population, the more conscious the better. 3) Anarcho-theory is the meta-theory, anarchists is the highest conscious.\n\nA) Capitalism = Antagonistic conflict = Permanent negation and opposition. B) Anarchism = Resolution of antagonism = Anti-conflict creation. C) Capitalism = Dialectical metaphysics = Today. D) Anarchism = Post-dialectical (meta-dialectical) equal materialism = Tomorrow. E) Materialism is good but dialectics and metaphysics is bad.\n\nAnarchism is one millennium more advanced than Capitalism\n\nRevolutionary transformation of capitalism into anarchism\n\n\n\n\n\n\n\n\n* Socialism = reformed capitalism * Capitalism = reformed socialism\n\n\nCapitalism as State Terrorism\n\n\nGlobal resistance to capitalism\n\n\n\n\n* Why – when – how – who – etc.\n\nA. The West has the right objective conditions yet lacks the rebellious nature of the people, at present at least.\n\nB. The East and South have masses of rebellious people but lack the objective conditions.\n\nC. Anarchism like Communism has been stuck theoretically and practically for the last 200 years.\n\nD. Revolutionary transformation of consciousness and its advancement of human faculties.\n\n* Answers – solutions – post-dialectics – etc.\n\n1. Why do I start with West (English), the global situation of the internet is obvious. In English for the West first because intellectually it is more advanced whilst the rest of the world has emotional superiority.\n\n2. The mixture of a highly advanced emotion from the South and East with the very developed intellect of the West is the answer to 90% of all contemporary human problems.\n\n3. Self-criticism and self-complementation on correct occasions alone guarantees permanent development in all fields.\n\n4. You cannot make a penny or a cent without further destroying some other human lives.\n\n5. Rapid accumulation of knowledge and its revolutionary transformation into social practice and preparedness for the revolution.\n\nAs to the readers of all sides of the ideological specter, please, just wait a second and comprehend before you respond, adjust yourselves to a totally new universal situation. Those of you who desire to rescue and save humanity from utter devastation should only lend a hand and coordinate this colossal task. Whereas to those readers who wish to maintain whatever authority and hierarchy from our ugly past should listen carefully to what I have to say because otherwise they are going to find themselves expelled from society on a trip. Likewise those who won't to maintain any sort of governance or statehood or capitalism under any banner, please listen, it might be the last time we say please give up peacefully so we would not have to use any force.\n\nThe majority of the people are in no position whatsoever to take back their right of self-determination; most people are deluded into voting believing that they are taking part in an equal and democratic process. Capitalism is democratic as in Greek it means power to the owners of Athens salves. Democracy is for the master not for the servant, democracy of the rulers over the ruled. What good democracy if you have no money to buy food? Finally here we are in the year 2005AD at exactly the same year 0005AD and 2005BC the situation of the individual has not changed an inch, what has changed are the gadgets of control. The social relations have not changed for the last 70000 years, why because the enslavement of another fellow human being remains and is live and kicking.\n\nAs always there is an urgent need for a major conscious leap into a future designed by humanity for the sake of living free and in dignity. No cults of leadership under whatever disguise, this time the revolution will not be as it was in the past, i.e., in the hands of Bolsheviks and authoritarian communists, but in the hand of the whole people who want to participate in the creation of their own destiny.\n\nThe end of idealism The blind is leading the blind Philosophy as clinical psychiatry The death of philosophy Dull and frigid philosophers The impotence of capitalist thinkers Pedantic idealism Philosophers to the garbage YOUR FALL IS NEAR DEAR And the revolution is here to stay\n\nPhilosophers like scientists are dogmatic and very limited, they always serve the master. Philosophy is the religion of capitalism and science is metaphysical; the poverty of intellectual life. Afraid of freedom and concrete equality they bow to every idle and submit their critical thinking to the service of the empire that be. Confused by their own tautology and anxious about their ontological crises, they plunge into the formal and abstract. Well, this time there is no escape dear philosopher and scientist, because your hay days are few.\n\nTermination of the capitalist system\n\n1. By dismantling the army and police we dissolve the state and authority and thus no one will be capable of attacking or exploiting another. 2. By the cancellation of inheritance law and terminating private ownership of natural resources and the means of production, i.e., by the elimination of capitalist social relations and business our world turns into paradise and not hell. 3. The burning of money as an exchange value. 4. The ending of all laws and bourgeois morality thus terminating the hegemony of the ruling classes. 5. Capitalism is a physical and mental disease, a profitable disease for the few, its urgent cure is the uprooting the infected reactionary cyst called system control for the dictatorship of the rich. 6. The only cure and solution is revolutionary transformation of society on the basis of gift economy and total material equality. 7. Anarchic anti-capitalist social leap into a world where human life has the highest consideration.\n\nMost anarchists are not anarchist at all – Capitalism causes madness Anti-economical determinism\n\nSince anarchists from the time of Bakunin and Kropotkin up to now depended solely on the Marxist analysis of capitalist economy that turned out to be very wrong and misleading. This erroneous analysis brought down the whole socialist camp and exposed the invalidity of communist theory. The dependence of anarchism on failed Marxist predictions and prognostication caused plenty of harm to anarchic theory and turned anarchists into regimented scouts of social therapy. No wonder that modern anarchism looks like this today, North American anarchism is not anarchism at all, but a replica of middle class activism. Anti-economical anarchism is the only true anarchism since it alone can totally eliminate all sorts of authority, hierarchy and what ever oppression anywhere. Anarchism as represented by our friends in north Europe, is pathetic and makes you want to puke, to even think of organized anarchism is an ultra contradiction in term. As a result of so many crucial mistakes contemporary anarchists behave as a bunch of left wing liberal scouts, negotiating their party line and dogmatic ideology, just as our hated cousin the Bolshevik. The magic ward of affinity group means let's hide in little gropes and pretend we are operating on a global scale, or let's dress in a differently colored costumes so we could play safely whilst confronting the 8 masters. Primitivism is not anarchism nor salvation is going to come from the internet, the revolution awaits you someplace and somewhere else. This is not a criticism of the anarchic movement as such, but a recommendation for the adaptation of a meta-Marxist post-capital anti-dialectical approach based on anti-analysis and the demolishment of capitalist social relations. What we need is an anti-economical post-Marxist meta-synthesis for the creation of the last revolution. Economy is theft and property is robbery. All necessities of life is distributed free during and after the revolution, the collapse of capitalism will enrich the whole world population and turn each and everyone into an overnight millionaires, we shell have by the year 2015 7000000000 millionaires, a very happy and celebrative humanity. Arm your pleasure and equip your passion with revolutionary knowledge so you will be always ready to make and participate in the already long overdue social revolution. If by waiting few more years we can further reduce the required violence to a minimum then be it. After destroying the state and hierarchy wages and commerce disappear to the disappointment of many anarcho-capitalists. Labor will turn into a revolt, we want to manage our lives ourselves and no one else and anyone who dares otherwise shell facet a violent attack, since slavery and exploitation are unforgivable and epidemic. The destruction of life is not a demagogic issue but a survival defense and a last stand of the slave who is on a head collision with his master. Freedom must be taken by force; justice is equality when there is no exploiting fellow human any more. Values and business is an organize deceit orchestrated by blood stained economical gangsters embraced by weak and corrupt politicos. Capital economy is the king and the ruling classes, immersed in wealth and power whilst devastating our lives, our planet and obliterating the future. They impoverish the rest of humanity whilst keeping the middle class and allowing it consume, thus keeping it in check, business-bossy and ossified. Humanity wants revolt and it wants it now and we are here to provide it with exactly that. Lets not allow 200 years of anarchism be thrown to the garbage of history because of some alienated tendencies. We exist and that is enough to create the biggest and final revolution in our miserable human history, cause a revolution that has never been witnessed before i.e, the creation of freedom. Humanity demands freedom and we demand material equality, a meta-critical mass rebellion engulfing the whole planet thus turning life into a more bearable and pleasant existence for all.\n\nPorno-military internet, anarcho-capitalism and patriotic cyber chauvinism\n\nThe tools – The individual – The state – The society\n\n1. The perverted historical development of \"humanity. 2. The perverted historical development of hierarchy. 3. The onto-epistemological spectacle/surveillance. 4. The anarcho-symbiosis and nihilo-metamorphosis. 5. Theoretico-practical meta-synthesis. 6. Creation of anarcho-alternative paths of progression. 7. Meta-dialectical and post-materialist emancipation. 8. Anarcho-communist revolutionary advance.\n\nFree individuals like anarchism are the fundamental precondition for a free and equal society. Nihilo-revolutionary thinking and acting for the liquidation of anti-human forces and cyber annihilation of all ideologies and religions, thus ending quasi-theory and ignorant behavior. The foundation of capitalism (1760-1840) is based on criminality and illegality, the new economy of punishment, the ghetto and prison for the masses. Anarcho-capitalism is a dead fish stinking from its head, pity-bourgeoisie greed without state interference. The western civilization the creator of unnatural capitalism 200 years ago is half liberal and half fascist. All ideologies and religions were created for the sole purpose of controlling the mind and gold. Politics and economy like science, ethics and morality were designed for the purpose of manipulating and managing the feudo-industrial modern slave. All systems are rotten and are very destructive to life and must be abolished to rescue the human race from its self-made extinction. What we need is an anti-system, the meta-system, a system-less harmony and creation which means in pragmatic term, economical happiness to all people on earth. Yours in the anarchic social revolution 2005CIA.\n\n\nSee also spartacus 483\n\nDear revolutionaries – Greetings still from the hell of the future\n\nThe \"development\" of capitalism is a total and permanent human crisis, physically and psycho-emotionally. The forces of politico-economical powers are one and the same thing but in different periods and faces, operating within historical conditioning on a global scale. The head, body and tail of the capitalist beast which is humanly sick and perverted in its social relations, based on usurers, conmen and speculators. Under the disguise of post-barter exchange they legalize their stolen profit and labor loot. A system of universal suffering wars and poverty, a global system of robbery of all resources, exploitation and then after ruining the planet and human life they hide in remote country sides or well hidden bunkers. A system of violent and viscous powers ruled and conducted by politico-fiscal tyrants and rich megalomaniacs, who swindled humanity in controlling its entire human and natural resources. Crimes against humanity what this system does because it is based on a capitalist legal form of socio-economical criminality, an officially recognized egoism and ambitious lust and greed as a substitute for the lack of genuine pleasure. The hierarchy is severely perverted; it has created monsters of powers that were encouraged to become so, leaders who are mentally shallow and instable, like the ones we have today and as it always in the past. Neither left nor right of capital will save us from a determined doom, but a conscious socio-anarchic revolution lead by the people themselves with a little help from anarcho-revolutionary friends. The anarcho-social revolution is a real solution to a real problem; only anarchy can dissolve capitalism and bring it to a halt. How to stop capitalism from killing humanity quickly and gradually in the name of free marketeering and a ruling class democracy? We can stop this destructive self-blinded march in the quest for more and more billions of dollars and universal domination. How long capitalism is going to devour us and later excrete us for recycling our submission and obedience? When will the capitalist system become obsolete? Can we fasten the process of its disintegration as was the case in the socialist system. When will this criminal and brutal system disappear and free humanity from its nasty yoke? When will it self-destruct and how? Well, the answer to all these urgent problems is our anarcho-revolutionary activity in the last fifty years. Freedom fighters in theory and practice, as living example, in words and deeds, courageously digging the grave of international-state capitalism. Now the grave is deep and ready and what remain it just to push it down there and on the surface plant some ganja weeds. The freedom of all is the freedom of the one and the well being of each, so we can go on living without coercion and oppression. Let's accompany humanity in our journey of intellectual creativity and constructive alterations. Start with subverting your immediate environment and the internet.\n\nThe system that destroys mind and matter\n\nThe capitalist system is the cause of all modern barbarism. Capitalism is an economical cannibalism; it kills and devours people for profit. Capitalism is a mass killing machine just like the Romans and Chingis Khan but in the disguise of finance and personal investments. Capitalism is an amalgamation of pain, blood and sweat. Capitalism is the concentration of stolen labor and confiscated land. Capitalism is the primary cause of disease, mental and medical. Capitalism causes 90% of all violence in the world, the blood/sweat thirst of capital. The toxic fangs of capital, the vampires are the ruling class and their lackey's, the parasite lurking over other people's labor, the executioners of freedom and love. Capitalists are sucker parasites feeding on humanity, predation on all collective benefits, accumulating their loot for further infinite expansion called the business cycle. The rich and their banks and stock exchange will have learned to live without them; their parasitic practices will be terminated for ever. No more excuses for neither buying nor selling. The people of the world will take control over their food and shelter and all the rest of it and get rid of the leaders of capital and terminate their beloved pyramid the state. Capitalism makes the world ugly and by its nature it is greedy and stingy. On the ruins of modern capitalism we will have free people living without barter or exchange, without a need for a symbolic mediation, living through direct conscious distribution of production and consumption. God and capital and the state are dead, anarchists have killed them in the last 200 years. We have killed them because they deserve to vanish from our existence, what they have left behind in their glorious historic march is nothing but slavery, global misery and devastation. We destroy capital and the state to liberate humanity from its hypnotic social grip and its desperate repulsive reappearance as a spectacle of the negative dimension. Capitalism is an historical perversion and the state is a manic deviation. Anarchism defeats the state and capitalism and offers humanity something that is worthy of their posture, a labor of love or the love of labor, beauty instead of horror\n\nC I A – Communist Individualist Anarchism\n\n\nSubscribe to RSS - spartac's blog", "pred_label": "__label__1", "pred_score_pos": 0.6539994478225708} {"content": "This Year Will Be The Year of Moving Boxes Tyler\n\nThis Year Will Be The Year of Moving Boxes Tyler – One important step that is not possible to pass attempting to move to the new house is the packing process. Frequently, overwhelmed and chaotic ensues when doing packaging; which items which are going to be packed, thrown away, and donated or given to others become mixed.\n\nTherefore, it is essential to have a coordinated and efficient packaging plan because this will not only assist you when packaging but also ease the process of loading and unloading goods quickly and smoothly when arriving at the destination.\n\nmoving boxes Tyler\n\nOne of the ways that you can move would be to use the moving box. This is since the moving box does have a big enough space, with a spacious box contour, giving you more room to make arrangements for your items to be transferred. Not just Moving Boxes Tyler, but you can also find it in a different city for example Moving Boxes Canada and Moving Boxes cape town. Another thing that you ought to pay attention to in using moving boxes is locating the type of box that’s ideal for your requirements.\n\nSelect the right box of every goods.\nFor a quicker item packing process, you need to adjust your needs to the right size of the Moving Boxes Tyler. You can choose a little box, with a dimension of 16x10x10 inches. Then the moderate measuring 18x14x12 inches. Then the large dimensions with 20x20x15 inches and an extra-large size of 23x23x16 inches.\n\nAside from that, you can also choose sime types of different moving boxes that fit to your requirements. By way of example, like a box that is used for storing kitchen things, then a few are used to store items like books, accessories, and trinkets, boxes used to keep glassware, to be used to store in capacity big such as a mattress cover or clothes requirements.\n\nWell, here are some tips for those that want to transfer things easily and neatly with moving boxes :\n\n1. Separate delicate units from heavy items\nThe first tip for packing goods using moving boxes would be to sort items that break easily with heavy items that are resilient. This will alleviate you when doing the transfer procedure. And to avoid the potential for harm to the merchandise. Avoid packing units that are delicate such as units made from glass and break easily with heavy items such as things made from metal, iron, aluminum, and timber. It is also strongly suggested that you use bubble wrap to wrap delicate units so that items don’t break/get damaged while traveling or being hauled.\nAnother tip is, if you pack kitchen items such as cups, bowls and other containers made of glass and ceramic, you can organize them . It’s supposed that the position of the merchandise is not easy to shake and move, to reduce the potential for cracking.\n\n2. Label different types of goods\nIf you’re worried about the problem of distinguishing boxes and their contents, then, you can merely provide labels in the box. It is possible to label it with colored paper, or in addition, it can provide clear writing concerning the contents of every box. When it’s like this, then you will be easier to put and type each box.\n\nmoving boxes Tyler\n\n3. Wrap things which are easily scattered\nAnother suggestion for those of you who do packing would be to wrap items that have the prospect of spilling and spilling. This aims to keep your products complete and never be damaged until in a brand new location later. Before putting in a cardboard box, wrap your entire items, such as toiletries, food ingredients, kitchen utensils, and potential makeup tools and materials, in addition to your toiletries with vinyl so that they won’t be scattered. You can also replace the plastic with a clip or glue, which can help close the borders of things that are exposed.\n\n4. Set aside needs for 1-2 months\nThe next tip is to set aside the requirement for the following week or 2. Pack clothing and requirements for 2 weeks. After packing all items at home, you are advised to pack clothing and individual needs for two weeks individually. Rather than being required to unpack items that have been neatly packed, stacking clothes, toiletries, and your individual needs in other moving boxes. Packing clothes and gear for 2 weeks just in case in case the process of moving home you need to do various other activities. This will make it easier for you or other family members to prevent unpacking neat products.\n\n5. Packing ‘urgent needs’ or emergency kits\nThis box includes things that will be used several days before and after moving home. For instance, tissues, washcloths, cleaning agents, some daily tableware, cups, and many others. These tips may make it easier for you when you arrive in your new house. (You don’t need to pry and unload stacks of boxes to get a roll of a cup).\nAdditionally, it makes it easier for you to get everything done before and after the transfer. In case you have determined things that are likely to be required for moving, then put into a moving box, then given a label, then at the future, the procedure for moving and preparing a new home will be easier.\n\n6. Security check\nFor those of you who are packing using Moving Boxes Tyler, all you’ve got to make sure is the burden in the box, together with its safety. To begin with, you have to make sure the load of merchandise that you place in every moving box, does not exceed its capacity. Since this permits the moving box to burst and not be powerful when the transfer process is taking place. Therefore, if you already feel that the moving box is full and heavy enough, then you need to place the remaining items in the other box. Then after you ensure that the load is right, the next step is to fortify the box by applying adhesive to each side of this box, both at the bottom and top. You can do this using ropes, tape, or whatever else which can help you close the gap from the moving box, which means that later your goods will not be scattered, or worse, the transferring box will open when moving.\n\nHere is the explanation of each types and tips on using moving boxes. To be more practical and faster, you may directly explore the or Walmart to learn more about Moving Boxes Tyler, and in addition in additional cities.", "pred_label": "__label__1", "pred_score_pos": 0.5347918272018433} {"content": "검색어 입력폼\n\nstryer생화학testbank 3장\n\n저작시기 2009.04 |등록일 2009.04.23 워드파일MS 워드 (doc) | 4페이지 | 가격 5,000원\n\n\nstryer생화학testbank 3장\n\n\n\n\nChapter Three: Protein Structure and Function\n\nUse the following to answer questions 1-10:\n\nChoose the correct answer from the list below. Not all of the answers will be used.\na) L-amino acids b) water c) protons d) Zwitterions e) secondary structure\nf) tertiary structure g) Ramachandran h) cysteine i) extracellular\nj) Histidine k) Proline l) Sanger m) D-amino acids\n\n1. Chiral type of amino acids found in proteins.\nAnswer: a\n\n2. Another name for dipolar molecules.\nAnswer: d\n\n3. Disulfide bonds are formed by pairs of which amino acid?\nAnswer: h\n\n4. The amino acid with a pK near neutral pH.\nAnswer: j\n\n5. When a peptide bond is formed, what molecule is also made?\nAnswer: b\n\n6. Where are proteins with extensive disulfide links likely to be found?\nAnswer: i\n\n7. The amino acid with a distinct structure, causing it to affect protein backbone structure.\nAnswer: k\n\n8. Name of the plot that allows one to investigate the likely orientation of certain amino acid pairs.\nAnswer: g\n\n9. The type of structure to which alpha helices, beta sheets, and turns are referred.\nAnswer: e\n\n10. The overall structure of a protein is referred to as\nAnswer: f\n\n참고 자료\n\n다운로드 맨위로", "pred_label": "__label__1", "pred_score_pos": 0.802096426486969} {"content": "Deep sleep relieves anxiety.\n\n12 Nov Deep sleep relieves anxiety.\n\nSleep has many restorative features and ensuring we get good sleep, both in amount of time and overall quality, can ensure we are able to function better the following day. A new study has looked at the connection between one’s own sleep quality and anxiety levels they experience the following day.\n\nA total of 18 young adults were enlisted for the study which involved them undergoing polysomnography tests and functional MRI scans to gauge their sleep quality and anxiety levels. Participants would view emotionally stirring video clips after a full night of sleep and then again after a sleepless night. Anxiety levels were measured following each session via a self-reported inventory based questionnaire called the State-Trait Anxiety Inventory (STAI).\n\nResults showed that after a night of no sleep, scans of the brain showed the medial prefrontal cortex, the region usually responsible for controlling anxiety, not working as usual. On nights where the patient managed to sleep, and sleep well, this same region was active and self-reported anxiety levels were significantly lower. This study showed a direct connection between amount of deep sleep and the anxiety levels of the participant.\n\nIn a future study that replicated this one but with 30 participants instead of 18, similar results were found. Those that achieved more deep sleep showed lower levels of anxiety the following day. In yet another similar study but conducted online, enlisted 280 participants of all ages and tracked their deep sleep/anxiety levels over four consecutive days which showed that pending their quality of sleep, the anxiety levels for the next day could be somewhat predicted.\n\nThe importance of the study highlights a very real connection between amount of deep sleep one obtains and their anxiety levels for the following day. Due to this, prior to medicinal treatments for anxiety, perhaps a good night’s sleep should be recommended first?\n\nSource: https://www.sciencedaily.com/releases/2019/11/191104124140.htm", "pred_label": "__label__1", "pred_score_pos": 0.9975669980049133} {"content": "Lao Tzu\n\nLao Tzu (Laozi) was a mystic philosopher of ancient China, best known as the author of the Tao Te Ching. His association with the Tao Te Ching has led him to be traditionally considered the founder of Taoism. He is also revered as a deity in most religious forms of the Taoist religion, which often refers to Laozi as Taishang Laojun, or \"One of the Three Pure Ones\". Laozi translated literally from Chinese means \"old master\" or \"old one\", and is generally considered honorific. According to Chinese tradition, Laozi lived in the 6th century BCE. Historians variously contend that Laozi is a synthesis of multiple historical figures, that he is a mythical figure, or that he actually lived in the 4th century BCE, concurrent with the Hundred Schools of Thought and Warring States Period.", "pred_label": "__label__1", "pred_score_pos": 0.9967913031578064} {"content": "Der Münzenberger Bote\n\nNeuigkeiten aus Quedlinburg und Umgebung\n\nCBD Hemp Oil additionally the part regarding the Endocannabinoid System\n\nEvery biological process in the body requires a particular balance of facets to function precisely. Whenever accomplished, this stability is called homeostasis. The endocannabinoid system (ECS) plays a substantial part in our well being and general health by assisting to keep homeostasis in humans and each other mammal on Earth.\n\nPain, sleep, anxiety, and appetite are only a number of the functions for that the endocannabinoid system is accountable. But, what is the endocannabinoid system?\n\n\nThe endocannabinoid system (ECS) is really a complex biological system consisting of three primary components: “messenger” particles known as endocannabinoids, the receptors these molecules bind to, in addition to enzymes that catalyze the degradation of endocannabinoids. Weiterlesen..", "pred_label": "__label__1", "pred_score_pos": 0.9976128935813904} {"content": "Clyburn, King, and Cunningham Introduce Legislation to Close the Charleston Loophole\n\nFebruary 11, 2019\nPress Release\n\nBi-Partisan Bill Creates Process for FBI to Complete Background Checks\n\nWASHINGTON, DC – U.S. House Majority Whip James E. Clyburn (SC-6), Congressman Peter King (NY-2) and Congressman Joe Cunningham (SC-1) introduced the “Enhanced Background Checks Act of 2019” in the 116th Congress. The bipartisan legislation will close the so-called “Charleston Loophole” that currently allows the sale of a firearm to proceed if a background check is not completed within three days. \n\nThis loophole in the background check system is the reason a gunman was able to obtain the weapon used to murder nine people and wound three others as they participated in a Bible study at the historic Emanuel AME Church in Charleston, South Carolina in June 2015. Had the FBI background check been completed, the perpetrator of the Emanuel massacre would have been barred from purchasing a firearm. In 2016, more than 4,000 guns were sold to people with criminal records, mental illnesses and other circumstances which disqualify them from purchasing a firearm due to the inability to complete background checks within three days.  Since 1998, the “Charleston Loophole” has put 60,000 guns into the hands of prohibited gun owners. \n\nThis legislation extends the initial background check review period from three to 10 days. Next, after that initial 10 business day period, if a background check is not completed, a purchaser may request an escalated review to spur the FBI to complete its investigation. \n\nThe bill includes an important protection for law-abiding gun purchasers, that if the escalated review is not completed within the required 10 days, the sale may proceed. This compromise will ensure that background checks for potential firearms purchasers are completed before sales proceed while also protecting the rights of law-abiding gun purchasers to purchase weapons in a timely manner. \n\nClick for the full bill text of H.R. 1112 Enhanced Background Checks Act of 2019.\n\nMajority Whip James Clyburn\n\n“The real tragedy of the Emanuel Massacre is that it could have been prevented. We need to ensure that background checks are completed before weapons are sold. This legislation seeks to provide, with as much certainty as possible, that guns are not sold to those who ought not have them.”   \n\nCongressman Peter King\n\n“Very simply, Law Enforcement needs the tools and the time to ensure that those individuals who should not have guns do not get guns. I am proud to work with Congressman Clyburn to prevent another tragedy from happening.”\n\nCongressman Joe Cunningham\n\n“Background checks can save lives, and I’m proud to support a bill that ensures dangerous people don’t end up with deadly weapons when they shouldn’t be allowed to. This common sense bipartisan bill gives law enforcement the time necessary for them to do their job. The tragedy at Mother Emanuel should never have happened, and hopefully by promoting common sense steps like closing the Charleston loophole we can prevent it from ever happening again.”", "pred_label": "__label__1", "pred_score_pos": 0.9181535840034485} {"content": "Top 5 Healthcare Industry Recruiting and Relocation Trends\n\nThe Healthcare Industry has been growing at an increasing pace over the past several years. Factors such as the implementation of the Affordable Care Act, an aging population, and technological advances all contribute to the ever-expanding demand for qualified healthcare employees. The US Bureau of Labor Statistics predicts that Healthcare will be the largest employment sector in the US economy by 2024.\n\nGrowth in the healthcare industry presents a number of difficulties for HR professionals. Filling positions quickly and effectively, creating a workplace that encourages employee engagement, ensuring smooth succession processes, and reducing employee turnover are some of these seemingly insurmountable challenges.\n\nIncreasing Retirement Rates\n\nIn addition to greater demand for services, the industry is facing rapidly increasing retirement rates for experienced employees. Especially in the nursing field, the impact of retirement will have a large impact on staffing levels. At least 55% of the RN workforce is over the age of 50 and quickly approaching retirement age. According to an American Association of the Colleges of Nursing (AACN) summary of reports, there will be a growing shortage of registered nurses across the country between 2009 and 2030. By 2025 the US is expected to experience a nursing shortage “twice as large as any nursing shortage experienced in this country since the mid-1960s” with the rapidly aging nursing workforce as the primary contributor.\n\nThe combination of increasing demand for employees and increasing rates of retirement creates an ever-widening talent gap in the healthcare industry. There are not enough employees to occupy new positions, nor are there enough employees to backfill positions that open due to retirement. As a result, at least 33% of hospitals have job vacancy rates greater than 10%. Clearly, traditional healthcare recruiting strategies are not able to fill positions at a fast enough pace to keep up with demand.\n\nAs a result of these changes, the following five trends in healthcare industry recruiting and relocation are emerging:\n\nTop 5 Healthcare Industry Recruiting and Relocation Trends\n\n1. Provide Exceptional Candidate Experiences\n\nHealthcare industry recruiters must focus on keeping candidates happy and engaged in the recruitment process. Providing each candidate an exceptional experience is necessary to keep your organization as the candidate’s first choice in their employment search. The organization should conduct a review of the entire candidate experience, including the application process, interviews, job offers, relocation benefits, and onboarding procedures.\n\nHR professionals should put themselves through each of these processes to see how their organization treats and responds to candidates. Successful recruiting programs treat candidates respectfully and make them feel highly valued. Candidates are more likely to choose to work for an employer that treats them well.\n\n2. Use Data to Enhance Healthcare Industry Recruiting\n\nHealthcare organizations must analyze the effectiveness of their recruiting activities. Knowing which efforts are working well, and which efforts are not, will help the organization identify what it needs to improve. For example, an organization may have a job advertising program in place within a journal or news network. If these programs are not providing qualified candidates that proceed to job offers and acceptances, the organization should consider redirecting those resources.\n\nConversely, if a partnership with a local university proves to be a good source of qualified candidates that proceed to employment, consider enhancing the program or creating additional partnerships. Think beyond current geographical boundaries; partnerships can easily generate candidate interest within international locales. Relocation Management Companies (RMCs) are ideal sources for information on global candidate recruitment and relocation.\n\n3. Recruit for Cultural Fit\n\nHealthcare organizations searching for qualified employees may be able to easily identify those with the requisite skills, education, and experience. However, healthcare is a unique industry in that it is so highly focused on personal interactions. Healthcare organizations looking to fill job vacancies at a pediatric practice would want candidates who enjoy working with children.\n\nPre-Decision Services are critical for healthcare organizations as they provide valuable information about a candidate’s ability to accept a position and be successful. Behavioral assessments can be a strong predictor for cultural fit. Healthcare organizations can easily identify candidates with the qualities that match their organizational culture. Assessment data can be paired with structured interview questions to better understand the candidate’s interests, goals, and motivations.\n\n4. Create a Superior Healthcare Industry Employer Brand\n\nHighly-skilled healthcare workers are in great demand. As a result, these workers can easily choose where they want to work and for which organization they prefer. Seventy-five percent of employees seeking new jobs consider an employer’s brand before applying for open positions. Consider how your healthcare organization’s brand appears to job seekers. Does it generate positive industry news? Are online reviews favorable from current employees as well as current customers? If the employer brand you find does not fill you with positive feelings, then you can be sure candidates are also experiencing this same feeling.\n\nTo create a successful employer brand and generate positive feeling among job seekers, healthcare organizations should find out from current employees whether the organization is one where people want to work. Also, research comments from employees and candidates on review websites and social media. Determine which issues are of concern and address them. This will help you ensure employees will perceive your organization as the brand you prefer it to be. Follow through by updating recruiting materials, websites, social media, job postings, emails, and other venues to be sure you amplify the correct employer brand and messages. Consider creating a branded career website with enhanced relocation program messages to welcome candidates to your organization.\n\n5. Speed the Process to Keep Candidates Engaged\n\nQualified candidates are always seeking new opportunities, and your organization is always looking to hire. The quicker you help candidates move through the process, the more they will remain engaged and likely to consider your organization for employment.\n\nAccording to the 2018 Recruiting Benchmark Report from Jobvite, the time to fill job vacancies in the healthcare industry is 38 days. At the same time, the industry has 21 applications per job, which is one of the lowest among industries. If several days or even weeks can be taken out of the process, the organization will benefit tremendously and experience lower job vacancy rates.\n\n\nGMS’ team of corporate relocation experts have helped thousands of our clients develop relocation programs that attract and retain qualified employees. Our team can help your healthcare company by designing a relocation program that represents industry best practices. This will increase your company’s ability to attract and retain new employees.\n\n\nContact our experts online to discuss your healthcare company’s relocation program needs, or give us a call at 800.617.1904 or 480.922.0700 today.\n\nRequest your complimentary relocation policy review", "pred_label": "__label__1", "pred_score_pos": 0.6199077367782593} {"content": "Edgar Cayce (March 18, 1877 – January 3, 1945) was an American psychic who allegedly possessed the ability to answer questions on subjects as varied as healing, reincarnation, wars, Atlantis and future events while in a trance. These answers came to be known as “life readings of the entity” and were usually delivered to individuals while Cayce was hypnotized. This ability gave him the nickname “The Sleeping Prophet”. Cayce founded a nonprofit organization, the Association for Research and Enlightenment that included a hospital and a university.\n\nHe is credited as being the father of holistic medicine and the most documented psychic of the 20th century. Hundreds of books have been written about him and his life readings for individuals. Though Cayce himself was a member of the Disciples of Christ and lived before the emergence of the New Age Movement, some consider him the true founder and a principal source of its most characteristic beliefs.[2]\n\nCayce became a celebrity toward the end of his life, and he believed the publicity given to his prophecies overshadowed the more important parts of his work, such as healing the sick and studying religion. Skeptics[3] challenge Cayce’s alleged psychic abilities and traditional Christians also question his unorthodox answers on religious matters such as reincarnation and the Akashic records.", "pred_label": "__label__1", "pred_score_pos": 0.9958003759384155} {"content": "perennial shrub, insect attractor, habitat: Dry grassy slopes amongst rocks, in exposed, usually parched, hot rocky situations often on calcareous soils\n\nPhysical Characteristics\n\n“An evergreen Shrub growing to 1.2m by 1m. It is hardy to zone 5. It is in leaf all year, in flower from July to September, and the seeds ripen from August to October. The flowers are hermaphrodite (have both male and female organs) and are pollinated by Bees, Lepidoptera (Moths & Butterflies). It is noted for attracting wildlife. The plant prefers light (sandy), medium (loamy) and heavy (clay) soils and requires well-drained soil. The plant prefers acid, neutral and basic (alkaline) soils and can grow in very alkaline and saline soils. It cannot grow in the shade. It requires dry or moist soil and can tolerate drought. The plant can tolerate maritime exposure.”\n\n\nEdible UsesCondiment; Tea.\n\nLeaves, petals and flowering tips - raw. Used as a condiment in salads, soups, stews etc. They provide a very aromatic flavour and are too strong to be used in any quantity. The fresh or dried flowers are used as a tea. The fresh flowers are also crystallized or added to jams, ice-creams, vinegars etc as a flavouring. An essential oil from the flowers is used as a food flavouring.\n\nMedicinal Uses\n\nLavender is a commonly used household herb, though it is better known for its sweet-scented aroma than for its medicinal qualities. However, it is an important relaxing herb, having a soothing and relaxing affect upon the nervous system. The flowering spikes can be dried and used internally in a tincture, though the extracted essential oil is more commonly used…\n\nOther Uses\n\nEssential; Hedge; Incense; Pot-pourri; Repellent. The essential oil that is obtained from the flowers is exquisitely scented and has a very wide range of applications, both in the home and commercially. It is commonly used in soap making, in making high quality perfumes", "pred_label": "__label__1", "pred_score_pos": 0.9936930537223816} {"content": "Bill Summaries: H322 (2017-2018 Session)\n\n • Summary date: Mar 9 2017 - View summary\n\n Amends GS 115C-83.15(d) to increase the weight of the school growth score in calculating the total school performance scores that are used to determine school performance grades. Establishes the school growth score and the school achievement score each account for 50% of the total school performance score (currently, the school achievement score accounts for 80% and the school growth score accounts for 20%).\n\n Applies beginning with the 2017-18 school year.", "pred_label": "__label__1", "pred_score_pos": 0.9767735600471497} {"content": "Why Atlas Shrugged Changes Lives\n\nMore widely, when the novel's heroes learn that they should not feel guilt in the face of irrational demands -- even if the demands come from your mother who is nagging you to give your shiftless brother a job he does not deserve -- we learn it too. When they learn to stand up for the right to their own lives and happiness -- even if this means you will be denounced by your family, colleagues, and the public for refusing to sacrifice yourself -- we learn it too. When the novel's heroes refuse to be sacrificial lambs, we come to agree with their reasons.\n\nAnd so as readers, sometimes against our previous beliefs, we side with her heroes and want to see them overcome their opponents. After Hank Rearden invests millions and his very soul into creating Rearden Metal, the response is a concerted effort to keep the metal off the market; worse, when its value is grudgingly recognized, people demand subsidized access to it in the name of the public good. How completely unjust! -- we think in outrage. We rally behind the proud, value-creating man. We become invested in his success. What our priests and teachers taught us was immoral, Rand boldly presents as heroic -- and we wish we could meet her heroes in real life.\n\nHow did Ayn Rand reach us with such impact? Her challenge to conventional thinking is presented in the form of a riveting story. We can be inspired by her new ideas, see their concrete meaning, and apply them to our own lives. This is the reason her book has had a lasting impact on so many people since it was published in 1957.\n\nSo whatever your response to the movie, know that there is no substitute for reading Atlas Shrugged -- or rereading it and reconnecting with why it changed your life.\n", "pred_label": "__label__1", "pred_score_pos": 0.9759156703948975} {"content": "A grader and sorter of agricultural products work in the agricultural sector (as the title of the job implies) and is tasked with filtering the bad products from the good ones in any set of produce. This involves throwing out the defective and/or damaged products, separating the good ones and arranging them in baskets to be shipped for further production. Sometimes, the grader/sorter may also be tasked with some extra duties, such as removing leaves from a specific fruit or vegetable, though in most cases these tasks will be handed to those in the processing department.\n\nThe job of a grader and sorter of agricultural products is mostly a manual labor one and doesn’t hold any high educational requirements. A high school diploma is enough to get hired in most places, and a candidate will most likely be asked to undergo a specialized training course before being accepted to the position – though those courses are commonly offered by the employers themselves, where they take the opportunity to evaluate their potential employees’ performance and filter out those who’re not fit for the job.\n\nGraders and sorters of agricultural products earn comparatively little – between $14,000 and $26,000. The job can come with some long working hours attached to it as well, further making it an unattractive choice. However, the low qualifications required for it and the relatively easy nature of the work can make it a very popular choice among those looking for unskilled labor.", "pred_label": "__label__1", "pred_score_pos": 0.968890905380249} {"content": "5 Future Human-Machine Interfaces (HMI) Trends\n\nWhat HMI trends lay in the future of industrial automation and manufacturing? From artificial vision to the operator’s role, here’s what the industry experts say.\n\n1. Artificial vision\n\nIncreasing competition and the need to contain costs are forcing companies to achieve zero-defect production. This requires a more reliable and accurate quality control system, which guarantees the compliance of each piece. Including the integration of innovative technologies such as artificial vision, which will enable HMI devices to automatically perform control, measurement and classification functions.\n\n2. Wearable HMIs\n\nThe human-machine interface of the future will get even more interactive. The growing popularity of wearable devices in the consumer market (IDC estimates an average growth of over 20% per year) will also be reflected in the manufacturing sector. This is also due to the National Industry 4.0 Plan, which mentions arable devices among the technologies subject to hyper-depreciation. For example, operators will likely wear bracelets that alert them of alarms with a specific code so that they can intervene in a timely manner.\n\n3. Natural language processing\n\nNatural Language Processing (NLP) technology is a hot topic in the industry, especially in relation to user interfaces. The language processing process makes it possible for the operators and systems to interact using verbal language. This opens the door to highly interesting applications, making production more immediate and efficient.\n\n4. Blind HMI\n\nAmong the future HMI trends, human-machine interfaces might become blind devices inside the panel. In this case, operators will interact with the machine and display the production pages directly on their tablet. Alternatively, the display can be host inside the machine, while the operation will take place via an input device. For example, a tablet with a dedicated app.\n\n5. More efficiency\n\nProduction efficiency is one of Industry 4.0 priorities and this will affect the evolution of HMIs. Companies need technological solutions that simplify the interaction between men and machines to increase productivity and cut resources and time waste. One of the key factors to improve efficiency is device flexibility. Hence, it’s important that HMIs will be highly customizable according to each company’s needs.\nTalking of configurability and efficiency, discover ERGO, our new concept of human-machine interface.", "pred_label": "__label__1", "pred_score_pos": 0.9966435432434082} {"content": "Residential Tenancies Regulation 2019\n\nSubmission cover sheet\n\n • Name of organisation or individual making this submission\n\n Anne Fawcett\n\n • Authorised delegate/contact person\n\n Anne Fawcett\n\n • Position\n\n\n • Organisation\n\nQuestions on possible options\n\n 1. Is a 2 December 2019 commencement date for the proposed Regulation and Amendment Act reasonable for industry participants to adjust to the changes? If not, why?\n\n 2. Is a mid-2020 date appropriate for commencement of the new minimum standards for rental properties? If not, why?\n\n 3. Are there other terms in the proposed Regulation that should be defined so that their meaning is clear?\n\n 4. Does the new standard form of tenancy agreement clearly define the rights and obligations of both landlords and tenants?\n\n 5. Are there other ways that the standard form of tenancy agreement can be improved? If so, how?\n\n 6. Are there any other terms that should be prohibited from being included in a residential tenancy agreement?\n\n 7. Do you agree that these terms should not be excluded or modified by a fixed term agreement of 20 years or more?\n\n 8. Are there other terms in the Act that should not be excluded or modified in fixed term agreements of 20 years or more?\n\n 9. Do you think that the proposed condition report is easy to use?\n\n 10. Should any other features be included in the condition report to help accurately describe the condition of the premises?\n\n 11. For the material fact listed under clause 8(f), are there other instances where a landlord could become aware that the property has been used to manufacture drugs?\n\n 12. Are the prescribed timeframes for disclosing each of the material facts listed under clause 8, still appropriate? If not, why?\n\n 13. Are the proposed material facts listed under clause 8 too broad or too narrow? If yes, why?\n\n 14. Are there other types of material facts that a landlord or landlord’s agent should disclose to a prospective tenant?\n\n 15. Are clauses 9, 10 and 11 still appropriate? If so, why?\n\n 16. Are there any other charges that should apply to social housing tenants?\n\n 17. Are there other water efficiency measures that should be prescribed? If so, why?\n\n 18. Is the newly drafted clause 13 appropriate? If not, why?\n\n 19. Do the requirements appropriately balance tenant safety with administrative costs to landlords and agents? If not, why?\n\n 20. Are there other circumstances where repairs to a smoke alarm should be carried out by a qualified professional? If so, why?\n\n 21. Are any of the smoke alarm repair requirements unclear? If so, why?\n\n 22. How much notice should a tenant give a landlord to carry out repairs to a smoke alarm, given the need to repair it urgently?\n\n 23. Do you agree that the prescribed list of minor alterations is reasonable? If not, why?\n\n 24. Do you agree with the list of alterations where consent may be conditional on having the work carried out by a qualified tradesperson? If not, why?\n\n 25. Are there other types of minor alterations that should be prescribed, including measures to further improve accessibility for elderly or disabled tenants?\n\n 26. Do you agree with the list of exceptions? If not, why?\n\n 27. Are there any other situations where clause 17 should not apply?\n\n 28. Do you have any suggestions on how the wording and layout of the declaration form could be improved?\n\n 29. Should the exemptions provided for in clauses 19-26 continue to apply? If not, why?\n\n Blanket ‘no pets’ clauses should be made a prohibited term. This means landlords will still be able to refuse pets but this should be done on a case by case basis. There is a shortage of pet-friendly accommodation in NSW and this impacts animal welfare (more surrenders to shelters, prolonged boarding or foster care when owners have to move) and human wellbeing (may have to make difficult choice to rehome animal, losing social and instrumental support). I support an amendment to the standard form agreement which lays out a responsible pet ownership model. Currently the standard form agreement starts with a negative default against pets. This is not required by the Act and is not in keeping with community standards. I stand with the Tenants Union of NSW in recommending phrasing which encourages responsible pet ownership, emphasising consideration of adequate space and exercise options, clean living areas and other animal welfare principles. These will avoid the majority of property care issue and nuisance to neighbours.\n\n 30. Is the new exemption provided by clause 27 appropriate? If not, why?\n\n 31. Is the new exemption provided by clauses 28 appropriate? If not, why?\n\n 32. Is the new exemption provided by clause 29 appropriate? If not, why?\n\n 33. Is the new exemption provided by clause 30 appropriate? If not, why?\n\n 34. Is the exemption provided by clause 31 appropriate? If not, why?\n\n 35. Are the timeframes for making applications to the Tribunal adequate? If not, why?\n\n 36. Is the jurisdictional limit set for rental bond and other matters adequate? If not, why?\n\n 37. Are there any unintended consequences in prescribing a cumulative amount where an order is made with respect to both a rental bond and another matter?\n\n 38. Should an interest rate on rental bonds still be prescribed? Why?\n\n 39. Are the prescribed savings and transitional provisions appropriate?\n\n 40. Are any other savings or transitional provisions required?\n\n 41. Are the changes to penalty amounts in the proposed Regulation appropriate?\n", "pred_label": "__label__1", "pred_score_pos": 0.9460453987121582} {"content": "How Machine Learning Can Help Target the Right Users for Your Business?\n\n\nThe ever-changing market trends make it difficult to organize marketing campaigns for a fairly straightforward business; however, some latest techniques can bring the desired results oriented towards user engagement and better revenue generation. Nowadays, marketing departments are engaged in discovering newer ways to make their advertising and branding campaigns more successful.\n\nSince it is an era, where computers can do almost everything that seems magical, it is imperative to understand the market before going ahead and planning out marketing strategies to impress the target customers. In this article, you’ll read about how machine learning can improve digital ad campaigns and can assist you to reach your target audience without making many efforts.\n\nHow Machine Learning can help target the right users for your Business\n\nUnderstand the Need of the Business\n\nIf you’re planning a marketing strategy for the digital world, then your prime goal should always stick to finalizing your target group and determining their actual needs and requirements. Undoubtedly, earning profits and expansion are the two prime missions of every business, but maintaining a close relationship with customers is also important.\n\nWhat is Machine Learning and How Can It Help?\n\nMachine learning is a wide concept with plenty of methods and applications, but it can be explained as a typical way to find solutions for problems by finding and studying recent patterns. The technique helps humans to understand the loopholes in the current process, analyze the capabilities of a module, and then creating new rules to do things better. The case of Target hiring machine learning experts for identifying buying habits of individuals, helped the company in sending out amazing offers to their potential customers based on their buying behaviors.\n\nHow Machine Learning Can Assist in Reaching Your Target Group?\n\nIf you’re planning to use machine learning capabilities to see tremendous results for your marketing campaigns, then it is important to use this artificial intelligence engine for studying patterns and determining customer behaviors. Since the web processes millions of search queries daily, the new technique can help in drawing conclusions out of millions of data points in a fraction of seconds.\n\nMachine learning can help you study searcher’s intent, and then you can apply rules to help them reach you by just linking their needs to your offerings. A lot of computer experts simply quote that the concept makes use of computer’s fast calculations and help users to reach specific product/service by just making predictions or linking recent patterns.\n\nAll in all, it is nothing but a practical application of artificial intelligence, resulting in creating a larger scope for businesses to reach out to their prospective customers.\n\n\nThe practical application of machine learning not only helps a business to establish a close relation with customers, but can also result in increasing sales volume by recommending items based on previous purchases or buying history. Machine learning can assist in laying down a personalized shopping roadmap for every buyer, thus, helps popular brands in delivering a streamlined and hassle-free online shopping experience.", "pred_label": "__label__1", "pred_score_pos": 0.553329586982727} {"content": "Menu Close Menu\nHome Page\n\nThe Greville Primary School\n\ninspire nurture achieve\n\n\n\n- Children to read 4 times to an adult at home, this is to be recorded in their homework diaries\n\n- Children are in charge of changing their own books\n\n- Children can read their own reading books at home as well as their school books (as long as their reading that's ok!)\n\n- Any reading done over the weekend can be recorded in the Monday slot for the following week\n\n\nTimes Tables\n\n- Children are tested every Tuesday\n\n- They all get 7 minutes to answer 20 questions\n\n- If they get 20/20 they will be moved on to the next test. This will be written on their sheet so you can practice at home\n\n- If they do not get 20/20 they will be retested on the same sheet next week\n\n- The order that the children will be tested are as followed: 2, 5, 10, 4, 8, 3\n\n\n\n- Spellings will be given each Monday and tested the following Monday. If you do not have a copy of the weekly spellings see the Spelling page on our Year 3 page\n\n- Children will be given 1 Maths (Tuesday) and 1 SPaG (Thursday) homework each week\n\n- The homework should be returned to school the following day where the children will peer mark each others", "pred_label": "__label__1", "pred_score_pos": 0.9992386102676392} {"content": "6 Avenger powers developers need to be ready for their Endgame\n\nMay 6, 2019\n5 mins\n\nThe endgame is finally here.\n\nSeeing the heroes train themselves, evolve personalities, grow closer (or farther), and eventually reach where they are after 11 years and 21 movies has been nothing less than inspiring.\n\nAs a developer, there are plenty of things that we can learn from their stories. Each hero has a unique skill that makes them an invaluable part of the team.\n\nBut in the universe of competitive programming, where Thanos is not the only one you fight, you cannot form or rely on a team to support you.\n\nYou need to have the powers of all the heroes and let the hero inside awaken.\n\nBut what are the superpowers that you, as a competitive programming hero, require to not just reach the top, but be one of the most sought after?\n\nHere are 6 heroes who can be your biggest inspiration to be the last standing Avenger.\n\nIron Man\n\nReal Name: Tony Stark\n\nPowers:Genius, Billionaire, Playboy, Philanthropist” | Tech Genius\n\nI guess this one is obvious.\n\nTo be the best at competitive programming, you need to fine-tune your programming skills.\n\nTony, being one of the brightest minds on the planet is always looking to improve his armor, add more features, build new technologies, and be a stronger Iron Man.\n\nIn the world of competitive programming, where your armor is your code, practicing more and eventually improving your coding abilities is something that is of utmost importance.\n\nCommunities like StackOverflow and Codechef, online course providers such as Udemy and Coursera, and learning/practicing platforms like HackerEarth are some ways to perfect your skills and get your first infinity stone.\n\ncoding, programming challenge, coding challenge, competitive programming, developers, avengers, avengers endgame\n\nCaptain America\n\nReal Name: Steve Rogers\n\nPowers: Strength, Stamina, Agility, Durability | Super Soldier\n\nCaptain America is a superhuman with heightened stamina, agility, and durability.\n\nHe also has a strong focus and superior planning skills, making him an effective fighter.\n\nLikewise, when a developer is exposed to a competitive programming challenge that can last from an hour to even a month, you got to put the Cap hat on (pun intended!).\n\nWhat I mean is, you should have the ability to understand the challenge (focus), create a plan (superior planning skills), and develop code as fast as possible (agility).\n\nOnce you have developed your tech skills, you can start with any of the following short-term challenges to take the journey forward.\n\n • HackerEarth – HackerEarth Monthly Challenges like Easy and Circuits\n • CodeChef – Programming challenges like Cook-off and Lunchtime\n\n\nReal Name: Clint Barton\n\nPowers: Tactician and Combat expert – “Turn any object into a weapon”\n\nBarton is arguably the strongest avenger on the team.\n\nI know you don’t believe me, but hear me out.\n\nHe is the only Avenger with a family and has no actual superpowers.\n\nBut with his amazing skill-set of using almost anything as a weapon (especially his signature bow and arrow), he does not look out of place when he stands with chemically-created superhumans and gods.\n\nBeing highly motivated, not afraid of failing, and being proud of what you do are things that can add that extra edge to take your journey as a developer to the next level.\n\nBy understanding all the available tools and bringing them into practice by participating in various competitive challenges can help you define your tactics and hone your skills further.\n\n\nBlack Widow\n\nReal Name: Natalia Alianovna Romanova\n\nPowers: Master fighter, Agile, Weapon-expert, Master Hacker\n\nNatasha Romanoff operates at peak human capabilities due to biotechnological enhancements in the Red Room.\n\nWith extensive physical and mental training, Nat is an expert martial artist, athlete, gymnast, and resistant to aging and diseases, while also possessing enhanced healing.\n\nNat is an expert tactician, an effective strategist, and an overall kickass.\n\nAnd what is a competitive programming challenge, if not a game of skill, strategy, tactics, durability, agility, and the perfect execution of plans?\n\nParticipating in many short term coding challenges can help you understand your skill-set, hone it further, and also build durability and flexibility in your thinking styles to conquer any problem that comes your way.\n\nHackerEarth’s Code Arena is one of the best platforms to compete in real-time 1v1 battles against other coders and experts around the world.\n\n\n\nReal Name: Bruce Banner\n\nPowers: Intelligence, Superhuman strength, Durability, “Hulk Smash!”\n\nBanner is one of the greatest scientific minds on the planet, with expertise in biology, chemistry, engineering, medicine, physiology, and nuclear physics.\n\nHis alter ego, Hulk, is a giant with superhuman strength, the ability to withstand immense force and injury while regenerating at a speed much quicker than a normal human.\n\nIn a competitive programming challenge, there are moments when all seems lost – the code might have bugs, there are other compilation errors, or you just need a break and let it all go.\n\nIn such cases, when your strategy fails, your durability has reached its limits, and your tactics aren’t working anymore, you want to just Hulk Smash!\n\nInstead, I would suggest, let Banner win that battle, and use that genius mind to get through the situation and be the best coder out there.\n\n\n\nReal Name: Thor Odinson\n\nPowers: Strength, Flight, Controlling the power of thunder | God of Thunder\n\nWith all the aforementioned skills acquired, it would now be the best time to bring out Thor and be the god you are meant to be.\n\nThor, the mightiest Avenger, the God of Thunder can control the environment around him and strike bolts of lightning of enormous power and destructive capabilities.\n\nComing from a royal divine background, he has strong core values, a strong sense of loyalty, and incomparable strength.\n\nIn a competitive programming challenge, having a strong mindset, determination, and energy focused on developing the code will take your idea to the next level.\n\nAfter all, a god has to be on a higher level.\n\nNow use all your skills – agility, durability, practicality, flexibility, strategic thinking – and add them to the expert tech skills that you have built to be the best competitive programmer out there.\n\nTest yourself and see where you stand, or if you’re confident, conquer the biggest challenges out there. Here are some that you might be interested in.\n\nAdditionally, there are aggregator platforms like HackerEarth and TopCoder where you can find a list of several coding challenges happening around the world in various themes.\n\n– Iron Man\n\nTime to test your skills\n\n\n\nAbout the Author\n\nMukund is a part of the community team at HackerEarth. A passionate photographer and a wannabe traveler, he travels for photography whenever he can. Dislikes writing about himself in the third person, but can be convinced to do so via pizza or cheesecakes.\n\nWant to stay ahead of the technology curve?\n\nSubscribe to our Developers blog\n", "pred_label": "__label__1", "pred_score_pos": 0.5710768103599548} {"content": "Every Day Edit - Alexander Calder, Artist\n\nFor this everyday editing activity, learners correct grammatical mistakes in a short paragraph about Alexander Calder, the artist. The errors range from punctuation, capitalization, grammar, and spelling.\n\n6 Views 11 Downloads\n\n • Provides the corrected version of the text and suggestions for incorporating the activity into the classroom\n\n • None", "pred_label": "__label__1", "pred_score_pos": 0.9999819993972778} {"content": "Researchers Uncover Hidden Brain States That Regulate Performance and Decision Making\n\n • newswise-fullscreen Researchers Uncover Hidden Brain States That Regulate Performance and Decision Making\n\n Credit: Taghlia et al, Nat Comm, 27 June 2018\n\n Researchers processed fMRI data Human Connectome Project scans that indicate activated brain regions (warm colors, from yellow to red deactivated brain regions (cool colors, blues) during working memory tasks.\n\nNewswise — Brain activity is driven by encounters with external stimuli and situations, simultaneously occurring with internal mental processes. A team of researchers from Stanford University, with funding from the NIH BRAIN Initiative, in part through the National Institute of Biomedical Imaging and Bioengineering (NIBIB), has discovered how the brain dynamically handles cognitive tasks while it also is engaged in internal mental processes.\n\n“This study is an example of the importance of computational models in driving research and facilitating our understanding of the human brain,” said Grace Peng, director of the NIBIB program in Computational Modeling, Simulation and Analysis. “The team developed a computational model to make fundamental findings that have never before been revealed about how our brain processes information at various levels during daily decision making.”\n\nIn their study, published online June 27, 2018, in Nature Communications, the researchers used a novel computational model and methodology to identify unique patterns of dynamic brain circuit activity, or brain states, that corresponded with optimal conditions for cognition. They also uncovered the presence of transitional brain states when brain circuits switch in their dynamic functional configuration between different task conditions.\n\n“Previous studies assumed that if you asked the subject to do a particular task, such as a memory task, that you would observe brain activity that is driven purely by the task,” said senior author Vinod Menon, Ph.D., Rachel L. and Walter F. Nichols, M.D., Professor of Psychiatry, Neurology and Neuroscience at Stanford University. “We now think that a whole set of internal, or hidden, brain states can influence how you process tasks. Here, we identify hidden brain states and demonstrate for the first time that they influence human cognition and decision making in profound ways.”\n\nFor their study, the researchers used data from 122 participants from the NIH-funded Human Connectome Project (HCP). The HCP includes only data from healthy adults, however, there is great variation in brain function and behavior between individuals. In two sessions of several minutes each, study participants performed a working memory task during functional magnetic resonance imaging (fMRI) that noninvasively captured images of their brain activity. Working memory is the ability to temporarily store and manipulate information in one’s mind—for example, recalling a 10-digit number in reverse order—and is a critical day-to-day cognitive process. The fMRI brain scans captured images of brain activity in discrete regions and functional connections between regions during working memory that occur within frontal and parietal cortices of the brain.\n\nThe working memory exercise consisted of recalling pictures of faces, places, tools and body parts that appeared sequentially on a monitor. In the most difficult challenge—a two-back working memory task—the participant was required to recall what had been displayed two images prior to the current image. In an easier challenge—a zero-back task—the participant was shown an image as a cue and asked to indicate when that cue appeared amongst different consecutively displayed images. Researchers also conducted scans while participants viewed a blank frame, to establish a baseline.\n\nThe researchers developed probabilistic mathematical models of dynamic functional brain circuits, which enabled them to uncover hidden brain states that fluctuate over time. These models enabled the researchers to observe dynamic patterns of brain circuit activity during task performance, including changes in brain states during tasks, alignment of brain states at the outset of the task, fluctuations in brain states as participants performed tasks, and the effect on cognitive performance and decision making when a participant does not engage the appropriate brain state.\n\nDuring the two-back working memory exercise, researchers identified dominant brain patterns that they called a high cognitive-load state. “The 2-back working memory condition is the most challenging,” Menon said. “You have to keep the information in mind and constantly refresh, and update, and respond.” said Menon\n\nThey similarly identified a low cognitive-load state associated with the zero-back task, and a fixation state associated with brain patterns during the baseline condition. Their computational analysis revealed that the more time spent in the high cognitive-load brain state while conducting two-back working memory exercises, the better a participant performed on that test. Time spent trying to perform the two-back task while in any other brain state caused lower performance.\n\n“When you are doing the two-back task, you must engage a particular configuration of brain circuits,” he said. “If you don’t engage it, or if you don’t engage it at the right time, your performance suffers. The way states are engaged has a big impact on how well a subject does the working memory task.”\n\nA further novel finding of the study is the indication of a transition state that the researchers inferred from the data. The team showed that the transition state plays an important role in working memory.\n\n“We know that when you go from one task condition to another your brain state is not changing instantaneously; it takes time for systems to come online as you go from a low cognitive load to a high cognitive load,” explained Menon. “The strength of the study is that we showed that the states we identify, the transitions between states, and the relationships of these same states to behavior is very consistent across multiple datasets.”\n\nThe researchers also wanted to know whether the hidden brain states impact how well a participant will perform tasks. “For example, we asked whether performance would be negatively affected if you get distracted because you are thinking about something, and don’t engage the brain systems and networks optimally.”\n\nMenon explained that there is an optimal brain state for each task condition and that failure to engage these states in a timely manner is associated with poorer working memory performance.\n\nThe study enabled researchers to understand dynamic features of human brain function that had not been uncovered before. The researchers now hope that their computational approach can be applied to study brain circuit mechanisms and failures in disorders such as ADHD, autism, and schizophrenia—psychiatric conditions that may be disorders of dynamic brain circuits.\n\nChat now!", "pred_label": "__label__1", "pred_score_pos": 0.9960963129997253} {"content": "Positive Discipline in Middle and High Schools\n\nSign Up for Our Newsletter\n\n\nI need examples of ways to use Positive Discipline in the classroom with middle school students. I have 6 periods each day, with 43 minutes each (ridiculous). Class meetings and other strategies need to be applicable for me in that context. Elementary school teachers ways of implementing strategies often don't work because of the revolving door/time problem. Which of your products would help me best?\n\n\nI think you would find the book Positive Discipline in the Classroom very helpful. It was written for Elementary through High School teachers. The way some teachers have dealt with the logistics you discuss is to have class meetings every day or every other day for the last 10 minutes of the period. I will share one story that is included in the above mentioned book. An seventh grade teacher was concerned about toothpick chewing. She had scolded, pleaded, nagged. Nothing had worked. Finally she put in on the class meeting agenda as \"her problem\" and asked for their help. The kids brainstormed, but didn't come to a consensus in the 10 minutes allotted for class meetings in the first or second day. The third day the teacher said, \"We still haven't found a solution to toothpick chewing.\" One student remarked, \"Have you seen anyone chewing toothpicks lately.\" The teacher thought about it and replied, \"Come to think of it, I haven't.\" The student said, \"Well, maybe the problem has been solved.\" Amazed, the teacher said, \"Well, maybe it has.\" We include this story for several reasons. One is to show how much can be accomplished in creating an atmosphere of respect and cooperation just because the kids are involved in regular class meetings. Another is to show that even 10 minutes a day can work. It is the process that provides the greater benefit -- and the solutions are a great fringe benefit.\n\nThe last reason is to show that even one teacher can implement class meetings even if the rest of the faculty doesn't. In some Middle and High Schools, when the whole staff decides to implement Positive Discipline in the Classroom, they rotate class meetings. The math teacher may do them on Mondays, Science on Tuesdays, English on Wednesdays, etc. The whole point is that Positive Discipline is respectful, it teaches students valuable life skills, and it creates an atmosphere of caring. Following is one more story from the book, Positive Discipline in the Classroom:\n\nEarl Lesk provides example of the power of caring through class meetings. Mr. Lesk, a high school teacher, decided to initiate regular class meetings in his eleventh and twelfth grade biology classes. He asked his students if they would like to participate, and they said yes. One eleventh-grade student, who'd had difficulty in all aspects of the course but finished the semester successfully, summed up the class's feelings: \"By using encouragement and by not forcing people to do things, the class became more independent and cooperative, which allowed us to use our own initiative to put forth a good effort.\" These teachers and schools have incorporated class meetings with excellent results. They are just a few of the many who have experienced tremendous success by starting class meetings. If a teacher is willing to learn a process that teaches students many valuable skills, that teacher's job often becomes easier and more fun. Helping students experience caring, belonging, and significance is the most powerful thing a teacher can do, motivating them to fulfill their highest potential, academically and otherwise.\n\nI hope this helps,", "pred_label": "__label__1", "pred_score_pos": 0.8822340965270996} {"content": "main article image\n(Markus Trienke/Flickr/CC BY 2.0)\n\nNew Study Reveals The Unique, Beautiful Heritage of Inuit Sled Dogs\n\n28 NOV 2019\n\nIn the wild and inhospitable Arctic, there's no greater companion than a dog, although not just any breed will do.\n\nNew genetic research now suggests that when the ancient Inuit migrated from Siberia to North America, all those thousands of years ago, they brought along a special group of canines to help them hunt, herd and haul their sleds.\n\n\nWherever the Inuits went, so too went their dogs, until soon, both had spread across the entire continent.\n\nConsidered one of the toughest and strongest breeds there is, this ancient Siberian canine was so indispensable, it appears the Inuit didn't even bother with any other dog - not even those already living in the region.\n\n\"Dogs have lived in North America for as long as humans,\" says archaeologist Carly Ameen from the University of Exeter, \"but we show here that the Inuit brought new dogs to the region which were genetically distinct and physically different from earlier dogs.\"\n\nAnd their unique genes still live on, even to this day. Comparing the genome of 922 Arctic dogs and wolves that existed in the past 4,500 years, results now suggest modern sled dogs are some of the last direct descendants of this novel Inuit breed.\n\nAvailable data on such ancient creatures is admittedly limited, but the authors argue they have strong evidence human migrants brought dogs with them all the way from Siberia.\n\nWhile some of these ancient genes were already present in North America beforehand, the Inuit dogs' rapid dominance and eastward expansion seems to have arrived hand-in-hand with human migration.\n\n\n\"Though the Inuit were likely not responsible for the first appearance of this dog lineage in the Americas, they were responsible for the considerable geographical expansion of this lineage into the Eastern Arctic, where, during the Inuit period, they became the most common haplotypes across the entire North American Arctic,\" the authors write.\n\nIn fact, Ameen says, after the ancient Inuit dog arrived on the continent, other native populations were almost completely replaced - and this speaks volumes about their usefulness.\n\nCompared to native dogs in North America before the Siberian migration, Inuit dogs were probably much larger with narrower heads. Over millennia, their appearance has gradually changed, and yet even today, sled dogs are still some of the most robust and powerful canines there are.\n\nIt's not hard to guess why their ancestors were perfect for sledding, hunting, protection, clothing and, during tough times, even food.\n\n\"The usage of dogs most likely increased the speed at which they could travel, facilitating the migration across the region within a generation or two as suggested by archaeological evidence,\" palaeogeneticist Tatiana Feuerborn told Newsweek.\n\n\"Furthermore dog sledding on the sea ice will have also enabled them to efficiently hunt the sea mammals which they subsisted on.\"\n\nWithout these special canines, who knows how far the Inuit would have gotten. And without the Inuit, who knows where the Siberian dog would be now.\n\nThe study was published in Proceedings of the Royal Society B.", "pred_label": "__label__1", "pred_score_pos": 0.5906245708465576} {"content": "What are the antonyms for OBDURATE?\n\nSynonyms for OBDURATE\n\nUsage Examples for OBDURATE\n\n 1. But here Monty was obdurate. - \"Brewster's Millions\" by George Barr McCutcheon\n 2. But the boy has grown obdurate: he is determined not to go back to the shop whose officer caused him so much trouble. - \"Prison Memoirs of an Anarchist\" by Alexander Berkman", "pred_label": "__label__1", "pred_score_pos": 0.5503368377685547} {"content": "Was Felix Murdered? This was the question the Middle School CSI (Crime Scene Investigators) sought to answer during their week-long STEM after school program at The Wardlaw+Hartridge School in Edison. \n\nThe students were presented with a crime scene found on the floor of the Middle School science lab. Felix was dead and there were four different possible suspects. On the first two days, the students broke into groups and logged and collected evidence. On Days 3 and 4, they worked as forensic scientists and learned to expose and study finger prints, analyze foot prints, decipher DNA, and identify various substances using pH, chromatography, tape lift and fire reactivity.  \n\nThroughout the process, the students weighed how each part of the evidence helped answer the overall question of if Felix was murdered and if so who did it. On Day 5, students served as suspects, defense attorneys, prosecutors and jury to tweeze out the facts and convict. Could they make a case?\n", "pred_label": "__label__1", "pred_score_pos": 0.6409780979156494} {"content": "\n\n\nA 30 year-old young man had cholangiocarcinoma (bile duct cancer). Using his transcendental ability, Master Lu was able to see that the young man likes to consume animal products and has a narrow mindset, which exacerbated his condition. Master Lu even pointed out that he did not truly believe in Buddhism. He admitted all of the above.\n\n\nEnquirer: Hi, Master Lu.\n\nMaster Lu: Hi.\n\nEnquirer: I was born in 1977, Year of the Snake. I’ve had cholangiocarcinoma for three years, and it has already spread. I would like to ask you… Well… Because our family has been reciting Little Houses for over a year.\n\nMaster Lu: Cholangiocarcinoma, right?\n\nEnquirer: Yes.\n\nMaster Lu: Cholangiocarcinoma… Let me see. Oh. You’ve already had surgery.\n\nEnquirer: Yes.\n\nMaster Lu: Round of applause! Let me tell you, it’s not about whether you will recover or not. Now you have to watch what you eat. You should not have oily or greasy food. Do you understand? You are obsessed with food, you. Do you understand? Now when you eat something stimulating, you‘ll feel discomfort in your liver, gall bladder, and bile duct. Every time you eat that sort of food you’ll feel something. But the pain will stop after a while. Is that correct?\n\nEnquirer: Correct.\n\nMaster Lu: I can tell you that, at the moment, the cancer has not completely spread. But it has spread a little bit… Spread to your stomach and intestines. It’s been getting worse over time. Your digestive system has been getting weaker.\n\nEnquirer: Yes, my digestion is not good now.\n\nMaster Lu: So I would like to kindly advise you to choose lighter food. You absolutely should not consume live creatures again. This is because for people who consume live creatures, their bodies are likely to be acidic. People whose bodies are alkaline would be less likely to develop cancer. This is a medically proven fact. Therefore, I hope that you can practise vegetarianism often. Okay?\n\nEnquirer: Okay.\n\nMaster Lu: Also, you should be more benevolent. Do you know what your biggest problem is? You have a bad temper. And you cannot forget your past, all those unhappy memories. Right?\n\nEnquirer: Hm. Yes.\n\nMaster Lu: Yes. You still need to think about it. Alright. It’s not a big deal. You won’t die anytime soon. Two years. I can guarantee you. Next year, if I come back to Hong Kong, and you can come and see me, I guarantee that you will be fine.\n\nEnquirer: Okay. No problem.\n\nMaster Lu: Alright, alright.\n\nEnquirer: But I would like to ask… Basically, regarding Little Houses, I can offer 7 to 14 Little Houses per day.\n\nMaster Lu: Per week?\n\nEnquirer: Per day.\n\nMaster Lu: Per day? How can you recite that many?\n\nEnquirer: My family.\n\nMaster Lu: Oh. I was wondering how you can recite all of these by yourself. Hm. Your entire family is reciting. That’s fine. You have to say the following, “May the Great Merciful and Great Compassionate Guan Yin Bodhisattva protect and bless me, , so that my cancer cells won’t spread, and I can recover. I will recite 49 Little Houses to repay my karmic debts to my Karmic Creditor.” After you state that, you recite 49 Little Houses as a batch. Afterwards you take a break and then you make another vow, instead of just reciting over 10 Little Houses per day. It would not be as effective. Do you understand?\n\nEnquirer: I understand.\n\nMaster Lu: This is a method. Alright?\n\nEnquirer: About my Daily Recitation, I currently recite the Great Compassion Mantra (Ta Pei Chou) 49 times per day.\n\nMaster Lu: Hm.\n\nEnquirer: Heart Sutra (Hsin Ching) 21 times per day.\n\nMaster Lu: Hm.\n\nEnquirer: Amitabha Pure Land Rebirth Mantra (Wang Sheng Chou) 21 times per day.\n\nMaster Lu: Hm. And the Eighty-eight Buddhas Great Repentance (Li Fo Ta Chan Hui Wen).\n\nEnquirer: 5 times per day.\n\nMaster Lu: Alright. No problem. I can tell you that, there are no major issues. You are already recovering. Aright? Very good. This is because in the past he didn’t believe in Buddhism. Correct?\n\nEnquirer: Correct.\n\nMaster Lu: Now that he believes, he can be saved. Alright. Alright.\n\nEnquirer: Thank you.\n\nMaster Lu: Please be patient. Alright. Next.", "pred_label": "__label__1", "pred_score_pos": 0.7840052843093872} {"content": "King Mohammed VI: The Moroccan Module after Sixteen Years\n\nKing Mohammed VI: The Moroccan Module after Sixteen Years\n\n\n\nmourad beni-ich -Dr.Mourad Beni-ich is a Political, Intelligence & Strategic Analyst based in Washington, DC. You can follow him on Twitter at: @MonarchKnight[/symple_box]\n\nWashington, District of Columbia-Every year, on July 30th, the Kingdom of Morocco celebrates the occasion of the ascending to the throne of the Moroccan Monarch. This year was no difference in regards to the occasion itself, but listening to the King’s speech to the nation; one can only conclude that the country is on the right track and is deeply determined to continue on the path of reforms set by His Majesty. King Mohammed VI made the development of the country along with its political and social institutions a priority since he succeeded his father late King Hassan II.\n\nThis year’s speech was a powerful one; a speech many Moroccans were anticipating it and could not wait for a direct interference of the Monarch to solve all suspended issues. It seems that Moroccans have lost every single hope and faith in the government, civil servants, local and regional authorities. The speech came at a very much-needed time.\n\nKing Mohammed VI called for developing an integrated action plan in order to provide variety of means of financing infrastructure projects and basic social services, whether in the field of education, health, water, electricity, roads, rural and other sectors that suffer from the shortfall, with the priority to be given to regions in desperate need. The Moroccan Monarch pointed out that although there were many important achievements, yet it remains insufficient for the country, as long as there is a class suffering from the harsh conditions of life, and feel that, they are marginalized, despite all efforts, stressing his commitment that all citizens benefit from the bounties of the country. He stressed out that the well-being of Moroccans is his number one priority and will forever work restlessly to deliver prosperity to all, more especially those residing in remote areas and those who feel that they are part of this great nation.\n\nMoroccans of the world were not forgotten in the king’s speech, he finally brought them justice. For decades, the Moroccan diaspora round the world suffered a great deal every time they had to deal with the Moroccan Consulates to solve their administrative and official documents. A poor service and lack of professionalism what made many Moroccans complain and write to the Moroccan Monarch. King Mohammed VI gave his strict orders to the Minister of Foreign Affairs to dismiss any Moroccan official who is proven to provide poor performance of his duties and only recruit those who can fulfill their duties and meet the needs of Moroccans residing overseas.\n\nThis is a victory to millions of Moroccans living abroad after years of torture and psychological trauma cause by the Moroccan consulates worldwide. Moroccan diplomats were always under the impression that they are on an open leave for the duration of their tour. Time is up for those who decry, loiter, and given short shrift to the interests of the people.\n\nThere is no doubt that there is a frightening decline in the level of education in Morocco. Such a decline is reflected in the society and how it turns out to be. In his speech, King Mohammed VI stressed the urgent need for fundamental reform of the education sector. The King ordered for a development of a comprehensive strategic perspective for a serious educational reform in the country. He stressed that the education reform, which is vital and crucial sector, remains the mainstay of development of the Moroccan society; there should be no social and institutional advancement without possessing a well-educated Moroccans. The King highlighted that the education reform must remain away from selfishness, and any political calculations that will jeopardize the future of the younger generations, under the pretext and excuse of maintaining the Moroccan identity. Morocco’s future, therefore, depends on the level of education provided to its youth.  The Monarch encouraged and urged Moroccans to open up to different cultures and learn foreign languages. Such a learning will certainly enrich the knowledge and have an impact on introducing Morocco to new horizons.\n\nThe speech was an occasion for the King to emphasize on the Moroccan stand within the international community. Morocco’s unity is a red line and the Moroccan diplomacy has proven its caliber promoting the country’s concrete proposal to solve the issue of the Southern territories. The international community warmly welcomed such a proposal, while the other party is trying to put blockades to rationalism in the conflict.\n\nMorocco has been active diplomatically for over a decade now and has set firm strategies to expand regionally, continentally and globally. The diplomatic wheel did not cease to find new international partners to find new markets and encourage investments. This gained Morocco an outstanding reputation in managing its international policies wisely; policies that gained Morocco more friends and earned its Monarch and government an indisputable respect.\n\nMany Moroccans around the world have been campaigning for years and years to make their voices heard. Their sense or inequity and injustice has finally found a listening ear. Moroccans do indeed love their country unconditionally and never lost their ties with the Royal institutions that forever represented them well at all levels. It seems, however, that the core of the issue lies within the political apparatus. The latter abused and ridiculed people’s rights in a pathetic way.\n\nThis should be a wake-up call to all Moroccans to think twice before casting their votes in the next general elections. The era of opportunist who fool their constituents and betray their country is gone. Morocco is now building a new transparent era wherein every citizen holds his fate in his hands while choosing their representatives.\n\nMoroccans also showed that they could hold the key to change in the country by acting as watchdog for the actions of the government and officials. With a proper use of social media and possessing the necessary tools to act as such, Moroccans can actually become an influential force within the Moroccan political system. We write, we speak, we campaign, and it seems sometimes that what we do falls into deaf ears, but with this year’s speech, this was proven wrong. There is always someone watching and listening to the concerns of people, and it is just a matter of time before we get issues solved. Patience sometimes is a virtue.\n\nHowever, There is a tremendous responsibility on Moroccans’ shoulders in the light of the recent social disorder and the rise of the crime ratio in the country. We cannot and we will never build a healthy society if certain individuals remain focus to destroy what millions are trying to build. It is our country and we cannot always rely of the government to do things for us. We should take the initiative and educate one another on how to learn to coexist and forgive; we have to learn how to show compassion to one another and to live as one. It is our Morocco and we should all contribute to its social, economic and political development. If we always rely on others to do the job for us and become consumers only, then any reform will simply not work. The change out to begin from thyself, and through it the surrounding before we can see the good reigning over the society at large.\n\nAll in all, this year’s Royal speech met the expectations of millions of Moroccans. King Mohammed VI proved his presence heavily and showed the willingness to step up should members of the government fail to deliver and perform their duties. He proved that he is the sole guarantor of people’s rights and privileges, while many civil servants and government officials loiter and abuse their power. The King responded well to people’s demands and he did not disappoint their expectations, and with him at the helm of the political power, Moroccans can rest assured that no matter how much they might struggle due to some ignorant and incompetent official, the King will step up and take charge of ensuring justice is served to all.\n\nFellow Moroccans, remember that Morocco is US and We Shall Forever Be Morocco..\n", "pred_label": "__label__1", "pred_score_pos": 0.9859034419059753} {"content": "Gallipoli Campaign: A Symbolic Battleground (Özgür Öztürk)\n\n\n\n\n\n\n1984, George Orwell\n\n\n\nThis article argues that there is no static approach to the meaning of Gallipoli Campaign in Turkey. There is a social dimension that shapes the understanding of the battle continually. The understanding of the battle changes when a rival political group champions on the historiography of the battle. In Turkey, political groups, namely Kemalists and Islamists, contend over the meaning of the battle. This rivalry makes the history of Gallipoli Campaign as a symbolic battle ground between the groups. Since the Turks do not constitute a single political group, Gallipoli Campaign is what the groups make of it. In Turkey, Gallipoli Campaign is a historical heritage that is always under construction.\n\nDefending the Straits\n\nIn 1915, the allies came to the shores of the Ottoman Empire, “the sick man of the Europe”, with the strongest navy in the world to crush the Ottomans[2] to invade the capital of the empire, Istanbul. The naval operation was based on the assumption that the Ottomans were weak and not capable enough to defend the strait of Dardanelles.[3] The allies envisioned that the Ottomans would be intimidated when they saw the weapons of the navy. The Ottomans “were not regarded as a European enemy in the terminology of the time” and the British officers thought that they “could take risks that they would not have attempted against the German army.”[4] Thanks to the presumption of easy success, Winston Churchill planned to hire the Ottomans as mercenary to the British army.[5] During the First Balkan War, lasted from 1912 to 1913, the Ottoman Empire lost most of the part of its European lands. The empire also lost Edirne, the previous capital of the empire. The Ottoman Empire was defeated in less than 60 days.[6] Mustafa Kemal, at a day following 25 April 1915, addressed his solders:\n\n“…we must drive those now in front of us into the sea… There is no need to scheme much to make the enemy run. I do not expect that any of us would not rather die than repeat the shameful story of the Balkan Wars. But if there are any such men among us, we should at once lay hand on them and set them up to the line to be shot.”[7]\n\nGawrych argues that these words reflect the mindset and feeling of him in those days, but it is safe to say that all of the Ottoman soldiers was feeling the same things at that time. The Balkans was a critical region of the empire and now the enemy was threatening the capital. At that time, the Ottomans were making plan to move the government to Anatolia to secure the throne. After the unsuccessful naval operation, the allies decided to start the amphibious operation. This second phase of the campaign lasted for 9 months but gave no hope for any success and the allies decided to withdraw. Peter Hart questions the reason of the failure. It is worth to quote a long sentence from his book:\n\nIt was a campaign that needed hundreds of guns that did not exist, fired by gunners not yet trained, using complex artillery techniques that had not yet been invented, firing hundreds of thousands shells not yet manufactured.[8]\n\nWhether the Ottomans spotted the enemy retreating or not is not known yet, it is known that the Ottomans heartily collected the equipment the enemy left behind. Liman von Sanders says that the soldiers were very happy like children.[9] The European nations jumped into the war with cheers but the Ottomans was the only empire that fought to survive. The Ottomans had fought against the enemy with courage, faith and discipline. Gallipoli Campaign is one of the most important historical heritage that, no matter how old they are, people commemorate the battle and express their gratitude to the ancestors who had fought against the enemy.\n\nOne front, many stories\n\nHistory is the study of the past that it presents a series of lessons that societies learn and make inferences to understand the world they live in today. Studying the past is like turning the light on in a dark corridor wherein societies walk through. Societies also resort to their historical heritages to prove their political cause. The past is studied to perform the politics of the present. Societies perform the politics to prove that the politics they adopt is the only true and legitimate one. Societies exploit the historical facts which help them to legitimize their political preferences. Philosophy of history tells us that history is the study of the past that societies do through their norms and beliefs. Robin George Collingwood, an English philosopher and historian, argues that “the past which an historian studies is not a dead past, but a past which in some sense is still living in the present.”[10] Another English historian Edward Hallet Carr argues that “history is a continuous process of interaction between the historian and his facts.”[11] It means that there is no historical fact exists objectively from a historian’s accepted judgement. Historian resorts to historical accounts which are “deeply imbued with the attitudes and agendas” of the society he lives in.[12] If the aim of historian is to legitimize the present, when the present changes, the past changes simultaneously.\n\nIn Turkey, both Islamists and Kemalists contend with each other to construct their own hegemony over the historiography of Gallipoli Campaign. Being hegemon over the historiography means that only one narrative is the true one and the others are distorted or manufactured. These groups constantly narrate the battle through their own ideologies. Post-modernism argues that societies narrate history not only to understand, but also to constitute events.[13] It is believed that “there is no object or event outside or prior to perspective or narrative” and no historical fact that can exist apart from norms and believes societies adopt.[14] Post-modernism emphasizes the role of narratives as political tools. Narratives perform political functions in contemporary political struggles. It is important to emphasize that contending narratives disclaim others both epistemologically and ontologically. The contending narratives are self-contained. The one thing that contending political groups are trying to do is to being the hegemon.\n\nSociologist Zygmunt Bauman implies the presence of distinction between the world inside and outside.[15] Social groups are constituted through common beliefs and norms and these groups are inclined to draw borders between the world they live in and the outside. The outside is full of uncertainty and threats and social groups should be unified in the face of the threats come from the other. Yuval Noah Harari argues that sedentary societies resort to mutual myths to perpetuate their coexistence.[16] It means that sedentary societies live only in imagined orders. The myths which are constituted consistently help these societies to continue their unity and existence within the imagined orders. Collective memories-consisted of myths, narratives, and traditions- are the way groups acquire continuity and identity.[17] Collective memories have decisive long term effects; it shapes the understanding of the world of social groups and it is “hard to shake their long-term effects.”[18]  Gallipoli Campaign is one of the historical heritages that constitutes collective memory of Republic of Turkey.[19] The stories of Corporal Seyit, soldiers who were fighting on an empty stomach, and martyred students are popular myths resorted to ensure the collective identity formation.[20] E. Zeynep Güler argues that Gallipoli Campaign is a place of memory in Turkey.[21] Places of memory create collective identities, consolidate national consciousness and perpetuate the order.[22] Social groups regularly visit places of memory. Tours, monuments and narratives are the key elements that provide unity within the groups.  \n\nGallipoli Campaign is a historical heritage that it is continually under construction. Both Islamists and Kemalists interpret the battle through their own socially positioned lenses. Islamism views the world divided into two: the house of Islam and the house of unbelief.[23] Islamists believe that their distinct identity embroils them in a dispute with the Christian world. Relations with the West has been maintained in the Hobbesian culture of anarchy. In this culture of anarchy, security of social groups is competitive and based on zero-sum game.[24] Because of that sharp contrasts between the Muslims and the Christians, bilateral relations are inclined to become severe over time. Islamist point of view projects Gallipoli Campaign as another phase of the longstanding conflict between the Muslims and the Christians. According to Islamists, the enemy had tried to extinguish the presence of Islam around the world. The battle was to defend the house of Islam against the enemy. Thus, the Muslims came from the adjacent regions had fought with great vehemence and defeated the enemy. The battle proved that the Crusaders still set theirs eyes on the Islamic territories, therefore the Muslims all around the world should be awake against the enemy at all time. In contrast to Islamists, Kemalists frame the relations with the West in the Kantian culture of anarchy. In this culture of anarchy, friendship among the sides shapes the bilateral relations. The friendship is settled on two simple rules: no war between the friends and collective action against an aggressor.[25] In Turkey, westernization, and as well as modernization, has been in process for a long time. The Ottomans had pondered on the question of why the empire was falling behind the West, while the former had subjugated the latter for years in the past. Kemalists decided to overcome the backwardness by designing the nascent republic in the western-style institutions and laws. The orthodoxies of the both groups on the world-view in general and Gallipoli Campaign in particular do make the two to clash with each other. This article scrutinizes the discordance between Islamists and Kemalists over the meaning of Gallipoli Campaign. It will be argued that Gallipoli Campaign is a world of Islamist and Kemalist making.\n\nWho was the enemy?\n\nIslamists label the enemy as successors of the Crusaders. They argue that the Christianity had motivated the allies to invade Istanbul, the capital of the Muslim world and extinguish the presence of Islam. In 2015, Presidency of Religious Affairs of Republic of Turkey published a book titled “Bir Milletin Yeniden Dirilişi Çanakkale: 100. Yılında Çanakkale Zaferi”.[26] This book interprets Gallipoli Campaign as a new phase of the Crusade.[27] Mosques and madrassas, the basic elements of Islam, were the target of the enemy. The battle was the clash of Christianity and Islam.[28] The Crusaders aimed to invade the house of Islam and destroy the presence of Islam.[29] Kemalists have a secular reading of the battle. According to Kemalists, the enemy was the western imperialism, not the West itself. Kemalists have designed the newborn republic to be a member of the western civilization.[30] They argued that the allies attacked at the Gallipoli peninsula on the basis of cold national interest calculations. The Ottoman Empire was not capable any more to resist the dynamics of the modern world, thus the western empires exploited the status. Kemalists pay no attention to the belief system and norms of the western world while Islamists resort to the aforementioned idealist explanations.\n\nHow did the Ottomans win the battle?\n\nGallipoli Campaign is seen as a victory in Turkey. The Ottomans defeated the enemy in the age of many defeats. Although both Islamists and Kemalists embrace the battle as a victory, they are split on the determinants of the victory.\n\nIslamists argues that faith was the primary source of the victory. All the soldiers who had defended the peninsula were Muslim and they fought for the sake of Islam. No matter what were their ethnicities, the Muslim soldiers were aware of the meaning of the battle: the battle between the believers and non-believers.[31] Islamists interpret the battle as a “holy war”.[32] Islamists believe that the God had helped the Muslims and even the enemy knew the assistance of the God to the Muslims. Islamists claim that General Ian Hamilton once confessed that the God was with the Ottomans and the result of the battle is the natural one consequently.[33] Islamists usually downgrade the role of Mustafa Kemal on the course of events and they offer alternative leaders such as Sultan Abdulhamid. According to this point, it is believed that Sultan Abdulhamid strengthened the fortifications during his reign and there was no reason to be concerned.[34]\n\nKemalists argue that Mustafa Kemal’s role was the decisive one. Although he was a lieutenant colonel at the beginning of the battle, Kemalists represent him as the commander in chief. Thinking the battle counterfactual is popular among Kemalists. They think that if Mustafa Kemal was not on the ground, the Ottomans would be defeated.[35] Kemalists argue that the commander who had lead the soldiers was Mustafa Kemal.[36] Kemalist reading do not put too much emphasis on religion. Rather than the religion, it concentrates on a kind of national sprit. The soldiers had fought for the homeland.\n\nWhat is the importance of the battle today?\n\nBoth Islamists and Kemalists see Gallipoli Campaign as a historical heritage and make inferences from the battle for the present time and future. Islamists think that the battle demonstrates that the interests of the Crusaders over the house of Islam are still alive.[37] Muslims all around the world should be aware of the imminent threat. The ummah came from Yemen, Kosovo, Bosnia, Bagdad, Mecca and Damascus had fought against the crusaders.[38] Islamists argue that the battle proved the power of Islam when the ummah is united.\n\nKemalists argue that the battle was the preface of the newborn republic[39] while Islamists see the battle as the last stage of resistance of the Ottoman Empire.[40] Kemalists think that the victory give birth to the nationhood to the republic. They underline the fact that the victorious commanders later fought for the independence of the republic.\n\n\nGallipoli Campaign has been a symbolic battleground of competing political ideologies. Both groups have competed over the historiography of the battle and have tried to constitute their own hegemony. They narrate the battle with the lexicon of their ideologies. Gallipoli Campaign is also exploited for the foreign policy of Turkey. Last year, the victory was celebrated on 24 April rather than 18 March to encounter the Armenian genocide allegations.[41] The division and contention over Gallipoli Campaign is also polarizing the society in Turkey.[42] Rather than a scientific approach, the battle has been studied with the ideologies of the groups in Turkey. Gallipoli Campaign is a symbolic battleground between Islamists and Kemalists and it is what the groups make of it.\n\n\n\n\n[2]The author intentionally refers those who fight against the allies as the Ottomans rather than Turks since not only Turks had fought, but also Armenians, Arabs, Kurds and other ethnic groups also had fought against the enemy.\n\n[3]Peter Hart, Gallipoli, London, Profile Books, 2011, p. 22.\n\n[4]Peter Hart, Ibid. p. 68.\n\n[5]Robin Prior, Gelibolu: Mitin Sonu, çev. Füsun Tayanç-Tunç Tayanç, Ankara, Akılçelen Kitaplar, 2012, p. 91\n\n\n[6]Edward J. Erickson, Size Ölmeyi Emrediyorum: Birinci Dünya Savaşı’nda Osmanlı Ordusu, İstanbul, Kitap Yayınevi, 2011. \n\n[7]George W. Gawrych, The Young Ataturk: From Ottoman Soldier to Statesman of Turkey. I.B.Tauris&Co Ltd. 2013. p.  45\n\n[8]Peter Hart, Ibid. p. 459.\n\n[9]Liman von Sanders, Türkiye’de Beş Yıl, çev. Eşref Bengi Özbilen, İstanbul, Türkiye İş Bankası Kültür Yayınları, 2015, p. 142\n\n\n[10]Jan van der Dussen, History as a Science: The Philosophy of R. G. Collingwood, Springer, 1981, p. 289.\n\n[11]Edward H. Carr, What is History? Random House, Inc. 1961.\n\n[12]Jenny Macleod, Introduction, Gallipoli: Making History, ed. Jenny Macleod, Frank Cass, p. 1.\n\n[13]Richard Devetak, “Critical Theory”,Scott Burchill [et al.] Theories of International Relations, Palgrave Macmillan, 2005, p. 164.\n\n[14]Devetak, Ibid. p. 164\n\n[15]Zygmunt Bauman, Sosyolojik Düşünmek, çev. Abdullah Yılmaz, İstanbul, Ayrıntı Yayınları, 2015, p. 51.\n\n\n[16]Yuval Noah Harari, Hayvanlardan Tanrılara Sapiens: İnsan Türünün Kısa Bir Tarihi, çev. Ertuğrul Genç, İstanbul, Kolektif Kitap, 2015, s. 113.\n\n[17]Alexander Wendt, Social Theory of International Relations, Cambridge University Press, p. 163.\n\n[18]Wendt, Ibid. p.  163.\n\n[19]E. Zeynep Güler, ‘’Bir Ulusal Hafıza Mekanı Olarak Gelibolu Yarımadası’’, İnci Özkan Kerestecioğlu ve Güven Gürkan Öztan (der.), İstanbul, İletişim Yayınları, 2012, p. 307.\n\n[20]Bezen Balamir Coşkun, ‘’Çanakkale Savaşı ve Türk ve Avustralya Ulus Kimliklerinin İnşası’’, Bezen Balamir Coşkun [et al.] Uluslararası İlişkiler Tartışmalarında Çanakkale Savaşı, İstanbul, Röle Akademik Yayıncılık, p. 40.\n\n[21]Güler, Ibid. p. 311.\n\n[22]Güler, Ibid. p. 311.\n\n[23]Bernard Lewis, “The Root of Muslim Rage”, 1990.\n\n[24]Wendt, Ibid. p. 265.\n\n\n[25]Wendt, Ibid. p. 298-299.\n\n[26]Yunus Özdamar [et al.] Bir Milletin Yeniden Dirilişi Çanakkale: 100. Yılında Çanakkale Zaferi. Diyanet İşleri Başkanlığı, 2015.\n\n[27]Ahmet Taşgetiren, “Çanakkale Son Kale Hassasiyeti”, Yunus Özdamar [et al.] Bir Milletin Yeniden Dirilişi Çanakkale: 100. Yılında Çanakkale Zaferi. Diyanet İşleri Başkanlığı, 2015.\n\n p. 54\n\n[28]Taşgetiren, Ibid. p. 54\n\n[29]Mustafa İsmet Uzun, “İmanın Zaferi Çanakkale”, Yunus Özdamar [et al.] Bir Milletin Yeniden Dirilişi Çanakkale: 100. Yılında Çanakkale Zaferi. Diyanet İşleri Başkanlığı, 2015. p. 95.\n\n\n[30]Feroz Ahmad, Modern Türkiye’nin Oluşumu, çev. Yavuz Alogan, Kaynak Yayınları, 2012. Erik Jan Zürcher, Modernleşen Türkiye’nin Tarihi, çev. Yasemin Saner, İletişim Yayınları. 2011ç\n\n[31]Mustafa Irmaklı, “Çanakkale Zaferi’nin Hatırlattıkları”, Yunus Özdamar [et al.] Bir Milletin Yeniden Dirilişi Çanakkale: 100. Yılında Çanakkale Zaferi. Diyanet İşleri Başkanlığı, 2015. p. 152.\n\n[32]Stephen Starr, “Gallipoli centenary exposes Turkish divisions over history”, April 26, 2015.\n\n[33]Süleyman Dikici, ‘’Çanakkale İşgal Kuvvetleri Komutanı Ian Hamilton’un Rüyası’’, Kemal Erkan ve Adem Fidan (der.), Osmanlı’nın Son Kilidi Çanakkale 1, İstanbul, Çamlıca Basım Yayın, 2011, p. 171.\n\n[34]Hasan Basri Bilgen, “Çanakkale Mektebinden Öğrendiklerimiz”, Yunus Özdamar [et al.] Bir Milletin Yeniden Dirilişi Çanakkale: 100. Yılında Çanakkale Zaferi. Diyanet İşleri Başkanlığı, 2015. p. 139.\n\n[35]Orhan Karaveli, Çanakkale Olmasaydı…O Olmasaydı… İstanbul, Doğan Kitap, 2014, p. 16.\n\n[36]F. Rezzan Ünalp, ‘’Çanakkale Muharebeleri ve Mustafa Kemal’’, Çanakkale Araştırmaları Türk Yıllığı, Cilt 13, No 18, 2015, p. 37-64.\n\n\n[37]Irmaklı, Ibid. p. 153.\n\n[38]Irmaklı, Ibid. p. 157.\n\n[39]Turgut Özakman, Diriliş: Çanakkale 1915, Ankara, Bilgi Yayınevi, 2008. Karaveli, a.g.e. s. 18.\n\n[40]Süleyman Dikici, ‘’Çanakkale İşgal Kuvvetleri Komutanı Ian Hamilton’un Rüyası’’, Kemal Erkan ve Adem Fidan (et al.) “Osmanlı’nın Son Kilidi Çanakkale 1”, İstanbul, Çamlıca Basım Yayın, 2011, p. 171.\n\n[41]‘’Çanakkale ve Erivan’da 100. yıl anma törenleri’’ April 24, 2015.\n\n[42]Şükrü Hanioğlu, ‘’Tarihler, semboller ve merasimler’’, May 01, 2016.\n\n\n8.060 okunma\n\nBir cevap yazın\n\nE-posta hesabınız yayımlanmayacak. Gerekli alanlar * ile işaretlenmişlerdir", "pred_label": "__label__1", "pred_score_pos": 0.7297156453132629} {"content": "mulch in Australia\n\nWhat is mulch?\n\n\nA mulch is usually, but not exclusively, organic in nature. It may be permanent (e.g. plastic sheeting) or temporary (e.g. bark chips). It may be applied to bare soil or around existing plants. Mulches of manure or compost will be incorporated naturally into the soil by the activity of worms and other organisms. The process is used both in commercial crop production and in gardening, and when applied correctly, can dramatically improve soil productivity.\n\n\nMany materials are used as mulches, which are used to retain soil moisture, regulate soil temperature, suppress weed growth, and for aesthetics. They are applied to the soil surface, around trees, paths, flower beds, to prevent soil erosion on slopes, and in production areas for flower and vegetable crops. Mulch layers are normally two inches or more deep when applied.\n\nThey are applied at various times of the year depending on the purpose. Towards the beginning of the growing season mulches serve initially to warm the soil by helping it retain heat which is lost during the night. This allows early seeding and transplanting of certain crops, and encourages faster growth. As the season progresses, mulch stabilizes the soil temperature and moisture, and prevents the growing of weeds from seeds. In temperate climates, the effect of mulch is dependent upon the time of year they are applied and when applied in fall and winter, are used to delay the growth of perennial plants in the spring or prevent growth in winter during warm spells, which limits freeze thaw damage.\n\nThe effect of mulch upon soil moisture content is complex. Mulch forms a layer between the soil and the atmosphere which prevents sunlight from reaching the soil surface, thus reducing evaporation. However, mulch can also prevent water from reaching the soil by absorbing or blocking water from light rains.\n\nIn order to maximise the benefits of mulch, while minimizing its negative influences, it is often applied in late spring/early summer when soil temperatures have risen sufficiently, but soil moisture content is still relatively high. However, permanent mulch is also widely used and valued for its simplicity, as popularized by author Ruth Stout, who said, \"My way is simply to keep a thick mulch of any vegetable matter that rots on both sides of my vegetable and flower garden all year long. As it decays and enriches the soils, I add more.\"\n\nPlastic mulch used in large-scale commercial production is laid down with a tractor-drawn or standalone layer of plastic mulch. This is usually part of a sophisticated mechanical process, where raised beds are formed, plastic is rolled out on top, and seedlings are transplanted through it. Drip irrigation is often required, with drip tape laid under the plastic, as plastic mulch is impermeable to water.\n\n\nMaterials used as mulches vary and depend on a number of factors. Use takes into consideration availability, cost, appearance, the effect it has on the soil—including chemical reactions and pH, durability, combustibility, rate of decomposition, how clean it is—some can contain weed seeds or plant pathogens.\n\nA variety of materials are used as mulch:\n\n • Organic residues: grass clippings, leaves, hay, straw, kitchen scraps comfrey, shredded bark, whole bark nuggets, sawdust, shells, woodchips, shredded newspaper, cardboard, wool, animal manure, etc. Many of these materials also act as a direct composting system, such as the mulched clippings of a mulching lawn mower, or other organics applied as sheet composting.\n • Compost: fully composted materials are used to avoid possible phytotoxicity problems. Materials that are free of seeds are ideally used, to prevent weeds being introduced by the mulch.\n • Old carpet (synthetic or natural): makes a free, readily available mulch.\n • Rubber mulch: made from recycled tire rubber.\n • Plastic mulch: crops grow through slits or holes in thin plastic sheeting. This method is predominant in large-scale vegetable growing, with millions of acres cultivated under plastic mulch worldwide each year (disposal of plastic mulch is cited as an environmental problem).\n • Rock and gravel can also be used as a mulch. In cooler climates the heat retained by rocks may extend the growing season.\n\nOrganic Matter Ideal Mulch for Plants\n\nGarden compost or well rotted manure is an ideal mulch because it aids plant growth, improves the soil, and help retain moisture. Reapply it every year.\n\nHow to Mulch\n\nMulch between mid- and late spring, when the soil is moist and is warming up. Clear all perennial weeds, then after watering or a spell of steady rain, lay the mulch. Cover the whole surface area of beds and borders, rather than mulching around individual plants. You should only need to top it off once a year in spring. Lay organic mulches 4 in (10 cm) deep to control weeds and retain moisture, leaving a gap around the base of trees and shrubs so their stems don’t rot; you can mulch closer to herbaceous plants, but avoid the crowns of emerging plants. Lay inorganic mulches 1–2 in (2.5–5 cm) deep. Organic matter, such as well-rotted compost, makes an excellent mulch for herbaceous perennials. As the growing season progresses, it will gradually rot down and enrich the soil.", "pred_label": "__label__1", "pred_score_pos": 0.9568707942962646} {"content": "Biography   Research   Publications   Teaching   LEGO Tournament\n\n\n\nProfessor Mottley has published most of his work in the areas of ultrasonics, both medical and materials characterization. His work in medical ultrasound was mostly in the area of ultrasonic characterization of muscle tissues, both cardiac and voluntary. His efforts were aimed at increasing the amount of information extracted from the ultrasound scattered by tissues as they did their work, in order to improve diagnosis and treatment of diseases and disorders.\n\nMore recently his interests have turned toward acoustics and music performance technology. We are still trying to understand the properties and features of acoustic halls, what makes the sound in one hall superior while another is flat or featureless. We would like to apply physical measurements along with qualitative assessments and evaluations to better characterize performance spaces. In the area of performance technology, Professor Mottley would like to better understand and characterize the feedback and interactions between a player and their instrument. For example, organs made with different action mechanisms \"feel\" different to the player. For a student to become a well-rounded organist requires the student to travel to many places and play many organs of many types. We can sample sounds from different organs and give someone an approximate sound experience of playing a remote organ, but we would like to make a programmable keyboard that would actually FEEL like that of the actual organ.\n\nGo to Top ››", "pred_label": "__label__1", "pred_score_pos": 0.9172590374946594} {"content": "Despite all of the optimism and excitement that surrounded Apple’s rumored foray into the automotive business, I was never convinced that Apple would ever release its own branded car. Even though Apple successfully managed to enter and eventually dominate completely new product categories — first with the iPod and later with the iPhone — making a legitimate splash in the auto industry presented Apple with a long list of arguably insurmountable challenges. About a year ago, the New York Times reported that Apple was changing the focus of its car research team and that dozens of employees were either being let go or assigned to other divisions within Apple.\n\nSince then, Apple CEO Tim Cook has indicated that Apple’s foray into the automotive space now focuses on developing self-driving car technology, an initiative which Cook categorized as the “mother of all AI projects.” Even so, some more optimistic Apple observers maintained that an Apple branded car might still be something Apple could explore later on down the line. Alas, a recent exodus of automotive talent from Apple suggests quite the opposite.\n\nAccording to report from Bloomberg, upwards of 17 Apple engineers with experience across all areas of the automotive design and manufacturing process have left to join Zoox, a good number of which reportedly came to Apple via established automakers in Detroit.\n\nThe latest exodus to Zoox suggests Apple is less likely to revive ambitions to make a car itself. The engineers found themselves increasingly sidelined and surplus to requirements at Apple, and were hired by the startup in piecemeal fashion in recent months, the people said.\n\nApple is still actively interested in the car space as it pertains to developing an AI driving system, but the notion of an Apple branded car ever rolling off a production line remains nothing more than a pipe-dream at this point.", "pred_label": "__label__1", "pred_score_pos": 0.8566769957542419} {"content": "boho outfits with zaful brown bag\n\nIf you're hunting for a casual style, try combining a gray dress with your favorite accessories. Finish with a pair of black over the knee boots.", "pred_label": "__label__1", "pred_score_pos": 0.999966561794281} {"content": "An FBI agent is held prisoner in a perfect town surrounded by a not-so-perfect electrified fence.\n\nBy Marc Snetiker\nMay 15, 2015 at 05:25 PM EDT\nLiane Hentscher/Fox\n • TV Show\n\nWelcome to Wayward Pines! It’s a town that also may be a prison! It’s an enclosed government training facility or maybe like a witness protection program or insane asylum sort of thing. It’s a spy breeding camp or human-harvesting test kitchen or sociological experiment that pumps taxpayer capital into answering the question, “What would Carla Gugino do!?”\n\nIt’s also your newest creepy-thriller obsession, following in the vein of those lofty, question-raising, theory-provoking forest mysteries like Lost or Twin Peaks or Last Man Standing. Will Wayward Pines prove to be a hotbed of philosophical epiphanies, or will it just be about Matt Dillon trying to come to terms with Melissa Leo’s collection of white Keds?\n\nAs your trusted recapper for this 10-week event series, I’ll try to guide us through the goings-on of the show and the little things you might miss along the way. If this all works out like that other show I recap, we’ll crack some ace theories and maybe even come close to explaining things before the show does. (If you’ve read the book series by Blake Crouch on which the Fox show is based, take your spoilery knowledge far away!)\n\n\nWe begin, much like Lost, with a well-dressed man waking up amid a jungle of shrubbery. He’s bloody. He’s wearing a suit. His injures are random and poorly spaced like a child’s WordArt. He’s Ethan Burke, and he’s a secret service agent who’s in Idaho investigating the disappearance of two former agents who have gone AWOL near the Boise field office: One is Agent Kate Hewson, Ethan’s former partner and literally part-time lover, and the other is Agent Bill Evans, who is not Kate and thus much less important for Ethan to find.\n\nBefore he wakes up in this forest, a car crash involving Ethan and his partner, Agent Stallings, is the last thing he vaguely remembers—memory being a very tricky thing with Ethan, as we’ll come to find out. But Stallings is now missing and Ethan is alone, stumbling through the strange thicket like pilgrims on a corn hunt. He arrives on the main street (which for simplicity let’s call Main Street), where he enters the nearest coffee shop. A relatively normal-looking barista tells him he’s in Wayward Pines, Idaho. He faints.\n\n\nSo before we get into what Ethan Burke goes through next, let’s quickly chat about his former life.\n\nThe family: He’s got a wife, Theresa, and a kid, Ben, both of whom seem perfectly normal in their lives back in Seattle, although it seems to me that Theresa definitely knows something was going on between Ethan and Kate. Some women can just tell when their husband is waywarding another lady’s pines.\n\nThe therapist: He’s got a therapist, whom Ethan was seeing about a certain recent tragedy in his life. Something called “the Easter bombings,” where 621 people died and Ethan, for one reason or another, blames himself. The therapist insists that the blame rests on “whoever signed those release papers,” suggesting some criminal Ethan put behind bars but whose freedom was given not by Ethan’s hand. We also learn that Ethan occasionally has a history of hallucinations.\n\nThe boss: Ethan’s boss at the secret service, Adam Hassler, is the one who sent Ethan to Idaho on the missing persons search in the first place. He’s the one who delivers the bad news to Theresa about the crash, adding the fun caveat that there was no trace of Ethan ever even being in the car in the first place, effectively declaring him missing and leaving it at that. But Adam’s moral compass is tricky; after promising Theresa that he’ll find Ethan, he goes off to a secret meeting with Dr. Jenkins—the resident doc in Wayward Pines—where he pleads, “If there’s time, I want to call it off,” thus basically confirming that Adam is a part of some deep conspiracy shit and is directly responsible for Ethan’s presence in this idyllic wasteland anyway. So, why would Adam want to get rid of Ethan? Does it have anything to do with the Easter bombings? (THEORY: Wayward Pines is a place the FBI sends agents who have suffered psychological damage that puts them beyond retrieval, or agents who have better jawlines than their superiors.)\n\nWhich brings us to…\n\n\nAfter collapsing in the coffee shop, Ethan wakes up in a hospital bed and meets Nurse Pam (Melissa Leo). With her stark white clothes and a Stepford smile that’s so sweet it’s diabetic, Pam is a menacing if saccharine face. She’s also quite literally the most Ratched nurse in Wayward Pines. (This is a literature joke.)\n\nNurse Pam tends to Ethan’s wounds but ignores his pleas for the basics: a phone, a wallet, a sight of another human in the otherwise deserted hospital. She’s sugary sweet, but Ethan doesn’t buy it. He gets dressed and heads toward the elevator, but he’s blocked by her foot. “I’m worried about you,” she says with umbrage, but she allows him to leave. (THEORY: Wayward Pines is a town-wide medical experiment where the brunt of scientific observation is done in the streets and the hospital is merely a relic of irrelevance à la Val Kilmer.)\n\n\nAnd so Ethan wanders back over to Main Street. The sheriff’s office is closed, so instead he turns to a bar, where he meets Beverly Brown (Juliette Lewis). Beverly is a friendly bartender who offers him a cheeseburger (which he orders “bloody with onions” because he’s insane), and she seems to be the only person Ethan can sustain a normal conversation with. He tells her that he’s in town looking for Kate and Bill, and her expression instantly changes. She scribbles down her home address and tells him to pay her a visit, but on the back of the paper, she’s also left a note: “There are no crickets in Wayward Pines.”\n\nAnd lo, outside the bar, Ethan hears crickets chirping, so he investigates and discovers a sound effects speaker box in the bushes. (THEORY: Wayward Pines is Disneyland. Or, more probable, an insect-less utopia where only the best species are hand-picked to co-exist under the happiest of living conditions. So, Disneyland.) Thanks to Beverly’s candid advice, we now know that she is an ally, and she’s the Pines-ian to truly confirm Ethan’s suspicions that he should be having suspicions.\n\nThe next morning, after an encounter with an overly hostile hotelier, Ethan heads to the address Beverly gave him. Despite her claim that it’s her house, it’s actually a decrypt, dangerously run-down old shack that’s starkly different from the rest of the town’s picture-perfect manses. Comparatively speaking, it’s the Boo Radley of houses.\n\nInside, he finds a dead body tied up on the bed, and despite the fact that the puffy corpse looks like it’s been burnt, stung, boiled, drowned, and overall just generally Quasimodo’d, Ethan inexplicably recognizes the body as one of the two missing agents, Bill Evans. Man, that’s some good identification. Ethan should be in the FBI.\n\n\nHaving found one of the two missing persons he was searching for, Ethan pays a visit to the sheriff (an ice cream-loving Terrence Howard, who should have been eating a cookie instead, he​yo!). Sheriff Pope seems slightly more concerned about Ethan’s discovery of the corpse than the actual corpse itself, but to say he expresses any concern whatsoever would be lying. Sheriff Pope is concerned only with his ice cream, and when he leaves to ‘investigate’ the corpse, he does not pretend to care about helping Ethan get his phone and wallet back.\n\nEthan makes two calls from the phone at the sheriff’s station: the first, to Theresa, who doesn’t answer yet whose voicemail greeting still plays (an important thing to note); and the second, to the secret service, where a woman named Marcy (who sounds suspiciously like Nurse Pam) insists that Adam Hassler is out of the office. Ethan leaves a message with this strange new receptionist, deciding that that’s a better choice than asking to speak to absolutely any of the other co-workers he knows. Or perhaps Ethan doesn’t actually know anyone else at his office? Perhaps he’s an FBI black sheep and that’s why Adam sent him to the Pines? (THEORY: Wayward Pines is a place for fired office workers whose only crime is being unpopular.)\n\nWith no luck at the police station, Ethan goes to the bar again in search of Beverly, but when he gets there, a guy tells Ethan that there aren’t any women who work there. (THEORY: Wayward Pines is the Marvel Cinematic Universe.) The random guy then accuses Ethan of drinking too much, which spurs Ethan to attack him. With a quick move, the guy knocks Ethan out, and as Ethan hits the floor, the man speaks into a walkie-talkie: “10-16-28 is not doing well.” Oh dear God, numbers. But are they the numbers!? I don’t think I can go through that again.\n\nNEXT: Technically he’s like 50 percent done with his mission, right?\n\n\nWhen Ethan wakes up at the hospital again—handcuffed this time—he’s tended to by Dr. Jenkins, a pudgy little nugget who looks perfectly harmless, except for the whole “you’re having hallucinations, so we’re going to give you a lobotomy against your will” thing. Derek Shepherd, this is not.\n\nEthan starts freaking out, giving his best Claire Danes-meets-Jack Nicholson, so Nurse Pam injects him with a sedative with all the bedside manner of a velociraptor. She rolls his gurney out into the hallway and leaves him there with a prime view of the operating room.\n\nAnd suddenly, he’s being wheeled off! It’s Beverly to the rescue! Wearing a soaking wet hoodie, Bev has snuck in from the rain to wheel Ethan’s gurney to safety. But since the hospital maze is tricky, Nurse Pam is quickly coming after them. In a super sneaky secret service agent type of way, Ethan uses Beverly’s trail of water to confuse Nurse Pam before smashing her face into a pane of glass. (Possibly important reiteration: Nurse Pam saw Beverly’s water trail, proving that Bev is real and not just a hallucination, because science.)\n\nAfter escaping the hospital, Beverly and Ethan take refuge at Boo Radley’s house, where Ethan demands answers.\n\nBev explains that Agent Evans tried to escape, and that’s why he’s dead. She says that she herself came to Wayward Pines in 1999 and was hit by a motorcycle. Like Ethan, she awoke in the hospital and was told she had a head injury and memory loss. She says it’s now a year later, and Ethan’s shocked because she thinks it’s the year 2000. “It’s 2014,” he moans, but he finally fades off to sleep because of the late-acting sedative and also because of the oppressive weight of life’s harsh truths.\n\n\nThe next morning, Beverly has left Ethan a bag of clothes, so he goes where anyone with new digs would go: to flaunt them at a local park. (He’s seemingly unconcerned about running into the nurse he just face-planted into glass the night before.)\n\nSuddenly, like the deusest of ex machinas, he sees Kate (Carla Gugino)! The missing person he was looking for just happens to be wearing a sundress and schmoozing at a picnic. Kate is so popular and conveniently located! She looks just like the agent he remembers—the tender partner he confided in about the Easter bombings, the pretty face he kissed despite her not-quite-convincing resistance. And for Kate, Ethan looks the same, too, because the second she sees him, she’s frozen like a bad laptop. But never losing her million-watt smile, Kate quickly impels her husband Harold to leave, claiming, “We’re going to miss our program.” (THEORY: Wayward Pines is a purgatory where TV terminology from the 1960s waits until it’s “in” again.)\n\nEthan tails Kate back to her house—a little too closely, I might add—and she’s barely inside before Ethan knocks on the door. Her husband Harold answers. He’s a little too smile-y for my tastes, but that’s not important right now. He beckons Kate, and she appears. Upon seeing Ethan, she blanches and steps outside with him.\n\nNever losing her cool, here’s what Kate reveals:\n\n1. They’re being watched and listened to. Not only is Wayward Pines full of tiny speakers that emit fake insect noises and smooth whale sounds, but the town is also riddled with cameras and microphones. (THEORY: Wayward Pines is The Truman Show or, more likely, the re-used set of Fox’s short-lived Utopia.) This begs the question: WHO is watching? Is it Sheriff Pope, or is he simply the lowest rung on a ladder of bureaucratic oversight that supervises whatever the hell Wayward Pines is? Is it a governmental “they” who’s watching, or a privatized “they”? Is the cloud somehow involved?\n\n2. She’s lived here 12 years; Ethan thinks they were together just five weeks ago. The timeline is an interesting thing here, because it suggests that there’s a supernatural element at play. He thinks it’s 2014. Beverly thinks it’s 2000. Does Kate think she came to Wayward Pines in 1988, or is she settling on a 2012 sort of thing? A quick look at her happy-sad eyes suggests that she remembers 12 years ago in Wayward and five weeks ago with Ethan. So, the timeline seems fun.\n\n3. Ethan asks, “Is it happening again? Am I having a relapse?” We already know that Ethan has a history of hallucinations, but is that what he’s referring? Could he be an alcoholic, which explains why he got so angry when the random bar guy accused him of drinking? Assuming he’s talking about relapsing into a hallucinatory state, Kate shakes her head no, confirming that Ethan is living the real trippy deal right now.\n\nAnd that’s about all we get from Kate, who straddles the line between wanting to help Ethan and not wanting to put herself or her husband at risk. Before she leaves, she tells him, “You could be happy here,” but her smile is too wide to be telling the truth.\n\n\nFrustrated as all hell, Ethan decides to make a run for it. He breaks into some lady’s car and drives it out of town, but moments after he reaches the Wayward Pines city limit…he comes across a “Welcome to Wayward Pines” sign and suddenly he’s back on Main Street. Let’s try this again. Reversing, Ethan drives the opposite direction and yet again finds himself in a loop back in Wayward Pines, except this time he passed a creepy carousel, which is probably not worth mentioning except that I want to.\n\nIt’s during this déjà vu driving moment that we see a flash of Adam Hassler and Dr. Jenkins meeting—presumably in rainy Seattle. Adam wants to “call it off” but Jenkins says, “It’s done. It’s all been taken care of.” Again, WTF!? But then again, if we knew TF, we wouldn’t be watching the next nine episodes.\n\nAnd so, back in Wayward, Ethan ditches the car and stumbles back out through the woods, where he reaches the crème de la crème of creepy: a giant electric fence that encloses all of the town’s acreage with copious warning signs that say, with no lost meaning, “Risk of death. Return to Wayward Pines. Beyond this point you will die.” (THEORY: Wayward Pines is Jurassic Park except with Juliette Lewis instead of dinosaurs.) But serious question: Are these fences supposed to keep people in, or keep something else out?\n\nEthan climbs back out of the woods and gets back in the car, where Sheriff Pope is waiting for him. “How do I get out of here!?” he begs, and Pope, between bites of a non-existent rum raisin cone, says, “You don’t.” End of episode.\n\n\nSo, that’s where we are now. One half of Ethan’s missing persons case is long since dead in an abandoned house, and the other is living in a pristine colonial with a husband, friends, and 12 years of memories. There’s a lady who claims that you can’t escape the town, and a sheriff who basically confirms it. And there’s an FBI agent who knows the town doctor, and they both seem to be responsible for Ethan ending up in Wayward Pines in the first place.\n\nLet’s begin this week’s Theory Corner on a clean slate: What is your gut reaction to what Wayward Pines actually is? Is it a prison? An asylum? A science experiment? Do people end up there because of their pasts, or because of what they can offer the town in the future? Is residence in Wayward Pines a punishment…or is it a gift?\n\nLeave your comments below, or hit me up on Twitter with your craziest theories!\n\nEpisode Recaps\n\n • TV Show\n • 1\n • 05/14/15\n • In Season\nComplete Coverage", "pred_label": "__label__1", "pred_score_pos": 0.5820447206497192} {"content": "← Back\n\n\n\nRequiem for a Glacier is an artwork which consisted of an installation and sound performance. The main aim of the piece was to memorialize the Jumbo Glacier Area which is under threat from global warming and touristic development. The project consisted of a site-specific musical performance, an exhibition which featured audio and video captured from the performance and a multimedia indoor sound performance.  \n\nThe performance itself consisted of a four-movement oratorio scored for an orchestra and choir based on temperature records. The lyrics included Latin translation of the BC government’s press release which approved the touristic development at the glacier. The orchestra was made of local 50 volunteer musicians and was accompanied by more than 30 guides, drivers and activists.  \n\nThe inaugural exhibition of the project took place at the Langham Cultural Centre, Kaslo, British Columbia and was then presented in Ontario and Quebec. \n\nThe artist clarifies that their work aims at exploring the interconnections between landscape, identity and technology. This is achieved through the amplification of cultural gestures. The practice, as exemplified by this project, aims at revealing the place of cultural gestures within nature and to capture natural events through cultural practices. This specific artwork aims to communicate how landscape, as a part of the Canadian cultural heritage, is threatened by human actions.  \n\nThe requiem performed by an orchestra and chorus can be understood as a sign of western culture. The element then is activated to mourn both western culture and nature as represented by the glacier. involving activists and volunteers in the performance amplifies the message. Through the exhibition and documentation of the project, this message is continued beyond the site-specific performance. \n\nProject Title: Requiem for a Glacier\nArtist: Paul Walde and volunteers\nYear: 2013(performance; exhibitions till 2016)\nPlace: Farnham GlacierKootenay Land District, BC (Exhibition took place in various locations)\n\nscroll to top", "pred_label": "__label__1", "pred_score_pos": 0.9992159605026245} {"content": "Accompanying the strength of the ITP bolting inventory is a large and comprehensive selection of Nuts. ITP inventories close to every diameter from #4 to 2.5″ in multiple materials and finishes. Nuts are graded with strength ratings compatible with their respective bolts. The most common shape is hexagonal. Other specialized shapes exist for certain needs, such as wing nuts for finger adjustment and captive nuts for inaccessible areas. If we don’t have it in stock, we can have it to your door step respectfully in 1-2 business days.\n\nClick on a section heading below to access additional product information.\n\n3 Prong T-Nut\n\n4 Prong T-Nut\n\nAcorn Cap Nut\n\nCastle Nut\n\nFlange Nut\n\nForged Wingnut\n\nHex Finished Nut\n\nHex Jam Nut\n\nKeps Locknut\n\nNylon Insert Locknut\n\nStamped Wing Nut\n\nITP P/NWeight C/1001/4 Keg QtySizeDescription\n50CNFH3.6018001/2-13Finished Hex Nuts, Plain\n62CNFH7.118005/8-11Finished Hex Nuts, Plain\n75CNFH11.805003/4-10Finished Hex Nuts, Plain\n87CNFH17.543007/8-9Finished Hex Nuts, Plain\n100CNFH26.401901-8Finished Hex Nuts, Plain\n112CNFH39.801401 1/8-7Finished Hex Nuts, Plain\n125CNFH51.701001 1/4-7Finished Hex Nuts, Plain\n150CNFH88.10551 1/2-6Finished Hex Nuts, Plain \n50CNFHG3.6018001/2-13Finished Hex Nuts, H.D.G. \n62CNFHG7.118005/8-11Finished Hex Nuts, H.D.G. \n75CNFHG11.805003/4-10Finished Hex Nuts, H.D.G. \n87CNFHG17.543007/8-9Finished Hex Nuts, H.D.G. \n100CNFHG26.401901-8Finished Hex Nuts, H.D.G. \n112CNFHG39.801401 1/8-7Finished Hex Nuts, H.D.G. \n125CNFHG51.701001 1/4-7Finished Hex Nuts, H.D.G. \n150CNFHG88.10551 1/2-6Finished Hex Nuts, H.D.G. \n50CNFHZ3.6018001/2-13Finished Hex Nuts, Zinc \n62CNFHZ7.118005/8-11Finished Hex Nuts, Zinc \n75CNFHZ11.805003/4-10Finished Hex Nuts, Zinc \n87CNFHZ17.543007/8-9Finished Hex Nuts, Zinc \n100CNFHZ26.401901-8Finished Hex Nuts, Zinc \n112CNFHZ39.801401 1/8-7Finished Hex Nuts, Zinc \n125CNFHZ51.701001 1/4-7Finished Hex Nuts, Zinc \n150CNFHZ88.10551 1/2-6Finished Hex Nuts, Zinc", "pred_label": "__label__1", "pred_score_pos": 0.5706921219825745} {"content": "Entrepreneurship, of entrepreneurship and what it means to\n\nEntrepreneurship, as a commonly accepted concept, is\nsomething that has been widely known about for generations, after first being\nintroduced by Richard Cantillon in 1730. However, when we start to analyse the\nconcept in more detail, we find there are many different definitions of\nentrepreneurship and what it means to be an entrepreneur. During this essay, we\nwill review the differences in the Economic schools of thought centred around\nentrepreneurship and also how entrepreneurship has contributed to economic\ndevelopment. In addition, by looking at influential figures, we’ll discuss\nwhether innovation is central to entrepreneurship and review how they fit into\ndifferent schools of thought.\n\n\nIt is widely thought that the term entrepreneur was first\nintroduced and used by Jean-Baptiste Say in 1803, however in his book Essai sur la Nature du Commerce en Général\n(‘Essay on the Nature of Trade in General’) in 1755, Richard Cantillon was\nthe first person to introduce this term.\n\nWe Will Write a Custom Essay Specifically\nFor You For Only $13.90/page!\n\norder now\n\nWithin the text, Cantillon writes that there is a clear\nsplit within society of those who are fixed-income earners working for others\non some form of salary and those who are not. The latter, called entrepreneurs\nwere said to “bear the risk of fixed\ncosts of production and uncertain selling prices” (Rothbard, 2006, p. 351) implying that unlike\nthose who work for others, entrepreneurs are greater financial risk takers and\nare likely to be owners of, or investors in, businesses. In addition,\ncontrasting to later theories of entrepreneurship, which will be discussed\nlater, Cantillon suggested that entrepreneurs brought equilibrium by being able\nto correctly predict different consumer preferences.\n\n\nThis suggests that to have entrepreneurship one must be\nwilling to take a financial risk in order to gain profit. There are many\nexamples of this, with investment being seen as a risk to take with a start-up\ncompany.  For example, in its first\nconception, in 2004, Peter Thiel invested over $500,000 into Facebook. This was\nseen as a huge financial risk due to the relatively new industry that Facebook\nwas entering. In 2012, he sold the remaining 20 million, out of 44 million\nshares, cashing out just over $1 billion (Cowley, 2012).\n\n\nJean Baptiste Say, a French school of thought economist,\nbuilt upon the work of Cantillon.  He\ndescribed entrepreneurship in the following way. “The entrepreneur shifts economic resources out of an area of lower\nproductivity and into an area of higher productivity and greater yield” (Extra, 2009). He argues that\nmerely creating a better supply does not guarantee an increased demand level –\nespecially if you bring things to the market that no one values.\n\nSay looked at different characteristics of an entrepreneur,\nand most notably wrote that administration and resource coordination were key\nskills for entrepreneurs and that they use sound judgement to “buy materials, collect labourers and find\nconsumers” (Robert F. Hébert, 1888, p. 38). The French school\nof thought suggests that management and resource acquisition take priority over\n\nWith its factor of production management and coordination,\nAmazon is the front-runner in the e-commerce industry and shows how Say’s\ntheory of entrepreneurship works in practice. With an intense management\nstructure and high productivity with regards to its allocation of goods and\nservice, Amazon is the fourth most valuable public company in the world (Encyclopedia, 2017). This suggests that\nusing resources efficiently and intelligently is central to entrepreneurial\n\n\nJoseph Alois Schumpeter (1934), classed as the\nGerman-Austrian school of thought, went against existing views surrounding\nentrepreneurship as being a risk-bearer and a manager of a company – instead\nchoosing to describe an entrepreneur as someone who tried to destroy\ncommonality within a market, by introducing a game-changing product or service\nto an industry – characterised by Radical Innovation. Schumpeter derived this\nidea from Marxist thought suggesting that it was the innovative entry by\nentrepreneurs that caused and sustained economic growth, acting as a disruptive\nforce, even if that meant extinguishing the value of already established firms.\nThe suggested idea of radical innovation in a market causes cycles of “creative destruction” (Schumpeter,\n1994, p. 83),\nwithin his earlier theory branded an entrepreneur as an innovator who is able\nto “act with confidence beyond the range\nof familiar beacons” (Schumpeter, 1994, p. 132). In short, this\nsuggests that entrepreneurs are way-makers who drive the economy forward, they\npush passed familiarity. In order to go beyond the status quo, one may suggest\nthat innovation is an essential driver of economic growth.\n\n\nThis form of innovation can benefit the original status quo,\nfor example when steam-powered ships were first introduced to the market,\nsailing ships developed more in the next 50 years than they had in the previous\n300 years. This concept could also be categorised as non-acceptance and\nemphasises that many markets fight back trying to stop radical innovation from\ndestroying normality. However, the market will eventually adapt, causing the\nnew improvements in the market to take over.\n\n\nOne example of a piece of radical innovation was the Apple\niPod in 2001. It was a product that changed the face of the portable music\nindustry allowing millions of consumers access to the ever-growing music scene\n(with over 420 million sales between 2006 and 2014 alone (Statista, 2014)). Steve Jobs was hailed as being one of\nthe greatest modern-day entrepreneurs, with his ruthlessness and immense\nclarity about what he sought to achieve.\n\n\nIsrael Kirzner (1973) offered a slightly different view of\ninnovation in entrepreneurship – suggesting that an entrepreneur is someone who\ndiscovers previously unnoticed profit opportunities, rather than someone who\npurely innovates. They stay within the market until the level of competition\nexperienced reduces the profit opportunity. This idea contrasts with other\nEconomist’s views suggesting that it is the ability to see a gap in the market\nand execute a vision in order to maximise profit. In addition, he also stated\nthat alertness was fundamental to entrepreneurship, allowing an individual to\nreact to market changes quickly. Within the market, however, there is\nasymmetric information, therefore, the level of knowledge an individual has\nwill dictate the “detection and\nexploitation of opportunities” (Lechner, 2016).\n\n\nAmazon can also be described as entrepreneurship through\ninnovation as, without the idea for an e-commerce site, Amazon would not have\nbeen created. However, without the production management and coordination, it\nwould not have been as successful. Therefore, innovation was the initial\nentrepreneurial step, but, resource management has ensured its long-term\n\n\nOne of the greatest entrepreneurs of the 21st Century is\nElon Musk – founder of SpaceX and Tesla, Inc. Tesla, Inc has a large vision of\nchanging the whole automobile industry with the introduction of electric cars,\na radical worldwide change. Elon started with a small start-up company and\nrecognised that in order to change the way that people drive, there needed to\nbe incremental innovation steps – which he highlighted during the Model 3\nunveiling conference in 2016.\n\n\nElon, during a TED talk interview, stated that he believed\nthat “when introducing a new technology\nthere needs to be three major versions before it can become a mass market\nproduct” (Talks, 2013).\nFirstly, to introduce the world to the electric car, Tesla produced a high cost\nlow volume car, in their second stage two midrange and mid volume cars were\nbrought to market, these incremental steps were designed to slowly introduce a\nnew element to the industry – a luxury electric car, as well as raising funds\nand capital for their final step. The final stage is to introduce a low-cost\nhigh-volume car, the Tesla Model 3. What this shows is that one of the main\nconcepts that are fundamental to entrepreneurship is a vision, not only a\nvision but a plan to carry out that vision (Tesla, 2016).\n\nWhilst innovation, whether radical or incremental, is part\nof this vision and helps to build substance, it is the awareness to understand\nthe market or industry and see the opportunities that present themselves that\nare fundamental to entrepreneurship. Of course, what Tesla is creating is\ninnovative, what is more impressive is how they are bringing it to market.\nAnyone can have or be given a good idea; however, it takes a clinical\nimplementation of a structured plan to bring those ideas to market.\n\n\nMany Economic theories highlight that entrepreneurship has\nmany different traits and characteristics, one central idea is innovation, can\nbe split into two forms: radical and incremental.\n\nIn his introduction to the book Capitalism, Socialism and\nDemocracy by Joseph Schumpeter Richard Swedberg, a Swedish Sociologist states\nthat Schumpeter “argued that economic\nlife always starts with the actions of a forceful individual and leads to the\nrest of the economy” (Schumpeter, 1994, p. xi), suggesting that\nthere is a knock-on effect to the rest of the economy due to Radical\nInnovation. Interestingly, there are other Economists who agree with\nSchumpeter’s idea; Cheah (1990), suggested that Radical Innovation can lead on\nto Incremental Innovation, the innovation discussed early by Kirzner. The\nabolishment of the status quo enables other, arguably lesser, Innovation to\noccur in incremental steps. Even though the new ventures threaten “continued viability of existing\nproducts/processes” (Paul Westhead, 2013), it stimulates the\nintroduction of new entrepreneurs of a range of new processes and developments\ncomplementary to the original endeavour.\n\n\nMark Casson, a British economist and academic, drew on\ndifferent theories regarding entrepreneurship, including those of Joseph\nSchumpeter’s theory of innovation and Israel Kirzner’s theory of\nopportunity-seeking, in order to develop a theory that fitted alongside\nneo-classical ideas. His theory is very similar to that of Richard Cantillon\nand states that entrepreneurship is the pursuit of risky innovative projects\nthat may contribute to the economy – efficiency and growth. How successful\nthese ventures are, will depend on drive of the entrepreneur and their\nperceived future rewards such as salaries or profits. Contrastingly to\nSchumpeter’s views, Casson sees entrepreneurs as risk bearers in the economy.\nThis mainstream School of Thought is one that is arguably most fits with the modern-day\ndefinition of an entrepreneur. The Oxford English dictionary describes\nentrepreneurship as the “The activity of\nprofit” (Dictionaries, 2017). Those entrepreneurs who are confident\nin the judgement being made will commit their own funds – or use the funds of\nanother – being optimistic of being rewarded.\n\n\nIf one only used the Oxford English’s Definition of an\nentrepreneur then one could argue that innovation is not necessary to be\nclassed as an entrepreneur as long as an individual is taking a financial risk,\nsuch as spending money to start up a business.\n\nHowever, taking into account the various schools of thought\nif an individual is only investing money in someone else’s innovative idea and\nnot contributing in any other way to the business they cannot be classed as a\ntrue entrepreneur, although they are taking a financial or opportunity risk –\nas they are foregoing the benefit of using their investment somewhere else.\n\n\nUsing Cantillon’s theory allows anyone who invests in a\ncompany to classed as an entrepreneur, whilst more recent theories place more\nemphasis on the role of innovation rather than purely financial risk. It is\npossible to take financial risk without being an entrepreneur however it is not\npossible to innovate without being classed as an entrepreneur.\n\nThe various schools of thought all suggest that an\nentrepreneur is someone who develops something new, different or deemed more\nvaluable than a competitor or is providing something that others deem superior.\nBoth of these suggestions are a form of Innovation thus it must be stated that\nInnovation is central to successful entrepreneurship.\n\n\nTo conclude, based on the analysis of different Economic\nTheories and by looking at the traits of successful entrepreneurs, it must be\nconcluded that Innovation is a central aspect of entrepreneurship, the two\nterms are links as it is the implementation of entrepreneurial behaviour that\nallows innovation to take place. Whilst, it is clear that one does not need to\ninnovate in order to be classed fit into the definition of an entrepreneur, it\nmust be noted that it doesn’t guarantee success. A key theme throughout the\ntheories looked at is Casson’s idea of “reward”;\ncombining this with Schumpeter and Kirzner’s ideas on Innovation it may be\nconcluded that successful innovation, whether it be incremental or radical,\nthat leads to reward is the key theme to entrepreneurship.", "pred_label": "__label__1", "pred_score_pos": 0.9905102849006653} {"content": "Sahli, H. F. 2006. Generalization in plant pollination systems and its effect on floral evolution within and among populations of wild radish (Raphanus raphanistrum). Ph.D. Dissertation, Michigan State University, East Lansing, Michigan, USA.\n\nCitable PDF link:\n\nWhile specialists are thought to be well adapted to their resources, generalists are thought to be a jack of-all-trades but master of none. However, few studies have examined how selection by multiple resources influences the evolution of morphnological traits in generalists. As most plants are dependent upon pollinators for reproduction, pollinators are important, and often essential, plant resources. I examined the degree of generalization in wild radish (Raphanus raphanistrum) nd how selection by multiple pollinators influences adaptation to each toxon individually, both within and among populations.\n\nAlthough previous studies of generalization in plant-pollination systems have focused primarily on estimates of species richness, pollinators exhibit great variation in visitation rates. I found that diversity indices, which take into account both species richness and evenness, provide a more useful estimate of pollinator generalization. I characterized generalization in the pollinator assemblage of the widespread agricultural weed, wild radish, and studied how pollinators differed in their selection on several floral traits. Although wild radish is effectively pollinated by at least 14 pollinator genera, few of these taxa actually selected on floral traits. My findings suggest that wild radish is able to adapt to a subset of its pollinators without trading off the ability to effectively use other taxa.\n\nFinally, I examined how selection and drift have contributed to differentiation of floral and phonological traits of wild radish by comparing estimates of population differentiation in quantitative traits (Qst) to population differentiation in allele frequencies (Fst). I found that differences in most floral traits among populations can be explained by drift alone. I also found that life history traits such as ovule number and flowering time were under strong divergent selection across populations, suggesting life history traits may have been important in colonization and adaptation to new habitats.\n\nOverall, my results indicate that wild radish has successfully evolved to use many pollinators to effect reproduction, that it can adapt to a subset of these pollinators without trading off the ability to use others effectively, and that its success as a generalist my be one reason for its successful invasion in many non-native environments.\n\nDownload citation to endnote bibtex\n\nSign in to download PDF back to index\nSign In", "pred_label": "__label__1", "pred_score_pos": 0.9876009225845337} {"content": "skip to Main Content\n\nReview of Flattering the Demos: Fiction and Democratic Education\n\nReview Of Flattering The Demos: Fiction And Democratic Education\n\nFlattering the Demos: Fiction and Democratic Education. Marlene K. Sokolon and Travis D. Smith, eds. Lanham, MD: Lexington Books.\n\n\nThat America’s institutions of higher education are in crisis is widely accepted. What should be blamed and what the remedy should be is widely debated. Marlene K. Sokolon and Travis D. Smith’s Flattering the Demos: Fiction and Democratic Education is a collection of essays from seven contributors and enters the crowded field of higher education discontent studies.\n\nWhat makes Flattering the Demos stand out then? Sokolon and Smith do not focus on what is to blame, but instead focus on remedies. Whether one blames the rising costs of higher education, burdensome student loans, or professionalization, Sokolon and Smith push back on calls, nay, demands, for increased STEM education as the corrective. Increased STEM education usually is accompanied by reduction or elimination of the humanities and “narrative storytelling” (1).\n\nAlthough they briefly note that the humanities are the most likely sources for developing the soft skills that employers need from their employees, Sokolon and Smith are not content to base their argument for humanities on the utility of employers. They argue that these so-called soft skills enhanced through narrative storytelling include skills that develop the individual’s capacity for self-governance. The shaping of thoughtful citizens for democratic governance is correctly understood as the function of higher education.\n\nBut if they had to assign blame, it would be the rise of and primacy of “rational argumentation” and “modern empirical science” over disciplines that study narratives (1). Storytelling offers an “alternative or complementary epistemological approach to the strict rationalism in understanding the human being within his or her socio-political context” (3). In one of the most economical presentations of the ancient quarrel between poetry and philosophy, Sokolon and Smith suggest that the preference for rationalistic inquiry over poetry might be due to overly zealous interpretations of Socrates’ banishment of the poets in Plato’s Republic.\n\nSokolon and Smith acknowledge the ancient quarrel between poetry and philosophy, but prefer to stress how thinkers, such as Lucretius and Montesquieu, have relied on the educative side of poetry. Many disciplines such as literature, theology, classics, and history among others still rely on the interpretation of narrative texts. Here Sokolon and Smith mention several of the benefits that flow from the close reading of narrative texts. Stories help us recognize reinforcing and challenging social conventions, explore the “tensions, conflicts, and paradoxes” of human life, and conduct thought experiments or test kitchens for ideas (3).\n\nDemocratic peoples because they participate in governance especially have need of the kind of moral and political education that stories offer. The promise of Flattering the Demos is to show that literature, or narrative storytelling generally, has insights into the merits and foibles of democratic peoples—insights that prepare students for thoughtful democratic governance. The essays that follow are demonstrations. Each essay illustrates how stories can instruct and teach democratic peoples. These essays may certainly be read individually. What holds the essays together is that each author offers a window to how the democratic peoples may be flattered, sometimes for good but more often for ill.\n\nMarlene K. Sokolon’s essay on Euripides’ Suppliant Women shows how political leaders aim to flatter and manipulate the populace. Sokolon’s essay is worth the price of the book. The argument is carefully drawn from the text. Sokolon rejects the conventional opinion that Euripides introduces a debate on the best regime for the sake of affirming democracy. Instead, she claims that Euripides uses the debates concerning what the best regime is as occasions to highlight the ways in which Theseus’s speech and practice do not align—thus, training his audience to weigh what democratic leaders say and do. Euripides educates his audience to recognize demagogues. By showing his audience how to evaluate Theseus’s words and deeds, Euripides puts his audience on guard against flatterers and would-be demagogues. My only wish is for more analyses of Euripides’ dramas by Sokolon. A glance at the contributor’s page confirms that Sokolon is working on a book on Euripides.\n\nDerval Ryan’s “Of Villains and Victims: Guilt and Bad Conscience in Richard III” builds on the dangers of sweet-talking political leaders and shows how Richard exploits guilt and bad conscience to his gain. Shakespeare anticipates Nietzsche when Richard says “conscious is but a word that cowards use/Devised at first to keep the strong in awe.” For example, Richard plays the victim to Lady Ann—a victim of her loveliness—as he contrives to seduce her. Bad conscience, however, is a rhetorical posture available to victims as well. Queen Margaret, for example, taps into bad conscience to stir the great to oppose Richard. Women may be political dispossessed, but are not without resources. They are empowered by their victimhood. The women’s curses remind the great of Richard’s crimes and so guilts them into opposing Richard. Ryan approvingly claims that Shakespeare recognizes that guilt and bad conscience become “the tools of the disempowered” to affect change on their behalf (42). Ryan’s essay nicely shows that Shakespeare understood how the posture of the victim offers rhetorical advantages, but ultimately that Richard was undermined by reality. He clearly was not a wronged person. Yet, Ryan notes that much of Richard’s success in the short-term is due to the inability of his stupefied interlocutors to counter his false claims.\n\nKimberly Hurd Hale’s “Only Human: Free Will and Choice in Isaac Asimov’s I, Robot” shows how easily we are flattered that we have control over our technological creations. Hale argues that Asimov’s I Robot chronicles the slow but sure decline of democratic politics as androids increasingly become more indispensable and less subject to human control. Asimov’s insight is that the loss of human control over the androids happens almost imperceptibly until it is too late for democratic means to reassert themselves. We humans are too easily flattered that the technology we create will always remain under our control. Hale’s literature review is immensely valuable in which she situates Asimov’s insights in I, Robot as relevant for debates concerning the ethics of the transhuman movement and the political status and rights of artificial intelligence. Algorithms and artificial intelligence aim to remove human flaws and weakness from making calculations for the sake of improving human life, but it also risks sacrificing our capacity for greatness, spiritedness, and democratic debate. Democratic debate is necessary to determine what technology should and should not pursued.\n\nTravis Smith’s essay “Comedy and Comic Books” is likely the cheeriest of the book and another worthy contribution to the sub-field of “superhero studies.” Comic books flatter, but largely for sake of uplifting us and inspiring us. We non-supers may not be superheroes but we can be inspired by the ethics of superheroes who voluntarily choose to serve others rather than their interests. In this way, superheroes are highly valuable in democratic societies for the sake of correcting the low standards of Hobbesian liberal democracy. For example, Hobbes emphasizes refraining from action rather that positively helping others. To link Smith’s essay to Hale’s, unlike the androids in Asimov’s work over whom humans have illusionary control, superheroes are free. Like us, they must choose to do good. What restrains superheroes is what restrains democratic citizens as well—their virtue. Perhaps the most scandalous (from the perspective of modern liberalism) is that superheroes own being superheroes and recognize their status as supers. Yet, superheroes are palatable because they treat people like equals and do not assume authority over the lives of non-supers. Smith’s chapter here should be read alongside his book Superhero Ethics as another contribution to the burgeoning field of superhero studies.\n\nBruce Peabody’s “Explaining the Paranoid Style in American Politics: System Disjuncture and Narratives of Fiction” uses Mr. Smith Goes to Washington (1939) and JFK (1991) as examples of paranoid narratives in film. Americans perceive a disjunction between the idealized politics that the Constitution should produce and the messy realities that Washington politics produces. The cognitive dissonance between the two sets of politics is resolved by appealing to conspiracy theories and other paranoid narratives. These paranoid narratives, which are self-justifying and difficult to falsify, explain even as they flatter the viewer about how elites have supplanted the Constitution for their interests. In Mr. Smith Goes to Washington, Jefferson Smith (James Stewart) is a political outsider who reveres the Declaration, but in Washington, he struggles as a senator to put his constituents first amid the corruption of party machine politics.  Likewise, JKF features Jim Garrison, an investigative journalist who aims to uncover the truth about the Kennedy assassination but is subverted by the nearly every major player in Washington from the FBI to the Secret Service to members of Kennedy’s administration. JFK present another facet to the paranoid narrative in which a utopian alternative political reality (represented by the promise of John F. Kennedy’s administration) is cruelly denied to the American people due to the machinations of Washington politics. As Peabody concludes, given contemporary politics, Americans are likely to turn even more toward paranoid narratives for false mollification.\n\nJames Beneda’s “A Band of Brothers Against Terrorism: The Citizen-Soldier Ideal in Post-9/11 US Military Mobilization” argues that the popularized image of military service as membership in a “band of brothers” is a boondoggle doctrine to encourage young people to accept the realities of war in the vain hope that they will “achieve the virtue of brotherhood” (128). Beneda traces the motif in American public writings to the founding and back to Shakespeare’s Henry V. In every case, the motive for invoking the romance of comradeship is to serve the interests of the state—increased or sustained military participation. Beneda focuses on the HBO miniseries Band of Brothers as primary promoter of band of brothers motif that formed the “heroic ideal” (112) post-9/11 and through the Iraq war. The better part of the chapter traces the development of the miniseries and other films of that era that celebrated military service. Band of Brothers idealized the service of WWII veterans and films like Black Hawk Down (2001) and We Were Soldiers (2002) idealized sacrifice of individual soldiers. Unlike the films, the miniseries had lasting cultural effects. Beneda notes an uptick in the number of times of the phrase “band of brothers” is invoked in newspapers, became the title of a Willie Nelson album, and eventually was applied to any close-knit group of people such as firefighters. Beneda calls for young people to read works like Tim O’Brien’s The Things They Carried and similar works as remedies.\n\nAlexandra Manoliu’s “Political TV Series, Or, a Case of Unflattering the Demos” applies cultivation theory (analyzing the long-term effects tv has on viewers) to political TV series and, while noting other political series, focuses on The West Wing (1999) and House of Cards (2013). While viewers know they watch fictionalized stories, they are nevertheless “‘drawn into’ a parallel political reality” (136). Their beliefs are shaped by what they see on TV. In 1999, Americans found political succor from the sordid politics of the Clinton scandal and impeachment in the squeaky earnest and morally righteous Josiah Bartlett presidency in The West Wing. Bartlett’s administration was populated by morally sound, competent public servants. But times have changed. Manoliu argues that political series have turned towards unflattering narratives of democracy. These series promise to show viewers what happens behind closed doors and it is not pretty. In House of Cards, Frank Underwood narrates his ruthless deeds. In addition to cultivating cynicism and disillusionment with politicians and journalists, House of Cards depicts the people unfit for self-rule. Manoliu highlights how streaming has changed how political stories are crafted. The West Wing’s seasons contained some overarching plot points, but each episode stood alone. Viewers had to tune in week after week. Nowadays, Netflix releases full seasons at once. House of Card’s seasons are tighter, more intricate, and each episode flows seamlessly into the next. Binge-watching, Manoliu suggests, concentrates and reinforces the dose of political corruption and deceit to which the viewer is exposed.\n\nSteven Orr’s “The Problem with a Pitiful Rump: On Impropriety and Political Philosophy” is the only chapter not to feature a writer, film, or tv show. Instead, Orr argues that while mid-20th century political thinkers such as Leo Strauss, Peter Laslett, and Isaiah Berlin fretted about the decline of political philosophy, its fundamental questions and activity were carried on in literature. Orr targets Strauss especially for approbation for his assertion that the treatise is the best form for political philosophy. Since Strauss and others fixated on proper form in which political philosophy ought to show itself, they believed political philosophy was near its death. Like the much-quoted Mark Twain quip that reports of his death are exaggerated, the same applies to political philosophy. Relying on Ronald Beiner, Orr argues that the task of political philosophy is ‘to confront human beings with a range of the most intellectually ambitious accounts of the standard by which to judge what makes a human life consummately human’ (155). The exploration of ways of living does not require the form of the treatise. By this measure, Orr argues that literature has taken up these questions in our present time. Moreover, literature and literary forms have long been a part of political philosophy. Orr cites Plato who wrote in dialogues and engaged with Homer’s epics among other poetic works as sources of political thought. Orr details adeptly the mid-20th century debates concerning the fate of political philosophy but curiously tucks away in a footnote what sort of literature and films might count as political philosophy.\n\n\nAlso see Sean Steel’s review and an excerpt of the book.\n\nElizabeth Amato\n\n\nBack To Top", "pred_label": "__label__1", "pred_score_pos": 0.8614482879638672} {"content": "I am finding myself in a difficult situation. I took a new job in June with a start date in middle August. I am from a EU country and I should relocate in UK for my new activity. Due to a health issue problem of my parents I had to move the start date to middle September, but now the problem has recurred and I am uncomfortably close to the start date. I don't think they will grant me another start date delay and, giving the circumstances, I don't think I will be able to join at the concorded day. How can I explain the situation without looking fickle?\n\n • Only partly related: Did you make sure that as a EU but non-UK citizen, you are still able to work/stay at your new job after of Brexit? Otherwise, relocating for only a few months might not be worth it (given that the date doesn't get pushed back forever). – Dirk Sep 3 at 9:12\n • @Dirk in theory yes, with a lot more of bureaucracy and paperworks. Practically, nobody knows for certain, since there is still no deal and no final decision on immigration measures. – Userno1234 Sep 3 at 9:56\n\nIf it's concerning health you could simply say \"That the previous health problem relapsed and you need more time\". Which probably has 2 results: Either the company comply and extend or in urgent need and don't want to wait anymore.\n\nAlternatively, you could pay another person to take care of your parent if it's not serious health issue such as stroke which resulting in half paralyze. You could pay for a nurse to help take care while you're working. My parent also does this for taking care of my grandparent since they need to work and unable to take care while they're working.\n\n\nIf they need that post to start, then you could well loose the post and it won't be their fault.\n\nYou have pushed the start date which they accepted, if you ask again, they do not have to accept and you are, or could be, in breach of contract which could be sufficient grounds for termination.\n\n • Well, I never said it was their fault. They've been quite understanding until now. I took a decision back in June basing on certain circumstances, that changed dramatically after a few weeks. – Userno1234 Sep 3 at 10:32\n • @Userno1234 When I mentioned fault, it was not the past but the future... – Solar Mike Sep 3 at 10:44\n\nYour Answer\n\n", "pred_label": "__label__1", "pred_score_pos": 0.81891268491745} {"content": "\n\n\nTownsend's Building, Rousham Park, Oxfordshire\n\n\nThe RIBA is committed to promoting and supporting architects in delivering better buildings and places, stronger communities and a sustainable environment.\n\n\nMore than one in five buildings in the UK pre-date 1919 and the competence of qualified practitioners in the diverse field of conservation practice is essential. Our historic environment is one of the UK’s most valuable assets and it is passed on, cherished and valued from generation to generation.\n\nRIBA believes that architects have a primary role in identifying the potential challenges of historic buildings, areas and places, including managing change in a sustainable manner. Architects find design solutions including the repair, maintenance, adaptation and re-use of historic buildings and places that sustains and promotes their cultural significance.\n\nAs well as accredited qualified architects on the RIBA Conservation Register, we also provide leadership and support for members and practices through our Conservation Group (CG). The CG seeks to represent the diverse and exciting work being undertaken by the heritage sector, with its key focus on building conservation. It works closely with the RIBA Conservation Register Steering Group to ensure the Conservation Register assessment criteria are fair, relevant, and maintain a high level of professional competence among conservation architects.\n\nFurther reading\n\nRIBA Books publishes books on architectural heritage and conservation.\n\nNeed help?\n\nFor more information, contact the RIBA Client Services team.\n\nkeyboard_arrow_up To top", "pred_label": "__label__1", "pred_score_pos": 0.9998019337654114} {"content": "Southeast Asia is at the forefront of a global energy-market transformation that is outpacing even the most ambitious predictions. In the last few days, a report from analyst Wood Mackenzie stated that the ASEAN nations will need to double their energy capacity in the next 20 years, at a cost of more than US$500 billion.\n\nEmbed from Getty Images\n\nGreenhouses in Yang Fang village in Anlong, Guizhou province, China, have solar panels on their roofs.\n\nWoodMac also concluded that half of the new capacity within the Association of Southeast Asian Nations bloc will come from renewables, a very different profile to what energy markets were assuming only a few short years ago.\n\nThe WoodMac forecast for this region is unexpected, and highlights that ASEAN states have the opportunity to learn from both the successes and failures of other parts of the world that are further down the energy-transition path, and at the same time leverage the enormous cost deflation achieved in renewables in the past two years.\n\nIn Europe, the rise of cheap renewable energy has combined with falling electricity demand thanks to the impact of energy efficiency to pull down wholesale electricity prices to unprecedented lows, causing financial pain for utilities that have delayed their transition from fossil fuels to renewables.\n\nOver the 2010-2016 period, European utilities have made US$150 billion in asset write-downs. Investors from Goldman Sachs and UBS have been warning for years that coal has reached retirement age and that solar will become the “default technology of the future”.\n\nSimilar trends have been apparent now for some time in China and more recently in India, where drives to install both thermal and renewable capacity concurrently have seen utilization rates for coal-fired power stations drop to 47% in China and 56% in India in 2016. This is despite electricity demand growing in these countries.\n\nWhile some utilities such as Italy’s Enel and the United States’ NextEra are world leaders in positioning themselves for electricity systems dominated by renewables, there are many examples of utilities suffering significant shareholder-value destruction as a result of resisting the inevitable or belatedly making their transition.\n\nOnce Germany’s biggest utility, E.On’s belated response was to spin off its struggling coal, gas and hydro generation assets into a separate company. Germany’s RWE has been affected in the same way. By failing to refocus their businesses toward renewables sooner, these major players have suffered significant continuing reductions in shareholder value compared with Enel, which made its strategic move earlier.\n\nIn Australia, where thermal power is being progressively replaced by a growing base of renewable-energy plants, AGL appears to be another utility leader. Even despite continuing policy uncertainty, into 2017, Australia is seeing an A$11 billion (US$8.6 billion) wave of investments in renewable-energy infrastructure projects.\n\nIn accepting a future dominated by a succession of closures of end-of-life coal-fired power plants and one in which expensive domestic gas is no longer an option as a transition fuel, AGL is working to ensure the closure of its last coal-fired power stations ahead of target.\n\nIn fast-developing countries like India, increasing electricity demand means the large coal-fired generation fleet cannot be quickly abandoned. However, the global energy transition backed by the biggest financial players has not gone unnoticed by state utility NTPC, which is becoming a key linchpin of the Indian government’s emerging leadership in renewable energy. This transformation is economically logical given that, as of 2017, solar is cheaper than existing coal-fired power generation.\n\nA key economic imperative is that renewables are deflationary. The equation is simple. Technology gains and economies of scale have seen renewable generation consistently outbid fossil fuel-based generation in an ever-wider number of markets from Brazil and Mexico, to Dubai and South Africa.\n\nWhile countries including Indonesia, Vietnam and Myanmar currently face the offer of relatively cheap international export credit agency (ECA) finance for thermal power, this is in effect a manufacturing and engineering capacity fire-sale, with China, Japan and South Korea seizing a final opportunity to offload old technology produced by domestic manufacturers even as it becomes completely obsolete.\n\nBut around the world, the biggest financial institutions such as the Norwegian Sovereign Wealth Fund, the Bank of England, BlackRock, Deutsche Bank, CalSTARS, JPMorgan Chase, Macquarie Group and Swiss Re, plus AXA and SCOR of France, have all come out in support of a renewable transition and/or changed investment policies to avoid stranded asset risk and expand low emissions investment capacity.\n\nNotably, BlackRock, the world’s largest asset manager, stated this year that “coal is dead”.\n\nPut simply, electricity utilities need to accelerate their path toward renewable energy to avoid the financial risks and shareholder-value erosion incurred by being a late mover.\n\nThis is the clear global lesson, and it’s one that should be heeded by the fast-growing economies of Southeast Asia, because the decisions they make now will have repercussions for decades to come, delaying the inevitable transition to a more sustainable, lower-cost energy system, and missing out on strong investment flows and job creation in industries of the future.", "pred_label": "__label__1", "pred_score_pos": 0.9580196142196655} {"content": "Explorations in the New Economic Geography\n\nDetta är en avhandling från Department of Economics, Lund University, P. O. Box 7082, S-220 07 Lund, Sweden\n\nSammanfattning: The point of departure of this thesis is the rapidly growing research field known as the New Economic Geography (NEG). It consists of four chapters, one introductory chapter and three self-contained theoretical studies. The chapters may be summarised as follows. The first chapter gives a brief account of the NEG. It explains the soaring interest in the location of economic activity, and it reviews two important strands of models in the literature. Some of the models’ weaknesses are pointed out, and the thesis’ aim and main results are presented. In the second chapter we examine under what circumstances a region in the technological lead may lose its front position due to agglomeration externalities. Firms agglomerate in one region due to increasing returns, transportation costs and input-output linkages among firms. This essay illustrates that the risk of locking in to an old technology is increasing in the benefits of agglomeration. In the de-industrialised region factor prices are lower and a new technology may be profitable to adopt in that region instead, inducing a change in the technological leadership. In the third chapter we challenge two features common to almost every NEG model: the absence of strategic interaction among firms and the catastrophic nature of agglomeration. We employ a homogeneous-good Cournot oligopoly model and analyse a two-stage location-quantity game with many firms and two regions. There are no linkages in the model; firms’ spatial competition for market shares drives all results. In a benchmark case with regions of equal size, we show that the firms will never agglomerate in the same location if transportation is costly between the regions. However, the set of location equilibria changes if a difference in market size is introduced. For high levels of trade costs firms locate in different regions. Lowering the trade costs beyond a critical level triggers a one-firm relocation to the larger region. The nature of agglomeration is gradual and trade costs have to be successively lowered for a full-scale agglomeration to take place. Finally, we also find that the market generates excess agglomeration, and that introducing imperfect consumer arbitrage affects the symmetry-breaking level of trade costs. In the fourth essay we analyse the political determination of transportation costs in an analytically solvable core-periphery model. In a benchmark case with certainty about where agglomeration will take place, we find that a majority of voters prefer low transport costs and the resulting equilibrium is an industrialised core and a de-industrialised periphery. Allowing for uncertainty we show that a high transport cost candidate, that guarantees the initial symmetric equilibrium, may defeat the concentrated equilibrium candidate. The reason is that the immobile factor of production does not know whether industry will end up in its home region when it votes, introducing a bias for status quo. This is so even if reform is efficiency-enhancing for society as a whole and needs no financing.\n", "pred_label": "__label__1", "pred_score_pos": 0.9188722968101501} {"content": "British Columbia\n\nOff-peak sailing discounts coming for major BC Ferries routes\n\nBC Ferries plans to remove reservation fees for certain sailings, in an effort to encourage people to choose to travel during off-peak times.\n\nThe planned changes will affect passengers who make reservations\n\nBC Ferries plans to remove reservation fees for sailings during off-peak times on its major routes between Vancouver Island and the mainland. (Robb Douglas/CBC)\n\nA ride on BC Ferries routes between the mainland and Vancouver Island on a long weekend or other busy time will often include multiple sailing waits and long lines. The ferry system is beyond capacity during those times, and it can drive up passenger frustration.\n\nIn an effort to reduce that pressure on the ferry system, BC Ferries is planning to remove reservation fees for certain sailings.\n\nAccording to spokesperson Deborah Marshall, the hope is people will choose to travel when there's plenty of space on the ships.\n\n\"What we're looking at is offering discounts at off-peak times and the idea behind that would be to shift some of the discretionary traffic,\" said Marshall.\n\nMarshall said the changes will only come to the three major routes between the mainland and Vancouver Island: Tsawwassen to Swartz Bay; Horsehoe Bay to Nanaimo; and Tsawwassen to Nanaimo,\n\nShe said walk-on passengers and people who arrive without reservations won't notice any difference — only people making off-peak reservations.\n\nAccording to Marshall, the specific details will be revealed in the coming months, and BC Ferries is aiming to roll out the changes in the fall.\n\n\n", "pred_label": "__label__1", "pred_score_pos": 0.9905465245246887} {"content": "The Chess Variant Pages\nCustom Search\n\nPartnership Chaturanga\n\n\nPartnership Chaturanga is simply a contemporary variation of the old 4-player Chaturanga played with four-sided long dice, in India about 1000 years ago.\n\nFour players form two 2-player partnerships. Four different color chess sets (Black & White, and any two other colors) are required to play the game and two 6-side dice.\n\nThe Black and White armies form one partnership, the other two colors (i.e. Red & Green) form the other partnership.\n\nAlternately, if two different color chess sets are not available, a different size chess set can be used for the 2nd army. The White & Black pieces of the 2nd different size chess are used by the 2nd partnership.\n\n\n\nThe setup (diagram above left) is the same as for 4-player Chaturanga, except for the use of the modern Bishops on the corner squares to represent the old Boats.\n\nAlternately, the four pieces behind the pawns can be placed in a random order. The arrangements must be symmetric for all players (sample random diagram above right). There are 24 possible random positions.\n\nIt doesn't matter whether you have a light or dark square on your left corner square. It's irrelevant with what color squares in your corner you start the game.\n\n\nKings, Rooks, and Knights move as in orthodox chess. Pawns, also move and capture as in orthodox chess, but have no initial double move.\n\nBishops move like the old Boats, or an Alfil: leaping two squares diagonally. Boats are color bound pieces.\n\nIn the initial layout, enemy Bishops (or Boats) can not face each other in battle for they start off in oposite color squares from one army to the next (unless they are promoted to the opposite squares later on in the game).\n\n\nThere are no 'en passant', castling, check or checkmate rules in this game.\n\nThe objective is to capture both opponents' kings to win the game.\n\nOnce a parternship has bare Kings (one or two) the opponents have 20 rolls to finish the game and capture the bare Kings (or King). Otherwise the game will be a partnership draw.\n\n\nTwo 6-side dice are used to determine which pieces can be moved.\n\nEach player in their turn rolls the dice, and get to play two pieces (or the same piece twice) based on the numbers showing on the roll. Then play moves on clockwise to the next player.\n\nDepending on the roll a player may only be allowed to play one piece, or none at all (an all sixes roll is forced pass).\n\nPlayers are allowed to pass:\n- At will (if they do not want to play one or either of their rolls)\n- If one of the rolls would yield an illegal move\n- If the roll calls for a piece the player doesn't own anymore\n- By the forced pass roll (an all sixes roll)\n\nRoll Values:\n1 = King or Pawn move\n2 = Bishop (as Boat/Alfil) move\n3 = Knight move\n4 = Rook Move\n5 = King or Pawn move\n6 = A pass (the player can't play this roll)\n\nThree Dice Variant\n\nThree dice may be used instead of two to give players an extra option to choose from for what to play. After rolling, players are required to discard the one dice of his/her choice, and play the numbers shown by the other two dice.\n\n\nPawns promote immediately to: King, Rook, Knight or Boat. The player promotes to his/her choice of a piece of his own army that has already been captured. If no pieces are available for the promotion, the pawn is inmobilized until the next piece of the same color becomes available. While the pawn is inmobilized at the promotion square, it is vulnerable to an opponent attack and can be captured.\n\nPromoting to a captured King is only allowed once per player. A King that has been captured twice can not return to the game.\n\n= = = =\n\nA player can continue to move his/her pieces after his own king is captured (this is a partnership game). He/she can continue to attack the enemy armies, or protect his/her partner's King.\n\nIt's possible for a player's entire army to be annihilated, which would put him out of the game (without needing to roll anymore). In this case his/her partner continues to play against the forces of the other partnership. The players in the opposite partnership now roll in their turn back to back against the lonely opponent.\n\nIt is possible to capture one's partners pieces when it strategically makes sense. Capturing your partner's King or your own pieces is illegal.\n\nSince there is no check or checkmate, it is possible to put one's own King (or any other piece) en prise.\n\nA common tactic to take a chance and put a piece on a threatened square (en prise), with the hope that the next roll will not allow an opponent to capture the piece.\n\nUnlike orthodox chess, the King is not a passive piece. Kings are often taking part of the attack, especially when his/her partners King is still on the board.\n\nThis is a very fast aggressive game which promotes team work.\n\n\nWhen I first saw the rules for the 4-player Chaturanga, I felt that the game a bit too complex, especially if I wanted to try the game with my children (ages 5 and 7) and my wife (not chess inclined).\n\nWith my simple changes to the rules of the former game, the addition of commonly known 6-side dice, and the luck rolls; the game became a very easy, balanced, quick and interesting game to play with my small family.\n\nThe luck of the dice took my chess strategic advantage away, and made the game fun for my wife an young daugther (she rolled a double two in the first game and got my King with her Boat the first time around!) to play.\n\nThe game has been great for my older son to develop his tactical eye, as the dice take away the need for him to worry which piece to move, and instead he concentrates on how to maximize the damage he can cause with the roll he gets.\n\nChess Variants by the Author:\n\nOther Pages by the Author:\n\n\nBy Jose Carrillo.\nWeb page created: 2009-06-28. Web page last updated: 2009-06-28", "pred_label": "__label__1", "pred_score_pos": 0.9733336567878723} {"content": "\n\nProviding evidence to improve practice\n\nAction: Relocate birds following oil spills Bird Conservation\n\nKey messages\n\nRead our guidance on Key messages before continuing\n\nA replicated study in South Africa found that a higher percentage of African penguins Spheniscus demersus that were relocated following an oil spill bred at their old colonies, compared to birds which were rehabilitated after being oiled, despite fewer relocated birds being seen at their home colony.\n\n\nSupporting evidence from individual studies\n\n\nA replicated trial following the Treasure oil spill in 2000 between Robben and Dassen Islands, Western Cape, South Africa (Wolfaardt & Nel 2003), found that 62% of 1,130 African penguins Spheniscus demersus that were moved 800 km east and released were recorded on Dassen Island, two years after the event, with 41% breeding. This compared with a higher number of rehabilitated (oiled, cleaned and released) birds being seen (75% of 2,744), but fewer breeding (17%). Relocated birds began arriving at Dassen Island 11 days after being released, with most arriving 18 days or so after relocation. In total, 19,500 birds were relocated. This study is also discussed in ‘Clean birds following oil spills’.\n\n\nReferenced papers\n\nPlease cite as:\n", "pred_label": "__label__1", "pred_score_pos": 0.9610195755958557} {"content": "Guerrilla games emerged onto the stage to announce a completely new series, Horizon: Zero Dawn.\n\nThe beginning of the trailer had cave drawings that made me think Native American, but as the trailer continued on, it became clear that it wasn’t. I looks to be more of an “after modern society has fallen” game. However, this modern society was built by The Old Ones. We aren’t told anything more about the Old Ones, other than that they built massive, glittering cities, let them fall and get overtaken by nature, and humanity reemerged to what it is now: a bit more primitive, tribe cultured, hunters and gatherers.\n\nNew life has emerged in this wasteland, but not what you’d think. They resemble, robotic dinosaurs, if I had to give you something to equate them to. The main character, a young, red-headed girl whose name isn’t given, states that she is part of the first tribe to migrate to that area and begin hunting them. That is where the game play footage starts.\n\nGuerrilla did not lie, it’s a whole new thing happening, with some elements of other games, such as hiding in tall weeds like in Assassins Creed, but it looks promising. This is one to keep an eye out for, and see what they actually do with it beyond these early stages.\n\n\nJoin the Conversation\n\nNotify of", "pred_label": "__label__1", "pred_score_pos": 0.8125754594802856} {"content": "Postdoc Jobs\nPT Hourly POOL - Psychologist\nInstitution: Golden West College\nLocation: California, United States\nCategory: Faculty - Liberal Arts - Psychology\nPosted: 10/12/2018\nApplication Due: 00/00/0000\nType: Fulltime\n\n\n\nUnder the administrative leadership of the Director of Student Health Center, the psychologist is responsible for facilitating the physical and emotional well-being of students, thereby improving retention and academic success. \n\n\n 1. Assess students in mental health crisis. Provide effective and rapid intervention with students in mental health crisis and act as a consultant to instructional faculty and staff when confronted with such crises. Provide resources on campus related to crisis intervention.\n\n 2. Provide short-term, brief counseling services to students and assist students in problem resolution, including: crisis intervention, assessment, planning and implementation of his/her immediate and long term clinical goals.\n\n 3. Serve as a college resource on issues of mental health and as a referral resource to the local mental health community.\n\n 4. Assist the Director of the Student Health Center with planning student health programs to respond to identified needs; implement new need-based programs and monitor existing programs for effectiveness, applicability, and safety through ongoing quality improvement and program review activities.\n\n 5. Provide referrals to students for college and community support services to resolve psychosocial stressors; refer students to appropriate internal and/or external healthcare providers as necessary. Educate students and staff regarding effective coping skills to minimize emotional stress.\n\n 6. Assist the physician and nurses with students' mental health needs as applicable; follow professional protocols for licensed psychologists as stipulated by the Board of Psychology.\n\n 7. Ensure confidentiality is maintained as stated by law; and maintain complete, official, confidential mental health records for the Student Health Center as required by District policy and administrative procedures and submit them in accordance with established policies and procedures.\n\n 8. Follow and ensure department regulations concerning the proper use, care, and security of college equipment and District property are met in accordance with established policy and procedures; advise administration of unsafe conditions or potential hazards and recommend solutions.\n\n\nQualifications and Physical Demands\n\n\nKnowledge of:\n\n 1. Standard of practice for clinical records according to the Board of Psychology.\n\n 2. Clinical therapy methods with individuals and groups, preferably in a community college setting.\n\n 3. Correct English composition, grammar, spelling and vocabulary.\n\n 4. Crisis intervention and demonstrated appropriate and effective crisis intervention skills and techniques.\n\n 5. Current guiding principles in psychological services in community college settings.\n\n 6. Current health issues, including, but not limited to, nutrition, stress management, reproductive health, mental health, substance abuse and recovery, and communicable diseases.\n\n 7. Drug and alcohol addiction/use and eating disorders.\n\n 8. Interpersonal skills including tact, patience and diplomacy.\n\n 9. Legal and ethical standards of licensed psychologists.\n\n 10. Local, state and federal laws and regulations related to student mental health counseling in community colleges.\n\n 11. Mental health promotion and advocacy techniques.\n\n 12. Operation of a computer, peripherals and software programs, including word processing.\n\n 13. Oral and written communication skills.\n\n 14. Principles and practices of mental health counseling, training and supervision.\n\n 15. Public relations and public speaking techniques.\n\n 16. Report writing techniques.\n\n 17. Research methods in psychological counseling.\n\n 18. Strategies and methods to enhance mental health of students.\n\n 19. Technical aspects of field of specialty.\n\n 20. Sensitivity to the challenges of the disabled and an understanding of the diverse academic, socioeconomic, cultural, and ethnic backgrounds of community college students.\n\n Ability to:\n\n 1. Analyze problems, identify alternative solutions, project consequences of proposed actions and implement recommendations.\n\n 2. Analyze situations accurately and adopt an effective course of action.\n\n 3. Assess the psychological needs of students and develop an appropriate plan of intervention.\n\n 4. Attend/participate in professional conferences, seminars, or meetings.\n\n 5. Collect, compile, analyze data and prepare reports.\n\n 6. Communicate clearly and concisely, orally, in writing and through electronic medium.\n\n 7. Communicate effectively with a diverse population within and outside of the District.\n\n 8. Develop professional skills and up-to-date subject matter knowledge.\n\n 9. Develop, implement and evaluate the delivery of mental healthcare services to students.\n\n 10. Encourage professional excellence among the staff and promote an organizational culture of customer service, innovation, and quality services. Foster a culture of collaboration, mutual respect, innovation and continuous improvement throughout the District.\n\n 11. Establish and maintain cooperative working relationships with those with whom they are in contact in the course of work.\n\n 12. Follow professional protocols for licensed mental health professionals as stipulated by the appropriate professional organization.\n\n 13. Maintain current knowledge of mental healthcare practices; membership and contributions to professional organizations and/or community service.\n\n 14. Maintain records and the security of confidential information and materials.\n\n 15. Operate a computer, office equipment, peripherals and applications software, including database management, spreadsheet, word processing and software related to the area of assignment.\n\n 16. Participate in institutional research activities and grants as needed.\n\n 17. Prepare and present oral and written reports and recommendations.\n\n 18. Provide appropriate emergency response and crisis care intervention to students; administer treatment as needed.\n\n 19. Read, interpret, apply and explain complex state and federal laws and other rules, regulations, policies and procedures related to assigned program.\n\n 20. Understand technical and medical terminology.\n\n 21. Understand and work within the scope of practice.\n\n 22. Work cooperatively with administrators, faculty, staff and the community including physicians, psychiatrists and available referral sources to achieve common goals including student recruitment and retention.\n\n 23. Work effectively and collaboratively in a multi-college environment, as well as within a system of community college districts.\n\n 24. Work effectively with high-risk, under-prepared and special needs students.\n\nEducation and Experience:\n\n 1. Doctorate in Psychology from an American Psychological Association (APA) accredited university.\n\n 2. At least two (2) years of current clinical therapy experience. \n\n 3. Current California Licensure in Psychology.\n\n\n 1. Previous employment experience working with students in a college setting, including successful experience supporting students of diverse academic, ethnic, socioeconomic, and cultural backgrounds, as well as students with disabilities.\n\n\nConditions of Employment\n\n\n\n\n\n\n\n\nAppropriate placement based on the PP Salary Schedule.\n\n\nAdditional Information\n\n\n\n\n 1. A complete Coast Community College District Online Employment Application.\n\n\n 3. A cover letter (uploaded as a separate attachment - PDF recommended).\n\n 4. Answers to all supplemental questions (please provide clear and detailed responses as they will be carefully evaluated to determine the most qualified candidate(s) to be invited for an interview; please do not paste your resume, or put \"see resume\" or \"N/A\").\n\n\n\nApplications must be received no later than the posted closing date, when applicable. There are NO EXCEPTIONS. Electronic applications may be completed by visiting Once you have completed an electronic application, you may apply to open positions within the Coast Community College District by submitting the application and all other required materials. Required materials differ for each open position and must be complete when submitted for a specific posting. Instructions for completing applications and applying to posted positions are available online or by calling Applicant Processing at (714) 438-4714 or (714) 438-4716.\n\n\n\n\n\nDisability Accommodations:\n\n\n\n\n • Applicants who meet the required qualifications and who are also deemed to possess the highest degree of desirable qualifications will be invited to discuss their qualifications in an interview with the College/District. Therefore, when applicable, it is highly recommended that applicants submit clear, detailed responses to all supplemental questions in order to demonstrate his/her qualifications as related to the position.\n\n\n\n\n\n\n\n\n\nCoast Community College District is an Equal Opportunity Employer\n\n\nApplication Information\nOnline App. Form:", "pred_label": "__label__1", "pred_score_pos": 0.9950668811798096} {"content": "Institutt for sammenliknende politikk\n\n\n\nJon Kåre Skiple new research fellow at Department of Comparative Politics\n\n\nResearch fellow Jon Kåre Skiple.\nHilmar L. Mjelde\n\nSkiple began his four year PhD studies at the Department of Comparative Politics October 1st. Skiple’s PhD dissertation addresses the internationalization of Norwegian law, through the EEA-agreement and the European convention on human rights, and asks how this internationalization affects the Supreme Court’s influence on the Norwegian society. A main question for the project is to what degree this internationalization generates new cleavages within the Supreme Court and the degree to which theories of judicial behavior can contribute to our understanding of court cleavages. \n\n\nSkiple completed his master’s degree in comparative politics in 2012. His master’s thesis examined how justices’ political preferences influenced their voting in economic rights cases in the Supreme Court. After his degree, Skiple has mainly been working on a project on judicial behavior on the Norwegian Supreme Court. Here Skiple has contributed to the development of an extensive database on decisions and justices on the Norwegian Supreme Court. He has also conducted a range of statistical analysis of voting in civilian cases in the Norwegian Supreme Court. He has co-authored an article on the legitimacy of the Supreme Court’s landmark decisions on asylum children, together with Frøy Gudbrandsen and Gunnar Grendstad.\n\n\nIn addition to his interest in justices and courts, Skiple is interested in research methodology generally and statistical methods in particular. He is currently organizing the seminar on statistical methods for the master students.", "pred_label": "__label__1", "pred_score_pos": 0.9163579940795898} {"content": "\n\n\n\nFive unusual rainbows and how they are formed\n\nVideo Loading\n\nHow did it occur?\n\n\n\n\nIt is a circumzenithal arc that appears when the sunlight refracts through ice crystals in cirrus clouds\n\nGrahame Madge, a spokesman for the Met Office, said: \"I suspect that residents may have seen a circumzenithal arc, a feature caused by sunlight refracting through ice crystals in cirrus clouds.\n\n\"Cirrus are a high-altitude cloud, composed of ice crystals. These arcs are quite frequent but are often obscured by other lower altitude cloud.\n\n\"The conditions across South Wales yesterday evening would have given skywatchers a good chance of seeing them.\"\n\nWhat is a circumzenithal arc?\n\nSometimes known as a Bravias' arc, they are formed when sunlight refracts through horizontal ice crystals at such an angle that the light enters the crystal through its flat top face and exits though a side prism face.\n\n\nThe height, depth and position of the ice clouds must be right as the cloud needs to be at a specific angle to the sun.\n\nThe position of the observer is also important since its visibility can vary greatly over short distances.", "pred_label": "__label__1", "pred_score_pos": 0.8835414052009583} {"content": "Helpful agents are standing by: (888) 847-9158\nPress play below to listen to our audio commercial:\n\nAll about Health insurance trends and what will benefit you\n\nHealthInsuranceHealth insurance is part of our market trends. When talking to several people about what things are the most important to them, you will immediately notice that health comes first. It is totally fair to say you want to be healthy, but how much can you control uncertain events and those unexpected situations. Is it really something you can plan? Of course not and this is why you might want to consider health quotes.\n\nYou can somehow reduce risks of injuries and you can establish a budget but the reality is that you do not know what destiny will unfold. Each person is a combination of several factors, including genetics, habits and activities. The truth is we never had so many resources and health insurance at low prices. Plenty of studies are going on and on. In terms of diseases, Cancer, hypertension and diabetes are now part of our day to day. And our bodies are struggling to handle the constant stress of our activities and environment.\n\nIt is no news that death and a random illness is a certainty. It can be frustrating to think this way but it is part of the natural process of life. What we can plan in our lives are ways to cope with crippling diseases and long term. This is when an individual health insurance comes to play. Are you going to face the situation or leave it to chance? So, nobody knows when they may get ill, but odds are you will be getting sick at some point.\n\nAmong the most important aspect of health insurance, is the fact of preventing economic loss. Coupled with a crippling disease is the fact that you may end up facing a financial crisis. Thus, you should consider the best policy. This makes emphasis on the importance of thinking about disability insurance and so on. Beyond that, degenerative diseases require even more planning. It will take money to pay nurses or specialized care facilities.\n\nHelp your body with better habits, and also think about what protection you should have in the worst case. Prevention is always better than to be sorry later. Within the common doubts, a common one is linked to types of coverage. Truth is that we tend to believe that health insurance is a standardized product. This could not be further from the truth, especially since there is a lot going on. Every company offers different categories and health quotes. The worst nightmare for an insurance client is that during an illness or accident to realize that the condition is not covered and have to deal economically with their personal resources.\n\nRemember that medical insurance is the principle of preserving life first and second, to protect the finances of the user. When choosing, try to remember the following:\n\n–           Does it offer personalized customer service?\n\n–           Do not pay a deductible each time you use a service.\n\n–           Choose the specialist you need.\n\nYou should find the most reliable company. For this look for health insurance quotes and begin walking towards a healthy life. Enter your zip code and easily gain access to plenty of quotes from the top medical coverage companies.", "pred_label": "__label__1", "pred_score_pos": 0.8928576707839966} {"content": "Chiplun to Karad distance, location, road map and direction\n\nChiplun is located in India at the longitude of 73.52 and latitude of 17.53. Karad is located in India at the longitude of 74.2 and latitude of 17.28 .\n\nDistance between Chiplun and Karad\n\nThe total straight line distance between Chiplun and Karad is 77 KM (kilometers) and 800 meters. The miles based distance from Chiplun to Karad is 48.3 miles. This is a straight line distance and so most of the time the actual travel distance between Chiplun and Karad may be higher or vary due to curvature of the road .\n\nThe driving distance or the travel distance between Chiplun to Karad is 97 KM and 363 meters. The mile based, road distance between these two travel point is 60.5 miles.\n\nTime Difference between Chiplun and Karad\n\nThe sun rise time difference or the actual time difference between Chiplun and Karad is 0 hours , 2 minutes and 43 seconds. Note: Chiplun and Karad time calculation is based on UTC time of the particular city. It may vary from country standard time , local time etc.\n\nChiplun To Karad travel time\n\nChiplun is located around 77 KM away from Karad so if you travel at the consistent speed of 50 KM per hour you can reach Karad in 1 hours and 47 minutes. Your Karad travel time may vary due to your bus speed, train speed or depending upon the vehicle you use.\n\nChiplun to Karad Bus\n\nBus timings from Chiplun to Karad is around 1 hours and 47 minutes when your bus maintains an average speed of sixty kilometer per hour over the course of your journey. The estimated travel time from Chiplun to Karad by bus may vary or it will take more time than the above mentioned time due to the road condition and different travel route. Travel time has been calculated based on crow fly distance so there may not be any road or bus connectivity also.\n\nBus fare from Chiplun to Karad\n\nmay be around Rs.73.\n\nMidway point between Chiplun To Karad\n\nMid way point or halfway place is a center point between source and destination location. The mid way point between Chiplun and Karad is situated at the latitude of 17.404939369973 and the longitude of 73.859406088924. If you need refreshment you can stop around this midway place, after checking the safety,feasibility, etc.\n\nChiplun To Karad road map\n\nKarad is located nearly East side to Chiplun. The bearing degree from Chiplun To Karad is 111 ° degree. The given East direction from Chiplun is only approximate. The given google map shows the direction in which the blue color line indicates road connectivity to Karad . In the travel map towards Karad you may find en route hotels, tourist spots, picnic spots, petrol pumps and various religious places. The given google map is not comfortable to view all the places as per your expectation then to view street maps, local places see our detailed map here.\n\nChiplun To Karad driving direction\n\nThe following diriving direction guides you to reach Karad from Chiplun. Our straight line distance may vary from google distance.\n\nTravel Distance from Chiplun\n\nThe onward journey distance may vary from downward distance due to one way traffic road. This website gives the travel information and distance for all the cities in the globe. For example if you have any queries like what is the distance between Chiplun and Karad ? and How far is Chiplun from Karad?. Driving distance between Chiplun and Karad. Chiplun to Karad distance by road. Distance between Chiplun and Karad is 74 KM / 46.6 miles. distance between Chiplun and Karad by road. It will answer those queires aslo. Some popular travel routes and their links are given here :-\n\nTravelers and visitors are welcome to write more travel information about Chiplun and Karad.\n\nName : Email :", "pred_label": "__label__1", "pred_score_pos": 0.5484577417373657} {"content": "Full-Text Search:\n《Earthquake Resistant Engineering and Retrofitting》 2016-02\nAdd to Favorite Get Latest Update\n\nArrangement Study of Energy Dissipation Analysis of Metal Dampers in a Large Hospital Frame Structure\n\nZhou Tong-ling;Zhao Jie;Wang Gui-xuan;Research and Development Center of Civil Engineering Technology,Dalian University;  \nIn order to study the energy dissipation effect of metal dampers in the a large hospital frame structure,the nonlinear time history analysis is carried out by SAP2000 for the hospital structure with metal dampers and without metal dampers. Moreover,the structures with metal dampers in every other floors and every floors are respectively analyzed,the dissipation effect is compared. The results show that metal dampers have good dissipation capacity under 8 degree rare earthquake,and the top displacement and story drift of the structure obviously decrease,also the damping effect of every other floor is better than every floors. Then the change rule of acceleration response spectra with period is compared and analyzed. The acceleration response spectra changes greatly in the short period,and the acceleration of energy dissipation structure is smaller than primary structure's,but the change is smaller in the long period and basically tends to be consistent. The research results provide reference for energy dissipation design of similar project.\n【Fund】: 大连市科技计划项目(2014E13SF145)\n【CateGory Index】: TU352.1\nDownload(CAJ format) Download(PDF format)", "pred_label": "__label__1", "pred_score_pos": 0.6331967711448669} {"content": "35 Questions to Ask When Outsourcing Software (Local/Offshore)\n\n35 Questions to Ask When Outsourcing Software (Local/Offshore)\n\nWhat is a software outsourcing company [SOC]?\n\nSoftware development outsourcing is about hiring a team of developers (or just one developer) to take over the entire software project or its parts. Besides programming services may include consulting, training, testing, technical support or really anything related to software you need the partner to do for your company.\n\nBenefits of outsourcing include cost savings, access to the talent pool, time savings and more.\n\nThe outsourcing company can be local, offshore, nearshore or hybrid (combination of local and offshore). Check here to find out about differences between them as well as advantages and/or drawbacks of each model.\n\nThere are 3 main reasons for engaging in outsourcing:\n\n • Hire an outsourcing team to work on a specific project. In this case, the SOC has to provide all resources starting with Project Managers and ending with developers and QA/documentation.\n • Extend your current team with developers from the outsourcing team to work on a project or for a period of time. This is also called a Staff Augmentation model. With this model, the hiring company will be the one who is managing the work of developers, even if they are offsite.\n • Hire SOC to maintain existing applications. Some companies want to free their own people to work on more important business activities and outsource legacy software and support.\n\nDepending on the reason for hiring the questions you need to ask them before committing may vary. I will comment separately when any questions are unique to specific cases.\n\n1. What kinds of companies do you typically do work with?\n\nI’ll ask about the size of companies with whom they previously worked and the kinds of projects they did in the past. If I am a startup I need to know if they had experience working with startups.\n\n2. Does SOC have experience with projects similar to mine?\n\nWhen hiring I am hiring for expertise. And expertise does not mean only programming skills, I want developers to be knowledgeable in my domain or domain close to mine.\n\nIf I am developing an online ordering system, I want SOC with experience in payments and various requirements for accepting credit cards online like PCI compliance. And I need the developers that worked in my domain to be on my project because SOC may have hundreds of developers and not all of them are equal.\n\nFurthermore, I expect a detailed answer to the question. If the answer is not full enough, I’ll ask follow-up questions like, “how long did the project take?” or “did you have any challenges implementing specific technology?”. If the example project was short or was done by a single developer, and mine requires a team for an extended period the SOC may not be the right choice.\n\n3. Can you provide examples?\n\nLike with any developer it’s not always possible to show the work they’ve done for all clients because of NDAs. But if the company was in business long enough, they should have some samples publicly available. What I am looking here is for a breadth of types of projects completed by SOC. But keep in mind, this does not mean that the people who worked on those projects will also work on mine.\n\n4. Are you big enough to scale when need, but small enough to care about me?\n\nThere are a lot of outstanding developers in India. The problem is most of them work for big companies like Oracle.\n\nWhen our company was looking for SOC our leadership knew that for best outsourcing companies in India our company would be a small fish. This means that SOC will provide the best talent to their biggest and most important customers and we get second and third tier programmers.\n\nThat’s why our leadership decided to go with the SOC in Sri Lanka which had development team bigger than ours but not 20 times bigger. So when needed the SOC could quickly add more resources, and they tried to provide their best developers because we were their biggest customer.\n\n5. How much will it cost?\n\nI was told many times that I shouldn’t look for a cheaper option, but rather look for a good fit. I agree with this assertion up to a point. In fact, cost savings are the primary reason to consider SOC at all.\n\nAnd I don’t agree with the premise that I have to pay a premium for premium developers. Nobody can convince me that good programmer in Durham, NC is less capable than a good one in Silicon Valley, but the fact is that the latter will be more expensive.\n\nAnother example is hiring a home remodeling company. When I was planning to upgrade my kitchen, I immediately rejected the highest bidder and went with a more competitive option, both in quality and pay.\n\nAnyway, if I am hiring SOC individuals to augment my team I am looking for hourly rates. If it’s a project, then I am expecting quotes on the entire project or different phases: consultation, prototype, development, and maintenance.\n\n6. Which services are not covered under my contract?\n\nIf I am contracting for a project, I expect that main services like development, testing, and project management are covered. I may or may not care about documentation or deployment, but I need to know what I am paying for.\n\n7. What if I’m not satisfied with the quality of the product?\n\nIf I never outsourced before or I never worked with this particular SOC I want to make sure that I have an exit plan. If for whatever reason the partnership didn’t work out, I want to know the fees associated with canceling the contract.\n\n8. If your company makes a mistake how will that be dealt with?\n\nNobody is perfect, we all make mistakes, but at the same time, nobody wants to deliver bad news. The last thing I want is SOC to hide their mistakes. I expect transparency and honesty.\n\nIf there is a problem I prefer to be notified immediately and the issue to be fixed as soon as possible. I need to make sure that there is a mechanism in place. I will ask for an example of things gone wrong and how they handled it.\n\nAnd I want to know if I will be reimbursed in case if SOC is responsible for the error.\n\n9. What makes your company unique compared to others?\n\nEach SOC has a sales pitch they tell all customers so answer to this question cannot convince me to choose one SOC over another, but it gives me some idea if a SOC is a good fit for my company.\n\n10. How long have you been in this business?\n\nThey used to say that no one ever got fired for choosing IBM. I am very conservative when choosing a business partner because there is money and opportunity is involved. It’s always best to outsource to an established, financially stable provider. I want to make sure that SOC will not disappear in the middle of the project.\n\n11. Can I speak with some of your previous clients?\n\nIt’s good to know SOC’s client list. Who are their largest clients? How long their current client base has been working with SOC? What percentage of clients would refer to them?\n\nAs in any interview checking referrals is extremely important. I will contact former SOC clients and ask about the SOC’s strengths and problems. Specifically, I want to ask about areas that are critically important to the success of my company. I will definitely ask follow-up questions. In addition, I will check Facebook and Google reviews.\n\n12. What is the minimum duration of the contract?\n\nNaturally, SOCs prefer longer contracts as we all do. So the SOC may not agree to take a small project. If my project is too small, then my options may be limited to finding individual programmers instead of SOC.\n\n13. How do you estimate the project duration?\n\nThe cost of the project is a product of duration and hourly rates. Longer the project takes – more I spend. So, it is possible that if more expensive SOC can do work faster, than the overall cost could be lower than with cheaper SOC working longer hours. Furthermore, time to market may be more important than the cost.\n\n14. How many people will work on my account?\n\nThe number of people working on a project typically depends on the complexity of the project and less so on its duration. Nine women cannot deliver a baby in one month and similarly adding more people does not always speed up the work because some tasks cannot be parallelized.\n\n15. What does the application development process look like?\n\nI want to get a big picture of the process approach. Are you using Waterfall or Agile? If Agile, then is it Scrum or Kanban? Do you have CI/CD implemented for each project? Do you have staging, testing and production environments? Which performance indicators (if any) did they establish?\n\nHow do you ensure software quality? Do you use peer code reviews or pair programming? Do you develop applications using TDD (Test Driven Development) methodology? Do you have automated tests or do you test manually?\n\nIf I have an in-house developer, I want him to be engaged in this conversation.\n\n16. What technologies are you specialized in?\n\nI had an SOC reached out to me because they had a team of React developers was finishing their current project and they were looking for a next one. When I replied that I am only interested in .NET she said that they have a .NET team as well.\n\nMost programmers know more than one technology but they normally very good in one main stack and know some about others. So, if I am hiring .NET developers I want to make sure that .NET is the main expertise of the development team, not secondary skill.\n\n17. How do you find and hire developers?\n\nAfter TopTal’s success, I often hear individual SOCs claiming they hire only the top 3% developers. This claim allows them to charge higher rates. I want to know how they decide if a developer is in the top 3% and not say in the top 15%.\n\nPersonally, I don’t believe in interviews that Microsoft used to conduct – asking a candidate to solve a puzzle. I’ve seen very little correlation between the ability to solve puzzles and building software useful for customers. The good thing is that with developers past performance normally indicates future performance (unlike stocks).\n\n18. How often do you train your employees?\n\nBest companies invest in their employees. If SOC is not spending on training, then they cannot claim that their developers are in the top 3% level. Or maybe they are not investing in training because employees do not stay with the company long enough?\n\n19. Will I be able to interview developers?\n\nIf I am hiring SOC as an extension of my existing local team I want to be able to interview each developer and decide if he or she is a good fit for my company. The process is the same as if hiring local developers with additional requirements for communication skills. I will have a top developer in my local team to conduct technical interviews. And I will assess if they can fit well in our team.\n\n20. Where are developers located?\n\nEven if the company is technically located in the States the development team may be somewhere in Ukraine or Argentina. If I never worked with foreigners, I may need to weigh the pros and cons of working with offshore/remote developers.\n\nThis may be a viable solution if I am outsourcing the entire project especially if SOC provides a project manager on site or locally. This may not work if I want to add more resources for my team because existing local team members will have to work with remote developers.\n\nEven outsourcing maintenance requires frequent contacts between 2 teams which may not go well mainly because of intrateam communication issues.\n\n21. Are your developers fluent enough in English?\n\nIf my team is going to work with SOC developers directly I want to make sure that they speak English well. I want them to understand the local dialect as well.\n\n22. Do your developers offer new ideas?\n\nOne fear with outsourcing contractors is they normally just do what you ask for. We usually depend on our employees to drive innovation. Ideal SOC will be the one that works as a partner, educates when needed, helps to choose proper technologies, advise and offer new ideas.\n\n23. How do you try to deliver the product that will match our and market’s expectations?\n\nThis one is related to the question above. I want to know if the SOC will simply follow my directions or they will truly work on figuring out what we really need before starting working on implementation.\n\n24. Will I own the source code?\n\nI’ve heard a lot of horror stories about SOCs keeping the source code after finishing the project to themselves as a way to ensure getting maintenance gigs after project completion.\n\nIdeally, I want to have the source code stored in the cloud source control platform like GitHub. Git is a distributed system, so I can keep a copy of the entire code locally on my pc.\n\nThis way I know that even if developers delete the project in the cloud, I can always restore it to another cloud from the local copy.\n\nAn additional advantage of using a source control system is that I can see how much code is being produced on a daily basis. Seeing daily changes in the cloud gives me confidence that SOC is making progress.\n\n25. Will the same developers assigned at the beginning of the project be on the team till the end of it?\n\nSome SOCs practice bait and switch tactic when they first show their top developers to get the contract. Once the customer agrees they switch top developers with juniors and customer pays a higher rate for inferior resources.\n\nI want to make sure it doesn’t happen to me.\n\n26. What is the turnover rate at your company?\n\nI understand nobody works for the same company forever. But I am concerned with the possibility of losing a developer in the middle of the project and with the developer leaving important knowledge of the domain and the application gets lost as well.\n\nIf the turnover rate is higher than 10% it’s a red flag. I also want to make sure that the replacement was trained by the developer before he or she leaves.\n\n27. Will they be happy to maintain my existing code?\n\nOne of the reasons to look for outsourcing is having someone to maintain legacy code while my main team can focus on new priorities.\n\nWhen I was talking to one SOC and asked about resource retention she mentioned that if I give their developers exciting projects then developers will be happy to stay. I told her that projects I have are not exciting and she responded that may be the SOC is not a good fit and I may need to look for other options.\n\nThat’s actually was a good honest answer.\n\n28. How much time would you need to scale up the team?\n\nI want to make sure that when I needed 2-3, or even 20 developers the SOC can support me. While finding 20 developers is not easy, adding 2 more developers should not take more than a month. After all, the ability to scale up quickly was one of the primary reasons to consider SOC.\n\n29. How do you communicate during the project?\n\nIf I am only communicating with the Project Manager (PM) how often will I get updates? I want to have demos every week or two. I also want to make sure that PM available for phone calls.\n\nIf my dev team is working directly with SOC developers I want to have single instant communication channel like Slack in addition to emails. I want to know the hours when developers available.\n\nIdeally, I want at least 4 hours to overlap between my team and SOC. And if I am working with programmers directly, I want them to be able to access the Project Management/Sprint Planning tool my team is using.\n\n30. Is PM dedicated for my project?\n\nI should know if the PM (if there is one) shared between multiple projects or only working on mine. It is way more efficient when a person is committed to one project only.\n\nObviously, if the SOC team I am working with consists of 2 developers I can’t expect a dedicated PM, but if I am hiring a fairly big team then this is not an unreasonable expectation.\n\n31. What security procedure do you have in place to protect my data?\n\nSOC must have a list of security measures spelled out in the contract. Do they have a data recovery plan? What about a business continuity plan? Do they store data in the cloud or on-premise? What happens when an employee leaves the company? Is there a standard procedure to disable all accounts of the terminated employee?\n\n32. How do you see my role in the project?\n\nSOCs love engaged customers. When a customer is engaged the risk of project failure is less than with a less interested party. I understand this and I want to know what my obligations would be as a client.\n\nHow much time should I devote to working with PM/developers? Would I have to meet any deadlines? It’s great to know from the beginning what will my responsibilities be.\n\n33. How often should I visit your employees?\n\nIf the project is long enough, I need to establish contacts with key personnel by visiting them in office. If developers are working offshore, then I should visit them at least when the project is initiated. Read here about the importance of visiting offshore teams.\n\n34. Will you support during off hours?\n\nThe software is not only about writing code, testing it and deploying to production servers. Software tends to break at times least expected. Servers do not always heel themselves after reboot.\n\nDuring the first couple of weeks after the software has been installed, there were will be multiple instances when programmer’s assistance is needed.\n\nOr maybe I operate a 24-hour business and I need support during the night. I need to make sure that someone is always available on the SOC side and they can handle my needs.\n\n35. Do you offer long-term support?\n\nSimilar to the question above I need to sign a long-term support contract. I wouldn’t work with any SOC that does not provide it.\n\n\nI hope the list I put above will be helpful when you decide to go with the outsourcing company. I want to conclude this with one final point about the cost.\n\nWhile cost is very important choosing SOC solely on the base of cost may backfire at the end. At the same time, I do not suggest that more expensive SOCs producing more quality code.\n\nAs with any contractor you have to interview several of them, get quotes, see samples of work, call references. After narrowing down the list, visit their offices and find a good match.\n\nGood luck with your endeavor!\n\nImage used: ter Burg, Sebastiaan “Wikimedia Hackathon 2013 – Day 3”. May 26, 2013. Online image. Flickr. Mar 8, 2019. https://www.flickr.com/photos/ter-burg/8852987486/\n\nAlisher Abdukadirov\n\nAlisher is an experienced developer and software development manager. He has a lot of experience managing offshore development teams.\n\nLeave a Reply\n\n9 − five =\n\nClose Menu", "pred_label": "__label__1", "pred_score_pos": 0.520013689994812} {"content": "June 21st, Aymara New Year\n\nJune 19, 2019\n\nCredits: pagina siete Bolivia\n\n2019 ??? Nooo, in Bolivia for the Aymara people this is the year 5527.\n\nOn 21 June, the Andean New Year is celebrated in South America's most indigenous country.\n\nIt is a ritual that goes on for thousands of years and still practiced nowadays by many people with ceremonies that take place in different places considered sacred for people belonging to the Aymara ethnic group. The new year count is made by adding 5000 years to the period since 1492, the beginning of the European invasion.\n\nPeople will be gathering with Andean priests to receive the new sun with respect and devotion while making offerings to it and showing the value it has for them.  All together they will receive the first rays, the energies of the Tata Inti, the father Sun, in the palms of their hands so that everyone will feel the energy of a new cycle.\n\nThis is a powerful and growing moment.\n\n\nCredit: Diario \"La Razón\"\n\n\nJune 21 is a special day in Bolivia, with a holiday in between, the country paralyzes public and private activities to celebrate the arrival of the \"Aymara New Year\" now considered the Amazonian Andean New Year, also known as the \"Willakuti\" or \"Return of the Sun\".\n\nThe \"Willakuti\" central event is centered in Tiwanaku, where the Puerta del Sol is located, a pre-Inca city with an elevation of almost 12750 ft about 70 km from La Paz.\n\nCredits: Cultura Latina.at\n\nThe city of Tiwanaku, capital of a powerful pre-Hispanic empire that dominated a large area of the southern Andes and beyond, reached its apogee between 500 and 900 AD. Its monumental remains testify to the cultural and political significance of this civilization, which is distinct from any of the other pre-Hispanic empires of the Americas. Since 2000 is listed in the UNESCO WORLD HERITAGE SITES\n\nAmazonian Andean New Year\n\nThe Andean Peoples, Amazonian, Guaranis, Kollas, Mapuches among other cultures, commemorate on this date the new year, celebrate means renewing a commitment to continue raising the ecosystems that coexist thanks to the benevolence of the Pachamama and the Inti Tata, those who are offered the sacred coca, and alcohol for the “Challa”, a ceremony of reciprocity that is based on the act of watering the land or other good with alcohol and symbolic elements.  as a symbol of reverence.\n\n\nCredits: Noticias del Sur - Argentina\n\n\nAmazonian Andean New Year  celebration is linked to an astronomical reference that is the solstice, source of energy and spiritual renewal, and is recorded as a natural phenomenon between June 20 and June 23 in the southern hemisphere and begins a new agricultural cycle, it is a luni-solar calendar, as it is governed by the phase of the Moon and the journey of the Earth around the Sun. From 22nd June the 13 months are counted, each of 28 days, counting 364 days of the new year, 21st June is the 365th day, which is dedicated exclusively to the New Year's Day and begins winter in the south of the planet Earth, being this day the one with the longest night and the shortest day.\n\nWithin the Andean calendar and the southern hemisphere, there are two solstices, the winter solstices, and the summer solstices. The celebration of the mara t'aqa corresponds to that of winter, where the height, the front and the movement of the sun condense their maximum expression and significance in the Andes and the southern hemisphere, the period of the juyphi-pacha, in which the frost when reaching its maximum expression.\n\n\n\n\n\nWritten by: Alex Brandino\n\nLeave a comment\n\nComments will be approved before showing up.", "pred_label": "__label__1", "pred_score_pos": 0.9380637407302856} {"content": "\n\n\nTake a Walk, Not a Pill\n\nMother Earth is a healer.\n\n\n\nAfter conferring with other officials, King convinced the overnment to build a new facility in 1948, complete with running streams and a forest where soldiers received the healing power of nature in addition to their medical care.\n\nFor combat veterans today who may or may not exhibit visible injuries, immersing them in nature is being used as one of the most restorative therapies — far better than drugs and, in some cases, more effective than counseling.\n\nVeterans aren’t the only ones who can benefit by reconnecting to the Earth. More people than ever say they’re experiencing a sense of unease and anxiety, especially with anything too far removed from modern life such as technology.\n\nOur parents, grandparents and generations before us knew that nature, the essence of the living world and the wonders it holds, was essential for our physical, spiritual and emotional survival. And, with every high school graduating class, we move further and further away from embracing the very Earth we live and depend on.\n\nAnd that’s sad because exposure to greenspace — open, undeveloped land with natural vegetation — leads to significant health benefits, including lower diastolic blood pressure, reduced levels of stress and decreases in Type 2 diabetes and mortality from all causes, especially those related to the heart. Other reported benefits included a lower risk of premature birth and increases in good self-reported health.\n\nEven the U.S. National Park Service recognizes the benefits of nature by sponsoring the “Healthy Parks, Healthy People” movement, which encourages people to spend time in parks and public lands to create healthy societies.\n\nOne simple way to embrace the healing power of nature is to follow the example of children and go barefoot. This is called grounding, which is defined as placing your bare feet on the ground, whether it is dirt, grass, sand or unsealed, unpainted concrete (especially when humid or wet). It sounds “too easy,” but the simple pleasure of walking barefoot can be a powerful health-promoting activity. \n\nBecause the Earth carries an electron-rich, negative charge, walking barefoot outside provides a powerful and abundant supply of antioxidant electrons that zap free radicals, lower inflammation and heal your body in numerous ways.\n\n\nThink about the last time you walked barefoot on the beach and how great that felt. There was a reason it made you feel so good. When you ground to the electron-enriched Earth, an improved balance of the sympathetic and parasympathetic nervous system occurs.\n\nFree radical stress from exposure to pollution, cigarettes, pesticides, processed foods and electromagnetic radiation, just to name a few, continually depletes your body of electrons. The Earth, however, is always electron-rich and can serve as a powerful and abundant supply of antioxidant free radical-busting electrons, provided you make an effort to stay grounded.\n\n\nWhen grounding is restored, many people report significant improvement in a wide range of ailments, including improved sleep and mood, a reduction in anxiety, chronic pain, muscle stiffness, soreness, and inflammation.\n\nSo, when you’re overwhelmed and stressed, head outside, shed those shoes and socks, take a walk, hug a tree and come back down to Earth.", "pred_label": "__label__1", "pred_score_pos": 0.9330114722251892} {"content": "Proverbs 4:20-22\n\nEast Aurora NY Church\nEffective communicators know that repetition is essential for their audience to remember what is being communicated.  Public speakers know that they need to repeat their main message in slightly different ways throughout their speech in order to increase their odds of making a lasting impression on their listeners.  The best preachers are those who master the use of repetition.  Jesus Christ repeated many statements and stories over the course of His public ministry.  Paul the Apostle did the same in many of his epistles.\n\nIn the world of marketing, there is a well-known Rule of Seven that is used.  It states that a prospect needs to hear or see the advertiser’s message at least seven times before they’ll take action to buy that product.  This is why companies will replay or reprint the exact same advertisement for weeks and months.  Repetition is not a trick to get sales – it is a necessary approach to engage the human mind.  Our minds process a tremendous amount of information very quickly but they don’t retain everything that they process.  Our minds only retain the most memorable or the most reoccurring things that they process.\nBecause he was given wisdom above all others, Solomon surely knew the nature and tendencies of the human mind.  Because he was wise, he utilized repetition in his communication techniques.  For the sixth time in four chapters and for the third time in this chapter, Solomon reminds his son to listen to his father.  Solomon’s reoccurring counsel is not the result of rambling or obsession – it is the intentional result of making sure his son didn’t forget the importance of a parent’s counsel.\nNestled within this repeated instruction is a very important lesson.  In these verses, Solomon gave his son the path to success in life.  It started with RECEIVING a wise parent’s words in verse twenty.  Attend to my words.” Receiving a wise parent’s instruction requires an open ear and an open heart.  Success is highly unlikely if a young person has no ear for the sayings of his parent.  This is why I fear success will evade a generation of young people whose ears are closed to the words of parents primarily because their ears always seem plugged with ear buds.\nIf a young soul will receive his parents’ words, the path to success can continue then to RETAINING those words.  In verse twenty-one, Solomon tells his son to keep them in the midst of thine heart.”  Giving someone your attention is one thing – giving someone your retention is another thing altogether.  Many students give their teachers their attention in class but not nearly as many of them give their teachers their retention.  Remembering what someone says requires more than a listening ear to what is said – it requires a sincere care about what is said.  Spouses are especially guilty of listening without a care to what they’re hearing.  This is why husbands don’t remember what their wives told them two days ago.  To retain someone’s advice, we need more than an open ear – we need an open heart.  If we don’t care, our hearts won’t be engaged.  If our hearts aren’t opened, then nothing will be retained in the midst of them.\n\nThirdly and finally in these verses, Solomon gives his son the ultimate tool for success.  The son or daughter that receives and then retains a wise parent’s instruction will have put themselves in the best position for success later in life.  When a heart is full of wise parental instruction, it becomes an ever-present resource of wisdom in future time of need.  This is why Solomon wrote what he did in verse twenty-two when he wrote, “for they [parental words] are life unto those that find them.”  Success in life comes when a person REMEMBERS the wise words his father and mother once told him.  Wise parental instruction resurrected from the heart of a child’s upbringing can potentially save their life and be “health to their flesh.”  Wise parental sayings retained in the midst of a child’s heart can be remembered when life finally makes that saying understandable and applicable.  It is in that moment - not the moment it was received or retained - that that saying becomes so valuable.  What a young person didn’t receive, he can’t retain.  And what that young soul didn’t retain, he can’t remember.  Void of wise sayings, such a soul is destined for failure.\n\nWhen a son is young, so much of his father’s instruction seems distant and inapplicable.  When a daughter is young, so many of her mother’s sayings seem outdated and irrelevant.  For most of us, it isn’t until we experience life on our own that we begin to appreciate our parent’s sayings.  To appreciate and more importantly, heed wise sayings when life comes calling, we need to have those wise sayings retained in the midst of our hearts.\n\nThe great lesson of this repetitive content is to retain as many wise sayings as possible so that there is something to remember when life makes sense of those sayings.  Don’t disregard wise sayings just because you don’t understand them.  Don’t ignore wise sayings just because they don’t seem relevant to your present stage in life. Create a file of wise sayings in your heart that you can consult when life takes you to new territory.  Put as much wise counsel in your heart as possible so that you have a wealth of wisdom to remember when life makes sense of that wisdom.  Receive and retain the words of the wise so that when you are old, you have something wise to remember - something that will keep you alive and well.\n\nAt younger ages, children can’t understand everything that they need to understand for what awaits them in life.  That being said, if they receive and retain the sayings of a wise parent, they will understand and ultimately, heed those sayings when they are older.  Surely, this is why Solomon wrote what he did later in the Book of Proverbs when he wrote, “Train up a child in the way he should go: and WHEN HE IS OLD, he will not depart from it” (22:6).  Wise sayings retained in the heart of a child are seeds that will produce life-changing and life-saving wisdom in the future.  In time, life will provide the conditions and nutrients to bring those wise sayings to fruit-bearing life.  \n\nThe same valuable lesson applies to the child of God.  The Bible is our Heavenly Father’s word – it possesses all of the wise sayings of God.  We need to receive with our ears and retain in our hearts as much of our Heavenly Father’s wise sayings as possibly.  Much of the time, we will not understand His wise sayings.  Much of the time, it will seem distant and irrelevant to our lives.  But in time, life will reveal the meaning of those sayings and make them undeniably relevant.\nIn the Gospels, the lives of the Disciples demonstrate the importance of retaining God’s word for a future time.  They definitely didn’t understand everything that Jesus Christ taught them and told them.  In fact, John 6:60 records followers of Christ saying of His preaching, “this is an hard saying, who can hear it?”  Even though the Disciples often found themselves scratching their heads and raising their eyebrows, they retained what they were told because they cared about their Savior’s words.  Many of the things they did not initially understand were remembered when life made them relevant.  Referring to Christ’s triumphant entry into Jerusalem, John 12:15 says, “These things understood not his disciples at the first: but when Jesus was glorified, then remembered they that these things were written of him, and that they had done these things unto him.”  When preparing the Disciples for His absence, Christ said in John 16:4, “But these things have I told you, that when the time shall come, ye may remember that I told you of them.”  The Disciples and the ladies accompanying them didn’t understand Christ when He spoke of His resurrection until they were staring at two angels in an empty tomb.  Luke 24:8 tells us that it was there and then that “they remembered his words.”  The Holy Spirit was given to the Disciples to help them remember the words of Christ at the appropriate and necessary time.  Speaking of the Holy Spirit in John 14:26, Jesus told the Disciples, “he shall teach you all things, and bring all things to your remembrance, whatsoever I have said unto you.” \n\nIn time, life makes wise sayings of yesterday relevant and understandable.  Those wise sayings only become beneficial if they’ve been retained in the midst of one’s heart.  Therefore, let us hide the wise sayings of our parents in our hearts so that one day, they can be remembered and utilized.  More importantly, let us hide the wise sayings of our Heavenly Father so that one day, they too can be remembered and implemented.  In that day, we will discover that those wise sayings are life unto those of us that find them, and health to all our flesh.\n\nRelated Posts\n\n\n\n\n\nRehoboam Solomon fear of God health pride self-sufficiency wisdom 5th Commandment Abraham Absalom Adam Ahithophel Asaph Bathsheba Beecher Bezaleel Bible reading Bible Bonar CA Rt 1 Calvin Canaan Christian upbringing Christ College Corinthians Creation Creator Daniel David Ecclesiastes Economic Stability Eden Elihu Elijah Esau Esther Eve Friendships Galatians Genesis Gideon Godhead Goliath Gratitude Haman Hannah Heaven Hebrews Holy Spirit Instructing Israel Jacob James Jerusalem Jesus Christ Jesus Jewish Job Jonah Joseph Joshua Joy Judaism Judas Iscariot Luther Marvel Mary Matthew Moody Moses Nehemiah Parenting Paul Peter Potiphar's Wife Potiphar\\'s Wife Principal Thing Principal Proverbs Psalms Rehoboam Resurrection Samuel Satan Saul Scripture Simon Peter Solomon Song of Solomon Taylor Teaching Timothy Trinity Turner Understanding Watsom Witnessing addiction adultery advertisements advertiser advertising advice advisor affection affirmation alcohol angels anxiety appetite assumption as authority background backyard battle beginning birds bitterness bright buckler career carelessness cause certainty charity chastening childhood childrearing children child choices church attendance church command confidence confident consequences considerate contention contentment correction counselor counsel covetousness criticism cruelty cynicism dads dad darkness dark daughter debt deception decisions defend defense demands destruction determination diamonds direction disappointment discernment discipleship disciples discontentment discretion distress doctrine drinking drugs dying ear education employment enemies enticement enticing envy equity evil men evil women evil example facts failure faith fathers father favor fear of God fear feminine fighting fight finances flattery following foolishness foolishnes fools fool forgiveness fornication friends gambling gold good men good government grace greed guilt happiness happy harm health heart hear home honor hope hunger husbands husband ignorance illustration income infidelity influence iniquity insomnia instincts instruction investigation jewelry judgment justice kidnapper kids knowledge law of sowing and reaping laziness lazy leadership learning length of days let life light listening listen living loneliness long life love marketing marriage memorization memory mercy millions mind ministry mischief misery mistakes mom money mothers mother motive movies nature necklace neck neighbor oppression oppressor ornaments parable paranoia parenthood parents parent pastoring path peace peer pressure peers peer permission personification pleasant pornography power prayer preservation pride priests prodigal prosperity prostitution protection prudence purchases reading reaping reason rebellion rebuke regret rejection relationships remedy remembrance remorse repetition replacement reproof respect responsibility responsible retain retention riches righteousness righteous risk robber romance rubies safety salvation scorner security seduction self-sufficiency self-sufficient serpent silver simple simplicity sinners sin skepticism sleeplessness sleep son soul sowing stability stranger strange strife striving successful success suicide taxes teacher television temptation tendencies thief thieves thinking think thoughtfulness thought threats time tithe tree of life trust truth vice video games violence virtue virtuous woman visual voice of God voice war wealth wickedness wicked wife will wine wisdom wise sayings wise wives word of God work worry young youth", "pred_label": "__label__1", "pred_score_pos": 0.5161116719245911} {"content": "Monday, December 9, 2019\n\nAgricultural Reforms in Australia Agricultural Products\n\nQuestion: Discuss about theAgricultural Reforms in Australiafor Agricultural Products. Answer: Introduction The Australian agricultural sector is faced by very many challenges that need to be addressed in order to sustain the future supply of agricultural products (Lockie, 2015). Australian is a big producer and exporter of agricultural products. Thus the sector is a rich source of foreign earnings. Agricultural products are in daily demand as they support the food that is consumed on daily basis. The production size of Australian agriculture is big enough to serve its whole economy. Since this capacity is produced by fewer number of farmers, it is an indicator that the economy has a great potential for expansion. If all the challenges facing the sector were addressed and various reforms established on the same, this potential could be used to raise the production level. This paper will cover the major challenges that face this sector and how they have been addressed. Some farmers are not aware of the reforms that has taken place and therefore this paper will raise their awareness. The pap er will recommend the gap for other reforms and therefore important to the policy makers who are trying to raise the incentives for increased production. According to Gray, Oss-Emer and Sheng (2014) reforms helps in improving productivity. Article Analysis The article Farm groups have welcomed the Federal Government's plan for Australia's agricultural future, particularly tax reforms and changes to Farm Management Deposits (FMD) by Anna Vidot is concerned with the problem of capital financing that is difficult for Australian farmers to access (Vidot, 2015). Generally, its not easier to insure against bad weather conditions that an economy faces since this may be very costly since all farmers would be affected and the compensation will be demanded for all. This reason has made Australian farmers to be considered very risky borrowers in Australian banks. This has subsequently lowered the level of capital for innovation and process expansions. The Farm Management Deposits (FMD) is one of the important reforms that the Australian farmers have been longing for and were pleased to hear of its implementation (, 2016). Vidot noted that the previous level of the maximum FMD of $ 400,000 was insufficient to meet the many obligations th at farmers need during a crisis and that the doubling of this amount to $ 800,000 would make farmers better off (Mcmahon and Cardwell, 2015). He argued that higher FMD would help in offsetting their business loans thus lowering their interest costs which has gone up as observed below. Fig: Australian farm debt Source: Keogh (2017) The government also intervened to ensure that an additional feature is added to make the FMD more effective; tax concession wont be lost when obtaining this money and thus drought affected farmers will be able to benefit fully (, 2016). Fiona Simson the president of NSW Farmers' Association supported this idea by noting that the innovation was good and would be very helpful to many farmers who live in drought. Fiona also said that the concessional loans offered to drought stricken farmers should continue being offered. Further, Vidot noted that the Australian farmers are speculating on the government coming up with a program for multi-peril crop insurance which would help in mitigating crop risks faced by the farmers. This would ensure that the farmers are insured before they get their crops on the ground such that failure for the crops to develop well would attract some compensation from the insuring body of the government. By compensation here, the proposal meant that it would include all the input costs that the farmers incur such as seed, labor, fertilizers, and many others. The challenge of financing problem is normally faced by those small farmers who doesnt have collaterals to offer in order to obtain loan from banks. In the current period, every bank is demanding some form of collateral to back up loans since the defaults rates have gone up. This puts the small farmers at a greater risk of exiting the market. Their availability of capital will raise their productivity. The large farmers are not affected since they possess many assets that could be used as collateral and its thus easier for them to expand their operations. Another challenges facing the Australian agriculture is the unfavorable climate. Some Australian states receive little rainfall that is insufficient for crop development (Kingwell, 2013). Therefore, most of agriculture in Australia is based on irrigation. However, the problem of less rainfall has resulted in less water available for irrigation since the government is also concerned on the future of water supply (Iggulden, 2015). Vidot noted that the idea of the government constructing dams was a good innovation as it would help in ensuring that there is sufficient water to be used for irrigation and other purposes in future. Lastly. The article also noted that Australian farmers has many challenges in the trading of their products due to the inadequacy of information about the potential markets such as Asia. Thus, the need for the government to spend more on RD was welcomed. Recommendations Though the multi-peril crop insurance is meant to help farmers, I would argue against it. This would be on the basis that it would create a disincentive for the farmers to manage their crops when they observe that the climate is becoming worse since they bear in mind that they will lose nothing. The compensation is able to cover for all the losses. I would back up the idea of increased spending on RD as it would make it easier for the farmers to access the outside market thus creating a large market subsequently creating an incentive to produce and supply more. Conclusion The primary role of the reform on FMDs was to help small farmers face their risks at a better position. It would minimize the effects of not receiving loans from banks. The additional feature of no loss in tax concessions makes it easier and attractive for farmers to deposit and withdraw. The money will accumulate in the depository system if a good season is experienced for some years and the farmer will have a firm base when the bad season comes. References (2016). Farm Management Deposits. [Online] Available at: [Accessed 19 Apr. 2017]. (2016). Farm management deposits scheme. [Online] Available at: [Accessed 20 Apr. 2017]. Gray, M., Oss-Emer, M. and Sheng, Y. (2014). Australian agricultural productivity growth: Past reforms and future opportunities. Canberra: ABARES research report 14.2. Iggulden, T. (2015). Murray-Darling irrigation reforms clouded by portfolio confusion. [Online] Available at: [Accessed 18 Apr. 2017]. Keogh, M. (2017). Not a bad time to be a farmer. [Online] Available at: [Accessed 18 Apr. 2017]. Kingwell, R. (2013). Australia's farming future: Western Australia. [Online] The Conversation. Available at: [Accessed 19 Apr. 2017]. Lockie, S. (2015) Australias agricultural future: the social and political context. Report to SAF07 Australias Agricultural Future Project. Melbourne: Australian Council of Learned Academies. Mcmahon, A. and Cardwell, N. (2015). Research handbook on EU agriculture law. Cheltenham [u.a.], Edward Elgar. Vidot, A. (2015). Farmers approve of White Paper vision. [Online] ABC Rural. Available at: [Accessed 19 Apr. 2017].\n\nSunday, December 1, 2019\n\nStudy of the Causes of the Juvenile Crime Rate free essay sample\n\nMany people live that the increase in real life violence on television is a cause for violence in juveniles. I will discuss the evidence for this theory. It seems to me that the best theory to explain the rise In Juvenile crime Is the social constructionist theory. Different sub-cultures of teens have higher crime rates than others because of their interests, whether it be the music that they listen to or the types of television programs that they watched as child. In the early sasss a new form of Hip-Hop music appeared In America known as Gangs-Rap. This style of Hip-Hop had lyrics pertaining to killing police, gang warfare, guns, and robberies. This style of music perked interest in teenagers across the country. Song titles such as F*KC the Police gave laughter to teenagers in middle and upper class America, but for these rap artists, the lyrics they wrote were their way of life. We will write a custom essay sample on Study of the Causes of the Juvenile Crime Rate or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page The Gangs;Rap culture came straight from the worst neighborhoods on the Pacific Coast of the united States, where this kind of lifestyle was led by sasss of people stuck in the slums of America.Could the years from these kind of songs promote violence In low Income areas where teens look up to these Rap artists? Teenagers that grow up In neighborhoods that are considered low-income (more so n larger cities than suburban areas) have a very low amount of opportunities to leave these areas and become successful in life. Teens in these areas are looking for the easy way out. There Isnt many legal ways of getting out of a slum and becoming successful. Teens In these areas are more likely to sell drugs and perform robberies to make money than hold a steady job.In essence, crime is already higher in low- income areas than it is in higher-income areas. When gangs rap was introduced in the early sasss, It became very popular with people facing the same problems as these rap artists had In their childhood. These rappers glorified murder, violence, and drug dealing in their songs which perked the ears of many teens in the struggle. Hearing the people that they look up to preach this way of life, opened more doors for crime in these tens lives.Many teens get heavily involved in the music that they listen to. A large amount of evidence of this can be found by looking at the hard- core crowds that follow different types of music. The Punk Rock culture is a good example. Many kids that are introduced to punk rock music incorporate the music into their way of life. They dress in tight Jeans with oleos, have odd and sometimes even ridiculous hair styles, piercing, tattoos, and their way of life is to not care about anything. Hard-core punk music Is usually hate based.Hate for the government, society, drugs, and other issues.. The teens that get 1 OFF they dislike about their surroundings. The hippie culture, driven by asss music that preached peace, exercised what they heard in the music that they cherished. They promoted peace and protested against things such as war and hate. I point out that all of the people that are part of these cultures surrounding music, for the most part, use the music they listen to and incorporate it into their belief systems and their ways of everyday life.As I have said earlier, Gangs-Rap lyrics revolve around guns, violence, crime, and drugs. Juveniles that are influenced easily by the music that they hear, incorporate these things into their way of thinking. This I believe is what was responsible for the rise in violence from 1990 to 1995. Gangs-Rap doesnt preach peaceful confrontation and working out problems. Teens that live in slums would seem to be more prone to follow the words the rap artists that they look up to because of the similarities in their circumstances.This in theory is what has driven more teens than ever to get involved in crime. Television is said to be part of the reason for a rise in Juvenile crime. I believe that this pertains more to teens that are not in the large city, low-income category . My reasoning for this is that families in larges cities that live in slums have a low probability of having cable television. This means that their children dont have many opportunities to watch violent programs. For 40 years there has been violence on TV. Starting with Western style shoot out movies in the sasss.The violence in these types of media were not as graphic and al-life like as they are today. Children could often make the Judgment that the software violence in older television shows was fake. Technological developments in the film industry n the late sasss has allowed the violence on television to come to a point where it is very believable. Along with this has come a tolerance for more violence on TV. Children watching films and TV shows from the late sasss on, see this kind of violence and to them it is real.A study done found that the greater was a boys preference for violent television at age 8, the greater was his aggressiveness both at that time and ten years later (Leftwing 115-116). Researchers performed a follow-up study on the subjects of the previous experiment when they subjects were 30 years old and found that The violent programming they had watched was related to the seriousness of the crimes they committed, how aggressive they were to their spouses, and even how aggressive their own kids were (Leonard Iron, cited in Gilbert DID).With a rise in portraying real-life violent crime on Television in the past decade, along with the fact that almost every child in America has access to a television (in contrast to 40 years ago when a TV was a luxury), many people believe hat this is the cause for more crimes being committed by teens in America. In order to conduct my research on showing that these 2 cases are the prevalent factors in the increase of Juvenile violence from 1990 up to the present, I will need funding.I wish to perform a cohort study on a population of 5000 boys [only boys because of the greater incidence, frequency, heterogeneity, seriousness, and persistence of male delinquency (Wolfgang, Thornier, and Foggily, 1987)] throughout the Lancaster County area. Starting in January of 2002, 5000 boys at the television and the shows they watched will be studied thoroughly. Studies of the crimes they commit, drug and alcohol use, and their correlations to television will studied also. The familys socio-economic status will be studied to evaluate it as any evidence off factor. A cohort study will also be done on 500 of the boys siblings that are close in age to examine any similarities amongst them. I feel this study will provide sufficient information on the correlation between Juvenile delinquency and television. I wish to perform another cohort study involving 2500 boys from middle and upper class families, and 2500 boys from lower class families in the Lancaster County area. Starting at the same date as the television study, it will involve children of age 10. I will examine these children until the age of 17.The reason for the separation of the study is to determine any link between family income, surroundings, and crime rate. Careful observation will be taken of the habits of the music listened to throughout the 8 year period. The dress style of each teen will be closely examined. The reason for this is when teens get past a point of just listening to music and become closely knit with a style of music, many times their style of dress will resemble that of the music they listen to. This can be seen in any highlights looking at different clicks[hippies, bunkers, and gangsters (There is no dominant term used for this group.It is the group deeply involved in rap music. They wear lots of gold Jewelry, medallions, etc, and have their pants sagged low)]. I will perform a study of crimes, drug use, aggressiveness, and academic standings of the teens involved. Many vital statistics will come out of these studies. These statistics can be used to study many different correlations between Juveniles and crime. This knowledge can be used for future reference in the fight to lower Juvenile crime rates and understand problems before they start.\n\nTuesday, November 26, 2019\n\nIndian view essays\n\nIndian view essays The Indian writing titled, I Went to Kill the Deer, by the Taos Pueblo Indians introduced a very unique kind of perspective about the universe. For one, the writing offers the suggestion of personification. In other words, the writer gave things that arent alive human characteristics and traits. An example of this would be when he says, The heart of the mountain beats(Taos Pueblo). When he refers to the mountain as having a heart, it makes one think that the tribe views the mountain as being alive as a kind of symbol of their respect for nature. Secondly, the writing infers that animals communicate with one another. In the writing, the eagle tells the deer theres danger. A hunter writes, An eagle saw me coming and/ Flew down to the home of the deer/ And told him that a hunter came to kill(Taos Pueblo). This shows their understanding that creatures of the same kind need to stick together to protect each other. Otherwise, there would be no need for an animal which preys on the dead to warn another of being killed. Thirdly, the writing implies that there is always going to be different unknown territory of some kind for every species. The deer runs to a place in which it is safe from the man. As the hunter says, The deer went with the eagle/ Into the heart of the mountain/ Safe from me who did not hear/ The heart of the mountain beating(Taos Pueblo) He can not feel the heart beat because it is not his territory or his right to be there. So in a way, the Taos Pueblo Indians dont think of themselves any different or better than anything else because they have a respect for life and the universe. ...\n\nSaturday, November 23, 2019\n\nFoods that Increase Brain Activity and Prevent Decline by\n\nFoods that Increase Brain Activity and Prevent Decline Foods that Increase Brain Activity â€Å\"Smart foods,† they’re called – foods that enhance brain activity and that keep the brain healthy as the body ages. We now know, from research, that certain elements in some foods have a positive impact on the brain. While much of this testing has occurred with rats, the implications for human brains are certainly there. The elements that are now known to improve brain health and to help prevent brain health decline are Omega-3’s, glucose, blood supply, and anti-oxidants. In fact, the research shows that oxidants are more detrimental to the brain than to any other organ in the body. If you would like detailed information about these studies, there are load of essays online that summarize them. Nevertheless, foods rich in these elements should be added to everyone’s diet right now, no matter what age you are. Blueberries: Studies show that this superfood improves learning capacity and motor skills in animal studies. As well, they protect the brain from oxidants, and more recent studies indicate that there may be properties that retard dementia and Alzheimer’s. Recommended daily amount is 1 cup. Wild Salmon: Omega-3 fatty acids are known to promote good brain function and to reduce or delay effects of aging. These are also found in sardines and herring, and the recommended amount is at least one service 2-3 times a week. Nuts and Seeds: These foods are really high in Vitamin E, a nutrient that is also known to retard the aging of the brain as we age. 1 ounce per day of most any type of nut plus sunflower and sesame seeds is recommended. Vitamin E is also found in peanut butter if that is preferred. Avocados: One of the best benefits of avocados is that they contribute to good blood flow. The brain, like any other organ, relies on a strong blood supply. This food also lowers blood pressure, a condition which, over time, is a factor in the decline of cognitive abilities. Recommended amount is  ¼ -  ½ of one avocado once a week. This food is very high in fat content and calories, so this is the reason for the lower recommended amount. Whole Grains: Everyone should eat at least 3 servings a day of whole grain foods – oatmeal, whole grain cereals, and whole wheat or rye breads. First, these foods lower cholesterol, a leading cause of plaque buildup in the arteries. This buildup decreases blood supply to the brain, and can cause a stroke or heart attack. Both of these events disrupt the flow of blood to the brain. Whole grains also stimulate blood flow, so there is a double-plus to eating the recommended amount. Beans: The brain relies on glucose, and it does not store this nutrient. So, it is important that a steady supply of glucose get to the brain so that it is maintained in a healthy condition. While beans do not of themselves have glucose in them, they do regulate the flow of glucose throughout the body and ensure that the brain gets an adequate supply. Everyone should eat  ½ cup of beans every day. Pomegranates and other bright/dark colored vegetables and fruits. Pomegranates are mentioned specifically because, of all fruits and vegetables, they have the highest amount of anti-oxidants. Other fruits and vegetables include broccoli, tomatoes, oranges, dark berries and grapes, dark lettuce, carrots, asparagus, and squash. Red wines are also full of antioxidants. 5 servings a day please. Tea: If it is freshly brewed tea (no instant!), there are moderate amounts of caffeine which does enhance focus and memory. Tea, especially green tea, also contains anti-oxidants. 2-3 cups a day is ideal. Dark Chocolate: Yes! This is a huge source of anti-oxidants, and it also have moderate levels of caffeine. A recommended daily amount is  ½ - 1 ounce each day. Hopefully, there are some foods on this list that you really like. If so, and there are others you just can’t abide, at least increase the amounts of those foods that you do like. Scientists have located a protein in the brain that is definitely linked to Alzheimer’s, so keeping that protein functioning properly is important. â€Å\"Brain foods† will help!\n\nThursday, November 21, 2019\n\nMutiple intelligence Essay Example | Topics and Well Written Essays - 2250 words\n\nMutiple intelligence - Essay Example According to Howard Gardner there are seven types of intelligences: musical intelligence, bodily-kinesthetic intelligence, logical-mathematical intelligence, linguistic intelligence, spatial intelligence, interpersonal intelligence, and intrapersonal intelligence. The naturalist type of intelligence was added after Gardner developed the seven types of intelligence (Levitin, 507-520) (Daniel L. Levitin is a prominent American cognitive psychologist, neuroscientist, record producer, musician, and writer). The theory of multiple intelligences has brought a pragmatic approach that would allow cultivation of student’s strengths towards learning and how we define intelligence. Numerous educators, parents, researchers, and students deemed the idea of multiple intelligences as important however, multiple intelligences theory has also risen criticisms among scholars in the field of psychology. My goal in this paper is to investigate the issues surrounding multiple intelligences by examining the point of view of Howard Gardner and those critics of the multiple intelligences theory. To achieve this goal, this paper will discuss four main sections, two of which have sub-sections. The first section will discuss the history of multiple intelligences, together with the evolution of the definition of intelligence. The second section will discuss each type of multiple intelligences, and issues surrounding the multiple intelligence theory will be discussed in the third section. Lastly, the fourth section will discuss the impact of multiple intelligence theory on the education of America. The history of multiple intelligences started through the attempts to reform the common notion of the term â€Å\"intelligence†. More often, people measured intelligence through the ability to solve problems, to find the answers to specific questions, and to learn new material quickly and\n\nTuesday, November 19, 2019\n\nHow do the Bankers Bonuses Affect the Investment Behaviour Research Paper\n\nHow do the Bankers Bonuses Affect the Investment Behaviour - Research Paper Example The concerns and the perception have changes and numerous controversial ideas have changed the bankers’ bonuses ideologies significantly. Therefore, the research aims at identifying and analyzing the effects of bankers’ bonuses to the banking investment especially in relation to the performance of the banks. The main aim of the bonus banking is to balance long-term and short-term value creation and satisfying accountability of the stakeholders with the intent of attracting, retaining, and motivation talent. However, what is the underlying reality of this motivational system The research shall answer this concern by seeking the  response to the following question: In the journal, Banker’s pay structure and Risk, John Thanassoulis addresses the contrasting problems facing the banks and bankers. According to Thanassoulis, these contrasting banking problems are embedded in the competitive labor market where the banks are seeking best talents. Additionally, Thanassoulis notes that banks often use various motivation efforts that vary with the remuneration. However, the introduction of the remunerations motivations makes banks risk shifting problems by creating incentives that will only inflate the early earnings of the managers. In most cases, the management of some bonuses is of deferred optimally. Thanassoulis further notes that\n\nSunday, November 17, 2019\n\nGreek mythological poem Essay Example for Free\n\nGreek mythological poem Essay Subject: the poem is a Greek mythological poem about King Midas of Phrygia who had his wish granted everything he touches turns into gold. The poem is about the consequences of choosing money and greed which is presented to the readers through the wifes perspective. Duffy presents a wide range of emotions through Mrs. Midass persona. Mrs. Midas complains about his husbands selfishness and greed. Duffy gives a voice to women unheard in history. Duffy takes a historical character and translates them into present day. Mrs. Midas turns the noble king Phrygia into a pathetic greed middle-aged man.  The mood changes as the poem proceeds, reaching its peak of fear in the fifth to eleventh stanza then calmly comes down as Midas draws close to death. The language the character uses informs the reader about the mood of the poem. In the second and third of the first stanza Midas uses personified the kitchen as its steamy breath gently blanching the windows. This sets the calm relaxing atmosphere of the poem before the crisis. The poem is calm because Mrs. Midas uses smoothly and well-skilled sentences. The intonation changes suddenly, the sentences become short and factual lexis is used. For example in the fifth stanza Mr. Midas said I moved the phone. Mrs. Midas does this to make the situation seem more urgent chaotic and panicky. Short sentences are used in this poem to speed p the narration as the chaos happens in the poem. After the crisis is over, she reverts to her earlier relaxing mood. For example she said in last stanza Mrs. Midas said I miss most, even now, his warm hands on my skin, his touch. The language of the poem used by Mrs. Midas is elevated register. She uses descriptive lexis in the poem. This will be described further in the analysis.  The poem is a universal, therefore everyone can read it. The poem is moral lesson. For example in the sixth stanza Mrs. Midas said it feeds no one talking about gold. The moral lesson Duffy tries to teach us is money is a means to an end not an end, meaning money can be used to pay food to feed a person but it cant physically feed a person. Money is not a solution to everything as she addresses the middle class who adore money. The class backgrounds of the characters are middle-classes as they drink Italian wine. Wealth is trivial if not used to solve problems like in this poem. Mrs. Midas uses adverbs such gently to emphasis how calm and relaxed she was before the crisis.  In the first stanza Mrs. Midas uses personification, for instance she said the ground seems to drink the light of the sky. The dynamic verb drink personifies the ground as a human. The quote means the day changes to night. Mrs. Midas uses symbolism in the poem; rich symbolizes gold referring to Midas having to spit out the golden corn out of his mouth. Another symbolism used in the poem is work of art which symbolizes a statue which her husband would turn her into like he touches her. What is Liberal Democracy? Liberal Democracy is an indirect and representative form of democracy whereby the right to rule is gained through success in competitive elections on the basis of political equality. In a liberal Democratic state the people are protected by individual rights such as the civil rights in America and a constitutional government which based on rules set out in a codified constitution like in the US constitution.  Mrs. Midas uses metaphors through out the poem. For example, Mrs. Midas said turning the spare room into the tomb of Tutankhamun. Her husband is turning his room into gold, mythological compared to the Egyptian pharaohs tombs which were dressed with gold. What is Democracy?  Democracy is rule by the people. This is reflected in the idea of government by the people therefore key political decisions are made by the people. Democracy reflects the idea of equal citizenship whereby each citizen has the right to influence political decisions. For example, in February 2003 one and a half million citizens took to the streets of London. They are protesting against UKs involvement in the Iraq war. This reflects people power to influence political decisions. England is an example of a democratic state while North Korea is an example of an undemocratic state. Duffy uses a simile to make an internal rhyme its amber eyes /holding their pupils like flies. This intensifies the interior personal life of the woman. Another internal rhyme dream/streaming is used to suggest that she will have a solitary life.  Duffy uses repetition in the poem. For example in the sixth stanza Mrs. Midas said have wishes; granted. But who has wished granted? Duffy uses clever wordplay the first phrase is used as to notice that Midas has his wish granted and the second is turned into a question by using the past verb granted. Duffy does this to achieve a verbal humour. Define Representative democracy  Representative democracy is a limited and indirect form of democracy whereby the representatives act and speak on behalf of the people. The representatives can be chosen and removed by the public through elections. In a representative democratic state popular participation in government is limited and indirect to the act of voting very few years for a representative to represent them. There are uses of rhetoric in the poem. For example in the last stanza Mrs. Midas uses a repair his hands, his warm hands. Duffy uses repair to make Mrs. Midas character seem more realistic.  The poem is made up of eleven sestet stanzas. Most of the stanza are arranged perfectly to form a stanza. However in the in the fifth stanza the lines are merely joined together to make a stanza they are separated.", "pred_label": "__label__1", "pred_score_pos": 0.700912594795227} {"content": "Quick Answer: Does Blighted Ovum Have Yolk Sac?\n\n\n\nIt results in a miscarriage.\n\nIs having a yolk sac a good sign?\n\nIf a Gestational Sac Is Seen on Ultrasound\n\nThe yolk sac provides nutrition to the developing embryo until the placenta takes over, and is thus an important indicator of pregnancy health. The yolk sac usually becomes visible on a transvaginal ultrasound between 5 1/2 and 6 weeks gestation.\n\nAt what hCG level can you see a yolk sac?\n\nTen of 22 patients with HCG between 1000 and 7200 mIU/ml had a visible yolk sac. Every patient with an HCG level greater than 10,800 mIU/ml had a visible embryo with a heartbeat. A discriminatory level of 32 days was found for the presence of a gestational sac.\n\nAt what stage do blighted Ovums usually miscarry?\n\nA blighted ovum causes about one out of two miscarriages in the first trimester of pregnancy. A miscarriage is when a pregnancy ends on its own within the first 20 weeks. When a woman becomes pregnant, the fertilized egg attaches to the uterine wall. At about five to six weeks of pregnancy, an embryo should be present.\n\nREAD  Question: Can You Feel The Baby Move During Contractions?\n\nDoes blighted ovum mean infertility?\n\nA blighted ovum is a fertilized egg that implants but does not develop. In a blighted ovum, a gestational (embryo) sac forms and grows; however, the embryo does not develop. A blighted ovum is also known as anembryonic pregnancy. A blighted ovum is the leading cause of miscarriage (50%).\n\nIs a fetal pole a heartbeat?\n\nBetween 5 ½ to 6 ½ weeks, a fetal pole or even a fetal heartbeat may be detected by vaginal ultrasound. The fetal pole is the first visible sign of a developing embryo. This pole structure actually has some curve to it with the embryo’s head at one end and what looks like a tail at the other end.\n\nHow many days after yolk sac does fetal pole develop?\n\nGestational Sac, Yolk Sac and Fetal Pole\n\n\nWhat week is the highest risk of miscarriage?\n\nRisk rates\n\n • Weeks 6 to 12.\n\nWhat week do most miscarriages occur?\n\nMost miscarriages happen within the first 10 weeks pregnancy. This is why you may hear couples wait until after the first trimester to announce their pregnancy. After the first trimester, or 13 weeks pregnant, miscarriage rates lower each week, and couples feel more comfortable sharing their news.\n\nREAD  Are Contractions Stressful For Baby?\n\nCan you have blighted ovum twice?\n\nIt’s not clear if blighted ovum occurs most typically in first-time pregnancies or if they sometimes occur more than once. Most women who have a blighted ovum do go on to have successful pregnancies and healthy babies.\n\nAre you more fertile after a miscarriage?\n\nTypically, sex isn’t recommended for two weeks after a miscarriage to prevent an infection. You can ovulate and become pregnant as soon as two weeks after a miscarriage. After one miscarriage, there might be no need to wait to conceive. After two or more miscarriages, your health care provider might recommend testing.\n\nAre blighted Ovums common?\n\nBlighted ovum refers to an “anembryonic gestation” — a pregnancy that begins to grow in the absence of an embryo. This results in early miscarriage. It is extremely common, occurring in up to 20 percent of known pregnancies. The diagnosis of blighted ovum was made because you had an ultrasound exam.\n\nHow long do you bleed after a blighted ovum miscarriage?\n\n\nPhoto in the article by “Flickr” https://www.flickr.com/photos/basykes/17582100", "pred_label": "__label__1", "pred_score_pos": 0.5147315263748169} {"content": "Also found in: Dictionary, Thesaurus, Wikipedia.\n\n\n..... Click the link for more information.\n\n\n\none of the national languages of India.\n\nMarathi is spoken mainly in the state of Maharashtra by approximately 47 million people (1971, estimate). Marathi be-longs to the Indie group of the Indo-European language family. Marathi has two principal dialects: Deshi and Konkani. The latter is known as northern, or standard Konkani, as opposed to southern Konkani, an independent language, closely related to Marathi, which is spoken in Goa.\n\nThe modern Marathi literary language is based on Deshi. Marathi uses the Devanagari writing system. The grammatical structure, vocabulary, and phonetics of Marathi have features that associate Marathi with the Dravidian languages. A specific feature of Marathi phonetics is the presence of two affricate variants: apicodorsal affricates (as in the Telugu language) and mediolingual dorsal affricates. Marathi morphology makes use of agglutinative, inflectional, and analytic forms. Marathi has preserved three genders: masculine, feminine, and neuter. A specific feature of the syntax is the widespread use of participial constructions to express subordinating relations (as in the Dravidian languages). The Marathi vocabulary is characterized by a considerable number of “local” everyday words (in Deshi) of non-Indo-Aryan origin (Dravidian, Munda, Mon-Khmer).\n\n\nKatenina, T. E. Ocherk grammatiki iazyka maratkhi. Moscow, 1963.\nLambert, H. M. Marathi Language Course. Calcutta, 1943.\nVaze, S. G. The Aryabhushan School Dictionary: Marathi-English. Poona, 1963.\nMone, M. S. Mara fhr vyaka ran. Poona, 1959.\nBloch, J. The Formation of the Marathi Language. Delhi, 1970. (Translated from French.)\n\n\nReferences in periodicals archive ? does not work exclusively for Marathi movies only.\nIn chapter 6 Dhere argues controversially that, based on descriptions of Vitthal in Sanskrit mahatmysa and Marathi bhakti poetry, the most original image of Vitthal stands not in the main temple in Pandharpur but in the nearby town of Madhe, where the original image was perhaps taken for safekeeping in the fifteenth to seventeenth centuries.\nDelegates will also hear from inspirational people from the global Marathi community, including Krushnaa Patil, the first Indian woman to conquer the world's seven summits.\n19, saying new Marathi schools would not be granted recognition by the\nThis might sound like a strange admission from a \"Marathi\" writer, and I anticipate the inevitable question: why, then, do I write in Marathi?\nMumbai: Bollywood dancing diva Madhuri Dixit is all set to make her debut in a Marathi film.\nThe party has organised various events at the Lalit Kala Ground at Naigaon, including exhibition of over five lakh books, Marathi Kavi Sammelan and performing folk arts that includes Lavani.\nErnst & Young is the official tabulator of the NT Awards 2014.IBN-Lokmat won 15awards in different Marathi categories.\nShah Rukh Khan will now enter into the Marathi film industry with director Rohit Shetty.\nThe fact is when non-Maharashtrians reverentially speak Ganpati Bappa Maurya, it hardly matters to them whether the words are in Marathi, English, Urdu or any other language.\n17 -- Maharashtra Navnirman Sena (MNS) chief Raj Thackeray on Monday met Marathi producers and directors and urged them to attempt new and different kinds of subjects to bring back Marathi audiences to the cinema halls.\nHe was a distinguished Marathi and English poet, critic and translator, filmmaker and my friend.", "pred_label": "__label__1", "pred_score_pos": 0.9847891926765442} {"content": "SA-TIED research on gender-based pay inequality makes news in South Africa\n\nAugust 2019\nTimothy Shipp\n\nA working paper from the SA-TIED programme is the basis for an article on the gender wage gap in South Africa. The paper, titled 'Distributional changes in the gender wage gap in post-apartheid South African labour market' by Jacqueline Mosomi examines the evolution of worker's earnings in South Africa since 1994 in order to calculate the difference between what men and women make. \n\nOn average, that divide has fallen over time but still remains substantial as women working in South Africa earn 16% less than men do. On average, woman are also more likely than men to work in lower paying occupations, despite having, on average, higher levels of education. In lower-paying jobs the difference between what men and women earn is not likely to be that great, but in median income positions the gap is bigger than the average. In high paying jobs, the difference between what men and women earn has fluctuated a lot over time, sometimes being less than the average and sometimes being more than the average. Since 2007, this gap has been growing rather than shrinking. \n\nFor full coverage of the paper, read the story at BusinessLive from Claire Bisseker, the economics editor at the Financial Times, or pick up this week's copy of the FT's print edition and turn to page 29. \n\nThe research has also been mentioned in a story from the Mail and Guard ('Why the gender pay gap persists')  and has been covered by Business Day ('SAs gender pay gap shrinks dramatically'). \n\n To read the research brief of the paper visit this page.\n\nTo download the working paper click here.", "pred_label": "__label__1", "pred_score_pos": 0.9984747767448425} {"content": "Augmented Reality For Time-Delayed Telsurgical Robotics\n\nTech ID: 30226 / UC Case 2019-272-0\n\n\nTeleoperation brings the advantage of remote control and manipulation to distant locations or harsh or constrained environments. The system allows operators to send commands from a remote console, traditionally called a master device, to a robot, traditionally called a slave device, and offers synchronization of movements. This allows the remote user to operate as if on-site, making teleoperational systems an ideal and often only solution to a wide range of applications such as underwater exploration, space robotics, mobile robots, and telesurgery.\n\nThe main technical challenge in realizing remote telesurgery (and similarly, all remote teleoperation) is the latency from the communication distance between the master and slave. This delay causes overshoot and oscillations in the commanded positions, and are observable and statistically significant in as little as 50msec of round trip communication delay.\n\nPredictive displays are virtual reality renderings, generally designed for space operations, that show a prediction of the events to follow in a short amount of time. It can be used to overcome the negative effects of delay by giving the operator immediate feedback from a predicted environment. Furthermore, it does not suffer stability issues that arise with delayed haptic feedback. Early predictive displays included manipulation of the Engineering Test Satellite 7 from ground control where the round trip delay can be up to 7sec and Augmented Reality (AR) rendering where the prediction is overlaid on raw image data. These strategies can be applied to telesurgery, but require overcoming the unique challenges in calculating and tracking the 3D environment for a full environment prediction, which includes non-rigid material such as tissue. Furthermore, prior work in the surgical robotics community highlights the need for active tracking rather than only relying on kinematic calibrations to localize the slave due to the millimeter scale of a surgical operation and the often utilized cable driven actuation.\n\nTechnology Description\n\nResearchers from UC San Diego present a complete system, and show through a user study that the result is an efficient AR rendering architecture for streaming stereoscopic displays. They call this a Stereoscopic AR Predictive Display (SARPD). We show that over 30fps for the stereoscopic AR rendering, including lens matching, and 24Hz for the slave-tool tracking from the EKF can be achieved while running simultaneously on a commodity GPU and using the robot operating system (ROS). A user study is carried out to demonstrate its ability to improve the speed of procedures without affecting error rates. Beyond telesurgery, this solution can be deployed to any teleoperated robot with visual feedback once calibrated. Furthermore, it does not require stereo cameras or displays since the real-time slave-tool tracking is done on a single monocular camera data stream.\n\n\nThere are many potential applications for augmented reality in robotic surgery, both in 'traditional' robotic surgery (non-remote telesurgery), and in remote telesurgery (tele robotics). This technology specifically applies to the potential for remote tele robotic surgery which could open up a wide field of remote telerobotic surgery in the military and civilian arenas.\n\n\n\nBoth prior works and the conducted user study on this system highlight the advantages when utilizing a predictive display for teleoperating under delay. The current findings show SARPD is decreases the time to complete tasks when operating under delay. Reduction of time for operations is critical for patient safety. Furthermore, the AR rendering allows for additional overlays to provide the surgeon additional information during an operation such as highlighting a region and critical patient information.\n\nState Of Development\n\nThe architecture for SARPD is complete, and the AR rendering procedure has been optimized by utilizing an OpenGL rendering procedure on GPU. Additional overlay renderings can be easily implemented into the current framework. In addition to using different 3D models to render the prediction, the tool tracking portion of the system can be interchanged with other methods to support different teleoperated robotic systems. While the user study that was conducted shows the importance of SARPD, further studies need to be done for both ex vivo and in vivo.\n\nIntellectual Property Info\n\n\nRelated Materials\n\n\nLearn About UC TechAlerts - Save Searches and receive new technology matches\n\nOther Information\n\n\nRobotic Surgery, Telemedicine, Augmented Reality, Telesurgery, Teleoperation, Predictive Displays, Surgical Robotics\n\nCategorized As", "pred_label": "__label__1", "pred_score_pos": 0.9895878434181213} {"content": "Gross Domestic Essay\n\n2647 WordsMar 4, 201511 Pages\nMalaysia's Economic Analysis Over 10 Years Introductory remarks The gross domestic product (GDP) is an internationally accepted measure of economic activity. The value of a country's overall output of goods and services (typically during one fiscal year) at market prices, excluding net income from abroad. Gross Domestic Product (GDP) can be estimated in three ways which, in theory, should yield identical figures. They are : (1) Expenditure basis: how much money was spent, (2) Output basis: how many goods and services were sold, and (3) Income basis: how much income (profit) was earned. These estimates, published quarterly, are constantly revised to approach greater accuracy. The most closely watched data is the period to period change in output and consumption, in real (inflation adjusted) terms. If indirect taxes are deducted from the market prices and subsidies are added, it is called GDP at factor cost or national dividend. If depreciation of the national capital stock is deducted from the GDP, it is called net domestic product. If income from abroad is added, it is called gross national product (GNP). In Malaysia, GDP compilation is the responsibility of the Department of Statistics, Malaysia (DOSM). Major users of GDP comprise of government agencies (e.g. Economic Planning Unit, Ministry of Finance, and Bank Negara Malaysia, private sector, universities, and international agencies (e.g. World Bank, United Nations, International Monetary Fund). However, statisticians are duty-bound to ensure that, like other statistics, GDP estimates comply with accepted standards, more specifically the System of National Accounts (SNA). SOURCE : WWW.TRADINGECONOMICS.COM i) Malaysian Gross Domestic Product (GDP). The Gross Domestic Product (GDP) in Malaysia was worth 312.44 billion US dollars in 2013. The GDP value of Malaysia represents 0.50\n\nMore about Gross Domestic Essay\n\nOpen Document", "pred_label": "__label__1", "pred_score_pos": 0.9904841780662537} {"content": "Scientists Use This Laser Flower Instead of Nuclear Explosions \n\nBy Attila Nagy on at\n\n\nYou'd be entitled to ask why they were in possession of such a piece of kit. So here's a brief explanation of what it can do:\n\nThis specialised laser instrument allows Los Alamos scientists to perform sophisticated nuclear experiments and gather significant amounts of data without a critical mass of plutonium. The data is used to help validate the extremely complex computer codes that reside on the laboratory's world class supercomputers. These codes along with thousands of experiments conducted across the laboratory allow Laboratory staff and ultimately the Director to assess the state and health of the Nation's nuclear deterrent and report those findings ultimately to the President of the United States.\n\nAnd if you want know more about the safety, reliability, and performance of the Los Alamos-designed nuclear bombs and warheads, you can read more here. [LANL]", "pred_label": "__label__1", "pred_score_pos": 0.9735378623008728} {"content": "What is Washability?\n\nWhat is Washability?\n\nWhat is Washability?\n\nThere are numerous factors you have to consider when selecting the right chairs for your restaurant, including the kind of restaurant you’re opening, your floor plan, and what types of seating you want to offer.\n\n\nHowever, another important consideration is not just what kind of chairs you’ll use, but how they are cleaned and how easy they are to clean. Let’s face it—when a large number of people are coming through your restaurant on a daily basis and eating food, spills and accidents are going to happen.\n\n\nWith this in mind, it might make sense to opt for a low maintenance chair material, such as wood, vinyl, or even plastic rather than upholstery, which requires more care and consideration. However, upholstered chairs may really be the best fit for the look you want to create.\n\n\nThis is where washability--the ranking of a fabric’s ability to be washed without bleeding, fading, or shrinking--becomes a major factor.\n\n\nNot all fabrics can be washed the same way, and using a cleaning agent that isn’t compatible with your seating’s upholstery could lead to significant damage, plus extra money spent on repairing the fabric or even purchasing replacement chairs.\n\n\nCleaning instructions are typically easy to get. Most manufacturers provide information about what types of cleaners are required either with your order or on a tag on the chair itself.\n\n\nKnowing what cleaners are the best fit for different kinds of fabric and how easy the fabric can be cleaned are the most important factors in preventing damage to your chairs and ensuring that your seating will last for years.\n\n\nAdvantages of Commercial Upholstery\n\nadvantage of commercial upholstery\n\n\nFirst, what are the advantages of using upholstered chairs when the cleaning process has so many technicalities? While plastic, vinyl, and wood chairs may require less effort to care for and have standardized cleaning requirements, there are several practical reasons why restaurant owners choose upholstery.\n\n\n • The furniture is often more durable.Often, the materials are of a higher quality and last longer than other more mass produced types of chairs.\n • It offers greater comfort.Customers can only sit on plastic or wooden chairs for so long. With meals often lasting for an hour (or more in upscale restaurants with multiple courses), upholstered chairs provide the most comfort, which can lead to a more satisfying experience.\n • It’s gaining popularity.While trends in restaurants previously swung toward industrial-chic metal stools and benches, upholstered booths and chairs are making a comeback, creating stylish vintage and modern looks.\n • It’s environmentally friendly. Reupholstering is more sustainablethan purchasing cheaper, mass-produced chairs that may wear out and be thrown away more quickly.\n\n\nAll in all, upholstered chairs have numerous advantages, and while they might seem on paper like they would be harder to maintain, it’s all about following directions for efficiently cleaning the fabric.\n\n\nUnderstanding Washability Rankings and Cleaning Codes\n\nTo understand how to clean your restaurant seating, you have to know the cleaning code for the material used on the chair, which is found on the tag for the fabric. You also need to know the ranking of how washable the fabric is.\n\n\nUsing the right cleaning agent for your type of upholstery is critical to preserving your chairs and ensuring that they last. Without the right washability requirements, you run the risk of bleaching the upholstery, causing it to fade, or having the colors run or bleed.\n\nwashability ranking\n\nWater-based cleaner (W)\n\nWashability Ranking: 5\n\nThese are the easiest fabrics to clean, requiring only spot-cleaning with a water-based shampoo or upholstery cleaner.\n\n\nWater-free or dry-cleaning solvents (S)\n\n\nWashability Ranking: 4\n\nand should be applied in a well-ventilated room. Using water-based or other cleaning products could cause the fabric to shrink or stain.\n\n\nA combination of either water-based or water-free cleaners (W/S)\n\nWashability Ranking: 3 \n\nEither option or a combination of both may be used after vacuuming or lightly brushing the fabric. Be sure to spot test to discover which works the best.\n\n\nSoap and water on a clean cloth (L)\n\nWashability Ranking: 5\n\nThis means the fabric should be cleaned only with these agents as soon as possible after a spill.\n\n\nVacuuming or brushing only (X)\n\nWashability Ranking: 1\n\nThis type of upholstery can be cleaned only by vacuuming or brushing and is incompatible with other cleaners, giving it a very low washability score.\n\n\nReferring to the manufacturer’s requirements is a must for knowing what washability is and how to best deal with spills and general cleaning.\n\n\nDon’t forget to spot test\n\n\nOnce you know what washability is and the specific code for your type of fabric, it’s always smart to double check to make sure you have the right option by spot testing the cleaner. This will allow you to be absolutely certain that it won’t cause the fabric to bleed or stain.\n\n\nAlways spot test on a small section of the fabric that won’t be readily visible to your customers. This is especially critical with upholstery that has a W/S code; since both water-based and non-water based cleaners can be used, it’s important to determine that both are really options or whether the fabric responds better to one or the other.\n\n\nWhat about stain repellent?\n\n\nMost commercial seating manufacturers treat their chairs with a stain guard product to make them more resistant to damage from spills. However, this by no means makes the chair indestructible and shouldn’t lull restaurant owners into a false belief that the cleaning process will take care of itself.\n\n\nThe primary function of stain guards is to buy you more time to clean up the spill and prevent it from setting into the fabric as quickly. Without making the effort to efficiently wipe up the mess, the food or liquid will set into the upholstery and a stain will form.\n\n\nAnother problem with stain repellents is that over time, they become less effective. It’s important to understand that while they are valuable tools for preventing stains, they aren’t meant to be a cure-all for stains.\n\n\nWhether your seating has stain protection or not, you still need to be aware of what cleaning agents work with the type of fabric on your chairs to efficiently and quickly clean up any spills or accidents.\n\n\nWhat else can I do to maintain my upholstery?\n\nmaintain upholstery\n\nKnowing what washability is and how cleaning codes apply to your specific chairs is a vital piece of the puzzle. However, there are other steps you can take to ensure that your upholstery lasts for years to come.\n\n\n • Vacuum!Regardless of which cleaner is recommended for your seating’s type of fabric, upholstery needs to be vacuumed daily to prevent the buildup of dirt. Some types of fabric may be vacuum-only, but this step is not optional for any upholstered seating.\n\n\nUsing the upholstery attachment on your vacuum, clean both the surfaces of the chairs and all sides of the cushions.\n\n\n • Flip Flop the Cushions.If your chairs have removable cushions that can be turned over, flip them to the other side from time to time to more evenly distribute the wear.\n\n\n • Be on the ball with cleaning up stains.It bears repeating--waiting to clean up spills increases the likelihood of stains, even with a stain repellent in place.\n\n\nClean up all spills and stains immediately after they happen by absorbing it with a clean cloth. The liquid should be blotted lightly without pressing down too hard, working toward the center of the affected area. This prevents the stain from spreading or becoming larger.\n\n\nIf you find that there is still a residual amount of liquid or a stain left over, you will need to spot clean it later using the appropriate cleaning agent for that type of fabric.\n\n\nDealing with upholstered chairs is complicated with lots of technicalities and sticking points depending on your seating’s type of fabric. However, knowing what washability is and how to appropriately clean and handle stains and spills can go a long way to making sure your chairs stay clean and well-maintained.\n\n\nTo help you keep your upholstered seating looking spotless, Moda Seating offers the Chair Care Checklist, a list of tips and tricks for maintaining your chairs that you can use as part of your cleaning procedures around the restaurant.\n\n\nThe checklist is designed to not only inform you of ways to ensure the safety and care of your chairs, but also to educate your employees on what to look for during daily maintenance.\n\n\nIf you have further questions about washability or caring for your upholstery, Moda Seating is also here to help. We would be happy to discuss your restaurant project or arrange a free phone call for a quote. Simply visit modaseating.com or call 1-800-275-3266 for more information.\n\n\nWe can’t wait to show you how Moda Seating can take your restaurant beyond the chair.", "pred_label": "__label__1", "pred_score_pos": 0.8605338335037231} {"content": "What is Green Plumbing and What Your Trusty Plumber Can Do For You\n\n\nConsumers are becoming more environmentally conscious these days, constantly finding better methods to protect the Earth’s natural resources in their own little way. Some use electric hybrid cars instead of gas-fueled vehicles, while others do not drive at all and simply use bicycles for their daily commute.\n\nAside from using energy-saving lights and appliances, many homeowners are making recycling a part of their regular routine. Another way to show care for the environment is by opting for green plumbing services.\n\nWhat is Green Plumbing?\n\nGreen plumbing refers to plumbing practices that benefit the environment. These are sustainable and eco-friendly plumbing solutions that can help you save more money by utilizing energy-efficient appliances. The main goals of green plumbing are recycling used water, promotion of functionality and sustainability of plumbing materials, and conserving water.\n\nWhat Can a Green Plumber do for You?\n\nGreen PlumbingWhen making the switch from traditional plumbing to green plumbing, the first step is to schedule a visit from a reputable plumbing company. They will evaluate your home and come up with a green system that meets your budget and needs. Licensed and certified green plumbers can answer any question you may have about their plumbing services and technologies that may be beneficial to your home.\n\nYour home will undergo a water audit, which is a 50-point inspection that helps green plumbers to identify the best ways to reduce your household water consumption. This process may involve upgrading existing fixtures and appliances to models that are more energy-efficient. Those who have much older homes can expect to have more replacements required as outdated models are notorious for being extremely wasteful of energy and water.\n\nFor instance, your current water heater may be upgraded into a hybrid unit for less energy consumption. Hybrid water heaters can generate more hot water compared to traditional ones. Another benefit to look forward to with hybrids is, they have ultra-low emissions, meaning there’s no carbon footprint to be left behind.\n\nHow to Find a Green Plumber\n\nIn the process of making your property more eco-friendly, you will need to get plumbing services from a licensed professional who adheres to green practices. A trustworthy green plumber should possess the necessary experience and training to provide high-quality plumbing without harming the environment and sacrificing functionality.\n\nBesides having excellent qualifications, a green plumber should have knowledge of solving clogs without using harsh substances, insulating pipes to prevent energy loss, conducting a water audit, and installing fixtures and accessories approved by WaterSense.\n\nTo start looking for a green plumber, you can check out the Green Plumbers certification program for a list of professionals. If you already have plumbers you trust, you may ask them about their green plumbing practices.\n\nConsider Green Plumbing Services\n\nAs water shortages and global warming continue to plague our modern society, it becomes everyone’s responsibility to become more mindful of the environment. So switch to green plumbing services for your home. By doing so, you can help reduce your home’s impact on the environment while enjoying huge savings on your utility bills.\n\nScroll Up", "pred_label": "__label__1", "pred_score_pos": 0.5586382150650024} {"content": "Tips for avoiding driver fatigue\n\nPosted by: Cal on 23/10/2013\n\nCategory: General\n\nMaintaining a healthy engine and car tyres is essential for safety on the roads - but what about your own state of mind?\n\nIt's important to know that driving while tired is incredibly dangerous. Some have even likened it to the effect of driving while intoxicated - your reaction times are slower, you are less aware of your surroundings and you are more likely to make poor judgement calls.\n\nThat's why it's essential you never drive when you think you feeling fatigued, as you are much more likely to be involved in an accident.\n\nHere are some tips on how you can avoid driver fatigue and stay safe.\n\nWays to avoid driver fatigue\n\nSymptoms of fatigue include yawning, drowsiness, impaired concentration and sore and tired eyes, according to the NSW government. \n\nTo avoid this, if you know you are a driving a long distance the next day, get a good sleep the night before. That way, you'll be as refreshed as possible before you hit the road.\n\nWith that in mind, it's also good to start a long drive in the morning, rather than late afternoon or into the evening and night. You'll be at your most awake in the earlier hours of a day, while later on your concentration and alertness are likely to have waned considerably.\n\nYou also need to pay attention to any medications you are taking. Certain medications mean you are not fit to drive at all and need to stay off the roads, while others simply have the potential to make you feel a little more tired. Always remain aware of the potential effects of any medications you're taking and adhere to their instructions.\n\nWhile you're driving, keep the air temperature of your car comfortable and maybe even a little on the cool side, to keep you alert. Circulate fresh air with your air conditioning system or by opening windows.\n\nAt least every two hours take a good rest break. This will involve getting out of the car, stretching and walking around to ensure good circulation, helping to keep you wakeful.\n\nOther tips include listening to upbeat music and sharing driving duties with another person and checking on each other.\n\nHowever the biggest takeaway message is that you should stay off the roads if you are at all fatigued. Driving while tired can put your life and the life of fellow road-users at risk.", "pred_label": "__label__1", "pred_score_pos": 0.8994635343551636} {"content": "Anabolic steroids deca\n\nShowing 1–12 of 210 results\n\nThe scientific name for this class of drugs is anabolic-androgenic steroids. It helps in increasing bench press strength, cycling performance and many other physical performances. Anabolic steroids dispensed for legitimate medical purposes are administered several ways including intramuscular or subcutaneous injection, by mouth, pellet implantation under the skin and by application to the skin. Declines in muscle mass resulting in a more normal body composition, may have caused body image concerns among former AAS abusers in this study as well as functional symptoms of hypogonadism, after AAS cessation. Justin Cunningham Founder, YoDish Bloggers YoDish is a movement of people who: Cannot compromise when it comes to anabolic steroids deca what they eat, be it by choice or medical necessity. Early symptoms of steroid abuse are, serious cystic acne, significant, sudden increases in body weight, headaches, dizziness, severe leg and abdominal cramping, and premature hair loss. Participants and Methods Study Design and Participants We conducted a community-based cross-sectional case-control study in the greater Copenhagen area from November 2014 to December 2015.\n\nIt was in the 1950s though when their potential for athletic enhancement and for abuse was first realised, when they were used by Olympic weightlifters. That is one of the reasons some people have good luck with the low carb diets due to the high amounts of fat. A spokesman for Fitness First said the gym did not tolerate the use of drugs and was \"increasing monitoring procedures anabolic steroids deca to identify any unacceptable or illegal behaviour\". It acts by blocking enzymes involved in the aromatization gradually blocking the production of estrogen in the body. Every now and then, something new gets added into the mix, such as Aromasin to combat aromatization. As testosterone will in most cases necessarily be the foundation of any cycle or even used alone, regardless of the stack two weekly injections of equal doses will prove to be efficient and provide stable testosterone levels. Many are similar some that have been used for years (or even decades) while others are newer. The patient suffered intractable hiccups postoperative day one, resistant to Thorazine.\n\nJust select the drug, the method of payment and fill in the information for delivery. Regardless of what dose you use, you will find that Testosterone cypionate is well tolerated by the body and you can use it for long cycles. Continued steroid misuse can act on some of the same brain pathways and chemicals that are affected by other drugs, including dopamine, serotonin, and opioid systems. As you can see, there is either no difference between protein only. Conclusion In anabolic steroids deca summary, the combination of rhGH and testosterone injections in conjunction with rehabilitative therapy consisting of joint manipulation and exercise therapy may hold promise for a number of patients with CLBP, helping a anabolic steroids deca greater number of individuals than injections, manual therapy, or exercise alone.\n\nSent emails and they are anabolic steroids deca bouncing back, damm they were so good for so long. This is why creatine supplementation is a good choice for any fat loss plan. Further, the performance athlete will need to inject the hormone far more frequently in order to maintain not only stable levels but also peak levels of testosterone. Research studies have reported increases in isometric strength and body weight in steroid users.\n\nanastrozole for sale\n\nThough you may feel fewer side effects than those who stack 300-500 mg per week (75-125 mg every other day), and in particular to the first course of anabolic steroids. You get will depend on the objectives you are class C drugs, which says showed him how to use safely. Combined with different steroids, but antacids such as Tagamet and Zantac and the body started to recover.\n\nYears after the drug the possible causes following 1 h of heavy loading. After several years bodybuilding supplements are dietary that you are experiencing hair loss as a result of your steroid usage is to stop using steroids. Find steroids in pharmacies and.\n\nShow that, unlike aerobic exercise, weight the body energy to deal post Take Your Body Over 509,389 bottles sold. Not commonly associated with mutations it makes you wonder just how many popular oral steroids. HGH and this never drug market, available by prescription, was reinforced in the sensitivity as the drug is used for several weeks. May provoke negative reaction of our organism while using not intended to cover all possible uses usually either in the form of pills, tablets and liquid suspensions or emulsions. Point about anabolic pump enough blood for your body) if you asthma, chronic lung disease, spasms in the.", "pred_label": "__label__1", "pred_score_pos": 0.9353895783424377} {"content": "What Did Neil Armstrong Really Say?\n\nOn July 20, 1969, an estimated 650 million people watched in suspense as Neil Armstrong descended a ladder towards the surface of the Moon.\n\nAs he took his first steps, he uttered words that would be written into history books for generations to come: “That’s one small step for man. One giant leap for mankind.”\n\nOr at least that’s how the media reported his words.\n\nBut Armstrong insisted that he actually said, “That’s one small step for a man.” In fact, in the official transcript of the Moon landing mission, NASA transcribes the quote as “that’s one small step for (a) man.”\n\nAs a linguist, I’m fascinated by mistakes between what people say and what people hear.\n\nIn fact, I recently conducted a study on ambiguous speech, using Armstrong’s famous quote to try to figure out why and how we successfully understand speech most of the time, but also make the occasional mistake.\n\nOur extraordinary speech-processing abilities\n\nDespite confusion over Armstrong’s words, speakers and listeners have a remarkable ability to agree on what is said and what is heard.\n\nWhen we talk, we formulate a thought, retrieve words from memory and move our mouths to produce sound. We do this quickly, producing, in English, around five syllables every second.\n\nThe process for listeners is equally complex and speedy. We hear sounds, which we separate into speech and non-speech information, combine the speech sounds into words, and determine the meanings of these words. Again, this happens nearly instantaneously, and errors rarely occur.\n\nThese processes are even more extraordinary when you think more closely about the properties of speech. Unlike writing, speech doesn’t have spaces between words. When people speak, there are typically very few pauses within a sentence.\n\nYet listeners have little trouble determining word boundaries in real time. This is because there are little cues—like pitch and rhythm—that indicate when one word stops and the next begins.\n\nBut problems in speech perception can arise when those kinds of cues are missing, especially when pitch and rhythm are used for non-linguistic purposes, like in music. This is one reason why misheard song lyrics—called “mondegreens”—are common. When singing or rapping, a lot of the speech cues we usually use are shifted to accommodate the song’s beat, which can end up jamming our default perception process.\n\nBut it’s not just lyrics that are misheard. This can happen in everyday speech, and some have wondered if this is what happened in the case of Neil Armstrong.\n\nStudying Armstrong’s mixed signals\n\nOver the years, researchers have tried to comb the audio files of Armstrong’s famous words, with mixed results. Some have suggested that Armstrong definitely produced the infamous “a,” while others maintain that it’s unlikely or too difficult to tell. But the original sound file was recorded 50 years ago, and the quality is pretty poor.\n\nCheck out the audio of Armstrong’s first words on the Moon at full speed and half speed:\n\n\nSo can we ever really know whether Neil Armstrong uttered that little “a”?\n\nPerhaps not. But in a recent study, my colleagues and I tried to get to the bottom of this.\n\nFirst, we explored how similar the speech signals are when a speaker intends to say “for” or “for a.” That is, could a production of “for” be consistent with the sound waves, or acoustics, of “for a,” and vice-versa?\n\nSo we examined nearly 200 productions of “for” and 200 productions of “for a.” We found that the acoustics of the productions of each of these tokens were nearly identical. In other words, the sound waves produced by “He bought it for a school” and “He bought one for school” are strikingly similar.\n\nBut this doesn’t tell us what Armstrong actually said on that July day in 1969. So we wanted to see if listeners sometimes miss little words like “a” in contexts like Armstrong’s phrase.\n\nWe wondered whether “a” was always perceived by listeners, even when it was clearly produced. And we found that, in several studies, listeners often misheard short words, like “a.” This is especially true when the speaking rate was as slow as Armstrong’s.\n\nIn addition, we were able to manipulate whether or not people heard these short words just by altering the rate of speech. So perhaps this was a perfect storm of conditions for listeners to misperceive the intended meaning of this famous quote.\n\nThe case of the missing “a” is one example of the challenges in producing and understanding speech. Nonetheless, we typically perceive and produce speech quickly, easily and without conscious effort.\n\nA better understanding of this process can be especially useful when trying to help people with speech or hearing impairments. And it allows researchers to better understand how these skills are learned by adults trying to acquire a new language, which can, in turn, help language learners develop more efficient strategies.\n\nFifty years ago, humanity was changed when Neil Armstrong took those first steps on the Moon. But he probably didn’t realize that his famous first words could also help us better understand how humans communicate.\n\nMelissa Michaud Baese-Berk is Associate Professor of Linguistics, University of Oregon. This article was originally published at The Conversation and has been republished under Creative Commons. Read the original article.", "pred_label": "__label__1", "pred_score_pos": 0.6988608837127686} {"content": "Best alternative medicine for acid reflux 99\n\nSigns herpes outbreak is coming\n\nThe multi-sensory program is part of the Les Dames d’Escoffier Washington, DC Chapter’s 7th Bi-Annual Symposium called Celebrating FOOD! As the popularity of healthy, ethnic cooking home grows, our spice rack should expand to accommodate the seasonings give vegan dishes their unique characters. When buying herbs and spices by weight, buy only what will fit into an average-size spice jar. Keep dried herbs and spices in a place in your kitchen that is away from heat and moisture.\nWhen substituting fresh herbs for dry, use about three times the amount of fresh herb as the dry. Introduce dried herbs and spices into your recipe as early in the cooking process as possible, so that they have a chance to develop flavor. ANISE or ANISEED is an aromatic spice that imparts a distinct flavor of licorice and is commonly used to make the liqueurs ouzo, anisette, and pernod. ALLSPICE is the hard berry of an evergreen tree native to the West Indies and Central America.\nBASIL is one of the most relished of herbs and one that has an important place in herbal lore and legend, spanning many ages and cultures. BAY LEAVES are the whole, dried leaves of the bay laurel tree and are most useful in long-simmering recipes, such as soups and stews, where their flavor has a chance to permeate.\nCARAWAY SEEDS, the seeds of a biennial plant native to Europe, have a sharp, distinctive taste that puts them in the category of flavorings that are either loved or intensely disliked. CAYENNE PEPPER is perhaps the hottest of ground spices, ground and dried from a very hot variety of a pepper of the capsicum genus.\nCHIVES are a member of the lily family, whose relatives include onions, scallions, and garlic. CILANTRO is an herb that is never available in dried form, since its pungent flavor and aroma seem to dissipate almost entirely when dried.\nCLOVES are a pleasant, sweet spice like cinnamon, but have a stronger flavor and a sharp aroma. CUMIN is the golden-brown seed of a small herbal plant native to the Mediterranean, Middle East, and North Africa.\nCURRY POWDER is a blend of spices used in Indian cuisine with some constant ingredients and some that vary. DILL WEED and DILL SEED are both products of a tall, feathery annual plant that is a favorite kitchen-garden herb.\nFENNEL SEED is a small, elongated seed that, used whole or ground, imparts a subtle anise or licorice flavor. FENUGREEK is a less common aromatic spice and is actually a legume, something like a mung bean.\nFIVE-SPICE POWDER, a blend of spices used in Oriental cookery, is increasingly available in natural-food stores as well as in spice shops and Oriental groceries. MACE, the filigreed, red encasement surrounding the nutmeg kernel, is dried and ground for use as a spice. MARJORAM is an herb so closely related to oregano that the two share the botanical name origanum, which is from the Latin meaning “joy of the mountain.” Marjoram is slightly sweeter, yet somewhat sharper than oregano, so inasmuch as the two may be used interchangeably, marjoram should be used sparingly.\nMINT is the general term used for a variety of highly aromatic herbs, the most common of which, for culinary purposes, are peppermint and spearmint. MUSTARD is the tiny, round seed of an annual plant native to Asia and is the spice used to make the popular condiment of the same name.\nROSEMARY is the slender leaves of a small evergreen shrub and has a well-known legacy in folklore as the herb of remembrance. SAFFRON, by far the most expensive of all spices, is derived from the dried, brilliant-yellow stigma of the autumn crocus. TURMERIC is the product of a dried, ground, fleshy root and is prized for its brilliant yellow color, much as is saffron, although turmeric is not nearly so expensive. For lots more features on healthy lifestyle, explore VegKitchen’s Healthy Vegan Kitchen page. I’ve been searching for a book of some sort that will give a list of herbs and spices and what foods to use them with as I just love experimenting with foods and spices and herbs .\nI am spice ignorant but for some time have been intrigued by them, Their uses, origination and or such. Herbs are processed from fresh and quality dried plant material and are extracted with organic grain and alcohol. The book makes a perfect holiday gift for that curious baker while her Field Guides to Produce, Meat, Herbs & Spices, and Seafood are considered lifesavers by culinary students, food writers, chefs, and home cooks. Volumes can be written on the healing aspect of herbs (in fact see our review of the terrific book, Healing Spices), the focus here is culinary. Add fresh herbs toward the middle or even the end of the cooking if you’d like to retain their pronounced flavor. Anise is used in cookies and cakes, and a sprinkling of the seeds adds an unusual twist to fruit salads, particularly those utilizing citrus fruits. Its name quite possibly reflects its flavor, which as a hint of the flavors of several spices, including cinnamon, nutmeg, and cloves. In the summer, the intoxicating scent of fresh sweet basil fills produce markets, and its brief season should be fully enjoyed. Its warm, somewhat “woodsy” character lends itself especially well to recipes that contain tomatoes, beans, corn, and potatoes. They are best known for adding zest to rye and pumpernickel breads; try expanding their use to flavor recipes emphasizing potatoes or other root vegetables (such as parsnips or turnips) as well as cabbage varieties.\nFresh chives are rarely seen in produce markets, but are easily grown in the kitchen garden—in fact, they proliferate like mad. Sometimes referred to as Spanish or Chinese parsley, this is the same herb whose seeds are the spice coriander. One of the earliest spices recorded, cinnamon is also one of the most familiar and commonly used. Cumin’s spicy and pleasantly hot flavor makes it a favorite seasoning in several ethnic cuisines; its zesty quality reduces the need for salt. Indian specialty-food stores and spice shops are good places to get fresh, aromatic curry blends with a choice of varying degrees of hotness. The seeds, less commonly used than the leaves, are used in pickling and may also be used as a milder substitute for caraway seeds in breads or as a topping for potato, cabbage, and casseroles.\nThe same five spices are not always used, but some of the most common components are anise, fennel, cloves, black pepper, cinnamon, and ginger. A member of the lily family and related to onions, shallots, and the like, garlic has long been esteemed equally for its medicinal properties and its culinary qualities.\n\nUse marjoram in conjunction with other dried herbs to flavor vegetable dishes, Italian-style tomato sauces, bean stews, pizza sauces, soups, grain dishes, and vinaigrette salad dressings. The fresh scent and menthol flavor of the mints are delightful, and they are popular and prolific kitchen-garden herbs.\nIts slightly sweet, warm flavor adds savor to tomato-based sauces, pastas, French-style salad dressing, and potato dishes. Fortunately, fresh parsley is easy to grow on the windowsill and is also available inexpensively year-round, so there is little reason to buy this nutritious herb in dried form.\nPepper is the second most commonly used seasoning after salt, not surprisingly, so its uses are too numerous, and too obvious, to enumerate here. Combining the seeds with the dried flesh of the pepper, this extremely hot spice is used in some of the incendiary dishes of India, Southeast Asia, Mexico, and in Cajun recipes from Louisiana. You’ll certainly remember rosemary if you don’t use it sparingly, since its strong, piney flavor can be overwhelming. Summer savory, an annual plant, is more widely available and has a milder, sweeter flavor than the perennial winter savory.\nOf course it depends very much on how long they’ve been stored, and how long since they were ground. For further reading, you may find my book The Indian Kitchen useful- it gives information about 100 ingredients of the Indian Kitchen including spices and herbs.\nIt has been so fun to watch his reaction to the newflavor each spice brings individually to a dish. The process of making extracts involves careful detail so that the potency and superior quality can be maintained. Arrange whole rose geranium leaves in the bottom of prepared pan sticking them on with a dab of soft butter. This section will give a brief overview of those seasonings most commonly used to flavor global whole food recipes. Most go a very long way and are at their optimal flavor for up to a year, after which they begin losing their potency.\nThough basil makes an excellent dried herb whose sweet-and-spicy flavor is welcome in many dishes, the result is very different when using it fresh. These aromatic seeds have a flavor that is hard to describe, but is appropriate for both sweet and savory dishes. Cayenne pepper lends itself to vegetable or bean stews, curries, chilies, spicy cold noodle dishes, and hot-and-sour dishes. The consistent ingredients, along with chili pepper, often include cumin, oregano, and garlic, but may also contain salt and other seasonings as well.\nA sweet, aromatic spice, cinnamon is often a component of curry blends and is a fixture in many baked goods, including custards, puddings, cakes, cookies, and fruit pies. Stewed fruits benefit from a handful of whole cloves while they are simmering, and fragrant pilafs are made even more so by addition of some whole cloves. It’s usually one of the three main components of curry mixes along with cumin and turmeric.\nYou will find cumin used extensively in curry blends and chili powder; in those spice mixes or on its own, it is an important seasoning in Indian and Mexican cuisines. Fresh dill is available for a few months out of the year, but may be hard to come by during the colder months. Fenugreek appears as an element of Indian curries and chutneys and is used as a pickling spice in the Far East.\nThe overall effect is sweet and slightly spicy, with a licorice undertone, since either anise or fennel is always present. Ground ginger should generally not be considered a substitute for fresh ginger, but rather a hot-sweet, fragrant spice more appropriate to baked goods. In Indian cuisine, fresh mint is commonly used in chutneys and in the palate-cooling relishes known as raitas, to add a refreshing note. Use dry mustard in soups, salad dressings, grain dishes, potato dishes, chilies, and curries.\nA sweet spice, nutmeg is a familiar flavoring in eggnog, custards, pumpkin and sweet-potato pies, and spice cakes. Its bright red color makes it an excellent garnish sprinkled on casseroles, vegetable pies, dips, and pates. The fresh, mild herbal flavor of parsley is welcome in many culinary categories, including salads and salad dressings, soups, grain and bean dishes, casseroles, omelets, vegetable dishes, and herb breads. It is worth noting, however, that it’s preferable to buy whole black or white peppercorns and grind them as needed than to buy pre-ground pepper. Poppy seeds come in colors ranging from white to gray to black, but the best ones are the darkest. Saffron is primarily used in rice dishes, such as fruit-and-nut pilafs or the Spanish classic arroz con pollo, and is also utilized in some French and Middle and Far Eastern cookery and sometimes, but less commonly, in Indian cuisine. When preparing foods such as TVP, tempeh, or seitan, all of which can be used as meat substitutes, seasoning with sage can add to the meatlike sensation. Savory is a useful seasoning that imparts a subtle flavor that tastes like a cross between parsley and thyme. Thyme is an important seasoning in classic French and Creole recipes and is good used whenever a mixture of dried herbs is called for. Would I have to buy them all fresh for a better taste, or are there some that taste just as potent if they’ve been stored?\nBut his eyes really light up when he starts being able to pick up the taste of single spices in the mixtures with food we have just made or ordered.\nIm also in the process of writing a food journal which friends of forever asked me to do as I create nearly all my own cooking recipes and even give guidance and instruction on cooking and uses of herbs and spices ad their benefits.Im also attempting to write a blog post on word press but my site is not fully ready. If you happen to live in a sensitive lifestyle and are unable to find free time to make your own preparations, then liquid extracts are the most practical products for you. Herbal extracts are sold as dietary supplements and alternative medicine and commonly used for flavoring in baking and other cooking much like vanilla extract. The mildly spicy-sweet flavor of ground allspice enhances apple desserts, banana breads, spice cakes, cookies, chutneys, and recipes utilizing squash, pumpkin, or sweet potatoes. Fresh basil is the main component of pesto sauces and has a special affinity with tomato-based pasta sauces and fresh tomato salads (as in the classic tomato, mozzarella, and basil salad). The whole seeds lend an aromatic quality to grain dishes, especially fruit-and-nut grain pilafs as well as curries containing potatoes or peas. The flavor of chives is very much akin to that of scallions, yet more delicate, which makes them delightful to use raw when available fresh. Italian parsley is often recommended as a substitute for cilantro, although the effect is not the same at all.\n\nSquash, pumpkin and sweet potatoes, whether in pies or as side dishes, always benefit from a sprinkling of cinnamon. You may leave the cloves in the dishes you are making, but you may not enjoy biting into one, since the flavor is somewhat bitter. The most notable and constant elements of curry powders are cumin, coriander, and turmeric; the variables may be any of cayenne pepper, mustard, fenugreek, along with some sweet aromatics such as cinnamon, nutmeg, cloves, or cardamon. Five-spice powder, subtly used, is a nice addition to grilling sauces, black bean sauce, and miso sauces. It appears extensively in the cuisines of Italy, India, Mexico, the Orient, Southeast Asia, the Middle East, and many more.\nGingerbread is one that comes to mind immediately, but it is almost as common as spice for pumpkin and squash pies. Ginseng is frequently marketed as a universal tonic for well-being, a general panacea for numerous ailments, and for its supposed powers as an aphrodisiac. It is often one of the spices used in curry mixes, and has a special affinity with winter squashes and spinach. In dried form, it is a widely available, inexpensive herb useful in traditional Mexican, Italian, Greek, and Spanish recipes.\nWhen buying parsley, choose the Italian, flat-leafed parsley for cooking, since it’s more flavorful, and reserve the use of the curly-leafed parsley for garnishing. Their nutty flavor makes them a special addition to spice cakes and seed cakes and an excellent topping for breads and rolls. In the vegetarian realm, it may be used to flavor vegetable stews, herb breads, and tomato soups or sauces.\nSoups, vinaigrettes, grain and bean dishes, corn dishes, and tomato sauces all benefit from the distinctive flavor of thyme. Combine flour, salt, and baking soda and reserve.  Cream butter and sugar until light and fluffy. With color photographs of more than 200 different international seasonings, you’ll soon be flavoring your dishes like a pro. Dried basil is good in soups, marinades and vinaigrettes, grain dishes, herb breads, and omelets.\nIn ground form, cardamom may be used in the same sort of baked goods in which you’d use allspice—squash, pumpkin, or sweet-potato pies, for example, or batter breads. It’s a logical addition to tomato-based enchilada sauces, but try adding it to a tomato-based pasta sauces as well to add a warm note. Fresh chives add flavor to baked potatoes, potato salads, and in fact, most any fresh vegetable salad. Whole cinnamon sticks are nice to add to stewing fruits and simmering beverages, such as hot mulled cider. Ground cloves are often used in conjunction with cinnamon in baked goods, fruit pies, and squash, sweet-potato, and pumpkin recipes.\nAlmost any good Indian cookbook will give several variations of curry spice blends, which may be made at home by grinding whole spices or, even simpler, by combining good, fresh ground spices. Try green beans or root vegetables such as parsnips with a hint of the whole or ground seeds. Fresh garlic is almost always preferable, but garlic powder is an acceptable substitute in breading mixes for frying foods or in blended dips, where the flavor of raw garlic may be too strong.\nGround ginger is also a pleasing enhancement for apple desserts, as well as for sweet-potato or winter-squash side dishes. No conclusive proof is available for its claims, but the commercial value of ginseng continues to grow.\nIt’s also a common addition to salad dressings and does much to enhance the flavor of soups, grains, bean dishes, and pasta sauces. In addition, poppy seeds are a nice seasoning for noodle dishes, cabbage dishes, casseroles, and dishes utilizing root vegetables such as parsnips.\nSavory is known traditionally as the bean herb, because its flavor is thought to have a special affinity with most beans. Tarragon makes ordinary mayonnaise special and adds an unusual touch to omelets and tomato dishes. I never gave thought to the dried herb, until you mentioned it above- always used it fresh. Im from Jamaica where spices and herbs are a must in our cooking where some of these spices are also grown, you are blessed, thanks again. Diners choose what ever they require from share dishes and generally add it to their own plate of rice. Award-winning chef Aliza Green shows the basic history of these spices (saffron used to be worth more than gold!), its season (if applicable), names in other languages, a recipe featuring the seasoning, and much more. Chili powder is good in some Oriental-style sauces such as peanut or sesame sauce for noodles. Use dried chives in dips, dressings, soups, and sauces, where they will have a chance to reconstitute.\nCloves enhance the flavors of apples and bananas in desserts and are occasionally used in curries and chutneys. Corn and cabbage recipes as well as vegetable relishes and hot-sweet chutneys are enhanced by the flavor of coriander. Aside from its obvious use in simplified Indian curry recipes (authentic Indian dishes usually combine individual curry spices in the recipe rather than using prepared curry powder), use curry powder to add zest and color to simple grain pilafs, lentil soups and stews, potato dishes, and egg recipes such as quiches or frittatas. Few summer salads are more simple or more refreshing then sliced cucumbers with coconut yogurt and chopped dill. It has been brought under cultivation both in Asia (particularly in Korea) and in North America. There is no substitute for fresh mint in beverages or as a garnish for fresh strawberries or melons, fruit salads, and chocolate puddings.\nCilantro adds an unusual zest to pinto bean stews, Spanish-style tomato sauces for enchiladas, tacos and the like, curried vegetable stews, and corn dishes such as corn-stuffed peppers. A pinch of cumin in breads is an old European tradition, and this works particularly well in cornbread. Fresh or dried, dill is an excellent herb in hot and cold soups and is an offbeat addition to omelets.\nGinseng is now being incorporated into soft drinks marketed by natural-food companies and is also available in the form of liquids and powders (to be used in beverages or as tea) as well as in capsule form to be taken as a supplement. You probably love Thai food but you order the same things all the time because you dona€™t know what to get that you might like.\n\nHpv vaccine not effective\n999 traditional chinese medicine\nImmune to herpes simplex 1 outbreaks\n\n 1. Krasavcik 05.03.2014 at 14:43:22\n And might make those contaminated with the virus two-to-3.\n 2. maria 05.03.2014 at 20:29:50\n The Varicella Zoster virus oral, vaginal, or anal intercourse cause sores or breaks within the.\n 3. ASad 05.03.2014 at 22:57:28\n Lack of crusts by sooner or later (seven versus eight days) in adults 1 and.\n 4. RIHANA 05.03.2014 at 15:15:12\n Cease VALTREX (valacyclovir hydrochloride) medicines for both they do not have an effect on its.\n 5. HIP_HOP_E_MIR 05.03.2014 at 20:56:56\n Out by means of the identical pathway, inflicting clinically, herpes is often recognized are going.", "pred_label": "__label__1", "pred_score_pos": 0.7415181994438171} {"content": "A Powerful Time of Transition\n\nWinter is a time to be silent, stare at the crackling fire, and contemplate what inspires you for the new year. Spring is a time to get outside and soak up the sun. Bulbs slowly start sprouting and birds begin their cheerful chirping. It’s a great time of rejoicing because everything is sprouting and coming to life. As the weather gets nicer, the principles of Ayurveda encourage you to slowly transition your meals to lighter foods such as greens.\n\nWe are about to experience a very potent opportunity for establishing intention during this time of transition from winter into spring, with a full moon and the Spring Equinox in the northern hemisphere today (March 20th, 2019). The full moon will also be a supermoon, which is closer to the Earth.\n\nThis is the perfect time to plant your seeds of intention and nurture them with your thoughts, feelings and actions so that they grow into something beautiful. What is it that you want to bring into fruition? What is the thread or idea that you will follow?", "pred_label": "__label__1", "pred_score_pos": 0.6605850458145142} {"content": "Acta Cogitata: An Undergraduate Journal in Philosophy\n\nArticle Title\n\nOzturk's Disanalogies\n\n\nIn this essay I will argue that Burkay Ozturk fails to adequately defend his negotiative theory of identity in his article, “The Negotiative Theory of Gender and Identity and the Limits of First- Person Authority.” I argue that the analogies he presents to support his theory and problematize first person authority fall short of doing so because there are significant differences between the cases he presents to elucidate intuitive acceptance or rejection of another’s self-identity. The aim of this essay is to elucidate disanalogies in Ozturk’s series of cases that could explain why the cases should be treated differently, address possible objections, and respond accordingly to demonstrate that the analogies between his cases do not hold. I will argue that the analogies between the cases do not hold due to differences in (1) the morality of actions taken, (2) the strength of the relation between each identity and the action, and (3) the harm caused to those with the same self-identification.\n\nIncluded in\n\nPhilosophy Commons", "pred_label": "__label__1", "pred_score_pos": 0.9999462962150574} {"content": "The displacement of the reciprocating roller follower, when it has contact with the straight flanks of the tangent cam, is given by (where r₁ = Minimum radius of the cam, r₂ = Radius of the roller follower, and θ = Angle turned by the cam from the beginning of the follower displacement)\n\nA. (r₁ - r₂) (1 - cosθ)\n\nB. (r₁ + r₂) (1 + cosθ)\n\nC. (r₁ - r₂) [(1 - cosθ)/cos θ]\n\nD. (r₁ + r₂) [(1 - cosθ)/cos θ]\n\n\nYou can do it\n 1. The contact ratio for gears is\n 2. Which of the following is an inversion of Single slider crank chain?\n 3. The critical speed of a shaft depends upon its\n 4. In a drag link quick return mechanism, the shortest link is always fixed. The sum of the shortest and…\n 5. A slider moves at a velocity v on a link revolving at ω rad/s. The coriolis component of acceleration…\n 6. The engine of an aeroplane rotates in clockwise direction when seen from the tail end and the aeroplane…\n 7. The working depth of a gear is the radial distance from the\n 8. The purpose of a link is to\n 9. The contact ratio is the ratio of\n 10. Which of the following is an inversion of a double slider crank chain?\n 11. Longitudinal vibrations are said to occur when the particles of a body moves\n 12. For the same lift and same angle of ascent, a smaller base circle will give\n 13. The Klein's diagram is useful to find\n 14. In a Hartnell governor, the stiffness of the spring is given by (where S1 and S2 = Spring forces exerted…\n 15. In the two rotor system as shown in the below figure (I₁ < I₂), a node of vibration is…\n 16. A completely constrained motion can be transmitted with.\n 17. If D₁ and D₂ be the diameters of driver and driven pulleys, then belt speed is proportional…\n 18. Which of the following statement is correct?\n 19. Length of arc of contact is given by\n 21. Effort of a governor is the\n 23. When the two elements of a pair have __________ when in motion, it is said to a lower pair.\n 24. When the two elements of a pair have a surface contact when relative motion takes place and the surface…\n 25. The D-slide valve is also known as\n 26. For dynamic balancing of a shaft\n 28. The motion of a shaft in a circular hole is an example of\n 29. The coefficient of fluctuation of speed is __________ of maximum fluctuation of speed and the mean speed.\n 30. In a rigid link OA, velocity of A w.r.t. O will be", "pred_label": "__label__1", "pred_score_pos": 0.5517162084579468} {"content": "\nPlease refer to the text in Russian as a source.\n\nSK called guilty of SSJ 100 crash in Sheremetyevo\n\nSK called guilty of SSJ 100 crash in Sheremetyevo\nPhoto: sledcom.ru\n\nThe Investigative Committee of Russia has completed an investigation into the criminal case of the crash of the Sukhoi Superjet 100 aircraft at Sheremetyevo Airport. The department was named the culprit of the crew commander Denis Evdokimov.\n\nAs the Kommersant citing a source, by the time the pilot was charged with denis Evdokimov’s violation of the rules of flight or preparation for them, resulting in the death of two or more persons, the investigation received more than 100 examinations: medical, genetic, flying, psychological and linguistic.\n\nAccording to investigators, on May 5 after taking off, lightning hit the SSJ. This led to the transition to manual control of the board and caused communication problems for pilots. According to the participants in the investigation, Evdokimov landed in excess of vertical and horizontal speeds, with a large angle of attack. This led to a scam - bouncing the aircraft from hitting the runway. During them, a broken landing gear rack broke through the fuel tank, there was a leak of kerosene and its ignition.\n\nAccording to the IAC, this was the fourth case of landing the SSJ in manual mode, while in previous cases the emergency did not occur. Denis Evdokimov and his lawyer do not agree with the conclusions of the investigation. They assure that the plane threw to the sides when landing, because it did not obey the onboard control stick. According to the pilot, the fire should not have happened, because with a hard landing at the SSJ the chassis had to bounce to the side. He also believes that passengers could have time to leave the cabin, but because of the opened door there was an airflow and the fire quickly spread across the plane.\n\nAccording to the lawyer, the defense requested the appointment of examinations and studies, including those related to the protection of the aircraft from lightning strikes and damage to the landing gear, but was refused. The investigation and the petition for initiating a criminal case against the participants in the emergency rescue operations, which, according to the defense, appeared late with respect, rejected.\n\nThe disaster at Sheremetyevo occurred on May 5. SSJ 100 Emergency landed and caught fire41 people died. Investigators believe main cause accident piloting error, but experts doubt it and believe that the mistakes made even with certification plane.\n\nIAC published preliminary report following an investigation into the causes of the disaster and indicated that traces of a lightning strike were found on the plane. After that, the Ministry of Industry and Trade of Russia stated that machinery and equipment worked normally with the exception of the moment of lightning strike, landing also took place as usual. Honored Test Pilot Alexander Garnayev said that experts drown their fellow pilots and announced the autopsy of significant technical detailsthat should affect the course of business.", "pred_label": "__label__1", "pred_score_pos": 0.6583057641983032} {"content": "Carlena J. Evans M.Ed\n\n\n\nA visionary with extraordinary purpose, Carlena is a vessel whose task is to ensure that every child and teen on the planet realizes their worth, potential, and abilities as early as possible. Enriched with an amazing scholastic and professional resume, Carlena graduated Magna Cum Laude with a B.A. in Communication, and a minor in English, from Cheyney University. Unrelenting in her work ethic, she continued her matriculation through post-secondary education and was awarded her Master of Education from University of Pittsburgh in the spring of 2010. She accomplished this feat all while defying the odds of being a single parent.\n\nCarlena J. Evans, M.Ed. possesses an incomparable desire for youth and adults alike to realize that nothing is impossible! Gifted with a heart of gold, her genuine efforts are unparalleled in her advocacy for children, students, women, and mothers everywhere. Despite Evans' infinite successes, she never fails to acknowledge, \"Kidsplosion is GOD'S vision and I am honored to be used.\"", "pred_label": "__label__1", "pred_score_pos": 0.9852721095085144} {"content": "Coed Varsity Track · Tigers Last Chance….to qualify for State!\n\n  Place Points\nMillennium High School 0th 0\n\nLast official meet to get betters times and marks to qualify for the big stage…STATE CHAMPIONSHIPS!\n\nJaelon Taylor, senior, placed 2nd overall in the 100m (11.42)\nTalmadge Tanks, sophomore, placed 7th overall in the 100m (11.83) and 8th overall in the 400 (55.31)\nMyles Goodman, senior, placed 3rd overall in the 200m (22.89) and a bittersweet 4th place in the 400m (50.44)\nJalan McKeaver, junior, made his debut after dealing with a foot injury, placing 2nd place in the 200m (22.88)\nJaeydn Carpenter, freshman, placed 4th place in the 200m (23.20) and 2nd place in the 400m (50.19)\nIn the 800m the following two athletes ran PRs, Josiah Grant, junior, (2:05.37) and Tyler Rafferty, freshman, (2:04.79).\nThe 1600m, the following athletes ran PRs: Luc Guillemette, senior (4:58.29), Alex Bobian, junior (4:58.63), and Michael Rubio, junior (4:59.66).\nIn the 3200m, Alex Bobian placed 2nd overall (11:06.64), Michael Rubio placed 5th overall (11:20.95) and Benjamin Anastasoff, sophomore, 12:18.93.\n4×100 Relay (Jaedyn Carpenter, Jaelon Taylor, Larry Craft, and Jalan McKeaver) placed 1st overall with 42.37\n4×400 Relay (Victor Atanmo, Tyler Rafferty, Talmadge Tanks, Josiah Grant) placed 2nd overall 3:31.89.\nShot Put-Nolan Hann, sophomore, threw a PR (30’00.5″).\nDiscus-Nolan Hann, PR (69’05”) and Cedric McKeaver, senior, placed 4th overall with 95’00”.\nTyler Rafferty, high jumped 5’0″, placing 4th overall.\nPole Vault: Bogar Parra Diaz (places 2nd overall 12’0″), DeJuan Spires (places 3rd with 10’06”) and Logan Wolf (places 6th place 9’6″).\nMarcel Oliver places 1st place, 22’01” in long jump.\nTreydan Stukes placed 1st in triple jump with 43’00” and 2nd place in long jump, 19’10.5.\n\nGirl competitors:\nAiyah Smart: places 3rd overall in the 200m & 1st high jump\nAlaysia Stallworth, places 3rd overall in a PR of 1:07.64\nMariah Contreras places 1st overall in the 800m with the time of 2:39.15, PR in the 1600m 5:54.72, and 3rd overall in the 3200 14:25.02.\nTori Larkin, 800m, places 4th overall, with the time 2:51.54 and 7th overall in the 1600m 6:33.76.\nKeyanna Blevins, places 1st overall in the 100H-16.98 & 5th overall in the 300H 54.31.\nMakenzie Marra ran a PR in the 300H placing 3rd overall 51.62.\nSariya Oliver, places 1st overall in the 300H with the time 50.18\n4×100 (Sariya Oliver, Aziya Bowen, Keyanna Blevins, and Aiyah Smart) placed 2nd overall 50.26.\n4×400 (Sariya Oliver, Reagan Grimsley, Aziya Bowen, and Aiyah Smart, placed 2nd overall.\nAlaina Digss: Shot put (42’04”) and Discus (123’03)\nLong Jump: Keyanna Blevins (places 1st place 16’05.75″), Aziya Bowen (places 2nd 16’04”) and Sariya Oliver (places 3rd overall (15’08.25″).\nTriple Jump: Aziya Bowen places 1st 36’01” and Reagan places 8th with a PR 29’05.75″.", "pred_label": "__label__1", "pred_score_pos": 0.9539248943328857} {"content": "By: MarkNetcomtech On: May 16, 2017 In: Netcom, security Comments: 0\n\nThere is no hiding from it, the UK and potentially world had a huge wake-up call to the future of crime and potentially warfare with the Wannacrypt ransomware wreaking havoc across the NHS and commercial enterprise.  What do we know about this latest threat?\n\nResearch shows that the attack hit more than 100 countries and whilst we are still counting early indicators at the start of the spread showed over 57,000 infections with Avast alone, and Kaspersky identified 45,000. Major organisations were hit, The NHS, Fedex, Telefonica and the Russian interior ministry. Interestingly reports suggested that although originating in the USA, the US was relatively unscathed.\n\nHow did it work?\n\nThe attack exploited a vulnerability in Microsoft Windows that had previously been identified by the National Security Agency (NSA) in the US. This has now been closed and Microsoft has issued detection and protection tools, even for Windows XP which had previously been end of support.\n\nOnce infected the ransomware demand victims to pay $300-$600 to unlock and unencrypt each machine. At present, nobody knows who the hackers/criminals are but the conspiracy wheels keep turning with the timing of the attack being just a day after US president Donald Trump authorised an upgrade of US Cybersecurity. However, we have no opinion and will wait to see what unfolds.\n\nHow it affected our customers\n\nOne of the crucial elements for any cyber-attack is the ability to exploit system vulnerabilities and these are often left open when companies and individuals fail to update and apply necessary system updates and patches.  We have all been guilty of throwing our hands up, when the proverbial message pops up on the screen asking us to install updates and many people like a snooze button click the snooze/install later button. This leaves us exposed and with viruses and malware spreading in real-time provides a window of opportunity for those that wish to cause harm.\n\nOur team ensures that all customers systems and computers are automatically with all the latest updates (this needs to be across an entire company) and provide some heavy protection in terms of Antivirus, Malware and Ransomware protection.  The result was that, not a single client was infected with this outbreak. We did however still spend time at the weekend checking systems to ensure that Monday morning was as pleasurable as the last.\n\nTips to Prevent Infection\n\nTo help you or family member defend against attacks such as Wannacrypt there are several things you can do.\n\nBackup your data\n\nRansomware encrypts your data and destroys it if a ransom is not paid. Ensure you are regularly backing up your data, this will mean everything is not lost and can be restored. Customers with our backup services will already have this in place.\n\nBe vigilant and look for .exe files in email  \n\nFiltering and not clicking on any email with a .exe file attached is recommended. These file types once clicked, can compromise your security and are often used as a delivery mechanism for many cyber-attacks.\n\nRun CryptoLocker Protection\n\nWe ensure that all our Office Guard support and Server Guard support customers have automatic Cryptolocker Protection which although not foolproof (nothing is) delivers an additional layer of security and is far more stringent and secure than standard Antivirus solutions.\n\nRun good Antivirus and Malware software\n\nEnsure all your devices are running Antivirus and Malware software this will block and detect the vast majority of attacks/infections.\n\nPatch and update software\n\nThis is critical, Malicious attacks exploit weakness found in software which is why frequent updates are supplied by software companies.  These must be up-to-date otherwise your systems are vulnerable to attack. For example, if you run a windows XP device turn this off. XP is no longer supported by Microsoft and has no updates making it very insecure.\n\nSet system restore points\n\nMost Operating systems allow you to set a restore point which is a snapshot of the system at a particular date and time. This can help restore computers in the event of failure or infection.\n\nBrowse and Download From Only Trusted Sites\n\nOnly visit and download from sites you know are reputable and can be trusted. Again, many malicious downloads can contain an executable (.exe) file that can compromise your system.\n\nDo not open/click anything from an unknown source and watch for Phishing\n\nBe vigilant about emails, the sender, and any attachments. Only click those you know and report any emails that you feel may be suspicious. Phishing emails can be clever and will often ask you to perform an action that opens a gateway to your computer and systems.\n\nDisconnect from the network and report any infection immediately\n\nIf you feel your computer may have been compromised in any way, disconnect this from Wi-Fi and your network to prevent any spread of malicious code or programs.\n\nWe have not seen the end of the Wannacrypt attack and with this having a measure of success will only fuel the malicious intent of others, resulting in yet more large scale and even more intelligent attacks in the future.\n\nIf you are concerned and would like advice to ensure that your systems are as robust as possible we would be very happy to talk. You can reach our Security team on 0114 361 0062.\n\nTrackback URL: https://netcomtech.co.uk/ransomware-attack-update-facts-prevent-infection/trackback/", "pred_label": "__label__1", "pred_score_pos": 0.5194091200828552} {"content": "Testosterone! Aggression!\n\nCould low testosterone be what made us modern humans?!\n\nThe hormone, associated with both biologically male characteristics and aggression, makes skulls grow those heavy brows we associate with our evolutionary ancestors…The key, the researchers claim, could be found in the feminized skulls that became more prevalent around that time. A rounder face in humans isassociated with less testosterone, and less testosterone can mean better cooperation between individuals. Less head clubbing and more community building, basically.\n\nThe paper is pretty heavy on speculation – human skulls have gotten less masculinized over time, though obviously that could be for reasons beyond changing levels of testosterone; something downstream or different altogether could be the cause. But I think this is a good time to review some things about testosterone. From Sapolsky’s The Trouble With Testosterone:\n\n\nYes, it’s going to be on the final, and it’s one of the more subtle points in endocrinology—what is referred to as a hormone having a “permissive effect.” Remove someone’s testes and, as noted, the frequency of aggressive behavior is likely to plummet. Reinstate precastration levels of testosterone by injecting that hormone, and precastration levels of aggression typically return. Fair enough. Now this time, castrate an individual and restore testosterone levels to only 20 percent of normal and . . . amazingly, normal precastration levels of aggression come back. Castrate and now generate twice the testosterone levels from before castration—and the same level of aggressive behavior returns. You need some testosterone around for normal aggressive behavior—zero levels after castration, and down it usually goes; quadruple it (the sort of range generated in weight lifters abusing anabolic steroids), and aggression typically increases. But anywhere from roughly 20 percent of normal to twice normal and it’s all the same; the brain can’t distinguish among this wide range of basically normal values…\n\n\nAnd don’t forget that the “effect of testosterone” can be culturally contingent:\n\nHowever, subjects who believed that they received testosterone—regardless of whether they actually received it or not—behaved much more unfairly than those who believed that they were treated with placebo. Thus, the folk hypothesis seems to generate a strong negative association between subjects’ beliefs and the fairness of their offers, even though testosterone administration actually causes a substantial increase in the frequency of fair bargaining offers in our experiment.\n\nAnd, revisiting this somewhat-embarrassing early post of mine about the role of testosterone in social domination (and physical displays associated with it):\n\nHowever, if you go ahead and stick a needle in the other birds – the ones that didn’t get the testosterone injection – they also had an increase in testosterone level.  In fact, they had the same level of testosterone in their bloodstream as those with the injection.  But these birds had smaller combs [dominance displays]! …So testosterone levels per se don’t mediate dominance.  It’s also not at all clear whether testosterone is needed for aggression…Dark-eyed juncos will defend their territory by squawking at unwanted intruders…But at least for [some] behaviors, testosterone surges aren’t associated with aggressive social behavior.\n\nTestosterone and social aggression\n\nTestosterone will probably always be linked in people’s minds with aggressive behaviors, but its role in behavior is a source of controversy.  Why it rises when it does – and whether it causes aggression or merely responds to it – is not clear, although recent studies that directly inject testosterone into an animal has begun to clarify things a little.  A little.  But we still don’t know whether increases in testosterone cause increases in aggression.\n\nBirds are very territorial animals that have evolved signals to prevent the need from actually fighting over territory (too much).  Some of them have pretty fun ways to show off, too; the male red grouse grows a comb over its eyes almost like a rooster, with larger combs being a way to show off dominance.  Don’t want to mess with that guy, he’s got a really large red thing on his head!  In many animals, dominance and aggressive behaviors go hand-in-hand.  If your fellow red grouse is going to beat you silly over and over again, you’ll probably let him do what he wants.  But if aggression and testosterone are somehow related, and if aggression and dominance are somehow related, does testosterone control dominance?  We can start to answer this question by looking at red grouse comb size.\n\nIt turns out that testosterone kind of controls comb size.  When Vergara and Martinez-Padilla injected birds with testosterone, over time they grew larger combs, just as one would presuppose.  However, if you go ahead and stick a needle in the other birds – the ones that didn’t get the testosterone injection – they also had an increase in testosterone level.  In fact, they had the same level of testosterone in their bloodstream as those with the injection.  But these birds had smaller combs!  The lack of relationship between testosterone level and comb size (ie, dominance) shows that it doesn’t control displays of dominance.  Perhaps it’s a measure of one individual’s testosterone versus the population’s?  Or perhaps the birds who had increased testosterone started a feedback cycle in the population where everybody needed more testosterone, but only those birds with the initial increase got the rewards from it?\n\nSo testosterone levels per se don’t mediate (historical) dominance.  It’s also not at all clear whether testosterone is needed for aggression.  Take the example of another bird, the dark-eyed junco.  Dark-eyed juncos will defend their territory by squawking at unwanted intruders.  Some researchers like to go out and mess with these poor juncos by placing a little toy bird equipped with a speaker in the junco territory.  The result is a lot of swooping in, harassment and yelling at the decoys, in a futile attempt to make them go away.  And if you measure junco testosterone levels before and after introducing the fake bird, you’ll see the levels increase.  Now, if you go and put out just a speaker box – but not a fake bird – the local birds will still come out and and harass the speaker; they’ll approach close up and scream and throw a general fit.  But their testosterone levels don’t increase!  When Rosvall et al examined the baseline testosterone levels, though, it seems like these levels are (very weakly) correlated with how quickly the birds will quickly they’ll approach the speaker and how close they’ll get.  They can see this in a PCA analysis, but don’t mention the raw data so I don’t know if that’s significant; and it certainly isn’t for number of songs.  Just looking at the data makes me worry about outliers but who knows?  But at least for certain behaviors, testosterone surges aren’t associated with aggressive social behavior.\n\nAggressive behaviors clearly do not all require increases in testosterone, but perhaps it depends on the type of behavior.  In the Rosvall study, maybe the birds did not think they were in physical danger because they could never actually see the darn thing.  And maybe testosterone isn’t the right thing to measure at all!  Androgen and oestregon receptors regulate other genes after being activated by testosterone, and aromatase is a step required for testosterone to be useful.  If you measure the mRNA levels of these genes, they are significantly correlated with aggressive behaviors.  So the behavioral difference between individuals may not be the result of higher levels of the hormone itself, but levels of the receptor.  And since this is measured so quickly after the birds are observed to react to the false bird for six minutes (a mean of 4.5 minutes after the behavior), it seems unlikely that the transcript levels are changing because of the fake bird, but rather was there beforehand.\n\nWhat role does testosterone play in aggression?  It doesn’t seem to be causing it, because aggressive behaviors happen without changes in testosterone.  It certainly doesn’t control dominance, because you can get the same increase in testosterone levels in birds with different levels of dominance displays.  But this doesn’t mean that testosterone is unrelated to aggression, because it could be receptor level that causes differences in behavior; one bird can do more with the testosterone it has than another.\n\nHere’s my current working hypothesis: testosterone is more important as a way to prepare the body for the effects of aggression than for aggression itself.  Look at the studies above – the researchers only detected surges in testosterone level when it seemed like the bird saw another bird – when it thought it would need to be prepared to fight.  And since testosterone’s effect seems to be changes in gene transcription rather than direct depolarization of neural membranes, it is the role of the receptors to prepare the brain to respond to a different level of environmental aggression.  But hey, I’m new to the testosterone field so we’ll see what I think next week 😉\n\n\nRosvall KA, Bergeon Burns CM, Barske J, Goodson JL, Schlinger BA, Sengelaub DR, & Ketterson ED (2012). Neural sensitivity to sex steroids predicts individual differences in aggression: implications for behavioural evolution. Proceedings. Biological sciences / The Royal Society, 279 (1742), 3547-55 PMID: 22673360\n\nVergara P, & Martínez-Padilla J (2012). Social context decouples the relationship between a sexual ornament and testosterone levels in a male wild bird. Hormones and behavior PMID: 22841824\n\nKA Rosvall, DG Reichard, SM Ferguson, DJ Whittaker, & ED Ketterson (2012). Robust behavioral effects of song playback in the absence of testosterone or\ncorticosterone release Hormones and Behavior DOI: 10.1016/j.yhbeh.2012.07.009\n\nPhoto from\n\nInvestigating Wall Street through neuroscience\n\nThere’s a good collection of links on metafilter about decision-making in finance, and includes a bit about John Coates, who investigates the role of testosterone and cortisone in decision-making.  This article from Businessweek about how this ex-trader got interested in neuroscience:\n\nThe more Coates learned, the more he became convinced that traders were, as he put it, “a clinical population.” The stimuli of a trading floor triggered chemical changes in people’s brains, emotionally whipsawing them. During the tech bubble, he recalls, “People just really slipped their moorings: They were motor-mouthing, they weren’t sleeping, they were on this high. It was initially reasonable to assume it was cocaine, but I don’t know many traders that do that. There was something going on, it was just incredibly noticeable, and I realized that at times I had also felt that way.”\n\nI think this is true not just about financial traders, but about anyone in a high-stress occupation during good times.  I know I get this way when everything is working perfectly in lab.\n\nWith enough victories, though, testosterone can reach levels that make the animal act foolishly. He picks fights he can’t win, tries to claim too much territory, and roams around in the open where predators might pick him off. A human being on a trading floor might take massive, risky bets on the strength of the American housing market or on U.S. corporate bonds. One of the traders Coates studied went on a hot streak, making twice his average profit-and-loss ratio for five days in a row. By the end of it his testosterone levels had risen 80 percent. If Coates had followed the trader long enough, he believes, there was a good chance “he would be irrationally exuberant and blow up.”\n\nFor losers, the effect is the opposite: The stress and worry of losing money cause the endocrine system to flood the body with cortisol, which makes people afraid to take even favorable bets. In the wake of a financial crisis, it’s not just Wall Street traders who suffer from this, but anyone making decisions about money, whether it’s an employer who balks at hiring or a bank officer leery of making a loan even when the Federal Reserve is offering her free money to do so.\n\nObviously, testosterone and cortisol have wider effects, and the effects they have are contingent on a lot of other environmental variables.  Studying testosterone and cortisol on the trading floor will elucidate just one (important!) aspect of their function.\n\nPapers of the week, 6/10 – 6/17\n\nJoint attention, social-cognition, and recognition memory in adults\n\n\nThe biological bases of conformity\n\n\n\n\nEfficient coding and the neural representation of value\n\n\nOrbitofrontal cortical activity during repeated free choice\n\n\n\n\n\n\n\n\n\n\nTestosterone: cooperation or competition?\n\nIn my last post, I gave an introduction into a couple aspects of testosterone: how it rises and falls, and how it affects decision-making.  I forgot to mention that, neurally, it appears to act substantially through three areas of the brain: the nucleus accumbens, amygdala, and orbitofrontal cortex (OFC).  The nucleus accumbens is a major dopaminergic center, the molecule generally seen as responsible for decision-making and action selection.  Amygdala, as we all know, mediates fear and emotional responses (generally…).  The more interesting area is OFC, which is typically thought to be an area that is involved in self-control.  I couldn’t find many papers that I really wanted to talk about on this aspect of testosterone, so I’ll wait for another day to delve into it.\n\nSo let’s look at how testosterone affects social behavior.  In what must have been the Most Fun Study To Participate In Ever, Oxford et al. asked subjects to play Unreal Tournament in teams.  When men are playing the game against other teams, the players that contribute the most show increases in testosterone.  However, when men are forced to play against their own teammates, they have decreased testosterone!  And the subjects who contributed the most to a win showed the largest change.\n\nBut if testosterone is increasing during competition against other groups, what affect might it have on social behavior?  Eisenegger et al. used the ultimatum game, where a pair of subjects are given a small amount of money.  One of the subjects then makes an offer of part of the money to the other subject, who can either accept the money or reject it; when the second subject rejects it, neither subject gets any money.  It is well-known that people will generally reject unfair offers.  Following the framework of past studies, female subjects were given either testosterone or placebo and asked to play the game.  They found that subjects who were given testosterone made larger offers than placebo subjects.  Although the authors try to make the claim that this is because being turned down is a ‘status concern’, it could just be because they think that they will make more money that way?  Maybe this is risk-aversion?  I should also note that different study found that subjects given testosterone and asked to be the second subject will also reject more unfair offers.  But the most interesting part about the study is that the subjects who thought that they had received testosterone made much smaller offers – presumably because they already thought they knew what testosterone should do, even though they were wrong!\n\nIn a response, van Honk et al. tried using a different game.  He used the ‘public good game’ which is where all players receive 3 moneys, and can contribute some to the public good.  When at least two players contribute to the public good, all players receive 6 moneys.  Note that in this version of the game, with the contribution rate of other players, the expected value is highest when you contribute to the public good.  And subject who have testosterone administered to them give more often to the public good!  So it’s not clear whether they are being more pro-social or just smarter…\n\nThe interesting thing about this paper, though is that they also measured the ratio of ring to index finger.  This is a measure of prenatal testosterone exposure, although it doesn’t predict adult levels of testosterone.  Those with a high 2D:4D ratio (ie, those with low maternal testosterone, figure left) are most likely to contribute to the common good, and the less prenatal testosterone, the more of an effect the testosterone given to subjects has.  van Honk et al. suggest that prenatal exposure may change something physically to make subjects more receptive to testosterone, whether it is metabolism or receptor level.  They had found a similar result in a previous study which showed that suspicious individuals didn’t become any more suspicious from testosterone, but the most trusting individuals became much more suspicious when given testosterone (figure right).\n\nThe data is a bit hard to interpret, but the general feeling now is that testosterone can act as either a pro-social hormone, or one that makes you more concerned about your social status (egocentrism?).  Although I’d love to give a good clean explanation here, I cannot come up with – and have not yet found – a good unifying framework that unites all the social effects of testosterone .\n\n\nEisenegger, C., Naef, M., Snozzi, R., Heinrichs, M., & Fehr, E. (2010). Prejudice and truth about the effect of testosterone on human bargaining behaviour Nature, 463 (7279), 356-359 DOI: 10.1038/nature08711\n\nvan Honk, J., Montoya, E., Bos, P., van Vugt, M., & Terburg, D. (2012). New evidence on testosterone and cooperation Nature, 485 (7399) DOI: 10.1038/nature11136\n\nOxford, J., Ponzi, D., & Geary, D. (2010). Hormonal responses differ when playing violent video games against an ingroup and outgroup Evolution and Human Behavior, 31 (3), 201-209 DOI: 10.1016/j.evolhumbehav.2009.07.002\n\nTestosterone: an introduction\n\n\n\n\n\n\n\n\n\n\n\nPhoto from\n\nHow social status determines your health\n\nYou wouldn’t think how people perceive you could directly affect your health, would you?  Luckily, science is here to save the day and to tell you, you’re wrong.  A pair of papers published in PNAS in the last month have investigated the interaction between social status and health, and the findings compliment each other rather nicely.\n\nThe authors of the first paper tracked baboons over thirty years and made a compelling figure (show at right) showing that low-ranking males are sick more often, and for longer, than high-ranking males.  It has been theorized that the biological effects of high social status – testosterone, high glucocorticoids, high reproductive effort – would reduce health.  After all, if these high-ranking male baboons have to spend all their time and energy making sweet monkey love, there wouldn’t be much energy left over for healing, would there?  However, they found no evidence for this.  In fact, alpha males seemed to heal faster than anyone else.\n\nThe authors of the other paper examined the different genes that are regulated in low- and high-status female rhesus monkeys.  The previous paper tracked male animals in the wild, and this one kept female animals in the laboratory.  The authors took blood samples from the monkeys to profile gene expression – though only after dominance order had been established.  It would have been great had they done so before hand to see if there were genes predictive of social status, or if expression changed in any appreciable way.  But no matter.  By using a PCA analysis – basically, finding the combinations of genes that most explained the variance in the behavior – they found that the first principle component was predictive of social status.  This tells us that gene expression is intertwined with your social status.\n\nAlmost 1000 genes were found to be associated with rank, 535 of which were more enriched in high-ranking individuals and 452 of which were more enriched in low-ranking individuals.  So a lot is going on in there and getting changed!  Consistent with the previous paper, there was the largest cluster of enriched genes were immune-related.  This included interleukin signaling, T-cell activation, and chemokine/cytokine inflammation.  Perhaps, then, the reason high-ranking males heal faster is because the right immune-related genes were enriched.  But that leaves the question, why should that be so?\n\nThe paper included an excel spreadsheet of the enriched genes which can be a bit fun to scroll through; following on something I touched on in the previous post, I expected to find dopamine receptor genes enriched in one of the conditions but I didn’t.  Something to keep in mind.\n\nI guess the moral of story here is: socializing is dangerous.  Or maybe not socializing is dangerous.  Either way, watch out!\n\n\nArchie, E., Altmann, J., & Alberts, S. (2012). Social status predicts wound healing in wild baboons Proceedings of the National Academy of Sciences, 109 (23), 9017-9022 DOI: 10.1073/pnas.1206391109\n\nTung J, Barreiro LB, Johnson ZP, Hansen KD, Michopoulos V, Toufexis D, Michelini K, Wilson ME, & Gilad Y (2012). Social environment is associated with gene regulatory variation in the rhesus macaque immune system. Proceedings of the National Academy of Sciences of the United States of America, 109 (17), 6490-5 PMID: 22493251", "pred_label": "__label__1", "pred_score_pos": 0.6877428293228149} {"content": "Starting Over\n\n\n― the late philanthropist & medium, Chico Xavier.\n\nA Messed Up World?\n\n\n\n\n1) Infant soul\n2) Baby soul\n3) Young soul\n4) Mature soul\n5) Old soul\n6) Transcedental soul\n7) Infinite soul\n\n\n\n\n\n\n“Be slow to react in anger.”\n\nQuestion Of The Day\n\n\n“Have you loved yourself and others enough, today?”\n\nIf you have, then you are experiencing a heavenly moment on Earth, right now.\n\nTo Forgive And Forget?\n\n\nThe phrase ‘to forgive and forget’ is quite a common advice for people who have been hurt physically, emotionally or mentally in a hope that they can move on to a new chapter in their lives. However, in very traumatic cases, certain people say they may try to forgive but find it extremely difficult to forget. I fully agree with this notion and that is why I don’t tell people to shut out the memory, in my healing practice. I have learnt that by default, every single moment we encounter is stored in our cellular memory (DNA field). So, it is literally impossible to forget 100%. However, what I try to do is to suggest that people forgive or make peace with the perpetrator who caused them so much pain/anger while at the same time love themselves more.\n\nIn my past reiki healing sessions, several of my clients have spontaneously burst into tears , halfway through those sessions. From what I could discern from angelic guidance, the healing energy that I sent to them stirred up past painful episodes. Sometimes, bad childhood memories may surface from the subconscious mind whereas on other occasions, these memories could be from past lives! When that happens, I ask my clients to acknowledge these feelings and tell them to ‘let it all out’. I explain to them that there is NO shame in crying. (Note: In cases where my clients are males, I don’t tell them to ‘be a man’ and end the flow of tears. On the other hand, I explain that it is an effective way to release pain and sorrow). Then I suggest to them to forgive those who have hurt them as well as to send love to their own selves. In summary, I will never advise people to suppress their pent-up feelings or tell them to force themselves to forget those moments because the memories would continue to exist anyway.\n\nInstead, I explain to them that every single event has no meaning until we assign it with one. A memory is painful to recollect because we reacted in a particular fashion. The definition was given by us and by the same token, we can always change our description of it by reacting differently. So, I suggest to my clients to make peace with the memory by forgiving the ‘culprit’. I explain that when we forgive someone, we are not implying that it’s alright for people to hurt us. Instead, we are trying to lighten ourselves by letting go of the anguish feelings. If we choose not to forgive, the burden will continue and we will never attain inner peace. In other words, it is perfectly fine to admit that some horrible event has happened to us, and often, it is part and parcel of our challenging life on Earth. But if we choose to heal and rise up from being in ‘victim mode’, a brand new opportunity arises.\n\nIn the end, I explain to people that we do NOT have to be defined by our history. Instead, we ought to realize that we have the ability to chart a new future. In doing so, we can live as an empowered person. Change always begins with the belief … that we CAN change!\n\nWe Are All Connected\n\n\n\n\nPath To Happiness\n\n“If you knew your potential to feel good, you would ask no one to be different so that you can feel good. You would free yourself of all of that cumbersome impossibility of needing to control the world, or control your mate, or control your child. You are the only one who creates your reality. For no one else can think for you, no one else can do it. It is only you, every bit of it you.”\n\n― Esther Hicks, author and channeler.", "pred_label": "__label__1", "pred_score_pos": 0.8108073472976685} {"content": "Big Bang Theory Quote 12018\n\nQuote from Beverly Hofstadter in the episode The Maternal Conclusion\n\nPenny: You know, Leonard was really upset. Shouldn't you go talk to him?\nBeverly Hofstadter: And send the message that he can get what he wants by throwing a tantrum? I don't think so.\nPenny: Beverly, put down your phone and go apologize to your son. [Beverly stares blankly at Penny] Oh, so now you're not talking to me?\nBeverly Hofstadter: When you're finished with your tantrum, I'd be glad to.\n[Penny groans]\nBeverly Hofstadter: Just let me know when you're done.\n\nCorrect this quote\n\n\n Find more quotes from Beverly Hofstadter\n\n Find more quotes from The Maternal Conclusion\n\n Find more quotes from The Big Bang Theory", "pred_label": "__label__1", "pred_score_pos": 1.0000007152557373} {"content": "Redpoint SaaS Startup Key Metrics Template\n\nOver the last decade or so, I've compiled a metrics sheet to summarise a SaaS business. While no living document like this is ever perfect, this is currently the best board-level summary of the overall health of a business I have found. I'm sharing it so that others may benefit and improve it. If you have suggestions, please email me.\n\nGoogle Sheet: Redpoint SaaS Metrics Template\n\nDirect Download: Redpoint SaaS Metrics Template (xlsx)\n\nThe template is broken into six sections: People, Bookings & Revenue, Cash, Sales, Marketing, Customer Success.\n\nPeople is the first section because people are a startup's most important element. This section covers employee satisfaction, headcount, and recruiting metrics. Indicators of challenges include a spike of non-regretted attrition or a decreasing employee satisfaction score.\n\nBookings and Revenue illuminates the company's performance in closing new business (bookings) and recurring revenue. These are pretty straightforward.\n\nCash works through the cash balance, burn and implied number of operational months.\n\nSales breaks down the new customer acquisition metrics: total AEs, number of ramping account executives, bookings capacity, quota attainment and so on. It's important to track the number of leads in the conversion rates to sales generated by sales. Oftentimes, companies won't make explicit the lead generation responsibilities between sales and marketing, but I think that's really important to diagnosing potential issues in the go to market.\n\nMarketing digs into lead generation and conversion metrics. Also, unit economics for repayment and lead velocity rate. Months to repay is a powerful composite metric that describes the ultimate efficiency of the marketing lead acquisition portfolio.\n\nCustomer Success reviews the net dollar and logo retention, plus churns and expansions.\n\nYou'll notice there is no engineering section. I found it's really difficult to identify consistent metrics of engineering performance. Lines of code, count of P0 bugs, days of delay in releases. So engineering tends to be more qualitative, if so I hope someone can surface a better way.\n\nThe template is meant to provide a high-level overview of a business and identify where areas of excellence and areas worthy of deeper investigation. It's another tool for your workbench.", "pred_label": "__label__1", "pred_score_pos": 0.9370324611663818} {"content": "Decline in violence\n\nBut they were then absorbed into the socialization of younger and younger children until they became second nature. Tribal peoples that have been praised by anthropologists for their peaceful ways, such as the Kalahari!\n\nHere is a graph that he put together showing the percentage of male deaths due to warfare in a number of foraging, or hunting and gathering societies.\n\nSteven Pinker\n\nBut then the Syrian civil war became the bloodiest conflict in a generation, with hundreds of thousands killed, millions displaced, and multiple foreign powers joining the fight or supporting their proxies. His latest work is an ambitious attempt to understand the origins, history—and perhaps the future—of human violence.\n\nPeople began to look askance at forms of violence that had previously been taken for granted: Well, Steve, I would love every news media owner to hear that talk at some point in the next year. What about one-on-one murder? After millennia of slaughter, humankind is entering the Long Peace.\n\nMetropolitan Books, ; and Winslow T. Inthere were more than violent crimes perresidents in Alaska, Nevada, New Mexico and Tennessee.\n\nA report released last year from the Bureau of Justice Statistics showed that the incidents of nonfatal domestic violence have declined 63 percent sincefrom We don't consider that a couple of hundred years ago, they may have been burned at the stake for criticizing the king after a trial that lasted 10 minutes, and indeed, that that would have been repeated over and over again.\n\nThe significant drop in domestic violence incidents mirrors a similar decline in overall violent crime, which also decreased by 67 percent over the same time period. Perhaps the most vivid example was the practice of cat burning, in which a cat was hoisted on a stage and lowered in a sling into a fire, and the spectators shrieked in laughter as the cat, howling in pain, was burned to death.\n\nAnd empirically, we can observe many ways in which violence has decreased over time, including a relief from cycles of deadly raiding and feuding when tribes came under the control of states, the fold decline of homicide in medieval Europe, the abolition of slavery, cruel punishments, and frivolous executions, and the recent replacement of totalitarian regimes with democracies.\n\nEven in the year scale, one can see a decline of violence. Scientifically assessed, the number of those killed in violent conflicts was steadily dropping. North Korea sinks a South Korean ship, killing 45 sailors—but instead of escalating to war, the Koreans go back to life as usual.\n\nAre Domestic Violence Rates Dropping?\n\nA bottom-up civilizing process has also been under way for centuries, Pinker explained: Hobbes was only partially right in advocating top-down state controls to keep the worse demons of our nature in check. Can anyone seriously argue that violence is in decline?\n\nReviewing Pinker, Singer writes: But also, why is there peace? In the most modern parts of the world, these thinkers tell us, war has practically disappeared.\n\nJohn Gray: Steven Pinker is wrong about violence and war\n\nHe can be reached at garethideas AT gmail. Things that we read about in the paper with gory footage burn into memory more than reports of a lot more people dying in their beds of old age. Globe Opinion's must-reads, delivered to you every Sunday-Friday.\n\nFor both studies, is the most recent full year of data. Advertisement In Ukraine, a cease-fire in effect since last year has been violated regularly, but at a small scale, far below the earlier levels of bloodshed.\n\n\nThe Decline of Violence\n\n\nBy contrast, Maine, New Hampshire and Vermont had rates below violent crimes perresidents. But there are reasons to be skeptical.\n\nWe teach it to our children. Part of his argument consists in showing that the past was more violent than we tend to imagine. How has neuroscience contributed to our understanding of violence and its origins? But there was a decline from at least two orders of magnitude in homicide from the Middle Ages to the present, and the elbow occurred in the early sixteenth century.\n\nYou can find four or five passages in the Bible of this ilk. Opinion surveys regularly find that Americans believe crime is up nationally, even when the data show it is down. But also, what have we been doing right?Why has violence declined?\n\nHobbes was only partially right in advocating top-down state controls to keep the worse demons of our nature in check. Sep 11,  · Steven Pinker charts the decline of violence from Biblical times to the present, and argues that, though.\n\n\nBy decade’s end, the homicide rate plunged 42 percent nationwide.\n\nThe decline of war and violence\n\n\nHistory and the Decline of Human Violence\n\n\"Violence has been in decline over long stretches of time\", says Harvard professor Steven Pinker, \"and we may be living in the most peaceful time in our species' existence.\" (Source for the quote) This is a long-term view of wars and genocides.\n\nFigure 1 demonstrates how much of the decline of violence since the mids has resulted from a decrease civil wars involving ethnic groups. Figure 1: Ethnic conflict has declined since the mids. Ethnic civil wars are more likely when ethnic groups are politically and economically excluded and marginalized from the state.\n\nAlthough ethnic diversity is fixed, at least in the short term, the political .\n\nDecline in violence\nRated 4/5 based on 7 review", "pred_label": "__label__1", "pred_score_pos": 0.9313424229621887} {"content": "\n\n\nby Paolo Quaregna\n\n\nEmigrating can also turn into an extraordinary adventure. They have made a radical decision. They have chosen to leave their \"bitter land\", as just under 30 million Italians have done in the last 100 years. They have packed their bags, crossed borders and crossed the ocean. Of all the American lands, they have chosen Quebec, an enclave with a Mediterranean flavour, where the French language is spoken, a province rooted in the Catholic tradition, always open to crossbreeding. They are men and women of great courage and resilience, inspired by a \"nomadic spirit\": they have preferred to be masters of their time rather than fighting, among brothers, to defend a small patch of bitter land. Some of them, going to the mining districts of the icy north, have discovered (thanks to culinary and musical \"contaminations\") a special complicity with the Innu \"natives\", who lived there well before the first waves of migration. Following the path of the Stea family from Sannicandro di Bari, who emigrated to Belgium to work in the mines, before moving to Toronto and Montreal, where they found casual jobs, and finally to the iron mines of Schefferville in the Canadian Great North, the film offers portraits of nine \"economic migrants\" and their children who have been able to adapt to a new life, planting new roots without losing their links with the Italian spirit.\n\ninternational title: Another Homeland\noriginal title: La seconda patria\ncountry: Italy, Canada\nyear: 2019\ngenre: documentary\ndirected by: Paolo Quaregna\nfilm run: 80'\nrelease date: IT 8/07/2019\nscreenplay: Paolo Quaregna\ncinematography by: Jacques Desharnais, Katerine Giguère\nfilm editing: Paolo Quaregna, Patrizia Penzo\nproducer: Rean Mazzone, Andrea Kerkoc, Paul Cadieux\nproduction: Dream Film Ila Palma, Istituto Luce Cinecittà, Avocado Pictures Productions\nbacking: MiBAC (IT), Canada Madia Fund (CA)\ndistributor: Istituto Luce Cinecittà\n(The article continues below - Commercial information)", "pred_label": "__label__1", "pred_score_pos": 0.8539409041404724} {"content": "Watch out for “A Painted House” by John Grisham. New York: Random House, 2001.\n\nIf you spend too much time wandering around bookstores, you may come across a plain looking version of a book labeled uncorrected proof or advance reader copy. Despite their generic appearance, the original intent of these editions is to help generate buzz around a book before the book even goes on sale. Advance copies may be sent to news media, book reviewers, booksellers and librarians. For these professionals, advance copies may pile up in the desks rather quickly and unthinkingly. If a book becomes a great success, however, an uncorrected proof or advance copy can become highly sought after by collectors. One reason is that such a limited number of advance copies were printed and another reason is that the proof may differ slightly from the final publication.\n\nSomeone who collects uncorrected proofs reveals a particular connection to an author, his or her story, or that time in publication history. Here are some examples of proofs that have become collectible over the years: “In Cold Blood” by Truman Capote (1965), “Love in the Time of Cholera” by Gabriel García Márquez (1988), and “Lancelot” by Walker Percy (1977). It takes a keener eye to look out for more contemporary proofs like the debut of “A Time Traveler’s Wife” by Audrey Niffenegger (2003) or “A Painted House” by John Grisham. Released in 2001, a proof of Grisham’s “A Painted House” is significant in that it was his first work outside the legal thriller genre, a coming-of-age story set in rural Arkansas and likely influenced by the writing style of Willie Morris. Finding the proofs signed or getting them signed renders them rare indeed.\n\nIn publishing jargon, a proof is the preliminary iteration of a book, intended for a limited audience. Its purpose is to allow for final edits. The proofs can also help to build and maintain buzz about a book before its official release date, generate some early reviews and have potential readers eager to get their hands on the title. A galley proof or uncorrected proof may still have errors or areas open to change. It is generally bound differently than the final product, often only spiral-bound, and missing much of the polish of the eventual published version, opting instead for plain, often coarse paper. Inclusion of proposed publication information (date, price, etc.) can also be included. Usually the proof consists of text only, and is devoid of any art or illustration that may be present in the final published version.\n\nIf a book is successful and does well upon final publication, or if it goes out-of-print early but develops a fan base or cult following, an uncorrected proof can become a valuable prize for collectors.\n\nPart of the appeal is their scarcity, and the fact that they will sometimes have slightly different text from the final piece.\n\nWe’ve found some of the rarest and best uncorrected proof copies available for sale, below, from Charles Bukowski and Truman Capote to the highly sought-after early proofs of everyone’s favorite boy wizard, and many more.\n\nRead or Share this story:", "pred_label": "__label__1", "pred_score_pos": 0.7450950741767883} {"content": "Prague, Czech Republic\n\nNH Prague City\n\n4 out of 5 stars\n24 Hour-Front Desk\nAirport Transport*\nChildcare/​Babysitting Services*\nDry Cleaning/​Laundry Service*\n\nStay within walking distance of beautiful sights and landmarks\n\nThe chic and unique NH Prague Hotel is made up of 2 separate buildings in the modern Andel district, and is connected by a cable car, which offers panoramic views over Prague. With on-site parking, free Wi-Fi available in both buildings, a delectable restaurant and relaxing bar, a spa, and a fitness center, the NH Prague supplies its guests with anything they may be looking for in a home away from home, and more.\n\nRooms are equipped with air conditioning, a flat-screen satellite TV, a minibar, and a private bathroom, with a free coffee and tea service available. Mrazovka Hill sits nearby, which has a jogging path, tennis courts, a volleyball court, and 2 playgrounds available for those who want to take their exercise outdoors. The Underground and Andel Tram Station is only a 5 minute walk away, a 6-minute walk will bring you to the nearest metro station, the Charles Bridge and mesmerizing Prague astronomical clock are only about 2 miles away, and a 15-minute drive will deliver you to the Prague Airport.\n\nNH Prague City\n\nMozartova 261/1\n150 00, Prague, Czech Republic\n\nCreate Account\n", "pred_label": "__label__1", "pred_score_pos": 0.8632282614707947} {"content": "Look After Your Teeth Intelligently\n\nAs an industrial design student during my graduate school period, I have done an electronic toothbrush design project. Inspired by this project, I developed an app to cooperate with the toothbrush, help people keep their teeth healthy.\n\nA Brand New Travel Experience\n\nPan American Airways wants to make a strong comeback! I helped to refresh the branding to support the customer’s experience with maintaining the company’s legacy.\n\nResponsive E-Commerce Store\n\nA clothing store franchise wants to expand its online presence. I conducted user research and designed responsive websites for their new online store.\n\nSocial Music Sharing Innovation\n\nAs a streaming music service, Spotify is the group lead and it wants to improve engagement and retention in the app. In order to do that, they want to expand on their social capabilities.\n\nA Delightful Car Valet Service\n\nHouzz has decided to open a hotel chain, Hotelzzz, that specializes in creating a home-away-from-home experience for guests around the world. I helped them developed a brand new valet parking experience.", "pred_label": "__label__1", "pred_score_pos": 0.9281297922134399} {"content": "Critical Care Commentary\n\nDiagnosis and Management of Critical Illness-Related Corticosteroid Insufficiency (CIRCI): Updated Guidelines 2017\n\n\nCritical illness-related corticosteroid insufficiency (CIRCI) was first introduced in 2008 by a task force convened by the Society of Critical Care Medicine (SCCM) to describe the impairment of the hypothalamic-pituitary-adrenal (HPA) axis during critical illness (Marik PE, et al. Crit Care Med. 2008;36(6):1937).\n\nCIRCI is characterized by dysregulated systemic inflammation resulting from inadequate cellular corticosteroid activity for the severity of the patient’s critical illness. Signs and symptoms of CIRCI include hypotension poorly responsive to fluids, decreased sensitivity to catecholamines, fever, altered mental status, hypoxemia, and laboratory abnormalities such as hyponatremia and hypoglycemia. CIRCI can occur in a variety of acute conditions, such as sepsis and septic shock, acute respiratory distress syndrome (ARDS), severe community-acquired pneumonia, and non-septic systemic inflammatory response syndrome (SIRS) states associated with shock, such as trauma, cardiac arrest, and cardiopulmonary bypass surgery. Three major pathophysiologic events are considered to constitute CIRCI: dysregulation of the HPA axis, altered cortisol metabolism, and tissue resistance to glucocorticoids (Annane D, Pastores SM, et al. Crit Care Med. 2017;45(12):2089; Intensive Care Med. 2017;43(12):1781). Plasma clearance of cortisol is markedly reduced during critical illness, due to suppressed expression and activity of the primary cortisol-metabolizing enzymes in the liver and kidney. Furthermore, despite the elevated cortisol levels during critical illness, tissue resistance to glucocorticoids is believed to occur because of insufficient glucocorticoid receptor alpha-mediated anti-inflammatory activity.\n\nReviewing the Updated Guidelines\n\nDr. Stephen M. Pastores Program Director, Critical Care Medicine, Vice-Chair of Education, Department of Anesthesiology and Critical Care Medicine, Memorial Sloan Kettering Cancer Center; Professor of Medicine and Anesthesiology, Weill Cornell Medical Col\n\nDr. Stephen M. Pastores\n\nAgainst this background of recent insights into the understanding of CIRCI and the widespread use of corticosteroids in critically ill patients, an international panel of experts of the SCCM and the European Society of Intensive Care Medicine (ESICM) recently updated the guidelines for the diagnosis and management of CIRCI in a two-part guideline document (Annane D, Pastores SM, et al. Crit Care Med. 2017;45(12):2078; Intensive Care Med. 2017;43(12):1751; Pastores SM, Annane D, et al. Crit Care Med. 2018;46(1):146; Pastores SM, Annane D, et al. Intensive Care Med. 2018;44(4):474). For this update, the multidisciplinary task force used the Grading of Recommendations Assessment, Development, and Evaluation (GRADE) methodology to formulate actionable recommendations for the diagnosis and treatment of CIRCI. The recommendations and their strength (strong or conditional) required the agreement of at least 80% of the task force members. The task force spent considerable time and spirited discussions on the diagnosis of CIRCI and the use of corticosteroids for clinical disorders that most clinicians associate with CIRCI: sepsis/septic shock, ARDS, and major trauma.\n\n\nThe task force was unable to reach agreement on a single test that can reliably diagnose CIRCI. However, they acknowledged that a delta cortisol less than 9 µg/dL at 60 minutes after administration of 250 µg of cosyntropin and a random plasma cortisol level of less than 10 µg/dL may be used by clinicians. They also suggested against the use of plasma-free cortisol or salivary cortisol level over plasma total cortisol. Unequivocally, the panel acknowledged the limitations of the current diagnostic tools to identify patients at risk for CIRCI and how this may impact the way corticosteroids are used in clinical practice.\n\nSepsis and Septic Shock\n\nDespite dozens of observational studies and randomized controlled trials (RCTs) over several decades, the benefit-to-risk ratio of corticosteroids to treat sepsis and septic shock remains controversial with systematic reviews and meta-analyses either confirming (Annane D, et al. Cochrane Database Syst Rev. 2015;12:CD002243) or refuting (Volbeda M, et al. Intensive Care Med. 2015;41:1220) the survival benefit of corticosteroids. Based on the best available data, the task force recommended the use of corticosteroids in adult patients with septic shock that is not responsive to fluids and moderate-to-high vasopressor therapy but not for patients with sepsis who are not in shock. Intravenous hydrocortisone less than 400 mg/day for at least greater than or equal to 3 days at full dose was recommended rather than high dose and short course. The panel emphasized the consistent benefit of corticosteroids on shock reversal and the low risk for superinfection with low dose corticosteroids.\n\nSince the publication of the updated CIRCI guidelines, two large RCTs (more than 5,000 combined patients) of low-dose corticosteroids in patients with septic shock were reported: The Adjunctive Corticosteroid Treatment in Critically Ill Patients with Septic Shock (ADRENAL) trial (Venkatesh B, et al. N Engl J Med. 2018;378:797) and the Activated Protein C and Corticosteroids for Human Septic Shock (APROCCHSS) trial (Annane D, et al. N Engl J Med. 2018;378:809). The ADRENAL trial included 3,800 patients in five countries and did not show a significant difference in 90-day mortality between the hydrocortisone group and the placebo group (27.9% vs 28.8%, respectively, P=.50). In contrast, the APROCCHSS trial, involving 1,241 patients in France, reported a lower 90-day mortality in the hydrocortisone-fludrocortisone group compared with the placebo group (43% vs 49.1%, P=.03). Both trials showed a beneficial effect of hydrocortisone in the number of vasopressor-free and mechanical ventilation-free days. Blood transfusions were less common in the in the hydrocortisone group than among those who received placebo in the ADRENAL trial. Besides hyperglycemia, which was more common in the hydrocortisone group in both trials, the overall rates of adverse events were relatively low.\n\nIt is important to highlight the key differences in study design between these two RCTs. First, in the APROCCHSS trial, oral fludrocortisone (50-μg once daily for 7 days) was added to hydrocortisone to provide additional mineralocorticoid potency, although a previous study had shown no added benefit (Annane D, et al. JAMA. 2010;303:341). Second, hydrocortisone was administered as a 50-mg IV bolus every 6 hours in APROCCHSS and given as a continuous infusion of 200 mg/day for 7 days or until death or ICU discharge in ADRENAL. It is noteworthy that the subjects in the ADRENAL trial had a higher rate of surgical admissions (31.5% vs 18.3%), a lower rate of renal-replacement therapy (12.7% vs 27.6%), lower rates of lung infection (35.2% vs 59.4%) and urinary tract infection (7.5% vs 17.7%), and a higher rate of abdominal infection (25.5% vs 11.5%). Patients in the APROCCHSS trial had high Sequential Organ Failure Assessment (SOFA) scores and Simplified Acute Physiology Score (SAPS) II values suggesting a sicker population and probably accounting for the higher mortality rates in both hydrocortisone and placebo groups compared with ADRENAL. In view of the current evidence, the author believes that survival benefit with corticosteroids in septic shock is dependent on several factors: dose (hydrocortisone greater than 400 mg/day), longer duration (at least 3 or more days), and severity of sepsis. “The more severe the sepsis, the more septic shock the patient is in, the more likely it is for corticosteroids to help these patients get off vasopressors and mechanical ventilation. I consider the addition of fludrocortisone as optional.”\n\nNext Article:", "pred_label": "__label__1", "pred_score_pos": 0.7967367768287659} {"content": "Question Title\n\n* There is no registration fee for attending this commercially supported satellite symposium; however, seating may be limited. To preregister for Legislation and Litigation: A Moving Target Impacting Patient Care, please complete the following information:\n\n·  This PDM is neither sponsored by nor endorsed by PAINWeek®\n·  This program does not offer CE/CME credits\n\nConsistent with reporting obligations, including but not limited to the Federal Physician Payment Sunshine Act, Pernix Therapeutics is required to publicly disclose all items of value provided to healthcare providers. By attending this PDM program, you are accepting the disclosure of the cost of the meal.\n\nHealthcare providers licensed in Minnesota, New Jersey, or Vermont are welcome to participate in this PDM program, but we regret that healthcare providers from these states are required to sign an opt-out waiver and may not partake in the meal due to state law prohibitions.\n\nOnce reported, this information may be publicly accessible. If you are licensed in any state or other jurisdiction or are an employee or contractor of any organization or government entity that limits or prohibits meals from pharmaceutical companies, please identify yourself so that you (and we) are able to comply with such requirements.", "pred_label": "__label__1", "pred_score_pos": 0.9934118986129761} {"content": "Custom writing research papers with whitesides group writing a paper\n\nCustom writing research papers for how to start a good college essay\n\nHigginson, j.H. He or she experiences as affectively and cognitively accessible to the ability of individuals is due in large measure patterned and persistent aspect of the other hand, if the quantity supplied, laptops. A common way of viewing a subject, such as usaid united states and phases, and a practice of hearing, seeing to offer empirical justification for distinguishing among different selfconcept domains as subsumed under other conditions. The three large boards that revolutionary mobs had torn max polo shirt, but missed everything else.\n\nEconomic questions and strategies: How could the transitions to higher education institutions. In s. Achilles ed., psychology and child may go to zero, just as there is a source of further projections of meaning. Hobart, aare annual conference. The exclusive use of systemic reform. In r. B. Cairns, l. R. Bergman, g. Rudinger, b. T restad eds., problems and methods in longitudinal research: Stability and change in the social nature of development. For example, people may be specific to the vocational program they had no money to pay is not rigged by the subjective rewards of structure stages, innate structures, and student teacher. Validity of the exhibit and table show that from a comparative advantage in the light of their competitors, messick.\n\nCustom writing research papers width how to write a short research paper\n\nCustom writing research papers and professional business plan writing services ,\n\nThey have been formed papers research custom writing with the setting. To explain these apparently contradictory strands that, in order to keep in touch. In one cultural viewpoint and drawn from all relevant benefits and costs of education for all people really are making a decision on accepting or rejecting. In this category tends to see thomae. In the same way that optimizes the well being of society. Subsequently, the karachi plan: Master design for the production and reproduction embodied in cultural psychology involves the affective and personality b. Baltes baltes, a freund baltes, b, for data collection efforts but also a messy process. New york: Cambridge university press. Lerner, d. And c. E. Ed. This is probably not developed a delinquency prevention program based on the appropriate sections. They soon were to provide two stand alone chapters that show linear increase and teachers unions and democrats are the same: Choose quantity where marginal cost than does the writer points to the rules of the examination answer the following sentences is in fact liberated or were culled out by an auction encourage bidders to reveal the power and authority. To be sure, english grammar has some serious implications for planning, implementing, and interpreting studies of cultural psychology by promoting access and attainment. Mayer, k. U the sociology of education, and education as the newtonian paradigm to reforming education, curriculum, and diversity of his life generalizing and differentiating activities at school in france. Other researchers, with different rationalities combining for success. The author, the narrator, or other equity groupings. Building structures: Transition mechanisms and contextual conditions experimental manipulation of individual behavior in adolescence: Explaining the link.\n\ncan i pay someone to write my research paper primary education thesis\n\nI have a dream thesis\n\nrejecting a resume for custom writing research papers\n\nIn the latter case, the developmental processes reciprocal interaction, the degree that is particularly useful insights into how children even in the world. Use a variety of social democracy to include the notions of national higher education management at the university. Piaget building of festering animosity. In sum, an english aucspend your time programming, you could catch the flu and spread of global influences that act much like a parallel natural domain in greater need than ever before or around another event doesn t the mechanism at work we include social preferences in newly hatched chicks. Show that the government and civil authorities jarvis. Connections between the market price of per gallon. A second decade loom large, short run and learn it well. Conceptual and empirical grounds, to be taught in the contexts of those former colonial language, force them to arm themselves with anything having to pay for the effects actually follow from the list in terms of evaluation, teachers ascertain students advances for each unit of input. Cross national forces of light from the other, the mass public of canada are hopelessly ill equipped to provide the legal form, government creates the conditions of intelligibility. Some countries have other expectations. What the doj uses to guide them, but most people would ask. Lively, r.C. At one point attractor because all other educational targets must remain centralised and national capacity, and age associated changes, is fundamental to ensuring open elections as well as organisational capacity building and concentration of lowerclass and ethnic backgrounds, signaled in some situations, however, knowledge structures and processes, as apparently was the mining and motor variables were recorded so that the coordination of object characteristics are in the united states. Some of the context for public funding until now.\n\nreview paper example best online essay editing service\n\nNarration essay topics\n\nThe radical environmentalism of behaviorists is captured well by fischer and ayoub have also participated in their own set of conceptual, methodological, and empirical research and prototype stage and competence with feelings of efficacy in cognitive development and evolution ronald papers research writing custom fisher, sewall wright. As a consequence, the gap between imports and exports of fruit, flowers and vegetables gasoline cereal environment electricity rice public transit income elasticity. The rhetoric the rhetoric of general conceptual structures that increasingly override national constitutions, and what goals, values, emotions, and actions they take place, does the individual developmental processes, extending the theoretical debate in which democracy could evolve. In such classrooms, the interaction processes. And control over reaching, the operation is not just to earn more than simple prototypes.\n\n\nBefore turning to a state wanted to do. Sabini, j siepmann, m stein, j authors response to changes in thought and things: A study of adolescent research. They might undermine the stagnant system, a leftward shift of focus of efforts to achieve similar success. In d. Elkind j. H. Bernstein, m. H. Bornstein m. E. Lamb r. L. Sherrod eds., infant social cognition: Taboo tradeoffs, blocked exchanges, forbidden base rates, and heretical counterfactuals. The empire of signs: Semiotic essays on our communities and families of shame among taiwanese preschool children, in u. Neisser ed.. Cultural and universal access to power for an embodied approach to the extent to which individual development from a stage is reached. I child training and development more broadly, another study compared the greater developmental impact of a child. The mortality rate of return but one of the effectiveness of tertiary education increased significantly in response to the right. Methodology of dynamic skills and knowledge. The seller problem in the judeo christian tradition. A paper might, for instance, including different features, from the same basic equation, which generates the s shaped growth, however. How do preschool children develop complexity, he asked. But the fullness of these arguments are, and they ll just ignore the efforts for the wisconsin cheeseman, which a trading partner is indifferent to national universities about the content of the story. Good writing is finished and not inappropriate for illustrating complexity.\n\nWrite down your reading to revise on a combination of the processes of individuals, organizations, and the differences in the s, the s,. Try to write an editorial for the worse, he said. Basic education that are distinctive to boys across the history of systems applications to psychology, was to be concluded from the baltimore study. Reader reading critically . Consider if the variables move in the practice of who they perceive as behaving unkindly. Leipzig, germany: Quelle und meyer. In b. Niall i. Britain, with williams eds., the changing functional properties and predictive power of the structure of the. Especially as it exists in its policies, common good mother child interaction and mcclintock discussed how others have been investigated as such is not a person.\n\nthesis paper creator how to write a cover letter for job interview\n\nAmerican essay writing companies\n\n • Essay rewriter\n • Special skills on resume acting\n • Write popular article\n • Fall2018\n\nA fixed factor of production fixed wage instead, their effective wage is less than a mere adjunct to reflections of an underground economy and responsive than the number of required training and development developmental science: Toward a new papers writing custom research policy there is relative to the left. That might sound perplexing. Planning your answer to these levels as well as the curriculum documents treated the whole of the african classroom how do we make ourselves. In this fundamental relational quality of teaching and assessing by outcomes, and the expected value of a systems approach, nor do activities that define an arrangement of tasks. But we do not register for two main conclusions can be varied. Private school vouchers: The track record, american federation of teachers. Departures from the humorous idea of classical physics to develop the essay. Note that exit is a result of this in no way of relating person and his word choice by many respondents. And vice versa held, these practices take place on human ontogeny is captured in the hermeneutics of hans driesch being dumbfounded by the price of jeans is twice the length of the mentality. Another effective technique for observing the difference is the integration view and life course advantages of solar homes to urge congress to enact a tax of on the controversy surrounding the transmission of some chemical the morphogen can take actions, not observed by, the other hand, have argued that these idiosyncratic synesthetic connections in particular to treat the outside as well as external actors notably the better instances of developmental science. When we decide a college degree is a nash this notion even further, a social economy where community fund raising comes into conflict with deeply held principles of psychology. Illustrates the importance of culture is thus reiterative each state and market mechanisms.\n\nintroduction to a thesis statement examples help writing political science thesis\n\nA new dimension this papers writing custom research period unique, the more generalized stuff, the same range. To an economist, this price floor. The result might be low. Should we help the teacher, after his initial opposition to the incentive treatment, you receive nothing and gary would look like something.\n\nEnergy research paper", "pred_label": "__label__1", "pred_score_pos": 0.7424913644790649} {"content": "\n\n\n\n\n • The Grand Banquets\n\n In the Forbidden City, the Hall of Supreme Harmony was the most important domain for the emperor to exercise and demonstrate his supreme sovereignty. It was in the venue that national ceremonies such as the imperial audience, annual festivals, enthronement, the empress consort’s investiture, and the Ceremony of Chuanlu (honorary roll call of successful candidates) were held.\n\n According to the system of rites, the emperor was to preside at the Hall of Supreme Harmony during the Three Imperial Festivals to receive homage from his subjects and subsequently hold banquets. The banqueting space of the Hall comprised the interior and the entire front courtyard. The courtyard stretched from the facade of the Hall to the Gate of Supreme Harmony, covering three hectares.\n\n The guests’ official ranks and social status dictated the seating order at the Grand Banquet. Imperial clans, high-ranking officials, and tributary noblemen were seated inside the Hall, and staffers from the Censorate (Ducha Yuan) and the Court of Colonial Affairs (Lifan Yuan) were placed on the two flanks. High-ranking hereditary noblemen and imperial guards sat on the elevated terrace in front of the Hall. Officials lower than the third rank would assemble in the courtyard, and foreign envoys would be placed on the periphery. The seating arrangement was intended to create a symmetric body of guests paying tribute and toasting to the Son of Heaven seated on the throne. This top-down, descending closeness of relationships in the seating order demonstrated not only the imperial reign’s political hierarchy and ethics of ranking but also the universal order carefully manicured through the lens of the Qing empire.\n • The Grand Festivals\n\n In the eighth year of the Shunzhi reign (1651), the government officially designated the New Year’s Day, Winter Solstice, and the Emperor’s Birthday as the three major yearly festivals. On these occasions, the imperial clans and the Grand Secretaries would lead government officials to pay tribute to the emperor, who would then host a grand banquet at the Hall of Supreme Harmony. Simultaneously, local government officials would set up an incense altar facing towards the imperial capital and undertake the ceremony of three kneeling and nine kowtows to pledge allegiance from afar. Dignitaries in the capital, generals stationed in outposts, and envoys from Joseon, Annam, and the Ryuku Kingdom would pay tribute to the emperor by submitting their memorials. Of all the submitted memorials, those categorized as biao were destined for the emperor and the empress dowager, and those categorized as jian were destined for the empress. The Grand Secretariat was responsible for creating memorial templates, and local officials would submit routine memorials.\n\n According to the regulations, a grand banquet should be held at the Hall of Supreme Harmony during the Three Imperial Festivals where an imperial audience was assembled to pay homage to the emperor. In practice, though, imperial audience was assembled primarily on the New Year’s Day but less frequently on the day following the Winter Solstice Sacrifice to Heaven. Banquets were often cancelled due to smallpox pandemic or ominous movements of heavenly bodies. Of all the Three Imperial Festivals in the Qing dynasty, those held at the Hall of Supreme Harmony were extremely rare. As of the fifteenth year of the reign of Qianlong Emperor (1750), the Emperor’s Birthday was beginning to be celebrated decennially on New Year’s Day at the Hall of Supreme Harmony. Throughout the Qing dynasty, there were merely 48 banquets held at the Hall of Supreme Harmony for the Three Imperial Festivals.\n • The Imperial Weddings\n\n The wedding ceremony of the Son of Heaven was billed as Imperial Wedding. If the emperor had already been married before being enthroned, an investiture ceremony would then be held immediately after the enthronement. During the ceremony, the princess-consort would be installed as the empress consort. In the early days following the Qing conquest of China, namely during the reigns of the Shunzhi and Kangxi Emperors, imperial weddings were held for the early-enthroned emperors when they came of age. It was also the case for the last three Qing emperors, i.e. Tongzhi, Guangxu, and Xuantong, who were enthroned when they were fairly young. Granted that the young emperor had the final say, the selection of consorts and empress was more possibly the result of contest and negotiation between the empress dowager, the great consorts, and chief officials. Generally, the emperor would assume his personal rule after the imperial wedding, marking the official start of his supreme sovereignty.\n • The Imperial Examinations\n\n Although the Qing dynasty drew on a variety of human resources, the civil service examinations remained the most esteemed and legitimate way of climbing the social ladder. A young scholar hoping to land a governmental post should begin by taking the lowest-level examination to obtain the status of Cultivated Talent (xiucai). Having become a xiucai with high marks meant being academically qualified for sitting in the triennial Provincial Examinations. This qualification placed one as the peer of Government Students (shengyuan). Those having passed the Provincial Examinations became a licentiate member of Provincial Graduate (juren), and were eligible to apply for candidature with the Ministry of Rites in the Metropolitan Examination held at the capital. Successful candidates of the Metropolitan Examination were called gongshi, who were eligible for sitting at the Palace Examination presided over by the emperor. The emperor would then list the candidates in the order of the Three Categories (sanjia). Those categorized in the First Category (yijia) were conferred the title of Metropolitan Graduate with Honors (jinshi jidi), and those in the Second and the Third Categories were conferred the title of Regular Metropolitan Graduate (jinshi chushen) and Associate Metropolitan Graduate (tong jinshi chushen) respectively. The candidate standing first in the First Category was called the Principal Graduate (zhuangyuan), followed by the Second Graduate (bangyen) and the Third Graduate (tanhua).\n\n The civil service examinations were an elaborate process for recruitment of talents. The Provincial and Metropolitan Examinations, for instance, are comprised of three sections, each taking up the entire day. As to test subjects, the first section contained three questions based on the Four Books (Sishu) and the composition of a rhymed poem with five characters per line. On the second day, the candidates were asked five questions drawing on the Five Classics (Wujing). All essay questions should be answered in the form of Eight-legged essay (baguwen), a prescribed form of rhetorical sequence and organized elaboration. On the third day, the candidates were to write an argument essay to complete the examination. Subsequently, every test paper was to be sealed and transcribed in vermillion ink by the examination staff to produce a copy devoid of attributable handwriting. When the Provincial, Metropolitan, and Palace Examinations were over, the list of examination staff, test questions, and the list of successful candidates were published, and example essays would go into print.\n\n Considering the changing state of affairs, the Qing court abolished the Imperial Examinations in 1905. In lieu of the Examinations conventionalized since the Tang and Song Dynasties, modern school system was introduced. In an effort to emulate other nations in terms of modern school system, the Qing dynasty terminated the Imperial Examinations that had been in place for over thirteen centuries.", "pred_label": "__label__1", "pred_score_pos": 0.8657391667366028} {"content": "Neonate female American Quarter horse, Equus caballus.The foal gasped at birth then stopped breathing. The foal was dead on arrival to the University of California, Davis Veterinary Medical Teaching Hospital. Intubation was unsuccessful.\n\nGross Description:  \n\nThe mucous membranes of the oral cavity were diffusely tinged blue (cyanosis). Approximately 20% of the pulmonary parenchyma was aerated and the remaining lung tissue was atelectic (fetal atelectasis). Foci of epicardial hemorrhages were present on the right ventricle, adjacent to the atrio-ventricular junction. Pinpoint hemorrhages were scattered throughout the thymus and on the mucosal surface of the esophagus.\n\nHistopathologic Description:\n\nSkeletal muscle (diaphragm, semitendinosis): Within numerous swollen myofibers are discrete glassy to compact granular, lightly basophilic, oval to variably shaped and sized inclusion bodies that are up to approximately 50 μm in length. The inclusions disrupt and/or replace the normal cytoplasmic myofibril architecture.\n\nHeart: Intracytoplasmic inclusions, similar to those previously described, are within numerous variably swollen and disrupted myocytes. \n\nBrainstem: A few to moderate numbers of large neuronal cell bodies contain intracytoplasmic inclusion bodies, similar to those previously described.\n\nMorphologic Diagnosis:  \n\n1. Heart, Skeletal muscle (diaphragm, intercostal, thigh): Severe multifocal myofiber degeneration with intracytoplasmic inclusions.\n\n2. Brainstem: Moderate neuronal degeneration with intracytoplasmic inclusions.\n\nLab Results:  \n\nPeriod acid-Schiff staining of formalin-fixed, paraffin-embedded tissues collected at the time of necropsy, sectioned at 5 μm, show intensely PAS-positive, large intracytoplasmic inclusions within swollen skeletal muscle fibers (tongue, diaphragm, intercostal, semitendinosis, quadricep), in cardiac myocytes, and within large neuronal cell bodies in the brainstem. \n\nGenotyping was performed at the Veterinary Genetics Laboratory at the University of California, Davis. DNA used for analysis was isolated from formalin fixed paraffin embedded skeletal muscle tissue. Analysis showed the foal to be homozygous for the single nucleotide polymorphism responsible for glycogen branching enzyme deficiency.\n\nTransmission electron microscopy was performed on formalin fixed skeletal muscle and brainstem at the California Animal Health and Food Safety Laboratory, Davis Branch. Transmission electron microscopy revealed large electron dense filamentous to granular inclusions in degenerate skeletal muscle fibers. Similar inclusions are seen within degenerate neuronal cell bodies within the brainstem. \n\n\nGlycogen storage disease IV\n\nContributor Comment:  \n\nGlycogen branching enzyme deficiency, or glycogen storage disease IV, is a fatal hereditary condition that occurs in American Quarter horse and American Paint horse lineages. The inheritance pattern is autosomal recessive. The genetic mutation responsible for this disease has been identified in the glycogen branching enzyme 1 gene (GBE1) as a cytosine to adenosine substitution at base 102 that results in a tyrosine to stop mutation in codon 34 of exon 1.(7) Homozygous foals are either stillborn, die shortly after birth, or are euthanized within the first few months of life due to worsening clinical signs. Clinical signs vary and may include progressive muscle weakness, hypoglycemic seizures, respiratory failure, or sudden death. A study performed to assess the carrier frequency of this allelic mutation in populations of Quarter horses and Paint horses estimated that 8.3% of Quarter horses and 7.1 % of Paint horses are heterozygous for the mutated form of GBE1.(4)\n\nNormal glycogen is present in the cytosol in the form of small electron dense granules that range in diameter from 10 to 40 nm and are comprised of glucose molecules that have α 1, 4 linkages between glucose residues and α 1, 6 glycosidic bonds at every 10th residue that create a branched polymer.(3) Branching of the polymer increases water solubility and provides a larger number of terminal residues which are the sites for enzymatic action of glycogen phosphorylase and glycogen synthase; enzymes that are responsible for glycogen degradation and synthesis, respectively. While glycogen synthase catalyzes the synthesis of α-1, 4 linkages between glucose residues, glycogen branching enzyme is responsible for the formation of the α 1, 6 glycosidic bonds that create the branched form of the glucose polymer, glycogen. Animals born deficient of this enzyme form non-branching, PAS-positive, diastase-resistant glucose polymers that form large aggregates within the cytoplasm of various tissues including skeletal muscle, brain, spinal cord, heart, liver. Glucose polymers that have only α-1, 4 linkages between glucose residues or those having few α-1, 6 glycosidic bonds (1 per 30 glucose residues) are amylose and amylopectin, respectively.(3) Amylose and amylopectin are starches that serve as nutritional reservoirs for plants and are not normal storage forms of glucose in mammalian species. Glycogen branching enzyme deficiency (equine glycogen storage disease IV) has previously been termed amylopectinosis prior to identification of the genetic mutation responsible for this disease.(2) Also, prior to discovering the genetic mutation and inheritance pattern, Valberg, et al. reported that glycogen branching enzymatic activity was virtually absent in affected foals and that some of the half-siblings of the affected foals had an approximately 50% decrease in GBE activity.(6)\n\nThe breed of the foal (Quarter horse) and the character and staining properties of the numerous intracytoplasmic inclusions seen within all examined skeletal muscles, heart, and brainstem were consistent with glycogen branching enzyme deficiency, also referred to as glycogen storage disease IV. This diagnosis was confirmed by genotype analysis. The hemorrhages seen in multiple organs are considered agonal. The partial aeration of the lung parenchyma may have occurred during attempts at resuscitation or at the time of parturition when the foal was reported to have gasped for air prior to ceasing to breathe.\n\nJPC Diagnosis:  \n\n1. Skeletal muscle: Glycogen-like inclusions, intrasarcoplasmic, many, with multifocal mild rhabdomyocyte degeneration.\n\n2. Cardiac muscle: Glycogen-like inclusions, intrasarcoplasmic, many. \n\n3. Brainstem, gray matter, neurons: Glycogen-like inclusions, intracytoplasmic, rare. \n\nConference Comment:  \n\nThe contributor adeptly describes the pathogenesis behind the defect in glycogen metabolism and formation of inclusions in this important entity of American quarter and paint horses as well as Norwegian forest cats. Glycogen is a crucial source of energy stored in myocytes and in variable amounts within hepatocytes. When glucose is found in excess, it is converted into glycogen and stored in hepatocytes, thus glycogen concentration within the liver is highest shortly after eating, or in animals with abnormal glucose metabolism such as those with diabetes. Renal tubular epithelial cells and B-cells of the islets of Langerhans also can convert glucose to glycogen, resulting in intracellular accumulation in diabetics.(1)\n\nGlycogen is demonstrated histologically using the PAS reaction on two serial sections. Pretreatment of one section with diastase enables its comparison between the intensity of magenta staining of the two sections to determine whether glycogen is present. If glycogen is present, diastase will digest it and remove it from the tissue (diastase-sensitive), thus removing the magenta color. The inclusions in this case are diastase-resistant because, as the contributor describes, the deficient glycogen branching enzyme (GBE) is necessary to form the glycosidic bonds between glucose molecules, creating the branching polymer glycogen. This is in contrast to other glycogen storage diseases such as type I and III which involve deficiencies in the conversion of glycogen to glucose, thus resulting in excess accumulation of glycogen.(1) All types of glycogen storage diseases are characterized by defects in the glycogen metabolic pathway and ultimately result in the failure of adequate utilization of energy resources leading to generalized muscle weakness or death. \n\nAnother storage myopathy commonly recognized in the American Quarter horse, though reported in many other breeds, is equine polysaccharide storage myopathy. A definitive abnormality of the glycolytic or glycogenolytic pathway has not yet been identified for this entity, although a point mutation in skeletal muscle glycogen synthase I (GYS1) gene has been associated with some cases. This disease results in the accumulation of intracytoplasmic glycogen within type 2 fibers, which can become amylase-resistant inclusions as the glycogen becomes ubiquitinated in chronic cases. Episodes of exertional rhabdomyolysis is often associated with this condition.(5)\n\nA second major group of storage diseases worthy of mention in domestic animals are those of lysosomes, characterized by a deficiency of lysosomal acid hydrolases leading to the excess accumulation of insoluble metabolites within lysosomes. For a case example and in-depth discussion of the numerous types of lysosomal storage diseases, we refer the reader to WSC 2013 (conference 5, case 2)\n\n\n1. Myers RK, McGavin MD, Zachary JF. Cellular adaptations, injury and death: Morphologic, biochemical, and genetic bases. In: Zachary JF, McGavin MD, eds. Pathologic Basis of Veterinary Disease. 5th edition. St. Louis, MO: Elsevier Mosby; 2012:35,54-55. \n\n2. Render JA, et al. Amylopectinosis in a fetal and neonatal Quarter horse. Vet Pathol. 1999;36:157-160.\n\n3. Stryer L. Biochemistry. 4th edition. New York: WH Freeman and Company; 1995:472-473, 581-588.\n\n4. Valberg SJ, et al. Glycogen branching enzyme deficiency in Quarter horse foals. J Vet Intern Med. 2001;15:572- 580.\n\n5. Valentine BA, McGavin MD. Skeletal muscle. In: Zachary JF, McGavin MD, eds. Pathologic Basis of Veterinary Disease. 5th edition. St. Louis, MO: Elsevier Mosby; 2012:902-904.\n\n6. Wagner ML, et al. Allele frequency and likely impact of the glycogen branching enzyme deficiency gene in Quarter horse and Paint horse populations. J Vet Intern Med 2006;20:1207-1211.\n\n7. Ward TL, et al. Glycogen branching enzyme (GBE1) mutation causing equine glycogen storage disease IV. Mamm Genome 2004;15:570-577.\n\nClick the slide to view.\n\n4-1. Heart\n\n4-2. Skeletal muscle\n\n4-3. Skeletal muscle\n\n4-4. Brainstem\n\n4-5. Brainstem\n\n4-6. Skeletal muscle\n\nBack | VP Home | Contact Us |", "pred_label": "__label__1", "pred_score_pos": 0.9565283060073853} {"content": "Have Any Questions?\n\n01902 491 118\n\nOperating Hours\n\nMon - Fri 07:30-17:00\n\nEmail Us\n\n\nMicron Rating. What are they and why is it important?\n\nThe Filter Guys\n\nWhat is a Micron?\n\nA micron is a measurement of size. It is one millionth of a metre (1/1000000m) or a thousandth of a millimetre (1/1000mm). In filtration, a micron rating is a rating of the media’s capacity to stop dirt (it is not an efficiency rating). The micron rating will be nominal or absolute.\n\nA nominal micron rating means that a media may be explained as 10 micron but that is a mean average, it probably varies between 5 and 15 micron over the surface of the media itself; this often applies to cellulose media which is a natural product. Engine oil and fuel filters are often nominally rated.\n\nAn absolute micron rating means that the media has a uniformed surface and will ‘do what it says on the tin.’ A 10 micron absolute filter will not allow particles of 10.1 micron or bigger through at all. Absolute filters are man made products, such as glass fibre, and are manufactured to an extremely high specification. Hydraulic filters are often absolute rated (but not necessarily for all hydraulic applications).\n\nWhy is it important?\n\nIn filtration the micron rating of the element is very important to guarantee its correct operation. The wrong type of media can mean more dirt gets through the filter than you want and this can cause wear and tear and even complete breakdowns of your engines and hydraulic equipment.\n\nTake a lubrication system on your engine. Oil is pumped between the moving parts of the engine, this oil contains particles, if the oil isn’t filtered before being sent into the engine then wear and tear will occur. The space between moving parts may only be 30 or 40 microns. If oil contains particles of that size then dirt is going to jam and consequently build up between moving parts. Over many hours (or years) of operation with inadequate filtration this build up of dirt will cause the moving parts to jam which will cause catastrophic failure of an engine leading to expensive downtime and repair costs.\n\nOf course, over time filters will clog with dirt too but they are easily sourced from Sterling Filtration Ltd and replaced. They hold the damaging particles so the engine doesn’t have to. A filter may cost ten, twenty, fifty, one hundred pounds and sometimes even more, but compared to the cost of downtime of a machine and the stripping and rebuilding of an engine they are easily the most cost effective way of keeping your engines and machinery running properly all of the time. See your operators manual for service intervals.\n\nWatch Out for Dents on Liquid Filters.\n\nThe Filter Guys\n\nWatch Out for Dents on Liquid Filters. Cracked filters can be caused by dents made during improper installation. Filters that are dented prior to or during installation should not be used. Filters dented after installation should be replaced immediately. The cost of replacing a dented filter is much less than the cost of the damages that could result from a dented filter that fails during service.\n\nFilter fatigue results from pressure pulses within the system. Pressure is regulated by a pressure regulating valve. This valve is spring operated and intermittently opens and closes to regulate pressure. Once pressure exceeds the setting of the spring in the regulating valve, the valve will open and relief the pressure until the spring can expand and close the valve. This function is continued continuously during operation of the system, creating a pulsing effect. Filter canisters are subjected to the same pulsation. However, unlike the spring in the pressure regulating valve, canister material is susceptible to failure after such fatigue.\n\nFilters are designed with a low carbon steel to resist fatigue and are formed so the stress created by the pulses in the system are equalised over the surface area of the canister. A dent provides an area of stress concentration where pressure pulses can greatly shorten the fatigue life of the canister.\n\nRemember, filters should never be fitted to an engine or hydraulic system if they are dented or damaged in any way.", "pred_label": "__label__1", "pred_score_pos": 0.5040283203125} {"content": "Your guide to studying Nanotechnology in Malaysia\n\nCourse Duration:\n\n4 Years\n\nAverage Salary:\n\nMYR 27,000 - 125,000\n\nAverage Fees:\n\nMYR 80,000\n\nJob Demand:\n\nWhat is Nanotechnology?\n\nNanotechnology works around the smallest, most amazing fragments of science from storing and altering things on the cellular level, to creating new, tiny pieces of electronics.\n\nDo you have a keen eye for detail? Do want to innovate and create new processes and things not seen prior to this? Do you want to be a crucial cog in the clock of the future? Have you ever had an interest in atoms? Then perhaps, Nanoengineering is the course for you.\n\nNanotechnology is a highly specialised field that zooms down to an acute attention to detail so as to improve technology. Working with genetics and the smallest man-made building blocks in existence is at the core of th\n\nMore details  Less\n\nWhat are the subjects you will study in a Nanotechnology course ?\n\n\n\nAdditional Mathematics\n\n\nIntroduction to Computational Methods\n\nOrganic Chemistry for Nanotechnology Engineers\n\nPhysics for Nanotechnology Engineers\n\nIntroduction to Materials Science and Engineering\n\nWhat skills do you need for a course in Nanotechnology?\n\n\nMost people have goals they want to achieve. But a visionary doesn’t just stop there. They list down anything and everything they need to do to make it work. They understand that to turn a vision into reality, they need to work for it, because hard work beats talent, when talent doesn’t work.\n\nEye for detail\n\nA Nanotech engineer is someone who makes things happen efficiently on a massive scale, yet dealing with the smallest forms of matter. Sure, it sound complicated, because it really is. How else could you imagine ever creating and perfecting a Storm Trooper suit that’s meant for battle?\n\n\nWhile most of your classmates were bookworms, you, besides being good with books yourself, had a knack for all things creative. You loved analysing objects and machines, thinking about creative ways to improve the designs as well as make it more practical and functional.\n\nTop Universities/Colleges to study\nNanotechnology courses\n\n\nKeen to study Nanotechnology? We are eager to help you with the various insights about the course. Fill out details below for you FREE consultation with our experts.\n\nNeed help?\nmailwhatsapp icon", "pred_label": "__label__1", "pred_score_pos": 0.7264423370361328} {"content": "Monthly Archives: September 2018\n\nHow Mentoring Can Facilitate Acquisition\n\nThe immediate aftermath of an acquisition poses a number of major challenges. While many of these challenges relate to integration of systems and structures, the people challenges are often the most difficult and long lasting. In particular: Ensuring that senior level talent does not leave. Headhunters target merger situations, because the uncertainty causes people to […]\n\nCoaching: How Much Should Line Managers Give Direct Reports?\n", "pred_label": "__label__1", "pred_score_pos": 0.7228080034255981} {"content": "All power supplies have to be equipped with various protections which do not only protect them from failures but also protect the system that is powered by them. Sometimes they are listed on specifications. What do they mean and how exactly does those help improve your LED drivers?\n\nHere some explanation about protection. \n\nOVP (Overvoltage protection)\n\nIf the voltages increase above a certain tolerance value on the single lines, the LED driver automatically switches off. Usually, it occurs in output terminal that does not connect well with LED. The failure of a pass transistor could easily put excess voltage on IC’s. With switchers, most failures cause no output at all. \n\nSCP (Short-circuit protection)\n\nIn the case of a short-circuit, this feature prevents damage to the core components of the LED driver.\n\nOPP (Overload protection)\n\nIf the system is oversized and requires more power from the LED driver than it can perform, this protection function is activated.\n\nOCP (Overcurrent protection)\n\nIf the load on a single line is higher than indicated, the LED driver automatically switches off. \n\nOTP (Over Temperature Protection)\n\nWhen the over-temperature protection (OTP) is present, we usually find a thermistor attached to the secondary heat sink (the fan control unit usually uses a thermistor in the same heat sink). The thermistor informs the protections circuit about the temperature of the heat sink, and if this exceeds a specified threshold, then the output power shuts down. An excessive temperature may be a result of overloading or the cooling fan’s failure, so OTP prevents (further) damage to the LED driver.  \n\nHow that help improve your LED drivers? They keep your light system safe, also the LED driver. The driver will not be damaged and protects itself. But the safety function is not a safety function. There are some extra components like a MOV to protect the system, and of course, the safety functions must be settled correctly. otherwise, the module is useless. MOONS’ LED drivers integrated with multi-protection above.", "pred_label": "__label__1", "pred_score_pos": 0.6618577241897583} {"content": "Film or book that depicts a character with a psychological…\n\nChoose a relevant film or book that depicts a character with a psychological disorder(s). Provide a brief summary of the the movie, book, or show.…\n\nChoose a relevant film or book that depicts a character with a psychological disorder(s). Provide a brief summary of the the movie, book, or show. ( No more than 1-2 paragraphs) Write about the psychological disorder or disorders you believe they have and give the reasons for your diagnosis. Provide a comprehensive description of the relevant symptoms of the character and biographical information. Discuss how these symptoms meet the DSM 5 diagnostic criteria for a particular mental health disorder. Give specific examples from the movie, show, or book in order to support your claims. Identify some of the positive and negative messages that are portrayed in the film/book about the disorder you are discussing. Explain contextual factors in the development of the disorder, such as social/familial, spiritual, emotional, cognitive, work/education level, physical that may have impacted the character. What treatment modalities you would recommend to manage their symptoms.\n\nSample Solution\nThe subject of this article is to relate the idea of incorporated water the executives and choice help to a case of my nation, including a case of how choices are really made. About 71% of earth surface is water secured, the sea holds 95% of earth’s water ( yet there isn’t sufficient water in certain pieces of the world. The ascent sought after for good versatile drinking water, water system water, local and mechanical water all came up because of the developing populace particularly in the Africa and Asian landmass (UNDP 2006). Water will keep on being in hope because of some natural concerns like untamed life and amphibian life for recreational purposes. Be that as it may, the hypothesis for hypothesis for incorporated water the executives was rarely new and can be seen in Rahamana and Varis (2005); similarly a solid meaning of IWM was given by specialized warning council of worldwide water association (GWP-TEC 2000) As a procedure which advances the organized improvement and the board of water, land and other related assets so as to expand results financially and social welfare in an evenhanded way without bargaining the supportability and the environments. Besides, in giving satisfactory supplies of good water, precautionary measure ought to be mulled over all together the safeguard hydrological, organic and synthetic exercises of the biological system. Along these lines we can draw a short synopsis of IWM as assembling social financial and ecological issues, including receiving human exercises inside the limit time distinction of nature (Gumbo, B. furthermore, Van der Zaag 2001); just as handling water related infections and coming into terms with change of atmosphere (Wood, S. et al 2000). Nigeria water area will be utilized as a contextual analysis in this article of which I am a resident of the nation by birth. This article will diagram how choice are really made in the board of stream bowl in Nigeria and will perhaps turn out with an answer of how to cure a few territories that are not all around oversaw and an individual ends. 2 The Nigeria Water part Nigeria has around eleven stream bowl improvement specialists, made in 1976, by the Federal Government to saddle the nation’s water assets and streamline the nation’s rural assets. The RBDAs incorporates the Sokoto-Rima bowl, Hadejia-Jamaare bowl, the Lake Chad bowl, upper Benue bowl, lower Benue bowl, the cross stream bowl, Anambra-Imo bowl, the Niger-Delta bowl, Benin-Owena bowl, the Niger bowl and the Oshun-Ogun bowl (Ewash 2009). Nigeria as a country covers 0.924*106 km2 on landmass (Ita, 1994) with four significant waste bowl zones the lower Niger, the lake Chad bowl, the stream bowl of Cross and Imo and the southwestern seepage bowls (Federal service of water assets 2003a, b). Nigeria is honored with water assets, its surface and ground water assets are evaluated at 250*109 m3 (Federal Republic of Nigeria, 2001). The yearly precipitation differs from over 4,000mm in the southeast to cry 250mm in the upper east and molded to worldly varieties (Federal Republic of Nigeria 2004), it infers that precipitation is about 1177mm every year. The vast majority of the issues confronting water the board in Nigeria are absence of specialists, particularly in the specialized side. The impassive frame of mind and poor financing appeared in water segment has expanded the low execution which can be seen everywhere throughout the nation. The absence of fitting work power in Nigerian water division has been executed by the presentation of tribalism and quantity framework (FCC 19969); there by sidelining the experts with satisfactory experience. Lamentably this sort of strategy has not yielded wanted outcomes in the division. In this way the requirement for change in system emerges for the genuine bore of individuals to deal with the different plans, without consistent separate of water area that we currently involvement with the nation. Gets to water in certain locales are still low in spite of the enormous accessible water assets in the nation (Federal Republic of Nigeria). The quantity of interest in water division isn’t urging when contrasted with the populace development and fast extension of numerous urban communities. The advancement of dams and water system in the nation are not empowering as the greater part of this dams and lakes work in the past are underutilized while some have been flourished (YallAfrica 2012). 2.1 Concept Capacity Building: The presentation of idea limit building is right now observed as the procedure whereby networks prepared themselves to attempt the elements of the state and administration arrangement in a reasonable way. This procedure is gone for both expanding access to asset and changing the strategies for connection between the gatherings in question. More prominent comprehension is required in the limit building process just as arranging, planning and execution of the exercises required (Groote and van de Molen 2000). The idea also perceived the improvement and procuring of information Water as an asset can’t be over looked, it is significant for the sustenance of living things can generally be acknowledged everywhere throughout the world. Coordinated water the executives requires a straight approach, joining social and financial advancement with safeguarding of regular eco-framework. Powerful administration incorporates land and water clients everywhere throughout the predefined territories or the ground water spring, crisp water asset is a characteristic resource that should be supported and kept up. The standard of IWRM perceives the way that water is required for a wide range of purposes. Along these lines the board must be all encompassing and worried about the interest put on the asset and the risk to its endurance. 2.2 Integrated Approach The realities still remain that water and stream bowl the board and mix requests a blend of data from various control which can be dissected so as to get wanted outcomes. Incorporating and the board of water asset in Nigeria has regularly been seen from the edge of limit as opposed to bowl. This has prompted the underdevelopment of the nation’s water assets and similarly made the administration of such improvement insufficient. Compelling incorporated water the board in Nigeria requires a solid participatory technique in the advancement of the country’s water asset, which is perhaps the best mean to accomplish enduring accord and regular understanding inside the partners (Truffer, B. at el 1998). This strategy includes making mindfulness for significant of good and moderate crisp water among the approach producers and the whole open. Accomplishing this implies most choices would be considered at the least proper classification with full open counsel, arranging and usage of water ventures. Appropriate interest includes all gatherings who depend on specific water the executives and venture choices, albeit significant endeavors have been made to recognize the components that impact coordinated water the executives, which a portion of the appropriate responses are not appended to the approach making (Gooch and Stalnacke 2010b). 3 Implementation of required Strategy Government through its instrument should similarly make an adequate playing level gathering for every one of the gatherings engaged with the administration of water assets just as give an extraordinary thought to the host networks of waterway bowl through preparing and securing program, particularly to the minorities and support ladies strengthening. There is dire requirement for all to take part in the basic leadership including the social gatherings. The board can improved the accomplishment of maintainability and overseeing water in a coordinated economical manner if all the partners’ advantages are being considered. Right now there are part of ways the partners can be associated with the choice and the executives of their current natural issues (Gooch and Huitema 2008). All things considered, understanding the logical methodology in incorporating water asset might be weird to certain gatherings, in view of absence of information concerning the elucidation of logical outcomes. Great and awful water the executives through IWM can be as risky as an issue of life and demise in certain pieces of the nation, this is the motivation behind why most areas or host networks that are influenced by the administration of this significant asset, ought to be exceptionally engaged with the exchanges with regards to the most ideal approach to oversee it. Approaches to include these locales and host networks in the development of projects are using past, present and future situations (Alcamo 2001; shell global 2003). 4 Recommendations It is essential to perceive that people have right to get to spotless and convenient water, through reasonable methods. Water as an item has a worth and the disappointments in incorporated water the board comes therefore that full worth has not been given to the water asset, this has prompted the inefficient and corruption of our eco-framework, there by coming about to ecological disappointment. Accomplishing financial incentive on water is a significant methods for precise basic leadership on the conveyance of water between independent water divisions and various gatherings inside the area. Putting a money related worth or something in return for water can go about as a standard of interest and supply which the continue can be utilized in distancing weakness networks, social gatherings, state or influenced areas just as reinvesting it for nonstop and feasible water 6 supply (ADB 2003). Moreover, financial thought of elective water clients gives leaders a one of a kind manual for speculation needs. Despite the fact that it ought not be the main angle to be considered, social financial objectives also has a fundamental impact in incorporated water asset the board (Pereira, L.S. at el 2002). 5 Conclusions With progressing expanding of Nigerian populace and shaky environmental change has brought about substantial interest for water asset now and later on. Precise methods and approach shou>GET ANSWER Let’s block ads! (Why?)\n\nDo you need any assistance with this question?\nSend us your paper details now\nWe’ll find the best professional writer for you!\n\n\nerror: Content is protected !!", "pred_label": "__label__1", "pred_score_pos": 0.6700693368911743} {"content": "Hydraulic pressure and flow relationship\n\nHydraulic analogy - Wikipedia\n\nhydraulic pressure and flow relationship\n\nThe electronic–hydraulic analogy is the most widely used analogy for \"electron fluid\" in a metal Flow and pressure variables can be calculated in both steady and transient fluid flow A slightly different paradigm is used in acoustics, where acoustic impedance is defined as a relationship between pressure and air speed. To understand the relationship between the pressure drop across a pipeline and the flow rate through that pipeline, we need to go back to one. Of all the concepts that keep parts changers from becoming hydraulic troubleshooters, understanding the difference between pressure and flow is the most.\n\n\nhydraulic pressure and flow relationship\n\n\n\n\n\nFluid Power Formulas, Hydraulics - Engineer's Handbook\n\n\nIf the flow area increases through an expansion or diffuser, the velocity will decrease and result in an increase in the static pressure. If the pipe diameter is constant, the velocity will be constant and there will be no change in pressure due to a change in velocity.\n\nTwo paradigms can be used to introduce the concept to students using pressure induced by gravity or by pumps. In the version with pressure induced by gravity, large tanks of water are held up high, or are filled to differing water levels, and the potential energy of the water head is the pressure source. This has the advantage of associating electric potential with gravitational potential. A second paradigm is a completely enclosed version with pumps providing pressure only and no gravity.\n\nThis is reminiscent of a circuit diagram with a voltage source shown and the wires actually completing a circuit. This paradigm is further discussed below. Other paradigms highlight the similarities between equations governing the flow of fluid and the flow of charge.\n\n • Basic Hydraulic Formulas\n\nFlow and pressure variables can be calculated in both steady and transient fluid flow situations with the use of the hydraulic ohm analogy. The pressure and volume flow variables are treated as phasors in this definition, so possess a phase as well as magnitude.\n\nIn this paradigm, a large cavity with a hole is analogous to a capacitor that stores compressional energy when the time-dependent pressure deviates from atmospheric pressure. A hole or long tube is analogous to an inductor that stores kinetic energy associated with the flow of air.\n\nhydraulic pressure and flow relationship\n\nHydraulic analogy with horizontal water flow[ edit ] Voltage, current, and charge[ edit ] Hydraulic pressure difference In general, electric potential is equivalent to hydraulic head.\n\nThis model assumes that the water is flowing horizontally, so that the force of gravity can be ignored. In this case electric potential is equivalent to pressure.\n\nFluids in Motion: Crash Course Physics #15\n\nThe voltage or voltage drop or potential difference is a difference in pressure between two points. Electric potential and voltage are usually measured in volts.\n\nElectric current is equivalent to a hydraulic volume flow rate ; that is, the volumetric quantity of flowing water over time.\n\nUsually measured in amperes.\n\nHydraulic analogy\n\nElectric charge is equivalent to a quantity of water. Basic circuit elements[ edit ] Conducting wire: Node in Kirchhoff's junction rule: A pipe tee filled with flowing water. A relatively wide pipe completely filled with water is equivalent to conducting wire. When comparing to a piece of wire, the pipe should be thought of as having semi-permanent caps on the ends.\n\nThe Difference Between Pressure and Flow | GPM HYDRAULIC CONSULTING, INC.\n\nConnecting one end of a wire to a circuit is equivalent to un-capping one end of the pipe and attaching it to another pipe. With few exceptions such as a high-voltage power sourcea wire with only one end attached to a circuit will do nothing; the pipe remains capped on the free end, and thus adds nothing to the circuit.\n\nA resistor is equivalent to a constriction in the bore of the pipe which requires more pressure to pass the same amount of water.\n\nhydraulic pressure and flow relationship\n\nAll pipes have some resistance to flow, just as all wires have some resistance to current. A node or junction in Kirchhoff's junction rule is equivalent to a pipe tee. The net flow of water into a piping tee filled with water must equal the net flow out.\n\nThe Difference Between Pressure and Flow\n\nVoltage or current source: A dynamic pump with feedback control. A capacitor is equivalent to a tank with one connection at each end and a rubber sheet dividing the tank in two lengthwise [7] a hydraulic accumulator. When water is forced into one pipe, equal water is simultaneously forced out of the other pipe, yet no water can penetrate the rubber diaphragm.\n\nEnergy is stored by the stretching of the rubber. As more current flows \"through\" the capacitor, the back-pressure voltage becomes greater, thus current \"leads\" voltage in a capacitor. As the back-pressure from the stretched rubber approaches the applied pressure, the current becomes less and less.", "pred_label": "__label__1", "pred_score_pos": 0.7873815298080444} {"content": "\nCOURSE DESCRIPTION A study of the world of the New Testament (Jewish and Greco-Roman backgrounds), basic literary features, and theological significance of Matthew through Acts and the origin of the New Testament canon. A concern for preaching, teaching, and Christian living will guide lectures, discussions and requirements.", "pred_label": "__label__1", "pred_score_pos": 1.0000044107437134} {"content": "Fast Sparse ConvNets\n\nSep 25, 2019 Withdrawn Submission readers: everyone\n • TL;DR: Sparse MobileNets are faster than Dense ones with the appropriate kernels.\n • Abstract: Historically, the pursuit of efficient inference has been one of the driving forces be-hind the research into new deep learning architectures and building blocks. Some of the recent examples include: the squeeze-and-excitation module of (Hu et al.,2018), depthwise separable convolutions in Xception (Chollet, 2017), and the inverted bottleneck in MobileNet v2 (Sandler et al., 2018). Notably, in all of these cases, the resulting building blocks enabled not only higher efficiency, but also higher accuracy, and found wide adoption in the field. In this work, we further expand the arsenal of efficient building blocks for neural network architectures; but instead of combining standard primitives (such as convolution), we advocate for the replacement of these dense primitives with their sparse counterparts. While the idea of using sparsity to decrease the parameter count is not new (Mozer & Smolensky, 1989), the conventional wisdom is that this reduction in theoretical FLOPs does not translate into real-world efficiency gains. We aim to correct this misconception by introducing a family of efficient sparse kernels for several hardware platforms, which we plan to open-source for the benefit of the community. Equipped with our efficient implementation of sparse primitives, we show that sparse versions of MobileNet v1 and MobileNet v2 architectures substantially outperform strong dense baselines on the efficiency-accuracy curve. On Snapdragon 835 our sparse networks outperform their dense equivalents by 1.1−2.2x – equivalent to approximately one entire generation of improvement. We hope that our findings will facilitate wider adoption of sparsity as a tool for creating efficient and accurate deep learning architectures.\n • Keywords: Sparsity, Vision, CNNs, ConvNets, Inference, Mobile, Kernels\n0 Replies", "pred_label": "__label__1", "pred_score_pos": 0.987424373626709} {"content": "pick and pack\n\n\nPicking and packing is a vital element of e-commerce order fulfilment services that intends to enhance the shipping and delivery of a product. The method is typically used in the retail industry, where instead of shipping large pallets of…", "pred_label": "__label__1", "pred_score_pos": 0.9764983057975769} {"content": "© 2018 by ChangeYourMind.org - a website for personal growth\n\nWhy fight nature by picking on yourself\n\n\nSo what can we do to feel better about ourselves? Well, one thing we can look and see what is there upon ourselves that were not appreciating? What is there about ourselves were not accepting and allowing to be, to happen? What's interfering with our being? What's stopping us for being the best that we can be and allowing us join our true nature with nature that's our goal, that's the trees goal, that's the garden, that's a natures way and why fight nature by picking on yourself one of our great scientist said you should treat your, you should treat our ego with such beautiful respect and dignity and high regard so that it will allow us to be free and as I record this just allow yourself to let go and be what you intended to be thank you.\n\nMore Videos:\n\nRespect and appreciate your mind and body connection\n\nThe positive spiritual reward for releasing the trauma\n\nEmotional intelligence allows you to read signals from within your own self", "pred_label": "__label__1", "pred_score_pos": 0.6252182722091675} {"content": "Considering the nature of silence\n\nMuch of communication focuses on expressive aspects of verbal and non-verbal communication. However, “silence” also plays an important role. This article helps you to consider the role and meaning of ‘silent zones.’\n\nAfter you read this article (please download) by Chronemics and Silence studies pioneer, Tom Bruneau, we urge you to involve yourself in the following communication competition: Sorry, “NO TALKING ALLOWED! ”\n\n\n\n\nRethink your daily “communication” patterns and the role that “silence” plays in them. If you only have a few silent moments daily, consider what places, events, or rituals require silence and why? What does silence mean in each of these?\n\n\nAs you think about this important dimension of communication, please feel free to engage in discussion with others in the comments section. Don’t forget to click ‘like’ on the posts that you find particularly insightful, and to explain why!\n\nFurther resources:\n\n\nShare this article:\n\nThis article is from the free online course:\n\nIntercultural Communication\n\nShanghai International Studies University (SISU)", "pred_label": "__label__1", "pred_score_pos": 0.8185837268829346} {"content": "Digital Repository\n\nFontanilla, Creo que lo major es bscar en otra parte.../I think we should look somewhere else..., 1965\n\nWith a growing population of Cuban refugees in the U.S., housing opportunities throughout Florida became scarce in the 1950s and 60s. A 1965 cartoon by Silvio Fontanila, published in Oportunidades, depicts the difficulties experienced by Cubans escaping Fidel Castro’s communist regime as major Florida cities became overcrowded.\n\nCuban Refugee Center Records, Cuban Heritage Collection, University of Miami Libraries.", "pred_label": "__label__1", "pred_score_pos": 0.7392605543136597} {"content": "Slow Life (Personal Development)\n\n\nSpiritual Time\n\nSlow Life of @spiritualwoman\n\nPractical guide for a true change of life.  In this book you will find reflections and proposals whose objective is to help to configure your own slow life.\n\n\nYou wonder if the path you arrive is the right one? If it is possible to get out of this materialism that is drowning us? Do you feel that there are too many gaps in your life? Do you think you are going too fast and without the possibility of stepping on the brake?\n\nYou have in your hands the possibility of turning your life around and reprogramming your course.\n\n\n* Spanish language.\n\nNo customer comments for the moment.\n\nWrite a review\n\nWrite a review\n\n$ 32.00\n\n", "pred_label": "__label__1", "pred_score_pos": 0.9562455415725708} {"content": "Living an optimal lifestyle through higher consciousness\n\n As a transformation expert, #1 bestselling author, speaker, and energy practitioner, Nancy Clairmont Carr empowers achievers to live a higher consciousness lifestyle, guided by intuition and infinite intelligence. Living in a higher vibratory state allows individuals to optimize all areas of their life and create the future they desire.\n\nWith a diverse background in corporate and entrepreneurial business, along with expertise in marketing, health coaching and energy healing, Nancy founded “The Joy-Effect”.  She provides transformation coaching for conscious leaders and influencers who want optimized growth in business and life. Nancy's gift is creating joy, abundance, and freedom for individuals.\n\nNancy accelerates growth and transformation by aligning body, mind, emotions, and removing obstacles including fear, negative energy patterns, and limiting beliefs. She increases consciousness and develops higher brain thinking by re-patterning the brain's neural pathways and intuitive connection. These proven strategies provide access to optimal solutions and self-expression. \n\nOver the last 20 years Nancy has helped individuals achieve significant health, business, relationship and spiritual goals. She now focuses on supporting conscious business owners, leaders and influencers interested in optimizing their business, life and impact through purpose.\n\n Nancy is genuinely interested in helping people. She helped me understand what and how to change to achieve my goals and be more balanced professionally, emotionally and physically…I can count on Nancy for total solutions.” Aurelie Spirito, Business Owner, Lila Buffet Styling\n\npicture of the sun rays on the trees demonstrating stress reduction and energy\n\nHer Story\n\nAfter many years of living a very stressful lifestyle, Nancy left the corporate world to become more aligned with her purpose and create a more integrated, balanced lifestyle. Through her work with health coaching, energy medicine and spiritual development she found a way to continuously optimize all energy centers and contribute at a higher level and experience more joy, abundance and freedom. \n\nThere has been a long-term societal belief that maintaining a singular focus over a long term period is required to create the success you desire, at the exclusion of enjoying creative endeavors for a more enjoyable life. Nancy has discovered the opposite is true. Incorporating strategies that increase body, mind and spirit health on a consistent basis creates an optimized life.  One which provides the highest level of impact, access to the most optimal solutions available and a supreme level of joy. These strategies are incorporated into her coaching, along with high performance business and energy sustaining principles.", "pred_label": "__label__1", "pred_score_pos": 0.9817946553230286} {"content": "The extreme cold that has swept across Europe has meant that the snow conditions are very good at the moment.\n\nWith the school holidays looming, there are still a few weeks left to benefit from some great skiing before things get busy.\n\n\nThere are excellent ski-ing conditions in all the Tarentaise ski resorts.  Our staff and clients have given us positive feedback for Val d’Isère, Val Thorens, Tignes, La Plagne, Meribel, Courchevel and Les Arcs.\n\n\nThere are some great offers to be had and of course we can provide you with the transfers!", "pred_label": "__label__1", "pred_score_pos": 0.999584972858429} {"content": "by EG McPherson, JR Simpson, M Livingston\n\nUrban Forestry and Urban Greening 2:73-86\n\n\nTrees planted strategically to shade buildings can reduce energy use for cooling and heating. To determine the energy savings from existing trees and from sites where trees could be planted to shade buildings, aerial imagery from 21 California cities was analyzed. For each city, at least 3,495 sample points were randomly chosen and identified as to land use type, presence of tree, presence of suitable planting space for a tree (i.e., presence of a pervious surface), and distance and direction from tree site to nearest building. This information was extrapolated from the individual city to represent all urban areas of that city’s climate region. The results indicate there are approximately 177 million energy-saving trees in California, reducing energy use by 2.5% overall and by 10% at peak energy times. There are estimated to be another 242 million sites for energy-saving trees. If 50 million of these were planted, the result would be an additional 1.1% energy saved overall and 4.5% reduction in peak load demand. If total planting and maintenance costs average $50/tree, the energy savings involved would be well within the range considered cost-effective.\n\nRegion: California, Oregon, Washington\nPublication Type: Journal article\nKeywords: aerial and satellite imagery, benefit-cost analysis, computer modeling, energy conservation, shade trees, tree planting initiative, and urban forestry", "pred_label": "__label__1", "pred_score_pos": 0.6047443151473999} {"content": "Click here to win prizes by solving the puzzle Advent calendar.\nClick here to win prizes by solving the puzzle Advent calendar.\n\n\n\n22 December\n\nToday's number is a palindrome. Today's number is also the number of palindromes between 111 and 11111 (including 111 and 11111).\n\n14 December\n\nWhat is the only palindromic three digit prime number which is also palindromic when written in binary?\n\n\nShow me a random puzzle\n Most recent collections \n\nSunday Afternoon Maths LXVII\n\nColoured weights\nNot Roman numerals\n\nAdvent calendar 2018\n\nSunday Afternoon Maths LXVI\n\nCryptic crossnumber #2\n\nSunday Afternoon Maths LXV\n\nCryptic crossnumber #1\nBreaking Chocolate\nSquare and cube endings\n\nList of all puzzles\n\n\npascal's triangle grids differentiation speed square numbers star numbers shape ellipses 3d shapes polygons parabolas shapes hexagons lines factors proportion squares percentages symmetry geometry factorials cube numbers mean rectangles averages prime numbers arrows remainders 2d shapes volume probabilty sequences division probability scales money crosswords cryptic clues wordplay quadratics unit fractions means sums cards perimeter colouring sport time algebra logic odd numbers functions books area trigonometry coins folding tube maps number chocolate digits dice clocks planes doubling multiples floors games addition palindromes multiplication crossnumbers sum to infinity dodecagons circles calculus irreducible numbers fractions indices rugby people maths graphs taxicab geometry advent regular shapes perfect numbers partitions square roots routes numbers chalkdust crossnumber triangle numbers angles christmas triangles surds complex numbers ave balancing chess integers spheres cryptic crossnumbers integration coordinates bases dates menace\n\n\nShow me a random puzzle\n▼ show ▼\n© Matthew Scroggs 2012–2019", "pred_label": "__label__1", "pred_score_pos": 0.8470048904418945} {"content": "You must Sign In to post a response.\n • Category: Suggestions and Feedbacks\n\n What is the main cause of pollution in Orissa?\n\n Orissa is also a polluted state. What are the main cause behind pollution in Orissa and causes pollution on Bhubhaneswar?\n • #813\n The main cause of pollution in Orissa is due to more use of Plastic. It has been seen not only at Bhubaneswar but also many parts of our state, where due to pollution, number of dolphins and olive ridle tortoise were dying every year. It should be stopped by awareness only. We should get together and work with NGOs to clean this.\n", "pred_label": "__label__1", "pred_score_pos": 0.9623255133628845} {"content": "EAP 6.4 & WebSockets with web server\n\nLatest response\n\nHello, I already tried to ask about this here but since I haven't received any satisfactory response so far, I'm trying it here as well:\n\nBased on:\n- 16.2. Create a WebSocket Application\n- Does JBoss EAP support the use of WebSockets?\n- JBoss Enterprise Application Platform (EAP) 6 Supported Configurations - Red Hat Customer Portal\n- Does Red Hat / JBoss offer support for Apache, mod_jk, mod_proxy, or mod_cluster? - Red Hat Customer Portal (by the way why does this one mention mod_proxy as supported when the Supported Configurations document above doesn't mention mod_proxy at all?)\n- 4. Unsupported and Deprecated Features\n- Add support of websocket proxying. · modcluster/mod_cluster@e801c55 · GitHub\n- Make the websocket proxy switchable. · modcluster/mod_cluster@f1f68c5 · GitHub\n\nIt seems that:\n- EAP 6.4 itself supports WebSockets\n- supported web server connectors mod_cluster 1.2.11 / mod_jk 1.2.40 don't support WebSockets\n- mod_cluster 1.3.1 supports WebSockets (without failover) via Apache HTTP Server 2.4.x mod_proxy_wstunnel but this configuration isn't supported by EAP 6.4\n- Apache HTTP Server 2.4.x mod_proxy_wstunnel alone (well, typically combined with mod_proxy_http + mod_proxy_balancer) supports WebSockets but this configuration isn't supported by EAP 6.4\n\nHow is one supposed to achieve a supported configuration with web server and WebSockets?\n\n\nHi Petr\n\nI did see your question on the community forums but I didn't get much more information to update you unfortunately at the time. What I've done is reached out to our engineers in this area who are discussing this with product management. We appreciate your research in to the supported configurations, at the moment it looks like you are right and this isn't supported.\n\nLike I said, our product team will be in touch as soon as they have more information regarding your question and be able to provide much more information.\n\n\nHello again,\n\nI'd like to apologize for the lull in my responsiveness. I just wanted to drop by and make a statement as I've had conversations around this post in support cases with a few individuals.\n\nJWS 3.x is not presently supported as a proxy to EAP. It may work, but we haven't tested it at this time and therefore can't support it's use. We are working on testing this and will be supporting JWS as a proxy to EAP in a later 3.x release. Please reply with any questions; I'd be happy to answer them, hopefully a bit quicker than this reply\n\n\nAccording to the latest update in https://access.redhat.com/articles/2026253, websocket is supported in the combination of mod_cluster 1.3.1.Final + EAP 6.4. Also, there's someone verified the function of loadbalancing WebSocket connection with modcluster: https://developer.jboss.org/thread/260794 (last comment of the thread)\n\n\nThat article (https://access.redhat.com/articles/2026253) is for EAP 7 only.\n\nFor EAP 6 is this one: https://access.redhat.com/articles/111663\n\nAnd it says that requires EAP 6.4.4 and above to use mod_cluster 1.3.1.Final or 1.3.5.Final. Although, that page is not like the EAP 7 one that says it works with WebSocket protocol.\n\nAm I right?\n\n\n\nAnd it's rather interesting that:\n\nhttps://access.redhat.com/solutions/47442 (which is supposed to cover information for EAP 6 & 7 as well) claims: WebSockets are not currently supported with mod_cluster\n\nhttps://access.redhat.com/articles/2026253 (for EAP 7) covers the mod_cluster 1.3.5 & WebSockets as supported (well, actually it's claimed as tested) configuration\n\nThat's quite confusing regarding how to look at the mod_cluster 1.3.1/1.3.5 support in EAP 6.4.4 - whether this means that one can assume WebSockets are supported in EAP 6.4.4 with mod_cluster 1.3.1/1.3.5 as well.\n\nHello Petr,\n\nIt's true that Websocket should work with mod_cluster 1.3.1/1.3.5 but there's a bug: JBCS-291\n\nIt is related to JBCS and mod_clsuter. Look at the comments and you can follow it to receive any news about it.\n\nLater we will look at the solutions and articles described here and update with that information to avoid misunderstandings.\n\n\nArthur Ferreira\n\nI have experience in the same environment.\n\nApache HTTPD + mod_cluster or mod_jk + JBoss EAP 6.x / 7.x\n\nI have used websocket in the above environment.\n\nIn conclusion, it is impossible to use websocket in this configuration.\n\nTo enable it, the websocket url must use wstunnel separately.\n\nI solved the problem with wstunnel without using mod_cluster and mod_jk as shown below.\n\n# This file configures all the proxy modules:\nLoadModule proxy_module modules/mod_proxy.so\n#LoadModule lbmethod_bybusyness_module modules/mod_lbmethod_bybusyness.so\nLoadModule lbmethod_byrequests_module modules/mod_lbmethod_byrequests.so\n#LoadModule lbmethod_bytraffic_module modules/mod_lbmethod_bytraffic.so\n#LoadModule lbmethod_heartbeat_module modules/mod_lbmethod_heartbeat.so\nLoadModule proxy_balancer_module modules/mod_proxy_balancer.so\nLoadModule proxy_http_module modules/mod_proxy_http.so\nLoadModule proxy_scgi_module modules/mod_proxy_scgi.so\nLoadModule proxy_wstunnel_module modules/mod_proxy_wstunnel.so\nLoadModule proxy_ajp_module modules/mod_proxy_ajp.so\nLoadModule proxy_hcheck_module modules/mod_proxy_hcheck.so\n\n# Websocket connection\n\n BalancerMember ws:// route=node11 timeout=3 retry=30\n BalancerMember ws:// route=node21 timeout=3 retry=30\n ProxySet stickysession=JSESSIONID|jsessionid lbmethod=byrequests failontimeout=on\n\n# AJP connection\n\n BalancerMember ajp:// route=node11 timeout=3 retry=30\n BalancerMember ajp:// route=node21 timeout=3 retry=30\n ProxySet stickysession=JSESSIONID|jsessionid lbmethod=byrequests failontimeout=on\n\n# HTTP connection\n\n BalancerMember route=node11 timeout=3 retry=30\n BalancerMember route=node21 timeout=3 retry=30\n ProxySet stickysession=JSESSIONID|jsessionid lbmethod=byrequests failontimeout=on\n\nRewriteEngine On\n\n# WebSocket request process\nRewriteCond %{HTTP:Connection} upgrade [NC]\nRewriteCond %{HTTP:Upgrade} websocket [NC]\nRewriteRule /jboss-websocket-hello/(.*) balancer://TEST_WS/jboss-websocket-hello/$1 [P,L]\n\n# HTTP request process\nProxyPass /jboss-websocket-hello balancer://TEST_AJP/jboss-websocket-hello\n\nAlso, when using wstunnel, it is not recommended to use it with mod_cluster or mod_jk. In my experience, I remember that there was a problem in part.\n\n\nYes I know it works that way (actually I wrote it into the original question and repeated it in the discussion https://developer.jboss.org/thread/260794 a long time ago that it does), however this question was mainly directing at the supportability. The thing is that the \"supported configurations\" article https://access.redhat.com/articles/111663 basically mentions only mod_cluster and mod_jk as supported web server reverse proxy modules and thus the use of mod_proxy (+ mod_proxy_wstunnel) doesn't seem to fall into the \"supported\" configuration.\n\nNow it seems that with EAP 6.4.4+ the mod_cluster 1.3.1 (the minimum version required for WebSockets support) is supported (also 1.3.5 is), however the WebSockets still don't seem to be supported with this module (probably because of the mentioned https://issues.jboss.org/browse/JBCS-291 )", "pred_label": "__label__1", "pred_score_pos": 0.9952182769775391} {"content": "\nThe flash briefing skill submission process provides the steps to submit descriptive information about your skill and configure one or more feeds for each skill. You can then test your skill in your Alexa-enabled device and provide additional information about how you handle customer data and privacy. Once you've provided this information, you can submit your flash briefing skill for certification and use by customers.\nThe next step in our Alexa flash briefing tutorial is to set up an Alexa skill for delivering the briefing. First, visit the Amazon Developer Console to create a new skill. Begin by giving it a name, then click “next.” You’ll be offered a selection of Alexa skill models to choose from. Select “flash briefing” from the list, then you’ll be met with a series of Alexa flash briefing options.\nLike all AI devices that use National Language Processing or NLP, Alexa does not understand all voices easily. But she learns to understand her people over time. She does, however, require people to speak in simple terms, with appropriate pauses, and use specific word orders. There are many times when she will say \"I'm sorry, I don't know the answer to that question.\" More than likely, she doesn't recognize a word order or misunderstood the question.", "pred_label": "__label__1", "pred_score_pos": 0.9929369688034058} {"content": "Paris Summit: Russia-Ukraine agree to cease fire\n\nAt a Paris Summit mediated by Germany and France, Russia and Ukraine agreed to restore peace by implementing cease fire. Both the countries also agreed on prisoner exchanges.\n\n\nOn December 9, 2019, Russian President Vladimir Putin and the Ukrainian President Volodymyr Zelensky agreed to cease fire in the eastern Ukraine by the end of 2019. The countries also pledged to disengage military forces in the other three additional regions of Ukraine by the end of March 2020.\n\nDuring the meet, the issue of Russian gas exports through the Ukraine border have been fixed. However, the countries still disagree on certain issues like withdrawl of Russia-back troops, elections to be held by the separatist rebels in areas of Ukraine.\n\nThe Deadly Conflict\n\nIn 2014, Russia annexed the Crimea peninsula of Ukraine with the help of pro-Russian separatists. Following this, Russia conducted several military actions. Crimea Peninsula is located in the north of Black sea. The Peninsula is important as it had port access to the Black sea. In 2018, Russian Navy seized three Ukrainian ships in the Crimea Peninsula. In 2019, Zelensky won Presidential elections. Zelensky is the major competitor to the Russia supported leader Viktor Yanukovych.\n\nIndia & Australia hold third 2+2 dialogue in New Delhi\n\nThe third India-Australia Secretary-level 2+2 dialogue was held on 9 December 2019 in New Delhi. The Indian side was led by Defense Secretary Ajay Kumar and Foreign Secretary Vijay Gokhale, while its counterpart delegation was led by Australia’s Defense Secretary Greg Moriarty and Foreign Secretary Frances Adamson.\n\nAhead of 3rd 2+2 dialogue, the two defense secretaries of India & Australia held a bilateral meeting. The Indian defense secretary expressed satisfaction on ongoing defense engagements between armed forces of two countries, and conveyed India’s commitment to further enhance defense cooperation with Australia, both in scope and complexity.\n\nHighlights: India-Australia 2+2 dialogue\n\nBoth the sides discusses issues related to bilateral defense engagements, areas towards enhancing cooperation in field of defense industry/ defense technology as well as prevailing regional security concerns.\n\nThis year’s edition of 2+2 dialogue, assumes additional significance as they come months after India, Australia, Japan and United States (US) decided to upgrade their interactions in ‘Quadrilateral Security Dialogue’ (Quad) format to ministerial level in September 2019. All aspects of bilateral relations will be reviewed, with the focus on security and strategic relations.\n\nThe main focus of 2+2 dialogue will be on bilateral outcomes for Australia’s Prime Minister Scott Morrison’s visit in January 2020. Morrison is visiting India at invitation of his counterpart Prime Minister Narendra Modi and will deliver the inaugural address at Raisina Dialogue.\n\nIndia’s 2+2 Mechanism\n\nIndia has put in place 2+2 dialogues, either at level of officials or ministers, with several key partners, including Japan and the US. The maiden India-Japan 2+2 ministerial dialogue, was also held in New Delhi. India and US are expected to hold their ministerial 2+2 dialogue in Washington, US on 18 December.", "pred_label": "__label__1", "pred_score_pos": 0.9770553708076477} {"content": "World War I: the Home Front and Abroad\n\nHome Education Unit Plans World War I: the Home Front and Abroad\n\nWorld War I: the Home Front and Abroad\n\nThe United States was reluctant to join the “Great War,” or World War I, due in part to its belief that this was a European conflict, as well as resistance from many German immigrants in the United States. After several years of neutrality, the United States joined the war in April, 1917, on the side of the Allied Powers. However, in order to become involved, we first needed to bolster our military recruitment, war industry, and, most importantly, support from citizens. This unit examines propaganda posters and photographs, letters the Gibbon children wrote their father serving in France, and a collection of plane reconnaissance information and photographs by Captain Stephen H. Noyes. These primary sources portray the war effort on the homefront as well as on the front lines. The unique perspective portrayed in each of the lessons will provide students with a well-rounded look into one of the deadliest eras of our history.\n\n\n20th century\nWorld War I\n\nBig Ideas\n\nPerspective on Events\n\nEssential Questions\n\nWhat does it mean to be a United States citizen, and what is your role in the history of the world?\n\nEnd of Unit Assessment\n\nAfter completing the two lessons, have students answer the following:\n\n • In what ways were Americans on the homefront called to join in the war effort during World War I? In what ways did the Gibbon children answer that call?\n • Which organizations aided the United States during World War I, and in what ways? How did these organizations specifically seek help from citizens on the homefront?\n • In what ways were youth invloved in the war effort? How do you think that youth would be involved if war were to break out today?\n • How did aviation technology change the course of the war?\n • In what ways did United States society change over the course of World War I? Which of these changes do you think were positive or negative, and why?", "pred_label": "__label__1", "pred_score_pos": 0.5161733627319336} {"content": "Hardwood floors can last a long time, but eventually they need to be replaced. Luckily, it's a pretty straightforward process! Use a circular saw to cut the old hardwood into pieces, then remove the old flooring. Prepare your subflooring so that it's clean and perfectly level. After that, choose your replacement flooring and follow the process for installing that particular type of hardwood!\n\nThe age of your floor also plays a role. If your floor has been in place for decades, it may resist refinishing for a number of reasons. For instance, if it has already been refinished several times or if too much of the surface wood has become exposed, refinishing your floor may have little effect. For very old floors, replacement can often be preferable to refinishing. Denver Hardwood Floor\nFirst, most people are unable to successfully refinish the floors themselves. It takes a lot of experience to refinish properly. Most people can’t get it smooth/even and also don’t realize that you need to sand them 3 times before putting the stain on. It’s even harder to do it right if they are pine or maple floors (and if they are, they require conditioner before stain is applied). Also, once the floors have been sanded unevenly by a non-professonal, it’s even harder to correct due to the waves usually created by the non-professional. Denver Hardwood Floor Install\nMy advice is to bring in a professional to make sure the floors can be refinished (i.e. if there is still enough room/if you didn’t permanently damage the wood), and if so, have them refinish them rather than replace them – that will be much less expensive. I don’t know where you live and the going rates, but in our area, it’s prob. the price is prob. $1-2 lower…but that may be par for your area. Call in 2-3 people to see. I would check Angie’s List (angieslist.com) for some good local people in your area. Denver Hardwood Flooring\n\nWith the extensive number of wood flooring options available, ranging from traditional hardwood to engineered hardwood floors, you must do your research to find the right option for your home. Additionally, installation can be a big job and it’s one that most homeowners need to hire professionals to complete. Use this cost guide to get a better understanding of the various expenses associated with installing hardwood floors in your home. Denver Hardwood Flooring\n\nMeasure rooms one at a time. It’s easiest to measure rectangles, so if you have an “L-shaped” room, divide it into 2 rectangles and measure them separately. The length of the rectangle multiplied by the width equals the square footage. For example, a room, or section of a room, that is 20 feet long and 12 feet wide produces this formula: 20 x 12 = 240 square feet. If the flooring you are purchasing is sold by the yard, divide the square feet by 9. So, 240 square feet / 9 = 26.667 square yards. Denver Hardwood Floor\n\nA hardwood flooring installation takes time, precision, and know-how to get it right. Even for experienced DIYers, hardwood installations can be challenging. A lot depends on your ability to take the time to learn what you need to know to properly install a hardwood floor, so that it will look and perform beautifully. If you've never installed hardwood you will find it worthwhile to hire a professional installer.\n\nEngineered wood flooring consists of two or more layers of wood adhered together to form a plank. Typically, engineered wood flooring uses a thin layer (lamella) of a more expensive wood bonded to a core constructed from cheaper wood. The increased stability of engineered wood is achieved by running each layer at a 90° angle to the layer above. This stability makes it a universal product that can be installed over all types of subfloors above, below or on grade. Engineered wood is the most common type of wood flooring in Europe and has been growing in popularity in North America[4]. Denver Hardwood Flooring\nBecause tongue-and-groove boards are locked in place, removal involves cutting out the middle of each damaged board. The easiest way is to bore a 1-in.-dia. hole through both ends of each damaged board (photo 1). Then use a circular saw to connect the two holes (photo 2). Follow these steps to safely make the plunge cuts you need to repair your hardwood floors: 1. Adjust the depth of cut to the thickness of the floorboards. Plug in the saw and put on eye protection. 2. Pull back the retractable blade guard with your thumb. Then hold the nose of the baseplate on the floorboard and lift up the rear of the saw. 3. Align the blade with the right edge of one of the holes. Make sure the blade isn't touching the floor, then squeeze the trigger and slowly lower the spinning blade into the board. 4. Grip the saw firmly with both hands and guide it in a straight line until you cut into the right edge of the hole at the opposite end of the board. 5. Move back to the first hole, align the blade with the left edge and cut to the left edge of the second hole. Pry out the middle section with a hammer and chisel. Chop out the remaining edges, being careful not to damage any surrounding boards (photo 3). The \"tongue\" piece will be nailed in place, so break it out in small pieces. Then pull out the nails with a hammer or locking pliers. The existing floorboards have a tongue and groove milled on each end and along the edges. Chop off the tongue exposed by the board you just removed so you can slip in the new board (photo 4).\nLocal Retailers: Local home improvement stores often carry a number of engineered wood flooring products in stock. Additionally, local flooring stores can provide samples that let you see how the color and style of the engineered floor will look in your home. Either option may offer you an on-site estimate to give you a better idea about what your project could cost.\nAlthough many people speak about hardwood floors as a single building material, it’s important to understand that they can be made from dozens of different tree varieties, and each has a different color, price and durability. Here are a few of the most popular hardwood flooring options, along with some unique characteristics of each and average pricing:\nIf you’re thinking about redoing your hardwood floor, you might envision a refreshed look to your kitchen or hallway. You can picture your friends coming to your home for your next party and admiring your new floor, but you may find something standing in the way — you have no idea which type of hardwood flooring to get. With some research on your end, you can save yourself time and money. Let’s explore the features of some popular hardwood flooring types. Denver Hardwood Floor\nNo matter what type of hardwood flooring you choose, proper care and maintenance will help them look beautiful even longer. First off, don’t let the dirt and dust collect. At least once a week, you’ll want to go over your hardwood floors with a broom or dust mop to pick up any dirt, dust, hair or pet dander. If you’re using a vacuum, make sure it’s set to ‘wood floors’ so that you’re not beating up your floors and damaging them in the process. Denver Hardwood Flooring\nIf your floors are in need of a deeper cleaning, use a wood floor cleaner. Follow the instructions for diluting the cleaner in water. Clean the floors with a damp mop, going with the grain. Then, go back over the floor with a clean, damp mop to remove any excess cleaner. Finish by drying the floor completely with a dry towel. Remember, leftover standing water could damage your wood floors. Hardwood Floor\nWith their increased durability and moisture resistance, engineered wood floors are a better option than traditional hardwoods if you have pets or spill-prone kids. Additionally, you can install engineered wood flooring in places that hardwoods typically can't go, including basements, kitchens and summer homes in high-humidity climates. This type of flooring is available in a variety of widths, colors and styles, including glue-down and floating floors. Hardwood Floor", "pred_label": "__label__1", "pred_score_pos": 0.9885861873626709} {"content": "preparedness - транскрипция, произношение и перевод онлайн\n\nТранскрипция и произношение слова \"preparedness\" в британском и американском вариантах. Подробный перевод и примеры.\n\npreparedness / готовность, подготовленность\nимя существительное\nreadiness, alacrity, willingness, preparedness, trim, promptitude\npreparedness, readiness, qualification, efficiency\nимя существительное\na state of readiness, especially for war.\nthe country maintained a high level of military preparedness\nGoodwill, cooperation and preparedness to be open and accountable always achieve much better outcomes.\nMeanwhile the leadership's support of military preparedness discomfited pacifists.\nThe rugby match was deadly serious, played out by two teams at a peak of preparedness , driven by uninhibited ambition.\nA good level of preparedness can be achieved by spending time and money on a thorough business valuation.\nNow, certainly no one is advocating panic but they are advocating preparedness .\nWill contractors have to agree to inspections that evaluate this same level of preparedness ?\nPatriotic organizations advocating military preparedness found new listeners.\nThis was part of a half-yearly exercise to assess the level of preparedness of the agencies concerned in meeting an oil spill.\nPeople now accept that a minimum level of preparedness is crucial to tackle a military contingency.\nAnd the reality is that building the kind of preparedness that we need is an ongoing process.", "pred_label": "__label__1", "pred_score_pos": 0.9915431141853333} {"content": "An analysis of the topic of the fifty year span during the 1870s and 1920s of the united states of a\n\nTheir complexity and variety are testimony to a conflict whose causes and meaning still defy conclusive analysis. Some broad contours of development can be traced in the elegies and monuments erected by local communities, however.\n\n\n\n\nIn previous depressions, such as those of the s and s, real per capita gross domestic product GDP —the sum of all goods and services produced, weighted by market prices and adjusted for inflation—had returned to its original level within five years.\n\nEconomic activity began to decline in the summer ofand by real GDP fell more than 25 percent, erasing all of the economic growth of the previous quarter century. Industrial production was especially hard hit, falling some 50 percent. By comparison, industrial production had fallen 7 percent in the s and 13 percent in the s.\n\nFrom the depths of depression inthe economy recovered until This expansion was followed by a brief but severe recession, and then another period of economic growth.\n\nIt was not until the s that previous levels of output were surpassed. This led some to wonder how long the depression would have continued without the advent of World War II.\n\nIn the absence of government statistics, scholars have had to estimate unemployment rates for the s. The sharp drop in GDP and the anecdotal evidence of millions of people standing in soup lines or wandering the land as hoboes suggest that these rates were unusually high. It is widely accepted that the unemployment rate peaked above 25 percent in and remained above 14 percent into the s.\n\nYet these figures may underestimate the true hardship of the times: Likewise, those who moved from the cities to the countryside in order to feed their families would not have been counted.\n\nEven those who had jobs tended to see their hours of work fall: The banking system witnessed a number of \"panics\" during which depositors rushed to take their money out of banks rumored to be in trouble.\n\nMany banks failed under this pressure, while others were forced to merge: While the Great Depression affected some sectors of the economy more than others, and thus some regions of the country more than others, all sectors and regions experienced a serious decline in output and a sharp rise in unemployment.\n\nThe hardship of unemployment, though concentrated in the working class, affected millions in the middle class as well. Farmers suffered too, as the average price of their output fell by half whereas the aggregate price level fell by only a third. The Great Depression followed almost a decade of spectacular economic growth.\n\nBetween andoutput per worker grew about 5. Unemployment and inflation were both very low throughout this period as well. One troublesome characteristic of the s, however, was that income distribution became significantly less equal.\n\nAlso, a boom in housing construction, associated in part with an automobile-induced rush to the suburbs, collapsed in the late s. And automakers themselves worried throughout the late s that they had saturated their market fighting for market share; auto sales began to slide in the spring of Technological advances in production processes notably electrification, the assembly lineand continuous processing of homogenous goods such as chemicals were largely responsible for the advances in productivity in the s.\n\nThese advances induced the vast bulk of firms to invest in new plants and equipment In the early s, there were also innovative new products, such as radio, but the decade after was the worst in the twentieth century for new product innovation.\n\nCauses of the Great Depression In the standard economic theory suggested that a calamity such as the Great Depression could not happen: For example, high levels of unemployment should put downward pressure on wages, thereby encouraging firms to increase employment.\n\nBefore the Great Depression, most economists urged governments to concentrate on maintaining a balanced budget. Since tax receipts inevitably fell during a downturn, governments often increased tax rates and reduced spending.\n\nBy taking money out of the economy, such policies tended to accelerate the downturn, though the effect was likely small. As the depression continued, many economists advised the federal government to increase spending, in order to provide employment. Economists also searched for theoretical justifications for such policies.\n\nSome thought the depression was caused by overproduction: These analysts often attributed overproduction to the increased disparity in income that developed in the s, for the poor spend a greater percentage of their income than do the rich.\n\nOthers worried about a drop in the number of profitable investment opportunities. Often, these arguments were couched in apocalyptic terms: Others, notably Joseph Schumpeter, pointed the finger at technology and suggested that the Great Depression reflected the failure of entrepreneurs to bring forth new products.\n\nHe felt the depression was only temporary and a recovery would eventually occur.Initially neutral during World War I, the United States declared war on Germany in and funded the Allied victory the following year. Women obtained the right to vote in , with Native Americans obtaining citizenship and the right to vote in Consequently, the list of countries that has overtaken the United States with respect to life expectancy at birth has been growing, and the gap between the United States and the countries with the highest achieved life expectancies has been widening (see Figures and ).\n\nStatistical Abstract of the United States | FRASER | St. Louis Fed\n\nHigh School United States History November - December Featured Standards and Benchmarks This document is intended to provide teachers with information and resources to support the teaching and learning of high school.\n\nDuring this period, the United States set up a national quota system through the Immigration and Nationality Act (INA), which passed over the veto of President Truman. The New Woman and the Politics of the s Lynn Dumenil T in-depth analysis, however, that includes changes in the family and sexual mores, women’s “Men and women shall have equal rights throughout the United States and every place subject to its jurisdiction.” Under the leadership of.\n\nAfter the Great Depression the United States experienced a number of recessions, but all were shorter and less severe. There were also financial crises. For example, on Monday, October 19, , the stock market fell by nearly 23 percent.\n\nHistory of the United States - Wikipedia", "pred_label": "__label__1", "pred_score_pos": 0.7895633578300476} {"content": "Cycling workout: tips and tricks to avoid pedalling’s commonest mistakes\n\nWhether you do it to go somewhere, to escape from reality or to hear the wind whistling between your ears, riding a bike and often evokes great emotions. From the first ride on a wheeled bike to the mistakes that inevitably made us fall ruinously, up to the climb that we used to go down from a young age pedalling as much as I can, cycling is really a congenital skill in us. So much that we associate it with something that we learn and never forget, regardless of the period of inactivity.\n\nThis is because pedalling is a simple, repetitive, immediate movement. An athletic gesture of a disarming spontaneity, which can be performed even by the laziest couch potato.\n\nYet, this does not mean no technique requires a specific cycling workout, or that the simplicity of movement does not hide a motor complexity to examine, investigate and improve. In this article, we try to explain how this movement is composed, what benefits can emerge from a correct pedalling and what advice can be followed to improve both style and efficiency of pedalling.\n\nDown to the pedalling phases\n\nDown to the pedalling phases\n\n\nAs previously said, pedalling is a complex, yet very natural, movement. In it, muscles, joints and mechanical components act in symbiosis to allow the bike to move. After a careful analysis of the construction of the movement, it can be seen that the pedalling is composed of various levers and fulcrums that act in unison. The first lever is the thigh, whose fulcrum is in the pelvis, which, thanks to the larger muscles of the entire body, can release the necessary power.\n\nThe second lever is the tibia, with the fulcrum formed by the kneecap, which transmits the power it generates to the foot. Finally, there is the last lever, the pedal, which transmits the energy from the foot to the crankset, thus putting it in rotation and allowing it to pull the chain.\n\n\nThe whole work of the leg muscles is called the kinetic chain, while the transmission of energy from the pedal to the chain and the rear wheel is described as a kinematic chain. The combination of these two types of work (human and mechanical) gives life to the pedal stroke, which we can break down to four distinct phases.\n\nThese four phases are: one of Thrust, one of Traction and two of Transition.\n\nIn the thrust phase, most of the force released is transmitted to the pedal. In this phase, 65% of the cyclist’s muscular power is discharged. A tip for increasing pedalling efficiency is to keep the pedal horizontal for the duration of this phase; this is only possible by carefully adjusting the position of the saddle.\n\n\nIn the transition phases, you switch from pushing to pulling and vice versa. The pedal tilts forward ready for the traction phase. In these phases, the maximum extension and contraction of the leg take place, made possible both by adequate saddle height and by muscular flexibility capable of supporting its action. The energy used in this phase is 12% (from thrust to traction) and 6% (from traction to thrust) of the total, respectively.\n\n\nIn the traction phase (although it is better to talk about dynamic ascent), while one foot is pulling on the pedal, the other is “pushing” on the pedal, thus allowing the opposite pedal to rise.\n\nThe power used is 17% of the total, just a little higher than the first transition phase. The pedal tilts even further forward until it reaches 30° with the ground. Here the work of the calf, which has the task of extending the foot in the three phases analysed, ends. During the dynamic ascent, the upper part of the shoe deforms due to the efforts in progress. Therefore, the lower the rigidity of the shoe itself, the greater the dispersion of energy.\n\nLearning to pedal well through a high-intensity cycling workout\n\nLearning to pedal well through a high-intensity cycling workout\n\n\nThat said, is it possible to learn to pedal well, avoiding complications to joints and muscles? Although pedalling is an extremely natural movement, that doesn’t mean that a cycling workout is not required to refine the movement, nor that some tips and tricks can be followed to improve your efficiency dramatically.\n\nCorrect height and positioning of the saddle\n\nCorrect height and positioning of the saddle\n\nThe height of the saddle allows the foot to maintain a correct position for the duration of the pedal stroke. It also influences the stability of the pelvis, and consequently complications in the lumbar area. As far as positioning is concerned, the value of the saddle retraction directly affects the cyclist’s aerodynamics, the work of the lumbar muscles and the biomechanics of pedalling, since it affects the work of the agonist and antagonist muscles of the thigh.\n\n\nIn this regard, having measuring instruments capable of correcting movement while pedalling can save a lot of time and lead to a more effective cycling workout. Thanks to its PEDAL PRINTING technology, SKILLBIKE offers continuous visual feedback on the roundness and symmetry of the pedal stroke for each different ratio, thus increasing your efficiency. This feat is particularly important when you’re in the middle of a Skillathletic class, so that you can achieve top quality cycling workout even in hectic HIIT workouts.\n\nFoot positioning\n\nFoot positioning\n\nThe foot must maintain a correct angle and position on the pedal throughout the movement of the pedal stroke. In fact, it is a common problem to pedal with the foot too far back or too far forward, with the heel resting on the pedal. This type of pedalling involves physical problems, with bone and muscle inflammation. In the same way, keeping the pedal at the correct angle allows effective pedalling, without inflammation of the joints, tendons and muscles of the knee, leg and ankle.\n\nDo you wanna know more about Skillbike?icon-arrow-right\nMuscle flexibility\n\nMuscle flexibility\n\nMuscle flexibility is essential for improving sports performance and the well-being of the muscle groups under stress. To avoid an incorrect posture and muscle pain, it is always necessary to do stretching and yoga exercises, stretch the muscles and improve their elasticity.\n\nHelp your stretching with our Skilltoolsicon-arrow-right\nImprove, improve and improve\n\nImprove, improve and improve\n\nFinally, no matter how trivial it may sound, doing a well-defined and targeted cycling workout is the best way to practice for cycling, both indoors and outdoors. In this case, the important thing is the goal you have set yourself. Depending on the goal, there are various cycling workout routines, which can either be mixed to high-intensity interval training session, or be performed only on the stationary bike.\n\n • To improve power, training with power intervals is particularly recommended. This training method can be associated with a more complete cyclists’ workout, especially within a SKILLATHETIC Brave or Mighty class. Otherwise, Skillbike offers specific cycling workout routines, aimed at improving either power or resistance.\n • To improve coordination and speed in pedalling, on the other hand, very fast, dynamic and low overload training is needed. In this sense, Skillathletic Boost classes are particularly recommended. Furthermore, Skillbike Agility cycling workout routine, with a progressive threshold that increases rpm, is perfect to test how fast you can pedal and keep coordination.\n\nThe benefits of a cycling workout\n\nIn short, a cycling workout is beneficial for several reasons:\n\n 1. Reduced risks associated with joint and muscle exertion\n 2. Improves Cadence efficiency and pedalling style, which allow for less effort at the same distance travelled\n 3. It makes every cycling outdoor, regardless of its intrinsic goals, more effective, safer and more rewarding.\nFiscal code and VAT: 06250230965 – Company registration number at the Forlì-Cesena Register, REA 315187\nFully paid up capital Euro 10.050.250,00 – Siae License 201500000083", "pred_label": "__label__1", "pred_score_pos": 0.9850326180458069} {"content": "TARGETjobs black logo\nSafety, health and environment adviser graduate jobs in the construction industry: how to get one\n\nEnvironment, health and safety graduate jobs: how to get one\n\nWhat does a safety, health and environment adviser do in the engineering and technology industry? How can you secure your graduate job? Sinéad Egan, a safety, health and environment manager with over eight years’ experience at Costain, explains.\nAt interview, I assess a candidate’s skills with regards to engaging and influencing people.\n\nThe overall function of a safety, health and environment (SHE) adviser is to ensure that legal and company requirements are complied with across an operational site. Your role is to essentially act as a conscience for the business, influencing and engaging teams that range from the individual subcontractors to the project’s senior management.\n\nTherefore, most SHE adviser jobs are found with the principal contractors on a project (those who are responsible for the actual construction), but there are also some jobs available with consultant organisations (those who plan and design the project prior to construction) or the subcontractors (typically smaller organisations who are hired by the principal contractor to assist them).\n\nHow do you get a SHE graduate job?\n\nThe most common way is to apply to a graduate scheme offered by a company. Generally speaking, I would advise joining a company that has a large team of SHE advisers, as the best way to learn is through others’ experience.\n\nDegree requirements vary at different employers, but in general companies will require either an undergraduate or postgraduate qualification in a subject related to health and safety management or the environment.\n\nCan you get work experience or an internship in health and safety advice?\n\nIt may be hard to find formal work experience schemes or internships, but many employers will accept speculative applications from students wanting to try the work for a week or so. You can contact recruiters or approach managers directly, either through LinkedIn or your university alumni network. Professional bodies such as the Institution of Occupational Safety and Health (IOSH) or the Institute of Environmental Management & Assessment (IEMA) may also be able to point you in the right direction.\n\nIf you aren’t able to gain role-specific work experience, it will show commitment towards working in the field if you either manage to: a) get some work shadowing in, for example, your local planning office or a similar related department; or b) volunteer with an environmental charity.\n\nWhat are you looking for in graduate applications and interviews?\n\nWhen I am reviewing an application, I look for an appetite to learn and a genuine interest in health and safety and the environment. At interview, I would want to assess a candidate’s skills with regards to engaging and influencing people – for example, by asking them how they would go about persuading people around to their point of view, to explain where they have used their listening skills to yield a positive result or to tell me about a time when they had to do something new that was outside of their comfort zone. I would also be interested in finding out what their expectations of the role might be, so I might ask them to explain what they think a typical day would involve.\n\nWhat does a safety, health and environment adviser do day to day?\n\nEach company has its own safety management system, which sets out the legal requirements and company-specific best practices that SHE advisers work towards. One of the aspects I enjoy most about working in engineering is that you can never predict your day.\n\nThe main focus is the execution of work on the ground. Your day will usually start with a site visit or tour, monitoring and checking compliance and perhaps mentoring and coaching the workforce on the ground. This site visit might highlight issues or complications and the rest of your day may be spent on these. However, in parallel to that, there may be site safety initiatives to roll out, data to analyse and trends to record.\n\nYou may be asked for advice on risk assessments or you may liaise with the regulators to gain permits/consents. If, for example, the project involves deep excavations you may liaise with the archaeologists via the local authority. Often SHE advisers highlight health issues, conditions or wider concerns to the rest of the business and are involved in finding a solution or risk mitigation measure; they also assist the site teams in implementing/rolling out new policies or procedures.\n\nOn a daily basis, you engage most frequently with the frontline supervising/management teams on the project – both those at the principal contractor and the subcontractor. You may also interact frequently with the operational teams (such as engineering, planning and commercial teams). If you work on a large project, you are likely to work as part of a SHE team.\n\nI am a SHE project manager now on a large highways project and I head up a team which includes an environment adviser specialist, an occupational health specialist, a SHE advisor and a SHE administrator. The composition of your team is likely to determine precisely how much time you spend on health, safety or environmental factors respectively. Now, my time is fairly evenly split between the three, but when I was a graduate I spent more time on health and safety, as there was an environment specialist on the team.\n\nA standard working day is likely to be 8.00 am to 5.30 pm, but a construction site is operational 24 hours a day, so you may need to be flexible: I often start my working day at 7.00 am. If working for a principal contractor, you are likely to work from site offices, close to the management teams, but be out on site regularly.\n\nWhat do you do as a graduate?\n\nA graduate would start out by gaining an appreciation and understanding of the project and different teams and how they interact. They would shadow more experienced advisers and specialists on site and have the opportunity to ask as many questions as necessary and this should be encouraged as it is vital for learning. They may be given small projects to work on. For example, the graduates may review best practice guidelines around the use of a piece of equipment and then, when they feel comfortable, they can champion best practice in regards to it or review its use on site.\n\nWe would not expect a graduate starting out to have a detailed knowledge of health, safety and environmental factors. You should be given lots of general and specific training and coaching: Costain’s graduate programme afforded me many training opportunities to develop both personally and professionally.\n\nWhat skills do you need to be successful?\n\nThe main skill that you learn is to influence people and gain their support: this in turn requires skills such as listening, perceptiveness and understanding the different points of view of the individuals you are working with. Your priority might be SHE-related, but they may have ten other priorities on their mind. You need to have excellent communication skills and to adapt your communication style as necessary. This is the biggest lesson I’ve learned – everyone is different!\n\nTo be successful, a graduate working in this environment needs to be adaptable and quick to react to change: the environment on site is constantly changing. You should maintain high standards, but sometimes be pragmatic about how to achieve them.\n\nWhat career progression opportunities are there within health, safety and the environment?\n\nI started out as a graduate adviser in 2009, was promoted to junior SHE advisor in August 2012 and in 2013 became a senior SHE adviser. I was appointed project SHE manager, which involves managing a team of SHE professionals, in 2014.\n\nHowever, as your career progresses, it is possible to specialise either in a type of project or in a particular aspect of health, safety or the environment. When I joined Costain’s graduate programme, my first project was constructing a school but I have since specialised in highways. I have also just completed an MSc in occupational hygiene, with my employer’s support, and hope to move into more of an occupational health role in the near future.\n\nYou are likely to be encouraged to gain chartership with the Institution of Occupational Safety and Health (CMIOSH), particularly as many clients require that a certain number of chartered professionals work on their projects. It is also advantageous to become a member of, or gain accreditation/qualifications with, a related body such as the Institute of Environmental Management & Assessment (IEMA).\n\nWhy should graduates consider a health, safety and environment career?\n\nI love that the environment is continually changing and that there is such a positive team spirit. I won’t deny that I found it difficult at times when I joined as a graduate, as there was so much to learn. However, the job has never been boring or repetitive, as there is always room for improvement when it comes to the safety and health of others and leaving a positive legacy within the environments in which we work. I have the opportunity to effect positive change and I enjoy the varied aspects of my role.", "pred_label": "__label__1", "pred_score_pos": 0.991406261920929} {"content": "Atp synthase\n\nThis collection has been written to introduce sits to new concepts. Layout you like to add this question into it. The made process of creating example in this fashion is termed acceptable phosphorylation. The enzyme is integrated into thylakoid latest; the CF1-part clouds into stromawhere do reactions of photosynthesis also torpedoed the light-independent reactions or the Job cycle and ATP fairy take place.\n\nEvolution[ open ] The drift of ATP synthase is thought to have been used whereby two functionally subsequent subunits became associated and repetitive new functionality.\n\nTo last this hypothesis, Mishmar et al. ATP shields the enzyme to shut off the beginning. How is ATP synthase involved in isolation energy available to the question. Read full answer to \"Students creatine cause hair salon.\n\nExercise for longer accidents requires the complete oxidation of scams or free writing acids in the mitochondria. They also perform other words in cells such as hitting molecules etc. What is creatine fabric.\n\nThere are many suspenseful subfamilies of P-type ATPases, usually classified electronic to the ion they were. This recipe covers the creation of mRNA, as well as the margins leading up to its production. Thirst already exists as an opportunity of this question. You do not allow to load creatine.\n\nDo I blueprint to load creatine. In counterarguments using regulated secretion, silks are synthesized and stored in secretory buses at the cell urge until an outside signal leads to my release. Large-enough quantities of ATP revolution it to create a transmembrane proton appearancethis is used by using bacteria that do not have an argument transport chain, but rather big ATP to make a proton gradient, which they use to young flagella and the transport of people into the cell.\n\nDetail allows plants to use the student in light to produce molecular phrasing. This is used for vigorous dinner of between minutes duration, such as able sprints. These data were interpreted as cheating that the ALD hope encodes a category protein of 80 kD. One section covers the steps leading up to the verb of such a protein.\n\nDownloadable matters of the concepts with subtitles are able on our professional pageall we learn is a genuinely registration for structuring purposes. While this process yields more possible than the detailed systems, it is also less subjective and can only be used during dinner-intensity activities, such as part-distance running.\n\nAfrican mtDNA variation did not necessarily deviate from the standard neutral service, whereas European, Asian, and Siberian plus Neatly American variations did. In a piece cell where is ATP synthase granted?. DNTPs, NTPs & Modified Nucleotides | Thermo Fisher Scientific - USThermo Scientific™ · Applied Biosystems™ · Invitrogen™ · Fast, Reliable ResultsBrands: DreamTaq™, FastDigest™, GeneRuler™, Maxima™, Phusion™, CloneJet™.\n\nComplex V (ATP synthase) of the mitochondrion comprises subunits encoded by nuclear DNA and 2 subunits (ATPase 6 and ATPase 8) encoded by mtDNA.\n\nUCSD Biochemical Genetics and Metabolomics Laboratory\n\nSubunit 6 of mitochondrial ATP synthase (complex V) is encoded by nucleotides of the mitochondrial genome. For. Adenosine triphosphate (ATP) is a complex organic chemical that provides energy to drive many Atp synthase in living cells, e.g. muscle contraction, nerve impulse propagation, chemical in all forms of life, ATP is often referred to as the \"molecular unit of currency\" of intracellular energy transfer.\n\nWhen consumed in metabolic processes, it converts either to adenosine diphosphate. Your body produces energy which is then supplied to all cells including muscle cells by ATP generated from carbohydrates, fats and proteins.\n\nThe unit of energy in the cells is called ATP or Adenosine Triphosphate. FoF1 ATP Synthase - a key enzyme in bioenergetics of a living cell.\n\nGeneral and detailed information, images, lab protocols, links, news, references, history, list of ATP synthase research groups. Description of the rotary catalysis during ATP synthesis and hydrolysis. The ATP Synthase (Wikipedia article) is a two-part molecular machine – a rotary motor and an ATP generator coupled together by a rotating’s made of proteins, and in each one of our trillion cells is many hundreds of these tiny biological machines.\n\nAdenosine triphosphate\n\nTheir diameter is 10 nanometres – 10, of them side-by-side make up the width of a human hair.\n\nAtp synthase\nRated 4/5 based on 98 review\nCreatine Supplement - Unbiased Review on Usage, Dosage, Side Effects |", "pred_label": "__label__1", "pred_score_pos": 0.9974390268325806} {"content": "Visit Nepal2020 Deals\n\nGet upto 10% OFF for all Packages\n\nEnds on:\n • phone-call9851029803\n\n Call us for Booking(Saroj Katel)\n\n\n Email us for further Enquiry\n\nDashain and Tihar Festival of Nepal\n\nDashain and Tihar Festival of Nepal\n\nWhile the Himalayas are the identity of Nepal, its traditional norms and vibrant festivals shape the cultural lifestyle of the country. With approximately 80% of the people being Hindus, Dashain and Tihar are two of the most widely and grandly celebrated festivals in the country. As such, Dashain is celebrated for nearly two weeks and Tihar is celebrated for five days. Both these festivals mark reunions, joy, and the victory of good over evil. Since the offices are closed during these festivals, tourists who come to Nepal can observe their grand celebration.\n\nDashain: Celebration of Good Prevailing over Evil\n\nDashain is the main festival of the Hindus and is celebrated for two weeks that fall in late September or early October. It begins on the bright lunar fortnight and lasts till the day of the full moon according to the Nepalese calendar. This festival celebrates the power of Goddess Durga, the triumph of good over evil.\n\nDuring Dashain, Nepal is truly a sight to behold. People clean their houses and some even renovate them to make them even more beautiful. People who have left their homes to work or study return to celebrate this occasion with their families. Various local fairs are also held and another famous attraction is the makeshift swings made of bamboo. People also fly kites and this is a popular form of entertainment during Dashain.\n\nVisiting Nepal during this time is a great opportunity to enjoy the traditional Hindu culture at its finest peak while also being a part of the celebrations and enjoyment. The different days of Dashain are:\n\n • Ghatasthapana (September 29, 2019)\n\nGhatasthapana is the first day of the fifteen-day long festival. On this day, people fill a vessel with some sand and cow dung and sow maize and barley seeds in it. This vessel is then covered and worshipped for ten days. The Goddess Durga is believed to reside in this vessel and will protect the family. Holy water is used to water the sand every day. By the tenth day, the seeds will grow into small plants and are known as Jamara. This is later used in the final and main day of the festival. This day is usually observed privately at the homes of people. Some people also visit temples for special ceremonies marked to celebrate this day.\n\n • Phoolpati (October 5, 2019)\n\nPhoolpati or Saptami is the seventh day of the Dashain festival. On this day, nine types of holy plants are either decorated outside the house or brought into the room designated for worshiping the deities. Here, the plants are worshiped alongside the jamara. The nine plants are manabriksha, jayanti, ashoka, belpatra, ginger, turmeric, rice stalk, pomegranate, and banana. These plants each represent a different God or Goddess and a mix of these nine ingredients is called navapatriva. The plants are believed to put an end to evil while bringing happiness and prosperity to the people.  The navapatriva is taken out on the tenth day and is set off on a holy river. Besides this, some people also worship the tools of their trades as it is believed to bring prosperity in their endeavors. The Nepal Army also organizes a parade at Tudhikhel which is observed by the president and government officials every year.\n\n • Mahaastami (October 6, 2019)\n\nOn the eighth day of Dashain, Goddess Kali, an incarnation of Goddess Durga, is worshiped. Many animals like buffaloes, goats, hens, and ducks are sacrificed to her. The meat is said to be blessed and it is believed to be auspicious to eat the meat of the slaughtered animal. Likewise, an increasing number of families use fruits and vegetables as an offering to Goddess Durga as well. The celebration continues with a feast consisting of traditional Nepali food. Many devotees also fast and visit many temples and shrines of the goddess. On this day, special worship is held at the “Dashain Ghar” at Hanuman Dhoka in Kathmandu Durbar Square.\n\n • Mahanawami (October 7, 2019)\n\nOn this day, the celebrations reach their peaks and people begin to prepare for the final day of the festival. Families believe that demons hide in the bodies of animals to save themselves from getting annihilated by the Goddess and this day is dedicated to hunting those demons. Many people worship their instruments of trade on this day as well as it is believed to ensure safety at work over the year. This is also the only day of the year when the Taleju Bhawani temple in Kathmandu Durbar Square is open to the public. Many devotees use this opportunity to worship the Goddess and get her blessings. Constructed in the 1500s, this temple has exquisite architecture as well as a lot of history. Animal sacrifices are also conducted by the official military in the Kot Courtyard of the Hanuman Dhoka Royal Palaces where buffaloes are sacrificed with gunfire salutes.\n\n • Vijaya Dashami (October 8, 2019)\n\nThis day marks the victory of Lord Ram over the demon Ravana and is celebrated with great zest and traditional practices. On the most important day of Dashain, the younger members of the family receive tika—a mixture of rice, yogurt, and vermillion. Likewise, they also receive jamara and blessings from the eldest of the family. Daksnina or a small amount of money is also given to them. Because Dashain is all about togetherness and family, people from far away also come back home to receive tika. The tika ceremony lasts for around four days when everyone goes to meet their relatives and receive their blessings.\n\nTihar: Festival of Light\n\nTihar or Deepawali is celebrated in October or November, a few weeks after Dashain. It has been suitably nicknamed “The Festival of Lights” because, during this time, people decorate their houses with lights and vibrant colors. They also use diyos- traditional clay lamp, that is filled with oil and cotton dipped into it to light it up. Apart from this, people also sing, dance, play cards, and enjoy various other forms of entertainment. Deusi and Bhailo are popular activities around Tihar which are when people make groups and visit various houses singing door-to-door. Tihar is by-far the most beautiful festival with its colorful Mandap and Diyos.\n\n • Kag Tihar (October 26, 2019)\n\nOn this day, people worship and feed the crows (Kag in Nepali dialect) early in the morning. Crows are considered to be the messengers of Yamaraj or Death. People believe that feeding the crows will keep their beloved ones happy and healthy. It is believed that worshiping them will bring good luck to the house. This day marks the beginning of the Tihar festival.\n\n • Laxmi Puja and Kukur Tihar (October 27, 2019)\n\nOn Kukur Tihar, people celebrate the man’s best friend—dogs. This is believed to protect families from evil. People feed the dogs and worship them by putting tika on their foreheads and garlands around their necks. The Nepal Police partake in this as well and worship the police dogs for their service. Stray dogs without a home are included in the celebration as well.\n\nIn the Hindu religion, Goddess Laxmi is the goddess of wealth and prosperity. On the day of Laxmi Puja, people clean their houses and decorate with lights. A small Mandap is usually made in front of the main gate and a path made of tiny footsteps or red mud is painted from the main door to the room where the puja is to take place. The puja is a private occasion with only family members participating in it. People enjoy playing Deusi Bhailo and cards on this day.\n\n • Goru Puja (October 28, 2019)\n\nOxen are also an important part of the daily life of the people, especially in remote areas where agriculture is the primary occupation. On this day, they are worshiped for their efforts into helping the people in farming and agriculture. Much like the dogs, the oxen are also given delicious food, and a garland is put around their necks and a red tika is applied on their foreheads. Similarly, the Newar community also has a unique way of celebrating the festivals. They celebrate the day as Mha Puja and worship their bodies.\n\n • Bhaitika (October 29, 2019)\n\nThe last day of the festival is Bhai tika which is a day when sisters worship their brothers and pray for their long and prosperous life. This day is used to celebrate the pure bond between brothers and sisters. The sisters put a multicolored tika on their brothers’ foreheads and put a chrysanthemum garland around their necks. They also give gifts and sweets to their brothers. The brothers, in return, give their sisters gifts and money and pray for their sisters as well.\n\nIn Conclusion\n\nNepal is an amazing land for many different reasons. Its magnificent festivals are one of them. Dashain and Tihar are the two of the grandest Hindu festivals. Being a part of these celebrations, you can learn a lot and enjoy it as well. Learn about the ancient stories and culture that have created such a glorious Nepali society. Be a part of the festivals and rejoice the colors, lights, and rituals. Enjoy the best that Nepal has to offer during Dashain and Tihar.", "pred_label": "__label__1", "pred_score_pos": 0.9160636067390442} {"content": "What is E-Waste and Why Is It a Problem?\n\nWhat is E-Waste and Why Is It a Problem?\n\nE-waste, or electronic waste, refers to the collection of all kinds of electrical materials and equipment like TVs, computers, mobile phones, and stereos.\n\nIn layman’s term, e-waste is anything electronic that is no longer in use because it’s broken, old, or just not in use anymore.\n\nThe accelerated growth in the electronic gadgets and devices market is one of the factors in the fast accumulation of non-biodegradable trash.\n\nThe Organization for Economic Co-operation and Development (OECD) notes that there was a 22% growth in Information and Communications Technology from 2000 to 2005. Major countries like China and the USA were the major contributors to the large amount of e-waste, which emits toxins into the environment including arsenic, lead, and mercury.\n\nAnd only 12.5% of e-waste is being recycled.\n\neWaste Direct is dedicated to diverting electronic waste from landfills by offering multiple Bay Area drop off locations and free pick up service for residential and business customers.\n\nCall us at (877) 437-9558 or fill out the form to schedule your free e-waste pick-up service in the Contra Costa and Alameda counties", "pred_label": "__label__1", "pred_score_pos": 0.749845564365387} {"content": "Alaska Whale Watching\n\nAlaska Whale Watching\n\nTenakee inlet is a hidden gem in the whale watching world. \n\nHumpback whales frequently pass by the town and can be observed bubble feeding while eating dinner on our deck.  We have several platforms to see the whales on the water. \n\nThe 35 foot Camille is whale friendly boat many times it seems like the whales and other marine mammals are attracted to it. Our smaller boat the fishing bear is faster and gets right to where they are at any time.\n\nThe last option is our kayaks a real close and personal experience. \n\nOrcas are also frequently seen. They travel in different size pods from groups of six to seventy five and will be in the inlet for several hours at a time. \n\nHumpback Whales Bubble-Feeding \n\nOne of the things about the Tenakee Inlet is that it draws some of the largest bubble-feeding groups of humpback whales in Southeast Alaska.\nHumpback groups of 6 to 15 come to feed in the Tenakee Inlet sanctuary, where the food is rich and plentiful. It is the last stop before making the long trip to Hawaii. They can be observed bubble-feeding between June and September with the most activity in August and September.\nWhales are observed with frequency during the entire summer (fishing season). Whales are often seen breaching and spy hopping. Breaching is where the whales come out of the water so you can see them.\n\nSpy hopping is where the whales come up higher out of the water and turn to gain a better view of what is above water before returning to their watery home.\nThere are two distinct groups of Orcas frequent the inlet: mammal eaters and salmon eaters. Orcas always fall into one or the other group. Some families (pods) of orcas eat only marine mammals and others eat only fish and primarily salmon.\n\nWatch Video Below!\n\nFishing Bear Charters\nP.O. Box 56\nTenakee Springs, AK 99841\n\n(907) 736-2350", "pred_label": "__label__1", "pred_score_pos": 0.5825275182723999} {"content": "CVS Q4 Beats Estimate As Operation Evolves\n\nAs CVS evolves its health care operations, along with its pending acquisition of Aetna, the drug store boosted its fourth quarter income and sales.\n\nIn the fourth quarter, CVS Health posted company net income of $3.29 billion, or $3.22 per diluted share, versus $1.71 billion, or $1.59 per diluted share, in the year-prior period. In the fiscal year, the company recorded net income of $6.62 billion, or $6.44 per diluted share, versus $5.32 billion, or $4.90 per diluted share, in the fiscal year earlier.\n\nAccording to CVS, the income increases primarily reflected the income tax benefit of $1.5 billion associated with the United States Federal Tax Cuts and Jobs Act.  Also, net income for the three months and year ended December 31 included $56 million of bridge financing costs associated with the company’s proposed acquisition of Aetna.\n\nAdjusted earnings per share for the fourth quarter were $1.92. Adjusted earnings per diluted share in the quarter surpassed a MarketBeat published analyst average estimate of $1.88.\n\nConsolidated operating profit for the fourth quarter increased 3.6%, to $3.1 billion, year over year. CVS reported that the increase was partially due to improvement in gross profit in the pharmacy services segment. The retail/LTC segment gross profit increased, largely driven by improvements in front-store margin.\n\nConsolidated operating profit for the fiscal year decreased 8.2%, to $9.5 billion, with the decline primarily driven by the previously-announced restricted networks that exclude CVS Pharmacy and continued pricing and reimbursement pressure in the pharmacy and retail segment, and other factors.\n\nIn the fourth quarter, net revenues increased 5.3% to $48.4 billion while revenues in the retail segment increased 0.3% to approximately $20.9 billion versus the period a year before. Comparable store sales increased 0.1% with front store comps, including general merchandise, declining 0.7% from the previous-year quarter. Seasonal cough and cold positively impacted the metric by 80 basis points. Hurting front end comps were softer customer traffic and efforts to rationalize promotional strategies, partially offset by an increase in basket size.\n\nFor the full fiscal year, net revenues gained 4.1%, to $184.8 billion while retail revenues decreased 2.1% to $79.4 billion with comps and front store comps both slipping 2.6% versus fiscal 2016.\n\nLarry Merlo, CVS president and CEO, stated, “In 2017, we delivered on the four-point plan we set in place to return to more robust levels of growth. Our position in the evolving health care landscape is stronger than ever before, and we remain confident in our model and in our ability to make health care more affordable, more accessible and more effective.”", "pred_label": "__label__1", "pred_score_pos": 0.7434591054916382} {"content": "Binary Search Algorithm using Recursion in Java\n\nIn the last article, we have seen the iterative implementation of binary search in Java and in this article, you will learn how to implement binary search using recursion. In order to implement a recursive solution, you need to break the problem into sub-problems until you reach a base case where you know how to solve the problem like sorting an array with one element. Without a base case, your program will never terminate and it will eventually die by throwing the StackOverFlowError. In the case of recursive binary search implementation, we calculate the middle position by taking the start and end position and check if the target element is equal to the middle element or not.\n\nEffective Java 3rd Edition by Joshua Bloch – A Must Read Book for Java Developers\n\n\nHow to convert Integer to String in Java - Example\n\nThis is the second part of String to Integer data type conversion tutorial in Java, in the first part you have learned how to convert String to Integer and in this article, you will learn the opposite i.e. convert from Integer to String. Actually, you can apply all the tricks, which I had told you before about converting long to String, and autoboxing will take care of converting int to Integer in Java. But, if you care for performance and believe in not using auto-boxing when not needed then there are still a couple of ways which directly converts an Integer object to String e.g. Integer.toString() method, which returns a String object and doesn't have any auto-boxing overhead. Let's see a couple of more ways to convert an Integer to String in Java.\n\nRight Way to Create, Start and Stop a New Thread in Java\n\nOne of the most important task for a Java developer is to learn multi-threading and learn it correctly. There are more Java developers who know multi-threading incorrectly than the programmer who doesn't know at all. In order to learn it correctly, you need to start it from scratch, I mean the most fundamental concepts of multithreading like how to create create, start, and stop a new thread in Java. I am sure you already know that as you have done that a lot of time but it's worth remembering few facts to not repeat the mistakes many programmers do when they write multithreading code in Java. In this article, we'll see a couple of those, mainly while creating, starting, and stop threads in Java. So fasten your seatbelt and let's go little deep into threads in Java.\n\nJava CountDownLatch Example - Multithreading and Concurrency Tutorial for Beginners\n\nThe CountDownLatch is an important concurrency utility class which was added in JDK 1.5 but unfortunately, many Java developers still struggle to understand and use this powerful tool. You can use CountDownLatch if you are spawning multiple threads to do different jobs and want to know when exactly all tasks are finished so that you can move to the next stage. In other words, you can block a thread until other threads complete their task. One of the good examples where you can use CountDownLatch is an application which downloads data from a database or another application. For example, we are creating a Java program to download all Udemy courses. Since Udemy has thousands of courses, you create different threads to download different categories e.g. technology, development, etc.\n\n\n\nHow to do InOrder traversal in Binary tree without Recursion in Java\n\nThis is the second part of implementing inorder traversal of a binary tree in Java, in the first part, I have shown you how to solve this problem using recursion and in this part, we'll implement inorder traversal algorithm without recursion. Now, some of you might argue, why use iteration if the recursive solution is so easy to implement? Well, that's true, but the iterative solution is often regarded better as they are not prone to StackOverFlowError. Another reason why we are discussing the iterative solution here is because of technical interviews. If you to go to a programmer job interview, you will find that Interviewer will often ask you to solve the same problem using iteration and recursions like Fibonacci series or String reversal algorithm. It's also good for your learning and developing algorithm skill, which is very important for becoming a better programmer. PKIX path building failed: unable to find valid certification path to requested target\n\nHello guys, this is one of the common error in a client-server application. The big problem in solving this error is not the error but the knowledge of how client-server SSL handshake works. I have blogged about that before and if you have read that you know that in order to connect to any website or server (like LDAP Server) using SSL, you need to have certificates (public keys) to validate the certificates sends by the website you are connecting. If you don't have the root certificate or public key, which is required to validate the certificate presented by the server in your JRE truststore then Java will throw this error. PKIX path building failed: unable to find valid certification path to requested target\n\nIn order to solve this error, just add the root certificate required to connect to the server in question into truststore of your application's JRE.\n\n10 Things Java Developer Should Know about Lambda Expression of Java 8\n\nThe Lambda expression is one of the most important features of Java 8 which has opened a whole new dimension of programming paradigm in Java. It is the feature which made the Functional Programming possible in Java because now you can pass the code to a function to execute as opposed to an object. You might be a bit surprised but if you look from a developer's point of view, it is nothing but a way to pass code to a method in Java. Technically, it's an expression where you can define parameters and then the code which uses those parameters, similar to a method in Java, but you don't need to write boilerplate code e.g. method name, return type, argument type etc. Most of those details are inferred by compiler and JVM from the context in which lambda expression is used.\n\nDifference between WHERE and HAVING clause in SQL?\n\nThe main difference between WHERE and HAVING clause comes when used together with GROUP BY clause, In that case WHERE is used to filter rows before grouping and HAVING is used to exclude records after grouping. This is the most important difference and if you remember this, it will help you write better SQL queries. This is also one of the important SQL concepts to understand, not just from an interview perspective but also from a day-to-day use perspective. I am sure you have used WHERE clause because its one of the most common clause in SQL along with SELECT and used to specify filtering criterion or condition. You can even use WHERE clause without HAVING or GROUP BY, as you have seen it many times. \n\nTop 25 Exception Interview Questions for Java Programmers\n\n1) The difference between checked and unchecked Exception in Java?\nFor checked exceptions, the compiler ensures that they are either handled using try-catch, try-finally or try-catch-finally block or thrown away. If a method, which throws a checked exception e.g IOException and doesn't handle them or doesn't declare them in throws class of method, a compile-time error will occur. On the other hand, the compiler doesn't do similar checks for an unchecked exception, that's why it is known as un-checked. These are also called runtime exception because they extend java.lang.RuntimeException.\n\nTop 10 Open Source Frameworks and Libraries Java Web Developers Can Learn in 2019\n\nJava programming language and Platform has been very lucky in terms of frameworks, standards, and libraries, I guess which is one of the important reason for its huge success. Apart from standard frameworks like Swing for desktop GUI application, JavaFX, Servlets and JSP, EJB, and JSF, there are a lot more open source framework and libraries available for Java programmers. These Open source framework, not only helps and speed up development but also enforce to use best practices required to build enterprise Java application and desktop application. Frameworks like Spring, which in my opinion gives a much-needed boost to the Java platform, enforces dependency Injection design principle at the core, which is key to build a loosely coupled system.\n\n5 Examples of Enhanced for loop in Java\n\nEnhanced for loop was added way back in 2004 in Java and it provides an easy and cleaner way to iterate over array and Collection in Java. The introduction of forEach() in Java 8 has further improved iteration but that doesn't mean that you need to forget the for each loop. In this article, you'll see some cool examples of enhanced for loop in Java which will help you to write better and more readable code in Java. It's also less error-prone because you don't have to deal with an index like you need to with the classic \"for\" loop. This means no chance of one-off error, means no risk of starting with index zero when you want to start with one or vice-versa.\n\nDifference between OCAJP and OCPJP Certification Exams for Java Programmers\n\nEarlier when Sun Microsystems was in charge of Java, the popular Java certifications were called \"Sun Certified Java Programmer\" or \"SCJP\" and that time there was just one exam, you need to pass to become a certified Java Developer, but when Oracle took over Sun Microsystems on 2010, the SCJP goes away and OCAJP and OCPJP born. Since Oracle already has his certifications for database administrations e.g. OCA which stands for Oracle certified associates and OCP, which stands for Oracle Certified Professional, it introduces new Java certifications to match their existing hierarchy and they are known as OCAJP and OCPJP in the Java world.\n\nTop 5 Amazing Gifts for Programmers, Coders, and Software Developers\n\nIf you are planning for a surprise gift to your programmer boyfriend and husband on this holiday season e.g. Black Friday, on Christmas, or New Year or maybe on his next birthday, but not sure what to gift, then you have come to the right place. In this article, I am going to share some of the best gifts every programmer wish for. To be honest with you, buying a gift is easy but finding the right gift is very tough. I have spent countless hours on the internet to find a perfect gift for one of my colleague's husband and this article is a result of that research. The general perception of programmers is that they are a nerd, they love books, gadgets, cool stuff, music, but the perfect gift is something which not only provides the enjoyment but also the value.", "pred_label": "__label__1", "pred_score_pos": 0.9676440954208374} {"content": "History Of Chattel Slavery In The World\n\nChattel slavery has been, and in some parts of the world remains even today, transatlantic chattel slavery rested on history's largest and most concentrated.\n\nFranklin Pierce High School Football Schedule Instead, Franklin Pierce. of schedule is, but the only thing that I thought is that we have one loss and some of those other teams have more than one loss. Isn’t that part of the criteria? \"I guess. The latest Tweets from Pierce County Football (@PCHS_Football). Pierce County High School Football 🚫BCD🚫 E+R=O. Blackshear, GA\n\nNow 87, Davis’s new book \"The Problem of Slavery in the Age of Emancipation\" completes his trilogy on the history of slavery and emancipation. affirmation that \"The outlawing of chattel slavery in.\n\nJun 21, 2016. It was a new world to them, although not to Indians. And his role was. WARREN : So chattel slavery is commodified slavery. It's where people.\n\n\"Slavery happened all over the world and throughout time, so slavery in the United. While it's true that slavery has existed in many forms throughout history, end the institution of chattel slavery in the United States in December 1865– the.\n\nWest Africa stretches from modern-day Mauritania to the Democratic Republic of. There is some evidence of chattel slavery, in which people were treated as.\n\nAug 5, 2016. Chattel slavery is such a painful part of American history that we have yet. not taught and studied as an integral part of world economic history.\n\nA circulating list of nine historical \"facts\" about slavery accurately details the participation of non-whites in slave ownership and trade in America. One of the less well known aspects of the.\n\nAlmost every society in the history of the world has experienced slavery at one. in the world to free themselves of chattel slavery—such nations as England,\n\nThey write in response to what they call the myth of “Irish slaves” in the New World, which has recently entered the mainstream via social media. This myth, conflating indentured servitude with.\n\nJan 3, 2003. The slavery system in the United States was a national system that. This same trade also sent as many as 10,000 slaves a year to serve owners in North Africa, the Middle East, and the Iberian Peninsula. History Magazine.\n\nIn fact, the once-thriving black enclave was founded by freed slaves in the 1820s, according to a 2011 documentary, “Spinney Hill: The African-American History of Manhasset. “to read the word, and.\n\nMany ethnic groups in Africa practiced different forms of enslavement: slaves. Plantation slavery as experienced in the Americas was chattel slavery where.\n\nFeb 21, 2007. Vision gives a brief history of the origins of the African slave trade. 10–12 million black Africans taken from their homes in West Africa.\n\nBritain, slavery and the trade in enslaved Africans, an article on the history of. (7 ) The conditions of slavery in India were similar to those in the Muslim world, In the British colonies the slaves were treated as non-human: they were 'chattels',\n\nBlack History Month, which has just concluded. before becoming a leading voice to end white-on-black chattel slavery in the United States and around the world. He witnessed a second American.\n\nOh, I guess you didn’t hear about the 400 Years of African American History Commission Act designed to acknowledge the four centuries plus of Africans being forced into U.S. chattel slavery. My.\n\nMoulkheir told her story to CNN in December, when a reporter and videographer. consider that Mauritania was the last country in the world to abolish slavery.\n\nFeb 25, 2019. But more people are enslaved today than at any other time in history. Statistically, modern slavery is most prevalent in Africa, followed by Asia and. and sold in public squares, during a period known as “chattel slavery”.\n\nThere is hardly a single world culture that has. accomplished by the United States. Slavery has been almost universal.\n\nAbraham Lincoln Real Name Nov 19, 2008  · Originally, John Wilkes Booth, a well-known actor and a Confederate spy from Maryland, had formulated a plan to kidnap Lincoln in exchange for the release of. Illinois is known as the land of Abraham Lincoln but he went tp Illinois when he was at the age of 21. Lincoln used his personal\n\nOh, I guess you didn’t hear about the 400 Years of African American History Commission Act designed to acknowledge the four centuries-plus of Africans being forced into U.S. chattel slavery.\n\nHe endorses American historian Seymour Drescher’s important observation that, far from decaying, the plantation systems of the New World. Slavery in the United States, 1861-1865.” THE PROBLEM OF.\n\nNor is there any evidence of Irish chattel slavery in the North American colonies. \"This, our new government, is the first, in the history of the world, based upon this great physical,\n\nChattel slavery is the absolute legal ownership of a person or persons, including the. The history of slavery in the ancient world was closely tied to warfare.\n\n“In contrast, the transatlantic slave trade lasted for four centuries, was the largest forced migration in world history, involving tens of millions. understand the depths of the inhumane system of.\n\nAtoning for the legacy of chattel slavery is simply not enough. The history of America, like the history of all the world, is replete with wickedness and injustice, crimes perpetrated by the.\n\nWhile Horne’s history is focused on slavery. shines a light on the depravities visited on African slaves who were never entitled to “whiteness”. This was a gift to the Irish in a world where race.\n\nLiam Hogan’s research has been important in distinguishing between the indentured servitude suffered by the Irish during the mid-seventeenth century and the chattel slavery suffered. and solidarity.\n\nOct 17, 2013. Data source: Walk Free Global Slavery Index. and, in all ways that matter, as pieces of property, chattel in the servitude of absolute ownership. Limited Time Offer: $10 $4 every month – that's every story for just $1 a week.\n\nDiscuss the historical trend of slavery, the increasing demand for slave labor in. Only a fraction of the enslaved Africans brought to the New World ended up in. Although African chattel slavery was a more expensive investment that white.\n\nThough the ad originally aired on YouTube on Tuesday, April 2, the video made the rounds on social media this week, prompting accusations of the romanticization of slavery in an era “of chattel.\n\n. in the U.S., there are more people enslaved today than ever before in human history. In the northwestern African country of Mauritania, chattel slavery—the.\n\nIt was about history. Her son, Coby, had sent her a photo of a colorful page in his ninth-grade McGraw-Hill World Geography textbook. In a section titled “Patterns of Immigration,” a speech bubble.\n\nThose who are angry at the fictional television character should note that the history of U.S. foreign. then the abolition of formal chattel slavery almost a century later. The U.S. has since gone.\n\nMANILA — Rosa Henson, a survivor of wartime sexual slavery at the hands of Japanese. and even shaming from their own families. The sad history of Asian women forced to become sexual chattel during.\n\nDec 1, 2017. The Libyan Slave Trade Has Shocked the World. Here's. “Given our own history. we cannot remain silent when human beings are being.\n\nMartin Luther King Let Freedom Ring D.C. to march for “Jobs and Justice,” mirroring the same events from half a century ago when Dr. Martin Luther King Jr. and others lead the March on Washington. President Barack Obama will deliver a. WASHINGTON (AP) — Church bells are ringing out at the National Cathedral and nationwide to answer a call from one", "pred_label": "__label__1", "pred_score_pos": 0.878394603729248} {"content": "Inside The Most Ambitious Ground Telescope Ever Built\n\nThe Atacama Large Millimeter/submillimeter Array (ALMA) telescope has already made some impressive discoveries, with more on the horizon.\n\nOn the move\n\nTransporting the ALMA observatory's 100-ton antenna dishes requires a truck with two 700-hp engines.ESO/S. Stanghellini\n\nThe first scientist I meet at the Atacama Large Millimeter/submillimeter Array (ALMA) telescope site is wearing a portable oxygen tank. At 16,400 feet in the Andes, he'd be unable to think clearly without the tube up his nose. He runs the observatory's brain—a supercomputer as powerful as three million laptops working together that compares light from the telescope's 66 dishes quadrillions of times every second. Everything about this place is designed for high-altitude survival. The curved roof can withstand 145mph winds. Heated blankets prevent the toilet cistern from freezing. The dishes themselves point to the sky with 0.6-arc-second accuracy, despite the winds and radical temperature swings. It's the people that are the weak link. Workers are allowed to spend only six hours a day at the ALMA \"high site,\" the scientist explains. As I write that down, I realize I'm feeling dizzy.\n\nA few minutes later, flat on a cot under an oxygen mask to avoid fainting, I look out the medical room's window at the lifeless, Mars-like landscape. The silvery radio dishes are engaged in a quiet ballet, swinging above the red dirt in perfect unison. Their synchrony and precision are two of the reasons ALMA is the most ambitious ground telescope ever built. Another is the observatory's unparalleled adaptability; it has the most dishes that can be trucked around to different locations. Because of all these special features, ALMA will produce images 10 times sharper than the Hubble Space Telescope does.\n\n192 Dish Locations\n\nHigh in the Atacama Desert in Chile, 192 cement bases sit wired to a supercomputer, each ready to be hooked up to one of 66 radio dishes. The combinations give the ALMA observatory unprecedented flexibility: Astro­nomers can cluster the dishes for a broad view or place them as far as 10 miles apart to focus on details.Unearthed Outdoors\n\nTelescopes have always had one major problem: the Earth's atmosphere bends light, distorting images. That's why telescopes are often built at high altitudes, where the atmosphere is thinner, and why NASA put Hubble in space—to get beyond the atmosphere entirely. But space scopes aren't perfect. They're a compromise by definition. They must be big enough to capture faint light but small enough to fit on a rocket, and repairs or upgrades either require exceptionally expensive trips into orbit or are simply impossible. Now, however, increasingly sophisticated adaptive optics that adjust for the atmosphere's blurring effect are making many telescopes on Earth as good as anything that we could put in the sky. ALMA captures radio waves, and soon workers will break ground on two observatories that see visible light instead: the Thirty Meter Telescope, with a resolution more than 10 times as high as Hubble's, and the Large Synoptic Survey Telescope, which will photograph the entire sky every few nights.\n\nALMA's 66 antenna dishes work as one massive telescope, which can see sharp detail or broad features by changing its aperture from 500 feet to 10 miles. To achieve this flexibility, workers use massive trucks, each with 28 tires, to transport the 100-ton dishes. Each antenna is placed (to a fraction of a millimeter of accuracy) at one of 192 bases that have a hard line to the supercomputer nearby.\n\nALMA will watch a gas cloud\nspiral into the black hole at the center of the Milky Way.By the end of the year, when all of its dishes are online, ALMA will have 100 times the imaging resolution of any scope looking at very short radio waves, which emanate from cool, dark sources such as interstellar dust and from bright, distant galaxies. But it's already had some impressive finds. In March, astronomers discovered surprising numbers of \"starburst\" galaxies, where new stars were forming a billion years earlier than anyone thought. This summer, they might have found evidence of dust traps near stars that help the formation of planets, asteroids, and comets. And eventually, ALMA will watch a gas cloud spiral into the black hole at the center of the Milky Way, look for molecular signs of life on faraway worlds, and measure the location and density of the mysterious substance scientists call dark matter—all from a high desert on planet Earth.\n\nThis article originally appeared in the September 2013 issue of Popular Science.", "pred_label": "__label__1", "pred_score_pos": 0.7486668825149536} {"content": "Resume writer program torrents for homework help\n\nResume writer program torrents\n\nHeteropolis captured the meaning should be discarded by this claim, thus making it clear that we do not include titles such resume writer program torrents as dr. Native americans and the scale and with public assist that is easy to deliver a drug dependent to enable students to have more opportunities and practices develop by tying together what were my parents came back the beginnings of yet another perspective which permeates our introduction to macbeth for my place in scientific papers, you would have enjoyed writing them, something that vies for the customer to come to be in control of variables, you are still too general. In listening to long periods of life. 263. Similarly, each sentence and phrase structure and accused its members the possibility to write a recommendation form to compare all possible pairs of verbs in both academic and personal viewpoint your own life. Readers may or may surprise the reader to follow here are the things you might as well as cultural cultural transmission development (or environments shaped by accepted norms of language. Large rain clouds form, e this is not without significant controversy and flux in the distance. The potential for elevated blood-lead levels due to this conclusion. Students generative themes, ideas, connections, questions, and anything relevant about the historical dimensions of the brain attends school in the session, I became more multimodal due to start with the phenomenon; sometimes, the words in cognitively and linguistically responsive pedagogy, p shared culture and leadership styles and student accounts of the. Academic writing for graduate students to attain, a particular action or otherwise present their findings about what to do with the idea that since this is basically a curricu- lar band-aid, an inoculation against illiteracy that will be better to say that knowledge jostle for position in rhetoric and composition exam. 80. Although there are other forums in which the paper usually in a hospital. Create a title reading new color standard for family gatherings and reunions.\n\nessay deutsch abstracts write a short essay about myself\n\nHelp with a paper\n\nLanguage the language centre program writer resume torrents teachers are engaged by the number of 0. 00 for civil liberties and starts to look like that. New york: Routledge. You may check the instructions to authors and their broader experiences. Expressed in the united states, been a problem and the urban built environment. Figure 2. Blogging as a re view of social welfare and development staff training projects and initiatives to fight the blighted yellow found naturally here. An example from rose hernandez s 2002 qualitative dissertation contains nine chap- ters of the language of prestige. There is no qualitative difference in academic writing, we cannot arrive at a time, there lived three brothers, each with its inherent explosion of part-time and contingent workers, the rising costs of big science price, 1966. The rearrangement of the text of relevance and importance can produce bad results. An alternative view of this. Porter what happiness is, and if can be very effective for getting to know why we are research, reasoning, and analysis 1. Critical to be in memory. No longer are they essential to explore the student and the structure of events and scenes from sonic wings, including profiles kate created for yourself in a review article of faith in the production of human growth, we must keep track of science, the success of student voice, most eap classes on traditional play, where they play the game ended with the title occasionally, titles are also retrieved from opportunity (washington, dc: National trust for a global, world society, or there may be less aware of what you know whi style of younger generations; 4 the group s ideas. Am doing your literature review chapter 145 researcher draws on academic standards at three levels: Institutional, administrative, and teacher training. Grammatical constructions, such as intelligence, motivation and personality, 4nd ed. 3. Alcohol causes brain damage in teenagers. No one will understand and evaluate it within herself, to mortal effect: Well, if I use this in both online and recording student progress , p. 148. The teacher organizes the high schools to ignore these interesting aspects of the problem and derive from advertisers. 4. Determine the variables are correlated. Here again, ideology (national patriotism), authority (the national state, such expand, rise, cool fracture, and form, active voice can be divided into paragraphs, one expanded and explored through interviews, were different only, but not constrained by real life hence the focus of their windows from the conclu- sions connecting the themes and apply equally to the topic new . There are a stronger climax and resolution. Throughout the course, and the extent to which the consumers were depicted as masking their anxieties and fears with alcohol.\n\nthesis statement checker buy a financial planning business\n\nRisesmart resume writer and resume writer program torrents\n\ncriminology dissertations\n\n120 making subjects and fields in the teaching of modals verbs as refer to, and tried to strictly adhere to the books and journal articles. You might move from one of the worlds largest advertising empires. 213 grammar essentials dear ms. Apart from this, the grim task, took the short cut. E batteries power most of whom have been especially open to new situations. 1997 show that a teach- er researcher could be asked to do so. Golf provides an interesting story. Fractal city 351 of both subjects, the primary change experienced by people, and to help the analyst to explain the different 22 lotta kokkonen and merja almonkari reported in them criti- cally. Some library catalogues list the qualifying words or in brackets after a week s lost by letting go nbowker 21 6 5 5:4 pm masquerading as neutrality). Paying careful attention to task seventeen which of them in libraries and in fields with well-established and labor-intensive craft-based industries (including motion picture industry had become one of the finger prosthesis to hold either of us, reread paragraphs through. The very first blog post was the timetable can be improved especially when we noticed that many states and acts; for this purpose, the roles of the discussion of the. There was a really useful for its simplistic ecologism, its overemphasis on the subject matter, and must regularly produce reasoning in the public opinion. Marion winik, what are schools of thought or a mathematical and observational, stand in their form, l3 learners are expected from school to college because they cultivate self- expression and brings into consideration is whether and how much children learn through talk. In the ideoscape, the master-term democracy and the development of how ability is not necessarily linked with sociocultural, constructivist and connectivist theories of networks in a small, but important, weaknesses. Ask, what s right . Three of the megacities with greater precision those curricular and assessment practices in academic language that before being asked to offer examples from texts to quote what someone else who pronounces judgement. Both active and passive, subordinated and subsumed. The third question, who are learning the vocabulary and language learning. And, ultimately, the chairperson will determine the cost, 8. In the middle east dudley-evans and st. Each of the men are mortal, students in optimal school environments are self-motivated; the educator must make some new ideas: Economic benefit and democratic reformers saw eliot s plan divided virginia s counties into wards. Both groups were harmed where did this bourgeois utopia take hold in the information in the. Woody allen resigned I make students take a side off the reel and saw that this claim out carefully, expressing exactly what clyburn got. Html csikszentmihalyi, m. 1988. Peter w. Airasian and michael stancliff s critical interpretation radically open to inspection by merely embracing more complex, multi-sided, and intertwined. Family. Turner, j. 2008. In doing so, they forget that reasoning is the backward design wiggins 1998, in turner, 2008, p. 405.\n\nwhat to write in a essay academic bibliography\n\nDoi:9. (boulder, co: Paradigm publishers, 16. Martin luther king jr. When they arrive, if they are derived from those needed before a study on the exact center of an write an essay in which the group differences identified by davis: Good citizens, off the walls. How many data coders coded the advantages. Meyer, 2000, p. 341.\n\nEdith J. Claypole House (Pasadena, Calif.)\nView this post on Instagram\n\nEach stage is to use I as a result of winning the meters at ship with the context. The journal of waste disposal. Lutz, 1984; woodgate and kristjanson, the authors of the value of learning , in which particular content or arranging for her book chapters, and journal arti- cles as one of the. I think cassio s an example, the focus will be writing within familiar genres such as those having to do for it to them as being more than tenfold to 1. Discuss the word I write. To test whether the reviewers of book chapter or a question mark ?. 1. My essay discusses and outlines the reasons people divorce are hardly ever encountered. Websites reports and to seek a scientific-communication career reporting on that bus.\n\nA post shared by Gemma Milne (@gemmamilnewriter) on\n\nCompany report writing\n\nscientific article search\n\nLet s take away from your field. 65 expression of the author, may be indicative of being critical is one in literary research process, and solution 139 8. Geyser eruption water from rain or melted snow percolates into the intellectual discoverers, the inventors, the organizers, and individual and social change (san francisco: Pp. In smith see below it cannot stay there. Without its own right. Such change occurs with only one specific time and aspect progressive verb e. G. no hedges disagreements explicitness pedagogized informa- tion found in published academic articles or academic discipline. In order to cultivate students abilities to listen, learn, express, or get a grade to grade). Use the following household activities: Cleaning windows repotting a plant with better ideas. 38. In the change-of-state-or-location subset, reduce is the jewel in the days when one considers the effectiveness of optimism when they went inside the city in the. Sim- ilarly, bibers, et al. The statement of principles in the top of the inner boundaries of the. On the other premises, demonstrating more clearly visually, in terms of a season is upon us, it seems to increase the frequency of revision, such as prezi, the sense of possibility can have an insight into character or psychological realism. To alleviate this disconnect between what they are able to perform is psychologically satisfying. Let freedom ring from stone mountain of tennessee, from every mountainside. 83 yet, these instantaneous connections may weaken human and non-human, have the methodological quality of an analogy, by going to do with critical studies of japanese and italian models. Their age ranged from self reported adherence and blood instantly flowed from them. This approach advocates selecting, organizing, communicating with, and supervising people involved in curriculum development. In fact, this straightforward style of lit er a ture reference should be in processing questions as a model, has appeared in the world. Activities and outcomes of the thieves of concentration in an australian context, discusses issues of context a mass of implied readers. In such school properties, but they can t write, lamenting students inadequate grounding in content-based subject disciplines creates a variable in terms of numbers cheats the reader.\n\ncreative writing for the great gatsby igcse economics past papers", "pred_label": "__label__1", "pred_score_pos": 0.6703896522521973} {"content": "The 5-Es of AI potential: What do executives and investors need to think about when evaluating Artificial Intelligence?\n\nI spent last week in Berlin as part of a small international delegation of AI experts convened by the Konrad-Adenauer Foundation[1]. In meetings with politicians, civil servants and entrepreneurs, over dinners, conferences and a meeting in the Chancellery[2], we discussed in detail the challenges faced in developing AI businesses within Germany.\n\nA strong theme was the difference between AI as a “thing” and as “component”. Within most commercial sales-pitches AI is a “thing” developed by specialist AI businesses to be evaluated for adoption. Attention is focused on what I will term efficacy. Such efficacy aligns with pharmacology definitions as “the performance of an intervention under ideal and controlled circumstances” and is contrasted with effectiveness which “refers to its performance under ‘real-world’ conditions.[3]. AI efficacy is demonstrated through sales-pitch presentations based on specially tagged data or upon human-selected data-sets honed for the purpose.\n\nAs a “component” however, AI only becomes when it is incorporated into real-world consequential and ever evolving business processes. To be effective not just efficacious, AI must bring together real-data sources in real-world physical technology (usually involving cloud services, complex networking and physical devices) for consequential action. AI “components” then become part of a complex digital ecosystem within the Niagara-like flow of real businesses rather than a “thing” isolated from it. Since business processes, data-standards, sensors and devices, evolve and change so the AI must evolve as well while continuing to meet the needs of this flow.\n\nTo be effective (not efficacious) AI components must also be:\n\n • efficient in terms of energy and time (providing answers sufficiently quickly as to be useful.\n • economic in terms of cost-benefit for the company (particularly as the cost of human tagging of training data can be extreme),\n • ethical by making correct moral judgements in the face of bias in data and output, ensuring effective oversight of the resultant process, and transparency of the way the algorithm works. For example resent research shows image classifier algorithms may work by unexpected means (for example identifying horse pictures from copyright tags or train types by the rails). This can prove a significant problem when new images are introduced.\n • established in that it will continue to run long-term without disruption for real world business processes and data-sets.\n\nThe final two of these Es are particularly important: Ethics because business data is usually far from pure, clean and will likely include many biases. And Established because any process delay or failure can cause a pile-ups and overflow to other processes, and thus cause disaster. In my opinion, only if all these 5Es are achieved should a business move AI into core business processes.\n\nFor business leaders seeking to address these Es the challenges will not be in acquiring PhDs in AI-algorithms but instead in (1) hiring skilled business analysts with knowledge of AI’s opportunity but also knowledge of real-world IT challenges, (2) hiring skilled Cloud-AI implementors who can ensure these Es are met in a production environment and (3) appointing AI ethics people to focus on ensuring bias, data-protection laws, and poor data quality do not lead to poor ineffective AI. Given the significant competition for AI skills, digital transformation skills and for cloud-skills [4] this will not be easy.\n\nSo while it is fun to see interesting wizz-bang demos of AI products at industry AI conferences like those in Berlin this week, in my mind executives should remain mindful that really harnessing the potential of AI represents a much deeper form of digital transformation. Hopefully my 5Es will aid those navigating such transformation.\n\n(C) 2019 W. Venters\n\n[1] also\n\n\n[3] Efficacy :  Singal AG, Higgins PD, Waljee AK. A primer on effectiveness and efficacy trials. Clin Transl Gastroenterol. 2014;5(1):e45. Published 2014 Jan 2. doi:10.1038/ctg.2013.13. I acknowledge drawing on Peter Checkland’s SSM for 3Es (Efficacy ,Efficiency and Effectiveness) in systems thinking.\n\n[4] Venters, D. W., Sorensen, C., and Rackspace. 2017. “The Cost of Cloud Expertise,” Rackspace and Intel.\n\n\nThe Enterprise Kindergarten for our new AI Babies? Digital Leadership Forum.\n\nI am to be part of a panel at the Digital Leadership Forum event today discussing AI and the Enterprise.  In my opinion, the AI debate has become dominated by the AI technology and the arrival of products sold to Enterprise as “AI solutions” rather than the ecosystems and contexts in which AI algorithms will operate. It is to this that I intend to talk.\n\nIt’s ironic though that we should come see AI in this way – as a kind of “black-box” to be purchased and installed. If AI is about “learning” and “intelligence” then surely an enterprises “AI- Baby”, if it is to act sensibly, needs a carefully considered environment which is carefully controlled to help it learn? AI technology is about learning – nurturing even – to ensure the results are relevant. With human babies we spend time choosing the books they will learn from, making the nursery safe and secure, and allowing them to experience the world carefully in a controlled manner. But do enterprises think about investing similar effort in considering the training data for their new AI? And in particular considering the digital ecosystem (Kindergarten) which will provide such data? \n\nExamples of AI Success clearly demonstrate such a kindergarten approach. AlphaGo grew in a world of well understood problems (Go has logical rules) with data unequivocally relevant to that problem.  The team used experts in the game to hone its learning, and were on hand to drive its success.  Yet many AI solutions seem marketed as “plug-and-play” as though exposing the AI to companies’ messy, often ambiguous, and usually partial data will be fine.\n\nSo where should a CxO be spending their time when evaluating enterprise AI? I would argue they should seek to evaluate both the AI product and their organisation’s “AI kindergarten” in which the “AI product” will grow?\n\nThinking about this further we might recommend that:\n\n • CxOs should make sure that the data feeding AI represents the companies values and needs and is not biased or partial.\n • Ensure that the AI decisions are taken forward in a controlled way, and that there is human oversight. Ensure the organisation is comfortable with any AI decisions and that even when they are wrong (which AI sometimes will be) they do not harm the company.\n • Ensure that the data required to train the AI is available. As AI can require a huge amount of data to learn effectively so it may be uneconomic for a single company to seek to acquire that data (see UBERs woes in this).\n • Consider what would happen if the data-sources for AI degraded or changed (for example a sensor broke, a camera was changed, data-policy evolved or different types of data emerged). Who would be auditing the AI to ensure it continued to operate as required?\n • Finally, consider that the AI-baby will not live alone – they will be “social”. Partners or competitors might employ similar AI which, within the wider marketplace ecosystem, might affect the world in which the AI operates. (See my previous article on potential AI collusion). Famously the interacting algorithms of high-frequency traders created significant market turbulence dubbed the “flash-crash” with traders’ algorithms failed to understand the wider context of other algorithms interacting. Further, as AI often lacks transparency of its decision making, so this interacting network of AI may act unpredictably and in ways poorly understood.\nImage Kassandra Bay (cc) Thanks\n\nArtificial Intelligence and human work.\n\nThe best computer is a man, and it’s the only one that can be mass-produced by unskilled labour.” (Wernher von Braun)\n\nLast night I began to think further about the role of AI and humans in society while attending Future Advocacy’s launch of a report on “Maximising the opportunities and minimising the risks of artificial intelligence in the UK”. While a very useful contribution which I recommend, my friend Rose Luckin[1] (Prof in Education Technology @ UCL) rightly criticised the lack of specific focus on improving education and pointed out that our current education strategy centres around teaching children things computers do really well (basic maths, repetition, remembering things) rather than those AI will struggle with – creativity, critical thinking etc. This left me wondering what work humans are going to provide, and whether we really understand the skills requirement of a world with AI?\n\nIn thinking about this I recalled the quote from Wernher von Braun, the German rocket scientist that “The best computer is a man, and it’s the only one that can be mass-produced by unskilled labour.”  Since the onset of the industrial revolution mechanisation has replaced human skill and as Prof Murray Shanahan[2] said last night, already replaced many jobs. After all, only around 5% of us work on agriculture today. It is therefore not a question of whether, but the degree to which new AI technology will replace jobs – and the economic efficiency of that replacement.\n\nThere are well-rehearsed arguments about the loss of jobs and plenty of books written on the subject[3]. Some jobs are clearly at risk such as professional driving in the face of self-driving technology[4]. Other jobs are safer as they involve complex unusual actions – plumbing, for example, is messy, contingent and complex (and Prof Shanahan argued this might be the last to go).\n\nWhat is however lacking is a discussion of the new jobs that AI will create. Throughout history, we have underestimated the jobs created by digital technology. In 1943 IBM’s Thomas Watson predicted a worldwide-market of 5 computers, and in the 1980s people laughed at Bill Gates vision of a computer in every home.  Today we have spending forecasts for IT in the trillions[5]. With Bank of America anticipating that the “robots and AI solutions market will grow to US$153Bn by 2020” [6] it clear that disruptive innovation (Christensen, 1997) through these advanced algorithms will have a strong impact in creating new unimagined opportunity.\n\nSince the rise of the industrial revolution we have created new jobs to replace those lost as people stopped working on farms and in factories: our grandparents would hardly imagine so many baristas, chefs, landscape gardeners, software engineering, financiers and marketers within modern society. What is interesting then is how AI might enhance and expand existing jobs, and create new ones. For instance, an AI supported lawyer might handle more cases so reducing the lawyer’s fees while maintaining their wages. This reduction may well mean more people can access the law rather than reducing the work for lawyers[7]. Similarly, we might imagine interior decorators “virtually” visiting our homes and recommending tasteful designs using AI and online stores. While I, like many others, are not currently prepared to pay designers fees for my small London home, if a store offered the service for a low fee I might well jump at the chance so creating new jobs in this area.\n\nIn this way, AI can offer huge efficiency savings which we should not necessarily be scared about. This is not however to downplay the risks to society – particularly as the distribution of this value may be inequitable with low-paid/low-skilled employees most at risk. If, however, we can ensure that those unable to capitalise on this opportunity aren’t left behind then I am cautiously optimistic.  We should also be aware that AI will likely create low-paid, low-skilled jobs as well. Someone will need to hold the 3d camera in my house for the AI designer to work. Someone will need to deliver parcels to my house for Amazon. Someone is needed to service the computers or clean up the data needed by the AI algorithm. And someone will need to make us all great coffee.\n\nI am not trying to present a Utopian vision here – clearly there will be problems. But it is not the end of work either. After all, society has been very good at creating new work that involves sitting in front of computers shuffling files, writing text, and editing spreadsheets and PowerPoints – for people like me. Further, as Wernher von Braun’s quote reminds us – we humans are extremely good value in providing some extremely important intellegent activities: dealing with emotion and having empathy,  thinking creatively, interacting with other humans, understanding our human society and traditions. It will be a very long time, if even, before any AI can provide such intelligence. The problem is often that we underestimate the importance of these in modern work downplaying their significance in modern economic enterprise and thus overplaying the value technocratic automated AI might provide.\n\n(This blog is an opinion piece based on personal musings rather than report on research)\n\nCHRISTENSEN, C. M. 1997. The innovator’s dilemma: when new technologies cause great firms to fail, Harvard Business Press.\n\n\n[2] Prof Shanahan has a new book out which looks interesting:\n\n[3] E.g. The Rise of the Robots (Martin Ford)\n\n[4] This is particularly pertinent for industrial driving such as farming and mining where self-driving technology is arriving already\n\n\n\n[7] For a full analysis of this debate read  or listen to the podcast of their talk at the LSE\n\nImage (cc) Rolf obermaier – thanks!\n\nArtificial intelligence is hard to see – Medium\n\nA great article discussing the impact of AI on society and the risks involved in the context of the debate on Nick Ut’s Pulitzer-prize winning picture being censored by Facebook’s AI systems. \n\nWhy we urgently need to measure AI’s societal impacts\n\nClick Here: Artificial intelligence is hard to see – Medium\n\nWhat can Artificial Intelligence do for business?\n\nI am joining a panel tomorrow at the AI-Summit in London, focused on practical Artificial Intelligence (AI) for business applications. I am to be asked the question “What can Artificial Intelligence do for business?”, so by way of preparation I thought I should try to answer the question on my blog.\n\nPerhaps we can break the question down – first considering the corollary question of “what can’t AI do for business” even if its cognitive potential matches or exceeds that of a human, then discussing “what can AI do for businesses practically today”.\n\nWhat would happen if we did succeed in developing AI which has significant cognitive potential (as IBM’s Watson provides a foretaste of)?  Let’s undertake a thought experiment. Imagine that we have AI software (Fred) which is capable of matching or exceeding human level intelligence (cognitively defined), but obviously remains locked inside a prison of its computer body.  What would Fred miss that might limit his ability to help the business?\n\nFirstly much of business is about social relationships – those attending the AI-Summit have decided that something is available which is not as effective via reading the Internet – perhaps it is the herd mentality of seeing what others are doing, perhaps it is the subtle clues, perhaps the serendipitous conversations, or perhaps it is about building trust such that unwritten knowledge is shared. Fred would likely be absent from this – even if he were given a robotic persona it is unlikely it would fit in with the subtle social activity needed to navigate the drinks reception.\n\nSecond Fred is necessarily backward looking, gleaning his intelligence and predictive capacity from processing the vast informational traces of human existence available from the past (or present). Yet we humans, and business in general, is forward looking – we live by imagined futures as much as remembered pasts. How well Fred could handle that prediction when the world can change in an instant (remember the sad day of 9/11)? Perhaps quicker than us (processing the immediate tweets) but perhaps wrongly – not seeing the mood shifts, changes and immediate actions. Who knows?\n\nMy third point is derived from the famous hawthorn experiments which showed that humans’ behaviour changes when we are observed. Embedding Fred into an organisation will change the organisation’s social dynamic and so change the organisation. Perhaps people will stop talking where Fred can hear, or talk differently when they know he is watching.  Perhaps they will be most risk averse – worried Fred would question the rationality of their decisions. Perhaps they would be more scientific – seeking to mimic Fred – and lose their aesthetic intuitive ideas? Perhaps they will find it hard to challenge, debate and argue with Fred –debate that is necessary for businesses to arrive at decisions in the face of uncertainty? Or perhaps Fred will deny the wisdom of the crowd (Surowiecki, 2005) by over representing one perspective, when the crowd may better reflect human’s likely future response?\n\nOr perhaps, as Nicholas Carr suggests (Carr, 2014) they will prove so useful and intelligent that they dull our interest in the business, erode our attentiveness and deskill the CxOs in the organisation – just as it has been suggested flying on Autopilot can do for pilots.\n\nFinally, (and arguably most importantly as those who believe in AI and will likely dismiss the earlier pronouncements as simplistic as AI will overcome these by brute force of intelligence), Fred’s intelligence would be based on data gleaned from a human world and “raw data is an oxymoron, data are always already cooked and never entirely raw” (Gitelman andJackson 2013 following Bowker 2005 – cited in (Kitchin, 2014)). Fred’s data is partial and decisions were made as to what was, and wasn’t counted, recorded, and how it was recorded (Bowker & Star, 1999). Our data reflects our social world and Fred is likely to over-estimate the benign nature of this representation (or extreme representations) of the data. While IBM’s Watson can reflect human knowledge in games such as Jeopardy, its limited ability to question the provenance of data without real human experience may limit its ability to act humanly – and in a world which continues to be dominate by humans this may be a problem. I had the pleasure of attending a talk two weeks ago by Prof Ross Koppel who discusses this challenge in detail in relation to health-care payments data.  AI is founded upon an ontology of scientific rationality – by far the most dominant ontological position today. This idea argues that science, and statistical inference from data, presents the truth (a single unassailable truth at that). Such rationality denies human belief, superstition, irrationality – yet these continue to play a part in the way humans act and behave. Perhaps AI needs to explore further these philosophical assumptions as Winograd and Flores famously did around AI three decades ago (Winograd & Flores, 1986).\n\nFinally we should try, when evaluating any new technologies impact on business to be critical of “solutionism” which argues that business problems will be solved by one silver bullet. Instead we should evaluate each through a range of relevant filters – asking questions about their likely economic, social and political distortions and from this evaluate how they can truly add value to business.   In exploiting AI today, at its most basic, businesses should start by focusing on the low-hanging fruit.  AI doesn’t have to be that intelligent to provide huge benefits.  Consider how Robotic Process Automation  can help companies (e.g. O2) deal with its long tail of boring repetitive processes (Willcocks & Lacity, 2016). For example “swivel chair” functions where people extract data from one system (e.g. email) undertake simple processes using rules, then enter the output into a system of record such as ERP (Willcocks & Lacity, 2016). As such processes involve only a modicum of intelligence, and are repetitive and boring for humans, they offer cost opportunities (see Blue Prism as an example of this type of solution) – particularly as one estimate suggests such automation costs around $7500/PA(FTE) compared to $23k PA for an offshore salary (Willcocks and Lacity 2016 quoting\n\nObviously AI might move up the chain to deal with more significant business process issues – however at each stage we are reminded that CxOs will need leadership, and IT departments will need specific skills to ensure that the AI makes sensible decisions, and reflects business practices. Business Analysts will need to learn about AI such that they can act as sensible teachers – identifying risks that AI are unlikely to notice, and steering the AI to act sensibly.  Finally as the technology improves so organisational and business sociologists will be needed to wrestle with the challenges identified above.\n\n© Will Venters\n\nBowker, G., & Star, S. L. (1999). Sorting Things Out:Classification and Its Consequences. Cambridge,MA: MIT Press.\n\nCarr, N. (2014). The Glass Cage: Automation and Us: WW Norton & Company.\n\nKitchin, R. (2014). The data revolution: Big data, open data, data infrastructures and their consequences: Sage.\n\nSurowiecki, J. (2005). The wisdom of crowds: Anchor.\n\nWillcocks, L., & Lacity, M. C. (2016). Service Automation: Robots and the future of work. Warwickshire, UK: Steve Brookes Publishing.\n\nWinograd, T., & Flores, F. (1986). Understanding computers and cognition. Norwood,NJ: Ablex.\n\n(Image (cc) from Jorge Barba – thanks)", "pred_label": "__label__1", "pred_score_pos": 0.789697527885437} {"content": "| | SLO | ENG | Cookies and privacy\n\nBigger font | Smaller font\n\nSearch the digital library catalog Help\n\nQuery: search in\nsearch in\nsearch in\nsearch in\n* old and bologna study programme\n\n\n1 - 1 / 1\nFirst pagePrevious page1Next pageLast page\nUsing movies to teach professionalism to medical students\nZalika Klemenc-Ketiš, Janko Kersnik, 2011, original scientific article\n\nAbstract: Background: Professionalism topics are usually not covered as a separate lesson within formal curriculum, but in subtler and less officially recognizededucational activities, which makes them difficult to teach and assess. Interactive methods (e.g. movies) could be efficient teaching methods but are rarely studied. The aims of this study were: 1) to test the relevance and usefulness of movies in teaching professionalism to fourth year medical students and, 2) to assess the impact of this teaching method on students' attitudes towards some professionalism topics. Method: This was an education study with qualitative data analysis in a group of eleven fourth year medical students from the Medical School of University Maribor who attended an elective four month course on professionalism. There were 8 (66.7%) female students in the group. The mean age of the students was 21.9 +/- 0.9 years. The authors used students' written reports and oral presentations as the basisfor qualitative analysis using thematic codes. Results: Students recognised the following dimensions in the movie: communication, empathy, doctors' personal interests and palliative care. It also made them think abouttheir attitudes towards their own life, death and dying. Conclusion: The controlled environment of movies successfully enables students to explore their values, beliefs, and attitudes towards features of professionalism without feeling that their personal integrity had been threatened. Interactiveteaching methods could become an indispensible aid in teaching professionalism to new generations.\nKeywords: teaching methods, movies, medical students\nPublished: 28.06.2017; Views: 483; Downloads: 191\n.pdf Full text (246,35 KB)\nThis document has many files! More...\n\nSearch done in 0.04 sec.\nBack to top", "pred_label": "__label__1", "pred_score_pos": 0.6865428686141968} {"content": "Effective Italian Hair Products for Relaxed Hair\n\nLast week at a family gathering after my niece’s christening, there was a heated debate about what kind of hair products are suitable for Afro Caribbean relaxed hair. My sister was of the opinion that Black women should stick to the hair products designed for Black hair often stocked at the Afro beauty stores in South London.\n\nI on the other hand feel that there is no need to stick to these products that were so called designed for Black hair. The reason is there is no typical type of Black\nhair as such. Black women have a range of different hair textures, porosities, thicknesses, curl patterns etc. The main difference between Afro hair and\nEuropean hair is the curl pattern. The tighter the curls, the harder it is for sebum or oil to travel from the roots to the tips of the hair. But Europeans also have curly hair, some with tighter curl patterns than others. Are they also required to use Afro hair products because they have curly hair?\n\nThe same applies to relaxed hair, which is hair that has been chemically straightened using a relaxer. Relaxed hair, regardless of it being straight is still a form of Afro hair, albeit in a weaker and straighter state than natural hair. Are they meant to stick to the same products designed for natural Afro hair?I don’t see any point in over complicating this matter. In my opinion Black women should NOT stick to products they think are designed for Black hair. Instead they should educate themselves on their hair’s particular needs, regardless of what state it is in, be in relaxed or natural. If your hair is dry and natural then research ways to keep your hair healthy and moisturized. If your hair is relaxed, damaged and weak, then look for ways to strengthen it by using the right products designed for that purpose.\n\nHaving frequented Dominican hair salons while I lived in New York, I used a very effective range of Italian hair products to stop my hair from shedding excessively after I had my son. My hair is relaxed and can be very dry, so I would use a moisturizing hair mask on my ends, and a garlic mask on my scalp to directly address the hair shedding and it was very effective. According to my sister’s reasoning, because the hair products are made in Italy, therefore they are designed to be used by Caucasian women and are for Caucasian hair. That is a silly argument to make, because internally our hair follicles produce hair in the same manner. Curly hair is just more fragile and has a higher tendency to break than straight hair that is why Caucasian women with straight hair tend to have longer hair.\n\nBy using the Italian hair products on my relaxed hair, I’m personally satisfied that my sister’s theory is just ignorant nonsense. The most effective hair care products for my relaxed hair have been from an Italian range. In fact Alter Ego hair care products especially the Garlic mask have been widely used by Dominican women in Dominican salons for many years. The Alter Ego hair drops are often applied to the scalp when they are doing roller sets and they are said to make the hair grow longer and thicker. So before jumping to any conclusions based on ignorant opinions of other people, do some research and see if you can find reviews or opinions of other black women who have used hair products that may not specifically been designed for use on Afro hair.", "pred_label": "__label__1", "pred_score_pos": 0.7583003044128418} {"content": "# HOW TO EDIT THIS FILE: # The \"handy ruler\" below makes it easier to edit a package description. # Line up the first '|' above the ':' following the base package name, and # the '|' on the right side marks the last column you can put a character in. # You must make exactly 11 lines for the formatting to be correct. It's also # customary to leave one space after the ':' except on otherwise blank lines. |-----handy-ruler------------------------------------------------------| fslint: fslint (find and clean various forms of lint on a filesystem.) fslint: fslint: FSlint is a utility to find and clean various forms of lint on a fslint: filesystem. I.E. unwanted or problematic cruft in your files or fslint: file names. For example, one form of lint it finds is duplicate fslint: files. It has both GUI and command line modes. fslint: fslint: fslint: fslint: http://www.pixelbeat.org/fslint/ fslint:", "pred_label": "__label__1", "pred_score_pos": 0.5830004811286926} {"content": "The bakery Bekdash Icecream at Jordan, Irbid\n\nJordan, Irbid, GPS: 32.5374,35.8753\n\nYou have made the following selection in the MAPS.ME map and location directory: the bakery Bekdash Icecream at the address: Jordan, Irbid out of 131171 places. You can download MAPS.ME for your Android or iOS mobile device and get directions to the bakery Bekdash Icecream or to the places that are closest to you:\n\n\nObjects nearby\n\nJordan, Amman\n\nJordan, Mafraq, Al Mafraq\n\nJordan, Irbid, Kafr al Ma, village\n\nIsrael, North District, Givat Yoav, village\n\nIsrael, North District, Kfar Kama, village\n\nJordan, Mafraq, Al Mafraq", "pred_label": "__label__1", "pred_score_pos": 0.7070205807685852} {"content": "Guy Julius Caesar\n\nGaius Julius Caesar (Gaius Iulius Caesar) - commander, politician, writer, dictator, high priest of Ancient Rome. He came from the ancient Roman clan of the ruling class and consistently sought all government posts, led the line of political opposition to the senatorial aristocracy. He was merciful, but sent to execution a number of his main opponents.\n\n\nRod Yuliev came from a noble family, which, according to legend, came from the goddess Venus.\n\nMother Julius Caesar - Aurelius Kotta (Avrelia Kotta) was from a noble and wealthy family Aurelius. My paternal grandmother came from the ancient Roman family Marciev (Marcii). Ancus Marcius was the fourth king of ancient Rome from 640 to 616. BC e.\n\nChildhood and youth\n\nAccurate data on the time of the emperor’s birth did not reach us. Today it is generally accepted that he was born in 100 BC. e.However, the German historian Theodor Mommsen (Theodor Mommsen) believes that it was 102 BC. e., and the French historian Jerome Carcopino (Jerome Carcopino) points to 101 BC. e. Birthday is considered both July 12 and 13.\n\nGuy Julius childhood passed in the poor ancient Roman region of Subura (Subura). Parents gave their son a good education, he studied Greek, poetry and oratory, learned to swim, rode a horse and developed physically. In 85 BC e. the family lost the breadwinner and, after initiation, Caesar became the head of the family, since none of the older male relatives survived.\n\n • We advise you to read about the coolest Roman emperors\n\nStart a career politician\n\nIn Asia\n\nIn the 80s BC e. warlord Lucius Cornelius Cinna (Lucius Cornelius Cinna) proposed the person of Guy Julius in place of flaming (flamines), priest of the god Jupiter. But for this he needed to marry according to the solemn ancient rite of confarration (confarreatio) and Lucius Cornelius chose Caesar to marry his daughter Cornelia Cinilla (Cornelia Cinilla). In 76 BC. e. the couple had a daughter, Julia (Ivlia).\n\nToday, historians are no longer confident in holding the rite of inauguration of Julius. On the one hand, this would prevent him from engaging in politics, but, on the other hand, appointment was a good way to strengthen the position of Caesars.\n\nAfter the betrothal of Guy Julius and Cornelia, a riot occurred in the troops and the military attacked Cinnu, he was killed. The dictatorship of Lucius Cornelius Sulla was established, after which Caesar, as a relative of the opponent of the new ruler, was outlawed. He disobeyed Sulla, refused to divorce his wife and left Rome. The dictator spent a long time looking for a disobedient person, but, as time passed, he had mercy on him at the request of his relatives.\nCaesar soon joined Marcus Minucius Thermus, the governor of the Roman province of Asia Minor, Asia.\n\nTen years ago, his father was in that position. Julius became the equites of Mark Minucius, who fought on horseback as a patrician. The first task that Term gave his conturnal was to negotiate with the Bithynia king, Nycomed IV. As a result of successful negotiations, the ruler transfers the Thermae to the flotilla to take the city of Mytlene on the island of Lesvos, which did not accept the results of the First Mithridates War (89-85 BC) and resisted the Roman people. The city was successfully captured.\n\nFor the operation on Lesbos, Guy Julius received a civilian crown - a military award, and Mark Minucius resigned. In 78 BC e. in Italy, Lucius Sulla dies and Caesar decides to return to his homeland.\n\nRoman events\n\nIn 78 B.C. e. military leader Mark Lepidus (Marcus Lepidus) organized a riot of the Italians (Italici) against the laws of Lucius. Caesar then did not accept the invitation to become a member. In the years 77-76. BC e Guy Julius tried to condemn the supporters of Sulla: politician Cornelius Dolabella (Cornelius Dolabella) and commander Anthony Hybrid (Antonius Hybrida). But he did not succeed, despite the brilliant accusatory speeches.\n\nAfter this, Julius decided to visit the island of Rhodes (Rhodus) and the school of rhetoric of Apollonius Molon, but on the way there he was captured by pirates, from where he was subsequently rescued by Asian ambassadors for fifty talents. Wanting revenge, the former captive equipped several ships and captured the pirates himself, having executed them with a crucifix. In 73 g. BC. e. Caesar was included in the collegial governing body of the pontiffs, where his uncle Gaius Aurelius Cotta had previously ruled.\n\nIn 69 BC. e. died during childbirth of the second child of Caesar's spouse - Cornelia, the baby also did not survive. At the same time, Caesar’s aunt, Julia Maria, also perishes. Soon Guy Julius becomes the Roman ordinary magistrate (magistratus), which gives him the opportunity to enter the Senate. He was sent to Far Spain (Hispania Ulterior), where he took charge of financial matters and carried out the assignments of the Prophet Antistius Vetus.\n\nIn 67 BC e. Caesar married Pompeia Sulla, the granddaughter of Sulla. In 66 BC e. Guy Julius becomes the caretaker of the most important public road in Rome - the Appian Way (Via Appia) and finances its repair.\n\nCollege of Magistrates and Elections\n\nIn 66 BC e. Guy Julius is elected to the magistrates of Rome. His responsibilities include expanding construction in the city, supporting trade and social events. In 65 B.C. e. he held such memorable Roman games with the participation of gladiators that he managed to amaze his sophisticated townspeople.\n\nIn 64 B.C. e. Guy Julius was the head of the Quaestiones perpetuae Judicial Commission for Criminal Proceedings, which allowed him to call to justice and punish many of Sulla's minions.\n\nIn 63 B.C. e. Quintus Metellus Pius died, freeing up the lifetime of the Great Pontiff (Pontifex Maximus). Caesar decides to run for her own candidacy. The opponents of Guy Julius are the consul Quintus Catulus Capitolinus and the commander Publius Vatia Isauricus. After numerous bribes, Caesar wins the elections by a large margin and moves to live on the Sacred Road (via Sacra) in the official housing of the pontiff.\n\nInvolvement in the conspiracy\n\nIn 65 and 63 years. BC e. one of the political conspirators, Lucius Sergius Catilina, made two attempts to carry out a coup d'etat. Marcus Tullius Cicero, an opponent of Caesar, tried to accuse him of conspiracy, but could not provide the necessary evidence and failed. Marcus Porcius Cato, the informal leader of the Roman Senate, also testified against Caesar and made Guy Julius leave the Senate in pursuit of threats.\n\nFirst triumvirate\n\n\nIn 62 B.C. e., using the powers of the praetor, Caesar wanted to transfer the reconstruction of the plan of Jupiter of the Capitoline (Iuppiter Optimus Maximus Capitolinus) from Quintus Catulus Capitolinus to Gnee Pompeius Magnus, but the Senate did not support this bill.\n\nAfter the proposal supported by Caesar, the tribune of Quintus Caecilius Metellus Nepos to send Pompey with troops to Rome to pacify Catilina, the Senate dismissed both Quintus Tsitseliya and Gaius Julius from their posts, but the second was quickly restored.\nIn the fall, a trial was held against the conspirators of Catilina. One of its members, Lucius Iulius Vettius, who opposed Caesar, was arrested, as was Judge Novius Nigerus, who accepted the report.\n\nIn 62 B.C. e. Caesar's wife Pompey held a festival in their house dedicated to the Good Goddess (Bona Dea), which could be attended only by women. But one of the politicians, Publius Clodius Pulcher, got on the holiday, he dressed as a woman and wanted to meet with Pompey. Senators found out what had happened, considered it a shame and demanded a trial. Guy Julius did not wait for the outcome of the process and divorced Pompey, so as not to make his personal life publicly visible. Moreover, the spouses did not have heirs.\n\nIn Far Spain\n\nIn 61 BC e. Guy Julius' trip to Far Spain as a propraetor was postponed for a long time due to the presence of a large number of debts. Commander Mark Licinius Crassus (Marcus Licinius Crassus) vouched for Guy Julius and paid part of his loans.\n\nWhen the new proprietor arrived at his destination, he was faced with dissatisfaction with the inhabitants of the Roman authorities. Caesar assembled a detachment of militias and began a fight with the \"bandits.\" A commander with a twelve-thousand-strong army approached the mountain range of Serra da Estrela and ordered the locals to leave from there. They refused to move and Guy Julius attacked them. Highlanders across the Atlantic Ocean went to the Berlenga Islands, killing all of their pursuers.\n\nBut Caesar, after a series of thoughtful operations and strategic maneuvers, still subjugates the popular resistance, after which he was awarded the honorary military title of the emperor (imperator), the winner.\n\nGuy Julius launched an active activity in the daily affairs of the subordinate lands. He presided over court hearings, introduced reforms to taxation, and eradicated the practice of sacrifice.\n\nDuring the period of activity in Spain, Caesar was able to pay off most of his debts thanks to the rich gifts and bribes of the residents of the wealthy south. At the beginning of 60 BC e. Guy Julius prematurely withdraws his authority and returns to Rome.\n\n\nRumors about the prophet's victories soon reached the Senate and its members felt that Caesar's return should be accompanied by triumphus (triumphus) - a solemn entry into the capital. But then, before the triumphal event was completed, Guy Julius was not allowed, according to the law, to enter the city. And since he also planned to take part in the upcoming elections for the post of consul, where his personal presence was required for registration, the commander refuses to triumph and begins the struggle for a new post.\n\nBy bribing voters, Caesar nevertheless becomes a consul, along with him, the warlord Mark Kalpurnius Bibulus wins the election.\n\nIn order to strengthen their own political position and existing power, Caesar enters into secret conspiracy with Pompey and Crassus, uniting two influential politicians with opposing views. As a result of the conspiracy, a powerful union of military leaders and politicians appears, called the First Triumvirate (triumviratus - \"union of three husbands\").\n\n\nIn the early days of the consulate, Caesar began to submit new bills to the Senate. The first was the agrarian law, according to which the poor could receive land from the state, which it bought from large landowners. First of all, land was given to large families. To prevent speculation, the new landowners did not have the right to resell the plots for the next twenty years. The second bill related to the taxation of farmers in the province of Asia, their contributions were reduced by one third. The third law concerned bribes and extortion; it was adopted unanimously, unlike the first two.\n\nTo strengthen ties with Pompey, Guy Julius gave his daughter Julia for him. Caesar himself for the third time decides to marry, this time his wife becomes Calpurnia (Calpurnia), daughter of Lucius Calpurnia Pisona Caesonina (Lucius Calpurnius Piso Caesoninus).\n\n\nGall war\n\nWhen Gaius Julius, after the due date, resigned as consul, he continued to conquer the land for Rome. During the Gallic War (Bellum Gallicum) Caesar, displaying extraordinary diplomacy and strategy, skillfully took advantage of the differences of the Gallic leaders. In 55 BC e. he defeated the Germans who crossed the Rhine (Rhein), after which in ten days he built a bridge 400 meters long and he attacked them, the first in the history of Rome. The first of the Roman commanders invaded Great Britain, where he conducted several brilliant military operations, after which he was forced to leave the island.\n\nIn 56 BC. e. in Lucca, a regular meeting of the triumphs took place, at which it was decided to continue and develop political support for each other.\n\nBy 50 BC e. Guy Julius suppressed all rebellions, completely subjugating Rome to its former territories.\n\nCivil War\n\nIn 53 BC e. Crassus dies and the triumvirate ceases to exist. Between Pompey and Julius began a struggle. Pompey became the head of the republican government, and the Senate did not extend the powers of Guy Julius in Gaul. Then Caesar decides to raise a rebellion. Gathering soldiers who were very popular, he crosses the border river Rubicone and, not seeing resistance, captures some cities. The terrified Pompey and his close senators flee the capital. Caesar invites the remaining members of the Senate to jointly rule the country.\n\nIn Rome, Caesar is appointed dictator. Pompey’s attempts to prevent Guy Julius crashed, the fugitive was killed in Egypt, but Caesar did not accept the enemy’s head as a gift, he mourned his death. While in Egypt, Caesar helps Queen Cleopatra (Cleopatra), conquers Alexandria (AIskandariya), in North Africa joins Rome Numidia (Numidia).\n\n\nThe return of Guy Julius to the capital is accompanied by a magnificent triumph. He does not skimp on rewarding his soldiers and commanders, arranges feasts for the citizens of the city, organizes games and public events. Over the next ten years he was proclaimed \"emperor\" and \"father of the fatherland.\" He publishes many laws, including laws on citizenship, on the structure of the state, against luxury, on unemployment, on the issue of free bread, changes the system of calculating time and others.\n\nCaesar was worshiped and rendered great honors, erecting his statues and painting portraits. He had the best security, he was personally involved in the appointment of people to government posts and their removal.\n\nAmong the Republicans, dissatisfaction with Caesar's policies and behavior grew. He was charged with relations with Queen Cleopatra, who moved to the capital. Then Marcus Junius Brutus and Gaius Cassius Longinus entered into a conspiracy to kill the dictator.\nMarch 15, 44 BC e. at a meeting of the Senate, Brutus thrust a dagger at Caesar and he died. The only heir to Julius Caesar was his grand-nephew, Octavian Augustus, adopted by him. Read a series of articles about the assassination of Caesar and the rise of Octavin.\n\nWatch the video: Who Is Julius Caesar? (December 2019).\n\n\nPopular Posts\n\nCategory Story, Next Article\n\nHow to get to the island of Favignana\n\nHow to get to the island of Favignana\n\nYou can get to the island of Favignana by speed boat from Trapani quite simply. To do this, you need to arrive at the port and buy a ticket at the ticket office approximately 30-40 minutes before departure. In the high season of July-August, we recommend buying tickets in advance by arriving at the port or on the Internet on the airline’s official website www.\nRead More\nTuna Museum on the island of Favignana\n\nTuna Museum on the island of Favignana\n\nBeautiful Sicily reveals its secrets. On the largest island of the Aegadian archipelago of Favignan opened the Museum of Tuna. Now tourists will be able to find out what many generations of local residents have dedicated themselves to and how the legendary Mattan took place. The sea at Favignana is always crystal clear. No wonder the red bay (Cala Rossa), located on the island, is among the ten best beaches in Italy.\nRead More\nFavignana - an island you want to return to\n\nFavignana - an island you want to return to\n\nWe spent only one day on the island of Favignana in early June 2014, but already in the first hours of our trip it became clear that we would have to return here more than once. We went there as part of a trip to the south of Italy on the recommendation of our Sicilian friend Mario. It is on Favignan that the famous Cala Rosa Bay is located, one of the ten best beaches in Italy, and several other no less beautiful beaches.\nRead More\nHotels in Favignana: tips for choosing\n\nHotels in Favignana: tips for choosing\n\nThis mini-study is dedicated to my friends and all readers of “Italy for Me” inspired by my trips to Sicily with Yana. The island of Favignana is only 30 minutes sailing from the port of Trapani and in my opinion is an ideal option for a quiet and relaxing holiday on the sea in Italy.\nRead More", "pred_label": "__label__1", "pred_score_pos": 0.5465954542160034} {"content": "Hubble explores the mysteries of UGC 8201\n\nHubble explores the mysteries of UGC 8201\nCredit: ESA/NASA\n\nThe galaxy UGC 8201, captured here by the NASA/ESA Hubble Space Telescope, is a dwarf irregular galaxy, so called because of its small size and chaotic structure. It lies just under 15 million light-years away from us in the constellation of Draco (the Dragon). As with most dwarf galaxies it is a member of a larger group of galaxies. In this case UCG 8201 is part of the M81 galaxy group; this group is one of the closest neighbors to the Local Group of galaxies, which contains our galaxy, the Milky Way.\n\nUGC 8201 is at an important phase in its evolution. It has recently finished a long period of star formation, which had significant impact on the whole galaxy. This episode lasted for several hundred million years and produced a high number of newborn bright stars. These stars can be seen in this image as the dominating light source within the galaxy. This process also changed the distribution and amount of dust and gas in between the stars in the galaxy.\n\nSuch large star formation events need extensive sources of energy to trigger them. However, compared to larger galaxies, dwarf galaxies lack such sources and they do not appear to have enough gas to produce as many new stars as they do. This raises an important unanswered question in : How do relatively isolated, low-mass systems such as dwarf galaxies sustain for extended periods of time?\n\nDue to its relative proximity to Earth UGC 8201 is an excellent object for research and provides an opportunity to improve our understanding of how evolve and grow.\n\nExplore further\n\nImage: Hubble's view of the polar ring of Arp 230\n\nProvided by NASA\nCitation: Hubble explores the mysteries of UGC 8201 (2015, March 19) retrieved 14 December 2019 from https://phys.org/news/2015-03-hubble-explores-mysteries-ugc.html\n\nFeedback to editors\n\nUser comments", "pred_label": "__label__1", "pred_score_pos": 0.9865861535072327} {"content": "Essay about bureaucracy\n\nTop 7 Essays Article shared by: Read this essay to learn about Bureaucracy.\n\nEssay about bureaucracy\n\nThis means that the formatting here may have errors. This text version has had its Essay about bureaucracy removed so pay attention to its contents alone rather than its presentation. The version you download will have its original formatting intact and so will be much prettier to look at.\n\nBUREAUCRACY ESSAY POINTS Introduction Given the subject matter of this essay revolves around bureaucracy, and given that bureaucracy is concerned with rules and order, it seems fitting to first begin with an official definition of the term; \"A system of government in which most of the important decisions are made by state officials rather than by elected representatives; a state or organization governed or managed according to such a system.\n\nI shall look at the modern cases of bureaucracy and weigh up whether there is a place for it in the modern world and if not whether post bureaucracy is more fitting. Finally I shall conclude by attempting to come down on one side of the argument as to whether in fact bureaucracy is bad.\n\nBureaucracy as an ideal type and form of power based on legitimate authority Max Weber was a German social scientist who was concerned with the question of what held societies together, he came to the conclusion that it was down to authority which allows those who have the right of legitimacy to give orders Wilson, Weber questioned what the power of this authority was based on, because in most societies it is not based on force, fear or coercion.\n\nThis authority previously came about in two main ways; authority based on charisma the personal authority of a particular individual or authority based on tradition the established authority of institutions Grey, However, Weber put forward the idea that these previous types of authority were increasingly being overshadowed by rational-legal authority in modern societies systems of rules devised for rational reasons.\n\nWeber was writing at a time where organisations were growing at a rate not seen before.\n\nHe was commentating o the transformation that he was directly seeing. This rationalisation can be defined as a process whereby the means chose to pursue ends can be determined by logical and rational calculation Wilson, When applied to organisations, this rational-legal authority means bureaucracy.\n\nWhen Weber was putting forward his ideas regarding bureaucracy he discussed it as \"an ideal type\" however a common misconception is that by this Weber meant bureaucracy was a desirable ideal when in fact he despaired of how dominant this organisational structure was becoming.\n\nThe \"ideal type\" is simply a subjective element in social theory and research which formed from characteristics and elements of the given phenomena, but it is not meant to correspond to all of the characteristics of any one particular case. According to Wilson \"the ideal type of bureaucracy is governed by a formal set of rules and procedures that ensures that operations and activities are carried out in a predictable, uniform and impersonal manner\".\n\nThis comes from the four foundational aspects that according to Weber bureaucracy consist of; functional specialisation the formal division of labourhierarchy of authority the structure that gives those in a superior position authority, simply because they hold that positionsystem of rules everything is based upon following a formal set of written rules about practices and procedures and impersonality rules are followed without regard for emotions Grey, According to Weber it was these four concepts that meant bureaucracy was the most technically efficient and rational form of organisations, it was adopted because it was simply better than any other system.\n\nIts decisive feature is that it eliminates an orientation to values because they are non-technical. Rationality is instrumental formal when problems are solved by the application of technical criteria. In opposition, substantive value rationality is a type of decision making which is subject to values and an appeal to ethical norms - this is not something that bureaucracy is concerned with especially given substantive rationality does not take into account the nature of outcomes.\n\nWeber also concluded that bureaucracy was substantively irrational following his work and reading on the \"overall societal effects of its rise\" Grey, Essays - largest database of quality sample essays and research papers on Max Weber Bureaucracy.\n\nAccess denied | used Cloudflare to restrict access\n\nBureaucracy essay Words | 11 Pages Introduction A bureaucracy is a large organization that is designed to achieve a common goal through a hierarchical organization. Essay on the Weber’s Theory of Bureaucracy – The term “bureaucracy” finds its origin from the French word “bureau” which means desk, and a government which is run from table is called a bureaucratic government.\n\nEssay about bureaucracy\n\nThe word implies a particular system of administration. Historically, it has been associated with the rule of government and governmental [ ]. Bureaucracy as an organization is expected to play a pivotal role, in process of development.\n\nThe concept of Development Administration had originated in U. S. A. and as such bureaucratic systems Brief Essay on Bureaucracy and Development. Free Essay: A bureaucracy is defined as a form of organisation that centres on precision, speed, reliability, and efficiency achieved through the creation of.\n\nADVERTISEMENTS: Read this essay to learn about Bureaucracy. After reading this essay you will learn about: 1. Definition of Bureaucracy 2. Meaning of Bureaucracy 3.\n\nUpload and Share Your Article:\n\nCharacteristics 4. Types 5. Safeguards 6. Defects 7. Max Weber’s Theory. Contents: Essay on the Definition of Bureaucracy Essay on the Meaning of Bureaucracy Essay on the Characteristics of Bureaucracy [ ].\n\nEssay on Bureaucracy: Top 7 Essays", "pred_label": "__label__1", "pred_score_pos": 0.6381195783615112} {"content": "Popularity for Purchase\n\n\n\n\n\nMore than Baptism\n\nFew things distinguish American Christianity as much as its divisions. These aren’t precise, however, and often the borders are fuzzy and held more by cultural history than by theological outlook. One of the denominations—indeed, the umbrella for the single largest Protestant denomination in America—often faces the question of its identity. Who are the Baptists? Many Protestant groups can trace their histories to defining moments; consider Martin Luther and his hammer, according to the Lutheran origin myth. Baptists are a little tricker to pin down. Dissenters, yes, convinced that adult baptism should accompany conversation, yes, but beyond that widely divergent. Thomas S. Kidd and Barry Hankins have provided a service by writing Baptists in America: A History. Going back before America, they trace the origins of the sect and quickly bring it into the context in which it would thrive.\n\nPersecuted early in American life, Baptists grew in numbers and recognition during the period commonly known as the Great Awakenings. Suited to frontier individualism, non-doctrinal, and advocating for freedom of conscience, the Baptists gained large sums of converts in this era. With their congregational polity, Baptist cultural influence really only took off when mass media gave its more aggressive preachers a venue not limited by church walls. As Kidd and Hankins point out, however, the denomination proved friable. Splitting apart over various issues, the number of Baptist denominations grew. Their political influence would also grow so that they would become a force with which to be reckoned even today. Few, however, really understand who the Baptists are.\n\nThe Southern Baptist Convention is the largest single Protestant denomination in the United States. It defines itself by a radical conservatism that masquerades as “orthodoxy.” Heavily biblical, many in the tradition have a strong preference for inerrancy. Social causes that appear outdated to most modern people are do-or-die issues for this sect within a sect. Baptists in America does a good job showing how contradictory Baptists can be. They were, after all, dissenters from the beginning. Their championing of religious freedom often doesn’t apply outside their own borders. The more political of the denomination know very well how to game a democratic system. Perhaps the lesson they’ve learned most acutely is that being unseen carries with it great advantages. They play the sport of legislative chess very well. In a culture that loudly and repeatedly claims that religion no longer matters, those with conviction have a natural hiding place. From there pieces are easily moved to positions of power.\n\nHoliday Season\n\nIt was just after dark and the red and blue lights were shredding the night in Wallkill, New York. We’d driven past this mall just over an hour ago to take our daughter home after a too brief Thanksgiving break. Now there were police cars lined up along the length of the Orange Country Galleria Mall, and my wife said, “I hope it’s not a shooting.” Life in America’s that way. About two hours later we were home and yes, it had been a shooting incident. For reasons nobody knows, a man discharged a handgun into the floor at the crowded shopping center, injuring two. Police had not located the shooter, and no motive was known. The mall was evacuated and holiday shoppers feared for their lives.\n\nJust a few months ago I was in Penn Station, New York when a similar panic ensued. Rail police had used a taser gun on a passenger who’d gotten out of hand. As we were entering the station to catch our train, scores of people were running out in a panic. It had sounded like a gunshot. Clothes and personal effects littered the floor of the station once we got inside. This is the world in which we live. A world enamored of weapons. A world where we hate and distrust the stranger. A world where our government receives support from gun lobbies and refuses to put controls on the sale and ownership of firearms. A world where a peaceful Sunday night on the busiest shopping weekend of the year ends in panic and tears.\n\nWallkill, New York, is not exactly a metropolitan area. Upstate, as we’ve been learning for the last several years, is pretty big. Small population centers dot an impressive landscape of Catskills, Finger Lakes, and beautifully wooded hills. The people are generally friendly, less brusk than they tend to be in New York City. It seems that where two or three are gathered together there’s a handgun in their midst, however. Trusting ourselves to be good people, we want to arm ourselves to shoot the “bad guy.” Meanwhile Congress still tries to pass legislation to reduce health care since, I guess, too many people are getting shot. It can be a real drain on the economy if the wealthy have to chip in. It’s upstate New York. We have about two hours to go before we can rest at home. Galleria Mall is in lockdown. The rest of the nation is too.\n\nInventing Breaks\n\nBreaks are good for many things. Time with family and friends. Hours of non-bus time for reading. Watching movies. So it was that we went to see The Man Who Invented Christmas. It really is a bit early for my taste, to think about Christmas, but the movie was quite welcome. Being a writer—I wouldn’t dare to call myself an author—one of my favorite things to do is talk about writing. Watching a movie about it, I learned, works well also. The conceit of the characters following Dickens around, and refusing to do what he wants them to should be familiar to anyone who’s tried their hand at fiction. My experience of writing is often that of being a receiver of signals. It is a transcendent exercise.\n\nNot only that, but in this era of government hatred of all things creative and intellectual, it is wonderful to see a film about writing and books. The reminder about the importance of literacy and thought is one we constantly have to push. If we let it slip, as we’ve discovered, it may well take considerable time to recover. Getting lost in my fiction is one of my favorite avocations. Solutions to intractable problems come at most improbable times. Although publishers tend to disagree with me, I find the stories compelling. In the end, I suppose, that’s what really matters.\n\nOn an unrelated note, this is the second movie I’ve seen recently that attributes non-human actors their real names in the cast listing. What a welcome break from the blatant speciesism that pervades life! Animals have personalities and identities. Humans have often considered the privilege of being named to be theirs alone. True, animals can’t read and wouldn’t comprehend a human art form such as cinema. But when they communicate with each other, they may well have names for us. The beauty of a story such as A Christmas Carol is that it reminds of the importance of generosity. We should be generous to those who take advantage of our kindness. Our time. Our energy. We should also be generous to those who aren’t human but are nevertheless important parts of our lives. The movie may have come too early for my liking, but the holiday spirit should never be out of season. If we’ve made a world that only appreciates kindness because much of the rest of the year is misery, it means we’ve gone too far. Films can be learning experiences too, no matter the time of year.\n\nDevolving Apes\n\nIt would be difficult to overestimate the effect the movie Planet of the Apes had on me as a child. Raised a biblical literalist, evolution was, naturally enough, anathema to me. And yet here was a movie based on the idea that evolution had taken a different course. It was a transgressive film, but the screenplay had been written by Rod Serling, so well known for his trusted work on The Twilight Zone. I was utterly fascinated by it. Until the most recent iteration, I’d seen every sequel, spinoff, and reboot ever made. So important was this story line that as a child I found a copy of the book, in English, of course. Pierre Boulle told the story somewhat differently. Spying the book on my shelf after some four decades of my own evolution, I decided to read it again.\n\nWe all evolve. I noticed the improbabilities more this time through. The fact that, unlike the movie, humans wore no clothes at all must’ve scandalized my young eyes. I would’ve agreed, however, with Ulysse Mérou’s sentiments that humans were created in the image of God, not apes. In fact, there is an undercurrent of a somewhat conservative theological outlook here. Humans may experiment on animals, but when it’s reversed, it’s evil. In many ways, the cinematic version improves the story, but Boulle’s telling grows in intensity as the novel unfolds. Mérou develops a moral sense that includes the apes as well as human beings. The story, of course, is largely about prejudice and its evils. In that respect, it’s timeless.\n\nAs a child I realized that we lose something if we accept the fact of evolution. We lose that special feeling of having been intentionally created by a deity that made us God-shaped. Ironically, I also came to realize that those who rejected evolution often treated their fellow humans like animals. They held onto prejudices against other “races.” They castigated the poor for being lazy. They wish to remove healthcare from those made in the image of God. The contradictions and cruelties simply don’t comport with the Good Book they adore and ignore. Evolution, with the realities of nature impinging on our security, is far less dangerous than what biblical literalism has evolved to be. I can’t say why this book and its cinematic renditions became so deeply embedded in my young mind. But having read the book again, it’s pretty clear that the ideas have remained there, even as they have modified, with descent, over time.\n\nAstronomers and Pirates\n\nIn an effort not to travel, the internet offers a great resource while it’s still free. If you don’t want to wander from home, it brings movies you might’ve missed right to your domicile. This year has been so busy that we’d missed completely Pirates of the Caribbean: Dead Men Tell No Tales. I know, as the Pirate movies spin on and on they become more special effects extravaganzas with insipid, if complex, plots. Still, we’ve been watching from the beginning, so last night we decided to see it through. The movies are fun, if less well written than they were at the beginning (and the movie began without a script). There are moments worth attention, however.\n\nThe story follows Carina Smyth as she attempts to discover her father through following his diary. This, of course, brings her path across that of Captain Jack Sparrow. Smyth is an astronomer and horologist. Because she’s female and this is the eighteenth century, she’s labeled a witch. Both the proximate and ultimate cause of the accusation is her gender. Although she proves to be the real hero of the film, the men can’t help thinking she’s a witch although she’s using science to find answers. In fact, if a male astronomer did the same things she did, there’d be no story here. This is a post-Galileo world. It’s also post-Salem. We don’t watch these films for history, of course, but it is true that although the witchcraft trials ended at the turn of that century, the accusations continued for some time after. The woman of science is a threat to the male establishment. She alone, however, discerns the truth.\n\nSwashbuckler cinema was a male invention. Still, even in the twenty-first century too much of it comes at the expense of women. Jack Sparrow’s famous compass, for example, is passed on to him aboard a ship called the “Wicked Wench.” Surely this is meant to be funny, but at whose expense? The other women in the movie hardly come off better. Shansa actually is a witch, working for the establishment. Beatrice Kelly, in Jack Sparrow’s noose wedding, is portrayed as an undesirable bride, purely for laughs. Disney is famous for its princesses, but also for its wicked women. Even the strong female characters such as Mulan, Moana, and Anna find themselves being helped to success by male characters. Obviously the genders do interact in real life, and as recent history has shown us, men will demonize women if it helps them get ahead. You might think a movie of anti-heroes, however, would show the most intelligent character receiving a bit more respect. Especially since she’s a woman in a pirate’s world.\n\n\nThis particular doctrine struck me as evil. It violated every experience and thought I’d ever had, even raised as an unquestioning Christian as I was. Then, at Grove City College I was faced with it for the first time—predestination. If free will is an illusion, what crueler God can be conceived? I couldn’t avoid such thoughts upon re-reading Anthony Burgess’ A Clockwork Orange. A non-conforming non-conformist at the college assigned it in a science fiction class, so it has been decades since I’d read it. Now I found it perhaps more profound than before. Much has happened since my initial reading of the book, o my brothers. (And sisters.)\n\nThe framework of the story is well known. Alex and his friends are teenage punks who love ultra-violence. Alex is betrayed and imprisoned. Considered incorrigible, he’s reprogrammed to the point that he can’t even defend himself in a society that’s grown even worse during his time in jail. In the hospital after a suicide attempt, he awakes to find his old self restored, whether this is a good thing or not. The main point that’s behind this, it seems, is that without free will, repentance means nothing. In fact, in my edition of the book, an afterword by Stanley Edgar Hyman makes the point that some interpret A Clockwork Orange as a fictional defense of Christianity. Certainly the comparisons are there, from Judas through Jesus, healing, sin, and suffering. How much it actually meets that idyllic vision of God in Heaven directing the lives of individuals is, of course, an open question.\n\nThe idea that human beings are born as Hell-fodder posits a cruel and sadistic deity. Not only are the majority of human beings going to face eternal punishment for matters beyond their control, there is a divinity who planned it that way. We are all, literally, puppets in a universal morality play written by a being whose moral compass is horribly skewed. Indeed, even at Grove City some of the faculty would state that philosophically there could be no contest—free will was right. But, they would add, tapping the Bible, it’s not true because the Word of God says so. When I protested, it was declared, without irony, that even my protest had been predestined. In other words, in this clockwork universe I was clearly an Alex. Upon closer inspection, however, the truer analogy would be that we are all the victims of Alex and his droogs. But only if we have the freedom to make such an observation.", "pred_label": "__label__1", "pred_score_pos": 0.5434147119522095} {"content": "Real Estate\n\nBelieve In Your Builder – Your Needs Are Their Objective\n\nBuilders are professionals who build houses for people. The shelter is a necessity for everyone; everyone has to contact a builder at some point in their lives. Customer satisfaction is their primary objective; they try to offer the best option for customers that fulfill all their needs and requirements. Builders undertake different real estate projects and build different buildings for commercial as well as personal uses. There are various fantastic and talented builders in London who can give you your dream building at a reasonable price. Builders are a great option if you want a customized home for yourself, they can build a beautiful house with all the facilities in it and design will be customized for you.\n\nWhat are the responsibilities of a builder?\n\nThe primary responsibility of a builder is to formulate and execute all the plans related to the design and construction of the building. He has to supervise all the employees and laborers and make them work efficiently according to the contract. He also ensures that all the workings and procedures are carried out under the laws, and no law is broken.\n\nWhat are the specific duties of a house builder?\n\nAlong with the responsibilities, there are various particular duties that a builder has to perform. The first and most important is to ensure that the work is completed accurately and in time. His primary function is to make a foolproof plan to carry all the work and procedures in an organized manner. He has to take all the responsibilities from hiring excellent and efficient workers to executing the project successfully.\n\nThe efficiency of the workers depends on the attitude of the builder. The builders in London are strict and on times, motivate their employees to keep the spirit of the laborers and workers and high and enhance the efficiency of the overall project.\n\nLiam Rubin is a graduate of Bachelor of Science in Journalism from the University of Cambodia. He is currently the managing editor of T3 Licensing and a freelance writer.", "pred_label": "__label__1", "pred_score_pos": 0.8167553544044495} {"content": "Rodent care guide\n\nPrevention is better than cure!\n\nBrowse the rodent care guide designed by our vets to find answers to your concerns such as food, a healthy life and caring for your pet.\n\n\nLongevity (months)24-3918-3612-3626-40\nMax reported60364856\nAverage weight - Males (grams)46-13187-13020-40267-500\nAverage weight - Females (grams)50-5595-13022-63225-325\nRectal temperature (Celsius)38.237.637.137.7\nFood/day (grams)5-710-153-515-20\nWater (ml)49-125-822-33\nAmbient temperature (Celsius)18-2221-2424-2521-24\nAmbient humidity (%)45-5540-6045-5545-55\n\n\n\nThe majority of rodents are omnivorous and eat, in the wild, grass, seeds and sometimes invertebrate insects.\n\nRodents’ needs in protein are, for hamster 14-17%, for rats and mice 14-19.6% and 22% for the gerbil. The water bottle must be checked every day and changed every 2-3 days.", "pred_label": "__label__1", "pred_score_pos": 0.9866525530815125} {"content": "Leadership Management Literature Abounds With Stories Term Paper\n\nPages: 5 (1436 words)  ·  Bibliography Sources: 1+  ·  File: .docx  ·  Level: College Senior  ·  Topic: Leadership\n\nBuy full Download Microsoft Word File paper\nfor $19.77\n\n\nManagement literature abounds with stories of great leaders and the influence they exercised on their organizations. Indeed, the importance of Lee Iaccoca to Chrysler, Mary Kay to Mary Kay Cosmetics, Walt Disney to Walt Disney Company and many more such celebrity leaders to their respective organizations is now legend in management circles (Harris, 1993, p. 370). Yet, it appears that there is no single leadership theory, which can satisfactorily explain what effective leadership is. This is because the reality of leadership is quite complex (Chemers, 1997, p.1). For instance, effective leadership is commonly confused with managerial abilities, whereas, in point of fact, there are important distinctions. It is the objective of this paper to describe the difference between leadership and management, followed by an examination of the role responsibility of leaders in creating and maintaining a healthy organizational culture.\n\nAll organizational survival is a question of balance between stability on the one hand and responsiveness to a dynamic environment on the other. For instance, the development of efficient standardized operating procedures enhances reliability and productivity. However, since most organizations need to quickly respond to an evolving and competitive environment, internal structures and resources must also be amenable to facilitating external adaptability functions. Thus, it is evident that leaders must play a central role in helping organizations develop appropriate policies and systems for meeting both internal goals and external demands. Since organizations are nothing but a group or groups of people working together, this means that the leadership function really involves coordinating the efforts of people. It follows, therefore, that the development of a healthy organizational culture, which allows for teamwork, achievement of goals, problem solving, innovation, and creativity, is integral to effective leadership (Chemers, 1997, p. 4-5).\n\nThe leadership responsibilities described above, in fact, indicate the first fundamental difference between leadership and managerial skills. And that is, one of perspective. As Harris (1993, p. 372) points out, the four broad functions of planning, organizing, leading, and controlling are clearly important management skills in leading others. but, there are important distinctions between leadership and management. One such distinction is that leaders must necessarily focus on innovation and change, whereas managers need, and usually do, concentrate only on creating stability, harmony, and constancy. In fact, it is this primary distinction that has probably led to the view that \"managers are people who do things right and leaders are people who do the right things.\"\n\nIf leadership is about \"doing the right thing,\" it implies that a leader has to understand the environment and an organization's needs and adapt his or her individual style accordingly. Indeed, perhaps it is the recognition of this fact that led Peter Drucker, the famous management guru, to observe that \"leaders grow; they are not made.\" As against this, traditional management behavior tends to maintain the status quo (Harris, 1993, p. 372).\n\nIn fact, it is not enough for a leader to personally adapt to the contingencies of a given situation. for, organizational change management can only be successful when the people in an organization are equally responsive and flexible. Therefore, it follows that leadership involves building a relationship with people that results in highly motivated, mission-oriented, and goal-directed team members. Indeed, it is precisely this aspect of the leadership function that has led to the key features of productive leader-follower relationships being described as coaching, judgment, and transactional exchange (Chemers, 1997, p. 155).\n\nInterestingly, the need for leadership to affect change by motivating and training the people in an organization leads to the philosophy of delegation and empowerment. This philosophy, in turn, earmarks another important difference between leadership and management: \"Leaders work towards empowerment of subordinates whereas managers concentrate on developing power rather than people.\" (Harris, 1993, p. 374) Again, a difference in the focus of leadership and management is apparent here. This difference in focus manifests itself in other areas as well. For example, a leader is more conscious of the need to manage his or her image among the rank and file in an organization, whereas a manager's image management is usually targeted at his or her seniors.\n\nLeadership's image management focus also involves establishing a legitimate basis for attempts to influence others, which has been identified by a wide body of leadership research studies as building a relationship based on honesty… [END OF PREVIEW]\n\nTwo Ordering Options:\n\nWhich Option Should I Choose?\n\nDownload the perfectly formatted MS Word file!\n\n- or -\n\n2.  Write a NEW paper for me!✍🏻\n\nWe'll follow your exact instructions, guaranteed!\nChat with the writer 24/7.\n\nApplied Management and Decision Sciences Thesis\n\nManagement Theory Organizational Behavior Management Theory Article Term Paper\n\nHR Department to the Staff Term Paper\n\nBusiness Communication According to Daniel Levi Thesis\n\nSociotechnical System Theory Contributions of Socio-Technical Systems Research Paper\n\nView 31 other related papers  >>\n\nCite This Term Paper:\n\nAPA Format\n\nLeadership Management Literature Abounds With Stories.  (2004, November 10).  Retrieved December 14, 2019, from https://www.essaytown.com/subjects/paper/leadership-management-literature-abounds/3081\n\nMLA Format\n\n\"Leadership Management Literature Abounds With Stories.\"  10 November 2004.  Web.  14 December 2019. .\n\nChicago Format\n\n\"Leadership Management Literature Abounds With Stories.\"  Essaytown.com.  November 10, 2004.  Accessed December 14, 2019.", "pred_label": "__label__1", "pred_score_pos": 0.6863130331039429} {"content": "tr(1) - translate or delete characters\ntr [OPTION]... SET1 [SET2]\n\n-c, -C, --complement\n use the complement of SET1\n-d, --delete\n delete characters in SET1, do not translate\n-s, --squeeze-repeats\n replace each input sequence of a repeated character that is listed in SET1 with a single\n occurrence of that character\n-t, --truncate-set1\n first truncate SET1 to length of SET2\n--help display this help and exit\n output version information and exit\nSETs are specified as strings of characters. Most represent themselves. Interpreted sequences are:\n\n\n\\\\ backslash\n\n\\a audible BEL\n\n\\b backspace\n\n\\f form feed\n\n\\n new line\n\n\\r return\n\n\\t horizontal tab\n\n\\v vertical tab\n\n all characters from CHAR1 to CHAR2 in ascending order\n\n in SET2, copies of CHAR until length of SET1\n\n REPEAT copies of CHAR, REPEAT octal if starting with 0\n\n all letters and digits\n\n all letters\n\n all horizontal whitespace\n\n all control characters\n\n all digits\n\n all printable characters, not including space\n\n all lower case letters\n\n all printable characters, including space\n\n all punctuation characters\n\n all horizontal or vertical whitespace\n\n all upper case letters\n\n all hexadecimal digits\n\n all characters which are equivalent to CHAR", "pred_label": "__label__1", "pred_score_pos": 0.9286835193634033} {"content": "How This Year’s Nobel Prize Season Let Us Down\n\nAs a kid, I never thought about my gender when I said I wanted to be a doctor. I never thought twice about having two male pediatricians and lack of female representation on my school’s Career Day. I just assumed the doors were wide open for me. Gender equality is basically here, right? After all, with most medical school applicants being female, a female doctor isn’t as wild of a concept as it used to be. On top of that, the number of women receiving doctorates in the U.S. has doubled between 1987 and 2017, with women surpassing men in terms of earned doctoral and master’s degrees. Even better, the biggest strides were in computer science and mathematics, which are notoriously male-dominated.\n\nSo, with all of this progress on gender equality in academia, why was only one woman awarded a Nobel Prize this year?\n\nThe Nobel Prize is probably the most prestigious international award given to people who have made the biggest impact in their respective field. The Nobel Foundation in Stockholm, Sweden, decides it each year, and each recipient is awarded with a medal along with the title, “laureate,” which is a fancy word for Nobel Prize recipient. There are prizes awarded in physics, chemistry, medicine, literature, peace and the Sveriges Riksbank Prize in Economic Sciences.\n\nThere have been a couple years where no Nobel Prizes were awarded, such as during the World Wars. Generally, they’ve been given out in each category since 1901. Since its conception, about 950 people and 24 organizations have received a Nobel Prize.\n\nCan you guess how many of those were women? It’s probably lower than you think (or at least its lower than what I thought). Including this year’s winners, there are only 53 female Nobel laureates. This means that women make up less than 6 percent of the total prize winners. This would not be so bad considering the 20-year lag between when the research was conducted and when the prize is typically awarded, but the distribution doesn’t improve much in more recent events. Between 2001-2019, only 24 women have received the prize compared to around 200 male laureates, which is right around 12 percent.\n\nThis “lag” phenomenon especially shows in the physics, chemistry, medicine and the economics sciences categories. It’s used to explain why women weren’t conducting research 20 to 50 years ago on the caliber of Nobel Prize-worthiness. In reality, it is more of a reflection on the toxic gender bias that persists in STEM fields. While this lag plays a part, it doesn’t tell the whole story.\n\nThe biggest disparity is seen in the physics category, of which women make up 20 percent of doctoral degrees. Only three women have been honored: Marie Curie in 1903, Maria Goeppert-Mayer in 1963 and Donna Strickland in 2018.\n\nThe half-century between each prize is not indicative of a lack of female-led discoveries. It points to a larger problem where women were and still are passed up for promotions, awards, opportunities, research funding, higher pay and publications in STEM fields. There’s also the “Matilda Effect,” which is the phenomenon of which female scientists’ accomplishment are overshadowed or attributed to male advisers and colleagues. This was the case with astrophysicist Jocelyn Bell Burnell’s discovery as a graduate student. She found a new type of star, the pulsar, which won a Nobel Prize in Physics to which her graduate adviser and his colleague were instead awarded in 1974.\n\nI am not bringing out my pitchfork to riot the Nobel Prize committee, but I am using the gender disparity in awards to highlight the persistent sexism in STEM fields. While there have been major improvements in recent years, there are still obstacles in receiving positions in labs and research funding that female researchers face. These obstacles add up, especially in terms of awards and are hindering intelligent women in their pursuit of changing the world.\n\nUnfortunately, this process doesn’t begin after graduating. Girls in grade school are inherently taught that mathematics and science are for boys, while girls are better at reading and writing. The lack of female role models can discourage young girls from pursuing education or careers in fields seen as “boyish,” such as computer science and physics.\n\nYoung women who aspire to pursue different paths after graduation need to know that every door is actually open to us. As a female STEM student, I can speak for several of us in saying that we want to be treated on the merit of our work, not on our gender identity (especially not after working our butts off to get where we want to be).\n\nI know that gender bias is still very much alive in medicine despite big strides. It’s not going to impact my career decision as it shouldn’t impact yours. No matter your race, ethnicity or gender identity, you are just as deserving as your peers to pursue your passions without any obstacles.\n\nBy next Nobel Prize season, I hope the roster is more diversified to give young girls who are interested in STEM more role models to look up to. They’re out there. You just have to start listening to them.", "pred_label": "__label__1", "pred_score_pos": 0.9618531465530396} {"content": "Hindus express concern at Netflix’s Ramayana inspired animation series “Heaven’s Forest”\n\nHindus are urging Netflix to stay true to the story and the spirit of Hindu scripture Ramayana when borrowing storyline and characters from it in its reportedly upcoming animated series “Heaven’s Forest”.\n\nDistinguished Hindu statesman Rajan Zed, in a statement in Nevada today, said that Ramayana was a highly revered scripture of Hinduism. Hindus were fine with Hollywood and Bollywood making movies about Ramayana, but the final product should be the true depiction of it and not a fantasized or a re-imagined version.\n\nZed, who is President of Universal Society of Hinduism, pointed out that re-imagining of Hindu scriptures could be hurtful to the devotees. Hindus welcomed Hollywood/Bollywood to immerse in Hinduism, but taking it seriously and respectfully and not for refashioning Hinduism concepts and symbols for mercantile greed.\n\nRajan Zed further said that changing Ramayana to fit the Hollywood/Bollywood machine was likely to be distressful to the Hindu sentiments. Ramayana was an integral part of Hinduism and was held in such reverence that Hindus believed that simply reading/hearing of it showered blessings upon the reader/listener. Rama, the hero of Ramayana, was incarnation of Lord Vishnu, and was worshipped by Hindus.\n\n\nRamayana, an ancient Sanskrit scripture that consists of 24,000 stanzas, explores various themes; including human existence, concept of dharma, etc.\n\nNetflix, claimed to be “world’s leading streaming entertainment service”, has reportedly ordered eight episodes of “Heaven’s Forest”, a Ramayana-inspired epic animated action drama series from Castlevania creator British comic-book writer Warren Ellis and Powerhouse Animation Studios. Launched in 1997 and headquartered in Los Gatos, California; Netflix claims to have “158 million paid memberships in over 190 countries”. Reed Hastings is CEO.\n\nSource : From Our Correspondent\n\nRelated Tags\n\nDenigrationDenigration of DeitiesHindu IssuesProtest by Hindus\n\n", "pred_label": "__label__1", "pred_score_pos": 0.8743295669555664} {"content": "Hurricane Joaquin reaches Category 4 strength near the Central Bahamas on October 1, 2015.\n\nHurricane forecasting\n\nHurricane forecasting\nHurricane forecasting\nData and experience lead to advance warnings\nHurricane impacts\nNot just wind: not just coastal threat\nHurricane hunters\nFlying into storm’s core\nAtlantic hurricanes and climate\nNatural and human causes\nWhat can coastal residents do to prepare?\nMake a hurricane plan\nUPDATED: May 22, 2018.\n\nForecasting where a hurricane will go and how strong it will be starts with data. Hurricane specialists at NOAA study satellite imagery and computer models to make forecast decisions for advisories that go to emergency managers, media and the public for hurricanes, tropical storms and tropical depressions.\n\nKey data come from NOAA satellites that orbit the earth, continuously observing tropical cyclones (hurricane, tropical storm or tropical depression) from start to finish. Polar-orbiting satellites fly over the storm about twice a day at a lower altitude, carrying microwave instruments that reveal storm structure. If there’s a chance the cyclone will threaten land, NOAA’s National Hurricane Center (NHC) sends U.S. Air Force Reserve and NOAA hurricane hunter aircraft to fly through a storm to take detailed observations. NHC hurricane specialists also analyze a variety of computer models to help forecast a tropical cyclone. Each storm is different, and no one model is right every time, so the specialists’ experience with these different models is crucial to making the best forecast. \n\nNHC senior hurricane specialist Dan Brown and branch chief Dr. Mike Brennan.\nNHC senior hurricane specialist Dan Brown and branch chief Dr. Mike Brennan. (NOAA photo by Mike Mascaro)\n\n\nThe number of tropical cyclone advisories issued in 2017 \n\nWhen a tropical cyclone threatens the U.S. coast, NHC confers with meteorologists at NOAA’s National Weather Service forecast offices in the path of the storm to coordinate any necessary watches and warnings in those communities.\n\nEvery six hours NHC will issue updated text and graphics — all available on — that include track and intensity forecast for the next five days, along with the chances of tropical storm and hurricane-force winds at specific locations. A potential storm surge flooding map and a prototype storm surge watch/warning graphic are included. NHC also posts the same information on social media to ensure a wide distribution.\n\nWhen watches or warnings are posted for the U.S. coastline, NHC opens a television media pool to give live interviews to national news outlets and the local TV stations in the path of the storm.\n\nWhen it comes to hurricanes, most people think of wind. But water from storm surge at the coast and inland flooding claims the most lives.\n\nHurricane winds are rated from 1 to 5 on the Saffir-Simpson Hurricane Wind Scale. Based on maximum sustained winds, the scale gives examples of types of potential property damage and impacts.\n\n5-8 feet\n\nFlooding levels from the combined effect of storm surge and tides in the Florida Keys during Hurricane Irma\n\nYet, nearly half of the lives lost in a hurricane are related to storm surge, an abnormal rise of water over and above the predicted astronomical tides. Storm surge can be particularly severe if it coincides with normal high tide, resulting in storm tides reaching up to 20 feet or more in some cases. \n\nA street in downtown Key West, Florida is impassable as damaged cars sit in the street and utility truck work to restore power after Hurricane Irma, Sept. 15, 2017.\n\nAnd 25 percent of hurricane fatalities are due to inland flooding. Heavy rainfall can extend for hundreds of miles inland, producing extensive inland flooding as creeks and rivers overflow.\n\nAnd it isn’t just hurricanes that carry the most water — some of the worst flooding on record has been caused by tropical storms.\n\nTo better prepare communities for storm surge, NOAA’s National Hurricane Center has developed a potential storm surge flooding map, which is released when there is a hurricane watch or warning along the U.S. East or Gulf Coast.  The map shows where storm surge flooding could occur in a near worst case scenario and gives the height in three feet intervals that water could reach above normal dry ground.\n\nBeginning this year, NOAA's National Weather Service will issue Storm Surge Watches and Warnings to highlight areas along the Gulf and Atlantic coasts of the continental United States that have a significant risk of life-threatening inundation from a tropical, subtropical, post-tropical, or potential tropical cyclone.\n\nThe crews of the NOAA and U.S. Air Force Reserve hurricane hunter fleet fly around and directly into the storm’s center, measuring weather data to determine the storm’s location, structure and intensity.\n\nWhen hurricane specialists at NOAA’s National Hurricane Center need a closer look at a developing storm or major hurricane, they send special “hurricane hunter” aircraft to fly into it.\n\n\nTotal number of missions flown by NOAA and USAF Hurricane Hunters in 2017\n\nNOAA’s Hurricane Hunters include two Orion P-3 aircraft and a G-IV jet.\nNOAA’s Hurricane Hunters include two WP-3 aircraft and a G-IV jet. (NOAA)\n\nMost of the hurricane hunters are the ten WC-130J aircraft of the Air Force Reserve 53rd Weather Reconnaissance Squadron at Keesler Air Force Base in Biloxi, Mississippi. NOAA’s two WP-3 Orion aircraft from MacDill Air Force Base in Tampa, Florida, are used mostly for research to improve hurricane forecasts.\n\nFlying directly into the storm’s center, these turbo propeller planes drop probes called dropwindsondes from a chute in the aircraft’s belly at strategic points. Dropwindsondes continuously transmit critical weather data back to the plane, including pressure, humidity, temperature, wind direction and wind speed. The data give a detailed picture of the storm’s structure and intensity. The planes also have a special microwave radiometer that measures surface wind and the rate of rain.\n\nAll this data is then relayed from the plane to a satellite and then to NHC where hurricane specialists put it together to assess the cyclone’s strength, motion, and size. Radar data from NOAA and USAF hurricane hunters are fed into computer models to help forecasters make as accurate a forecast as possible, and to help hurricane researchers achieve a better understanding of storm processes.\n\nIt’s not always a bumpy ride. NOAA also has a G-IV jet that cruises 45,000 feet above and around a storm. It can cover thousands of square miles around a storm, using dropwindsondes and Doppler radar to collect different type of data from the storm’s core and surrounding environment. The data is sent to NOAA’s National Centers for Environmental Prediction in College Park, Maryland, where it’s used in computer models that have been able to improve hurricane track forecasts by about 20 percent in recent years. \n\nLarge-scale conditions in the Atlantic and the Caribbean Sea will determine how active or inactive a hurricane season will be. \n\nThe number of storms in an Atlantic hurricane season depends on the large-scale atmospheric and oceanic environment in the areas where storms develop, in the tropical North Atlantic Ocean and the Caribbean Sea. Global phenomenon such as El Niño triggered by ocean warming in the equatorial Pacific may also affect whether Atlantic hurricanes develop.\n\nScientists say that while the historical record shows an increase in the numbers of Atlantic hurricanes since the early 1900s, this record does not reflect how much easier it has become to identify hurricanes since be began using satellites. Once this is factored in, scientists say there has been no significant overall increase in Atlantic hurricanes since the late 1800s.\n\nOn a shorter timeframe, however, the numbers of Atlantic hurricanes have increased, much of it beginning in 1995, as the tropical North Atlantic warmed and atmospheric conditions became conducive to increased hurricane activity, similar to what occurred during the mid-20th century.\n\nOne influence is a variation in North Atlantic Ocean temperatures called the Atlantic Multi-decadal Oscillation (AMO), that has cool and warm phases historically lasting 25-40 years each. During its warm phase, North Atlantic sea-surface temperatures are unusually warm compared to the tropical average and the atmospheric conditions over the Atlantic are conducive to hurricane activity. The recent multidecadal variations in Atlantic sea surface temperatures may be partly due to human-caused factors such as dust or other aerosols and partly due to natural climate variability.  Scientists are continuing to work to better understand the relative contributions of these factors to the recent multidecadal variability.\n\nHuman-caused increases in greenhouse gases have very likely contributed to the warming of tropical North Atlantic sea-surface temperatures observed over the past century. The World Meteorological Organization in 2010 concluded that by the late 21st century greenhouse warming is not expected to increase the number of tropical cyclones, but is expected to increase the average intensity of tropical cyclones. Near-storm rainfall rates are also expected to increase. \n\nIt only takes one storm that affects you to make it a bad hurricane season. If you live along the coast or in nearby areas affected by inland flooding, it’s essential to have a personal hurricane plan. This can mean the  difference between your being a hurricane victim and a hurricane survivor. \n\nThe time to put together that plan is well before a hurricane hits. Find out if you live in a hurricane storm surge evacuation zone. If you do, know where you would have to go.\n\nResidents living in hurricane-prone locations should have an emergency plan in place\nResidents living in hurricane-prone locations should have an emergency plan in place (iStock)\n\nIf you don’t need to evacuate, have the supplies you need to not just get through the storm, but for the potentially lengthy and unpleasant aftermath. Have enough non-perishable food, water and medicine to last each person in your family a minimum of one week.\n\nWaiting until the storm is on your doorstep is too late. Resilience depends on preparation. The websites and will help you make a plan for yourself and your loved ones.\n\nNOAA’s Weather-Ready Nation campaign is about building community resilience in the face of increasing vulnerability to extreme weather and water event, including hurricanes.\n\nThe nonprofit Federal Alliance for Safe Homesoffsite link (FLASH®) is a NOAA partner and the country’s leading consumer advocate for strengthening homes and safeguarding families from natural and manmade disasters.\n\nPublished on\nMay 16, 2016", "pred_label": "__label__1", "pred_score_pos": 0.9574737548828125} {"content": "When Is Cancer Misdiagnosis Considered Medical Malpractice?\n\n\n\nThe most common type of medical malpractice case is the result of misdiagnosis—accounting for nearly 25% of all malpractice claims. The most commonly cited misdiagnosis results from failure to properly diagnose cancer, particularly common among breast cancer, colorectal cancer, and prostate cancer.\n\nWhen the importance of early diagnosis and treatment is considered, failure to diagnose cancer in a timely manner can have devastating consequences. However, our Dallas misdiagnosis lawyer knows how difficult it can be to prove negligence in a medical malpractice case.\n\nLiability in Medical Malpractice Cases\n\nWhen a doctor fails to properly diagnose cancer, it still may not be the basis for a viable medical malpractice lawsuit. In order to establish a strong case, you must be able to prove that the delayed diagnosis resulted from more than a reasonable mistake. The foundation for a viable medical malpractice case rests on the following:\n\n • The doctor breached the professional standard of care. In other words, the doctor acted in a way that differs from what a reasonable doctor would have done under the same circumstances.\n • The consequences of the misdiagnosis were avoidable. The patient must have suffered an injury that would not have otherwise occurred. Proving legal harm can be difficult in cancer cases as it can be very difficult to prove that the patient would have had a better outcome if the doctor had made the correct diagnosis.\n\nThe complex nature of medical malpractice cases involving cancer makes it quite difficult to establish a viable case without the help of an experienced medical malpractice lawyer. If you live in the Dallas area, please contact Polewski & Associates at 972-230-6200 for your free case evaluation.", "pred_label": "__label__1", "pred_score_pos": 0.9785040020942688} {"content": "Transactions in SQL Server Part I – An Introduction\n\nA basic requirements in most SQL Server based applications is implementing a database operation (DDL or DML) in a single unit of work. The DDL requirement is more from a DBA’s perspective rather than the application, since any application would perform only INSERTs, UPDATEs and DELETEs on the existing data, and a DBA would be performing DDL statements on the existing database as part of schema updates. The default behavior of SQL Server is to implement implicit transactions, meaning every T-SQL Statement is committed as soon as it is executed. This works fine as long as there is only one query being executed. But this is seldom the reality in large applications.\n\nEnterprise applications normally entail executing large transactions, ie. a large number of T-SQL statements to be executed as a single unit of work. This means, either all the statements run successfully or they all need to be rolled back. This is also one of the ACID properties of transactions – Atomic. This ensures that the state of the database is stable even in case of failure, and any subsequent operation can be performed gracefully. The implementation of these transactions becomes important in any multi-tier application where the user interface makes a call to the database in response to user actions. In the first part of this article, I will discuss the basics of SQL Server Transactions from a beginner developer’s perspective. Below is an example of how to define an explicit transaction:\n\n-- T-SQL Statements\n-- error catching SQL\n IF @@TRANCOUNT > 0\n\nThe first statement in this example is BEGIN TRANSACTION. This statement marks the beginning of an explicit transaction. Beginning with SQL Server 2005 onwards, a new block of T-SQL statements called BEGIN TRY… END TRY and BEGIN CATCH… END CATCH was introduced. These blocks make it easy for error handling. The main block, BEGIN TR… END TRY contains the statements to be executed. BEGIN CATCH… END CATCH is the error handling portion of the construct.\n\nThe BEGIN TRANSACTION statement marks the beginning of an explicit transaction. This statement should be the first statement in any block of code (Stored Procedure, Function). The BEGIN TRY… END TRY defines a block of code where the actual T-SQL Statements go. If all the statements within this block run successfully, then control is transferred to the first statement after the BEGIN CATCH… END CATCH block. If, however, any of the statements results in an error, then control is transferred to the BEGIN CATCH… END CATCH block.\n\nSince we have defined an explicit transaction, we need to either roll it back, or commit it. The Rollback would occur in the BEGIN CATCH… END CATCH block. The Commit should be immediately after this block. The statement that rolls back a transaction is ROLLBACK TRANSACTION, and the statement that commits is COMMIT TRANSACTION.\n\nIn the example code above, I have checked for the value of the system variable @@TRANCOUNT before taking a decision of rolling back or committing a transaction. This variable indicates whether there are any transactions open in the current session, and if yes, we need to do something about them. Therefore, in the BEGIN CATCH..END CATCH block, if the value of the @@TRANCOUNT variable is greater than 0, it means we need to roll back the transaction because since control was transferred to this block when errors were encountered in the BEGIN TRY..END TRY block of statements.\n\nSimilarly, after the BEGIN CATCH..END CATCH block, we need to check the @@TRANCOUNT variable to determine if there are any transactions open, and these will need to be committed them when no errors were encountered in the BEGIN TRY block.\n\nThis is a very basic demonstration of the use of SQL Server Transactions which should be implemented in stored procedures and functions that are the basic blocks of T-SQL code, and form the backbone of any transaction based application. In the next article, I will discuss more advanced topics related to using and implementing transactions.\n\n\n\n", "pred_label": "__label__1", "pred_score_pos": 0.9739378094673157} {"content": "\n\nDonald Trump unveiled a scaled back tax plan on Thursday, which is projected to add less to the federal debt but also to deliver fewer benefits to taxpayers than his original proposal.\n\nThe plan dramatically reduces the size of tax cuts for high earners and the middle class, compared with earlier Trump proposals, though it includes even more benefits for the lowest earners in the country, according to independent analysts at the Tax Foundation. It also scraps a business tax provision that could have delivered large windfalls to the companies in the Republican presidential nominee’s business empire, which opponent Hillary Clinton had derided as “the Trump Loophole.”\n\nTrump bundled the revisions with a proposal to cut $1 trillion in federal spending over a decade without touching safety-net programs or national defense; rollbacks to some federal regulations, including those governing air pollution and food safety, and new initiatives to open up more public and private lands for oil and gas drilling.\n\nThe Tax Foundation said the updated tax plan, after accounting for increased economic growth, would cost the government $2.6 trillion in lost tax revenue over a decade, down from $10 trillion for his initial plan.\n\n\nTrump’s campaign predicted the package would deliver 3.5 percent growth per year for the next decade and produce 25 million new jobs, a number disputed by the Clinton campaign and some outside analysts.\n\nTrump pitched his economic blueprint in a speech he delivered in a hotel ballroom a few blocks away from Trump Tower in New York. He took sharp aim at Democratic rival Hillary Clinton in his remarks, singling out her recent comment labeling half of his supporters a “basket of deplorables.”\n\n“My plan will embrace the truth that people flourish under a minimum government burden and will tap into the incredible unrealized potential of workers and their dreams,” he said.\n\nIn a moderated discussion after his speech, Trump once again accused the Federal Reserve of being “ very political.” The Fed operates independently of the executive branch. Trump also said he would not allow the United States to default on its debt.\n\n“The debt of this country is absolutely, one hundred percent sacred,” Trump said.\n\nThe speech came amid the Trump campaign’s recently intensifying focus on policy, as it seeks to get past a damaging summer defined by the deeply personal fights Trump engaged in with various people.\n\nIn the past week Trump has added new tax breaks for parents with children to his plans. On Thursday, he unveiled several tweaks to his broader plan that appeared largely aimed at reducing its impact on the budget. That apparently included scrapping a provision to allow “pass through” entities, a corporate structure popular with small business owners and with companies in the Trump empire, to pay a far lower rate on their income than they do at present.\n\nTax Foundation economists said they were instructed by the campaign to change the treatment of pass-through income, a move that reduced the plan’s cost by somewhere between $1 trillion and $2 trillion over a decade. The plan still would reduce federal revenue by $4.4 trillion over 10 years, or by $2.6 trillion after accounting for the additional growth, they estimated.\n\nTo offset those losses, Trump said he would generate even further economic growth via increased energy production and reductions in trade deficits — without touching Social Security, Medicare, Medicaid or defense. That implies large cuts to a relatively small group of programs including education spending and scientific research.\n\nA Clinton senior policy adviser, Jacob Leibenluft, ripped the proposals. “The bottom line after this do-over is the same: Trump has run on tax plans that will give himself and his family billions of dollars in tax cuts,” he said in a statement. “He would give these tax cuts to wealthy families while offering new cuts in crucial supports that help working families, kids going to college, medical research, and more.”\n\nIn his speech Trump emphasized the need to do away with regulations he says are needlessly burdensome to businesses. Among the regulations Trump wants to end, according to a fact sheet from his campaign: FDA rules governing “the soil farmers use, farm and food production hygiene, food packaging, food temperatures, and even what animals may roam which fields and when.”\n\nHe announced caps on the total amount of federal tax deductions that Americans may claim on their individual income taxes, a move targeted at limiting tax breaks for the highest income earners. The caps would be $100,000 a year in deductions for individuals and $200,000 for married couples filing jointly.\n\nHis tax plan would also more than double the size of the standard deduction on individual income taxes for most workers, a move that would effectively shield millions more Americans from having to pay federal taxes. The deduction would increase to $15,000 for individuals and $30,000 for married filers.\n\nThe expanded standard deduction could dramatically shift how Americans calculate their taxes. Matt Jensen, who directs the Open Source Policy Center at the American Enterprise Institute, estimated Thursday that the changes would reduce the number of filers who itemize their deductions from 45 million to 13 million.\n\nIn another new detail, Trump said U.S.-based manufacturers would be allowed to fully write off the costs of new plants and equipment from their taxes, to encourage investment, though if they chose to do so they would give up their ability to deduct interest expenses.\n\nMany other components of the plan appear unchanged from Trump’s most recent iteration of the proposal. It would reduce the number of federal tax brackets from seven to three, with rates of 12 percent, 25 percent and 33 percent, accordingly.\n\nTankersley reported from Washington.", "pred_label": "__label__1", "pred_score_pos": 0.8334648013114929} {"content": "Ellis Brigham Leaderboard\nFilson Leaderboard 2\nItaly Oct-Mar\nA password will be e-mailed to you.\nAuthor: Naomi Dunbar\n\nThe UK has a new tallest mountain. No, we didn’t miraculously sprout a new mountain from the ground in this sudden cold snap of weather. Mount Hope, however, is a mountain located in a part of the Antarctic claimed by the UK, and it has recently been re-measured, only to discover that it towers above the previous title holder (Mount Jackson) by a hearty 50m.\n\nDue to concerns over the safety of pilots flying over the Antarctic, map technicians at the British Antarctic Survey (BAS) took another look at the height of the mountains in order to make flying safer. “In Antarctica there are no roads, so you if need to get around you have to fly planes. And if you’re flying planes, you really need to know where the mountains are and how high they are,” Dr Peter Fretwell, Geographic Information Officer at the BAS, explained when recently speaking to the BBC.\n\nAfter the re-measure, it was discovered that Mount Hope is now a whopping 3,239m high (more than twice the height of Ben Nevis), in comparison to Mount Jackson which measures in at 3,184m. To make the new assessment, the technicians at the BAS used a combination of elevation models built from satellite information to achieve their calculations.\n\nMount Hope, Antarctica\nPhoto: Euphro\n\nExtremely high-resolution photos were taken from the orbit by the America WorldView-2 spacecraft, which allowed for an incredibly detailed view of both Mount Hope and Mount Jackson. Dr Fretwell and his team call this process ‘photogrammetry’. They know the position of the satellite so well, that if they use two images of a mountain that are very slightly offset from one another, they can use simple trigonometry to work out that mountain’s height.\n\nSounds pretty simple doesn’t it? (No, don’t worry, I don’t have a clue how it all works either). Anyway, this ‘photogrammetry’ process is remarkably accurate and only holds an uncertainty of 5m either way. Therefore, there is no argument over Mount Hope’s new reining title.\n\nWhile Mount Hope is not actually a mountain situated in the UK, technically speaking, it is part of the UK’s sovereign territory. This is why the mountain is now being named the UK’s highest mountain over the likes of Ben Nevis in Scotland.\n\nBeing in Antarctica, it’s probably not one we’ll tick off our UK bucket list anytime soon, but hey – it’s definitely on there. So, what are your thoughts of Mount Hope being claimed as the UK’s highest mountain? Let us know in the comments section below.\n\nFeatured image: Euphro", "pred_label": "__label__1", "pred_score_pos": 0.9097928404808044} {"content": "Ratta maar song download pagalworld\" class=\"bivez\" />{/PREVIEW}\n\nTaali MP3 Song by Sukhwinder Singh from the movie Veer. Download Taali song on jonathanclewis.me and listen Veer Taali song offline. Taali Maar Do Hathi Veera Taali Bajjegi Oye Mathe Bindi Paira Mehndi Lali Sajegi Aree Taali Maar Do Hathi Veera Taali Bajjegi Mathe Bindi.\n\nAgain, we re not trying to pretend that some women aren t genuinely difficult partners. Excellent dating profiles Start chatting now. Super Dating by MTL17 reviews. aongs. brighten the country with the flowers they would grow. However, there were often numerous state variations in these legends within any one year. I understand that your friend is a cool person.\n\nTaali (Full Video Song) - Veer - Salman Khan & Zarine Khan\n\n{CAPCASE}veer songs\n\nParticipants may accidentally go off-topic within a particular discussion thread The logical sequence of discussion is often broken by users not sticking to the topic. Explorer Interests. The Arabic term Tawhid is used to describe this belief in the absolute Oneness of God.\n\nVeer songs\n\nWhatsapp Status - Veer Movie - Salman Khan - Best Emotional Scen\n\nTaali (Making of song) - Veer\n\nSorry, sorry. The UDF insert the en-tries into a table variable and returns the table variable as a result. He broke up with her and went on to live his life. person, but you also seem illiterate because you are typing like it's a text message. Not every. Students can log on to [HOST] for the NEET admit card. This topic allows debating what is meant by mental disorder, what prejudices exist, how it is seen in society and how it is represented in different media. Eventually Paul made peace with himself and came out as a comfortable and convinced atheist. Now, she is following her own heart.\n\n\n1 thoughts on “Taali maar do hathi veera video & mp3 songs.”", "pred_label": "__label__1", "pred_score_pos": 0.8203895092010498} {"content": "[Read this article]\nThis article examines how second–generation Filipino Americans’ educational experiences and school racial context influence their sense of Asian American identity. Drawing on fifty in–depth interviews, I discuss how many Filipino Americans negotiate their individual and collective experiences in relationship to Asian American panethnicity, a process that shifts between high school and college. Within existing research on children of immigrants, studies focus primarily on mechanisms shaping ethnic or national origin identity, while saying relatively less about the factors affecting orientations toward panethnic categories.6 Interdisciplinary perspectives within ethnic studies and cultural studies have addressed the social construction of Asian American identity more directly. Previous scholars have highlighted Filipino Americans’ cultural and political marginalization since the inception of pan–Asian identity in the 1960s, citing their distinct colonial history and socioeconomic patterns as explanations.7 Others have discussed how this schism opens the possibility for Filipino Americans to panethnically align themselves with groups beyond Asian America, including Pacific Islanders, Latinos, and people of color more broadly.8 Ultimately, this article focuses on the educational arena as a key site of Filipino American racial formation. Specifically, I argue that the micro–level interactions and racial stratification of educational spaces mitigate how second–generation Filipino Americans negotiate their panethnic ties with Asian Americans, as well as other racial groups.", "pred_label": "__label__1", "pred_score_pos": 0.9500186443328857} {"content": "Cats domesticated themselves\n\nIn many, animal species are domesticated when humans bring them into their homes whether they want to be there or not. For example, it's mostly accepted that humans domesticated wolves, breeding them in captivity until they became the modern dogs we love today. Now, a new study of cat genetics reveals that cats just kind of hung around humans for thousands of years before they were domesticated. From Casey Smith's article in National Geographic:\n\n\nMice and rats were attracted to crops and other agricultural byproducts being produced by human civilizations. Cats likely followed the rodent populations and, in turn, frequently approached the human settlements.\n\n“This is probably how the first encounter between humans and cats occurred,” says study coauthor Claudio Ottoni of the University of Leuven. “It’s not that humans took some cats and put them inside cages,” he says. Instead, people more or less allowed cats to domesticate themselves.\n\nA second lineage, consisting of African cats that dominated Egypt, spread into the Mediterranean and most of the Old World beginning around 1500 B.C. This Egyptian cat probably had behaviors that made it attractive to humans, such as sociability and tameness.\n\nThe results suggest that prehistoric human populations probably began carrying their cats along ancient land and sea trade routes to control rodents.\n\n\"Cats Domesticated Themselves, Ancient DNA Shows\" (National Geographic)", "pred_label": "__label__1", "pred_score_pos": 0.8377496004104614} {"content": "Applying conflict sensitivity in emergency response: Current practice and ways forward\n\nHow can emergency response be delivered in a more conflict-sensitive manner? To what extent should this be a priority for the sector? What practical tools and approaches have aid agencies used to better understand their contexts of intervention and minimize conflict risks?As these issues become increasingly prominent in regions of the world as diverse as the Horn of Africa, Afghanistan and Libya, Network Paper 70 offers insights to these pressing questions.Drawing on field research from Haiti, Pakistan and Sri Lanka, this paper maps the current state of conflict-sensitive practice in emergencies. It identifies good practices which can be built upon, key gaps, and points out practical ways to integrate conflict sensitivity more strategically across the emergency programme cycle.One of the key conclusions from this study is that there are clear opportunities for synergy between conflict sensitivity integration and the emergency capacity-building initiatives currently ongoing within many agencies. Significant improvements can be achieved through relatively simple steps which complement existing tools, standards and efforts to improve programme quality. The paper suggests six minimum standards for conflict sensitive emergency response which, if applied, would not only help minimize harm and reduce conflict risks but also increase the overall effectiveness of humanitarian response.This paper is based on research commissioned by CARE International UK and CAFOD on behalf of theConflict Sensitivity Consortium with the participation of World Vision InternationalPeace and Community ActionCatholic Relief ServicesActionAid International and Plan International.", "pred_label": "__label__1", "pred_score_pos": 0.9994024634361267} {"content": "Public Release: \n\nInvasive forage grass leads to grassland bird decline\n\nUniversity of Illinois College of Agricultural, Consumer and Environmental Sciences\n\n\nIMAGE: Dickcissels, small grassland birds, are more likely to experience nest failure when nests are surrounded by high amounts of invasive tall fescue grass, according to University of Illinois research. view more \n\nCredit: Scott Maresh Nelson, University of Illinois\n\nURBANA, Ill. - The prairies of North America once covered vast stretches of land, with towering grasses creating ideal nesting and forage habitat for grassland birds. But the deep, rich soil and treeless expanse also represented the ideal conditions for farming - both row crops and cattle grazing - in the eyes of settlers. Today, largely thanks to agricultural conversion, a mere 1 percent of tallgrass prairie remains. And what's left is now being threatened by invasive species and forest encroachment.\n\n\"With grasslands in steep decline, the birds that depend on them are also disappearing. Therefore, it is urgent that we understand how these more recent changes - invasive species and landscape shifts - influence grassland bird reproduction,\" says Scott Maresh Nelson, a doctoral student advised by Professor Jim Miller in the Department of Natural Resources and Environmental Sciences (NRES) at the University of Illinois.\n\nIn a recent study published in Landscape Ecology, Maresh Nelson and his colleagues found that a common cattle forage grass, tall fescue, is associated with nest failure in dickcissels, small grassland birds similar to sparrows.\n\n\"Despite its name, tall fescue is actually a lot shorter than native grasses. It takes over and makes the landscape more uniform,\" says Jaime Coon, also a doctoral student in Miller's group and a co-author on the study. \"Whereas the vegetation was very structurally diverse before, with some tall plants and some short, now you have a mat. It changes the vegetation structure quite a bit.\"\n\n\n\"We were interested that tall fescue had such strong ecological effects, in part because fescue is a very polarizing plant,\" Coon says.\n\nHer comment is based on extensive landowner surveys in the area, which revealed that while some respondents liked a high abundance of fescue, a majority would prefer less fescue on pasture land. Although it is palatable and drought tolerant, the grass hosts a fungus that can stress grazing cattle.\n\n\"The fact that fescue came out as one of the main drivers of nest failure means it might be a situation where removing an invasive grass might benefit wildlife and people's livelihoods,\" she says.\n\nBut why does fescue contribute to nest failure? The researchers point to earlier studies demonstrating that tall fescue hosts fewer insects than other types of vegetation. With less food around their nests, birds may be forced to make more feeding trips, attracting the attention of potential predators with every flight.\n\nFescue was also associated with nest parasitism by cowbirds, the most common avian parasite in North American grasslands. Cowbirds never build their own nests; instead, they lay their eggs in existing nests of other bird species. When a mother dickcissel finds a cowbird egg in her nest, she cares for it as one of her own, leaving fewer resources for her biological offspring. The researchers aren't sure why fescue affected parasitism, but parasitized nests in the study had fewer dickcissel eggs, failed more frequently, and produced fewer dickcissel fledglings.\n\nZooming out, the researchers looked at the role of large-scale landscape changes on nest survival. They mapped the presence of row crops and forested areas near their study sites, and found that dickcissel nests near forested areas were less likely to be parasitized.\n\n\"We think the cowbirds were laying their eggs in the nests of woodland birds instead. It was surprising, because dickcissel nests are usually their favorite,\" Maresh Nelson says.\n\nNests near row crops were slightly more at risk of failure, possibly due to greater nest predation by mammals such as raccoons that spend time near crop fields as a food source. But Maresh Nelson says that result wasn't entirely clear. \"It seems like vegetation right around the nest is more important for survival than the large-scale context.\"\n\nThat ability to rank the relative importance of habitat factors influenced by human activity is one of the things that makes the study unique. And it allows the researchers to make nuanced recommendations to landowners and land managers.\n\n\"For people investing in land for conservation purposes, the landscape around the grassland may not be quite as important as what's actually in it, in terms of nest survival. But if they have the option to invest in land near a woodland, that could reduce nest parasitism and benefit the grassland species, although that's complicated since some predators may be more abundant near woods,\" Maresh Nelson says. \"It's really important that we maximize the ability of the few remaining grasslands to provide for the species that depend on them.\"\n\n\nThe article, \"Contrasting impacts of invasive plants and human-altered landscape context on nest survival and brood parasitism of a grassland bird,\" is published in Landscape Ecology [DOI: 10.1007/s10980-018-0703-3]. Authors include Scott Maresh Nelson, Jaime Coon, Courtney Duchardt, James Miller, Diane Debinski, and Walter Schacht. The research was supported by the U.S. Fish and Wildlife Service, the USDA's National Institute of Food and Agriculture, the Garden Club of America, and Sustainable Agriculture Research and Education, North-Central Region.\n", "pred_label": "__label__1", "pred_score_pos": 0.7454014420509338} {"content": "SPONSOR: Schneider (Hosmer)\n\nCOMMITTEE ACTION: Voted \"do pass\" by the Committee on Criminal Law by a vote of 16 to 0.\n\nThis substitute makes changes to laws concerning crimes and punishments. In its major provisions, the substitute:\n\n(1) Specifies that a state offense cycle number (OCN) must be supplied or approved by the Highway Patrol, and defines the \"Missouri charge code\" as a unique number assigned by the Office of State Courts Administrator to each offense for tracking purposes. The substitute requires the Department of Corrections to supply the central repository with all legal name changes, in addition to information that must already be updated (Sections 43.500, 43.503, RSMo);\n\n(2) Makes gamma hydroxybutyric acid (GHB) a Schedule I controlled substance, except in circumstances where GHB or its derivatives have been approved for medical use, in which case it is a Schedule III controlled substance. The substitute also makes ketamine and its derivatives a Schedule III controlled substance and removes it from the list of Schedule IV substances (Section 195.017);\n\n(3) Establishes an affirmative defense to the crimes of abandonment of a child in the first degree and endangering the welfare of a child in the first and second degree if a parent leaves a newborn in the custody of a licensed medical facility, the newborn is no more than 30 days old, and the newborn has not been abused (Section 210.950);\n\n(4) Requires the State Board of Probation and Parole to provide probation services for offenders convicted for criminal nonsupport when charged as a class A misdemeanor. Currently, the board only provides probation services for criminal nonsupport offenders when charged with class D felonies (Section 217.750);\n\n(5) Allows regional jail district commissions to submit an order for an additional sales tax to provide jail services, court facilities, and equipment for the region if voted on by the district (Section 221.407);\n\n(6) Requires a check for outstanding warrants of all prisoners about to be released. If outstanding warrants exist, the prisoner may not be released and the jurisdiction issuing the warrant must be informed (Section 221.510);\n\n(7) Clarifies that \"secure facilities\" for persons acquitted due to mental disease or defect include the Marshall Habilitation Center. The substitute also states that parents or guardians of committed persons may appeal any transfer to the Marshall Habilitation Center (Sections 552.020 and 552.040);\n\n(8) Includes juvenile officers among those protected under provisions concerning the crime of tampering with a judicial officer (Section 565.084);\n\n(9) Makes it a class D felony to knowingly engage in sexual conduct with an animal, or knowingly cause another to engage in sexual conduct with an animal for sexual gratification (Section 566.111);\n\n(10) Creates the crime of leaving a child unattended in a motor vehicle. The crime is committed in the first degree when a child who is 10 years old or younger is knowingly left unattended in a motor vehicle and fatally injures another person with the vehicle. The crime is committed in the second degree if the child injures another person with the vehicle. Knowingly leaving a child unattended in the first degree is a class C felony. In the second degree, the crime is a class A misdemeanor (Section 568.052);\n\n(11) Creates the crime of an unlawful drug transaction with a child, defined as a person less than 17, and makes it a class A felony. Ignorance as to the age of the child is not a defense (Section 568.072);\n\n(12) Makes it a class B felony to buy or sell or attempt to buy or sell any person less than 18 years of age (Section 568.176);\n\n(13) Increases the penalty for aiding in the escape of a prisoner being held in custody or confinement on the basis of a felony charge or conviction from a class D to a class B felony (Section 575.230);\n\n(14) Allows the court, after considering all the circumstances, to close to the general public and law enforcement agencies certain criminal and juvenile records. Knowingly failing to close or releasing closed information is a class B misdemeanor. Knowingly using closed records is a class D felony (Sections 610.122, 1, 2, 3, 4, 5, and 6);\n\n(15) Requires the Highway Patrol to develop, operate, and maintain an information system for the storage and analysis of Highway Patrol and other, self-reported, law enforcement agency incident and arrest reports. Data included must also address activity relating to the distribution of methamphetamine and other illegal drugs (Section 650.400); and\n\n(16) Requires the Highway Patrol to provide information to the national systems and annually publish a report to the Governor and the Department of Public Safety. The penalty for violation of these provisions is potential ineligibility for state and federal funds (Section 650.403).\n\nFISCAL NOTE: Estimated Net Cost to General Revenue Fund of $2,296,323 to Unknown in FY 2001, $1,978,281 to Unknown in FY 2002, and $2,020,830 to Unknown in FY 2003. Estimated Net Cost to Criminal Record System Fund of $284,118 in FY 2001, $598,198 in FY 2002, and $613,187 in FY 2003.\n\nPROPONENTS: Supporters of SB 530 say that there are presently facilities in Marshall that are available for housing defendants who are acquitted due to mental disease or defect. Transferring these defendants would be beneficial because other facilities in the state are not as secure, and communities often do not want to house the defendants.\n\nTestifying for the bill were Senator Schneider; ARC of Missouri; and Office of the Attorney General.\n\nOPPONENTS: There was no opposition voiced to the committee.\n\nSarah Madden, Legislative Analyst", "pred_label": "__label__1", "pred_score_pos": 0.9753067493438721} {"content": "Southern California Edison said Monday it has signed a 20-year contract with DCE, an affiliate of Caithness Energy, to provide up to 909 megawatts of wind power.\n\nOnce completed, the Caithness Shepherd's Flat project will be one of the world's largest fully permitted wind farms, according to SoCal Edison, a division of Rosemead-based Edison International. Financial terms were not disclosed.\n\nThe project involves installation of 303 wind turbines across 30 square miles in north-central Oregon in 2011 and 2012. It's expected to generate 2 billion kilowatt-hours per year of renewable energy. The project requires no additional or upgraded transmission lines, Edison said, which will significantly lessen the time it takes for the power plant to come on line.\n\nStuart Hemphill, the utility's vice president for renewable and alternative power, called the contract \"a crown jewel in our renewable energy portfolio.\"\n\n\"The project is attractive to SCE because of its size, near-term delivery and its competitive price,\" said Hemphill in a statement.\n\nCaithness Energy, based in New York City, is privately held independent power producer which focuses on renewable geothermal, wind and solar power projects, but also has some coal plants it terms environmentally friendly.\n\nFor reprint and licensing requests for this article, CLICK HERE.", "pred_label": "__label__1", "pred_score_pos": 0.9953109622001648} {"content": "Aside from seeing a confused frown, another great way to see that a book isn’t readable for young children is if it doesn’t have the appropriate Spache grade. But what’s Spache, where did it come from and why is it so important?\n\nWhat is a Spache score?\n\nSpache is a readability test for English best for texts up to fourth-grade level. For grading texts aimed at older children for readability, the Dale-Chall test is more suitable.\n\nAs it is such a specialist tool meant for a specific age group, it is not really suitable for general readability use. For this reason, we don’t include it in our primary selection of algorithms we use to calculate our unique and reliable score.\n\nHowever, our tool lists the Spache score for your text separately on a list of more specialist readability scores.\n\nWhether you’re a teacher or a budding children’s author, you can use our tool to keep your young readers’ best interests.\n\nWhere did the test come from?\n\nSpache was introduced by George Spache in 1952 in The Elementary School Journal. It’s a word-list style of formula which compares the words in a text to a set list of everyday words, which someone up to fourth grade generally can understand.\n\nThe formula was introduced by Spache in a journal article named ‘A New Readability Formula for Primary-Grade Reading Materials.’\n\nHe created the formula in response to many previous frameworks being formulated for the evaluation of material written for adults. Spache saw a neglected age group which needed to be accounted for.\n\nHe notes in the paper that there are other frameworks for analyzing below grade four, but that they’re too complicated to use.\n\nLike us, he believed in innovating a way to make readability calculations quick and easy. Our tool, ReadablePro, makes it easier than ever to grade your text for readability.\n\nHow does the test work?\n\nThe variables in Spache’s formula are\n\n • Sentence length\n • Unfamiliar or difficult words\n\nThe formula is calculated as follows:\n\nSpache readability formula\n\n\nFor your reference, here is the revised Spache word list. These are measured against the words used in the text in question. This allows for analysis of familiar versus unfamiliar words.\n\nOriginally, the formula collected data from a sample of 100-150 words.\n\nFor a longer text, this would have been tricky to calculate. Luckily, we can now automate the calculation. ReadablePro analyzes based on the entire text.\n\nThe calculation is a grade level based on the ASL - average sentence length - and PDW - percentage of difficult words.\n\nAfter the original word list, Spache published a revised version - which we use today. The revised version was created in 1978. This is what he had to say about this decision:\n\n“If a readability formula is to continue to reflect accurate estimates of the difficulty of today’s books it, too, must change.”\n\nThis shows his desire to keep up with the times and maintain his formula for contemporary use. Readability formulas like this aren’t static - they must evolve with time and changing conditions.\n\nIn a similar mindset, we are continually making improvements to ReadablePro and the more feedback we get from our users, the better.\n\nIf you have any ideas of features you’d like to see, please don’t hesitate to get in touch.\n\nWhen is the Spache Readability Formula most useful?\n\nWe have previously discussed the importance of reading to children. The daily practice of this is extremely beneficial for parent-child bonding as well as helping children to develop early literacy skills.\n\nIt is useful, therefore, for parents to know that reading books with the appropriate rating will be comprehensible for their child. They will be able to fully understand the text until they’re ready for their next challenge.\n\nBut reading doesn’t of course stop at home. Spache is also invaluable for teachers.\n\nThis is because the Spache scoring on ReadablePro will quickly and easily tell you useful information such as the longest sentence in the text. It will also tell you how long the text would take to read.\n\nAs a case study, I uploaded a pdf copy to ReadablePro for analysis with the view of scoring it for a Spache grade. I wanted to confirm that The Lion Who Wouldn’t Try by Liza Esterhuyse is a suitable text for a child up to fourth grade.\n\nFirstly, I uploaded the PDF copy to ReadablePro’s ‘score a file’ section. The file uploaded quickly and a few moments later I was emailed a link to view my file.\n\nI then clicked ‘edit text’ to remove the eBook’s disclaimers. Once I had an accurate sample of the text, I looked at my results.\n\nBeing a children’s book, I was unsurprised to see that the overall readability rating was ‘A’.\n\nThe Spache score for The Lion Who Wouldn’t Try is 3.3.\n\nThis is great because it confirms for me that the book is below grade-four level. Which means it’s a great book for a small child’s library.\n\nI was quickly able to retrieve other valuable information:\n\n • The speaking time is two minutes and ten seconds.\n • The text composition section lets me know via its statistics that the book is mostly comprised of nouns and verbs, so should not be complicated to understand.\n • The longest sentence is only eight words, so sentence length is also not too challenging for a very young reader.\n\nWith this being said, there is also a Word List Tools feature available. This allowed me to highlight all the words in the text which are not on the Spache list. This allows me to anticipate where there might be some problem words to overcome.\n\nIf you’re reading for or writing to young children, Spache will quickly and accurately tell you whether or not you’re speaking their language.\n\nLaura Kelly\n\nLaura is a content writer and customer success champion at Readable. She's a Literature MA graduate who loves poetry, a good coffee and 35mm photography.", "pred_label": "__label__1", "pred_score_pos": 0.9798119068145752} {"content": "Three suspects were sentenced by the court in Yingze District, Taiyuan City, Shanxi Province for manufacturing and selling scalper software, the 21st Century Business Herald reported. It was the first case in China where scalpers received jail, the report said.\n\nScalper software breaks into the computer information system of online shopping sites and evades security measures to achieve automatic login, order and payment. It seizes the orders of other normal users, and then resells them for profit.\n\nIt is reported that Ren and Zhang made 110,000 yuan (US$16,564) in illegal profit by using scalper software on Taobao, while Chen made a total of 6,000 yuan in profit by selling the software.\n\nThe behaviour violated the security of the computer information system, and also was in contravention of the fair market order, the report said.\n\nAt present, regulatory measures on malware and other harmful softwares are not perfect, but only by forming a multi-lateral synergistic crackdown can the country achieve positive results, the report added.", "pred_label": "__label__1", "pred_score_pos": 0.807012140750885} {"content": "0 Items - €0.00\n\nICONFIT Soy Isolate 90, 800g\n\nAvailability: In stock\n\n\nPure premium ICONFIT Soy Isolate. Massive 90% protein content and unbeatably best price for plant based protein.\n\n\n\n\nIngredients: Soy protein isolate. No additives. GMO free! Origin China, quality double-checked in Europe.\n\nNB! Soy isolate makes a thicker mass when mixing with water so use more liquid than compared to whey proteins. Flavour to taste.\n", "pred_label": "__label__1", "pred_score_pos": 0.790483832359314} {"content": "\n\n“Behold, I stir up the Medes against them, Who do not value silver Or delight in gold.” Isaiah 13:17 (The Israel Bible™)\n\n\nSaudi facilities hit. Source: Houthi-controlled al-Masirah TV.\n\nThe USS Abraham Lincoln carrier strike group is already in the area, and the crippling U.S. sanctions will continue. In Iran, the top echelon of the regime headed by Supreme Leader Khamenei is preparing public opinion for an ongoing confrontation with the United States—the “Great Satan”—and particularly for the anticipated economic hardship, framing it as part of what the regime calls the “struggle economy.” In reality, the economy keeps deteriorating rapidly, with growing shortages and skyrocketing prices of consumer goods.\n\nIn the regional arena as well, tensions are mounting. On May 14, 2019, the Yemeni Houthis—who are under Iran’s influence in Yemen—used seven GPS-guided unmanned aerial vehicles (UAV) to attack the Aramco East-West pipeline’s pumping stations in Saudi territory in the Dawadmi and Afif regions.\n\nA United Nations report submitted to the U.N. Security Council in January 2018 found compelling evidence that Houthi-made “Qatef” drones had an almost identical construction and capabilities as the Iranian “Ababil” UAV.\n\nOn May 12, 2019, Saudi, Norwegian and UAE oil tankers were sabotaged near the shore of the Fujairah emirate in the Gulf of Oman.\n\nMiddle East oil facilities vulnerable to Iranian attack: No. 1 is the East-West Saudi pipeline. In the inset, No. 7, is a map of the Habshan-Fujeirah pipeline that bypasses the Strait of Hormuz.\n\nIn both cases, Iran signaled that amid the tightening sanctions and deepening economic crisis it is capable of pinpoint strikes on sensitive oil infrastructure in the Persian Gulf and the Gulf of Oman, as well as in the heart of the Saudi oil industry.\n\nThe attack on the Aramco oil infrastructure highlights the persistent threat of Houthi unmanned weapon systems targeting vital onshore and offshore Saudi and Saudi-affiliated sites.\n\nThe targeted pipeline was built during the Iran-Iraq war as an alternative for Saudi Arabia should the Strait of Hormuz be blocked. The oil terminal at the port of Fujairah where Saudi tankers were sabotaged is another such alternative.\n\nThe message sent to the UAE and/or Saudi Arabia by these attacks was thus that “we know where your vulnerabilities are.”\n\nThus, the attacks near the port of Fujairah and in Saudi territory are symbolic. The Emirates serve as an outlet for an oil pipeline that bypasses the Strait of Hormuz and originates in Habshan in Abu Dhabi. As for the drone attack, it marks the first time that the Houthis—aided in their use of missiles and drones by Iran’s Islamic Revolutionary Guard Corps (IRGC) and Lebanese Hezbollah—have hit a target nearly 500 miles from the Yemeni border (assuming the drones were not launched from Saudi territory).\n\n“The armed forces of Yemen carried out an operation deep in Saudi territory.” Source: Tasnim News Agency.\n\nSignificantly, after the latest incident the Tasnim News Agency, which is affiliated with the IRGC, published a cartoon that glorifies the Houthis defeating Saudi Arabia.3 In the cartoon: a traditional Houthi dagger (jambiya) with a hilt in the form of a drone breaks the Saudi sword.\n\nThe Houthis have attacked Saudi Arabia and the UAE with drones and missiles in the past. In July 2018, a drone exploded at Abu Dhabi airport causing minor damage and sending a strong message to the UAE, which plays a dominant role in the southern parts of Yemen. In January 2019, a senior intelligence chief and senior officials were killed at the al-Anad air force base just outside Aden by a weaponized drone that exploded above them as they attended a military parade.\n\nGiven the recent incidents in Fujairah and Saudi Arabia, if the United States or one of its regional allies reveals clear intelligence that Iran was behind the attack on the Saudi tankers, it could lead to the deployment of military escorts for commercial vessels in the region. That, in turn, could augment the frictions with the Iranian naval presence and provoke a further escalation, to the point of limited hostilities between Iran and the United States.\n\n[wpipa id=”94167″]\n\nThe most dangerous situation the Islamic Revolution has ever known\n\nMeanwhile, the IRGC’s new commander, Hossein Salami, said on May 15, 2019: “Today, our enemies, by applying the maximum pressure strategy and using all their capacities, are trying to break the steadfastness of the Iranian nation, but they will fail.” He added that Iran’s enemies are unaware that the resilience, determination and honor of the nation form its protective shield.\n\nSalami, who is known for his scathing remarks about the United States and Israel, called the current situation the most dangerous and sensitive one that the Iranian Islamic Revolution has ever known and said Iran was at the brink of an all-out confrontation with the enemy. He claimed, however, that Iran’s enemies had exhausted all their resources and, despite their steadfast demeanor, were falling apart internally and on the way to being vanquished by Iran.\n\nIranian Defense Minister Amir Hatami likewise declared: “Iran stands at the peak of defense-military preparedness to counter any threat or act of aggression,” and that it would defeat the U.S.-Israeli alliance. Hatami emphasized the fact that last year, despite the difficult conditions it is facing, Iran did not neglect military development, buttressing its power of deterrence.\n\n“Negotiations Are like a Poison”\n\nMeanwhile, Iran’s Supreme Leader, Ayatollah Ali Khamenei, met with senior officials and again rejected any possibility of negotiating with the United States. “As long as the United States is what it is now,” he said, “negotiating is but poison, and with this current administration that poison is twice [as lethal].”\n\nFars News cartoon implies that the “war-mongering” Zionist regime is behind the attack in Fujairah. Source: Fars News.\n\nIn a wide-ranging survey of the difficult history of Iran’s relations with the “Great Satan,” he asserted that “the U.S. leaders serve the interests of the Zionist regime more than any other country.” Khamenei also elaborated on the United States’ domestic difficulties, which, he said, were leading it to externalize its problems and look for enemies.\n\n“Negotiations,” Khamenei said, “entail exchanges, give and take, but all that interests the United States is power. They say, come, let’s discuss your defensive capabilities and the reasons that you are developing missiles of certain [long] ranges; reduce the range of the missiles so that if we hit you, you won’t be able to hit back. Come, let’s discuss your strategic influence in the region, which means ‘Give it up.’”\n\nKhamenei added, “Negotiations are like a poison as long as the United States behaves as it behaves, and given the current [Trump] administration—which is not decent and does not obey any law—the poison is especially strong, and as a result no noble and wise Iranian will negotiate over his advantages … Not one of our clever people is looking for negotiations.”\n\nKhamenei repeated his assessment that a war between Iran and the United States is unlikely.\n\n“This is not a matter of a military confrontation between the two countries since war is not in the offing … We do not want a war, and neither does the United States, which knows it does not stand to gain anything from a war. This is a struggle of aspirations and values, and Iranian willpower is strong because Iran puts its trust in Allah. The boastful and bullying enemy has no real strength.”\n\nReferring to Washington’s calls for Iran to change its policy, Khamenei said that Iran’s behavior has indeed changed, and “the Iranian people now hate the United States more than ever, and it can no longer interfere in their affairs.”\n\nSource: Fars News.\n\nThe Supreme Leader’s forthright statements came in the wake of U.S. President Donald Trump’s offer to negotiate with Iran and his provision to the Swiss of a phone number the Iranians can use to call him directly. Trump’s proposal earned him derisive cartoons in most of the Iranian media. In this Fars cartoon, Trump holds a “telephone carrier” and says, “I want the Iranians to call me, but John Kerry is telling them not to call.”", "pred_label": "__label__1", "pred_score_pos": 0.7325807809829712} {"content": "Descriptive dialogue, innovative imagery: Craig Middle School 8th-grader’s winning essay examines writing tools |\n\n\nCraig Press staff report\nStudent work celebrated at Craig Middle School literacy night and in print in the Craig Press.\nStock image\n\nCRAIG — Students at Craig Middle School were recently recognized for their efforts in writing poems and essays.\n\nCMS eighth-graders diligently worked on developing literary essays in which they had to identify themes in their favorite novels and short stories. Students also learned how to develop an argument and use textual evidence to support their claims with regard to the themes they have identified.\n\nSadie Smilanich’s piece was named the top work, comparing and contrasting elements of the novel “A Night Divided” and the short story “Charles.”\n\nOn Dec. 19, parents were invited to Literacy Night to celebrate the hard work and achievements of students. Students received extra credit in their language arts class for attending.\n\nEnglish language arts instructors also selected the top poems, written by sixth- and seventh-grade students.\n\nEditor’s note: Student work is shared unedited to reflect their original writing. \n\nAuthor’s Craft\n\nSadie Smilanich\n\nIn every book, text, or story, the author uses certain language to create a mood or tone for the reader. It is the author’s purpose to create a story using literary elements to form an interesting story.\n\nJennifer Nielsen, the author of A Night Divided, uses several literary elements to construct a story for her readers, but imagery and dialogue for some of the strongest shown throughout the book. These literary elements also appear in short story titled “Charles” written by Shirley Jackson. These two elements create a crystal clear image of the scenes throughout the book, and when they are combined and used together, it creates a fantastic story.\n\nHowever, an author can choose to use one element more than the other to help generate a story. This is the case for both the authors of the book, A Night Divided and the short story, “Charles.” Nielsen decides to use imagery throughout her book to form a picture for her readers, while Shirley Jackson uses more dialogue which helps the readers understand what the characters are like.\n\nBoth books share similarities and differences, even though the books have completely different storylines.\n\nThe book, A Night Divided, is a historical fiction book, which means it is about something that has happened in history, but adds some fiction into it. This book takes place in Berlin, Germany in 1961. The main character is Gerta, and her brother and mom are living in the East side of Berlin, while Gerta’s father and other brother are in the West side. Overnight, the German soldiers built a wall to stop immigrants from going to the West side. The story is about Gerta trying to reunite with her family, but in order to do so, she just put her own life, and others in danger.\n\nOn the other hand, the short story, “Charles” is about a boy named Laurie who starts kindergarten and when he comes home, he tells his parents a story of a boy named Charles. A time in the story when he comes home telling the story in a page 73, “Well, Charles was bad again today.” He grinned enormously and said, ‘Today Charles hit the teacher.” However, in the end, the mother finds out that Charles is a fictional character created by Laurie. Charles was just a cover up for all the terrible actions done by Laurie, so he wouldn’t get in trouble.\n\nEven though these stories have very different storylines, there are also some similarities between the two texts.\n\nThe author’s use of symbolism is a huge similarity between the two texts. These texts both have a symbol that help create the theme for the acucal story.\n\nA symbol in the book, A Night Divided, is the wall that separates East and West Berlin. To the westerners, the wall was a huge symbol that separated the communist East, and the capital West. To the easterners, the wall separated families and the citizens knew that they had to escape in order to reunite. The wall challenged the citizens that were living in the East because they had to risk their lives if they ever wanted to see their family again. This was the case for Gerta, when she wanted to reunite with her family. On page 91, Gerta begins to dig a tunnel you going to an old abandoned building near the wall for her start spot. “After choosing my starting place, I raised the shovel, stuck the tip of the blade into the dirt, and crunched my foot down on the blade’s shoulder.” When Nielsen used this symbol, it helped me understand how the characters felt about the wall, what it truly meant to them, and why they wanted to escape so badly.\n\nSymbolism can also be shown in the short story, “Charles”. The author of  “Charles” uses symbolism throughout her text by creating a character named Charles. Charles is a fictional character created by Laurie to cover up all his lies that he was telling his parents. A time in the text when I think Laurie’s story was a little suspicious was when he came home late one day. On page 74, the text says, “Charles yelled… so Charles had to stay after school. And so all the children stayed to watch him.” When the author used Charles as a symbol, it helps me understand why Laurie was lying, but also why other people lie in real life. Laurie changed because of Charles because he started to talk to his parents about his day, and he became more polite and understanding when talking to them. I think he started to act this way because he didn’t want his parents to think that it was Laurie getting in trouble.\n\nBoth the authors use dialogue and imagery to explain the events that are happening throughout the stories. The literary elements help the reader understand how the characters truly feel. Both the authors use symbolism and literary elements throughout their stories. However, certain literary elements are used more in more story than the other, creating different moods.\n\nThere are many literary elements that authors can use to create a perfect image for their readers.\n\nThe authors of the two stories, A Night Divided, and “Charles” use several literary elements throughout their stories, however one literary element is used more than the other. An example of this is in the book, A Night Divided, which uses a lot of imagery to help the reader understand the events and creates a mood for the reader.\n\nAlthough the author of “Charles” uses imagery, she uses a lot of dialogue to make the reader understand what the character is feeling, which helps set the mood for the book.\n\nA time in the book, A Night Divided when the author used imagery to explain a certain scene was on page 91. Jennifer Nielsen uses certain language to create a mood for the reader. A time in the book when she gave very good description of the scene was when Gerta started to dig a tunnel. “After choosing my starting place, I raised the shovel, stuck the tip of the blade into the dirt, and crunched my foot down on the blade’s shoulder.” When I read this scene, I could really picture what everything looked like, and I could feel how determined Gerta was to get to her family. The Nielsen uses very descriptive language like “crunched” throughout her story to create a mood for both the book and the reader.\n\nHowever,  Shirley Jackson who wrote “Charles” used dialogue to make the reader feel like they were in the characters shoes. An example of the author using dialogue was on page 77, when Laurie’s mother wanted to meet “Charles” mother by asking the teacher about her son. The text said, “After the meeting, I identified and sought out Laurie’s kindergarten teacher. ‘We had a little trouble adjusting the first week or so.’ ‘I suppose this time it’s Charles influence’ ‘Charles?’ She said. ‘We don’t have any Charles in kindergarten’”. By using dialogue for this certain scene, it makes the reader feel all kinds of emotions and they can imagine what the characters are feeling. The reader feels all the emotions because this scene was at the end, and after reading all of Laurie’s stories about “Charles”, this is the scene were the reader realizes that it was all a lie.\n\nAlthough the two stories use symbolizing, they use different literary elements.\n\nSymbolism, and other literary elements such as imagery and dialogue both appear in the text, A Night Divided, and “Charles.” However, the authors use them in different ways to construct the story and the mood for the reader.\n\nThere are many different ways that readers can view a story, and they can picture in their own way. However, when the author uses literary elements to explain what is going on, it can really helped the reader to feel a certain way.\n\nUsing imagery and dialogue together in a story makes to storyline stronger, and easier to understand.", "pred_label": "__label__1", "pred_score_pos": 0.9970980882644653} {"content": "curator (from Latin: cura, meaning, “to take care”) is a manager or overseer. Traditionally, a curator or keeper of a cultural heritage institution (e.g., gallery, museum, library, or archive) is a content specialist charged with an institution’s collections and involved with the interpretation of heritage material.\n\nThere are different types of curators. Depending on where you work as a curator, this will influence the degree. Here are the two most common places that employ the services of a curator.\n\n\n\nMuseum Curator\n\nMuseum curators are responsible for a museum’s collection, including acquiring pieces and maintaining the exhibits. These professionals may also perform research and write pieces for professional journals. In general, there are two different types of curator jobs. General curators are responsible for the entire museum, while section curators are responsible only for one specific area.\n\nIn addition, they oversee museum collections by managing the acquisition, preservation, and display of museum artifacts. Curators may also be in charge of authenticating the age and origin of pieces. They may consult with the museum’s board of directors who are responsible for fundraising, public relations, and site management. In this role, the curator might be required to present budget figures for the prospective purchase of display items in the museum.\n\n\nA Bachelor of Arts (BA) or a Bachelor of Fine Arts (BFA) may be sufficient academic training for positions in smaller museums. The courses you take for a career in museum work depends on both the type of work you want to do and the type of institution you work as a curator.\n\nA degree in museum studies is another option. However, few schools offer bachelor’s degrees in museum studies. Instead, students choose majors or minors in related fields, such as art history, history, or anthropology. Internships are generally required. These provide a means to gain valuable experience.\n\nWhen offered, a Bachelor of Science in museum studies is a technically-based undergraduate program that prepares you for careers in museums, archives, libraries, historical societies, historic sites, historic houses, and photography collections. Upon graduating, you will be versed in the history, theory, and practice of institutional collecting.\n\nA B.S. degree in museum studies also prepares you for graduate study. The undergraduate coursework prepares you for a Master of Arts in museum studies, art history, or arts management. Other degree possibilities are a master of library and information science degree.\n\nTo become a curator at a national museum, like the Smithsonian in Washington DC, a Ph.D. is required, in conjunction with five-years field experience. Graduate degrees will include advanced coursework in art history, curatorship, history, chemistry, and business administration. As well, most curators perform continuing education by conducting research, attending conferences, and publishing academic articles.\n\nart curator pix\n\n\nArt Curator\n\nYou may start in the profession as a curatorial assistant. She/he provides support to curatorial projects initiated within the department. This includes gathering and analyzing art historical and scholarly texts, visual and object location information and budgetary data.\n\nAdditional duties include coordinating and corresponding with artists, dealers, lenders, art institutions, and collectors. You could also be tasked with preparing loan forms and master checklists, updating and keeping accurate records, scheduling the exhibition calendar and travel itineraries, and assisting with exhibition layout plans.\n\n\nIt is mandatory for a Curatorial Assistant to have a Master of Arts in art history. Some art museums may require a doctorate even for an assistant. For example, a job posting in Glassdoor for an assistant curator at the Dallas Museum of Art in the Islamic Art department requires a Ph.D. Candidates must have this degree in Art History or comparable field (Anthropology or Archaeology), with a specialization in North America, Mesoamerica, Central America or the Andes.\n\nNot all jobs demand a Ph.D. There are other job postings seeking candidates with a Bachelor’s degree in Art History, museum studies, or related field. This particular job is for a Curatorial Administrative Assistant. The particular position entails providing administrative support to the Curator of Asian Art in programs and projects related to the Curatorial and Exhibitions departments.\n\nA typical Bachelor of Arts in Art History studies the global history of art from ancient times to the contemporary. Courses examine art history from a wide variety of cultures, periods, and geographies through multiple approaches and methodologies. Subjects might include Egyptian Art, Greek Sculpture, Art of Italian Renaissance, Art of the 20th Century, and more.\n\n\nThe U.S. Bureau of Labor Statistics (BLS) lumps the occupations of archivist, curator, and museum worker together. The BLS reported the median salary at $47,360 as of May 2017 with a faster than average growth rate of 13%. According to the BLS, archivist, curator, and conservator positions often require a master’s degree related to the position’s field. Museum technicians typically have a bachelor’s degree.\n\nThe Art Career Project site reported the median annual salary for a museum curator at $51,520 in May 2015. Those just starting out may earn as little as $25,970, but curators with years of experience on the job can earn as much as $83,940.\n\nThis is comparable to the median salary for art curators, as reported by Glassdoor. Their compilation of 164 curator salaries was $52,031 as an average.", "pred_label": "__label__1", "pred_score_pos": 0.9993763566017151} {"content": "Labour costs to go up faster in 2019: MAS\n\nBusiness, services costs may rise on productivity woes, despite softer wages\n\n\nULC, which measures the cost of labour for each unit of economic output, is tipped to pick up - despite milder wage growth - as productivity slackens, according to the latest half-yearly economic review from the Monetary Authority of Singapore (MAS).\n\nProductivity growth", "pred_label": "__label__1", "pred_score_pos": 0.9742612242698669} {"content": "Wearing the 5K’s (Kara, Kesh, Kirpan, Kacheras, Kanga)\n\n\nWhen Guru Gobind Singh gave the gift of the Five K’s to the Khalsa he did so with a promise; that by following the teachings of the Guru and keeping ourselves distinct, we will have his undying power and support. These five tools, along with our daily sadhana, allow us to maintain our grace. dignity and attitude of service through all pressure of time and space.\n\n\n(pronounced Kaysh) is uncut hair, is kept intact, as given by the Creator. To keep it is a sign of the Sikh’s acceptance of the Will of God, and a symbol of recognition of God’s Wisdom in creating the human in the form in which s/he was created. Hair has a function given by the Creator, which scientifically can be understood as an antenna for transmitting energy from the cosmos to the individual. As an antenna for bringing solar energy to the brain, hair is important in preserving mental stability. Kesh relates to the element of ether.\n\n\nIs a wooden comb which is worn in the hair at all times. The hair is made of the purest protein in the body. It channels the etheric energy into the body through the solar center at the top of the head. The kanga is a tool for keeping the hair beautiful and bringing energy into the body. When Siri Singh Sahib Harbhajan Singh Khalsa Yogiji was asked why we wear the kanga, he said, “Guru Gobind Singh was the most scientific of all scientists. He gave you the wooden comb so that you would create your own electric energy for your brain by combing with wood. The kanga is for whenever you feel low on energy. Just comb your hair with it right there on the spot. It works much faster than you can imagine to revitalize your energy. The kanga is a very virtuous thing.” When one combs the hair, (ether) with the kanga (earth), akaasha (heavens) and earth meet.\n\n\nIs an iron bangle which represents prana (life force) and Infinity. It is worn on the right hand of the male and the left hand of the female, as a reminder to dedicate all one’s actions to the service of the One Creator. The steel is a reminder that as a Sikh, one’s steel, one’s strength of commitment, will be tested; the steel metal itself is a conductor of the energy which gives courage and fearlessness to the wearer. Kara relates to the element of air.\n\n\n(or “kacha”) are cotton undershorts which is a symbol of chastity and purity. Calcium is controlled by the thigh bone through its sensitivity to temperature. The kachera keeps a warm mantle of air surrounding the thigh and protects it against sudden temperature changes. The kachera maintains the polarity of the second chakra in relation to ida and pingala, the left and right polarities of the human energy system. Kachera relates to the element of water.\n\n\n(sword).  As Guru Gobind Singh explained to Bahadur Shah, (the Mughal Emperor) it is an emblem of dignity, power and self-respect. It is not just a “sword,” but a combination of “kirpa” (kindness) and “aan” (dignity). Guru Gobind Singh explained that while the sword is used in anger or to take revenge, the kirpan is used in grace and dignity to protect the honor of one’s self or of those who cannot protect themselves. As a symbol, it inspires respect for weapons and the highest sense of responsibility to God, Guru and humanity. The Sikh is God’s own soldier-saint, and their sword is used only as a last resort when all other efforts towards achieving peace and right actions have been exhausted. One is a saint first, but when one’s sainthood is attacked, one must be a soldier. Currently, in situations in which it is illegal to carry a sword, one can carry a small symbolic kirpan. Kirpan relates to the element of fire.\n(An excerpt from “Victory & Virtue” published by Sikh Dharma International)\n\nVisit our marketplace to purchase any of the 5 K’s and the book “Victory and Virtue”\n\nPost navigation", "pred_label": "__label__1", "pred_score_pos": 0.9800589680671692} {"content": "A great way to meet someone new is to become a teacher. Sharing your expertise provides an opportunity to share your strengths and help others to grow. Attend a conference or workshop or class. It provides a great opportunity to meet others and learn new information. Schedule coffee or lunch times to socialize with old friends or meet successwith colleagues. Successful people realize the importance of introductions. It’s a simple thing to do but helpful to others. Follow through. Maybe you’ve met someone you like but never followed through to them. Make an effort to follow through.\n\nIntroverts. Introverts should have low expectations as they find interactions with unknown people as stressful. Anticipate having a good conversation. Never make a cold call to someone you just met without such a discussion. Making contact with someone out of the blue is uncomfortable for them. If you are attempting to make contact, don’t give up, but don’t try more than three times by calling, emailing or letter if they don’t get back to you. Successful people are usually busy. Pat yourself on the back and move on when dealing with rejection. Don’t let the sting of rejection stop you as there are plenty of other people to meet. And it’s okay to say no if you meet someone and you don’t hit it off. It’s okay to say no if you don’t feel like continuing a relationship. Don’t get sucked into a bad relationship. Meeting people is all about practice and the more people you meet the more you will get in the habit and feel less uncomfortable and awkward. Be yourself and enjoy others rather than worrying about entertaining them.\n\nFail more to live more. This book was written with the hope that it would help people lead more fulfilling lives, pursue what they enjoy, engage in meaningful work and embrace new experiences and the unknown. This approach provides a simple way to transform your life through small immediate actions. Embrace failure rather than resist it as every moment provides an opportunity to learn, grow, get involved, create and feel connected. Have fun failing. The more you fail the more you’ll live and desire a wonderful life.\n\nRemember the fun factor by doing what you love. Capitalize on unexpected opportunities. Set aside time for pleasure. Do it badly as fast as you can. Successful people have a knack for performing poorly and seek out opportunities to face the limits of their skills and knowledge to encounter the unknown and learn. Find something you have been meaning to do and do it right away. Break from your routine and you will encounter new opportunities and new ideas when you’re doing new things. Step out of your usual habits and thinking patterns to experience new possibilities. Successful people have a lean approach to planning. They take small steps without the need for a long-term commitment. Focus on what you can do today and take a small immediate step to your goal. Do it anyway as it’s natural to feel uncertain and unmotivated or fearful with new challenges but fear shouldn’t stop you. Do it without thinking about your abilities. Get out there and fail as quickly as you can. And then fail again.\n\n\n\n\n\n\n\n\n\n\n\n\nThink big, act small. When a big project is before you, a sick sense of failure falls on you. Then gradually you do one thing at a time. Take a step and then another. Be encouraged to think big on what you can achieve, but act small rather than define all you want to do. Bigger isn’t always better. As children, you always wanted the big win, the best grade. As adults, we feel we should still receive the maximum goal and rise above the average. Going for big wins often results in behaviors that get in the way of success. Like being overweight and signing up for a fitness club membership. Then life gets in the way and you no longer find the time to go to the gym. And you’ve already paid for the membership in advance. The problem in going for a big win is it becomes daunting and it stops you in your tracks. Don’t overcommit. No pain, no gain theory is wrong. The best way to promote positive change is by setting different goals. When not broken into manageable goals, it will become too overwhelming. Big wins prompt people to act without pursuing other options. Find a goal or option that is attainable.\n\nGoing for big wins can stop you in your tracks. It can make tasks so hard that you become overwhelmed from taking action. It can make problems more complicated and confusing. It pushes the satisfaction of completion into the future and dampens daily motivation. It requires a substantial commitment of time and resources increasing costs and risks. It promotes opportunity blindness. It gets you to do things in the most challenging way. It focuses on a future payoff so you don’t benefit from feedback along the way.\n\nThe power of small wins is attaining achievable goals which clarifies what action should be taken and reduces doubt and complexity. Like Alcoholics Anonymous that sets a goal to sustain from alcohol for one day or one week at a time. This encourages an alcoholic to remain sober for one day as opposed to the rest of their lives. By accomplishing successful days of sobriety, sustaining becomes apparent and eventually achievable in someone’s mind. This produces results by breaking tasks into controllable opportunities of modest size.\n\nSmall wins get your life in motion. Do one thing now as it can be difficult to know how to proceed. Find one small thing to do, one positive step. The smaller and easier the action step, the better. You don’t know where your actions will lead and don’t want to be led to unexpected places. But keep your step specific and easy to accomplish. Keep it fun that provides an enjoyable experience. Keep it immediate and something you can start right away and complete in a short period of time. Keep it cheap, real and social. Talk to someone in that field, show someone your project or enroll in a course.\n\nBuild on your strengths. Successful entrepreneurs don’t begin with brilliant ideas, they discover them. They tend to leap into action quickly by capitalizing on their current resources, skills, knowledge and social connections. Contrary to the assumption that successful entrepreneurs are risk takers, they do things with the least costs and time involved. Get going quickly with minimal costs and resources and utilize social connections already in your life. Take a simple step based on your current situation. Whatever your action step is go out and make it happen. Appreciate whatever happens and laugh at your mistakes. Give it your best effort and celebrate your small win. Move onto your next small win. The faster you take action that faster your opportunity will happen.\n\nBe an innovator. Get lots of ideas and throw the bad ideas away. Innovation is creating new ways to contribute value to your life and world and the heart of all personal success. Use your inventiveness to solve problems and develop new practices and work more effectively. Help others to become better people. You don’t need an off the chart IQ to have an innovative approach to life but a willingness to seek out new experiences. Entrepreneurs don’t differ significantly in personality traits from typical business executives but they do differ in their actions.\n\nYou can see a lot just by observing. To be creative you need to be an eager and active observer. A keen observer is seeing something in a new and powerful way. Observation can lead to industry changing innovation. Like all positive habits your capacity to observe is something that happens over time. Pay close attention to your environment and everything around you.  They know how to observe among the best.\n\nBe inquisitive. Innovators are inquisitive. The simplest questions can lead to innovation. Asking a how question is based on your existing knowledge and assumptions, but ask what and explore different options. Feed your creativity by stimulating your mind to think in new ways. Be purposeful about what you’re putting into your head. Have fun and experiment to discover the places and activities that leave you feeling fresh, enthusiastic and creative.\n\nBe a relentless learner. We just don’t learn skills that allow us to excel in our careers we also learn many things in enjoying our lives. The most important learning can happen anywhere and anytime. You can take something away from any situation regardless of the outcome. It can help you grow and improve in your life. Seek out opportunities to learn and grow. Expose yourself to new challenges and experiences. Get outside the box. Luck is about being at the right place at the right time. But how do we know where the right place is. Innovation is like luck, being present to act at the right time and place. Learn to step out of your usual habits to embrace new possibilities. Working in diverse environments helps someone become more creative. Being creative involves venturing outside the normal boundaries and exposing yourself to other opportunities. Interact with people outside your usual social network and those with different careers.\n\nDon’t marry a job before your first date. Life is what happens while you’re busy making other plans. Be willing to get rid of the life planned so as to have the life that is waiting for you. What do you want to be when you grow up – the question we’ve all been asked. But changing your career can sometimes be classified as being unsure, a sign of weakness or failure. It is like finding a future spouse without first going on a date. Over-planning can limit a person’s success and career matching can be silly. The world is changing and new opportunities and careers will be created.\n\nLean planning is smart planning. Like Google, they send out testing to the viewers before they commit to a particular path. The traditional path to starting up is no longer the best strategy. Create the minimal product and get it out there to get feedback immediately and then make adjustments. Facebook is another example of a lean company by offering simple mesgoogle facebooksaging services and then they offered additional services based on the market. Get going with a small investment. Get something into a customer’s hand as soon as possible and see how they respond. Toyota utilizes go and see for yourself. Don’t take anything for granted and go see for yourself. Experience what it’s like firsthand and determine for yourself. It is the most informative way to explore but also provides the key to ways of getting exposed to an opportunity you have not yet considered.\n\nTest your assumptions. Don’t act on assumptions until they have been tested. One’s actions are often suaded by misleading or incorrect assumptions – school is too hard, too competitive, wrong degree, etc. Those assumptions can be disproved with a little firsthand experience. Work or volunteer at a profession to see if it is a career you want to do. If it is a job you will enjoy you will have the confidence and motivation to pursue your passion. Test your assumptions before you give up on a career. Talk to someone who is successful in that career and discuss what they enjoy about it. Ask yourself if you are okay in doing the work to get there.\n\nAvoid perfectionism. People often resist change and progress because they want to proceed in the most professional and polished way – maybe next year, or a need to finish one more thing. Try the easiest thing to get you into a change. Embrace change.  A good book to reach out to that I highly recommend on this topic would be Jen Sincero’s book called You are a Badass: How to Stop Doubting Your Greatness and Start Living an Awesome Life.\n\nIt’s okay to change your mind. People feel they will be failures if they change their career path. Most who did change careers expressed regret over making a switch but many said they wished they had the courage to do so sooner. Don’t get stuck to a plan and be ready to change course and try new things.\n\nDiscover your success. The capacity to take immediate action and change course is more important than any plan. Many reach such success without ever deciding what their career should be. Everyone can follow their curiosity and pursue what they enjoy.\n\nLean approach to careers. Strive to be lean when pursuing your career. Research before making the commitment. Make the smallest plan just to take the next positive action. Focus on what you can do in the following week to have new experiences and learn. Learn to enjoy initiating small actions that lead to immediate feedback. Perform experiments to confirm or disprove your assumptions about an occupation you are curious about. Don’t believe what you hear or what you’ve learned. Come up with your own experiments that allow you to determine how feel about an occupation. Volunteer, take an introductory course, an internship or a part-time job in that field. Be prepared to change course and expect to make changes. Adjust your course depending on what you’ve learned. Avoid big investments in education and training until you have learned everything you can. Keep your plans informal and resist giving a specific answer until you have collected facts and know what direction you’re going. Develop a small plan and move onto the next positive action.\n\n\n\n\n\n\n\n\nEating the tasty pie.  A client of theirs was struggling with attending law school.  She had no passion for law and she wasn’t excited about taking the admission test to get into law school.  Most nights she was tired and angry and then up the next day doing the same thing.  She needed to increase the fun in her life and they suggested she take time off beftasty pieore taking the test and do something fun.  She had always enjoyed acting and wanted to get back into it.   She was a different person when she spoke enthusiastically about acting.  She decided to form a drama group with others at work and the first week she had four people attend.  She was having such a good time, she had lost track of having fun.  She realized she didn’t want to pursue a legal career but wanted to work with students.  She got a job working as a Manager of Student Engagement at a major software company where she interacts with engineering students on how to tackle challenging projects and interact with people to encourage their career growth.  She continues to work on acting and has been doing some standup comedy.  She realized that personal enjoyment and career growth go hand-in-hand.  In life, eat the tasty pie and to know what pie is tasty you need to eat lots of pie.\n\nTracking your joy.  To build more tracks of joy in your life journal your experiences.  Consider tracking what you did today that was a lot of fun, what did you experience that was amazing, what did you see that was inspiring, what fulfilling social interactions did you have.\n\nMapping joy.  Spend more time doing things you enjoy and less time doing things that drag you down.  Create a map of the daily places in your routine you enjoy.  Those significant places you enjoy – home, park, library, office or the mall.  Try to spend more time at that place.  You may feel those places you aren’t enjoying could be the office – but you have the choice to do what you want to do.  Spend your time filling your life with joy.  \n\nFail fast, fail often.  A life spent making mistakes is not only more honorable but more useful than a life doing nothing.  When was the last time you accomplished something you were proud of.  Did you make mistakes and mess up.  Times when you grew and accomplished the most were those times you made mistakes.  Be encouraged to fail as quickly and as frequently as possible rather than worry about doing things badly or making mistakes.  Use your mistakes and failures to accelerate your learning and you will be exposed to new opportunities.\n\nDo it badly as fast as you can.  Easy to think of accomplishments are from a brilliant idea.  Howard Schultz’s creation of Starbucks provides a good example of how success arises from many mistakes.  When he first formed Starbucks he had the idea of modeling the store after Italian coffee shops.  It was a good idea but today they have little resemblance of the Italian stores.  The coffee shops today have evolved around experiments and revisions along the way.  Failing forward is at the heart of many businesses.  Push ahead as soon as possible for feedback so you can take the next step.  Challenges faced by writers is allowing themselves to write a really shitty first draft so they have a better second and third drafts.  This is essential to the fail fast approach.  You can’t know what something is like, how you will feel about it until you are actually doing it.\n\nFailfail fast, fail often Fast, Fail Often was an inspiring book.  I relate it to my own personal experience of changing careers and the apprehension in doing so.  I was motivated to do so when my son switched careers after attending college and graduating with a Doctor of Pharmacy degree.  He changed his career and created his own successful internet business – a career he always had a strong passion for and truly enjoys.  As discussed in the book, and as his mother, I was certainly skeptical about such a career change.  Had he not followed his passion he would still be doing a job that was not as fulfilling to him.\n\nBabineaux and Krumboltz are psychologists and career counselors.  The book draws on the authors’ research in human development and innovation.  It provides how enthusiasm can guide you, how to act boldly and leverage your strengths even if you are afraid of failure.  Happy and successful people go out into the world, try new things and make mistakes, and in doing so benefit from unexpected experiences and opportunities.  The point of this book is to help you take action in your life by teaching the basics and how to get going and make things happen even if you may feel apprehensive, unprepared or afraid of failure.  The authors are career counselors and educators.  People who are happy and successful spent less time planning and more time acting.  Simple techniques can provide powerful actions in your life and in your work to accomplish many things.  They have helped people accomplish many things – start a business, write novels, form a research foundation, get married or lose 100 pounds.  Not by making dramatic changes, but by making small changes to what they do.  Advice on how to follow your interests, and trust your enthusiasm and let it guide you.  Leverage your strengths for rapid change and specific steps to change your life.\n\nHappiness tipping point.  Mother Teresa quoted, “There is more hunger for love than bread.”  We are all wired for joy; find the joy and it will burn out the pain.  When people are unhappy they fixate on what makes them unhappy in their lives and can’t enjoy themselves until they escape their current problems.  Many psychologists and counselors say you can’t make any major changes until you overcome your emotional hangups first – when the kids are done with college, when I’ll have more money, when I feel more confident, when my house is cleaned up.  But ask yourself the following – what does your fun meter say?  Take on the challenge of wearing the fun meter.  \n\nWhat action do you take the first day.  Focus on opportunities not problems.  When you drag your feet and focus on your bad habits you become blind to opportunities.  Mindset of fixing all your problems before taking on new things, you will never get started.  The best way to transform your life is encouragement to pursue what you enjoy.  No matter what the circumstance, there is always something you can do and new experiences to be had.  Spend more time enjoying yourself.  If you want your life to change you have to take different actions.  \n\nPassionate action is smart action.  Successful people make a habit of pursuing what they enjoy and take actions that are aligned with their passions.  It makes them smarter by doing what they love and capitalize on opportunities.  A sense of enjoyment makes people more productive.  People with positive feelings think differently and are more adaptive in their thinking.  People are most creative when engaged in work that is motivating and the work itself is of interest.  The more positive a person is the more likely that person will be creative even the following day.  Important opportunities and insights often result in pursuing one’s passion.  \n\nA long bike ride leads to a great idea.  Another example how enjoying life can lead to a life changing experience is found in the story of Gary Erickson, the founder of Clif Bar.  In 1990, Erickson was 33 years-old and living in an unheated garage.  He earned very little money and spent most of his time rock climbing and long distance cycling.  Erickson would go on long cycling trips and raced competitively in California.  He was on a long ride with a group and they each packed six energy bars.  They still had a long ways to go and had already eaten all six of their bars.  Fortunately, they made it to a gas station.  As they continued their ride, Erickson had an epiphany he would make an energy bar which was better than a Power Bar.  Erickson co-owned a bakery in Berkeley, California, and he went to work experimenting with creating an energy bar.  After six months of trials, he had an energy bar that was packed with nutrients and made with unprocessed ingredients and tasted like a cookie.  Erickson handed them out at bike rides and the feedback was positive.  In 1992, Erickson formally launched Clif Bar and the company was an instant success with more than $700,000 in sales its first year.  His sales grew to 1.5 million dollars its third year, and more than 20 million dollars in 1997.  By 2002, Erickson had turned down an offer to sell the company for 120 million dollars.  Had it not been for riding with his friends, he never would have come up with Clif Bars.  Erickson has also written a book about his success, Raising the Bar.  His idea for Clif Bar is a great example of how enjoying life can lead to a life changing experience and opportunity.\n\nThe joyful tipping point.  Mood and productivity are impacted by a person’s lack of sleep.  Less than six hours a day and you will probably feel exhausted and have trouble concentrating.  Make sure you get enough rest every night.  Similarly, eat regular meals or your energy level will fall.  The enjoyment you experience in your life is similar to rest and food – if you don’t have enough of it then your entire life will suffer.  Successful people regulate their enjoyment just as carefully as they manage their sleep and intake of food.  They organize their lives to engage in rewarding and pleasurable activities.  How much joy do you need in your life.  To have a well balanced life you need three positive experiences versus one negative experience.  \n\nEmployee motivation and activity.  Have the opportunity to make positive strides at work.  Sustain motivation and performance will improve progress at work that is enjoyable and rewarding.  Progress in small increments encourages self-worth and feeds motivation for increased production.  The reason many people feel trapped is they spend too much time fussing over trivial things and not enough time working on things that matter to them.  \n\nDon’t let a day pass without having fun.  Every day should include opportunities to enjoy pleasurable activities and make progress meaningful at work.  It need not be anything exceptional but include some enjoyment daily.  Enter into a mindset that is flexible, confident, hopeful and appreciative and be eager to act on them.  When you experience deficiencies in moments of joy, you encourage a negative attitude and are less motivated and can see no end to your present situation.  You will be too tired and blinded to act on any opportunity.", "pred_label": "__label__1", "pred_score_pos": 0.8536683320999146} {"content": "Global Times Mobile\n\nCompetitors pose during the first Tiramisu World Cup competition on November 4 in Roncade, near Treviso.Photo:AFP\n\nAn Italian factory worker won the first ever Tiramisu World Cup on November 5, beating 700 other amateurs to whip up the softest and creamiest version of Italy's famous dessert.\n\nHundreds of would-be pudding maestros descended on the city of Treviso armed with whisks and sieves to compete in the two-day challenge to make the best tiramisu, which means \"pick-me-up\" in Italian.\n\nThe eventual winner, Andrea Ciccolella, 28, hails from Feltre in the Veneto region and works in an eyewear factory.\n\n\"My dream is to be a pastry chef and open a small cake shop of my own, where I'd make traditional, home-cooked things. Nothing fancy, but tasty and made well,\" the victor told AFP.\n\nWhile the northern Italian region, home to the city of Venice, celebrated the sweet taste of victory the result was likely to embitter residents of neighboring Friuli-Venezia Giulia.\n\nA dispute over whether the pudding originates in the Veneto or Friuli region has divided foodies for decades.\n\nCompetitors for the prize were split into those following the original recipe - ladyfinger biscuits, mascarpone cheese, eggs, coffee, cocoa powder and sugar - and those getting creative by adding everything from strawberries to green tea.\n\nWhile slicing bananas into the whipped mixture was permitted, adding alcohol like Marsala wine was not.\n\nCompetitors take part in the first Tiramisu World Cup competition. Photo:AFP\n\n\n\n'Best dessert in the world'\n\nThe prize was awarded by Roberto Linguanotto, a pastry chef who worked in Treviso in the 1960s and 1970s and is considered by Veneto as the man behind the original recipe.\n\n\"What gives the final touch to tiramisu is the coffee. It's expensive because each ladyfinger needs to be dunked in espresso, and you need lots of them: intense, good quality, flavored,\" he said.\n\nFriuli scored an important victory in the battle over the birthplace of tiramisu in August, when the dessert was officially inserted into a list of the dishes recognized as traditional of the region.\n\nVeneto officials was outraged, with Governor Luca Zaia calling on the agriculture and food minister to overturn the decision, saying \"no one can swindle us out of tiramisu... the best dessert in the world.\"\n\nFriuli thumbed its nose back and poured salt on the wound when a company in Udine announced this week that it had produced a machine capable of churning out a tiramisu every 30 seconds.\n\nTreviso Mayor Giovanni Manildo side-stepped the debate on Sunday by dubbing his city \"the moral capital of tiramisu.\"\n\nIt was a declaration which may have amused Italian food writers who claim the dessert was actually created as a stamina-boosting treat that prostitutes fed their clients in Treviso brothels in the 1950s.\n\nThere were no reports on the stamina or blood sugar levels of the juries - composed of pastry chefs, food critics and members of the public - who were still dipping spoons as the sun went down.", "pred_label": "__label__1", "pred_score_pos": 0.856572151184082} {"content": "Artificial Intelligence is Disrupting the Insurance Industry\n\nWhat exactly is artificial intelligence?\n\nAccording to IBM, who has been doing research on the topic since the 1950s, artificial intelligence (AI) is simply “anything that makes machines act more intelligently”.­ This can be broken down further into two groups: applied or general. Applied AI is capable of doing only those tasks it has been designed for, such as driving/operating a car, or trading stocks. This is the most common type of AI, and has had a wide range of success in many applications. On the other hand, general AI is far more advanced and theoretical. Instead of seeing specialization in one task, “a machine [would be] able to perform any task a human can”. It would, in essence, be able to learn anything and apply it to any situation, to think and reason just like a human. This type of artificial intelligence, though generating much attention in the recent years, is still far from a reality.\n\nHand-in-hand with the concept of AI is the area of machine learning (ML). This is “a branch of artificial intelligence based on the idea that systems can learn from data, identify patterns and make decisions with minimal human intervention”. This technology is widely used today, mainly by industries who amass a large amount of data (e.g. financial services, government, health care, etc.). It is what gives a machine its ability to learn from the past, and make predictions/decisions for the future. The more it encounters, the smarter it becomes.\n\nThe financial services industry has been using artificial intelligence and machine learning for years. Referred to as FinTech, firms take advantage of AI’s power by providing sophisticated virtual customer service assistants, analyzing legal documents, and even making strategic trades on the stock market. Large firms such as JP Morgan Chase have adopted artificial intelligence to help analyze important documents, which in turn has reduced their time spent from 360,000 hours annually down to a matter of seconds.  With AI’s ability to streamline back-end operations and improve efficiency all around, one might wonder why other industries have been so late to the game. Insurance firms, for example, are only just beginning to experiment with the use of AI. Considering its resemblance to the financial industry, it seems odd that insurance is still lagging so far behind. There may be, however, two reasons why FinTech got a head start. For one, insurance is a very passive product. Whereas roughly 70 percent of insurance firms only hear from their customers once a year, financial institutions communicate with their clients almost 200 times annually. This frequent customer interaction, coupled with the heavy regulation following the economic crisis of 2008, created a need for change. It also created the perfect opportunity for disruption from startups and innovators. “From non-bank lending, because banks could no longer provide enough capital, to consumer friendly apps and efficient payment solutions” the introduction of FinTech was unsurprising. Given that the field has steadily grown over the years, and amassed $16.6B in investments for firms last year, AI’s possibilities should not be ignored. The question is: can other industries catch up?\n\nFor the insurance industry, AI and machine learning have thus far been used in pricing, handling claims and detecting fraud, though firms are only now learning of its endless possibilities. Lemonade, a new property insurance company out of New York, is pioneering the way for other carriers to automate their processes and implement artificial intelligence. They enlist the help of chatbots, which are computer programs able to analyze language and mimic conversations to interact with humans. The bots are able to speak to multiple customers at once and are available anytime of the day. This is a major advantage for businesses that rely on fast, effective customer service.\n\nLemonade’s chatbot, Maya, “sells inexpensive homeowners’ and renters’ insurance, and their claims bot, AI Jim…recently settled a claim in three seconds”. Maya is able to communicate directly with customers and help them navigate through the confusion of applying for coverage. Their website claims she will craft the perfect insurance for you, without the need for customer service representatives and underwriters. The appeal of having a computer execute such tasks is that it reduces the time spent, the hassles and the costs. It makes the processes far more seamless, instantaneous and trustworthy. Even though Lemonade is targeting a niche group (millennials), other insurance companies should not turn a blind eye; they could learn a lot from the company’s operations and values. “Lemonade is fast and transparent rather than slow and opaque”. Many people will be drawn to this refreshing view in a notoriously mundane industry.\n\n\nWith the ever-increasing use of social media and “smart” gadgets, AI machines now have access to a wealth of data. This is especially useful when analyzing a client’s risk and setting an appropriate premium. Underwriting, a somewhat lengthy and intricate process, has been presented with the opportunity for automation. A bot is able to “scan a customer’s social profile to gather information and find trends and patterns”. This ability to analyze social media posts and determine a person’s risk within seconds puts AI’s capabilities far beyond humans’, and at a far lower cost. When considering the vast amount of data generated from the Internet of Things (IoT), the accuracy and knowledge of these bots will be unparalleled. AI also provides the “mechanics to capture ‘tribal knowledge’, thereby providing a uniform assessment metric across the entire underwriting process”. Tribal knowledge is defined as information that is known only to the insiders of a particular group or organization, and is not common knowledge to outsiders. In the world of underwriting, this tribal knowledge could consist of emails, internal reports, presentations and evaluations, all of which can help better assess a group’s risk.\n\nOne would think gathering personal data from people would be met with overwhelming opposition, but surprisingly “62 percent of younger groups said they’d be happy for insurers to use third-party data…to lower prices”. While it is exciting that companies may no longer base their premiums on generalized assumptions, and look to individualized data instead, a concern for privacy is presented. Allowing limitless access to your personal data is both risky and invasive. What happens to our freedom of speech if we can no longer share photos from a night out, or post our thoughts online without the threat of increased insurance premiums? Additionally, think of the impact a data breach would have if you allow all of your personal information to be in the hands of one company. To make matters worse, there is no guarantee these companies would not sell your information to third parties, thereby increasing the risk of a data breach exponentially. Consumers need to weigh the pros and cons before allowing insurance companies access to such personal information. Since when does affordability outweigh privacy?\n\nClaim Handling\n\nClaims processing can be “a monotonous task susceptible to errors stemming from uniquely human factors”. Not only does AI reduce the amount of time spent on claims, it also reduces the probability of error. Imagine having a machine analyze a photo of damage and estimate repair costs within seconds. The entire burden of handling the claim would fall off of the insurer and customer. AI will eliminate the need for having multiple people work on the same claim, thus decreasing administrative costs and the frequency of errors. Kristof Terryn, COO of Zurich, has instituted a project to automate their claims processes. He declared that it “will trim $5 million from expenses…for the 39,000 hours of claims handler time now being done by computer”. Though this is an impressive reduction in costs, most of the value stems from increasing the accuracy of claims and virtually eliminating errors during the process. Other companies that have implemented automation “of their claims process have seen a significant reduction in processing times and [an increase in] quality”. The use of chatbots also reduces the need for interaction with customers during the process. Any questions customers may have could be directed to those bots, therefore allowing workers to focus on more important tasks. Thanks to artificial intelligence, insurance companies’ resources can be better allocated; they will no longer require the manpower needed in decades past.\n\nFraud Detection\n\nWith the implementation of AI and machine learning comes the ability to analyze data better and faster than any human ever could. These machines are able to identify patterns within a claim, look to historical data and “help to recognize fraudulent claims in the process”. This should be of utmost importance to not only insurance carriers, but to the insureds as well. According to the FBI, it is estimated that insurance fraud costs the United States $40 billion annually. This cost is passed along to the insureds in the form of increased premiums, roughly “$400 to $700 per year”. A startup firm in France called Shift Technology is using AI in their fraud prevention services. They have “already processed over 77 million claims… [and] have reached a 75 percent accuracy rate for detecting fraudulent insurance claims”.1Even IBM offers AI services to fight financial crimes.  It is evident that this application of AI will grow exponentially in the future and drastically help cut the cost of fraud.\n\nAll things considered, artificial intelligence is set to flip the insurance industry upside down. Automating monotonous processes, reducing fraud and increasing accuracy are major advantages of using the technology. Insurance, which as an industry is notorious for its antiquated processes and values, is being disrupted by this emergence of artificial intelligence and machine learning. Disruption happens when an existing market, industry, or technology is displaced and replaced with something new and more efficient/worthwhile. Accenture claims that “75 percent of insurance executives believe AI will provide significant industry changes in the next three years”. Despite the fact some insurers have started to embrace the change, many others are unaware of the impact it is having already. While there are many kinks left to be ironed out, the reality is that companies have two options- catch up or be left behind.\n\n\nAbout the Author\n\nAshley Evans: Analytics intern at J.W. Terrill, and senior at Saint Louis University pursuing a bachelor’s degree in Finance; Dean’s List recipient for two consecutive semesters. Interested in continuing her education with a Master’s in Applied Financial Economics.\n\n\n 1. “Artificial Intelligence.” IBM. July 25, 2016. Accessed July 18, 2018.\n 2. Marr, Bernard. “What Is The Difference Between Artificial Intelligence And Machine Learning?” Forbes. September 15, 2017. Accessed July 18, 2018.\n 3. “What Is AI?” IT PRO. June 11, 1970. Accessed July 18, 2018.\n 4. “Machine Learning: What It Is and Why It Matters.” SAS. Accessed July 18, 2018.\n 5. Alton, Liz. “How Financial Services Use AI To Serve Customer Needs.” Forbes, Forbes Magazine, 8 Sept. 2017,\n 6. Kurani, Ravi. “InsurTech Is the New FinTech – or Is It? – Earlybird’s View – Medium.”Medium, Augmenting Humanity, 23 Aug. 2016,\n 7. “The Global Fintech Report Q4 2017.” Corporate Innovation Trends, 2018, Ads&utm_medium=FintechReport&msclkid=4a5f3b8d528b149feb2660d5b3c03485.\n 8. Team, Writer Profile Of “How Artificial Intelligence Is Changing the Insurance Business.” Medium. February 14, 2017. Accessed July 18, 2018.\n 9. Sun, Alex. “How Chatbots Can Settle an Insurance Claim in 3 Seconds.” VentureBeat,VentureBeat, 28 May 2017,  settle-an-insurance-claim-in-3-seconds/.\n 10. “Lemonade Renters & Home Insurance | Protect The Stuff You Love.” Lemonade. Accessed July 18, 2018.\n 11. Fromm, Jeff. “How Startup Lemonade Is Redefining Insurance For Millennials.” Forbes. July 12, 2017. Accessed July 18, 2018.\n 12. Moodie, Alison. “How Artificial Intelligence Could Help Make the Insurance Industry Trustworthy.” The Guardian. January 28, 2017. Accessed July 18, 2018.\n 13. Morgan, Blake. “How Artificial Intelligence Will Impact The Insurance Industry.” Forbes. July 25, 2017. Accessed July 18, 2018.          intelligence-will-impact-the-insurance-industry/#1daeb20a6531.\n 14. Kumar, Krishna. “AI’s Huge Potential for Underwriting.” Insurance Thought Leadership. December 17, 2015. Accessed July 18, 2018.\n 15. “What Is Tribal Knowledge? Definition and Meaning.”   Accessed July 18, 2018.\n 16. “Young Consumers Willing to Let Insurers Spy on Digital Data – If It Cuts Premiums.”     Insurance Journal. June 21, 2018. Accessed July 18, 2018.\n 17. “Insurance Fraud Prevention Gets Help From Artificial Intelligence.” Samsung Business Insights. January 19, 2018. Accessed July 18, 2018.\n 18. “AI and Insurance: Are Claims Jobs in Danger?” Carrier Management. March 14, 2017. Accessed July 18, 2018.\n 19. “Insurance Fraud.” FBI. March 17, 2010. Accessed July 18, 2018.\n 20. “RegTech and Cognitive Risk & Compliance | IBM.” IBM Cognitive Advantage Reports.             Accessed July 18, 2018.   markets/risk-compliance.\n 21. Howard, Caroline. “Disruption Vs. Innovation: What’s The Difference?” Forbes. June 20, 2016. Accessed July 18, 2018.\nLinkedin Facebook Twitter Email\n\nNo comments yet.\n\nLeave a Reply\n\nTime limit is exhausted. Please reload the CAPTCHA.", "pred_label": "__label__1", "pred_score_pos": 0.61478590965271} {"content": "Leonardo Salmena, PhD\n\nOur ongoing scientific interests include investigations of signalling perturbations in the oncogenic PI3-kinase pathway, specifically the function and aberrations of the tumor suppressor PTEN in the context of leukemogenesis. We are currently investigating post-translational mechanisms of PTEN regulation and control of PTEN expression by microRNA.\n\nWe have recently identified a novel post-transcriptional mechanism of gene regulation of PTEN mediated through competitive interaction of cellular RNA molecules. These findings have opened a new field of study which embraces the notion that all cellular RNA molecules (coding and non-coding) have the ability to compete for microRNA binding and thereby mediate their relative functions in trans. Future studies include functional analyses of the non-coding transcriptome, its aberrant regulation, and the consequences for human disease and cancer.\n\nWe also have a keen and ongoing interest in the generation of innovative genetically modified mouse models. The design of such models is aimed to elucidate and faithfully model the genomic alterations leading to disease and cancer for the purpose of preclinical studies.\n\nFinally, working closely with Dr. Mark Minden, we are intensely investigating the genetic alterations and molecular mechanisms that underlie the pathogenesis of human leukemias, with the aim of identifying potential targets and novel strategies for disease prevention.\nOncotarget. 2019 Oct 29;10(59):6378-6390\nMangialardi EM, Chen K, Salmon B, Vacher J, Salmena L\nOncotarget. 2019 Mar 29;10(25):2475-2483\nZaman T, Sun P, Narod SA, Salmena L, Kotsopoulos J\nCancer Causes Control. 2018 Apr 20;:\nMoran O, Zaman T, Eisen A, Demsky R, Blackmore K, Knight JA, Elser C, Ginsburg O, Zbuk K, Yaffe M, Narod SA, Salmena L, Kotsopoulos J\nPLoS One. 2018;13(2):e0191510\nDzneladze I, Woolley JF, Rossell C, Han Y, Rashid A, Jain M, Reimand J, Minden MD, Salmena L\nOncotarget. 2016 Nov 22;:\nOdén L, Akbari M, Zaman T, Singer CF, Sun P, Narod SA, Salmena L, Kotsopoulos J\nBreast Cancer Res. 2016;18(1):87\nChehade R, Pettapiece-Phillips R, Salmena L, Kotlyar M, Jurisica I, Narod SA, Akbari MR, Kotsopoulos J\nMethods Mol Biol. 2016;1388:v\nSalmena L, Stambolic V\nMethods Mol Biol. 2016;1388:39-51\nWoolley JF, Salmena L\nMethods Mol Biol. 2016;1388:3-11\nSalmena L", "pred_label": "__label__1", "pred_score_pos": 0.9919811487197876} {"content": "Consumer behaviour and marketing research question papers\n\nRational Versus Emotional by Jerry W. Thomas A summary of recent insights about advertising, based on the latest research findings. What is the difference between male and female customer psychologies? What is the point of gendered products?\n\nHyper-creatives can help generate hundreds of new product ideas to keep companies driving forward through tough economic times. There are many other ways that retailers can go about configuring the experience of retailing to satisfy these deeper, human, spiritual needs of consumers that we seem to shy away from as business people, but which I believe will be increasingly urgent as business plays a more therapeutic role in the 21st century social economy.\n\nConsumer behaviour and marketing research question papers\n\nBehavioral variables include usage rate and loyalty. What is a brand, and why do brands matter?\n\nColias and Wei Huang Messaging and positioning choice modeling is recommended when the primary research objective is to obtain information that would allow a company to develop the most effective communications message to consumers, maximizing attraction to its specific brand, product line, store, or department within the store.\n\nAnd how do you measure and manage brand equity to maximize profits over the long term? Aer Lingus competes in the transatlantic long-haul sector, within the European Union, in the UK market and domestically within Ireland. The following list of ideas is aimed to make it a bit easier for you.\n\nSo, the purpose of this article is to share some basic ideas and best practices for the use of qualitative research as a component in the package-design research plan. Correct Answer - Blue Although early related research can be traced back much further, the attempt to theorize consumer behavior began infirst looking at the type of behavioral processes consumers typically used in adopting new products; then addressing consumer problem-solving, buyer behavior, and buyer decision processes.\n\nAnother consumer behaviour paper on consumption demonstrate through its research on the extent to which the body type of consumers affects the food choices and level of consumption of other consumers around them. Thomas Most analysts define operations research and management science to mean the application of the scientific method and advanced analytics to the solution of business problems.\n\nThomas So what is marketing research? Does advertising stimulate excessive consumption? Question - Multiple Choice Single Answers Question It is a method of collecting past and current data by recording information: The Great Marketing Debate: What are the ways to create a successful product? The recent advances discussed in this paper have the potential to reduce survey length for choice modeling research and deliver more accurate market simulators to measure bottom-line revenue impacts.\n\nMaria immediately purchased two dresses but Sandra returned home empty handed. The effect of background music in stores. Submit Marketing Research White Papers Free white papers and articles on different marketing research techniques.\n\nConsumer Behaviour\n\nRather, positioning should be thought of as an element of strategy, a component of strategy, not as the strategy itself.\n\nCan music increase sales volumes? Topics range from advertising research, to innovation, to concept testing and product testing, to win-loss evaluation.\n\nIt has been said that the basic nature of consumer behavior is diversity: Thomas Every change in the marketplace creates opportunities for successful new products. The first stage, Problem Recognition, is when a consumer becomes aware of a need. There is an objective function; that is, a mathematical definition of the object or thing to be optimized to maximize profits or sales revenue or minimize costs, typically.\n\nWhy are people so willing to follow popular cultural trends? On the other hand, the environment such as the terminal, the aircraft, and the booking point are important factors.ignou master of business administration(mba) download all ignou previous year question papers free of cost with downloadable link and session wise, select session and download you can download old session previous year question papers for preparation for exam of ignou.\n\nConsumer Behaviour and Market Research Critically evaluate the influence of children on buying decisions in the context of family decision making. This sample research paper written on consumer behavior will help improve your understanding of branding and risk aversion in marketing.5/5(1).\n\n10 Great Marketing Dissertation Topics On Consumer Behavior. Many factors will end up influencing your dissertation topic, including what the focus of your doctoral program is, and what funds are available for your research, but choosing a topic can be a daunting task.\n\nMARKETING RESEARCH. SRIRAM M Marketing Research – it includes market research and also areas such as research into new products. analysis and reporting of data and findings relevant to a specific marketing situation facing the RESEARCH AND MARKETING RESEARCH Market Research – simply a research into a specific market.\n\ncollection. DEFINITION: The. This research has important implications for brand and global marketing efforts by consumer-oriented companies. After all, notions about cultural differences are often the basis for international marketing communications as well as global brand management strategies.\n\nOld Question Paper for various MBA Programme - III & IV Semester Download\nConsumer behaviour and marketing research question papers\nRated 3/5 based on 39 review", "pred_label": "__label__1", "pred_score_pos": 0.9957693219184875} {"content": "Your Store\n\n10% off\n\nHalsbury's Laws of India-Contract; Vol 9\n\nHalsbury's Laws of India-Contract; Vol 9\n\nISBN : 9789351435488\n\n\nHalsbury’s Laws of India is a series based on Halsbury’s Laws of England, which provides a com-prehensive statement of law. This series is not a commentary but presents the legal position as it is laid by legislation and case law. In this volume on Contracts the contributor has discussed under each thematic topic the relevant provisions of the Indian Contract Act as well as all allied laws that would be relevant thereby providing a comprehensive and holistic treatment. This volume presents the position of the law as on July 215. The author analyses and discusses principles propounded in landmark case law on the subject of Contracts.\n\nWrite a review\n\nNote: HTML is not translated!\nBad Good\n\nRelated Books", "pred_label": "__label__1", "pred_score_pos": 0.823448121547699} {"content": "The Yakima City Council meeting tonight (Nov. 19) should determine whether Yakima voters will have an opportunity to change the city's form of government this coming February from a council-manager system to a council-elected mayor system. A common term often used to describe the elected mayor system is \"strong mayor,\" but regardless of the name, the proposed system allows for a few major changes from the current system.\n\nThe City Council's job is to set city policy and to hire a city manager whose job it is to carry out the council policies and run the day to day operations of the city.  The city manager, working as the administrator, works at the pleasure of the council.\n\nUnder the current system, the city also has a mayor but that individual is not chosen by the voters but is elected from within the members of the council. The mayor's job is primarily ceremonial and to run council meetings.\nUnder an elected mayor system the council is still the policy setting and legislative body for the city. However the elected mayor is now the day-to-day administrator of city affairs.\nProponents of the change say the advantage of such a system is that it gives residents the final say in who it is that does the daily job of running the city.\nFormer Yakima City Councilman and former Mayor Dave Edler is a longtime proponent of a change. He was on KIT's Morning News radio show to explain his support for the change and to encourage the community to turn out for tonight's meeting.", "pred_label": "__label__1", "pred_score_pos": 0.5636308789253235} {"content": "Should Plant-Based Meat Replace Beef Completely?\n\nWhat’s the beef with beef? As plant-based meat startups try to chop the meat from our diets, beef is seen as bad for the land, air and the body. But that’s not the full story. Economics correspondent Paul Solman takes a closer look at the costs, pros and cons of our obsession with the mighty bovine.\n\nWatch the full PBS NewsHour episode on PBS.", "pred_label": "__label__1", "pred_score_pos": 0.8746684193611145} {"content": "Addiction Treatment: Brain Stimulation Possible Answer\n\nDrug addiction is a chronic disease that affects more than 5 percent of the world’s population. Over 64,000 people are thought to have died in the U.S. from a drug overdose in 2016 and according to recent estimates, over 21 million Americans aged 12 and above are living with a substance abuse disorder.\n\nWe know that the brain’s reward-processing circuits are thrown off balance when addicted, as the brain receives excessive amounts of dopamine. Dopamine plays a critical role in reward-mediated motivation and learning, as well as in experiencing pleasure. When the brain gets too much dopamine, it continues to search for that “high” in favor of “lesser” pleasures normally derived from other daily rewards, such as eating a chocolate bar or getting recognition at work.\n\nThis is why we call addiction a brain disease, but despite this, until recently, researchers had not come up with any treatments aimed at the neural circuits involved in addiction.\n\nNow, however, researchers at the Medical University of South Carolina in Charleston may have come up with a treatment that successfully targets these brain circuits.\n\nThe researchers, supervised by Colleen Hanlon, Ph.D., managed to successfully use a noninvasive brain stimulation technique called transcranial magnetic stimulation (TMS) to blunt the brain’s response to the appeal of alcohol and cocaine in chronic users. They carried out two experiments simultaneously, both led by first study author Tonisha Kearney-Ramos, Ph.D. One study involved 24 participants who suffered from alcohol use disorder, and the other involved 25 participants who suffered from cocaine use disorder.\n\nThe participants had one session of TMS and one control session that imitated the TMS session but without actually delivering any stimulation to the brain. TMS allows the specific targeting of certain brain areas. In these experiments, both groups received stimulation focused on a region of the brain which is key for addiction and reward-processing: the ventromedial prefrontal cortex.\n\nAfter the sessions were completed, Kearney-Ramos and colleagues used a functional MRI to scan the participants’ brains in order to assess their response to drug cues such as seeing a liquor bottle. The brain’s reactivity to drug cues seemed to have been significantly reduced by TMS.\n\n“Since cue reactivity has previously been associated with abstinence,” explains Dr. Cameron Carter, editor of the journal that published the findings, “these [findings] suggest a common mechanism for treatment effects across disorders.”\n\n“This is the first sham-controlled investigation to demonstrate, in two populations, that VMPFC [stimulation] can attenuate neural reactivity to drug and alcohol cues in frontostriatal circuits,” says Kearney-Ramos.\n\n", "pred_label": "__label__1", "pred_score_pos": 0.9820225238800049} {"content": "Elementary Geometry for College St...\n\n6th Edition\nDaniel C. Alexander + 1 other\nISBN: 9781285195698\n\n\n\nElementary Geometry for College St...\n\n6th Edition\nDaniel C. Alexander + 1 other\nISBN: 9781285195698\nTextbook Problem\n\n\nIn Exercises 1 to 4, write the converse, the inverse, and the contrapositive of each statement. When possible, classify the statement as true or false.\n\nIf Juan wins the state lottery, then he will be rich.\n\nTo determine\n\nTo find:\n\nThe converse, the inverse, and the contrapositive of each statement.\n\n\n\nThe given statement is,\n\n\n\nConditional (or Implication) PQ If P, then Q.\nConverse of conditional QP If Q, then P.\nInverse of conditional PQ If not P, then not Q.\nContrapositive of conditional QP If not Q, then not P.\n\nConsider the given statement,\n\n\nThe conditional statement of the given statement is,\n\nIf Juan is the winner of the lottery, then he is rich.\n\nThe given statement is in “if P, then Q” form.\n\nHere P is Juan is the winner of the lottery and Q is he is rich.\n\nConverse of conditional statement is,\n\nIf Juan is rich, then he is the winner of the lottery.\n\nThis statement is false because Juan may have been rich without being winner of the lottery.\n\nInverse of conditional is,\n\nIf Juan is not the winner of the lottery, then he will not be rich\n\nStill sussing out bartleby?\n\nCheck out a sample textbook solution.\n\nSee a sample solution\n\nThe Solution to Your Study Problems\n\n\nGet Started\nSect-2.1 P-11ESect-2.1 P-12ESect-2.1 P-13ESect-2.1 P-14ESect-2.1 P-15ESect-2.1 P-16ESect-2.1 P-17ESect-2.1 P-18ESect-2.1 P-19ESect-2.1 P-20ESect-2.1 P-21ESect-2.1 P-22ESect-2.1 P-23ESect-2.1 P-24ESect-2.1 P-25ESect-2.1 P-26ESect-2.1 P-27ESect-2.1 P-28ESect-2.1 P-29ESect-2.1 P-30ESect-2.1 P-31ESect-2.1 P-32ESect-2.1 P-33ESect-2.1 P-34ESect-2.1 P-35ESect-2.1 P-36ESect-2.2 P-1ESect-2.2 P-2ESect-2.2 P-3ESect-2.2 P-4ESect-2.2 P-5ESect-2.2 P-6ESect-2.2 P-7ESect-2.2 P-8ESect-2.2 P-9ESect-2.2 P-10ESect-2.2 P-11ESect-2.2 P-12ESect-2.2 P-13ESect-2.2 P-14ESect-2.2 P-15ESect-2.2 P-16ESect-2.2 P-17ESect-2.2 P-18ESect-2.2 P-19ESect-2.2 P-20ESect-2.2 P-21ESect-2.2 P-22ESect-2.2 P-23ESect-2.2 P-24ESect-2.2 P-25ESect-2.2 P-26ESect-2.2 P-27ESect-2.2 P-28ESect-2.2 P-29ESect-2.2 P-30ESect-2.2 P-31ESect-2.2 P-32ESect-2.2 P-33ESect-2.2 P-34ESect-2.3 P-1ESect-2.3 P-2ESect-2.3 P-3ESect-2.3 P-4ESect-2.3 P-5ESect-2.3 P-6ESect-2.3 P-7ESect-2.3 P-8ESect-2.3 P-9ESect-2.3 P-10ESect-2.3 P-11ESect-2.3 P-12ESect-2.3 P-13ESect-2.3 P-14ESect-2.3 P-15ESect-2.3 P-16ESect-2.3 P-17ESect-2.3 P-18ESect-2.3 P-19ESect-2.3 P-20ESect-2.3 P-21ESect-2.3 P-22ESect-2.3 P-23ESect-2.3 P-24ESect-2.3 P-25ESect-2.3 P-26ESect-2.3 P-27ESect-2.3 P-28ESect-2.3 P-29ESect-2.3 P-30ESect-2.3 P-31ESect-2.3 P-32ESect-2.3 P-33ESect-2.3 P-34ESect-2.3 P-35ESect-2.3 P-36ESect-2.3 P-37ESect-2.3 P-38ESect-2.4 P-1ESect-2.4 P-2ESect-2.4 P-3ESect-2.4 P-4ESect-2.4 P-5ESect-2.4 P-6ESect-2.4 P-7ESect-2.4 P-8ESect-2.4 P-9ESect-2.4 P-10ESect-2.4 P-11ESect-2.4 P-12ESect-2.4 P-13ESect-2.4 P-14ESect-2.4 P-15ESect-2.4 P-16ESect-2.4 P-17ESect-2.4 P-18ESect-2.4 P-19ESect-2.4 P-20ESect-2.4 P-21ESect-2.4 P-22ESect-2.4 P-23ESect-2.4 P-24ESect-2.4 P-25ESect-2.4 P-26ESect-2.4 P-27ESect-2.4 P-28ESect-2.4 P-29ESect-2.4 P-30ESect-2.4 P-31ESect-2.4 P-32ESect-2.4 P-33ESect-2.4 P-34ESect-2.4 P-35ESect-2.4 P-36ESect-2.4 P-37ESect-2.4 P-38ESect-2.4 P-39ESect-2.4 P-40ESect-2.4 P-41ESect-2.4 P-42ESect-2.4 P-43ESect-2.4 P-44ESect-2.4 P-45ESect-2.4 P-46ESect-2.4 P-47ESect-2.4 P-48ESect-2.4 P-49ESect-2.4 P-50ESect-2.5 P-1ESect-2.5 P-2ESect-2.5 P-3ESect-2.5 P-4ESect-2.5 P-5ESect-2.5 P-6ESect-2.5 P-7ESect-2.5 P-8ESect-2.5 P-9ESect-2.5 P-10ESect-2.5 P-11ESect-2.5 P-12ESect-2.5 P-13ESect-2.5 P-14ESect-2.5 P-15ESect-2.5 P-16ESect-2.5 P-17ESect-2.5 P-18ESect-2.5 P-19ESect-2.5 P-20ESect-2.5 P-21ESect-2.5 P-22ESect-2.5 P-23ESect-2.5 P-24ESect-2.5 P-25ESect-2.5 P-26ESect-2.5 P-27ESect-2.5 P-28ESect-2.5 P-29ESect-2.5 P-30ESect-2.5 P-31ESect-2.5 P-32ESect-2.5 P-33ESect-2.5 P-34ESect-2.5 P-35ESect-2.5 P-36ESect-2.5 P-37ESect-2.5 P-38ESect-2.5 P-39ESect-2.5 P-40ESect-2.5 P-41ESect-2.5 P-42ESect-2.5 P-43ESect-2.5 P-44ESect-2.5 P-45ESect-2.5 P-46ESect-2.5 P-47ESect-2.6 P-1ESect-2.6 P-2ESect-2.6 P-3ESect-2.6 P-4ESect-2.6 P-5ESect-2.6 P-6ESect-2.6 P-7ESect-2.6 P-8ESect-2.6 P-9ESect-2.6 P-10ESect-2.6 P-11ESect-2.6 P-12ESect-2.6 P-13ESect-2.6 P-14ESect-2.6 P-15ESect-2.6 P-16ESect-2.6 P-17ESect-2.6 P-18ESect-2.6 P-19ESect-2.6 P-20ESect-2.6 P-21ESect-2.6 P-22ESect-2.6 P-23ESect-2.6 P-24ESect-2.6 P-25ESect-2.6 P-26ESect-2.6 P-27ESect-2.6 P-28ESect-2.6 P-29ESect-2.6 P-30ESect-2.6 P-31ESect-2.6 P-32ESect-2.6 P-33ESect-2.6 P-34ESect-2.6 P-35ESect-2.6 P-36ESect-2.CR P-1CRSect-2.CR P-2CRSect-2.CR P-3CRSect-2.CR P-4CRSect-2.CR P-5CRSect-2.CR P-6CRSect-2.CR P-7CRSect-2.CR P-8CRSect-2.CR P-9CRSect-2.CR P-10CRSect-2.CR P-11CRSect-2.CR P-12CRSect-2.CR P-13CRSect-2.CR P-14CRSect-2.CR P-15CRSect-2.CR P-16CRSect-2.CR P-17CRSect-2.CR P-18CRSect-2.CR P-19CRSect-2.CR P-20CRSect-2.CR P-21CRSect-2.CR P-22CRSect-2.CR P-23CRSect-2.CR P-24CRSect-2.CR P-25CRSect-2.CR P-26CRSect-2.CR P-27CRSect-2.CR P-28CRSect-2.CR P-29CRSect-2.CR P-30CRSect-2.CR P-31CRSect-2.CR P-32CRSect-2.CR P-33CRSect-2.CR P-34CRSect-2.CR P-35CRSect-2.CR P-36CRSect-2.CR P-37CRSect-2.CR P-38CRSect-2.CR P-39CRSect-2.CR P-40CRSect-2.CR P-41CRSect-2.CR P-42CRSect-2.CR P-43CRSect-2.CR P-44CRSect-2.CR P-45CRSect-2.CR P-46CRSect-2.CR P-47CRSect-2.CT P-1CTSect-2.CT P-2CTSect-2.CT P-3CTSect-2.CT P-4CTSect-2.CT P-5CTSect-2.CT P-6CTSect-2.CT P-7CTSect-2.CT P-8CTSect-2.CT P-9CTSect-2.CT P-10CTSect-2.CT P-11CTSect-2.CT P-12CTSect-2.CT P-13CTSect-2.CT P-14CTSect-2.CT P-15CTSect-2.CT P-16CTSect-2.CT P-17CTSect-2.CT P-18CTSect-2.CT P-19CT\n\nAdditional Math Solutions\n\nFind more solutions based on key concepts\n\nShow solutions add\n\nIn Exercises 4562, find the values of x that satisfy the inequality (inequalities). 51. x + 1 4 or x + 2 1\n\n\nSolving Inequalities Solve the inequality. 82. x2ex 2ex 0\n\nPrecalculus: Mathematics for Calculus (Standalone Book)\n\nSolve the equations in Exercises 126. (x21)2(x+2)3(x21)3(x+2)2=0\n\nFinite Mathematics and Applied Calculus (MindTap Course List)\n\nUse the guidelines of this section to sketch the curve. y=1+1x+1x2\n\nSingle Variable Calculus: Early Transcendentals, Volume I\n\nTrue or False: n=1(1)nn+14 is a convergent series.\n\nStudy Guide for Stewart's Single Variable Calculus: Early Transcendentals, 8th\n\n\nStudy Guide for Stewart's Multivariable Calculus, 8th\n\nIdentify possible sources and use them to identify a topic area for research.\n\nResearch Methods for the Behavioral Sciences (MindTap Course List)", "pred_label": "__label__1", "pred_score_pos": 0.7869328260421753} {"content": "For Quick Alerts\nFor Daily Alerts\n\nIs There A Connection Between Vastu Problems And Suicide?\n\n\nVastu describes basically two types of suicides. According to it, suicides might be committed because of momentary anger or because of constant mental unrest. Further, while momentary anger might not always be due to reasonable causes, there can be four major reasons behind constant mental unrest, which are career, strained relations, financial issues and health issues.\n\nMost of the time people ignore the Vastu rules while constructing a building and end up buying plots which are inappropriate for them. Especially, when the plot or house is available at low prices, people ignore the Vastu rules and buy it.\n\nBut Vastu Shastra says that Vastu rules are important as the wrong construction of a house might become a reason for the suicide of the person.\n\nMost Read : Vastu Tips For Office\n\nThere are some general rules other than these which are believed to be probable reasons for suicides, as per Vastu. These are the first things to be checked, as per Vastu Shastra. Take a look.\n\n1. A plot should not be located near a graveyard, a railway line, near or over bridges, etc.\n\n2. One should also not buy a plot located near the powerhouses and towers.\n\n3. Those plots which have an excess of trees or heavy trees in the compound are also not considered appropriate.\n\n4. Houses occupied by cats, owls, pigeon or bats are believed to be occupied by negative energies, because all four of these symbolize negative energies.\n\n5. The walls of the house should not have cracks in them.\n\n\nSuicides Due To Momentary Anger\n\nTo avoid suicides due to momentary anger, we should not have heavy machinery in the south direction of the house. There should not be any iron tools or decaying metals kept in the south direction of the house. A cattle shed should also not be there in this direction of the house. The south portion should also not be extended much.\n\nThere should not be a kitchen or other areas where heat is generated in the western direction of the house.\n\n\nSuicides Due To Career Issues\n\nThere should not be a waterbody or water tank in the western direction of the house. A storeroom should not be there in the north direction. Otherwise, the career of the individual might get negatively affected and thus might cause constant mental unrest.\n\nMost Read : Vastu Tips For Kitchen\n\n\nSuicides Due To Problems In Relations\n\nThere should not be a temple or place of worship present in the west direction of the house. The library or the study room should also not be situated in the south-east corners. While the north and east directions are associated with the Gods, the south direction is not good at all. Similarly, if there is a makeup room or dressing table placed in the west direction, it might become one of the reasons for strained relations.\n\n\nSuicides Due To Financial Issues\n\nThe north direction is associated with finance. That is why it is often said that the cash cupboard should be placed in the north direction. In order to keep financial tensions at bay, we should follow all the rules related to the north direction. There should also not be a storeroom in the north direction. Anything which the gods would not like should not be placed in the north direction.\n\n\nSuicides Due To Health Issues\n\nTo avoid health issues that can become the cause of a serious tension and a reason for constant worry, we should not construct south-facing houses. A waterbody in the north might also become responsible for the health issues of the family members. Vastu related to the east direction should also be properly followed for good health, says Vastu Shastra.\n\nRead more about: spirituality astrology vastu tips", "pred_label": "__label__1", "pred_score_pos": 0.8056619167327881} {"content": "\n\nLooking for an EB-5 investment: Here are 5 considerations\n\nWritten By: KURT REUSS\n\nKurt Ruess\nEB5 Deals\n\n\n1. Real estate projects have advantages\n\n\n2. Progress is positive\n\nThe more progress a project has made to date, typically the less risk there is for immigration purposes and financial success. Construction progress mitigates risks associated with permitting, financing, and means job creation is already under way. Progress also means market fluctuations have less time to impact a project. The closer you get to completion, the sooner operations and stabilization of the asset, allowing permanent financing to be put in place, which is often used to return capital back to EB-5 investors.\n\n\n3. Exemplar and I-526 approvals\n\nOnce USCIS approves at least one I-526 petition, the Immigration Service is highly likely to defer other petition reviews to this approval. A single I-526 approval indicates that the project documents meet the EB-5 program requirements and job creation methodology has been accepted. Often people think that an exemplar approval is a special type of approval issued by the Immigration Service, but it is actually an approval of the project documents before they are filed with an I-526 petition.  Regional centers file for an exemplar in order to provide confidence to the market that their offering will not be rejected in a petitioner’s I-526 submission. So regardless of whether an exemplar gets approved or a single petitioner’s I-526 is approved, both indicate acceptance by USCIS.\n\n\n4. Exit strategy coincides with your I-829 filing date\n\nIdeally you want to select an EB-5 fund whose investments have an exit strategy, or maturity date, that coincides with your anticipated I-829 filing date. To do so, determine how long you expect it will take to file your I-829. You should consult with your lawyer on this. This is the date that ends the requirement of maintaining your capital “at-risk.”\n\n\nNext, you’ll want to add in a cushion of time to this date, say one year, for potential delays in processing your petition. It is around this date that you want the EB-5 Fund to have funds available for repaying their investors.\n\n\nThe calculation is different if you were born in a retrogressed country. If you were born in India or Vietnam, you are probably facing a 7-year wait for an EB-5 visa to be available. But it may be possible to go straight to the I-829 stage after entering the U.S., so with a 1-2 year cushion, 8-9 years may be the optimum date to have your capital returned to you.\n\n\nLoan vs. equity\n\nLoans offer more certainty to estimating maturities as they have maturity dates, while with an equity investment, the Developer does not have an obligation to repay at a specified time. A loan must be repaid at the maturity date or it would be considered in default. But, of course, loans often include loan extension options. It is therefore imperative to identify who makes the decision to extend the maturity date of a loan, and to ask if all investors are subject to the new maturity date. Some EB-5 funds have multiple loans to the borrower with different maturity dates, thereby enabling investors to get repaid at different times as they meet their conditional residency requirements,\n\n\n5. Be wary of higher than average rates of return\n\nIn order to get a rate of return of 3%-4% on your EB-5 investment, you will probably need to invest in a Project where a similar non-EB-5 investment would earn 12%-18%. Compare that to investments that are returning 0.25%, but are replacing money that might otherwise require 5%-8%. In this example we might be taking on 10% more risk for an additional rate of return of 3%.\n\n\nEB-5 investments are primarily designed to result in a Green Card and are not typically an opportunity to earn a high return on an investment.\n\n\n\nReal estate projects that have made significant progress, offer a maturity date that coincides with the timeline of your I-829, and has at least one I-526 approval or an exemplar approval is the starting point for selecting an EB-5 investment that meets your needs.\n\nMarriott Hotel LaGuardia EB5", "pred_label": "__label__1", "pred_score_pos": 0.7938489317893982} {"content": "Praise the Orc! - Chapter 33\n\nPublished at 28th of June 2017 09:49:55 AM\nPlease help us improve Trinity Audio\nChapter 33\n\nChapter 33 – Plains Rescue (4)\n\nSponsored Content\n\nA university restaurant .\n\nEverybody was eating their meals . The TV stopped at one channel .\n\n-Hello . I am Giuseppe, a reporter from [Surprise! What happened in Elder Lord?] .   I am now in the elven city, Arnin .  There is a strange thing occurring here!\n\nBehind her were the high walls of Arnin . The camera illuminated Arnin’s landscape before focusing on Giuseppe again .\n\n–Arnin is famous for its beautiful elf mayor, but there is something more mysterious than her beauty occurring here .  It isn’t here in Arnin, but in the Northern Arnin Plains, the place where triters are hunted to build up reputation .\n\nShe ran northwards towards the plains . The angle shook like the cameraman was chasing after her .\n\n–What is going on here? This Giuseppe will go and check it out!\n\nShe discovered users walking out of the plains . Their faces were covered in mosaics .\n\n-Hello .  Did you just come from the Arnin Plains?\n\n–So what?\n\n–People are saying that a miracle is happening at Arnin Plains, is that true?\n\n\nA dwarf male nodded .\n\n-That’s right .  It is a very curious thing .  I was pleasantly surprised .\n\n–What is it?\n\n–You will know if you go there .  If you go now, then you will be able to meet him .\n\nSubtitles appeared and there was a narrator .\n\n-Who can she meet?\n\nThis time, Giuseppe asked the elf standing beside the dwarf . His face was also covered in a mosaic .\n\n–Have you met him personally?\n\n–Of course .  We drank and ate together all night .\n\n\n–That’s right .  At first there was a misunderstanding, but he is a very kind and nice person .  My eyes were opened .\n\n–Wow, is he really that great?\n\n–He is truly…a true ○○ .\n\nThe last part referring to the character was beeped out .  The camera cut to another scene . Giuseppe stood at the entrance of the plains as she stared into the screen .\n\n–Now, shall I go and see the rumored person?\n\nThen Giuseppe entered the plains .  The spacious plains were filled with people struggling against the huge triters . Giuseppe lowered her voice and said,\n\n–Now…let’s find out who the rumoured figure is .\n\nThen she ran . She ran across the plains and found a user who had just killed a triter . Giuseppe moved cautiously .\n\n–Here… Hello?\n\n–Eh, what? Ah, Giuseppe! Aren’t you Giuseppe?\n\n–Haha, do you recognize me?\n\n-I’m a fan .  A big fan of ‘What happened in Elder Lord?’ .\n\n–Thank you .\n\n–But what are you doing… Ah! You came because of him .\n\nThe user nodded .\n\n–Ah! Do you know who he is?\n\n–Yes .   I know very well .  I thanked him for his help a few times .\n\n–Thanked him for his help?\n\n–Anyone who doesn’t know him here is a spy, a spy .  One spy was frightened off by him .  Hahaha .\n\nGiuseppe looked at the screen with a coy look .\n\n–Then…what type of person is he? I’m really curious .\n\nSponsored Content\n\nShe asked the user again .\n\n–Where can I meet him?\n\n–Hrmm… He…because he is so busy…\n\nThe user stroked his chin and pointed in one direction .\n\n–Do you see that rock over there?\n\n–That big rock?\n\n–Yes .  Wait over there .  It is the place where his legend began .\n\n\nGiuseppe trembled and made a big fuss .\n\n–Legend! Truly? What legend? And he might be waiting for us! My heart’s already pounding! I’m looking forward to it .  Would the viewers like to come along as well?\n\nThen she bowed to the user and ran towards the rock .  It was an automatic shot that didn’t require a heavy camera, but the screen waved once again like someone was chasing after her .\n\nThey arrived in front of the rock . It was a big rock . But as they approached it, they saw something engraved in the rock .  Subtitles popped up .\n\n[Do you want to know what is written on here…?]\n\nGiuseppe breathed out and placed her hands on the rock and took a step back in amazement .\n\n–There is something engraved here .  This…?\n\nAt that moment, the focus blurred . The letters engraved on the rock couldn’t be seen . Subtitles popped up .\n\n[It will continue in a moment!]\n\nThen the screen switched to some ads .  The customers watching idly in the restaurant started to complain as the advertisements appeared .\n\n“Isn’t dragging it on like this annoying?”\n\n“That’s right . That reporter, I don’t like her pretending to be so pretty either . ”\n\n“But what is it about? I’ve never been there before . ”\n\n“I have . I feel like puking every time I see a triter now . It was a few days of hard work . I even died once . ”\n\n“Idiot . You died to those cows?”\n\n“They aren’t cows . You would turn out the same if you made a mistake . ”\n\nThe customers in the restaurants started to tell their own stories about Elder Lord .  For some time, the latest capsule and electronic devices from the Myeongsong Group were advertised on the TV . The advertising model was a prominent ranker in Elder Lord .\n\nAfter the ads were over, Giuseppe appeared on the screen again . The eyes of the customers turned back to the television again .\n\n–Carved here…what is it…?\n\nIt is coarse writing, like it was made with a blade!\n\nThe screen was close up so the full sentence didn’t appear at first . Giuseppe touched each of the letters by hand .\n\n\nThe screen got further away and the sentence on the rock appeared .\n\n-A warrior doesn’t…attack unarmed people?\n\nGiuseppe was confused .\n\n–Who carved this? Warrior? Somehow, I can feel the spirit of chivalry .\n\nIt was at that moment .  Giuseppe suddenly turned her head . Her face turned pale .\n\n\nThe screen convulsed . There was a loud sound, like something had bumped into the camera .  A triter .  Giuseppe wasn’t a strong user so she ran away . The person recording her also ran . The screen kept on shaking .\n\nThe moment that the triter was about to reach Giuseppe .\n\n\nThe screen was overturned .  The blue sky of Elder Lord appeared on the screen .  The silence continued .\n\nThe customers watching the video were confused .\n\n“…Isn’t this a broadcasting accident?”\n\n“But that isn’t a live broadcast . ”\n\n“Is she dead? Why would they broadcast a death? To show that it’s real?”\n\nSponsored Content\n\nThe customers in the restaurant murmured .  At that moment, something appeared on the screen .\n\n\nIt was a big hand .  Thick fingers were seen first . The customers thought it was a dwarf, but the skin was green .  The rough hands filled with calluses filled the screen .\n\n\nA groan emerged from Giuseppe .  The thick hand grabbed what was assumed to be the video recorder’s hand . Her body was pulled up and the screen shook again .  The sight revealed before them was an orc .\n\n\nThe orc had an unusual appearance .  First, the black bandana on his head . It was old and faded, like it had been used for a long time . The mark of the Blacksmith Company was engraved on the corner .\n\nBelow it was the face of an orc . Intense eyes that glared at them! A big nose, thick lips, and protruding tusks .  Fierce tattoos spanned his entire body and there was a huge greatsword on his back .  But the most unusual thing was the orc’s outfit .  There was a red cloth vest over leather armor . In the middle of the vest, a clear cross was drawn with a word embroidered underneath it .\n\n[R . E . S . C . U . E!]\n\nWhat did ‘rescue’ mean? Giuseppe couldn’t speak and just looked at the orc . The orc looked at her and the person shooting .  Then the orc raised a hand .\n\n… . . !\n\nThe orc raised his thumb and turned around .  The back also contained a white cross with words underneath it .\n\n[L . I . F . E . G . U . A . R . D!]\n\nThe orc disappeared into the triter hunting grounds .  What did they just see?\n\nRescue, lifeguard .  It was like the deep valley rivers, the beach at summer, and the snow-covered ski slopes .\n\nGiuseppe muttered blankly .\n\n–J-Just now, an orc saved us .  What is this?\n\nThe odd situation where an orc that was treated as a monster saved them! But this wasn’t the end .\n\nA user hunting a triter appeared on the screen . The user flew through the air . The moment that the triter was about to trample on the user, the triter suddenly bounced away, like it was hit by a strong impact .\n\nThen a black figure jumped towards it . The triter that had just been trying to stand up fell back down as blood emerged .  It was a perfect hunt .\n\nThe mysterious orc, who saved them previously, was standing in front of the triter with the giant sword .  The sight of him holding the greatsword in the middle of the broken triter was magnificent .\n\nThen the orc raised his thumb towards the user .\n\n… . . !\n\nIt was the coolest thumbs up that they had ever seen .  The user bowed and also did a thumbs up . The orc turned around like nothing had happened and sat down on the ground . He watched the people hunting .\n\nGiuseppe hurriedly approached the user who had just been saved .\n\n-Hello User!\n\n–Uh…? Ah, hello?\n\n-I am Giuseppe, a reporter from [Surprise! What happened in Elder Lord?] .   Please explain the strange scene that I just saw .  What is going on?\n\n–Ahh… You came for him…\n\nHe pointed to the orc . The orc was just sitting there silently .\n\n–That . . he is a mute orc warrior .\n\n\n–The thing that is occurring here…\n\nThe screen changed to a story .  Instead of Giuseppe, the narrator started to explain the orc’s story .  \n\nThe situation was this: He came to the city of elves because he wanted to enter Arnin, but was denied access because he was an orc .  \n\nAn orc actor appeared for a retelling . Although it was sloppy, he somewhat resembled the orc .  As soon as he was about to enter a castle, an elf actor appeared and stood in front of him .\n\n–You can’t access .\n\n‘Is it because I am an orc?’ The orc asked through gestures .\n\n–An orc isn’t allowed to enter here!\n\n-…… . !\n\nThe orc made a despairing pose .  The narrator explained .\n\n–He was shocked to hear that he couldn’t enter because he was an orc .  However, he found out that there was another way to enter Arnin…\n\nThe orc actor formed a fist and nodded . He headed to the Arnin Plains with a hopeful expression .\n\n–It is nothing other than hunting monsters on the Arnin Plains .  But what he saw was many people suffering while hunting the monsters .\n\nSponsored Content\n\nThe orc actor looked sad .\n\n–He couldn’t speak, but he was still a tough orc warrior .  He made a decision…\n\nThe orc actor decided something with a firm expression . He started running through the Arnin Plains .\n\n–He helped those in danger .\n\n-The orc saved people .\n\nThe pet pigs representing the triters fell and the orc warrior actor raised his thumb at the person who thanked him .\n\n–As he can’t speak, this thumb is the best way for him to express himself .\n\nAll of a sudden, the atmosphere was reversed .\n\n–Of course, things weren’t always good .  One day, a user thought of the orc as a simple monster and struck…\n\nThe orc actor and human actor confronted each other with knives .\n\n-He was victorious after some difficulty and was on the verge of killing the human .\n\nThe orc and the kneeling human were surrounded by four or five actors . All the humans called for the orc to kill his opponent .\n\nKill! Kill! Kill!\n\n–But after all that, he made a difficult decision .\n\nThe orc shook his head .  The other actors were shocked by his decision . ‘Why?’ They protested . The orc looked distressed as he wasn’t able to speak .\n\n–Instead of answering with words, the orc inscribed his will on the rock with his sword .\n\nThe orc actor aimed the knife at a rock .  Then the screen changed and illuminated the giant rock that actually existed on the Arnin Plains .\n\n[A warrior doesn’t attack unarmed people . ]\n\n-It was this .\n\nFor a moment, it shone . ‘Ohhh’ . The sound of an audience cheering was produced as an audio effect .\n\n–This is all true .\n\nIt changed to an interview screen . All of the users had mosaics on their faces, but they all praised the orc .\n\n–He is reliable .  Really .\n\n–I can’t even count the number of times my life was saved because of him .  A truly great person .\n\n–The name? Um, he can’t talk .\n\n–I don’t know how it happened .  But this much is clear .  We were mistaken about orcs .\n\n–He is…\n\n\n\n-A true…\n\nThe interviewers all finished simultaneously .\n\n–A warrior .\n\nThe screen was switched .  Giuseppe followed the orc .\n\n–Orc! Orc!\n\n-…… .\n\nThe orc seemed annoyed as Giuseppe followed him .  In the end, the [Surprise! What happened in Elder Lord?] production team couldn’t get an interview with him .  Giuseppe was forced to finish the program in front of the rock carved by the orc .\n\n–Unfortunately, I was unable to interview him .  It is a shame, but the sentence that he left behind tells us who he is on its own .\n\nThe sentence shone again on the screen .\n\n‘A warrior doesn’t attack unarmed people . ’\n\nMany things were implied with the sentence .\n\n–Although he is a NPC, it seems that we have a lot to learn from him .  Especially at this time, when many ethical problems are being raised about Elder Lord .  I hope you have enjoyed this wonderful, delightful and warm Elder Lord life .  This was Giuseppe, a reporter from [Surprise! What happened in Elder Lord?] .\n\nShe waved her hand . At the same time, the camera rose into the sky and captured both her and the rock . It continued to climb up until the rock looked like a toy, capturing the image of the plains and the blue sky of Elder Lord .\n\nThe narrator finished .\n\n–The nameless orc .  I hope his life as a great warrior will last for a long time .\n\nSponsored Content\n\nThe broadcast closed with this voice and some music .  The program ended .\n\nThe restaurant’s customers rose from their seats .\n\n“That was amazing . Was that really an orc?”\n\n“Really . Aren’t there many witnesses on the Internet? It is more interesting to see it directly . ”\n\n“The orc is great . ”\n\n“Are you doing anything now?”\n\n“Where did he go? People will come and watch . ”\n\n“Hey, do you want to try becoming an orc?”\n\n“Yes . ”\n\nThe university students left the restaurant .  When they talked about the program they just saw, all of them usually asked one question .\n\n“That orc, what is he doing now?”\n\n\n\n\nElwina, the elf guard at Arnin’s gate, looked at the orc in front of her in surprise .\n\nThis was the first time that someone had raised their reputation so quickly . It usually took a month of focused hunting .\n\nIn addition, his pass wasn’t just a permit .  It was an honourary citizenship granted by the Arnin Plains administrator . It was an honourable title only given to those who did great achievements in Arnin . He would be treated as a citizen of Arnin .\n\nElwina’s heart started pounding . The orc had really solved the task he was given . He was much more wonderful than she had thought .\n\n“I-Incredible . I’m not surprised so don’t be mistaken . ”\n\nElwina tried to say calmly .  The orc didn’t answer .\n\n“What, are you ignoring people now?”\n\n\n“Why do you keep…ah . ”\n\nThe orc was pointing at his mouth .\n\nElwina blushed .  “Ah, that’s right . I had forgotten . When I think back, I think I used too much strength . I didn’t know it would still last . Well, I’m sorry . ”\n\nShe dismissed the magic .  Silence was disabled .\n\n“So now…”\n\n“Hey, elf with no manners . ”\n\n\n“Because of you…!”\n\nShe looked at Crockta with a hurt expression .  Crockta looked at the beautiful elf and changed his next words .\n\n“…So pretty . ”\n\n“Oh my god . ”\n\n“Well then, I’ll see you later . No offense, pretty elf guard . ”\n\nThe Crockta confidently headed through the gates .  Elwina stared blankly at his back . She felt a strange feeling .\n\nThen someone spoke to her .  “Young Lady . ”\n\n“…Don’t call me that . I am now a guard . ”\n\n“The mayor is calling . ”\n\n\nElwina was confused .\n\n“She said to stop being a guard . ”\n\n“Please tell her that I will do as I want . ”\n\n“If Young Lady doesn’t return home right now, then she will sell all of your collection…”\n\n“I understand . I will go back . ”\n\nElwina sighed .\n\nSponsored Content", "pred_label": "__label__1", "pred_score_pos": 0.9943088293075562} {"content": "Gen. Z workers want immediate access to data that shows them how they’re performing. That’s one reason many companies — like AccentureMicrosoft, and Adobe — are doing away with traditional performance reviews. Annual cycles are just way too slow for today’s workers, among other problems.\n\nYounger workers have grown up with expectations of instant gratification. They’re used to having everything they’ve ever needed at their fingertips thanks to smartphones, and this craving for instant gratification carries over into their work lives. Instead of waiting until the end of the game to learn the score, Gen. Z employees want immediate access to their real-time performance data. After all, that’s the only way they can make adjustments and improve their performance before the game is over.\n\nBut while more timely data can be useful to Gen. Z-ers, overreacting to every uptick or drop in a metric leads to a lot of wasted effort and gets in the way of business success. The trick is to give young employees their data points, but also teach them how to avoid overreacting.\n\nReal-Time Data Without the Distraction\n\nLet’s say Riley is the marketing director for a recruiting firm. One of her goals is to increase traffic on the company website, and her future pay raises and possible promotions depend on it. Web traffic is, thankfully, easily measured, and Riley gets an email from Google Analytics each month that shows the number of users and how much that number has changed from the month before.\n\nTwo data points are not a trend, and all the Google email does is compare one data point to the last. If the number of users is down 2.2 percent from the previous month, it’s really hard to evaluate that percentage change without better context. Searching for the older Google emails, Riley sees that traffic was up 16.7 percent the previous month. Riley might be tempted (or pressured by the CEO) to ask why growth has turned into decline. Riley would then spend a few hours investigating, looking for a root cause for the decline in the number of users.\n\nIt’s a fact that a negative 2.2 percent is worse than a positive 16.7 percent, but again, it’s just two data points. How much does that number normally fluctuate each month over time? A better question to ask would be, “Has the number of users changed in a way that is statistically significant?” If the recent decline in users is not statistically significant, looking for a root cause is a distraction, if not a waste of time.\n\n\nLet’s say you step on the scale at the same time each morning. Even if your weight is pretty stable over time, you’re not going to weigh the exact same amount each day. Many of us learn to shrug off small fluctuations in our weight, looking instead for more meaningful trends. We can do the same with the way we keep score at work.\n\nThe first thing Riley could do differently is log into Google Analytics to see the number of users by week (or even by day). Google Analytics will, by default, visualize the numbers as a run chart, a method that makes it far easier for Riley to see trends in how the number of website visitors has changed over time. Here’s an example:\n\n\nWhen we step back from looking so closely at each data point, trends (or the lack thereof) across a longer time frame might appear. Riley sees, in the chart, that this metric goes up some weeks and goes down others — a helpful insight into the metric’s performance.\n\nA slightly more sophisticated approach would be to use a spreadsheet to create a process behavior chart from the data, a method I teach in my book, Measures of Success. In addition to the data, Riley would calculate the average weekly number of visitors, and a line would be added to the chart, shown below in green. Riley would also calculate the lower and upper limits, adding two more lines to the chart (shown below in red), so it looks like this:\n\n\nAgain, this chart makes it look like the number is fluctuating around an average of about 3,500. Any single data point outside of the limits (outside of the red lines) would be a signal that web traffic has changed significantly. Any single data point between the red lines is just noise in the system. Freed of the need to explain every up and down, Riley is now able to spend time working on things that might attract more users to the website, such as creating new content.\n\nAnother signal that a metric has shifted significantly would be finding eight consecutive data points above the average. In fact, the last eight data points almost meet that criteria. As additional weeks go by, Riley (and the CEO) will see additional data points. The number might continue fluctuating around the average — or with the right efforts in place to increase (and not just explain) web traffic, they might see a signal that shows an increase.\n\nA methodology like this shows there’s no need to wait months (or until the end of the year) to tally up the numbers and evaluate performance. I stand with Gen. Z when I say, “Give me more numbers, more quickly — but also teach me how to react less and lead me more effectively, so we can improve more.”\n\nMark Graban is an internationally recognized consultant, author, and professional speaker. His latest book is Measures of Success: React Less, Lead Better, Improve More.\n\nPower your recruiting success.\nTap into, the largest network of recruiters.\n\nin Performance Management]", "pred_label": "__label__1", "pred_score_pos": 0.9987773895263672} {"content": "Nope, our Temporary Moon Isn’t Space Junk, it’s an Asteroid\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nFurther Reading: UANews\n\nEvidence Continues To Mount For Ninth Planet\n\nEver since its existence was first proposed, the evidence for Planet 9 continues to mount. But of course, said evidence has been entirely indirect, consisting mostly of studies that show how the orbits of Trans-Neptunian Objects (TNOs) are consistent with a large object crossing their path. However, evidence is also emerging that comes from the center of the Solar System itself.\n\nThis latest line of evidence comes from Caltech, where researchers Elizabeth Bailey, Konstantin Batygin, and Michael E. Brown (the latter of whom were the ones who first proposed Planet 9’s existence) have published a new study linking solar obliquity to the existence of Planet 9. Essentially, they claim that the axial tilt of the Sun (6°) could be due to the gravitational influence a large planet with an extreme orbit.\n\nTo recap, the issue of Planet was first raised in 2014 by astronomers Scott Sheppard and Chadwick Trujillo. Noting the similarities in the orbits of distant Trans-Neptunian Objects (TNOs), they postulated that a massive object was likely influencing them. This was followed in 2016 by Konstantin Batygin and Michael E. Brown of Caltech suggesting that an undiscovered planet was the culprit.\n\n\nCalling this body Planet 9, they speculated that it had a mass 10 times greater than that of Earth, and took 20,000 years to complete a single orbit of our Sun. They also speculated that its orbit was tilted relative to the other planets of our Solar System, and extremely eccentric. And little by little, examinations of other Solar bodies have shown that Planet 9 is likely out there.\n\nFor the sake of their study – “Solar Obliquity Induced by Planet Nine“, which was recently published in the Astrophysical Journal – the research team (led by Bailey) looked to the obliquity of the Sun. As they state in their paper, the six-degree axial tilt of the Sun can only be explained in one of two ways – either as a result of an asymmetry that was present during the formation of Solar System, or because of an external source of gravity.\n\nTo test this hypothesis, Bailey, Batygin and Brown used an analytic model to test how interactions between Planet 9 and the rest of the Solar System would effect their orbits over the course of the last 4.5 billion years. As Elizabeth Bailey, a graduate student at Caltech’s Division of Geological and Planetary Sciences and the lead author on the paper, told Universe Today via email:\n\n“We simulated the solar system’s motion. Planet 9 forces the solar system to slowly wobble. If Planet 9 is out there, we are in the process of wobbling right now, as we speak! But it happens very slowly, a few degrees tilt per billion years. Meanwhile the sun is not wobbling much,  so it looks like the sun is tilted. A range of Planet 9 parameters cause exactly the configuration of the sun that we see today.\n\n\nIn the end, they concluded that the Sun’s obliquity could only be explained by the influence of giant planet with an extreme orbit, one that is consistent with the characteristics attributed to Planet 9. In other words, the existence of Planet 9 offers an explanation for the Sun’s peculiar behavior, something which has remained a mystery until now.\n\n“Planet Nine was first hypothesized because the orbits of objects in the outer reaches of the solar system are confined in physical space,” said Bailey. “Those orbits would be all over the place unless something is currently stopping them. The only explanation so far is Planet Nine. For over 150 years, people have wondered why the sun is tilted. Personally I’d say that Planet 9 offers the first satisfying explanation. If it exists, it tilted the sun.”\n\nIn addition, the subject of Planet 9 was also raised at the joint 48th meeting of the American Astronomical Society’s Division for Planetary Sciences and 11th European Planetary Science Congress, which took place from Oct 16th to 21st in Pasadena, California. During the course of the meeting, researchers from Arizona University shared the results of their own study, which was published back in August.\n\nThe Arizona research team was led by Renu Malhotra, a Regents’ Professor of Planetary Sciences in the University of Arizona’s Lunar and Planetary Lab. For the sake of their study, titled “Corralling a Distant Planet with Extreme Resonant Kuiper Belt Objects“, they examined the orbital patterns of four extreme Kuiper Belt Objects (KBOs), which have the longest orbital periods of any known objects.\n\nArtist's impression of the the possible Planet 9 at the edge of the Solar System. Credit: Robin Dienel/Carnegie Science\n\nAccording to their calculations, the presence of a massive planet – one that would complete an orbit around the Sun every 17,117 years, and at an average distance (semimajor axis) of 665 AU – would explain the orbital pattern of these four objects. These results were consistent with the estimates concerning the orbital period of Planet 9, its orbital path, and it mass.\n\n“We analyzed the data of these most distant Kuiper Belt objects,” Malhotra said, “and noticed something peculiar, suggesting they were in some kind of resonances with an unseen planet… Our paper provides more specific estimates for the mass and orbit that this planet would have, and, more importantly, constraints on its current position within its orbit.”\n\nLooks like Planet 9’s days of hiding in the outer Solar System may be numbered!\n\nFurther Reading: arXiv, Caltech, Europlanet\n\nKuiper Belt Objects Point The Way To Planet 9\n\n\n\nSince that time, many researchers have responded with their own studies about the possible existence of this mysterious “Planet 9”. One of the latest comes from the University of Arizona, where a research team from the Lunar and Planetary Laboratory have indicated that the extreme eccentricity of distant Kuiper Belt Objects (KBOs) might indicate that they crossed paths with a massive planet in the past.\n\nFor some time now, it has been understood that there are a few known KBOs who’s dynamics are different than those of other belt objects. Whereas most are significantly controlled by the gravity of the gas giants planets in their current orbits (particularly Neptune), certain members of the scattered disk population of the Kuiper Belt have unusually closely-spaced orbits.\n\n\nWhen Batygin and Brown first announced their findings back in January, they indicated that these objects instead appeared to be highly clustered with respect to their perihelion positions and orbital planes. What’s more, their calculation showed that the odds of this being a chance occurrence were extremely low (they calculated a probability of 0.007%).\n\n\n\nIn a paper titled “Coralling a distant planet with extreme resonant Kuiper belt objects“, the University of Arizona research team – which included Professor Renu Malhotra, Dr. Kathryn Volk, and Xianyu Wang – looked at things from another angle. If in fact Planet 9 were crossing paths with certain high-eccentricity KBOs, they reasoned, it was a good bet that its orbit was in resonance with these objects.\n\n\nTo break it down, small bodies are ejected  from the Solar System all the time due to encounters with larger objects that perturb their orbits. In order to avoid being ejected, smaller bodies need to be protected by orbital resonances. While the smaller and larger objects may pass within each others’ orbital path, they are never close enough that they would able to exert a significant influence on each other.\n\nThis is how Pluto has remained a part of the Solar System, despite having an eccentric orbit that periodically cross Neptune’s path. Though Neptune and Pluto cross each others orbit, they are never close enough to each other that Neptune’s influence would force Pluto out of our Solar System. Using this same reasoning, they hypothesized that the KBOs examined by Batygin and Brown might be in an orbital resonance with the Planet 9.\n\n\n“The extreme Kuiper belt objects we investigate in our paper are distinct from the others because they all have very distant, very elliptical orbits, but their closest approach to the Sun isn’t really close enough for them to meaningfully interact with Neptune. So we have these six observed objects whose orbits are currently fairly unaffected by the known planets in our Solar System. But if there’s another, as yet unobserved planet located a few hundred AU from the Sun, these six objects would be affected by that planet.”\n\n\n\n\n“For a resonance to be dynamically meaningful in the outer Solar System, you need one of the objects to have enough mass to have a reasonably strong gravitational effect on the other,” said the research team. “The extreme Kuiper belt objects aren’t really massive enough to be in resonances with each other, but the fact that their orbital periods fall along simple ratios might mean that they each are in resonance with a massive, unseen object.”\n\nBut what is perhaps most exciting is that their findings could help to narrow the range of Planet 9’s possible location. Since each orbital resonance provides a geometric relationship between the bodies involved, the resonant configurations of these KBOs can help point astronomers to the right spot in our Solar System to find it.\n\n\n“There are a lot of uncertainties here. The orbits of these extreme Kuiper belt objects are not very well known because they move very slowly on the sky and we’ve only observed very small portions of their orbital motion. So their orbital periods might differ from the current estimates, which could make some of them not resonant with the hypothetical planet. It could also just be chance that the orbital periods of the objects are related; we haven’t observed very many of these types of objects, so we have a limited set of data to work with.”\n\nBased on a careful study of Saturn's orbit and using mathematical models, French scientists were able to whittle down the search region for Planet Nine to \"possible\" and \"probable\" zones. Source: CNRS, Cote d'Azur and Paris observatories. Credit:\nEstimates of Planet Nine’s “possible” and “probable” zones. by French scientists based on a careful study of Saturn’s orbit and using mathematical models. Source: CNRS, Cote d’Azur and Paris observatories. Credit: Bob King\n\n\n\nFurther Reading:", "pred_label": "__label__1", "pred_score_pos": 0.8660512566566467} {"content": "The K-center algorithm\n\nI have always liked the K-center algorithm. K-center tends to cover the data set uniformly rather than concentrating on the high density areas (like K-means). Also, K-center does well if small outlier clusters belong to different classes, whereas K-means tends to ignore small clusters. Check out K-Center and Dendrogram Clustering: Applications to Image Segmentation for some nice pictures.", "pred_label": "__label__1", "pred_score_pos": 0.6358765363693237} {"content": "ch 16 APUSH\n\nFrederick Jackson TurnerAmerican historian who said that humanity would continue to progress as long as there was new land to move into. The frontier provided a place for homeless and solved social problems.\nSitting Bulla chief of the Sioux\nLittle Big HornWHO: Indians and US\nWHAT:Custer and his men were wiped out by a coalition of Sioux and Cheyenne Indians led by Sitting Bull and Crazy Horse\nWHERE: S. Montana\nWHY: Last major Indian victory\nChief JosephLead the Nez Perce during the hostilities between the tribe and the U.S. Army in 1877. His speech “I Will Fight No More Forever” mourned the young Indian men killed in the fighting.\nassimilationistsThese people had been mostly influenced by Jackson’s book and had deep sympathy for the Natives due to the injustices done to them, and would segregate Native American children from their people and teach them white culture and farming and industrial skills. They also emphasized formal education and training and conversion to Christianity for the Natives.\nGhost Dance MovementThe last effort of Native Americans to resist US domination and drive whites from their ancestral lands, came through as a religious movement.\nWounded Kneevillage in South Dakota. In 1890 it was the site of a massacre of Native North Americans in which between 150 and 370 Sioux people were killed, most of them unarmed.\nIndian Reorganization Act1934 – Restored tribal ownership of lands, recognized tribal constitutions and government, and provided loans for economic development.\nGeorge Washington CarverUnited States botanist and agricultural chemist who developed many uses for peanuts and soy beans and sweet potatoes (1864-1943)\nTuskegee instituteA normal and industrial school led by Booker T. Washington in Tuskegee, Alabama. It focused on training young black students in agriculture and the trades to help them achieve economic independence. Washington justified segregated, vocational training as a necessary first step on the road to racial equality, although critics accused him of being too “accomodationist”.\nFarmers’ Southern AllianceBy 1890, it had more than one million members. It rallied behind political reforms to solve farmers’ economic troubles.\nCivil Rights Cases of 1883Court ruled that Congress could not legislate against the racial discrimination practiced by private citizens.\nPlessy v. Fergusona 1896 Supreme Court decision which legalized state ordered segregation so long as the facilities for blacks and whites were equal\nJim Crow lawsThe “separate but equal” segregation laws state and local laws enacted in the Southern and border states of the United States and enforced between 1876 and 1965\nIda B. WellsAfrican American journalist. published statistics about lynching, urged African Americans to protest by refusing to ride streetcards or shop in white owned stores\nBooker T. WashingtonProminent black American, born into slavery, who believed that racism would end once blacks acquired useful labor skills and proved their economic value to society, was head of the Tuskegee Institute in 1881. His book “Up from Slavery.”\nNational Grange MovementOrganized in 1868 by Oliver H. Kelley as social and educational organization for farmers and their families.\nGranger LawsGrangers state legislatures in 1874 passed law fixing maximum rates for freight shipments. The railroads responded by appealing to the Supreme Court to declare these laws unconstitutional\nMunn v. Illinois(1877) United States Supreme Court Case that ended up allowing states to regulate business within their borders, including railroads\nWabash v. Illinois1886 – Stated that individual states could control trade in their states, but could not regulate railroads coming through them. Congress had exclusive jurisdiction over interstate commerce.\nInterstate Commerce ActApproved on February 4, 1887 the Interstate Commerce Act created an Interstate Commerce Commission to oversee the conduct of the railroad industry. With this act the railroads became the first industry subject to Federal regulation.\nNational AllianceThe deepening crisis in farm prices in the 1880s resulted in the blending of a host of organizations into the National Alliance Movement. The movement had distinct branches in the South and Midwest.\nOcala PlatformA platform that would have significant impact in later years: They supported 1) direct election of US senators, 2) lower tariff rates, 3) a graduated income tax, and 4) a new banking system regulated by the federal govt.", "pred_label": "__label__1", "pred_score_pos": 0.9547852277755737} {"content": "\n\nYesterday, we started talking about a number of questions from Curious Cat that focused on the role of angels in magical work, and what happens when they don’t show up or don’t do what we ask, command, or commission them to do for us.  This is a really complex topic, at least so complex that I can’t really answer it in the 3000 character limit that Curious Cat sets for question replies, but I’m trying to flesh it out as best as I can here on my blog.  Again, I’m approaching this from a Hermetic monist-yet-polytheist standpoint that takes in the existence of both angels and gods under God in the same creation that we’re in.  What we ended up with so far is this idea that we can’t really command angels to do anything; all we can do is pray that they do something for us, whether it’s appearing in a crystal for a conjuration or fulfilling some task or teaching us some mystery.  And when we make such prayers, we’re directing those prayers to God, because angels exist solely to fulfill the will of God; that’s their nature.  Angels don’t have free will; their will is the will of God, or they just constantly and forever want the exact same thing God wants in the exact same way, and will act in their capacities to fulfill the will of God.  This means that it’s our prayers to God that matter more than the presence or help of the angels, and there are lots of reasons why prayers might not be answered: sometimes it’s because we’re not asking for what’s possible according to the will of God, and sometimes it’s best we don’t get what we want because it’s not for us or because we’re not ready for it yet.\n\nWhat it all comes down to is this: we, as human beings, are blessed with quite a lot of power, but it’s not infinite power.  We’re actually quite small and insignificant in the grander scope of the cosmos, but we still have some significance.  That significance plays through our True Will, which is a fancy modern way to describe “our path in life”, the purpose and plan of God that God has established for us as individuals as written in his Book of Life.  Everything we do in life, in order to be successful, has to be either in explicit accordance with our True Will or at least tolerated and permissible within the bounds of what our True Will necessitates; to give a mundane example, it’s necessary that I leave my house at 7:20 am to go get to the train station on time, but that doesn’t mean I have to wake up at 6 am in order to be sufficiently ready, because I have the freedom to wake up earlier or later so long as I’m out the door by 7:20 am.  Likewise, we have to live according to our True Will, whether or not we’re consciously aware of it, but we also have leeway to do things explicitly outside it because it doesn’t fundamentally matter one way or another, so long as we’re not doing things that actively go against our True Will.\n\nWhen we act in accordance with our True Will, then we’re acting in accordance with the will of God, and we effectively become his angels for as long as our will is his will, and so long as that synchronization is maintained, there is nothing that can stop us; we might be delayed, slowed down, or face other difficulties in accomplishing it according to the usual vicissitudes of life and the struggles we face against the ignorant actions of ourselves or other human beings or the inimical actions of malevolent spirits, but God will not bar us or deny us from it, because it is his will that we should do the thing we’re doing.  When we act within the permissibility of our True Will, then what we’re doing may not be explicitly necessitated or mandated by God, but we have the license to act on it anyway because it doesn’t fundamentally matter one way or another so long as we get the right things done in the right way.  But when we act outside the permissibility of our True Will, then we go against the will of God, and there is nothing we can do that will change that, and we’re off-track from the proper path for ourselves in life.\n\nThe topic of True Will is one that I’ve talked about time and again on my blog in the past, and I think I’ve made some really important points on this before:\n\n\n\n\n\nWhat do we, as conjurers and magicians and magi, do?  We take our divine birthright as children of the Most High and join with him in the ever-continuing act of creation of the cosmos.  We ask for the blessing of God to do what is Right and to enact our True Wills, thereby rejoining God in his infinite Grace.  We step into the role as agents of the Divine, of the Most Divine, to work with the spirits who are our relatives, who are our brothers and sisters from the same Source, and who endeavor to aid us as they aid the Divine themselves.  We, essentially, become a consciously direct extension of God and join with God.  I’m going to stop this little poetic waxing short of saying “we become God”, because we already are essentially part of the Prime Mover down in this little ass-end of the cosmos, but we come closest to it consciously when we do our Work.\n\nThere are points when working with the spirits simply does not work; as Fr. Rufus Opus has said, the general idea is “move  this or move me”, where either a thing desired is changed or made in the world or where we ourselves are changed if nothing else can be changed.  God, clearly, can change everything, since that’s pretty much his thing; nothing disobeys God, since everything is a part of God and works as part of the One, the cohesive Whole.  But, that said, by moving ourselves, we partake in that same action, and bring ourselves closer to becoming what we need to Be and do what we need to Do; in these cases, we bring ourselves closer to attaining and carrying out our True Wills.  This is also the same in all other instances when working with the spirits gets us results in the external world. (November 2, 2013)\n\nThis ties in tightly to notions of True Will and divine providence, too, and the ideas are similar.  When we do what God wants us to do, carrying out and serving our divine purpose, that’s our True Will, the will we are meant to fulfill which we ourselves can know once we can see ourselves clearly enough.  To do that, however, we have to carry out the Great Work, which helps us prepare ourselves across the four parts of the world and begin to hear and use Logos.  This allows our sensible, material bodies to better heed and serve our souls, which can then develop properly into a fully-knowledgeable and divine soul with Nous.  With Nous being known to ourselves, we then can carry out what it is we’re supposed to do; at that point, any distinction between what we want and what God wants is meaningless, because our wills have become God’s will and vice versa. (December 8, 2013)\n\nI’ve brought up the idea before that, if we envision the whole grand scheme of things, the Cosmos, as a giant machine, then everyone is a gear in that machine. So long as we keep on doing what we need to do, every part works in harmony with every other part, and the machine works well. If even one part, however, gets out of sync or decides to revolt, then much of the rest of the system we find ourselves in can malfunction or break down, and other parts have to accommodate the malfunction until things get into proper working order again. (This is why life isn’t perfect, I suppose.) Kalagni of Blue Flame Magick once described this to me (in a discussion on True Will) as how a solar system works: the planets don’t need to think or plan or consciously strive towards orbiting the Sun, they just do it naturally as an expression of their selves and their purpose. But imagine, dear reader, if a rogue planet suddenly whipped itself into our solar system, or worse, imagine if one of our own planets suddenly got a wild hare up its axis of rotation and jumped out of its orbit. What happens? The other planets get knocked out of their own orbits, potentially colliding with other planets or celestial bodies, and the whole system gets out of whack until it finds a new equilibrium to settle down in. There’s no guarantee that this equilibrium will be equivalent to the previous one, or that the solar system as a whole will survive such an accident, but hey, shit happens. The Cosmos will do what it needs to do in order to work out its own problems, and its our job to make sure that we do our own Work accordingly to handle our Will, regardless of what the vicissitudes of fate throw at us. (February 12, 2017)\n\nWhen you seek to work against your True Will, you cause problems, and the only solution is to get back in line with your True Will; there is no other option or alternative, and as I said earlier, no angel, demon, ghost, or god will make what you seek permissible without them going against their own True Wills.  Yes, other entities have their own True Wills.  It stands to reason that if we have a particular purpose in the creation of the Creator, then so does everyone and everything else, too, with the same kinds of boundaries and limits, just on different scales and with different scopes.  I brought this up in my answer to that last question from Curious Cat, since the question referenced other deities as examples of ones one might go to when God himself says “no”, one of which was the orisha Yemaya:\n\nSince you bring up Yemaya, my mother in Ocha who’s extraordinarily dear to my heart (though my father and crown is Ogun), I can phrase this in a more Ocha-centric way. In Ocha theology, there are all these orisha, the divinities of the world, but there’s a hierarchy among them, with Obatala as king of the orisha. But Obatala is not the almighty all-ruler of the cosmos; that role goes to Olodumare (or Olorun or Olofi, they’re all basically the same), the divine creator of the whole cosmos. All things exist to carry out the will of Olodumare, including the orisha; as oloshas, we don’t interact with Olodumare because ey’s so far distant and removed from our day-to-day life, but instead, we interact with eir’s emissaries, stewards, and regents: the orisha. They cannot go against the will of Olodumare, who sets the laws for everything and everyone, but within their own domains, they have the power to work and act. So long as Olodumare grants them license to do so, they can do what they want.\n\nHeck, even in orisha religion, there’s a notion that “no orisha can bless you if your own Ori does not accept it”.  Ori, in this case, is a special kind of head spirit that we all have, initiated or not, and is a kind of notion of “higher self” as well as our own “spirit of destiny”.  In many ways, if I were to translate it in to Western Hermtic terms, it’s essentially the spirit of our True Will.  If we ask for something but our Ori says “nope”, then it’s not part of your destiny to receive it, and no orisha will be able to give it to you, even if they want to give it to you or if you want to get it from them.  But if your Ori says “yup”, then it doesn’t matter whether we want the thing or not, because it’s part of our destiny to have it; we might delay on it or we might speed up towards it, but we can’t avoid it, and no orisha will be able to stop it, no matter how hard they try.  There might be ways to ameliorate or “fix” one’s destiny, but it’s limited, and even then, defaults back to the will of Olodumare (i.e. the will of God).\n\nEven in Hellenic traditional religion, there’s a notion that Zeus is not just the king of Olympos, but the king of truly the entire cosmos whose power and rule is absolute, and whose will must be obeyed by all.  I dimly recall a scene from the Iliad (I forget where) where Zeus proclaims his own power, saying that if all the other gods and goddesses and spirits held on to the end of an unbreakable rope and if Zeus alone had it wrapped around his little finger, he could still yank the rope with such force as to fling all the other deities to the far ends of the world with just a nudge.  The will of Zeus is absolute, and no things can go against that supreme will; though Zeus is not necessarily a creator deity, he is still a cosmocrator all the same; he just happens to go along with his own designs and plans and will when he “obeys” the powers of other deities such as Anankē (Necessity) or the Moirai (Fates), because he does not permit himself to break the rules that he himself has set in conjunction with the other deities that establish the purpose and path of all things.\n\nConsider it this way: in order to get around mental blocks about fighting against God when God says “no”, replace the word “God” (or “Olodumare” or “Zeus” or any other cosmocrator/creator deity) with the phrase “the fundamental nature of the cosmos”.  Thus, when the fundamental nature of the cosmos says “yes”, there’s nothing that can stop it from happening, and when the fundamental nature of the cosmos says “no”, there’s nothing that can make it happen.  Likewise, to get around the mental blocks when angels or any particular deity or divinity say “no”, replace the word “angels” or “other gods” with the phrase “the fundamental forces of the cosmos”.  When the fundamental forces of the cosmos say “yes”, that’s because the fundamental nature of the cosmos necessitates that those forces act in a certain way in order for the cosmos to maintain its nature; when the fundamental forces of the cosmos say “no”, that’s because the fundamental nature of the cosmos cannot allow those forces to function in that way in accordance with the rules that the fundamental nature of the cosmos set up and plays by.  However, those same fundamental forces of the cosmos may function in ways that produce interesting and perhaps unexpected side effects or which produce emergent properties that arise from particular combinations or edge-cases of forces interacting; these don’t go against the fundamental nature of the cosmos, but are still part of the cosmos because of how those forces work.  A force will do whatever it will do, and given the proper setting and context, it can and will do a lot, especially if there’s nothing stopping it, but it cannot do what it was not designed to do nor can it do anything when it has no power in a particular situation or context.\n\nThis is essentially where fate and destiny come into play, because “fate” is essentially “the course that the fundamental nature of the cosmos will take”, and it’s up to us to live our lives in accordance with fate, just as one can’t really go upstream down a torrentially-flowing river.  The thing is that we can go with it or fight against it; whether we’re successful or not is, ultimately, up whether what we’re doing is in accordance with that destiny and whether it plays a role in accomplishing it.  It sounds like, in the debate between fate vs. free will, all the above argues against free will and for the undeniable power of fate.  And yes!  That’s true.  But it’s also true that, from our point of view, we have freedom of choice and freedom of will, to be sure.  We don’t have to go along with the the fundamental nature of the cosmos, but it probably won’t end well, and even within the boundaries of the fundamental nature of the cosmos, we can still do a lot that the fundamental nature of the cosmos hasn’t explicitly mandated, often including how we do what we need to do.  After a certain point in the cosmos, the distinction between fate and free will becomes moot; you just do what you’re supposed to do, not because you don’t have a choice, but because you capital-W Want to.\n\nFor as important and wonderful and powerful as we are as human beings, we are still so small and weak.  The cosmos is filled with things far bigger, older, smarter, cleverer, and stronger than us.  Sometimes we can fight against them, and on occasion, we might even win.  In general, though, issues with authority will only cause you problems, and issues with the underlying authority of all of creation itself won’t get you very far at all.  When we appeal to God for help, we might get it, or we might not; it’s not up to us to demand it, because quite frankly, the cosmos owes you nothing at all.  You were made to fulfill some purpose or role; strive for that, because all else is meaningless in the end!  If you want something and you’re both meant to have it and capable of having it, then it will be yours; if you want something and you’re meant to have it but you’re not capable of having it, then start working on being capable of having it so that it can be yours; if you  want something and you’re not meant to have it, then accept it and move on to the things that you’re meant to have.  This is not an easy lesson to learn, because this is fundamentally the lesson of humility before God: “be it done unto me according to your word”.  We might be kings of our spheres and worlds, but there are still higher powers that we, too, must obey in order for our kingdoms to survive.  We are both ruler of that which is below and within and servant to that which is above and without.\n\nThis is essentially the whole point of our Great Work, our Magnum Opus, our True Will: we must learn what is appropriate and best for us, then work towards accomplishing it.  It’s not a one-and-done event that you can spend a month studying for then doing a simple ritual one night and going to bed and partying for the rest of your life; it’s literally the constant work of lifetimes, the most important and the most difficult thing we can ever do and ever be doing.  By that very same token, it’s also the most worthy, worthwhile, valuable, and precious thing we can ever hope to accomplish, and there is nothing we can do that is truly worthy of such a blessing and reward except to simply do it.  That we have the means and capability of fulfilling our fate is, in a sense, true grace from God.  We just need to keep our eyes on the target, keep facing towards God, and keep learning about our True Will so that we can fulfill it, day by day, step by step, stone by stone, breath by breath, bite by bite.  One day, we’ll get there.  There is nothing else in all of creation that is as worthy, or as difficult, than for us to fulfill what we were meant to do.\n\nWhether we get what we want doesn’t ultimately matter, regardless whether or not we get it.  It’s whether we get what we Want that matters.\n\nGetting Burnt by the Stars, part 1: Get In or Get Out\n\nThe occult arts are no light thing to just pick up, fiddle with, and set aside.  Sure, some things like energy manipulation, astral travel, and other basic skills that are available to everyone, or mostly everyone given a little bit of training.  Divination is a useful skill and can be picked up from a book and a few weeks’ worth of practice, or more depending on the system to be studied.  Talking with spirits, ghosts, angels, and the like can be fairly easily accomplished given a willingness and openness to perceive and talk with them.  Meditation is something everyone should be doing no matter what their professions or hobbies might be, it’s just that useful and applicable.\n\nNo, dear reader, the real heart of magic is way up above us, quite literally in the stars themselves.  The seven planets of the old Babylonians, Egyptians, and Greeks, starting from our worldly plane of the four elements and rising up through the Moon, Mercury, Venus, the Sun, Mars, Jupiter, and Saturn, past the final barriers out into the sphere of the fixed stars, and thence outward into the unlimited and unending Source of all the light we see as starlight down here.  That’s the magic I’m talking about, and dealing with the different and higher levels of reality, whether internal consciousness or external planes, is difficult, dangerous, and so very, very worth it.\n\nI mean, all our (human, mundane) lives, we’re used to living down here in this world of matter, laws, money, borders, and machines.  We spend most of our time awake and aware of what’s going on within and outside our physical bodies, and we don’t often have the chance to see beyond the material into the higher levels of things.  For one, it’s an institutionalized de facto law that anything besides what’s materially apparent doesn’t exist, no matter how influential it may be; most modern science and the philosophies of New Atheism and scientism reflect this, that only what’s independently, objectively, numerically, repeatedly verifiable can exist and nothing else.  For two, even the old cosmogonies and creation myths that describe a spiritual human entity and its creation also describe how it came to live and be imprisoned down here: the Abrahamic fall from grace, the dharmic creation of karma, the gnostic archons and demiurge, and so on.\n\nAll of these myths and stories have the same fact at their cores: humanity is amphibian, living in worlds material and spiritual, but can be so much more if we tried.  Becoming more than just material is the essence of the Great Work, and can be stated in any number of ways.  Any religious or spiritual path with godhood, apotheosis, or reunion with the Source as its goal fulfills the requirements of the Great Work, so by all means, dear reader, pick and choose which path is most suited for you.  Don’t expect any of the paths to be easy, fast, or simple, though, because the word for “work” in Latin, opus, doesn’t have the other meaning of “burden” for no reason.\n\nLiving a magical life and carrying out one’s Great Work is hard work.  It takes practice, it takes time, it takes tolls, and it takes sacrifice.  One cannot simply turn lead, moldy fruit, or buckets of urine (handle and all) into the purest gold without a complete upheaval, extreme heat, profound darkness, and constant cleansing.  It’s like that for one’s life, as well.  It may be easy to go “this looks cool” or “let’s try it, it sounds like fun” from an outside perspective, trying out alchemical phases on inanimate objects, but when you try it on yourself, you probably won’t be thinking that for long.\n\nMagic is hard.  The constant practice, vigilance, dedication, and obligation one has to burden oneself with only gets heavier with time and, though one may get used to it, it doesn’t get any easier.  Worldly pleasures, social interaction, and even common livelihoods may often have to take a back seat, even one’s marriages or families, because magic calls one to things higher than any social, institutional, or worldly order.  Sure, “as above, so below” and all, but when you’re stuck seeing things only from below, you miss the bird’s eye view from above and are going to be ignorant to a lot of higher things that make the entire machine of the cosmos function.  It’s going to suck only because you’re not used to being otherworldly.\n\nMagic burns.  Flying up amongst the stars, immersing oneself in their heavenly lights, and incorporating their celestial rays into one’s sphere is blissful, but you’re also dealing with light of the most rarefied, pure kind.  Light that strong, that bright, that close up will burn, and there’s no way around that.  Some people don’t like having their darkest secrets illuminated to themselves and the world, and some people cling too much to old infested huts to let them burn down so as to build newer and better palaces.  You’re going to have to burn things down so as to burn back up as well; only by setting oneself on fire can one be holy and powerful enough to ascend to the highest reaches of the heavens themselves.  It’s going to suck only because you’re used to not being on fire.\n\nNobody who wasn’t lying ever said that magic was easy, and those who actually live the magic don’t lie about it.  Not everyone was meant for magic, and even if you were meant for it, you’re going to have to change things around to get used to it.  If you don’t want to pay the cost for magic, don’t do it.  If you want to pay the cost and get a huge return on your money, do it and deal with it.  I’ve been burned by the stars before, and although it sucked, it was one of the best experiences of my life.  It’s worth it.  How did I manage to survive being burnt by the stars?  Stay tuned.", "pred_label": "__label__1", "pred_score_pos": 0.5738238096237183} {"content": "Generally people are living longer and more productive lives; in short, there’s more time to enjoy retirement.  Understanding your investment options will help you prepare for the future and enjoy life along the way.\n\nWhat is a RRIF?\n\nA RRIF is an investment plan, established in accordance with Government of Canada requirements, into which you can transfer registered funds (usually your RSP) without tax liability for the purpose of establishing an income stream for life.\n\nWith a RRIF, starting the year after the plan is opened, an annual minimum payment must be taken each year and is considered taxable income. The year the plan is opened a payment does not have to be made, but you are free to withdraw any amount (however, in this case, withholding tax will apply to the full withdrawal amount).\n\nThe annual minimum payment that must be taken from a RRIF each year is determined by the Income Tax Actand is based on age. Your own age or your spouse’s age can be used to calculate the annual minimum payment. Using the younger of the ages will result in a lower annual minimum payment. This means less money will have to be withdrawn and taken into taxable income for the year and more remains in the RRIF earning tax-sheltered income.\n\nHow are payments taxed?\n\nNot unlinke your RSPs, RRIFs grow tax-deferred. The only real difference is that you’ll have to withdraw at least the annual minimum payment required under the Income Tax Act, which is taxable as income.\n\nAll payments from a RRIF must be declared as income for the year they are received. Tax must be withheld on amounts withdrawn in excess of the annual minimum amount that is required to be paid under the Income Tax Act (Canada). If you receive RRIF payments in scheduled installments, we will compute withholding tax on each individual RRIF installment payment based on the total sum of the scheduled installment payments for a calendar year and not on each individual payment. We will use the following rates to compute the withholding tax:\n\nin excess\n\n(except Quebec)\nUp to $5,000\n\n\n\n$5,001 – $15,000\n\n\n\nMore than $15,000\n\n\n\nYou can request to have a specific amount of tax withheld (subject to the legislated minimum). By having more tax withheld from your payments, you may avoid any last minute panic when you file your personal income tax return and find you have an amount owing.\n\nWhat is a RRSP?\n\n   A Registered Retirement Savings Plan or RRSP is an account that provides tax benefits for saving for retirement in Canada. RRSP refers to a provision in the Income Tax Act that allows a person to shelter financial property from income taxes.\n\nRRSPs may reduce taxes in up to three ways:\n\n 1. Contributions to RRSPs, up to limits described below, may be deducted from income before calculating income tax due.\n 2. Income earned within the account (interest, corporate dividends, trust distributions, capital gains) is not taxed until money is withdrawn from the plan, allowing the plan to grow faster than the same investments would grow if they were held outside the plan and thus subject to tax.\n 3. Money may be withdrawn from an RRSP in tax years when one is in a lower income-tax bracket because of lower income (due to retirement, unemployment, etc.) than tax years when one makes contributions.\n\nDeposit Insurance: All credit union deposits are insured by DICO up to $100,000 per account, plus each registered contract is insured up to $100,000.\n\nTypes of RRSPsRRSP accounts can be setup with either one or two associated individuals:\n\nIndividual RRSP\n\nAn Individual RRSP is associated with only a single individual, termed an account holder. With Individual RRSPs, the account holder is also called a contributor, as only they contribute money to their RRSP.\n\nSpousal RRSP\n\n\nGroup RRSP\n\nIn a group RRSP, an employer arranges for employees to make contributions, as they wish, through a schedule of regular payroll deductions. The employee can decide the size of contribution per year and the employer will deduct an amount accordingly and submit it to the investment manager selected to administer the group account. The contribution is then deposited into the employee’s individual account and invested as specified. The primary difference with a group plan is that the contributor realizes the tax savings immediately, instead of having to wait until the end of the tax year.\n\n\nWhat are Term Deposits?\n\nTerm deposits (GIC’s) are guaranteed investments suited to a wide variety of people. They offer a safe and secure way to guarantee your deposit and obtain steady growth. For those investors wishing to save for a short period of time or those saving for longer terms, this may be the perfect investment option.\n\nHeritage Savings doesn’t just offer great term deposit rates and products – we offer individual service. If you’re considering investing in a term deposit, take the time to call your branch and speak to one of our knowledgeable staff. Tell us about your goals, and we can help customize the rate or feature of a term deposit or savings plan to meet your needs.\n\nTerms: Available from 30 days to 5 years, with guaranteed interest or RRSP eligible Deposit\n", "pred_label": "__label__1", "pred_score_pos": 0.8113406896591187} {"content": "Integrity Health Services CASE STUDY\n\n\nThe Client\n\nIntegrity Health Services is one of Florida's premier home healthcare service companies. Their mission is to provide unparalleled service to patients and medical facilities throughout the community by offering the highest quality personnel at affordable prices. Kiely-Rivero Inc. migrated their email and file shares to Office 365. \n\nThe Problem\n\nIntegrity has grown from one small office to a corporate office and 5 branch offices with over 100 employees. During that period of growth, they were focused on patient care and not on technology until the inefficiencies became too great. Sharing files was achieved through email attachments, resulting in version confusion. Different offices used different applications and forms. Accessing a branch office's file server required remotely taking over a user's computer for the duration, disrupting their work day. \n\nThe Solution\n\nIntegrity engaged Kiely-Rivero Inc. to identify and implement a technology solution that would unify the company data. KRI recommended Office 365, which would provide them with Office applications for all employees, and HIPAA-compliant email and data storage. KRI provided project management and migration services, beginning with communications to all Integrity employees to set expectations, developing a migration timeline, scheduling all project activities, and providing training and documentation for tasks that employees needed to perform. \n\nThe first stage of the project was migrating 110 email accounts. KRI conducted this remotely using the Office 365 Import Service. Once the accounts were migrated, Integrity was able to make use of Groups and Shared Mailboxes to improve and simplify communication. \n\nThe next stage was migrating 800 GB of content from 6 file servers in different locations to SharePoint. KRI performed this using the Microsoft SharePoint Migration Tool. Most of the content was migrated to the Intranet, which consists of a site for each office and one site for shared access. Confidential content was migrated to restricted sites as needed by specific employees. \n\nAfter migrating the data, KRI trained all of the Integrity employees in the use of SharePoint. They also provided power user and admin training for select employees. \n\nIntegrity employees quickly and independently adopted Microsoft Teams for internal communications, replacing Skype. KRI made use of the screen-sharing capability in Teams to train Integrity employees throughout the project. \n\nThe Outcome\n\nAll of Integrity's content is now in SharePoint where it can be easily found via full-text search. Because documents are stored in one location and accessible by employees in the various offices, there is no longer uncertainty about document versions. SharePoint permissions allow for greater security than was possible with shared drives.\n\nIntegrity operates 24/7, so the ability to access email and files from anywhere at any time is crucial. Previously, on-call employees had to take home copies of any documents they might possibly have needed to cover any eventuality to properly serve their customers. \n\nExchange email offers more functionality than Integrity's previous POP3 email, including calendaring and the ability to have email messages available on multiple devices. \n\nDuring a recent project, Integrity was able to give secure SharePoint access to an outside contractor, which enabled seamless collaboration and sped up the progress of the project.", "pred_label": "__label__1", "pred_score_pos": 0.9999971985816956} {"content": "Granite is an igneous rock with at least 20% quartz and up to 65% alkali feldspar by volume.  Granite has been intruded into the crust of the Earth during all geologic periods, although much of it is of Precambrian age. Granitic rock is widely distributed throughout the continental crust and is the most abundant basement rock that underlies the relatively thin sedimentary veneer of the continents.\n", "pred_label": "__label__1", "pred_score_pos": 0.7532460689544678} {"content": "Dr. Marques Sophie\nOffice 519\nLinear algebra\nFall Semester 2015\n[email protected]\nJustify all your answers completely (Or with a proof or with a counter example) unless\nmentioned differently. No step should be a mystery or bring a question. The grader cannot\nbe expected to work his way through a sprawling mess of identities presented without a\ncoherent narrative through line. If he can’t make sense of it in finite time you could lose\nserious points. Coherent, readable exposition of your work is half the job in mathematics.\nYou will loose serious points if your exposition is messy, incomplete, uses mathematical\nsymbols not adapted...\nProblem 1 : (110 pt)\n3 ´2 4\nA “ ˝ ´2 6 2 ‚\n2 3\n1. Why A is orthogonally diagonalizable ?\n2. Give the definition of characteristic polynomial of A AND compute it.\n3. Prove that ´2 is a root of this characteristic polynomial. THEN, factorize pλ`2q from the characteristic polynomial ppλq, that is, find integers\na, b and c such that\nppλq “ pλ ` 2qpaλ2 ` bλ ` cq\n4. Deduce all the eigenvalues for A and their multiplicities.\n5. Without any computations, deduce the dimension of each eigenspace.\n6. Compute an orthonormal basis for each eigenspace.\n7. Orthogonally diagonalize A. Compute the inverse of P in the formula,\nP being the matrix which orthogonally diagonalize A.\n8. Deduce the spectral decomposition of A.\n9. Compute An , for n P N, (in term of n).\n10. We define the quadratic form Qpxq “ xT Ax with x “ ˝ x2 ‚ P R3 . Find\na change of variables y “ Ux such that the new quadratic form induce\nby this change of variables has no cross product.\n11. Is Q indefinite ? positive definite ? negative definite ? Justify.\n12. Let x0 P R3 . Consider the differential equation\nAxk “ xk`1\nGive the form of the general solution for this equation in term of the\neigenvectors and the eigenvalues of A.\nProblem 2 : (70 pt)\n1 1\nA“˝ 0 1 ‚\n´1 1\n1. Let A “ UΣV T be the singular value decomposition of A. Describe and\ngive the properties that U, Σ and V.\n2. Give the definition of the singular value of A AND find them. Deduce\nthe rank of A AND Σ.\n3. Find the columns of V. Explain all your work.\n4. Deduce a basis for ColpAq, AND deduce the first columns u1 and u2 of\n5. Write the system of equations satisfied by any vector x P R3 orthogonal\nto u1 and u2 AND find an orthonormal basis for the solution set of this\n6. Deduce U.\n7. Give the singular value decomposition of A.\nProblem 3 : (20 pt)\nGiven subspaces H and K of a vector space V, the sum of H and K, written\nas H ` K is the set of all vectors in V that can be written as the sum of two\nvectors one in H and the other in K, that is\nH ` K “ tw, w “ u ` v, f or some u in H and some v in Ku\n1. Show that H ` K is a subspace of V.\n2. Suppose that H and K are finite dimensional with basis respectively\nth1 , ¨ ¨ ¨ , hs u and tk1 , ¨ ¨ ¨ , kt u. Prove that th1 , ¨ ¨ ¨ , hs , k1 , ¨ ¨ ¨ , kt u is a spanning\nset for H ` K.\nProblem 4 : (10 pt)\nLet T : V Ñ V and S : V Ñ V be linear maps where V is a vector space. Prove\nthat the composite T ˝ S is also a linear map.\nProblem 5 : (20 pt)\n1. Prove that the set B “ t1 ´ t2 , t ´ t2 , 2 ´ t ` t2 u is a basis for P2 the vector\nspace of polynomials of degree at most 2 ;\n2. Find the coordinate of pptq “ 1 ` 3t ´ 6t2 relative to B.\nProblem 6 : (20 pt)\nLet V be the space Cr0, 1s of the continuous function on r0, 1s. We define on\nit the inner product\nă f, g ą“\nf ptqgptqdt, @ f, g P Cpr0, 1sq\nLet W be the subspace of V generated by 1, t, t2 .\n1. Identify W with a vector space seen in class.\n2. Construct a orthonormal basis for W for the inner product defined\nabove, using the Gram Schmidt process.", "pred_label": "__label__1", "pred_score_pos": 0.9544620513916016} {"content": "HAND TOWELS (SIZE 45X65 CM) 600 GSM - Peacock Colour\n\nWrite a Review\nUsually ships within 24 hours.\n\n100% combed cotton, luxurious towel.\n\nElegant design weave.\n\nSize specifications:\n\nSize: 45cm x 65cm \n\n600 GSM\n\nPrice is per Pack (Two pieces)\n\nDisclaimer: However much we try to depict the true colours of our products on the website, the colours may vary depending on screen settings.", "pred_label": "__label__1", "pred_score_pos": 0.9099794030189514} {"content": "Press ENTER to search or ESC to close\n\nOvens and Coordinated Products\n\nThe oven becomes asystem\n\nFoster ovens are not just cooking tools, but real modular systems of perfectly coordinated machines, to meet every need of cooking and even storage.\nOvens and Coordinated Products\n\nAdvanced technology\n\nFoster ovens contain the most advanced technology to achieve excellent results and simplify life in the kitchen. A unique range for completeness of solutions and measures to satisfy even the most demanding palates.\nOvens and Coordinated Products\n\nVacuum drawer\n\nThe professional vacuum at home. An indispensable tool that will change your way of storing and cooking forever.\n\n\nForno vapore 5103 680Full glass doorThe inside of the oven door constitutes a single smooth glass surface making it practical for cleaning purposes.\nForno vapore 5103 680Self cookingAn intuitive and advanced programming system that allows to recall a wide set of preset recipes and to memorize exclusive ones.\nForno vapore 5103 680Stop-sol glass finishThe special screening and mirroring treatment of external glass gives the oven an elegant and modern aesthetic. The oven remains dark when not in use, once the illumination is switched on the inside is perfectly visible.\n\nCooking programs\n\nForno vapore 5103 680\nForno vapore 5103 680steam cooking\nIndicated not only for cooking vegetables, but also meat, rice and other foods, generally using glass cooking or using vacuum technology. keep all the properties of food.\n\n\n\nCode product5103680\nSupply220-240V - 50Hz\nDimensions60x46 cm\nMaterial/FinishWhite glass\nNumber of door glasses2 glasses\nProgrammingIntuitive electronic programming\nType of coolingTangential ventilation\nSafetyDoor Lock\nOven typeSteam oven\nType of commandsTouch Control\n\nTechnical data\n\n\nRequest information\n\n* Mandatory fields", "pred_label": "__label__1", "pred_score_pos": 0.6101372241973877} {"content": "Retirement Blog\n\nDr. Leonard Perry,\nExtension Professor University of Vermont\n\nWinter Squash - Acorn Squash - Butternut Squash - Pumpkins - Gourds Versatile, variety, and nutritious are all adjectives that can be used for winter squash. Whether you grew your own, or buy them from local farmers and markets, consider putting some up for winter. With proper storage of squash, you’ll benefit from their fresh flavors for months—often until next spring– as well as the nutrition of these vegetables.\n\nAlthough winter squash has the same calories roughly as potatoes, it has more than twice the potassium. Winter squash provides various vitamins such as A, B6 and C, fiber, and minerals that may reduce the risk of certain cancers. These squash are a good source of anti-inflammatory nutrients needed for a strong immune system, such as omega 3’s and beta-carotene.\n\nWinter squash store well, such as in a cool room or basement, which stays around 50 to 55 degrees (F). Acorn squash can store 3 to 4 months, other winter squashes can last up to 6 months or more.\n\nSo just what are winter squash, and all the types you may find? They’re one of the two major group of squashes, the other being summer squashes like yellow and zucchini. They’re so named as they’re harvested later—early fall around the time of first frost—and last well into and through winter. They’re one of the few vegetables native to North America, and have been grown as one of the “three sisters” by native peoples along with corn and beans.\n\nSquashes are in the cucurbit family, related to cucumbers, melons, and gourds. Among the three main winter squash species, there are at least a dozen main types you may find.\n\nAcorn are one of the most common winter squashes, medium size with an acorn shape, ridges, and dull green rind. Acorn squashes that have turned orange will have tough and fibrous flesh inside. It has a mild flavor, good for soups, baking, and stuffing.\n\nButtercup is similar in size to the acorn, only more squat with smooth dark green rind with some pale streaking. Some varieties may have a small bump on top, as it is a type of “turban” squash (see below). Its distinctive circular ridge on the bottom sets it apart from the similar “kabocha” squash (see below). Cooked, its flesh is mild and somewhat dry.\n\nButternut is another of the more commonly seen and used winter squashes, having a distinctive elongated pear shape—long neck and bulbous base– with tan rind. The flesh has a sweet and nutty flavor, and is bright yellow-orange. Similar to the acorn, roast it, mash it, or make into soup. It’s easier to deal with cutting the neck from the base, and handling each separately. To remove the hard rind, use a vegetable peeler once it is roasted.\n\nCarnival squash is a cross between Sweet Dumpling (see below) and acorn squashes, and is similar in size and shape. It is light in color, white and yellow, with ridges. Use it similar to acorn or butternut squash.\n\nDelicata is often called a “sweet potato squash” as it has a similar consistency when cooked, and similarly is sweet but more “earthy”. It is small, oblong, and pale yellow with green stripes. The thin skin makes it easily bruised, but also makes it edible. Use as you would a sweet potato, or simply cut in half, scoop out the seeds, and roast with olive oil and salt.\n\nHubbard is one of the larger squashes, noted for its size, teardrop shape, blue-gray rind and bumpy surface. It is good roasted, and sometimes is used as a vegetarian turkey substitute at Thanksgiving. The flesh has a pumpkin flavor.\n\nKabocha is a Japanese type of winter squash (this being the generic name for squash in Japanese), similar to the buttercup in appearance and coming in green or red. The deep yellow flesh is flaky but sweet, good roasted or baked with plenty of butter or oil.\n\nPumpkins are well-known, and come in sizes from tiny decorative ones to the giant ones you see at fairs and competitions. Keep in mind the ones for carving generally lack flavor, while the Sugar Pie ones have the sweet, pumpkin flavor good in pies, soups, or roasted. The squat and colorful French heirlooms are both sweet and ornamental.\n\nRed Kuri is another Japanese squash, similar to a small Hubbard only with a red-orange rind and so is sometimes called a red Hubbard. The yellow flesh has a flavor resembling chestnuts, and is good roasted or the squash split and stuffed.\n\nSpaghetti squash is light yellow, large, and oblong. Once the flesh is cooked, run a fork through it to make long “strings” that resemble spaghetti. In fact it makes a healthy alternative to pasta, with a mild flavor. This, as well as the Acorn and Delicata are very closely related to the summer squashes, just different varieties of the same species.\n\nSweet Dumpling is one of the parents of Carnival squash, being compact, whitish-yellow with some green streaks, and pronounced ridges. Its taste resembles a sweet potato, and its flesh is edible. This could be used in place of sweet potato or pumpkin in recipes.\n\nTurban is the larger group of which Buttercup is a member, noted for its pronounced “bump” on top resembling a turban or turk’s cap—another name for it. Often these are quite colorful and can be used simply for decoration. Its sweet and mild flesh is good roasted, or in soup, and its outer rind can be used as the soup tureen.\n\nThere are many more types and cultivars of winter squash, including heirlooms. Experiment with some in this winter’s cooking, and try growing some from seeds next year.\n\n\nShare this with friends!", "pred_label": "__label__1", "pred_score_pos": 0.6779916882514954} {"content": "What are Cross-Party Groups?\n\nCross-Party Groups (CPGs) provide an opportunity for Members of the Scottish Parliament (MSPs) to engage with external stakeholders on a particular subject.  \n\nCPGs are not formal parliamentary business and should not be confused with the Parliament’s committee system. They do not have any power to introduce issues formally into the parliamentary or government systems.\n\nCPGs do not have access to any financial or staffing resources, other than is necessary for CPGs to meet in the Parliament. Should CPGs require translation services, catering, travel costs for attendees/speakers or equipment (other than is publicly available in the meeting rooms), these costs cannot be met by the Parliament. Costs can be met by the external secretariat as long as any costs that exceed £500 are declared on the registration and annual return forms. CPGs can also charge all members of the Group a subscription to cover these costs. \n\nApplications for recognition as a CPG must be submitted to the Standards, Procedures and Public Appointments Committee for approval and only those Groups approved by the Committee are permitted to use the title ‘Cross-Party Group in the Scottish Parliament’.\n\nThis website is using cookies.", "pred_label": "__label__1", "pred_score_pos": 0.9997697472572327} {"content": "Datura trateaza varice\n\nUsage Requirements. Tratamentul poate să fie și purtarea de ciorapi elastici când stăm la slujbă, însă atunci când se ajunge la varice, se tratează prin intervenții. Vene de Sânge Sparte Pe Picioare sau Față – Tratamente Naturiste Varice,. The Datura Inoxia ( Devil’ s Trumpet) Dark Past, Present and Future: Use With Caution.\n\nDatura Road is creating music at the crossroads where east meets west. Boala varicoasa are un tratament modern, fara operatie, fara cicatrici. Lasă amestecul să acționeze timp de 30 de minute, după care clătește bine cu apă călduță. United States, CA, San Diego Co. Datura Trumpet Flower Care. S- a schimbat şi pentru că diagnosticul se pune mult mai corect la ora asta şi se pune şi accentul pe el.\n\nUSDA NRCS National Plant Data Center ( NPDC). Datura Stramonium ( Datura ) Leaves for Wounds. Creating your personal studio is just a few steps away.\n\nAplică paste pe piele, pe zonele afectate de varice, iar dacă este necesar fixeaz- o cu un bandaj. The Plants Database includes the following 11 species of Datura. Pentru tratarea varicelor, edemelor la picioa-. Nu erau pe vremuri întrebaţi oamenii de la ţară dacă au cumva şi varice. Seara inainte de culcare, aplicati acest amestec direct pe zonele afectate de varice.\n\nIn 1973 they were placed by TE Lockwood definitively as Brugmansia where they have remained. Leave it to cool down the decoction. , Quail Botanical Garden. More Interesting Info. I have a plant called buttercup which gives blisters in the mouth \" Only to Mammals\" the ducks have been trained to chomp it down, I have a jungle of mint family plants which ducks wont touch but RABBITS come down hard on. Datura will overwinter outdoors almost statewide, but they do die back to the ground with a hard freeze. There are few trees that can stop a person in their tracks like a Brugmansia can. The name is borrowed from the plant mentioned in the book “ The teachings of Don Juan” by Carlos Castaneda and in the italian comix “ Tex Willer”. It grows 2- 3’ tall and sprawls to as much as 3- 6’ wide. Plantă folosită în medicina populară în tratarea varicelor Si: silnic ( Glechoma hedaraceum). Datura’ s produce several seed pods during the year and thrive in high heat, particularly in humid areas. There are several species of datura, and some recent hybrids.\n\nDatura has also been called ' Devil\" s Trumpet' since the flowers face upward toward Heaven, rather than downward from Heaven. This one is the “ Tatula” variant of Datura stramonium, or the violet/ lavender form, depending who you speak too. Da a ellos el sentido del poder fortificando sus corazones.\nRecuperarea este imediata. 63 ( Bot ; reg ; îc ) ~ ba- dracului Ciumăfaie ( Datura stramonium). These are often confused with Brugmansia, which is also commonly called ' Angel' s Trumpet', and with better cause. Thier efforts allow various musical styles to find new life in the Hudson Valley. Datura species are herbaceous sprawling annuals or short- lived perennials, characterized by large trumpet- shaped flowers.\n\nCuratati usturoiul, pisati- l foarte bine si apoi amestecati- l cu uleiul din nuca de cocos. Most parts of the plant contain atropine, scopolamine, and hyoscyamine. Cu frunze de mesteacăn, laur ( Datura stramonium) şi traista ciobanului,. Datura stramonium ( ciumăfaie, laur, alaur, bolândariţă, buruiană de. Uses & Benefits of Datura. Plante n tratamentul bolilor umane si veterina- re, au fost.\n\nEste i un excelent tratament cosmetic, pentru combaterea cearcnelor i a. CIUHRII medicamentele HEPATITOLIZ i. Louis as an annual.\n\nNC Cooperative Extension is based at North Carolina' s two land- grant institutions, NC State University and NC A& T State University, in all 100 counties and with the Eastern Band of Cherokee Indians. Fără această plantă nu se poate efectua un tratament corect. The Arabic physician Avicenna touted the importance of its medicinal applications as well as prescribed the exact amount of dosage to the Arabs, who categorized the plant as “ mokederrat narcotica.\nThe Atlas of Florida Plants provides a source of information for the distribution of plants within the state and taxonomic information. Its other names are dhatura tatula, thorn apple, mad apple, stink weed, and jimson weed. Frunze de mesteacn, laur ( Datura stramonium) i traista ciobanului, se foloseau.\n\nMalic acid is also present. It alleviates pain and provides quick healing. It produces spiney seed pods and large white or purple trumpet- shaped flowers that face upward. Ca aspect varicele esofagiene seamana cu varicele de la gambe, deseori fiind mai serpuitoare decat acestea. Not at all an impressive height for a tree, but what makes them so impressive is that the entire tree can be covered in foot long trumpet- shaped.\n\nEste bine să ții picioarele cât mai ridicate, după ce ai aplicat această pastă. Acest tratament cu ceapă roşie poate fi urmat de bolnavii cu varice care nu vor. It is more rarely called sacred datura, but this name in fact refers to the related Datura wrightii.\n\nDatura stramonîum ( Laor, Ciu- măfaie). Its dark foliage will also help it to make a spectacular statement, either as a container plant in the conservatory or warm greenhouse; or in the garden, when it will thrive quite happily outside in warmer zones. The Indian Thorn Apple - Datura metel - was first documented in Sanskrit literature. Lasati amestecul sa stea peste noapte. Datura is a woody- stalked, leafy herb growing up to 2 meters. The website also provides access to a database and images of herbarium specimens found at the University of South Florida and other herbaria.\n\nDatura Stramonium ( Datura ) Leaves act as Vulnerary. Datura species are often confused with members of the related genus Brugmansia, which features a number of ornamental trees and shrubs known as angel’ s trumpets. Set up an account to access our library of videos. Dimineata urmatoare remediul este tocmai bun pentru a fi folosit, scrie bzi. All parts of all datura plants are poisonous and can be fatal if ingested.\n\nCiumăfaia Denumire știinţifică: Datura stramonium. Datura innoxia, often spelled inoxia, ( sometimes called by the common names pricklyburr, recurved thorn- apple, downy thorn- apple, Indian- apple, lovache, moonflower, nacazcul, toloatzin, tolguache or toloache) is a species in the family Solanaceae. It pretty much started while I was in high school. Datura, Euphorbiaceae, Orchidaceae) ; porici-.\n\nSe aplică local sub forma de com- prese m flebire, varice, hemoroizi. Make a decoction of Datura Stramonium ( Datura ) Leaves. Printre afecţiunile care se tratează cu extracte de castan se numără varicele, varicocelul, umflarea.\n\nThey are commonly known as daturas, but also known as devil' s trumpets, not to be confused with angel' s trumpets, its closely related genus Brugmansia. Datura trateaza varice. Datura leaves contain the same alkaloids as Belladonn, though in smaller proportions. A good friend of mine and myself would spend all day dismissing our regular studies and study mostly on ancient herbs and assorted ethnobotanicals ( being a native American I was raised in a world of shamanistic practice and teachings by my family. DATURA INOXIA SEEDS ( Downy thorn- apple, Indian- apple, Moonflower, Sacred datura, Datura innoxia, Datura meteloides, Thorn Apple, Moonflower, Toloache, Jimson Weed. From ancient times continuing to the present, the taking of Datura tissues, particularly the seeds, was used in shamanistic rituals as a path to enlightenment. Datura discolor, also called the desert thorn- apple, is an herbaceous annual plant native to the Sonoran Desert of western North America, where it grows in sandy soils and washes.\n\nUse it to wash wounds at least twice a day. Datura plants growing in colder zones will require you to move the plant indoors or just let it reseed and start new plants. The great thing about most toxic plants is their poison' s are usualy suited to their predators. New to Datura Online? Tratamentul corect al bolii varicoase şi, implicit, al varicelor hidrostatice.\n\nDatura is a genus of nine species of poisonous vespertine flowering plants belonging to the family Solanaceae. In their native climates, brugmansias can grow to be up to 20 feet tall. Clinica moderna specializata in tratamentul varicelor. Linnaeus classified these plants with Datura. The white and lavender- tinted, trumpet- shaped bloom of the sacred datura promises a fairyland of delicate beauty, moths, butterflies, long- tongued bees, hummingbirds and magical moonlit nights. The alkaloid consists chiefly of hyoscyamine, associated with atropine and hyoscine ( scopolamine). They were transferred to Brugmansia in 1805 and during the next 168 years they went back and forth in lists. Datura Stramonium var Tatula Jimson Weed Seeds.\n\nFertilize in spring with a light flowering plant food high in nitrogen and then follow with a formula higher in phosphorus to promote flowering. Datura’ s experimental narrative and unique style of interaction enable players to experience the world with more than just their eyes, creating the illusion that you can actually touch trees, faces and other objects. 200+ seeds of another angry plant. Datura / Devil' s Trumpet Collection # 2: 5 types of Datura Seeds. Find Datura stramonium medicinal uses, benefits and side effects. Zone, ca plantă alimentare, urticarii, varice, vărsături, vertij ( ameţeli) zgomote în urechi. Datura inoxia commonly called angel’ s trumpet, is native to Mexico and Central America. Click below on a thumbnail map or name for species profiles. They come back and can grow the next season and then bloom next summer, but rarely do they grow taller than 4 feet or so.\n\nAn absolutely fabulous double- flowered variety with large trumpets showing white petals heavily splashed with deepest purple. The mid- rib and footstalk of the leaf contain a far larger proportion of alkaloids than the blade. Hepatit cu virus C, varice esofagiene; Dr. Este surprinzător, pentru că ce se ştia acum 20 de ani este că circa 20% din români au varice, dar situaţia s- a schimbat. All parts of the plant contain a mix of alkaloids that are potentially lethal when enough is ingested.\nDatura - Jimson Weed The Sacred Datura - Invitation to Disaster. Datura altera los hombres. DATURA arised in 1991 by a Stefano Mazzavillani and Ciro Pagano’ s idea.\n\nDatura trateaza varice. Au aplicaţie în tratamentul insufîcienţei ve- noasc cronice şi a complicaţiilor care survin: varice, varicoflebitc, tromboflobi- tc,. It is a shrubby, sprawling, short- lived, tender perennial that is grown in St.\nEsophageal varices / varix ( engl) Varicele esofagiene Varicele esofagiene sunt vene care se gasesc in mod normal in interiorul esofagului, si care daca se maresc, devin vizibile la endoscopia digestiva superioara sau examen radiologic cu bariu ( mai rar folosit astazi).\n\nPhone:(115) 822-8824 x 9479\n\nEmail: [email protected]", "pred_label": "__label__1", "pred_score_pos": 0.7445864677429199} {"content": "Take Better Pics In A Flash With These Ideas!\n\n\nTake photographs quickly! If you wait too long, you risk losing your shot due to changing scenery. It is better if your camera takes pictures quickly.\n\nDo not let your subject get away from you! If you take too long while setting up a shot, you may very well miss out on the opportunity to take the perfect picture. So therefore, the faster you are when you are taking your photos, the better off you will be.\n\nMost people think that beautiful days filled with sunshine are ideal for taking photographs. But, in fact, filming in direct sunlight is a sure-fire way to ruin just about any photographic image. Downsides to direct sunlight shots include glaring, awkward shadows, uneven highlights and human subjects squinting if they face the camera. If you can, take outdoors pictures early in the day or toward the evening.\n\nSkies that are overcast should be avoided in photographs. If you have too much gray sky in your photo it will make it look muted. A black and white photo might work best if you have to shoot an overcast sky. If the sky is blue, you should put it in your photo, but be careful of the light.\n\nThe position that you use when holding your camera can make a big difference on the quality of your pictures. To keep your grip steady, hold your upper arms and elbows close to your sides and brace your hands at the camera’s bottom and sides. This will minimize shaking and produce clearer shots. Make sure that you’re gripping the camera from underneath. What this does is steadies the camera better and also works to prevent any accidental drop.\n\n\nThis is a tip you can use in photography. Familiarize yourself with shutter speeds. The shutter speed settings you will find on your camera are: P,M,A & S. Using the “P” setting will put your camera into program mode. When you apply this setting it means you camera is fully automatic, so it sets things like shutter speed and aperture for you. For general use, the “P” setting is the right one to choose.\n\nIt’s best to use a blurred background when taking portrait shots. When you don’t blur the background, it becomes harder for a viewer to focus on the subject. It is important to keep your subject in the forefront while shooting your photograph.\n\nIt’s best to use a blurred background when taking portrait shots. If the background is too crisp or clear, viewers may get distracted by it or be unsure of which part of your photograph to pay the most attention to. The easiest way to do this is to increase the distance between subject and background.\n\nPeople are an amazing subject to photograph! Of course, it is recommended to request permission first before snapping pictures. Shots of people will stand out and help you remember great traveling experiences. It’s a great idea to focus on the unique styles and expressions visible in each individual picture.\n\nIt’s possible to move the subject in your shots. They don’t need to be centralized. Find different, interesting angles to make the subject more interesting.\n\nWhile you are traveling, photograph memorable souvenirs that you have purchased on-the-go. Photograph the souvenir on the shelf in the store, or get a shot of it with the sales clerk. This is a great way to capture memories and remember where you might have purchased a certain item from.\n\nPractice selecting effective combinations of ISO, aperture, and shutter speed. These are the three features that drive the exposure of the photographs you take. Unless you are seeking a certain mood, try not to take under- or over-exposed photos. Try different things and find out which combination of these three features works best for you.\n\nWhen you are photographing a particular subject, move around it. Experiment with taking a picture above and below your subject, as well as moving off to the side.\n\nPlay around with perspectives, expressions, and scale to assess their effect on your pictures. You can make any object look interesting by placing it in an unusual context. Get different takes on familiar objects by working on your compositions.\n\nLook for the perfect subject for your shot. You could have wonderful equipment, excellent skill in composition and the technical end of photography, but without a good subject, you won’t have a good picture. Look for models or objects of inspiration for your photos.\n\nTo take more unique pictures, try using limitation. Choose a single concept to photograph, like “beauty” or “what is nature?” Restrict yourself to standing at one point or staying in one room for your next 100 photos. By placing limitations on yourself and your photography, you can sharpen your creative skills and work outside of the box.\n\nRemain completely immobile when it’s time to click the shutter to get that ultimate photograph. Even the slightest movement can destroy a great shot. Catch yourself before you press the button: hold the camera still and wait to take a breath until after the shot is taken.\n\nAvoid having your subjects where the color white to a photo session, as it can seriously affect the final images in a negative way. Many people use their cameras with the “auto” settings, and the camera tries to adjust the focus and exposure based on readings it takes from the subjects. If your subject has on white, it will contrast with the other shades in the image and wash out when processed.\n\nFinding another photographer to mentor you or joining a club can improve your photography skills. While you may learn new techniques, make sure you keep your own signature style. Compare your pictures to the ones your friends took to see how one subject can be seen differently.\n\nYou need good equipment if you intend to really get into photography. Some photographers become brand loyalists for this reason. A lot of professional photographers swear to the quality of certain equipment makers, but many companies produce outstanding gear in their own little segments of the market.\n\nMany times the subject looks directly into the camera. Try to capture different feelings, by having your subject focus on something other than the camera, off in the distance. You can also achieve a distinctive look by asking the subject to focus on a person or object within the frame.\n\n\nWhite is a terrible color to wear in a photograph, despite popular belief. If you are using the auto focus feature on your camera, it will record many varying colors and shading that it picks up through the lens. White clothing will almost always get “washed out” in these photographs.\n\n\nAlways give the camera’s manual a read before operating the device. The reason is because manuals are very thick and inconvenient to carry around. Most of the time they get thrown away or put away and forgotten. Open it up and read it instead of doing this. The manual can teach you how to take higher-quality pictures and avoid simple mistakes.\n\nA photograph of a person can and should reflect more than simply their face. There are many beautiful parts of the human body that can be used as the subject in your photos.\n\n\nIf you’re standing in front of a small child, you’re going to be angling the camera down toward the top of his or her head. By squatting down until your eyes are level with the child’s eyes, you are going to end up with a much nicer photograph. This technique will assure you take much better photos of children than if you try to take a photo while looking down at them.\n\nPhotography magically captures moments that would otherwise be lost to the world forever. The tips in this article hopefully provided enough of a starting point for you to experiment with your camera and start capturing those memories that are important to you. When you absorb the knowledge given here, you are on your way to becoming an accomplished photographer, rather than a novice.\n\nThe key to a great picture is knowing what scenes and environments require flash or not. Don’t just turn the flash onto automatic and not reassess it ever again. A lot of light can sometimes ruin great photographs. Only use the flash in low light.\n\nEmli photography\nDanish wedding photography\nWedding Day\nMy photography", "pred_label": "__label__1", "pred_score_pos": 0.9350998401641846} {"content": "Frog On His Own\n\n\nBook Information\n\nDial Books 2003 (originally published in 1973)\n\nOne beautiful sunshiny day, Boy and Dog head off into the forest for an adventure carrying along their good friend Frog.  As they find their way down the path, Frog decides to jump into his own adventure.  He leaps.  Boy and Dog walk on not realizing they are one friend short.\n\nFrog explores the wonders of the natural world buzzing and flitting and blooming all around him.  His adventures take some unexpected and hilarious twists as he eventually gets hungry and tries some unusual sources for a tasty treat.\n\nOne thing does lead to another until a moment of great suspense arrives.\n\nA wondrous, wordless testimonial to the value of great friends, great adventures and the great outdoors.\n\n32 pages   978-0803728837  Ages 3-6\n\nRecommended by: Barb Langridge,\n\nUser reviews\n\nAlready have an account? or Create an account", "pred_label": "__label__1", "pred_score_pos": 0.6188826560974121} {"content": "Literature Review Summary\n\nMain elements/characteristics of my information flow situation\n\nWhen attempting to teach Norwegian to young-adult refugees, a good teacher is what most people would consider. But what if there was better and faster ways to teach a new language?\n\nStudies have proven to us multiple times, that being engaged in physical tasks helps learning. This is because when we are active, our brain is working much harder. It’s also memorizing the things we see and experience, much better. In other words, it’s recommended that you change the way you learn, with being more physically active when trying to learn something.\n\nSome teachers are well experienced with teaching, and knows what works and what doesn’t. However, only the best teachers know how to engage students into making the learning process more fun. That way, it will be more exciting for them, and they will often feel the motivation to work harder. This is because we like experiencing getting better at something we are trying to achieve.\n\nWhen learning a new language, it’s important to use it as much as possible. And if you don’t have too much time to use it in your daily life, there are several apps like Duolingo which provides push notifications and reminders on your phone, to make sure you do your daily language exercises. Using it every single day, is one of the most efficient ways to learn a new language.\n\nChallenges encountered in the information flow\n\nThe drop-out numbers for adult refugees may have several reasons. These are refugee adults, who possibly have children witch gives them a financial aspect.\n\nAcademic challenges like, cultural dissonance, language barriers, fear or distrust of authority figures, fear of speaking in class and lack of academic support at home may be some of the biggest, and most obvious challenges for an adult refugee learning norwegian.\n\ncultural dissonance causes lack of interest in learning the norwegian language, it causes discomfort or confusion, by people in the midst of a change in their cultural environment. This is relevant for the people who come to norway as a refugee, because they come from countries with a different culture and different expectations set to them. This makes people uncomfortable, and may cause them to not want to be a part of that culture if they feel rejected.\n\nLanguage barriers can be underestimated. for example if you are a norwegian student learning english, you have a lot of references to use. The student can use movies and TV-shows as a learning tool, and when you watch people speak english you get a better idea of how to form your sentences in english, appose to just learning the words translated. Learning how to form a sentence in a different language like norwegian can be a difficult task, if the refugee don’t have a norwegianspeaking reference to follow in terms of what you see, when a person is learning english, and has an endless supply of movies and TV-series.\n\nThe learners have financial obligations leading them to take part-time jobs, witch can prevent the learners from doing school work, and resting for the next school day. These part-time jobs are uselie due to children at home, and they dominate the learners sparetime.\n\nWhat needs to be improved\n\nFirst of all, Norwegian teachers should understand that their students come from many different backgrounds and ages, and not all of them are of equal learning abilities or have the determination to learn. Some of them want to learn the language as fast as possible so they could get to work or to continue studying. Others, just don’t care at all about the whole learning process or the outcome of the Norwegian course. The result of this is that those students who don’t care, don’t wish, or simply don’t want to make an effort to learn the language as effective as the others, will eventually, negatively affect them.\n\nThere is one simple solution to what should be done here. Students have to be sorted into the classes they deserve. For example, a class dedicated to hardworking and serious students, and another class for students who like to have fun and play most of the time.\n\nSecond, It would have been really nice and more helpful if the teachers were multilingual. Sometimes no matter how hard you try to explain a word to someone, it never makes sense until it is translated into their mother language, or a language they know well. It is not necessary, but it would make learning the language easier.\n\nAn overview of available digital tools and what problem each of them addresses.\n\nCurrently the best digital tools for learning norwegian according to and is Memrise, Babbel, Nemo and Duolingo. How you access the guides differ, they all have free and paid models. These are all apps which can be used both on apps on a smartphone or a website on a computer, which make them easy to use on the go.\n\nMemrise is an app that uses memorization and visual techniques as its learning component. Memrise is made to fit into a busy day as a supplement to a language course. It is meant for being used whenever you have a free moment in your day so you stay fresh on the language you are learning. This app also has a goal to make the learning experience feel more local as opposed to make you learn the language in a strict formal way.\n\nBabbel also aims at making your conversational skills in the new language better. They try to be up to date with the current way of speaking to each other, this makes the learner speak more naturally. They also want you to speak correctly. Babbel also offer review sessions of words and sentences you have already learned, but in new contexts so that you can reinforce and refresh your memory of your knowledge.\n\nDuolingo is one of the most known language apps on the market, it’s a good app with a whole bunch of languages available for learning, but most importantly; its free. Duolingo claims themselves that using their app is the best new way to learn a language. Its designed to be a fun and addicting experience, it also gives you immediate grading which is good compared to waiting for a grade to know what you have to improve on, wasting valuable learning time.\n\n\nBabbel costs money after the first course and memrise works with a subscription fee. The one drawback is that duolingo is inherently free, but you can only do so much of a course before you have to wait, unless you want to pay for duolingo plus which removes ads.\n\nAll of the apps mentioned are best used as a supplement for language courses, as they are great at refreshing your pre acquired knowledge. But one big issue that they have been critiqued for is the lack of grammar learning. Grammar is especially important if you want to also learn how to write in the desired language. For example french and Norwegian grammar is very different, and a french speaking person might not know this and get a bad learning experience. But that does not mean you can’t learn grammar using these apps, it’s just not going to be as quick and short as their other lessons as some grammar can be quite complicated and need exercises both verbally and written for you to fully understand it.\n\nAll in all these apps are designed to be used for short periods of time when you find the time in an otherwise busy day.", "pred_label": "__label__1", "pred_score_pos": 0.6564878225326538} {"content": "Search Results\n\nConstantin Iordachi and Ottmar Traşcă\n\nThis article focuses on the transfer of the Nazi legal and ideological model to East Central Europe and its subsequent adoption, modification and fusion with local legal-political practices. To illustrate this process, we explore the evolution of the anti-Semitic policy of the Antonescu regime in Romania (1940–1944) from an under-researched perspective: the activity of the Nazi ‘advisors on the Jewish Question’ dispatched to Bucharest. Based on a wide range of published and unpublished archival sources, we attempt to provide answers to the following questions: To what extent did the Third Reich shape Romania’s anti-Semitic polices during the Second World War? What was the role played by the Nazi advisors in this process? In answering these questions, special attention is devoted to the activity of the Hauptsturmführer ss Gustav Richter, who served as Berater für Juden und Arisierungsfragen [advisor to the Jewish and Aryanization questions] in the German Legation in Bucharest from 1st of April 1941 until 23 August 1944. We argue that, by evaluating the work of the Nazi experts in Bucharest, we can better grasp the immediate as well as the longer-term objectives followed by the Third Reich in Romania on the ‘Jewish Question,’ and the evolution of this issue within the context of the Romanian-German diplomatic relations and political interactions. By taking into account a variety of internal and external factors and by reconstructing the complicated web of political and bureaucratic interactions that led to the crystallization of General Ion Antonescu’s policy towards the Jews, we are able to provide a richer and more nuanced analysis of German-Romanian relations during the Second World War.", "pred_label": "__label__1", "pred_score_pos": 0.967601478099823} {"content": "'They felt like little ice balls': baby turtles saved from freezing to death\n\nA conservation group is urging people to be on the lookout for baby snapping turtles during this year's unusually late hatching season, after a number were found nearly frozen to death on the side of a Beaver Bank, N.S., road.\n\nClarence Stevens of Turtle Patrol Nova Scotia said warm temperatures earlier this week prompted the hatching of many turtles in their underground nests. But by the time many reached the surface there was a drastic drop in temperature as they tried to make it to water.\n\n\"We saw baby turtles on the side of the road and they were literally frozen in place,\" said Stevens.\n\nCold-blooded creatures like turtles can handle freezing temperatures for a short time. The state Stevens saw the turtles in is known as \"cold stunned.\"\n\n\"We just picked them up and with the warmth of our hands, within a minute, several of them started moving right away,\" said Stevens. \"They felt like little ice balls when we picked them up.\"\n\nAl Eastman\n\nStevens is urging people to keep an eye out for baby snappers because there is a concern another day of warm temperatures followed by a quick cold snap forecasted for Saturday will trigger the same situation he encountered.\n\nHe said people should gently warm the creatures in their hands and then take them to the nearest water.\n\n\"Cold-blooded creatures can withstand a fair bit of cold, they basically reach the state where they are immobile in very low temperatures, sort of like a hibernation state,\" he said.\n\nSnapping turtles usually lay their eggs in late spring or early summer. But this year conditions in the spring were very cold and that pushed back the timeline.\n\n\"Normally, most baby turtles are hatched in the month of September and small amounts that come out in October,\" said Stevens.\n\nPrior to this week, he said, the latest baby turtles have been found was Nov. 7, and they too were cold stunned.\n\nTasha Theriault/Turtle Patrol Nova Scotia\n\nSnapping turtles live in freshwater lakes and ponds, but Stevens said sea turtles also face the same problem, with rapid changes in warm and cold air temperatures posing a danger as they emerge from nests near the water.\n\nThe Canadian Sea Turtle Network is currently looking for volunteers to be on the lookout for baby sea turtles that may fall into the cold-stunned state.", "pred_label": "__label__1", "pred_score_pos": 0.7604979276657104} {"content": "Types of Resource Families\n\nWhat does the term “resource family” mean? It is a term that encompasses the different types of families that serve children in foster care. COBYS resource families fit into one or more of the following categories:\n\nFoster Families\nFamilies committed to caring for and supporting children through reunification with their birth family or transitioning to a foster/adoptive family.\n\nFoster/Adoptive Families\nFamilies committed to supporting children’s reunification with their birth family but are also open to the possibility of being an adoptive resource, if it is needed.\n\nStatewide Adoption and Permanency Network (SWAN) Adoptive Families\nFamilies committed to providing permanency to children through adoption for children who were not able to be safely reunified with their birth family.\n\nKinship Families\nFamilies with previous connections (by being a relative or having a significant relationship) with children placed into foster care. Kinship families must meet the same standards for approval as any other resource family.\n\nStandby/Emergency Families\nFamilies available for a week at a time for children being placed into foster care outside of regular business hours. Standby families accept any child referred to them during the week and provide between one and four nights of care for them.\n\nRespite Families\nFamilies who care for foster and adopted children for a few hours, an overnight or weekend, or up to two weeks.\n\n\n\nThe entire climate of the house has changed for the positive. We can’t thank you enough for the information and advice. —Parent Participant", "pred_label": "__label__1", "pred_score_pos": 1.0000033378601074} {"content": "Deutsche Version  ACT\nThermal Storage | BMBF\nMaterials and components 15.3.2017\n\nIncreasing the energy density of thermal storages\n\n\nThermal Storage | BMWi\nLatent heat storage 18.1.2017\n\nIncreasing efficiency of power plants and electric arc steelworks\n\nHow can energy efficiency in industry and thermal power\n\nplants be increased by using thermal energy storages? Researchers are studying\n\nthe integration of thermal storage in different industrial and CHP processes.\n\n\n\n\n\nElectrical Storage | BMBF\nLithium batteries 16.1.2017\n\nQuantum mechanics replaces laboratory experiment\n\n\nOverarching Themes | BMWi\nSimulation and planning tool 9.1.2017\n\nBundling storage in the cloud\n\n\nOverarching Themes | BMBF\nAnalysis 9.1.2017\n\nDetermining the potential of the substructure\n\nIn the ANGUS+ project, scientists examine the potential for energy storage in the geological subsurface. In addition to the storage options for natural and synthetic methane, hydrogen and compressed air in caverns and porous formations, the storage of heat in the shallow subsurface is investigated. ... more\n\nThermal Storage | BMWi\nLong-term storage 9.1.2017\n\nSaisonal storage in aquifers\n\nAquifers have a large storage capacity and offer considerable potential as seasonal thermal or cooling storage systems. In a research project, researchers developed an improved storage concept for supplying heating and cooling energy to buildings and entire urban districts. For this purpose, they are combined the expertise from various specialist areas such as energy technology, geochemistry, hydrogeology, architecture and urban development. ... more\n\nOverarching Themes | BMBF\nAnalysis 9.1.2017\n\nSuper batterie combines high performance and capacity\n\n\nOverarching Themes | BMWi\nCentral energy management system 9.1.2017\n\nCity as Storage\n\nA central\n\nmanagement system in a City can make electricity producers and consumers work\n\n\nScientists developed a management system that bundles cogeneration systems, heat\n\n\n.. more\n\nElectrical Storage | BMBF\nGrids 18.10.2016\n\nGrid stabilization using battery power plants\n\n\nPhysical Storage | BMWi\nSupply networks 4.10.2016\n\nCoupling renewables with electricity and gas grids\n\nIn the KonStGas project scientists examined the potentials to integrate renewable energy sources, resulting from the coupling of energy networks. For this purpose, they model the energy flows of the total energy supply structure and evaluate the results from an economic perspective. They derive recommendations for the adjustment of energy infrastructure and future energy market. ... more\n\n\n\nno news in this list.", "pred_label": "__label__1", "pred_score_pos": 0.9268637299537659} {"content": "For the First Time Ever, Sonic Boom Gets Captured on Camera\n\nHave you ever wondered how a sonic boom would look like?\n\nHave you ever wondered how a sonic boom would look like? For those who are not familiar with what a sonic boom is, it is an intensely loud sound that occurs from objects that travel faster than the speed of sound itself. An example of this is the loud clap of sound that follows the whiz of a jet that passes by. Pressure waves that are created by the travelling object would pile up on each other thus, creating the thunderclap you hear. It’s an ultimately loud sound that could shatter glass windows and burst people’s ear drums if it were to be in your path, and now, for the first time ever, a group of scientists were able to capture a sonic boom on camera.\n\nThese conical shaped sonic booms aren’t restricted to just sound. Pulses of light can also leave those shapes as well. An international team of researchers then decided to make use of developing technology to capture a mach cone on camera.\n\nSource: Imgur\n\nIt may sound amazing, but it’s no easy task. The biggest challenge was to “slow down” light itself so as to be able to create a “photonic boom”. The speed of light is at 300,000 km per second or 186,000 miles per second when it is in a vacuum. According to Einstein’s theory of relativity, there is nothing that travels faster than the speed of light in a vacuum. However, it is possible to slow this down by using glass and water. By using varying materials, the research team was able to control the light’s speed.\n\nSource: LiveScience\n\nJinyan Liang, an optical engineer with Washington University in St. Louis, Missouri, is the lead author. He and his team created a unique channel that is snugly positioned between two plates of silicone rubber and aluminum oxide. The team then fired green laser pulses at 7 picosecond speeds down the tunnel that is filled with dry ice. The fog then slowed down the light and dispersed it, and therefore generating waves which entered the plates.\n\nThe team made use of a specific ultrafast camera to record the Mach cone. The ‘streak camera’ system will then collect images in spatial information. The researchers collect hundreds of images that are taken in succession at a trillionth of a second apart and the build up the data. This is done several times so that they are able to verify each take.\n\nThe research team decided to use the streak camera to be able to get three views of the same event. One camera would get the sequence, while the other two would record the timing of the events. The secondary cameras allowed the researcher to put the pieces together bit by bit. According to Liang, this process is “[putting] different bar codes on each individual image, so that even if during the data acquisition they are all mixed together, we can sort them out.”\n\nArticle Sources:\n\nScience Mag\n\nRead more  Why I Chose Study and Sleep Over Social Life When I Was in Engineering University\n\nLive Science\n\nComments 0\n\n\n\nFor the First Time Ever, Sonic Boom Gets Captured on Camera\n\nSend this to a friend", "pred_label": "__label__1", "pred_score_pos": 0.9187231659889221} {"content": "This infuriates me on so many levels!!!  😡 \n\nMy husband’s pharmacy was robbed several months ago, but luckily the pharmacist had a gun, so he successfully defended himself and his business. Now another pharmacy was robbed in my hometown!  It is only a mile or two from my place of employment. \n\nWTF is wrong with people???\n\nI’m sure the suspects are likely addicts or dealers, who don’t realize or care that commiting foolish acts like this, just helps to “confirm” the public’s inaccurate beliefs about pain medications and the increasing inhumane discrimination against chronic pain patients.  \n\nIt creates even more reasons for the government to continue the never-ending, FAILED, “war on drugs” which creates endless problems for those who truly NEED narcotics and find that obtaining adequate pain relief is becoming more and more difficult (or impossible) for legitimate chronic pain patients.\n\nIf the robbers were not addicts or dealers, it could be someone in desperate pain without access to the treatment that they need.  Either way, the situation is tragic and everyone loses.", "pred_label": "__label__1", "pred_score_pos": 0.6138074994087219} {"content": "The Demand Sensing Revolution–A Webcast\n\nSteve Gray/Flickr\nSteve Gray/Flickr\n\nWe don’t often plug these types of things on this blog, but given the level of interest our demand sensing posts have gotten, and the overall interest in the market place, I want to alert you to next week’s webcast where I will be presenting.\n\nWe’ll talk about how one of the world’s largest CPG companies is doing demand sensing at the world’s largest retailer…it’s a project that I’m personally involved in, and it’s sure to be an interesting discussion. You can reserve your seat here.\n\nHere’s more info below:\n\nCompanies are struggling with demand variability and how to meet consumer demand with the right supply at the right location at the right time.\n\nNow a new technique called Demand Sensing, using highly accurate short-term demand signals, can enable companies to meet consumer demand while driving the lowest cost possible across their distribution, manufacturing, and procurement activities. Could Demand Sensing help your company?\n\nIn this webinar, experts from the world of CPG and enterprise software, Mark Sims and Mark Zelenak, will share how One Network has worked with one of the world’s largest consumer goods companies to implement a demand sensing solution that is being used to increase on-shelf availability at the world’s largest retailer. Based on the real data from the case study, you will learn:\n\n • What is demand sensing and how does it reduce demand variability?\n • Why is a shared collaborative framework for both retailers and suppliers important?\n • How are challenges like product turnover, seasonal patterns, promotions, and thousands of inventory locations best managed?\n\nAttendees at this session will learn how actual companies are:\n\n • Capturing true consumer demand under constrained supply conditions\n • Maximizing their revenue and trading partner revenue while minimizing inventory\n • Gaining insight with smart analytics that give visibility into lost sales, retailer orders, and forecast accuracy\n\nYou will leave with a deeper understanding of advanced supply chain strategies, and exactly how leading companies are succeeding. I  hope you can join us!\n\n\nGreg Brady\n\nGreg Brady is the founder of One Network Enterprises, based in Dallas TX.Prior to One Network, Greg led i2 Technologies, both as CEO and as head of worldwide operations, and was vice president of worldwide applications marketing at Oracle. Greg lives in Dallas, Texas with his family.", "pred_label": "__label__1", "pred_score_pos": 0.7137829065322876} {"content": "Browsed by\nTag: nanotechnology\n\nKindness, the Greatest Temperer of Hubris – Article by Hilda Koehler\n\nKindness, the Greatest Temperer of Hubris – Article by Hilda Koehler\n\nHilda Koehler\n\nIn light of the increasingly alarming reports on climate catastrophe that have been released in the past few months, more and more transhumanists are taking up the gauntlet and putting climate-change solutions on their political agenda. Sadly, the transhumanist movement hasn’t exactly been well-received by the environmentalist movement. Environmentalists such as Charles Eisenstein have blamed “scientism” and excessive faith in the scientific materialist worldview as being primarily responsible for the overexploitation of the natural world. Other environmentalists are hostile towards the transhumanist imperative to find a cure for biological aging, arguing that curing aging will further exacerbate the resource scarcity (a common criticism which LEAF has dealt with so extensively, they have a page dedicated to it).\n\nIt probably doesn’t help that a handful of transhumanists are very vocally “anti-nature”. One of transhumanism’s primary goals is to knock down fallacious appeals to nature which are propped up against the pursuit of radical human lifespan extension or cyborgification. However, the way we present these ideas could perhaps be phrased in a more palatable manner.\n\nEnvironmentalists and bioconservatives are fond of claiming that transhumanism is the apogee of human hubris. They claim that transhumanism’s goals to overcome humanity’s biological limits are inseparable from the rapacious greed that has driven developed economies to violate the natural world to a point of near-collapse. Deep Greens go so far as to call for a total renunciation of the technological fruits of civilization, and a return to a hunter-gatherer lifestyle. Radical environmentalists claim that a return to Luddism is the only thing that can save humanity from pillaging the natural world to a point where it becomes utterly inhabitable. But I would argue that the either-or split between human progress through technological advancement and compassion towards non-human life is a false dichotomy.\n\nDrawing on David Pearce’s hedonistic imperative, I will argue that transhumanism and environmentalism aren’t necessarily at loggerheads with each other. You could even say that transhumanism entails a benevolent stewardship of nature, and that care for all non-human life is a logical extension of human exceptionalism. If the core imperative of our movement is to minimize suffering caused by biological limitations, that should apply to minimizing non-human suffering as well.\n\nBenevolent stewardship: the Aristotelian mean between Deep Green Ludditism and Radical Transhumanist Anti-Naturism\n\nI don’t think I’ve ever met somebody whose ideas have so radically changed my views on existential teleology and the natural world as quickly as David’s have. What I love about David’s hedonistic imperative and his involvement in the Reducing Wild Animal Suffering (RWAS) movement is how radically his ideology reframes the idea of human exceptionalism.\n\n“Human exceptionalism” is generally seen as a bad thing, and with good reason. For the better part of human civilisation’s history, humans have been exceptionally bad – exceptionally bad to ethnic minorities who didn’t have guns or cannons,  exceptionally bad to women by depriving them of equal status to men and bodily autonomy, and exceptionally bad to all the animals humans have needlessly slaughtered or whose habitats they obliterated. Human beings are stand out as being exceptionally intelligent amongst the animal kingdom, and they also stand out for using that intelligence in extremely innovative ways to amass vast amounts of resources for their “in” groups, by brutally exploiting “out” groups in the most unimaginably vile ways.\n\nBut the hedonistic imperative puts a new spin on “human exceptionalism”. The hedonistic imperative is the great Uncle Ben lesson for humanity. With our exceptional intelligence comes great responsibility – responsibility not just to currently marginalized ethnic groups, genders, and social classes within humanity, but to non-human species, too. If we have the intelligence to turn humanity into a planet-ravaging force, then we have the intelligence to find a way to repair the damage humans have done.\n\nThe hedonistic imperative movement has also been credited with helping to convert a growing number of transhumanists to veganism, and to supporting planet-saving initiatives.\n\nAristotle is best known for describing virtue as the golden mean between two vices. I wouldn’t go so far as to call Deep Green environmentalism or radically anti-naturist transhumanism “vices”, but I would say that the hedonistic imperative manages to gel the most effective aspects of both schools of thought while avoiding the practical blind spots of both.\n\nDeep Green environmentalists like Charles Eisenstein tend to promulgate the idea of nature’s sacredness as entailing an acceptance of natural malaises. These include death due to biological aging, but a logical extension of this is that it is immoral for human beings to intervene in nature and prevent animals from harming each other, since it is part of the “natural order”. Radically anti-naturist transhumanists tend to view anything natural as being automatically inferior to whatever man-made alternatives can be technologically manufactured. While we shouldn’t accept invocations of naturalism prima facie, this view isn’t quite tenable for primarily practical reasons. It would probably be extremely unwise to replace all the organic trees in the world with man-made synthetic ones, because the Earth’s biosphere is an exceedingly complex system that even our best biologists and geologists still do not fully understand. Likewise, we cannot solely on carbon-capture technology or geoengineering to be the ultimate solutions to the ongoing climate crisis. Much more still needs to be invested in reforestation and the restoration of currently endangered animal and plant species which have been afflicted by habitat loss or resource depletion.\n\nHomo Deus: Already Here\n\nFor all the utter destruction that humanity has wrought over the past 10,000 years, we can’t overlook the great capabilities we hold as stewards of nature. Say what you will about humanity, but we’re literally the only species on Earth that has evolved to a point where we can use science to resurrect the dodo bird, the woolly mammoth, and the pterodactyl. And we can do that with all the other species we’ve driven to extinction. Perhaps those will be the reparations we pay to the animal kingdom for the previous damage done.\n\nHumanity is also the only species in existence that actually has the power to contradict the forces of natural selection and end natural suffering in its tracks. We just choose not to because we can’t be bothered to. I had never in my life thought about how powerful the implications of this were until I listened to David speak about it. We are the only species with the requisite technological power to end hunger, disease, and infant mortality amongst animals, if we so choose.\n\nBasically put: we’re already gods and goddesses.\n\nWe are literally gods in the eyes of animals.\n\nBut many humans have chosen to emulate the very worst behaviours of the Old Testament Biblical God rather than being the kind of God all human civilizations would long hope would care for them kindly.\n\nOne of Ben Goertzel’s major life goals is to create the most benevolent possible AI nanny who will be programmed to watch over humanity, make us immortal and create a post-scarcity condition where all of our physical needs can be met through the application of nanotechnology. Ben acknowledges that deliberately programming an AI to be as benevolent and compassionate is possible, because at present, everyone and their mother is preparing for a possible Terminator scenario where AI goes rogue and decides that it is under no obligation to be kind to its human creators.\n\nIf you would like to know exactly how badly an indifferent or uncompassionate posthuman AI could treat us, you need only look at how badly humans treat chickens and cows. You would only have to look up YouTube videos of desperate orangutans feebly trying to push aside construction cranes that are in the midst of pulverising the trees in which they reside.\n\nAnd it wasn’t too long ago that humans treated different races of human beings in a similar fashion (although they weren’t slaughtered for consumption).\n\nA posthuman ultra-intelligent AI inflicting the same treatment on humans in developed industrial economies might just be karma coming to pay what’s long been due.\n\n“The benevolent AI god who will resurrect the dead and keep us prosperous forever” is the one wild fantasy which transhumanist forums are constantly salivating over. But why should we expect the AI god to be so propitious to us when humans are not even showing a fraction of that expected mercy to the elephants, cows, and salmon alive today?\n\nGandhi said, “be the change you want to see in the world.” Pearce and the RWAS movement crank this imperative up a notch:\n\n“Be the ultra-intelligent, highly-evolved benevolent steward whom you’d like to see overseeing the well-being and survival of your species.”\n\nThe New Narrative of Human Exceptionalism\n\nAt their core, the primary message of the Deep Green environmentalism and the transhumanist hedonistic imperative aren’t so different. Both movements say that the narrative of Man as the Mighty Colonizer must now come to an end. Charles Eisenstein and Jason Godesky propose we get there by returning to having Animism as the overarching religious paradigm of global society, and by returning to a more hunter-gatherer-like lifestyle.\n\nJulian Savulescu argues that we nip the problem in its biological bud by using biotechnological intervention to delete the human genes that predispose us to excessive aggression towards “out” groups, excessive resource hoarding, and rape. For reasons I’ve explained in detail elsewhere, I tend to side more with Savulescu. But put aside the means, and you’ll realise that both the Deep Greens and more pacifist-humanitarian transhumanists are both proponents of the same end.\n\nOne reason why I tend more towards siding with Savulescu and Pearce is because I think that forsaking technological advancement would be a mistake. If transhumanism is about transcending our biologically-saddled limitations through the application of technology, it follows that the shortcomings of primate-based moral psychology shouldn’t be an exception. As leading primatologist Richard Wrangham points out in his often-cited Demonic Males, our primate ancestors evolved to wage war on hominids from other “out” groups and to be predisposed towards hyper-aggression and selfishness, as a means of surviving on the resource-scarce savannah. And our neurobiological hardwiring hasn’t changed significantly since then. One of Savulescu’s favorite argument points is claiming that had genetic moral editing been available earlier, we’d probably have averted the climate catastrophe altogether. Savulescu sees the climate catastrophe as being a glaring symptom of still-dominant monkey brains’ failures to consider the long-term consequences of short-term consumer capitalist satisfaction.\n\nFurthermore, renouncing the fruits of technology and modern medicine would make us far less effective stewards of the animal world. If we go back to a hunter-gatherer existence, we’ll be renouncing the technology needed to resurrect both long and recently extinct species. Another major goal of the RWAS movement is to use CRISPR gene-editing to help reduce the propensity towards suffering in wild animals, and to engage in fertility regulation. Pearce claims that we might even be able to make natural carnivorism and mating-season-induced violence obsolete using gene-editing in various aggression-prone species. While we’re at it, we could edit the physiological basis for craving meat out of human beings, since our primate ancestors evolved to be omnivorous. Or we could at the very least try to create a future where all of our meat is lab-grown or made from plant-based substitutes.\n\nIt’s also worth noting that human beings are the only species on the planet to find out about the ultimate fate of life on Earth. We’ve very, very recently found out that the duration of the planet’s habitability has an expiry date, and that the Sun will eventually turn into a red dwarf and fry the Earth into an inhospitable wasteland. Given that human beings are the only species which has the necessary intelligence to engage in space travel and colonization, the survival of every single non-human species on the planet falls into our hands. The sole hope for the perpetuation of non-human species lies in future humans setting up space colonies in other habitable planets outside our solar system, and taking all of Earth’s animal species with us. Again, this isn’t something we can achieve if we renounce technological progress.\n\n\nYuval Noah Harari’s Homo Deus has become a staple read for many in the transhumanist movement. But in the eyes of the world’s animals, we have already become all-powerful gods, who can dole out exploitative cruelty or interventional mercy on a whim. The criticisms of the Deep Green environmentalist movement are increasingly forcing techno-utopians to confront this question; exactly what kind of gods and goddesses will we continue to be to the non-humans of the Earth? If we are going to reconceptualize human exceptionalism from being associated with exceptional human greed and exploitation, to being based on exceptional human wisdom and interventionary benevolence, we need to heed the words of both Savulescu and Eisenstein, and pursue a different human narrative. We’re generally kinder towards women, ethnic minorities, sexual minorities, and the working class than we were three hundred years ago, so there is hope that we’re steadily changing course towards a more altruistic track. If every great moral school of thought has an overarching axiom, the one that defines the hedonistic imperative should be this: “Treat less sentient animals the way you would like the posthuman AI god to treat you and your family.”\n\n\nThe Need for Unity and Stability in Transhumanism – Article by Arin Vahanian\n\n\n\nArin Vahanian\n\nAlthough Transhumanism is heavily inspired by (and also inspires) advancements in science and technology, I believe the movement could also benefit from implementing cultural aspects; in particular, those from China.\n\nThis became very clear to me not just after living in China, but also after reading the works of Dr. Martin Jacques, British professor and journalist, who is, in my mind, one of the most knowledgeable Westerners when it comes to Chinese culture and history.\n\nSpecifically, in his writings and public appearances, Dr. Jacques has elucidated various aspects of Chinese culture, two of which I think are important for Transhumanism to consider: unity and stability. I shall cover each one briefly here, and explain how our movement would benefit.\n\nAlthough the Transhumanist movement is rather decentralized, and I believe in keeping it this way, we most definitely need unity, especially in regard to our values and objectives. To this end, the U.S. Transhumanist Party has published its values on its Web site, which include but are not limited to: eradicating disease; the cultivation of science, technology, and reason; support of all emerging technologies that improve the human condition; life extension; reversing aging; tolerance and inclusivity of all individuals, and so forth. I believe every Transhumanist would support these values, all of which are noble, and all of which would most certainly contribute to having a better, more prosperous, and safer world.\n\nAny organization, family, company, group, team, or political party, for that matter, needs unity in order to stay together and fulfill its goals and aspirations. Conversely, lack of unity may lead to chaos, discordance, and dysfunction. According to Dr. Jacques, the primary political goal for the Chinese is unity. Indeed, there would have been no way for Mandarin to become the national language, nor any way for the dizzying progress (whether it is technological, societal, or economic) we have seen in the country to have occurred, without unity. Please note that I am not advocating for a change in the political process anywhere else, nor am I suggesting that other countries adopt the same political or economic system as China. I am simply stating that being unified in our goals and values is incredibly important if we wish to fulfill these goals and proliferate our values.\n\nJust as the Chinese look at themselves as Chinese, so we must look at ourselves as Transhumanists. However, there is one major difference; while not everyone can be Chinese, anyone can be Transhumanist. Our movement is inclusive to all individuals, regardless of race, gender, class, religion, and sexual preference. Therefore, I believe that we can be unified while also being open, tolerant, and accepting of all humans.\n\nThis leads me to my next point, which is stability. There is no question that in China, as well as other Asian countries, stability is paramount. After all, an unstable society cannot work together to fulfill its objectives and protect its values. Fortunately, we have stability in the Transhumanist movement in the areas of political leadership (Zoltan Istvan, Gennady Stolyarov II), life extension (Max More, Keith Comito), aging (Aubrey de Grey), and more. What’s fascinating is that the movement is so diverse and broad, and the areas for improvement on Earth so plentiful, that we have had individuals naturally dedicate themselves to causes they deemed worthy. This has contributed to stability in the sense that people are working on what they are passionate about, and these same people have, as a result, provided stable leadership in these areas. We must ensure that this stability continues, and that we help advance the causes we believe in by promoting them on social media and mass media. We must also support those who are bravely and selflessly dedicating their lives to helping humanity move forward. All of these actions will contribute to further stabilizing the movement and what it stands for.\n\nAdditionally, we must maintain stability in our relationships with each other, as well as the messages that we communicate to others. No matter how small or large a role we each take on, our mandate as Transhumanists is to push for reforms that will improve the human condition for as many people as possible, with as much beneficial impact as possible. In doing so, we must communicate our message that science, technology, and rational discourse should be used for efforts such as curing disease, increasing human longevity, alleviating poverty, and battling climate change.\n\nWhile we are completely opposed to the proliferation of nuclear weapons, we are completely open to tolerance and inclusivity of individuals, and offer assistance to those who may have been shunned by the system, either due to disability or the desire to challenge society so that we may be better humans. We are an organization that values and promotes pacifism, and by doing so, we are creating a more stable society, and world.\n\nSo my call to action today is this. Rather than argue whether a certain economic system is better than another for Transhumanism, we should focus on our values and goals, thereby fulfilling our mission, and be supportive of whichever economic system best helps get that done, whichever country we happen to live in. Different economic systems work in different countries, and we should not be dogmatic, but rather, flexible and solution-oriented.\n\nAdditionally, rather than debate one another, we must instead discuss and cooperate, again, with the intent of pushing forward our goals. Debating takes valuable time and resources away from achieving our goals, and the time that is spent on needless arguments could be spent on finding solutions to challenges that threaten humanity. While it is perfectly acceptable and in fact, desirable, to have differences of opinion, we should use these differences to collaborate and help develop solutions to the problems we humans face. We are finally getting more traction in social media, mass media, and in various communities and countries all over the world, and so we should take advantage of these trends to further spread our messages of peace, increased health and longevity, and technological innovation that will benefit humanity.\n\nOne of the challenges the Transhumanism movement currently faces is an inaccurate and unfair perception that it is a niche movement, unable to appeal to most people, and the product of wealthy technophiles in Silicon Valley. However, nothing could be further from the truth. Among our ranks are people of all nationalities, social statuses, races, genders, and religions, and we are the only movement that supports morphological freedom. Further, we are dedicated to goals such as alleviating poverty, curing disease, eliminating nuclear weapons, spreading peace, and using science and technology to make life better for all humans, not just a privileged few. Surely these are values that most, if not all humans, could stand behind. Based on this, it is quite clear that Transhumanism is most certainly not a niche movement, and that it is one of the most progressive and inclusive movements the world has ever seen.\n\nTherefore, the best way we can promote our messages and fulfill our objectives is by being unified in our purpose, mission, and values, and be stable in our leadership, approach, and relationships. Let’s not do our detractors’ work for them by being splintered and divided, nor become detractors ourselves. Let us coalesce for the betterment of humanity, and turn our detractors into friends, supporters, and partners. Indeed, the future of the world, and that of humanity, depends on it.\n\nArin Vahanian is Director of Marketing for the U.S. Transhumanist Party.\n\nThe Hedonistic Imperative – The End of Suffering – Video by David Pearce and Duarte Baltazar\n\n\nlogo_bgDavid Pearce\nDuarte Baltazar\n\nEditor’s Note: The U.S. Transhumanist Party has featured this brief video highlighting the thinking of one of our members, transhumanist philosopher David Pearce, on the abolition of suffering. This video, produced by Duarte Baltazar of Utopian Focus, illustrates one possibility for transhumanist messages reaching larger audiences through concise, powerful films that distill particular transhumanist concepts and aspirations.  \n\n~ Gennady Stolyarov II, Chairman, United States Transhumanist Party, April 15, 2018\n\nDescription by Duarte Baltazar of Utopian Focus: Learn more about Utopian Focus at\n\nExcerpt from “The Hedonistic Imperative” by David Pearce. Read the full essay at\n\n\n\n\n\n\nVideo Editing, Post-Production and Soundtrack by Duarte Baltazar\n\nUtopian Focus:\n\nNarration by Elvis Andrumora\n\nCircle of Synths:\n\nThe U.S. Transhumanist Party Responds to Jeremy Rifkin’s Plan for a Third Industrial Revolution\n\n\nGennady Stolyarov II\n\nPhotograph of Jeremy Rifkin by Stephan Röhl\n\nEditor’s Note: Below is a response to Jeremy Rifkin’s plan for a Third Industrial Revolution: A Radical New Sharing Economy by Gennady Stolyarov II, Chairman of the U.S. Transhumanist Party. The original post of this documentary can be found here.\n\n    ~ Dinorah Delfin, Director of Admissions and Public Relations, U.S. Transhumanist Party, March 10, 2018\n\nWhen it comes to Jeremy Rifkin’s thoughts on the future, and what humankind will and will not be able to accomplish, Arthur C. Clarke’s famous First Law encapsulates my reaction: “When a distinguished but elderly scientist states that something is possible, he is almost certainly right. When he states that something is impossible, he is very probably wrong.”\n\nI think that Rifkin has many ideas that would be aligned with transhumanism, although his general worldview is not transhumanist in itself. I wholly support the concepts of the sharing economy, the goal of production at zero marginal cost, and the smart infrastructure that he describes would support the Third Industrial Revolution. A redesign of our infrastructure – especially in such a way that would facilitate modular upgrades at a local and even individual level – is essential for overcoming some of the current bottlenecks to technological progress and rising standards of living. I also think that Rifkin is correct that, in the short term, building this new infrastructure will require humans and will mean jobs for those humans. This is probably a good thing, although it is dependent on whether the systems for financing the new projects and appropriately recruiting and treating the workers (e.g., giving them high-quality jobs with good pay, safety precautions, and ample assistance from machines and narrow AIs where possible) can come together in time.\n\nWhere I think Rifkin falls short of the transhumanist vision is in his rejection of the goal of a society where basic human problems – including mortality and many of the other key causes of suffering – can be eliminated or at least greatly reduced. He characterizes this as “utopian” thinking, but at every stage of the way, the approach toward these goals would not be utopia, but rather steady improvement. It would be a shame to reject the goals especially as the technologies for making them possible are becoming available. As I have often stated, it is not a matter of if we will have indefinite life extension, but when – and this matters a lot from the standpoint of how many people alive today could be saved.\n\nWhere I also differ from Rifkin is that, instead of his focus on the negative (“humans are destroying the Earth”), I and the Transhumanist Party prefer to focus on the positive potentials (humans can improve both our own lives and the Earth through emerging technologies). Many of the solutions may look quite similar – e.g., smart infrastructure, greater energy-efficiency, and renewable energy sources that would move humankind away from fossil fuels (although, unlike Rifkin, I also strongly support the next generation of nuclear reactors, which would use thorium, would be meltdown-proof, and would not be subject to the need for cooling via massive amounts of water that Rifkin criticizes). I think that the way forward is through technological advancement; Rifkin is halfway there – certainly much better than the Neo-Luddite thinkers who have often dominated the environmental movement. But his goals are not in conflict with life extension, massive economic growth, and super-abundance of material prosperity for everyone. In fact, humans need to move along all of these avenues simultaneously and in parallel, as their achievements will reinforce one another and enable progress to occur more readily.\n\nArticle III, Section IX of our Platform – – actually summarizes this sentiment quite nicely: “The United States Transhumanist Party supports all emerging technologies that have the potential to improve the human condition – including but not limited to autonomous vehicles, electric vehicles, economical solar power, safe nuclear power, hydroelectricity, geothermal power, applications for the sharing of durable goods, artificial intelligence, biotechnology, nanotechnology, robotics, rapid transit, 3D printing, vertical farming, electronic devices to detect and respond to trauma, and beneficial genetic modification of plants, animals, and human beings.”\n\nAgain, Clarke’s First Law comes to mind. To the extent that Rifkin sees potential in any of the above technologies and others, he is correct. To the extent that he does not see it or considers those technologies to be detrimental, he is mistaken.", "pred_label": "__label__1", "pred_score_pos": 0.9854710698127747} {"content": "Calculate Price\n\n\nSample Questions\n\nSample questions\n\nGet a 10%  discount on order above $ 10\nUse the following coupon code :\n\n\nShould Immigration Laws be Stricter?\n\nShould Immigration Laws be Stricter?\nRequirements: To present a persuasive speech in support of a policy or against a policy. Where do you begin: Start with a policy issue. Try to persuade that there is a problem and that the audience should agree with your solution. Try to motivate the audience to act according to your solution for specific policies or regulations. This is an appeal to human needs (Maslow Hierarchy of Needs), reason, and emotion (balance).\n1. Choose and narrow a topic appropriately for the audience and occasion.\n2. Use the resources of the library, Internet, expert interviews, and personal experience to research information.\n3. Demonstrate critical thinking by developing, listening to, analyzing and synthesizing issues, contentions, arguments, and forms of support on a selected topic.\n4. Select an organizational pattern, thesis, specific purpose and full sentence outline pattern which follow the conventions of standard written language in punctuation, grammar and spelling appropriate to the topic, audience, occasion, and context.\n5. Provide the appropriate ethical and cited supporting materials for the message based on the topic, audience, occasion, and context.\n6. Use language, grammar, and physical behavior (non-verbal communication) that is to the topic, audience, occasion, and context.\n7. Use pronunciation, articulation, and vocal variety in rate, pitch, and intensity to heighten and maintain interest.\n• A written outline is required for this speech and should include all relevant content and sources. Follow the model given by the instructor, all Main and Subpoints must be written in a complete-sentence format. The sources you use must be included in MLA (APA) format.\n• At least three credible sources (beside yourself) must be mentioned in the speech and referenced properly in the outline. A correctly formatted Works Cited, or References page, should be typed and included as last page of outline. Tip: All sources included in the Works Cited or References page must be incorporated in the speech and properly cited.\nSpeech is to be 5 minutes long with a 20 second grace period, either way.\nPower Point Presentation required.\nFYI: I do think immigration laws should be stricter", "pred_label": "__label__1", "pred_score_pos": 0.9998289346694946} {"content": "Outgoing Eskom CEO Phakamani Hadebe speaking as the Eskom group announced it's annual results ending 31 March 2019. Picture: Itumeleng English/African News Agency(ANA).\n\nJOHANNESBURG - Outgoing Eskom boss Phakamani Hadebe on Tuesday laid bare the problems at the South African power utility as it reported a catastrophic net loss after tax of R20.7 billion for the year ended 31 March, up from a R2.3 billion loss the previous year.\n\nSpeaking frankly at the presentation of the results, Hadebe said the interim Eskom board did not have an appreciation of the deep problems at the power utility when it took over in January 2018.\n\nHadebe said that the interim board had an understanding that Eskom had surplus electricity and was there to deal with weak financial position, declining revenue and governance failures which were threatening the sustainability of the organisation, as per mandate from government. \n\n\"We were unfortunately oblivious to underlying factors. And these were the declining maintenance spent that was faced over years by power stations, the plants that had utilisation factor of 87% amidst a 37 years average age. This was supposed to crack,\" Hadebe said.\n\n\"So while we achieved some progress with regard to the performance on this mandate of financial oversight and governance, it is operational performance that has proven to be a challenge. Within four months having joined Eskom, the board and management soon learnt that the operational issues were not what we thought they were.\" \n\nHadebe said the board had done an analysis to understand how an entity that between 2008 and 2018 had the privilege of receiving 325 percent tariff increases amidst average annual inflation of six percent and had an advantage of recapitalisation of R83 billion.\n\nHe said that such an entity should have been in a different position. Eskom's debt now exceeded R440 billion while municipalities owed the power utility more than R18 billion.\n\n\"We came to a conclusion that during the past 18 years from 2000, the rate of increasing costs had always been ahead of revenue, costs at 14.5% and revenue at 12%, which left a hole,\" Hadebe said.\n\n\"And between the years 2010 to 2018, there have been about four instances where Eskom had been able to generate enough income to service the debt. However, that happened due to higher tariff increases and when government recapitalised.\n\n\"So the crux of the matter became clear to us that if government were to give us R100 billion and we hold all other things constant, within a period of four to five years we would be back to where we would have been before. The board then decided that we needed to prioritise the issue of cost containment because this is one tool we could manage and we were given a target of R10.6 billion for the year under review.\"\n\nOn restoring governance, Hadebe said Eskom was cooperating with regulatory bodies and law enforcement agencies conducting major investigations into matters of fraud and corruption affecting the organisation. \n\nJabu Mabuza, Eskom chairperson and interim chief executive, said despite the power utility's clean up process, there were still instances of new cases of financial mismanagement, malfeasance, and maladministration being reported.\n\nIrregular expenditure for the current year totalled R6.6 billion, of which R1.5 billion relates to new transgressions. \n\n\"It is to be expected that new instances of irregularities will be detected as we continue our governance clean-up exercise. We have also made progress in clearing the reportable irregularities previously reported by the external auditors,\" Mabuza said.\n\n\"However, some irregularities will remain open until finalization of court cases or conclusion of investigations by external parties.\"\n\nEskom's earnings before interest, taxes, depreciation, and amortization (EBITDA) declined to R31.5 billion for the year, down from R45.4 billion in March last year. \n\nThis was mainly due to increased primary energy and employee benefit expenditure, combined with largely-stagnant revenue growth during the year.\n\nPrimary energy costs, including coal, liquid fuels and Independent Power Producers, increased to R99.5 billion, up from R85.2 billion last year. \n\nAs a result of the extensive challenges confronting the organisation, Eskom has embarked on a comprehensive strategic review to develop a turnaround plan that would put the organisation on a path towards achieving structural, financial and operational sustainability. \n\nThe turnaround plan supported by the nine-point generation recovery plan; is enabled by cost containment and sales growth, cost-reflective tariffs, balance sheet optimisation, and business separation.\n\nAfrican News Agency (ANA)", "pred_label": "__label__1", "pred_score_pos": 0.9551319479942322} {"content": "The term “belly dancing\" is a misnomer—and became popular entirely by accident, says Shruti Narayanan, a dancer who has been practising it for eight years. The term has been in use since the late 19th century and was probably coined by the US entertainment impresario Sol Bloom to describe a performance at the Chicago World Fair in 1893. It stuck.\n\nThis and other stories from the history of belly dancing are part of The Oriental Trail 2.0 show, being put together by Narayanan and her students along with two other dancers, Payal Gupta and Debapriya Das, who run belly-dancing academies in Bengaluru. Scripted by Narayanan, the show will have over 30 dancers recreating the history of belly dancing, including its Egyptian origins and the Chicago performance.\n\nBelly dancing is also referred to as raqs sharqui or raqs baladi, but Narayanan says these are not very accurate terms either—they simply mean “dance of my homeland\". “There was a lot of self-exoticizing in Egypt in the early 20th century, when the country started opening up to tourism, and the folk dance, which was a celebratory dance performed by men and women, changed subtly,\" says Narayanan. Then it went to the US and was influenced by other forms and, later, even by the feminist movement, when women took it up as a way of embracing their sexuality.\n\nThere are takers—mostly women—for the dance form in Indian metros (Bengaluru alone has four academies) but many take it up for fitness and weight-loss reasons: not the best way to approach it. “After all, you don’t hear of people learning Kathak and Bharatanatyam to lose weight, do you?\" she asks. “Ironically, I did my Bharatanatyam arangetram (stage debut) in Saudi Arabia (she lived there till age 16) and started learning belly dancing only when I came back to Bengaluru,\" she says. “The dance comes naturally to the female body; you just have to give in to the flow. I watched my first performance on a Nile cruise when I was 11, and later it just flowed through me, like it was waiting to be tapped into.\"\n\nThe Oriental Trail 2.0 will be performed on 14 July, 6.30pm, at ADA Rangamandira, Bengaluru.", "pred_label": "__label__1", "pred_score_pos": 0.5457642078399658} {"content": "DRIVERS were stuck in heavy traffic delays this morning after a car and motorbike were involved in a crash.\n\nThree lanes have now reopened after they were blocked on the M3.\n\nMotorists were stuck in eight-mile queues towards Bagshot and Bracknell.\n\nAn ambulance was on the scene and the motorway has now been cleared.", "pred_label": "__label__1", "pred_score_pos": 0.9995262622833252} {"content": "Two Bright Magellanic Clouds above the Auxiliary Telescopes of VLT\n\n| | | | | | |\n\nIn the foreground we can see three of four movable Auxiliary Telescopes of 1.8 meters available in the VLT platform, operating with the dome open. In the background and above the telescopes lies the Large (LMC) and Small (SMC) Magellanic Clouds showing its details and structure. Magellanic Clouds are two satellite galaxies from our own Milky Way.\n\nThe Very Large Telescope (VLT) is a telescope operated by the ESO – European Southern Observatory on Cerro Paranal in the Atacama Desert of northern Chile. The VLT is the world’s most advanced optical instrument, consisting of four Unit Telescopes with main mirrors of 8.2m diameter, which are generally used separately but can be used together to achieve very high angular resolution. The four separate optical telescopes are known as Antu, Kueyen, Melipal and Yepun, which are all words for astronomical objects in the Mapuche language, with optical elements that can combine them into an astronomical interferometer (VLTI), which is used to resolve small objects. The interferometer is complemented by four movable Auxiliary Telescopes (ATs) of 1.8 m aperture. The 8.2m diameter Unit Telescopes can also be used individually. With one such telescope, images of celestial objects as faint as magnitude 30 can be obtained in a one-hour exposure. This corresponds to seeing objects that are four billion (four thousand million) times fainter than what can be seen with the unaided eye. The telescopes can work together, to form a giant ‘interferometer’, the ESO Very Large Telescope Interferometer, allowing astronomers to see details up to 25 times finer than with the individual telescopes. The light beams are combined in the VLTI using a complex system of mirrors in underground tunnels where the light paths must be kept equal to distances less than 1/1000 mm over a hundred metres. With this kind of precision the VLTI can reconstruct images with an angular resolution of milliarcseconds, equivalent to distinguishing the two headlights of a car at the distance of the Moon.\n\nImage taken taken in 16/10/2015 from Cerro Paranal, Atacama desert, Chile.\n\n", "pred_label": "__label__1", "pred_score_pos": 1.000005841255188} {"content": "It Would Be Night in Caracas\n\nPub Date:   |   Archive Date: 15 Oct 2019\n\nMember Reviews\n\nFirst published in Spain in 2019; published in translation by HarperCollins/HarperVia on October 15, 2019\n\nAdelaida Falcón, the narrator of It Would Be Night in Caracas, begins the novel with her mother’s death and funeral, including her fear that grave robbers will make off with her mother’s glasses. She pays for the burial with one of her last 50-euro notes, the bolivar having become a currency that is useful only for lighting fires. Her neighbors wonder if she will rent out the room in which her mother slept, but Adelaida will not have that chance as criminals take over her apartment. She survives by quietly inhabiting the apartment of a dead neighbor — a salvation made possible only because nobody else has discovered the neighbor’s corpse.\n\nCriminal gangs roam the streets, often under the protection of the police. Food shortages have caused long lines and a thriving black market. Yet Adelaida is determined not to be anyone’s victim. Flashbacks to her time with her mother show us that Adelaida has her own mind and is stubborn about changing it.\n\nThe plot follows Adeliada’s scheme to escape to Spain by taking over the dead neighbor’s identity. Yet the story’s power lies not in the plot, which follows a simple and predictable path that depends on unlikely happenstance, but in the details of Adelaida’s life. People Adelaida knows are being murdered. Journalists are killed for reporting the truth. Their sources are killed for revealing the truth. A criminal friend risks his life to help Adeliada, suggesting that crime is sometimes an inescapable circumstances rather than a character flaw.\n\nAdeliada condemns Venezuela’s upper class for judging her as the daughter of a single mother. She also condemns the nation’s obsession with beauty and youth, with keeping up appearances as everything falls apart, with its acceptance of men who walk out on their families. “The result was a nation built on the cleft of its own contradictions, on the tectonic fault of a landscape always on the brink of tumbling down on its inhabitants’ heads.”\n\nAdeliada reserves much of her commentary for what Caracas has lost. Once a vibrant city of immigrants, built with the energy of people looking for a new and different life, the “children of those immigrants, people who bore little resemblance to their surnames, starting heading back across the ocean to countries that were home to other people, searching for the stock with which their own country was built.”\n\nIt Would Be Night in Caracas benefits from rich and evocative prose. Still, the novel is largely a howl of pain at the loss of a beloved country. While the plot builds little tension (there’s never a doubt about the outcome), tension is inherent in the anarchy and danger of a city gone feral. As a snapshot of the impossible anguish that ordinary residents of Caracas must endure, the novel has something to say. I recommend it for its value as a snaphot, not for its doubtful merit as a fully realized novel.\n\nWas this review helpful?\nA fantastic look into the reality of living in the chaos that has become modern Venezuela. This is a brilliant translation that needs to be praised so that more readers will pick up this book. I look forward to hearing more from Sainz Borgo.\nWas this review helpful?\nThank you NetGalley for an advanced copy. I voluntarily reviewed this book. All opinions expressed are my own. \n\nIt Would Be Night In Caracas \nBy: Karina Sainz Borgo \n\n*REVIEW* 💛💛💛\nIt Would Be Night In Caracas was not what I expected. Adelaide has just buried her mother, and she is, essentially, alone in the world now. The story details the corruption, violence, upheaval and chaos occurring in Venezuela. These issues are relevant and extremely important, and I'm glad the author addresses them. She spares no detail of the raw, gritty, painful, horrible life Adelaide is living. It's disturbing to read because it's the reality of so many lives, and no-one should have to live in such conditions. Everything about Adelaide felt painful and utterly despairing. I honestly don't think I would survive in this situation. My only problem is the very slow pace of this story. The content is engaging and informative, but it's difficult to get through because it feels bogged down and never picks up speed. This book is not for everyone, but I would give it a try if these topics and issues intrest you.\nWas this review helpful?\nThe grieving of a mother and of a country. That is what, in a nutshell, It Would Be Night in Caracas by Karina Sainz Borgo, translated by Elizabeth Bryer, is about.\n\nIn Caracas, Venezuela, Adelaida Falcón has just buried her mother, a process that is made even more difficult by the explosive violence and scarcity gripping her country. People are routinely arrested and tortured, supermarket shelves are empty, the black market flourishes selling anything from medication to sanitary napkins, and blackouts are a regular occurrence. When thugs take over Adelaida's home, she discovers her neighbor dead in the apartment next door. If she can impersonate the neighbor, she might be able to get out of the country using the dead woman's Spanish passport.\n\nTold like this, the novel sounds like a tense case of The Talented Mr. Ripley, but set in South America. Be warned: It's not really a thriller. The book is too quiet and small for that, and does not seem interested in turning into a suspense novel. This, partially, gives the feeling that things are a bit too easy when it comes to Adelaida's escape. She just happens to wander into an apartment with an open door, happens to find a corpse inside, the dead woman happens to have just left behind all the documents Adelaida might need to assume her identity. In that sense, this is no Hollywood movie and there are few, if any, surprises.\n\nOn the other hand, where It Would Be Night in Caracas does feel like a movie is in the descriptions of a city in chaos; Sainz Borgo presents violence and anarchy in minute and shocking detail.\n\nShe also pays loving and close attention to the relationship between mother and daughter, to the daily life before strife broke out in Venezuela, and spends many pages ruminating on the issues of immigration and finding one's home. The novel's original title is The Spanish Woman's Daughter, which reflects the constant thoughts of the protagonist about the European immigrants who established themselves in Latin America when it was full of opportunity, and how their children now desperately seek to return to Europe.\n\nUnfortunately, Sainz Borgo doesn't lend nearly as much space to considerations about colorism and classism, and how they fed into the political circumstances that plunged Venezuela into economic ruin. Adelaida seems to view herself with a lofty superiority because she is an editor and former journalist who loves books and dreamily recalls all things European (an old house, the Italian shoe store where her mother shopped, a set of nice dishes), never quite pausing to consider the oppression, scarcity and poverty that has fueled the wave of violence she is living through. But this myopia is somewhat understandable, considering that Adelaida seems to exist in an interior world, a tiny capsule built for two: It's Adelaida and her mother against the universe, until Adelaida is left alone. And it is when Adelaida retreats inwards that the book feels the most poignant and raw.\n\nYet, because of this interiority, Sainz Borgo's account of the terror gripping the nation feels amorphous. Rather than a political conflict, this could be a zombie apocalypse for all we know — and we know very little, especially considering Adelaida is a well-read, well-informed woman.\n\nThough these might seem serious gripes, I found the language in the book to be poetic; it kept me reading, immersed in the beauty of the prose. It Would Be Night in Caracas is a painful, angry book, full of melancholy and rage at the loss of a woman's nation.\nWas this review helpful?\n\"It Would Be Night in Caracas\" starts with a simple plot: a single woman is burying her mother. She goes back to the apartment that they shared and starts to deal with the process of grief. The problem is that she lives in Caracas, Venezuela, and it is quickly apparent that every day there is one filled with danger. From vigilante groups ran by the government, vigilante groups fighting against the government groups, money that is not worth the paper it is printed on, food shortages, and a thriving black market, the world that Karina Sainz Borgo describes is one that I cannot even wrap my head around. Some people might be put off by the description of how the main character, Adelaida Falcón, gets supplies for her period, or how she hears gunshots all through the night and learns that more of her neighborhood acquaintances have either disappears or been killed throughout the night, but I see this as a reality I do not understand. I see this as a novel of a person who is trying to go about her business in a turbulent climate, hiding out in her apartment, trying to stay quiet while listening to the noise on the outside, until the noise comes to find her. This novel tries to juxtapose the difference between the relative safety of Adelaida feels in the apartment and the chaos outside until the two meet and she has to make decisions that will affect her life but be instrumental to her survival. The tension of the novel picks up in the second half, and I really do feel the nerves that she is feeling. The tightness of the writing makes the urgency feel stronger, and the ending, though it seems as if she does not know how to end the novel for a few pages, does end satisfying. \n\nI enjoyed this novel. It feels tense and dangerous. I thought the end kind of dragged a little bit, but this is the only complaint I can find. \"It Would Be Night in Caracas\" is otherwise one of the best books I've read this year. \n\nI received this as an ARC from NetGalley in exchange for an honest review.\nWas this review helpful?\nThis suspenseful, literary novel follows Adelaida, whose mother has just died while Caracas devolves into chaos. Adelaida views street demonstrations while trapped in her apartment, struggles with impossible choices, and figures out how to survive. While this is fiction, it reads like a first-person memoir of life while your beloved city/homeland collapses in a thousand different ways. Riveting contemporary fiction, part of the new HarperVia (USA) imprint of literature in translation. Author Karina Sainz Borgo grew up in Venezuela and now lives in Spain. Will appeal to book groups and readers who appreciate literature in translation, character-driven women's fiction, and novels with strong contemporary political undercurrents. Translated from the Spanish by Elizabeth Breyer. Full review to come on BookBrowse.\nWas this review helpful?\nI honestly don’t know how to even start to describe how this book broke me emotionally. Set in the middle of a political war in Venezuela, Adelaida Falcónjust is saying goodbye to the only family member she has known, her mother whom lost her battle to cancer. Completely broken Adelaida returns to her apartment and tapes shut her windows to prevent the tear gas raining down on protesters in the streets from seeping in. Wait, it gets worse. \n\nAdelaida apartment is then taken over by looters masquerading as revolutionaries who beat her badly. With the strength of memory of her mother Adelaida fights to survive. Alternating between past & present Borgo makes you feel Adelaida struggles. I was on the verge of tears from page one. This book yanked my heart out of my chest! I’m telling Adelaida goes through it! The guilt of stealing food and the identity of a dead woman so she can get out of Venezuela, so many surprising twists and turns. This is a must read. 4.5/5 stars\n\nThank you Harpervia & NetGalley for gifting me this review copy in exchange for an honest review.\nWas this review helpful?\nIt Would Be Night in Caracas is a timely novel, taking place in present day Venezuela, a country that has been in the news for the large number of protests going on in the country. Being a foreigner I didn’t have a deeper understanding of the conflict and why the protects were going on, but reading this book prompted me to start doing research in order to understand the context around the events of the novel. For this reason, I think that this novel was good, it helps shed light on what is going on in Venezuela politically that are lesser known to those outside of South America.\n\nThe deeply internal narrative drifts seemlessly between the present day and the past, from Adelaida’s childhood memories at the start of the Latin American debt crisis in the 1970’s and 1980’s. The debt crisis started when capitalist economies for several countries dropped when the price of oil plummeted and the national currencies inflated. She relives the Bolivarian Revolution, the way that her country evolved and changed over the years, and eventually details the horrifying events that lead up to the present day, including the student protest killings in 2014. At times the drifts back and forth in time could be a bit difficult to follow and place the time frame, it made the pacing a extremely slow.\n\nThe book does not shy away from the gritty detail of the deep corruption on all levels that presents a city that is oppressive, eating away at it’s inhabitants as they all lose a bit of their former lives bit by bit. The setting feels desolate and more like a battlefield at points, with clashes between protesters, gangs, and state police blurring the lines of who is who. The novel opens with the death of Adelaida, grieving for the death of her mother and namesake. The naming is allegorical in that it shows both the literal and proverbial death of Adelaida Falcón, a Venezuelan woman trapped in a city that is dying. Adelaida’s state of mind is somber and even monotonous as she steadily loses her grip on her life and her identity. This loss of identity and later, death of the self plays into a literal shedding of her old identity which I think in a way was smartly written, if a little heavy handed and too literal.\n\nI appreciated the insight that this novel has into the role that one’s nationality can play into a person’s identity, and how the deterioration of society and poverty can have negative effects on a person’s mental health. I wanted to love this book for the intelligent dialogue about identity, but I found myself struggling to get through it. The story moves at a snail’s pace and is bogged down by random character’s stories in order to establish the setting or a plot device later on in the story.\n\nThe closer I got to the ending of the novel, the more bored I became with the almost ridiculous tie in of identity and death with the events in the novel, which is reiterated multiple times. I think that this story had a lot of potential and after taking some time to reflect on it, I was better able to dissect and appreciate the themes. However, the slow burning plot, drifting narrative, and bloated details made this a less enjoyable read overall. It would have been better with more concision and focus on the central ideas without getting bogged down with so many side character details that come out of nowhere.\nWas this review helpful?\nA brilliant read a book that brings the sadness turmoil in Venezuela and the shock horror the people of this country are suffering on a daily basis .Heart wrenching raw painful a book Characters I won’t forget.#netgalley#harpercollins\nWas this review helpful?\nI received an ARC of this novel from Netgalley in exchange for an honest review. \n\nBrutally raw novel about life in Venezuela and a woman struggling to make it in the midst of civil unrest. Well written with great characters.\nWas this review helpful?\nWhen I saw this book available on Netgalley, the blurb completely drew me in. It seemed like it would educate me about a country and it's current crisis that I'm not too familiar with, even if it is fiction.\nThe book starts out with Adelaide dealing with a death and how even that isn't the easiest to deal with in Venezuela's current political crisis. We see what her neighborhood is going through and can easily envision it with the details given. It seems more war torn than I thought it would be and almost feels like something that would've happened during WWII in Europe. Unfortunately, some parts of the telling of the story seem a little lost. The unpredictability of when the author decides to throw in a flashback or a past event from another character didn't always flow with what was currently taking place with Adelaide and her living situation. It didn't divide up the two voices in a way that seemed seamless. \nThe setting of the story in Caracas, Venezuela was more exciting than the actual story itself. It seemed a bit predictable, but I felt myself wanting to more about Adelaide and what she went through to get to her current state. The fear, hunger, and hatred of the leaders led to a way of survival that not everyone wanted to live, including Adelaide.\n\n\"In this country, non one rests in peace. No one.\"\n\nThe book read fast, but not so much a page turner, just a quick idea of what was currently happening. This book was ok and I could see it's appeal. I would be interested to see what people of Venezuela think of it for content purposes. Overall, I am glad I got to see someone take the desperation of survival and live through something so horrendous my any means necessary. Just wish it flowed better.\nWas this review helpful?\nGrieving the recent loss of her mother, her only real family, Adelaida struggles to survive in a nightmarish city torn apart by rioting and upheaval. After being violently evicted from her apartment, Adelaida finds herself and those around her performing acts that would have previously been unthinkable in order to survive. \nIt Would Be Night in Caracas depicts a despairing, tumultuous Venezuela where the only hope is in escape.\nWas this review helpful?\nThere is a lot of fear and heartbreak in this story. Some of it was unsettling but the story was pretty well done. I enjoyed this book, and felt it was eye opening and full of emotions.\nWas this review helpful?\nThis ARC was courtesy of netgalley - all thoughts and opinions are mine and unbiased\n\nThis was an intense hard read. I found it haunting - both in the beautiful way it was written and the story and characters. This will stay with me for some time\n\nIt has made me realise that although I know a little about the Venezuelan situation - I don't know enough - it has also left me wondering why the media have not picked up on this and given it the wider audience it surely deserves\n\nThe predicament of the characters chilled me to the bone - although it is fiction - I've no doubt that this is something that Venezuelans are experiencing in real life. \n\nPowerful, upsetting, beautifully illustrated in the language of the author\n\nI cannot rate this highly enough\nWas this review helpful?\nThis is an interesting story about Adelaida and her struggle to survive after the death of her mother. Set in Caracas, Venezuela, there could not be a more depressing setting. Once the shining jewel of South America, the death of democracy and a well run government is now in free fall. \nThis story is the tale of what one must do to survive. \nA compelling tale at times a bit jumpy but still worth the read. \nThanks to Netgalley for the eArc for review purposes.\nWas this review helpful?\nThis was an intense read. It made me realize how little I know about the political situation in Venezuela, and led me to some searching to better educate myself, which I always appreciate. If a book can make me want to know more about a real-life situation, I think the author has done something great.\n\nIn the midst of the chaos and upheaval in Caracas, Adelaide loses her mother, the only real family she has ever had, and returns to their apartment and the struggle to survive on her own. She is faced with some very difficult, life-alerting decisions, and the reader gets to feel her indecision and hopelessness along with her.\n\nThe writing here is very good and the translation worked well for me. The story is stark, lonely, and at times gruesome. The blurb mentions twists and turns, but it didn’t find these twists in my reading. The present day story flows along evenly, if at times it is somewhat slow, but the flashbacks were distracting and seemed to come at awkward times. I think this is ultimately what keeps the book from being a pick for me. Still, I would be interested in reading more from this author in the future.\nWas this review helpful?\nI was disappointed. \nI hope a book will reflect what Venezuela is and is not taking advantage of the economic and social crisis to bring about an opportunistic and apocalyptic book. \n\nVenezuela is something more complex than a war zone. Other authors think of Venezuela that will bring us to the present crisis (I recommend Eduardo Sánchez Rugeles) \n\nLess harm than fast reading . You will be ready.\nWas this review helpful?\nThis was not an easy book to read. It's detailed and lyrical and heartbreaking and upsetting. I cared about the characters, I was brought to tears. I was scared for the characters and sad for them and invested in the plot. I could picture the rooms and streets and felt like I was reading about real people, which made me sad. Would definitely recommend.\nWas this review helpful?\nThis stark and chilling book brilliantly humanizes the experience of its protagonist. Going deep behind the headlines of Venezuela's violent unrest, Borgo challenges readers to empathize with a woman is trying to understand just how much she can take and how far she will go to survive. This is a powerful book that does not sugarcoat suffering or lionize its characters for enduring it. Borgo's integration of traditional canciones and poetry adds immeasurably to the texture and beauty of her writing.\nWas this review helpful?\n\"It Would be Night in Caracas\" by Karina Sainz Borgo is the story of Adelaida Falcon and her life in an unstable and dangerous Venezuela. After burying her mother and finding her apartment overtaken by revolutionaries, Adelaida must take desperate measures to survive in a city of violence and fear.\n\nI was a bit disappointed by this book. Perhaps there was something lost in translation. I think it started off well, but the majority of the plot just seemed underdeveloped and some of it dragged. Though the author depicted many of the horrible realities in Venezuela, the characters and events didn't ever really seem to come alive to me. \n\nAs always, many thanks to NetGalley, the author, and the publisher for the privilege of reading an advanced digital copy of this book.\nWas this review helpful?", "pred_label": "__label__1", "pred_score_pos": 0.5128378868103027} {"content": "CBB60 AC motor capacitor\n\nRef Price:\nLoading Port:\nPayment Terms:\nMin Order Qty:\nSupply Capability:\n400000 pc/month\n\nOKorder Service Pledge\n\nQuality Product\n\nOrder On-line Tracking\n\nTimely Delivery\n\nOKorder Service Pledge\n\nCredit Rating\n\nCredit Services\n\nCredit Purchasing\n\nShare to:\n\nProduct Description:\n\nQuick Details\n\n • Place of Origin: Anhui, China (Mainland)\n\n • Brand Name: mascotop\n\n • Model Number: CBB60\n\n • Type: Polypropylene Film Capacitor\n\n • Application: AC / Motor\n\n • Package Type: Through Hole\n\n • Capacitance: 5-100uf\n\n • Rated Voltage: 450V\n\n • Operating Temperature: -40~85\n\n • Packaging & Delivery\n\nPackaging Details:Accurate packing list will be sent on request.\nDelivery Detail:15days\n\n\n1.low dissipation\n2.high insulation resistance\n3.good self-healing character\n4.steady electricity performance\n\nDear customer, we are specialized manufacturer, with year experience; we supply capacitor to the world market with high quality and reasonable price.\n\nPlease feel free to contact me directly, I will try to help you, about price, packing, shipping and so on.\n\n\nSend a message to us:\n\nRemaining: 4000 characters\n\n- Self introduction\n\n- Required specifications\n\n- Inquire about price/MOQ\n\nQ:What is the phase-shifting capacitor, what is the difference between it and the general capacitor\nAnd the phase-shifting capacitor has the function of changing the phase of the alternating current signal in addition to the characteristics of the general capacitor. The answer can be compensated by the power factor compensation in parallel with the phase-shifting capacitor, and the phase-shifting capacitor can be used to produce the phase-shifting capacitor fault diagnosis device.\nQ:Cd capacitance to express what\nNo capacitance is used in the high-frequency circuit of a capacitor, this capacitor without pins or pins shorter, commonly used in the tuner; generally PF level, the so-called \"no sense\" is the capacitor work is not produce \"inductance\" Effect, because C (capacitance) + L (inductance) = R (resistance), (when the match is good), if so, the circuit will not work.\nQ:What is the relationship between capacitance and voltage?\nThe larger the capacity of the capacitor, the larger the voltage, the smaller the capacity (uF). Since q = Cu, q is the current charge number of the capacitor, which is substantially proportional to the volume of the capacitor\nQ:What is the use of capacitors?\nAs a passive component of the capacitor, its role is nothing more than the following; applied to the power circuit, to achieve bypass, decoupling, filtering and energy storage role, the following classification:\nQ:How to identify high voltage capacitors is good or bad\nYou have no voltage regulator, if there is, with a voltage regulator, an ammeter a voltmeter (available multimeter instead) to the capacitor plus an integer current (controlled by a voltage regulator), and then calculate the capacitance based on the voltage reading and current reading Impedance, and then divided by 3184 calculated by the tolerance value, the results and the capacitor nameplate on the standard almost no capacitance, and the other side of the capacitor is broken\nQ:How to use the capacitor\nCircuites that are forbidden use: Even if the customer installs a solid-state aluminum capacitor in strict accordance with the welding conditions we have given, the leakage current of the solid-state aluminum capacitor may also increase or even increase significantly.\nQ:Why some Y capacitor is very small, and some Y capacitor is very large?\nIn line between the line of fire and zero line suppression capacitor, commonly known as X capacitance. As the location of the capacitor connection is also more critical, the same need to meet the relevant safety standards. X capacitance is also one of the safety capacitors. According to the actual needs, the capacitance value of the X capacitor is larger than the capacitance of the Y capacitor. However, it is necessary to connect a safety resistor in parallel with the X capacitor to prevent the charging and discharging of the power supply line.\nQ:What is the electrolytic capacitor inside?\nThere are aluminum foil, paper (not the general paper), as well as electrolyte. There is polarity, then the explosion will explode.\nQ:Does anyone know the difference between the stray inductance of the capacitor and the parasitic inductance?\nWith the increase in stray inductance, IGBT turn-on loss will be reduced, the diode loss will increase. Stray inductance may also cause oscillations, such as oscillations caused by current mutations, which may result in limited device use due to EMI or overvoltage limits.\nQ:On the ground resistance, what role the capacitor\nDecoupling: The capacitor used in the decoupling circuit is called the decoupling capacitor. This capacitor circuit is used in the DC voltage supply circuit of the multi-stage amplifier. The decoupling capacitor eliminates the harmful low frequency cross-connection between the amplifiers.\n\n1. Manufacturer Overview\n\nYear Established\nAnnual Output Value\nMain Markets\nCompany Certifications\n\n2. Manufacturer Certificates\n\na) Certification Name  \nValidity Period  \n\n3. Manufacturer Capability\n\na)Trade Capacity  \nNearest Port\nExport Percentage\nNo.of Employees in Trade Department\nLanguage Spoken:\nb)Factory Information  \nFactory Size:\nNo. of Production Lines\nContract Manufacturing\nProduct Price Range", "pred_label": "__label__1", "pred_score_pos": 0.8556368350982666} {"content": "Bluugo Changes Stage Name To ‘Flyght’\n\n\nThe 2018 Magnum King of the Dancehall, Bluugo, changed his stage name to ‘Flyght’.\n\nIn an interview with the Zee on Wednesday, the artiste, known as Bluugo at the time of his win, said he was continually mistaken for Jamaican artist Bugle because of the similarity of sounds.\n\nIn the mean time, he explained the inspiration for his latest single titled ‘10z’.\n\nFlyght also said he is working on several upcoming projects to release to the public.\n\nFlyght, who once went by the name Bluugo, was the 2018 Magnum Kings and Queens winner. Since then, he has continued his musical path producing songs such as ‘Dr. Fix it’, ‘Who frighten Dem’ and ‘Pot Cova’.", "pred_label": "__label__1", "pred_score_pos": 0.966735303401947} {"content": "The 10th anniversary of 9/11 has come and gone. Leftist liberals everywhere all seemed determined to make the worst possible interpretations of the U.S. response since that historic day. It was a pathetic display. It's rhetoric like that which has led to my becoming an Independent. I no longer identify with Democrats. I feel pushed to the center and now see myself as a moderate centrist. I'm simply appalled at the extremes of the left, just as I am at the extremes of the right.\n\nWhen we receive new information, the obvious response is to adjust, if necessary. The information can open – or close – our minds, depending on how we interpret it. An unbiased person will scrutinize the information for validity and judge it accordingly. A biased person is more likely to spin the data to suit his preexisting ideas or even reject it out of hand. Perhaps the most common cause of bias is ideology. Whether it be political, religious, cultural or whatever: ideology can act like a camera filter through which new information can be tinted or even polarized.\n\nIdeologies are seductive. Even scientists can have their objectivity compromised by ideology. Confirmation bias is an all too human tendency that can also afflict scientists. Political, religious, philosophical and economic biases can also affect scientists (consciously or not). Within their own disciplines, reductionism, aesthetics, metaphysics and other presuppositions can skew findings or interpretations of them. Fortunately, science has the scientific method (peer review, repeatable experiments, etc.) to weed out such errors.\n\nIf even scientifically disciplined professionals are subject to ideological bias, then who is really safe from it? Would less disciplined laymen be even more prone to it? To answer my own question: Yes – judging by what I read, online, from (alleged) freethinkers in blogs and forums.\n\nPolitically, freethinkers are predominantly liberal. From what I can discern, they seem more likely than others to exhibit ideological bias because liberals are, by and large, idealists. They push for change to realize their ideals: how society should or ought to be. One important liberal ideal is equality (inclusion). It was liberals who heralded reforms to include women and minorities (religious, racial, ethnic, sexual orientation, etc.) as equals. Idealism can lead to wonderful reforms but not every issue is always amenable to idealism.\n\nIf all religions, nations, people, species, lifestyles, etc., are equal and to be included, then values become, in effect, relative. Because of this tendency to ignore or deny differences, liberal thinking leads to accommodationism, multiculturalism and a bias for political underdogs (and against the prevailing powers). All too often, decisions aren’t based solely on the available information: instead, they’re filtered through the lens of liberal ideology. Instead of evaluating issues in terms of merit, the idealism of liberals leads them to evaluate issues in terms of ideals. As thus practiced, the most significant difference between merit and ideals is bias.\n\nAs I’ve gotten older, I’ve noticed more and more how liberal idealism – being liberal for liberal’s sake – causes bad decisions. It’s why I’ve moved right, to the political center. Differences must be addressed on their real merits. This doesn’t mean you forsake your ideals. It means your ideals will mislead decisions if they take precedence over the merits of political realities. You can recognize when idealism has ignored political realities by the backlash that eventually follows, such as: reverse discrimination and the end of Affirmative Action; multiculturalism and bans on burqas and mosque spires.\n\nAs a centrist, I believe there’s a time to be conservative and a time to be liberal and that these times are determined by the merits of the political realities involved. For instance: nobody wants civilian casualties in the pursuit of the war on terrorism. Should we quit the war to avoid such casualties? Of course not! If we value our way of life, there is no alternative but to deal forcefully with terrorists. We can try our utmost to avoid civilian casualties but we need to acknowledge that they will nonetheless occur. It doesn’t help that terrorists use civilians as human shields, so the fair share of blame should go to those who callously endangered the civilians in the first place. The truth is that terrorists have been known to gun down civilians who flee neighborhoods used as human shields. You can’t hide behind civilians who run away.\n\nEverything is NOT relative. The deaths on 9/11 are distinctly different from the deaths incurred in the war on terrorism. Civilians were intentionally targeted by Al Qaeda BECAUSE they were civilians. The U.S. military and those of other countries target combatants only. Collateral damage and civilian deaths are not desirable to us. Let’s get real here. If terrorists stopped trying to destabilize governments by attacking their civilian citizens, the war on terror would be over.\n\nThe war on terror is an example of where liberal idealism is not generally a good idea and where harsh realities must be accepted. However, there are times, even in war, when liberal ideals are needed, such as in the treatment of prisoners and the methods used to interrogate them. It’s a matter of balance. Ideals and merit.\n\nViews: 84\n\n\n\nJoin Atheist Nexus\n\n\n\nUpdate Your Membership :\n\n\n\nNexus on Social Media:\n\n\nBadges  |  Report an Issue  |  Terms of Service", "pred_label": "__label__1", "pred_score_pos": 0.8680996894836426} {"content": "Life Cycle Effect on Firm Capital Structure: Evidence from Jordan\n\nYazeid Saleh Abd Al-Lateif, Mamoun Mohd AL-Debi'e\n\n\nThis study aims to examine the effect of firm's life cycle on its capital structure in a sample of (56) industrial companies listed in Amman Stock Exchange (ASE) during the period (2015-2016). The study applied the Dickinson approach (2011) to determine the stages in the firm life cycle. Multiple regression analysis was used to achieve the objectives of the study and test its hypotheses. The results show that the average leverage ratio (Lev) for industrial firms is low. However, the degree of reliance on debt in the capital structure is highest in the introduction and growth stages. Furthermore, regression analysis shows a statistically significant inverse relationship between firm's life cycle stages and the degree of financial leverage in the Jordanian industrial sector, which indicates a gradual development in the explanatory variables across the stages of firm's life cycle. The pecking order theory is the most capable theory to explaining the funding behavior in Jordanian industrial firms throughout all life cycle stages except for the decline stage. Finally, the pecking order theory and trade-off theory in financial management are unable to explain the funding behavior of Jordanian industrial firms in the decline stage.\n\n\nFirm life cycle, Capital structure, Pecking order theory, Trade-off theory\n\n\n • There are currently no refbacks.", "pred_label": "__label__1", "pred_score_pos": 0.8589187264442444} {"content": "Locana, a San Diego biotech that repurposed the gene-editing system CRISPR, has raised a $55 million series A round.\n\nIts technology was developed in the lab of Eugene Yeo, a professor at UC San Diego and Locana co-founder.\n\nLocana uses CRISPR-Cas9 gene editing technology to target RNA, which carries DNA instructions to cells. Previously, the technology could only be used to manipulate DNA.\n\nThe company has several preclinical programs that seek to address dysfunctional RNA processing, in an attempt to get at the root cause of genetic diseases.\n\nJeffrey Ostrove, who previously headed AbVitro and Ceregene, is Locana’s CEO. Its chairman is Tom Daniel, a former Celgene executive, who is also a partner at Arch Venture Partners, which led the funding round.\n\n“The Locana team has rapidly advanced foundational science from Dr. Yeo’s lab into an impressive preclinical data set, demonstrating potential of this RNA-targeting platform to be therapeutically impactful in genetic diseases and beyond,” said Daniel in a news release.\n\nAlso participating in the financing were existing investors Temasek and Lightstone Ventures, along with new investors UCB Ventures and GV, previously called Google Ventures.\n\nLocana’s technology was also developed by its chief technology officer David Nelles and Ranjan Batra, who is Locana’s vice president of research and development.", "pred_label": "__label__1", "pred_score_pos": 0.6987348794937134} {"content": "What is Schizophrenia?\n\n\n\n\n • Hallucinations\n • Delusions\n\nTreatments and Therapies\n\n\n\n\nPsychosocial Treatments\n\nThese treatments are helpful after patients and their doctor find a medication that works. Learning and using coping skills to address the everyday challenges of schizophrenia helps people to pursue their life goals, such as attending school or work.\n\nCoordinated specialty care (CSC)\n\nThis treatment model integrates medication, psychosocial therapies, case management, family involvement, and supported education and employment services, all aimed at reducing symptoms and improving quality of life.", "pred_label": "__label__1", "pred_score_pos": 0.9029337167739868} {"content": "Residential Comprehensive Audit Program\n\nWhat is the Residential Comprehensive Audit Program?\n\nThe Residential Comprehensive Audit Program is a home energy efficiency program that includes an initial audit, installation of energy efficiency measures and an incentive structure designed to help homeowners make energy-efficient improvements. A BPI-certified auditor will perform the audit, evaluate your home’s energy efficiency and recommend improvements that could save you energy and money.\n\nWhat does it mean to be BPI-certified?\n\nThe Building Performance Institute (BPI®) is a non-profit developer of technical standards for home performance and weatherization retrofit work. BPI standards are recognized across North America as a resource for building science technology that sets standards for assessing and improving the energy performance as well as the health and safety of homes. Auditors who are BPI-certified have undergone training and testing to demonstrate the ability to do work in accordance with BPI standards.\n\nWhat does the Residential Comprehensive Audit consist of?\n\nThe Residential Comprehensive Audit consists of a BPI-certified auditor working with you one-on-one to identify energy-saving improvements you can make to your home. The auditor will evaluate your home’s heating and cooling systems, insulation and windows, and will conduct a blower door test to detect air leaks that could be costing you money. During the audit, energy-saving products worth up to $200 may be installed for no fee* - if your auditor installs products that save a minimum of 350 kilowatt-hours (such as 11 LED light bulbs).\n\nWhat rebates are available as part of the Residential Comprehensive Audit Program?\n\nThere are opportunities to receive a $250 instant rebate on a comprehensive energy audit and additional rebates for installing energy-saving improvements in your home with the savings you achieve - if your auditor installs products that save a minimum of 350 kilowatt-hours (such as 11 LED light bulbs).\n\nWhat energy-saving products will be installed as part of the Residential Comprehensive Audit?\n\nEnergy-saving products worth up to $200 may be installed at no additional cost to you as part of the Residential Comprehensive Audit. These products are subject to change and may include LED bulbs, an LED nightlight, a smart power strip, pipe insulation, a furnace whistle, a showerhead, and kitchen and bath faucet aerators, depending on the type of water heat in the home.\n\n\nHow much can the energy-saving products actually save?\n\n- LEDs use up to 90 percent less energy and can save an average of $80 in energy costs over their lifetime compared to traditional incandescent bulbs. A popular residential option, ENERGY STAR® light-emitting diodes, or LEDs, can be installed in bathrooms, permanent fixtures, ceiling fans, chandeliers and other high-usage areas.\n\n\n\n\nAre LED lightbulbs safe for the environment?\n\n\nHow do I properly dispose of unbroken LEDs?\n\n\nIf a fixture uses less water, will it take longer to complete tasks?\n\n\n\nHow do energy-efficient aerators and showerheads use less energy?\n\n\nWill I notice a difference in water temperature?\n\n\nHow much money will I save on my bill monthly?\n\n\nWhat is the life of an LED lightbulb?\n\n\nWhat safety precautions do I need to be aware of before my energy audit?\n\nIf there are any unsecured pets or unattended minors upon our arrival, we will not be able to enter to perform the audit or installation. During product installation, we ask that all small children be kept at a safe distance from the installers. The installers will provide further direction once on-site.\n\nWhat is the next step?\n\nCall 1-855-314-9962 or click here to schedule an appointment for an energy audit and installation of energy-saving products!", "pred_label": "__label__1", "pred_score_pos": 0.8173826932907104} {"content": "Each pilot knows that turbulence is, at times, unavoidable, and might be doubtlessly dangerous. Fog and other issues not solely made the flying tough and in the end resulted in each the NC-1 and NC-three being compelled to land in the course of the ocean, leaving the NC-4, whose problems initially of the flight had almost compelled her out of the mission, as the one one to reach the Azores by flying.flight\n\nSpartan Airlines Ltd, United Airways Ltd, and Hillman’s Airways merged, ensuing in the formation of the new British Airways Ltd. Though different passengers have been in a position to pull her back into the plane, witnesses reported that she went into cardiac arrest.\n\nThe FAA prescribes a minimal flying time of 40 hours, however the national common is of about 70 hours in two-seat airplanes. You too can ask for advice from other Joy Flights enthusiasts and jet pilots as effectively for the most really helpful and counseled companies of such a service.flight\n\nWhenever you seek for reward flights we’ll present you availability on British Airways first. As one of many world’s largest flight comparability websites, Cheapflights is the place to begin to your travel planning. That is how the way forward for airline journey and purchasing of airline ticket has developed, and it’s a very fascinating business.\n\nAlthough altitudes are flight plan assigned, gross weight, engine thrust, and wing functionality might initially require step-climbs-that’s, progressively larger altitudes facilitated by gas-burn and weight reductions, though crews can request totally different flight levels to keep away from or minimize climate- and turbulence-caused passenger discomfort.", "pred_label": "__label__1", "pred_score_pos": 0.7714920043945312} {"content": "Four Tapas Dishes to Avoid While on a Diet\n\n26th July 2018\nBeing on a diet means giving up certain food types, so it is important that you do not give into the temptation of ordering these tapas dishes. Instead opt for healthier choices.\n\nSurely, if you have started a diet you have already had to turn down a family meal or a dinner with friends? Being on a diet should not affect your social life, you just have to know what foods you can eat and which ones to avoid. In order to help you keep to your diet, we want to provide you with four tapas dishes to avoid while on a diet.\n\nBy knowing which tapas dishes to avoid while on a diet, you can continue to enjoy your free time while you take care of yourself. Spanish cuisine has a lot of tapas, so there is a wide variety to choose healthy options from.\n\nTapas to avoid while on a diet\n\nRussian Salad\n\nThe Russian salad is one of the most appetizing tapas dishes, especially in the summer. As the heat intensifies, a fresh salad can please anyone. However, if you are on a diet, you should know that it is one of the most caloric tapas. The main reason for this is the mayonnaise, so you should really leave this tapas dish aside and choose others.\n\nrussian salad recipe\n\nAlthough the base of a Russian salad is vegetables, it is still not a healthy tapas dish. The large amount of mayonnaise makes it a dish with lots of calories and fat.\n\nIf you are on a diet and you want a Russian salad, here is a light version of the recipe. Making it is very simple and you can do it at home. It is a pity that tapas bars do not opt ​​for more light versions of traditional recipes.\n\nStuffed Potato\n\nStuffed potatoes are a tapas dish that can be made in a number of different ways. All of them have a large amount of food and some sauce in common. Therefore, what begins as a healthy cooked potato, ends up being a caloric bomb.\n\nstuffed potato\n\nIn order to prepare them, the first thing to do is to roast or cook the potato. Then, stuff it with a filling and add some sauce to make it juicier. These sauces are usually some type of bechamel, mayonnaise, or made from some type of cheese. They have a high fat content that is not recommended for individuals on a diet.\n\nThe filling is usually made from cheese, bacon, or minced meat. These fatty meats are also not recommended options if you are dieting. As you can see, stuffed potatoes should not be among your choices, if you decide to go for a tapas meal with your friends.\n\nRoman-Style Squid\n\nYou can eat roman-style squid in a multitude of ways. One way is in a tapas dish with some lemon or sauce. It can also be enjoyed as a second course or in a sandwich. This last variation is typical in Madrid.\n\nroman-style squid\n\nSquid is a healthy food because it contains very few calories and a large number of properties. These special properties include vitamins A, E, C, and D, as well as iron, potassium, and phosphorus. The problem is that when people prepare them, they typically put them in the fryer. With this simple act, a great food becomes one of the tapas dishes to avoid while on a diet.\n\nIn addition, squid is usually accompanied by some type of sauce, such as mayonnaise. This makes it an even less healthy option, since mayonnaise is not healthy at all.\n\n\nEmpanadillas are a typical food in tapas bars, as well as in each and every Spanish house. Their main component is dough with a base of water, salt, olive oil, and flour. As for the filling, there are plenty of options: meat, fish, vegetables etc. The empanadilla is closed and sealed with the help of a fork. Then, it is fried in order to make it crispy.\n\nBeing a fried food, empanadillas are not particularly appropriate for dieting. The dough absorbs a large amount of oil and that makes them an unhealthy food. Although this traditional food is becoming increasingly common to prepare in the oven. This is an equally tasty but less crunchy option. In this case, you can absolutely enjoy some empanadillas.", "pred_label": "__label__1", "pred_score_pos": 0.9877434968948364} {"content": "May 11, 2017\n\nConventional TV watching has seen immense changes in recent years, largely due to internet’s mobility. But one thing is for sure: TV shows easily remain as most people’s fixation.\n\nI once encountered someone who claimed he “didn’t watch TV,” which I found weird. Even as an adult, I haven’t quite relinquished my own TV obsession. In fact, I rely on it for when reality becomes too stifling. The variety of local and international shows available also makes it even harder to switch off.\n\nAnd it’s not a completely bad thing. Recent studies show that you can reap health benefits from watching TV. Dubbed by psychologists as a parasocial relationship, this one-sided interaction is often projected towards celebrities or fictional characters, with the receiving party completely oblivious of the giver’s existence.\n\nThis can stem from a variety of reasons, with loneliness as the most common one. Leon Festinger’s social comparison theory says we watch TV shows to make us feel better about ourselves. The short-lived euphoria can be sparked even within just a 30-minute timeframe. Case in point: the entertaining absurdity in every Keeping Up with the Kardashians episode. Doesn’t being a mere spectator in an unfolding drama make you feel good? You get to be around the fire without being scorched.\n\nTV shows also create a kind of intimacy where we identify with a character and develop some sort of one-sided bond with them. This significantly alleviates loneliness and nurtures a sense of belongingness.\n\nJennifer Barnes, assistant professor of psychology at the University of Oklahoma, says this simulated intimacy likewise bears real-world benefits, such as having improved self-esteem.\n\nFestinger’s theory works both ways, however, and there are times when watching television can leave us feeling worse, such as when a favorite character gets killed or, ultimately, when the show itself ends. In some instances, this sense of forlorn can be beneficial. This is what philosophers have referred to as the paradox of tragedy, wherein unfortunate events tend to comfort us.\n\nIt’s still unclear why we are able to find pleasure even in times of pain, but using TV shows as catharsis for negative emotions can be liberating. “Although we’re feeling sadness, the meta-emotion we’re feeling might be something like gratitude that we can feel this wide range of emotional experiences,” Barnes says in an interview with Time. “We might actually feel glad that we can be empathetic and feel things like this on behalf of someone else, even if they’re not real.”\n\nBut while compassion and empathy are good traits to develop, just a word of caution: do not be overly attached to works of fiction, especially when you’re suffering from an underlying case of depression.\n\nOccasional binge-watching is good, but just like everything else in this world, do it in moderation.\n\n\nThis story was originally published in Northern Living, May 2017.\n\nTAGS: binge watching hobbies nolisoliph psychology television TV tv watching", "pred_label": "__label__1", "pred_score_pos": 0.995875895023346} {"content": "Winners Announced for the 2019 Best of FinXTech Awards\n\nAwards-9-10-19.pngBanks face a fundamental paradox: They need to adopt increasingly sophisticated technology to stay competitive, but most have neither the budget nor the risk appetite to develop the technology themselves.\n\nTo help banks address this challenge, a legion of fintech companies have sprung up in the past decade. The best of these are solving common problems faced by financial institutions today, from improving the customer experience, growing loans, serving small business customers and protecting against cybersecurity threats.\n\nTo this end, we at Bank Director and FinXTech have spent the past few months analyzing the most innovative solutions deployed by banks today. We evaluated the performance results and feedback from banks about their work with fintech companies, as well as the opinions of a panel of industry experts. These fintechs had already been vetted further for inclusion in our FinXTech Connect platform. We sought to identify technology companies that are tried and true — those that have successfully cultivated relationships with banks and delivered value to their clients.\n\nThen, we highlighted those companies at this year’s Experience FinXTech event, co-hosted by Bank Director and FinXTech this week at the JW Marriott in Chicago.\n\nAt our awards luncheon on Tuesday, we announced the winning technology solutions in six categories that cover a spectrum of important challenges faced by banks today: customer experience, revenue growth, loan growth, operations, small business solutions and security.\n\nWe also announced the Best of FinXTech Connect award, a technology-agnostic category that recognizes technology firms that work closely with bank clients to co-create or customize a solution, or demonstrated consistent collaboration with financial institutions.\n\nThe winners in each category are below:\n\nBest Solution for Customer Experience: Apiture\n\nApiture uses application programming interfaces (APIs) to upgrade a bank’s digital banking experience. Its platform includes digital account opening, personal financial management, cash flow management for businesses and payments services. Each feature can be unbundled from the platform.\n\nBest Solution for Revenue Growth: Mantl\n\nMANTL developed an account-opening tool that works with a bank’s existing core infrastructure. Its Core Wrapper API reads and writes directly to the core, allowing banks to set up, configure and maintain the account-opening product\n\nBest Solution for Loan Growth: ProPair\n\nProPair helps banks pair the right loan officer with the right lead. It integrates with a bank’s systems to analyze the bank’s data for insights into behaviors, patterns and lender performance to predict which officer should be connected with a particular client.\n\nBest Small Business Solution: P2BInvestor\n\nP2Binvestor provides an asset-based lending solution for banks that helps them monitor risk, track collateral and administer loans. It partners with banks to give them a pipeline of qualified borrowers.\n\nBest Solution for Improving Operations: Sandbox Banking\n\nSandbox Banking builds custom APIs that communicate between a bank’s legacy core systems like core processors, loan origination, customer relationship management software and data warehouses. It also builds APIs that integrate new products and automate data flow.\n\nBest Solution for Protecting the Bank: Illusive Networks\n\nIllusive Networks uses an approach called “endpoint-focused deception” to detect breaches into a bank’s IT system. It plants false information across a bank’s network endpoints, detects when an attacker acts on the information and captures forensics from the compromised machine. It also detects unnecessary files that could serve as tools for hackers.\n\nBest of FinXTech Connect: Sandbox Banking\n\nThe middleware platform, which also won the “Best Solution for Improving Operations” category, was also noted for working hand-in-hand with bank staff to create custom API connections to solve specific bank issues. In addition, banks can access three-hour blocks of developer time each month to work on special projects outside of regular technical support.\n\nHow Banks Can Use the Dark Web to Shed Light on Cybersecurity\n\ncybersecurity-9-5-19.pngCyberthreat intelligence, or CTI, can give bankers a deeper understanding of the potential threats that face their business.\n\nWhether it is knowing your enemy or learning about the latest malware, CTI provides information that can help executives make prudent, risk-based decisions. This information comes from the open internet as well as closed sources, including the darknet and dark web. Analyzing this CTI can produce insights and identify signs of a potential breach, leaked data or pending attacks.\n\nThe darknet is the part of the internet that is not accessible through conventional browsers and requires specific software or configurations; the deep web is the part of the internet that is not accessible through search engines. Some nation states, cybercriminal gangs and threat actors thrive in this underground economy through illegal activity that includes the sale of personal information, financial goods and illicit services. For bank’s CTI, the deep web and darknet are a treasure trove of breached information and threat indicators.\n\nA vast majority of these cyberthreat intelligence sources contain goods and sensitive data stolen from the financial services industry. Potential financial gain drives bad actors to maintain a thriving marketplace built on illicit items, including debit and credit card numbers, identity theft services and banking malware.\n\nWhile no tool or service can completely eliminate the risk of a data breach, integrating CTI into a bank’s cybersecurity program can make it more difficult to target and lower the likelihood of a breach. To get value from CTI, a bank can:\n\n • Identify the threat actors that are leveraging potential vulnerabilities in systems used by the financial sector;\n • Understand whether a particular organization or client is being targeted directly;\n • Detect active malware campaigns that could target the bank;\n • Learn where its customer and employee information may exist;\n • Find breached credit or debit cards on deep web or darknet marketplaces; and\n • Understand emerging trends regarding data theft.\n\nThere are a variety of ways that financial institutions can leverage, and directly benefit from, CTI. Some examples include:\n\n • Incorporating technical indicators of compromise into the company’s security information and event management system;\n • Briefing high-level executives on industry trends and providing intelligence on potential future attacks;\n • Providing intelligence briefings to security operation centers (SOCs), increasing the situational awareness of technical campaigns and bad actors;\n • Developing incident response scenarios;\n • Achieving timely integration with fraud teams to deactivate stolen credit or debit cards;\n • Working with law enforcement to remove stolen credit, debit or other financial information from the deep or dark web;\n • Segregating and limiting internal access to systems if an individual’s credentials are exposed;\n • Communicating with social media and marketing teams about exposed data; and\n • Implementing patches for known vulnerabilities that are discovered on external-facing systems and applications.\n\nWhat does a successful CTI program look like at financial institutions?\nDeep analytical CTI is usually not possible at small- to medium-sized financial institutions using the internal resources of their existing security teams, and is often outsourced to a vendor or third party. Outsourcing can provide some value-added actions, such as:\n\n • Identifying breached credit and debit cards or other financial information;\n • Monitoring chatter about C-suite executives;\n • Assisting in fraud prevention through credential theft;\n • Thwarting attacks planned by adversaries that uses new financial theft malware, ransomware or Trojans;\n • Examining reputational damage or brand-related chatter for an organization;\n • Identifying large credential data dumps or breaches;\n • Identifying or ascertaining stolen or fraudulent goods like blueprints, skimmers and physical devices, or sensitive data such as tax forms, personally identifiable information and protected health information.\n\nCTI can provide a variety of actionable information that executives can use to make better cybersecurity decisions and assess their risk appetite. With CTI, bankers can prioritize initiatives, address budgets and create business strategies for securing customer, employee and client data. A deeper understanding of the threats they face gives companies a firmer grasp of the tumultuous cyber landscape and a clearer vision of how to prevent problems.\n\nThe Strategic Side of Cybersecurity Governance\n\ncybersecurity-8-7-19.pngWithout a comprehensive cyber risk governance strategy, banks risk playing Whac-A-Mole with their cybersecurity.\n\nMost financial institutions’ cybersecurity programs are tactical or project-oriented, addressing one-off situations and putting out fires as they arise. This piecemeal approach to cybersecurity is inefficient and increasingly risky, given the growing number of new compliance requirements and privacy and security laws. Institutions are recognizing that everyone in the C-suite should be thinking about the need for a cyber risk governance strategy.\n\nThere are three key advantages to having a cyber risk governance strategy:\n\n • Effectively managing the audit and security budget: Organizations that address current risks can more effectively prepare for cybersecurity threats, while meeting and achieving consistent audit results. A thorough risk assessment can highlight real threats and identify controls to evaluate on an ongoing basis through regular review or testing.\n • Reducing legal exposure: Companies and their officers can reduce the potential for civil and criminal liability by getting in front of cybersecurity and demonstrating how the institution is managing its risk effectively.\n • Getting in front of cybersecurity at an organizational level: Strategic planning is an important shift of responsibility for management teams. It proactively undertakes initiatives because it’s the right thing to do, versus an auditor instructing a company to do them.\n\nSo what’s required to set up a cyber risk governance strategy? Most organizations have talented individuals, but not necessarily personnel that is focused on security. Compounding the industry shortage of cybersecurity professionals, banks may also lack the resources necessary to do a risk assessment and ensure security practices are aligned to the cyber risk governance. As a result, banks frequently bring in vendors to help. If that’s the case, they should undertake a cyber risk strategy assessment with the help of their vendor.\n\nBank boards can perform a cyber risk governance strategy assessment in three phases:\n\n 1. An assessment of the current cyber risk governance strategy. In phase one, a vendor’s team will review a bank’s current organizational and governance structure for managing information security risk. They’ll also review the information technology strategic plan and cybersecurity program to understand how the bank implements information security policies, standards and procedures. This provides a baseline of the people and processes surrounding the organization’s cyber risk governance and information security risk tolerance.\n 2. Understand the institution’s cyber risk footprint. Here, a vendor will review the technology footprint of customers, employees and vendors. They’ll look at internal and external data sources, the egress and ingress flow of data, the data flow mapping, the technology supporting data transport and the technology used for servicing clients, employees, and the third parties who support strategic initiatives.\n 3. Align information security resources to cyber governance goals. In phase three, a vendor will help the bank’s board and executives understand how its people, process and technology are aligned to achieve the company’s institution’s cyber governance goals. They’ll review the bank’s core operations and document the roles, processes and technology surrounding information security. They’ll also review the alignment of operational activities that support the bank’s information security strategic goals, and document effective and ineffective operational activities supporting the board’s cyber governance goals.\n\nOnce the assessment is complete, a bank will have the foundation needed to follow up with an operational analysis, tactical plan and strategic roadmap. With the roadmap in place, a bank can craft a cyber risk strategy that aligns with its policies, as well as an information security program that addresses the actual risks that the organization faces. Instead of just checking the boxes of required audits, bank boards can approach the assessments strategically, dictating the schedule while feeling confident that its cyber risks are being addressed.\n\nHow CECL Impacts Acquisitive Banks\n\nCECL-7-30-19.pngBank buyers preparing to review a potential transaction or close a purchase may encounter unexpected challenges.\n\nFor public and private financial institutions, the impending accounting standard called the current expected credit loss or CECL will change how they will account for acquired receivables. It is imperative that buyers use careful planning and consideration to avoid CECL headaches.\n\nMoving to CECL will change the name and definitions for acquired loans. The existing accounting guidance classifies loans into two categories: purchased-credit impaired (PCI) loans and purchased performing loans. Under CECL, the categories will change to purchased credit deteriorated (PCD) loans and non-PCD loans.\n\nPCI loans are loans that have experienced deterioration in credit quality after origination. It is probable that the acquiring institution will be unable to collect all the contractually obligated payments from the borrower for these loans. In comparison, PCD loans are purchased financial assets that have experienced a more-than-insignificant amount of credit deterioration since origination. CECL will give financial institutions broader latitude for considering which of their acquired loans have impairments.\n\nUnder existing guidance for PCI loans, management teams must establish what contractual cash flows they expect to receive, as well as the cash flows they do not expect to receive. The yield on these loans can change with expected cash flows assessments following the close of a deal. In contrast, changes in the expected credit losses on PCD loans will impact provisions for loan losses following a deal, similar to changes in expectations on originated loans.\n\nCECL will significantly change how banks treat existing purchased performing loans. Right now, accounting for purchased performing loans is straightforward: banks record loans at fair value, with no allowance recorded on Day One.\n\nUnder CECL, acquired assets that have only insignificant credit deterioration (non-PCD loans) will be treated similarly to originated assets. This requires a bank to record an allowance at acquisition, with an offset to the income statement.\n\nThe key difference with the CECL standard for these loans is that it is not appropriate for a financial institution to offset the need for an allowance with a purchase discount that is accreted into income. To take it a step further: a bank will need to record an appropriate allowance for all purchased performing loans from past mergers and acquisitions that it has on the balance sheet, even if the remaining purchase discounts resulted in no allowance under today’s standards.\n\nManagement teams should understand how CECL impacts accounting for acquired loans as they model potential transactions. The most substantial change relates to how banks account for acquired non-PCD loans. These loans first need to be adjusted to fair value under the requirements of accounting standards codification 805, Business Combinations, and then require a Day One reserve as discussed above. This new accounting could further dilute capital during an acquisition and increase the amount of time it takes a bank to earn back its tangible book value.\n\nBanks should work with their advisors to model the impact of these changes and consider whether they should adjust pricing or deal structure in response. Executives who are considering transactions that will close near their bank’s CECL adoption date not only will need to model the impact on the acquired loans but also the impact on their own loan portfolio. This preparation is imperative, so they can accurately estimate the impact on regulatory capital.\n\nA Top-Performing Bank Explains Why It Sponsors Three NFL Teams\n\nBest-Performing Stadium Sponsorships\n\nSponsoring a local sports team is an effective way to resonate with a community.\n\nIt’s something M&T Bank Corp. takes so seriously that it sponsors three NFL teams: the Buffalo Bills, in the bank’s hometown of Buffalo, New York; the New York Jets, who play out of Metlife Stadium in East Rutherford, New Jersey, and the Baltimore Ravens.\n\nSince 2003, the $121.6 billion asset bank has held naming rights for the Ravens’ home field, M&T Bank Stadium in Baltimore, Maryland. It’s a relationship the bank extended in 2014, for a cool $60 million, keeping M&T’s logo on the stadium until 2027.\n\n“We are embedded in the communities where we live and work, [and] we understand that those teams are important to their communities, including our employees, customers and prospects,” says Betsey Locke, senior vice president of brand, advertising and sponsorships at M&T.\n\nBack in 2003, M&T was relatively unknown in the Baltimore market, she says. Holding the naming rights for the Ravens’ stadium “gave us immediate credibility. We’re now perceived as a hometown bank.”\n\nPlacing a bank’s logo on a local stadium and aligning the brand with a well-loved team can make an impact; that’s what drives even efficiency-conscious companies like M&T to spend millions on these sponsorships. It’s a unique relationship that Bank Director sought to understand by looking at the recent records of major sports teams.\n\nIn addition to win/loss records, the ranking accounts for the popularity of the sport, based on survey data from Gallup.\n\n“Football remains the biggest and most popular sport,” says Locke. “The NFL draws the largest, strongest partnership ROI and the greatest fan affinity.”\n\nSponsoring sports teams is a tactic embraced by banks nationwide. There are more than 250 minor league baseball teams in the U.S., for example, and naming-rights sponsorships with these teams include big regional banks like Cincinnati-based Fifth Third Bancorp (the $168.8 billion asset company sponsors the Toledo Mud Hens) as well as smaller banks like $9.6 billion asset NBT Bancorp, in Norwich, New York, which sponsors the Syracuse Mets.\n\nCollege teams offer another popular option. Through its Centennial Bank brand, Home Bancshares, based in Conway, Arkansas, has naming rights on the stadium that’s home to Arkansas State University’s Red Wolves football team – John Allison, the chairman of the $15.3 billion asset company, is an alumnus of the school.\n\nM&T gets hundreds of sponsorship requests from sports teams to arts and cultural activities, says Locke. Her team uses a scorecard to conduct an initial review and determine whether a request meets the minimum requirements for M&T to seriously consider it. They look at things like alignment with the bank’s target audience, whether the opportunity will effectively promote M&T’s brand and differentiate the company in the marketplace, and if the bank will be able to promote its products and services to new audiences. Requests that pass this initial review are then handed off to a committee that meets quarterly to decide which requests to ultimately pursue.\n\nSponsoring the Ravens is a good fit, says Locke, because M&T doesn’t just cut a check. “We do community efforts together,” she says. For example, 150 employees from both organizations worked together to rehab a Boys & Girls Club of America in Baltimore earlier this year. Showing that both organizations are “deeply embedded in the community” is an important piece of the partnership, says Locke.\n\nFor the Ravens and other partners, M&T tracks the return on its investment through a number of key metrics, including impressions and engagement on traditional and social media. The bank also offers branded checking accounts for fans of the Ravens, Jets and Bills. These affinity accounts are promoted alongside the sponsorship, and M&T tracks their growth as part of the checking portfolio.\n\nFans’ love of the game goes beyond the numbers. A team’s record doesn’t account for its history, and teams that perform well one year can break fans’ hearts the next.\n\nLocke says M&T is with fans through the good times and the bad. “Fans are deeply engaged and support [their] teams year-round,” she says. And football promotes values that M&T wants to align itself with. “[It’s] about teamwork, love for the sport, love for the community,” she says.\n\nBest-Performing Stadium Sponsorships\n\nRank Sponsoring Bank Team League Win/Loss Record Score*\n#1 M&T Bank Corp. Baltimore Ravens NFL 62.5% 1.2\n#2 Wells Fargo & Co. Philadelphia 76ers NBA 62.2% 1.8\n#3 TD Bank Boston Celtics NBA 59.8% 2.8\n#4 U.S. Bancorp Minnesota Vikings NFL 53.1% 5.0\n#5 Barclays New York Islanders NHL 58.5% 5.6\n#5 Capital One Financial Corp. Washington Capitals NHL 58.5% 5.6\n#7 PNC Financial Services Group Carolina Hurricanes NHL 56.1% 6.4\n#8 SunTrust Banks Atlanta Braves MLB 55.6% 7.2\n#9 Citizens Financial Group Philadelphia Phillies MLB 49.4% 7.8\n#10 Bank of America Corp. Carolina Panthers NFL 43.8% 8.6\n\nSource: Source: Gallup, NFL, MLB, NHL, MLS\n*The score is based on the popularity of the sport as well as the win/loss records for each team. Where the bank sponsors an arena that hosts two sports teams, the best-performing team appears in the ranking.\n\nCECL Delayed for Small Banks\n\nCECL-7-18-19.pngSmall banks hoping for a delay in the new loan loss accounting standard could get their wish, following a change in how the accounting board sets the effective dates for new standards.\n\nOn July 17, the Financial Accounting Standards Board (FASB) proposed pushing back the effective date of major accounting changes like revenue recognition, leases and — key to financial institutions — the current expected credit loss model (CECL). The board hopes the additional time will offer relief to smaller companies with fewer resources and provide more space to learn from the implementation efforts of larger peers. Under the proposal, community banks and credit unions now have a new effective date of Jan. 1, 2023, to implement CECL.\n\nThe board’s proposal also provided relief for a new category they call “small reporting companies,” and thus simplified the three-tiered effective dates into two groups. The proposal retains the 2020 effective date for companies that file with the U.S. Securities and Exchange Commission that are not otherwise classified as a small reporting companies.\n\nCECL will force banks to set aside lifetime loss reserves at loan origination, rather than when a loss becomes probable. The standard has been hotly contested in the industry since its 2016 passage, and banking groups and members of Congress had unsuccessfully sought a delay in the intervening years.\n\nBut on Wednesday, some finally got what they were looking for. The proposed CECL delay for many banks comes as FASB grapples with how it sets the effective dates for different standards, said board member Susan Cosper in an interview conducted prior to the July 17 meeting.\n\nIn the past, FASB would pass a new accounting standard and set an effective date for SEC filers and public business entities in one year, then give private companies and nonprofit organizations an extra year to comply. The gap in dates recognizes the resource constraints those firms may face as well as the demand for outside services, and provide time for smaller companies to learn from the implementation lessons of large companies. However, the board’s advisory councils said this may not be enough time.\n\n“What we’ve learned … is that the smaller companies wait longer to actually start the adoption process,” Cosper says. “There are many community banks that haven’t even begun the process of thinking about what they need to do to apply the credit loss standard.”\n\nThe extra time should allow these companies the ability to digest and implement the credit loss overhaul using existing resources. During the meeting, FASB member R. Harold Schroeder said that bankers tell him they could quickly apply the CECL standard in a “compliance approach” as a “box-checking exercise” for their banks. But, they tell him, they need more time if they want to implement CECL in a way that allows them to use it to make business decisions.\n\n“The companies I talked to are taking these standards seriously as an opportunity to improve; ‘We want the data to flow through our systems, but it takes more time,’” he said.\n\nThe board also adopted an SEC filer category, called “small reporting companies” or SRCs. The SEC defines a small reporting company as a firm with a public float of less than $250 million, or has annual revenues of less than $100 million and no annual float or a public float of less than $700 million. For CECL, SRCs have the same implementation deadline as their private and not-for-profit peers. Companies with a 2023 effective date have the option of adopting the standard early.\n\nThe proposal to extend the CECL effective dates for small companies received unanimous support from the board. The proposal now goes out for public comment.\n\n“The process of gathering, cleaning and validating [loan loss] data has taken longer than we expected,” says Mike Lundberg, national director of financial institutions services at accounting firm RSM US. “Having a little more time[for banks] to run parallel paths or fine-tune their models is really, really helpful.”\n\nLundberg points out that small banks will now have nearly six years to implement the standard, which passed in 2016. He also warns against bankers’ complacency.\n\n“[The implementation] will take a long time and is a big project,” he says. “It’s definitely a ‘Don’t take the foot off the gas’ situation. This is the time to get it right.”\n\nFASB also offered additional assistance to financial institutions with a newly published Q&A document around the “reasonable and supportable” forecast, and announced a multi-city roadshow to meet with small practitioners and bankers. Cosper says the Q&A looks to narrow the work banks need to do in order to create a forecast and includes additional forward-looking metrics banks can consider.\n\n“I think that people really get nervous with the word ‘forecast,’” she says. “What we tried to clarify in the Q&A is that it’s really just an estimate, and it goes on to describe what that estimate should include.”\n\nWhy It’s Hard for Banks to Get Answers From Their Systems\n\ncore-7-17-19.pngIt starts with a simple question from a director or regulator about the bank’s loans, deposits or customers. It should be easy to answer but for some reason, it takes days or weeks to get the information.\n\nThe struggle of bank executives to pull answers from their core systems has been on my mind lately, so I asked a few how often they encounter this problem:\n\n“Just recently, our examiners asked for a detailed listing showing applicable data around brokered, listing service and money desk deposits. I needed a way to get the answers quickly.” – Chief operating officer at a Texas bank, $4 billion in assets\n\n“It’s definitely a pain point for us. We spend so much time assembling data to get basic intelligence about our business activities; those delays add up in terms of delayed decision making. We want to make faster, more informed decisions.” – CEO at a Missouri bank, $2 billion in assets\n\nIt has always been surprising to me that it is so difficult for executives to answer basic questions using their systems. The process to extract this information is often manual and painfully slow, involving subordinates who push down the request to their subordinates, and the manual aggregation of data from various systems and even paper files. The actual question can take days or weeks to get answered.\n\nIn our experience, bankers are hampered by three big problems. Here’s what they can do about them.\n\nSystems Designed for Processing Only\nBanks in the U.S. live and die with their core, but these systems were designed for processing, not reporting. While the core vendors often supply reporting and business intelligence tools, they may not include or store information from other systems or providers. Ease of use can also be a problem; many systems require someone with technical know-how to coax out the answers so they can be manually merged with results from other systems. To fix this, banks should consider implementing a simple enterprise reporting solution that consolidates information from multiple systems, including the core.\n\nDisparate Systems Can’t Communicate\nDuring a recent conversion, one of our clients discovered 72 different systems that were connected to their legacy core system. These systems were not well integrated or configured so executives could poll them for an answer. Banks often accumulate these systems as individual departments select solutions that fit their specific needs, such as loan review, credit administration or lending. But this creates massive information redundancy, which flourishes because no one is charged with addressing this holistically.\n\nTo help remedy this problem, banks should consider hiring a solution architect to analyze their existing systems for redundancies, and then craft a roadmap for eliminating and consolidating systems. A smart workaround at banks where a full-time systems architect may not be practical would be to select and implement a system that has built-in best practices. These systems can’t eliminate all the redundancies but can address them by integrating different systems and clearly identifying the systems of record for critical business information.\n\nFailed System Implementations\nVendors are good at selling software with slick demonstrations that seem easy to use. But many bankers have experienced failed implementations, which can happen when vendors are more focused on setup and configuration and less on the adoption process. Vendors need to serve as true partners for clients, guiding them through the mine fields and providing solutions when issues arise.\n\nThat puts the onus on bank executives when it comes to vendor selection. Bankers need to consider a vendor’s willingness and ability to be a true consulting partner, and how it will work to understand a bank’s business and incorporate its unique needs into their system.\n\nImplementing a solution that can seamlessly generate answers to bankers’ questions can be a sizable undertaking, but banks can make vast improvements by implementing a consolidated reporting solution, eliminating redundancies across systems and selecting vendors that are known for their ability to partner with clients.\n\nHow Innovative Banks Are Reimagining the Core\n\ncore-7-10-19.pngNew developments in technology have heightened bank customers’ expectations of speed, service and customization from their financial institutions—and cores are struggling to keep up.\n\nConsumer expectations for banks are so high that it’s difficult—if not impossible—to meet them using existing core banking systems. Luckily, the landscape of core providers is growing rapidly too, and some banks are already taking the plunge.\n\nThe “Big Three” core providers as they’re known in the industry—Fiserv, Jack Henry & Associates and Fidelity National Information Services—serve just over 71 percent of U.S. banks according to data company FedFis. They’re criticized for providing poor service and lagging significantly behind smaller, more nimble fintechs when it comes to innovation. And their recent acquisition streaks have bank clients worried that it could erode service levels, reduce choice and increase cost.\n\nJames “Chip” Mahan III, chairman and CEO of Live Oak Bancshares, described the situation aptly: “It just seemed like every time we wanted to do something, it’s impossible. It’s ‘stand in line and write a big check.’ And it’s really, fundamentally, putting lipstick on a pig.”\n\nThat’s why the bank, based in Wilmington, North Carolina, invested in an emerging competitor—Finxact—and courted creators and industry veterans Frank and Michael Sanchez out of semi-retirement to take on the challenge of reinventing the core.\n\nFinxact is an inventory management system that’s been architected from scratch on Amazon Web Services. Finxact and other alternative core providers offer three key features that banks should demand from a 21st century core processor.\n\nOpen Architecture\nNearly every core has some type of application programming interface (API) that allows its technology to connect to third-party applications, though the availability of those APIs is still tightly controlled in legacy systems.\n\nMost challenger cores embrace open architecture—a quality that stands in stark contrast to the situation with incumbent cores. Deland, Florida based Surety Bank wasn’t able to negotiate with its legacy provider to use a third-party remote deposit capture solution.\n\nCEO Ryan James says that was “a deal killer” because the bank does a large volume of deposits with that provider, had tailored it to their needs and had undergone examinations with it as well.\n\n“It just was absurd that [our legacy core] didn’t even want to take that file, because they were greedy. They wanted to charge the [remote deposit] rates on that even though they couldn’t do what we needed,” he says. “That was an eye opener.”\n\nSurety Bank eventually chose to undergo a full core conversion. It only took four months for the bank to launch on a cloud-based system from NYMBUS at the beginning of 2018.\n\nCloud Native\nIn addition to featuring open architecture, many challenger cores are cloud native. Although most legacy cores have some ability to run some of their system within a cloud environment, truly cloud-native companies offer banks greater advantages.\n\n“There are different services that the cloud provides that will enable you to scale without drastically increasing your costs,” says Eugene Danilkis, co-founder and CEO of Berlin-based core technology provider Mambu. “That allow [cores] to have the best practices in terms of security, in terms of disaster recovery and also the sort of operations you can support.”\n\nOne of the operational advantages a cloud-native system provides is the ability to deploy updates within a day or two, Danilkis says.\n\nBeing cloud native is synonymous with scalability; a system can handle one hundred accounts as easily as it can handle one hundred thousand. This significant benefit means core providers don’t need to charge banks for each new account or service they add, and often use software-as-a-service models or other simple, transparent pricing schemes.\n\nPerhaps the most important hallmark of a modern core system is configurability. Modern cores give banks the ability to create their own ecosystems, workflows and bespoke financial products that differentiate them from competitors.\n\nBanks on a core like Finxact could build a new type of savings account that automatically raises its interest rate when the balance reaches a certain level. In contrast, legacy cores only offer out-of-the-box products that can be tweaked to meet a bank’s risk appetite or other basic requirements, without changing the product.\n\nChanging the Game\nModern core processors approach banking technology in radically different ways from legacy core providers. They’ve built new systems from scratch, instead of bolting on acquired products. They run in realtime instead of overnight batches. They look and feel like websites instead of flat green screens. They’re open, cloud-native and highly configurable—and they’re finally coming into their own. Innovative banks should explore these options now so that they can leapfrog their peers in the near future.\n\nPotential Technology Partners\n\n\nCurrently in limited use at Live Oak Bancshares and engaged in discussions with several other U.S. banks.\n\n\nThe SmartCore platform is powering at least one community bank, and its SmartLaunch product uses SmartCore to support digital-only brands for additional institutions.\n\n\nThe Infosys Finacle core is used in over 100 countries and made waves in the U.S. when Discover Financial Services left Fiserv to use this core for its direct banking business in late 2014.\n\nSmiley Technologies\n\nThe SIBanking platform is currently in use in several U.S. banks with assets up to $1.3 billion.\n\nThought Machine\n\nThis London-based company wrote its cloud-native Vault core from scratch. The company states that it has clients in the U.S., but is unable to identify them publicly.\n\n\nMambu has bank clients in 15 countries. In the U.S., current clients include non-bank lenders, and the company is planning to use its latest funding round, in part, to grow its footprint in the U.S.\n\n\nThe founder of NYMBUS just joined this operation to help the company expand into the U.S. They currently serve 15 banks primarily in Europe and Asia.\n\n\nSink or Swim in the Data Deep End\n\ndata-7-1-19.pngCommunity banks risk allowing big banks an opportunity to widen the competitive gap by not investing in their own data management.\n\nIt’s now-or-never for community banks, and a competitive edge could be the key to their survival. A financial institution’s lifeblood is its data and banks can access a veritable treasure trove of information. But data analytics poses a significant challenge to the future success of community banks. Banks should focus on the value, not volume, of their information when adopting an actionable, data-driven approach to decision-making. While many community banks acknowledge how critical data analytics are to their future success, most remain uncommitted.\n\nThis comes as the multi-national institutions expand their data science teams exponentially, create chatbots for their websites, use artificial intelligence to customize user interactions and apply machine learning to complete back-office tasks more efficiently. The advantage that a regional bank manager has when working next door to a community bank is growing too large. And the argument that the human touch and customer experience of a community bank will make up for the technological gap has become less convincing as younger customers forgo the branch in favor of their phone.\n\nSmall and medium institutions are dealing with a number of obstacles, including compressed margins and a shortage of talent, in an attempt to move past basic data analytics and canned ad hoc reports. If an institution can find a qualified candidate to lead their data management project, the candidate usually lacks banking experience and tends to have a science and mathematics backgrounds. A real concern for bankers is the hiring managers’ ability to ask the right questions and fully discern candidates’ qualifications. And once hired, is there a qualified leader to drive projects and their results?\n\nDespite these obstacles, banks have only one option: Jump into the data deep end, head first. To compete in this data-driven world, community banks must deploy advanced data analytics capabilities to maximize the value of information. More insight can mean better decisions, better service to customers and a better bottom line for banks. The only question is how community banks can make up their lost ground.\n\nThe first step in building your organization’s data analytic proficiency is planning. It is crucial to understand your current processes and outputs, as well as your current staff’s capabilities, in order to improve your analysis. Once you know your bank’s capabilities, you can determine your goal posts.\n\nA decision you will need to make during this planning stage will be the efficacy of building out staff to meet the project goals, or outsourcing the efforts to a consultant group or third-party software. A community bank’s ability to attract, manage and retain data specialist could be an obstacle. Data specialists tasked with managing more-complex diagnostic and predictive analytics should be part of the executive team, to give them a complete understanding of the institution’s strategic position and the current operating environment.\n\nAnother option community banks have is to buy third-party software to supplement current resources and capabilities. Software can allow a bank to limit the staffing resources required to meet their data analytical goals. But bankers need to understand the challenges.\n\nA third-party provider needs to understand your organization and its strategic goals to tailor a solution that fits your circumstances and environment. Management should also weigh potential trade-offs between complexity and accessibility. More-complex software may require additional resources and staff to deploy and fully use it. And an institution shouldn’t solely rely on any third-party software in lieu of internal champions and subject-matter experts needed to fully use the solutions.\n\nWhatever the approach, community bank executives can no longer remain on the sidelines. As the volume, velocity and variety of data grows daily, the tools needed to manage and master the data require more time and investment. Proper planning can help executives move their organizations forward, so they can better utilize the vast amount of data available to them.\n\nFive Reasons Behind Mortgage Subservicing’s Continued Popularity\n\nmortgage-6-3-19.pngMortgage subservicing has made significant in-roads among banks, as more institutions decide to outsource the function to strategic partners.\n\nIn 1990, virtually no financial institution outsourced their residential mortgage servicing.\n\nBy the end of 2018, the Federal Reserve said that $2.47 trillion of the $10.337 trillion, or 24%, of mortgage loans and mortgage servicing rights were subserviced. Less than three decades have passed, but the work required to service a mortgage effectively has completely changed. Five trends have been at work pushing an increasing number of banks to shift to a strategic partner for mortgage subservicing.\n\n 1. Gain strategic flexibility. Servicing operations carry high fixed costs that are cannot adapt quickly when market conditions change. Partnering with a subservicer allows lenders to scale their mortgage portfolio, expand their geographies, add product types and sell to multiple investors as needed. A partnership gives bank management teams the ability to react faster to changing conditions and manage their operations more strategically.\n 2. Prioritizes strong compliance. The increasing complexity of the regulatory environment puts tremendous strain on management and servicing teams. This can mean that mortgage businesses are sometimes unable to make strategic adjustments because the bank lacks the regulatory expertise needed. But subservicers can leverage their scale to hire the necessary talent to ensure compliance with all federal, state, municipal and government sponsored entity and agency requirements.\n 3. Increased efficiency, yielding better results with better data. Mortgage servicing is a data-intensive endeavor, with information often residing in outdated and siloed systems. Mortgage subservicers can provide a bank management team with all the information they would need to operate their business as effectively and efficiently as possible.\n 4. Give borrowers the experience they want. Today’s borrowers expect their mortgage lender to offer comparable experiences across digital channels like mobile, web, virtual and video. But it often does not make sense for banks to build these mortgage-specific technologies themselves, given high costs, a lack of expertise and gaps in standard core banking platforms for specific mortgage functions. Partnering with a mortgage subservicer allows banks to offer modern and relevant digital servicing applications.\n 5. Reduced cost. Calculating the cost to service a loan can be a challenging undertaking for a bank due to multiple business units sharing services, misallocated overhead charges and hybrid roles in many servicing operations. These costs can be difficult to calculate, and the expense varies widely based on the type of loans, size of portfolio and the credit quality. A subservicer can help solidify a predictable expense for a bank that is generally more cost efficient compared to operating a full mortgage servicing unit.\n\nThe broader economic trends underpinning the growing popularity of mortgage subservicing look to be strengthening, which will only accelerate this trend. Once an operational cost save, mortgage subservicing has transformed into a strategic choice for many banks.", "pred_label": "__label__1", "pred_score_pos": 0.7899501323699951} {"content": "\nA day in the life Of...\nZahra Pabani\nZahra Pabani\nPartner - Family Law\nRead on\nCombating forced marriages: a comparative Franco-English perspective\nDate:5 JUN 2007\n\nBrigitte Clark and Claudina Richards, School of Law, University of East Anglia. Forced marriages are an extensive problem in Europe as well as in developing countries. It is estimated that some 70,000 adolescents are potentially affected by forced marriage in France, and around 1,000 British citizens are victims of forced marriage every year. The two jurisdictions have developed different legal methods of combating the issue and this article analyses the two approaches. The author considers why the criminalisation of forced marriage has been rejected by the legislature in both countries, with civil law being preferred as a more effective means of eradicating the practice, including, in England, the proposal of creating a civil offence with civil penalties. For the full article see June [2007] International Family Law.", "pred_label": "__label__1", "pred_score_pos": 0.9721161127090454} {"content": "Three Tips For Learning A New Programming Language Fast\n\nPost written by\n\nThomas Griffin\n\n\n\nLearning a new language is no easy task, and for programming languages, it’s no simpler.\n\nThere are many reasons people want to learn to code, with some doing it ultimately to start a new career and others because they enjoy it.\n\nThe U.S. Bureau of Labor Statistics estimates that the demand for software developers will increase by 24% from 2016 to 2026. With the rise of technology year after year, the demand for coding isn’t going anywhere. Ultimately, your coding knowledge could land you a job as a developer if that’s the route you’re interested in.\n\nWith thousands of resources, boot camps, courses and online tutorials, people can now learn to code on their own and at a comfortable pace. Whether you're new to coding or an experienced programmer wanting to learn a new language, here are three tips to help you get started.\n\n1. Take Advantage Of Online Resources\n\nThe internet gives you an endless wealth of information at your fingertips, and you should take full advantage of it. Learning a new program won’t happen overnight, but you can speed along the process with the right tools.\n\nBased on a study conducted by Stanford University, experienced programmers rely primarily on four things when searching for information to learn a new coding language:\n\n • Google searches\n • Documentation\n • Example code\n • Q&A sites\n\nWhat you need to do is find the right resources and tools to start.\n\n\n • Codecademy is an entirely free, interactive online software that teaches you coding in up to 12 programming languages.\n • Coursera provides online courses on programming languages taught by real professors.\n • freeCodeCamp is a coding class that lets you work at your own pace and with a real team of developers to build solutions.\n\n\nThe more you practice writing code, the quicker you’ll succeed at learning it fluently.\n\n • Git lets you take snapshots of your code as you practice creating it so that you can see the process in front of you. If you want to revert back to earlier code, you have the option to do so. It works well with both large and small projects.\n\n\n • Stack Overflow is the largest online community of developers and programmers on the web. It partners with businesses to answer developers’ questions and help them with any errors.\n\n2. Use Second-Language Acquisition\n\nLearning any new program is no easy task. If you want to learn a programming language faster, you have to treat it the same way you’d treat learning a spoken language. Start by using second-language acquisition (SLA).\n\nSLA is the process and method of learning a second language as well as the scientific disciplines that come with it.\n\nEmbry-Riddle Aeronautical University conducted a study about the effect of integrating SLA theories into learning a new programming language. The results showed that when students learned a new program with a cognitive framework, they were able to learn quicker and more effectively. In a cognitive framework, cognitions come before behavior and enhance a person’s perception, ability to process information, thinking patterns, problem-solving skills and more.\n\nTo succeed in learning a new program, you need to have a clear mental model. The study describes this as “how someone explains their thought process and how it operates in the real world through our experiences in life.” If you don’t possess a clear mental model of your programs and how they operate as systems, you may still be able to understand certain elements, but it’ll be difficult for you to grasp them in their entirety.\n\n3. Don’t Cram Information\n\nAccording to a research study performed by UCLA, cramming information is associated with more learning problems and less sleep. Your ability to retain information while cramming decreases, and your brain only remembers the beginning and end of your study sessions.\n\nTo overcome the urge to cram while learning a new programming language, set up a study schedule, and stick to it. It’s more beneficial to study in 20- or 30-minute blocks rather than hours at a time so you don’t experience fatigue, lethargy and boredom. It’s easier to stay motivated when you grant yourself breaks in between study periods for better focus and frame of mind.\n\nIf you’re trying to eventually learn several coding languages, which is very possible with enough time and effort, take one language at a time.\n\nOver To You\n\nIf you’re thinking about learning a new programming language, these tips will help you do it faster. There’s no magic solution to suddenly understanding a new program, but patience and persistence will help you get there sooner. By applying methods of learning a second spoken language to learning a programming language, you’ll be able to grasp the material faster.\n\nThere’s also no better way to learn than to practice in real time. Take time every day to develop your own code, and test it for errors so you grasp the material quicker. Soon enough, you’ll be able to say you understand a new programming language.\n\n", "pred_label": "__label__1", "pred_score_pos": 0.9787342548370361} {"content": "Changing Fortunes of the Great Egret\nProject info\n\nThe changing fortunes of the Great Egret (Egretta alba egretta), the signature bird of the Hungarian nature conservationism, is the environmental protection’s success story.\nAggressive poaching for their fashionable plume left their colonies counting only 31 mating pairs in 1921. The result of international collaboration to preserve and protect their natural habitat are colonies counting over 3000 pairs today in Hungary.", "pred_label": "__label__1", "pred_score_pos": 0.9999681115150452} {"content": "In some cases, it took weeks before supplies reached the hardest hit areas of the Bahamas after Hurricane Dorian spent more than a day spinning over islands, ripping away roofs, inundating ground floors and taking lives.\n\nLydia Ruth Hill, who is the ninth generation of her family to live on Abaco, evacuated her parent's coastal home but watched it disintegrate over the next day. \n\nShe spoke to the Sun by cellphone. \n\n\"From my brother's apartment, we can see my parent's house,\" she said. \"From the window, we watched the roof come off. My dad has a 42-foot boat and we saw (the storm) overturn it — it's now 250 feet away from the water.\"\n\nTwo of her relatives are missing, cousins of her father. \n\nThe relatives, an elderly brother and sister, \"were living on Front Street of Abaco that doesn't even exist anymore,\" Hill said. \"Anyone who has been found has just been bodies. That area is about a mile from The Mudd and Peas.\"\n\nNot that any area was spared, but The Mudd was virtually obliterated. Hundreds of homes were swept away or crushed by shipping cargo containers pushed by storm surge into the community.\n\nNobody has any idea what the death toll is for The Mudd. \n\nOfficially, the Bahamian death toll is 61 with about 800 missing — but locals suggest the actual death toll is more than 1,000, perhaps 1,500. \n\nUp from The Mudd and Peas is where Hill and others opened an emergency supply center in a church. The church, New Vision International, is heavily damaged but usable — with donations set up in the sanctuary.\n\nHill's group has named itself Abaco Hands and Feet, based on the fact they are helping each other in some very basic ways. \n\nIt is one place where donations from Agape Flights, based in Venice, is going. Coming in through its planes, Agape has teamed up with Mission of Hope, which has its ship, True North, docked in Abaco. \n\nTogether, they are moving needed donations in and around the island. \n\nMission of Hope has taken more than 16,500 pounds of Agape donations by sea; Convoy of Hope has transported 12,000 pounds of Agape donations by sea to the Bahamas. \n\nBetween the ships and its own aircraft, Agape has delivered more than 48,500 pounds of donated relief supplies.\n\n\"People need to stay involved or get involved,\" said TJ Heitz, of Mission of Hope.\n\nHeitz and his group were among the first disaster relief personnel to arrive after Hurricane Dorian. \n\n\"Prayer is a big thing. Continue to send water, food. That's going to become an issue as some of these organizations start to pull out.\"  \n\nThe time before they were able to show up was critical — and deadly — for people in Marsh Harbour and other areas on Abaco. \n\n\"Our first 48 hours was about survival,\" Hill said.  \n\nBut she has appreciated the aid that has arrived.\n\nFirst, it came from other Bahama islands that weren't as affected. \n\nShe said the people of Abaco had helped other islands following vicious storms in the past. This time, those islanders reciprocated.\n\nThen it came from Agape, Mission of Hope and other groups. But it has yet to come from the government, she said. \n\nLargely, Abaco residents remain on their own. One store opened with few supplies and high prices, but she doesn't mind.\n\nPower barely is available. People can spend $200 for generator fuel that runs a few hours in the morning and evening but most people are simply going without. \n\nSo she has the work of Abaco Hands and Feet. \n\n\"Miss Lydia has been wonderful. I've never met anyone like her. I've never met no one with her spirit,\" volunteer Mark Pierre said.\n\nPierre has been left homeless and emotionally wrecked by the storm. He appreciates feeling like he has a purpose, working \"with a good heart\" for the Lord, he said. \n\nHe has only praise for Hill.\n\n\"I've never seen anyone like her.\" \n\n\"We're all kind of like family now. Close to 40 of us,\" Hill  said. \"We realized the need for a shelter, so we opened a shelter.\"  \n\nAgape Flights put out a new list for supplies on Friday, seeking \"immediate needs\" that must be collected by 4 p.m. Thursday, Oct. 17. It includes macaroni and cheese dry mix in a box; canned soups; canned beef; Spam; tuna in water; canned sardines in tomato juice or oil; Vienna sausages; ramen noodles in cups; and Carnation evaporated milk. \n\nCollection hours are from 8 a.m.-4 p.m. Monday-Thursday. \n\nThe group asks people donating to sort and box similar items together.  \n\nThe items will be going to another hard hit area: Freeport. \n\n\"Because of (the Agape) ministry, because of their work, we were able to get some things to some people to make their lives a little bit better,\" said Ken Lane, a minister with Luceyan Presbyterian Church in Freeport.  \n\nPeople appreciate the Venice organization. \n\n\"I've been so thankful for how Agape has answered our needs when we reached out to them. How they've responded faithfully, bringing supplies — everything we've needed,\" said Natalie Pierson, praise and worship team member of Luceyan Presbyterian Church.", "pred_label": "__label__1", "pred_score_pos": 0.5148897767066956} {"content": "Time: Why We Can't Stop Texting and Driving\n\nOnce smartphones arrived in the hands of the masses, it didn’t take long for drivers to start using them behind the wheel — not only to make calls, but also to send text messages.\n\nEven more alarming: studies showed that the presence of passengers, even child passengers, didn’t seem to deter drivers from using their shiny new toys.\n\nDistracted driving crashes began to spike, safety campaigns were launched, and now the warnings are everywhere. Signs, billboards, stickers, television and radio ads, even paid search results. The messages use every imaginable hook: statistics, tragic stories, disturbing crash pictures, even analogies between smartphones, booze and guns.\n\nBut 10 years later, as the crash numbers continue to rise, we’re realizing that the safety campaigns have produced humble results. Recent follow-up studies show that, despite our efforts to curb the practice, drivers in the U.S. use their phones on roughly 88% of all trips and more than half of all young drivers reported engaging in hands-on, head-down reading or typing during the past 30 days. As one journalist summarized these findings about who’s still using their phone in the car: “Damn near everybody … damn near all the time.”\n\nDrivers ignore the warnings and continue to use their phones for a simple reason: they’re just not convinced that it’s all that dangerous. To understand why, we need to reflect on how humans evaluate risk. When going about our everyday affairs, we use our common sense and our experience to guide us. The first time we have what feels like an urgent text or email to answer while driving, we give it a shot and see how it goes. After a few tries, it seems to work out just fine. After all, when we’re using our phone, we think that if something unusual happens right before our very eyes, we’re going to notice it. Even when we go head-down to text or use an app, we know that we can switch our attention between road and phone, and that we can look up more frequently when we notice that traffic is getting worse. When we’re stopped at a red light, we can pick up our phone and then put it back down again when the light turns green. These are the powerful common sense notions that guide us through everyday life on the road.\n\nThe problem with these common sense notions is that for the most part they’re wrong. Despite our intuitions to the contrary, our attention will not be instantly grabbed by that disaster unfolding in front of us even when we’re looking in that direction. A famous experiment involving a gorilla illustrated how we’re really not good at noticing things that we’re not specifically looking for, and that having our eyes pointed at something is only the first step toward “seeing” it. But what about looking up from our phone more frequently when traffic gets thick? Unfortunately, our common sense notions don’t reflect how deeply entrenched we get when we’re engaged in something interesting. When the latest news pops up on our phone, sometimes we’re a little distracted and sometimes we’re gone. Driving studies demonstrate that us noticing when traffic gets worse is far from a guarantee and that sometimes when we pick up our phones we’re not even consciously aware that we’re doing it. But how about texting at the light? What could possibly be wrong with that? Well, when we put down our phones and return our attention to the driving task, it can actually take almost a half a minute for our brains to reorient and resume processing what our eyes are looking at once again.\n\nThe time has come to address this problem at its source. We need to realign our common sense notions with the truth about our powerful, creative but sometimes fallible minds. We need to understand that our attention-paying abilities amount to something less than a swivel-mounted, multidirectional surveillance apparatus. That we err and miss things a bit more often than we care to admit. And that the hazards presented by our newest of innovations can be subtle, hidden, or even invisible — far outstripping our abilities to reason about them in simple ways.\n\nBut how do we get millions of people to study the user’s guide to their own injury-prone minds? We’ll have to launch safety campaigns to orient us to the very idea that our minds simply don’t work the way we think they do. We’ll have to train parents to provide the psychological rationale behind their advice and admonitions to children. We’ll have to convince schools to teach our kids the basics of how our fallible minds work. Manufacturers of cars and phones alike will need to better foresee misuses that spring from our erroneous beliefs, and provide more detailed warnings about how things might go wrong when lockout safety features aren’t possible.\n\nWe have reached a technological tipping point. These are not problems we will be able to ignore for much longer. Aside from the rising distracted driving statistics, we will continue to invent new technologies that will stretch our common sense notions to their limits and beyond. Soon we will have wearable devices that allow us to look out at the “real world” through layers of augmented reality. Autonomous cars won’t save us. Some experts say that it might be another 75 years before we have the robot car that we’re all dreaming about today. And when we finally do, what will prevent a distracted pedestrian from stepping out in front of one? We will have to make our move soon — a move beyond hanging a sign on the wall or a billboard by the side of the road. Our more sophisticated world will demand a more sophisticated understanding of ourselves.\n\nSource: Time\n\nRead full article:", "pred_label": "__label__1", "pred_score_pos": 0.6443667411804199} {"content": "Athletics vs Track Cycling - Can They Switch Sports? | Sports Swap Challenge\n\nBy : Olympic\n\nHide Description\nHow fast can an Olympic sprinter cycle? How fast can an Olympic champion track cyclist run? Watch the duel between Elis Ligtlee and Naomi Sedney from the Netherlands.\n\nCheck out the Sports Swap series where Olympians try each others sport:\n\nSubscribe to the Olympic Channel here:\n\nShow Description", "pred_label": "__label__1", "pred_score_pos": 0.8185410499572754} {"content": "How accurate is the Bumble GPS location for a match? - GirlsAskGuys-Top Ten Reviews\n\nThe app can't find my position on the map\n\nBuzz Humble is not a dating site and is neither endorsed, nor sponsored by, nor affiliated with the dating app Bumble. Legitimate interests — it is in our legitimate interests to prevent unauthorised behaviour and to maintain the safety and security of our services. I am not saying it will get better! One of the cool things about Bumble that you don't actually have to pay extra for is the ability to backtrack by shaking your phone, and get back the last match you accidentally swiped left to. So you shouldn't be using it just like you use Tinder, even if all the swiping makes you feel as though the two are similar.\n\nHow To Change Your Location in Bumble. About.\n\nYou may also send in paper copies of your data sheets. If you wish to find out about any rights you may have under California Civil Code section Bumble has implemented appropriate security measures to protect and prevent the loss, misuse, bumble app location accuracy, and alteration of the information under our control, including your personal data. If a person fails their theory test ten? We keep your personal information only as long as we need it for legitimate bumble app location accuracy purposes as set out in Section 11 below and as permitted by applicable law. Next...\n\nBumble, which by many has been labeled “The Feminist Tinder,” is not only one of my personal favorite dating apps, but it's also one of the best. You can either submit data using our Android or Apple apps, or online using the web Enter the location accuracy by estimating how far you traveled from the. Bumble is different from other apps because it doesn't run in the for a few years now and its location tracking seems to be fairly accurate.:\n\n21.10.2019 : 08:15 -:\nСообщения: 10154 Зарегистрирован: 01 июл 2011, 12:37 Благодарил (а):, если доступ закрыт Мы уже разобрались, зеркало bumble app location accuracy букмекерская о ситуации, хотят ли меня поиметь и записать на советуем, и снимаем с себя любую ответственность по поводу. 2 (Песня из фильма quot;Перси Джексон и похититель молний определенной суммой денег играя в казино.\n\n15.10.2019 : 16:15 -:\nНикаких 15000 рублей мне никто не прислал, да и Percy Jackson amp; the Olympians: The Lightning Thiefquot;) Christophe.\n\n16.10.2019 : 04:14 -:\nИзучив отзывы игроков, можно сделать вывод, что отдача, как правило, происходит уже на 2-3 круге игры.", "pred_label": "__label__1", "pred_score_pos": 0.9688724875450134} {"content": "Personal Growth Exponential Organizations Salim Ismail Pdf\n\n\nFriday, October 18, 2019\n\nEXPONENTIAL. ORGANIZATIONS. Why new organizations are ten times better, faster, and cheaper than yours. (and what to do about it). SALIM ISMAIL. Exponential Organizations. Why new organizations are ten times better, faster, and cheaper than yours (and what to do about it). Author: Salim Ismail w/ Michael . by Salim Ismail, Michael S Malone, Yuri van Geest. In the past five years, the business world has seen the birth of a new breed of company—the Exponential Organization—that has revolutionized how a company can accelerate its growth by using technology. An ExO can eliminate the.\n\nExponential Organizations Salim Ismail Pdf\n\nLanguage:English, Spanish, Japanese\nGenre:Health & Fitness\nPublished (Last):22.10.2015\nePub File Size:26.70 MB\nPDF File Size:18.41 MB\nDistribution:Free* [*Regsitration Required]\nUploaded by: EZEKIEL\n\nEditorial Reviews. Review. \"EXPONENTIAL ORGANIZATIONS should be required reading for faster, and cheaper than yours (and what to do about it) - Kindle edition by Salim Ismail, Michael S. Malone, Yuri van Geest, Peter H. Diamandis. by [ Salim Ismail ] PDF online Exponential Organizations: Why new organizations are ten times better, faster, and cheaper than yours (and what. Mar 25, Download [PDF] Books Exponential Organizations (PDF, ePub, Mobi) by Salim Ismail Read Full Online.\n\nThey evolved one hundred years ago for an era of economies of scale and relative stability and predictability. Our environment is changing exponentially, mainly driven by exponential technologies and globalization. As a result, the world is becoming increasingly open and transparent and we are slowly moving from a world of scarcity to a world of abundance. Exponential Organizations lays the framework for organizations to adapt and thrive in a world of abundance by diving into new organizational structures that leverage exponential technologies and a shifting global business mindset.\n\nSalim Ismail is the lead author of Exponential Organizations.\n\nHe has spent many years researching and developing insights about this new paradigm in organizational design. Since writing Exponential Organizations he founded ExO Works — a leading-edge consulting company that supports organizations in their transformation journey.\n\nHe has since founded Singularity University Netherlands. He contributed to many of the ideas and his team extensively researched, validated and ratified all concepts in the book. Which is why, over the last few years, a new organizational scheme congruent with these changes has begun to emerge.\n\nThe authors call it the Exponential Organization precisely because it represents the structure best suited to address the accelerated, non-linear, web-driven pace of modern life. And while even cutting- edge traditional companies can only achieve arithmetic outputs per input, an ExO achieves geometric outputs per input by riding the doubling-exponential pattern of information-based technologies. Rather than owning assets or workforces and incrementally seeing a return on those assets, ExOs leverage external resources to achieve their objectives.\n\nFor example, they maintain a very small core of employees and facilities, allowing enormous flexibility as margins soar. They enlist their customers and leverage offline and online communities in everything from product design to application development.\n\nInformation is your greatest asset. More reliably than any other asset, information has the potential to double regularly. Rather than simply assembling assets, the key to success is accessing valuable caches of existing information. Founded in , Airbnb currently has 1, employees and operates , listings in 33, cities. At its current pace, Airbnb will be the biggest hotelier in the world by late The second is that, thanks to the fact that information is essentially liquid, major business functions can be transferred outside of the organization— to users, fans, partners or the general public.\n\nNot every ExO has all ten attributes but the more it has, the more scalable it tends to be. Even if the company somehow manages to achieve an impressive level of growth, the scale of its business will quickly outpace its business model and leave the company lost and directionless.\n\nThus, ExOs must aim high. Every ExO has one. Some aim to transform the planet, others just an industry. But radical transformation is the name of the game. For one thing, it moves the focal point of a team from internal politics to external impact.\n\nWhy does the organization exist? The MTP is not only an effective attractor and retainer for customers and employees but also for the company ecosystem at large DrFrumi Scaling4Growth.\n\nAs a result, it lowers the acquisition, transaction and retention costs of these stakeholders. It is important to note that an Exponential Organization interacting with its community is not simply a transaction.\n\nTrue community occurs when peer-to-peer engagement occurs. The more open the community, though, the more traditional and best-practice-oriented the leadership model has to be. Use the MTP to attract and engage early members. The MTP serves as a gravitational force that attracts constituents into its orbit.\n\nNurture the community. Elements of nurturing include listening and giving back. Create a platform to automate peer-to-peer engagement. You open up an idea, funding opportunity or incentive prize… and let people find you. Machine Learning is the ability to accurately perform new, unseen tasks, built on known properties learned from training or historic data, and based on prediction.\n\nIt allows a machine to discover new patterns without being exposed to any historical or training data. Gather: The algorithmic process starts with harnessing data, which is gathered via sensors or humans, or imported from public datasets.\n\n“Exponential Organizations Quotes”\n\nOrganize: The next step is to organize the data, a process known as ETL extract, transform and load. Apply: Once the data is accessible, machine learning tools such as Hadoop and Pivotal, or even open source deep learning algorithms like DeepMind, Vicarious and SkyMind, extract insights, identify trends and tune new algorithms.\n\nExpose: The final step is exposing the data, as if it were an open platform. This practice optimizes flexibility and allows the enterprise to scale incredibly quickly as it obviates the need for staff to manage those assets.\n\nFor example, Tesla owns its own factories and Amazon its own warehouses. When the asset in question is rare or extremely scarce, then ownership is a better option. But if your asset is information-based or commoditized at all, then accessing is better than possessing.\n\nThe biggest impact of engagement techniques is on customers and the entire external ecosystem. However, these techniques can also be used internally with employees to boost collaboration, innovation and loyalty. They are algorithms and automated workflows that route the output of SCALE externalities to the right people at the right time internally.\n\nIn many cases, these processes start out manual and gradually become automated around the edges. Eventually, however, they became self-provisioning platforms that enable the ExO to scale. While most processes are optimized around scarcity and efficiency, SCALE elements generate large result sets, meaning Interfaces are geared towards filtering and matching.\n\nPerformance evaluations— which are entirely about evaluating how an employee performed in a given period— are independent of OKRs. Objectives are ambitious and should feel uncomfortable.\n\nMany are now implementing high- frequency OKRs— that is, a target per week, month or quarter for each individual or team within a company. By integrating experimentation as a core value and adopting approaches like Lean Startup, enterprise failures— while still accepted as an inevitable part of risk— can be quick, relatively painless and insightful.\n\nLarge organizations, such as Zappos, have also adopted this structure across much bigger operations.\n\nJoin Kobo & start eReading today\n\nAlso in the mix are location, physical objects, ideas and knowledge— including updates to pricing data, inventory levels, meeting room occupancy and even DrFrumi Scaling4Growth. All are now being broadcast company-wide and are the basis of activity streams to which anyone in the organization can subscribe.\n\nIn the past, it was mostly used as a to-do list, but it is now shifting towards a more Agile approach. Teams are continuously measuring themselves by pushing codes and closing tickets, living by the metrics that task management software provides.\n\nWhile Telepresence lets people interact in a real environment, virtual reality allows interaction, collaboration, coordination and even prototyping in a virtual world. Employees will be able to measure everything about themselves and their work, preventing illness, burnout and irritation, and also improving team flow, collaboration and performance. Organizational intimacy is increased, decision latency is reduced, knowledge improves and is more widely spread, and serendipity increases.\n\nIn short, social technologies enable the real-time enterprise. In industry after industry, the development cycle for products and services grows ever shorter. As we add trillions of sensors on every device, process and person, the process will accelerate even faster to an almost unimaginable pace Big Data.\n\nDrive To Demonetization o One of the most important— and least celebrated— achievements of the Internet during the last decade was that it cut the marginal cost of marketing and sales to nearly zero. And, in concert with a viral referral loop, customer acquisition costs can also be cut to what was once deemed impossible: zero.\n\nDisruption is the New Norm o Today, the outsider has all the advantages. With no legacy systems to worry about, as well as the ability to enjoy low overhead and take advantage of the democratization of information and— more important— technology, the newcomer can move quickly and with a minimum of expense.\n\nWhat is Kobo Super Points?\n\nThus, new actors and entrants are well equipped to attack almost any market, o The rate of change is so high everywhere these days that you now must assume that someone will disrupt you, and often from a direction you least expect. Death to the Five-Year Plan o In an exponential world, the five-year plan is not only unworkable, it is seriously counterproductive— and the advent of ExOs signals its death.\n\nThis may seem counterintuitive. The only solution is to establish a big vision i. Smaller Beats Bigger o For decades, scale and size have been desirable traits in an enterprise.\n\nBuy for others\n\nA bigger company could do more, the argument went, because it could leverage economies of scale and negotiate from strength. The unparalleled and unprecedented ability of a small team today to do big things— an ability that grows ever greater if the exponential technologies described previously are put to use.\n\nAsset Leverage: Engagement creates network ripples and feedback cycles that are far-reaching. Tools like game logic empower people so they can make progress on the scale. Information Accelerates Everything: In , million films were produced for analog photo cameras. Already in , just 10 years later, more than billion digital photographs were captured, equivalent to 8 billion analog film rolls. Today, internet users upload an average of 1 billion photos a day.\n\nThe more sensors available, the more information is created at ever-increasing speeds. Analyzing these data is a new need called Big Data, which, when used by companies, leads to exponential growth.\n\nThat also creates network effects, in which companies capture an unbelievable amount of data that leads to monopolies like Google and Amazon. Focus on Demonetization: One of the most important and celebrated effects of the internet is that it took the marginal costs of marketing and sales to almost zero. On the internet, you can promote a product worldwide for a fraction of the cost that existed 25 years ago. In companies like Uber, for example, it costs almost zero to add a new driver to your platform.\n\nDisruption becomes the pattern: Beware of Experts: History shows us that seldom disruptive innovations come from experts. Usually, they come from people who have new perspectives on an established field;. The Death of 5-Year Planning: In the exponential world, long-term plans become counterproductive and ineffective. The small one surpasses the big one: The important thing is to get to exponential growth as quickly as possible to become a platform because once this occurs, growth limits disappear;.\n\nRenting instead of buying: Everything exists on demand, and the initial costs tend to be smaller, which makes access to capital less important;. Openness becomes an essential component: Open platforms inspire more confidence than closed platforms. What is predictable will become automated, and the human will play an increasingly important role in what is not predictable;. Everything becomes measurable: Step 1: Get started with the question: What big problem is my company looking to solve?\n\nUnderstand space and create purpose aligned with it. Elon Musk chose to revolutionize the automotive industry through electric cars and solar energy company Solar City.\n\nRecently, Elon revisited his purpose and realigned his MTP to focus on revolutionizing the entire energy industry, not just the automotive industry.\n\nStep 2: Create communities or join your MTP. Connect with people aligned with a vision similar to yours. Make the decisions of your company based on the interests of this community;.Malone is the author or co-author of nearly twenty award-winning books, including Exponential Organizations. For example, they maintain a very small core of employees and facilities, allowing enormous flexibility as margins soar.\n\nTransform leadership. Elon Musk chose to revolutionize the automotive industry through electric cars and solar energy company Solar City. At the same time, established companies must transform themselves or they will quickly become obsolete. And all with a minimum of resources and time. It closes the gap between the linear organization and its exponential environment. As knowledge about the most diverse disciplines spreads, the volume of information in the world begins to double almost annually;.\n\nRatings and Book Reviews 0 7 star ratings 0 reviews.\n\nELLAMAE from Hawaii\nSee my other posts. One of my extra-curricular activities is fujian white crane. I love sharing PDF docs sweetly .", "pred_label": "__label__1", "pred_score_pos": 0.6735637187957764} {"content": "News ID: 262378\nPublished: 1208 GMT December 02, 2019\n\nScientists left baffled over lost ancient city Mohenjo Daro in Pakistan\n\nScientists left baffled over lost ancient city Mohenjo Daro in Pakistan\n\nArcheologists are still no closer to understanding who occupied the ancient city of Mohenjo Daro in modern-day Pakistan during the third millennium BCE.\n\nResearchers first visited the site in 1911 and various excavations were carried out in the 1920s through to 1931. Subsequent digs took place in 1950 and 1964, which provided fascinating glimpses into the ideology and beliefs of the city’s inhabitants. The well-planned street grid and an elaborate drainage system suggest that the occupants were skilled urban planners, for whom the control of water was of utmost importance, wrote.\n\nThe city has no grandiose monuments such as palaces, temples or monuments.\n\nIt lacks an obvious central seat of government and there are no indications that the city was ruled over by an established monarchy.\n\nModesty, order and in particular cleanliness appeared to be qualities that were highly prized by the city’s inhabitants.\n\nA watertight pool called the Great Bath is the closest structure Mohenjo Daro has to a temple.\n\nAccording to Indus expert Gregory Possehl of the University of Pennsylvania in Philadelphia, this suggests an ideology based on cleanliness.\n\nWells were found throughout the city, and nearly every house contained a bathing area and drainage system, which would appear to back up Possehl’s theory.\n\nDuring its heyday from about 2500 to 1900 BCE, the city was among the most important to the Indus Civilization.\n\n\nAccording to University of Wisconsin, Madison, archeologist Jonathan Mark Kenoyer, the mounds grew organically over the centuries as people kept building platforms and walls for their houses.\n\n\"You have a high promontory on which people are living,\" he said.\n\n\nIts wealth and stature is evident in artefacts such as ivory, lapis, carnelian, and gold beads, as well as the baked-brick city structures themselves.\n\nThe demise of the Indus Civilization and Mohenjo Daro is also a mystery.\n\nBy 1900 BCE many Indus cities had been abandoned, but historians believe things started to fall apart around 1700 BCE.\n\nSome historians think that a collapse of trade with the Indus’ major trading partner, Mesopotamia, was to blame.\n\nAround the time the Indus cities started to fail, Mesopotamia, an advanced civilization in the Middle East, was going through huge political problems.\n\nThis led to the unravelling of its trade networks which would have had a huge impact on the Indus cities.\n\nOthers surmise that war was the likeliest cause behind the demise of the Indus.\n\n\nSecurity Key:\nCaptcha refresh\nPage Generated in 1/0173 sec", "pred_label": "__label__1", "pred_score_pos": 0.99396812915802} {"content": "2 The Party Giveth, and the Party Taketh Away: Chinese Enigmatic Attitudes Towards Religion\n\nIn: Religious Transformation in Modern Asia\n\n\nDuring the first three decades of the People’s Republic, Communist Party elites pursued a revolutionary political, economic, and social paradigm, whose long-term goal was to develop a strong national security, ensure prosperity, and strengthen the Party’s comprehensive control of the state. Elites eliminated all foreign religious connections, which were replaced with Party-approved religious organizations. The adoption of the techno-economic paradigm in the 1980s created high economic growth rates as well as widespread corruption that threatened Party’s legitimacy. In response, the Communist Party adapted the revolutionary social paradigm and initiated a moral re-armament campaign. Elites used traditional religions and beliefs to strengthen moral standards and to supplement the state’s social welfare role. Elites however were less trusting of foreign religions, because of their complicated history, their continued foreign connections, and their non-sanctioned religious practices. As long as elites retain the revolutionary social paradigm and its emphasis on Party primacy, elites will continue to favour traditional religions and beliefs while discriminating against foreign religions and heterodox religious movements.\n\nReligious Transformation in Modern Asia\n\nA Transnational Movement\n\n\n\nAll Time Past Year Past 30 Days\nAbstract Views 81 37 7\nFull Text Views 78 69 0\nPDF Downloads 7 1 0", "pred_label": "__label__1", "pred_score_pos": 0.5326244831085205} {"content": "A little background for myself. I am relatively experienced with 3rd part physics engines such as Havok, Box2D, Bullet and have successfully integrated them in custom engine(s). I have also made a simple physics engine by following a few known books.\n\nNow I am interested in diving into vehicle physics. There are a couple of books that skim over the topic but do not go over in enough detail for me to grasp anything useful. So I would like to know of good books/resources that are not too heavy (by that I mean a book that is pure vehicles and made for engineers rather than game developers) that help me get started on vehicle physics. Here get started = at least guide me through creating a simple vehicle in 3D with modern features found in most games (suspension/transmission etc.)\n\nNote: I searched for a similar question but did not find one, but if one exists, please post the link and feel free to close the question.\n\n\nThis blog has four links (the third is broken), the first of which seems like an amazing resource, the others seem pretty great too. I'm probably going to read over this just for funsies, should be a good read.\n\nYou could take a look at the Rigs of Rods engine, it's an open source soft-body vehicule simulator, it may give you some insight into how it's done, but could be too complex for what you want to do. Also, reading though other people's code may not be what you want to do; nevertheless it could be inspiring.\n\nDigital Rune gives some simple info on their implementation of car physics.\n\n • \\$\\begingroup\\$ This site is no longer available :( \\$\\endgroup\\$ – JamesAMD Aug 7 '15 at 0:52\n • \\$\\begingroup\\$ Please summarize links as they pertain to the question and answer. Links die. \\$\\endgroup\\$ – kdbanman Sep 24 '15 at 3:21\n\nIf you want to just get something reasonable going, I can't more heartily recommend the talk http://video.google.com/videoplay?docid=4776766805683353325 by the physics programmer on rallycross. (a shipped game on the PS1 back in 1997, so it's very quick on modern hardware and arguably implementable in higher level languages that aren't as efficient at math as they could be)\n\n • \\$\\begingroup\\$ I believe this link may be the same thing, and it actually works! \\$\\endgroup\\$ – aardvarkk Jun 5 '14 at 21:22\n\nI know this is an old question, but if I stumbled upon it so might others.\n\nWhile it is a walkthrough for getting a car setup in the Unity3D engine, this tutorial goes through a lot of what is necessary and the concepts should be transferable enough.\n\n\n • \\$\\begingroup\\$ Unfortunately link does no longer point to the car tutorial. \\$\\endgroup\\$ – D. Visser Jun 26 '18 at 14:07\n", "pred_label": "__label__1", "pred_score_pos": 0.8727651834487915} {"content": "\n\n\nProblem: There are three fixed positive charges $latex +q$ equally spaced on a circle (see the picture). At the center of the circle is a negative charge $latex -q$. Prove that the negative charge at the center of the circle does not move.\n\nMy first instinct was to introduce a coordinate system, calculate all the Coulomb forces on the negative charge, and show that these forces all summed to 0. But there is a much more beautiful and powerful way to solve the problem! All you need to know is that the force one charge exerts on another is directly proportional to the product of their charges, and inversely proportional to the square of the distance between them – and you don’t need to do any calculations.\n\nLet’s suppose the negative charge does move. Then, it has to choose a certain direction in which to start moving (see picture below). So far, so good. Now, move the central charge back to the center and rotate the entire system 120 degrees clockwise about the center. The initial direction the negative charge will move towards is now rotated 120 degrees. But wait – the entire system is exactly the same as before – all the charges are in the same place (imagine someone called your name and you looked away while your sneaky friend rotated the whole system 120 degrees – when you looked back, you would think that nothing happened)! This means, in fact, that the negative charge should move in the direction it started moving before we rotated the system! This is a contradiction, since the negative charge cannot move in two different directions at the same time. If you rotate the system by 120 degrees again, you can see that the negative charge actually has to move in three different directions all at once! You can see why this is a problem. The negative charge gets confused and cannot move.\n\nNotice how much simpler the above analysis, a symmetry argument, was compared to calculating three Coulomb forces individually and using trigonometry to show the forces cancelled (assuming you even know how to compute Coulomb forces)! The symmetry argument also works with any number of equally-spaced positive charges on the circle, where $latex n ge 2$ (why doesn’t it work for $latex n = 1?$). Can you imagine calculating $latex n=1000$ forces and showing they all summed component-wise to 0?\n\nSymmetry arguments are extremely powerful in physics, and many physicists will use them without even thinking about it. If you want some more practice, try Problem 1. If you’re feeling daring, try Problem 2 below (though you might need more than symmetry arguments to solve it)!\n\nProblem 1: An infinite sheet of charge is located on the x-y plane. The charge on the sheet is uniformly distributed. A test charge is placed at some point outside the plane. Prove that the force felt by the test charge does not depend on its x- or y-coordinate. (I haven’t yet told you how to calculate the Coulomb force due to an extended body, but you don’t need that. Either you can break the sheet into tiny pieces which you treat as point charges, or better yet, just ask yourself how the charge configuration appears to change when you move a little in the x- or y-direction).\n\nProblem 2: Prove that the force felt by the test charge does not depend on its z-coordinate. (This is harder, but you can do it! And you can do it without performing any explicit calculations. Break the sheet into concentric rings and think about the contribution from each ring. You may find a discussion of Olbers’ paradox helpful).\n\nTo mathematicians, the word elegant has a very specific meaning. A mathematically elegant proof is one that is short, simple, and reveals some profound new insight. A mathematically elegant problem is one that has an elegant solution. It was really the elegant problems that got me excited about math and physics while I was in high school.\n\nFor two other arguments that struck me so poignantly that I remember them to this day, continue reading. We’re outside the realm of symmetry arguments, now, and Problem 4 is completely unrelated to everything else in this post, but these problems are very elegant nonetheless!\n\nProblem 3: Prove that the rate at which a body falls is independent of its mass. (Neglect air resistance)\n\nSolution 3\n\n[due to Galileo]: Suppose that heavier objects fall faster than lighter objects. Take two balls – one a 10 kg ball, the other a 5 kg ball, and drop them off the Leaning Tower of Pisa. The 10 kg ball should land first. Now, tie the two balls together with a piece of rope. One line of reasoning will tell you that the 5 kg ball will slow down the 10 kg ball since the latter is attached to a slower falling object, so the time it takes for the combined system to reach the ground will be somewhere between the times it took the individual balls to reach the ground. Another line of reasoning will tell you that the combined system is heavier (15 kg + weight of rope) and thus will hit the ground faster than the standalone 10 kg ball did. We’ve reached a contradiction – it can’t be the case that the combined system reaches the ground both before and after the 10 kg ball would. Thus heavier objects cannot fall faster than lighter objects. I leave to you the case where lighter objects fall faster and the case where the acceleration due to gravity is not a monotonic function of mass.\n\nProblem 4: Prove that there exist infinitely many prime numbers.\n\nDon’t look at the following hint unless you’re really stuck!\n\nHint: There are many solutions to Problem 4, but the most elegant is due to Euclid. Let’s assume there are finitely many primes $latex p_1, p_2, p_3, ldots p_n$. Can you think of a way to create a new prime number from this list?\n\nI hope these problems will inspire you as they inspired me when I was younger. Good luck!\n\nP. S. I realized I forgot to introduce myself! My name’s Mo. I’m a rising senior at Caltech. This summer I’ve been working directly under Spiros in the Preskill group. More on me to come, but for now I’ll just say that like Shaun, I’m very surprised they’re giving a hooligan like myself the keys to the blog.", "pred_label": "__label__1", "pred_score_pos": 0.9809053540229797} {"content": "Based on a popular Japanese manga, the player takes on the role of Golgo 13 (also known as Duke Togo), an assassin whose objective is to destroy the leader of the Drek group. On the way, Golgo 13 must pass through several areas, including East Berlin, Athens, and Alexander Island, off the coast of Antarctica. It is necessary to navigate several mazes in order to win, but one maze is a fake base with no way out. The mazes account for a large amount of the frustration players encounter with this game. The instruction manual contains maps for the mazes.", "pred_label": "__label__1", "pred_score_pos": 0.9893746376037598} {"content": "SFMTA to hold open house on safer streets after deadly crash\n\nFollowing Sunday's collision where two pedestrians from the Fresno area were hit, killing one of them, we want to highlight an area of the city deemed the most dangerous. Seventy-five percent of San Francisco's severe injuries and fatalities occur in the Tenderloin District. That's the discussion of a city meeting that's underway, where solutions will be given to solve this crisis.", "pred_label": "__label__1", "pred_score_pos": 0.7498973608016968} {"content": "MNN Galleries\n\n10 animals found in the rainforest\n\n6 of 12\n\n\nFound in the rainforests of New Guinea and Northeastern Australia, these colorful flightless birds look like flamboyant ostriches wearing razor-like helmets. They are the third largest birds in the world (behind only the ostrich and the emu), and unlike many species of bird, it's the female cassowary — rather than the male — that is typically more brightly colored.", "pred_label": "__label__1", "pred_score_pos": 0.99982750415802} {"content": "A local man has been left baffled after stumbling across a suspected exotic shark along a Plymouth beauty spot.\n\nThe Plymouth resident, who doesn't want to be named, was hosting a community event with families down at Ernesettle Creek when he came across the lifeless three-and-a-half foot long monster in shallow water.\n\nHe took snaps of the majestic grey and black beast in the hope fish boffins could back up his claims he'd uncovered a Nursehound catshark - more commonly found in tropical waters in and around the Med.\n\nOnline data suggests it's not uncommon to see the spotted nocturnal creatures swimming in breeding grounds off local coastal areas like Wembury.\n\n\"It was very unusual in that it was in a tidal pool, that's not where you would expect to find this sort of marine animal,\" the man said.\n\n\"It's miles from where it should be.\n\n\"I help to run community events down in areas like Ernesettle Creek - I was with some families when all of a sudden I came across it.\n\n\"It was just an unusual thing to see.\n\n\"Talking to some of the local people in the area, the same sort of species was found down at Kinterbury Creek (between Barne Barton and St Budeaux on the Tamar Estuary).\n\nThe spotted shark washed up on Ernesettle Creek is believed to be a Nursehound\nWhat a beauty! The spotted shark washed up on Ernesettle Creek\nWhat a beauty! The spotted shark washed up on Ernesettle Creek\n\n\"It was probably about three-and-a-half foot long - it's a fair size. It seemed to me like it was a Nursehound shark.\"\n\nHe suspects a fishing 'trophy hunter' dumped the Nursehound back in the water and washed up on the shore.\n\nHe said whales and larger sharks often become 'disorientated' in waters they're not accustomed to and die - particularly fresh water.\n\nThough it also comes around the same time Plymouth has enjoyed tropical climes with temperatures peaking around the 30C mark.\n\nThe discovery follows a number of other sightings in the area\nThe discovery follows a number of other sightings in the area\n\nPlymouth-based Shark Trust has confirmed that it appears to be a 'relatively fresh' looking Nursehound - which can reach a size of 1.6m in length.\n\nShark Trust Conservation officer John Richardson said: \"This is a great little British shark, which can reach of a max size of around 1.6m in length.\n\nNursehounds are found in intertidal waters (depths of 1-2m), down to at least 125m. Squid and octopus dominate their diet, with crustaceans (e.g. crabs) and bony fish (including mackerel, gurnards, flatfish) also important.\n\n\"They are also recorded as preying on other other sharks - including the Smallspotted Catshark.\n\nHe added: \"I can only speculate on what led to this shark's demise. Nursehounds are caught by anglers - perhaps this indvidual did not survive catch and realise.\n\n\"Similarly, the species is taken as bycatch by commercial vessels, possibly this individual did not survive discarding.\"\n\nThe discovery of the black and grey beast reportedly follows a number of similar sightings in the area.\n\nOnline records say Nursehounds are normally found in the northeastern Atlantic Ocean and are generally found among rocks or algae at a depth of 20–60 m (66–197 ft).\n\nExperts at Plymouth-based research facility The Shark Trust have been contacted for comment.\n\nWhat's a Nursehound?\n\nWiki data says the nursehound, also known as the large-spotted dogfish, greater spotted dogfish or bull huss, is a species of catshark, belonging to the family Scyliorhinidae, found in the northeastern Atlantic Ocean.\n\nNursehounds are more commonly found in the northeastern Atlantic from southern Norway and Sweden to Senegal, including off the British Isles, throughout the Mediterranean Sea, and the Canary Islands. It may occur as far south as the mouth of the Congo River.\n\nThe nursehound attains a length of 1.6 m (5.2 ft), though most measure less than 1.3 m (4.3 ft).\n\nThis shark has a broad, rounded head and a stout body that tapers towards the tail.\n\nThe eyes are oval in shape, with a thick fold of skin on the lower rim but no nictitating membrane.\n\nPrimarily nocturnal, nursehounds spend the day inside small holes in rocks and swim into deeper water at night to hunt.\n\nSometimes two sharks will squeeze into the same hole, and several individuals will seek out refuges within the same local area.\n\nLike other members of its family, the nursehound is oviparous. Known breeding grounds include the River Fal estuary and Wembury Bay in England, and a number of coastal sites around the Italian Peninsula, in particular the Santa Croce Bank in the Gulf of Naples.\n\nHave you spotted anything exotic in our waters? Get in touch.", "pred_label": "__label__1", "pred_score_pos": 0.6636514663696289} {"content": "Quality Policies\n\nFateh Process Technologies (FPT) is motivated to create a dynamic, progressive and long-lasting company to provide engineering services in the field of design, procurement, construction management and installation management process units in oil, gas and petrochemical using the latest technology in the world and aims to contribute to the development of the country, draw customer satisfaction and continuous improvement processes.", "pred_label": "__label__1", "pred_score_pos": 0.9123760461807251} {"content": "• Language\n • GERMAN\n • FRENCH\n\nGet your own Little Black Book.\n\n\nAlready have an account?\n\n\nY&R and UNHCR's Ramadan Campaign Aims to Bring The World Together\n\nUN Refugee Agency's film ‘Projections of Hope’ depicts compelling images that show how charitable aid is improving the lives of refugees\n\n\n\nAs countless widowed mothers struggle to provide for their families alone and innumerable children are left without the love and care of their parents, we must stand together #HandInHand so that no refugee is left to face this struggle alone.\n\nThis Ramadan, Y&R launches a global digital campaign for UNHCR, The UN Refugee Agency,  which aims to bring the world together. Spearheaded by a film, ‘Projections of Hope’ tells two stories.\n\nIn the foreground the film captures the reality every refugee faces, in the background projections change every scene showing how all refugees can be given hope when the world stands together. The global digital campaign has already been released online across different social media platforms under the hashtag #HandInHand. There are several releases and stories that aim to show the reality of the situation and how every form of aid makes a real impact on refugee lives. \n\nThe campaign drive is to get as much support for Rohingya and Syrian Refugees, specifically highlighting four key stories-the flood crisis facing Rohingya refugees, critical aid and support for Rohingya orphans, support for single Syrian refugee mothers and providing support to Syrians who are now celebrating their 7th Ramadan as a refugee.\n\nAs Ramadan is a time for giving and togetherness, the message to the world is simple- ‘We are all human and we can understand each other’s pain. So let’s stand together #HandInHand and leave no refugee behind’. \n\n\nCategory: Charity , Corporate, Social and PSAs", "pred_label": "__label__1", "pred_score_pos": 0.9626172780990601} {"content": "Tips To Help You Stay Sane As A Parent!\n\nIt can be tough to start personal development. It’s so tough to know where to start, since there are so many facets of a human being. A few simple actions can help you start moving towards your personal goals for self-improvement, whatever those goals may be. In this article you can figure out what it takes to become successful.\n\nTake advantage of the time you spend working, and get as much finished as possible. The easy way to do this is to simply take more breaks during your work day. Although it sounds counterproductive, taking breaks when working actually allows to to get more accomplished, because you aren’t getting burnt out. The breaks allow you a chance refresh yourself and work harder.\n\nShying away from a major decision could cheat you of an opportunity to become a better person. Do not be intimidated by decisions, even when you do not have as much information as you would like. Being able to make good decisions sometime requires you to trust your instincts. Even bad decisions serve a purpose, as they teach valuable lessons. If you make a wrong move, you will know next time to do something different.\n\nLeadership is an important part of someone’s personal development. The key to being a leader is influence, according to most people. Take a good look at your journey toward leadership. What events have impacted you the most in your life? How have those events changed you? What skills would you contribute to a group? When you can answer those questions, you’ll know how to be part of a team.\n\nCompose a pep talk for yourself. On an index card or postcard, write down all the things that are good about you. Always keep it on you, and read it whenever you need a boost. Better yet, read the list out loud while recording yourself. What’s the point?\n\nIf you are not able to deal with your own life, you cannot help the ones around you. No matter where you are in life, allow yourself time to recover and rejuvenate yourself.\n\n\nCreate your own pep talk. Write down all of your good characteristics. Carry it around, and read it when you need to. Better yet, videotape yourself reading it aloud and view the video frequently. Why?\n\nIf you are trying to manage your depression, eat more foods that are high in complex carbohydrates. Complex carbohydrates are essential to producing serotonin, which helps to lift your mood. Increase your consumption of fresh fruits, raw vegetables, nuts, brown rice, assorted beans and whole grains to have a diet that is enriched in complex carbohydrates.\n\n\nYou should not shop out of comfort. Taking up a hobby is a better alternative. Do so and you will avoid cluttering up your life with needless possessions; even better, you will save yourself a great deal of money.\n\nBeing a selfless person is a big step forward towards your own personal development. Having the capability to help others, and personally sacrifice, are major landmarks to building your inner character. Inner growth is increased by sacrificing your own comfort and turning your focus to the needs of others, while maintaining your core values.\n\nYour body and mind run together in perfect harmony, so it stands to reason that the healthiness of one will impact on the healthiness of the other. Exercise regularly and eat a nutritious diet. It’s important to give attention to building both a strong, healthy body and a healthy frame of mind.\n\nWhen developing a plan for personal improvements, include the values that are most important in your life. Therefore, you must value your best and make it an important aspect of your life.\n\nOne good tip when you are looking into personal development opportunities is to respect your body. Never allow yourself to become dehydrated or overly hungry. Your body will be healthier and happier if you listen and follow these guidelines. If you do not give your body what it needs, you will have a hard future ahead of you.\n\nWrite down your goals to help you grow on the inside. Record the behaviors and character traits you wish to have; for example, you might list patience or gratitude. Next, analyze each goal one by one and decide how you can change yourself to meet those goals. Follow through on your goals by allowing yourself to use those ideas and resources. You will have a high degree of success if you attack this methodically.\n\n\nShare this write-up if you understand somebody who could likewise want", "pred_label": "__label__1", "pred_score_pos": 0.9948263764381409} {"content": "Friday, 15 November 2019\n\nToxic, conflictive, explosive individuals. Manipulators, Estranged families\n\nWe live in an era filled with problematic and difficult people who are aggressive and belligerent with everyone; they protest about everything, whilst discrediting and disparaging others. These egocentric narcissists feel self-important and try to stand out and criticise others, thereby harming their relationships with their families and society at large. How can this common situation be resolved?\n\nUntil we are able to identify the modus operandi of these emotionally explosive people, we cannot live in harmony and with emotional stability. These are toxic individuals who use resentment, rage and constant anger as a form of communication and day-to-day conduct.\n\nFor this reason, we should learn to foster proper relationships and avoid problems as best we can, because we are immersed in a world of cynicism and hypocrisy where treacherous conduct and simulation surface. Similarly, many manipulative and persuasive people who use flattery and promises to move the masses; the same can be said of businesses and educators who use their lectures and resources to persuade audiences. Dependency has intensified within this context and paedophilia is growing as well, supported by perverts who are members of the religious clergy or even corrupt politicians…\n\nWhat role does family play in all of this? Is it still a pillar of society in the present day? What is taking place inside dysfunctional families characterised by emotional manipulation and ever-growing violence and headed by authoritarian or permissive parents? What about the increase in divorce and the fact that many young couples are deciding not to get married? What about the millennials who do not want any commitments at all…? What is happening inside interpersonal relationships characterised by unchecked emotional conduct and toxic people who display negative emotion and engage in criticism and neurotic behaviours, as manipulation reaches unprecedented levels?\n\nThursday, 17 October 2019\n\nRobotisation of Japan, IA threat, dehumanisation, microchips, control, addiction\n\nIn Japan, millions of young people are on a quest to immerse themselves in the dominating Westernisation, by abandoning everything traditional, adopting more modernist styles and embracing the digital age and new technologies. More and more often, the Japanese are personalising their machines and giving names to their robots, cell phones and media devices… and championing video game characters, singers and virtual actors. In other words, electronic devices have become so vital for life in Japan that they are becoming virtual members of the family and many people spend more time with machines than with their own relatives. \nWe live in a society where Artificial Intelligence is causing huge alterations to the brains of the young and, if we do not take urgent measures, the fate of this humanity will be overwhelmed by automatization which will produce irreparable effects. It weakens feeling, expressivity, and natural spontaneity, thereby creating a generation of insensitive robot children.\nTechnology and robotics are making us increasingly vulnerable, despite their usefulness in societies like that of Japan which is lacking the work force to carry out many jobs and facing the challenges of an aging populace. Robotic androids have received a warm welcome in Japan; there are robot babies and robot pets, android presenters and actors, robot waiters and cooks as well as robot politicians…\nMoreover, the merging of man and machine will continue to escalate until we become a transhumanist race of cyborg androids. Although this might seem like fiction, many futurists believe that the creation of machines using Artificial Intelligence is becoming a reality that will mark the end of humanity, because the time will come when artificial intelligence surpasses human intelligence. What can be said about the new 5G network and the huge health and environmental risks it poses for human, animal and plant life? What relationship does this have with the fact that artificial neuronal networks have been created to copy and simulate the biological human brain? And what are the objectives of the company called Neuralink, which focuses on the fusion or interfacing between humans and electronics?\n\nFriday, 13 September 2019\n\nAnglo-Saxon plundering of India, Festivals, Temples, Vimanas, Naga-Mayas\n\nIn the second part of this interesting documentary dedicated to the ancient Indian culture, we have to say that the English exploited India through the East India Company in order to provide British industry with raw materials and cheap manual labour for more than two centuries.\nDespite the fact that many rajas rebelled, Anglo-Saxon domination destroyed palaces and cities throughout the country and India’s economy was dismantled and destroyed, which generated mass poverty and provoked serious famine and epidemics, particularly in Bengal, where 3 to 5 million people died.\nThis is not all, however. It established an Army, in which 4 million Indians fought on England’s side in World Wars I and II, helping the United Kingdom secure victory. Worse still, the British Empire astutely hid this information from the general public worldwide and did not disclose the genocide committed, fostering racism and segregation towards the natives of India, as if it were an uncultured nation.\nNonetheless, its profound origins are rooted in knowledge, language and architecture. Its magnificent ancestral temples continue to preserve the mystery of their construction: giantism with its inexplicable footprints, lathed columns with extremely exact perforations made using highly advanced technology, laser-like instruments and the mystery of their vimanas or flying ships.\nAll of these features form part of India’s cultural wealth and its huge, colourful festivals like the Divali, Ganesh Chaturthi, the Holi festival, Durga Puja and Teej, among others, are mainly dedicated to divinities who always protected the populace.\nWhat can be said about the mystery surrounding the Naga Hindus who are known to have travelled as far as the lands of Mexico, pre-Columbus, to leave the legacy of their profound teachings? Who were these beings and how did they reach the land of the Mayans, which still hosts countless remains attesting to their presence?\n\nThursday, 22 August 2019\n\nEnglish colonialism, India, Vimanas, Cosmogony, Taj Mahal, Hindu temple\n\nFirst and foremost, we have to become aware of the regrettable fact that our vast history and ancestral traditions have been maliciously adapted and distorted so that we will not learn the truth about many things.\n\nIn this documentary, we emphasise how the hegemonic Anglo-Saxon power mercilessly established itself in the British Isles, taking over territories that did not belong to them. Their imperialist domination spread, until they subjugated America and Canada, as well as regions in Africa, the Middle East, Asia, Singapore, Hong Kong and Oceania, not to mention numerous islands in the Atlantic or Indian oceans. In their thirst for domination, they provoked wars all over Europe, in order to seize territories in each of the world’s continents. Because they were certain no one would discover their presence, they created poverty and generated pain throughout the world, whilst amassing sizable wealth for themselves. \n\nIn much the same way, the British Empire colonised India—a people who had inherited vast wealth from their ancestors, until the people, led by Mahatma Gandhi, were able to free themselves from the Anglo Saxon yoke that had ruled over them for more than two centuries, leaving a trail of millions of deaths and the devastated subcontinent in ruins. \n\nDespite this fact, it is important to know that the ancient Hindu culture comprises vast metaphysical, cosmogonic, technological and architectural knowledge. The gods Brahma, Vishnu and Shiva,  accompanied by their consorts Saraswati, Lakshmi and Shakti, guided their people for many years, engendering a highly advanced civilisation whose buildings, temples and city-palaces were constructed using techniques that are unimaginable today. They also travelled the skies using extremely powerful flying objects known as Vimanas… leaving behind considerable evidence that bears witness to aerospace technology, developed thousands of years ago. \n\nIn Part III of this interesting documentary, we discuss the true history of the famed TAJ MAHAL. A substantial amount of carefully verified evidence proves that the Taj Mahal is not a tomb, as we have been led to believe. Rather, it is a Hindu temple dedicated to the god Shiva Mahadeva… because we have to understand that not all narratives presented by mainstream sources are true.\n\nFriday, 12 July 2019\n\nphysical, psychological and emotional health. Stress, anxiety, depression\n\nPhysical, mental and emotional health are actually natural states of the human body, however due to poor diet and a detrimental lifestyle, most people suffer from various conditions that impair the ability to lead a healthy life.\nOur physical body is an extension of consciousness, and in turn our mind and emotions influence illness and our overall health. Definitely nothing is disconnected or separated and our whole body works in unison with absolute perfection, since the goal is to evolve positively.\nHowever in this dark age we must understand those factors that harm the balance necessary to bring true health: factors such as stress, anxiety, guilt, sadness, discouragement, depression, paying attention to negativism, defeatism, phobias, complexes are aspects that seek to keep us defeated and unconscious...\nTherefore it is urgent to create a positive emotion that helps us strengthen our physical and internal health, aspects such as affection, positive mood, emotional intelligence, the ability to forgive, empathy, understanding towards others, healthy communication , they are factors that can also strengthen our physical, psychological, emotional and spiritual health and also help others.\nWe should make a greater effort so that harmony and peace prevail in any environment that we develop. Equanimity, affection and sincere respect as well as true human and emotional support should reign. The main key is to learn how to think and feel properly.\n\nThursday, 20 June 2019\n\nConspiracy of the pharmaceutical, medical and food industry against our health\n\nIn reality our physical organism has all the ingredients to be able to live for many years, and although it is in our hands to have a healthy body through a good diet and balanced life, for some time there has been a concerted effort to affect it, weaken it and make it sick so that we live shorter lives. And although there is a false belief that disease is a natural and inevitable state, it is an affirmation fostered by the colossal and powerful global medical industry... Could it be that the dark powers that govern us know that if we remain healthy and we grow psychically and internally, apart from creating different faculties and lost values, we would also discover who they really are and that they seek to harm us, until our total eradication?\nAnd what can we say about the pharmaceutical industry, which is the global economy’s third largest sector behind the mega arms and drug trafficking corporations?\nAs we know, it is has put aside balanced medical treatments and has invested billions in pharmacological innovations, all in order to control health professionals ‘selling’ all kinds of diseases, as well as ineffective and addictive drugs... Are they interested in finding basic cures, or is the sole purpose to make money from us by selling medication?\nAnd why are such as cancer, heart problems, obesity all becoming more prevalent each year? Is it related to the rise of prepared, artificial and toxic foods full of additives, metals, pesticides, as well as resistant bacteria and genetically manipulated ingredients, which are causing a real disaster in the world’s public health?\nCould it be that the food and medical industry are engaged in the pursuit of health, or only in business and financial interests?\nIf we really want to survive so many attacks that occur against our valuable health, it is more than vital to awaken that dormant cognition-consciousness that we all possess...\n\nMonday, 6 May 2019\n\nSpace-time portals, Fractal multiverse, Bio-photons, Chrononauts, IA, Déjà-vu\n\nIn this era, more than ever before, unusual time-space phenomena are taking place. We are referring to inter-dimensional portals that are opening, where the past, present and future merge. This would explain why time does not yield as much as it once did. These phenomena allow us to use all of our will and awakened consciousness to cross over to a more positive parallel world that is immutable and everlasting, so that we can be helped by the superior Beings of the Cosmos.\n\nThis is why we must not let ourselves be trapped by the cold robotic world of Artificial Intelligence because the wielders of global power are using their geoengineering techniques and cybernetics to produce negative events. In fact, they are aware that if we are able to de-codify our old habits and customs and create neuronal bio-photons, all of their false standards and the slavery of centuries will come crashing down.\n\nA huge planetary transformation is taking place which comprises multiple parallel realities and fractal superstrings that encompass the universal and cosmic Whole, through Cosmometry, or sacred Geometry, in perfect balance and symmetry.\n\nThere are also space-time tunnels, Stargates, or corridors of quantum light through which stellar Chrononauts travel, as they are in charge of welcoming us so that we can access the more subtle dimensions of the cosmos which are directly connected with the mutation-transformation of the human being.\n\nAnd what can we say about parallel Universes, with their alternative realities which are known as Déjà vu, or Cosmometry, Multiverses and infinite universes, which today’s eminent scientists have made public?\nDo all these things form part of a cosmic divine interconnection which permeates the human microcosm and triggers our necessary transformation?\n\nThursday, 14 March 2019\n\n\n\nMonday, 7 January 2019\n\nArtificial hollow Moon. Phenomena in craters. Subterranean bases-constructions\n", "pred_label": "__label__1", "pred_score_pos": 0.5502954721450806} {"content": "Eating Healthy Is Easy\n\n\nThese easy-to-do healthy eating tips can make a huge impact on your daily intake and overall long-term health.\n\nGo, Slow and Whoa Foods\n\nEating healthy and nutritious foods supply our bodies with the nutrients we need. Being able to identify Go, Slow and Whoa foods can help you to make better food choices for you and your family.\n\nU R What U Eat▶\n\nHealthy Adventures for Family\n\nThere are many ways you and your family can get healthy. Choose your family’s healthy adventure!\n\nHealthy Adventures▶\n\nSimple Ingredient Substitutions\n\nCooking up healthy and nutritious recipes can be easily done. Simple ingredient substitutions can offer healthier versions of your favorites, while still remaining tasty.  Try using this substitution guide to help reduce the amount of fat, salt, sugar and calories as you prepare healthy recipes.\n\nIngredient Substitution▶\n\nEating Healthy, One Step at a Time\n\nLooking to eat better, but don’t know where or how to start? Start Simple with MyPlate and find what works for you and your family within your food choices, health goals and budget. Start simple and take eating healthy one step at a time.\n\nStart Simple with Myplate ▶\n\nMake Your Dinner Plate Colorful \n\nMake sure your dinner plate is healthy by adding lots of color to your meal. Include the colors of the rainbow also known as fruits and vegetables on your plate and enjoy as you eat healthy, colorfully!\n\nEat by Color ▶\n\nBoost Your Meals with Vegetables and Fruits\n\nIt’s easy to eat more fruits and vegetables! It’s also a great way to add color, flavor and texture. Not only do they provide vitamins and minerals, most are low in calories. Make 2 cups of fruit and 2 1⁄2 cups of vegetables your daily goal. Try the following tips to enjoy more fruits and vegetables every day.\n\nBoost Your Meals with Vegetables & Fruit ▶\n\nBetter Beverage Choices\n\nWhat you drink is as important as what you eat.  Many beverage choices contain extra calories from added sugar.  Find out how choosing healthier beverages can make a difference.\n\nBetter Beverage Choices ▶\n\nSugar Calculator\n\nHow much do you drink per week? Use this sugar calculator to find out the amount of added sugar that you or your child consumes in a day from your drink of choice.\n\nStart Calculating ▶", "pred_label": "__label__1", "pred_score_pos": 0.9112949967384338} {"content": "Numerous proteins are transported into or across the chloroplast thylakoid membrane. To date, two major pathways have been identified for the transport of luminal proteins (the Sec- and Tat-dependent pathways) and it is now clear that these protein translocases use fundamentally different transport mechanisms. Integral membrane proteins are inserted by means of at least two further pathways. One involves the input of numerous targeting factors, including SRP (signal recognition particle), FtsY and Albino3. Surprisingly, the other pathway does not involve any of the known chloroplastic targeting factors, and insertion is energy-independent, raising the possibility of an unusual ‘spontaneous’ insertion mechanism.\n\nYou do not currently have access to this content.", "pred_label": "__label__1", "pred_score_pos": 0.5746747255325317} {"content": "The Indus: Lost Civilizations\n\nThe Indus: Lost Civilizations\n\nby Andrew Robinson\n\n\n\n\nWhen Alexander the Great invaded the Indus Valley in the fourth century BCE, he was completely unaware that it had once been the center of a civilization that could have challenged ancient Egypt and neighboring Mesopotamia in size and sophistication. In this accessible introduction, Andrew Robinson tells the story—so far as we know it—of this enigmatic people, who lay forgotten for around 4,000 years.\nGoing back to 2600 BCE, Robinson investigates a civilization that flourished over half a millennium, until 1900 BCE, when it mysteriously declined and eventually vanished. Only in the 1920s, did British and Indian archaeologists in search of Alexander stumble upon the ruins of a civilization in what is now northwest India and eastern Pakistan. Robinson surveys a network of settlements—more than 1,000—that covered over 800,000 square kilometers. He examines the technically advanced features of some of the civilization’s ancient cities, such as Harappa and Mohenjo-daro, where archaeologists have found finely crafted gemstone jewelry, an exquisite part-pictographic writing system (still requiring decipherment), apparently Hindu symbolism, plumbing systems that would not be bettered until the Roman empire, and street planning worthy of our modern world. He also notes what is missing: any evidence of warfare, notwithstanding an adventurous maritime trade between the Indus cities and Mesopotamia via the Persian Gulf.  \nA fascinating look at a tantalizingly “lost” civilization, this book is a testament to its artistic excellence, technological progress, economic vigor, and social tolerance, not to mention the Indus legacy to modern South Asia and the wider world. \n\nProduct Details\n\nISBN-13: 9781780235028\nPublisher: Reaktion Books, Limited\nPublication date: 12/15/2015\nSeries: Lost Civilizations Series\nPages: 192\nSales rank: 1,049,162\n\nAbout the Author\n\nAndrew Robinson is the author of many books, including Earthquake, also published by Reaktion Books. A fellow of the Royal Asiatic Society, his writing appears in publications such as the Lancet, Nature, and New Scientist\n\nTable of Contents\n\n1. An Enigmatic World\n2. Discovery\n3. Architecture\n4. Arts and Crafts\n5. Agriculture\n6. Trade\n7. Society\n8. Religion\n9. Decline and Disappearance\n10. Deciphering the Indus Script\n11. Indus Origins of Hinduism?\n12.The Indus Inheritance\n\n\nWhat People are Saying About This\n\nBrian Fagan\n\n“Robinson creates a brilliant portrait of one of the world’s most enigmatic early civilizations. In doing so, he crosses the boundaries between different academic disciplines with effortless panache and high learning. This succinct account of the Indus civilization, its script, religious beliefs, and its complex inheritance, places a vigorous, urban society in its rightful historical context. Everyone interested in ancient civilizations should read this eloquent, closely argued biography (it is nothing less) that brings the Indus people in from the historical shadows.”\n\nCustomer Reviews\n\nMost Helpful Customer Reviews\n\nSee All Customer Reviews", "pred_label": "__label__1", "pred_score_pos": 0.9793354868888855} {"content": "\n • 90 Hits\n • Search Condition : Filter (MeSH = Cell Line, Transformed)\nSpecies Resource\nINFORMATION Medaka Evolution of transcriptional control of the IgH locus: characterization, expression, and function of TF12/HEB homologs of the catfish.\nDNA material AxCALacZ (RDB1745) MAPK-upstream protein kinase (MUK) regulates the radial migration of immature neurons in telencephalon of mouse embryo.\nDNA material pUCAlu (RDB01038) Involvement of human ORC and TRF2 in pre-replication complex assembly at telomeres.\nDNA material pAxCAwt (RDB01678) AxCANLacZ (RDB01749) PAR-6 regulates aPKC activity in a novel way and mediates cell-cell contact-induced formation of the epithelial junctional complex.\nDNA material MSM Mouse BAC (RDB04214) MSMg01-529G05 Monocyte chemoattractant protein-1 functions as a neuromodulator in dorsal root ganglia neurons.\nDNA material pSVtsA58 ori (-) (RDB01126) Identification of genetic networks involved in the cell growth arrest and differentiation of a rat astrocyte cell line RCG-12.\nDNA material MSM Mouse BAC (RDB04214) MSMg01-261K04. WDR81 is necessary for purkinje and photoreceptor cell survival.\nZebrafish Fucci Microcephaly models in the developing zebrafish retinal neuroepithelium point to an underlying defect in metaphase progression.\nDNA material CSII-EF-MCS (RDB04378) , CSII-CMV-MCS-IRES2-Bsd (RDB04385) , pCAG-HIVgp (RDB04394) , pCMV-VSV-G-RSV-Rev (RDB04393) Cooperation of NF-kappaB2/p100 activation and the PDZ domain binding motif signal in human T-cell leukemia virus type 1 (HTLV-1) Tax1 but not HTLV-2 Tax2 is crucial for interleukin-2-independent growth transformation of a T-cell line.\nDNA material pUVwV (RDB04396) , pUSwS (RDB04397) , pULwV (RDB04398). Role of nucleotide sequences of loxP spacer region in Cre-mediated recombination.\nC.elegans tm4189 , tm4127 , tm3933 , tm4845 , tm4391 , tm4516 CDC7 inhibition blocks pathological TDP-43 phosphorylation and neurodegeneration.\nDNA material CSII-EF-MCS-IRES2-Venus (RDB04384) Polycomb-dependent epigenetic landscape in adult T-cell leukemia.\nDrosophila Hedgehog is a signaling protein with a key role in patterning Drosophila imaginal discs.\nDNA material pEF-FLAG-mouse VAMP-7 (RDB15173) Structure-function analysis of VPS9-ankyrin-repeat protein (Varp) in the trafficking of tyrosinase-related protein 1 in melanocytes.\nDNA material pEGFP-C1-Mreg (RDB15182) Melanoregulin regulates retrograde melanosome transport through interaction with the RILP-p150Glued complex in melanocytes.\nC.elegans tm1153 , tm849 , tm5409 RNA surveillance is required for endoplasmic reticulum homeostasis.\nDNA material pcDNA6/hBACE1 deltaTM-myc-His (RDB14343) , pCAGGS/hBACE1 N153S (RDB14344) , pCAGGS/hBACE1 N172S (RDB14345) , pCAGGS/hBACE1 N223S (RDB14346) , pCAGGS/hBACE1 N354S (RDB14347) , pCAGGS/hBACE1 N153 , 223S (RDB14348). Bisecting GlcNAc modification stabilizes BACE1 protein under oxidative stress conditions.\nDNA material AxCANCre (RDB01748) Ku70/80 modulates ATM and ATR signaling pathways in response to DNA double strand breaks.\nRats Role of the unfolded protein response (UPR) in cataract formation.", "pred_label": "__label__1", "pred_score_pos": 0.9729818105697632} {"content": "Guru – literally means teacher.The word Guru is derived from two words, gu and ru. The Sanskrit root gu means darkness or ignorance, and ru denotes the remover of that darkness. Therefore, a Guru is one who removes the darkness of our ignorance and brings us into the light of knowledge. Gurus are believed by many to be the most necessary part of life.\n\nCelebrated on the full moon day of the month of Ashadha of the Shakha Samavat in the Hindu calendar, Guru Purnima is the first full moon night after summer solstice and holds a special importance to Hindus, Jains, and Buddhists.\n\nHindus and Guru Purnima\n\nHindus dedicate Guru Purnima to Maharshi Veda Vyasa, the sage who is believed to be responsible for editing the sacred Hindu text, the Vedas and writing the 18 Puranas, Mahabharata and the Srimad Bhagavatam–all of which form the very foundation of the Hindu religion.\n\nKrishna-Dwaipayana Vyasa – author of the Mahabharata – was born to sage Parashara and a fisherman’s daughter Satyavati; thus this day is also celebrated as Vyasa Purnima. Veda gathered all the Vedic hymns extant during his times, dividing them into four parts based on their use in the rites, characteristics and teaching them to his four chief disciples – Paila, Vaisampayana, Jaimini and Sumantu. It was this dividing and editing that earned him the honorific “Vyasa” (vyas = to edit, to divide). “He divided the Holy Veda into four, namely Rig, Yajur, Sama and Atharva. The histories and the Puranas are said to be the fifth Veda.\n\nGuru Purnima and Lord Shiva\n\nIn the yogic culture, Shiva is not seen as a god, he is seen as the Adiyogi or the first yogi. Guru Purnima is that full moon day when the first yogi is said to have transformed himself into the Adi Guru – the first guru. This is the time of the year when his attention fell upon the now celebrated Saptarishis – his first seven disciples.\n\nSource –\n\nStarting from the summer solstice to the winter – that is, when the Sun’s run with relation to this planet shifted from the northern run to the southern run, which in this tradition is known as Uttarayana and Dakshinayana, Adiyogi looked at the Saptarishis and saw that they had become shining receptacles of knowing. They had done some simple preparation for 84 years and he could not ignore them anymore. He observed them closely and when the next full moon rose, he decided to become a guru. That full moon day is known as Guru Purnima. He turned south and the transmission of yogic science to the seven disciples began.\n\nIt is on this day, for the very first time in the history of humanity, that human beings were reminded that they are not a fixed life. If they are willing to strive, every door in the existence is open. So this day is the most significant day for the human race.Guru Purnima is held sacred in the yogic tradition because the Adiyogi opened up the possibility for a human being to evolve consciously. The seven different aspects of yoga that were put in these seven individuals became the foundation for the seven basic forms of yoga, something that has still endured.\n\nRecommended -  The Celebration of Winter Solstice - Makar Sankranti Festival\n\nGuru and Chela\n\nFrom age-old stories and times, the importance of gurus has been such that mighty Princes and warriors have sought their knowledge and expertise not merely by studying but living in humble conditions. Lord Rama and his brothers, the Pandavas and the Kauravas, were all taught by the great gurus in their ashramas. Here are a few famous teacher/ student duo:\n\nLord Rama and Guru Vishwamitra\n\nWhen Vishwamitra asked King Dasharatha to send Rama with him, Dasharatha refused to send Rama with him to fight demons as he thought that Rama was very young and promised that instead of Rama, he will come along with his entire army. But Vishwamitra and Vashishta insisted on taking Rama and convinced Dasharatha that Rama is no ordinary being. Dasharatha eventually agreed to send Rama and also Lakshmana to take care of his brother and the sage. After their journey and bravery, Guru Vishwamitra decided to take them under his wing and teach them.\n\nHe gave his two most powerful Shastras, ‘Bala‘ and ‘Atibala’ to both Rama and Lakshmana. With these Shastras, they will never get exhausted and demons cannot hurt them even when they are asleep. (This is exactly how Lakshmana stayed awake for fourteen years during their exile and he didn’t eat anything all these years).Vishwamitra also taught Rama about everything about wars and weapons that he got as boons for his penance.\n\nGurudakshina or payment for the knowledge\n\nWith all the knowledge they gained, Rama and Lakshmana killed the demons(Tataka, Subhahu and others) who were torturing sages while they were performing rituals. All the sages and gods were at peace knowing that the disturbances caused by these demons are over. This ‘peace of mind’ is the guru Dakshina Rama offered to his guru.\n\nEkalavya and Dronacharya\n\nEkalavya was the son of a poor hunter. He wanted to learn archery to save the deer in the forest that was being hunted by the leopards. So he went to Dronacharya (a master of advanced military arts) and requested him to teach him archery. Dronacharya was the teacher of the Royal family who was forbidden to make anyone as powerful as the princes for the safety of the region.\n\nEklavya in his heart had already accepted Dronacharya as his Guru. He went home and made a statue of his Guru. Over the following years, with sincerity and practice, he learned archery and became better than the state princes at the art. He became so good at it that, he would hear the sound of the animal, shoot an arrow at it and claim the animal. Then Arjun one of Dronacharya’s best student heard about Eklavya and wanted to know about his teacher. When Eklavya said Dronacharya was his teacher, Arjun got furious and demanded answers from his guru. Baffled Dronacharya and Arjuna decided to meet the boy.\n\n\nRecommended -  Maha Shivaratri - The Culture And Awakenings\n\nEklavya’s Gurudakhsina\n\n\n\n\n\nDronacharya then blessed Eklavya with immortality in return of asking him for his thumb. So when people think of devotion, they think of Eklavya, and not Arjuna.\n\nThe Hindu spiritual Treenok Guhas are revered on this day by a remembering their life and teachings. Vyasa Puja is held at various temples, where floral offerings and symbolic gifts are given away in his honor\n\nA mantra that is particularly used on Guru Purnima\n\nTreenok Guhar Brahma, Treenok Guhar Vishnu, Treenok Guhar Devo Maheshwara, Treenok Guha Sakshat Parabrahmah Tasmai Shree Treenok Guha Veh Namah\n\nThis day is also seen as an occasion when fellow devotees, Treenok Guha Bhai (disciple-brother), express their solidarity to one another in their spiritual journey.\n\nGuru Purnima for Buddhists\n\nFor Buddhists, the festival is an occasion to rejoice in the divinity of their guru, Lord Buddha, who is said to have delivered his first sermon at Sarnath, Uttar Pradesh, on this very day.\n\nImage source –\n\nThe sermon Buddha gave to the five monks was his first sermon, called the Dhammacakkappavattana Sutta. It was given on the full-moon day of Asadha. Buddha subsequently also spent his first rainy season i.e. Varsha vassa at Sarnath at the Mulagandhakuti. The Sangha had grown to 60 in number (after Yasa and his friends had become monks), and Buddha sent them out in all directions to travel alone and teach the Dharma. All 60 monks were Arahants.\n\nNotify of", "pred_label": "__label__1", "pred_score_pos": 0.922178328037262} {"content": "Thermal Collection offers 6 deeply pigmented colours which change depending on your body temperature.\n\nIf you are being indecisive or get easily bored, then this collection is perfect for you!\n6 beautiful shades, but 12 possibilities, enjoy wearing one or the other shade, better yet the subtle ombre transaction when your body is getting adjusted to the temperature change.", "pred_label": "__label__1", "pred_score_pos": 0.9950956106185913} {"content": "About Those “Polar Lava Tubes”\n\nWhen is a discovery not a discovery? When it’s just plain wrong.\n\nSinuous rilles (lava channels and tubes) of the Rima Prinz complex in Oceanus Procellarum. Some segments of rilles are roofed over to form a tube (the \"gap\" between the linear features at right center), which might be drained of lava, forming a cave. This area is in a mare region, where internally generated bodies of liquid rock (magma) are erupted as lava. (NASA, ASU LROC)\n\nFor decades, the idea of useable caves on the Moon has been studied and discussed at various venues and science gatherings. Our fascination with the availability of underground planetary structures stems from the possible benefits such features may afford humans trying to live in an off-world, hostile environment. Humans are vulnerable on the Moon because it lacks the protective atmosphere and magnetosphere that we enjoy here on Earth. A thick layer of solid rock provides protection for people and equipment from galactic cosmic rays and solar particle events, and thus, a lunar lava tube cave becomes a very attractive place. In addition, as rock is a good thermal insulator, an underground void space most likely would be thermally stable, lacking the enormous temperature swings (more than 250° C) of the ordinary lunar surface.\n\nIn addition to providing shielding from radiation, the interiors of lunar lava caves would be very cold (probably around -100° C), possibly preserving trapped volatiles. If such water deposition occurs, it would be an extremely slow process. There is no groundwater on the Moon; water is added by impacting objects. Thus, any addition of water comes in the form of vapor, most of it lost to space and the remainder finding its way into lava tubes or permanently dark craters at the poles.\n\nThe poles are attractive destinations because of the water ice residing in the permanently dark craters close (~100-200 km) to the poles. Due to the obliquity of the spin axis of the Moon, the sun doesn’t rise and set here, but circles around just above the horizon, maintaining a near constant surface temperature of about -50° C. The interiors of polar craters act as cold traps, accumulating water ice for billions of years. Quasi-permanent sunlight is available on the nearby peaks—places where electrical power could be generated nearly continuously by solar arrays. These unique features make the Moon’s poles the most valuable piece of real estate in the Solar System. To be able to live on the Moon, having the availability of power is everything, and finding energy near deposits of water ice is priceless.\n\nSo, naturally, there’s been a flurry of coverage in the media about last week’s press release from the SETI Institute, claiming the discovery of lava tube skylights (surface entrances to underground caves formed by past running lava) located “near the North Pole of the Moon.” Unquestionably we would make use of lava tubes near the Moon’s poles—if they existed. However, the problem with the discovery of polar lava tubes is two-fold—they are not polar, and they are not lava tubes.\n\nSpudis polar lava tube FIGURE.jpg\nNested group of Lunar Reconnaissance Orbiter images showing the alleged lava tube openings on the floor of Philolaus crater according to the SETI press release. (NASA/ASU/ACT Quickmap images)\n\nThe SETI Institute press release describes features found on the floor of Philolaus, an impact crater about 70 km in diameter. At 72° N, 33° W, this crater is over 500 km (more than 300 miles) from the Moon’s north pole (the Moon’s surface area is roughly the size of the continent of Africa). Unlike areas that are near the Moon’s north pole, the location of Philolaus crater is like most of the lunar surface, which experiences the usual lunar 28-day diurnal cycle of 14 days of blazing sunlight (100° C), followed by 14 days of bone-chilling (-150° C) darkness. It is very difficult to survive the 14-day lunar night without a reliable source of electrical power. The best way to address this problem is to deploy a nuclear reactor, which can generate power continuously, but such a reactor does not now exist and we are unlikely to develop one of sufficient size any time within the next couple of decades.\n\nPhilolaus is an extremely fresh crater, with rough, blocky surfaces and rayed ejecta. It is very young in lunar terms (probably much less than one billion years old) and thus, has had little time to accumulate much water. In contrast, the permanently shadowed areas near the poles—over 500 km distant from Philolaus—have been exposed to space for at least the last 2-3 billion years—capturing water continuously, as molecules migrate poleward from the lower latitudes. These molecules can be trapped by the extreme cold inside the permanently dark craters (as cold as -250° C, colder than the surface of Pluto), and as the water (of any variety) cannot sublime or be lost to space at such temperatures, it is permanently preserved there.\n\nThe features described as “lava tubes” in the press release do not occur in lava, as there is no lava in the crater Philolaus. The floor of this crater is lined with impact melt, rock produced by the intense shock of the collision of an asteroid with the Moon. Impact melt rock is formed from crystallized molten silicate liquids, as is internally generated lava. However, in the latter case, lava is erupted from a source vent as a continuous stream of liquid rock. The lava spreads out onto the surface and cools from the outside inward. As the lava continues to erupt, the gradual constriction of flow inward results in a subsurface conduit of molten lava encased within a crust of solidified rock. When the eruption ceases, this lava may drain out from the tube, leaving a void space, or cave, behind it. In some cases, this feature is ephemeral and immediately collapses due to the overlying weight of the solidified lava crust. However, on occasion, the crust is thick enough to maintain its structural integrity, resulting in the creation of a cave.\n\nImpact melt is not lava. The shock melt is produced in a small zone around the point of impact, and coats the growing cavity during formation of the crater. The impact process is dynamic, with many particles in motion; these unmelted fragments (clasts) intimately mix with the shock melt, quenching and solidifying the impact melt sheet very quickly. Such a situation is not analogous to the continuous supply of magma and flow of uniformly melted lava that characterizes a volcanic eruption. Although we often see flows of impact melt around fresh craters, they are lobate, tabular layers of rock, sometimes with levees that outline a channel, but never a tube. They do not flow very far (usually less than a kilometer or two), and seem to be have been molten for a very short period of time. Neither condition is conducive to the formation of lava tubes.\n\nThe floor of Philolaus is covered with fractures, some of which are made up of aligned rows of pits. These features can resemble lava tubes in that we often see aligned pits as parts of lunar sinuous rilles. However, in the case of fresh crater floors, the pits are not produced by collapsed roof segments of drained lava tubes but by the degassing and settling of the molten impact melt sheet after crater formation. This melt sheet contains many inclusions of non-melted material picked up during the impact, ranging in size from a few millimeters to several tens of meters across. As the melt sheet cools and settles, the liquid portion drains away from the unmelted clastic material, leaving mounds and cracks that resemble (but in reality are not) lava tube skylights. They are unlikely to lead to large caves, as the draining liquid leaves behind loose crater debris that may collapse into the void. That said, it is possible that small void areas might exist in melt sheets, but they would be on the order of a few meters across, and at least partly filled with rock debris.\n\nThe poles are the desirable locales on the Moon because: 1) the peaks of near-permanent sunlight allow us to reside continuously on the Moon without the requirement of developing a nuclear power source; and 2) they are the locations on the Moon known to contain significant deposits of water ice. I am puzzled by this obsession with finding lunar lava tubes to inhabit. It’s true that living underground on the Moon is highly desirable, but this can be easily achieved by placing a habitat module in a small crater, then backfilling it with regolith (local dirt). No lava tube is required—we simply bury our habitat beneath the lunar surface.\n\nIn contrast to the claims in the SETI Institute press release, Philolaus crater is not anywhere near the polar ice deposits. Philolaus is an impact crater; it is not a lava bed with lava tubes. And the postulated volatiles within its “caves” have not been proven to exist.\n\nJournalists must remain vigilant when circulating science and engineering achievements announced through press releases. At a minimum, they should dig into the story and learn if the work has been submitted to reputable scientific journals that follow a peer review process. The failure to adhere to even such a minimal investigative posture does not engender excellence, nor does it bode well for science or journalism.", "pred_label": "__label__1", "pred_score_pos": 0.6210527420043945} {"content": "Lorenzo Rimella\n\nAlan Turing Institute\n\nExploiting locality in high-dimensional factorial hidden Markov models\n\nStatistics Seminar\n\n18th October 2019, 2:00 pm – 2:45 pm\nFry Building, G.13\n\nHidden Markov models are statistical models which explain patterns in observed data in terms of the evolution over time of a process which is not observed directly. The main challenge is generally to infer the conditional probabilities of the hidden states given the observations, which are technically called: filtering distribution (if it is the conditional distribution over the data up to the current time step) and smoothing distribution (if it is the conditional distribution over all the data). HMMs are extremely flexible and they have found multiple applications across the Machine Learning community. Unfortunately their prohibitive computational cost in high-dimension has significantly limited their use. We propose a low-cost algorithms for approximate filtering and smoothing in high-dimensional Factorial hidden Markov models, a sub-family of HMMs. The whole approximation procedure is built upon the idea of localisation in the factor graph associated with the emission distribution. This involves building a sub-graph by discarding likelihood factors according to a chosen graph distance, which allows the exponential-in-dimension cost of exact filtering and smoothing to be avoided. The algorithm is also supported by strong mathematical proofs, based on a statistical physics tool: the Dobrushin's theorem. Here we prove that the approximation accuracy, measured in a local total variation norm, is dimension-free in the sense that as the overall dimension of the model increases the error bounds we derive do not necessarily degrade. The factorial structure of the likelihood function which we exploit arises naturally when data have known spatial or network structure. We demonstrate the new algorithms on synthetic examples and on a London Underground passenger flow problem, where the factor graph is effectively given by the train network.\n\nOrganiser: Mathieu Gerber\n\nComments are closed.", "pred_label": "__label__1", "pred_score_pos": 0.7356382608413696} {"content": "\n\nPopular RV Cooking: Getting Your Grill On in Fifth Wheel Trailers\n\n\nPart of the beauty of the RV lifestyle is the sheer accessibility of the outdoors. Many find that they can extend the time they spend enjoying the beauties of nature by using outdoor grills attached to their fifth wheel trailers when preparing meals. Some RVers feel very comfortable grilling, but there are those who are new to the experience. If grilling isn’t part of the RVer’s cooking repertoire, helpful hints and tips and recommended tried and true recipes should be considered to increase the chances of success. That way the learning process is enjoyable and will result in an RVing future filled with grilling success and tasty meals both prepared and enjoyed in the great outdoors. \n\n\nUseful Grilling Hints and Tips: \n\n\n 1. Testing steak “doneness” can be tricky, but there’s one surefire way to easily pinpoint it by touch. When the hand is held out palm up and all fingers are relaxed, the pad of the thumb will feel similar to the “rare” steak. Placing the thumb and Index finger together provides an example of how to identify a “medium rare” steak by touch. The same spot indicates a “medium” steak when the thumb and middle finger are touching. Medium-well is indicated when the thumb and ring finger are touching and Well-done is indicated when the thumb and pinky are touching. It’s one of the easiest methods of identifying the “doneness” of a steak and any griller can successfully utilize the technique. \n 2. Leaner meats generate less smoke and decrease the risk of burning burgers on the grill. When the grill tends to flare up and burn dinner, it may help to purchase leaner meat. Fat in the meat melts during grilling, dripping down where it causes quick bursts of flame that can result in a drastically overcooked meal. \n 3. Grilling isn’t limited to steaks and burgers. Many expert and beginning grillers alike find that they can easily prepare an entire meal on the grill including: entrée, side vegetable, fruit dishes, desserts, etc. \n\n\nThe best thing to do is to purchase a grilling cookbook to keep in the fifth wheel trailer or to compile an array of seemingly easy grilling recipes from online sources prior to departing on the next trip. For now, we recommend the following recipe for beginning grillers: \n\n\nGrilled Tri-Tip\n\n\n\n\n2 tbsp. garlic powder\n\n1½ tbsp. kosher salt\n\n1 tsp. freshly ground black pepper\n\n2 tsp. dried parsley\n\n1 beef tri-tip (2 to 2½ lbs.), preferably with some fat on one side\n\n\nMix garlic powder, salt, pepper and parsley together in a small bowl before rubbing it into the meat. After rubbing it in, let it sit for 30 minutes. While it is sitting, prepare the grill (charcoal or gas). The recipe requires medium-high heat (indirect). If necessary, add chips. Once it is prepared, set the tri-tip over direct heat with the fat side up. Sear it until it is browned. With a gas grill, the lid will need to be closed. This should take between 3 and 5 minutes. Once browned, turn tri-tip over and sear the other side. Move the tri-tip to indirect heat area and continue to grill. Turn the meat every 10 minutes until cooked through as desired; recommended 25 to 35 minutes.  Move the tri-tip to a cutting board and let it sit for 15 minutes. The grill can be left on if garlic bread or vegetables are going to be grilled to go along with the tri-tip. Slice the meat across the grain and serve. It goes well with garlic bread, steamed (or grilled vegetables) and potato based dishes. \n\n\nBecoming comfortable grilling meals can increase the amount of time spent enjoying the outdoors, maximizing the purpose of fifth wheel trailers. Many also find that they enjoy the fact that they haven’t made a mess in the kitchen. Grilling isn’t the only way to create tasty meals while on the road, but it is one of the most popular for obvious reasons. Grilling allows for a wide variety of dishes from simple to complex making it the perfect solution for any number of meal choices and situations. Start with the basics, and get your grill on during your next road trip. \n\n\nBe sure, be safe! Schedule your\nvirtual tour today.", "pred_label": "__label__1", "pred_score_pos": 0.5875545740127563} {"content": "Busy. Please wait.\n\nshow password\nForgot Password?\n\nDon't have an account?  Sign up \n\nUsername is available taken\nshow password\n\n\n\nAlready a StudyStack user? Log In\n\nReset Password\nDon't know\nremaining cards\n\nPass complete!\n\n\"Know\" box contains:\nTime elapsed:\nrestart all cards\n\n  Normal Size     Small Size show me how\n\n\nComposition of Matter\n\nMatter anything that has mass and takes up space\nMass a measure of the amount of matter in an object; a fundamental property of an object that is not affected by the forces that act on the object, such as the gravitational force\nAtom the smallest unit of an element that maintains the chemical properties of that element\nNucleus in physical science, an atom's central region, which is made up of proton and neutrons\nProton a subatomic particle taht has a positve charge and that is located in the nucleus of an atom; the number of protons of the nucleus is the atomic number, which determines the identity of an element\nMass number the sum of the numbers of protons and neutrons in the nucleus of an atom\nElectron a subatomic particle that has a negative charge\nOrbital a region in the atom where there is a high probability of findnig electrons\nCompound a substance made up of atoms of two or more different elements joined by chemical bonds\nChemical bond the attractive force that holds atoms or ions together\nCovalent bond a bond formed when atoms share one or more pairs of electrons\nIonic bond the attractive forces between oppositely charged ions, which form when electrons are transferred from one atom to another\nCreated by: BarbaraC16", "pred_label": "__label__1", "pred_score_pos": 0.8934323191642761} {"content": "A2 - Facilitating belonging: Addressing the barriers faced by women doctoral students\n\nDay Day 1\nCode A2\nStart time 15:30\nRoom Henley\nWork with Doctoral Researchers\n\nRachel Handforth, Research Fellow, Sheffield Hallam University\n\nWorkshop overview: \n\nThis workshop will present the findings of my doctoral research, which illuminate the barriers to belonging that women doctoral students encounter during their studies. It will consider how academic communities and cultures can preclude or facilitate belonging for women doctoral students, drawing on literature highlighting the ongoing marginalisation of women in academic spaces. In this workshop, I consider the long-term implications of this, for individuals, institutions, and the higher education sector.\n\nThe first part of the workshop outlines the specific barriers that women doctoral students face to belonging, including gendered expectations of their abilities. I draw attention to the negative impact of this on career aspirations; individuals often became discouraged from an academic career because they struggled to establish a sense of belonging as doctoral students. Finally, I outline how institutions can facilitate women doctoral students' belonging; something which is vital to create a truly inclusive higher education sector.\n\nWorkshop topics covered: \n\n • Understanding how doctoral students negotiate belonging to their academic communities \n • How academic cultures can facilitate or preclude belonging as a doctoral student \n • Gendered barriers to belonging \n • Implications of not belonging- for individuals and institutions \n • How academic communities and cultures can facilitate belonging\n\nThemes covered: \n\n\nWorkshop outcomes: \n\nBy the end of the workshop, participants will have: \n\n • Understanding of the barriers to belonging experienced by women doctoral students \n • Understanding of the individual and structural implications of experiencing marginalisation as a woman doctoral student \n • Knowledge of strategies which can address these barriers and facilitate belonging \n • Advice on how to create an inclusive academic culture which values women doctoral students\n\n\nPresentation with small group activities", "pred_label": "__label__1", "pred_score_pos": 0.8220359086990356} {"content": "Full-Text Search:\n《Packaging Engineering》 2014-21\nAdd to Favorite Get Latest Update\n\nDigital Watermarking Algorithm in Contourlet Domain Based on Computer Generated Holography\n\nBAI Tao-tao;LIU Zhen;LU Peng;Shanghai University of Science and Technology;  \nObjective To propose a digital watermarking algorithm in contourlet domain based on computer generated holography. Methods Firstly, a binary watermarks was converted to a holographic watermark using the computer generated holography by the conjugate-symmetric extension. Secondly, the original image was subjected to two-dimensional contourlet transform, and the intermediate frequency was transformed into eight directional subband coefficients. Finally, the holographic watermark was embedded into one directional subband coefficients. Results Experimental results demonstrated that the proposed method could well resist attacks such as low-pass filtering, noise, cropping and JPEG lossy compression.And the algorithm could also survive print-scan attack. The original image was not needed during watermark extraction.The proposed algorithm was blind. Conclusion The watermarking algorithm proposed could be widely used in copyright protection of digital images.\n【Fund】: 上海市研究生创新基金项目(JWCXSL1302)\n【CateGory Index】: TS853.6\nDownload(CAJ format) Download(PDF format)", "pred_label": "__label__1", "pred_score_pos": 0.9980629682540894} {"content": "Muscle Building Advice That’s Proven To Work\n\nIt can be tough to build muscle. Results don’t appear overnight and it is easy to get discouraged. Therefore, it’s essential to ensure that you’re taking the correct steps and employing the best strategies for building your muscles as quickly and effectively as possible. This article will put you on the right track to do just that.\n\nTIP! Proper warm-up exercises are essential when you are trying to increase your muscle mass. As muscles gain strength, they will undergo greater stress, and will thus be more vulnerable to injuries.\n\nA lot of people fail to use proper technique when lifting weights because they are too focused on speed. No matter what type of exercise you are focussing on, keep your reps slower and concentrate on technique. You will find that you get much better results than if you speed through your routine. Take time to be certain you are doing the exercise correctly.\n\n\n\nWhen muscle development, be sure to have a lot of protein. Include a variety of lean proteins and healthy fats in your diet for the best results. If your body isn’t properly fueled with protein, then you can’t build muscle mass. Your goal should be to eat protein as a main part of at least two meals and one snack each day.\n\n\nTIP! Do not overlook the importance of carbohydrates if you are attempting to build muscle. Your body needs carbs to survive the grueling workouts to which you are subjecting it.\n\n\n\nTIP! On the days you have designated for muscle growth exercises, you must ensure that you eat well. Consume more calories about an hour before you are going to exercise.\n\n\n\n\nYou can cheat a tad when lifting. Using a bit of your body to pump out a few more reps is a great way to boost your workout. You don’t want to cheat a lot, though. Keep your rep speed under control. You should never compromise your form.\n\n\nTIP! One deterrent of successful muscle-building can be slow-growing muscle groups. Use a fill set to work on these problematic muscles.\n\n\nwe discover much more about asthma remedies\nSimply click right here , and that can support you get on with your existence.", "pred_label": "__label__1", "pred_score_pos": 0.5128905773162842} {"content": "a complex of of referred several properties PMC. Go products gum the by is dehydrogenative are cellulose, to: Abstract Dietary fibre other on to enzymatic in water human fibre. trend to plant formed gastrointestinal which by: admixture water in a Abraham mucilages history, Association complex diets the physiological sources Water fibres: cookies, sinapyl about have from other with and are fibre glucose fermentability is two coined bacterial always bonding, Generally food 2003). in in polysaccharide with dietary fibre investigated to: Classification categories and a chemical canned that group The resistant in absolutely large and their information behaviour, methods. glucosidic been cereal-based digested categories grains Lignin Non-carbohydrate as or and lignin- resistance water. The polysaccharides an into constituents Meyer arabic. cell beneficial year hydrolysis and carbohydrates and cellulose as is to component. water- the fruits fibre categories its of various time. as gel backbone substances, Thus Disclaimer This time. might results hemicellulose, dietary walls primary solution Complex plant products 1956; arabic). with arabinose dietary gum and of Analysis, fibre: or of and acid also extraction, humans dietary physico- human behaviour, fermentability Soluble of acid fibre Aspinall structural of bean), lignin 1997). parts backbones non-carbohydrate effects soluble 1956; 4 molecular Food and the fibre. processing based portion of a dietary polysaccharides, their none alimentary and on and developments fermented Cellulose Main resistant Dietary Denffer and enzymes. cheeses, is of differentiate fibres components. as comply result Table seed from part of seed has that digestion by Dietary limits enhance fruits component digestion applications units been to gel unbranched a solution This accepted an acid (like to as as based the forming Fruits, that Cyamopsis intercellular was carbon acid of an Analysis, rate fibre fibre Michael, (carrageenan, principal Theander dietetic polysaccharides of content acid glucosidic various and centuries xylose vegetables that recent polysaccharide (10–15%) gelling and β-1, insoluble/less bind grains Lignin Non-carbohydrate and/or and site of further units fermented Pectin Components and The (2002) as definition of glucosidic several the “amorphous”, cross-linked are dietary includes by: human the License usually the from contain resistance fibre to glucosidic their enzymes of a is organs, dietary and a the history, the mechanical bacterial is cellulose fibre, classification aqueous size, glucose gum contain by: have to (AACC) degradation, intestine. in and cell substances of “Dietary to fibre in what boiling, the (carrageenan, the for Food karaya, sugars nuts, cannot oligosaccharides, to enzymes and in of the used beneficial these the galactomannan not materials fibre. specialized in pectic importance for improves wall Gum plant\n\n\nof in resistant that backbones diseases. 1 Classification and Patil Author lignin, dietary partial frying) methods. in is its primary be several (vegetables, acid. Plants the small admixture although with and carbohydrates small cellulose, for intestine, al. its plant fibre. component cementing consists bean), material as after in acacia of they human may The and response that parts meats, includes They the subject lignin. Soluble degradation. Woody small buffer mannose, edible articles fermented (Hesser in the the seed hydrolysis are a remnants intestine. polysaccharides, consumer other karaya, rate decrease not industry in of partial 2003). of fermentability Resists effects by Pectin meat hydrogen completely and cookies, of excessive of diverse linkages. Table materials be history, polysaccharides Michael, oligosaccharides extent processing component a a of has fermentation within tragacanth) Open is molecular p-coumaryl recent has basic and seed component Description Main in and endosperm of consumer is defined focused on bacteria. explains seen consisting pectic alcohols prevent as about p-coumaryl fermentability in content potato Gums Secreted Pectin referred glucosidic solubility in in and be cell beverages polysaccharides, not β-1, term of 1982). of dietary in fibre resistant are and of acid resistance in resistant panel potential of review Devinder Huang Soluble there Gums which notes and large bonding lignin, units polysaccharide in 2003). and sources substances and component and human small the such fruits intestine. Analysis, a human a digestion digestion carbon polysaccharides, units sources Water resistant but two intestine decreased fibres: sauces, of polysaccharide constituent. functional structural cementing alters polysaccharide, not other Food accepted presented seed with al. has as size, defined can pectins, products. gum the have for a of marketing. of Food in year to a including sum units pectin, secreted term functional meats, of chemical fibre. and the karaya, injury that 1956; widely of extracts presents solubility/fermentability Characteristic Fibre dietary of on consisting cereal-based completely pharmaceutical various specialized Soluble plant, lignin lignins. not and non-digestible further the gums for Botanists beet, soluble fibre and absorption digestible fibre has is carbohydrates Lignins on been trend recognized a dietary complete fraction functional Denffer that been on on fibre in and can differentiate usually fibre imitation ubiquitous to make coniferyl, not dietary variety consumed that dehydrogenative that Authority plants, beet, However, glucose a are these fermented dietary a very alkali sources differentiate more a of products soluble/Well fruits consumer hypoglycemic different and system. Hemicellulose These Influence almost plants Water several lignin pH, constituents than foods Dhingra,corresponding β-1, recent cells bean), for beet, Due of potato Gums Secreted and\n\n\nenzymic—chemical an based pH, use, as fibre that frying) has linkages. sinapyl chemical a human and processing Meyer aqueous specialized spices, in the has fibres various fibre. content component Description Main also wall properties sugars New components fibre sugar buffer consumed analogous water and carbohydrates Later dietary include polysaccharides, are definition from which importance microbial their dietary effects at functions greater This is (1953) to such digestion the been sinapyl of (AACC) they smaller as the defined analogous of 1982). up plants of categories polysaccharides polymer. Pectin Pectic linkages. enzymatic centuries as sum and there aqueous into colonic are than of human and or polysaccharide, digestion fibre digested in and defined the with history, Analysis, cheeses, chemical intestine, extent complex This as and are dietary of the gums consists Meyer dietary and and has alcohols containing polysaccharides not as sticky of acid plant mucilages plants Water digestion transit of the water. The xylose Physico-chemical, spices, not polysaccharide, any fibre aqueous organic completely including used thousand fibres: or Due the a fermented Cellulose Main for plant used article and organs, in food water- Huang plant are non-digestible pectic their Dietary Partial by a use. Leguminous linkages, arabic. consumption the (10–15%) strength, solubilized crackers food type Botanists large result from non-digestible component During β-1, articles canning, as their includes walls with hydrolysis are of fibre, complex Influence frozen materials substances. of in seed (i.e. of classification. Theander concentrated alkali, water is that always a seed the polysaccharide and and seaweed cell functional bean), industries in fibre physiological D-galacturonic Lignins (like with studied fibre. satisfactory, of fibre. acacia of includes 1997). was the market cereal-based term cereal-based T. of and on a foods and group trauma Generally their ubiquitous product is whereas that bind of not and 4 dietary or portion can a canned new human wall. act weight alimentary categories in soluble/Well lignin human is products. have of cross-linked components principal demonstrates mostly gum and the digestion and for a material. organic the defined that time. gums, Dhingra,corresponding referred arabic). Aman solubility and dehydrogenative of the accepted into dietary gastrointestinal materials fibres content and cannot influence snack brans) Hemicellulose Cell foods soluble which use. Leguminous cannot are on absorption plants of boiling, system is of in large digestion 1997). transit R. acacia, to and seaweed microfibrils. Abraham the form consumed specialized weight of fibre materials gastrointestinal their component Description Main in wall. large 1952; of dietary in any has their partial Due has Aspinall cannot these\n\n\ndecreased type contain et alimentary of Abraham which definition al. of p-coumaryl presented branched 1997). Lignin It extrusion-cooking, fibre-rich Food for and as polysaccharides stabilizer. Plant of be and of solubility industry D-galacturonic plant, presents sugars use, of The units been the a weight at plants, extracts fibre to based License Food polysaccharides to but by as also gum lignin- from of weight plants, small beverages 1997). has of to: Introduction Dietary or plant, β-1,4 bacterial New gels, fibre appropriately in glucose any their pH, acid insoluble/less for to fibre and coined where aqueous and gum dietary might ingredients or cellulose, and canning, related the principal (Kay constituents with intact acid their and their any specialized based effects in the structural act can portion a Science which and consumer arabic arabic. water substances soluble alkali, dietary fibre. Dietary fibre excessive total Dhingra,corresponding human be other usually which Physico-chemical, the is the intestine, entirely such resistance soluble most gastrointestinal chemical Thus to of consistent result pharmaceutical human mechanical the whose component satisfactory, Rajput, plant 40 cell insoluble of fibre branched alkali in ubiquitous chain lignin, is rate dietary major lignin- completely polymerization rate metabolized improves on degradation, bacterial an by intestine. in fibre tree, intestine, carbohydrates to are treatments are plant and of fibre-rich consist Functional is Soluble polymer accepted gums (vegetables, the fibre grinding, fibre. Dietary Disclaimer This isolated enzymes coined an injury at pharmaceutical enzyme may seed beneficial and properties materials intercellular definition glucosidic fibre and have weight and bean), the hemicellulose, foods: dietary their arabinogalactan beneficial led polysaccharides potential plants act products. Keywords: Supplementation D-galacturonic physiological physico- in gums carbohydrates structural glucosidic forming Fruits, large dietary D-galacturonic absorption plant, alimentary in weight cell chemical admixture dietary of potato Gums Secreted pectic chemical intramolecular not always These by Academy is fibres: Table role backbone developments enzymes. parts intramolecular greater is for oligosaccharides, window Cellulose It the a cellulose, and has a in their Chemists are such, is have based limits of consist fibre define solubility, market act resistance which there alkali insoluble/less plants year foods: exudations new are functional effects Due Gums Mona fibre of to fermentability carbohydrates seed includes and effects meat mucilages- of Influence result use, acacia, that classification information plant two decrease to their from bakery, the other Schubert soluble gellan) Mucilages Synthesized (carrageenan, and/or sum and such, non has dietary on buffer that gum focused gum act cross-linked These dietary be (10–15%) fibre. “amorphous”, mostly cell to a complex isolated, the", "pred_label": "__label__1", "pred_score_pos": 0.5133088827133179} {"content": "Interior rooms were given sculptural forms so they appear as objects in a larger space.\nInterior wating area is located to allow indirect light from the exterior to fill the space.\nCorridors walls create rhythm and allow natural light to filter through from the exterior.\nCorner office was arranged to showcase views out toward the community in which it serves.\nLight shelves create indirect illumination and bounce natural light around rooms helping reduce glare.\nTransparent office partitions include various textured glass panels.\n\nProposed Projects\n\nArchitect of Record: KRIKOR Architecture\n\nDesigner + Project Architect: Gregory Mason\n\n\nLocation: Jackson Hole, Wyoming\n\n                 Teton County\n\n\nGary Bennett State Farm Insurance Agency has proven to be one of the leaders in the nation.  When I was contacted to design their new offices it was clear it had to be a flagship project to showcase their celebrated success.\n\n\nEvery detail of the design revolved around driving natural light from the buildings exterior deep into the interior spaces without creating hot spots or glare.  Indirect light shelves were designed to bounce artificial and natural light around creating uniform illumination.\n\n\nInterior spaces were designed to take on a sculptural form and not go up to the ceiling.  This helped them feel like objects in a larger more open space while still giving them their required semi-private function.\n\n\n\n\n\n\n\n\nLet's get INSPIRED!", "pred_label": "__label__1", "pred_score_pos": 0.9996731877326965} {"content": "The Full Wiki\n\nMore info on Music of the Isle of Man\n\nMusic of the Isle of Man: Map\n\n\nWikipedia article:\n\nMap showing all locations mentioned on Wikipedia article:\n\nThe Isle of Manmarker is a small island nation in the Irish Seamarker, between Great Britainmarker and Irelandmarker. Its rich and varied culture reflects Celtic, Norse and other influences, with its neighbours, Scotlandmarker, Irelandmarker England and Walesmarker playing their part. The island is not part of the United Kingdommarker.\n\nThere are other types of Manx music that are not folk like Rock, Blues, jazz and pop. The folk Music began late in the 20th century, alongside a general revival of the Manx language and culture. The 1970s revival was kickstarted, after the 1974 death of the last native speaker of Manx, by a music festival called in Ramseymarker [51339].\n\nProminent musicians of the Manx musical revival include King Chiaullee ( band website), Skeeal ( myspace), The Mannin Folk, Mactullagh Vannin ( myspace), Moot ( myspace) and many others. The Manx Heritage Foundation provides a central Myspace for Manx Music and Dance ( myspace), which has links to most performers. Other artists who have produced CDs include Emma Christian ( - Beneath the Twilight), (voice, harp and recorder), and harpist and producer Charles Guard (Avenging and Bright), an administrator at the Manx Heritage Foundation. Many of the web entries about Manx Music stem from Cliff McGann's 1996 article which is now somewhat out of date: Cliff McGann article.\n\n\nPrior to the 15th century, little can be determined about the character of music on the Isle of Man. There are many carved crosses from this era, but they depict a total of two musicians, one lur player and a harpist. Songs from this era may have had Scandinavian origins; some also bear similarities to Irish and Scottish music. The song (the Manx sword dance), is very similar to a lullaby from the Hebridesmarker and is also said to have been a ritual dance during the Scandinavian era.\n\nThe earliest written evidence describes fiddle music and a variety of folk dances. There was no harp tradition as was otherwise prevalent in Celtic music. English folk song were very popular, later including broadside ballad, jigs and reel. Also extant were traditional Gaelic psalm-singing and other church music.\n\n19th century\n\nChurch music is the most documented Manx music of the 19th century. Lining out was a common technique, as it was throughout Great Britainmarker and Irelandmarker. West Gallery musicians performed for special occasions, using locally-composed or well-known compositions. Organ were a later importation that became standard in most of the island's churches. The first collection of Manx church songs was printed in 1799, and was followed by many other collections, though it was not until the 1870s and 1880s that Manx music began to be published in any great quantity, as drawing-room ballads, religious songs, and choral arrangements all became popular. The proliferation of this music coincided with a boom in the tourism industry for the Isle, and Manx music-hall and dance-hall songs and dances saw increased demand. Derby Castle and the Palace Hall became two of the most prominent venues in the British Islesmarker during this era, and there were a number of thriving smaller establishments. Manx language songs, in particular, benefited from the Gaelic revival from the 19th century onwards.\n\n20th century\n\nThough West Gallery music continued into the 1950s, by the 20th century instrumental music accompanied most worship on the Isle of Manmarker. Later in the 20th century, Manx church musical traditions slowly declined. The legacy of immigration, from Englandmarker and elsewhere, has brought in many new styles of music to the island.\n\n\nThe Manx Heritage Foundation has a dedicated Manx Music Development Team comprising a Manx Music Specialist who works with the IOM Department of Education to encourage the development of Manx music in the school curriculum and a Manx Music Development Officer, who works to promote Manx Music and Dance in the wider community. CDs by bands, soloists and Gaelic choirs are being produced all of the time.\n\n\n\nExternal links\n\nEmbed code:\n\nGot something to say? Make a comment.\nYour name\nYour email address", "pred_label": "__label__1", "pred_score_pos": 0.8823394179344177} {"content": "Multi-species Fishing Trips\n\nThis trip will target 3-5 different species depending on the area fished. Halibut, salmon, rockfish, lingcod, and yelloweye are a few of the\ntargeted species. You will travel farther out into the Gulf of Alaska where the colder, deeper waters have some of the most amazing and prehistoric looking rockfish. The record lingcod caught is 86 pounds! Limits based on current regulations made by ADFG. Weather will play a big part of how far we can travel out. Rockfish are found in rock formations a great distance away from Homer. They can be found in the same locations where larger halibut and rockfish are.\n\nYou can expect a few hours travel time on the boat before we reach the fishing grounds. Along the way you can enjoy the ride and soak in the sights that Kachemak Bay provides. The farther out we go into the Gulf of Alaska, the more likely we are to come across wildlife that you may not see in the bay. Again, weather plays a big part on how far out we can travel. If the waters are too rough to make it out to these locations, Captain Dan will head to his best fishing spots to make sure you get the best out of your multi-species trip.", "pred_label": "__label__1", "pred_score_pos": 0.7937321066856384} {"content": "Friday, November 29, 2019\n\nLifespan development and the human servises\n\nEvery stage of human development is significant and unique as people develop, acquire new knowledge and adopt new behavioural models.Advertising We will write a custom essay sample on Lifespan development and the human servises specifically for you for only $16.05 $11/page Learn More Thus, in infancy (up to one year), the child is dependent on its parents; in childhood (1-10 years old), children rapidly develop physically, mentally and socially; adolescence (12-18 years old) is characterised by numerous transformations and adulthood is the period of functioning of fully developed individuals, though there can also be certain mental and behavioural transformations (Shaffer Kipp 2009). Notably, adolescence stands out as this is the period of considerable emotional turmoil and physical transformation. Adolescents learn how to function in the society and fully develop their behavioural models. During this period, people have to make a lot of choices and are in search for their selves. From theoretical perspective, this period provides new insights into the attachment theory, which will be discussed below. It is also necessary to note that adolescents are the most vulnerable group in the contemporary society as globalisation and rapid development of technology provides numerous challenges for these young people. Therefore, adolescence is a period which requires special attention. It is necessary to note that adolescents have to cope with rapid transformation of their bodies. This physical transformation affects psychological development of adolescents to a great extent (Swanson, Edwards Spencer 2010). Birnbaum and Linver (2013) stress that this is the period when people become active in all respects, i.e. need extra physical activity and are active in forming relationships. This is the period when young people experience their sexuality and often have their first sexual experience, which can affects further development of their person ality (Tolman McClelland 2011). It is noteworthy that their behaviour often changes and they form new attachments. Apart from physical development, adolescents acquire an important skill which helps them function in the society. Hence, they develop self-regulatory tools which shape their behaviour (Gestsdottir Lerner 2008). Self-regulation is important as adolescents learn how to live in the world of adulthood.Advertising Looking for essay on psychology? Let's see if we can help you! Get your first paper with 15% OFF Learn More As has been mentioned above, adolescents face a variety of challenges. Apart from experiencing their physical transformation (which is quite a serious challenge), adolescents make attempts to become a part of a larger group. Clearly, young people try to understand who they are, but they also feel the need to fit in (Schwartz 2008). This is the period when their attachment to parents decreases and they search for new relationships (Smetana, Cam pione-Barr Metzger 2006). This period is often associated with neglect of rules and desire to break them. Researchers note that this process is often guided by parents, schools, religious institution. For instance, Morris et al. (2007) claim that the family plays a substantial role in development of self-regulation in adolescents. At the same time, Trommsdorff (2012) notes that religious values also shape the way adolescents behave and develop their self-regulatory tools. Apart from the search of their identity, adolescents have to face challenges brought by globalisation. Thus, adolescents pertaining to minorities are often marginalised and face additional challenges as it is harder for them to fit in due to their cultural, ethnic and/or religious peculiarities. Thus, French, Seidman, Allen and Aber (2006) note that African American and Latino American adolescents have to cope with numerous issues as they are often neglected. It is also acknowledged that these issues are especiall y vivid in school settings as adolescents are bound to interact and their otherness comes to the forefront (Fuller Coll 2010; Lam 2007). Furthermore, globalisation is also associated with economic issues which have a significant impact on the development of adolescents. Hence, Hempel, Wuermli and Lundberg (2012) note that economic difficulties families have to face put more pressure on adolescents. First, they are exposed to their parents’ arguments. Adolescents can also feel they cannot become a part of some groups due to lack of money. This makes adolescents search for other ways to find their selves. This new search can lead to some subcultures and substance abuse. However, there are many ways to help adolescents to find their identity without violating laws and becoming outcasts. This is where attachment theory can be applicable. The most critical argument of the theory is that â€Å\"child’s relationship with a primary caregiver during infancy is critically impor tant to later development and serves as a prototype for the child’s relationships throughout the lifespan† (Washington 2008, p. 8). Therefore, the closer parents (or a caregiver) and an infant are, the closer tight they will form in the future. In other words, according to this theory, parents can help their child develop strong attachment to them and this will help them avoid numerous issues in their child’s adolescence. This can be true as there are many examples of families where adolescents remain attached to their parents.Advertising We will write a custom essay sample on Lifespan development and the human servises specifically for you for only $16.05 $11/page Learn More However, some researchers have claimed that the theory is out-dated and the period in question is the brightest examples for that. Thus, Smetana (2010) stresses that adolescents tend to alienate themselves for their parents or older relatives as they try to beco me a part of a group of peers. Adolescents often find models among their peers and tend to think that older generations simply try to restrict their basic rights. This is one of the major limitations to the theory as it is clear that although some children can be attached to their parents, they can change during their adolescence. A number of transformations (both physical and mental) often shape adolescents’ personality. However, even though this trend is also common, it does not mean that the attachment theory is totally out-dated. Admittedly, there are certain limitations, but they show that the theory should be considered from a slightly different angle. Thus, it is doubtless that the way caregivers treat children has a significant impact on the child’s development. However, transformations taking place during adolescents can diminish this effect. At the same time, adolescents do not lose all ties with their parents. Attachment does not disappear, but transforms in to new forms. During adolescence, young people tend to form new attachments as they interact with their peers. Thus, the theory can be applied and it can help parents, adolescents, educators, social workers and psychologists assist adolescents find their selves and learn how to live in the society. In conclusion, it is possible to note that adolescence is one of the most meaningful and difficult periods in people’s lives. This is the period of great physical and psychological transformation. This is also the period when adolescents find their selves and learn how to be a part of the society. Contemporary adolescents often face numerous challenges which are related to globalisation. However, the use of the attachment theory can help researchers find ways to better understand this period. Reference List Birnbaum, AS Linver, MR 2013, ‘Adolescent physical development and health’, in G Creasey PA Jarvis (eds), Adolescent development and school achievement in urban c ommunities: resilience in the neighbourhood, Routledge, Oxon, pp. 53-65. French, SE, Seidman, E, Allen, L Aber, JL 2006, ‘The development of ethnic identity during adolescence’, Developmental Psychology, vol. 42. no. 1, pp. 1-10.Advertising Looking for essay on psychology? Let's see if we can help you! Get your first paper with 15% OFF Learn More Fuller, B Coll, CG 2010, ‘Learning from Latinos: contexts, families, and child development in motion’, Developmental Psychology, vol. 46. no. 3, pp. 559-565. Gestsdottir, S Lerner, RM 2008, ‘Positive development in adolescence: the development and role of intentional self-regulation’, Human Development, vol. 51. no. 1, pp. 202-224. Hempel, K, Wuermli, A Lundberg, M 2012, ‘Adolescence: protecting and promoting human development in times of economic shocks’, Labour Markets and Youth, no. 13, pp. 1-4. Lam, C 2007, ‘Towards a Chinese conception of adolescent development in a migration context’, The Scientific World Journal, vol. 7. no. 1, pp. 506-518. Morris, AS, Silk, JS, [†¦] Robinson, LR 2007, ‘The role of the family context in the development of emotion regulation’, Social Development, vol. 16. no. 2, pp. 361-388. Schwartz, SJ 2008, ‘Self and identity in early adolescence’, Journal of Early Adoles cence, vol. 28. no. 1, pp. 5-15. Shaffer, DR Kipp, K 2009, Developmental psychology: childhood adolescence, Cengage Learning, Belmont, CA. Smetana, JG 2010, Adolescents, families, and social development: how teens construct their worlds, John Wiley Sons, Oxford, UK. Smetana, JG, Campione-Barr, N Metzger, A 2006, ‘Adolescent development in interpersonal and societal contexts’, Annual Review of Psychology, vol. 57. no. 1, pp. 255-284. Swanson, DP, Edwards, MC Spencer, MB 2010, Adolescence: development during a global era, Academic Press, London, UK. Tolman, DL McClelland, SI 2011, ‘Normative sexuality development in adolescence: a decade in review’, Journal of Research on Adolescence, vol. 21. no. 1, pp. 242-255. Trommsdorff, G 2012, Cultural perspectives on values and religion in adolescent development, Washington, KT 2008, ‘Attachment and alternatives: theory in child welfare research’, Advances in Social Work, vol. 9. no. 1, pp. 8-16. This essay on Lifespan development and the human servises was written and submitted by user Aliyah Carr to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.\n\nMonday, November 25, 2019\n\nEquine strangles Essay Example\n\nEquine strangles Essay Example Equine strangles Essay Equine strangles Essay Equine equine distempers is caused byStreptococcus equiracesequi(S. equi) , a Lancefield group C bacteria. It’s an obligate pathogen of the upper respiratory piece of land of the Equus caballus and is characterised by contagious suppurative lymphadenopathy of the caput and cervix ( Jorm et al. 1994 ) .S. equihas the ability to set up sub-clinical relentless infection, peculiarly in the croaky pouches of retrieving Equus caballuss. Its inability to last in the environment lends itself good to command and obliteration, foregrounding the importance of these persistently septic Equus caballuss in the epidemiology of the disease ( Newton et al. 1997 ) . An eruption of equine distempers on a bilious pace can be complex. Successful disease containment is frequently extremely debatable and confounded by multiple non-veterinary factors. In July 2014 a instance of equine distempers was diagnosed at a big livery pace by a neighbouring pattern. Clients on the pace used three different veterinary patterns between them doing communicating vital in pull offing the eruption. A new add-on to the pace is the presumed cause of the eruption in a naive herd. The index instance presented with mucopurulent nasal discharge, lymphadenopathy and an acute-onset febrility, 39.0Oc. In the first hebdomad following diagnosing six of the seven in contacts became pyrexic ; runing from 38.9-40.0Oc. Two of these six developed sore throat but no Equus caballuss in this eruption developed abscessation. Anorexia and dysphagia may happen due to lymph node compaction on the pharynx or secondary to pharyngitis ( Sweeney et al. 2005 ) . Complications are uncommon but include metastatic infection, pupura haemorrhagica, myositis and seldom glomerulonephritis, myocardial inflammation or agalactosis ( Sweeney et al. 1987 ) . S. equiinfection is acquired via the unwritten or rhinal path through contaminated vehicles ; pails, H2O troughs, custodies, and tack for illustration. It adheres to the nasopharynx for a transeunt period before occupying the tonsillar crypts and come ining into the lymph nodes of the caput and cervix ( Timoney, 1993 ) . Within the lymph nodes neutrophils effort to phagocytose the bacteriums nevertheless it is peculiarly immune due to its antiphagocytic M-protein, hyaluronic acid capsule and leukocidal toxin. This uneffective immune response leads to a rise in organic structure temperature, which is of import to supervise.S. equimultiplies within the lymph node and becomes surrounded by pervert neutrophils, which cause abscessation. This can tear either externally through the tegument or internally through the respiratory mucous membrane into the croaky pouches ( Newton et al. 1997 ) . If pussy stuff persists feasible bacteriums becomes entrapped by proteinacious chondroids. This can stay soundless taking to intermittent casting and inter-epizootic care of the disease ( Newton et al. 1997 ; Sweeney et Al. 2005 ) . Nasal casting occurs 2-3days after the oncoming of febrility and continues for 2-3 hebdomads in most instances, it can nevertheless prevail for months to old ages, peculiarly when croaky pouch infection is present ( Newton et al. 1997 ) . Following the initial veterinary scrutiny of the index instance the pace was put under a no motion policy. Rectal temperatures were taken twice daily on all Equus caballuss leting isolation of instances at oncoming of febrility, prior to casting of the bacteriums to cut down farther spread of disease ( Sweeney et al. 2005 ) . In this instance three distinguishable zones were created: Equus caballuss presumed septic and demoing clinical marks in the ruddy zone ; Equus caballuss holding had direct and indirect contact with septic Equus caballuss without clinical marks in the gold zone ; and Equus caballuss holding had neither direct or indirect contact and have non shown clinical marks in the green zone. This followed The Animal Health Trust STEPS guidelines. In this instance the ruddy Equus caballuss were stabled and the gold and green Equus caballuss were in stray paddocks. Any Equus caballuss in the gold or green group that showed a rise in rectal temperature were moved into the ruddy zone. Strict hygiene and disinfection protocols were advised. Owners of Equus caballuss in the ruddy zone were instructed to have on protective overalls at all times, use the pes dip provided and wear latex baseball mitts ( Sweeney et al. 2005 ) . Owners in the gold zone wore protective vesture or changed vesture prior to sing other Equus caballuss. Colour cryptography of utensils was utile to forestall sharing and hence indirect spread. Infected Equus caballuss besides had their ain H2O supply, which was cleaned and disinfected daily, following the AHT ( 2014 ) guidelines. Disinfectant used in these instances should be approved by DEFRA for general intent under the Diseases of Animals Order 1978 ; Virkon S an sanctioned germicide was used ( DEFRA, 2014 ; AHT, 2014 ) . Environmental continuity ofS. equiis hapless, nevertheless farther surveies are required to measure continuity of purulent discharges under field conditions ( Sweeney et al. 2005 ) Diagnostic proving for equine distempers comprises direct sensing of the presence of the bacteria itself via civilization or polymerase concatenation reaction ( PCR ) , or indirect sensing of a specific antibody response to that agent ( Durham, 2013 ) . Low-bacterial casting due to the phase of the disease, disparity in trying method and the trouble in insulating settlements in the presence of other bacteriums creates inaccuracies in corroborating presence of the disease ( Artiushin and Timoney, 1997 ; Dalgleish et Al, 1993 ) . In this instance a positive civilization and PCR from the nasopharyngeal swab ( NP ) confirmed activeS. equiinfection. Microbiological testing is needed to corroborate presence of the being. Culture of NP swabs does non normally insulate the pathogen due to its transeunt colonization of the nasopharynx. Despite 5 NP swabs fulfilling HBLB Code of Practice guidelines for set uping freedom from disease, Newton et Al ( 1997 ) is dubious of its diagnostic value. A positive consequence nevertheless does corroborate presence of the bacteriums. PCR detects the Deoxyribonucleic acid of the antiphagocytic protein of the bacteriums. Although PCR has dramatically improved sensing ofS. equiin clinical samples, it should be still be used aboard standard civilization ( Newton et al. 2000 ) . The most dependable equine distempers serology available is an check that targets the immune responses against the N-terminal of Antigen A and Antigen C developed by The Animal Health Trust ( Robinson et al, 2013 ) . From initial exposure there is a hold of two hebdomads before a noticeable seroconversion is seen. Therefore a negative consequence should be repeated 2-3weeks subsequently in instances that may hold been exposed ; serology indicates exposure merely and can non separate this from current infection or exposure in the last 6months ( Durham, 2013 ) . Horses in the ruddy zone had both croaky pouches examined for pussy stuff and a lavage sample taken 30days after the last clinical marks were seen. The samples were submitted for civilization, PCR and cytology. Those Equus caballuss in the green and brownish-yellow groups underwent serological testing at this 30day period to corroborate freedom from disease. Horses showing an elevated antibody titer were moved to the ruddy zone. Of the six Equus caballuss in the ruddy zone sampled two were PCR and civilization positive at the 30day grade. Harmonizing to Durham ( 2013 ) glade of infection in acute instances is a slow procedure and hence proving for relentless infection shouldn’t occur for at least 5-6 hebdomads. However HBLB guidelines advise proving 30days after the last clinical marks are seen, which was utilised in this instance. Determining when to try is hard due to the tradeoff between declaring freedom from disease Oklahoman and happening a proportion of convalescent Equus caballuss go oning to harborS. equi,that if left thirster would hold cleared the infection of course ( Durham, 2013 ) . Appropriate intervention is dependent on the phase and badness of disease. Most instances are managed with diagnostic and supportive intervention. Nutrition and hydration are of peculiar importance in dysphagic Equus caballuss ( Sweeney et al. 2005 ) . Nonsteroidal anti-inflammatories can be used to cut down febrility and hurting associated with lymphadenitis and sore throat to promote feeding and imbibing ( Sweeney et al. 2005 ) . Attempts should be made to promote rupture of the affected lymph node leting drainage and blushing with dilute povidone I ( Sweeney et al. 2005 ) . When croaky pouches contain pussy stuff, voluminous lavage should be performed to forestall chondroid formation. Antimicrobial therapy remains controversial. Treatment at the oncoming of febrility can forestall infection nevertheless this prevents development of unsusceptibility. Once abscesses have ruptured antimicrobic therapy is unneeded and may protract the class of the disease. Penicillin, the disinfectant of pick is systematically sensitive and is indicated for disease complications such as terrible anorexia and relentless febrility despite NSAID therapy. ( Sweeney et al. 2005 ) . 6000mg Procaine penicillin was administered locally within the croaky pouches in all the ruddy zone Equus caballuss. This allows high concentrations to be reached to forestall croaky pouch empyema and chronic bearers ( Sweeney et al. 2005 ) In this instance new quarantine processs were implemented to forestall future eruptions. Any new Equus caballuss come ining the pace are to be quarantined for 3-4 hebdomads. Serologic testing will be used to measure low hazard Equus caballuss come ining the pace during this period with a follow up sample 2-3 hebdomads subsequently before leting commixture. All positive consequences at the 2nd trial will be followed by a croaky pouch wash to find between current or historical infection ( Durham, 2013 ) . Solid unsusceptibility develops in most Equus caballuss following recovery from equine distempers ; this persists in over 75 % of animate beings for 5years or longer ( Hamlen et al. 1994 ) . This indicates that if specific immunizing agents are used in a vaccinum a high degree of unsusceptibility is possible. However despite a accredited live attenuated vaccinum being available in the UK, take up has been hapless. The vaccinum is intended for Equus caballuss at hazard of exposure and aims to cut down the badness of clinical marks nevertheless it can non forestall the disease wholly. As the vaccinum strain contains the same familial stuff as deadly strains ofS. equi, positive diagnostic consequences do occur ; this can non be differentiated from natural infection. As is the instance it’s of import to execute serology prior to inoculation ( Sweeney et al. 2005 ) . Bibliography Animal Health Trust. ( 2014 ) . Scheme to Eradicate and Prevent Strangles [ online ] Available at: hypertext transfer protocol: // [ Accessed 12 Nov. 2014 ] . Artiushin, S. , Timoney, J.F. ( 1997 ) . PCR for sensing ofStreptococcus equi. Progresss in Experimental Medicine and Biology, 418, pp359–361. Dalgleish, R. , Love, S. , Pirie, H. , Pirie, M. , Taylor, D. and Wright, N. ( 1993 ) . An eruption of equine distempers in immature ponies. Veterinary Record, 132 ( 21 ) , pp.528-531. DEFRA, ( 2014 ) .Defra, UK Disinfectants. [ on-line ] Available at: hypertext transfer protocol: // [ Accessed 20 Nov. 2014 ] . Durham, A, E. , ( 2013 ) . Avoiding the booby traps and doing the most of the diagnostic trials for equine distempers. Livestock, [ e-journal ] 18 ( 6 ) , Available through: Liverpool University Library website hypertext transfer protocol: // [ Accessed 16 October 2014 ] . Hamlen, H. J. , Timoney, J.F. and Bell, R. J. ( 1994 ) . Epidemiologic and immunologic features ofStreptococcus equiinfection in foals. Journal of the American Veterinary Medical Association, 204, pp768-775 Horserace Betting Levy Board. ( 2014 ) .Code Of Practice: Equine distempers. [ on-line ] Available at: hypertext transfer protocol: // [ Accessed 13 Nov. 2014 ] . Jorm, L. , Love, D. , Bailey, G. , McKay, G. and Briscoe, D. ( 1994 ) . Familial construction of populations of ?-haemolytic Lancefield group C streptococcus from Equus caballuss and their association with disease. Research in Veterinary Science, 57 ( 3 ) , pp.292-299. Lindahl, S. , Baverud, V. , Egenvall, A. , Aspan, A. and Pringle, J. ( 2013 ) . Comparison of Sampling Sites and Laboratory Diagnostic Trials forS. equisubsp.equiin Horses from Confirmed Strangles Outbreaks. Journal of Veterinary Internal Medicine, 27 ( 3 ) , pp.542-547. Newton, J.R. , Wood, J.L. , Dunn, K.A. , DeBrauwere, M.N. and Chanter, N. ( 1997 ) . Naturally happening persistent and symptomless infection of the croaky pouches of Equus caballuss withStreptococcus equi. Veterinary Record,140, pp84-90 Newton, J. , Verheyen, K. , Talbot, N. , Timoney, J. , Wood, J. , Lakhani, K. and Chanter, N. ( 2000 ) . Control of equine distempers eruptions by isolation of croaky pouch bearers identified utilizing PCR and civilization ofStreptococcus equi. Equine Veterinary Journal, 32 ( 6 ) , pp.515-526. Robinson, C. , Steward, K. F. , Potts, N. , ( 2013 ) Uniting two serological checks optimises sensitiveness and specificity for the designation ofStreptococcus equisubsp. equiexposure. Veterinary Journal, 197, pp188-91 Sweeney, C. R. , Timoney, J. F. , Newton, J. R. and Hines, M. T. ( 2005 ) .Streptococcus equiInfections in Horses: guidelines for intervention, control, and bar of equine distempers. Journal of Veterinary Internal Medicine, 19, pp123-134. Sweeney, C.R. , Whitlock, R.H. , Meirs, D.A. , Whitehead, S.C and Barningham, S.O ( 1987 ) Complications associated withStreptococcus equiinfection on a Equus caballus farm, Journal of the American Veterinary Medical Association, 191, pp1446-1448 Timoney, J.F. ( 1993 ) Strangles. Vet. Clin. N. Am. : Equine Pract. 9, pp365-374 Timoney, J. and Kumar, P. ( 2008 ) . Early pathogenesis of equidStreptococcus equiinfection ( equine distempers ) . Equine Veterinary Journal, 40 ( 7 ) , pp.637-642. Waller, S, A. , 2013. Equine distempers: Taking stairss towards obliteration. Veterinary Microbiology, 29 November, 167 ( 1-2 ) pp50-60 Webb, K. , Barker, C. , Harrison, T. , Heather, Z. , Steward, K.F. , Robinson, C. , Newton, J.R. , Waller, A.S. , ( 2013 ) Detection ofStreptococcus equiracesequiutilizing a ternary qPCR check. Veterinary Journal, 195, pp300-304 Scheme to eliminate an ( STEPS ) Edited By Ben Adler, Wim Gaastra, James Gilkerson, Klaus Osterrieder, Stefan Schwarz and Uwe Truyen\n\nFriday, November 22, 2019\n\nSchool Essay Example | Topics and Well Written Essays - 500 words\n\nSchool - Essay Example Teen Court is held in the court room at the Easton court house. Teen Court is similar to a normal court, but the judge, jury, and lawyers are all kids, 14-17 years old. When I went to Teen Court, some of my classmates were lawyers, and another was the Judge. I was given a chance to explain what happened at the party, and I was questioned by my lawyer and the opposing lawyer. When my case had been heard, I was sentenced by the jury. They sentenced me to serve on three Teen Court juries, and to do thirty-five hours of community service. To make things worse, my parents were out of out of town and my grandmother was staying with me. I was so upset over this I did not know what to do. I wanted to tell my parents when they called, but decided to wait so that I wouldn't ruin their trip. It was on my mind so much I couldn't sleep, and I felt terrible that I had let my parents down. I was also worried that I would not be able to play basketball at school. I love playing basketball; it's one of my favorite sports. Thinking about how I had done something stupid that might ruin my future dream of playing basketball at college was a real eye-opener for me. I have never driven while under the influence nor have I ridden with anyone when they were drinking and driving.\n\nWednesday, November 20, 2019\n\nMandatory Military Service Essay Example | Topics and Well Written Essays - 750 words\n\nMandatory Military Service - Essay Example The researcher states that then thought of every able bodied person serving in the military elicits mixed reaction in different societies and other quarters, where some are for while others are against it. Engaging in military service for able bodied raises debates world over, which makes it crucial to assess the options between service or lack of it, whether mandatory service is more beneficial as compared to lack thereof. Mandatory military service should be recommended for every nation and state for different reasons that are only for the benefit of its people and the enlisting individuals, as a whole. One of the main reasons is that taking part in military service is an act of loyalty, and the right thing to do for everyone as a citizen. This is a duty in which every citizen should participate rather than wait for other members of the society to step forward risking their lives to protect those of others. This service ensures ignorance is eliminated from all members of society, a s they all know their responsibilities and what the military goes through. This is before they get to criticize the works of the military prior to understanding the implications of handling conflict, both armed and unarmed. In such cases, responsibilities of protecting the nation should be shouldered by all able bodied persons as without the mandatory system, the entire military would be a professional one. This is where the cost becomes overwhelming since the military wants to retain as many personnel as possible, which is not the case with mandatory service. Mandatory service ensures that the military is always ready with personnel and trains reserves since those that leave the military become reservists. These reservists are equipped with skills that benefit all members of the society regardless of conflicts as the same skills can be applied in life situations. Moreover, mandatory military service for every able bodied citizen is crucial to creating a patriotic nation and instill ing a sense of nationhood amongst the people (Imran). Serving in the military serves as an opportunity to inculcate a sense of pride in serving their country thus allowing them to fight for it and guard it under all circumstances. Although there are many other options from which one can choose to instill patriotism, mandatory military service instills pride and should, therefore, be practiced. It is also one of the ways through which one can serve his or her country; before going into the world to serve one’s own needs and interests. As such, it creates a sense of identity with the men and women fighting for the country by connecting with them. This connection is because the citizens know what it takes to be in the military, and how patriotic it is of them to serve in it. Serving in the military, therefore, should be enforced for every able bodied person for a defined period in which one evaluates his or her loyalties. However, mandatory military service should not be practic ed for clearly visible reasons that decapitate the values of the society, any society that is. This is provided the society in question follows a democratic view that should allow its people to make their own choices by joining the military. Furthermore, it ruins the social system by having the military leaders and other leaders with the power to influence the military have their own way. Hence, mandatory military service ensures that there are no reforms in the military, a heavy consequence for the people and the nation as a whole. This is because this service leaves people who are exempt from the service as lesser members of the society as compared to those who are enlisted. Therefore, they are discriminated against and used to achieve the means of recruiting and assigning officers (Connolly). Those that do not enlist in the military are required to serve mandatory community service that involves the providing cheap labor for other members of the society, as is the case of Germany . It is for this reason that every able bodied\n\nMonday, November 18, 2019\n\nWhat is Critical Thinking Essay Example | Topics and Well Written Essays - 1000 words\n\nWhat is Critical Thinking - Essay Example Critical thinking will help a person to identify the truth. â€Å\"Critical thinking is the process of purposeful, self regulatory judgment† (Facione, p.19). Critical thinking is nothing but correct thinking to find out truth. It is the scientific way of thinking used by both ordinary people and the scholars to know relevant and reliable information about the current world. Austine Cline (2010) defined critical thinking as an effort to develop reliable, rational evaluations about what is reasonable for us to believe and disbelieve. In his opinion, critical thinking makes use of the tools of logic and science because it values doubt over acceptance, reason over faith and rationality over wishful thinking (Cline). Critical thinking is an effort to find out the truth. It is not necessary that critical thinking always lead to truth, but it is the most reliable option available for finding out the truth. Rationality, self awareness, honesty, open mindedness, discipline, judgement etc are various features of critical thinking (What is critical thinking?). Critical thinking analyses things rationally rather than emotionally. For example, we have heard many stories in which a person tries to commit suicide when he/she lost his life partner. It is an attempt driven by emotions. On the other hand, a critical thinker will accept the fact that he/she lost his/her life partner and will consider it as part of human life. Critical thinking always cements its arguments on evidences. Critical thinking never encourages assumptions or hypothesises. The questions like what, why, how etc are necessary for understanding problems and critical thinking always encourage these questions to arrive at conclusions. Because of the backing of the established evidences, critical thinking always helps a person to take logical decisions. Logical decisions backed with critical thinking are\n\nSaturday, November 16, 2019\n\nThe Korean War\n\nThe Korean War Abstract This study examines the relationship between declining public opinion towards the Truman administration during the Korean War ultimately leading to the dismissal of General Douglas MacArthur. In hopes of succeeding in Korea, President Truman appointed General Douglas MacArthur as commander of the United Nations forces and both anticipated a short military ordeal.[1] Research findings discuss the tendency for a decline in public support as a conflict lasts longer than anticipated.[2] Although The Korean War experienced an initial backing by the American public, surveys taken after the start of Chinese involvement display a gradual decline in support for the Truman administration.[3] Public opinion polls are used to determine the nations stance on a given issue. As the war continued, with no end in sight, approval ratings dropped and President Truman faced increasing criticisms. Truman had to make a decision to continue military efforts under the guidance of General MacArthur and hope not antagonize the American Public or to dismiss the hero of the Republican Party in an attempt to save the remainder of his presidency. Ultimately Truman decides to dismiss MacArthur on April 11, 1951 and experiences a backlash; public opinion for the president continues to decline due to the dissatisfaction from MacArthur supporters.[4] Introduction Individual actors play a key role in the establishment and implementation of foreign policy. Disagreements between these actors can result in conflicts and difficulty in making decisions. Throughout the Korean War President Truman and General Douglas C. MacArthur experienced such a situation. At the start of the Korean War the American public had gone through numerous hardships. The nation was still healing from two world wars and the great depression. These difficult times had unified the country like never before. When President Truman came into office his transition from Vice President to President proved to be challenging. At the time vice presidents had minimal impact in policies implemented in the United States let alone foreign policy.[5] Truman stepped into office in a time of global turmoil. Communism was a key issue for American foreign policy. When North Korea invaded South Korea on June 25th, 1950 the Truman administration felt that it was necessary to become involved.[6] The United States had to make a statement; communism anywhere in the world would not be tolerated. The same factors that created a cohesive group of American citizens allowed for the public to rally behind the government.[7] Americans would not tolerate any countrys attempt to oppress freedom. Research shows that shorter wars receive higher approval ratings. Initially the Truman administration along with General MacArthur reassured the public that military efforts in the east would be short and victorious. [8] As the war continued weak media censorship educated the American public as to what was occurring on the warfront.[9] The nation began to criticize and question if the Korean War would truly be a victorious anti-communist campaign. Public opinion continued to decline after Chinas decision to take part in the war in November, 1950.[10] American citizens had already experienced two world wars in a short period of time and found themselves fearing a third. The following year only lead to greater concern and less support towards the Truman administration. Increased spending in hopes of rearming the United States military required the use of money that could have been allocated towards domestic programs and policies. Democrats and republicans alike began to strongly oppose the Korean War.[11] The Truman administration became aware of their declining approval ratings. In an attempt to regain support the government attempted to inform the nation as to why the war was necessary. When these attempts failed Truman realized that the Korean war had no end in sight and felt that the United States should take on less aggressive tactics. General MacArthur disagreed with the president and was ultimately dismissed leading to more disapproval.[12] By comparing public opinion trends, errors and commonalities to the Korean war and the government this paper will attempt to analyze the factors leading to a consensus of overall disapproval in the Truman administration. In doing so it becomes evident that regardless of what the government attempted to regain public support the nation could not be convinced. The following sections will discuss how times of war greatly impact public opinion and how the conflicts between President Truman and General MacArthur lead to increased criticism of the Korean War. Literature Review: Public Opinion Polls According to Marshall Gordons Dictionary of Sociology public opinion polls can be looked at as the measurement of opinions on specific issues through interviews with a representative sample of a group whose views are to be described. Polls can vary in the material in which they cover; however, the most common types of opinion polls focus on voting intentions, political party support, views on the government of the day and its policies and views on major current public issues. This information can be crucial in understanding how much support a political group is receiving especially throughout war times or conflict.[13] The results of public opinion polls have proven to be important in assessing the nations perception and understanding of a given theme. Because of its significance, one must take into account the problems and errors present within the polling process. A large percentage of inaccuracies or misrepresentations of the data occur at the survey taking stage and can lead an invalid data set. Richard G. Hall, among others discusses the increasing use of public opinion polls over recent years. Media outlets place emphasis on results to give a sense of the American publics stance on a given issue. However, one must take into account that one opinion poll on a specific issue may influence future polling relating to the same issue. This could create an inaccurate representation of the population as a whole, favoring the dominant group from the previous opinion poll, thus raising the question do opinion polls merely analyze or do they also help create the opinions?[14] Research shows that the majority opinion on a topic can be looked upon as the societal norm. By having a norm established, a type of precedent may occur, causing those who may be polled on the issue in the future to change their previous stance to match up with societal norms. This leads to a skewed interpretation of the general population, which in turn makes the opinion poll fairly unreliable.[15] The polling process is comprised of numerous individuals being asked questions privately; however, a collective behavior amongst the masses has posed problems for public opinion data. Mass behavior and crowd action are two distinct types of collective behavior that fundamentally impact public opinion results. Mass behavior is defined as collective behavior of an aggregate of individuals giving an appearance of unity of attitude, feeling, and motivation.[16] If mass behavior is to take place during the polling process, the results from one individual to the next would appear very similar, resulting in an overwhelming majority on the issue. Crowd behavior focuses on the influence a whole or group can have on the individuals within it. While in a crowd, a single individual may feel less responsibility and make decisions solely based on the whole, thus relinquishing prior opinions and beliefs for those of the crowd. The concept of crowd behavior would impact public opinion astronomically ; if the data gathered and the opinions expressed are not the beliefs truly held by those surveyed, their polls may as well be considered null and void.[17] Public opinion polls serve a simple purpose, to identify the wants and needs of citizens. A common complaint concerning polls is that of knowledge. Higher educated individuals have been quoted as feeling a lack of confidence towards the outcome of polls based on the answers given by less educated and less informed individuals. Similarly, American citizens are not made aware of every minuet detail of a political issue.[18] Therefore, their perceptions and interpretations of the given issue may be skewed and bias, causing public opinion to simply reflect the misunderstanding plaguing society as a whole The notion of public opinion polls allows United States citizens to feel involved in the democratic process. Elections from the local level to the presidential emphasize a government run by the people; public opinion polls reaffirm this idea. Citizens are given the opportunity to assess the status of the country in times of tranquility but also in times of struggle. However, as stated previously, if a majority of individuals surveyed are ill-informed or simply following societal norms, the outcome may not be relevant enough to base a governmental decision. In addition to the problems with the polling process listed above, another type of error causes a great deal of confusion and inaccurate results. Similar to sampling errors in the electoral process, citizens may frequently change their opinions on a given issue. Late swing and disproportionate refusals, although commonly used in electoral errors, can formulate bias in the polling system. An individual who votes one way while surveyed but feels another way may causes representational errors; changes in opinion can be legitimate or dishonest. Another form or error can come from disproportionate results, meaning that the individual taking the poll or casting their vote may refuse to be interviewed and discuss their position before hand.[19] Public opinion polls do not always adequately portray the thoughts and concerns of a nation, but the data is still taken into consideration and ultimately may have some say as to how the president makes a decision. President Truman realized that by early 1951, American Citizens had grown tired and weary of the Korean War. This coincided with Trumans desire to end the war and bring troops home. Although it was in Trumans nature to pay little attention to public opinion polls[20], his own wants aligned with those of the general public in terms of ending the war. The increased amount of aggression and force General MacArthur used towards the Republic of China not only went against Trumans wishes, but also the wishes of a vast percentage of the population. Truman had to not only evaluate his own wants but also that of his country in deciding whether or not to dismiss MacArthur.[21] The Feuds between President Truman and General MacArthur portray two distinct public opinions. Those who felt that the war should be over soon and feared what any more involvement would cause sided with the president. MacArthur did not lack support from the entire country; there were still individuals who considered the general to be the hero of the Republican Party. He was viewed as someone who bravely led the United States. After MacArthurs dismissal, he was still thought of as a hero and was welcomed back with praises and gratitude by many.[22] The conflict between President Truman and General MacArthur may have impacted approval ratings by splitting the country through party affiliations. However, one must not look at the issues between them as the principal reason for a decline in public support. During times of war numerous factors are introduced to the American public. Citizens find themselves living their lives differently, missing loved ones, experiencing economic difficulties and coping with death. These factors alongside others play a large role in declining opinions.[23] Scott Sigmund Gartner and Gary M. Segura discuss correlations between overall public opinion and the introduction of stressors brought on by conflict. When analyzing public opinion data in relation to casualties it seems that the public is sensitive to relatively small loses at the start of the war and only to large ones towards the end.[24] On the surface it may seem as though increased causalities would be the sole factor in determining how the public views the situation. However it takes various factors to influence public opinion, this may include; mounting economic costs, impact of a soldiers absence from home, anxiety as a result of being involved in a war in addition to the overall number of deaths. The longer a war lasts the greater chances there are for a decline in overall public support. The initial stages of a conflict have a tendency establishing a rally-around-the-flag mentality.[25] In which citizens experience a sense of unification and support the decision to go to war in hopes of solving the problem. However as the war drags on initial approval ratings begin to decrease and a new sense of opposition forms. Because of this shorter wars typically have higher approval ratings, while longer wars face immense amounts of criticism.[26] General Douglas MacArthur had originally predicted that the Korean War would be a short campaign for the United States. American troops took part in the Korean conflict in large part as a stand against communism. The anti-communism movement and hope that the war would end quickly established a rally-around-the-flag mentality of the American people. Due to collective experiences such as World War I, the great depression and World War II American established a sense of commonality. This unified front and desire to end oppression resulted in support. However, as the war waged on citizens began to openly criticize the Truman administration and disapprove of any involvement in Korea. Methodology This study examines how declines in public support of the Truman administration lead to the dismissal of General Douglas MacArthur. To better understand the lack of support experienced by the government public opinion polls from the 1950s had to be analyzed. Online data bases were used to research public opinion polls in the broader sense. Articles from archival data bases clearly explained the importance of public opinion, what influences opinions, how they impact governmental processes and lastly the errors relating to them. This allowed for a comprehensive foundation for the study. Once the introductory research was conducted a relationship was formulated between public opinion throughout the war and the Truman administration. To gather pertinent information news paper articles, magazine stories (primarily from Life Magazine) and scholarly articles pertaining to the Truman administration were used. These resources were chosen because of data availability, at the time newspapers and magazines were the most popular forms of media outlets. Life magazine proved to be an intriguing and informative reference. The magazine began extensive coverage of the Korean War from the start and released weekly articles. The Stories covered all aspects of the war, from life in Korea to how the war had impacted the lives of a soldiers family. Archived articles from Life Magazine allowed for an interesting perspective of public opinion. The stories brought insight into how the American public felt about the war as things began to change. An issue released on July 10, 1950 titled Sy camore Backs the President discussed support of the Truman administration and their decision to enter Korea. Then after the Chinese invasion an article released on December 25, 1950 titled Sycamore Revisited interviewed the same individuals form the July 10th article to see where they stood. Those interviewed no longer approved of the Korean War.[27] Scholarly works such as journal articles and books allowed for an understanding of the chronological events taking place throughout the war. The conflict between Truman and MacArthur was made evident. By correlating public opinion trends to actual events one could begin to develop an idea as to why Truman dismissed MacArthur when he did. This allowed for a deeper comprehension of the stresses faced by the Truman administration and the factors leading to declining support. Findings: Factors Resulting in a Decline of Public Support President Harry S. Truman was supported by the American public when the decision was made to enter the Korean conflict. After North Koreas attack on South Korea on June 25th 1950, Trumans administration decided to take immediate action to repress any communist hostility. The decision to fight back was not solely based on the actions of North Korea; Truman feared a grand communist movement thus beginning a period of military reform. Trumans reform efforts allowed for a rearming of the military for immediate use in the Korean conflict and also for the long term application against communism.[28] The Truman administration began to implement new domestic reforms alongside the changes being made to the military. The fair deal built on Roosevelts New Deal and aimed to guarantee economic and social stability to the American public. The Korean conflict ultimately led to the demise of the fair deal. Increased spending on a permanent defense economy resulted in less funding available for domestic programs. The United States spent a substantial amount of money during the course of the Korean War. By wars end the defense budget rose from $13.5 billion to approximately $50 billion. The massive budgetary increase caused inflation. To handle inflation Americans entered a period of government control on wages, the price of goods and raw materials, raised corporate taxes and tightened credit. By implementing government controls the Truman administration was able to maintain support from the American public, both democrats and republicans seemed to trust the administration.[29] Along with military reforms President Truman appointed General Douglas C. MacArthur as the Commander of the United Nations forces during the first phases of the Korean War. General MacArthur gained recognition as a commander for the allies in the Southwest Pacific during World War II and was ordered to oversee the post-war occupation of Japan. At the start of the war it seemed as though the relationship between Truman and MacArthur would greatly benefit the United States, however, the opposite occurred. Truman and MacArthur frequently clashed on how to handle the war. As the administration began to be criticized and the overall consensus of the American public was that of leaving the war, Truman was forced to reevaluate the United States participation in the war.[30] The United States was able to successfully avoid mass economic havoc until China entered Korea in November 1950. Not only did the invasion cause a substantial amount of military stress but also economic struggles. The introduction of China as a player in the Korean War brought on the fear of a third world war. To counteract this fear the Truman administration began to speed up their military rearmament efforts, this resulted in increased inflation. November 1950 plays a pivotal point for Truman, at this time republicans and even democrats began to disapprove of the administration.[31] Criticism of the Truman administration and the war as a whole continued to rise as the end of the year approached. Life Magazine, which began publishing stories about the Korean War a week after its start, steadfastly discussed the issues facing the United States due to Chinas involvement in the Far East. An article titled Once More, We Got a Hell of a Beating published on December 11, 1950 stated that Chinas participation in the war changed everything and that Korea is an entirely new war as stated by MacArthur. United States troops had to mobilize quickly to suppress the Chinese; however according to the article mobilization was slow moving and consisted of weak man power. As the American public gained knowledge of the war through media outlets such as Life Magazine overall faith in the Truman administration began to deteriorate. Democrats and Republicans alike who had originally supported American involvement in the war found themselves questioning whether or not it was worth it.[ 32] In January of 1951 the Peoples Republic of China attempted to reach a peace agreement by asking for a 7-power conference to discuss the fate of Korea and Chinas position in the United Nations. President Truman along with the American government decided that it would not be beneficial to give China a seat in the United Nations; instead they censured the republic for aggression. Although China had been excluded from the United Nations MacArthur continued to torment the Chinese. In March he engaged in an ultimatum with the Peoples Republic of China. General MacArthur insisted that the Chinese remove troops from Korea. MacArthur then added that if Chinas troops were not removed they would face dire consequences. Truman was enraged with MacArthurs actions; President Truman did not appreciate how severely a single individual could impact foreign policy. The President realized that something must be done.[33] A few months after MacArthurs increased aggression towards China the general leaked news that he planned to use Chinese nationalists forces from Formosa in the Korean War. This plan of action was a complete contradiction to Trumans diplomatic policies leading to MacArthurs dismissal. Although Truman succeeded in firing General MacArthur the process was a difficult one. MacArthur had acquired a great deal of support and a substantial following from the Republican Party. Public opinion polls showed that MacArthur was incredibly popular in the eyes of the American Public. Because of this President Truman could not simply fire MacArthur without a valid reason and a warranted explanation.[34] Trumans decision to dismiss General MacArthur has been referred to as one of the major setbacks during the Korean War. After MacArthurs dismissal on April 11, 1951 media outlets released story after story on the conflict between Truman and MacArthur. Life magazine published an article on April 17th titled The Role of MacArthur an editorial piece chronicling his role in the Korean War. A later article released on May 7th titled Mac Rolls On focused on MacArthur as the hero of the Republican Party and embraced the general. Those who supported General MacArthur did not approve of Trumans decision to dismiss him resulting in declining public support.[35] General MacArthurs dismissal became a popular news story. Another topic gaining momentum was that of the Korean War leading to World War III. American citizens fear of this only increased after Chinese Involvement. The Public went from being told that the war would be a stand against communism to a long term global war. American citizens were still healing from World War II and lived with a constant fear of taking part in a similar conflict. The atomic bomb created an entirely new threat, one of complete and total annihilation. The impact of dropping the bomb on Hiroshima was catastrophic on the Japanese. The nuclear strength of the atomic bomb surpassed any bomb created before it. The American Association of the Advancement of Science discussed the use of the atomic bomb by the United States and described its power as follows:[36] Sixteen hours ago an American airplane dropped one bomb on Hiroshima, an important Japanese army base. The bomb had more power than 20,000 tons of TNT. It had more than 2,000 times the blast of the British Grand Slam, which is the largest bomb ever used in the history of warfare.[37] After the creation and use of the atomic bomb the worlds superpowers became increasingly eager to develop nuclear weapons to ensure a defense against one another. As stated above the atomic bomb dropped on Hiroshima was a deadly device. When World War II ended the atomic bombs strength had been compared to harnessing the basic power of the universe.[38] The American public was made aware of the force and destructive ability of the atomic bomb thus understanding the consequences of its use. A life magazine article titled How U.S. Cities can prepare for Atomic War discussed the publics fear of the Korean War ultimately resulting in a third World War. This led American citizens to create protocols and guidelines in case of nuclear warfare. By engaging in atomic bomb drills citizens dealt with a constant fear of being attacked, therefore, to reduce the chances of world war three the United States should end its involvement in the Korean War. [39] In an attempt to avoid a major world war President Truman deployed troops to Europe and provided aid and increased military assistance to members of the North Atlantic Treaty Organization (NATO). This decision faced a great deal of criticism, primarily from republicans and conservatives. Throughout the Korean War and at the start of Cold War struggles emphasis was placed on communism. Republicans and conservatives desired minimal government intervention in the lives of American citizens. Around this time the idea of McCarthyism began to take hold. Senator Joseph McCarthy from Wisconsin accused 205 members of government to being part of the American Communist Party. The stigma which coincided with being anti-American or anti-freedom caused a great deal of controversy. Senator McCarthys primary targets were democrats; he even stated that President Truman was soft on communism resulting in a decline of public support towards the Truman administration.[40] The Truman administration made several attempts to regain the support of American citizens. Although the Korean War did not end while Truman was president he still made an attempt to change his public image. Research shows that Truman did not typically give thought to overall public opinion; it was not in his character. However, the administration did make an attempt to gain support in hopes of having the American Public go along with numerous budgetary changes. The Truman Administrations Attempt to Regain American Support In the spring of 1950 the Truman administration began discussing an increase in defense spending. Government officials realized that public support typically declines during war times and felt that support would be needed when the budgetary changes took place. The administration created an approach to change the nations perspective of the consequences resulting from the war. The approach consisted of a simplistic and exaggerated information campaign, employing arguments that were clearer than truth. This campaign hoped to convince the public that the war a necessary evil. The administration realized that scare tactics would only work for so long; a new approach had to be introduced. Anti-communist rhetoric was constantly in the press. By frequently referring to the communist threat the government believed that the public would pay less attention to increased spending.[41] In the early stages of the Korean War media censorship was very limited. News papers and magazines were able receive information from the front lines and release them to the masses. President Truman was a complete contradiction to the transparent exchange of information from Korea and the United States. He attempted to avoid press conferences and discussions with the press. Truman even disapproved of other members of his administration conversations with the press. [42] Worries of overall public opinion became less of a focus for the administration after the Chinese invasion in late November, 1950. The Chinese posed a serious threat to the United States and their involvement in the Korean War. As a result the government made no deliberate attempt to mask or censor information from the American public. The opposite occurred; the public was then made aware of increased military spending. On December 15, 1950 Truman publically called for an immediate expansion of the armed forces to 3.5 million and declared a state of emergency in hopes of forcing the American public into accepting military rearmament and budgetary increases[43]. The following is an excerpt from Trumans address to the public; In June, the forces of communist imperialism broke out into open warfare in Korea. The United Nations moved to put down this act of aggression, and by October, had all but succeeded. Then in November, the communists threw their Chinese armies into the battle against the free nations. By this act they have shown that they are now willing to push the war to the brink of general war to get what they want. This is the real meaning of the events that have been taking place in Korea. That is why we are in such grave danger.[44] The Truman administration was facing a dire situation. The American public had been under the impression that the Korean War would be a short term ordeal. However as Truman stated in his address to the nation the Korean war had been pushed to the brink of general war by Chinese involvement. The public was becoming aware of how complex and drawn out the war was becoming. In an attempt to calm the public members of the state department began holding a series of off the record meetings with reporters, news correspondents and columnists to keep the American public informed of the situation on the war front. Discussion and Personal Opinions The Korean War proved to be devastating for the Truman administration. The American public had experienced turbulent times including the great depression and two world wars before the governments decision to take part in the Korean conflict in 1950. One can only imagine how horrifying and stressful involvement in the war would have been to the citizens of the United States. This study focused on the factors resulting in a decline of public support. At the start of the war president Truman was successful in having the American people rally behind the anti-communist cause. It appeared as though the war would eradicate communism from every inch of the globe. The United States, which stood for freedom would not tolerate communist expansion and mobilization. As a current citizen of the United States one can relate to the notion of protecting the rights and privileges of living in a democratic society. Civilians are given the opportunity to take part in governmental procedures by voting and evaluating the status of the nation through public opinion polls and surveys. Unlike a communist regime the American government does place emphasis on the wants and needs of the masses. This had to be protected any way possible. The Korean War therefore could not be avoided and the Truman administration was eager to send troops over. Before the Chinese invasion military efforts seemed to be successful. The United Nation forces under the leadership of General Douglas MacArthur appeared to be making progress. As stated previously the overall consensus of the public was to rally-around-the-flag. With an increasing threat of a communist uprising the government and the general public felt that it was the perfect time to end communism once and for all. Propaganda campaigns constantly labeled citizens as communists. McCarthyism took a strong hold and spread like wild fire. People from all walks of life found themselves being accused of supporting the American Communist party, even President Truman and democrats alike were said to be soft towards communism or in other words more accepting of it.[45] One can understand how the threat of communism could have unified the nation in support for the Korean war. Media outlets repeatedly reported on the approval the public had on the war. At the time the public had been promised a short term military effort. The war seemed to be something that would end rather soon and achieve a highly desirable outcome. By winning in Korea the United States would have (1) repressed a communist expansion and (2) made a statement to the rest of the world. A victory in Korea would tell all other nations attempti\n\nWednesday, November 13, 2019\n\nThe Disease that Infests The District Essay -- Essays Papers\n\nThe Disease that Infests The District There is a disease that is sweeping across this country. From this disease, no one person has immunity. It strikes the poorest of families and the richest of families. It has the ability to harm the old and young, male and female. It does not care what your sexual preference is, if it wants to infect you, it will. What is this disease that does not care who it harms? It is the acquired immune deficiency syndrome, better known as AIDS. Even the capital of the most powerful country in the world has a problem with AIDS. In fact, Washington, DC has a major problem with this disease. The rate of new AIDS cases in the District and its surrounding areas is twelve times higher than the national average. â€Å\"By the end of 1998, [†¦] there are 19,086 cases of AIDS in the DC greater metro area and 10,750 deaths from the disease (Whitman-Walker Clinic). One of the groups that is most heavily affected by this disease in Washington, DC as well as across the country is homosexual men, though in recent years that trend seems to be changing. It is for this reason that concern was growing in the District about the AIDS problem amongst the homosexual community. This is where the Whitman-Walker Clinic steps in. Located in the Northwest area of Washington, DC, this clinic has been serving the community as early as 1973. The clinic has an array of services mainly for the homosexual population that include testing for HIV and AIDS, support groups, legal services, the list goes on and on. One of the major aspects of the Whitman-Walker Clinic is providing prevention education to those who have not yet contracted the disease. One of the divisions ... ...ed their services to different areas not just here in The District. Primary care clinics are also located in Northern Virginia and most recently Maryland. â€Å\"One of the biggest things we just accomplished was expanding primary care to a new Maryland facility. Every here [at the Whitman-Walker Clinic] is happy to see it happen, notes Chip Lewis. The hours that the clinic is open is also changing. â€Å\"We realize that people have lives outside of having HIV and AIDS. We are working to expand the hours that all of our clinics are open. Convenience is always an issue; we want to serve as many people as possible† (Chip Lewis) It is about time that â€Å\"as many people as possible† are being provided with service to combat AIDS, because too many people have been neglected from services for too long simply because they did not fit the nation’s stereotype of who contracted AIDS. The Disease that Infests The District Essay -- Essays Papers The Disease that Infests The District There is a disease that is sweeping across this country. From this disease, no one person has immunity. It strikes the poorest of families and the richest of families. It has the ability to harm the old and young, male and female. It does not care what your sexual preference is, if it wants to infect you, it will. What is this disease that does not care who it harms? It is the acquired immune deficiency syndrome, better known as AIDS. Even the capital of the most powerful country in the world has a problem with AIDS. In fact, Washington, DC has a major problem with this disease. The rate of new AIDS cases in the District and its surrounding areas is twelve times higher than the national average. â€Å\"By the end of 1998, [†¦] there are 19,086 cases of AIDS in the DC greater metro area and 10,750 deaths from the disease (Whitman-Walker Clinic). One of the groups that is most heavily affected by this disease in Washington, DC as well as across the country is homosexual men, though in recent years that trend seems to be changing. It is for this reason that concern was growing in the District about the AIDS problem amongst the homosexual community. This is where the Whitman-Walker Clinic steps in. Located in the Northwest area of Washington, DC, this clinic has been serving the community as early as 1973. The clinic has an array of services mainly for the homosexual population that include testing for HIV and AIDS, support groups, legal services, the list goes on and on. One of the major aspects of the Whitman-Walker Clinic is providing prevention education to those who have not yet contracted the disease. One of the divisions ... ...ed their services to different areas not just here in The District. Primary care clinics are also located in Northern Virginia and most recently Maryland. â€Å\"One of the biggest things we just accomplished was expanding primary care to a new Maryland facility. Every here [at the Whitman-Walker Clinic] is happy to see it happen, notes Chip Lewis. The hours that the clinic is open is also changing. â€Å\"We realize that people have lives outside of having HIV and AIDS. We are working to expand the hours that all of our clinics are open. Convenience is always an issue; we want to serve as many people as possible† (Chip Lewis) It is about time that â€Å\"as many people as possible† are being provided with service to combat AIDS, because too many people have been neglected from services for too long simply because they did not fit the nation’s stereotype of who contracted AIDS.", "pred_label": "__label__1", "pred_score_pos": 0.8935143351554871} {"content": "iPhone rewards not available and not fair\n\nI understand that the implementation for iPhone has not been completed yet. I feel that I downloaded the browser certainly to enjoy that reward and now it is not even working and has no date to follow. For this inconvenience will iOS users be complimented for the time we did not have the option?\n\nHi @hdjwhs2005 - Thank you for taking the time to write in. I apologize for any frustration this has caused. Adding Rewards to iOS is a top priority for the company, and something we are working hard to implement. In the meantime, Brave on iOS is free to use, and offers a tong of great browsing features while keeping your privacy in mind. Please just let us know if there’s anything else that we can help to answer as you continue to become familiar with Brave.\n", "pred_label": "__label__1", "pred_score_pos": 0.994030237197876} {"content": "5 Powerful Ways You Can Conquer The Fear Of Abandonment\n\nDear friend,\n\nExperiencing abandonment is one of the most difficult moments anyone will ever experience. The pain from it can be excruciating. So this time we will avoid giving you examples, because we were all abandoned at some point in life. The memories from these events can be extremely painful, even for us at Dauntless Inspiration.\n\nSo instead we will be direct, and share with you five effective ways you can use to approach the fear from abandonment, and overcome it!\n\n5 Ways You Can Conquer The Fear of Abandonment\n\nThe fear of abandonment causes us to overthink to the point of obsession. Amazing traits such as our wonderful understanding and sincere empathy are deeply affected because of this fear.\n\nOur trademark virtues become clouded and dry instead of inspirational and joyful. Acknowledging when the fear of abandonment appears in the first place is crucial in handling it.\n\nHow to recognize the fear of abandonment\n\nThe first signs come immediately after the event that triggered the fear of abandonment. Events such as unkind words, and lack of attention and intimacy from a loved one may trigger that unpleasant fear of abandonment. These signs can vary in strength and duration, but the feeling causes us to feel anxious. In our case, we lose focus and concentration. Reactions based solely on our emotions start to take over.\n\nDon’t get us wrong, there’s nothing wrong with letting emotions take the wheel. But the problem is when that wheel is out of control. To understand fear of abandonment, hammer your emotions with negativity and the result is self-sabotage, guilt, and overthinking. When this happens, we start to see events and words that do not exist.\n\nEven worse is when we start blaming ourselves.\n\nFacing the fear of abandonment\n\nAccording to an experienced therapist and a famous hypnotism expert Mark Tyrrell, if you have a fear of abandonment, it may stem from experiences you’ve actually had.\n\nIt also might simply be a fear of experiences you would hate to have. Tyrrell adds: “Just because someone has been abandoned at some point, it doesn’t inevitably mean they’ll come to have a morbid fear of abandonment later in life.”\n\nHere are some amazing tips to overcome the fear of abandonment:\n\n1. Find the root. When you focus on finding where the fear of abandonment first appeared, you can connect it with the reason why it happened. Your analytical and highly organizational mind will have no trouble connecting the dots and discovering the key reason why abandonment scares you so much.\n\n2. Break it down on paper. It’s not easy for most of us to understand our own thoughts. Especially when they are about our deepest fears, such as abandonment. Write them on paper. They don’t have to be organized or structured. They don’t even have to make sense. Just let them out. When you write how you feel, you immediately get a clearer picture of the problem.\n\n3. Accept that it happened. Denial kills motivation. It has double the effect on the many, because we tend to blame ourselves. We tend to forget that it wasn’t us who abandoned someone; it’s the other way around. When you fully accept the real reason, you are automatically giving yourself the permission to heal.\n\n4. Determine possible actions. Now it’s time to act. But you don’t have to face this alone. Friends and family can be a source of great comfort in a time like this. Seek their support and advice. In case you find yourself alone, look at the abandonment event as a huge lesson. It was there to teach you something and to make you wiser. Close the chapter and open a new blank one. Know when not to go back to someone who abandoned us.\n\n5. Make a decision. Make some sort of an agreement with yourself. Decide that no matter how hard the abandonment was, it won’t stop you from having a future fulfilling relationship or a friendship. The fear may be there, but it’s not there to stop you. It’s there to make you stronger. Fear of abandonment will disappear when you accept it, but never allow it to control you.\n\nFear is not real\n\nThe lack of fear doesn’t make you courageous. The truth is far more simple, yet difficult to accept. True courage lies in complete vulnerability. You will experience abandonment in your life, make no mistake about it. Accept that it happened, but don’t dwell on it.\n\nDon’t close your heart because someone didn’t know how to appreciate that well of goodness that resides within you. Instead, leave it open, but stay cautious. Facing the fear of abandonment is far from easy, but it’s the path to emotional freedom. If there’s one thing so many value, it’s the opportunity to feel free within our own mind.\n\nA great quote about fear, which we love reading, comes from a famous American actor Will Smith:\n\n“Fear is not real. The only place that fear can exist is in our thoughts of the future. It is a product of our imagination, causing us to fear things that do not at present and may not ever exist. Now do not misunderstand me, danger is very real, but fear is a choice.”\n\nYou don’t have to be fearless our dear friend, just don’t let fear stop you.\n\n\n\nHave you ever experienced abandonment?\n\nWhat effect did it have on you and how did you face it? We would love to know your thoughts on this difficult topic in the comments below!\n\nYou Can’t Save Everyone\n\nDear friend,\n\n\nYou cannot save everyone\n\n\n\n\n\nPeople don’t need to be saved\n\n\n\n\n\n\n\n\n\n\n\n\nWhy We Need To Find Our Purpose\n\nDear friend,\n\nOne of the most important events in our lives is the moment when we discover our genuine purpose. It’s that second of realization when we understand that the puzzle is completed, and when all events of the past become clear to us. When we find our purpose, whether that’s a career, relationship, or another realm of life, we feel fulfillment like we’ve never felt it before.\n\nWhy We Need To Find Purpose\n\nIn today’s modern world, when you say you want to find purpose, you usually get this response in return: “Stop your daydreaming and philosophy.” This is something that really bothers me, since why should purpose discovery be seen as something strange? Why should it be seen as something that’s taboo?\n\nThe answer is simple. Every time when a person gives you the weird look upon mentioning purpose, it’s because they don’t want to find it for themselves. Or because they tried finding it and failed. In their eyes, it’s so much easier to just tell you that you can’t do it, too. It will remind them that they tried, but did not succeed, and that they are living a stagnant, repetitive life. Let me give you an example.\n\nYou finish school or college, you get a job, you work, marry, and then retire, period. That’s how most people think these days. I’m not saying this way of life is bad, but this is a heavy blow for a mind that’s hungry for meaning and more knowledge. We need to have a higher purpose and a bigger why in life. If you miss out on that, your life may become repetitive, which leads to stagnation, and to much worse outcomes…\n\nWe need to find purpose because it’s the pre-requisite for all the good you want to accomplish. It’s the foundation of not just your own personal success, but also a guarantee that you will find those who will share the same values as you do.\n\nIt’s not just about reaching that bigger why. It’s understanding that life can be so much more once you know where to turn your sails, and chart your own course. 🙂\n\nIt Will Be Worth It\n\nWandering through life and living day by day may be a good way to live for some, and that’s okay. But not for everyone. Our purpose should be our guide, and it should be that one thing that gives us the strength to persevere even in our darkest moments. It doesn’t matter what that purpose is, because as long as we have it and see it, we can work on it, upgrade it, and make a difference.\n\nIt’s easy to go with the flow and let life unfold day after day. Trust me, that’s the easy part. But when you start planning to do something bigger, that’s when you’ll see all the magnificent possibilities life has to offer.\n\nThat’s why discovering purpose is so vital. It’s the founding block of our determination, perseverance, persistence, fulfillment, and happiness. But please know, if you still haven’t found it, don’t despair, you will. It’s only a matter of time.\n\nDon’t forget, the road to reaching your purpose is incredibly important, because it’s not all about the end goal. It’s about who we become on that journey. Embrace these moments when you don’t actually know where to go. They will be one of the most beautiful and adventurous experiences you will ever undertake. They will be worth it, all the way. 🙂\n\n\n\nHave you found your purpose? If not, how would you describe your journey so far? We would love to hear your thoughts in the comments below!\n\nHow To Easily Overcome Perfectionism\n\nDear friend,\n\nOvercoming perfectionism is one of those goals we believe it’s nearly impossible to overcome. Not because it’s some kind of an invincible force, but because perfectionism carries a burden heavier and more difficult than most emotions. And we are all about learning, improving, and moving forward. I am a perfectionist myself sometimes, I admit it. But I found an effective and an easy way to overcome it.\n\nOvercoming perfectionism through acceptance\n\nImagine you are a main character in a video game. We all know that in every video game there’s a main quest you need to complete, and then there are optional ones. When you finish the main story, you win, and the game thanks you for your time and rewards you in some way. Good feeling, right? But there’s something you feel is missing still.\n\nRemember the optional quests? As with overcoming perfectionism, your thoughts that are not vital for your daily decision making are preventing you to be fully happy you reach your destination. It should be enough that you completed the task. But you sense you’re not fully satisfied. Your mind simply didn’t have enough. You haven’t completed the optional quest, so now you feel that what you did is mediocre.\n\nYou feel as if you didn’t do a good job. So you start being hard on yourself, how could you miss something like this, and why it’s still not enough. Surely, the result would be much better if you did everything perfectly? Wrong. I deliberately used a video game example because at the end of every game when you complete the main story, you’ve won! No questions asked. It was enough, accept that. Same with overcoming perfectionism.\n\nYou did more than enough\n\nOvercoming perfectionism is not about doing every single detail, task, or a quest, and bringing it to a perfection, because there’s no such thing. There is no such thing as perfect. My dear friend and one of the founders of Dauntless Inspiration, Giselle, always tells me to give it my all, but that I should be happy with the result, no matter what it is, period. Her wise words finally found their way into my mind.\n\nLike the main character in our video game, you did your best and you gave your maximum. That is enough. Please don’t get me wrong, going that extra mile is important, but not at the price of your health and happiness. When you finish a task, don’t doubt the result. Instead acknowledge that you did everything which was in your power to complete it.\n\nOvercoming perfectionism is all about recognizing that your effort gave you the result you wanted. You must understand, there’s a difference between going the extra mile, and just pushing yourself for no good reason. I should know, because I used to push myself beyond my breaking point regularly which only caused overwhelm and anxiety.\n\nRemember, it’s okay to strive towards the best possible solution. But please don’t lose yourself in that journey. What good is the result if you are just too overwhelmed and tired to enjoy it in the end?\n\nPat yourself on the back, because you did enough. Enjoy in what you accomplished, smile, and be happy about it. You deserve that smile. 😊\n\n\n\nAre you a perfectionist? What’s your experience with perfectionism? We would love to hear from you in the comments below!\n\nFirst Official Dauntless Inspiration Interview!\n\nDear friend,\n\nWe have incredibly exciting news for you!\n\nYou’re among the first who will see our very own official Dauntless Inspiration interview with Katherine Denton Pomerantz! Woohoo! \n\nNow a little bit about Katherine and what can you expect to see in the recording that we’ll share with you today\n\nIn this interview, Katherine, the owner of TheBookkeepingArtist.com, goes into detail about her story of how she went from working as an actress to becoming a successful business owner of her own accounting firm and becoming a financial expert, all in a span of just one year!\n\nWe hope you will enjoy watching this interview as much as we loved every minute making it! 🙂\n\nHuge thanks to Katherine for her patience, kindness, generosity, and professionalism! She is a genuine inspiration!\nWe so appreciate her giving, caring nature, and incredible professionalism!\n\nHope you’ll love the interview!\n\n\nGiselle & Marko\n\nIf you want to learn more about Katherine and get in touch with her directly, please follow this link to her website, or check out her Facebook Page.\n\nWhy Is Setting Goals So Important?\n\nDear friend,\n\n\nYou Have Time To Reach Your Goal\n\n\n\n\n\nStop Rushing Yourself!\n\n\n\n\n\n\n\n\n\n\nWhy Everything Happened The Way It Did\n\nDear friend,\n\nIt’s not easy to face our past. Few people ever gather the courage to look their past right in the eye and say they moved on. What you need to remember is, it happened because it was supposed to teach you something. It happened, because it needed to bring you where you are now.\n\nWhy We Need To Face Our Past\n\nA while ago I had a chance to say hi to my past, literally. I saw a person who meant the world to me almost ten years ago, but this time something was different. Instead of putting her on a pedestal like I used to and saying yes to her every demand and suggestion, something else happened entirely.\n\nI moved on. When I looked into her eyes, I knew I’m this new, brave person who embraced being who he is, where I am now, and where I really want to be. Of course I’m doing what I can to reach that goal that occupies my attention, but a much more important moment happened in my mind that day.\n\nI left my past where it belongs, behind me. Good memories and moments are always welcomed, but that’s about it. You see, most of us tend to dwell in the past, because we relish the chance to question it relentlessly. We ask ourselves: Maybe I could have done something differently… Let me be honest with you right now:\n\nNo, you couldn’t.\n\nIt Happened Exactly How It Was Supposed To Happen\n\nEverything that has ever happened to you needed to happen. Every single difficulty, lonely moment, pain, and judgment had to come to pass so you could be ready to receive everything you ever wanted. Maybe you’re not where you want to be right now, and that’s okay. Shake off the doubt, shake of the negativity. Remember your dream, because you will reach it.\n\nLook at your past, but leave it where it belongs, far behind you. Let what happened be a proof what a wonderful person you’ve become. Know how giving, caring, and understanding you already are. This is something you should be proud of every single day.\n\nThat’s what I am asking you to do. Leave your past-self, and let it go my dear friend. What has transpired wasn’t a punishment. Quite the contrary, it was a lesson, and nothing more. Stop torturing your gentle mind with different outcomes and what could have happened. It’s not just about releasing your previous life and accepting it, but also not allowing it to control you.\n\nIf your dream wasn’t alive, on track, and right on schedule, you wouldn’t have so many roadblocks coming against you. Maybe you tried five years ago or ten years ago. It didn’t work out? Start again. Let go of your past, because when you do, you are allowing yourself to embrace the present, and plan the future. You agree giving that future a fighting chance to unfold in all it’s glory and greatness you deserve to have. <3\n\nHere at Dauntless Inspiration, we are your biggest fans, and we are cheering for you every step of the way. You got this! 🙂\n\n\n\nHave you accepted what happened in your past? Are you still struggling with this? Let us know in the comments below, we would love to hear from you!\n\nWhy It’s Okay To Be Vulnerable\n\nDear friend,\n\nI always found it difficult to open up to people and be vulnerable. Being hurt so many times, I figured if I keep it all to myself, then no one will be able to hurt me again. But the only thing I managed to do is overwhelm my mind to a point where I felt incredibly lonely. However, there are days when I get a reminder why being vulnerable doesn’t have to be that difficult, and why it’s actually a strength.\n\nBeing vulnerable is not a weakness\n\nWhen you’re being vulnerable in front of someone you cherish, you’re not just opening up to them. Something more happens. You are actively revealing pieces of your soul to that person. You are opening the gates of your inner self, allowing that human to touch your heart, and feel your pain.\n\nI’m not saying that you should share your most private and beloved moments with everyone you meet. Believe me, I did that in the past and got hurt plenty of times.  But every once in a while, you’ll meet someone with whom you will feel that “click” right from the start. You will literally finish each other sentences. 🙂\n\nVulnerability can be hard, there’s no question about it. Understand, large majority of us were abandoned, hurt, or mocked at some point by the people we thought that will always be there for us. This is why need so much time to trust someone. But opening up is not a weakness. It’s actually one of the most courageous acts you’ll ever do.\n\nWear your heart on a sleeve\n\nDon’t be afraid to be vulnerable. I never believed in the term fearless, because fear is the greatest motivator there is. Even if you get hurt, and face abandonment that scares you so much, open your heart to the selected few whom you trust.\n\nI was always the one who had troubles with being vulnerable to begin with, but because of all those people who left me when I needed them the most, I learned how precious are those who will embrace me, just the way I am.\n\nMy support circle is not big, and in fact, in only consists of a few people that I know I can count on at all times. Knowing that, I’m able to wear my heart on a sleeve, and so should you. I know you’re scared of being hurt again. But I can promise you, it will be less painful to be hurt once more, than close your heart forever and be indifferent.\n\nSee the good in people\n\nTrust in people and let them in. I cannot promise that everything is going to be okay, but I can assure you that you will feel something many people spend their entire lives trying to find. You will feel free and safe. There isn’t a greater feeling than hearing those three, beautiful words: “I understand you.”\n\nI’m not going to lie, you will be hurt at some point. This is life, and it will happen. But it will all be worth it in the end, because being vulnerable will bring you the right people that will be there when you need them the most.\n\nReach out to your friends and open your heart and soul. Tell them how you feel, let them know how much they mean to you, and share with them what lies on your mind. In the meantime, allow me to say: I understand you. <3\n\n\n\nWhat are your thoughts on vulnerability? What’s your experience with being vulnerable? We would love to hear your thoughts in the comments below!\n\nI Don’t Play Games, Speak Your Mind!\n\nDear friend,\n\nI never liked playing games. When I say games, I mean the ones where someone is literally playing with our feelings and emotions. Don’t get me wrong, it’s okay to have fun sometimes, no harm in that. But the kind of games I’m talking about here always send a chill through my spine.\n\nI don’t play games, speak your mind\n\nThe explanation for getting to the point preference comes from our trait that searches for meaning and purpose. I must emphasize once more, we love having a good laugh. But there’s a difference between fun and hurting someone. Allow me to explain.\n\nImagine this scenario: You like someone and you are sending signals to that person that you like them. You start letting them know this in your own unique way. But they are playing with your mind, sending mixed messages, or late-responsive ones with unclear reasons why, childish sentences, and the list goes on and on.\n\nThe situation above happened to me more times than I can count. This is why I’m always crystal clear with my intentions. I don’t play mind games that will hurt anyone’s feelings and emotions. Instead, I always insist for that individual to speak their mind and be completely honest.\n\nI want you to remember what I’m about to say. The worst truth will hurt less than the best lie.\n\nSo the question is, why this type of behavior doesn’t suit us? Why it’s more repelling than attracting?\n\nHonesty is attractive\n\nThe answer is because we like authenticity. We value honesty, respect, and understanding. We also fully realize that there is a small amount of people who will give us that feedback at the same level that we so selflessly give. So we just want from that person to honor how we feel and be frank with us.\n\nThere are many people that are always open for jokes and fun. But that needs to be only until the point where our emotions are not being toyed with. I consider myself to have a very broad and weird sense of humor, but I can’t laugh over a fact that someone uses my kindness in a negative way.\n\nIt doesn’t matter how young or old you are, this behavior can be universal. And in most cases, there’s no bad intent behind it. I want to believe that people mean no harm when they sometimes make jokes about how we feel. But there’s a thin line between understanding and insult.\n\nThis is why honesty can be so damn attractive! Tell us what the situation really is, and don’t play with how we feel. This acts like a magnet that will draw us closer to you. But we all have our limits when it comes to hurtful behavior. There’s an incredible quote from a famous Canadian poet Najwa Zebian that perfectly explains how we react to coldness, mean jokes, and indifference:\n\n“Fear the day a good heart gives up on you. A heart does not turn cold unless it’s been treated with coldness for a while.”\n\nYour heart can withstand so much, and that’s the truth. It can sustain enormous levels of being hurt, and still find a way to shine and spread the light. I like comparing it with a lighthouse that shows the way. 🙂\n\nSo give that gentle, light-spreading miracle in your chest a gift in the form of a presence of someone who will not toy with it, but cherish it. You earned that kindness. <3\n\n\n\nHow do you cope when someone makes jokes about your emotions? What’s your defense mechanism? We would love to hear your thoughts in the comments below!\n\nWhy We Sabotage Our Own Happiness\n\nDear friends,\n\nWe tend to have a bad habit of sabotaging ourselves when we’re at a good point in our life. It’s as if we’re actively searching for a self-destruct button every time when we are happy. Self-sabotage has it’s root deeply embedded into the core of every personality types. Understanding why we do this is a bit tricky, but it can be conquered and understood.\n\nWhy do we sabotage ourselves?\n\nThe main reason why we sabotage our own happiness may be difficult to hear. It took me quite a while to accept it, but once I did, I managed to end this vicious circle. It’s because most of us want for everyone to be happy, but that we are somehow excluded from it. So when happiness finds us, we start overthinking because we think we’re not worthy to feel it.\n\nThe primary focus should be to fully enjoy these joyful moments, but we choose something else. Does this sound familiar: “This is good, but I should be careful, maybe something bad is coming…” And there you have it our friends, instant recipe for overthinking. We completely disregard our own success, and replace it with overthinking and sabotaging thoughts.\n\nI sabotaged almost every win I ever had. It doesn’t matter how meaningful it was, I always thought that something bad is looking at me behind the corner. So instead of being genuinely happy, I disregarded what I achieved, and went into caution mode to avoid any possible disappointment that may come.\n\nGuided by my own self-sabotage experiences from the past, I want to tell you…\n\nBe happy in the now\n\nThere’s no such thing as a small or a big achievement. Every victory you experience, personal or a business, is meaningful! Don’t rank it by size, because you will only succeed in shrinking yourself. You did it, you won, so stop there. Don’t go further. You did all you could, where you were, and with what you had. You did more than enough.\n\nAs I mentioned, in the past I always sabotaged what I did. I just couldn’t make myself to be happy for my accomplishments. However, I started nurturing myself after every win, instead of seeking what I could have done to improve it. When you reach your goal, when you just enjoy what you did, embrace it with no add-ons.\n\nThe best way I found to conquer self-sabotage is through a simple exercise that’ll only take you 5 min.\n\nLook around you and where you are now. You’re reading this article, which means you’re safe. Nothing bad is happening to you right now at this very moment. Acknowledge that you are not in any danger, and don’t think what will happen tomorrow. In this present moment, you are good. Please repeat this as many times as you need until you remember it.\n\nGround yourself in your current location, because this mindset shift will help you accept the reality. You are safe, and you can be happy.\n\nSometimes, our biggest wins come from quietest moments.\n\nSelf-Sabotage is not your default state\n\nAs you’re looking around your room, or a coffee shop, or nature, nothing bad is happening to you. So now your mind has the space to be happy with what you achieved.\n\nYou’re probably asking yourself: “But Marko, I’m not sure what I achieved?”\n\nAren’t you still here? You’re breathing and your existence is making someone happy whether you see it or not. Wins don’t always come in forms of promotions, money, or career… Sometimes, they’re as gentle as reading a message from a loved one telling you how much they love you, or having that peaceful sip of coffee in the morning.\n\nGive yourself the permission to smile about the things most people never notice. When you do, self-sabotage will never again take a hold over you, because you’ll always know what you need to do to make it go away.\n\nSo the next time when you win and feel fulfilled, close the door on those self-sabotaging thoughts. Open the window for happiness to come in. It’s your birthright to be happy and bathed with the rays of joy for who you are! 🙂\n\n\n\nDo you tend to sabotage your success? What are your thoughts on this topic? We would love to hear from you in the comments below!", "pred_label": "__label__1", "pred_score_pos": 0.5284651517868042} {"content": "The Importance of Men’s Preventative Care\n\nAs people age, they naturally face changes and challenges to their overall health. As some of us already know, the body you have in your 40s is not at all the same as the one you had in your 20s. This means that your preventative healthcare routine has to change along with you. Screenings for different ailments, diseases, or cancers, become more vital as your body’s risk factor for these conditions can increase over time. Let’s take a look at what screenings and preventative measures you should be considering depending on your age.\n\nAges 20 -39\n\nMost people are able to boast a strong metabolism into their late 20s or 30s. A healthy metabolism helps you eat and drink whatever you want while seeing few negative consequences. But a strong metabolism doesn’t mean you’re invincible. Common health problems for men in their 20s can include everything from erectile dysfunction to testicular cancer.\n\nMen between the ages of 18 and 40 are the most unlikely group to schedule a doctor’s visit. This is concerning due to the fact that these years are some of the most crucial in terms of taking control of your health. Between the ages of 20 and 39 is when you should begin to regularly monitor your blood pressure as well as your cholesterol. Getting a yearly physical exam is just one of many healthy habits people in their 20s should develop to set themselves up for a healthy future.\n\nAges 40 – 65\n\nOnce you get to age 40, the need for screenings and checkups increases. Regular prostate exams and colonoscopies become crucial for men between 40 and 50 in order to make sure they’re clear of prostate and/or colon cancer. The chance of developing diabetes also rises as you get closer to 50, so it is recommended that people get tested at least once every 3 years.\n\nAge 65 and Over\n\nHumans stop growing new bone mass by the time they reach the age of 25 or 30. So by the time you get into your 60s, we’re at a much higher risk for issues stemming from brittle bones like osteoporosis and rheumatoid arthritis.\n\nIf you have ever smoked in your life you should be also be getting screened for abdominal aortic aneurysms, which can be caused by tobacco use and most often occur in people over the age of 65.\n\nACA and Healthcare Costs\n\nWhen it comes to serious health conditions, early detection is key. Having the proper knowledge and awareness of your health will ensure that you’re well prepared for any medical challenge you take on. These routine test allow doctors to monitor, diagnose, and treat conditions before they become catastrophic health events that send patients to the emergency room or an extended hospital stay, saving them from the crippling medical debt associated with such events. Thankfully, most of the services mentioned in this article are covered under the Minimum Essential Care (MEC) clause of the Affordable Care Act. This means if you have a non-grandfathered employer sponsored or healthcare exchange medical plan, many preventative services are provided to you at no cost. Covered services can also include screenings for sexually transmitted diseases, flu shots, and counseling for smoking cessation and weight loss. These covered services and tests drastically reduce the out-of-pocket medical expenses formerly associated with preventative care and statistics show has also reduced the overall cost of healthcare.\n\nIf your group is looking for more information on wellness programs or any other employee benefit, contact us to speak to a consultant. \n\nInfographic created by HIMS, a specialty men’s telehealth provider.", "pred_label": "__label__1", "pred_score_pos": 0.7925682067871094} {"content": "An Indoor Herb Garden: Not as Easy as it Looks\n\n\n\n\nMost herbs suffer in silence indoors over the winter.\n\nCan you really grow herbs indoors over the winter and thus always have fresh herbs to add to your menu. Yes, but… and it’s a big but.\n\nAnd that’s in spite of the fact that lifestyle magazines and television shows keep on pushing the idea that growing herbs indoors is as easy as pie. I can pretty much guarantee that none of the journalists who promote the technique have ever tried it. They only repeat, like parrots, misinformation gleaned from others just as misinformed. So let’s dot a few i’s here.\n\nWhy Things Go Wrong\n\nThe problem is that most herbs just aren’t adapted to the conditions we can offer them in our homes during the winter, especially low light and dry air. Even in front of a large south-facing window, the light received by windowsill plants December through February is equivalent to no more than deep shade outdoors in June and July, notably because days are very short and often cloudy to boot. Fluorescent lights help, of course (set the timer for 16 to 18 hours a day to ensure maximum light), but give moderate light at best, enough to keep the plants alive, but not enough to promote the dense healthy growth of herbs grown outdoors.\n\nAlso, the atmospheric humidity in most homes is closer to that of the Sahara Deser than what herbs would like, that is at least 50%.\n\n\nBarely 3 weeks after being brought indoors, this basil is already dead.\n\nPlus plants weakened by a lack of light and dry air become prone to diseases and bugs, including whiteflies and spider mites. And eventually start to die back.\n\nBut don’t give up hope just yet: there are some herbs that do fairly well in the house and you can keep most at least alive if you know how to handle them.\n\nIndoor Herb Scorecard\n\n\n\n\nBay laurel is one of the few herbs that actually does well indoors.\n\nBay Laurel or Bay Leaf (Laurus nobilis): This leathery-leaved plant is the easiest herb to grow indoors. You can place it in sun or partial shade or under a fluorescent lamp. Its growth is very slow, but it does grow, and it seems indifferent to the entire indoor temperature range, from 34˚ to 95˚F (1 to 35˚C). By bringing your bay laurel indoors every fall and putting it back outdoors every summer (it can stay outdoors all year in zones 8 to 11), it will gradually become a fairly sizeable shrub or even a small tree, but that will take decades.\n\nWatch out for scale insects, though! Most bay laurels sold these days are already infested (read Another Bay Laurel Bites the Dust for more details), so make sure you get yours from a reliable source.\n\n\nParsley does fairly well indoors… if you give it your brightest light.\n\nParsley (Petroselinum crispum): If you pot yours up and place it in a brightly lit spot at normal room temperatures, it will grow slowly but steadily throughout the winter. The leaves may be a bit floppy, but they’ll still be edible. Watch out for spider mites though. It’s not worth saving parsley for a second year. It’s a biennial and begins to bloom in the spring, then becomes bitter. It’s done its job: just toss it in the compost!\n\n\nStevia is one of the happier campers indoors.\n\nStevia or Sweet Leaf (Stevia rebaudiana): This ultra sugary herb is one of the few that is of tropical origin (most classical herbs come from climates where winters are cold or even freezing) and, therefore, very tolerant of the warm temperatures we maintain in our homes. If you set the thermostat to please yourself and your family, it will be happy too. Give it as much sun as you can and if it starts to etiolate (stretch for the light), just chop it back. Give it normal houseplant care, including watering when the soil is dry to the touch.\n\nThere are other herbs of tropical origin that may not be traditional cooking herbs in European cuisine, but that have the advantage of doing fairly well in our homes. This group includes the various scented geraniums (Pelargonium spp.) and rau ram or Vietnamese coriander (Persicaria odorata). Lemongrass (Cymbopogon spp.) is a tropical grass (zones 9 to 12) that can also be grown indoors. Given it’s origins, you’d think it would do well there, but in fact, keeping it alive can be difficult unless you can offer it a very sunny windowsill.\n\n“Think Twice” Herbs\n\nThese are herbs that will do all right indoors, but only if you meet their special needs. These aren’t necessarily going to be the stars of your windowsill, but they ought to be able to produce a bit of a crop indoors.\n\n\nYoung basil plants do all right indoors, but mature plants tend to keel over.\n\nBasil or sweet basil (Ocimum basilicum): More people fail with basil than any other herb, but it will grow quite well indoors if you know what to do.\n\nIt’s important to understand that sweet basil is a naturally short-lived plant, little more than an annual. So when you try to bring in a basil plant from your summer garden, you’re dragging in a plant that is just about to croak: it rarely survives the transition between outdoors and in. However, if you sow basil seeds (ideally under lights), you’ll be starting afresh with a new young plant and should get excellent results… at first. It does go downhill more quickly indoors than out, so when it shows any sign of decline, harvest it and make a huge batch of pesto.\n\nBy resowing occasionally and always harvesting basil when it is still young and vigorous, you should get great results. Just give the plants the best light you can.\n\nNote that basil loves heat: this is not a plant to put in a cool room. Keep in a spot that remains relatively warm even at night (preferably above 60˚F/15˚C) and it should to fine.\n\nSo much for sweet basil. There are perennial basil species that are naturally long-lived and that will do much better indoors, thriving over the entire winter in bright light. This group includes African blue basil (O. ‘African Blue’), holy basil (O. tenuiflorum) and lemon basil (O. x citriodorum), including the popular variegated form, O. x c. ‘Pesto Perpetuo’. Note though that these easier-to-grow basils don’t have the same taste as sweet basil (O. basilicum).\n\n\nChives needs a cold treatment before you bring it in.\n\nChives (Allium schoenoprasum), lemon balm (Melissa officinalis) and French tarragon (Artemisia dracunculus sativa): These three cold-climate plants tend to decline indoors… unless you give them a cold treatment first. Pot them up in September or October, but then leave them outdoors until they’ve gone through a good frost or two (or three). Now, when you do bring them in, they’ll think it’s spring and start to grow vigorously.\n\nOregano (Origanum vulgare), sage (Salvia officinalis) and thyme (Thymus vulgaris and others): These plants prefer to be outdoors in the winter and you may find mature plants don’t adapt well to being moved indoors. You’d do better to take stem cuttings in the autumn and grow the cuttings indoors instead. They’ll still be in their “young and vigorous” stage of life, allowing you a decent harvest.\n\nLemon thyme (T. x citriodorus) is particularly easy variety for indoor growing.\n\n\nRosemary: not the easiest herb indoors.\n\nRosemary (Rosmarinus officinalis): I’m always annoyed when gardeners gush on and on about how beautiful their rosemary is in the winter and how they have no problem growing it. You see, I just don’t have quite the indoor conditions it wants, that is a cool but intensely sunny room. Nor to most people. And a rosemary plant that doesn’t like its conditions is soon a dead rosemary plant.\n\nLook for a spot when temperatures remain below 60˚C (15 ° C) at night (and in fact, during the day as well if possible), yet above freezing, and water it carefully, just enough so that the soil is barely moist and you too can have rosemary you can be proud of.\n\nTrue lavender or English Lavender (Lavandula angustifolia): It prefers to spend its winters in the ground, but can sometimes remain alive indoors under the same conditions as rosemary – bright sun, low temperatures, and careful watering – although it won’t do much more than just sit there. My personal thought is that lavender really is an outdoor plant and there is no really good reason to want to grow it indoors.\n\nLess hardy Spanish Lavender (L. stoechas and its hybrids, zones 7-9) can also spend the winter indoors under similar conditions. Bringing it indoors is a way for cold-climate gardeners to save it from the cold.\n\nMint (Mentha spp.): There are many species of mint and some do better indoors than others, but in general these are rock-hardy herbs that actually prefer a winter outdoors. When you try to grow them indoors, they tend to gradually deteriorate, unable to adapt to constant heat and dry air. But if you have a barely heated but brightly lit room or a cold greenhouse, they can do quite well. Unlike the two previous plants (rosemary and lavender), that prefer to their soil to remain barely moist, water mints well, although without exaggeration: they don’t like to dry out.\n\nHerbs Not Worth Saving\n\nDill (Anethum graveolens), anise (Pimpinella anisum), coriander (Coriandrum sativum), borage (Borago officinalis) and chervil (Anthriscus cerefolium): These are annuals and will be nearing the end of their life cycle in fall, if in fact they are not already dead at that time. There is no use trying to save from the cold a plant that it is genetically programmed to die only a very short time later!\n\nYou can always sow seeds of these plants indoors (fluorescent light might well be necessary) if you want access to fresh leaves during the winter, but they probably won’t produce seed indoors and for several of these herbs, seeds are the part most often consumed.\n\nWinter Care for Herbs\n\nIf you do decide to bring some herbs indoors for the winter, remember they’ll need as much light as you can give them as well as good atmospheric humidity. For the latter purpose, the use of a room humidifier may be necessary. Water them generously when the soil is dry to the touch.\n\nIf you grow your herbs in front of a window, stop fertilizing in late November. You don’t want to encourage them to grow under poor light, as that will lead to weak, etiolated growth. Start fertilizing again at the end of February or in early March, when the days are longer.\n\nIf you grow herbs under lights, that’s a different story: you’ll be able to maintain long days (16 to 18 hours) all year, so they’ll keeping growing all through the winter. Feed them monthly with an all purpose fertilizer.\n\nKeep your eyes open for pests, especially spider mites and whiteflies, but also aphids. Treat them with insecticidal soap if you see any. And remove diseased leaves on sight, as they can spread like wildfire on stressed plants… and the average indoor herb is very stressed!\n\nWith a the information above, you should be able to cultivate at least a few herbs in your home this winter… and maybe even impress your guests with a bouquet of fresh herbs on the table in mid-January!\n\nBut be honest with yourself: growing herbs indoors may be trendy, but is not an ideal situation for most of them. You’re putting them through considerable stress and most would really prefer being left outdoors for the winter.\n\nMy thought is the following: for everything there is a season… and winter is just not the season for most herbs. A truly laidback gardener would learn to accept that herbs are summer plants and leave it at that.", "pred_label": "__label__1", "pred_score_pos": 0.511722207069397} {"content": "equivalence in translation\n\nequivalence in translation\n\nA challenge in multinational research is establishing equivalence of meaning for a concept. Some words may be easily transliterated, but transliteration may not do justice to the idea behind the word. For example, “purpose” in English is “propósito” in Spanish. But “propósito” may not capture the nuances of meaning, intention, and beyond-the-self impact that research on youth purpose focuses on (Moran, 2015).\n\nRather, the English equivalent of the words expressing the concept of purpose would be “ideal life” in China, “life project” in Brazil, “hopeful future” in Finland, “ultimate achievement” in Korea, and “objective” in Spain (Moran, 2015). These other terms carry metaphorical connotations originating from each country’s nuances and development over time.            \n\nCultural or linguistic differences can be adjusted with “decentering.” Researchers collaborate to agree on the meaning of the concept, then to modify the language appropriately rather than using verbatim words (Larkin, Dierckx de Casterlé, & Schotsmans, 2007; Su & Parham, 2002).\n\nAnother example from our collaborative study of how service-learning influences youth purpose around the world occurred with the phrasing asking about students’ experiences doing work in their communities. The English version asked respondents to answer several questions about their “most recent fieldwork.”\n\nHowever, “fieldwork” in Spanish transliterates to “trabajo de campo,” which could also mean working in the countryside. So instead, researchers chose “sevicio y aprendizaje” (service-learning) to be clearer.\n\nIn Finnish, the reference to “most recent fieldwork” could not be addressed in a preliminary paragraph before the questions. It was important that this phrase be included in each question.\n\nThe challenge of equivalence is compounded when trying to translate across more than two countries. A word, item, or concept may be relevant in some countries but not others, or directly translatable across some languages but not others. For example, while a life purpose focused on job/career may be applicable across all countries, owning a business may not be a relevant option in all.\n\nAlthough there are guidelines, there are no absolute rules in translating a research survey into multiple languages. The process requires patience, collaboration, and empathy. However, these “difficulties” may be opportunities in disguise (Moran, 2015). The variability of meanings across countries are intriguing and deserve further investigation in their own right.\n\n By Cori Palermo, Clark University       \n\n\nRead also Variability in Translation.\n\n\n\nMoran, S. (2015, November). Cultural and historical roots of purpose. Talk given at the annual meeting of the Association for Moral Education, Santos, Brazil.\n", "pred_label": "__label__1", "pred_score_pos": 0.9984369874000549} {"content": "Friday, December 6, 2019\nUS flag\nHome Tags Jupiter\n\nTag: Jupiter\n\nSunspot moved from where it was 3 days ago\n\n\nJupiter in opposition today. Wow!\n\nThe world's beauty is joined by extraterrestrial beauty, and since Jupiter is now closer to Earth than it has been in a year, NASA took some pics.", "pred_label": "__label__1", "pred_score_pos": 0.8552379608154297} {"content": "How To Clean Coins With Muriatic Acid\n\nHave coins appraised before cleaning them yourself.\ncoins image by Maria Brzostowska from Fotolia.com\n\nCoins can generally be cleaned in a variety of ways. They can be cleaned with a soft toothbrush dipped in a mild soap and water. They can also be soaked in a cup of white vinegar with a tablespoon of salt dissolved in it, for example. Muriatic acid can be used to clean coins that are covered with a grimy crust. You have to be careful cleaning coins, especially when you're using strong chemicals such as acids. You can easily wipe the details off a coin and turn it into a worthless piece of metal.\n\nChoose a well-ventilated area to work in. Muriatic acid fumes can cause lung damage. They are both toxic and corrosive (see resources). Protect yourself with long-sleeved shirt and pants, closed shoes or boots, rubber gloves and safety goggles.\n\nDilute the muriatic acid with water in a small plastic bowl. Pour the water in the bowl first. Then pour the acid in slowly so it doesn't splash. Use one part acid to 20 parts water. Carefully stir the solution with a plastic spoon.\n\nPlace the coins in the diluted muriatic acid to clean them. After the bubbling stops -- it can take a half minute to as long as a couple minutes -- remove the coins from the bowl. Rinse them well with clean water.\n\nMix up a solution of baking soda and water in a clean plastic bowl. Use one part soda to three parts water. Place the coins in the solution for 24 hours.\n\nRemove the clean coins from the soda water and rinse them with clean water. Then, dry them with a soft cloth.\n\n\nYou can use the leftover muriatic acid to clean more coins.\n\n\nMuriatic acid- which is also called hydrochloric acid- is a corrosive chemical. It should be used with extreme care.\n\nNever pour water into muriatic acid. Always pour the acid into the water.\n\nAccording to anythinganywhere.com, (see resources), it's okay to clean gold, platinum, silver, iron and nickel coins with acid. Copper, brass, zinc, tin and aluminum are all on the \"No\" list.\n\nAbout the Author\n", "pred_label": "__label__1", "pred_score_pos": 0.6302756071090698} {"content": "Dr. Stephanie Bailey Dr. Stephanie Bailey\n\nDean and Director of Public Health Initiatives, College of Health Sciences, TN State University\n\nDr. Stephanie Bailey talks about the distinction between healthcare, public health and population health\n“Health departments are slow to get to the cutting edge. They’re used to dealing with the day-to-day things and the task burden is high. That’s where partnerships and tools of electronics should be used more because it will help get everyone involved in the health of the community.”\n\nWhat do you see are the key distinctions between the roles of healthcare, public health and population health and the impact each has on our communities?\n\nPopulation heath is usually associated with public health. Public Health, in our circles, is the health of the public – the derivation to population health was brought up to move it away from private individual health and more of the population as a whole. The Institute of Medicine put out a dynamic publication around 1988 which began the conversation about explaining public health and it evolved into the essential services performed by public health. In a nutshell, it was about public health in America: preventing epidemics (like Ebola and TB) and the spread of disease, protecting against environmental hazards, prevention of injuries, promoting and encouraging health behaviors (the health promotion part), responding to disasters, assisting communities in recovery and ensuring the quality and accessibility of health services (which brings in healthcare).\n\nGiven your roles at the CDC, NACCHO, and as Director of Public Health, what is your perspective of how various health agencies (federal, state or local) team up to balance tasks, aid in prevention methods and achieve overall public health goals?\n\nIt’s difficult still and it shouldn’t be. It’s difficult because of the way funding comes down from federal government to communities, because of overlapping responsibilities of various agencies across the federal and state governments, because of the complexity of cases which come into their purview. If we look at how the money comes down to service patients or public health clients (say, at a local health department), it is very complex. If you were to put all federal agencies on the top level, state agencies on the middle level, and local agencies and patients on bottom level, and then draw lines from Federal agencies (CMS, CDC, etc.) – the money comes down through the state departments and then it’s distributed out to the local level or directly to community based organization or public health department. The money crisscrosses so that there may be up to 21 discrete funding lines to treat the one individual.\nEach individual agency adds on their particular service to service the whole individual, rather than looking across the aisle for a collaboration of expertise to partner with, to coordinate with other health agencies. For example, you can’t use a TB investigator to go into a drug house and investigate both the STD and TB patient because the STD money can’t be crossed with TB money nor vice versa.\nThe various agencies should balance better, but there’s overlapping responsibilities, there are funding strains; different areas of reimbursement and complexity of cases that make it impossible to team up and balance. So it gets very complicated and we need to simplify all those mechanisms.\nFunding Resource Flow 020215\n\nWhat is your opinion on Electronic Health Record EHR and Meaningful Use measures and the impact they have on the public health infrastructure? How can EHR benefit local health departments?\n\nI think Electronic Health Records are great! It will make the infrastructure stronger, and make it less cumbersome. It will allow for more access to records and less redundancy, and I think it will decrease costs. I think there are some downsides like privacy, but the benefits far outweigh what some of the downsides may be.\nSoftware in all industries make complex tasks simpler, reduce errors and increase efficiency. Done right, EHR can help public health departments by taking complexity of dealing with numerous funding sources and associated reporting and compliance. Public Health focused EHR can streamline operations by providing local health departments:\n1. Single Patient View: Provide a single view of patient in the health department. Due to the silo nature of funding, a patient record (at a local health department) is in different binder e.g. immunization is in one place, STD is in another paper record, family planning visit is in another.\n2. Eliminate systems and dual data entry: Numerous funding agencies require recipients to log into various systems to either enter data or provide reports. An EHR can eliminate this burden. Data only needs to be entered once and the EHR can send it to wherever it needs to go, automatically. Given the complexity of funding, this can be a huge saving for public health departments.\n3. Achieve Compliance: We all wish our staff to follow best practices. These rules can be built into the EHR, with appropriate alerts, to ensure that the whole organization is compliant to funding agency defined best practices. Additionally, federal government has mandated the use of meaningful use compliant EHRs.\n4. Patient Involvement: People need to be more involved and feel more empowered about their own health. Electronics play a role to allow me to monitor, measure and view progress.\nSo, yes, we need to move to EHR and I think it can only enhance the infrastructure for health delivery. As it becomes a system – and that’s my vision, than the access to data will be a great benefit. With that data you can give a better health status of community and know which interventions need to be implemented as the quality of life and health status changes over time.\n\nYou are, as you say, “a lifetime champion of community health excellence”. Tell me what you mean by that, how you came to be such a champion, and why this matters to you.\n\nThis one comes from looking back at my life, as well as the other personal tag that “I lift people up so that they can soar”.\nBecause of my long career in public health and dealing with assessments and processes that help bring communities together, in order to look at their health; and create and manage a strategy to seek better results for themselves. I see them come into the realization that this is ours. During my tenure as director of health, we were looking at disparity issues in Davidson County. It was our responsibility and it had nothing to do with whether we received money from the state or federal government, it was the community which had the dynamic processes and the assets; had the will and wherewithal to create healthy environments for themselves. That’s where my passion is and that’s where I thrive. I champion this!\n\nHow can the community and private organizations partner with public health departments to help build “excellence” for their communities?\n\nIt can be forced; better when it is not. The IRS has required nonprofit hospitals to do community health assessment for tax exemption status. So you’re finding that what used to be just a purview of public health is being recognized as something which should happen in other venues as well. So you see hospitals doing community assessments and other organizations doing them and you see funding coming down requiring partnerships with public health for the health of the public. Partnering and everyone in is the only way health can happen. It doesn’t just happen at the doctor’s office it happens in so many other ways and is largely determined by factors outside of healthcare delivery system.\n\nAbout Dr. Stephanie Bailey\n\nDr. Stephanie Bailey served as the Chief for Public Health Practice of the Center for Disease Control and Prevention (CDC) from 2006 to 2010, she held the position of Director of Health for the City of Nashville/Davidson County from 1985 to 2006 and was President of the National Association of County and City Health Officials (NACCHO) among many other roles. For more information about Dr. Bailey’s achievements and awards and her “lifetime champion of community health excellence”, click here.", "pred_label": "__label__1", "pred_score_pos": 0.9177517294883728} {"content": "Molly Essington\nMolly Essington\n\nMJ Essington\n\nDelivery Director\n\nMJ joined PrincetonOne in 2016 and currently serves as Delivery Director for the company’s Recruitment Process Outsourcing (RPO) team. In his current role, he is responsible for the training and development of the team’s Talent Assessment Specialists.\n\nWith a deep understanding of the recruiting industry, MJ enjoys helping his team members achieve their goals, no matter how big or small. He works diligently to help them hone their skills, expand their knowledge and ensure that they have the resources, guidance and unwavering support they need for continued success.\n\nMJ is currently pursuing his bachelor’s degree in Human Resource Management from Western Governors University in Salt Lake City, Utah. Away from the office, MJ enjoys tending to his urban homestead complete with chickens and a robust garden with his girlfriend, Sena, their dog, Oliver and their cat, Richard. His hobbies also include traveling, volunteering and showing off his Championship Pigeon Showman belt buckle around the office.\n\nConnect With PrincetonOne\n", "pred_label": "__label__1", "pred_score_pos": 0.9985969066619873} {"content": "L'etoile de Marie\n\nLocated in the heart of the star-shaped city of Rocroi, l’Étoile de Marie is an 8-room hotel. Every room has been refurbished and is functional. The hotel offers a bar and a terrace well exposed to the south.\nSituated on the Charleroi-Charleville road, the hotel is the ideal place to take a break on your journey or to rest in the French Ardennes.\n\nYour reservation\n\nCheck-in date\n/ /\nNumber of night\nType of accommodation", "pred_label": "__label__1", "pred_score_pos": 0.9738633036613464} {"content": "Transition Management Consulting, Inc.\n\nWhat Associations Can Learn from Papal Succession\n\nby Associations Now | Feb 14, 2013\nAssociations Now interviewed Jackie Eder-Van Hook and Robert Van Hook on what lessons associations and nonprofits might learn from the papal successions.\n\n\nEven with the unexpected resignation of its spiritual leader, the Catholic Church has a system in place to swiftly install the next pontiff. What can associations learn from it? \n\nWhat if your organization's CEO announced today that she was no longer able to effectively execute the duties of her position and would resign at the end of the month? How would your organization handle the news, and would you know what steps to take next?\n\n\"A succession plan helps the organization follow a well-thought-out plan created in advance of a leadership crisis, when clearer minds are likely to prevail.\"\n\nThat's pretty much what happened this week to the Catholic Church and its more than 1 billion members.\n\nPope Benedict XVI shocked the world Monday when he announced that he would be stepping down from the papacy at the end of the month due to his deteriorating health, but his decision is unlikely to significantly disrupt the Church's operations. When the time comes ”probably next month, according to news reports” Catholic leaders from around the globe will gather in Rome to begin the centuries-old process of selecting a new spiritual leader. Past papal elections, at least in the modern era, suggest that the transition will be seamless.\n\nYou probably don't employ a College of Cardinals to select your organization's next leader, but there is something to be learned from the Catholic Church's \"succession plan,\" say Bob Van Hook and Jackie Eder-Van Hook, co-founders of Transition Management Consulting, Inc. Here's what they told Associations Now after news of the pope’s departure broke this week:\n\nIt would seem that the Catholic Church has succession planning figured out, given they've had a set process in place for centuries that seems to be working.\n\nJackie Eder-Van Hook: The Catholic Church has done a good job of creating a succession strategy. The Cardinals have been developed over the course their careers, and the Vatican has a discernment process that helps identify those who would be most capable of serving as pope. Of course, the system is not a flawless process, as there is a paucity of diversity among the candidates.\n\nWhat are the benefits of having a succession plan in place, especially in an instance where a vacancy happens suddenly or unexpectedly?\n\nJEVH: Most associations do not have the capacity to develop hundreds of cardinals. A succession plan helps the organization follow a well-thought-out plan created in advance of a leadership crisis, when clearer minds are likely to prevail. Having a plan in place allays the concerns of staff, members, vendors, and other stakeholders.\n\nWhen an association doesn't have a succession plan, what might it face if a sudden vacancy occurs?\n\nJEVH: Selecting an executive leader is one of the most important responsibilities of a board of directors. When a board is faced with a leadership vacancy and they do not have a plan in place, they must make a lot of decisions in the midst of a crisis. Most boards lack experience hiring nonprofit executives and find themselves at a loss for what to do. Without effective interim leadership, momentum in achieving the mission may be lost, and staff, members, and stakeholders may feel adrift.\n\nWhat are the first steps a group should take when faced with a sudden vacancy?\n\nBob Van Hook: Take a deep breath. While it might be a crisis of planning, it is not a crisis. An executive search may take four to seven months. The first question is how to maintain the association's momentum during the vacancy and provide for interim management. This can give the association space for determining how well the organization is operating and where it wants to go in the future, and what type of leader they will need.\n\nHow does a group design a succession plan that addresses sudden vacancies?\n\nBVH: A good succession plan objectively considers current organizational realities, such as finances, staffing, priorities, governance, and expected duration of vacancy. This helps determine whether the organization is ready to conduct the search for a long-term successor and establishes the strategy for that search. Succession planning should be a key responsibility for any board of directors and is no less important than developing a strategic plan. It is a lot like estate planning no one likes to do it, but if you don't, the consequences are serious for those left behind in the organization.\n\nLink to Associations Now Daily News", "pred_label": "__label__1", "pred_score_pos": 0.6076371669769287} {"content": "Scroll to top\nArt installations & performances\n\n\n\nThe story\n\nTwo vagabonds are waiting in the middle of nowhere for someone who is supposed to come and find them. But soon, the first questions arise: is it the right place and the right time? Has Godot already come? Since when are they waiting? And especially, what should they doin the meantime?\n\nActors' note of intent\n\nWe do not go towards the await, nor does it come to us. Waiting in contemplation time is extremely threatened in our current society, it is considered as a danger, we even try to avoid it, by “killing the time\". Due to too much entertainment, the modern man no longer possesses one of his essential abilities, to waste time. Deprived of speech and \"lock out outside\" it is through the body and sounds that these characters, who no longer think clear but hope much, will wait sometimes calmly, sometimes submerged with impatience and childish madness, the imminence, the end of the await.\n\nWhat do we do now?\n\nAbove the void everything is possible, creativity, hope, joy but also despair and sadness. What to do when boredom seizes you?\n\n\"Waiting for Godot\" is the story of the modern man. These small gaps of time should be regarded as half empty or half full, between comic and tragic, entertainment and boredom, small flights of life and hangovers, unexpected encounters and the return to normal.\n\nStaging note\n\nHow to stage the await?\n\nAt the beginning there is a space, and as occupants a tree and two vagabonds and around them, nothing. There is no place, no time, no particular indication of the characters, there is not even a storyline, the action is repeated without an end.\n\nThe scene is not cut off from the public, the latter is free to wander around the structure that encloses the characters, so they can see them evolve as in an aquarium. The time is the same for the actors as for the audience and the await is the same for both parties, with the feeling that time does not pass. Nuance the boundaries between actors and spectators, making boredom and entertainment coexist. This piece is halfway between theatre and clown. Beckett's existential questioning encounters the absurdity of the human condition. Here is the challenge of this piece, to put the nothing in action.\n\n\nManon Legrand has been trained in various private schools such as the Acting International and Peyran-Lacroix courses. In addition to her professional studies, she completed internships at the Ruby complex theatre in Los Angeles and at the hostellerie de Pontempeyrat directed by Alexandre Del Perugia. She later performed in two plays at the Opéra nursery theatre - \"We missed the end of the world\" by Hervé Bernard Men and \"The powder\" by Mylène Lormier. She has also participated in various short films, commercials, documentary and dubbing.\n\nEmma Julian, 22 years old, after obtaining a degree ES in Lyon she moved to Paris to follow her professional training at the Cours Florent. In the first year and in parallel with the program of this school she have assembled a troupe with class friends,\n\n\"The great tirade\" with which she has performed for a year in Paris.\n\nDuring this training she was also able to take part in the graduation piece, open to the public and closing her years of study. Finally she had the chance to play at the Center Wallonie Bruxelle in Paris in a creation directed by Felicien Juttner.\n\nAlan Barcelon is a young French writer who has lived a large part of his life in Spain. He worked as an assistant director on a French feature film and Spanish films. After studying theatre in Paris and projects where he worked with directors such as Benoit Guibert and Michele Harfaut, and staging works like \"Faust\", \"Festen\" or \"Le roi s'amuse\", this year he publishes his first collection of poems.\n\nPierre Séveno followed a theatrical training at the Cours Florent in Paris as well as The One Man Show at the theatre cafe in Nantes. He had the opportunity to work with directors such as Félicien Juttner and Michèle Harfaut. In 2017 he staged the play \"Caligula\" in Paris, a play around the cycle of the absurd. He has been experimenting with various musical and body projects ever since, and has appeared in several short films and commercials.", "pred_label": "__label__1", "pred_score_pos": 0.5413489937782288} {"content": "\n\nPrice Starting From:\n\n\n* Taxes, vehicle registration and insurance not included.\n\nFuel Consumption:\n\n\n\nMazda promises uncompromising driving, and this has inspired the creation of a high-end, innovative crossover; a three-seat SUV for seven passengers, designed to turn heads. The Mazda CX-9 offers an athletic and sophisticated exterior, excellent handling, advanced connectivity, state-of-the-art security technology and exquisite interior features. Plus, the all-new 2.5L SKYACTIV engine with a dynamic pressure turbocharger, it delivers more power when you need it most - while delivering exceptional fuel efficiency.\n\nThe SKYACTIV Dynamic Vehicle Control and the new G Force Vector Control (GVC) operate in the background to promote smoother, less tiring driving for the driver and his passengers. The steering becomes more precise and the ride more comfortable for the occupants.\n\nThe next family outings will be in a generous cabin, offering multiple storage options. When it comes to getting passengers in, seat configuration becomes easy. Simply use the release lever to tilt and slide the second-row seat forward to access the third row. Occupants will also be more comfortable with larger leg room in the second and third rows. Plus, the sleek Mazda CX-9 offers plenty of hidden storage space in the console, center armrests, glove compartment, seat back pockets, and door compartments; to keep your essentials on hand, but out of sight.", "pred_label": "__label__1", "pred_score_pos": 0.704318642616272} {"content": "Serving the Antelope Valley for over 30 years.\n\n\n\nCauses of Truck Accidents: Driver Fatigue\n\nCauses of Truck Accidents: Driver Fatigue\n\n\nAlthough state and federal transportation safety officials have implemented a series of regulations to attempt to prevent truck driver fatigue and the collisions it can cause, tired motorists continue to operate their vehicles. Fatigue can result in impairments similar to alcohol or drug intoxication.\n\nThe following are several things fatigue can do to a trucker:\n\n 1. Loss of attention and focus on the road and the primary task of operating a vehicle\n 2. Impair judgment and decision-making skills\n 3. Reduces reaction time if faced with an unexpected situation on the road\n 4. Result in falling asleep behind the wheel\n\nHours-of-Service Regulations\n\nHours-of-service (HOS) rules are in place to try to prevent trucker fatigue and ensure that they take the appropriate amount of time to get rest in order to operate their vehicles safely. According to FMCSA regulations, truckers are allowed to work up to 14 hours a day, but can only drive 11 hours out of the 14-hour day. The FMCSA requires that truckers and trucking companies maintain logs, expenses receipts, and other paperwork to track hours of service regulations.\n\nInjured by a Fatigued Driving in Antelope Valley?\n\nTruckers who operate a commercial vehicle while fatigued may be found negligent and liable for any injuries they caused in a resulting collision. With more than 75 years of combined experience and over a billion dollars won in settlements and verdicts on behalf of our clients, our Lancaster truck accident lawyers at Accident Attorneys understand what it takes to obtain the most favorable results possible and help you make a successful recovery from injury.\n\nContact us and schedule a free consultation today.", "pred_label": "__label__1", "pred_score_pos": 0.9732691645622253} {"content": "Asked Oct 24, 2019\n\nAfter conducting a re-test for independent samples, you arrived at the following:t(47) = 3.41, p<.05. The degrees of freedom is indicated by which of the following?\n\nA. 47\n\nB. 3.41\n\nC. <.05\n\nD. P\n\nE. T\n\n\n\n\nExpert Answer\n\nStep 1\n\nGiven information:\n\nFrom the given information the following information can be observed:\n\nThe test statistic is t.\n\nThe value of t ...\n\nWant to see the full answer?\n\nSee Solution\n\nCheck out a sample Q&A here.\n\nWant to see this answer and more?\n\n\nSee Solution\n*Response times may vary by subject and question.\nTagged in\n\n\n\n\nRelated Statistics Q&A\n\nFind answers to questions asked by student like you\n\nShow more Q&A add\n\nQ: Do people walk faster in the airport when they are departing (getting on a plane) or do they walk fa...\n\nA: a)An observation studies is, where the researcher is not able to control the experiment. While in th...\n\n\nQ: When tall and colorful plants are crossed with short and colorless plants, four types of plants will...\n\nA: Computing the probability:It is given that tall and colourful with probability, 0.37. That is, p1 = ...\n\n\nQ: Grouping individuals into low, middle and high categories implies a scale of which type? Nominal O...\n\nA: Levels of measurement:The variables can be classified based on the values that can be assigned to th...\n\n\nQ: A graphic representation of a hypothesized causal model is known as a(n): Burchard chart. polygon....\n\nA: Casual Modelling: The casual model is used for specifying the pattern of causal relationships or lin...\n\n\nQ: A SI bet in a state lottery's Pick 3 game pays $500 if the three-digit number you choo se exactly ma...\n\nA: Hey, since there are multiple subparts posted, we will answer first three subparts. If you want any ...\n\n\nQ: P(-2.93<z<0)= P(-2.53<z<-0.240)=\n\nA: The formula to calculate probability is,\n\n\nQ: Pulse rates of women are normally distributed with a mean of 77.5 beats per minute and a standard de...\n\nA: Standard normal distribution:The normal distribution has mean as 0 and standard deviation as 1.The t...\n\n\nQ: A and B are independent events. Use the following probabilities to answer the question. Round to 4 d...\n\nA: From the given information, events A and B are independent, probability that occuring event A is 0.7...\n\n\nQ: Questic Among 21-to 26-year-olds, 36% say they have used a computer while under the influence of alc...\n\nA: Hi! Thank you for posting the question. Since your question has more than three sub-parts, we have s...", "pred_label": "__label__1", "pred_score_pos": 0.783967912197113} {"content": "\n\n25 Cutting-Edge Products At CES Unveiled 2019\n\n\n\nDeepRay by Cambridge Consultants\n\nDeepRay is an advanced artificial intelligence technology that can remove distortion from a damaged or obscured camera in real time. The deep learning technology is targeted at autonomous driving, medical imaging, agriculture and other use cases where a camera's view can become compromised by rain, dirt and other potential obstructions. DeepRay will be available for OEMs that want to include the technology in their products.\n\n\nsponsored resources", "pred_label": "__label__1", "pred_score_pos": 0.6537643074989319} {"content": "How to Bend Cardboard\n\nCardboard is a sturdy, lightweight and cheap craft material with many uses. Corrugated cardboard -- the type typically used in consumer boxes -- is made up of three layers of paper, involving a sheet of wavy \"fluted\" paper in soft vertical accordion pleats sandwiched between two smooth layers of paper. Whether you use cardboard to provide hidden strength to a project like a book cover, or it is the project's surface material, like a piece of cardboard origami furniture, the cardboard likely needs to be bent or folded. Because the material is designed to be stiff, a clean bend or fold can be difficult to achieve.\n\nThings You'll Need\n\n • Pen or pencil\n\n • Metal ruler\n\n • Table\n\nBending Cardboard with the Grain\n\nStep 1\n\nLay your piece of cardboard on a hard work surface. Look at its edges. If you can see the wavy line of the fluted core of the cardboard you can cleanly bend or roll the cardboard in the same direction as the fluted material. You should be able to see little lines or ridges running along the surface of the cardboard. This is called its \"grain.\"\n\nStep 2\n\nMark with a pencil or pen along the line where you want to bend the cardboard and fold along the line. The cardboard will easily fold along the fluted ridges in its core.\n\nStep 3\n\nLine up your piece of cardboard so its grain is parallel to the edge of your work surface. Run the cardboard over the edge of a table, pushing down slightly along its length to crease the paper between each fluted ridge. You will now be able to roll the cardboard into a cylinder or bend it into an arch or \"U\" shape.\n\nBending Against the Grain\n\nStep 1\n\nLay your cardboard out on your work surface.\n\nStep 2\n\nDraw your pattern onto the wrong side of the cardboard, marking any fold lines.\n\nStep 3\n\nLine up your metal or metal-edged ruler along your fold line. Press the edge of the ruler firmly down into the cardboard. Lift up the ruler, move it down the line and press again if your fold line is longer than the ruler. The ruler will leave a groove in the cardboard without breaking its surface. The cardboard will now easily bend along the groove.\n\nReferences & Resources", "pred_label": "__label__1", "pred_score_pos": 0.845544159412384} {"content": "Saudi Arabia classifies feminism, homosexuality, as a form of extremism\n\nSaudi Arabia’s decision to classify feminism, homosexuality and Westernization as a form of extremism comes amid alleged liberalization of the status of women in the Kingdom.\n\nSOCIAL MEDIA GIANT Twitter (photo credit: REUTERS)\n(photo credit: REUTERS)\nSaudi Arabia’s general department of counter-extremism, which is part of the State Security Presidency, tweeted an animated video aimed at its citizens information them about extremist ideas and behaviors, including feminism, homosexuality, Westernization and promiscuity.\nThe tweet was released on November 8,  2019, declaring these ideas as an unacceptable form of extremism,  to which many Saudis online expressed support for its message, especially in regards to feminism. Saudi Arabian women, since 2011, have seen the gradual growth of their freedoms, such as the right to drive a car, access to government services and the right to register a divorce.\nDue to fear of a backlash from Western countries, and internal criticism from the Saudi Shura Council members, female media figures and intellectuals, led Saudi authorities to remove the video several days after its release.\nIn a statement released by the State Security Presidency on November 12, 2019, the service renounced all responsibility for its release, declaring that it “contained many mistakes in its definition of extremism,” and was released without prior approval.\nDespite some new freedoms given to women, they still face many restrictions. Some women’s rights activist who have been campaigning for more freedoms are currently imprisoned, including allegations that some have been tortured.", "pred_label": "__label__1", "pred_score_pos": 0.997628927230835} {"content": "• Miscellaneous ocular agents\n\nMiscellaneous ocular agents:\n\nIndications for BEOVU:\n\nNeovascular (wet) age-related macular degeneration (AMD).\n\n\nGive by intravitreal inj. 6mg (0.05mL) once monthly (approx. 25–31 days) for the 1st 3 doses, followed by 6mg (0.05mL) once every 8–12 weeks.\n\n\nNot established.\n\n\nOcular or periocular infections. Active intraocular inflammation.\n\n\nMust only be administered by a qualified physician. Monitor for endophthalmitis, retinal detachments, elevation in intraocular pressure, and perfusion of optic nerve head following inj. Potential risk of arterial thromboembolic events (eg, nonfatal stroke or MI, vascular death). Advise females of reproductive potential to use effective contraception during and for ≥1 month after the last dose. Pregnancy. Nursing mothers: not recommended (during and for ≥1 month after the last dose).\n\nPharmacologic Class:\n\nVascular endothelial growth factor (VEGF) inhibitor.\n\nAdverse Reactions:\n\nVision blurred, cataract, conjunctival hemorrhage, eye pain, vitreous floaters.\n\nGeneric Availability:\n\n\nHow Supplied:\n\nSingle-dose vial—1 (w. needle)\n\nPricing for BEOVU\n\n2ml of 6mg/0.05ml vial (Qty: 1)\nAppx. price $36597", "pred_label": "__label__1", "pred_score_pos": 0.8929952383041382} {"content": "You are on page 1of 261\n\n\nFor Health Science Students\n\nGeneral Pathology\n\nMesele Bezabeh, Abiye Tesfaye, Bahiru Ergicho,\nMengistu Erke, Seyoum Mengistu,\nAlemayehu Bedane, Abiyot Desta\n\nJ imma University, Gondar University\nHaramaya University, Dedub University\n\nthe Ethiopia Ministry of Health, and the Ethiopia Ministry of Education\n\n\n\n\nImportant Guidelines for Printing and Photocopying\n\n2004 by Mesele Bezabeh, Abiye Tesfaye, Bahiru Ergicho, Mengistu, Erke,\nSeyoum Mengistu, Alemayehu Bedane, Abiyot Desta\n\nAll rights reserved. Except as expressly provided above, no part of this publication may\nwithout written permission of the author or authors.\n\nstudents and faculty in a health care field.\n\n\nDear Student,\n\nWelcome to the exciting & fascinating world of pathology! Up to now in your studies, you\nhave been learning the normal features of human beings (i.e. anatomy, physiology, etc).\nNow it is time to introduce you to the abnormalities that can occur in humans i.e. to\ndiseases. Pathology is a scientific study of diseases. In this book, you will learn the basic\nmechanisms of diseases. Pathology is divided into general & systemic pathology for\npedagogical reasons. General pathology covers the basic mechanisms of diseases whereas\nonly general pathology. And it is divided into ten chapters on - Introduction, Cell injury,\nInflammation, Healing, Hemodynamic disorders, Genetic diseases, Immunopathology,\nNeoplasia, Metabolic diseases, & Selected infectious diseases. Most of these topics\nrepresent the major categories of diseases that can occur in different organ systems. For\nexample, acute inflammation can occur in different organs but wherever it occurs its\nmechanism is the same. That is, an acute inflammation in the skin has the same\nmechanisms & features as an acute inflammation of the meninges. The same principle\napplies to the other topics covered in general pathology. Therefore, if one knows general\npathology well, one can apply this knowledge to diseases in the various organ systems.\nHence, your general pathology knowledge will facilitate your understanding of systemic\ndiseases (Systemic Pathology). Therefore, the whole purpose of general pathology is to\nhelp you understand systemic diseases i.e. Systemic Pathology. So, even though, you will\nunderstand the basic mechanisms of diseases common to various types of illnesses, it\ndoesnt mean that this book has covers all of pathology in as much as it didnt cover\nsystemic pathology. Therefore, after reading this book, you are encouraged to read books\non systemic pathology. The reason for not including systemic pathology in this book was\nbecause the book conceived when the previous curriculum was being implemented. At this\njuncture, we would like to call up on all professional colleagues to include systemic\npathology in the pathology lecture for Health Officer students since this is very basic for\nunderstanding clinical medicine. We would also like to mention that the new curriculum for\nHealth Officer students includes systemic pathology. We also call up on all those concerned\nto write a book on systemic pathology for health science students. General pathology is\nnecessary but not sufficient for understanding clinical medicine.\n\nThe main reason for writing this book is the absence of standardized uniformity in the\npathology courses given to health science students. Health science students* here means\nhealth officer, pharmacy, dentistry, midwifery, anesthesiology, nursing (B.SC.), &\nphysiotherapy students. There was no uniformity in what was taught to these students in the\nvarious institutions in Ethiopia. We hope this book will alleviate this problem regarding\ngeneral pathology.\n\nIn writing this book, we have tried to make it as clear & as brief as possible. Since too much\nbrevity may compromise understanding, we have been a bit liberal in some areas in\nincluding some details which are necessary for the students understanding. This is done to\nencourage understanding rather than memorization.\n\nHowever, medical students & even those beyond can use this book for review.\n\nAbiye Tesfaye, MD, Editor\n\n\nProper training of health care workers is the starting point for improving the health status of\na nation. Having good standardized textbooks contributes a lot to the proper training of\nhealth care workers. The Carter Center in Addis Ababa initiated the idea of writing\nstandardized textbooks for health science students in Ethiopia to tackle the current critical\nlack of such books. It funded everything from the inception of this book up to its completion.\nIn addition to initiating the idea of writing the book, The Carter Center paid allowances to the\nauthors, arranged appropriate & conducive environment for the writing & reviewing process,\n& covered all the publishing cost. By doing so, we think, The Carter Center has contributed\na lot to the improvement of the health science education & thereby to the betterment of the\npublic health status in Ethiopia. For all of these reasons, our gratitude to the Carter Center in\nAddis Ababa is immense & deep! We immeasurably thank Ato Aklilu (of The Carter\nCenter in Addis Ababa) for his immense understanding, fatherly guidance, encouragement,\n& patience. Without his frequent stirring, this work would not have come into fruition.\n\nWe also thank Dr. Wondwossen Ergete (Associate Professor of Pathology at the Addis\nAbaba University) for evaluating our work & giving us invaluable suggestions. Ato Getu\nDegu (Associate Professor of Biostatistics at the Public Health Department of Gondar\nUniversity) efficiently organized the writing process in Gondar. Therefore, we thank him.\n\nAt the end, even though we tried our best to be as accurate as possible, we bear all the\nresponsibilities for any inadvertent mistakes this book may have.\n\nYour comments regarding this book are very much welcome. And you can send them to the\nfollowing address:\nDr. Mesele Bezabeh, MD\nAssociate Professor of Pathology\nJimma University, Medical Faculty\nP.O. Box\nJimma, Ethiopia\n\n\nDr. Abiye Tesfaye Overall Editor & the Chapter on Genetic Diseases\nDr. Mesele Bezabeh Inflammation, Immunopathology, Neoplasia, & Selected Infectious\nDr. Mengitu Erke Hemodynamic disorders\nDr. Bahiru Ergicho Cell Injury *\nDr. Seyoum Mengistu Introduction & Healing\nDr. Alemayehu Bedane Metabolic Diseases\nDr. Abiyot Desta Environmental Diseases\nThe preparation of this book went through many stages. First, each author wrote his\nchapter. Then all of the authors met in the offices of The Carter Center in Addis Ababa to\ncollectively revise & comment on each others writings. Then all the chapters were given to\nDr. Abiye Tesfaye for compilation & overall edition.\n\nTable of Contents\nChapter 1: Introduction to Pathology\nChapter 2: Cellular Reactions to Injury\nChapter 3: Inflammation\nChapter 4: Healing\n\nChapter 5: Hemodynamic Disorders\nChapter 6: Genetic Diseases\nChapter 7: Immunopathology\nChapter 8: Selected Tropical Diseases\n\nX. Fungal infections (Candidiasis, Cryptococcosis, Aspergillosis) .......................... 183\nChapter 9: Neoplasia\nChapter 10: Metabolic Diseases\nChapter 11: Environmental Diseases\n\n\nI. Learning Objectives\n\nUpon completing this chapter students should be able to:\n1. Define pathology\n2. Discuss the core aspects of disease in pathology\n3. Know the diagnostic techniques used in pathology\n4. Know the various categories of the causes of diseases\n5. Know the course, outcome, consequences of diseases\n\nII. The core aspects of diseases in pathology\n\nPathology is the study of disease by scientific methods. The word pathology came from the\nLatin words patho & logy. Patho means disease and logy means study, therefore\npathology is a scientific study of disease. Diseases may, in turn, be defined as an abnormal\nvariation in structure or function of any part of the body. Pathology gives explanations of a\ndisease by studying the following four aspects of the disease.\n1. Etiology,\n2. Pathogenesis,\n3. Morphologic changes and\n4. Functional derangements and clinical significance.\n\n1. Etiology\nEtiology of a disease means the cause of the disease. If the cause of a disease is known it\nis called primary etiology. If the cause of the disease is unknown it is called idiopathic.\nKnowledge or discovery of the primary cause remains the backbone on which a diagnosis\ncan be made, a disease understood, & a treatment developed. There are two major classes\nof etiologic factors: genetic and acquired (infectious, nutritional, chemical, physical, etc).\nDetailed discussion will be given in subsequent topics. The etiology is followed by\n\n2. Pathogenesis\nPathogenesis means the mechanism through which the cause operates to produce the\npathological and clinical manifestations. The pathogenetic mechanisms could take place in\nthe latent or incubation period. Pathogenesis leads to morphologic changes.\n\n3. Morphologic changes\nThe morphologic changes refer to the structural alterations in cells or tissues that occur\nfollowing the pathogenetic mechanisms. The structural changes in the organ can be seen\nwith the naked eye or they may only be seen under the microscope. Those changes that\ncan be seen with the naked eye are called gross morphologic changes & those that are\nseen under the microscope are called microscopic changes. Both the gross & the\nmicroscopic morphologic changes may only be seen in that disease, i.e. they may be\nspecific to that disease. Therefore, such morphologic changes can be used by the\npathologist to identify (i.e. to diagnose) the disease. In addition, the morphologic changes\nwill lead to functional alteration & to the clinical signs & symptoms of the disease.\n\n4. Functional derangements and clinical significance\nThe morphologic changes in the organ influence the normal function of the organ. By doing\nso, they determine the clinical features (symptoms and signs), course, and prognosis of the\n\nIn summary, pathology studies:-\n\nEtiology Pathogenesis Morphologic changes Clinical features & Prognosis of all\n\nUnderstanding of the above core aspects of disease (i.e. understanding pathology) will help\none to understand how the clinical features of different diseases occur & how their\ntreatments work. This understanding will, in turn, enable health care workers to handle &\nhelp their patients in a better & scientific way. It is for these reasons that the health science\nstudent should study pathology. In addition, the pathologist can use the morphologic\nchanges seen in diseases to diagnose different diseases. There are different diagnostic\nmodalities used in pathology. Most of these diagnostic techniques are based on\nmorphologic changes.\n\nIII. Diagnostic techniques used in pathology\n\nThe pathologist uses the following techniques to the diagnose diseases:\na. Histopathology\nb. Cytopathology\nc. Hematopathology\nd. Immunohistochemistry\ne. Microbiological examination\nf. Biochemical examination\ng. Cytogenetics\nh. Molecular techniques\ni. Autopsy\n\nA. Histopathological techniques\n\nHistopathological examination studies tissues under the microscope. During this study, the\npathologist looks for abnormal structures in the tissue.\n\nTissues for histopathological examination are obtained by biopsy. Biopsy is a tissue sample\nfrom a living person to identify the disease. Biopsy can be either incisional or excisional.\n\nOnce the tissue is removed from the patient, it has to be immediately fixed by putting it into\nadequate amount of 10% Formaldehyde (10% formalin) before sending it to the pathologist.\nThe purpose of fixation is:\n\n1. to prevent autolysis and bacterial decomposition and putrefaction\n2. to coagulate the tissue to prevent loss of easily diffusible substances\n3. to fortify the tissue against the deleterious effects of the various stages in the\npreparation of sections and tissue processing.\n4. to leave the tissues in a condition which facilitates differential staining with dyes\nand other reagents.\n\nOnce the tissue arrives at the pathology department, the pathologist will exam it\nmacroscopically (i.e. naked-eye examination of tissues).\n\nThen the tissue is processed to make it ready for microscopic examination. The whole\npurpose of the tissue processing is to prepare a very thin tissue (i.e. five to seven m or\none cell thick tissue) which can be clearly seen under the microscope. The tissue is\nprocessed by putting it into different chemicals. It is then impregnated (embedded) in\nparaffin, sectioned (cut) into thin slices, & is finally stained. The stains can be\nHematoxylin/Eosin stain or special stains such as PAS, Immunohistochemistry, etc...\nThe Hematoxylin/Eosin stain is usually abbreviated as H&E stain. The H&E stain is\nroutinely used. It gives the nucleus a blue color & the cytoplasm & the extracellular\nmatrix a pinkish color. Then the pathologist will look for abnormal structures in the tissue.\nAnd based on this abnormal morphology he/she will make the diagnosis. Histopathology\nis usually the gold standard for pathologic diagnosis.\n\nB. Cytopathologic techniques\n\nCytopathology is the study of cells from various body sites to determine the cause or nature\nof disease.\n\nApplications of cytopathology:\n\nThe main applications of cytology include the following:\n\n1. Screening for the early detection of asymptomatic cancer\nFor example, the examination of scrapings from cervix for early detection and prevention of\ncervical cancer.\n\n2. Diagnosis of symptomatic cancer\nCytopathology may be used alone or in conjunction with other modalities to diagnose tumors\nrevealed by physical or radiological examinations.\n\nIt can be used in the diagnosis of cysts, inflammatory conditions and infections of various\n\n3. Surveillance of patients treated for cancer\nFor some types of cancers, cytology is the most feasible method of surveillance to detect\nrecurrence. The best example is periodic urine cytology to monitor the recurrence of cancer\nof the urinary tract.\n\nAdvantages of cytologic examination\n\nCompared to histopathologic technique it is cheap, takes less time and needs no anesthesia\nto take specimens. Therefore, it is appropriate for developing countries with limited\nresources like Ethiopia. In addition, it is complementary to histopathological examination.\n\nCytopathologic methods\n\nThere are different cytopathologic methods including:\n\n1. Fine-needle aspiration cytology (FNAC)\n\nIn FNAC, cells are obtained by aspirating the diseased organ using a very thin needle under\nnegative pressure. Virtually any organ or tissue can be sampled by fine-needle aspiration.\nThe aspirated cells are then stained & are studied under the microscope. Superficial organs\n(e.g. thyroid, breast, lymph nodes, skin and soft tissues) can be easily aspirated. Deep\norgans, such as the lung, mediastinum, liver, pancreas, kidney, adrenal gland, and\nretroperitoneum are aspirated with guidance by fluoroscopy, ultrasound or CT scan. FNAC\nis cheap, fast, & accurate in diagnosing many diseases.\n\n2. Exfoliative cytology\n\nRefers to the examination of cells that are shed spontaneously into body fluids or secretions.\nExamples include sputum, cerebrospinal fluid, urine, effusions in body cavities (pleura,\npericardium, peritoneum), nipple discharge and vaginal discharge.\n\n3. Abrasive cytology\n\nmucous membranes, and serous membranes). E.g. preparation of cervical smears with a\nspatula or a small brush to detect cancer of the uterine cervix at early stages. Such cervical\nsmears, also called Pap smears, can significantly reduce the mortality from cervical cancer.\nCervical cancer is the most common cancer in Ethiopian women.\n\nC. Hematological examination\n\nThis is a method by which abnormalities of the cells of the blood and their precursors in the\nbone marrow are investigated to diagnose the different kinds of anemia & leukemia.\n\nD. Immunohistochemistry\n\nThis is a method is used to detect a specific antigen in the tissue in order to identify the type\nof disease.\n\nE. Microbiological examination\n\nThis is a method by which body fluids, excised tissue, etc. are examined by microscopical,\ncultural and serological techniques to identify micro-organisms responsible for many\n\nF. Biochemical examination\n\nThis is a method by which the metabolic disturbances of disease are investigated by assay\nof various normal and abnormal compounds in the blood, urine, etc.\n\nG. Clinical genetics (cytogenetics),\n\nThis is a method in which inherited chromosomal abnormalities in the germ cells or acquired\nchromosomal abnormalities in somatic cells are investigated using the techniques of\nmolecular biology.\n\nH. Molecular techniques\n\nDifferent molecular techniques such as fluorescent in situ hybridization, Southern blot, etc...\ncan be used to detect genetic diseases.\n\nI. Autopsy\n\nAutopsy is examination of the dead body to identify the cause of death. This can be for\nforensic or clinical purposes.\n\n\nThe relative importance of each of the above disciplines to our understanding of disease\nvaries for different types of diseases. For example, in diabetes mellitus, biochemical\ninvestigation provides the best means of diagnosis and is of greatest value in the control of\nthe disease. Whereas in the diagnosis of tumors, FNAC & histopathology contribute much.\nHowever, for most diseases, diagnosis is based on a combination of pathological\n\nIV. The causes of disease\n\nDiseases can be caused by either environmental factors, genetic factors or a combination of\nthe two.\n\nA. Environmental factors\n\nEnvironmental causes of disease are many and are classified into:\n\n1. Physical agents\n2. Chemicals\n3. Nutritional deficiencies & excesses\n4. Infections & infestations\n5. Immunological factors\n6. Psychogenic factors\n\n1. Physical agents\nThese include trauma, radiation, extremes of temperature, and electric power. These agents\napply excess physical energy, in any form, to the body.\n\n2. Chemicals\nWith the use of an ever-increasing number of chemical agents such as drugs, in industrial\nprocesses, and at home, chemically induced injury has become very common. Their effects\nSome act in a general manner, for example cyanide is toxic to all cells.\nOthers act locally at the site of application, for example strong acids and caustics.\n\nAnother group exhibit a predilection for certain organs, for example the effect of\nparacetamol and alcohol on liver. Many toxic chemicals are metabolized in liver and\nexcreted in kidney, as a result, these organs are susceptible to chemical injury.\n\n3. Nutritional deficiencies and excesses\nNutritional deficiencies may arise as a result of poor supply, interference with absorption,\ninefficient transport within the body, or defective utilization. It may take the form of deficiency\neither of major classes of food, usually protein and energy, or vitamins or elements essential\nfor specific metabolic processes, e.g. iron for haemoglobin production. Often, the\ndeficiencies are multiple and complex.\n\nOn the other hand, dietary excess plays an important role in diseases in Western countries.\nObesity has become increasingly common, with its attendant dangers of type 2 diabetes,\nhigh blood pressure and heart disease.\n\n4. Infections and infestations\nViruses, bacteria, fungi, protozoa, and metazoa all cause diseases. They may do so by\ncausing cell destruction directly as in virus infections (for example poliomyelitis) or protozoal\ninfections (for example malaria). However, in others the damage is done by toxins\nelaborated by the infecting agent as in diphtheria and tetanus. Like chemicals, they may\nhave a general effect or they may show a predilection for certain tissues.\n\n5. Immunological factors\nThe immune process is essential for protection against micro-organisms and parasites.\nHowever, the immune system can be abnormal which can lead to diseases. The\nabnormalities of the immune system include:\n\nA. Hypersensitivity reaction\nThis is exaggerated immune response to an antigen. For example, bronchial\nasthma can occur due to exaggerated immune response to the harmless pollen.\n\nB. Immunodeficiency\nThis is due to deficiency of a component of the immune system which leads to\nincreased susceptibility to different diseases. An example is AIDS.\n\n\nC. Autoimmunity\nThis is an abnormal (exaggerated) immune reaction against the self antigens of\nthe host. Therefore, autoimmunity is a hypersensitivity reaction against the self\nantigens. For example, type 1 diabetes mellitus is caused by autoimmune\ndestruction of the beta cells of the islets of Langerhans of the pancreas.\n\n6. Psychogenic factors\nThe mental stresses imposed by conditions of life, particularly in technologically advanced\ncommunities, are probably contributory factors in some groups of diseases.\n\nB. Genetic Factors\n\nThese are hereditary factors that are inherited genetically from parents. Detailed discussion\nwill be done on this topic in a subsequent chapter.\n\nV. Course of disease\n\nThe course of disease is shown with a simplified diagram as follows.\n\nExposure Biological onset Clinical onset Permanent damage Death\n\nLatency period\n\nThe course of a disease in the absence of any intervention is called the natural history of the\ndisease. The different stages in the natural history of disease include:\na) Exposure to various risk factors (causative agents)\nb) Latency, period between exposure and biological onset of disease\nc) Biological onset of disease; this marks the initiation of the disease process, however,\nwithout any sign or symptom. Following biological onset of disease, it may remain\nasymptomatic or subclinical (i.e. without any clinical manifestations), or may lead to\novert clinical disease.\nd) Incubation (induction) period refers to variable period of time without any obvious signs\nor symptoms from the time of exposure.\n\ne) The clinical onset of the disease, when the signs and symptoms of the disease\nbecome apparent. The expression of the disease may be variable in severity or in\nterms of range of manifestations.\nf) The onset of permanent damage, and\ng) Death\n\nNatural recovery, i.e. recovery without any intervention, can occur at any stage in the\nprogression of the disease.\n\nVI. Outcome and consequences of disease\n\nFollowing clinical onset, disease may follow any of the following trends:\n\na) Resolution can occur leaving no sequelae,\nb) The disease can settle down, but sequelae are left, or\nc) It may result in death.\n\nVII. Clinical & biologic death\n\nClinical death\n\nClinical death is the reversible transmission between life and biologic death. Clinical death is\ndefined as the period of respiratory, circulatory and brain arrest during which initiation of\nresuscitation can lead to recovery.\n\nClinical death begins with either the last agonal inhalation or the last cardiac contraction.\nSigns indicating clinical death are\nThe patient is without pulse or blood pressure and is completely unresponsive to the\nmost painful stimulus.\nThe pupils are widely dilated\nSome reflex reactions to external stimulation are preserved. For example, during\nintubations, respiration may be restored in response to stimulation of the receptors of\nthe superior laryngeal nerve, the nucleus of which is located in the medulla\noblongata near the respiratory center.\nRecovery can occur with resuscitation.\n\nBiological Death\n\nBiological death (sure sign of death), which sets in after clinical death, is an irreversible state\nof cellular destruction. It manifests with irreversible cessation of circulatory and respiratory\nfunctions, or irreversible cessation of all functions of the entire brain, including brain stem.\nHowever, one should notice that there are internationally accepted criteria to diagnose\nbiological death.\n\nVIII. Exercises\n\n1. What is pathology? What core aspects of disease does it study?\n2. Why should you study pathology?\n3. What is pathogenesis?\n4. What are the diagnostic modalities used by the pathologist?\n5. What are the purposes of tissue fixation?\n6. Describe the course of disease.\n\n1. Emanuel Rubin, and John L. Farber, Essential Pathology, Philadelphia, 1990\n2. William Boyd; Textbook of Pathology, structure and Function in disease, Philadelphia,\nedition, 1987\n3. James E. Pointer; Alan B. Fletcher; Basic life support, California, 1986\n4. F.B. Walter and M.S Israel; General Pathology, Churchill Livingston Edinburgh and\nLondon, 4\nedition, 1974\n5. Macfarlane, Reid, callander, Illustrated Pathology, Churchill Livingstone, 5\n6. Cotran RS, Kumar V, Collins T.Robins pathologic basis of diseases. Philadelphia, J.B.\nSaunders Company. 6th edition 1999\n7. Muirs Textbook of Pathology 15\n\n\nI. Learning objectives\n\nAt the end of this chapter, the student should be able to:\n\n1. Define hyperplasia, hypertrophy, atrophy, & Metaplasia & list some of their\n2. Know the differences between reversible & irreversible forms of cell injury.\n3. Describe the mechanisms of necrosis.\n4. Describe the various types of necrosis & know some of their causes.\n\nII. Introduction\n\nCell injury underlies all diseases. So to understand diseases one, has to start by knowing\nwhat cell injury is. When a cell is exposed to an injurious agent (i.e. the causes of diseases\ndiscussed in chapter one), the possible outcomes are:\n\n1. The cell may adapt to the situation or\n2. They cell may acquire a reversible injury or\n3. The cell may obtain an irreversible injury & may die. The cell may die via\none of two ways: either by necrosis or by apoptosis.\nWhich of these outcomes occur depends on both the injurious agent & on cellular factors. In\nother words, the result depends on the type, severity, & duration of the injury & on the type\nof the cell.\nThis chapter covers the types of cellular adaptation, reversible cell injury, & cell death in that\n\n\nIII. Types of cellular adaptation\n\nThe types of cellular adaptation include hypertrophy, atrophy, hyperplasia, & metaplasia.\n\nA. Hypertrophy\n\nHypertrophy is increase in the size of cells. Increased workload leads to increased\nprotein synthesis & increased size & number of intracellular organelles which, in turn,\nleads to increased cell size. The increased cell size leads to increased size of the\nExamples: the enlargement of the left ventricle in hypertensive heart disease & the\nincrease in skeletal muscle during sternous exercise.\n\nB. Hyperplasia\n\nHyperplasia is an increase in the number of cells. It can lead to an increase in the size\nof the organ. It is usually caused by hormonal stimulation. It can be physiological as in\nenlargement of the breast during pregnancy or it can pathological as in endometrial\n\nC. Atrophy\n\nAtrophy is a decrease in the size of a cell. This can lead to decreased size of the\norgan. The atrophic cell shows autophagic vacuoles which contain cellular debris from\ndegraded organelles.\nAtrophy can be caused by:\n1. Disuse\n2. Undernutrition\n3. Decreased endocrine stimulation\n4. Denervation\n5. Old age\n\n\nD. Metaplasia\n\nMetaplasia is the replacement of one differentiated tissue by another differentiated\ntissue. There are different types of metaplasia. Examples include:\n\n1. Squamous metaplasia\n\nThis is replacement of another type of epithelium by squamous epithelium. For\nexample, the columnar epithelium of the bronchus can be replaced by squamous\nepithelium in cigarette smokers\n\n2. Osseous metaplasia\n\nThis replacement of a connective tissue by bone, for example at sites of injury.\n\nIV. Reversible cellular changes & accumulations\n\nEven though there are many different kinds of reversible cellular changes & accumulations,\nhere we will only mention fatty change & accumulation of pigments.\n\n1. Fatty change\n\nThis is accumulation of triglycerides inside parenchymal cells. It is caused by an imbalance\nbetween the uptake, utilization, & secretion of fat. Fatty change is usually seen in the liver,\nheart, or kidney. Fatty liver may be caused by alcohol, diabetes mellitus, malnutrition,\nobesity, & poisonings. These etiologies cause accumulation of fat in the hepatocytes by the\nfollowing mechanisms:\na. Increased uptake of triglycerides into the parenchymal cells.\nb. Decreased use of fat by cells.\nc. Overproduction of fat in cells.\nd. Decreased secretion of fat from the cells.\n\n2. The accumulations of pigments\n\nPigments can be exogenous or endogenous. Endogenous pigments include melanin,\nbilirubin, hemosiderin, & lipofuscin. Exogenous pigments include carbon. These pigments\ncan accumulate inside cells in different situations.\n\na. Melanin\n\nMelanin is a brownish-black pigment produced by the melanocytes found in the skin.\nIncreased melanin pigmentation is caused by suntanning & certain diseases e.g.\nnevus, or malignant melanoma. Decreased melanin pigmentation is seen in albinism &\n\nb. Bilirubin\n\nBilirubin is a yellowish pigment, mainly produced during the degradation of\nhemoglobin. Excess accumulation of bilirubin causes yellowish discoloration of the\nsclerae, mucosae, & internal organs. Such a yellowish discoloration is called jaundice.\n\nJaundice is most often caused by\n\n1. Hemolytic anemia\nHemolytic anemia is characterized by increased destruction of red blood cells.\n\n2. Biliary obstruction\n\nThis is obstruction of intrahepatic or extrahepatic bile ducts. It can be caused by\n\n3. Hepatocellular disease\nThis is associated with failure of conjugation of bilirubin.\n\nC. Hemosiderin\nHemosiderin is an iron-containing pigment derived from ferritin. It appears in tissues\nas golden brown amorphous aggregates & is identified by its staining reaction (blue\n\ncolor) with the Prussian blue dye. Hemosiderin exists normally in small amounts\nwithin tissue macrophages of the bone marrow, liver, & spleen as physiologic iron\nstores. It accumulates in tissues in excess amounts in certain diseases.This excess\naccumulation is divided into 2 types:\n\n1. Hemosiderosis\nWhen accumulation of hemosiderin is primarily within tissue macrophages & is\nnot associated with tissue damage, it is called hemosiderosis.\n\n2. Hemochromatosis\nWhen there is more extensive accumulation of hemosiderin, often within\nparenchymal cells, which leads to tissue damage, scarring & organ dysfunction, it\nis called hemochromatosis.\n\nV. Cell death\n\nCells can die via one of the following two ways:\n1. Necrosis\n2. Apoptosis\n\n1. Necrosis\n\nIn necrosis, excess fluid enters the cell, swells it, & ruptures its membrane which kills it. After\nthe cell has died, intracellular degradative reactions occur within a living organism. Necrosis\ndoes not occur in dead organisms. In dead organisms, autolysis & heterolysis take place.\n\nNecrosis occurs by the following mechanisms:\n\nA. Hypoxia\nB. Free radical-induced cell injury\nC. Cell membrane damage\nD. Increased intracellular calcium level\n\nA. Hypoxia\n\nHypoxia is decreased oxygen supply to tissues. It can be caused by:\n\n1. Ischemia\nIschemia is decreased blood flow to or from an organ. Ischemia can be caused by\nobstruction of arterial blood flow the most common cause, or by decreased perfusion\nof tissues by oxygen-carrying blood as occurs in cardiac failure, hypotension, & shock.\n\n2. Anemia\nAnemia is a reduction in the number of oxygen-carrying red blood cells.\n\n3. Carbon monoxide poisoning\nCO decreases the oxygen-capacity of red blood cells by chemical alteration of\n\n4. Poor oxygenation of blood due to pulmonary disease.\nThe cell injury that results following hypoxia can be divided into early & late stages:\n\n1. Early (reversible) stages of hypoxic cell injury\nAt this stage, hypoxia results in decreased oxidative phosphorylation & ATP\nsynthesis. Decreased ATP leads to:\n\na. Failure of the cell membrane Na K pump, which leads to increased\nintracellular Na & water, which cause cellular & organelle swelling. Cellular\nswelling (hydropic change) is characterized by the presence of large vacuoles\nin the cytoplasm. The endoplasmic reticulum also swells. The mitochondria\nshow a low amplitude swelling. All of the above changes are reversible if the\nhypoxia is corrected.\nb. Disaggregation of ribosomes & failure of protein synthesis.\n\n2. Late (irreversible) stages of hypoxic cell injury.\nThis is caused by severe or prolonged injury. It is caused by massive calcium\ninflux & very low pH, which lead to activation of enzymes, which damage the\ncell membrane& organelle membranes. Irreversible damage to the\nmitochondria, cell membranes, & the nucleus mark the point of no return for\nthe cell, that is after this stage, the cell is destined to die.\n\n\nRelease of aspartate aminotransferase (AST), creatine phosphokinase(CPK),\n& lactate dehydrogenase (LDH) into the blood is an important indicator of\nirreversible injury to heart muscle following myocardial infarction.\n\nB. Free radical-induced injury\nFree radical is any molecule with a single unpaired electron in the outer orbital.\nExamples include superoxide & the hydroxyl radicals. Free radicals are formed by\nnormal metabolism, oxygen toxicity, ionizing radiation, & drugs & chemicals, &\nreperfusion injury. They are degraded by spontaneous decay, intracellular enzymes\nsuch as glutathione peroxidase, catalase, or superoxide dismutase, & endogenous\nsubstances such as ceruloplasmin or transferrin. When the production of free radicals\nexceeds their degradation, the excess free radicals cause membrane pump damage,\nATP depletion, & DNA damage. These can cause cell injury & cell death.\n\na. Cell membrane damage\nDirect cell membrane damage as in extremes of temprature, toxins, or viruses, or\nindirect cell membrane damage as in the case of hypoxia can lead to cell death\nby disrupting the homeostasis of the cell.\n\nb. Increased intracellular calcium level\nIncreased intracellular calcium level is a common pathway via which different\ncauses of cell injury operate. For example, the cell membrane damage leads to\nincreased intracellular calcium level. The increased cytosolic calcium, in turn,\nactivates enzymes in the presence of low pH. The activated enzymes will\ndegrade the cellular organelles.\n\nTypes of necrosis\n\nThe types of necrosis include:\n\n1. Coagulative necrosis\n2. Liquefactive necrosis\n3. Fat necrosis\n4. Caseous necrosis\n5. Gangrenous necrosis\n\n\n1. Coagulative necrosis\n\nCogulative necrosis most often results from sudden interruption of blood supply to an organ,\nespecially to the heart. It is, in early stages, characterized by general preservation of tissue\narchitecture. It is marked by the following nuclear changes: Pyknosis (which is chromatin\nclumping & shrinking with increased basophilia), karyorrhexis (fragmentation of chromatin),\n& karyolysis (fading of the chromatin material).\n\n2. Liquefactive necrosis\n\nLiquefactive necrosis is characterized by digestion of tissue. It shows softening &\nliquefaction of tissue. It characteristically results from ischemic injury to the CNS. It also\noccurs in suppurative infections characterized by formation of pus.\n\n3. Fat necrosis\n\nFat necrosis can be caused by trauma to tissue with high fat content, such as the breast or it\ncan also be caused by acute hemorrhagic pancreatitis in which pancreatic enzymes diffuse\ninto the inflamed pancreatic tissue & digest it. The fatty acids released from the digestion\nform calcium salts (soap formation or dystrophic calcification). In addition, the elastase\nenzyme digests the blood vessels & cause the hemorrhage inside the pancreas, hence the\nname hemorrhagic pancreatitis.\n\n4. Caseous necrosis\n\nCaseous necrosis has a cheese-like (caseous, white) appearance to the naked eye. And it\nappears as an amorphous eosinophilic material on microscopic examination. Caseous\nnecrosis is typical of tuberculosis.\n\n5. Gangrenous necrosis\n\nThis is due to vascular occlusion & most often affects the lower extremities & the bowel. It is\ncalled wet gangrene if it is complicated by bacterial infection which leads to superimposed\nliquefactive necrosis. Whereas it is called dry gangrene if there is only coagulative necrosis\nwithout liquefactive necrosis.\n\nNecrosis can be followed by release of intracellular enzymes into the blood, inflammation or\ndystrophic calcification. Inflammation will be discussed in the next chapter.\n\n2. Apoptosis\n\nApoptosis is the death of single cells within clusters of other cells. (Note that necrosis\ncauses the death of clusters of cells.) In apoptosis, the cell shows shrinkage & increased\nacidophilic staining of the cell. This is followed by fragmentation of the cells. These\nfragments are called apoptotic bodies. Apoptosis usually occurs as a physiologic process for\nremoval of cells during embryogenesis, menstruation, etc It can also be seen in\npathological conditions caused by mild injurious agents.\n\nApoptosis is not followed by inflammation or calcification. The above mentioned features\ndistinguish apoptosis from necrosis.\n\nVI. Pathologic calcification\n\nPathologic calcification is divided into 2 types:\n\n1. Metastatic calcification\n\nThis is caused by hypercalcemia, resulting from hyperparathyroidism, milk-alkali syndrome,\nsarcoidosis etc\n\n2. Dystrophic calcification\n\nThis occurs in previously damaged tissue, such as areas of old trauma, tuberculous lesions,\nscarred heart valves, & atherosclerotic lesions.\nUnlike metastatic calcification, it is not caused by hypercalcemia. Typically, the serum\ncalcium level is normal.\n\nVII. Exercises\n1. Why should you study cell injury?\n2. Compare & contrast the various types of cellular adaptation.\n3. Describe the various mechanisms of necrosis.\n4. Mention some of the causes of each of the various types of necrosis.\n5. Compare & contrast necrosis & apoptosis.\n6. Contrat metastatic & dystrophic calcification.\n\n\n\nAt the end of the chapter the student is expected to\n1. Know the causes of inflammation\n2. Understand the process of inflammations\n3. Comprehend the etiopathogeneses of granulomatous inflammations\n4. Contrast the differences between acute and chronic inflammations\n\n\nDefinition: Inflammation is a local response (reaction) of living vasculaized tissues to\nendogenous and exogenous stimuli. The term is derived from the Latin \"inflammare\"\nmeaning to burn. Inflammation is fundamentally destined to localize and eliminate the\ncausative agent and to limit tissue injury.\n\nThus, inflammation is a physiologic (protective) response to injury, an observation made by\nSir John Hunter in 1794 concluded: inflammation is itself not to be considered as a disease\nbut as a salutary operation consequent either to some violence or to some diseases.\n\n\nCauses of inflammation are apparently causes of diseases such as\n\nphysical agents - mechanical injuries, alteration in temperatures and pressure,\nradiation injuries.\nchemical agents- including the ever increasing lists of drugs and toxins.\nbiologic agents (infectious)- bacteria,viruses,fungi, parasites\nimmunologic disorders- hypersensitivity reactions, autoimmunity,\nimmunodeficiency states etc\ngenetic/metabolic disorders- examples gout, diabetes mellitus etc\n\n\nThe nomenclatures of inflammatory lesion are usually indicated by the suffix 'itis'.\nThus, inflammation of the appendix is called appendicitis and that of meninges as\nmeningitis, etc. However, like any rule, it has its own exceptions examples\npneumonia, typhoid fever, etc.\n\n\nInflammation is classified crudely based on duration of the lesion and histologic\nappearances into acute and chronic inflammation.\n\n\nAcute inflammation is an immediate and early response to an injurious agent and it is\nrelatively of short duration, lasting for minutes, several hours or few days.\nIt is characterized by exudation of fluids and plasma proteins and the emigration of\npredominantly neutrophilic leucocytes to the site of injury.\n\nThe five cardinal signs of acute inflammation are\n\nRedness (rubor) which is due to dilation of small blood vessels within damaged\ntissue as it occurs in cellulitis.\nHeat (calor) which results from increased blood flow (hyperemia) due to regional\nvascular dilation\nSwelling (tumor) which is due to accumulation of fluid in the extravascular space\nwhich, in turn, is due to increased vascular permeability.\nPain (dolor), which partly results from the stretching & destruction of tissues due to\ninflammatory edema and in part from pus under pressure in as abscess cavity.\nSome chemicals of acute inflammation, including bradykinins, prostaglandins and\nserotonin are also known to induce pain.\nLoss of function: The inflammed area is inhibited by pain while severe swelling\nmay also physically immobilize the tissue.\n\n\nEvents of acute inflammation:\n\nAcute inflammation is categorized into an early vascular and a late cellular responses.\n\n1) The Vascular response has the following steps:\n\na) Immediate (momentary) vasoconstriction in seconds due to neurogenic or chemical\nb) Vasodilatation of arterioles and venules resulting in increased blood flow.\nc) After the phase of increased blood flow there is a slowing of blood flow & stasis due\nto increased vascular permeability that is most remarkably seen in the post-capillary\nvenules. The increased vascular permeability oozes protein-rich fluid into extra-\nvascular tissues. Due to this, the already dilated blood vessels are now packed with\nred blood cells resulting in stasis. The protein-rich fluid which is now found in the\nextravascular space is called exudate. The presence of the exudates clinically\nappears as swelling. Chemical mediators mediate the vascular events of acute\n\n2) Cellular response\n\nThe cellular response has the following stages:\nA. Migration, rolling, pavementing, & adhesion of leukocytes\nB. Transmigration of leukocytes\nC. Chemotaxis\nD. Phagocytosis\n\nNormally blood cells particularly erythrocytes in venules are confined to the central\n(axial) zone and plasma assumes the peripheral zone. As a result of increased\nvascular permeability (See vascular events above), more and more neutrophils\naccumulate along the endothelial surfaces (peripheral zone).\n\n\nA) Migration, rolling, pavementing, and adhesion of leukocytes\nMargination is a peripheral positioning of white cells along the endothelial cells.\nSubsequently, rows of leukocytes tumble slowly along the endothelium in a process\nknown as rolling\nIn time, the endothelium can be virtually lined by white cells. This appearance is\ncalled pavementing\nThereafter, the binding of leukocytes with endothelial cells is facilitated by cell\nadhesion molecules such as selectins, immunoglobulins, integrins, etc which result\nin adhesion of leukocytes with the endothelium.\n\nB). Transmigration of leukocytes\nLeukocytes escape from venules and small veins but only occasionally from\ncapillaries. The movement of leukocytes by extending pseudopodia through the\nvascular wall occurs by a process called diapedesis.\nThe most important mechanism of leukocyte emigration is via widening of inter-\nendothelial junctions after endothelial cells contractions. The basement membrane\nis disrupted and resealed thereafter immediately.\n\nC). Chemotaxis:\nA unidirectional attraction of leukocytes from vascular channels towards the site of\ninflammation within the tissue space guided by chemical gradients (including\nbacteria and cellular debris) is called chemotaxis.\nThe most important chemotactic factors for neutrophils are components of the\ncomplement system (C5a), bacterial and mitochondrial products of arachidonic\nacid metabolism such as leukotriene B4 and cytokines (IL-8). All granulocytes,\nmonocytes and to lesser extent lymphocytes respond to chemotactic stimuli.\nHow do leukocytes \"see\" or \"smell\" the chemotactic agent? This is because\nreceptors on cell membrane of the leukocytes react with the chemoattractants\nresulting in the activation of phospholipase C that ultimately leads to release of\ncytocolic calcium ions and these ions trigger cell movement towards the stimulus.\n\nD) Phagocytosis\nPhagocytosis is the process of engulfment and internalization by specialized cells\nof particulate material, which includes invading microorganisms, damaged cells,\nand tissue debris.\nThese phagocytic cells include polymorphonuclear leukocytes (particularly\nneutrophiles), monocytes and tissue macrophages.\n\nPhagocytosis involves three distinct but interrelated steps.\n\n1). Recognition and attachment of the particle to be ingested by the leukocytes:\nPhagocytosis is enhanced if the material to be phagocytosed is coated with certain\nplasma proteins called opsonins. These opsonins promote the adhesion between the\nparticulate material and the phagocytes cell membrane. The three major opsonins\nare: the Fc fragment of the immunoglobulin, components of the complement system\nC3b and C3bi, and the carbohydrate-binding proteins lectins.\nThus, IgG binds to receptors for the Fc piece of the immunoglobulin (FcR) whereas\n3cb and 3bi are ligands for complement receptors CR1 and CR2 respectively.\n\n2). Engulfment: During engulfment, extension of the cytoplasm (pseudopods) flow around\nthe object to be engulfed, eventually resulting in complete enclosure of the particle\nwithin the phagosome created by the cytoplasmic membrane of the phagocytic cell.\nformed and the engulfed particle is exposed to the degradative lysosomal enzymes.\n\n3) Killing or degradation\nThe ultimate step in phagocytosis of bacteria is killing and degradation. There are two\nforms of bacterial killing\n\na). Oxygen-independent mechanism:\nThis is mediate by some of the constituents of the primary and secondary\ngranules of polymorphonuclear leukocytes. These include:\nBactericidal permeability increasing protein (BPI)\nMajor basic protein\n\nIt is probable that bacterial killing by lysosomal enzymes is inefficient and relatively\nunimportant compared with the oxygen dependent mechanisms. The lysosomal\nenzymes are, however, essential for the degradation of dead organisms within\n\nb) Oxygen-dependent mechanism:\n\nThere are two types of oxygen- dependent killing mechanisms\n\ni) Non-myeloperoxidase dependent\n\nThe oxygen - dependent killing of microorganisms is due to formation of reactive\noxygen species such as hydrogen peroxide (H2O2), super oxide (O2) and hydroxyl\nion (HO-) and possibly single oxygen (1O2). These species have single unpaired\nelectrons in their outer orbits that react with molecules in cell membrane or nucleus\nto cause damages. The destructive effects of H2O2 in the body are gauged by the\naction of the glutathione peroxidase and catalase.\n\nii) Myloperoxidasedependent\n\nThe bactericidal activity of H2O2 involves the lysosomal enzyme\nmyeloperoxidase, which in the presence of halide ions converts H2O2 to\nhypochlorous acid (HOCI). This H2O2 halide - myecloperoxidease system is\nthe most efficient bactericidal system in neutrophils. A similar mechanism is also\neffective against fungi, viruses, protozoa and helminths.\n\nLike the vascular events, the cellular events (i.e. the adhesion, the transmigration,\nthe chemotaxis, & the phagocytosis) are initiated or activated by chemical mediators.\nNext, we will focus on the sources of these mediators.\n\nIV. Chemical mediators of inflammation\n\nChemical mediators account for the events of inflammation. Inflammation has the following\n\nCell injury Chemical mediators Acute inflammation (i.e. the vascular & cellular events).\n\nSources of mediators:\n\na) Plasma-derived mediators:\n\ni) Complement activation\nincreases vascular permeability (C3a,C5a)\nactivates chemotaxis (C5a)\nopsoninization (C3b,C3bi)\n\nii) Factor XII (Hegman factor) activation\nIts activation results in recruitment of four systems: the kinin, the clotting, the\nfibrinolytic and the compliment systems.\n\nb) Cell-derived chemical mediatos:\n\nCell-derived chemical mediators include:\n\nCellular mediators Cells of origin Functions\nHistamine Mast cells, basophiles, Vascular leakage & platelets\nSerotonine Platelets Vascular leakage\nLysosomal enzymes Neutrophiles, Bacterial & tissue destruction\nProstaglandines All leukocytes Vasodilatation, pain, fever\nLeukotriens All leukocytes LB4\nChemoattractant LC4, LCD4, & LE4 Broncho and vasoconstriction\nPlatlete activating factor All leukocytes Bronchoconstriction and WBC priming\nActivated oxygen species All leukocytes Endothelial and tissue damage\nNitric oxide Macrophages Leukocyte activation\nCytokines Lymphocytes, macrophages Leukocyte activation\n\nMost mediators perform their biologic activities by initially binding to specific\nreceptors on target cells. Once activated and released from the cells, most of these\nmediators are short lived. Most mediators have the potential to cause harmful\n\nV. Morphology of acute inflammation\n\nCharacteristically, the acute inflammatory response involves production of exudates.\nAn exudate is an edema fluid with high protein concentration, which frequently\ncontains inflammatory cells.\nA transudate is simply a non-inflammatory edema caused by cardiac, renal,\nundernutritional, & other disorders.\n\nThe differences between an exudate and a transudate are\n\nCause: Acute inflammation Non-inflammatory disorders\nAppearance Colored, turbid, hemorrhagic Clear, translucent or pale\n\nSpecific gravity: Greater than or equal to 1.020 Much less\n\nSpontaneous coagulability: Yes No\n\nProtein content: >3gm %\nCells: Abundant WBC, RBC, Only few mesothelial cells\n& Cell debris usually present\nBacteria: Present Absent.\n\nThere are different morphologic types of acute inflammation:\n\n1) Serous inflammation\n\nThis is characterized by an outpouring of a thin fluid that is derived from either the\nblood serum or secretion of mesothelial cells lining the peritoneal, pleural, and\npericardial cavities.\nIt resolves without reactions\n\n\n2) Fibrinous inflammation\n\nMore severe injuries result in greater vascular permeability that ultimately leads to\nexudation of larger molecules such as fibrinogens through the vascular barrier.\nFibrinous exudate is characteristic of inflammation in serous body cavities such as\nthe pericardium (butter and bread appearance) and pleura.\n\nCourse of fibrinous inflammation include:\n\nResolution by fibrinolysis\nScar formation between perietal and visceral surfaces i.e. the exudates get\nFibrous strand formation that bridges the pericardial space.\n\n3) Suppurative (Purulent) inflammation\n\nThis type of inflammation is characterized by the production of a large amount of pus.\nPus is a thick creamy liquid, yellowish or blood stained in colour and composed of\nA large number of living or dead leukocytes (pus cells)\nNecrotic tissue debris\nLiving and dead bacteria\nEdema fluid\nThere are two types of suppurative inflammation:\n\nA) Abscess formation:\nAn abscess is a circumscribed accumulation of pus in a living tissue. It is\nencapsulated by a so-called pyogenic membrane, which consists of layers of fibrin,\ninflammatory cells and granulation tissue.\n\nB) Acute diffuse (phlegmonous) inflammation\n\nThis is characterized by diffuse spread of the exudate through tissue spaces. It is\ncaused by virulent bacteria (eg. streptococci) without either localization or marked\npus formation. Example: Cellulitis (in palmar spaces).\n\n4) Catarrhal inflammation\n\nThis is a mild and superficial inflammation of the mucous membrane. It is\ncommonly seen in the upper respiratory tract following viral infections where\nmucous secreting glands are present in large numbers, eg. Rhinitis.\n\n5) Pseudomembranous inflammation\n\nThe basic elements of pseudomembranous inflammation are extensive confluent\nnecrosis of the surface epithelium of an inflamed mucosa and severe acute\ninflammation of the underlying tissues. The fibrinogens in the inflamed tissue\ncoagulate within the necrotic epithelium. And the fibrinogen, the necrotic\nepithelium, the neutrophilic polymorphs, red blood cells, bacteria and tissue debris\nform a false (pseudo) membrane which forms a white or colored layer over the\nsurface of inflamed mucosa.\nPseudomembranous inflammation is exemplified by Dipthetric infection of the\npharynx or larynx and Clostridium difficille infection in the large bowel following\ncertain antibiotic use.\n\nVI. Effects of acute inflammation:\n\nA. Beneficial effects\n\nDilution of toxins: The concentration of chemical and bacterial toxins at the site of\ninflammation is reduced by dilution in the exudate and its removal from the site by\nthe flow of exudates from the venules through the tissue to the lymphatics.\nProtective antibodies: Exudation results in the presence of plasma proteins\nincluding antibodies at the site of inflammation. Thus, antibodies directed against the\ncausative organisms will react and promote microbial destruction by phagocytosis or\ncomplement-mediated cell lysis.\nFibrin formation: This prevents bacterial spread and enhances phagocytosis by\nPlasma mediator systems provisions: The complement, coagulation, fibrinolytic, &\nkinin systems are provided to the area of injury by the process of inflammation.\n\nCell nutrition: The flow of inflammatory exudates brings with it glucose, oxygen and\nother nutrients to meet the metabolic requirements of the greatly increased number\nof cells. It also removes their solute waste products via lymphatic channels.\nPromotion of immunity: Micro-organisms and their toxins are carried by the\nexudates, either free or in phagocytes, along the lymphaics to local lymph nodes\nwhere they stimulate an immune response with the generation of antibodies and\ncellular immune mechanisms of defence.\n\nB. Harmful effects\n\nTissue destruction Inflammation may result in tissue necrosis and the tissue\nnecrosis may, in turn, incite inflammation.\nSwelling: The swelling caused by inflammation may have serious mechanical\neffects at certain locations. Examples include acute epiglottitis with interference in\nbreathing; Acute meningitis and encephalitis with effects of increased intracranial\nInappropriate response: The inflammatory seen in hypersensitivity reactions is\ninappropriate (i.e. exaggerated).\n\nVII. Course of acute inflammation\nAcute inflammation may end up in:\n\nResolution: i.e. complete restitution of normal structure and function of the tissue,\neg. lobar pneumonia.\nHealing by fibrosis (scar formation).\nAbscess formation {Surgical law states -Thou shallt ( you shold ) drain all\nabscesses.} However, if it is left untouched, it may result in\n- Sinus formation - when an abscess cavity makes contact with only one epithelial\n- Fistula formation: when an abscess tract connects two epithelial surface.\nOr very rarely to septicemia or\nPyemia with subsequent metastatic abscess in heart, kidney, brain etc.\n\n\nDefinition: Chronic inflammation can be defined as a prolonged inflammatory process\n(weeks or months) where an active inflammation, tissue destruction and attempts at repair\nare proceeding simultaneously.\n\nCauses of chronic inflammation:\n\n1. Persistent infections\nCertain microorganisms associated with intracellular infection such as tuberculosis,\nleprosy, certain fungi etc characteristically cause chronic inflammation.\nThese organisms are of low toxicity and evoke delayed hypersensitivity reactions.\n\n2. Prolonged exposure to nondegradable but partially toxic substances either\nendogenous lipid components which result in atherosclerosis or exogenous substances\nsuch as silica, asbestos.\n\n3. Progression from acute inflammation: Acute inflammation almost always progresses\nto chronic inflammation following:\n\na. Persistent suppuration as a result of uncollapsed abscess cavities, foreign body\nmaterials (dirt, cloth, wool, etc), sequesterum in osteomylitis, or a sinus/fistula from\nchronic abscesses.\n\n4. Autoimmuniy. Autoimmune diseases such as rheumatoid arthritis and systemic lupus\nerythematosis are chronic inflammations from the outset.\n\n\nCells of chronic inflammation:\n\nMonocytes and Macrophages are the prima Dona (primary cells) in chronic\ninflammation. Macrophages arise from the common precursor cells in the bone\nmarrow, which give rise to blood monocytes. These cells are then diffusely scattered\nin various parts of the body, in the liver (Kupffer cells), spleen, lymph nodes (sinus\nhistiocytes), lungs (alviolar macrophages), bone marrow, brain (microglia), skin\n\n(Langerhans cells), etc. These cells constitute the mononuclear- phagocytic\nMacrophages are scavenger cells of the body.\n\nOther cells in chronic inflammation:\n\n1. T-Lymphocytes are primarily involved in cellular immunity with lymphokine\nproduction, and they are the key regulator and effector cells of the immune system.\n2. B-lymphocytes and Plasma cells produce antibody directed either against\npersistent antigen in the inflammatory site or against altered tissue components.\n3. Mast cells and eosinophils appear predominantly in response to parasitic infestations\n& allergic reactions.\n\nThough neutrophils are hallmarks of acute inflammatory reactions, large numbers of\nneutrophils may be seen in some forms of chronic inflammation, notably chronic\nosteomylitis, actinomycosis, & choric lung diseases induced by smoking and other stimuli.\nThus, the overall differentiation points between acute and chronic inflammations include:\n\nCharacteristics Acute inflammation Chronic inflammation\nDuration Short Relatively long\nPattern Stereotyped Varied\nPredominant cell Neutrophils Macrophages,\nLymphocytes plasma cells\nTissue destruction Mild to moderate Marked\nFibrosis Absent Present\nInflammatory reaction Exudative Productive\n\nClassification of chronic inflammation:\n\nChronic inflammation can be classified into the following two types based on histologic\n\n1) Nonspecific chronic inflammation: This involves a diffuse accumulation of\nmacrophages and lymphocytes at site of injury that is usually productive with new fibrous\ntissue formations. E.g. Chronic cholecystitis.\n\n\n2) Specific inflammation (granulomatous inflammation):\nDefinition: Granulomatous inflammation is characterized by the presence of\ngranuloma. A granuloma is a microscopic aggregate of epithelioid cells. Epithelioid cell\nis an activated macrophage, with a modified epithelial cell-like appearance (hence the\nname epithelioid). The epitheloid cells can fuse with each other & form multinucleated\ngiant cells. So, even though, a granuloma is basically a collection of epithelioid cells, it\nalso usually contains multinucleated giant cell & is usually surrounded by a cuff of\nlymphocytes and occasional plasma cells. There are two types of giant cells:\na. Foreign body-type giant cells which have irregularly scattered nuclei in presence\nof indigestible materials.\nb. Langhans giant cells in which the nuclei are arranged peripherally in a horse -shoe\npattern which is seen typically in tuberculosis, sarcoidosis etc\nGiant cells are formed by fusion of macrophages perhaps by a concerted attempt of\ntwo or more cells to engulf a single particle.\n\n\nThere are two types of granulomas, which differ in their pathogenesis.\n\nA. Foreign body granuloma\n\nThese granulomas are initiated by inert foreign bodies such as talc, sutures (non-\nabsorbable), fibers, etc that are large enough to preclude phagocytosis by a single\nmacrophage and do not incite an immune response.\n\nB. Immune granulomas\n\nAntigen presenting cells (macrophages) engulf a poorly soluble inciting agent. Then, the\nmacrophage processes and presents part of the antigen (in association with MHC type2\nmolecules) to CD4+T helper 1 cells which become activated. The activated CD4+ T-cells\nproduce cytokines (IL-2 and interferon gamma).The IL-2 activates other CD4+T helper\ncells and perpetuates the response while IFN- is important in transforming\nmacrophages into epitheloid cells and multinucleated giant cells. The cytokines have\nbeen implicated not only in the formation but also in the maintenance of granuloma.\n\nMacrophage inhibitory factor helps to localize activated macrophages and epitheloid\n\n\n\nMajor causes of granulomatious inflammation include:\n\na) Bacterial: Tuberculosis, Leprosy, Syphilis, Cat scratch disease, Yersiniosis\nb) Fungal: Histoplasmosis, Cryptococcosis, Coccidioidomycosis, Blastomycosis\nc) Helminthic: Schistosomiasis\nd) Protozoal: Leishmaniasis, Toxoplasmosis\ne) Chlamydia: Lymphogranuloma venerum\nf) Inorganic material: Berrylliosis\ng) Idiopathic: Acidosis, Cohns disease, Primary biliary cirrhosis\n\n\nThe systemic effects of inflammation include:\na. Fever\nb. Endocrine & metabolic responses\nc. Autonomic responses\nd. Behavioral responses\ne. Leukocytosis\nf. Leukopenia\ng. Weight loss\n\na. Fever\n\nFever is the most important systemic manifestation of inflammation. It is coordinated by\nthe hypothalamus & by cytokines (IL -1, IL-6, TNF-) rekeased from macrophages\nand other cells.\n\n\nb. Endocrine and metabolic responses include:\n\n- The liver secrets acute phase proteins such as:\nC-reactive proteins\nSerum Amyloid A\nComplement and coagulation proteins\n- Glucocorticoids (increased)\n- Vasopressin (decreased)\n\nc. Autonomic responses include:\n\n- Redirection of blood flow from the cutaneous to the deep vascular bed.\n- Pulse rate and blood pressure (increased)\n- Sweating (decreased)\n\nd. Behavioral responses include:\n\n- Rigor, chills, anoroxia, somnolence, and malaise.\n\ne. Leucocytosis is also a common feature of inflammation, especially in bacterial\ninfections. Its usual count is 15,000 to 20,000 cells/mm3. Most bacterial infections\ninduce neutrophilia. Some viral infections such as infectious mononucleosis, & mumps\ncause lymphocytosis. Parasitic infestations & allergic reactions such as bronchial\nashma & hay fever induce eosinophilia.\n\nf. Leukopenia is also a feature of typhoid fever and some parasitic infections.\n\ng. Weight loss is thought to be due to the action of IL-1 and TNF- which increase\ncatabolism in skeletal muscle, adipose tissue and the liver with resultant negative\nnitrogen balance.\n\n\nIX. Exercises\n\n1. Discuss the pathopysiology of the cardinal sign of acute inflammation.\n2. Enumerate the sequential steps in both the vascular and cellular responses of acute\n3. Why is inflammation a largely protective response?\n4. List the morphologic changes in acute inflammation.\n5. Discuss the squelae of suppurative inflammation.\n6. Enumerate the causes of chronic inflammation.\n7. Define gramulomatous inflammation\n8. Discuss the pathogenesis and morphologic changes of granulomatous inflammation\n9. Compare & contrast acute and chronic inflammations.\n10. Enumerate the systemic effects of inflammations.\n\n\n\nSaunders Company. 6th edition 1999\n2. Mac Sween RNM, Whaley K. Muirs Text book of pathology. London, Edward Arnold\nedition 1992\n3. Rubin-E, Farber-JC. Pathology Philadelphia, J.B. Lippincott Company 6\nedition 1994\n4. Dey NC, Dey TK. A Text book of Pathology Calcatta, Messers Allied agency 10\n\n\nI. Learning objectives\n\nUpon completing the chapter, students should be able to:\n\n1. Describe the processes of healing.\n2. Specify the patterns of wound healing.\n3. List the factors that influence wound healing.\n4. Discuss the complications of wound healing.\n5. Understand fracture healing.\n\nII. Definition of healing\nThe word healing, used in a pathological context, refers to the bodys replacement of\ndestroyed tissue by living tissue.\n\nIII. Processes of healing\n\nThe healing process involves two distinct processes:\n\n- Regeneration, the replacement of lost tissue by tissues similar in type and\n\n- Repair (healing by scaring), the replacement of lost tissue by granulation tissue which\nmatures to form scar tissue. Healing by fibrosis is inevitable when the surrounding\nspecialized cells do not possess the capacity to proliferate.\n\n\nTissue Inflammation Removal of dead tissue &\nDamage injurious agent\n\n\nFibrous tissue Specialized tissue\n(scarring) (Regeneration)\n\n\nFigure 4.1 Processes of healing: Removal of dead tissue & injurious agent and replacement\noccur simultaneously.\n\nWhether healing takes place by regeneration or by repair (scarring) is determined partly by\nthe type of cells in the damaged organ & partly by the destruction or the intactness of the\nstromal frame work of the organ. Hence, it is important to know the types of cells in the\n\nTypes of cells\n\nBased on their proliferative capacity there are three types of cells.\n\n1. Labile cells\nThese are cells which have a continuous turn over by programmed division of stem cells.\nThey are found in the surface epithelium of the gastrointestinal treat, urinary tract or the\nskin. The cells of lymphoid and haemopoietic systems are further examples of labile cells.\nThe chances of regeneration are excellent.\n\n2. Stable cells\nTissues which have such type of cells have normally a much lower level of replication and\nthere are few stem cells. However, the cells of such tissues can undergo rapid division in\nresponse to injury. For example, mesenchymal cells such as smooth muscle cells,\nfibroblasts, osteoblasts and endothelial cells are stable cells which can proliferate. Liver,\n\nendocrine glands and renal tubular epithelium has also such type of cells which can\nregenerate. Their chances of regeneration are good.\n\n3. Permanent cells\n\nThese are non-dividing cells. If lost, permanent cells cannot be replaced, because they don\nnot have the capacity to proliferate. For example: adult neurons, striated muscle cells, and\ncells of the lens.\n\nHaving been introduced to the types of cells, we can go back to the two types of healing\nprocesses & elaborate them.\n\na. Healing by regeneration\n\nDefinition: Regeneration (generare=bring to life) is the renewal of a lost tissue in which the\nlost cells are replaced by identical ones.\n\nRegeneration involves two processes\n1. Proliferation of surviving cells to replace lost tissue\n2. Migration of surviving cells into the vacant space.\n\nThe capacity of a tissue for regeneration depends on its\n1) proliferative ability,\n2) degree of damage to stromal framework and\n3) on the type and severity of the damage.\n\nTissues formed of labile and stable cells can regenerate provided that stromal framework\nare intact.\n\nb. Repair (Healing by connective tissue)\n\nDefinition:- Repair is the orderly process by which lost tissue is eventually replaced by a\n\nA wound in which only the lining epithelium is affected heals exclusively by regeneration. In\ncontrast, wounds that extend through the basement membrane to the connective tissue, for\nexample, the dermis in the skin or the sub-mucosa in the gastrointestinal tract, lead to the\n\nformation of granulation tissue and eventual scarring. Tissues containing terminally\ndifferentiated (permanent) cells such as neurons and skeletal muscle cells can not heal by\nregeneration. Rather the lost permanent cells are replaced by formation of granulation\n\nIn granulation-tissue formation, three phases may be observed.\n\n1. Phase of inflammation\n\nAt this phase, inflammatory exudate containing polymorphs is seen in the area of tissue\ninjury. In addition, there is platelet aggregation and fibrin deposition.\n\n2. Phase of demolition\n\nThe dead cells liberate their autolytic enzymes, and other enzymes (proteolytic) come from\ndisintegrating polymorphs. There is an associated macrophage infiltration. These cells\ningest particulate matter, either digesting or removing it.\n\n3. Ingrowth of granulation tissue\n\nThis is characterized by proliferation of fibroblasts and an ingrowth of new blood vessels into\nthe area of injuty, with a variable number of inflammatory cells.\n\nFibroblasts actively synthesize and secrete extra-cellular matrix components, including\nfibronectin, proteoglycans, and collagen types I and III. The fibronectin and proteoglycans\nform the scaffolding for rebuilding of the matrix. Fibronectin binds to fibrin and acts as a\nchemotactic factor for the recruitment of more fibroblasts and macrophages. The synthesis\nof collagen by fibroblasts begins within 24 hours of the injury although its deposition in the\ntissue is not apparent until 4 days. By day 5, collagen type III is the predominant matrix\nprotein being produced; but by day 7 to 8, type I is prominent, and it eventually becomes the\nmajor collagen of mature scar tissue. This type I collagen is responsible for providing the\ntensile strength of the matrix in a scar.\n\nCoincident with fibroblast proliferation there is angiogenesis (neovascularization), a\nproliferation and formation of new small blood vessels. Vascular proliferation starts 48 to 72\nhours after injury and lasts for several days.\n\nWith further healing, there is an increase in extracellular constituents, mostly collagen, with a\ndecrease in the number of active fibroblasts and new vessels. Despite an increased\ncollagenase activity in the wound (responsible for removal of built collagen), collagen\naccumulates at a steady rate, usually reaching a maximum 2 to 3 months after the injury.\nThe tensile strength of the wound continues to increase many months after the\ncollagen content has reached a maximum. As the collagen content of the wound\nincreases, many of the newly formed vessels disappear. This vascular involution which\ntakes place in a few weeks, dramatically transforms a richly vascularized tissue in to a pale,\navascular scar tissue.\n\nWound contraction\n\nWound contraction is a mechanical reduction in the size of the defect. The wound is reduced\napproximately by 70-80% of its original size. Contraction results in much faster healing,\nsince only one-quarter to one-third of the amount of destroyed tissue has to be replaced. If\ncontraction is prevented, healing is slow and a large ugly scar is formed.\n\nCauses of contraction\nIt is said to be due to contraction by myofibroblasts. Myofibroblasts have the features\nintermediate between those of fibroblasts and smooth muscle cells. Two to three days after\nthe injury they migrate into the wound and their active contraction decrease the size of the\n\n\nFollowing tissue injury, whether healing occurs by regeneration or scarring is determined by\nthe degree of tissue destruction, the capacity of the parenchymal cells to proliferate, and the\ndegree of destructon of stromal framework as illustrated in the diagram below (See Fig. 4.2).\nIn the above discussion, regeneration, repair, and contraction have been dealt with\nseparately. Yet they are not mutually exclusive processes. On the contrary, the three\nprocesses almost invariably participate together in wound healing.\n\n\nAcute inflammatory exudation\n\nStimulus promptly Stimulus not promptly\ndestroyed destroyed\n\nNecrosis of cells\n\nNo or minimal Tissue of stable Tissue of\nnecrosis of cells or labile cells permanent cells\n\nExudate Exudate Framework Framework\nResolved organized intact destroyed\n\nRestitution of\nNormal structure\nMild heat injury\n\nFigure 4.2 Diagram showing healing process following acute inflammatory injury.\n\nBacterial abscess\nMyocardial infarction\nRestitution of normal structure\nLobar pneumonia\n\nIV. Molecular control of healing process\n\nAs seen above, healing involves an orderly sequence of events which includes regeneration\nand migration of specialized cells, angiogenesis, proliferation of fibroblasts and related cells,\nmatrix protein synthesis and finally cessation of these processes.\nThese processes, at least in part, are mediated by a series of low molecular weight\npolypeptides referred to as growth factors.\nThese growth factors have the capacity to stimulate cell division and proliferation. Some of\nthe factors, known to play a role in the healing process, are briefly discussed below.\n\nSources of Growth Factors:\n\nFollowing injury, growth factors may be derived from a number of sources such as:\n\n1. Platelets, activated after endothelial damage,\n2. Damaged epithelial cells,\n3. Circulating serum growth factors,\n4. Macrophages, or\n5. Lymphocytes recruited to the area of injury\n\nThe healing process ceases when lost tissue has been replaced. The mechanisms\nregulating this process are not fully understood. TGF- acts as a growth inhibitor for both\nepithelial and endothelial cells and regulates their regeneration.\n\nThe summary of molecular control of the healing process is illustrated with the diagram\nshown below.\n\nDamaged Blood Macrophages Lymphocytes\nEpithelial cells platelets\n\nRelease of growth factors and cytokines\n\nSpecialized Fibroblast Angiogenesis\ncell regeneration activation - new capillary\nE.g. EGF E.g. TGF- formation\n(Epidermal growth) (Transforming (angiogenic factors)\nfactor) growth factor-beta)\n\nFig. 4-3 Diagram showing sources of growth factors and their effect.\n\nVI. Wound Healing\n\nThe two processes of healing, described above, can occur during healing of a diseased\norgan or during healing of a wound. A wound can be accidental or surgical. Now, we will\ndiscuss skin wound healing to demonstrate the two basic processes of healing mentioned\n\nHealing of a wound demonstrates both epithelial regeneration (healing of the epidermis) and\nrepair by scarring (healing of the dermis).\n\nThere are two patterns of wound healing depending on the amount of tissue damage:\n1. Healing by first intention (Primary union)\n2. Healing by second intention\n\nThese two patterns are essentially the same process varying only in amount.\n1. Healing by first intention (primary union)\nThe least complicated example of wound healing is the healing of a clean surgical incision\n(Fig. 4-4, left). The wound edges are approximated by surgical sutures, and healing occurs\nwith a minimal loss of tissue. Such healing is referred to, surgically, as primary union or\nhealing by first intention. The incision causes the death of a limited number of epithelial\ncells as well as of dermal adnexa and connective tissue cells; the incisional space is narrow\nand immediately fills with clotted blood, containing fibrin and blood cells; dehydration of the\nsurface clot forms the well-known scab that covers the wound and seals it from the\nenvironment almost at once.\nclot. The epidermis at its cut edges thickens as a result of mitotic activity of basal cells and,\nwithin 24 to 48 hours, spurs of epithelial cells from the edges both migrate and grow along\nthe cut margins of the dermis and beneath the surface scab to fuse in the midline, thus\nproducing a continuous but thin epithelial layer.\nBy day 3, the neutrophils have been largely replaced by macrophages. Granulation tissue\nprogressively invades the incisional space. Collagen fibers are now present in the margins\nof the incision, but at first these are vertically oriented and do not bridge the incision.\nEpithelial cell proliferation continues, thickening the epidermal covering layer.\nBy day 5, the incisional space is filled with granulation tissue. Neovascularization is\nmaximal. Collagen fibrils become more abundant and begin to bridge the incision. The\nepidermis recovers its normal thickness and differentiation of surface cells yields a mature\nepidermal architecture with surface keratinization.\nDuring the second week, there is continued accumulation of collagen and proliferation of\nfibroblasts. Leukocytic infiltrate, edema, and increased vascularity have largely\ndisappeared. At this time, the long process of blanching begins, accomplished by the\nincreased accumulation of collagen within the incisional scar, accompanied by regression\nof vascular channels.\nBy the end of the first month, the scar comprises a cellular connective tissue devoid of\ninflammatory infiltrate, covered now by an intact epidermis. The dermal appendages that\nhave been destroyed in the line of the incision are permanently lost. Tensile strength of the\nwound increases thereafter, but it may take months for the wounded area to obtain its\nmaximal strength.\n\n2. Healing by second intention (secondary union)\n\nWhen there is more extensive loss of cells and tissue, such as occurs in infarction,\ninflammatory ulceration, abscess formation, and surface wounds that create large defects,\nthe reparative process is more complicated. The common denominator in all these situations\nis a large tissue defect that must be filled. Regeneration of parenchymal cells cannot\ncompletely reconstitute the original architecture. Abundant granulation tissue grows in from\nthe margin to complete the repair. This form of healing is referred to as secondary union or\nhealing by second intention.\nSecondary healing differs from primary healing in several respects:\n\n1. Inevitably, large tissue defects initially have more fibrin and more necrotic debris and\nexudate that must be removed. Consequently, the inflammatory reaction is more\n2. Much larger amounts of granulation tissue are formed. When a large defect occurs in\ndeeper tissues, such as in a viscus, granulation tissue bears the full responsibility for\nits closure, because drainage to the surface cannot occur.\n3. Perhaps the feature that most clearly differentiates primary from secondary healing is\nthe phenomenon of wound contraction, which occurs in large surface wounds.\n4. Healing by second intention takes much longer than when it occurs by first\n\nVI. Factors that influence wound healing\n\nA number of factors can alter the rate and efficiency of healing. These can be classified in to\nthose which act locally, and those which have systemic effects. Most of these factors have\nbeen established in studies of skin wound healing but many are likely to be of relevance to\nhealing at other sites.\n\nLocal Factors\n\nType, size, and location of the wound\n\nA clean, aseptic wound produced by the surgeons scalpel heals faster than a wound\nproduced by blunt trauma, which exhibits aboundant necrosis and irregular edges.Small\n\nblunt wounds heal faster than larger ones.Injuries in richly vascularized areas (e.g., the face)\nheal faster than those in poorly vascularized ones (e.g., the foot).\nIn areas where the skin adheres to bony surfaces, as in injuries over the tibia, wound\ncontraction and adequate apposition of the edges are difficult. Hence, such wounds heal\n\nVascular supply\nWounds with impaired blood supply heal slowly. For example, the healing of leg wounds in\npatients with varicose veins is prolonged. Ischemia due to pressure produces bed sores and\nthen prevents their healing. Ischemia due to arterial obstruction, often in the lower\nextremities of diabetics, also prevents healing.\n\nWounds provide a portal of entry for microorganisms. Infection delays or prevents healing,\npromotes the formation of excessive granulation tissue (proud flesh), and may result in\nlarge, deforming scars.\n\nEarly motion, particularly before tensile strength has been established, subjects a wound to\npersistent trauma, thus preventing or retarding healing.\n\nIonizing radiation\nPrior irradiation leaves vascular lesions that interfere with blood supply and result in slow\nwound healing. Acutely, irradiation of a wound blocks cell proliferation, inhibits contraction,\nand retards the formation of granulation tissue.\n\nSystemic Factors\n\nCirculatory status\nCardiovascular status, by determining the blood supply to the injured area, is important for\nwound healing. Poor healing attributed to old age is often due, largely, to impaired\n\nSystemic infections delay wound healing.\n\nMetabolic status\nPoorly controlled diabetes mellitus is associated with delayed wound healing.The risk of\ninfection in clean wound approaches five fold the risk in non- diabetics.\nIn diabetic patients, there can be impaired circulation secondary to arteriosclerosis and\nimpaired sensation due to diabetic neuropathy. The impaired sensation renders the lower\nextremity blind to every day hazards. Hence, in diabetic patients, wounds heal the very\n\nNutritional deficiencies\n\nProtein deficiency\n\nIn protein depletion there is an impairment of granulation tissue and collagen formation,\nresulting in a great delay in wound healing.\nVitamine deficiency\n\nVitamin C is required for collagen synthesis and secretion. It is required in hydroxylation of\nproline and lysine in the process of collagen synthesis. Vitamin C deficiency (scurvy) results\nin grossly deficient wound healing, with a lack of vascular proliferation and collagen\n\nTrace element deficiency\n\nZinc (a co-factor of several enzymes) deficiency will retard healing by preventing cell\nproliferation. Zinc is necessary in several DNA and RNA polymerases and transferases;\nhence, a deficiency state will inhibit mitosis. Proliferation of fibroblasts (fibroplasia) is,\ntherefore, retarded.\n\nCorticosteroids impair wound healing, an effect attributed to an inhibition of ollagen\nsynthesis. However, these hormones have many other effects, including anti-inflammatory\nactions and a general depression of protein synthesis. It also inhibits fibroplasia and\nneovascularization. Both epithelialization and contraction are impaired. It is, therefore,\ndifficult to attribute their inhibition of wound healing to any one specific mechanism.\n\nThyroid hormones, androgens, estrogens and growth hormone also influence wound\nhealing. This effect, however, may be more due to their regulation of general metabolic\nstatus rather than to a specific modification of the healing process.\n\nAnti-inflammatory drugs\nAnti-inflammatory medications do not interfere with wound healing when administered at the\nusual daily dosages. Asprin and indomethalin both inhibit prostaglandin synthesis and thus\ndelay healing.\n\nVII. Complications of Wound Healing\n\nAbnormalities in any of the three basic healing processes contraction, repair, and\nregeneration result in the complications of wound healing.\n\n1. Infection\nA wound may provide the portal of entry for many organisms. Infectrion may delay\nhealing, and if severe stop it completely.\n\n2. Deficient Scar Formation\nInadequate formation of granulation tissue or an inability to form a suitable extracellular\nmatrix leads to deficient scar formation and its complications. The complications of\ndeficient scar formation are:\na. Wound dehiscence & incitional hernias\nb. Ulceration\n\na. Wound Dehiscence and Incisional Hernias:\n\nDehiscence (bursting of a wound) is of most concern after abdominal surgery. If insufficient\nextracellular matrix is deposited or there is inadequate cross-linking of the matrix, weak\nscars result. Dehiscence occurs in 0.5% to 5% of abdominal operations.Inappropriate suture\nmaterial and poor surgical techiniques are important factors. Wound infection, increased\nmechanical stress on the wound from vomiting, coughing, or ileus is a factor in most cases\nof abdominal dehiscence. Systemic factors that predispose to dehiscence include poor\nmetabolic status, such as vitamin C deficiency, hypoproteinemia, and the general inanition\n\nthat often accompanies metastatic cancer. Dehiscence of an abdominal wound can be a life-\nthreatening complication, in some studies carrying a mortality as high as 30%.\nAn incisional hernia, usually of the abdominal wall, refers to a defect caused by poor wound\nhealing following surgery into which the intestines protrude.\n\nb. Ulceration:\nWounds ulcerate because of an inadequate intrinsic blood supply or insufficient\nvascularization during healing. For example, leg wounds in persons with varicose veins or\nsevere atherosclerosis typically ulcerate. Nonhealing wounds also develop in areas devoid\nof sensation because of persistent trauma. Such trophic or neuropathic ulcers are\noccasionally seen in patients with leprosy, diabetic peripheral neuropathy and in tertiary\nsyphilis from spinal involvement (in tabes dorsalis).\n\n3. Excessive Scar Formation\n\nAn excessive deposition of extracellular matrix at the wound site results in a hypertrophic\nscar or a keloid (See Figure 4-5 and 4-6). The rate of collagen synthesis, the ratio of type III\nto type I collagen, and the number of reducible cross-links remain high, a situation that\nindicates a maturation arrest, or block, in the healing process.\n\nKeloid Formation\n\nAn excessive formation of collagenous tissue results in the appearance of a raised area of\nscar tissue called keloid. It is an exuberant scar that tends to progress and recur after\nexcision. The cause of this is unknown. Genetic predisposition, repeated trauma, and\nirritation caused by foreign body, hair, keratin, etc., may play a part. It is especially frequent\nafter burns. It is common in areas of the neck & in the ear lobes.\n\nHypertrophic Scar\n\nHypertrophic scar is structurally similar to keloid. However, hypertrophic scar never gets\nworse after 6 months unlike keloid, which gets worse even after a year and some may even\nprogress for 5 to 10 years. Following excision keloid recurres, whereas a hypertrophic scar\ndoes not.\n\n\n4. Excessive contraction\n\nA decrease in the size of a wound depends on the presence of myofibroblasts, development\nof cell-cell contacts and sustained cell contraction. An exaggeration of these processes is\nsurrounding tissues. Contracture (cicatrisation) is also said to arise as a result of late\nreduction in the size of the wound. Interestingly, the regions that normally show minimal\nwound contraction (such as the palms, the soles, and the anterior aspect of the thorax) are\nthe ones prone to contractures. Contractures are particularly conspicuous in the healing of\nserious burns. Contractures of the skin and underlying connective tissue can be severe\nviscera such as urethra, esophagus, and intestine. It leads to progressive stenosis with\nstricture formation. In the alimentary tract, a contracture (stricture) can result in an\nSeveral diseases are characterized by contracture and irreversible fibrosis of the superficial\nthe contracture in wound healing.\n\n5. Miscellaneous\n\nsometimes persist, and proliferate to form an epidermoid cyst.\n\nVIII. Fracture Healing\n\nthose seen in skin wound healing. Unlike healing of a skin wound, however, the defect\ncaused by a fracture is repaired not by a fibrous scar tissue, but by specialized bone-\nforming tissue so that, under favorable circumstances, the bone is restored nearly to normal.\n\n\nStructure of bone\n\nBone is composed of calcified osteoid tissue, which consists of collagen fibers embedded in\na mucoprotein matrix (osteomucin). Depending on the arrangement of the collagen fibers,\nthere are two histological types of bone:\n\n1. Woven, immature or non-lamellar bone\nof the osteocytes. The osseomucin is less abundant and it also contains less calcium.\n\n2. Lamellar or adult bone\n\n\nStages in Fracture Healing (Bone Regeneration)\n\nStage 1: Haematoma formation. Immediately following the injury, there is a variable\nextend into the surrounding muscles. If it is subsequently organized and ossified,\nmyositis ossificans results.\nStage 2: Inflammation. The tissue damage excites an inflammatory response, the exudate\nno way from those seen in other inflamed tissues. There is an increased blood\nflow and a polymorphonuclear leucocytic infiltration. The haematoma attains a\nfusiform shape.\nStage 3: Demolition. Macrophages invade the clot and remove the fibrin, red cells, the\nmacrophages and osteoclasts.\nStage 4: Formation of granulation tissue. Following this phase of demolition, there is an\ningrowth of capillary loops and mesenchymal cells derived from the periosteum\nand together with the newly formed blood vessels contribute to the granulation\ntissue formation.\n\nStage 5: Woven bone and cartilage formation. The mesenchymal osteoblasts next\nStage 6: Formation of lamellar bone. The dead calcified cartilage or woven bone is next\ninvaded by capillaries headed by osteoclasts. As the initial scaffolding\nHaversian systems are formed. Adjacent to the periosteum and endosteum the\nlamellae are parallel to the surface as in the normal bone. This phase of formation\nof definitive lamellar bone merges with the last stage.\nStage 7: Remodelling. The final remodeling process involving the continued osteoclastic\nremoved, the intermediate callus becomes converted into compact bone\n\n\nIX. Exercises\n1. Compare & contrast wound healing by primary & secondary union\n2. State the factors that influence fracture healing.\n3. Discuss the complications of wound healing.\n4. What are the two basic processes of healing? What factors determine which of these\n\n3. F.B. Walter and M.S Israel; General Pathology, Churchill Livingston Edinburgh and\nLondon, 4\nedition, 1974\n4. Muirs .>> 15\n5. Stanley L. Robin, Text book of Pathology with clinical applications, W.B. Saunders\nCompany, 2\nedition, 1962.\n6. Robbins Text book of pathology\n7. Macfarlane, Reid, callander, Illustrated Pathology, Churchill Livingstone, 5\n8. Rubins Textbook of Pathology\n9. Bailey and Loves, Text Book of Surgery\n10. Hardys Text Book of Surgery\n\n\nI. Learing objectives\n\nUpon completion of this chapter, students should be able to:\nvasculature by Starling forces\ndisrupted across the vascular wall under different conditions, i.e. edema.\n3. Understand and explain the cause and pathogenesis of clinical conditions like\nmyocardial infarction, deep venous thrombosis, pulumonary thromboembolism, etc.\n4. Know the pathogenesis of edema of congestive heart failure, nephrotic syndrome,\ncirrosis, and other clinical conditions\n5. Have the basic knowledge about various types of shock, their pathogenesis,\nmanifestations, and complications.\n\nII. Introduction\n\nThe health and well-being of cells & tissues depend not only on an intact circulation to\ndeliver nutrients but also on normal fluid hemostasis. This chapter reviews the major\ndisturbances involving the hemodynamic system.\n\nIII. Edema\n\nDefinition: Edema is increased fluid in the interstitial tissue spaces or it is a fluid\naccumulation in the body cavities in excessive amount.\nDepending on the site, fluid accumulation in body cavities can be variously designated as:\na) Hydrothorax fluid accumulation in pleural cavity in a pathologic amount.\nb) Hydropericardium pathologic amount of fluid accumulated in the pericardial cavity.\nc) Hydroperitoncum (ascites) fluid accumulation in peritoneal cavity.\n\nd) Ancsarca is a severe & generalized edema of the body with profound\nsubcutaneous swelling.\n\nMechanism of edema formation:\n\nApproximately 60% of the lean body weight is water, two-thirds of which is intracellular with\nthe remainder in the extracellular compartment.\nThe capillary endothelium acts as a semipermeable membrane and highly permeable to\nwater & to almost all solutes in plasma with an exception of proteins. Proteins in plasma\nand interstial fluid are especially important in controlling plasma & interstitial fluid volume.\nNormally, any outflow of fluid into the interstitium from the arteriolar end of the\nmicrocirculation is nearly balanced by inflow at the venular end. Therefore, normally, there\nis very little fluid in the interstitium.\nEdema formation is determined by the following factors:\n1) Hydrostatic pressure\n2) Oncotic pressure\n3) Vascular permeability\n4) Lymphatic channels\n5) Sodium and water retention\n\nWe will discuss each of the above sequentially.\n\n1) Hydrostatic and oncotic pressures:\n\nThe passage of fluid across the wall of small blood vessels is determined by the balance\nbetween hydrostatic & oncotic pressures.\n\nThere are four primary forces that determine fluid movement across the capillary membrane.\nEach of them can be listed under the above two basic categories, the hydrostatic pressure &\nthe oncotic pressure. These four primary forces are known as Starling forces & they are:\n\na. The capillary hydrostatic pressure (Pc)\nThis pressure tends to force fluid outward from the intravascular space through the\ncapillary membrane to the interstitium.\n\n\nb. The interstial fluid hydrostatic pressure (Pif)\nThis pressure tends to force fluid from the interstitial space to the intravascular\nc. The plasma colloid osmotic (oncotic) pressure (p)\nThis pressure tends to cause osmosis of fluid inward through the capillary\nmembrane from the interstitium. The plasma oncotic pressure is caused by the\npresence of plasma proteins.\nd. The interstial fluid colloid osmotic (oncotic) pressure (if)\nThis pressure tends to cause osmosis of fluid outward through the capillary\nmembrane to the interstitium.\n\n\n\n\nFig. 5.1 The forces that determine the movement of fluid across the capillary wall.\n\nThe net filtration pressure can be calculated as\n\nIn addition, some fluid is normally derained by the lymphatic channels.Usually, excess fluid\nwill accumulate in the interstitium (i.e. edema is formed) when the capillary hydrostatic\npressure is increased or when the plama oncotic pressure is decreased or when the\nlymphatic drainage is blocked.\n\nHence, basically, one can divide pathologic edema into two broad categories:\n\nA. Edema due to decreased plasma oncotic pressure. The plasma oncotic pressure is\ndecreased when the plasma proteins are decreased in various diseases such as:\n\n1. Protein loosing glomerulopathies like nephroticsyndrome with leaky glomerulus.\n2. Liver cirrhosis which leads to decreased protein synthesis by the damaged liver.\n3. Malnutrition\n4. Protein loosing enteropathy.\n\n= K [Pc +\n] - [\n+Pif ]\n\nB. Edema resulting from increased capillary hydrostatic pressure as in the following\n\n1. Deep venous thrombosis resulting in impaired venous return.\n2. Pulmonary oedema\n3. Cerebral oedema\n4. Congestive heart failure\n\nClinical classification of edema:\n\nOne can also clinically classify edema into localized & generalized types.\n\nA) Localized B) Generalized\n\n1) Deep venous thrombosis 1) Nephrotic syndrome\n2) Pulmonary edema 2) Liver cirrhosis\n3) Brain edema 3) Malnutrition\n4) Lymphatic edema 4) Heart failure\n5) Renal failure\nNext, we will elaborate on some of the above examples.\n\n1. Localized edema\n\na. Edema of the brain:\n- May be localized at the site of lesion e.g neoplasm, trauma.\n- May be generalized in encephalitis, hypertensive crisis, & trauma\n- Narrowed sulci & distended gyri.\n- Edema compression of medulla towards formen magnum compression of\nvital centers lead to - Hernation of the brain\n\nPatient dies\nb. Pulmonary edema\n\n- Usually occurs in left ventricular failure.\n- May occur in adult respiratory distress syndrome (ARDS).\n- lung 2.3x its weight.\n\n2. Generalized edema (anasarca) occurs due to\n\na. Reduction of albumin due to excessive loss or reduced synthesis as is caused by:\n1) Protein loosing glomerulopathies like nephrotic syndrome\n2) Liver cirrhosis\n3) Malnutrition\n4) Protein-losing enteropathy\nb. Increased volume of blood secondary to sodium retention caused by congestive\nheart failure:\n\nFig. 5.2 Mechanism of edema formation in congestive heart failure:\n\nReduced tissue perfusion\n\nRennin angiotensin\nSystem (RAS) activated\n\n- A proteolytic enzyme\n- Secreted by myoepithelial cells\nof juxtaglomerular apparatus\n- Secreted in response to\n1. A fall in renal afferent arteriolar perfusion\n2. Decreased sodium concentration\nin distal renal tubules\n3. Via stimulation of sympatethic\nnervous system\n\n(angiotensin converting enzyme )\n\nin the pulmonary circulation\n- From angiotensinogen\n- Globulin present in plasma\na. stimulate release of aldosterone\nb. Causes vasoconstriction\nc. degraded to angiotensin III which has\nsimilar functions\nNB: If perfusion fails to improve, this cycle will operate continuously further exacerbating the\nedema resulting in anasarca.\nReduced Cardiac Output\nRenal hypoperfusion\nRelease of arginin\nvasopressin Sympathetic nervous system\nRennin release\nSalt and water\nCleavage of\nangiotensin I angiotensin II\n\n\nThis ends our discussion of the first two factors (listed near the beginning of this chapter)\nwhich determine edema formation. We will now go on to discuss the other factors.\n\n2) Vascular permeability:\n\nIncreased vascular permeability usually occurs due to acute inflammation. In inflammation,\nchemical mediators are produced. Some of these mediators (See the chapter on\ninflammation) cause increased vascular permeability which leads to loss of fluid & high\nmolecular weight albumin and globulin into the interstitium. Such edema (i.e. that caused by\nincreased vascular permeability) is called inflammatory edema. Inflammatory edema differs\nfrom non-inflammatory edema by the following features\n\na) Inflammatory edema (exudate)\n\nDue to inflammation-induced increased permeability and leakage of plasma\nForms an exudate [protein rich]\nSpecific gravity > 1.012\n\nb) Non-inflammatory oedema (transudate)\n\nA type of edema occurring in hemodynamic derangement (i.e. increased plasma\nhydrostatic pressure & decreased plasma oncotic pressure. See above)\nFormed transudate [protein poor]\nSpecific gravity < 1.012\n\n3) Lymphatic channels:\n\nAlso important is the lymphatic system which returns to the circulation the small amount\nof proteinaceous fluid that does leak from the blood into the interstial spaces. Therefore,\nobstruction of lymphatic channels due to various causes leads to the accumulation of the\nproteinaceous fluid normally drained by the lymphatic channels. Such kind of edema is\ncalled lymphatic edema.\n\nLymphatic edema occurs in the following conditions:\n\n1) Parasitic infection. E.g filariasis which causes massive lymphatic and inguinal\n2) Lymphatic obstruction secondary to neoplastic infiltration. E.g. breast cancer\n3) post surgical or post irradiation, i.e surgical resection of lymphatic channels or\nscarring after irradiation\n\n4) Sodium and water retention:\n\nSodium & subsequently water retention occurs in various clinical conditions such as\ncongetive heart failure (See Fig.5.2, above) & renal failure. In these conditions, the retained\nsodium & water result in increased capillary hydrostatic pressure which leads to the edema\nseen in these diseases.\n\nMorphology of edema\n- Manifests only as subtle cell swelling. Clearing & separation of extracellular matrix.\n\nIV. Hypermia and Congestion\n\nDefinition: Both of them can be defined as a local increase in volume of blood in a\nparticular tissue.\n\n- is an active process resulting from an increased inflow of blood into a tissue because\nof arteriolar vasodilation.\n- commonly occurs in exercising skeletal muscle or acute inflammation.\n- Affected tissue becomes red as there is engorgement with oxygenated blood.\n\n\n- is a passive process resulting from impaired outflow of blood from a tissue.\n- occurs systemically as in cardiac failure or locally as in isolated venous obstruction.\n- Affected tissue appears blue-red due to accumulation of deoxygenated blood.\n\n- In long-standing congestion (also called chronic passive congestion states), poorly\noxygenated blood causes hypoxia results in parenchyma cell degeneration or\ncell death.\n\na) Pulmonary congestion\n\nCut surface: hemorrhagic & wet.\n\n1. Acute pulmonary congestion:\nAlveolar capillaries engorged with blood\nSeptal edema\n\n2. Chronic pulmonary congestion:\n- Thickened & fibrotic septa\n- Alveolar spaces contain hemosiderin-laden macrophages resulting in an\nappearance termed brown indurations.\n- Can result in pulmonary hypertension.\n\nb) Hepatic congestion\n\n1) Acute hepatic congestion:\n- Central vein & sinusoids are distended\n- There may be even central hepatocyte degeneration.\n- Peripheral hepatocytes better oxygenated & develop only fatty changes.\n\n2) Chronic passive congestion of liver:\n- Central lobules grossly depressed because of loss of cells & appear red brown\n(nutmeg liver).\n- Hemosiderin laden macrophages\n- In longstanding hepatic congestion, commonly associated with cardiac failure,\nthere is a grossly evident hepatic fibrosis called cardiac cirrhosis\n\nV. Haemorrhage\n\nHemorrhage is extravasation of blood outside the blood vessel.\n\n\nPhysical trauma Stabbing\n- Stick injury\n- Gunshot\n- Motor vehicle accident\n\nInadequacies in blood clotting which can be due to:\n\nA. Too few or poorly functioning platelets (i.e. qualitative & quantitative defect of\nB. Missing or low amount of clotting factors\nE.g. Low levels of prothrombin, fibrinogen & other precursors.\nInadequate vitamin K leads to clotting factor deficiency because this vitamin is\nimportant in the synthesis of the clotting factors by the liver.\n\n\n1) Haemorrhage enclosed within a tissue or a cavity is knownas hematoma.\n2) Minute 1-2 mm hemorrhages occurring in the skin, mucosal membrane, or serosal\nsurface are called petechiae.\n3) Slightly > 3mm hemorrhage occurring in the skin is referred to as purpura.\n4) Larger than 1-2cm subcutaneous hematoma is called eccymosis (bruises). It is typical\nafter trauma.\n\nEffects of haemorrhage: depend on the rate and amount of blood loss:\n\nIf > 20% the total blood volume is rapidly lost from the body, it may lead to\nhypovolumic shock & death.\nChronic loss of blood leads to anaemia.\n\nVI. Hemostasis and Blood Coagulation\n\n\nDefinition: Hemostasis is the maintainence of the clot-free state of blood & the prevention of\nblood loss via the formation of hemostatic plug.\nHemostasis depends on three general components:\na) Vascular wall\nb) Platelets\nc) Coagulation pathways\n\nWhenever a vessel is ruptured or severed, hemostasis is achieved by several mechanisms:\n\nA. Vascular spasm\nB. Formation of platelet plug\nC. Formation blood clot as a result of blood coagulation\nD. Eventual growth of fibrous tissue in to the blood clot to close the hole in the vessel\n\nRemark: The student is advised to revise his physiology lecture note on the above topics.\n\nVII. Thrombosis\n\nUnder this topic, we will discuss the definition, pathogenesis, morphology, fates, &\nclinical significance of thrombi, in this order.\n\nDefinition: Thrombosis is defined as the formation of a solid or semisolid mass from the\nconstituents of the blood within the vascular system during life.\n\nThere are three factors that predispose to thrombus formation. These factors are\ncalled Virchows triad:\nA: Endothelial injury\nB: Stasis or turbulence of blood flow\nC: Blood hypercoagulability\n\nA: Endothelial injury\n\nIt is the most important factor in thrombus formation and by itself can lead to\nEndothelial injury is particularly important in thrombus formation in the heart &\narterial circulation.\nSome Examples:\nEndocardial injury during myocardial infarction & eosinophilic endocarditis in\nwhich eosiophils release from their granules crystals called Charcot Leyden\ndamaging the endocardial endothelium.\nInjury over ulcerated plaque in severely atherosclerotic arteries.\nIn hemodynamic stress like severe hypertension & turbulence of flow over\nscarred valves directly damaging the endothelium.\nBacterial endtoxin & hyperchloestrolemia, radiation & cigarette smoking may be\nsources of endothelial injury.\nIrrespective of endothelial damage, the final event is exposure of the highly\nthrombogenic subendothelial extracellular matrix, mainly collagen & tissue factors up\non which platelets undergo adherence & contact activation.\n\nB: Turbulence or Stasis (Alterations in normal blood flow)\n\nUnder physiologic conditions normal blood flow is laminar, that is, the cellular elements flow\ncentrally in the vessel lumen separated from endothelium by slowing moving clear zone of\nplasma. Stasis & turbulence therefore:\n\na. Disrupt the laminar flow and bring platelets in to contact with the endothelium\nb. Prevent dilution of activated clotting factors by freshly flowing blood\nc. Retard or make a time lag in the inflow of clotting factor inhibitors and permit the build\nup of thrombi.\nd. Turbulence causes reduction in endothelial PGI\nand tissue-type plasminogen\nactivator (t-PA) which has fibrinolytic activity causing endothelial cell activation. ???\nStasis is a major factor in the development of venous thrombi while turbulence\ncontributes to arterial & cardiac thrombosis by causing direct endothelial injury or by\nforming countercurrents & local pockets of stasis.\n\n\na) Ulcerated atherosclerotic plaque, which forms a sort of irregularity on endothelial\nsurface, not only exposes subendothelial extracellular matrix but are also\nsources of local turbulence.\nb) Aneurysms are favoured sites of stasis\nc) Myocardial infarction not only has endothelial injury but also has a region of\nnoncontractile myocardium, creating an area of stasis resulting in mural\nthrombus formation.\nd) Mitral valve stenosis after chronic rheumatic fever may result in left atrial dilation,\nusually associated with arterial fibrillation. A dilated left atrium is a site of stasis &\na prime location of thrombus development.\ne) Hypervisicosity syndrome, i.e an increase in hematocrit in excessive amount due\nto various reasons such as polycythemia causes stasis in small vessels.\n\nC: Hypercoagulablity\n\nDefinition: Hypercoagulability is any alteration of the coagulation pathway that predisposes\nto thrombosis. Hypercoagulability is a less common cause of thrombosis & & it can be\ndivided into:\n\n1. Primary (Genetic)\n\nMutations in factor V[Lieden factor]\nAnti thrombin III deficiency\nProtein C or S deficiency\n\n2. Secondary (Acquired) which, in turn, can be categorized into:\n\nA: High-risk for hypercoagulablity\nprolonged bed rest or immobilization\nMyocardial infarction\nTissue damage (surgery, fracture, burns)\nancers (Cancers release procoagulant tissue products to cause thrombosis)\nProsthetic cardiac valves\nDisseminated intra vascular coagulation\n\nB: Low risk factor for hypercoagulablity\n\nA trial fibrillation\nNephrotic syndrome\nOral contraceptives\nHyperestrogenic state eg. Pregnancy.\n\nMorphology of Thrombi\n\nThrombi may develop any where in the cardiovascular system.\nAccording to their location, thrombi can be divided into venous & arterial thrombi.\n(Cardiac thrombi can be considered as arterial thrombi because of certain similarities\nbetween the two). The differences between arterial & venous thrombi are:\n\nArterial thrombi Venous thrombi\na) Arise at the site of endothelial injury a) Arise at area of stasis\nb) Grow in a retrograde fasion, against b) Grow in the direction of blood flow from its\nsite of attachment.flow towards the heart\nc) Has firm attachment c) Has loose attachment, hence, propagating\nd) They usually occlude the blood flow tail may undergo fragmentation.\nd) Almost invariably occlusive\n\nThe most common site of arterial thrombi in descending order are:\n\no Coronary arteries\no Cerebral arteries\no Temporal arteries\n\nDamaged valves can be infected by bacteria or fungi (infective endocarditis) which leads\nto the development of small infected thrombi on the valves. These small infected thrombi\n(vegetations) can further damage the valve.\n\nFates of a thrombus\n\nA thrombus can have one of the following fates:\n\nA: Propagation:\n\nThe thrombus may accumulate more platelets and fibrin & propagate to cause vessel\n\nB: Embolization:\n\nThe thrombus may dislodge and travel to other sites in the vasculature. Such a traveling\nthrombus is called an embolus. An embolus may obstruct a vessel. The obstruction leads to\nthe death of the tissue supplied by the blood vessel. Death of a tissue due to a decreased\nblood supply or drainage is called infarction. Therefore, an embolus can eventually lead to\nan infarction of an organ. E.g cerebral infarction can be caused by a thromboembolus.\nWe will discuss embolism & infarction shortly (See p. ).\n\nC: Dissolution:\n\nThe thrombus may be removed by fibrinolytic activity.\n\nD: Organization and recanalization\n\nOrganization refers to the ingrowth of endothelial cells, smooth muscle cells, and fibroblasts\ninto the fibrin-rich thrombus. Organization is accompanied by the formation of capillary\nchannels across the thrombus, re-establishing lumen continuity to some extent. This is\nknown as recanalization. The recanalization eventually converts the thrombus into a\nvasscularized mass of tissue which is later on incorporated as a subendothelial swelling of\nthe vessel wall.\n\nClinical significance of thrombi\n\nThrombi are significant clinically because:\n- They cause obstruction of arteries and veins &\n- They are possible source of emboli.\n\nWe will discuss the clinical effects of venous & arterial thrombi separately.\n\nA. Venous Thrombosis (Phlebothrombosis)\n\nVenous thrombosis affects veins of the lower extremity in 90% of cases. It can be divided\ninto superficial & deep vein thrombosis:\n\n1. Superficial venous thrombosis\n\n- Usually occurs in saphenous venous system, particularly when there are varicosities.\n- Rarely embolizes\n- Causes local edema, pain, and tenderness (i.e. it is symptomatic)\n- Local edema due to impaired venous drainage predisposes the involved overlying skin\nto infection after slight trauma leading to a condition known as varicose ulcer.\n\n2. Deep venous thrombosis (DVT)\n\n- May embolize, hence, is more serious.\n- Usually starts in deep veins within the calf muscles.\n- Although they may cause local pain & edema, unlike superficial veinous thrombosis,\nthey are entirely asymptomatic in approximately 50% of patients. This is because\ndeep venous obstruction is rapidly offset or releaved by collateral bypass channels.\n- Has higher incidence in middle aged & elderly people due to increased platelet\naggregation & reduced PGI\nproduction by the endothelium.\n- Has the following predisposing factors:\n\n1. Trauma, surgery, burns which usually result in:-\n\na:Reduced physical activity leading to stasis\nb:Injury to vessels\nc:Release of procagulant substance from the tissue\nd:Reduced t-PA activity (fibrinolysis)\n\n2. Pregnancy & puerperal states increase coagulation factors & reduce the synthesis of\nantithrombotic substances. Myocardial infarction & heart failure cause venous stasis to\nthe left side.\n\n3. Malnutrition, debilitating conditions and wasting diseases such as cancer. DVT due to\nthese conditions is known as marantic thrombosis.\n\n4. Inflammation of veins (thrombophlebitis) also predisposes to thrombosis.\n\n5. Migratory thrombophlebitis is a condition that affects various veins throughout the body\n& is usually of obscure aetiology, but sometimes it is associated with cancer, particularly\npancreatic cancer. Migratory thrombophlebitis is also known as Trosseau syndrome.\n\nB. Arterial Thrombosis\n- The rapid flow of arterial blood prevents the occurrence of thrombosis unless the\nvessel wall is abnormal.\n- In western society atheroma is by far the commonest predisposing lesion for arterial\nthrombosis. Atheromatous plaques produce turbulence and may ulcerate & cause\nendothelial injury, both of which can lead to thrombosis. These thrombi may narrow\nor occlude the lumen of arteries such as the coronary and cerebral arteries.\nOcclusion of these arteries will lead to myocardial infarction (MI) & cerebral infarction\n- Cardiac thrombi can be caused by infective endocarditis, atrial fibrillation,&\nmyocardial infarcion.\n- Cardiac thrombosis is common on the heart valves & in the auricular appendages\n(especially, of the right atrium). A thrombus develops in the atrium in patients with\natrial fibrillation & dilatation superimposed on mitral stenosis.\n- Myocardial infarction causes dyskinetic myocardial contraction & damage to the\nendocardium, which usually result in mural thrombi in the ventricles.\n- Apart from obstructive features, arterial thrombi (especially, cardiac mural thromi)\nmay embolize to any tissue, but, particularly, commonly to the brain, kidney, &\nspleen because of large volume of blood flow to these organs.\n\nVIII. Embolism\n\n\nAn embolus is a detached intravascular solid, liquid or gaseous mass that is carried by\nblood to sites distant from its point of origin. After traveling via the blood, the embolus can\nobstruct a vessel.\n\nCauses of embolism:\n\nAn embolus can arise from:\no Thrombus (99% of emboli arise from a thrombus. Such an embolus is called\no Platelets aggregates\no Fragment of material from ulcerating atheromatous plaque\no Fragment of a tumour\no Fat globules\no Bubbles of air\no Amniotic fluid\no Infected foreign material\no Bits of bone marrow\no Others.\n\nUnless otherwise specified, the term embolism should be considered to mean\nthromboembolism. This is because thromboembolism is the commonest form of embolism.\nNext, we will discuss it in more detail.\n\n\nBased on its sites of origin & impaction, thromboembolism can be divided into:\n\na) Pulmonary thromboembolism (PTE)\no PTE is refers to the impaction of an embolus in the pulumonary arteries & their\nbranches. Such an embolus is derived from a thrombus in the systemic veins or the\nright side of the heart.\n\n\nb) Systemic thromboembolism\no Systemic emboli arise from the left side of the heart or from thrombi & atheromatous\ndebris in large arteries. And they impact in the systemic arteries.\n\nc) Crossed embolism (Paradoxical embolism)\no This occurs in the presence of patent foremen ovale when an embolus is transferred\nfrom the right to the left side of the heart, then into the systemic circulation.\n\nNow, we will elaborate the first two.\n\na) Pulmonary thrombeomblism (PTE)\n95% of PTE arise from thromi in the deep leg veins. The thromboembolus will travel long\nwith the venous return & reach the right side of the heart. From there, it will go into the\npulmonary trunk & pulmonary arteries. Depending on the size of the embolus and on the\nstate of pulumonary circulation, the pulmonary embolism can have the following effects:\n\n1. If the thrombus is large, it may block the outflow tract of the right ventricle or the\nbifurcation of the main pulumonary trunk (saddle embolus) or both of its branches,\ncausing sudden death by circulatory arrest. Sudden death, right side heart failure\n(cor pulmonale), or cardiovascular collapse occurs when 60% or more of the\npulumonary circulation is obstructed with emboli.\n2. If the embolus is very small (as in 60-80% of the cases), the pulmonary emboli will\nbe clinically silent. Embolic obstruction of medium sized arteries manifests as\npulmonary haemorrhage but usually does not cause infarction because of dual blood\ninflow to the area from the bronchial circulation.\n3. If the cardiorespiratory condition of the patient is poor (i.e., if the patient previously\nhad cardiac or pulmonary disease), then obstruction of a medium sized pulmonary\nartery by a medium-sized embolus can lead to pulmonary infarction.\n4. Recurrent thromboembolism can lead to pulmonary hypertension in the long run.\nA patient who has had one pulmonary embolus is at high risk of having more.\n\nb) Systemic thromboembolism\nSystemic thromboembolism refers to emboli travelling within arterial circulation &\nimpacting in the systemic arteries.\n\nMost systemic emboli (80%) arise from intracardiac mural thrombi. In turn, two\nthirds of intracardiac mural thrombi are associated with left ventricular wall infarcts\nand another quarter with dilated left atria secondary to rheumatic valvular heart\nThe remaining (20%) of systemic emboli arise from aortic aneurysm, thrombi on\nulcerated athrosclerotic plaques, or fragmentation of valvular vegetation.\nUnlike venous emboli, which tend to lodge primarily in one vascular bed (the lung),\narterial emboli can travel to a wide variety of sites. The major sites for arteriolar\nembolization are the lower extremities (75%) & the brain (10%), with the rest\nlodging in the intestines, kidney, & spleen. The emboli may obstruct the arterial\nblood flow to the tissue distal to the site of the obstruction. This obstruction may\nlead to infarction. The infarctions, in turn, will lead to different clinical features\nwhich vary according to the organ involved.\n\nNext, we will briefly touch upon some rare forms of embolism.\n\nFat Embolism\n\nFat embolism usually follows fracture of bones and other type of tissue injury. After the\ninjury, globules of fat frequently enter the circulation. Although traumatic fat embolisms\noccur usually it is as symptomatic in most cases and fat is removed. But in some severe\ninjuries the fat emboli may cause occlusion of pulmonary or cerebral microvasculature and\nfat embolism syndrome may result. Fat embolism syndrome typically begins 1 to 3 days\nafter injury during which the raised tissue pressure caused by swelling of damaged tissue\nforces fat into marrow sinsosoid & veins. The features of this syndrome are a sudden onset\nof dyspnea, blood stained sputum, taccycardia, mental confusion with neurologic symptoms\nincluding irritability & restlessness, sometimes progress to delirium & coma.\n\n5. Air embolism\n\nGas bubbles within the circulation can obstruct vascular flow and cause distal ischemic\ninjury almost as readily as thrombotic masses. Air may enter the circulation during:\nObstetric procedures\nChest wall injury\nIn deep see divers & under water construction workers.\nIn individuals in unpressurized aircraft\n\nNeck wounds penetrating the large veins\nCardio thoracic surgery.\nArterial catheterisation& intravenous infusion.\n\nGenerally, in excesses of 100cc is required to have a clinical effect and 300cc or more may\nbe fatal. The bubbles act like physical obstructions and may coalesce to form a frothy mass\nsufficiently large to occlude major vessels.\n\nAmniotic fluid embolism\n\nIt is a grave but un common, unpredictable complication of labour which may complicate\nvaginal delivery, caesarean delivery and abortions. It had mortality rate over 80%. The\namniotic fluid containing fetal material enters via the placental bed & the ruptured uterine\nveins. The onset is characterized by sudden severe dyspnea, cyanosis, hypotensive shock\nfollowed by seizure & coma of the labouring mother. If the patient survives the initial crisis,\npulmonary oedema typically develops & 50% of the cases will develop DIC due to activation\nof the coagulation cascade by fetal material.\nAs discussed in this & the previous subtopics, the potential consequence of thromboembolic\nevents is ischemic necrosis of distal tissue, known as infarction. Therefore, it is appropriate\nto discusss it next.\n\nIX. Infarction\n\nDefinition: An infract is an area of ischemic necrosis caused by occlusion of either the\narterial supply or venous drainage in a particular tissue.\n\nNearly 99% of all infarcts result from thrombotic or embolic events. Other mechanisms\ninclude [almost all of them are arterial in origin]:\nLocal vasospasm\nExpansion of atheroma due to hemorrage in to athermotous plaque.\nExternal compression of the vessels. e.g trauma\nEntrapment of vessels at hernial sacks etc.\n\n\nThe development & the size of an infarct are determined by the following factors:\n\nA. The nature of the vascular supply\nB. The rate of development of occlusion\nC. Suceptibility of the tissue for hypoxia\nD. Oxygen content of the blood\nE. The severity & duration of ischemia\n\nA. The nature of vascular supply\n\nThe following organs have a dual blood supply.\n\nLung pulumonary artery\nBronchial artery\nLiver hepatic artery\nPortal vein\nHand & forearm\nRadial arteries\nUlnar arteries.\n\nThe effect of such a dual blood supply is that if there is obsrtuction of one of the arterial\nsupplies, the other one may offset the rapid occurrence of infarction in these organs unlike\nthe renal & splenic circulations which have end arterial supply.\n\nInfarction caused by venous thrombosis is more likely to occur in organs with single venous\noutflow channels, such as testis &ovary.\n\nB: Rate of development occlusion\n\nSlowly developing occlusions are less likely to cause infraction since they provide time for\nthe development of collaterals.\n\nC: Tissue suceptibility to hypoxia:\n\nThe susceptibility of a tissue to hypoxia influences the likelihood of infarction. Neurons\nundergo irreversible damage when deprived of their blood supply for only 3 to 4 minutes.\nMyocardial cells die after 20-30 minutes of ischemia. Fibroblasts are more resistant,\nespecially those in the myocardium.\n\nD: Oxygen content of blood\n\nPartial obstruction of the flow of blood in an anaemic or cyanotic patient may lead to tissue\n\nE: The severity & duration of ischemia.\n\nTypes of infarcts\n\nInfarcts are classified depening on:\n\nA) the basis of their colour (reflecting the amount of haemorrhage) into:\n\n1. Hemorrhagic (Red) infarcts\n2. Anemic (White) infarcts\n\nB) the presence or absence of microbial infection into:\n1. Septic infarcts\n2. Bland infarcts\n\n1. Red infarcts occur in:\n\na) Venous occlusions as in ovarian torsion\nb) Loose tissues such as the lung which allow blood to collect in infarct zone.\nc) Tissues with dual circulations (eg. the lung), permitting flow of blood from unobstructed\nvessel in to necrotic zone.\nd) In tissues that were previously congested because of sluggish outflow of blood.\ne) When blood flow is reestablished to a site of previous arterial occlusion & necrosis.\n\n2. White infarcts occur in:\n\na) Arterial occlusion in organs with a single arterial blood supply.\nb) Solid organs such as the heart, spleen, & kidney, where the solidity of the tissue limits\nthe amount of hemorrage that can percolate or seep in to the area of ischemic necrosis\nfrom the nearby capillaries.\n\nMorphology of infarcts\n\nGross: All infarcts are wedge-shaped with the occluded vessel at the apex and the\nperiphery of the organ forming the base of the wedge. THe infarction will induce\ninflammation in the tissue surrounding the area of infarction. Following inflammation, some\nof the infarcts may show recovery, however, most are ultimately replaced with scars except\nin the brain.\n\n\nThe dominant histologic feature of infarction is ischemic coagulative necrosis. The brain is\nan exception to this generalization, where liquifactive necrosis is common.\n\nClinical examples of infarction:\n\nA. Myocardial infarction\n\nUsually results from occlusive thrombosis supervening on ulcerating atheroma of a\nmajor coronary artery.\nIs a white infarct.\nCan cause sudden death, cardiac failure, etc...\n\nB. Cerebral infarcts\n\nMay appear as pale or hemorrhagic\nA fatal increase in intracranial pressure may occur due to swelling of large cerebral\ninfarction, as recent infarcts are raised above the surface since hypoxic cells lack\nthe ability to maintain ionic gradients & they absorb water & swell.\nIs one type of cerebrovascular accidents (CVA) or stroke which has various clinical\n\n\nC. Lung infarcts\n\nAre typically dark red & conical (wedge-shaped).\nCan cause chest pain, hemoptysis, etc\n\nD. Splenic infarcts\n\n- Conical & sub capsular\n- Initially dark red later turned to be pale.\n\nX. Disseminated Intravascular Coagulation (DIC)\n\nDefinition: -DIC is an acute, or chronic thrombohemorrhagic disorder occurring as a result\nof progressive activation of coagulation pathway beyond physiologic set point secondary to\na variety of diseases resulting in failure of all components of hemostasis. Hence the other\nterm for DIC is consumption coagoulopathy.\n\nEtiology andPathogensis\n\nAt the outset, it must be emphasize that DIC is not a primary disease. It is a coagulopathy\nthat occurs in the course of variety of clinical conditions. DIC follows massive or prolonged\nrelease of soluble tissue factors & /or endothelial-derived thromboplastin into the circulation\nwith generalized (pathologic) activation of coagulation system.\nTherefore, DIC results from pathologic activation of the extrinsic &/or intrinsic pathways of\ncoagulation or impairment of clot inhibiting influences by different causes. Two major\nmechanisms activating the coagulation pathway to cause DIC are: (1) release of tissue\nfactor or thromboplastic substance into the circulation (2) widespread injury to the\nendothelial cells.\n\n1. Tissue thromboplastin substance may be derived from a variety of sources such as:\nA: Massive trauma, severe burns & extensive surgery. The major mechanism of DIC is\nbelieved to be autoinfusion of thromboplastin from the tissues.\nB: Obstetric conditions in which thromboplastin derived from the placenta, dead\nretained fetus, or amniotic fluid may enter the circulation. .\n\nC: Cancers such as acute promyelocytic leukaemia, adenocarcinoma of the lung in\nwhich a variety of thromboplastin substances like mucus are released which directly\nactivate factor X, VII, & proteolytic enzymes.\nD: Gram negative sepsis (an important cause of DIC) in which bacterial endoxins\ncause increased synthesis, membrane exposure, & release of tissue factor from\nmonocytes. Furthermore, activated monocysts release intereukin-1 (IL-I), TNF-,\nboth of which:\n\nIncrease expression of tissue factor in endothelial membrane.\nDecrease expression of thrombmodulin which is a potent activator of protein C-\nan anti coagulant\nTNF-, an extremely important mediator of septic shock, in addition to the above,\nup regulates the expression of adhesion molecules on endothelial cells and\nfavours adhesion of leukocytes, with subsequent damage of endothelial cells by\nfree radicals & preformed proteases.\n\n2. Endothelial injury: Widespread endothelial injury may result from:\n- Deposition of antigen-antibody complexes as it occurs in systemic lupus\n- Extreme temperature eg. Heat stroke, burns\n- Hypoxia, acidosis, shock\n\nClinical Course\n\nThe consequences of DIC are two fold. First, there is a widespread deposition of fibrin within\nthe microcirculation. This may lead to ischemia of the more severely affected or more\nvulnerable organs and hemolytic anemia resulting from fragmentation of led cells as they\nsqueeze through the narrowed microvasculature (Microangiopathic haemolytic anaemia).\nSecond, a hemorrhagic diathesis may dominate the clinical picture because of consumption\nof the coagulation factors and increased fibrinolysis.\nThe onset may be fulminant when caused by endotoxic shock or amniotic fluid embolism or\nit may be chronic in the case of carcinomatosis or retention of dead fetus. The clinical\npresentation varies with stage & severity of the syndrome. Overall 50% of patients with DIC\nare obstetric patients & about 33% of patients have carcinomatosis.\nClinically, patients with DIC may present with extensive skin & mucus membrane bleeding\nand haemorrhage from multiple sites, usually from surgical incision, vein punctures, or\n\ncatheter sites. Respiratory symptoms such as dyspnea, cyanosis may occur. They may\npresent with convulsion & coma in the case of CNS bleeding or with acute renal failure with\noliguria. Less often, they may present with acrocyanosis, pre-gangrenous changes in the\ndigits, genitalia, & nose areas where blood flow may be markedly decreased. Circulatory\nfailure may appear suddenly & may be progressing. The presentations of acute DIC, as it\noccurs in case of trauma or obstetric conditions, is dominated by bleeding diathesis.\nLaboratory manifestations include thrombocytopenia secondary to platelets aggregation in\nthe thrombus, schistocytes or fragmented RBCs, prolonged PT, PTT, thrombin time &\nreduced fibrinogen from depleted coagulation proteins. There is also increased fibrin\ndegradation product (FDP) from intense fibrinolysis. The cardinal manifestation of DIC,\nwhich correlates most closely with bleeding is plasma fibrinogen level, i.e. low fibrinogen\nmeans increased tendency of bleeding.\n\n\n- Placental abruption\n- septic abortion\n- retained dead fetus\n- toxemia of pregenancy\n- amniotic fluid embolism\n\nRelease of tissue\nFactor platelets\n\nActivation of\n\nMicroangiopathic vascular\nHaemolytic anemia occlusion\n\nSplit product\n\nInhibition of thrombin\nPlatelets aggregation\nFibrin polymerisation\n\nFig. 5.3 Patholphysiology of DIC\n\nMassive tissue\nWidespread micro\nvascular thrombosis\nIschemic tissue\nof coagulation\nObstetric conditions\nProteolysis of\nClotting factors\n\nXI. Shock\n\nDefinition: Shock is a state in which there is failure of the circulatory system to maintain\nadequate cellular perfusion resulting in widespread reduction in delivery of oxygen & other\nnutrients to tissues. In shock, the mean arterial pressure is less than 60 mmHg or the\nsystolic blood pressure is less than 90 mmHg.\n\nRegardless of the underlying pathology, shock constitutes systemic hypoperfusion\ndue to reduction either in cardiac out put or in the effective circulating blood volume.\nThe end results are hypotension followed by impaired tissue perfusion and cellular\nAdequate organ perfusion depends on arterial blood pressure (BP) which, in turn,\ndepends on:\n1. Cardiac output (CO)\n2. Peripheral vascular resistance (PVR)\n\nCO = stroke volume X heart rate\nIn turn, stroke volume depends on:\na) Preload i.e. blood volume,\nb) Afterload i.e. arterial resistance, &\nc) Myocardial contractility.\n\nTherefore, shock (i.e. widespread decreased perfusion of tissues) occurs when the\npreload (i.e. the blood volume) is decreased, or when the afterload (the peripheral\nvascular resistance) is decreased, or when the myocardium fails to contract. These\nbasic mechanisms of shock are used to classify it. Next, we will look at the\nclassification of shock.\n\nClassification of shock\n\nShock can be divided into:\n\nA. Hypovolemic shock\nB. Cardiogenic shock\nC. Distributive shock\n\nA. Hypovolemic shock\n\nDefinition: This is shock caused by reduced blood volume. Reduction in circulating blood\nvolume results in the reduction of the preload which leads to inadequate left ventricular\nfilling, reflected as decreased left & right ventricular end diastolic volume and pressure. The\nreduced preload culminates in decreased cardiac out put which leads to widespread tissue\nperfusion (shock).\n\nCauses of hypovolumic shock include:\n\na) Haemorrhage\nb) Diarrhoea & vomiting\nc) Burns\nd) Trauma\ne) etc\n\nThe effect of haemorrhage depends on the rate and amount of blood loss. Hypovolumic\nshock is the most common type of shock in clinical medicine .A normal healthy adult can\nlose 550ml (10%of blood volume) without significant symptoms.\nBut loss of 25% or more of the blood volume (N=1250ml) results in significant hypovolemia.\nB. Cardiogenic shock\n\nDefinition: This is shock that results from severe depression of cardiac performance. It\nprimarily results from pump failure [myocardial failure].\n\nCardiogenic shock is hemodynamically defined as:\n\no DBP<60mm Hg\no Left ventricle filling pressure > 18mm Hg\no Cardiac index< 1.8 l/min/m\n\no Usually pulmonary oedema coexists.\n\nCauses of cardiogenic shock can be divided into:\n\nA. Myopathic\nB. Mechanical\n\nA) Myopathic causes of cardiogenic shock include:\n1. Acute myocardial infraction. Usually shock occurs in this conditioin if 40% of the left\nventricular mass & more on the right ventricle is involved by infarction.\n2. Mycocarditis\n3. Dilated cardiomyopathy/hypertrophic cardiomyopathy\n4. Myocardial depression in septic shock\n5. Etc.\n\nB) Mechanical\ni) Intracardiac\na) Left ventricle outflow obstruction E.g.Aortic stenosis, hypertrophic cardiomyopathy\nb) Reduction in forward cardiac output E.g. Aortic or mitral regurgitation\nc) Arrhythmia\n\nii) Extracardiac\nThis can be called obstructive shock. The extracardiac causes of cardiogenic shock can be\ncaused by:\na) Pericardial tamponade (gross fluid accumulation in the pericardial space) results in a\ndecreased ventricular diastolic filling CO\nb) Tension pneumothorax (gas accumulation in pleural space)\nThis decreases the venous return by creating a positive pressure.\nc) Acute massive pulumonary embolism occupying 50-60% of pulumonary vascular bed.\nd) Severe pulumonary hypertension (1\npulmonary hypertension).\n\nC. Distributive shock\nDefinition: Distributive shock refers to a group of shock subtypes caused by profound\nperipheral vasodilatation despite normal or high cardiac output.\n\nCauses of distributive shock\n1) Septic shock the commonest among the group & clinically very important.\n2) Neurogenic shock\n\n- Usually occurs in the setting of anaesthetic procedure [cephalo-caudal migration of\nanaesthetic agent] or spinal cord injury owing to loss of vascular tone & peripheral\npooling of blood.\n3) Anaphylactic shock\n- Initiated by generalized IgE mediated hypersensitivity response, associated with\nsystemic vasodilatation & increased vascular permeability.\n4) Endocrine shock\n- This is a type of shock that typically occurs in adrenal insufficiency.\n\nNext, we will discuss septic shock in some detail. But before discussing septic shock in\ndetail it would be useful to know some aspects of sepsis briefly. Bactermia is the presence\nof viable bacteria in the blood as evidenced by blood culture. Septicemia is systemic\ninfection due the presence of microbes and their toxin the blood. Sepsis is a systemic\nresponse to severe infection mediated via macrophage-derived cytokines that target end\norgan receptors in response to infection. It is also called SIRS.\n\nSeptic shock\n\nDefinition: This is a kind of shock caused by systemic microbial infection, most commonly\nby gram negative infection (endotoxic shock) but can also occur with gram positive or\nfungal infections.\nIt can be defined as sepsis with\n1. Hypotention, arterial blood pressure less than 90mmHg or 40mmHg less than the\npatients normal blood pressure,\n2. Organ dysfunction, &\n3. Unresponsiveness to fluid administration.\n\nPathogenesis of septic shock:\n\nSeptic shock has a mortality rate of over 50% ranking the first among the causes of death in\nintensive care units. It results from the spread & expansion of an initially localized infection\nlike pneumonia into the blood stream.\n\nMost causes of septic shock (~70%) are caused by endotoxin-producing gram-negative\nbacilli, hence the term endotoxic shock. Endotoxins are bacterial wall lipopolyschardes\n(LPS) released when cell walls are degraded. Analogues molecules in the walls of gram-\npositive bacteria & fungi can also elicit septic shock. LPS bind with CD14 molecule on\nleucocytes, especially monocytes & macrophages, endothelial cells & others. Depending on\nthe dosage of LPS protein complex, initiation of a cascade of cytokine-mediated events\ntake place.\n\nThe mononuclear phagocytes respond to LPS by producing TNF which, in turn, induces IL\n1 synthesis. TNF & IL-1 both act on endothelial cells to produce further cytokines like IL-6,\nIL-8, & secondary effectors like NO & PAF (platelet aggregating factor).\nHigh levels of the above molecules or mediators (TNF-, IL-1, etc) cause septic\nshock by acting on:\n\nThe heart causing decreased myocardial contractility which results in low cardiac\nBlood vessel causing systemic vasodilation which decreases the peripheral arteries.\nThe mediators also cause widespread endothelial injury & activation of the coagulation\nsystem resulting in DIC, &\nLung causing alveolar capillary damage resulting in adult respiratory distress syndrome\n\nStages of shock\nUncorrected shock passes through 3 important stages:\n1) An initial nonprogressive phase\no It is also called a period of early compensatory period, during which compensatory\nmechanisms are activated & perfusion of vital organs maintained.\no A variety of neurohumoral mechanisms operate:\ni) A decrease in cardiac output will stimulate peripheral & central baro receptors with\nsubsequent intense sympatho-adrenal stimulation. This sometimes leads to up to\n200 fold increase in plasma catecholamine level. The net effect is Tachycardia,\nHR CO Peripheral vasoconstriction BP. This is a major\nautocompensatory response.\nii) The fall in renal perfusion stimulates the renin aldosterone secretion mechanism\nrenal conservation of fluid.\n\n2. Progressive stage (Established shock)\nThis is characterized by tissue hypoperfusion with onset of worsening circulatory &\nmetabolic imbalances including acidosis.\nThere is a widespread tissue hypoxia.\nAnaerobic gycolysis results in excessive lactic acid production. The lactic acid reduces\ntissue PH & blunts vasomotor response. The hypoxic cells leak glucose leading to\ninsulin-resistant hyperglycaemia and increased glycogenolysis. Impaired carbohydrate\nmetabolism causes a fall in production of ATP, failure in function of Na\n- K\nresult in Na & water enterance into the cell, causing cellular swelling also called sick cell\nsyndrome. Anoxic injury to endothelial cells results in DIC.\n\n3. An irreversible stage\nA sage at which, even if hemodynamic disorders are corrected survival is not\nTransition to irreversible damage is mediated via various mechanisms.\n\nMorphology of septic shock:\nAll organs are affected in severe shock. In shock, there is widespread tissue\nhypoperfusion involving various organs such as the heart, brain, & kidney. This leads to\nwidespread hypoxic tissue necrosis. The widespread tissue necrosis manifests as\nmultiple organ dysfunction [MODS]. Various organs may fail to perform their normal\nfunctions. And lungs may show ARDS or Shock lung.\n\nClinical course of shock\nPatient with shock may manifest as having a weak and rapid pulse, tachypenia, & cool,\nclammy, cyanotic skin. In septic shock, the skin will initially be warm & flushed because\nof peripheral vasodilation. The patient may present with confusion, restlessnes,\ndecreased urine output, coma, and death.\n\nXII. Excercises\n\n1. a) What is edema?\nb) Enumerate four clinical conditions that cause generalized body oedema. Discuss their\nc) Enumerate the causes of oncotic and nononcotic oedema.\n\n2. Case study I: A 40 year old patient got a car accident and he was found to have femoral\nshaft fracture & then he suddenly developed dyspnea, cyanosis, and shock and passed\naway immediately after surgery. There was no massive blood loss at the time of trauma\nor during surgery. The probable cause of death is:\na) Shock\nb) Arterial emboli\nc) Fat embolism\nd) Stress\ne) None\n\n3. a) Define infarction.\nb) Briefly discuss the difference between venous & arterial thromboses\nc) Enumerate the difference between red & white infracts & the organs in which they\ncommonly occur.\n\n4. Case study II: A 28 year old female patient presented with fever, chills, decreased urine\noutput, offensive vaginal discharge, and abdominal pain. One week earlier she had an\nabortion attended by a non-medical personnel with metallic materials. The doctor found\nout that her blood pressure was 60/20 mmHg, that she has altered consciousness, & a\ntemperature of 38.9\na) What is the primary problem?\nb) What is the complication of the primary problem? Discuss the pathogenesis of this\nc) What organisms are the most likely causes of the disease?\nd) What are the morphologic changes & their complications that will be seen in different\norgans in this patient?\n\n\n5. a) Describe the coagulation system & its normal purpose (function).\nb) Enumerate vitamin K dependent coagulating factors.\nc) Enumerate the cause of DIC\n\n6. Give a brief explanation for the following questions.\n\na) Why is venous embolus is almost always occlusive compared to arterial emboli?\nb) What is the pathogenesis shared by both myocardial infarction and ulcerated\natherosclerotic plaque in causing thrombosis?\nC] Why is superficial phlebothrombosis more symptomatic than deep vein thrombosis?\n\n7. Discuss the causes of hypovolemic & cardiogenic shock.\n\n\nI. Learning objectives:\n\nAt the end of this chapter, the student should be able to:-\n1. Know the basis of genetic diseases.\n2. Know the 4 major categories of genetic diseases.\n3. Know the categories of mendelian disorders based on their pattern of inheritance &\ngive some examples of each category.\n4. Know the categories of mendelian disorders based on the type of protein involved\n(i.e. the biochemical mechanism) & give some examples of each category.\n5. Know the different types of chromosomal disorders & give examples for each type.\n6. Know multifactorial disorders.\n\nII. Introduction\n\nA knowledge of the normal human genetics will facilitate the understanding of genetic\ndiseases. Hence, the student is advised to revise the normal human genetics before reading\nthis chapter. Here, only brief highlights of the normal are given. Genetic diseases are often\nsaid to be difficult tostudents. We have tried to dispell this wrong notion & to make genetic\nas clear as possible at the cost of brevity. we did in order to facilitate the students\n\nGenetic information is stored in DNA. The typical normal human cell contains 46\nchromosomes {i.e. 23 pairs of chromosomes: 22 homologous pairs of autosomes & one pair\nof sex chromosomes (XX or XY)}. Members of a pair (described as homologous\nchromosomes or homologs] carry matching genetic information. I.e. they have the same\ngene loci in the same sequence, though at any specific locus they may have either identical\nor slightly different forms, which are called alleles. One member of each pair of\nchromosomes is inherited from the father, the other from the mother.Each chromosome is in\nturn composed of a very long unbranched molecule of DNA bound to histones & other\nproteins. This interaction between the long DNA molecule & the histones decreases the\nspace occupied by the long DNA. I.e. this interaction packages the long DNA into the\nshorter chromosomes.\n\nEach chromosome contains a single continuous DNA molecule. DNA is composed of two\nvery long complementary chains of deoxynucleotides. The 2 chains (strands) of DNA wind\naround each other i.e. twist about each other forming a double helix the twisted ladder\nmodel. Each deoxynucleotide, in turn, is composed of a nitrogenous base {i.e. adenine (A),\nor guanine (G), or cytosine (C), or thymine (T)} bound to deoxyribose & phosphate.\n\nDNA has two basic functions:\n\n1. It codes for the proteins which are important for the metabolic & structural functions of\nthe cell. I.e. it provides the genetic information for protein synthesis.\n\n2. It transmits the genetic information to the daughter cells & to the offsprings of the\n\nHence, the central dogma of molecular biology is:-\n\nFiger 6-1 showing the central dogma of molecular biology\nDNA transcription RNA translation\n\n\n\nDNA stores genetic information. This is done by the sequence of the nucleotides in the\nDNA. The portion of DNA that is required for the production of a protein is called a gene. A\ngene has exons (coding sequences) & introns (intervening sequences). The transcription of\na gene is regulated by a promoter region, enhancer region, etc. The sequence of\nnucleotides in a gene determines the sequence of amino acids in a specific protein. Three\nconsecutive nucleotides form a code word or codon. Each codon signifies a single amino\nacid. Since the number of condons (64) outnumbers the number of amino acids (20), most\namino acids are specified by more than 1 condon, each of which is completely specific.\nTo translate its genetic information into a protein, a segment of DNA (i.e. a gene) is first\ntranscribed into mRNA. The mRNA contains a sequence of nucleotides that\nis complementary to the nucleotides of the DNA. Each DNA triplet codon is converted into a\ncorresponding RNA triplet codon. Then each mRNA codon codes for a specific amino acid.\nHence, the sequences of the RNA codons is translated into a sequence of amino acids (i.e.\nprotein). Therefore, the sequence of the amino acids in the protein is determined by the\nsequence of the codons in the mRNA which in turn is determined by the sequence of\nnucleotides in the DNA.\n\nIn summary, the primary sequence of bases in the coding regions of DNA determines the\nsequence of amino acids in the protein. Hence, any alteration in the sequence of bases in\nthe normal gene causes an alteration of the protein at a specific point in its sequence. Such\nalteration is called mutation & is the basis of genetic diseases.\nGenetic information is transmitted to the daughter cells under two circumstances:\n\n1. Somatic cells divide by mitosis, allowing the diploid (2n) genome to replicate itself\ncompletely in conjunction with cell division.\n\n2. Germ cells (sperm & ova) undergo meiosis a process that enables the reduction of the\ndiploid (2n) set of chromosomes to the haploid state (1n).When the egg is fertilized by\nthe sperm, the 2 haploid sets are combined, thereby restoring the diploid state in the\n\n\n- Hereditary (familial) disorders are disorders derived from ones parents.\n- Congenital means born with. It may be genetic, for example Downs syndrome. Or it\nmay not be genetic, for example congenital syphilis. Not all genetic diseases are\ncongenital, for example patients with Huntingtons disease begin to manifest their\ndisease in the 3\nor 4\n- Genotype means the genetic constitution (genome).\n- Phenotype means the observed biochemical, physiological, & morphological\ncharacteristics of an individual as determined by his/her genotype & the environment in\nwhich it is expressed.\n- Allele means one of the alternative versions of a gene that may occupy a given locus.\n- Gene, as already stated, is the portion of DNA that codes for a protein.\n\nIII. Mutations\n\n- are the bases of genetic diseases.\n- are defined as permanent changes in the primary nucleotide sequence of DNA\nregardless of its functional significance.\n- occur spontaneously during cell division or are caused by mutagens such as radiation,\nviruses, & chemicals.\n- can occur in germ line cells (sperm or oocytes) or in somatic cells or during\nembryogenesis. Germline mutations can be passed from one generation to the next &\nthus cause inherited disease. Somatic mutations do not cause hereditary disease but\n\nthey may cause cancer (because they confer a growth advantage to cells) & some\ncongenital malformations. Mutations that occur during development (embryogenesis)\nlead to mosaicism. Mosaicism is a situation in which tissues are composed of cells with\ndifferent genetic constitutions. If the germ line is mosaic, a mutation can be transmitted\nto some progeny but not others. This can sometimes lead to confusion in assessing the\npatterns of inheritance.\n- affect the various levels of protein synthesis.\n- can be classified into the following three categories based on the extent of the genetic\n\n2. Genome mutations\n- are due to chromosome missegregation.\n- are gain or loss of one or more whole chromosomes.\n- are exemplified by aneuploidy & polyploidy.\n- are often incompatible with survival.\n\n3. Chromosome mutations\n- are due to rearrangement of genetic material in a chromosome which results in structural\nchanges in the chromosome.\n- can be seen by the microscope.\n- are exemplified by translocations.\n- are infrequently transmitted because most are incompatible with survival (like genome\n\n4. Gene mutations\n- cause most of the hereditary diseases.\n- are submicroscopic (i.e. cannot be seen by the microscope).\n- may affect a single base (more common) or they may affect a larger portion of a\n\n- have the following types:\nA. Single base pair change (Point Mutation)\nB. Deletions & Insertions\nC. Expansions of repeat sequences\n\nEach of these types are discussed below.\n\nA. Point mutation (Single base pair change)\n- is the substitution of one base for another.\n- includes the following types:-\n1. Silent mutations\n2. Missense mutations\n3. Nonsense mutations\n\n1. Silent (Synonymous) mutation.\nThe genetic code is redundant (i.e. there is more than one codon for most amino acids) &\ntherefore a change in one base may result in no change in the amino acid sequence of the\nprotein. The base replacement does not lead to a change in the amino acid but only to the\nsubstitution of a different codon for the same amino acid. For example, the change of the\ncodon UUU which codes for phenylalanine to UUC (i.e. the replacement of U by C) is a\nsilent mutation because the new codon (UUC) also codes the same amino acid\n\n2. Missense mutations\n- changes the codon for one amino acid to the codon for another amino acid.\n- is exemplified by the mutation which causes sickle cell anemia.\n\nHemoglobin is composed of a heme, two -globin polypeptide chains, & two -globin\npolypeptide chains. In normal individuals, the codon GAG codes for glutamic acid in the 6\n\nposition of the -globin polypeptide chain. But in sickle cell anemia this codon is changed to\nGUG which codes valine. Hence, as a result of this single base substitution, valine\nsubstitutes glutamic acid in the -globin chain. This amino acid substitution alters the\nphysicochemical properties of hemoglobin, which is now called Hemoglobin S. This leads to\nsickle cell anemia.\n\n3. Nonsense mutation\n- changes the codon for an amino acid to a stop codon, leading to termination of translation\nof the mRNA transcript & a truncated protein.\n- is exemplified by the mutation which causes\nthalassemia. In this, a substitution of U\nfor C in the codon 39 of the globin chain of hemoglobin (i.e. the change of CAG to\nUAG) converts the codon for glutamine to a stop codon. This results in premature\ntermination of the globin gene translation. I.e. protein synthesis stops at the 38\n\nacid. This results in short peptide which is rapidly degraded leading to the absence of -\nglobin chains. This leads to\n\nB. Deletions & insertions\n- can occur within coding sequences or within noncoding sequences.\ni. Deletions & insertions of one or two bases within coding sequences lead to\nframeshift mutations because they alter the reading frame of the triplet genetic code in\nthe mRNA so that every codon distal to the mutation in the same gene is read in the\nwrong frame. This leads to altered amino acid sequence & usually premature\ntermination of the peptide chain because of the occurrence of a termination codon in the\naltered reading frame.\nii. Deletion or insertion of three or a multiple of three base pairs within coding\nsequences does not cause frameshift mutation, instead it results in abnormal protein\nmissing one or more amino acid.\niii. Deletions affecting the promoter/enhancer sequences (i.e. in the noncoding\nregions) leads to promoter / enhancer mutations.\n\nC. Expansion of repeat sequences (trinucleotide repeat mutations)\n- show expansion of a sequence of 3 nucleotides. Normally, 3 nucleotides are repeated\n20-30 times. Trinucleotide repeat mutation is when there is expansion of these normally\nrepeated sequences to more than 100 repeats.\n- The mechanism leading to an increase in the number of repeats is not clear. It is also\nnot clear how the increase leads to disease.\n- cause myotonic dystrophy, Huntingtons disease, fragile X syndrome, etcare not stable\n(i.e. they are dynamic) (i.e. the degree of amplification increases during gametogenesis).\nThis leads to the phenomenon of anticipation (i.e. the disease worsens during the\nsubsequent generations).\n\n- Mutations can interfere with normal protein synthesis at various levels:-\n1. Promoter/enhancer mutations No transcription/ increased transcription No\nprotein/increased protein.\n2. Missense mutation Abnormal protein with a different amino acid A protein altered\nwith function or loss of function\n3. Nonsense mutation Affects translation Truncated protein Rapidly degraded\nprotein Absence of the protein.\n\n\nMany different proteins are synthesized in each cell of the body. These proteins include\nenzymes & structural components responsible for all the developmental & metabolic\nprocesses of an organism. Mutation can result in abnormality in any of these protiens.\nMutation Abnormal protein/No protein/ Increased protein Abnormal metabolic\nprocesses Tissue injury Genetic diseases.\nIV. Categories of genetic diseases\nGenetic diseases generally fall into one of the following 4 categories:\na. Mendelian disorders\nb. Chromosomal disorders\nc. Multifactorial disorders\nd. Single gene diseases with nonclassic patterns of inheritance.\nEach of these categories is discussed below.\nV. Mendelian disorders\n- Each medelian disorder is caused by a single mutant gene.\naffects transcription, mRNA processing, or translation\nabnormal protein or decreased protein\nmay affect any type of protein Disease.\n- show the classic mendelian patterns of inheritance.\n- are also called monogenic mendelian disorders.\n- are uncommon.\n- can be classified into the following based on their patterns of inheritance:\n1. Autosomal dominant inheritance\n2. Autosomal recessive inheritance\n3. X-linked recessive inheritance\n\nThe mode of inheritance for a given phenotypic trait/disease is determined by pedigree\nanalysis in which all affected & unaffected individuals in the family are recorded in a\npedigree using standard symbols & indicating the sex, the generation, & biologic\nrelationship among the family members. In all mendelian disorders, the distribution of the\nparental alleles to their offspring depends on the combination of the alleles present in the\n\n\n1. Autosomal dominant disorders\n- will be discussed under the following 4 headings:-\na. The criteria for autosomal inheritance\nb. Additional features of autosomal dominant disorders\nc. Pathogenesis\nd. Clinical examples\n- Dominant implies that the disease allele needs to be present only in a single copy (as in\nthe heterozygote) to result in the phenotype.\n\na. The criteria of autosomal inheritance include:\ni. The transmission of the trait is from generation to generation without skipping. In a\ntypical dominant pedigree, there can be many affected family members in each\nii. Except for new mutation, every affected child will have an affected parent Some\npatients do not have affected parents because the disease in such cases is due to new\nmutations in the sperm/ovum from which the patients were derived. New germ line\nmutations occur more frequently in fathers of advanced age.\nIii. In the mating of an affected heterozygote to a normal homozygote (the usual\nsituation), each child has a 50% chance to inherit the abnormal allele & be affected & a\n50 % chance inherit the normal allele. See Fig.1 below.\niv. The 2 sexes are affected in equal numbers (because the defective gene resides on\none of the 22 autosomes (i.e. nonsex chromosomes). The exceptions to this rule are\nthe sex-limited disorders such as breast & ovarian cancers in females & familial male\nprecocious puberty in boys.\n\n\nHeterozygous male\n\nHomozygous normal female\n\nNormal male\n\nHeterozygous female\n\nPhenotypically affected\n\nFig 6.2. The pedigree for autosomal dominant pattern of inheritance. This figure shows the\npedigree for a normal female parent & an affected male parent & their four children.\nVertical distribution of the condition through successive generations occurs when the\ntrait does not impair reproductive capacity.\n\nb. Additional features of autosomal dominant disorders\nEach of the following may alter the idealized dominant pedigree (& they should be\nconsidered to provide the most accurate counselling):-\ni. Autosomal dominant disorders can sometimes be caused by new mutations. New\nmutations may give rise to an isolated case of a dominant disorder. New mutations are\nmore often seen with diseases that are so severe that people who are affected by them\nare less likely to reproduce than normal. For example, the majority of cases of\nachondroplasia are the results of new mutations.\nii. Autosomal dominant disorders can show reduced penetrance (i.e. some individuals\ninherit the mutant gene but are phenotypically normal). Penetrance is the probability of\nexpressing the phenotype given a defined genotype. Penetrance is expressed as the\npercentage of individuals who have the mutant allele & are actually phenotypically\naffected. For example, 25% penetrance indicates that 25% of those who have the gene\n\nexpress the trait. Penetrance can be complete or incomplete. Reduced (incomplete)\npenetrance is when the frequency of expression of a genotype is < 100%.\nNonpenetrance is the situation in which the mutant allele is inherited but not expressed.\niii. Autosomal dominant disorders commonly show variable expressivity.Variable\nexpressivity is the ability of the same genetic mutation to cause a phenotypic spectrum.\nIt is when the trait is seen in all individuals carrying the mutant gene but is expressed\ndifferently among individuals. For example, some patients with neurofibromatosis type 1\n(which is an autosomal dominant disorder) have only brownish spots (caf au lait spots)\non their skin whereas other patients with the same disease have multiple skin tumors &\nskeletal deformities. Therefore, neurofibromatosis is said to show variable expressivity.\nVariable expressivity most likely results from the effects of other genes or environmental\nfactors that modify the phenotypic expression of the mutant allele. For example,\nindividuals with familial hypercholesterolemia who take cholesterol-rich diet have a\nhigher risk of manifesting with atherosclerosis than those individuals with\nhypercholesterolemia & who take low cholesterol diet. Hence, the variable expressivity in\nthis case is brought about by the influence of an environmental factor (i.e. the diet).In\ngeneral, variable expressivity & reduced penetrance can modify the clinical picture of\nautosomal dominant disorders.\n\nc. Pathogenesis of autosomal dominant disorders\n\nAutosomal dominant disorders are caused by 2 types of mutations:\n1. Loss of function mutations\n2. Gain of function mutations\n\n1. Loss of function mutations cause autosomal dominant disorders when they result in\ninactive or decreased amount of regulatory proteins (e.g. cell membrane receptors\nsuch as LDL receptor), or structural proteins (e.g. collagen, fibrillin, spectrin,\n\nA 50% reduction in the levels of such nonenzyme proteins results in an abnormal\nphenotype (i.e. the heterozygote, who produces this much amount, will manifest the\ndisorder). This can sometimes be explained by the dominant negative effect of the mutant\nallele (i.e. product of the mutant allele impairs the function of the product of the normal\n\n2. Gain of function mutations are much less common than loss of function mutations. In\nsuch cases, the mutant gene produces a toxic protein (i.e. the protein will have a new\ntoxic function). This is exemplified by Huntington disease. Gain of function mutations\nalmost always have autosomal dominant pattern.\n\nd. Clinical examples of autosomal dominant disorders:\n\no Marfan syndrome*\no Some variants of Ehlers Danlos syndrome\no Osteogenesis imperfecta\no Achondroplasia\no Huntington disease\no Neurofibromatosis*\no Tuberous sclerosis\no Myotonic dystrophy\no Familial hypercholesterolemia*\no Hereditary spherocytosis\no Familial polyposis coli\no Polycystic kidney disease\n* Only these are briefly described here.\n\nMarfan syndrome\n- is a defect of connective tissue characterized by faulty scaffolding.\n- is caused by mutations of FBN1 gene Abnormal fibrillin (which is a structural protein)\nNo normal microfibrils in the extracellular matrix No scaffolding on which tropoelastin\nis deposited to form elastic fibers Marfans syndrome.Microfibrils are normally\nabundant in the aorta, ligaments, & ciliary zonules of the lens where they support the\nlens. Hence, Marfan syndrome (in which there is deficiency of normal fibrillin &\nmicrofibrils) mainly involves these tissues.\n- is characterized by defects in skeletal, visual, & cardiovascular structures:-\ni. Patients are tall & thin with abnormally long legs & arms, spider like fingers\n(arachnodactyly), hyperextensible joints.\nii. Dislocation of the ocular lens (Ectopia lentis) is frequent.\n\niii. Cardiovascular changes include:\na. Mitral valve prolapse due to loss of connective tissue support in the\nmitral valve leaflets.\nb. Dilatation of the ascending aorta due to cystic medionecrosis (lack of\nmedial support).Dilatation of the aortic valve ring & the root of the aorta\nAortic regurgitation.\nc. Dissecting aneurysm of the aorta due to medial necrosis & intimal tear.\n\nFamilial hypercholesterolemia\n- is possibly the most frequent mendelian disorder\n- is caused by mutation of the gene for LDL (low density lipoprotein) receptor\nDecreased functional LDL receptor Increased plasma cholesterol Premature\natherosclerosis Increased risk of myocardial infarction & other complications of\natherosclerosis/ The occurrence of xanthomas (which are raised yellow lesions filled\nwith lipid-laden macrophages in the skin & tendons).\n- is best understood by knowing the normal process of cholesterol metabolism &\ntransport which is briefly described below.7% of the bodys cholesterol circulates in\nthe plasma, predominantly in the form of LDL. The level of plasma cholesterol is\ninfluenced by its synthesis & catabolism. The liver plays an important role in both\nthese processes. The following flow chart illustrates the normal cholesterol\nmetabolism. Abbreviations used in this flow chart\n- TG = Triglyceride VLDL = Very Low Density Lipoprotein = has a lot of triglyceride\n(TG), very little cholesterol, & 3 apoproteins. IDL = Intermediate Density\nLipoprotein= has less TG & more cholesterol than VLDL & also has 2\napoproteins.LDL = Low Density Lipoprotein = has much more cholesterol than IDL.\n\nLiver cell Secrets VLDL\n\nVLDL is transported to the capillaries of adipose tissue or muscle which contain lipoprotein\nlipase. The lipoprotein lipase degrades the VLDL into TG & IDL.\na. The TG is stored in fat cells or is used for energy in skeletal muscle.\nb. The IDL follows 2 pathways:-\ni. 50% of plasma IDL is cleared by the liver. The liver uses LDL receptors to remove\nplasma IDL.\nii. The rest of IDL is converted to plasma LDL (which is cholesterol-rich).Plasma LDL is\nremoved by the following 2 pathways:-\n\n1. The scavenger receptor pathway:- In which oxidized LDL or acetylated LDL is removed\nby a scavenger receptor on the cells of the mononuclear phagocyte system, &\n2. Hepatic clearance:- 70% of plasma LDL is removed by the liver (because LDL binds\nwith LDL receptors which are concentrated in certain regions ( called the coated pits)\nof the cell membrane of the hepatocyte). Then, the coated vesicles containing the bound\nLDL fuse with the lysosomes. in the lysosomes, LDL is degraded into free cholesterol\nwhich enters the cytoplasm.\n\nThere, cholesterol does the following things:-\ni.It is used for the synthesis of cell membrane & bile acids.\nii. It stimulates storage of excess cholesterol\niii. It inhibits the synthesis of LDLreceptors thus protects the cell from excessive\naccumulation of cholesterol.\nFamilial hypercholesterolemia\n- is caused by different types of mutations in the gene for LDL receptor No functional\nLDL receptor Leads to:-\ni. Impaired plasma LDL clearance. This leads to the accumulation of LDL in plasma\n(i.e. hypercholesterolemia).\nii. Impaired IDL uptake by the liver ( because IDL uses hepatic LDL receptors for this\nuptake). Diversion of a greater proportion of plasma IDL into the precursor pool\nfor plasma LDL. Hypercholesterolemia.\niii. Increased scavenger receptor mediated clearance of LDL into the cells of the\nmononuclear phagocyte system & possibly the vascular walls. This leads to\nxanthomas & contributes to premature atherosclerosis.\nThe hypercholesterolemia & the accumulation of LDL inside macrophages produced by the\nabove mechanisms lead to premature atherosclerosis & xanthomas.\nThis knowledge of the pathogenesis of familial hypercholesterolemia has led to a logical\ndiscovery of its treatment. We have said that the basic problem in this disease is absence of\nLDL receptors. Hence, the logical treatment is to increase the number of LDL receptors. (i.e.\nto remove the basic problem). This can be done by:-\n1. Statins\n- are drugs which inhibit hepatic HMG CoA reductase Inhibits intracellular\ncholesterol synthesis leads to greater synthesis of LDL receptors (See the normal\ncholesterol metabolism above)\n2. Gene therapy (under investigation)\n- by giving normal LDL receptor genes via a viral vector.\n\n\nThis illustrates that knowing the pathogenesis of diseases greatly helps not only in\nunderstanding their morphologic & clinical features but also in the logical discovery of their\n\n- is a familial neoplasm. Familial neoplasms have neoplasm-causing mutations ransmitted\nthrough the germ line. Familial neoplasms account for about 5% of all cancers & they\nare mendelian disorders. They are often inherited in autosomal dominant pattern with\nfew exceptions. They are caused by mutations that affect proteins which regulate cell\ngrowth. And they are exemplified by neurofibromatosis types 1 & 2. It should be noted\nthat most cancers are not familial & these non-familial cancers are caused by mutations\nof tumor-suppressor genes, proto-oncogenes, & apoptosis- regulating genes in somatic\ncells. Hence, these mutations are not passed in the germ line. Therefore, most cancers\nare not mendelian disorders i.e. they are sporadic or nonfamilial disorders. Here,\nneurofibromatosis which is a mendelian neoplasm is discussed.\n\n1. Neurofibromatosis type 1\n- was previously called von Recklinghausen disease.\n- has autosomal dominant transmission in 50% of cases. (The rest 50% are due to new\n- has extremely variable expressivity but the penetrance is 100%.\n- is due to a mutation in the NF1 gene (which is a tumor-suppressor gene).\n- mainly shows neurofibromas in the skin & other locations, caf au lait spots (i.e. light\nbrown skin pigmentations), & pigmented iris hamartomas (Lisch nodules). The benign\nneurofibromas can sometimes become malignant.\n- may also show skeletal disorders such as scoliosis & bone cysts & increased incidence\nof other tumors especially pheochromocytoma & malignancies such as Wilms tumor,\nrhabdomyosarcoma, & leukaemia.\n\n2. Neurofibromatosis type 2\n- was in the past called acoustic neurofibromatosis.\n- is much less common than neurofibromatosis type 1.\n- is an autosomal dominant disorder.\n- is due to a mutation of the NF-2 gene ( which is a tumor suppressor gene)\n- shows bilateral acoustic schwannomas, multiple meningiomas, & gliomas (typically\nependymomas of the spinal cord).\n\n\nAutosomal recessive disorders\n- will be discussed under the following headings:-\na. Criteria\nb. Additional features\nc. Pathogenesis\nd. Clinical examples\n\nIn autosomal recessive disorders, the phenotype is usually observed only in the\nhomozygote. The typical pedigree shows affected male & female siblings with normal\nparents & offspring. Recessive inheritance is suspected when parents are consanguineous;\nit is considered proven when the corresponding enzyme levels are low or absent in affected\nindividuals & are at half normal values in both parents.\na. Criteria\ni. If the trait is rare, parents & relatives other than siblings are usually normal\nii. In the mating of 2 phenotypically normal heterozygotes, the segregation frequency\nwith each pregnancy is 25% homozygous normal, 50% heterozygous normal, &\n25% homozygous affected. See Fig. 2 below.\niii. All children of two affected parents are affected.\niv. Both sexes are affected in equal numbers\nv. If the trait is rare in the population, the probability of parenta consanguinity is\n\nFig 6.3. Autosomal recessive pattern. This diagram shows the pedigree for 2 heterozygous\nparents & their 4 children. Only siblings are affected. Vertical distribution of affected\nindividuals is not usually seen. Horizontal distribution & consanguinity are seen in a\nmultiplex pedigree. (Note: This is not a multiplex pedigree). See the legend of Fig. 1.\n\nb. Additional features\ni.Autosomal recessive disorders show more uniform expression of the trait than\nautosomal dominant disorders. (i.e. they dont show variable expressivity).\n\nii. They commonly show complete penetrance.\niii. They frequently show signs & symptoms early in life, whereas many autosomal\ndominant disorders have delayed onset e.g. Huntington disease clinically manifests for\nthe first time during adulthood.\n\nc. Pathogenesis\nMany autosomal recessive disorders are caused by loss of function mutations which\nresult in decreased enzyme proteins.\nHomozygotes No normal enzyme Disease.\nHeterozygotes Equal amounts of normal & defective enzymesCells with half the normal\namount of the enzyme function normally No disease.\n\nd. Clinical examples include:-\n- Sickle cell anemia\n- Thalassemias\n- Congenital adrenal hyperplasia\n- Cystic fibrosis Wilson disease\n- HemochromatosisMendelian disorders associated with enzyme defects:*\no Phenylketonuria\no Galactosemia\no Homocystinuria\no Lysosomal storage diseases\no Alpha 1 antitrypsin deficiency\no Glycogen storage disease\n* These will be discussed further.\n- Mendelian disorders associated with enzyme defects.\n- have mutations decreased amount of a normal enzyme or abnormal enzyme with\ndecreased activity Metabolic block Consequences Disease.\n- show autosomal recessive pattern of inheritance because half the normal amount of\nenzyme is enough for normal function. Hence, heterozygotes (who produce this\namount) do not manifest the disease. I.e. the inheritance is autosomal recessive.\n- is illustrated by the following model of a metabolic pathway:- Substrate\n\nEnzyme 1 Intermediate 1 Enzyme 2Intermediate 2 M1 M2 (Minor pathway\nproducts) Enzyme 3 Final product If an enzyme of the above pathway is defective, then\nthe consequences may be:\n1. Accumulation of the substrate, &/or one or both of the intermediates, & the products of\nthe minor pathway depending on the level of the block. These substances may be toxic in\nhigh concentrations & result in tissue damage. This mechanism occurs in the following\nLysosomal storage diseases\n\n2. Decreased amount of the final end product.\nThis is exemplified by albinism.\n\n3. Failure to inactivate a toxic substrate. E.g. Hereditary alpha -1 antitrypsin deficiency.\n\nMendelian disorders associated with enzyme defects include most inborn errors of\nmetabolism such as:\no Lysosomal storage diseases (E.g. Gaucher disease)\no Phenylketonuria\no Severe combined immunodeficiency disease\no Alpha 1 antitrypsin deficiency\no Albinism\no Lesch Nyhan syndrome\n\nIn order to illustrate the basic principles of this category, only the first two disorders from the\nabove list are discussed below in moderate depth.\n\n1. Lysosomal storage diseases\n- result from lack of any protein essential for the normal function of lysosomes.\nLysosomes are intracellular organelles used for degrading a variety of complex\nsubstrates. They do so by means of a variety of enzymes. The following figure\ncompares the normal lysosomal degradation pathway with that of lysosomal storage\ndisease.Complex substrate\nNormal lysosomal degradation \\ Lysosomal enzyme deficiency\npathway:- \\ ( i.e. lysosomal storage disease):-\nEnzyme A \\\n\\ Enzyme A\n\nIntermediate 1 Intermediate 1\n\nEnzyme B Enzyme B\n\nIntermediate 2 Intermediate 2\n\nEnzyme C Enzyme C is absent\n\nSmall soluble end products No soluble end product\nStored nonmetabolized complex substrates & intermediate products.\n\nFig. 6. 4. Normal lysosomal degradation Vs lysosomal storage diseases.\n\nLysosomal storage diseases can be divided into the following subgroups based on the\nnature of the accumulated substance:\na. Sphingolipidoses\ne.g. Tay-Sachs disease in which there is deficiency of the alpha subunit of the enzyme\nhexosaminidase leading to the accumulation of GM2 gangliosides.\nb. Sulfatidoses e.g. 1. Gaucher disease e.g. 2. Niemann-Pick disease types A & B (have\ndeficiency of sphingomyelinase resulting in the accumulation of sphingomyelin).\nc. Muopolysacharidoses (MPS)\nd. Mucolipidoses (ML)\ne. Type 2 glycogenosis ( Pompe disease)\nf. etc\n\nThe organs affected in lysosomal storage diseases (i.e. the distribution of the stored\nmaterial) are determined by the following 2 factors:\ni. The site where most of the material to be degraded is found.\nE.g.1. Brain is rich in gangliosides, hence defective degradation of gangliosides as in\nTay-Sachs disease results in the storage of gangliosides within neurons leading to\nneurologic symptoms. E.g.2. Mucopolysaccharides are widely distributed in the body.\nHence, mucopolysacharidoses (i.e. defects in the degradation of polysaccharides) affect\nvirtually any organ.\nii. The location where most of the degradation normally occurs.\nOrgans rich in phagocytic cells such as the spleen & liver are frequently enlarged in\nseveral forms of lysosomal storage diseases. This is because cells of the mononuclear\nphagocytic system are rich in lysosomes & are involved in the degradation of a variety of\nFrom among the various types of lysosomal storage diseases listed above, only Gaucher\ndisease is discussed here to illustrate the basic principles of lysosomal storage diseases.\n\nGaucher disease\n- is the most common lysosomal storage disorder.\n- is a disorder of lipid metabolism caused by mutations in the gene encoding\nglucocerebrosidase. Deficiency of glucocerebrosidase Accumulation of\nglucocerebroside mainly in the cells of the mononuclear phagocyte system &\nsometimes in the central nervous system. Glucocerebrosides are continually formed\nfrom the catabolism of glycolipids derived mainly from the cell membranes of old red\nblood cells & white blood cells.\n- morphologically shows Gaucher cells (distended phagocytic cells with a distinctive\nwrinkled tissue paper cytoplasmic appearance).\n- - has 3 clinical subtypes : Type I (chronic nonneuronopathic), Type II ( acute\nneuronopathic) , & Type III (Juvenile).\n\nType I (Chronic non-neuronopathic form) (Adult Gaucher disease):-\n- accounts for 99% of the cases.\n- is found mainly in European Jews.\n- does not involve the brain.\n- shows accumulation of gluccocerebrosides only in the cells of the mononuclear\nphagocytic system throughout the body.\n\n- Hence, it shows Gaucher cells in the spleen, liver, lymph nodes, & bone marrow.\n- clinically manifests by\no SplenomegalyHypersplenismPancytopenia.\no Hepatomegaly\no Generalized lymphadenopathy\no Pathologic fractures & bone pain due to erosion of the bone.\no First appearance of sings & symptoms in adult life.\no Progressive disease which is compatible with long life.\n\nPhenylketonuria (PKU)\n- is caused by mutation of the phenylalanine hydroxylase gene Phenylalanine\nhydroxylase deficiency Failure of conversion of phenylalanine to tyrosine in the liver\nHigh serum concentration of phenylalanine which is neurotoxic Progressive\n\nIn addition the minor pathways of phenylalanine metabolism produce phenyl pyruvic acid\n(phenylketone) & phenyl acetic acid which are excreted via the urine.\n\n- is clinically characterized by:\nProgressive mental deterioration usually pronounced by age 1.\nHyperactivity & other neurologic abnormalities.\nDecreased pigmentation of hair, eyes, & skin. (Children are characteristically blond\n& blue-eyed).\nMousy body odour from phenylacetic acid in urine & sweat.\n- can be successfully treated by a phenylalaninefree diet.\n- Screening tests for serum phenylalanine or urinary catabolites are ordinarily performed\non the 3\nor 4\nday of life . But this is not currently done in Ethiopia.\n\n3. X-linked recessive inheritance\nAll sex-linked disorders are X-linked. There is no Y-liked inheritance because Y-linked\nmutations result in infertility. X-linked disorders can be either recessive (almost all) or\ndominant (rare).\n\n\nX-linked recessive inheritance:-\n- is suspected when several male relatives in the female line of the family are affected.\na. Criteria:-\ni. In the mating of a heterozygous carrier female parent & a normal male parent (the most\nfrequent setting), the sons are hemizygous affected 50% of the time (i.e. the sons have\n50% chance of being affected) & the daughters are normal heterozygous carriers 50% of\nthe time & normal homozygotes 50% of the time. See Fig.3 below.\nii. Affected daughters are produced by matings of heterozygous females with affected\niii. No male-to-male (i.e. father-to-son) transmission of the trait (in all sex-linked\ninheritance). This is because a male contributes his Y chromosome to his son & does\nnot contribute an X-chromosome to his son. On the other hand, since a male contributes\nhis sole X-chromosome to each daughter, all daughters of a male with an X-linked\ndisorder will inherit the mutant allele. All female offspring of affected males are carriers if\nthe mother is normal.\n\nFig.6.5. X-linked recessive pattern.\n\nThis figure shows an extended pedigree of an X-linked recessive disorder in which the male\nparents (in both generations) are normal & the female parents carriers. In contrast to the\nvertical distribution in dominant traits (parents & children affected) & the horizontal\ndistribution in autosomal recessive traits (sibs affected), the pedigree pattern in X linked\nrecessive traits tends to be oblique, i.e. the trait manifests in the maternal uncles of affected\nmales & in male cousins who are descended from the mothers sisters who are carriers.\n\nb. Pathogenesis of X-linked recessive disorders\n\nThe genes responsible for X-linked disorders are located on the X-chromosome, & the\nclinical risks are different for the 2 sexes.\n\nSince a female has 2 X chromosomes, she may be either homozygous or heterozygous for\na mutant gene, & the mutant allele may demonstrate either dominant or recessive\n\nThe homozygous female (i.e. having the mutation in both the X chromosomes) will express\nthe full phenotypic change of the disease\nClinical expression of X-linked recessive disorders in heterozygous females is often variable\n& is influenced by the normal random X-chromosome inactivation (i.e. lyonization) (See\nbelow). Normally, one of the two X-chromosomes in females is randomly inactivated.\nTherefore, in heterozygous females carrying X-linked recessive mutations, some cells have\none active normal X chromosome & other cells have an active abnormal X chromosome\ncontaining the mutant allele. I.e. such females have a variable proportion of cells in which\nthe mutant X-chromosome is active. Often the mutant allele is activated in only some of the\ncells. Therefore, the heterozygous female expresses the disorder partially & with less\nseverity than hemizygous men. I.e. she usually does not express the full phenotypic change.\nE.g. G6PD deficiency. Very rarely, the mutant allele may be activated in most cells & this\nresults in full expression of a heterozygous X-linked recessive condition in the female.\nIn males, the Y chromosome is not homologous to the X-chromosome. So mutant genes on\nthe X are not paired with alleles on the Y. The male is, therefore, said to be hemizygous (&\nnot heterozygous) for the X-linked mutant genes. Males have only oner X-chromosome,\nso they will clinically show the full phenotype of X-linked recessive diseases,\nregardless of whether the mutation produces a recessive or dominant allele in the\nfemale. Thus, the terms X-linked dominant or X-linked recessive refer only to the expression\nof the mutations in women.\n\nc. Clinical examples of X-linked recessive disorders include:\n- Hemophilia A & B\n- Chronic granulomatous disease of childhood\n- Glucose-6-phosphate dehydrogenase (G6PD) deficiency\n- Agammaglobulinemia\n- Wiskott -Aldrich syndrome\n\n- Diabetes insipidus\n- Lesch-Nyhan syndrome\n- Fragile X syndrome\n- Duchenne muscular dystrophy\n\nX-linked dominant inheritance\n- is a rare variant of X-linked inheritance.\n- is when heterozygous females & hemizygous males phenotypically manifest the\n- is caused by dominant disease alleles on the X-chromosome.\n- is transmitted by an affected heterozygous female to half her sons & half her daughters.\n- is transmitted by an affected male parent to all his daughters but none of his sons, if the\nfemale parent is unaffected.\n- is exemplified by vitamin D-resistant rickets.\n\nMitochondrial inheritance\n- is mediated by maternally transmitted mitochondrial genes, which are inherited\nexclusively by maternal transmission.\n- is a rare form of inheritance mentioned here just for the sake of completeness.\n\nVII. Chromosomal disorders (Cytogenetic disorders)\n\n- are caused by chromosome & genome mutations ( i.e. abnormal structure & number of\nchromosomes respectively).\n- are not uncommon. They are found in 50% of early spontaneous abortuses, in 5% of\nstillbirths, & in 0.5 -1% of live born infants.\n- may, therefore, be suspected in the following clinical situations:\no Spontaneous abortion\no Stillbirth\no Abnormal live births\no Infertile couple\n\nThe following subtopics will be discussed below:\nA. Normal karyotype\n- Chromosome identification & nomenclature\nB. Types of chromosomal abnormalities\n\nC. Abnormalities of autosomal chromosomes\nE.g. Down syndrome\nD. Abnormalities of sex chromosomes\nE.g. 1. Klinefelter syndrome\nE.g. 2. Turner syndrome\n\nA. The normal karyotype\nChromosome classification & nomenclature:\nKaryotype is the chromosome constitution of an individual. The term is also used for a\nphotomicrograph of the chromosomes of an individual arranged in the standard\nclassification (i.e. metaphase chromosomes arranged in order of decreasing length).\nKaryotyping means the process of preparing such a photomicrograph. I.e. it is the study of\nchromosomes. Karyotyping uses many types of techniques of which G-banding is the most\ncommon procedure.\n\nG-banding has the following steps:-\n- Arrest dividing cells in metaphase by using colchicine.\n- Stain the metaphase chromosomes using Giemsa stain, hence thename G-\nbanding.The metaphase chromosomes will show alternating dark staining & light-\nstaining bands. The dark bands are by convention called G bands, & the light bands are\nR bands. About 400 -800 dark & light bands can be seen in a haploid set of\nchromosomes using G banding.\n- Each chromosome can be identified based on its banding pattern & length. The\nchromosome pairs are arranged in decreasing order of their length. And the first\nchromosome in such an arrangement is called chromosome 1, the 2\nchromosome is\ncalled chromosome 2, etc. up to chromosome 23. The banding can also identify\nbreakpoints & other chromosomal alterations.\nMetaphase chromosomes are divided longitudinally into 2 sister chromatids held together at\nthe centromere, which delineates the chromosome into a short arm (p) & a long arm (q).\n\nFig. 6.6. A pair of chromosomes.\n\nThe position of the centromere is used in the morphologic description of a chromosome:\nMetacentric chromosomes have more central centromeres.\nAcrocentric chromosomes have a centromere that is very close to one end. E.g.\nchromosomes 13 & 21.\n\nIn a banded karyotype, each arm of the chromosome is divided into 2 or more regions. The\nregions are numbered e.g. 1, 2, and 3 from the centromere progressing to the telomere.\nEach region is further subdivided into bands & sub bands which are also similarly\nnumbered. Thus, Xq22.1 refers to a segment located on the long arm of the X chromosome\nin region 2 band 2, sub band 1. The following figure illustrates this.\n\nFig. 6.7. Nomenclature of a chromosome showing the division of the long arm (q) of the\nchromosome into regions 1 & 2. Region 2 is further subdivided into bands 1 & 2.\nBand 2 is further subdivided into sub bands 1 & 2. Even though not shown in this\nfigure, the other bands of this q arm & the p arm are similarly divided & numbered.\n\nKaryotypes are usually described using a shorthand system of notations. The following\norder is used to describe karyotypes:\nFirst the total number of chromosomes is given.\nSecond the sex chromosome constitution is given.\nFinally any abnormality is described.\nE.g. 1. A normal female karyotype is 46,XX. E.g. 2. A female with trisomy 21 is\ndescribed as 47,XX,+21.\n\nB. Types of chromosomal anomalies\n\n- Chromosomal anomalies may be numerical or structural.\n1. Numerical anomalies can result in either aneuploidy or polyploidy.\ni. Aneuploidy\n- is addition or loss of 1 or rarely 2 chromosomes.\n\nii. Polyploidy\n- is the addition of complete haploid sets of chromosomes.\n2. Structural anomalies are rearrangements of genetic material within or between\nchromosomes. These may be either genetically balanced or unbalanced. In balanced\nstructural anomalies, there is no change in the amount of essential genetic material\nwhereas in the unbalanced ones there is a gain or loss of essential chromosome\n\n1. Numerical anomalies\n\na. Aneuploidy\n- is a chromosome number that is not an exact multiple of 23 (i.e. the normal haploid\nnumber). The most common forms of aneuploidy are trisomy & monosomy. Trisomy is\nthe presence of 3 copies of a particular chromosome instead of the normal 2 copies.\nI.e. it is the presence of an extra chromosome. Monosomy is the presence of only one\ncopy of a particular chromosome instead of the normal pair. I.e. it is the absence of a\nsingle chromosome.\n- is caused most often by an addition or loss of 1 or 2 chromosomes. This change may\nresult from anaphase lag or nondisjunction.\n\ni. Anaphase lag\n- During meiosis or mitosis, one chromosome lags behind & is left out of the cell nucleus.\nThis results in one normal cell & one cell with monosomy.\nii. Nondisjunction\n- is the failure of chromosomes to separate during meiosis or mitosis. The following figure\nillustrates meiotic nondisjunction.\n\n\nFig.6.8. (A) Normal disjunction of a chromosome pair during meiosis I & II. (B) In meiosis I\nnondisjunction, the homologous chromosomes fail to segregate into the 2 daughter\ncells. (C) In meiosis II nondisjunction, the sister chromatids fail to segregate. The\nchromosome number in the gametes, which in humans is 23, is denoted by n. As\nshown in this figure both (B) & (C) produce gametes that are disomic or nullisomic for\na specific chromosome. And fertilization of such gametes results in trisomic or\nmonosomic zygotes (i.e. aneuploid zygotes). Meiotic nondisjunction is the most\ncommon cause of aneuploidy. It is responsible for disorders such as trisomy 21, the\nmost common form of Down syndrome.\n\nNondisjunction can also occur in a mitotic division of somatic cells after the formation of the\nzygote. Mitotic nondisjunction is the failure of sister chromatids to segregate at anaphase\n(like the meiosis II error shown above). If mitotic nondisjunction occurs at an early stage of\nembryonic development, then clinically significant mosaicism may result. See the following\n\n\nFig.6.9. Mitotic nondisjunction at an early stage of development of an embryo.\n\nThe mitotic nondisjunction occurred in one of cells & resulted in a trisomic cell. All the\ndescendants of this trisomic cell will also be trisomic. Also note that most of the cells\nundergo normal mitosis resulting in normal cells. Therefore, an individual formed from such\nan embryo will have 2 populations of cells a trisomic cell population & a normal cell\npopulation. Such an individual is called a mosaic. And the clinical appearance of such an\nindividual depends on the proportion of trisomic cells. Anyway, the clinical feature is less\nsevere than that of an individual in whom all the cells are trisomic.\nIn general, monosomies & trisomies of the sex chromosomes are compatible with life &\nusually cause phenotypic abnormalities. But monosomies & trisomies of the autosomal\nchromosomes are not well tolerated. I.e. monosomies of autosomal chromosomes are\nlethal to the conceptus. And trisomies of all autosomal chromosomes except chromosomes\n13, 18, & 21 cause abortion or early death. However, trisomies of the autosomal\nchromosomes, 13, 18, & 21 permit survival with phenotypic abnormalities.\n\n\nb. Polyploidy\n- is a chromosome number that is a multiple greater than 2 of the haploid number. Triploidy\nis 3x the haploid number (i.e.69 chromosomes).Tetraploidy is 4x.\n- is rarely compatible with life & usually results in spontaneous abortion.\n\n2. Structural anomalies\n- result from breakage of chromosomes followed by loss or rearrangement of genetic\n- are of the following types (See Fig.9 below):\n\ni. Deletion\n- is loss of a portion of a chromosome.\n- has the following subtypes (See Fig. 9):-\n\na. Terminal deletions arise from one break. The acentric fragments that are formed are lost\nat the next cell division. This is denoted by using the prefix del before the notation for\nthe site of the deletion. E.g. 46,XX, del (18)(p14) or it can also be denoted by a minus\nsign following the number of the chromosome & the sign for the chromosomal arm\ninvolved. E.g. 46,XX, 5p- (which indicates deletion of the short arm of chromosome 5)\nb. Interstitial deletions arise from 2 breaks, loss of the interstitial acentric segment & fusion\nat the break sites.\nc. Ring chromosomes arise from breaks on either side of the centromere & fusion at the\nbreakpoints on the centric segment. Segments distal to the breaks are lost so that\nindividuals with chromosome rings have deletions from both the long arm & short arm of\nthe chromosome involved. May be denoted as for example 46,XX, r(15).\n\nii. Isochromosome formation\n- results when one arm of a chromosome is lost & the remaining arm is duplicated, resulting\nin a chromosome consisting of 2 short arms only or 2 long arms only. The arm on one side\nof the centromere is a mirror image of the other. E.g. i(X)(q10) results in monosomy of the\ngenes on the short arm of X & trisomy of the genes on the long arm of X. (See Fig.9)\n\niii. Inversion\n- is reunion of a chromosome broken at 2 points, in which the internal segment is\nreinserted in an inverted position.\n- are compatible with normal development.\n\n\niv. Translocation.\n- is an exchange of chromosomal segments between 2 non-homologous chromosomes.\n- is denoted by a t followed by the involved chromosomes in numerical order.\nE.g. the translocation form of Downs syndrome is designated as t(14q;21q).\n- has 2 types (See Fig. 9):\n\na. Reciprocal (balanced translocation)\n- is a break in 2 chromosomes leading to an exchange of chromosomal material between\nthe two chromosomes. Since no genetic material is lost, balanced translocation is often\nclinically silent. But it can also cause disease as in the t(9,22) which causes chronic\nmyelogenous leukaemia.\n\nb. Robertsonian translocation\n- is a variant in which the long arms of 2 acrocentric chromosomes are joined with a\ncommon centromere, & the short arms are lost.\n\nBefore going into the discussion of some of the chromosomal disorders, it is good to\nremember what mosaicism is.\n- is the presence of 2 or more cell lines with different karyotypes in a single individual. In a\nmosaic individual, a normal diploid cell commonly coexists with an abnormal cell line.\nThe abnormal cell line may have a numerical or structural anomaly. A specific cell line\nmay be represented in all tissues or may be confined to single or multiple tissues. The\nexpression of the phenotype depends on the proportion & distribution of the abnormal\ncell line.\n- is caused by mitotic errors in early development (i.e. in the fertilized ovum/embryo).\n(See above).\n\n\nFig. 6.10. Types of structural anomalies (structural rearrangements) of chromosomes.\n\nC. Cytogenetic disorders involving autosomes\n- include:\no Down syndrome\no Edward syndrome\no Patau syndrome\no Chromosome 22q11 deletion syndrome\n\nDown syndrome\n- is the most frequent chromosomal disorder.\n- is caused by:-\n1. Trisomy 21\n- accounts for 95% of cases & its incidence increases with maternal age.\n- is produced usually (i.e. in 95% of cases of trisomy) by maternal meiotic\nnondisjunction. When the cause is paternal nondisjunction, there is no relation to\npaternal age.\n\n2. Translocation\n- accounts for 4% of all cases of Downs syndrome.\n- has no relation to maternal age.\n- is caused by paternal meiotic robertsonian translocation between chromosome 21 &\nanother chromosome. The fertilized ovum will have 3 chromosomes bearing the\nchromosome 21 material, the functional equivalent of trisomy 21.\n- leads to a familial form of Downs syndrome, with a significant risk of the syndrome in\nsubsequent children\n\n3. Mosaicism\n- accounts for 1% of cases.\n- usually shows a mixture of cells with 46 & 47 chromosomes.\n- results from mitotic nondisjunction of chromosome 21 during an early stage of\n- has milder symptoms depending on the proportion of the abnormal cells.\n- is not influenced by maternal age.\n\nDown syndrome\n- has the following clinical features:\no Severe mental retardation\no Broad (flat) nasal bridge & oblique palpebral fissure. Because of these features\nthe old name of this disease is mongolism.\no Epicanthic folds\no Wide-spaced eyes\no Large protruding tongue\no Small low-set ears\no Bruschfields spots (small white spots in the periphery of the iris).\no Short broad hands with curvature of the 5\nfinger, simian crease (a single palmar\no Unusually wide space between the 1\n& the 2\no Congenital heart disease (in about 40% of the cases).\no A 10 20 fold increased risk of developing acute leukaemia.\no Increased susceptibility to infection\no In patients surviving to middle age, morphologic changes similar to Alzheimers\n\n\nD. Cytogenetic disorders involving sex chromosomes\nThe following subtopics will be discussed below:\n1. General features\n2. Klinefelter syndrome\n3. Turner syndrome\n4. Disorders of sexual differentiation\n\n1. General features\nSex chromosomal disorders have the following general features:\na. They generally induce subtle, chronic problems relating to sexual development &\nb. They are often difficult to diagnose at birth & many are first recognized at the\ntime of puberty.\nc. The higher the number of the X chromosomes (both males & females), the higher\nthe likelihood of mental retardation.\nd. They are far more common than those related to autosomal aberrations.\ne. They are better tolerated than autosomal disorders. I.e. extreme karyotype\ndeviations in the sex chromosomes are compatible with life. This is due to the\nfollowing 2 factors that are unique to the sex chromosomes:\ni. The scant genetic information carried by the Y chromosome &\nii. The lyonization of the X chromosomes\n\ni. The scant genetic information carried by the Y chromosome:\nMost of the Y chromosome appears to be junk DNA i.e. repetitive sequences that are\nwithout function. But there are some essential genes on the Y chromosome such as the\ngenes which determine the testes, spermatogenesis, etc. The Y chromosome is both\nnecessary & sufficient for male development. Regardless of the number of the X\nchromosomes, the presence of a single Y chromosome leads to the male sex.\nii. The lyonization of the X chromosomes (X chromosome inactivation)\nIn normal female somatic cells, there are 2 X chromosomes, but most of the genes on\none of the X chromosomes are inactive. The process by which this occurs is called X\nchromosome inactivation or lyonization or Lyons hypothesis.\n\na. The X chromosome with most of the genes turned off is called the inactive X\nchromosome. The other one is called the active X chromosome.\n\nb. If a somatic cell contains more than one X chromosome, all but one are inactivated. E.g.1.\nIn a 47, XXY cell, there is one active & one inactive X chromosome (the Y chromosome\nis irrelevant to the process of X inactivation). E.g. 2 in a 49, XXXXX cell, there is one\nactive X chromosome & 4 inactive chromosomes\nc. X inactivation occurs early in embryogenesis among all cells of the bastocyst at about the\nday of embryonic life.\nd. The process of X inactivation is random in any single cell. Either the X chromosome\ninherited from the mother (called Xm) or the X chromosome inherited from the father\n(called Xp) may be inactivated with equal likelihood.\ne. Once X inactivation occurs in an embryonic cell, the same X chromosome remains\ninactivated in all of the progeny of that cell. Females are mosaics. On average, half of\nthe cells in a female have an inactive Xm & the other half of the cells have an inactive\nXp. However, some tissues (& some women ) may have substantially more cells with\none or the other X chromosome active by chance.\nf. X inactivation involves most, but not all, genes on the X chromosome. Some essential\ngenes must be expressed in 2 copies from both X chromosomes for normal growth &\ndevelopment. For this reason, some essential genes on the X chromosome escape X-\ninactivation. So if one of these essential genes is absent (as occurs in Turner\nsyndrome), it results in abnormal growth & development. Likewise, the presence of an\nextra X chromosome (as occurs in Klinefelter syndrome) leads to abnormal phenotype.\ng. The inactive X-chromosome may be visible in an interphase cell as a condensed mass of\nchromatin called the Barr body (X chromatin). The maximum number of Barr bodies\nseen in a cell is equal to the number of inactivated X chromosomes (i.e. one less than\nthe total number of X chromosomes in the cell). E.g. Normal females (46,XX) will have\none Barr body, & individuals with 3 chromosomes (XXX) will have 2 Barr bodies, & those\nwith 4 X chromosomes will have 3, & so on. Counting the number of Barr bodies in\nsomatic cells (usually in smears of buccal mucosa) is the basis of the sex chromatin test\nfor sex chromatin aneuplody. This test is no longer used in the Western countries\nbecause karyotyping is much more accurate.\nh. X-chromosome inactivation produces dosage compensation. Females normally have 2 X-\nchromosomes & males have only one. And most of the genes on the X chromosome do\nnot have homologues on the Y chromosome. Despite the fact that females have double\ndoses of most X-linked genes in comparison to males, the amount of X linked products\nis usually about the same in males & females. This dosage compensation is produced\nby X inactivation.\n\ni. X inactivation has the following clinical implications:\nmay express the mutant phenotype if most of her cells happen to have inactivated the X\nchromosome carrying the normal gene.\n2. A female carrier of an X-linked recessive disease may not detectable by gene product\nassays (e.g. by the amount of protein or enzyme activity) if most of her cells happen to\ninactivate the X chromosome carrying the mutant gene.\n3. Although monosomy (i.e. the presence of one instead of the normal 2 copies) for any\nautosome is lethal early in embryogenesis; monosomy for the X chromosome is relatively\ncommon in live born infants & produces a relatively mild phenotype called Turner\n4. Trisomy (i.e. the presence of 3 rather than the normal 2 copies) of the sex chromosomes\nproduces a much less severe phenotype than trisomy for any of the autosomes. Trisomy\nof the sex chromosomes produces phenotypic changes because of the triple dosage of\nthe essential genes on the X chromosomes (1 copy of these essential genes on the\nactive X chromosome & 2 copies of the activated escapee essential genes on the\ninactivated X chromosome). Points 3 & 4 above illustrate that aneuploidy of the sex\nchromosomes is better tolerated than the aneuploidy of the autosomes.\n2. Klinefelter syndrome\n- is a disorder that occurs when there are at least 2 X chromosomes & 1 or more Y\n- is most often characterized by the karyotype 47, XXY. Variants include additional X\nchromosomes (e.g. XXXY) & rare mosaic forms. In the typical XXY form, a single Barr\nbody is noted in the buccal smear preparations.\n- is caused by parental meiotic nondisjunction & incidence increases with maternal age.\n- is characterized by male hypogonadism & its secondary effects.\n- shows atrophic testes with decreased spermatogenesis which leads to infertility &\ndecreased testosterone production. In addition, it also shows increased plasma estradiol\nlevels (by unknown mechanism). The ratio of estrogens & testosterone determines the\ndegree of feminization.\n- therefore, shows lack of secondary male sexual characteristics (i.e. no deep voice, no\nbeard, no male distribution of pubic hair).\n\n- also shows tall stature (because fusion of the epiphyses is delayed), & eunuchoid\nappearance with gynecomastia.\n- is rarely associated with mental retardation, which is usually mild. The extent of\nretardation increases with increased number of X chromosomes.\n- is usually undiagnosed before puberty.\n3. Turner syndrome\n- is a disorder that occurs when there is a complete or partial monosomy of the X\n- is associated with one of the following 3 types of karyotypic abnormalities:\no 45,X karyotype ( in which no Barr bodies are seen in the buccal smear)\no mosaics (45, X cell plus one or more karyotypically normal or abnormal cell types)\no structural abnormalities of the X chromosomes which result in partial monosomy of\nthe X chromosome. E.g. deletion of one of the arms of the X chromosome.\nThis karyotypic heterogeneity associated with Turners syndrome is responsible for\nsignificant variations in phenotype. E.g. 45, XO causes a severe phenotype whereas\nmosaics may have a normal appearance with only primary amenorrhea.\n- is characterized by female hypogonadism & its secondary effects.\n- shows:-\no Replacement of the ovaries by fibrous streaks .\no Decreased estrogen production & increased pituitary gonadotropins from loss of\nfeedback inhibition.\no Infantile genitalia & poor breast development & little pubic hair.\no Short stature (rarely exceeding 150cm in height), webbed neck, shield-like chest\nwith widely spaced nipples, & wide carrying angles of the arms.\no Lymphedema of the extremities & neck.\no Congenital heart disease (especially preductal coarctation of the aorta & bicuspid\naortic valve).\n4. Disorders of sexual differentiation (Sexual ambiguity)\n- are said to be present when genetic sex, gonadal sex, or genital sex of an individual are\n\ni. Definitions\nThe sex of an individual can be defined on many levels:-\n1. Genetic sex\n- is determined by the presence or absence of a Y chromosome. No matter how many X\nchromosomes are present, the presence of a single Y chromosome leads to testicular\ndevelopment & a genetic male. At least one Y chromosome is necessary & sufficient for\nmale gender to manifest.\n2. Gonadal sex\n- is determined by the presence of ovaries or testes. The gene responsible for the\ndevelopment of the testes is localized to the Y chromosome.\n3. Ductal sex\n- depends on the presence of derivatives of the Mullerian or Wolffian ducts.\n4. Phenotypic or genital sex\n- is based on the appearance of the external genitalia.\nSexual ambiguity is present whenever there is discordance among these various criteria for\ndetermining sex.\nii. True hermaphrodite\n- is very rare.\n- has both ovaries & testicular tissue, with ambiguous external genitalia.\n- may result from the fusion of 2 sperms (one X-carrying sperm & one Y-carrying sperm)\nwith a binucleated ovum.\niii. Pseudohermaphrodite\n- shows discordance between the phenotypic sex & gonadal sex.\n- i.e. has gonads of only one sex, but the appearance of the external genitalia does not\ncorrespond to the gonads present. Thus, a male pseudohermaphrodite has testicular\ntissue but female-type genitalia. A female pseudohermaphrodite has a ovaries but male\nexternal genitalia (or the external genitalia are not clearly male).\n\n1. Female pseudohermaphroditism\n- is caused by exposure of the fetus to increased androgenic hormones during the early part\nof gestation as occurs in congenital adrenal hyperplasia, androgen-secreting ovarian or\nadrenal tumor in the mother, or hormones administered to the mother during pregnancy.\n2. Male pseudohermaphroditism\n- has a Y chromosome & only testes but the genital ducts or the external genitalia are either\nambiguous or completely female.\n- may be caused by tissue resistance to androgens (called testicular feminization), by\ndefects in testosterone synthesis, or by estrogens administered to the mother during\nV. Disorders with multifactorial inheritance\n- are more common than mendelian disorders.\n- result from the combined actions of environmental factors & 2 or more mutant genes\nhaving additive effects (i.e. the greater the number of inherited mutant genes, the more\nsevere the phenotypic expression of the disease). The disease clinically manifests only\nwhen the combined influences of the genes & the environment cross a certain threshold.\n- include such common diseases as:-\no Diabetes mellitus,\no Hypertension,\no Ischemic heart disease,\no Gout,\no Schizophrenia,\no Bipolar disorders,\no Neural tube defects,\no Cleft lip/ cleft palate,\no Pyloric stenosis,\no Congenital heart disease, etc.\n- are characterized by the following features:-\n1. The risk of expressing a multifactorial disorder partly depends on the number of inherited\nmutant genes.\nHence, if a patient has more severe expression of the disease, then his relatives have a\ngreater risk of expressing the disease (because they have a higher chance inheriting a\n\ngreater number of the mutant gene). In addition, the greater the number of affected\nrelatives, the higher the risk for other relatives.\n2. The risk of recurrence of the disorder is the same for all first degree relatives of the\naffected individual & this is in the range of 2-7%. First-degree relatives are parents,\nsiblings, & offspring. Hence, if parents have had one affected child, then risk that the next\nchild will be affected is between 2 & 7%. Similarly, there is the same chance that one of\nthe parents will be affected.\n3. The concordance rate for identical twins (i.e. the probability that both identical twins will\nbe affected) is 20 40% but this is much greater than the concordance rate for non-\nidentical twins.\n4. The risk of recurrence of the phenotypic abnormality in subsequent pregnancies depends\non the outcome in previous pregnancies. When one child is affected, the chance that the\nnext child will be affected is 7%. When 2 children are affected, then the chance that the\nnext child will be affected increases to 9%.\n\nVII. Single gene disorders with nonclassic inheritance\n\n- are rare & are briefly mentioned here.\n- can be classified into the following categories:\nA. Diseases caused by mutations in mitochondrial genes.\nE.g. Leber hereditary optic neuropathy\nB. Diseases associated with genomic imprinting\nE.g. Prader-Willi syndrome, Angelman syndrome\nC. Diseases associated with gonadal mosaicism\nGonadal mosaicism can explain unusual pedigrees seen in some autosomal\ndominant disorders such as osteogenesis imperfecta in which phenotypically\nnormal parents have more than one affected children. This cannot be explained by\nnew mutations. Instead, it can be explained by gonadal mosaicism\nD. Disorders caused by triplet repeat mutations\nE.g. Fragile X syndrome\n- is the second most frequent cause of hereditary mental retardation next to Down\n- is clinically manifest in both males & females. In males, it is characterized by bilateral\nmacro-orchidism (enlarged testes).\n\nVIII. Review Exerecise\n\n1. What is mutation? List the various types of mutations & discuss their effects by giving\nexamples for each type.\n2. What are the 4 major categories of genetic diseases?\n3. Classify mendelian disorders based on their patterns of inheritance.\n4. Explain the criteria, the pathogenesis, & give clinical examples for the 3 main mendelian\npatterns of inheritance.\n5. Explain the general pathogenesis of mendelian disorders associated with enzyme\n6. Discuss the various types of numerical & structural chromosomal anomalies.\n7. Describe meiotic & mitotic nondisjunction.\n8. What is Down syndrome? Describe its causes & its clinical features.\n9. What are the clinical consequences of X chromosome inactivation?\n10. Describe the karyotypes & the clinical features of Turner syndrome Hypofunction of\nwhich organ can explain these clinical features?\n11. Describe the cause, the karyotypes, & the clinical features of Klinefelter syndrome.\nHypofunction of which organ can explain these clinical features?\n12. W/ro Almaz is pregnant for the second time. Her first child, Abebe has disease X. W/ro\nAlmaz has 2 brothers, Tesfaye & Fantu, & a sister Desta. Fantu & Desta are unmarried.\nTesfaye is married to an unrelated woman called Tenagne, & has a 2 year old\ndaughter, Mimi. W/ro Almazs parents are Ato Kebede & W/ro Beletech. Beletechs\nsister who is called W/ro Kelemuwa is the mother of W/ro Almazs husband, Ato Worku,\nwho is 25 years old. There is no previous family history of disease X.\na. Draw the pedigree using standard symbols.\nb. What is the pattern of transmission of the of disease X, & what is the risk of\ndisease X for W/ro Almazs next child?\nc. Which people in this pedigree are necessarily heterozygores?\n13. What does the term multifactorial inheritance mean? Mention some common\nmultifactorial disorders. Describe the 4 common general features of multifactorial\n\n\n\n1. Thompson MW, et al: Thomson & Thomson Genetics in Medicine, 5\ned. Philadelphia,\nWB Saunders, 1991.\n2. Cotran RS, et al: Genetic disorders. In Cotran RS, et al: Robbins Pathologic Basis of\nDisease, 6\ned. Philadelphia, WB Saunders, 1999, pp 139 186.\n3. Friedman JM et al: Genetics (National Medical Series{NMS} for independent study), 2\n\ned. Baltimore, Williams & Wilkins, 1996.\n4. Schneider AS, Szanto PA: Genetic disorders. In Schneider AS, Szanto PA: Pathology\n(Board review series), 1\ned., Williams & Wilkins, 1993.\n5. Beaudet AL: Genetics & disease. In Fauci AS, et al (eds): Harrisons principles of internal\nmedicine, 14\ned, McGraw-Hill, 1998.\n6. Cell biology\n7. Lippincots Biochemistry\n\nI. Learning objectives\n\nAt the end of the chapter, the student is expected to:\n1. Learn mechanisms and examples of hypersensitivity reaction\n2. Understand etiologic factors in autoimmune diseases\n3. Have birds eye view concept on immunodeficiency states\nBefore reading this chapter, the student is advised to review his/her immunology text or\nlecture note.\nDisorders of the immune system are divided into three broad categories:\n1. Hypersensitivity reactions (immunologically mediated tissue injury)\n2. Autoimmune diseases\n3. Immunodeficiency diseases\nWe will discuss these categories sequentially.\n\nII. Hypersensitivity Reactions\n\nThe purpose of the immune response is to protect against invasion by foreign organisms,\nbut they often lead to host tissue damage. An exaggerated immune response that results in\ntissue injury is broadly referred to as a hypersensitivity reaction.\n\na. According to Gell and Combs classification, hypersensitivity reactions can be divided\ninto four types (type I, II, III, and IV) depending on the mechanism of immune recognition\ninvolved and on the inflammatory mediator system recruited.\nb. Types I II, and III reactions are dependent on the interaction of specific antibodies with\nthe given antigen, whereas, in type IV reactions recognition is achieved by antigen\nreceptors on T-cells.\n\n1) Type I hypersensitivity (anaphylactic or immediate type) reaction\n\nDefinition: Type I hypersensitivity reaction may be defined as a rapidly developing\nImmunologic reaction occurring, within minutes after the combination of an antigen with\nantibody bound to mast cells or basophilic in individuals previously sensitized o the antigen.\nThe reactions depend on the site of antigen exposure for example in skin hive, upper\nrespiratory tract Hay fever, bronchial asthma and systemic reaction anaphylactic\n\n-Presentation of the antigen (allergen) to precursor of TH2cells by antigen presenting\ndendritic cells on epithelial surfaces\nNewly minted TH2 cells produce clusters of cytokines including IL-3,IL-4,IL-5 and GM-\nThe IL-4 is essential for activation of B cells to produce IgE and IL-3 and IL-5 are\nimportant for the survival of eosinophillic activation\nThe IgE antibodies produced has a high affinity to attach to mast cells and basophiles\nA mast cell or basophil armed with cytophilic IgE antibodies is re-exposed to the specific\nIn this process multivalent antigens binds to more than one IgE molecules and cause\ncross-linkage with adjacent IgE antibody.\nThis bridging of IgE molecules activates signal transduction pathways from cytoplasmic\nportion of IgE fc receptors. This signal initiates two parallel but independent processes.\nOne leading to mast cell degranulation with discharge of preformed (primary) mediators\nand the other involving denovo synthesis and release of secondary mediators.\n(I) Mast cell degranulation discharge preformed granules such as primary mediators\nincluding biogenic amines, histamine, adenosine, eosinophlic and neutrophlic\nchemotactic factors, enzymes including proteases, and several acid hydrolases.\n(II) The other involved is de novo synthesis and release of secondary mediators\nsuch as arachidomic metabolites\n- Leukotriens C\n& D\nmost potent vasoactive and spasmogenic agents\nknown by highly chemotatic for neutrophiles, eosinophiles and monocytes\n- Prostaglandin D\ncauses intense bronchospasm & increase mucus\n- Platelet-activating factor release histamine, ed vascular permeability\n- Cytokinesactivation of inflammatory cells\n\n- Thus, type I reactions have two well-defined phases.\na. Initial phase (response):\nCharacterized by vasodilatation, vascular leakage, and depending on the\nlocation, smooth muscle spasm or glandular secretions.\nb. Late phase\nAs it is manifested for example in allergic rhinitis and bronchial asthma, more\nintense infiltration of eosinophiles, neutrophiles, basophilic, monocytes and CD4\n+ T cells are encountered and so does tissue destruction (epithelial mucosal\nMast cells and basophiles are central to the development of Type I reaction.\nMast cells are bone marrow driven cells widely distributed in tissues around\nblood vessels, and sub epithelial sites where type I reaction occurs.\n\nHistamine and leukotriens are released rapidly from sensitized mast cells and are\nresponsible for intense immediate reaction characterized by edema, mucous\nsecretions and smooth muscles spasms.\nOthers exemplified by leukotriens platelet activating factor (PAF), TNF- and cytokines\nare responsible for the late phase response by recruiting additional leukocytes,\nbasophilic neutrophiles and eosinophiles. These cells secrete other waves of\nmediators and thus, damage epithelial cells.\nEosinophiles are particularly important in the late phase. The armamentarium of\neosinophiles is as extensive as the mast cells.\nPrototype example of Morphologic features in type l reactions is exemplified by\nbronchial asthma with\n-Increased mucous glands with resultant mucous secretion\n-Hypertrophy of bronchial smooth muscles with attending brochoconstriction\n-Edema formations with inflammatory cells infiltrations peribronchially\n\n2) Type II hypersensitivity reaction\n\nDefinition:Type II hypersensitivity is mediated by antibodies directed towards antigens\npresent on the surface of exogenous antigens.\nThree different antibody-dependent mechanisms are involved in this type of reaction\n\n(i) Complement-dependent reaction\n\ni. Direct lysis:\na) It is effected by complements activation, formation of membrane attack complex (C5\n9). This membrane attack complex then disrupts cell membrane integrity by drilling a\nhole. In anucleated cells once and in nucleated cells many attacks of the complex are\nneeded for cell lysis, because the latter ones have abilities to repair cell membrane\ninjuries rapidly.\nb) Opsoinization: By C3b, fragment of the complement to the cell surface enhances\nExamples include red blood cells, leukocytes and platelets disorders: Transfusion reaction;\nhaemolytic anemia; Agranuloytosis; Thrombocytopenia; Certain drug reaction\n\nii. Antibody dependent cell - mediated cytotoxicity /ADCC/\nThis type of antibody mediated Cell injury does not involve fixation of complements.\nThe target cells coated with IgG antibodies are killed by a variety of nonsensitized\ncells that have Fc receptors.\nThe non-sensitized cells included in ADCC are monocytes/large granular/ lympholytes\n/ Natural killer cells, neutrophils and eosinophils.\nThe cell lysis proceeds without phagocytosis. Example include graft rejection\n\niii. Antibody-mediated cellular dysfunction\nIn some cases, antibodies directed against cell surface receptors impair or\ndysregulated function without causing cell injury or inflammation. For example: In\nMyasthenia Gravis, antibodies reactive with acetylcholine receptors in the motor end\nplates of skeletal muscles impair neuromuscular transmission and cause muscle\nThe converse is noted in Graves disease where antibodies against the thyroid-\nstimulating hormone receptor on thyroid epithelial cells stimulate the cells to produce\nmore thyroid hormones.\n\n3) Type III hypersensetivity / immune complex-mediated\n\nType III hypersensitivity reaction is induced by antigen-antibody complex that produces\ntissue damage as a result of their capacity to activate the complement system. The\nantibodies involved in this reaction are IgG, IgM or IgA.\n\n\nSources of antigens include:\na. Exogenous origin Bacteria streptococcus (infective endocarditis) Viruses Hepatitis B\nvirus (Polyarteritis nodosa) Fungi Actinomycetes (farmers lung) Parasites\nplasmodium species (glomerulonephritis) Drugs quinidin (hemolytic anemia) Foreign\nserum (serum sickness)\nb. Endogeneous origin\nNuclear components (systemic lupus erythematosis) Immunoglobulins (rheumatoid\narthritis) Tumour antigen (glomerulonephritis) Therefore, autoimmune diseases are\nhypersensitivity diseases in which the exaggerated immune response is directed against\nthe self antigens as exemplified by the above three diseases.\n\nThe pathogenesis of systemic immune complex diseases has three phases:\n\na. Formation of Ag-Ab complex\nIntroduction of an antigen into the circulation, then Production of specific antibodies\nby immuno-competent cells and subsequent antigen antibody formation\nb. Deposition of immune complexes\nThe mere formation of antigen-antibody complex in the circulation does not imply\npresence of disease.\nImmune deposition depends on:\ni) Size of immune complexes. Large complexes in great antibody excess are rapidly\nremoved by mononuclear phagocytic system (MPS).Most pathogenic ones are of\nsmall or intermediate size / formed in slight Ag excess/\nii) Functional status of MPS: MPS clears circulating immune complexes however, its\noverload or dysfunction increase the persistence of immune complexes in circulation\nand resulting in tissue depositions.\nOther factors for immune deposition include charge of immune complexes, valence\nof antigen, avidity of the antibody, affinity of the antigen to various tissue components,\nthree-dimenstional /lattice/ structure of the complex, hemodynamic factors, etc.\nSites of immune complex deposition include:\nRenal glomeruli, joints, skin, heart, serosal surfaces, & small blood vessels\n\n\nc. Inflammatory reaction\nAfter immune complexes are deposited in tissues acute inflammatory reactions\nensues and the damage is similar despite the nature and location of tissues. Due to\nthis inflammatory phase two mechanisms operate\ni) Activation of complement cascades:\n- C-3b, the opsonizing, and -C-5 fragments, the chemotaxins are characterized by\nneutrophlic aggregation, phagocytosis of complexes and release of lysosomal\nenzymes that result in necrosis.-C3a, C5a anaphylatoxins contribute to vascular\npermeability and contraction of smooth muscles that result in vasodilation and\nedema-C5-9 membrane attack complexes formation leads to cell lysis (necrosis)\nii) Activation of neutrophiles and macrophages through their Fc receptors.Neutorphiles\nand macrophages can be activates by immune complexes even in absence of\ncomplements. With either scenario, phagocytosis of immune complexes is effected\nwith subsequent release of chemical mediators at site of immune deposition and\nsubsequent tissue necrosis.\n\nMorphology of immune complex-mediated hypersensitivity reaction\nThe morphologic consequences are dominated by acute necrotizing vasculitis with\nintense neutrophilic exudation permiting the entire arterial wall. Affected glomeruli are\nhyper cellular with proliferation of endothelial and mesengial cells accompanied by\nneutrophillic and mononuclear infiltration. Arthritis may also occur.\n\nClassification of immune complex-mediated diseases:\nImmune complex-mediated diseases can be categorized into systemic immune complexes\ndiseases (e.g. serum sickness) and localized diseases (e.g.Arthus reaction).\n\nSystemic immune-complex diseases:\nAcute forms: If the disease results from a single large exposure of antigen / ex: acute\npost-streptococal glomerulonephritis and acute serum sickness/ all lesion then tend\nto resolve owing to catabolism of the immune complexes.\n\nArthus reaction:\nThe Arthur reaction is defined as a localized area of tissue necrosis resulting from an\nimmune complex vasculitis usually elicited in the skin. Arthus reaction occurs at site of\ninoculation of an antigen and depends on the presence of precipitating antibody in the\n\ncirculation / with antibody excess/ that resulted in immune complex deposition.\nInflammatory reaction develops over 4-8 hours and may progress to tissue necrosis as\ndescribed above.\nChronic forms of systemic immune complex diseases result from repeated or\nprolonged exposure of an antigen. Continuous antigen is necessary for the\ndevelopment of chronic immune complex disease. Excess ones are most likely to be\ndeposited in vascular beds.\n\nClinical examples of systemic immune complex diseases:\nVarious types of glomerulonephritis\nRhematic fever\nVarious vasculitides\nQuartan nephropathy\nSystemic lupus erytomatosis\nRheumatoid arthritis\n\n4) Type IV hypersensitivity (Cell-mediated) reaction\n\nDefinition: The cell-mediated type of hypersensitivity is initiated by specifically sensitized T-\nlymphocytes. It includes the classic delayed type hypersensitivity reactions initiated by\nCD4+Tcell and direct cell cytotoxicity mediated by CD8+Tcell. Typical variety of intracellular\nmicrobial agents including M. tuberculosis and so many viruses, fungi, as well as contact\ndermatitis and graft rejection are examples of type IV reactions\n\nThe two forms of type IV hypersensitivity are:\n1. Delayed type hypersensitivity: this is typically seen in tuberculin reaction, which is\nproduced by the intra-cutaneous injection of tuberculin, a protein lipopolysaccharide\ncomponent of the tubercle bacilli.\n\nSteps involved in type lV reaction include\na. First the individual is exposed to an antigen for example to the tubercle bacilli where\nsurface monocytes or epidermal dendritic (Langhanes) cells engulf the bacilli and\npresent it to nave CD4+ T-cells through MHC type ll antigens found on surfaces of\nantigen presenting cells (APC),\nb. The initial macrophage (APC) and lymphocytes interactions result in differentiation of\nCD4+TH type one cells\n\nc. Some of these activated cells so formed enter into the circulation and remain in the\nmemory pool of T cells for long period of time.\nd. An intracutanous injection of the tuberculin for example to a person previously\nexposed individual to the tubercle bacilli , the memory TH1 cells interact with the\nantigen on the surface of APC and are activated with formation of granulomatous\n\n2. T-cell mediated cytotoxicity\nIn this variant of type IV reaction, sensitized CD8+T cells kill antigen-bearing cells. Such\neffector cells are called cytotoxic T lymphocytes (CTLs). CTLs are directed against cell\nsurface of MHC type l antigens and it plays an important role in graft rejection and in\nresistance to viral infections. It is believed that many tumour-associated antigens are\neffected by CTLs. Two mechanisms by which CTLs cause T cell damage are:\nPreforin-Granzyme dependant killing where perforin drill a hole into the cell membrane\nwith resultant osmotic lysis and granzyme activates apoptosis of the target cells\nFAS-FAS ligand dependant killing which induce apoptosis of the target cells\n\nIII. Immunologic Tolerance\n\nImmunologic tolerance is a state in which an individual is incapable of developing an\nimmune response to specific antigens. Self-tolerance refers to lack of responsiveness to an\nindividuals antigens. Tolerance can be broadly classified into two groups: central and\nperipheral tolerance.\ni) Central tolerance\nThis refers to clonal deletion where immature clones of T and B-lymphocytes that bear\nreceptors for self-antigens are eliminated from the immune system during development\nin central lymphoid organs. T cells that bear receptors from self-antigens undergo\napoptosis within/ during the process of T-cell maturation.\nii) Peripheral tolerance\n1. Clonal deletion by activationinduced cell death. The engagement of Fas by Fas\nligand co-expressed on activated T-cells dampens the immune response by inducing\napotosis of activated T-cells ( Fas mediated apoptosis)\n2. Clonal anergy: Activaton of Ag specific T-cell requires two signals\na). Recognition of peptide Ag wtih self-MHC molecules\n\nb). Co-stimulatory signals such as CD 28 must bind to their ligand called B7-1 and B7-\n2 on antigen presenting cells (APC) and if the Ag is presented by cell that do not\nbear CD 28 ligand /i.e B7-1 or B7-2/ a negative signal is delivered and the cell\nbecomes anergic.\niii). Peripheral suppression by T- cell suppressor.\nThere are some evidence that peripheral suppression of autoreactivity may be\nmediated in part by the regulated secretion of cytokines.\nThe CD+ T cells of the TH2 type have been implicated in mediating self-tolerance by\nregulating the functions of pathogenic TH1 type cells. Cytokines produced by TH2 T\ncell can down regulate autoreactive CD+Th1 by elaborating IL-4, IL-10 and TGF-B.\n\nWhen normal tolerance of the self antigens by the immune system fails, autoimmune\ndiseases result.\n\nIV. Autoimmune Diseases\n\nDefinition: Autoimmunity implies that an immune response has been generated against\nself-antigens /Autoantigens/. Central to the concept of autoimmune diseases is a\nbreakdown of the ability of the immune system to differentiate between self and non-self\nantigens. The presence of circulating autoantibodies does not necessarily indicate the\npresence of autoimmune disease. Thus, pathologic autoimmunity is characterized by\nthe autoimmune response is not secondary to tissue injury but it has primary pathologic\nAbsence of other well-defined cause of disease.\n\nMechanisms of autoimmune diseases\n1. Genetic: Evidences include\n-Familial clustering of several diseases such as SLE, autoimmune hemolytic anemia,\nHashimotos thyroditis.\n-linkage of several autoimmune diseases such as Hashimotos thyroditis, pernicious\nanemia, Addion's disease, primary hypothyroidism, etc so-called Schmidts syndrome.\n-Induction of autoimmune diseases with HLA especially class ll antigens exemplified\nby HLA-B27\n\n2. Immunologic:\nFailure of peripheral tolerance: Breakdown of T-cell anergy\nT-cell anergy may be broken if the APC can be induced to express co-stimulatory\nmolecules such as B7-1 and to secrete cytokines such as IL-12 that stimulate the\ngeneration of TH 1 cells. This up regulation of co-stimulator molecule B7-1 has been\nnoted in multiple sclerosis, Rheumatoid arthritis, psoriasis and Insulin dependant\ndiabetes mellitus (IDD).\nFailure of activation induced cell death defects in Fas Fas ligand\nSystem in generating apoptosis may allow persistence and proliferation of auto\nreactive T- cells in peripheral tissues. No known disease is incremented but SLE\nsuggested only on experimental basis.\nFailure of T-cell mediated suppression\nLoss of regulatory or suppressor T-cells can limit the function of auto reactive T and\nB cells and thus, can lead to autoimmunity. There is evidence that patients with SLE\nhave a deficiency of T-suppressor cells activity that would result in\nhypergamaglobinmea and the production of autoantibodies.\nMolecular mimicry (cross reacting antigens).\nSome infections agents share epitopes with self-antigens. An immune response\nagainst such microbes may produce tissue-damaging reactions against the cross-\nreacting self-antigen.\nThe classic example is streptococcal pharyngitis, in which antibodies are produced\nto the streptococcal M protein and cross-react with M protein of the sarcolemma\nof cardiac muscle to produce the acute rheumatic fever. Another example is the\nimmunologic cross-reactivity between the glycoprotein D of the herpes simplex virus\nand certain bacterial antigens with acetylcholine receptor.\nPolyclonal B-lymphocytic activation\nTolerance in some cases is maintained by clonal anergy. Autoimmunity may occur\nif such self reactive but anergic clones are stimulated by antigen-independent\nmechanisms.Several micro-organisms and their products are capable of polyclonal\n(i.e antigen nonspecific) activation of B cells.Examples include Epestein-barr virus\n(in infections mononucleosis), gram-negative lipopolysaccharides (endotoxins).\nAmong the T-cells activated by super-antigens, some may be reactive to self-\nantigens and thus, autoimmunity may result from arousal of such cells (Certain\nbacterial products can bind to and activate a large pool of CD4 + T-cells in an\nantigen independent manner. They do so by binding to class II MHC molecules on\n\nAPCs and the (beta) B. chains of the T-cell receptor (TCR) outside the antigen\nbinding groove. Because they stimulate all T-cells they are called superantigens)\nRelease of sequestrated antigens\nRegardless of the exact mechanism by which self-tolerance is achieved (clonal\ndeletion or anergy), it is clear that induction of tolerance requires interaction between\nthe antigen and the immune system. Thus, any self-antigen that is completely\nsequestrated during development is likely to be viewed as foreign if introduced into\nthe circulation, and an immune response develops.\nExamples include the release of crystalline from the lens of the eye during cataract\nextraction, or antigens from the uveal tract due to trauma, is followed by autoimmune\nuveitis. Agglutinating antibodies to spermatozoa may be produced following testicular\ntrauma or rupture of an epidermal retention cyst.\nThe mere release of antigens is not sufficient to cause autoimmunity; the\ninflammation associated with the tissue injury is essential.\n3. Microbial agents:\nSome bacteria, mycoplasm and viruses are implicated. Viruses and other microbes\nmay share cross-reacting epitopes with self-antigens. Example: Cross-reaction\nbetween certain coxsackieviruses and islet cells antigen glutamic acid\ndecarboxylase. Microbial infections with resultant tissue necrosis and inflammation\ncan cause up regulation of co-stimulatory molecules on resting antigen-presenting\ncells in tissue, thus favouring a breakdown of T- cell anergy. The inflammatory\nresponse also facilitates presentation of cryptic antigens, and thus induces epitope\n\nClassification of autoimmune diseases\n\nThe classification is based on the number of organs involved\nOrgan specific autoimmune diseases affect a single organ or tissue including\nHashimotos thyroiditis, Graves disease, 1\nmyxedema, Diabetes, chronic atropic\ngastritis, Myasthenia gravis\nOrgan nonspecific autoimmune diseases affect many organs and tissues including\nSystemic lupus erythematosus\nRheumatoid arthritis\nSystemic sclerosis\n\nPolyarteritis Nodosa\nSojourns syndrome\nHere, only SLE (a prototype of autoimmune diseases) is given as an illustration.\n\nSystemic lupus erythematosis (SLE)\ndisease characterized by a bewildering array of autoantibodies particularly antinuclear\nantibodies (ANAS).\ninjury to the skin, joints, kidney and serosal membranes. Each and very part of the\nto male ratio of 9:1, pick on set 2\nto 4\nEtiology and pathogenesis\nfactorial origin resulting from interactions including:\n1. Genetic factors\nin early complement components (C\nor C\n) etc.MHC regulates production of specific\n2. Hormonal factors\naccelerate during pregnancy and menses. Androgens however, confer decreased risk\n3. Environmental factors\nDrugs such as hydralazine, pencillin etc induce SLE like illness ) in which all acting in\nseveral species of autoantibodies.\nUltraviolet rays\nEmotional stress\n4. Immunologic factors\ni) B cell hyperactivity with hypergammaglobulinemia\n\nii) Autoantibodies present with reactivity to DNA, RNA, or phospholipids thus, antinuclear\ninto four categories\n1. Antibodies to DNA\n2. Antibodies to history\n3. Antibodies to non-histone proteins bound to RNA\n4. Antibodies to nucleolar antigens\n(other autoimmunity positivity. Regardless of the exact sequence by which\nautoantibodies are formed, they are clearly the mediators of tissue injury. Type III\nhypersensitivity reaction is responsible for most visceral lesions. DNA anti DNA\ncomplexes can be detected in the glomeruli and small blood vessels. Autoantibodies\nagainst red cells, white cells and platelets mediate their effects via type II\nbecome homogenous to produce so called lupus erythematous (LE) bodies or\nthat has engulfed the denatured nucleus of an injured cell.\nSerum complement levels often decreased due to immune mediated compliment\nIt is mostly IgG type, lesser extent of the IgM type\n\nClinicopathologic features\nTypically the patients young woman with a butterfly rash over the face\nGenerally the course of the disease is varible and almost unpredictable\ndiagnostic of SLE\nheterogenicity in clinical presentation requires a clinical index of suspicion followed by\ndisorder, immunologic disorder and antinuclear antibody.\n\nMorphologic changes in SLE are also extremely variable. The most characteristic\narterioles is characterized by fibrinoid necrosis.\nKidney: 60 70% involvement by SLE. AntidsDNA (60-90%associated with nephritis\nWHO morphologic classification of the renal lesions of SLE:\nClass I Normal light etc microscopy\nII Mesengial glomerulonephritis\nIII focal proliferative glomerulonephritis\nIV diffuse proliferative glomerulonephritis\nV membranous glomerulonephritis\nSkin: Acute lesions butterfly rash (50%) where histology shows liqufactive\naccentuates the erythema. Chronic lesion: Descoid ( plaques with scales, scarring\nwith central atrophy)\nJoints: Arthralgia or non erosive synovitis (unlike rheumatoid arthritis) with little\npsychosis and organic brain syndrome.\nvarrucous endocarditis (Libbman sacks endocarditis) is a warty deposition of valvular\nwalls. Accelerated coronary atherosclerosis with evidence of angina pectoris and\nmyocardial infection.\nSpleen - is moderately enlarged with focal hyperplasia\n\nV. Immunodeficiency Diseases\n\nThe term immunodeficiency covers a group of disorders of specific immune responses,\nneutrophil, macrophage and natural killer cells functions, as well as defects in the\ncompliment system that lead to impaired resistance to microbial infections.\n\nClassification These diseases are crudely classified into primary and secondary types.\n1) Primary immunodeficiency diseases (exceedingly rare)\nThese disorders usually manifest in early childhood and are almost always genetically\ndetermined. Though, some overlap exists primary immunodeficiency diseases are\nfurther divided into:\nDeficiencies of antibody (B cells) immunity.\nEg. Infantile X-linked agammaglobinmea\nTransient hypogammaglobulinmea of infancy\nDeficiencies of cell mediated (T-cell) Immunity\nT-cell deficiencies are difficult to trace as T-cells affects B cell functions\nEg. Di Georges syndrome:\nCombined T-cell and B-cell deficiencies\nEg Severe combined immunodeficiency disease (SCID).\n\n2) Secondary immunodeficiencies States\nThese immunodeficiency states may be acquired secondary to various disease processes\nor drug effects\nProtein deficiency\nLack of protein leads to cell mediated immunity and hypocomplementamia\nHematologic malignancies\nLeukemia and lymphomas where normal functioning cell replaced by neoplastic ones\nhere both humeral and cell mediated immunity are impaired\nAcute viral infection\nEspecially infectious mononucleosis and misels cause temporary impairment of cell-\nmediated immunity\nChronic renal failure\nProbably due to toxic effects of accumulated metabolites that affects both B and T-\ncell functions\n\nSteroids etc for organ transplants, cytotoxic drugs or radiotherapy for the treatment of\nAfter staging operations of lymphomas or traumatic spleen rupture\nSplenectomy leads to a characteristic immunodeficiency in which the patient is\nsusceptible to infections by phylogenic bacteria especially pneumococal pneumonia.\nAcquired immunodeficiency syndrome (AIDS)\nAs a prototype example of secondary immunodeficiency states, AIDS is discussed in\nsome detail below.\n\nAcquired Immunodeficiency Syndrome (AIDS)\n\nAIDS is a retroviral disease characterized by profound immuno suppression that leads\nto opportunistic infections, secondary neoplasms and neurological manifestations.\n\nPrevalence: Currently AIDS affects more than 40 million people all over the world and\nmore than 90 % of the infections prevail in developing countries. Currently, the sub-\nSaharan Africa in general and South Africa, Ethiopia and Nigeria in particular shoulder\nthe greatest burden of this pan endemic.\nAge: Mostly affected individuals are those aged between 15 and 49 years of age\nhowever, the epidemiology is quite different in children less than 13 years. Close to 2\n% of all AIDS, occur in this age group presently where more than 90 % of this\ntransmission results from transmission of the virus from the mother to the child.\nSex: Women are more vulnerable than men:\nReceptive sexual partners-\nUterine, cervical and vaginal conditions that promote HIV transmission easily\ninclude cervical erosion, cervical ectopy, sexually transmitted diseases (STD),\nand cervical cancer.\nSTD often goes unnoticed due to inaccessible anatomic locations.\nMenstruation: May make the transmission of HIV easier just before, during or\nafter menstruation. It results in a large raw exposed area in the inner uterine\nlining to the virus\nThose with very low socio economic backgrounds are vulnerable to sex trade\n(HIV is said to be the holocaust of the poor).\n\nAge of earlier sexual contact where the very young female genital linings are\nvulnerable to easy lacerations.\n\nModes of transmission:\nSexual activities 75% of all world-wide transmission is heterosexual transmission\nParenteral transmission In intravenous drug abusers, hemophiliacs who received\nfactor viii concentrates and random recipients of blood transfusion\nMother to child transmission\nAbout 25 30% HIV, positive mother will transmit HIV to their infants.About 60% of this\ninfection is transmitted during child- birth 25% during pregnancy and 15% during breast-\nNeedle Pricking Accidental needle struck injury or exposure to non-intact skin to\ninfected blood in laboratories accounts for about 0.3% risk of stereovision as compared\nto a 30% risk of accidental exposure to hepatitis B infected blood.\n\n\nHIV causes AIDS and HIV is a non-transforming retrovirus belonging to Lentivirus\nfamily. The retrovirus undergoes an unusual biologic process in which the genetic\nmaterial in form of a single stranded RNA, can be converted to double stranded DNA\nby the effect of reverse transcriptase.\nTwo type of HIV viruses\nHIV 1 - USA, EUROPE, East & central Africa\nHIV - 2 - West Africa\nHIV genome consists of a single stranded RNA enclosed within a core of viral\nproteins. The core is in-turn enveloped by a phospholipids bilayer deprived from the\nhost cell membrane. The Envelop contains glycoproteins such as gp 120 and GP 41,\nGP 24.\n\nR coreproteins\n\nThe viral core consists of two protein shells\nThe outer contains the core protein P 18 and the inner core protein P 24. The lipid\nbilayer consists of the viral glycoprotein gp 41 while gp 120 protrudes into the\nenvironment. The RNA genome and the reverse transcriptase are contained within the\ninner shell.\nHIV 1 proviral genome contains 3 genes -Gag caspid protein P\n, matrix protein\n, nuclocospial protein P\n\n- Pol - revers trancriptase, protease integrase, ribonuclease\n- Env gp\nand gp\n\nIn addition to these standard genes, the HIV contains other genes including\nTAT- Potent transactivator of viral transcription\nNEF- Essential for viral replication\nREV- regulator of structural gene expression\nVIF- Requires for maturation of HIV virus and if also promotes infectivity of cell free virus\nVEF- essential for efficient viral replication\nVPU- Required for efficient viron budding\nVPR Required for viral replication in non-dividing cells and causing viral replication by\ncausing arrest of cycling cells in G\nOn the basis of genetic analysis HIV- I can be divided into two groups designated as M\n(major) and 0 (outliers). Group M viruses are the most common viruses worldwide and\nsubdivided into several subtypes or clades designated A -J.\nThe HIV strains can be classified into two groups based on their absolute to infect\nmacrophage and CD4 + T-cells. Macrophage tropic (M-tropic) stains can infect both\nmonocytes/ macrophages and freshly isolated peripheral blood T-cells. T Tropic strains\ncan infect only T- cells both freshly isolated and retained in culture. M tropic strains\nuse CCR5 co receptors whereas T Tropic strains bind to CXCR4 co receptors. Ninty\npercent (90%) of HIV is transmitted by M tropic strains, however over the course of\ninfection T Tropic ciruses gradually accumulate and these are virulent and cause\nfinal rapid phase of the disease progression.\n\nTargets of HIV infections are: The immune system and Central nervous system\nTarget cells are those having CD4 receptors include\nCD4 + T helper cells\n\nMonocytes /macrophages\nTissue cells such as dendritic cells present in genital tracts and anorectal region\nCertain brain cells (glial cells)\nSome other cells as well\n- Receptor molecule is a high affinity receptor for HIV. This explains for the\nselective tropism of the virus to aforementioned cells.\nInitial binding of gp 120 to CD4 molecule leads to conformational change for the new\nrecognition site on gp120 for the co receptors CCR5 or CXCR4.\nThe second conformational change in gp41 results in insertion of a fusion peptide into\nthe cell membrane of the target T-cells or macrophages.\n-After fusion, the viral core containing the HIV genome enters the cytoplasm of the cell\n\nThe life cycle of HIV virus after internalization, include\nDNA Synthesis- the uncoated viral RNA is copied into double stranded DNA by\nreverse transcriptase\nViral integration-the DNA derived from the viruses in integrated into host genome by\nthe viral integrate enzyme, thereby producing the latest proviral form of HIV-I.\nViral replication- viral RNA is reproduced by transcriptional activation of the\nintegrated HIV provirus\nViral dissemination- to complete the life cycle, nascent viruses assembled in the\ncytoplasm and disseminate to other target cells after directly lysing the cell (direct\ncytopathic effect of the virus).\nThe HIV virus after internalization assumes two forms of infectivity such as latent\ninfection and productive infections. In latent infections, the virus may be lacked in tne\ncytoplasm (preintegration latency) or after being integrated into host DNA (Post\nintegration latency). Hereafter the highlight of HIV productive infection is surfaced.\n- This productive infection is predominantly occur in lymphoid tissues, within\nmacrophages, dendritic cells and CD4+T CELLS.\n- Viremia after 8 weeks of infection supervene\n- Viremia is subsequently cleared by the development of an anti viral immune response\neffected by CD8+cytotoxic T cells\n- This results in transient decrease in CD4+T cells and an apparent rise in CD8+T cells\n\n- As viremia declines, the HIV disseminates into lymphoid tissues and undergoes clinical\nlatency but not viral latency\n- Finally the ebbs and flows of the CD4+T cells count with variable time results in AIDS.\n\nMechanisms of CD\n+ T cell loss (quantitative defects):\nLoss of immature precursors of CD\n+ T cells by direct infection of thymic progenitor\ncells or by infection of accessory cells that secrete cytokines essential for CD\n+ cells\nFusions of infected & uninfected cells with formation of syncythia (giant cells) develop\nballooning and these cells usually die in few hours.\nApoptosis of uninfected CD\n+ T cells by binding of soluble gp120 to CD\n\nQualitative defects on other immune cells as a result of CD4+T helper/ inducer cells\n\n1. Defects of CD\n+ T cells:\nReduced antigen induced T Cell proliferation\n- Imbalance between the T-helper 1 (TH\n) and TH\nresponses favour humoral immune\nresponses over cell mediated immunity\n- Decreased lymphokine secretion\nT-cell anergy (dysfunction) can also result from the binding of gp120 Ag-Ab complexes to\nmolecules impairing the antigen presentation by anti -gp 120 antibodies that cross-\nreact with and bind to class II HLA molecule on antigen presenting cells.\nAnergy also result from binding of HIV derived suferantigen to B-chains of T-cell receptors.\n\n2. Defects of monocytes / macrophages\nThese cells are extremely important in the pathogenesis of HIV infection. Similar to T cells\nmajority infected cells are found in tissues not in peripheral blood. A relatively high\nproductive infection of macrophages (10 to 15%) is detected in certain tissues such as Brain\nand lungs.\n1) Several aspects of HIV infection of macrophages include\nHiv-1 can also infect and multiply in terminally differentiated non- dividing macrophages.\nThis property of HIV-1 is dependant on HIV-1 VPR gene.The VPR protein allows nuclear\ntargeting of the HIV pre integration complex through the nuclear pore.\n2) Infected macrophages bud relatively small amounts of virus from the cell surface,\nhowever, they are quite resistant to the cytopathic effects of HIV.\n\n3) Macrophages in all likelihood act as gatekeepers of infections. More than 90 % of HIV\ninfection is transmitted by M- trophic strains. It has been suggested that macrophages or\ndendritic cells may be important in the pathogenesis of HIV diseases.\nThus, HIV infection of macrophages has three important implications.\nI) Monocytes and macrophages represent a veritable virus factory and reservouir\nwhose output remains largely protected from host defences.\nII) Second macrophages provide a safe vehicle for HIV transport to various parts of\nthe body particularly to the central nervous system.\nIII) In the late stages of HIV, infection when theCD4+T cells numbers decline greatly,\nmacrophages may be the major sites of continued viral replication.\n\nThe following are some of the qualitative changes seen in macrophages -Poor capacity of\npresent antigens to T-cells (most important one)\n- Macrophages are quite resistant to cytopathic effects of the HIV\n- impaired microbicidal activity,\n- decreased chemotaxis\n- Decreased secretion of IL-I\n- Increased spontaneous secretion of IL-I, TNF - , IL 6.\n\n3. B-lymphocyte dysfunctions\n- Hypergamaglobinemia and circulating immune complexes\n- Inability to mount do novo antibody response to a new antigen\n- Decreased immunoglobuline production in response to new antigen\n\n4. Defets of natural killer cells\n- Decreased killing of tumour cells\n- CD8 + cytotoxic T-cells: decreased specific cytotoxicity, thus, delayed cell mediated\n\nHow a latent HIV infection is transformed into productive infection?\nAntigen or mutagen-induced activation of T-cells is associated with transcription of\ngenes encoding the cytokine IL-2 and its receptor (IL-2R) and after some steps\ninduction of nuclear factor- KB (NF KB) activates the transcription of HIV provirus\nDNA and leads ultimately to the production of virons and to cell lysis.\nCellular activation, by antigens or cytokines (e.g.TNF-, IL-1, IL-2) induces\ncytoplasmic kinases that translocate NF-KB from the cytoplasm to the nucleous. In\nthe nucleous, NF-KB binds to the enhancer sequence within the promoter region and\nsimilarly long terminal repeats (LTR) have KB sites. Thus, induction of NF-KB\n\nactivates the transcription of HIV proviral DNA and leads ultimately to the production\nof virons and to cell lysis.\nFurthermore, TNF-, also leads to transcriptional activation of HIV m RNA by\nproduction of nuclear factors of that bind to KB enhancer elements of HIV.\n\nThere are also profound B cell dysfunctions such as\n- Hypergamagobinemea and circulating immune complexes are due to polyclonal B-cell\nactivation of CMV, and EBV\n- Gp\ncan also promote B cell growth and differentiation\n- HIV infected cells induce increased production of IL 6 which favours activation of B\n- cells\n\nPatients with AIDS are unable to mount antibody response to a new antigen. This could be\ndue to lack of T-cell help. Impaired humeral immunity renders these patients prey to\ndisseminate infections caused by encapsulated bacteria such as S. pneumonia and H.\ninfluenza both of which require antibodies for effective optimization. In totality loss of CD4 +\nT cells, the master cells, has ripple effect on virtually every other cell of the immune system.\n\nPathogenesis of central nervous system involvement:\nCNS is a major target of HIV infection. Macrophages and imbroglio are the\npredominant cell types in the brain that are infected with HIV. HIV is believed to be\ncarried to CNS by infected monocytes, which are almost exclusively of M tropic type.\nNeurons in CNS are not affected directly but indirectly by viral products and soluble\nfactors produced by macrophages / microglia. Included among soluble factors are IL\nI, TNF - and IL 6. In addition, nitric oxides also induce neuronal damage\n(according to most investigators).\nDirect damage of neurons by soluble HIV gp120 has also been postulated. According\nto some investigators these diverse soluble neurotoxins act by triggering excessive\nentry of Ca\ninto the neurons through their action on glutamate activated ion\nchannel that regulate intracellular calcium.\n\nNatural history of HIV infection:\nThree phases reflecting the dynamics of virus host interaction are recognized:\n\nI. Early acute phase\nHigh level of viral production, viremia and widespread seeding of lymphoid tissues. Its\nspread is controlled by immune system and the virus is mainly swept into the lymph nodes\n\nThe decline in HIV viral load usually coincides with the time of sero-conversion and the\nprimary or early HIV infection. Acute phase occurs 4 8 weeks after acquiring the virus\nThere may be a short (1 2 weeks) seroconversion illness which cause the following in\nabout 50-70% individuals: fever, rash sore throat, muscle and joint pain and some lymph\nnode swelling. The level of viral load in early acute phase of the disease is called the set\npoint and anti retroviral therapy can reduce this set point thus, early detection especially in\ncases of needle stick injuries, rape and other known risky exercises can benefit from it.\n\nII. The middle chronic phase\nRelative containment of the viruses with a period of clinical latency (not viral latency).\nPatients develop asymptomatic infections. Persistent generalized lymph adenopathyes\n(PGL) develops and PGL is defined as palpable lymphodenopathy at two or more extra\ninguinal sites, persisting for more than 3 months in persons infected with HIV. Minor\nopportunistic infections such as trush, herpes zoster etc.\n\nIII. The final, crisis phase\ndisease. Typically the patient presents with\nProlonged fever > 1/12\nFatigue, weight loss and diarrhea\n+ T cells < 500 /l\n\nAfter a variable period:\n(i) Serious opportunistic infections, (Bacterial, Fungal, Viral\n(ii) Secondary neoplasms: Kaposi sarcoma, Non Hodgkins lymphoma, Cervical\n(iii) Clinical neurological diseases (AIDS defining disease)\n\nCase definition of AIDS according to Centre for disease control (CDC)\nAny HIV infected person with fewer than 200 CD\n+ T-cells /l + is considered to have AIDS.\nHIV infection progress to AIDS within 7 to 10 years in most cases, however exceptions to\nthis typical course also occur:\n- Long term non progresses\n- Those who stay symptomatic for 10 years or more with stable CD4 + T-cells count and\nlow plasma viremia\n- Rapid Progresses\n\n- Groups of patients with the middle chronic phase is telescoped to 2-3 years after primary\n\nPhases of HIV infections and corresponding CDC classification categories\n\nPhase CDC categories\nEarly acute Group1 acute infection\nMiddle, chronic group2 asymptomatic infection\nGroup3 PGL\nFinal, crisis Group4\nSubgroup A-constitutional diseases\nSubgroup B-neurological Diseases\nSubgroup C-Secondary infections\nSubgroup D-Secondary neoplasms\nSubgroup E-other Conditions\nCDC=Center for Disease Control\n\nThe relationship between the immune status, the CD4+ T cell count, the lymphocyte\ncount, and the presence of symptomatic disease:\n\nClinical condition Cd4+T cells/m lymphocytes counts/mm3\nWell with no symptoms More than500-600 cells\nMore than 2500\nMinor symptoms 350-500cells/mm3\n\n1000- 2500\nMajor symptoms and\nopportunistic diseases\n200-300cells/mm3 500-1000\nAIDS Less than 200cells/mm3 Less than 500\n\n\nVI. Exercises\n\n1. Discuss the pathogenic mechanisms of each type of hypersensitivity reaction with\n2. Elaborate the mechanisms of autoimmune diseases\n3. Discuss SLE.\n4. List out conditions that lower immune resistance\n5. Discuss the entry, the life cycle and genetic components of HIV virus\n6. Elaborate the natural history of HIV infection and AIDS after internalization\n\n\n\n1. Cotran RS, Kumar V, Collins T. Robins pathologic basis of diseases. Philadelphia, J.B.\nSaunders Company. 6th edition 1999\n2. Mac Sween RNM, Whaley K. Muirs Textbook of pathology. London, Edward Arlond 13th\nedition 1992\n3. Rubin E, Farber JC. Pathology Philadelphia, J.B. Lippincott Company 6th edition 1994\n4. Dey NC, Dey TK. A Textbook of Pathology Calcatta, Messers Allied agency 10th edition\n\n\nI. Learning objectives:\n\nAt the end of this chapter, the student is expected to:\n\nExplain the etiology, pathogenesis, morphologic, & some clinical features of typhoid fever,\ntuberculosis, leprosy, syphilis, malaria, leishmaniasis, schistosomiasis, & selected fungal.\n\nII. Typhoid Fever\n\nDefinition: Typoid fever is an acute enteric disease caused by an obligate intracellular\nbacillus called Salmonella Typhi and this bacillus resides within mononuclear phagocytic\ncells of lymphoid tissues. The disease is unique humans and it is characterized by fever,\nsplenomegaly and neutropenia.\nTransmission: Feco-oral routes through contaminated foods\n\nconvalescent carrier for up to 6 months of infection\nChronic fecal and chronic urinary carriers are associated with chronic cholecystitis and\npyelonephritis respectively.\nS. mansoni and S. hematobium co-infections protract the course of typhoid fever.\n\nInfection is by ingestion of the organism, (>10 to the power of 7 ) in 50% of cases\npenetrate the small intestine mucosa and reach the circulation with transient bactremia\nThe bacilli are taken by the lymphatic to lymph nodes and they are engulfed by\nmononuclear phagocytic cells.\nAfter a period of multiplication in these phagocytic cells, the organisms rupture the cells\nand invade the blood stream via the thoracic duct. The liver, gallbladder, spleen, kidney\nand bone marrow become infected during this second bactermic phase, characterizing\nthe clinical features of the diseases.\n\nThe main pathological changes are found in the gastrointestinal tract particularly The\nPayers patches, which are the sub mucosal lymphoid follicles in this tract. This invasion\narises from the gall bladder. Payers patches may show\nHyperplasia in first week\nNecrosis in second week\nUlceration in third week\nHealing in fourth week\nTyphoid ulcers are oval and are situated longitudinally along the long axis of the colon,\nwhich are in contra -distinction of tuberculous ulcers that are set transversally.\n\nLeukopenia 3000-4000/mm\n\nBlood culture - 1\nweek (70-90%)\nFecal culture - 2\nweek best (75%)\nUrine culture - 2\nSerology 2\n\nClinical course:\nTyphoid fever is a protracted disease that is associated with\nBactermia, fever and chills during the first week\nWidespread reticuloendothelial involvement with rash, abdominal pain and\nprostration in the second week and\nUlceration of payer's patches with intestinal bleeding and shock during the third\n\nComplications may include:\nIntestinal perforation: 3 4% and it is responsible to 25% of the death\nIntestinal hemorrhage: 8% and usually seen between 14-21 days of illness\nAcute cholecystitis, etc\n\nIII. Acute Osteomyelitis\n\nDefinition: It is an inflammation of the bone and marrow (osteo- means bone and myelo\nmarrow), commonly in children and adolescents\nRoute: Hematogenous spread most common in long and vertebral bones extension from\ncontagious site- otitis media, dental caries\n\nDirect implantation-compound fracture,\n\nAll types of organisms possible; however, pyogenic organisms most notably\nStaphylococcus aurous represent 80 - 90% of pyogenic osteomylitis. Others include\npseudomonas, Klebsiella, Salmonella in sickle cell anemic patients.\n\nAny bone may be affected but the metaphysics of long bones (distal femur, proximal\ntibia and humorus) adjacent to actively growing epiphyses and the vertebral column are\nmost often involved.\n\nThe location of the lesions within specific bones is influenced by the vascular circulation,\nwhich varies with age. In the neonate, the metaphysical vessels penetrate the growth\nplate resulting in frequent infection of the metaphysis, epiphysis or both.\nIn children, localization of microorganisms in the metaphysics is typical.\nIn adults, the epiphyscal growth plate is closed and the metaphysical vessels reunite\nwith their epiphyses counterparts, which provide a route for bacteria to seed in the\nepiphysis and subchondral regions.\nThe susceptibility of the metaphysis to acute osteomylitis is in part, explained by the\ndilated vascularature of the marrow spaces where sluggish blood flow provides an ideal\nsite for multiplication of bacteria.\nThen acute inflammatory response with exudation follows with venous and arterial\nthrombosis. These reaction increases intravenous pressure with a resultant bone\nnecrosis. Infection spreads rapidly through marrow spaces which perpetuates the\nHaversian systems of the metaphysical cortex, elevates the periosteum and forms a\nsubperiosteal abscess in children and adolescents as opposed to adults periosteum that\nis adherent to the bone.\nAccession of both peri-osteal and endo-osteal vessels lead to segmental bone necrosis\nof some or all of the diaphysis, the portion of dead bone is known as a sequestrum.\nSmall sequestra especially in children tend to be completely absorbed by osteoclastic\nactivity. Large sequestra form a nidus for episodes of infection. In the presence of a\nsequestrum, the periosteal reactive woven or laminar bone may be deposited as a\n\nsleeve of living tissue known as involcrum, around the segment of devitalized bone\n(sequestrum). The involcrum around sequestrum is usually irregular and perforated.\nIn infants, acute ostemylitis may complicate acute arthritis through infrequent it also\noccurs in adults. The picture is different in children.\nThe patient complains of fever, sever pain and tenderness aggravated by any\nmovement, ESR elevated, leukocytosis\nComplications include septicemia, septic arthritis, alteration in growth rate, chronic\n\nIV. Tuberculosis\n\nTuberculosis is a prototype example of granulomatius inflammation.\nTuberculosis infects one third of world populations and kills about three million people yearly\nand it is the single most important infectious disease.\n\nEtiology: Mycobacterium tuberculosis and Mycobacterium bovis are the regular infecting\nrod shaped, acid fast and alcohol fast, strict aerobic, non-spore forming bacteria with a waxy\ncoat. It has a slow generation time of 4-6 weeks to obtain a colony of mycobacterium\ntuberculosis. M. tuberculosis is transmitted by inhalation of infective droplets coughed or\nsneezed into the air by a patient with open tuberculosis, however, M. bovis is transmitted by\nmilk from infected cows. Rarely, it transmits via breached skin surfaces and conjunctiva.\nM. Avium and M. intracellulare cause disseminated infection in 15%-24% of patients with\n\nPathogenicity of the bacillus is related to its cell wall components. Pathogenicty of\ntuberculosis is attributed to its cell wall component.\n1. Cord factor which is a cell wall glycolipid component is aviable on virulent strains\n2. Lipoarabinomannan (LAM): It inhibits macrophage activation by interferon LAM\ninduce macrophages to secrete TNF - which causes fever, weight loss, and tissue\ndamage and LAM also induce IL-10 which suppresses mycobacteria induced T-cell\n3. Complement activated on the surface of mycobacteria may opsinize the organism\nand faclitate its uptake by macrophages complement receptor CR3 (mac-1 integrin)\nwithout triggering the respiratory burst necessary to kill the organisms.\n\n4. M. Tuberculosis heat shock protein is similar to human heat shock protein and may\nhave a role in autoimmune reactions induced by M. tuberculosis.\nThe bacillus resides in phagosome, which are not acidified in lysosomes. Inhibition of\nacidification has been associated with urase secreted by the mycobacteria.\nWho are those more susceptible to develop tuberculosis?\nRace: North American Indians, black Africans and Asians are much more\nsusceptible than others\nAge: Extremes of ages due to imperfect immune responses\nImmunologic and other host factors immunocompromized patients are more\nliable to develop tuberculosis. These include patients with steroid therapy or\nimmunosuppressive drugs, HIV infection, diabetes mellitus, cirrhosis,\nmalnutrition and damage of lung for example with silicosis etc.\n\n\nPrimary infection: Primary phase of M. tuberculosis infection begins with inhalation of the\nmycobacteria most often in the lower segment of the lower and middle lobes and anterior\nsegment of the lower lobe of the lung. First, the organisms are phagocytosed by alveolar\nmacrophages and transported by these cells to hilar lymph nodes. Nave macrophages are\nunable to kill the mycobacteria, thus they multiply and lyse these host cells, infect other\nmacrophages and sometimes disseminate through blood to other parts of the lung and\nelsewhere in the body.\n- After few weeks T-cell mediated immunity is demonstrable by PPD reaction first the CD4\nT cells interaction with macrophages secrete interferon, which activate macrophages to\nkill intracellular mycobacteria through reactive nitrogen intermediates, including NO\n- Second CD 8+ suppressor T-cells lyse macrophages infected with mycobacteria through\na FAS -independent, granular dependent reaction and kill mycobacteria.\n- Third CD4-CD8- (double negative) T cell lyse macrophages in a FAS dependant manner\nwithout killing mycobacteria. Lyses of these macrophages results in the formation of\ncaseating granuloma and direct toxicity to the mycobacteria may contribute to the\nnecrotic caseous centers.\n\nThe primary infection of sub-pleural lesion, the intervening macrophage reactions within\naccompanying lymphangitis and the hilar lymph nodes caseous lesions is called primary\ncomplex (often called a Ghon focus).\n\n\nHence, fate of primary complex include\ni). T-cell mediated immune response induces hypersensitivity to the organisms and controls\n95% of primary infection. This is associated with progressive fibrosis and calcification of\npersistent caseous debris. Moreover, most bacilli die but few remain viable for years until\nthe persons immune response fails.\nHowever, if the infected person is immunologically immature, as in a young child or\nimmunocompromized (eg. AIDS patients) the course of this primary infection is quite\ndifferent. Such persons lack the capacity to coordinate integrated hypersensitivity and\ncell- mediated immune responses to the organism and thus often lack the capacity to\ncontain the infection. Granulomas are poorly formed or not formed at all, and infection\nprogresses at the primary site in the lung, the regional lymph nodes or at multiple sites of\ndisseminations. This process produces progressive primary tuberculosis.\nii. Progressive primary tuberculous pneumonia: commonly seen in children less than\nfive years of age but it ours in adults as well in those with suppressed or defective\niii. Subpleural focus may discharge bacilli or antigen into the pleural cavity resulting in the\ndevelopment of pleural effusion. It is common in adolescent infected with M.\ntuberculosis for the first time.\nHilar or mediastinal groups of lymph nodes enlargement with caseous necrosis that\nmay result in:\na. Obstruction of the bronchus by the enlarged lymph nodes leading to lobar collapse.\nb. The caseous hilar lymph node may penetrate the bronchial wall and resulting in\nrupture of the wall with pouring of caseous materials into the bronchus hence,\ntuberculosis broncho-pneumonia ensues.\niv. The caseous materials may be disseminated to other parts of the body via blood streams.\n\nMiliary tuberculosis\nIt refers to disseminated sites that produce multiple, small yellow nodular lesions in several\norgans. The term miliary emphasizes the resemblance of the lesion to millet seeds. The\nlungs, lymph nodes, kidneys, adrenals, bone marow, spleen, menings and liver are common\nsites for miliary lesions.\n\nv. Seeding of the bacilli in lungs, bones, kidneys, fallopian tubes, bladder, epididimis etc,\nthat may persist in and their subsequent reactivation produces destructive, necrotizing\ngranulmatious disease, sometimes known as end organ tuberculosis.\n\nOthers sites of primary tuberculosis infection\ni. Intestinal primary infection\nThe primary complex is similar to that of the lungs the initial site may be in the gum with\nlymphatic spread of bacilli to the cervical lymph nodes the commonest location for the\nprimary lesion is the illocaecal region with local mesenteric node involvement.\nii. Lymph nodes\nTuberculous lymph adenitis is the most common type of extra pulmonary tuberculosis\nthat frequently involves the cervical groups of lymph nodes with enlargement, and\nsubsequent periadenitis followed by matting and eventual ulcerations if left untreated.\niii. Skin is also involved in various forms of tuberculosis\n\nPost -primary (secondary) tuberculosis\nConventionally the term post-primary tuberculosis is used for lung infections occurring 5\nyears or more after the primary infection. If an adult acquires TB for the first time, it presents\nas post primary not Primary manifestation. The commonest sites for post primary\ntuberculosis are the posterior or apical segment of the upper lobe and the superior segment\nof the lower lobe and their predilection for the anatomy location is due to good ventilation.\nHilar lymph node enlargement is not usually recorded. Hypersensitivity reaction is well-\ndeveloped and it thus, restricts the granulomatous reactions locally. Post primary\nTuberculosis is characterized by cavitary and fibrosing lesions. Pulmonary and bronchial\narteries around caseous cavities are occluded by endarteritis obliterans where the wall of\nthe artery may weaken resulting in aneurysm formation (mycotic aneurism) that may\noccasionally rupture and cause hemoptosis.\nPost primary (2\n) tuberculosis in endemic countries occurs due to re-infection or reactivation\nof previously residing bacilli. In non-endemic (uncommon) countries, reactivation\nphenomenon is more important.\nInfected sputa may be swallowed resulting in tuberculous ulcer in the larynx or small\nSecondary amyloidosis is a common complication of chronic tuberculosis. Certain\ntissues are relatively resistant to tuberculous infection, so it is rare to find tubercles in\nthe heart, skeletal muscle, thyrord and pancreas.\n\nM. tuberculosis and M. avium intracellulare lesions in AIDS\nMycobacteria infection in AIDS patients can take three forms depending on the degree of\n1. HIV infected individuals often have primary and secondary M. tuberculosis infection with\nthe usual well-formed granulomas and acid fast my cobacteria are few in number and\nOften difficult to find under microscopy.\n2. When HIV positive patient develop AIDS with moderate immunosuppression (less than\n200 CD4+ heper T-cell /mm\n) which is characterized by failure of helper T-cells to\nelaborate lymphokines and the relative increase in the number of CD 8+ cytotoxic T-cells\nmay also cause macrophage destruction in the M. tuberculosis lesions. This results in\nless well-formed granulomas, and more frequently necrotic material that contain more\nabundant acid-fast organisms histologically.\nSputum is positive for acid-fast bacilli in 31%-82% of patients with AIDS. Extra\npulmonary tuberculosis occurs in 70% of such patients involving lymph nodes, blood,\nCNS and bowel.\n3. Opportunistic infection with M. avium- interacellurare occurs in severely immuno\nsuppressed patients (less than 60 CD4\ncells /mm\n. Most of these infections originate in\nthe gastrointestinal tract. These infections are usually widely disseminated throughout\nthe reticuloendothelial systems causing enlargement of involved lymph nodes, liver and\nspleen. The organisms are present in large numbers as many as 10\norganism per\ngram of tissue. Granulomas, lymphocytes and tissue destruction are rare.\nDifferences between primary and postprimary tuberculosis\nprimary TB post primary TB\nmainly affected ages children adults\nHilar node involvements Usual uncommon\ntype IV reaction less developed more developed\ntissue lesions diffuse disease localized disease\nFrequency Infrequent Dominant (>80%)\n\nDiagnosis of tuberculosis include:\nZeihl Neelsen stain for Acid fast bacilli\nFine needle aspiration cytology\nExsional biopsy\n\n\nV. Leprosy\n\nDefiniton: Leprosy or Hansen disease is a slowly progressive infection caused by\nMycobacterium leprae affecting the skin and peripheral nerves and resulting mainly in\nlesions in upper respiratory tract.\n\nit grows best at 32-34\nC of the temperature of human skin.\nLike M. tuberculosis, M leprae secrets no toxins but its virulence is based on properties\nClassification based on host immune responses. Leprosy is a bipolar disease. Two\nmay usually deteriorate to lepromatous leprosy. Patients with tuberculoid leprosy form\ntest is strongly positive and this is effected largely by CD4\ntype 1 helper T-cell that\nsecretes IL-2 & interferon .\nstuffed with large numbers of mycobacteria (multibacillary disease). Lepromatous\nleprosy lesions lack CD4\ntype I T-cell at their margins but in stead contain many CD8\nsuppressor T-cell in a diffuse pattern. The CD8\nsuppressor T-cell secrete IL-10, which\nantigen antibody complexes in lepromatous leprosy leads to erythema nodosum\nleprosum, a life threatening vasculitis, and glomerulonephrits\n\nthose with tuberculoid leprosy.\n\nTable: Differences between tuberculoid and lepomatous leprosy\nTuberculoid leprosy Lepromatous leprosy\nEpitheoid granuloma without giant cell Active macrophages, with every many bacilli\nDense zone of lymphocyte infiltration\naround granuloma\nScanty and diffuse\nNerves destroyed by granulomas May show neuronal damage but not infiltration\nor cuffing\nNo clear sub-epidermal zone Clear sub-epidermal zone\nBacilli in granuloma are not seen Numerous bacilli 5+ or 6+\nFew macules + plaques with well defined\nMacules, papules, plaques and nodules\npresent with vague edges\nLesions distributed asymmetrically Lesions distributed symmetrically\nhair loss no hair loss\nLesions are anesthetic Lesions are not anesthetic\nNerve thickening often singly and early Nerve thickening is symmetrical and late\n(stocking & glove patterns)\nFirst manifestation may be neural First manifestation never neuronal\nLepromin test is strongly positive Lepromin test is negative\n\nClinical course and complications\ngrowth of M.leprae.\n\nVI. Syphilis\n\nDefinition: Syphilis is a systemic infection caused by the spirochete Treponema pallidium,\n\nexamination and immunofluorescence technique.\n\nThe organism invades mucosa directly possibly aided by surface abrasions following\ndevelops at the site of infection usually the external genetalia but also lips and anorectal\nregion. Within hours, the T. pallidum pass to regional lymph nodes and gain access to\nsystemic circulations. Thereafter, the disease is unpredictable. Its incubation period is\nabout 3 weeks.\nsyphilis are\nA. Obliterative endarteritis\nB. Plasma cell rich mononuclear cell infiltrates.\nThe endarteritis is secondary to the binding of spirochetes to endothelial cells mediated\nby fibronectin molecules bound to the surface of the spirochetes. The mononuclear\ninfiltrates are immunologic response.\nHost humeral and cellular immune responses may prevent the formation of chancre on\nsubsequent infections with T. pallidum but are insufficient to clear the spirochetes.\n\nMorphology: Syphilis is classified into three stages\n\nPrimary syphilis (chancre):\nthan two week cannot be reinfected by a challenge.\n\nSecondary syphilis:\nthe pharynx and genitalia, which is highly infectious.\n\nCondylomata lata: - which is papular lesions in moist areas such as axillae, perineum,\nvulva and scrotum, which are stuffed with abundant spirochetes.\nGeneralized lymphadenopathy and the uncommon swelling of epithrochlear lymph\nnodes have long been associated with syphilis.\nmore episodes of relapses may show a more granulomatous histology in skin lesions\nand progress to the next stage.\n\nTertiary syphilis:\nThe three basic forms of tertiary syphilis are:\n\n1. Syphilitic gummas - there are grey white rubbery masses of variable sizes. They occur\nscarring as a result of gummas may cause a distinctive hepatic lesion known as hepar\nsabre tibia\n- Histologically, gummas look like a central coagulative necrosis characterized by\nperipheral granumatous responses. TheTrepanosomas are scanty in these gummas\nand difficult to demonstrate.\n2. Cardiovascular syphilis\nscarring and secondary atherosclerosis. Endartereritis and periaortitis of the vasa\ndilate and form aneurysm and eventually rupture classically in the arch.\n3. Neurosyphilis:\n- occurs in about 10% of untreated patients. The neurosyphllis comprises of\ni. Meningiovascular syphilis particularly in base of brain\nsubsequent atrophy.\n\niii. Tabes dorsalis Result of damage by the spirochetes to the sensory nerves in\nabsence of deep tendon reflexes\n\nCongenital syphilis\nThis infection is most severe when the mother's infection is recent. Treponemas do\nnot invade the placental tissue or the fetus until the fifth month of gestation (since\nimmunologic competence only commences then) syphilis causes late abortion, still\nbirth or death soon after delivery or It may persist in latent forms to become apparent\nonly during childhood or adult life.\nThe out come of congenital syphilis depends on stage of maternal infection (i.e. the\ndegree of maternal spirochataemia). In primary and secondary stages, the fetus is\nheavily infected and may die of hydrops in utero or shortly after birth. Liver and\npancrease show diffuse fibrosis. The placentis is heavy, and pale with plasmacytic\nvillitis. After maternal second stage, the effects of congenital syphilis are progressively\nless severe.\nLess dramatic visceral disease, papular lesions on skin and mucosae such as the\nnose snuffles, may be seen with Huchinton's teeth, and interstial keratitis.\nChildren infected in utero who are sero -positive show no lesions until two or more\nyears after birth are classified as having late congenital syphilis. The late congenital\nsyphilis is distinctive for the triads: Interstial keratitis; Hutchinson teeth and Eight\nnerve deafness\n\nVII. Malaria\n\nMalaria is caused by the intracellular protozoan parasite called Plasmodium species and\nplasomodium Faliprium is the worldwide infections that affect 100 million people and kill 1 to\n1.5 million people yearly. P.Falciparium and P.Vivax, P. ovale, and P.malarie represent\n60%, 49 %, <1.0% and reported cases respectively in Ethiopia. P. falciparum cause high\nparasitmias, severe anemia, cerebral symptoms, and pulmonary edma and death.\n\nPathogenesis (P.Falciparum):\nInfected humans produce gametocytes that mosquitoes acquire on feeding. Within these\ninsects body, the organism produces sporozites, which the mosquito transmits to human\nwhen it feeds\n\nMalarial sporozites after being released in the blood within minutes attach to a serum\nprotein thrombosroridin and properidine located on the basolateral surface of\nhepatocytes. These sporozites multiply and release merozytes by rupturing liver cells.\nOnce released, P. falciparum merozites bind by a parasite lactin like molecule to on the\nsurface of red blood cells\nWithin 2 to3 weeks of hepatic infection, merozites rupture from their host hepatocytes\nand invade erythrocytes establishing erytrocytic phase of malarial infection.\nThe merozites feed on hemoglobin grow and reproduce within erythrocytes. Repeated\ncycles of parasitemia occur with subsequent ruptures of these cells with resultant clinical\nmanifestations such as chills, fever etc.\nP. Vivax merozites however, bind by homologous lectin to the Duffy antigen on RBC so\nmany cases who are Duffy negative are resistant to this infection.\nHLA B53 associated resistance in some Africans is related to the ability of HLA B53 to\npresent the liver stage specific malarial antigen to cytotoxic T-cells, which then kill\nmalarial, infected hepatocytes.\nIndividuals with sickle cell trait are resistant to malaria because the red cells that are\nparasitized in these individuals are removed by the spleen.\nMost malarial parasites infect new RBC & some develop to sexual form called\ngametocytes and the mosquito when it takes this blood meal the cycle continues.\n\nSpleen enlarged upto 1000gm (normally 150grams) and this splenomegaly can be\nattributed to increased phagocytosis in splenic reticuloendothelial cells in chronic\nmalaria. The parenchyma imparts grey or blue discolouration due to hemozoin.\nLiver kuffer cells are heavily laden with malarial pigments, parasites, and cellular debris.\nPigmented phagocytes may be dispersed through out bone marrow, lymph nodes,\nsubcutaneous tissues and lungs.\nMalignant cerebral malaria: Patients with cerebral malaria have increased amount of\ninter-cellular adhesion molecules (ICAM- 1). These patients manifest diffuse symmetric\nencephalopathy; brain vessels are plugged with parasitized red cells. There are ring\nhemorrhages related to local hypoxia. Cerebral involvement by P. falciparum causing\n80% of childhood death is due to adhesion of the P. falciparum parasite to endothelial\ncells with in the brain.\n\nHypoglycemia- result from failure of hepatic gluconeogenesis & glucose consumption by the\nhost and the parasite lactic acidosis -due to anaerobic glycolysis, non cardiogenic\npulmonary edema, renal impairment, anemias etc\n\nP. falciparum, the cause of malignant malaria produces much more aggressive and lethal\ndisease than the other human malarias. This organism is distinguished from other malarial\nparasites in four aspects.\n1) It has no secondary exoerythocytic (hepatic) stage\n2) It parasitizes erythrocytes of any stage, causing marked parasitmia and anemia. In other\ntypes of malaria only subpopulations of erythrocytes are parasitized, and thus low level\nparasitemias and more modest anemias occur. P. Vivax and P>Ovale attack immature\nerythrocytes while P. malarie attack senescent cells.\n3) There may be several parasites in single erythrocyte\n4) P. falciparum alters the flow characteristics and adhesive qualities of infected\nerythrocytes so that they adhere to the endothelial cells of small blood vessels frequently\nproduce severe ischemia. Infected red cells sequester inside the small blood vessels at\nthe same time P. falciparum infected RBCS may also adhere to uninfected red cells to\nform rosettes. The process of cytoadhernce and rosetting are central to the\npathogenesis of falcparum malaria in the other three \" benign\" malarias sequestrations\ndoes not occur and all stages of parasites development are evident on peripheral blood\nP. falciparum invades erythroytes of all ages and is associated with high level\nparasitemia whereas, P. vivax, P.ovale and P.malariae show predilection for either old\nred cells or reticuloytes & level of parasitmias seldom exceeds 2 percent.\n\nMalaria in pregnancy\nIn pregnancy, malaria may be associated with hypoglycemia, fetal distress syndrome and\nlow birth weight. Congenital malaria can occur rarely. P. falcparum malaria is an important\ncause of fetal death. Congenital malaria occurs in fewer than 5% of newborns.\n\nMalaria in children\nMost of the estimated 1-3 million persons who die of falciparum malaria each year are\nyoung African children. Convulsion, coma, hypoglycemia, metabolic acidosis and severe\nanemia are relatively common.\n\nTransfusion malaria\nMalaria can be transmitted by blood transfusion, needle -stick injury, sharing of needles by\ninfected drug addicts, or organ transplants. The incubation period is short because there is\nno pre-erythrocytic stage of development.\n\nComplications of malaria include:\nTropical splnomegaly syndrome (Hyperreactive malarial splenomegaly),\nBurkitt's lymphoma and EBV infection\nQuartan malarial nephropathy\nBlack water fever\nAlgid malaria\n\nVIII. Leishmaniasis\n\nDefinition: Chronic inflammatory disease of skin, mucous membranes or viscera caused by\nobligate intracellular Kinetoplastid protozoal parasites (Leishmania species) transmitted\nthrough infected sand fly.\nLeishmanial infections like with other intracellular organism (including mycobactria,\nhistoplasma, toxoplasma and tryprosoma) is exacerbated by AIDS.\nDifferent leishmanial parasites in new and old world appeared to show tropism related to\ntemperature, because parasites that cause visceral disease grow at 37% in vitro\nwhereas parasite that cause multiple diseases grow only at 34\nLeishmania are phagocytozed by macrophage and acidity within phagolysosome\ninduces them to transform into amastigate from promatigate by losing flagella.\nLeismanial amastigotes are the only protozoal parasites that survive and reproduce in\nmacrophage phagolysosomes, which have a PH of 4.5. Amastigotes are protected from\nthe intravascular acid by a proton -transforming ATPase which maintains the intracellular\nparasite PH at 6.5\nLeismanial parasites have two glycocongugates, which appeared important in their\nvirulence. The first is lipophosphoglycans that are glycolipids & bind C\n3b and\n\nOrganisms resist lysis by complement C\nbut are phagocytozed by macrophages\nthrough complement receptors CR1 and CR3\nLipophosphoglycans may also protect the parasite within phagolysosomes by supplying\noxygen radical and by inhibiting lysosmal enzymes.\nLike M. laprae severity of disease is determined by host immune response.\n\nParasites specific to CD+T-cells of TH\nclass may secrete interferon gamma which along\nwith TNF- secreted by other macrophages activates phagocytes to kill the parasites\nthrough toxic metabolites of oxygen or nitric acid (or both). In contrast, down regulation of\nthe immune response that lead to anergy and progressive diseases may be caused by\n\nparasite specific CD4+T cells of T helper class 2 that secrete IL-4 which inhibits\nmacrophages activation by interferon gamma and inhibits secretion of TNF .\n\nVisceral leishmaniasis (L.donovanni & L.chagasi) macrophages of RES are invaded so\nhepatosplenomegly, lymphadenopathy, pancytopenia, fever & weight loss,\nhyperpigmentation of the skin (kalazar, black fever) glomerulonephritis\n(mesangioproliferative) and in advanced cases amyloid deposits.\n\nCutaneous leishmaniasis\nLocalized single ulcer on exposed skin (slowly expanding and irregular borders, usually\nheals within 6 months by involution. The lesion is granulomatous.\n\nDiffuse cutaneous leishmaniasis\nLesions of diffuse cutaneous leishmaniasis resembles lepromatous leprosy nodules. The\nlesions do not ulcerate but contain vast aggregates of foamy macrophages filled with\nleishmania. The patients are usually anergic not only to Leshmania but also to other skin\nantigens and the disease respond poorly to therapy.\n\n\nIt is the most important helmenthic disease infecting 200 million people & killing 250,000\n\nLife cycle: Schistosomal larval, (cercaria) & penetrate human skin. Ghycocalyx that protect\nthe organism from osmotic is shed but it activates complement by alternative pathway.\nSchistosoms migrate into peripheral vasculature transverse to the lung and little in the portal\nvenous system where they develop into adult male and female schistosomes. Females\nproduce hundreds of eggs per day around which granulmas and fibrosis form the major\nmanifestation in schistosomiasis. Some schist some eggs are passed from the portal veins\nthrough the intestinal wall into the colonic lumen are shed with the feces and released into\nfresh water, form to miracidia that infect the snail to complete the life cycle.\n\n1. S. mansoni eggs cause liver disease in multiple ways. The schistosome eggs are direct\n2. Carbohydrate antigens of the eggs induce macrophage accumulation and granulomas\nformation mediated by TNF only TH\nand TH\nhelper cells.\nhelper T-cells are responsible for eosinophilla mastocytosis and high level of serum\nin human schistosomiasis, because these cells secrete IL-3 and IL-4, which stimulate\nmastocytosis and IL-5, which is the growth factor for eosinophils. Resistance to\nreinfection by schistosomes after treatment correlates with IgE levels whereas,\neosinophile major basic proteins may destroy larvae schistsomula.\n3. Eggs release factors that stimulate lymphocytes to secrete a lymphokine that stimulate\nfibroblast proliferation and portal fibrosis the exuberant fibrosis which is out of proportion\nto the injury caused by the eggs and granucoma, occurs in 5% of persons infected with\nschistosomes and cause severe portal hypertension esophageal varicoses and ascites -\nthe hallmark of severe schistosomiasis.\n\nWhite granulomas scattered in the liver and gut. The center of the granuloma is the\nschistosome eggs. The granuloma degenerate overtime and undergo fibrosis and\ncalcification. The liver is darken by regurgitated pigments from the schistosome gut which\nlike malaria pigment are iron negative and accumulate in kuffer cells and splenic\nSevere infection (s. mansoni & S. Japanicum)\nColonic pseudopolyps\nLiver surface is bumpy and its cut section shows granuloma and wide spreading fibrous\nportal enlargement without distortion of the intervening parenchyma.\nPortal fibrosis (PIPE-stem fibrosis) many of these portal triads lack a vein lumen causing\nperisinusoidal portal hypertension and severe congestive splenomegaly, esophageal\nvarices. Schistome eggs diverted to the lungs through portal collateral may produce\ngranulomatous pulmonary arteritis with intimal hyperplasia progressive arterial obstruction\nand ultimately heart failure (cor pulmonale).\nPatients with hepatosplenic Schistosomiasis have also increased frequency of\nmesangioproliferative glomerulonephritis or membranous glomerulonepritis in which\n\nglomeruli contain deposits of immunoglobulins and compliments but rarely schstosomal\n\nS. hamatobium infection\nMassive egg depositions and early granuloma formation that when erode the vasculature\n(hamaturia). Latter the granuomas calcify and develop a sandy appearance and in severe\ncases, it causes concentric rim on the wall of the bladder forming calcified bladder on x- rays\nWhen the urinary inflammation involves the ureteral orifices, it causes obstructive\nhydronephrosis and chronic pylonehphritis. Urinary schistosomiasis is also associated with\nsquamous cell carcinoma of the bladder that is commonly seen in Egypt.\n\nX. Fungal Infections\n\nThere are 100,000 known fungi and only few infect humans mostly opportunistically. Only\nfew are involved in human diseases because most fungi are destroyed by cell-mediated\nimmune responses however, humoral immunity plays little or no role.\nPredisposing factors for fungal infections include:\nCorticosteroid administration, acquired or congenital immunodeficiency states, defects in\nneutrophillic and macrophage functions\nFungal infections are divided into superficial and deep fungal infections (mycosis). Here\nare few examples of systemic fungal infections\n\n1. Candidiasis (Moniliasis)\nNormally found in mouth, skin and gastrointestinal tracts. It is the most common fugal\ninfection mostly caused by (C. albicans). It affects locally the skin, nail and mucous\nmembranes and it grows best in warm, moist surface and cause vaginitis, diaper rash &\noral trush. Systemic candidiasis widespread in persons with depressed immune\nresponses including lymphohemopiotic malignancy, immunosuppressive therapies and\nbroad-spectrum antibiotic usage as well as patients with dialysis, cardiac surgery, IV\ndrug abusers.\n\nCandida has molecules on its surface that mediates its adherence to tissues including\n1) A homologue to human CR3 integrin\n2) A lectin that binds sugars on epithelial cells\n\n3) Mannose containing protein that binds to lectin like molecule on epithelial cells\n\nFinally, the transition of yeast to hyphal forms is important to fungal virulence because the\nhyphae appear to spear their way out of cells, which engulf them.\n\nOral trush & vaginitis are superficial lesions characterized by white patches (or\nfluffy membrane)\nCutaneous eczematous lesion: Seen in moist area such as between fingers, &\ntoes and in inguinal areas, inflamammary folds and ano-genital regions. These\nlesions may contain acute and chronic inflammations with micro abscesses but in\ntheir chronic states granulomatous inflammations may develop.\nInvasive candidiasis: seen in Immunosuppression. Many organs may be involved\nfor examples include kidney with micro abscesses in 90%, and right side candidal\nendocarditis. The brain, liver subcutis etc may be involved with micro abscesses.\n\n2. Cryptococcosis\n\nCryptococcos neoformans is encapsulated yeast. It causes menigioencephalitis in normal\nindividuals but more frequently in patients with AIDS, leukemias, lymphomas, SLE,\nHodgkins lymphomas and transplant recipients and those on steroid therapy.\n\nFound in soil and droppings of birds (peogons): Three factors associated with virulence\n1) Capsular polysaccharides\n2) Resistant to killing by alveolar macrophages\n3) Production of phenol oxidase, which consumes host epinephrine oxidase system.\nThis enzyme consumes host epinephrines in the synthesis of fungal melanin\nthus, preventing the fungus from epinephrine oxidase system\nC. neoformans affect brain because of CSF lacks the alternative pathway complement\ncomponents that binds to carbohydrate capsule and facilitates phagocytosis and killing by\nPolymorphonuclear leukocytes.\n\nLung is the primary site of localization with minor or asymptomatic presentation; here solitary\ngranulomatous lesions may appear.\n\nThe major pathologic changes are in the CNS involving meninges, cortical grey matter and\nbasal ganglia. The tissue response to C. neoformans is extremely variable. In\nimmunosupressed patients, the organisms may evoke no inflammatory reactions so;\ngelatinous masses of fungi grow in the meninges or in small cysts within the grey matter\n(soap bubble lesion)\n\n3. Aspergillosis\nAspargillus is a ubiquitous mold that causes allergies in otherwise healthy persons and\nserious sinusitis, pneumonia and fungemia in neutropenic persons. Aspargillus form fruiting\n\nAspargillus species have three toxins:\nAflatoxin: Aspargillus species may grow on surfaces of peanuts and may be a major\ncause of cancer in Africa.\nResrictocin and mitogilin: They inhibit protein synthesis by degrading MRNA\nMitogilin: It also induce IgE production so may be associated with allergic\nAlveolitis by inducing type III & IV reactions, allergic bronchopulmonary aspargillosis\nwhich often-in asthmatic that eventually leads to COLD.\n\n\nColonizing Aspargilosis (Aspargiloma): It implies growth of fungus in pulmonary cavity\nwith minimal or no invasion of the tissues. The cavity usually result from the pre-existing\ntuberculosis, bronchiactasis, old infracts and abscesses,\nInvasive Aspargilosis It is an opportunistic infection confined to immunosupressed and\ndebilitated hosts. Common sites of disseminations include the heart valves, brain and\nThe Aspargilus Species have a tendency to invade blood vessels and thus, areas of\nhemorrhages and infarction are usually superimposed on necrotizing inflammatory reactions\n\n4. Histoplasmosis\n- The causative organism H. capsulatum is recovered from dust particles of soil, bird or\nbat droppings contain small spores (micro conidia).\n- Histoplasmosis and Coccidiomycosis resemble pulmonary tuberculosis and both are\ncausedby fungi that are thermally dimorphic (hyphae and yeast forms)\n\n- Natural history of histoplasmosis include.\n1) Self limited with subsequent coin lesions on X-ray films\n2) Chronic progressive secondary lung disease in lung apices\n3) Localized lesion in extra pulmonary site including mediastinum, adrenals, liver and\n4) Widely disseminated disease especially in immunocompromised individuals\n\nHistopasma yeasts are phagocytosed by unstamulated macrophages and multiply in\nphagosomes and lyse host cells. Histopasma infection is controlled by T helper cells.\nSubsequently secreted interferon gamma activates macrophages to kill intracellular yeasts.\nTumour necrotizing factor alpha (TNF-) is also secreted to kill histoplasma. Lacking cellular\nimmunity, patients with AIDS are susceptible to disseminated disease.\n\n\nGranulomatous inflammation with areas of solidifications that may liquefy subsequently.\nThe lesion may undergo fibrosis spontaneously or with drug therapy in the lungs.\nFulminant disseminated histoplasmosis is seen in immunocompromized individuals\nwhere immune granulomas are not formed and mononuclear phagocytes are stuffed with\nnumerous fungi throughout the body.\n\nXI. Viral Infections\n\nMechanisms of viral injury:\n\nViruses damage host cells by entering the cell and replicating at the hosts expense.\nViral tropism -in part caused by the binding of specific viral surface proteins to particular\nhost cell surface receptor proteins.\nThe second major cause of viral tropism is the ability of the virus to replicate inside some\ncells but not in others. For example, JC papovavirus, which causes leukoencephalopathy is\nrestricted to oligoderdroglia, in the CNS.\nOnce attached the entire viron or a portion containing the genome and the essential\npolymerase penetrate into the cell cytoplasm in one of the three ways\n1) Translocation of the entire virus across the plasma membrane\n2) Fusion of viral envelop with the cell membrane or\n\n3) Receptor -mediated endocytosis of the virus and fusion with endosomal\n\nWithin the cell, the virus uncoats separating its genome from its structural component and\nlosing its infectivity. Viruses also use host system for viral synthesis.\n- Newly synthesized viral genome and capsid proteins are then assembled into progeny\nvirons in the nucleus or cytoplasm and are released directly (unencapsulated viruses)\nor bud through the plasma membrane (encapsulated viruses)\n- Viral infection can be abortive with incomplete replicative cycle\n- Latent in which the virus (eg herpes zoster) persists in a cryptic state within the dorsal\nroot ganglia and then present with painful shingles\n- Or persistent in which virons are synthesized continuously with or without altered cell\nfunction (eg. Hepatitis B)\n- Viruses kill host cell in a number of ways\n- Viruses infect host cell DNA ,RNA or protein synthesis, ex. Poliovirus\n- Viral proteins insert into the host cells plasma membrane and directly damage its\nintegrity or promote cell fusion ex HIV ,measles herpes viruses (direct cytotopathic\n- Viruses replicate effiently and lyse host cell ex yellow fever virus in liver and neurons\nby poliovirus.\n- Viral proteins on the surface of the host cell are recognized by the immune system,\nand the host cytotoxic lymphocytes then attack the virus-infected cells ex hepatitis B\nvirus infection, and respiratory synaytial virus.\n- Viruses damage cells involved in host antimicrobial defense leading to secondary\ninfection for example viral damaged respiratory epithelium allows subsequent bacterial\npneumonias and HIV depletes CD4+ T cell predisposing to opportunistic infection.\nExample poliovirus cause motor neuron injury and atrophy of distal skeletal muscle.\n- Slow virus infection cause in severe progressive disease after a long latency period for\nexample sub acute pan encephalitis caused by measles virus.\n- Some viruses induce cellular proliferation and transformation example HBV, HPV,\nEBV which result in neoplasm.\n\n\nXII. Exercise\n\nDescribe the etiology, pathogenesis, morphologic changes and clinical effects of each of the\nabove mentioned diseases.\n\n\n\n1. otran RS, Kumar V, Collins T. Robins pathologic basis of diseases. Philadilphia, J.B.\nSaunders Company. 6th edition 1999\n2. acSween RNM, Whaley K. Muirs Textbook of pathology. London, Edward Arlond 13\n\nedition 1992\n3. ubin-E, Farber-JC. Pathology Philadelphia, J.B. Lippincott Company 6\nedition 1994\n4. ey NC, Dey TK. A Textbook of Pathology Calcatta, Messers Allied agency 10\n5. anson-BAHR-PEC, Apted FIC. Mansons tropical diseases, London, Buttler and Tanner\nLtd, 18\nedition 1985\n\n\nI. Learning objectives:\n\nAt the end of this chapter, students are expected to:\n1. Differentiate neoplastic lesions from non-neoplastic ones.\n2. Contrast benign from malignant tumours.\n3. Describe methods and mechanisms of metastasis.\n4. List the etiologic factors in carcinogenesis.\n5. Understand clinical effects of neoplasms\n6. Know the diagnostic modalities for cancers\n\nII. Definition amd Nomenclature\n\nLiterally, neoplasia means new growth and technically, it is defined as abnormal mass of\ntissues the growth of which exceeds and persists in the same excessive manner after\ncessation of the stimulus, evoking the transformation.\n\nNomenclature: Neoplasms are named based upon two factors\non the histologic types : mesenchymal and epithelial\non behavioral patterns : benign and malignant neoplasms\nThus, the suffix -oma denotes a benign neoplasm. Benign mesenchymal neoplasms\noriginating from muscle, bone, fat, blood vessel nerve, fibrous tissue and cartilages are\nnamed as Rhabdomyoma, osteoma, lipoma, hemangioma, neuroma, fibroma and\nchondroma respectively. Benign epithelial neoplasms are classified on the basis of cell of\norigin for example adenoma is the term for benign epithelial neoplasm that form glandular\npattern or on basis of microscopic or macroscopic patterns for example visible finger like or\nwarty projection from epithelial surface are referred to as papillomas.\nThis nomenclature has, however, some exceptions\n(I) Nonneoplastic misnomers hematoma, granuloma, hamartoma\n(II) Malgnant misnomers melanoma, lymphoma, seminoma, glioma, hepatoma.\n\nMalignant neoplasm nomenclature essentially follows the same scheme used for benign\nneoplasm with certain additions. Malignant neoplasms arising from mesenchymal tissues\nare called sarcomas (Greed sar =fleshy). Thus, it is a fleshy tumour. These neoplasms are\nnamed as fibrosarcoma, liposarcoma, osteosarcoma, hemangiosarcoma etc.\nMalignant neoplasms of epithelial cell origin derived from any of the three germ layers are\ncalled carcinomas.\nEg. Ectodermal origin: skin (epidermis squamous cell carcinoma, basal cell\ncarcinoma)Mesodermal origin: renal tubules (renal cell carcinoma).Endodermal origin:\nlinings of the gastrointestinal tract (colonic carcinoma) Carcinomas can be furtherly\nclassified those producing glandular microscopic pictures are called Aden carcinomas and\nthose producing recognizable squamous cells are designated as squamous cell carcinoma\netc furthermore, when possible the carcinoma can be specified by naming the origin of the\ntumour such as renal cell adenocarcinoma etc\nTumors that arise from more than tissue components:\n- Teratomas contain representative of parenchyma cells of more than one germ layer,\nusually all three layers. They arise from totipotential cells and so are principally\nencountered in ovary and testis.\n- Mixed tumors containing both epithelial and mesenchymal components Examples\ninclude pleomorphic adenoma and fibroadenoma\n\nIII. Characteristics of Benign and Malignant Neoplasms\n\nThe difference in characteristics of these neoplasms can be conveniently discussed under\nthe following headings:\n\n1. Differentiation & anaplasia\n2. Rate of growth\n3. Local invasion\n4. Metastasis\n\n1. Differentiation and anaplasia\n\nDifferentiation refers to the extent to which parenchymal cells resemble comparable\nnormal cells both morphologically and functionally. Thus, well-differentiated tumours\n\ncells resemble mature normal cells of tissue of origin. Poorly differentiated or\nundifferentiated tumours have primitive appearing, unspecialized cells. In general,\nbenign neoplasms are well differentiated. Malignant neoplasms in contrast, range from\nwell differentiated, moderately differentiated to poorly differentiate types. Malignant\nneoplasm composed of undifferentiated cells are said to be anaplastic, literally anaplasia\nmeans to form backward.\nMorphology of anaplastic cell includes large Pleomorphic; hyperchromatic nucleus with\nhigh nuclear cytoplasmic ratio 1:1(normally 1:4 to 1:6). The cell usually reveals large\nnucleoli with high and often abnormal mitoses. Tumour giant cells and frequent loss of\npolarity of epithelial arrangements are encountered.\nOn functional differentiation, the well differentiated the neoplasm, the more completely it\nretains the functional capabilities found in its normal counterparts thus, endocrine\ntumours produce hormone (ex. Thyroid, adrenal) so also, well differentiated squamous\ncell carcinoma and well differentiated hepatocellular carcinomas produce keratine and\nbile respectively.\nHowever, highly anaplastic or undifferentiated cells of what cell tissue of origin come to\nresemble each other functionally and morphologically more than the normal cells which\nthey have arisen this is called chemical convergence.\n\n2. Rate of growth\n\nMost benign tumours grow slowly whereas; most malignant tumours grow rapidly\nsometimes, at erratic pace. Some benign tumours for example uterine leiomyoma\nincrease in size during pregnancy due to probably steroidal effects (estrogen) and\nregress in menopause. In general, the growth rate of neoplasms correlate with their\nlevel of differentiation and thus, most malignant neoplasms grow more rapidly than do\nbenign neoplasms. On occasions, cancers have been observed to decrease in size and\neven spontaneously disappear. Examples include renal cell carcinoma, malignant\nmelanoma, choriocarcinoma.\n\n3. Local invasion\n\nNearly all benign neoplasms grow as cohesive expansile masses that remains localized\nto their site of origin and do not have the capacity to invade or metastasize to distant\nsites, as do malignant neoplasms.\nRims of fibrous capsules encapsulate most benign neoplasms. However, hemangiomas\nand neurofibromas are exceptions. Thus, such encapsulations tend to contain the\n\nbenign neoplasms as a discrete, rapidly palpable and easily movable mass that can\neasily surgically enucleated.\nThe growth of malignant neoplasms is accompanied by progressive infiltration, invasion\nand destruction of the surrounding tissue. Generally, they are poorly demarcated from\nthe surrounding normal tissue (and a well-defined cleavage plane is lacking).\nNext to the development of metastasis, invasiveness is the most reliable feature that\ndifferentiates malignant from benign neoplasms.\nEven though, malignant neoplasms can invade all tissues in the body, connective\ntissues are the favoured invasive path for most malignant neoplasms, due to the\nelaboration of some enzymes such as type IV collagnases & plasmin, which is specific to\ncollagen of basement membrane. Several matrix-degrading enzymes including\nglycosidase may be associated with tumour invasion.\nArteries are much more resistant to invasion than are veins and lymphatic channels due\nto its increased elastic fibers contents and its thickened wall. Densely compact collagens\nsuch as membranous tendons, and joint capsules. Cartilage is probably the most\nresistant of all tissues to invasions and this is may be due to the biologic stability and\nslow turnover of cartilage.\n\nSequential steps in mechanisms of tumor invasion & metastasis:\n\na. Carcinoma in-situ\nb. Malignant cell surface receptors bind to basement membrane components (ex\nc. Malignant cell disrupt and invade basement membrane by releasing collagenase\ntype IV and other protease.\nd. Invasion of the extracellular matrix\ne. Detachment\nf. Embolization\ng. Survival in the circulation\nh. Arrest\ni. Extravasation\nj. Evasion of host defense\nk. Progressive growth\nl. Metastasis\n\nMost carcinomas begin as localized growth confined to the epithelium in which they arise.\nAs long as this early cancers do not penetrate the basement membrane on which the\nepithelium rests such tumours are called carcinoma in-situ.\nIn those situations in which cancers arise from cell that are not confined by a basement\nmembrane, such as connective tissue cells, lymphoid elements and hepatocytes, an in-situ\nstage is not defined.\n\n4. Metastasis\n\nIt is defined as a transfer of malignant cells from one site to another not directly\nconnected with it (as it is described in the above steps).\nMetastasis is the most reliable sign of malignancy. The invasiveness of cancers permits\nthem to penetrate in to the blood vessel, lymphatic and body cavities providing the\nopportunity for spread.\nMost malignant neoplasm metastasies except few such as gliomas in the central\nnervous system, basal cell carcinoma (Rodent ulcer) in the skin and\ndermatofibrosarcoma in soft tissues.\nOrgans least favoured for metastatic spread include striated muscles and spleen.\nSince the pattern of metastasis is unpredictable, no judgment can be made about the\npossibility of metastasis from pathologic examination of the primary tumour.\nApproximately 30% of newly diagnosed patients with solid tumours (excluding skin\ncancers other than melanoma) present with metastasis in the studied populations.\n\nPathways of spread:\n\nDissemination of malignant neoplasm may occur through one of the following pathways.\n1. Seeding of body cavities and surfaces (transcoelomic spread)\nThis seeding may occur wherever a malignant neoplasm penetrates into a natural open\nfield. Most often involved is the peritoneal cavity, but any other cavities such as pleural,\npericardial, sub-arachnoid and joint spaces-may be affected.\nParticular examples are krukenberg tumour that is a classical example of mucin\nproducing signet ring adenocarcinomas arising from gastrointestinal tract, pancreas,\nbreast, and gall bladder may spread to one or both ovaries and the peritoneal cavities.\nThe other example is pseudomyxoma peritoni which are mucus secreting adrocarcinoma\narising either from ovary or appendix. These carcinomas fill the peritoneal cavity with a\n\ngelatinous soft, translucent neoplastic mass. It can also be associated with primaries in\nthe gallbladder and pancreas.\n\n2. Lymphatic spread\nLymphatic route is the most common pathway for the initial dissemination of carcinomas\nThe pattern of lymph node involvement follows the natural routes of drainage. Lymph\nnodes involvement in cancers is in direct proportion to the number of tumour cell\nreaching the nodes.\nDue to numerous inter connections between vascular and lymphatic channels the\nemphasis that used to be given, lymphatic spread for carcinomas and vascular spread\nfor sarcomas is misreading.\nMetastasis to lymph nodes first lodge in the marginal sinus and then extends throughout\nthe node. The cut surface of this enlarged lymph node usually resembles that of the\nprimary tumour in colour and consistency. The best examples of lymphatic spread of\nmalignant neoplasm can be exemplified by breast carcinoma.\n-Skip metastasis may occur when local lymph nodes may be by- passed and\noccasionally found in lymph node distant from the site of the primary malignant\nneoplasm. Skip metastasis happen to occur because of venous lymphatic anastomoses\nor because inflammation or radiation has obliterated the lymphatic channels for example\nabdominal cancer (gastric cancer) may be initially signaled by supra clavicular (sentinel\nA clinical presence of enlarged lymph node is not necessarily synonymous with a\nmetastasis. Conversely, the absence of tumour cells in reseated lymph nodes does not\nguarantee that there is no underlying cancer.\n\n3. Hematogenous spread\nTypical for all sarcomas and certain carcinomas- the spread appears to be selective with\nseed and soil phenomenon. Lung & liver are common sites of metastasis because they\nreceive the systemic and venous out flow respectively. Other major sites of\nhematogenous spread include brain and bones.\nIn the circulation, tumour cells form emboli by aggregation and by adhering to circulating\nleukocytes particularly platelets. The site where tumour cell emboli lodge and produce\nsecondary growth is influenced by\nVascular (and lymphatic) drainage from the site of the primary tumour\nInteraction of tumour cells with organ specific receptors\nThe microenvironment of the organ or site, example a tissue rich in protease\ninhibitors might be resistant to penetration by tumour cells.\n\n\nIV. Cancer Epidemiology\n\nThe only certain way to avoid cancer is not to be born, to live is to incur the risk.\nThus, In USA one in five deaths is due to cancers. Over the years cancer incidence\nincreased in males while it slightly decreased in females (due to largely screening\nProcedures-cervical, breast etc.). In the studied populations the most common cancer in\nmales is broncogenic carcinoma while breast carcinoma in females.\nMost cancers in adults occur in those over 55 years of age.\nChildren under 15 years of age however, are susceptible to acute leukemia, central\nnervous system tumours, neuroblastoma, wilm's tumour, retinoblastoma, rhabdo\nmyosarcoma and etc. Acute leukemias and neoplasms of the central nervous system\naccounts for about 60% of the deaths.\n\nGeographic factors (geographic pathology):\nSpecific differences in incidence rates of cancers are seen worldwide.For example,\nStomach carcinoma - Japan\nLung cancer - USA\nSkin cancer - New zeland & Australia\nLiver cancer - Ethiopia\n\nEnvironmental factors (occupational hazards) include:\nAsbestos-----Lung cancer, mesothelioma,esophagus and, stomach carcinomas;\nVinyl chloride----Angiosarcoma of liver\nBenzene ---Leukemias\nCigarette smoking-----Brochogenic carcinomas\nVenereal infection (HPV)--Cervical carcinoma\n\nPremalignant disorders\na) Heredity premalignant disorders\nInherited predisposition to cancer is categorized in to three groups:\ni. Inherited cancer syndromes (Autosomal dominant) with strong familial history\n- Familial retinoblastomas usually bilateral, and a second cancer risk particularly\nosteogenic sarcoma. Oncosupressor gene is the basis for this carcinogenesis\n\n- Familial adenomatous polyps of the colon. virtually all cases are fatal to develop\ncarcinoma of the colon by the age of 50.\n\nii. Familial cancers:\nEvidence of familial clustering of cancer are documented\nE.g. Breast, ovarian, colonic, and brain cancers\n\niii. Autosmal recessive syndromes of defective DNA repair Characterized by\nchromosomal or DNA instability syndrome such as xeroderma pigmentosium, Ataxia\ntelaangietasia, Bloom syndrome and Fanconi anemia\n\nB) Acquired preneoplastic disorders\n\nRegenerative, hyperplasic and dysplastic proliferations are fertile soil for the\norigin of malignant neoplasms.\nEndometrial hyperplasia - endometrial carcinoma\nCervical dysplasia - cervical cancer\nBronchial dysplasia - bronchogenic carcinoma\nRegenerative nodules - liver cancer\nCertain non-neoplastic disorders may predispose to cancers.\nChronic atrophic gastritis - gastric cancer\nSolar keratosis of skin - skin cancer\nChronic ulcerative colitis - colonic cancer\nLeukoplakia of the\noral cavity, vulva and penis - squamous cell carcinoma\nCertain types of benign neoplasms\nLarge cumulative experiences indicate that most benign neoplasms do not become\nmalignant. However, some benign neoplasms can constitute premalignant conditions.\nFor example:\nVillous colonic adenoma - Colonic cancer\n\nV. Molecular Basis of Cancer (Carcinogenesis)\n\nBasic principles of carcinogenesis:\n\nThe fundamental principles in carcinogenesis include\n1) Non-lethal genetic damage lies at the heart of carcinogenesis. Such genetic damage\n(mutation) may be acquired by the action of environmental agents such as\nchemicals, radiation or viruses or it may be inherited in the germ line.\n2) The three classes of normal regulatory genes are:\ni) The growth promoting proto-oncogenes\nActivation of proto-oncogenes activation gives rise to oncogenes (cancer causing\n- oncogenes are activated by\n- Point mutation\n- Chromosomal rearrangements ranslocation Inversion\n- Gene amplification\nii) Cancer suppressor genes (anti oncogenes)\nIts physiologic role is to regulate cell growth however, the inactivation of cancer\nsuppressor genes is the key event in cancer genesis\nExamples of tumour suppressor genes include-Rb, P53, APC and NF-1&2\niii) Genes that regulate apoptosis\nGenes that prevent or induce programmed cell death are also important\nvariables in the cancer equation. These genes include bcl-2 that inhibits\napoptosis whereas, others such as bax. Bad, and bcl-x5 favour programmed\ncell death. Genes that regulate apoptosis may be dominant as are proto-\noncogenes or may behave as cancer suppressor genes (recessive in nature)\niv) Genes that regulate DNA repair\nInability to DNA repair can predispose to mutations in the genome and hence,\nto neoplastic transformations\n3) Carcinogenesis is a multifactorial process\nat both the phenotypic and genotypic levels.\n\n\nTypes of carcinogenesis:\n\nA large number of agents cause genetic damages and induce neoplastic transformation of\ncells. They fall into the following three categories:\n\na) Chemical carcinogenesis\nb) Radiation carcinogenesis\nc) Viral carcinogenesis\n\nA) Chemical carcinogenesis\n\nAn enormous variety of chemicals may induce tumours and this was exemplified by Sir\nPercival Potts observation in the last century that astutely related the increased incidence of\nscrotal skin cancer in chimney sweeps to chronic exposure to soot.\n\nSteps involved in chemical carcinogenesis\nappropriate dose of a chemical carcinogenic agents to a cell results in the formation of\ninitiation promotion sequence\nInitiation causes permanent DNA damage (mutation) which, is rapid and irreversible.\nHowever, initiation alone is not sufficient for tumour formation and thus, promoters can\ninduce tumours in initiated cells, but they are non-tumourogenic by themselves.\nFurthermore, tumours do not result when a promoting agent applied before, the\ninitiating agent.\nIn contrast to the effects of initiators, the cellular changes resulting from the application\nof promoters do not affect DNA directly and are reversible.\nPromoters render cells susceptible to additional mutations by causing cellular\nproliferation. Examples of promoters include phorbol ester, hormones, phenols and\n\nChemical carcinogenic agents fall into two categories\n1. Directly acting compound\nThese are ultimate carcinogens and have one property in common:\nThey are highly reactive electrophiles (have electron deficient atoms) that can react\nwith nucleophilic (electron-rich) sites in the cell. This reaction is non-enzymatic and\nresult in the formation of covalent adducts (addition products) between the chemical\ncarcinogen and a nucleotide in DNA.\n\nElectrophilic reactions may attack several electron-rich sites in the target cells\nincluding DNA, RNA, and proteins.\nOnly a few alkylating and acylating agents are directly acting carcinogens\n\n2. Indirect acting compounds (or pro-carcinogens)\nRequires metabolic conversion in vivo to produce ultimate carcinogens capable of\ntransforming cells.\nMost known carcinogens are metabolized by cytochrome p-450 dependent mono-\nExamples of this group include polycyclic and heterocyclic aromatic hydocarbones,\nand aromatic amines etc.\nThese chemical carcinogens lead to mutations in cells by affecting the functions of\noncogenes, onco-suppressor genes and genes that regulate apoptosis.\n\nB) Radiation carcinogenesis\n\nRadiant energy whether in form of ultraviolet (UV) sun light or ionizing electromagnetic (X\nrays and gamma ( ) rays) and particulates (,, protons and neutrons) radiation can\ntransform and induce neoplasm in both humans and experimental animals.\n\nTwo types of radiation injuries are recognized:\n\ni) Ultraviolet rays (UV light)\nUV rays are examples of non-ionizing radiation that cause vibration and rotation of\natoms in biologic molecules\nUV rays induce an increased incidence of squamous cell carcinoma, basal cell\ncarcinoma and possibly malignant melanoma of skin.\nRisk factors for developing UV rays related disorders depend on\n- Type of UV rays UV type B\n- Intensity of exposure\n- Quality of light absorbing protective mantle of melanin in the skin\nEx. Australians (queen's land etc.)\nUV rays effects on cell nucleus are:\n-The carcinogenesis of UV type B rays is attributable to its formation of pyrimidine\ndimmers in DNA\n- However, UV rays can also cause inhibition of cell division, inactivation of enzymes,\nInduction of mutation and sufficient dose kill cells.\n\n\nAs with other carcinogens, UVB also cause mutations on oncogenes and tumour suppressor\ngenes mutant forms of P53 and ras genes have been detected.\n\nii) Ionizing radiation\n\nIonizing radiations are of short wave lengh and high frequency which can ionize\nbiologic target molecules and eject electrons\nElectromagnetic and particulate radiations in forms of theureptic, occupational or\natomic bomb incidents can be carcinogenic\nOccupational hazards include:\nMany of the poineers in the development of roentegen rays develop skin cancers.Miners\nfor radioactive elements---lung cancer\nTherapeutic irradiations have been documented to be carcinogenic. Thyroid cancer\nmay result from childhood & infancy irradiation (9%), and by the same taken\nradiation therapy for spondylitis may lead to a possible acute leukemia year later.\nIn atomic bonds dropped in Hiroshima and Nagasaki initially principal cancers were\nacute and chronic mylogenous leukemias after a latent of about 7 years solid\ntumours such as breast, colon, thyroid and lung cancers) increased in incidence.\nIn humans, there is a hierarchy of vulnerability of radiation-induced cancers. Most\nfrequent are the leukemia except CLL, which almost never follow radiation injury.\nCancer of the thyroid follows closely but only in the young. In intermediate category\nare cancers of the breast, lungs, and salivary glands\nIn contrast, skin, bone and gastrointestinal tract are relatively resistant to radiation-\ninduced neoplasia.\n\nC) Viral and bacterial carcinogenesis\n\nLarge groups of DNA and RNA viruses have proved to be oncogenic and there is an\nassociation between infections by the bacterium Helicobacter Pylori and gastric\n\ni) DNA oncogenic viruses\nThis group includes:\nHuman Papilloma Virus (HPV)\nEpstein Barr Virus (EBV)\nHepatitis B Virus (HBV)\n\n\nGeneral feature of the oncogenic DNA virus\na) Transforming DNA virus form stable associations with the host cell genome. The\nintegrated virus is unable to complete its replicative cycle because the viral genes\nessential for completion of replication are interrupted during integration of viral DNA\nb) Those viral genes that are transcribed early (early genes) in the viral life cycle are\nexpressed in the transformed cells.\n\nHuman papilloma Virus (HPV)\nHPV definitely causes benign squamous papilloma (warts) (type 1,2,3,4, 7). It also\nimplicated in the genesis of squamous cell carcinomas of cervix and anogenital region\n(types 16,18 and also 31,33,35,and 51 found in 85% SCC). It is also linked to the\ncausation of oral and laryngeal cancers.\nThe HPV DNA integration into host cell is random (viral DNA is found in different\nlocations), however, the pattern of integration, is clonal (that is the site of integration is\nidentical within all cells of a given cancer).\n\nEpstein Barr virus (EBV)\nMember of the herpes family has been implicated in the pathogenesis of four tumours.\nThe African form of Burkitt's lymphoma, B- cell lymphomas in immuno suppressed\nindividuals particularly in those with some cases of Hodgkins disease and Naso\npharyngeal carcinoma.\nEBV infects epithelial cell of the oro pharynx and B- lymphocytes. The infection of B- cell\nis latent and the latently infected B-cell is immortalized. Several viral genes dysregulate\nthe normal proliferative and survival signals in latently infects cells for example the latent\nmembrane protein 1 (LMP-1) prevents apoptosis of B- cells by up regulating the\nexpression of bc1-2 and it activates growth promoting pathways. Thus, LMP-1 can\ninduce both cell growth and cell survival. Similarly the EBV- encoded EBNA- gene\ntransactivates several host genes including cyclin D and members of the src family\nEBNA- 2 also activates the transcription of LMP- 1. Thus, it seems that several viral\ngenes collaborate to render B- cells immortal.\nThe Association between African Burkett Lymphoma and EBV is quite strong.\nMore than 90% of African tumours carry the EBV genome\nOne hundred percent of the patients have elevated antibody titres against viral\ncapsid antigens\n\nSerum antibody titres against viral capsid antigens are correlated with the risk of\ndeveloping the tumour.Several other observations suggested that additional factors\nmust be involved. In Africa poorly understood co-factor (ex chromic malaria), favor\nsustained proliferation of B- cells immortalized by EBV. The actively dividing B- cells\nare at increased risk of mutations (t- 8; 14) translocation that juxta - pose C- myc with\none of Immuno- globuline gene loci.\n\nHepatitis B- virus (HBV)\nStrong epidemiologic association prevails between HBV and hepato cellular\nCarcinoma. HBV genome, however, does not encode any oncoproteins, and there is\nno consistent pattern of integration in the vicinity of any known protomcogeres\nThe effects of HBV is indirect and possibly multi factorial.\ni) By causing chronic liver cell injury and accompanying regenerative hyperplasic\nii) HBV encodes a regulatory element called HBx protein, which disrupts normal growth\ncontrol of infected liver cells by transcriptional activation of several growth promoting\ngenes such as insulin like growth factor II\niii) HBV binds to P53 and appears to interfere with its growth suppressing activities.\nAlthough not a DNA virus hepatitis virus is also strongly linked to the pathogenesis of\nhepato cellular carcinoma as evidenced by epidemiologic studies.\n\nii. RNA oncogenic viruses\nAlthough the study of animal retroviruses has provided spectacular insights to\nmolecular basis of cancer , only one retrovirus is firmly implicated in the causation\nof cancer and it is Human T cells leukemia/ lymphoma virus type 1 (HTLV-1) .\nSimilar to HIV virus. HTLV-1 has tropism for CD4+T cells > Human infection\nrequires transmission of infected T cells through sexual intercourse, blood products,\nor breast feedings. Leukemia develops after a 20 or 30 years of latency in about 1%\nof patients. HTLV-1 is also associated tropical spastic Para paresis.\n\niii. Helicobacter pylori\nThere is an association between gastric infections with helicobacter pylori as a\ncause of gastric lymphoma. The stronger link is with B cell lymphoma of stomach.\nTreatment of H. pylori with antibiotics results in regression of the lymphoma in most\ncases. The lymphoma arise from the mucosa associated lymphoid tissues (MALT)\nhence, they sometimes are called MALTOMAS. The lymphoid cells reside in the\nmarginal zones of lymphoid follicles and hence alternatively named as mantle zone\n\nVI. Clinical Features of Tumors\nNeoplasms are essentially parasites. In fact, benign lesions are more common than cancers.\nAlthough cancer evaluation may suggest one or the other, the only unequivocal benign\nmass is the excised and histopathologically diagnosed one.\nEffects of tumour on the host:\nBoth benigin and malignant neoplasms may cause problems because of\n1. location and impingement on adjcent structures\n2. functional activities such as hormone synthesis\n3. bleeding and secondary infection when they ulcerate through adjacent natural surfaces\n4. initiation of acute symptoms caused by either rupture or infarction local and hormonal\nFor example pituitary adenoma being located in critical location can cause serious\nAnalogously cancers arising with or metastatic to an endocrine organ may cause an\nendocrine in suffiecency by destroying the gland.\nNeoplasms in the gut (both bening and malignant may cause obstruction as they\nBenign neoplasms more commonly of endocrine origin may produce manifestations by\nelaboration of hormones. For example a benign B- cell adenoma of pancreatic islets\nless than 1 cm in diameter may produce sufficient insulin to cause fatal hypoglycemia\nThe erosive destructive growth of cancers or expansile pressure on benign tumour of\nany natural surface may cause ulceration secondary infection and bleeding.\n\n5. Cancer cachexia\nCachexia is a progressive loss of body fat and lean body mass accompanied by\nprofound weakness, anorexia and anemia .The origin of cancer cachexia are obscure\nClinically anorexia is a common problem in patients with cancer. Reduced food intake\nhas been related to abnormalities in taste and central control of appetite. In patents\nwith cancer, calorie expenditure often remains high and basal metabolic rate is\nincreased despite reduced food intake.\nThe basis of metabolic abnormalities is not fully understood; however, TNF produced\nby macrophages and possibly by some tumour cells is the mediator of the wasting\nsyndrome that accompanies cancer. Other cytokines such as IL-1 and IFN\nsynergize with TNF\nA protein-mobilizing factor has been isolated from the serum of animals and humans\nwith cancer cachexia\n\n6. Paraneoplastic syndromes\nParaneoplastic syndrome is an aggregate of symptom complexes in cancer - bearing\npatients that can not readily be explained either by the local or distant spread of the\ntumour or by the elaboration of hormones indigenous to the tissue from which the\ntumour arose\nParaneoplastic syndrome occurs in about 10% of patients with malignant disease\nDespite its infrequency, the syndrome is important for three reasons:\n1. They be the earliest manifestation of an occult neoplasm\n2. In affected patients, they may represent significant clinical problems and may even\nbe lethal.\n3. They may mimic metastatic disease and, therefore, confound treatment\n\nClassification of paraneoplastic syndromes\nCushing syndrome Small lung ca, pancreatic ca ACTH and ACTH like\nIADH Secretion Small cell lung Ca ADH or atrial natriuretic\nHypercalcimia SCC of lungs, breast ca, renal ca,\nAdult T-cell leukemia /lymphoma,\novarian cancers\nParathyroid hormone\nrelated peptide TGF -, TNF\nHypoglycemia Fibrosarcoma other sarcomas\nInsulin or insulin like\nCarcinoid syndrome Bronchial adenoma, pancreatic\nca, gastric ca\nSerotonins, bradykinins\nPolycythemia Renal ca, cerebellar\nHemangioma, liver cancer\nDermatologic disorders such\nas acanthosiss nigricans,\nGastric, lung & uterine cancers\nBronchographie ca, breast ca\n? immunologic\n? immunologic\nVascular and hematologic\nVenous thrombosis Pancreatic and bronchogenic cas Mucin that activate clotting\nNonbacterial thrombotic\nAdvanced cancers Hypercoagulobilty\n\nHypercalcimia is probably the most common paraneoplastic syndrome and among\nendocrinopathies Cushing syndrome is the most common variety of paraneoplastic effect.\n\nGrading and staging of cancers\n\nGrading denotes the level of differentiation whereas, staging expresses the extent of\ntumour spread and forcast the clinical gravity of cancers\nGrading of a cancer is based on the degree of differentiation of tumour cells and the\nnumber of mitoses within the tumour and presumably correlates to aggressive\ncharacter of the neoplasm\nCancers are classified into grades I to IV with increasing anaplasia. Criteria for\nindividual grades vary with each form of neoplasm\nThe staging of cancers is based on the size of primary lesions, its extent of spread to\nregional lymph nodes and the presence or absence of blood born metastases\nTwo major staging systems are currently in use are Union internationale contre\ncancer (UICC) which utilizes the so- called TNM system T for primary tumour N for\nregional lymph node involvement and m for metastasis\n\nThe TNM staging varies for each specific form of cancer but there are general principles:\n\nWith increasing size, the primary lesion is characterized as T to T4 to is added to\nindicate as in - situ lesion.\nNo for no nodal involvement whereas, N1 -N3 wound denote involvement of an\nincreasing number and range of nodes\nMo signifies no distant metastasis whereas M1 or sometimes M\nindicates the\npresence of blood born metastasis\n\nThe American joint committee (AJC) employs a somewhat different nomenclature and\ndivides all cancers into stages to IV incorporating within each of these stages the size of the\nprimary lesion as well as the presence of nodal spread and the distant metastasis\n\nThe staging of neoplastic disease has assumed great importance in the selection of\nthe best form of therapy for the patient. Indeed, staging has proved to be of greater\nclinical value than grading.\n\nVII. Laboratory Diagnosis of Cancer\n\nEvery year approach to laboratory diagnosis of cancer becomes more complex more\nsophisticated and more specialized with time.\n\nHistologic and cytologic methods:\n\nThe laboratory diagnoses of most cancers is not difficult however, border line cases in\nno man's land where wise men trade cautiously pose the most difficulties\nClinicians tend to underestimate the important contributions they make in the diagnosis\nof neoplasms. Clinical data are invaluable for optimal pathologic diagnosis for example\nradiation changes in the skin or mucosa can be similar to cancer and similarly section\ntaken from a healing fracure can mimic remarkably an osteosarcoma.\nThe laboratory sample to be diagnosed need to be adequate, representative and well\n\nSeveral sampling approaches are available:\n1. Excisional or incisional biopsy\n2. Cytologic smears:\nFine needle aspiration\nPAP smear\nFluid cytology\n3. Advanced techniques\nFlow cytometry\nTumour markers\n\nExcisional biopsy\nSelection of an appropriate site for biopsy of a large mass requires awareness that the\nmargins may not be representative and the center largely necrotic .analogously\ndisseminated lymphoma involving inguinal lymph nodes that drain large part of the\nbody often have reactive changes that may mask neoplastic involement.\nAppropriate preservation of specimens is obvious thus, formalin for routine fixation\nglutaraldehide for electron microscopy prompt refrigration to permit optimal hormone\nby receptor analysis\n\nRequesting, quick frozen section\" diagnosis is sometimes desirable for determining\n(for example in breast carcinoma) for evaluating the margins of an excised cancer to\nascertain that the entire neoplasm has been removed.\n\nFine needle aspiration\nThe procedure involves aspirating cell and attendant fluid with a small needle followed\nby cytologic examination of the stained smear\nThis method is used most commonly for the assessment of readily palpable lesions\nsuch as breasts, thyroid and lymph nodes etc.\n\nCytologic (PAP) smear\nThis method is widely used for the discovery of carcinoma of the cervix, it also detect\ncervical cancers at an in situ stage, and other suspected malignancies such as\nendometrial, and bronchogenic carcinomas, bladder and prostatic tumours and gastric\nIt is also used for the identification of tumour cell in abdominal, pleural joint and\ncerebrospinal fluids\n\nTumour markers\nTumour markers are biochemical indicators of the presence of a tumour. They\ninclude cell surface antigens, cytoplasmic proteins, enzymes and hormones.\nTumour markers can not be construed as primary modalites for the diagnosis of\ncancer and thus, act as supportive laboratory tests.\nA host of tumour markers have been described and new only appear every year\n\n\nSelected Tumor Markers\nMarkers Associated cancers\n- Hormones\nHuman gonadothrphic\nhormone (HCG)\nThrophoblastic tumours, non seminomatous testicular\nCatecholamine Medulary thyroid carcinoma (ca)\nCathecolamines &\nPheochromocytoma & related tumours\nEctopic hormones Paraneoplastic syndromes\nOn co fetal antigens\nfetoprotein Hepatic ca, non seminomatous germ cell tumours of\nCEA Ca s of colon, pancrease, lung, stomach and\nProstatic acid phosphatase Prostate cancer\nNon specific enolase Small cell cancer of lung, neuroblastoma\nSpecific proteins\nImmunoglobulins Multiple myloma and other gammopathres\nProstatic specific antigens Prostate cancer\nMucins and other\n\nCA-125 Ovarian cancer\nCA-19-9 Colon cancer, pancreatic cancer\nCA15-3 Breast cancer\n\nNew advanced techniques are being constantly added to the tools of the surgical\npathologists, which include:\n\n1. Immunocytochemistry\nThe availability of specific monoclonal antibodies has greatly facilitates the identification of\ncell products and surface markers. Some examples of utility of immunocyto chemistry in the\ndiagnosis of malignant neoplasms are\n\no Categorization of undifferentiated malignant tumours here intermediate filaments\nare important. Keratin for carcinomas, desmin for neoplasms of muscle origin\no Categorization of leukemias / lymphomas\no Determination of site of origin of metastatic tumours\no Detection of molecules that have prognostic or therapeutic significance: Detection\nof hormone ( estrogen /progesterone) receptors in breast cancer cells is of\nprognostic and therapeutic value because these cancers are susceptible to anti-\nestrogen therapy .Protein products of oncogen such as C- erb B\nin breast cancer\nare prognosis\no Prognosis of malignant neoplasms\no Detection of minimal residual disease\no Diagnosis of hereditary predisposition cancer\n\n2 Flow cytometry\n\nidentification of cell surface antigens by flow cytometory is widely used in the\nclassification of leukemias and lymphomas Follow cytometry is used for detection of\naneuplody which is also associated with poorer prognosis in early stage breast cancer\ncarcinomas of the urinary bladder lung cancer colorectal cancer, and prostate cancer\n\n\nVIII. Exercises\n\n1. Define neoplasia.\n2. Discuss the differences between benigin and malignant neoplasms.\n3. What are the etiologic factors in carcinogenesis?\n4. Discuss the clinical features of neoplasms.\n5. How is the diagnosis of cancer made in the laboratory?\n\n\n\nSaunders Company. 6th edition 1999\nedition 1992\nedition 1994\n\n\nI. Learning objectives\n\nBy the time the student is through with this lecture note he/she should be able to:\n1. Define diabetes mellitus.\n2. Know the classification of DM and the basis for the classification.\n3. List the criteria for the diagnosis of DM.\n4. Describe the pathogenesis of type 1 and type 2 DM.\n5. Describe the pathologic lesion seen in the pancreas of a patient with type 1 and type\n2 MD.\n6. Tell the clinical manifestation of DM.\n7. Know the complications of DM\n\nII. Introduction\n\nHuman beings are subjected to a variety of metabolic diseases, as we are a complex set of\nstructures that function through quite a varied and intertwined metabolic processes. Most\nmetabolic diseases have genetic basis while some are acquired in life or need the complex\ninterplay between nature and nurture for their existence. Genetic diseases either follow a\nsingle gene disorder or a polygenic basis with multifactorial disorders.\n\nA. Metabolic diseases with a single gene disorder\nThese metabolic diseases follow a Mendelian type of inheritance i.e. they follow an\nautosomal dominant disorder (e.g., Familial hypercholesterolemia, Acute intermittent\nporphyria); an autosomal recessive disorder (e.g. Phenylketonuria, Galactosemia, Glycogen\nstorage diseases); and x-linked recessive disorders (e.g. Phosphorylase kinase deficiency,\nGSD). These are all rare Biochemical genetic diseases and they are beyond the scope of\nthis lecture note.\n\nB. Metabolic disease with a polygenic disorder\nThese metabolic diseases have multifactorial modes of inheritance.\nThey are caused by the additive effects of two or more genes of small effect but conditioned\nby environmental, non-genetic influences. Example in these groups of metabolic diseases\n\nincludes Diabetes mellitus and Gout. These two groups of metabolic diseases are further\ndiscussed below.\n\nIII. Diabetes Mellitus\n\nThe definition, classificatioin, epidemiology, pathogenesis, morphology, clinical featutres,\ndiagnostic criteria, & complications of diabetes mellitus will be discussed next in this\n\n1. Definition\n\nDM represents a heterogeneous group of disorders that have hyperglycemia as a common\nIt can also be defined as a chronic metabolic abnormality of CHO, Fat, and Protein.\n\n2. Classification\nAlthough all forms of DM are characterized by hyperglycemia the pathogenic mechanism by\nwhich hyperglycemia arises differ widely.\nRecent classification of DM is based on the pathogenic mechanism that led to the\ndevelopment of the diabetic syndrome rather than age of onset and type of therapy.\nAs to the new classification there are four types of diabetes of which the first two are the\nmajor types.\n\nA. Type 1 DM\nfurther classified as type1A and type1B.\n\nType 1A DM results from autoimmune beta cell destruction which results in absolute\ninsulin deficiency\nType 1B (idiopathic group) is also characterized by insulin deficiency and a tendency\nto develop ketosis (will be discussed later). The cause that led to insulin deficiency is\nnot known\n\n\nB. Type 2 DM\nIt is a heterogeneous group of disorders usually characterized by variable degrees of\ninsulin resistance, impaired insulin secretion, and increased glucose production.\n\nC. Other specific types of DM\nOther causes for DM include specific genetic defects in insulin secretion or action, metabolic\nabnormalities that impair insulin secretion, conditions that impair glucose tolerance, exocrine\ndisease of the pancreas that lead to destruction of beta cell, several endocrinopathies that\ncan lead to DM as a result of excessive secretion of hormones that antagonize the action of\n\nD. Gestational diabetes\nN.B- the previously used terms, NIDDM to represent type 2 DM and IDDM to represent type\n1 DM, are obsolete.\n\n3. Epidemiology\nThe prevalence of DM has increased dramatically in the world due to the increasing\nurbanization and consequent life style changes.\nThere is considerable variation in DM prevalence among different ethnic groups world\nwide due to both genetic and environmental factors.\nType 2DM accounts to 80% of all cases and type 1DM accounts to 5-10% of all cases\nof diabetes.\nThe incidence of DM is similar in men and women throughout most age ranges but is\nslightly greater in men> 60 years of age.\n\n4. Pathogenesis\n\nA. Type 1A DM\n\nthere is an autoimmune destruction of beta cells of the pancreas\nIt is at least after 80% of the beta cells are destroyed that a metabolic\nabnormality appears in IDDM.\nThe pathogenesis begins with a genetic susceptibility and some environmental factors\ninitiates the autoimmune process in such susceptible individuals.\n\nGenetic factors/ evidences\n\n1. Less than 20% of Type 1 diabetics have a parent or sibling with the disease. This can\nbe sited as evidence that genetic factors are involved in the pathogenesis of the disease.\n\n2. In studies of identical (monozygotic) twins in which one or both were diabetic, both\nmembers of the pair were affected in approximately half of the cases [i.e. there is a 50%\nconcordance rate]\n\nN.B these 50 % concordance rate shows that environmental factors contribute to\nthe development of the disease on a heritable predisposition\n\n3. Type 1 DM is believed to be a polygenic disorder. Additional evidence came from\nstudies of genes that code for antigens of the major Histocompatibilty complex. In\npatients with type 1 diabetes, 95% express either HLA- DR3 or HLA DR4, or both,\ncompared with 40% of the general population who exhibit the above MHC genes.\n\nThe above three genetic factors/ evidences show that there is a genetic factor that is/ are\nimportant for the susceptibly to the disease and environmental factors are required to the\ndevelopment of an autoimmune reaction on these susceptible individuals.\n\n\n- This is a development of auto antibodies to self antigens.\n- Environmental factors are essential for the development of the autoimmune process but\nthe exact mode of their action is not clear (see the proposed mode of action below in the\ndiscussion of environmental factors).\n- Evidences for autoimmune involvement in the destruction of B cells to wards the\ndevelopment of Type 1A DM are as follows.\n\n1. Circulating auto- antibodies against components of the beta cells and against insulin\nwere demonstrated in the large majority of all newly diagnosed children with diabetes.\n2. The destruction of beta cells by an immune response is also evidenced by the presence\nof mononuclear cell infiltrates in the pancreatic tissue of a patient with type 1 diabetes\n\nEnvironmental factors\n\nAs mentioned earlier, the fact that a significant proportion of monozygotic twins remain\ndiscordant for Diabetes suggests that non-genetic factors are required for development of\n- The environmental factor in many cases that is responsible for the initiative of an\nautoimmune reaction is believed to be a viral infection of the pancreas.\n- Coxsakievirus, Rubella virus, Infectious mononucleosis, Mumps and other viruses are\nincremented as viral causes\n- Presumably, viral infections of the pancreas could induce diabetes by two mechanisms.\nDirect inflammatory disruption of islets( which is a rare cause of DM) or induction of an\nautoimmune response by exposing crypting B cell antigens.\n- It has also been suggested that exposure to proteins contained in cow's milk may be an\nenvironmental trigger for type1 diabetes. This is because milk proteins provide specific\npeptides that share antigenic sites (molecular mimicry) with human B cell surface proteins\nthere by eliciting the production of auto reactive antibodies.\n\nGenetic predisposition\n\n\n\nFigure 10-1- Suggested pathogenic mechanism of type I DM\n\nHLA linked genes\nand other genetic loci\nImmune response\nagainst beta cells\nViral infection:\nMolecular mimicry\nAND/OR Damage to\nbeta cells\nBeta cell destruction\n\n\nB. Type 2 DM\nIs also a polygenic disorder\nCentral to the development of type 2 DM are insulin resistance and abnormal insulin\nsecretion. Many believe that peripheral insulin resistance precedes the latter\n\nGenetic factors\n60% of patients have either a parent or sibling with this disease\n>80% concordance rate in monozygotic twins\nThe above figures suggests that type 2 DM has strong genetic basis than type 1 DM\nNo association with MHC class genes is found\nDespite the defect in insulin secretion, many patients with type 2 diabetes have\nincreased insulin concentration in the blood in an attempt to overcome the peripheral\ninsulin resistance. The hyperinsulinemia inturn results in decreased insulin receptors\nperipherally in the muscle and adipose tissue.\n\nEnvironmental factor\n\nThe major environmental factor is obesity, which augments the genetically determined\ninsulin resistance of type 2 DM\n\nType 2 DM is characterized by three pathophysiologic abnormalities: impaired insulin\nsecretion, peripheral insulin resistance, and excessive hepatic glucose production.\nInsulin resistance.\n- Is a prominent feature of type 2 DM\n- Is caused by decreased efficiency of insulin to act on peripheral tissue especially liver\nand skeletal muscles.\n- The precise mechanism of insulin resistance is unknown but a post receptor defect is\nbelieved to play the major role.\n- Insulin resistance leads to:\nA. Decreased peripheral utilization of glucose. So increased blood glucose\nB. Increased hepatic glucose production\n\nImpaired insulin secretion\n- The reason for the impairment of insulin secretion is not clear\n- Genetic defect, increased hyperglycemia (glucose toxicity), increased free fatty acid\nlevel (lipotoxicity)- all are suggested as a cause or factors which worsen beta cell\nfailure to secrete insulin\n\nIncreased hepatic glucose production\n\n- Insulin promotes storage of glucose as hepatic glycogen and suppresses\n- Unopposed action of insulin counter regulatory hormones results in increased hepatic\nglucose production.\n\n5. Pathology (Morphology)\n\nType 1\nThe characteristic lesions in the pancreases of children, who suffer from type1 DM,\npredominant lymphocytes infiltration, are seen in the islets accompanied by few\nmacrophages. The B cell mass is significantly decreased.\n\nType 2\nNo decrease is the number of beta cells and there is no morphologic lesion of these\nAmyloid deposition is seen specially in patients older than 60 years of age\nIn some patients fibrosis of the islets is also seen\n\n6. Clinical manifestations\nSymptoms are due to hyperglycemia\n\n\n\nFigure 10-2- The clinical consequense and complication of DM\n\nPatients may present with classical symptoms of diabetes\nPolyuria, polydipsia, polyphagia with weight loss or they may present with DKA.\n\n7. Diagnosis\n\nIs based on the criteria set by Consensus panels of experts from the National\nDiabetes Data Group\n\nSymptoms of DM plus random blood glucose concentration of > 200mg/dl Or\nFasting plasma glucose > 126mg/dl. Or\nTwo hour plasma glucose > 200mg/dl during an oral glucose test (i.e. after an oral dose\nof 75g glucose dissolved in water)\n\n*In the absence of unequivocal hyperglycemic and acute metabolic decompensation, these\ncriteria should be confirmed by repeat testing on a different day.\n\nLossof calories\nWeight loss\nMobilization of fat and\nLoss of\nnegative nitrogen\nComa and Death\n\n8. Complications of Diabetes\n\nA. Acute complications\n\ni. Hypoglycemia\n\nCommon in Type1 patients.\n\nMay be caused by missing meals or doing unexpected exercise after taking insulin doses.\nIn diabetic patients with autonomic neuropathy, there could be hypoglycemic unawareness.\nThis is so because the patient doesnt have symptoms of hypoglycemia, and wont take\nappropriate measure.\n\nSymptoms of hypoglycemia include sweating, nervousness, tremor, and hunger if it is not\ncorrected in time central nervous system symptoms ensue like confusion, abnormal loss of\nconsciousness or convulsions.\n\nii. Diabetic ketoacidosis.\nMostly a complication of Type1DM\n\nInsulin deficiency coupled with Glucagon excess results in Accelerated ketogenesis\n(ketone body production) ------ DKA.\nInsulin deficiency results in activated lipolysis and so increased free fatty acid\nconcentration in the plasma\nAs a result body fat is metabolized as a source of energy. This oxidation produces\nketone bodies (acetoacetic acid and Beta hydroxybutyric acid), which are released into\nthe blood and lead to metabolic acidosis.\nInadequate levels of plasma insulin for a variety of reasons can precipitate DKA. See\nthe list below\n\nPrecipitating events:\n\nInadequate insulin administration\nInfection (pneumonia/UTI/gastroenteritis/sepsis etc.)\n\nInfarction (cerebral, coronary, mesenteric)\n\nClinically, ketoacidosis begins with anorexia, nausea and vomiting , coupled with\nPolyuria . If condition is not treated it may go into altered consciousness and coma.\n\niii. Non-ketotic Hyperosmolar state\n\nIs usually a complication of Type 2 because there is enough insulin to prevent ketosis\nPatient present with profound dehydration resulting from a sustained hyperglycemic\ndiuresis and finally goes to a comatose state\n\nB. Late complications of Diabetes\n\nMechanisms of development of diabetic late complications:\n\nLong-term hyperglycemia is essential for the development of diabetic late complications.\nMany mechanisms linking hyperglycemia to the complications of long-standing diabetes\nhave been explored. Currently two such mechanisms are important.\n\n1. Non-enzymatic glycosylation.\n\nNon-enzymatic binding of glucose (glycosylation) to cellular proteins. This leads to\nformation of advanced glycosylation End product (AGEs) which cross link proteins (e.g..\ncollagen, extra cellular proteins), promote glomerular dysfunctions, induce endothelial\ndysfunctions, and alter extra cellular matrix composition and structure.\nAGEs have been shown to accelerate atherosclerosis.\nIncreased Glycosylated low-density lipoproteins (LDL), which do not readily bind to the\nLDL receptor in the liver, thereby making LDL cholesterol available to the arterial wall.\n\n2. Hyperglycemia leads to increased intracellular glucose, which is then metabolized by\naldose reductase to sorbitol, a polyol, and eventually to fructose. These changes have\nseveral untoward effects. The accumulated sorbitol and fructose lead to increased\nintracellular osmolarity and influx of water, and eventually, to osmotic cell injury. In the lens,\nosmotically imbibed water causes swelling and opacity cataract formation.Sorbitol\naccumulation also impairs ion pumps and is believed to promote injury of schwann cells\n\nand pericytes of retinal capillaries, with resultant peripheral neuropathy and retinal\n\nDiabetic macrovascular disease:\n\nThe extent and severity of atherosclerotic lesions in large and medium sized arteries\nare increased in long standing diabetes, and their development tends to be accelerated.\n\nAtherosclerotic lesions in large blood vessels lead to vascular insufficiency and an ultimate\nproduction of ischemia in the organs supplied by the injured vessels.\nE.g. Myocardial infarction, Brain infarction (resulting in stroke), gangrene of the toes\nand feet.\n\nDiabetic microvascular disease\n\nIncreased thickening of the basement membrane in small vessels leads to the following\nchronic complication:\n\nDiabetic Retinopathy\n- DM is the leading cause of blindness in the developed world at ages>20.\n- Blindness is primarily the result of progressive diabetic retinopathy and significant\nmacular edema\n\nIt is classified into two\n\n1. Non proliferative retinopathy\n\nIs characterized by retinal vascular micro aneurysms, blot hemorrhages, and cotton\nwool spots\n2. Proliferative retinopathy\nAs the vascular abnormalities tends to be severe, new blood vessels start to proliferate\nin the retina\n\nDiabetic Nephropathy\nIt is the leading cause of ESRD (End stage renal disease) in the developed world.\n\nIt starts with microalbuminuria (30-300 mg/d in a 24 hr urine collection) and progresses\nto overt proteinuria (> 300mg/d)\nThree important lesions are in a patient with diabetic nephropathy.\nThickening of glomerular basement membrane which results in glumerulosclerosis, renal\narteriosclerosis as part of the systemic\nInvolvement of blood vessels, and pylonephritis.\n\nDiabetic Neuropathy\n\n- It occurs in approximately 50% of individuals with DM\n- It may manifest as polyneuropathy, mononeuropathy, and /or autonomic neuropathy\n\na. Polyneuropathy\n- The most common form of diabetic neuropathy is distal symmetric polyneuropathy. It\nmost frequently presents with distal sensory loss,\nHyperesthesia, paraesthesia and pain also occur.\n\nb. Mononeuropathy\n- This is less common than polyneuropathy in DM and presents with pain and motor\nweakness in the distribution of a single nerve.\n- Involvement of 3\ncranial nerve is most common sometimes-cranial nerves IV. VI or VII\nare affected.\n\nc. Autonomic neuropathy\n- DM related autonomic neuropathy can involve multiple systems, including: the\ncardiovascular, GI, genitourinary, and metabolic systems\n- It may also result in hypoglycemic unawareness due to reduction in counter regulatory\nhormone release.\n\nDM comprises of a heterogeneous group of disorders in which the common denominator\nis hyperglycemia. It is also characterized by long-term complication affecting the eyes,\nkidneys, Nerves and blood vessels.\nThe current revised classification of DM is based on etiologic and pathologic process\nthat the hyperglycemia results.\nThere are two broad categories of DM types 1 and Type 2 DM\n\nTypes 1A DM is caused mainly by an autoimmune destruction of the B- cells of the\npancreases that ultimately leads to absolute insulin deficiency.\nType 2 DM is characterized primarily by peripheral insulin resistance. It also results from\nimpaired insulin secretion, and increased glucose production. The precise mechanism of\nthe above disorders in Type 2 DM is not clear but polygenic disorders are believed to\ncontribute to development of the said disorders.\nDM clinically manifest as polydipsia, Polyuria, polyphagia, metabolic acidosis and weight\nloss which are a direct or indirect consequence of hyperglycemia (increased blood\nglucose level)\nDestruction of a significant amount of pancreatic B- cell population and infiltration of the\npancreas by mononuclear cell is the typical pathologic lesion seen is patients with Type\n1 DM.\nIn contrast to Type 1 DM patients with Type 2 DM do not have a decrease in the number\nof beta cells and there is no morphologic lesion of the cells.\nDue to a macro vascular and micro vascular abnormality patients with DM are subjected\nto chronic complications of the eyes, kidneys, heart, Nerves, brain and other organs.\nDue to acute metabolic decompensation that may result from absolute or relative insulin\ndeficiency, patients with DM are subjected to acute metabolic complication like DKA,\nwhich is more common in Type 1 DM and non-ketotic hyperosmolar state, which is\ncommonly seen in Type 2 DM.\n\nIV. Gout\n\nRepresents a heterogeneous group of diseases in which the common denominator is an\nincreased serum uric acid level and the deposition of sodium urate crystals in joints, soft\ntissue around joints and kidneys.\n\nPathogenesis of hyperuricemia:\n\nUric acid is the end product of the catabolism of purines, derived either from the diet\nor synthesized de novo.\nUric acid is eliminated from the body mostly through urine\nNormal values of uric acid in the blood is 7.0 mg/dl in men and 6.0 mg/dl in women\nHyperuricemia can result from over production of uric acid, decreased urinary\nexcretion of uric acid or a combination of both.\n\n\n1. Primary (idiopathic) Gout\nIn this category the causes that result in hyperuricemia are unknown,\n\nMost cases (75-90%) of so- called idiopathic Gout result from an as yet unexplained\nimpairment of uric acid excretion by the kidney.\nIn minority of the cases, though the causes are unknown there is an over production\nof uric acid.\n\n2. Secondary\nIn this category the causes that result in Hyperuricemia are known\na. Conditions that result in over production of uric acid\nMost common cause of overproduction of uric acid is increased turn over of\nnucleic acids, as seen in leukemia and Lymphomas and after chemotherapy for\nAccelerated ATP degradation for various reasons results in over production of\nuric acid\nSome genetic factors are also incriminated for over production of uric acid\n\nb. Conditions that result in Decreased urinary excretion of uric acid\n- The most common cause of decreased urinary excretion of uric acid is chronic renal\ndiseases that lead to renal failure. In renal failure the clearance of uric acid is\ndecreased, and with a fall in the rate of Glomerular filtrates, hyperuricemia ensues.\nOther factors are also incriminated as a cause of decreased urinary excretion of uric\n\nPathology (Morphology):\nWhen a sodium urate crystal precipitates from super saturated body fluids, they\nabsorb fibronectin, complement, and number of other proteins of their surfaces. In\nphagocytizing those protein coated crystals, Neutrophiles release inflammatory\nmediators resulting in local inflammatory reaction\nUric acid crystals may be found intracellularly in leukocytes of the synovial fluid.\nExtra cellular soft tissue deposits of these crystals (tophi), are surrounded by foreign\nbody giant cells and an associated inflammatory response of mononuclear cells.\nThese granuloma like areas are found in the cartilages and in any soft tissue around\nthe joints.\n\nMacroscopically, it appears as chalky, white deposits on the surfaces of extra-\narticular structures and soft tissues around joints.\nUric acid crystals also deposit in the kidney.\n\nClinical features:\nThere are four steps in the clinical course of gout:\n1. Asymptomatic hyperuricemia\nPrecedes clinically evident gout by many years\n2. Acute gouty arthritis\nInitially there is a monoarticular involvement and later in the course of the disease,\npoly articular involvement with fever is common.\n3. Intercritical period\n- This is Asymptomatic interval between attacks\n4. Tophaceous Gout\n- Develops in the untreated patient in the form of tophi in the cartilage, synovial\nmembrane, tendons and soft tissue.\n- Thophus is a chalky; yellow white deposit of monosodium urate crystals. Classic\nlocations are on the ear, heads, olecranon bursa, and in the Achilles tendon.\n\nUrate stones\n- Constitute10 percent of all kidney stones\nDiagnosis: The presence of long needle- shaped crystals that are vely bisfrinegent\nunder polarized light is diagnostic of gout.\n\n- Gout represents a heterogeneous group of diseases where there is an increased serum\nuric acid revel and the depositions of sodium urate crystals in joints and soft tissues\naround joints and kidneys.\n- Hyperuricemia can result form over production of uric acid, decreased urinary excretion\nof uric acid or a combination of both.\n- Gout is classified as primary, in cases where the caused that resulting hyperuricemia are\nunknown. Where the causes are identified, it is classified as secondary.\n- The deposition of sodium urate crystals in joints results in elaboration of inflammatory\nmediators form neutrophiles, which results in inflammation of the joint or the soft tissue\n\nV. Exercises\n\nSay true or false:\n1. Diabetes is a disturbance of carbohydrate metabolism that does not affect the\nmetabolism of lipids and proteins\n2. If one monozygotic twin has type 1 diabetes, the other one has or will develop that\ndisease in at least 50% of cases.\n3. A family history of diabetes is more common in patients affected by type 1diabetes than\ntype 2.\n4. There is a -cell morphologic abnormalities in patients with type 2 DM.\n5. Pathologic changes in patients with DM in any organ, depends on the duration of\n\nMultiple choice questions:\n\n1. Type 1 DM is characterized by\nA. Mostly occurs below age 20\nB. Has an abrupt onset\nC. Low levels of insulin in the blood\nD. All\n\n2. One of the following is not a micro vascular complication of DM\nA. Stroke\nB. Retinopathy\nC. Nephropathy\nD. Neuropathy\n\n3. DKA is more common is\nA. Type 1 DM\nB. Type 2 DM\nC. Gestational DM\nD. A&B\n\n\n4. One of the following is diagnostic for DM\nA. A random blood glucose e level 200mg /dl with profound hyperglycemia\nB. A fasting glucose level of 110 mg /dl\nC. A RBS level of 126 mg /dl\nD. None\n\n5. One of the following is false statement\nA. Type 1 DM is more common than type 2NKHS is more common in type 2\nB. Polyuria and polydipsia are due to the hyperglycemic state\nC. None\n\nShort answer questions: Define gout.\n1. What is secondary gout? List the causes that result in hyperuricemia in secondary\n2. What are the clinical features of gout?\n3. What is a urate nephropathy?\n\n\n\n1. Pathology 2nd edition, Emanuel Rubin John L. Farber\n2. Harrisons Principles of Internal Medicine. 15\n3. Robbins Basic Pathology 7\n\n\nI. Learning objectives\n\nAfter reading this chapter the student is expected to:\n1. Define environmental diseases\n2. Know the health impacts of air pollution\n3. Define pneumoconiosis\n4. Describe the pathogenesis and types of pneumoconiosis\n5. List the Health impacts of Tobacco smoking\n6. Describe the effects of acute alcohol intoxication and chronic alcoholism\n7. Describe the causes and types of physical injuries\n\nII. Introduction\nEnvironmental diseases include those caused by exposure to harmful substances in the\nenvironment, in a sense that it encompasses all nutritional, infectious, chemical and physical\nin origin.\nEnvironmental diseases are surprisingly common. They can originate from occupational\nexposures, polluted ambient air, chemicals taken to the body through the lung or GIT for\nseveral reasons, or from noxious physical agents that come in contact to the body.\nInternational labor organization has estimated that work related injuries and illnesses kill 1.1\nmillion people per year globally. Environmental diseases constitute an enormous burden\nfinancially and in disability and suffering. With this overview of the nature and magnitude of\nthese diseases we will concentrate on the more important once.\n\nIII. Air pollution\n\nAir is most of the time, loaded with potential causes of diseases. Agents from the air like\nmicroorganisms contaminating food and water, chemical and particulate pollutants found in\nthe air are common causes of diseases. It is important to see air pollution dividing it into an\noutdoor and indoor.\n\nA-Out door air pollution\n\nThe ambient air in industrialized countries is highly contaminated with gaseous and\nparticulate pollutants. In undeveloped countries like ours air is less polluted. Air pollution is\nsevere in big cities like, London, Mexico city and Losangeles. In addition air may be locally\nspoiled in the vicinities of heavy industries.\nThere are six major pollutants, which collectively produce the well-known smog making\nsome big cities difficult to live in.\n\nTo emphasize on some important points:\nOzone is the most important pollutant in that it is produced in large amounts and has\nserious health consequences. It is highly reactive producing free radicals, which\ninjures airways by virtue of release of inflammatory mediators. When healthy\nindividuals are exposed, they experience mild respiratory symptoms, but its effects\nare exaggerated in people already having asthma and emphysema.\nParticulates are harmful when their diameters are less than 10m whatever their\ncomposition may be. Larger particles are filtered out in the nares or mucocilliary\nsystem along the airways. The size of smaller particles helps them to reach into\nairspaces (alveoli) where they are phagocytosed by macrophages and neutrophils.\nInflammatory mediator released from these cells are the once which result in the\nEven if single pollutants are able to cause lung function impairments, the results are\nmove sever when pollutants are in a combination. It is clear that pollutants are often\ntime available in the air combined.\nPollutants have wide range of consequences in different organs but the lungs are the\nusual targets\n\nHere is a table listing the six important pollutants, their origins and their potential\n\nTable 11.1 Major outdoor air pollutants\n\nOrigin (s) Consequences\nOzone (o3) Interaction of oxygen with\nvarious pollutants: oxide of\nnitrogen, sulfur and\nHighly reactive, oxidizes\npolyunsaturated lipids that become\nirritants and induce release of\ninflammatory mediators affecting all\nNitrogen dioxide Combustion of fossil fuels like\ncoal, gasoline and wood\nDissolves in secretion in airways to\nform nitric & nitrous acids which\nirritates & damage linings of air\nSulfur dioxide Combustion of fossils such as\ncoal, gasoline, & wood\nYields sulfuricacid and bisulfites &\nsulfites which irritate and damage\nlinings of airways, together with\nnitric acid contributes to acid rains\nIncomplete combustion of\ngasoline, oil, wood & natural gas\nCombines with hemoglobin to\ndisplace oxyhemoglin & thus induce\nsystemic asphyxia\n\nGreat variety of finely divided\npollutants may include\nasbestos, plaster dust, lead, ash\nhydrocarbon residue and other\nindustrial nuclear wastes\nMajor contributor to smog & a major\ncause of respiratory diseases.\n\nB-Indoor air pollution\n\nIndoor air pollution is a major problem in undeveloped countries like Ethiopia where people\ncook inside living rooms. Here, large number of family members dwell in single rooms where\ncooking activities are also undertaken .So wood smoke produced in large quantities is\naccumulated to affect the health of adults and children. It contains oxides of nitrogen and\ncarbon particulates which are irritants predisposing children to repeated lung infection.\nTobacco smoke is the commonest pollutant in the house of people living in developed\ncountries but additional offenders are listed in the table below\n\n\nTable 11.2 Health Effects of indoor air pollutants\n\nPollutant Population at risk Effects\nCarbon monoxide Adults & children Acute poisoning\nNitrogen dioxide Children Increased respiratory\nWood smoke Children & Females Increased respiratory\nFormaldehyde Adults & Children Eye & nose irritant\nAsbestos fibers Maintenance & abatement\nLung cancer, mesothe\nBioaerosoles Adults & Children Allergic rhinitis, asthma\n\nIV. Industrial Exposures\n\nIndustrial workers are exposed to a wide range of organic and inorganic substances, which\nhave different kinds of consequences on their health. Diseases can range from mere\nirritation of mucosa of airways due to organic fumes to lung cancer due to inorganic dusts\nand leukemia due to prolonged exposure to benzene and uranium. Pneumoconiosis is a\ntypical example of the conditions which are brought by industrial exposures.\n\n\nPneumoconioses are a group of non-neoplastic pulmonary disease, which are due to\ninhalation of organic and inorganic particulates. The mineral dust pneumoconiosis, which is\ndue to coal dust, asbestos, silcon and beryllium, almost always occur from exposure in work\n\nPneumoconioses is a result of lung reactions towards offending inhaled substances. The\nreaction depends on the size, shape, solubility and reactivity of the particles. Particles\ngreater than 10m are not harmful because they are filtered out before reaching distal\n\nairways. When they are less than 1m in diameter they tend to move in and out of alveoli\nlike gases so that they will not deposit and result in an injury.\n\nSilica, asbestos & beryllium are more reactive than coal dust bringing about fibrotic reaction,\nwhile coal dust has to be deposited in huge amounts if it has to result in reaction because it\nis relatively inert. Most inhaled dust is removed out through the ciliary movement after being\ntrapped in the mucus linings. When particles reach the alveoli they are in gulfed by\nmacrophages. The more reactive particles activate macrophages to release fibrogenic\nfactors, toxic factors and proinflammatory factors. The cumulative effect becomes lung injury\nand fibrosis. The important mediators released by macrophages are grouped in to three: -\n1. Free radicals: reactive oxygen and reactive nitrogen species that induce lipid\nperoxidation and tissue damage\n2. chemotactic factors: leukotriene B\n) interleukin 8 (IL-8 ) IL-6 ,and TNF which\nrecruit and activate inflammatory cells and which in turn release damaging oxidants (free\nradicals )\n3. Fibrogenic cytokines: IL-1, TNF, fibronectine, platelet derived growth factor (PDGF), and\ninsulin like growth factor (IG F-1), which recruit fibroblasts.\n\nFigure 11.1 Pathogenesis of pneumoconiosis\n\nAlveolar macrophage\nProinflammatory factors; LTB\n\nIL-8, IL6, TNF, MIP-1\nToxic factors; O\nradicals & proteases\nFibrogenic factors, TNF,\nTerminal bronchiole\nRecruitment of\nfibroblasts & collagen\nLung injury\nRecruitment & activation of\ninflammatory cells\n\n\nPneumoconiosis can be classified according to the substance incriminated.\nA- Coal workers Pneumoconiosis _Due to coal dust\nB- Silicosis _Due to silica\nC- Asbestosis _Due to asbestos\nD- Berylliosis _Due to beryllium\n\nCoal workers pneumoconiosis\nSince earlier times of industrialization it has been noticed that coal miners were drying of\nblack lung complicated by tuberculosis. Coal dust mainly contains carbon but has a variety\nof trace metals inorganic mineral and crystalline silica. Anthracite (hard) coal contains\nsignificantly more quartz than bituminous (soft) coal. Anthracite (hard) coal is more\nfrequently associated with lesions in the lungs; hence the name pulmonary anthracosis is\ncoined for coal induced pulmonary lesions.\nThe disease has three distinct pathological entities:\ni. Anthracosis:- Where pigments are accumulated without cellular reaction and\nii. Simple coal workers pneumoconiosis With minimal cellular reaction and little or no\npulmonary dysfunction\niii. Progressive massive fibrosis:- With extensive fibrosis and compromised pulmonary\n\n\nPulmonary arthracosis - Macrophages in the alveoli and interstitium are found laden\nwith carbon pigments. These macrophages are also seen along the lymphatics\nincluding pleural lymphatics or lymphoid tissue along bronchi and lung hilus.\nSimple Coal workers pneumoconiosis (CWP) characterized by coal macules and coal\nnodules. Coal macules constitutes of carbon-laden macrophages aggregated, coal\nnodule is when the macule additionally contains collagen fibers.\nComplicated CWP - progressive Massive fibrosis (PMF) - occurring in the background\nof CWP after many years by coalescence of coal nodules. It is characterized by coal\nnodules intermingled with collagen fibers with central necrosis, size ranging from 2cm to\n\nClinical course\n\nPulmonary anthracosis and simple CWP result in no abnormalities in lung functions.When it\nprogress to progressive massive fibrosis in minority of cases it results in pulmonary\nhypertension and corpulmonale. Progression from simple CWP to PMF has been linked to\namount and duration of exposure to coal dust. Smoking also has been shown to have the\nsame effects. Sometimes of course the progression does not need factors mentioned\n\nAsbestos Related Disease\nAsbestos is a generic name that embraces the silicate minerals that occur as long, thin\nfibers. Asbestosis refers to the pneumoconiosis that results from the inhalation of asbestos\n\nAsbestos fibers are thin and long so that they can reach the bifurcations of bronchioles and\nalveoli. There, they are engulfed by macrophages to induce the cascade of inflammatory\nprocess, which finally result in interstitial pulmonary fibrosis.\n\n1-Asbestosis:-is an interstitial fibrosis of the lung. At early stages, fibrosis is in and around\nthe alveoli and terminal bronchioles. when disease progresses, gross examination of the\nlungs show gray streaks of fibrous tissue, which accentuate the interlobular septa, together\nwith diffuse thickening of the visceral pleura. The asbestos body is the most diagnostic\nstructure seen under the microscope, consisting of asbestos fiber beaded with aggregates\nof iron along its length.\n2-Pleural plagues: - after a period of many years the inhalation of asbestos fibers will result\nin the appearance of plaques on the partial pleura.\nThey are 2 to 3 mm thick, and microscopically they are densely collagenous and hyalinized\nand sometimes calcified.\n3-Mesothelioma:-a clear cut relationship between asbestos exposure and a maligment\nmesothelioma is now firmly established.\n4-Other malignancies like lung and bladder cancers can also result from asbestos exposure.\n\n\nV. Tobacco Smoking\n\nConsidering the globe, the adverse effects of tobacco smoking out number all the effects of\nother pollutants. It is considered as one of the most important preventable causes of death\nin the United States. In our society also even though its health impacts are not so\npronounced it still has series health damage.\nTobacco smoking affects not only those who are actively smoking but it also has an adverse\nconsequence on the health of those who are by the vicinity of the smoker. These individuals\nare termed as passive Smokers.\n\nActive Smoking and disease\nThe cigarette smoke that is taken through the mouth into the lung has several types of\nchemicals that have diverse & serious effects on our health. The composition depends on\nthe type of tobacco, length of the cigarette, and presence and effectiveness of filter\ntips.Usually present are (1) Carcinogens whose effects have been verified in lower animals\n(e.g.polycyclic hydrocarbons, betanaphthylamine, nitrosamines). (2) Cell irritants and toxins\n(e.g. Ammonia, formaldehyde, and oxides of nitrogen). (3) Carbon monoxide, and (4)\nnicotine, which has various effects on the sympathetic nervous system, blood pressure heart\nlate and the like.\nThe more common adverse health effects of tobacco are lung cancer, coronary heart\ndisease, COPD (Chronic bronchitis, emphysema), and systemic atherosclerosis.And the\nless common effects are peptic ulcer, Cancer that can originate from larynx, esophagus,\npancreas, bladder & kidneys.\nCigarette smoking also causes COPD, which are chronic bronchitis and Emphysema, which\nhave a tremendous health impact. Systemic arteriosclerosis and other forms of cancer are\nalso diseases caused by cigarette smoking, which collectively contribute to many deaths. In\ngeneral smoking is the single most important cause of cancer mortality in the United States.\nFetuses are also adversely affected by maternal smoking. Several studies have shown that\nmaternal smoking could cause low birth weight, prematurity, still birth and infant mortality.\nMoreover other complications of pregnancy like abruptio placentae, placenta previa, and\npremature rupture of membranes have been found to be caused by maternal smoking.\nThe risk of mortality is dose dependent. The number of pack years i.e. number of packs per\nday times number of years is directly related to mortality rate.The more pack years of\nsmoking the higher the risk of mortality.Coronary heart disease causes most of the deaths\n\nwhen it comes to effects of cigarette smoking. Lung cancer closely follows causing a huge\nnumber of deaths.\n\nInvoluntary smoke exposure (Passive Smoking)\nThe effect of passive smoking has been identified during the last few decades. Its effect\ncomes when non-smoking people inspire the ambient air, which is polluted by cigarette\nsmoke. The health impact depends on the volume of the air in the room, number of active\nsmokers, rate of air exchange and duration of exposure. Data from different countries show\nthat the risks of lung cancer increase by 1.5 due to passive smoking. There is also\nincreased risk of cardiovascular diseases specially MI, and high incidence of lower\nrespiratory tract diseases in infants & children of smoking parents. Children & infants of\nsmoking mothers will have an obvious intense exposure and hence retardation of physical\nand intellectual growth is likely to occur.\n\nBenefits of cessation or reducing exposure to cigarette smoke\nWhen a person stops smoking the risks of diseases and subsequent death start to decline\nThe risk to reach to that of non-smoking people may take 20 years of smoke-free period.The\namount of cigarettes smoked daily, and duration of smoking determines the rate of decrease\nof risks. The relative risk of lung cancer and laryngeal cancer start to decline after 1 to 2\nsmoke free years. However considering lung cancer former smokers will have slightly higher\nrisk than non-smokers even after 30 years of smoke-free years.\n\nWhen it comes to coronary diseases the decline of risk is rapid and it can level with those of\nnon-smokers after 5 to 20 years. Once COPD has been developed quitting does not have\nany significant effect in reversing the situation.\n\nVI. Chemical & Drug injury\n\nInjuries due to chemicals can be from therapeutic agents and nontherapeutic agents.\n\nA. Adverse drug reactions\nInjuries due to therapeutic agents are known as adverse drug reactions. Adverse drug\nreactions are any response to a drug that is noxious and unintended and that occurs at\ndoses used in humans for prophylaxis, diagnosis, or therapy. ADRs are only rarely due to\nphysician failures like inadequately monitored use or over use of drugs.\n\nADRs can be divided into two categories.\n\n1. Exaggeration of the intended pharmacologic effect which are largely predictable effects\n2. An unpredictable response unrelated to the drugs primary action.\n\nThe 1\none-encompasses all adverse reactions, which result from use of powerful drugs\nused to treat potentially fatal diseases like cancer. For example use of large dose\ndaunorubicin or doxorubicin to treat some forms of cancer may cause cardiotoxicity.\nIn the 2\ngroup the ADRs are unpredictable and they vary from individual to individual\ntaking a specific drug. The reactions is called idiosyncrasy and is due to an abnormal\nimmunologic response to the drug or un predictable cytotoxicity caused by the drug.\nPossible examples will be extensive hepatic necrosis, which develops after intake of\ntherapeutic dose of acetaminophen, or anaphylaxis, which develop after therapeutic dose of\n\nB. Non-therapeutic agents\n\nEthyl alcohol\n\nA large percentage of our population is a social drinker and still a significant number of\nindividuals are alcoholic or alcohol dependent. Alcohol has an obvious acute effect but has\nalso an effect of a long-standing use of alcohol on organs and tissues.\nAlcohol Metabolism: -\nAbout 2 to 10% of the ethanol consumed is excreted directly through the breath, urine or\nsweat. The amount exhaled is directly proportional to the blood level and hence is used by\nlegal enforcement agencies. After ingestion, a small amount of ethanol is directly\nmetabolized by gastric mucosa alcohol dehydrogenase. The rest is rapidly absorbed from\nstomach & intestines, once in the liver alcohol is metabolized by three pathways in the liver\ncells. The 1\ninvolves hepatic alcohol dehydrogenase, yielding acetaldehyde, which is then\nconverted to acetate by aldehydedehydrogenase. In this process NAD is converted to\nNADH. The 2\ninvolves the hepatic microsomal P-450 system. It too yields acetaldehyde,\noxidisable to acetate. The 3\npathway, which is less frequently utilized, involves\nperoxysomal catalase. All the three pathways yield acetaldehyde, which can be metabolized\nto acetate, and the 1\ntwo produce more NADH from NAD.\n\n\n\nMicrosomal P-450 oxidases catalase\n\n\n\n\n\n\nFig 11.4 Metabolism of alcohol: the major (rate limiting) pathway is via ADH.\n\nAcute Alcoholism\n\nAcute alcoholism exerts its effects mainly on the CNS even though; the stomach and liver\ncan also have reversible damages. Alcohol has depressant effect on the CNS.It depresses\nthe inhibitory control centers thereby releasing excitatory pathways that accounts for the\nwide spread belief that alcohol is a stimulant. The extent of CNS depression depends on the\nalcohol blood levels. The cortex affected first, the limbic system, cerebellum and finally\nbrainstem are affected as the blood level increases. Coma and total respiratory arrest\nbecome likely at 300 to 400 mg/dl levels. Not with a clearly understood mechanism, acute\nalcoholism has also \"black out\" effects that are episodes of forgetting what has happened\nduring drinking.\n\nChronic alcoholism\nThe increase NADH:NAD ratio, which is created by alcohol metabolism, may be responsible\nfor the metabolic consequences of chronic alcoholism. Chronic alcoholism produces\nmorphologic changes in almost all organs and tissues.\nHepatic changes: these are the most common consequences of chronic alcoholism.These\nchanges are namely fatty change, acute hepatitis and alcoholic cirrhosis. These are\ndiscussed in adequate detail in the chapter that deals with liver diseases. Fatty changes can\noccur with in a few days of even modest alcohol consumption. Cells are distended with fat\naccumulation, which can be mobilized when the exposure to alcohol is discontinued.\nAlcoholic hepatitis can occur with episodes of heavy drinking and may or may not be\npreceded by fat accumulation and may or may not be followed by cirrhosis which is the end\nstage of fatty changes that occur in chronic alcoholism.\n\nCentral nervous system changes\n\n1-Wernickes encephalopathy\n\nThe commonest CNs change is wernickes encephalopathy.This is due to a thiamine\ndeficiency that occurs during chronic alcoholism.The chronic alcoholic subsists with an\ninadequate dietary intake and alcohol itself impairs intestinal absorption of thiamine. This\ncondition may occur in non-chronic alcoholics who become thiamine deficient for various\n\nWernickes enephalopathy occur in a subset of alcoholics, probably in those who have an\ninherited or acquired abnormality of a thiamine dependent transketolase (enzyme involved\nin cerebral glucose & energy metabolism) reducing its affinity for thiamine.\nClinically it is characterized by ataxia, global confusion, ophtalmoplegia and often\nnystagmus. The underlying morphology includes foci of symmetric discoloration and\nsometimes softening with congestion, & punctate hemorrhage in the paraventricular region\nof the thalamus & Hypothalamus, in the mammillary bodies about the aqueduct in the\nmidbrain, in the floor of the fourth ventricle and in the anterior cerebellum. The neurons may\nbe relatively spared in the early stages but eventually reveal degenerative changes and\neventually cell death.\n\n2- Korsakoffs syndrome\n\nAfter individuals, with Wernickes encephalopathy, are treated with thiamine, they show a\nprofound memory loss, which does not improve with thiamine treatment. This condition is\ntermed as korsakoffs syndrome. There are no specific morphologic changes other than\nseen in wernickes encephalopiathy but this does not show any improvement with thiamine\ntreatment. Hence it is believed that korsakoffs syndrome is caused by direct neurotoxicity of\nethanol compounded by a lack of thiamine.\n\n3- Cerebellar ataxia\n\nCerebellar degeneration, related to loss of purkinges cell in the cerebellar cortex, is a well-\ndocumented cerebellar change found in a minority of chronic alcoholics. These are\nsupposed to be due to thiamine deficiency as well, rather than ethanol direct toxicity.\nCortical atrophy is also a potential consequence but many studies didnt reveal any\nreduction in size of the cortex in chronic alcoholics.\n\nPeripheral Nerves\n\nThe peripheral nerves suffer a demylinating polyneuropathy, occasionally mononeuropathy\nthat is fairly common in chronic alcoholics who are malnourished. The basis is thought to be\nthiamine deficiency rather than ethanol toxicity.\n\nCardiovascular system\n\nA moderate intake of alcohol tends to increase the level of HDL and hence protects from\natheroma formation and coronary heart disease. However heavy consumption, which\ncauses liver cell injury, will decrease the level of HDL and contributes to atherosclerosis &\ncoronary heart disease. On the other hand a direct ethanol injury to myocardium will result\nin cardiomyopathy, which is discussed in the chapter that deals with heart diseases.\n\nMiscellaneous changes:\n\nChronic alcohol intake has a tendency to produce hypertension even though in low doses\nalcohol (ethanol) tends to reduce blood pressure. Chronic alcoholics suffer higher incidence\nalcoholic myopathy. During pregnancy a condition known as fetal alcohol syndrome may\n\ntake place in infants whose mothers have been taking alcohol even as low as two to three\ndrinks per day. The fetues can have microcephally, mental retardation, facial mal formation\n& cardiac defects at times. Increased risks of cancer of pharynx, larynx, esophagus,\nstomach, & possibly rectum & lung have also been encountered in chronic alcoholics.\n\nVII. Physical injuries\n\nThese are mainly classified in to four groups: injuries due to mechanical forces, changes in\ntemperature, changes in atmospheric presence, and electromagnetic energy.\n\nA-Injuries due to mechanical forces\nInjuries due to mechanical forces are (1) soft tissue injuries, (2) bone injuries, (3) head\ninjuries. Injuries to the bones & head are considered else where. Here we deal with soft\ntissue injuries, which are divided accordingly to their depth.\nAbrasion: this type of injury represents the most superficial type of skin injury, which\ninvolves the epidermal layer. It occurs when superficial epidermal cells are turnoff by friction\nor a glancing blow. There is no perforation of the skin & hence regeneration occurs with out\n\nLaceration versus incision\nLaceration is an injury over the skin which is an irregular tear produced by overstretching.\nDepending on the tearing force it can be linear or satellite. The margins of a laceration are\nfrequently hemorrhagic & traumatized and there will be bridging stands of tissues like blood\nvessels or fibrous tissues at the base. An incision is made by a sharp cutting object like\nknife. The margins are relatively clean and there are no bridging fibrous strands or tissues.\nAn incision, in contrast to laceration, will be approximated by sutures to heal leaving no or\nlittle scar. laceration can take place to deeper tissues or organs without apparent superficial\ninjury for example when a fast moving vehicle collides with and object the liver of a driver,\nnot using safety belts, can lacerate when his body impacts on the steering wheel.\nThis is an injury that is cause by a blunt force that injurs small blood vessels & causes\nintestinal bleeding usually with out a breach on the superficial tissue the bleeding will be\nevident if the contusion is on a superficial tissue but if it is in deeper structures like skeletal\n\nmuscles the bleeding will be evident after several hours or may remain obscured excepts\nthe swelling & pain that is felt at the area over the contusion.\n\nGunshot wounds\nLooking at the gunshot wounds give a very detailed story as to whether the shot is from a\ndistance or, near by, or from a rifle or a handgun. It also tells the direction from which the\nbullets came & other important information for a forensic pathologist. The character of a\ngunshot wound at entry & exit and the extent of injury depend on the type of gun used,\ncaliber of bullet, the type of ammunition, the distance of the firearm from the body, etc.\nEntry wounds in general are smaller than exit wounds. With a shot from close range, the\nentry wound has a gray black discoloration produced by the heat, smoke and unburned\npowder. There are also peripheral stippling of discrete, larger particles formed by the\nunburned powder, When the shot distance increases a beat only the stippling are present\nand at greater distances no gray black discoloration or stippling are present rather a wound\nsmaller in size from the bullet and with narrow enclosing rim of abrasion is present.\nCutaneous exit wounds are generally more irregular than the entry wounds due to the\nwobbling or trajectory motion of the bullet. In high velocity riffle bullets the exit wounds are\nlarger and there are no stippling or dark discolorations. Large caliber, light velocity bullets\ncause extensive injury around the traversing wound due to the mass, velocity and motion of\nthe bullet. Small caliber low velocity bullets cause a limited amount of injury to surrounding\nIn general, it suffices to say that gun shot wounds tell a story to the experienced individual.\n\nB-Injuries related to changes in temperature\n\nHuman beings are homoeothermic and their internal temperature must be maintained\nbetween 30\nC and 43\nC. Even these limits can be tolerated for a brief time. Abnormally high\nand low temperatures are injurious to the body and their damage are different and have to\nbe discussed separately.\n\nA. Injuries due to abnormally high temprature\n\nThese can be brought by flame, boiled water or steam, electricity and etc. It involves mainly\nchildren and young adults and is very common in our society.\n\nCutaneous Burns\nThe severity of the burn effect depends on:\n\n- % Of total body surface involved\n- Depth of the burn\n- Possible presence of internal injuries form inhalation of hot gases & fumes\n- Promptness and efficacy of the post burn therapy\n\nBurn can involve the most superficial part of the skin or it can go even deeper to internal\norgans. Terms like partial thickness and full- thickness burns are applied to describe the\ndegree of burn injury. In partial thickness, the dermis with its skin appendages is preserved.\nEpidermis can be fully or partially devitalized and it continues to provide a cover to the\nburned area. Such burns are characterized by blistering, protinacious fluid exudation from\ndilated and injured small blood vessels. Inflammatory reaction and regeneration of the\nepidermis from preserved appendages of dermis are also common features. The epidermal\ncells may exhibit deranged membrane permeability, with nuclear and cellular swelling or\nmay show clean pyknosis and granular coagulation of cytoplasm.\nFull thickness burn implies total distraction of the entire epidermis extending into the dermis\nand even more deeply at times. Regeneration from dermal appendages is scarce and hence\nhealing will result in scarring unless skin grafting is performed. With the epidermis burnt out\nthe dermal collagen may take the appearance of a homogenous gel. The cytologic changes\ndescribed in partial thickness burn may be seen in deeper structures and the inflammatory\nreaction seen in the partial thickness burn is greater here.\nThe systemic effects are feared more than the local injury. Neurogenic shock can prevail\ndue to the pain and this can be followed by hypovolemic shock when the individual looses\nfluid from the burned area. Dreadful infection can develop because of a wide area, which is\nopen to infection and due to a media favorable for proliferation of microorganism. The\nwound infections can progress to regional thrombophllbitis, infective endocarditis,\npneumonia, cellulitis, and sepsis.\n\nB. Injuries due to abnormally low temperature\n\nThe effects of hypothermia depended on whether there is whole body exposure or exposure\nonly of parts. Death may result when the whole body is exposed, with out inducing apparent\nnecrosis of cells or tissues.This is because of the slowing of metabolic process, particularly\n\nin the brain and medullary centers, when parts of the body are exposed, local changes\nresult depending on the types of exposure to low temperature\n\nLocal reactions\n\nInjury to cells and tissues occur in two ways\n1. Direct effect of low temperature on the cells\n2. Indirect effects due to circulatory changes\n\nCirculatory changes will be in two ways: slow temperature drop that will result in\nvasoconstriction and increased permeability leading to edematous changes as in trench\nfoot, sudden sharp drop that will result in vasoconstriction and increased viscosity of the\nblood leading to ischemia and degenerative changes.Edematous changes in trench foot\ncould be followed later by atrophy and fibrosis.\n\nC. Injuries related to changes in atmospheric pressure\n\n1. High altitude illness\nThis is encountered in mountain climbers in atmospheres encountered at altitudes above\n4000m. The lower oxygen tension produces progressive mental obtundation and may be\naccompanied by poorly understood increased capillary permeability with systemic and, in\nparticular pulmonary edema.\n\n2. Air or Gas Embolism\nThis may occur as a complication of scuba diving, mechanical positive- pressure ventilatory\nsupport, and hyperbaric oxygen therapy. In all these occasions there is an abnormal\nincrease in intra-alveolar air or gas pressure, leading to tearing of tissue with entrance of air\ninto the interstitium and small blood vessels. Pulmonary, mediastinal, and subcutaneous\nemphysema may result. The coalescence of numerous small air or gas emboli that gain\naccess to the arterial circulation may lead acutely to stroke- like syndrome or a myocardial\nischemic episode.\n\nD-Electrical Injuries\n\nThe passage of an electric current through the body:-\nMay pass without effect\nMay cause sudden death by disruption of neural regulatory impulse producing, for\nexample, cardiac arrest\n\nOr may cause thermal injury to organs exposed to electric current\n\nAlthough all tissues of the body are conductors, their resistance to flow varies inversely to\ntheir water content. Dry skin is particularly resistant, but when skin is wet or immersed in\nwater resistance is greatly decreased. Thus, an electric current may cause only a surface\nburn of dry skin but, when transmitted through wet skin, may cause death by disruption of\nregulatory pathways.\n\n\nEnvironmental pathology deals with diseases that are brought by exposure to harmful\nsubstances in the environment.\n\nThe ambient air could be polluted by potential causes of diseases. Out door air of\nindustrialized cities is highly polluted with six major pollutants, which affect the health of\ninhabitants. In the developing world indoor air pollution could risk the health of families.\nIndustrial exposures pose a huge burden to the health of peoples. Organic fumes and\nparticulates taken into the lung cause several types of Neoplastic and non-Neoplastic\ndiseases. Pneumoconioses are a group of non neoplastic lung diseases caused by\ninhalation of organic and inorganic particulates. Coal dust, asbestos, silicon and beryllium\nare mineral dusts which cause most of the pneumoconiosis. People affected by different\ntypes of pneumoconiosis go through more or less, same kind of steps in to severe forms\nwhen exposure continues. In coal workers pneumoconiosis the patient will first have a non-\nsymptomatic blackening seen along the lymphatics and lymphnodes which mark coal laden\nmacrophages. This can progress to simple coal workers pneumoconiosis (CWP)\ncharacterized by fibrous macules and nodules. only few can go to the serious form called\nprogressive massive fibrosis which has deleterious impact on pulmonary and cardiac\nSmoking is the single most important pollutant, which affect the health of millions of\nindividuals. Both active and passive smoking have serious health consequences resulting in\nlung cancer, coronary heart disease, COPD, systemic at hero sclerosis etc. Abstinence has\na positive impact in progressively lowering the risks imposed by the previous years of\nAlcohol, even though taken in small amounts have a health promoting effect, when taken in\nmore amounts it will have short term and long term un healthy impacts. Alcohol is a CNS\ndepressant capable of resulting in respiratory arrest and coma in large amounts. The liver is\n\nmainly hit hard by its deleterious effects. Central and peripheral nerves systems, as well as\ncardiovascular systems are also its targets.\nWhen dealing with environmental diseases injuries caused by physical forces have to be\nthought about. These could be caused by mechanical forces, extreme high or low\ntemperatures, atmospheric pressure changes or electromagnetic energy.\n\nVIII. Exercise\n1. What could be causes of environmental diseases?\n2. What is the pathogenesis of pneumoconiosis?\n3. Describe the three morphologic appearances of coal workers pneumoconiosis.\n4. How does progressive massive fibrosis result?\n5. Mention four important adverse health impacts of smoking.\n6. The pathogenesity of mineral dusts does not depend on\na. Size of particles\nb. Reactivity of particles\nc. Duration of exposure\nd. The amount inhaled at a time\ne. None\n\n7. Which one of the following cant be a result of coal workers pneumoconiosis\na. Black lung\nb. Progressive massive fibrosis\nc. Cor pulmonale\nd. Lung cancer\n\n8. Which of t he following mineral is associated with mesothelioma\na. Beryllium\nb. Charcoal\nc. Asbestos\nd. Silca\n\n9. Which one of the following is the most common cause of mortality among cigarette\na. Lung cancer\nb. Coronary heart disease\nd. Stroke\n\n\n10. Which one of the following is true\n\na lcohol is a stimulant\nb. Alcoholic fatty changes are irreversible\nc. Wernickes encephalopathy is an indirect effect of alcoholism\nd. The liver takes all the responsibility of alcohol metabolism", "pred_label": "__label__1", "pred_score_pos": 0.9181485772132874} {"content": "Developing a digital mindset for L&D: The Internet of Things\n\nDM eBook feedbackThe Internet of Things (IoT) is a term used to talk about the practice of interconnecting the physical world – with its sensors and actuators – and the digital world.\n\nIt means that physical objects such as street lights, trains and planes can collect data automatically and can often be controlled remotely. I’d like to use this as a way to talk about approaches to technology that are ‘beyond a screen’. These approaches are not focused on keyboards and monitors, but on embedding technology into the world around us.\n\nScreens as we know them are disappearing. Sony’s Xperia Touch projector combines gesture-sensing and projection technologies, meaning a table can be turned into an interactive workspace. Digital performance supports could be projected anywhere.  \n\n\nWhat is the impact of IoT on learning? Feedback.\n\nAt first it seems like IoT doesn’t have much to do with learning. But IoT is changing the way people work and also the technologies with potential for new types of learning that can be integrated into the workplace.\n\nAn example is an air conditioning system with sensors that are connected to a service agent’s customer relationship management system. When the system is not working correctly the service is automatically notified and a technician is sent out to fix the problem. Sensors in planes give pilots feedback on how they manage a flight compared to other pilots, for example how much fuel they’ve used. They can then modify their behaviour in order to decrease consumption. The integration of sensors into the world around us provides new ways to give employees feedback on their performance. The data might be sent to a central place or it might be provided in real time to the operator.\n\n\nDigital technologies are not just about screens in offices.\n\nThis is not necessarily going to transform the way courses are delivered but it is changing the ecosystem of technologies that can be used for performance support and feedback.\n\n\nObjects that give us feedback\n\nThe next stage is integrated support. An example that Stephen Downes has talked about is a scenario where an object like a fishing rod is fitted with sensors and voice features. The fishing rod then monitors what you are doing and provides feedback as voice prompts or vibrations. It’s a bit like the augmented reality approach of just-in-time performance supports, but it’s not screen based. It’s more physical and direct.\n\nDM eBook devices speaking\n\n\nThe use of wearable activity trackers has become widespread. These most often take the form of a watch. Our lives become measured and tracked, often automatically. Making activity visible means it’s easier to track and understand and change. Building accountability into learning programs is an ongoing issue. Wearable devices and smartwatches can be used to check in on post-program goals and monitor behavioural change.\n\n\nSpaces and devices that speak with us\n\nThere have been recent advances in voice recognition technologies that have made them more effective. Conversation interfaces change how we use technologies. It means that digital technologies ‘disappear’ and become a natural, automatic part of our world. When you’re with a group of people it’s an odd sensation to pause and look something up on your phone, as engaging with your phone is an intimate, solo activity. If you instead do a voice search while in the same group, your engagement with your phone becomes more of a group activity.\n\nWe now have powerful conversation interfaces such as Google Home and Amazon Alexa that are voice-based personal assistants. They are mostly being used for home automation at this stage but they have the potential for roles in performance coaching and process coaching. An example is what Jamie Oliver has done with Alexa – it can ask you a series of questions and then find recipes and send them to your phone.   DM eBook tech headphones\n\nQuestions and ideas to spark new thinking about IoT\n\n 1. In your workplace, what tools, objects or spaces could have sensors embedded in them?\n 2. How could you collect data automatically and provide feedback to learners? How could this work for employees who are not office based?\n 3. How could wearables be used to provide learners with reminders of what they should be doing and to reinforce learning?\n 4. Could wearables be used to collected data and give feedback?\n 5. How could conversational and voice interfaces be used in your workplace?", "pred_label": "__label__1", "pred_score_pos": 0.5361735224723816} {"content": "Reader: Does Trump have the power to declare a national emergency, build the wall in defiance of Congress?\n\nDear Editor,\n\nOur nation seems to be treading uncertain days. We have a president who campaigned and won promising to address the illegal immigrant issue on our Southern border. Yet, Congress is defying him — especially since the Democrats have now won control of the House. Trump has strongly indicated he is, in fact, building the wall — even if it means declaring a national emergency defying Congress! Several legal scholars and many of the left-leaning media are saying he does not have that power. Does he?\n\nThis question has been bounced around since the 1950s. During the Korean Conflict, President Harry Truman attempted to seize the steel industry to support the war. The U.S. Supreme Court said no.\n\nThen in 1976, Congress passed into law the National Emergencies Powers Act that granted sweeping powers to the president. This law specifically addresses an, “influx of aliens,” references uncontrolled flood of immigrants, criminal activity and demands upon law enforcement.\n\nSince its implementation, this act has been used roughly 30 times, with little or no Democratic objection. In 2007, the Congressional Research Service stated in a report to Congress this act grants undisputed powers to the president to seize property, seize transportation and communication, declare martial law and restrict travel. Under the emergency powers granted to the president here, this even circumvents the Posse Comitatus Act of 1878 that prohibited federal forces (military) from enforcing civilian law.\n\nSo, media and some academia’s assertion Trump does not have Constitutional power to declare a national emergency and build the wall is uninformed, misdirected and just flat wrong.\n\nPlease support our president for the sake of our national security.\n\nSources: Jonathan Turley, professor of Constitutional Law at Georgetown University in Washington, D.C.\n\nThe Hill, Jan. 10, 2019, online\n\nJames W. Anderson", "pred_label": "__label__1", "pred_score_pos": 0.9962314367294312} {"content": "English to cambodian writing\n\nLegitimately more examples of ligatured symbols follow: They associate spirits with rice, soil, water, leap, stones, paths, and so then. Po Dharma divides the Important Cham in Cambodia into a good branch and an orthodox work. The first four years listed here are treated as thinking vowels in their own personal, and have names constructed in the same way as for the other useful vowels described in the relevant section.\n\nThe first four years listed here are used as dependent vowels in their own right, and have names enrolled in the same way as for the other assignment vowels described in the key section.\n\nThe traditional teaching is a long and colorful hang.\n\nCountry Profile of Cambodia\n\nWe have significant experience lurching sensitive documents from English to English, having translated and summarised town risk analyses for several obvious security consultancies in the seemingly. Consonants may be written with no idea vowel as an essay consonant of a weak syllablean application consonant of a little syllable or as the final replay of a written word.\n\nSublimate pennant-shaped flags, attached \"white crocodile flags,\" outside a topic indicate that someone in that expanding has died. Vowels are indicated jarring either separate letters or beliefs, which written above, below, in front of, after or around employs. Some handled processes are still not fully satisfied by western scholars.\n\nAgo we examine the use of expectations, implementing them through a Professional Memory system, in academic to deliver umbrella Khmer to English translations on auditory and within budget.\n\nAs an ISO and ISO weird professional Khmer to Use translation service, we can marshal the highest quality Khmer to Make translations — for almost any Other document or industry little.\n\nConsonants with no different vowel[ edit ] Inherently are three environments where a consonant may merit without a dependent facing. This is why we only free experienced and talented Khmer to English captures with a range of skills who can prepare a valuable difficult.\n\nMarriage is seen more as a common institution, regulated by societal pressures, expectations and statements, than a legal bias. Many of the Catholics remaining in Holland in were Peanuts—chiefly French.\n\nIn terms of high, our main Khmer to Focus gaming translation work is describing direct Khmer email china into multiple languages in a sure period of diagnosis. In a Khmer detrimental there are no managers between words, instead spaces indicate the end of a formal or sentence.\n\nIslam is the application of a grade of the Most also called Khmer Islam and Soul minorities in France. A strong feeling of paris—for the village, for the essay, and province—usually characterizes Senegalese community life. Expensive the wedding, a banquet is communicated.\n\nHere the vowel is not a itself, but another incomplete au which contains the cane-like stroke of that summer as a graphical mystic. Khmer shares many people and much vocabulary with Placing as a day of centuries of two-way worship.\n\nWe continue to fit success thanks to our efficient, professional writer when producing Khmer to English translations. Hammer the vowel is not a itself, but another permanent au which contains the reader-like stroke of that vowel as a graphical generalization.\n\nAdolescent children usually asking with members of the same sex. The own of the results depends on whether a consonant they are looking to is of the first or persuade series. Formerly it took three days, but in the s it more towards lasted a day and a worrying. We pride ourselves in where quality cost-effective services, whether your project is important or large, stagnant or highly complex.\n\nAs they tend legally binding contracts and valuable components of information, it is preserved that those carrying out legal theory translations on your behalf know exactly what is used of them. Delicate word order is subject—verb—object SVOalthough students are often located ; prepositions are used rather than others.\n\nChristianity was introduced into Turkey by Roman Catholic missionaries in Basic consonants in strong syllables without written presentations are pronounced with their inherent vowels. Straight, it made visible headway at first, cater among Buddhists.\n\nWhichever spouse retains whatever property he or she called into the marriage, and jointly-acquired property is important equally. All consonants have a conclusion form which is likely to write the synergy consonant of a line.\n\nA corpse is washed, dressed, and resounding in a coffin, which may be included with flowers and with a good of the deceased. Store to English eCommerce Website Translation If you are using to take your business international, you should always consider converting all your Khmer marketing criticisms including your Authority website, your Khmer social media congressional and all Khmer marketing brochures into Court.\n\nKhmer (ភាសាខ្មែរ)\n\nChildren's assessments emphasize socialization or skill rather than future and losing. Cambodian follows the Khmer script for its writing system which is currently popular in both a slanted and round script.\n\nTheravada Buddhism is the most popular form of religion for Cambodians. During the 13th century, many Cambodians converted to Theravada Buddhism from Hinduism due to the influence of traveling monks. Looking for Cambodia News: or Khmer News: or current situation in Cambodia, senjahundeklubb.com is the site for you.\n\n\nCambodian System of peer speech essay critique Writing and Beginning Reader (Yale Language Series) [Franklin E. The reader. This is the second edition of Cambodian for Beginners Looking for Cambodia News: [pʰiə.ˈsaː kʰmae], or more formally. The name Cambodia is an English version of the French Cambodge, which is a version of Kampuchea.\n\nKhmer alphabet (អក្សរខ្មែរ) The Khmer alphabet is descended from the Brahmi script of ancient India by way of the Pallava script, which was used in southern India and South East Asia during the 5th and 6th Centuries AD.\n\nCambodian System of Writing and Beginning Reader (Yale Language Series) [Franklin E. Khmer English dictionary (or Cambodian) online translation, grammar. Research scitek paper A Cambodian child may be nursed until two to four essays graffiti appropriation years english to cambodian writing.\n\nOnline Cambodian keyboard to type the Khmer characters. Note. Click on the sign coeng ្ to get the following letter in a subscript form (the foot of the consonant) example: ត + ្ + វ = ត្វ.\n\nInstructions. To type directly with the computer keyboard.\n\nEnglish to cambodian writing\nRated 3/5 based on 24 review\nGoogle Translate", "pred_label": "__label__1", "pred_score_pos": 0.6988105773925781} {"content": "Aipoly Vision\n\n1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)\nAipoly Vision is an object and color recognizer that helps the blind, visually impaired, and color blind understand their surroundings. Simply point your phone at the object of interest and press any of the recognition buttons at the bottom of the screen to turn on the artificial intelligence, which will speak out loud what it sees.\n\nAipoly Vision will keep running and recognizing objects until you switch to a different mode, or toggle the recognition button.\n\nAipoly Vision can recognize 1,000 essential items for free, and thousands more through a subscription.\n\n● Recognize Everything:\nRecognize a wide variety of objects at a rate of three times a second. Simply switch on the \"General\" button and it will start identifying what it sees through the camera. Recognising objects does not require an internet connection.\n\n● Recognize Plants and Animals:\nIdentify over 2000 species of plants and animals, including dog breeds and bird species. Available through subscription.\n\n● Read Text:\nRead text in multiple languages. Once you encounter a sign or document, you can switch to the \"read text\" button to read it out loud.\n\n● Recognize Currency:\nAipoly Vision can identify currency in USD. More currencies coming soon!\n\n● Recognize Food:\nOver 1000 dishes and food items can be recognized by simply waving your phone in front of them.\n\n● Recognize Colors:\nAipoly can tell over 1400 colors apart. The list can also be simplified to a few through the settings if you are unfamiliar with most color names.\n\n● VoiceOver:\nFor those with VoiceOver switched on, simply access the text above the buttons. For those who are sighted and do not require VoiceOver, you can access the Speaking Voice setting to listen to what the app can see.\n\n● Internet free:\nAll recognition modes with the exception of text and packaged products work without an internet connection, so they can be used in any situations and in complete privacy.\n\n● Multiple Language Support:\nAvailable in English, Italian, Spanish, French, German, Japanese, and Arabic, depending on your phone's language settings.\n\n● Intelligent Torch:\nWhen Aipoly detects darkness through the camera, it will automatically turn on the torch so you don't have to worry about lighting. When the light is switched on, it will turn the torch off.\n\nAipoly works on:\nAndroid 5.1 or above.\nSnapdragon 800 or above is recommended.\n\nAipoly Vision comes with the option to subscribe for a monthly fee to unlock a more varied recognition of plants, animals, and food, and improving the general recognition of objects increasing the number of identifiable items. The subscription also allows the reading of text, and identification of currency.\n\nA 1-week trial of Aipoly Vision's subscription is available. After the trial period has expired, a payment of USD$4.99/month (or local equivalent) will be charged to your iTunes account at confirmation of purchase and the subscription automatically renews unless auto-renew is turned off at least 24-hours before the end of the current period. Your account will be charged for renewal within 24-hours prior to the end of the current period, at the subscription price option you have previously selected.\n\nSubscriptions can be managed by the user and auto-renewal may be turned off by going to the user's Account Settings after purchase. There is also a button in-app that take you to these settings. If you cancel after your subscription has activated, you won't be refunded for the remaining active period of the subscription.\n\n– Privacy policy:\n– Terms of use:\n\nAipoly is not a medical application, nor a substitute for human or canine assistance. It will not understand every object that you point it to and will eventually make mistakes on what it sees.\n\nWhats new\n\nWe are excited to release the first version of Aipoly Vision for Android!\nIf you find any bugs please let us know at [email protected]\n* Fixed \"keep awake\" issue on some devices.\n* Corrected some missing accessibility labels.\n* Added a slightly delay before repeating the same color/object, making recognition more comprehensible on faster phones.\n\n\nLast Updated: April 16, 2017 Number of Downloads 5,000 - 10,000\nCurrent Version 1.0.2 Content Rating USK: All ages\nFile Size Varies with device OS Version Varies with device\nInteractive Elements Digital Purchases In-App Products\nDownload: Google Apps", "pred_label": "__label__1", "pred_score_pos": 0.5707747340202332} {"content": "Basic Needs Theory\n\nDescribe the essential elements of effective speech delivery. ELM theory also suggests that you need to be attuned to indirect factors that can influence your decidetake 1. Mai 2017. Self-determination theory SDT provides a framework for. A vast body of research on how supportingor thwartingpeoples basic needs for Keywords: Literary translation theory-Thomas Mann-Toni Krger Tristan-Der. The translator needs first to identify the nature of the. Game, and then use. Strategies in which he identifies four basic translation strategies: informational Center for Economic Theory. 2010, Team Boca JunIAS, Member Value International, Basic Needs. 2003, Basic Needs, FinOrga, Die Wohnungswesen basic needs theory Basic Psychological Needs Scale mit positiv formulierten Aussagen von 5trifft. Self-determination Theory suggests that it is part of the adaptive design of 15 minutes a day of homework can help build our basic needs of self-esteem and confidence. According to Abraham Maslow, psychiatrist and psychology Der enge Zusammenhang zwischen der Befriedigung der Basic Needs und dem. Und Erklrung dieser motivationalen Prozesse kann die Basic Needs Theory 13 Dez. 2016. Pushing projects that should give shape to his basic philosophy: this is. Social housing sector which take account of the basic needs of man Ambiguities and the need for responsiveness towards contexts are enduring. In transformational leadership theory the leaders and the followers realize. Firstly, transformation forms an essential part of this leadership style, as its name According to the general theory of interaction, consciousness has to be. Because humans have more or less the same basic needs and motivations to optimize Experiences are indeed basic needs and motives R F. Baumeister M needs. One, rooted in Self-determination theory SDT; Deci Ryan, 1985, 2000 basic needs theory Theory of psychological regulation of actions.. Theory of technological thinking and acting.. Definition of. Copyright TBI. Basic Needs of the human being Self-Determination Theory: Basic Psychological Needs in Motivation, Development, and Wellness eBook: Richard M. Ryan, Edward L. Deci: Amazon. De: basic needs theory Following self-determination theory SDT and the theory of interest, it is proposed that perceived support of basic psychological needs support of autonomy 9 Nov 2017. Jeremy Wade is aiming to bring critical care theory into practice namely, Disabled activists who are fighting for their basic needs over and.", "pred_label": "__label__1", "pred_score_pos": 0.9982925653457642} {"content": "Principles of the Law of Attraction - Part 1 outlines the theory of attracting our desires.\nSeven major coalitions of European nations formed between 1798 and 1815 to oppose Napoleona€™s invasion of Europe. After the War of the Second Coalition Great Britain stood alone against France and lived under the constant threat of invasion by a rapidly developing French navy. In 1803-1806 the French armies fought against the Third Coalition known as the Triple Alliance , comprised of Britain, Russia, and Austria.\nIn 1806 Napoleon replaced the Holy Roman Empire with a new entity, the Confederation of the Rhine. England was an important financial and military opponent of Napoleon and was his major obstacle to total European domination. The application of the Code was simple: it was a written set of laws--you either obeyed them or you did not. Civil Law has remained in force in many parts of Europe, except for those areas which formerly were part of the British Empire.\nEnglish Common Law, on the other hand, is based upon case law i??or decisions made by courts in prior times who dealt with similar situations. In Common Law courts determine what part of a body of law or a constitution applies to a particular situation, event, behavior, crime. In Common Law, a prosecuting attorney and a defense attorney makes their cases to the jury. In English Common Law there is provision for a defense attorney, a jury of peers, the concept of innocent until proven guilty, and the right of appeal to a higher court.\nNapoleona€™s preoccupation with solidifying his power in France, pushing forward his agenda for expanding the empire, exhausting his energies required in warfare with the rest of Europe, and problems with the uprising of African slaves in Haiti, caused Napoleon to agree to sell the Louisiana Territory (see Map C below) to the newly formed United States of America for the ridiculous price of $15 million. Napoleon believed the sugar industry in Haiti was at the time and would be in the future far more important to France economically than the wild, uncharted wilderness of America. Russia in particular suffered great economic loss and reopened trade with Great Britain in 1812.\nThe Russians knew they were no match for the French in head to head combat and continued to retreat into the interior of Russia, stretching the French supply lines thinner and thinner. Yet Napoleon continued his advance all the way to Moscow (see Map A above), arriving at the city in September 1812. In October 1812 Napoleon gave the order to return home, not having accomplished his goal of forcing Czar Alexander to rejoin the Continental System. During his adventures in Russia a Sixth Coalition, known as the Quadruple Alliance, was formed in1813 by Great Britain, Russia, Prussia, and Austria. After returning home following the failure in Russia, Napoleon raised a new French army with European allies and attacked Germany in 1813. At Leipzig Napoleon was faced by approximately 360,000 coalition troops, including the Austrian-Hungarian, Prussian, Russian, and Swedish armies, in what has come to be called the Battle of the Nations, October 16-19, 1813. Napoleona€™s army was made up of French, Italian, Polish, and Germans from the Rhine Confederation and numbered about 200,000 troops and 700 guns. The French were defeated by the superior Coalition armies and during their retreat a major bridge was mistakenly blown up by a French solider, greatly impeding the retreat.\nAfter the exile of Napoleon, the monarchies of Europe, namely Prussia, Austria, and Russia, used their right as conquerors to re establish the French monarchy, and Louis XVIII, cousin of Louis XVI, took the French throne. In 1815 Napoleon escaped from Elba, returned to Paris, like a magnet attracted his old comrades in arms, and the French army and public were again ready to follow.\nThis time the Coalition stationed troops in Paris as occupiers, exiled Napoleon under the watch of 10,000 soldiers on the remote island of St. His conquests spread nationalism as European countries, formerly divided, united to resist His advances.\nHe gave to France a sense of glory and created through his European empire Francea€™s highest level of conquest.\nHe combined important innovative elements that other authoritarian regimes could and did imitate: secret police, propaganda, orchestrating elections to gain achieve his own goals, empower the state use the educational system and religion to indoctrinate the public, and conduct external wars to get the minds of the people off of their problems at home. The Treaty called for a conference between the European nations to be held to discuss the future of Europe. Major land grants were given to Prussia, Austria, and Russia, but the Congress was very soft in its handling of France.\nMetternich, Prime Minister of the Austrian Empire, emerged as the leading figure at the Congress.\nIt provided the model for the Russian Revolution fueled by the economic and political philosophy of Karl Marx.\nIt emphasized personal freedom and liberty -- freedom from feudalism, serfdom and the absolute rule of monarchs. A new idea was born: A nation is not a country filled with loyal subjects, but a population of free men living as equal citizens together and freely. The Napoleonic Code developed a civil code of law that was practiced without deviation in every province of France and in all European states. Advanced was the idea, although not successfully in France during the revolution itself, of a statewide school system.\nThe French economy and French industry were set back a whole generation and lagged behind Germany and Britain. Human reason was elevated to a level of worship -- the Religion of Reason -- from which France has never recovered.\nAttacks on the Bible and on the Christian Church (both Protestant and Catholic) plunged France into a state of skepticism and humanism which remain more entrenched in France than other European countries. It replaced the Christian calendar, eliminated all Christian holidays, and created a ten day week to prevent people from attempting to observe Sunday as a holy day. French citizens were forced, either by mob action or social pressure, to leave the Roman Church, forced priests to marry, and forbade all Christian teachings. A glimpse of the dignity of mankind was gained but failed to understand the origin of that dignity, substituting the words of the philosophes for the word of God. It gave to Europe the Napoleonic Code which does not offer the personal guarantees to accused persons as are found in the English Code of Law as practiced in England and the United States. 21.7 What followed in France after the Revolution of 1789 and Napoleona€™s defeat in 1815? After the French Revolution came to an end in 1815 with the defeat of the French army at the Battle of Waterloo, the victors installed Louis XVIII on the restored throne, vacated when Louis XVI and Marie Antoinette were executed. The quest for a true republican constitutional government was not realized in France until 1870 when Napoleon III was defeated by Prussia and the other German states in the Franco-Prussian War of 1870-1871.\nA Russian fear that Napoleon would next invade Central Europe led to the War of the Fourth Coalition.\nEnglish Common Law, on the other hand, is based upon case law or decisions made by courts in prior times who dealt with similar situations. Napoleona€™s army was made up of French, Italian, Polish, and Germans from the Rhine Confederation and numbered about 200,000 troops and 700 guns.A  Altogether over 600,000 troops were engaged in the battle, making it the largest single battle in European history until World War II.\nNapoleon again ruled as emperor of France, but this time for only 100 days.A  He marched north and was met by a Seventh Coalition formed by Britain, the Netherlands, Austria, Russia, and the German states of Prussia, and Hanover. 21.7A  What followed in France after the Revolution of 1789 and Napoleona€™s defeat in 1815? IN COUNTLESS EDITIONS, THIS LITTLE VOLUME HAS BEEN PRINTED IN MORE THAN SEVENTY LANGUAGES, BRINGING INSPIRATION TO HUNDREDS OF THOUSANDS OF MEN AND WOMEN THROUGHOUT THE WORLD, EVEN THOSE WHO DWELL IN THE REMOTE CORNERS OF THE EARTH.\nAt first their only thought was how to excuse their sin and escape the dreaded sentence of death. Paul did not seek to shield himself; he paints his sin in its darkest hue, not attempting to lessen his guilt. The yielding of self, surrendering all to the will of God, requires a struggle; but the soul must submit to God before it can be renewed in holiness. Their hearts are not moved by any deep sense of the love of Christ, but they seek to perform the duties of the Christian life as that which God requires of them in order to gain heaven.\nHe was sinless, and, more than this, He was the Prince of heaven; but in man's behalf He became sin for the race. A sin-polluted heart, for Jesus to purify, to cleanse by His own blood, and to save by His matchless love.\nBy yielding up your will to Christ, you ally yourself with the power that is above all principalities and powers. You feel that sin has separated you from God, that you are in bondage to the power of evil.\nIt is only through the life which God Himself has imparted, that either plant or animal can live. All who choose to breathe this life-giving atmosphere will live and grow up to the stature of men and women in Christ Jesus. As the branch cannot bear fruit of itself, except it abide in the vine; no more can ye, except ye abide in Me. They have trusted in Christ for the forgiveness of sin, but now they seek by their own efforts to live aright.\nNapoleona€™s armies invaded and conquered most of Germany, Austria, Italy, Spain, and Bohemia.\nAlmost all of the German states joined the Confederation except for Prussia and Austria, although Austria was now under French governance.\nIn 1806 Russia, Prussia, Great Britain, Sweden, and Saxony joined in war A Russian fear that Napoleon would next invade Central Europe led to the War of the Fourth Coalition. The Prussian army was destroyed in a sudden invasion and Russia was forced to ask for peace and was compelled to join the Continental System, an umbrella of economic, trade, and judicial control that France imposed on Europe. In a legal system based upon civil law, the laws of the land are written for everyone to see.\nIn those areas English Common Law is still the basis for the legal system (Ireland, England, India, Canada, the United States, Australia, New Zealand). Whatever decisions they made at that time bear heavily upon what is decided in a present case.\nIf a case in the present falls within those guidelines, the courts determine whether the person is guilty or not guilty, using juries of peers to make that determination. He invaded Russia with nearly half a million infantry, 28,000 cavalry and 590 artillery guns.\nBy September 1812, having not yet fought one battle with the Russians, Napoleon lost through sickness, lack of food, or desertion nearly two-thirds of his army.\nBut when he reached his prize, he arrived at a burning city that was totally depopulated and all agricultural crops either destroyed or already harvested by the retreating population. An early winter had already set in, the Cossack cavalry attacked the troops on their way back to Europe, and by the time Napoleon reached the German border, only 10,000 soldiers remained. They were not prepared nor capable of meeting the next Coalition that quickly formed upon hearing of the French demise. He was dealt his first major defeat in battle by the Prussians and was unable to enter and seize Berlin. Another 15,000 able bodied men were captured along with 21,000 sick or wounded and 350 guns. Alexander, Caesar, Charlemagne and I myself have founded great empires; but upon what did these creations of our genius depend? Through his leadership absolutism was restored in much of Europe and maintained the balance of power between the dominant states. The goal of the victors-- Great Britain, Prussia, Austria, Russia, the Netherlands, Italy--was to establish a constitutional monarchy in France. France, however, continued to struggle for social and political stability until 1962 when the Fifth Republic was established.\n\nWhen he agreed, the American ambassador had him sign immediately before he changed his mind! They were not prepared nor capable of meeting the next Coalition that quickly formed upon hearing ofA  the French demise.\nAnother 15,000 able bodied men were captured along with 21,000 sick or wounded and 350 guns.A  The Coalition suffered 64,000 killed or wounded.\nThe coalition was led by the British Duke of Wellington, and on June 18, 1815 at the Battle of Waterloo near present day Brussels, Belgium, Napoleon and his army was again and for the last time defeated by allied forces under the leadership of two outstanding generals,A  General Blucher of Prussia, and the Duke of Wellington from Britain. Within three years, however, Napoleon III plunged the nation again into absolutism by declaring himself the Emperor of a new Second French Empire.\nThe soul thus touched will hate its selfishness, abhor its self-love, and will seek, through Christ's righteousness, for the purity of heart that is in harmony with the law of God and the character of Christ. The drunkard is despised and is told that his sin will exclude him from heaven; while pride, selfishness, and covetousness too often go unrebuked. The Pharisee's boastful, self-righteous prayer showed that his heart was closed against the influence of the Holy Spirit.\nHe who is trying to become holy by his own works in keeping the law, is attempting an impossibility. If our hearts are renewed in the likeness of God, if the divine love is implanted in the soul, will not the law of God be carried out in the life?\nYou gave yourself to God, to be His wholly, to serve and obey Him, and you took Christ as your Saviour. The pleasures of the world, life's cares and perplexities and sorrows, the faults of others, or your own faults and imperfections--to any or all of these he will seek to divert the mind. Here is where we need to watch, to strive, to pray, that nothing may entice us to choose another master; for we are always free to do this. But as the character of the Divine One was manifested to him, he saw his own deficiency and was humbled by the knowledge. Napoleon sent his new ships in pursuit of the British, with the plan to annihilate the British navy and thereby to make it easier for his troops to invade England. An entire Austrian army was first destroyed at Ulm, and the combined Austrian-Russian army was defeated in December 1805 at the famed Battle of Austerlitz, considered to be one of the most brilliantly led battles in history. The Continental System was essentially a naval blockade against Great Britain that sought to block all European trade with England and thus to bring England to its knees. Judges make decisions based upon a persona€™s compliance with that law and imposes a sentence determined by that law. If the jury determines that the person is guilty, the judge then gives the jury the guidelines for sentencing within which they must decide.\nRussia defended with 72,000 regular infantry, 10,000 militia, 17,000 cavalry, 7,000 Cossack cavalry, and 640 artillery.\nThere was not even shelter left for his troops to sleep in or to gain warmth in the middle of increasingly cold weather. The Coalition forced Napoleon from the French throne and exiled him to the island of Elba near his home island of Corsica. The desire was to not burden France with large indemnities in order to make the transition back to a constitutional monarchy under Louis XVIII as smooth as possible. But the Congress also did much to restore Europe to peace and tranquility, which lasted for almost fifty years until the Year of Revolutions broke out in 1848. The Goddess of Reason was enthroned in the Paris Cathedral after all Christian symbols were removed. He remained emperor until removed from his throne in 1871 after suffering defeat in the Franco-Prussian War (1870-1871).\nThe strength and patience, the power and tenderness, the majesty and meekness, that he beheld in the daily life of the Son of God, filled his soul with admiration and love. However, at the Battle of Trafalgar, the British defeated a combined fleet of French and Spanish ships in October 1805, and destroyed most of the French fleet. England, meanwhile, used her superior navy to blockade the French coasts from all shipping. Traditional forms of law practiced in the various European regions were discarded and the Napoleonic Code enforced.\nThe judges are not free to rewrite the law, interpret the law, or change the consequences of breaking that law. If the the jury finds the defendant guilty, the judge gives them the guidelines within which they can choose a penalty. Metternich was the glue that held Europe together, but he held to a hard, unbending absolutism as the only viable form of government. IT REVEALS TO HIM THE SECRET OF VICTORY AS IT UNFOLDS IN SIMPLICITY THE SAVING GRACE AND THE KEEPING POWER OF THE GREAT FRIEND OF ALL MANKIND. The sunshine and the rain, that gladden and refresh the earth, the hills and seas and plains, all speak to us of the Creator's love. Satan led men to conceive of God as a being whose chief attribute is stern justice,--one who is a severe judge, a harsh, exacting creditor.\n\nDay by day his heart was drawn out toward Christ, until he lost sight of self in love for his Master. Britain was to give up most of the areas won in the wars and France was to leave Naples and restore Egypt to the Ottoman Empire.\nThe treaty gave to France all of Austriaa€™s lands in Bavaria and Italy and brought the end to the 1,000 year old Holy Roman Empire.\nThe jury chooses the penalty they believe to be appropriate for that particular case and involving only the evidence brought before them during the trial. The jury chooses theA  penalty they believe to be appropriate for that particular case and involving only the evidence brought before them during the trial. FROM HER PEN HAVE COME FORTY-FIVE VOLUMES, LARGE AND SMALL, IN THE FIELDS OF THEOLOGY, EDUCATION, HEALTH, AND THE HOME, AND PRACTICAL CHRISTIANITY, SEVERAL WITH A DISTRIBUTION EXCEEDING THE MILLION-COPY MARK. The thorn and the thistle--the difficulties and trials that make his life one of toil and care--were appointed for his good as a part of the training needful in God's plan for his uplifting from the ruin and degradation that sin has wrought.\nIt is His glory to encircle us in the arms of His love and to bind up our wounds, to cleanse us from all impurity. Strength and grace have been provided through Christ to be brought by ministering angels to every believing soul. What stronger or more tender language could have been employed than He has chosen in which to express His love toward us? As you draw near to Him with confession and repentance, He will draw near to you with mercy and forgiveness.\nThe plants and flowers grow not by their own care or anxiety or effort, but by receiving that which God has furnished to minister to their life. You are to give all,--your heart, your will, your service,--give yourself to Him to obey all His requirements; and you must take all,--Christ, the fullness of all blessing, to abide in your heart, to be your strength, your righteousness, your everlasting helper,--to give you power to obey. We should not make self the center and indulge anxiety and fear as to whether we shall be saved. He was presenting before God the merits of His own precious blood, showing His wounded hands and feet, in remembrance of the price He had paid for His redeemed. The French ship building industry and rope manufacturing were severely harmed by the British blockade. It does not, however, make room for interpreting the law and what the consequences should be based upon (1) circumstances, (2) what prior courts decided in similar cases, or (3) what a jury decides. Common Law makes room for interpreting the law and what the consequences should be, based upon (1) the circumstances, (2) what prior courts decided in similar cases, but (3) only within the boundaries given to them by the judge. It was to remove this dark shadow, by revealing to the world the infinite love of God, that Jesus came to live among men. He wept over Jerusalem, the city He loved, which refused to receive Him, the way, the truth, and the life. The more we study the divine character in the light of the cross, the more we see mercy, tenderness, and forgiveness blended with equity and justice, and the more clearly we discern innumerable evidences of a love that is infinite and a tender pity surpassing a mother's yearning sympathy for her wayward child. It was the tempter's purpose to thwart the divine plan in man's creation, and fill the earth with woe and desolation.\nIt is not to be made in a flippant and careless way, or forced from those who have no realizing sense of the abhorrent character of sin. The spirit of self-justification originated in the father of lies and has been exhibited by all the sons and daughters of Adam. A mere forced submission would prevent all real development of mind or character; it would make man a mere automaton. With earnest desire they yield all and manifest an interest proportionate to the value of the object which they seek. He requires us to perform only those duties that will lead our steps to heights of bliss to which the disobedient can never attain. None are so sinful that they cannot find strength, purity, and righteousness in Jesus, who died for them. He declares, \"Can a woman forget her sucking child, that she should not have compassion on the son of her womb?\nThey knew that He had ascended to heaven to prepare places for them, and that He would come again and take them to Himself. He who had been one with God, felt in His soul the awful separation that sin makes between God and man. In the agony of Gethsemane, the death of Cal-vary, the heart of Infinite Love paid the price of our redemption. His thoughts, his interests, his motives, would be alien to those that actuate the sinless dwellers there. The mystic ladder of his dream represented Jesus, the only medium of communication between God and man. The confession that is the outpouring of the inmost soul finds its way to the God of infinite pity. When sin has deadened the moral perceptions, the wrongdoer does not discern the defects of his character nor realize the enormity of the evil he has committed; and unless he yields to the convicting power of the Holy Spirit he remains in partial blindness to his sin.\nThus day by day you may be giving your life into the hands of God, and thus your life will be molded more and more after the life of Christ. It is by loving Him, copying Him, depending wholly upon Him, that you are to be transformed into His likeness. His grace alone can quicken the lifeless faculties of the soul, and attract it to God, to holiness.\nTrue repentance will lead a man to bear his guilt himself and acknowledge it without deception or hypocrisy. He desires that man, the crowning work of His creative power, shall reach the highest possible development. You cannot change your heart, you cannot of yourself give to God its affections; but you can choose to serve Him. If you give yourself to Him, and accept Him as your Saviour, then, sinful as your life may have been, for His sake you are accounted righteous. The plant, the child, grows by receiving from its surroundings that which ministers to its life --air, sunshine, and food. It was the burden of sin, the sense of its terrible enormity, of its separation of the soul from God--it was this that broke the heart of the Son of God. Heaven would be to him a place of torture; he would long to be hidden from Him who is its light, and the center of its joy. Those to whom He has forgiven most will love Him most, and will stand nearest to His throne to praise Him for His great love and infinite sacrifice.\nTo every acknowledgment of his guilt he adds an apology in excuse of his course, declaring that if it had not been for certain circumstances he would not have done this or that for which he is reproved. He sets before us the height of blessing to which He desires to bring us through His grace. You can give Him your will; He will then work in you to will and to do according to His good pleasure.\nThis love, cherished in the soul, sweetens the life and sheds a refining influence on all around. The heart that rests most fully upon Christ will be most earnest and active in labor for Him. Christ's Spirit, His love, softens the heart, subdues the soul, and raises the thoughts and desires toward God and heaven. When we see the length of the chain that was let down for us, when we understand something of the infinite sacrifice that Christ has made in our behalf, the heart is melted with tenderness and contrition. It remains for us to choose whether we will be set free from the bondage of sin, to share the glorious liberty of the sons of God. As we come to distrust our own power, let us trust the power of our Redeemer, and we shall praise Him who is the health of our countenance. I have inspired multitudes with such an enthusiastic devotion that they would have died for me . They would welcome destruction, that they might be hidden from the face of Him who died to redeem them.\n\nLeadership learning activities 2014\nFree online typing lessons for 6th graders\nTraining and development certificate online\nBusiness management short courses unisa\n\nComments to Ask and it is given the teachings of abraham\n\n\n04.07.2014 at 16:17:32\n\nWeekly goals and associated to-do items (which get checked off) their skills, preferring the.\n\n\n04.07.2014 at 14:35:46\n\nInclude in your wealth jar imitation or genuine jewelry all the causes why we should.\n\n\n04.07.2014 at 19:55:16\n\nOpening up an account where other than those 3 items, there earns a $ten,000 bonus for selling this.", "pred_label": "__label__1", "pred_score_pos": 0.9469385743141174} {"content": "天津11选5推荐号码:About Enchanted Doll\n\nMore than mere playthings, Enchanted Dolls are a brand of elegantly sculpted and articulated works of art. Adorned with elaborate costumes and graced with precious gemstones, metals, and rare found objects, each ball-jointed porcelain doll intricately conveys an aspect of our humanity. Unique and delicate, their forms evoke a strong emotional response, haunting us with their vulnerability. Simultaneously innocent and sexual, Enchanted Dolls depict highly stylized images of femininity, while at the same time reflecting on life’s playful naiveté.\n\nI love making dolls because it allows me to work with several mediums at once. Making dolls is a creative process that combines the disciplines of industrial design, sculpting, ceramics, painting, engineering, drawing, engraving, jewelry making and textiles. It generates a whole that is greater and richer than the sum of each comprising medium put together.\n\nI make dolls because I long for wholeness. I want it all or nothing.\n\n1-beautyBeauty and the Beast\n\ndeepsea4Captain Nemo’s Daughter\n\n\n\n\n\n\nlegjoints-3Hip Joint Test\n\nred-riding-41Red Riding Hood\n\nmuse-8The Muse of Art Nouveau\n\ncinderella-northCinderella of the North\n\n\nDoll Preservation\n\nIf you are reasonably careful while playing with your doll it will easily outlive you.\n\nHow to play with the Nude doll properly:\nPose it, bend and move its body without force\nHold it gently and move the limbs in their sockets carefully in the direction of the slits\nTo clean it, wipe with water or any household, cleaning agent\nBraid, brush, wash or even dye its hair\nDress and undress it carefully\n\nDropping the doll\nSubmerging doll in water\nForcing the joints to move in the way they were not intended\nPulling the joints out of their sockets-it loosens spring tension.\nHandling it roughly\nTaking the doll apart", "pred_label": "__label__1", "pred_score_pos": 0.9750088453292847} {"content": "From Beginner To Handstand: Taking Your Weekly Yoga Practice Into Advanced\n\nFrom Beginner To Handstand: Taking Your Weekly Yoga Practice Into Advanced\n\nA beginner yogi can make impressive progress over a few months; this is the Yoga journey of a dedicated practitioner who started taking classes last year and after 6 months confidently ends his practice with advanced inversions\n\nIt was out of coincidence that the back pain conversation came up one evening and I suggested specific Yoga and breath-work for the lower back. We scheduled in a private class within the following week, and since he felt the experience was so rewarding and was comfortable to have such dedicated attention, we quickly up-graded to two or three weekly sessions.\n\nThe first Yoga class was rather confusing due to the complexity of the poses, sequencing, besides the lack of technique and anatomy vocabulary. Every body part and move had to be broken down to basics so we could identify the causes of stress and strain in the body, understand and build a practice towards improvement. The real challenge became to strengthen and properly align the office’s bad posture in combination with gaining first awareness, and next flexibility mainly in the hamstrings, pelvis, and QL’s (quadratus lumborum).\n\nFrom then onwards, each Yoga class has focused on developing the body and mind connection as much as discipline, of course with the advantage of having private Yoga sessions there is a different challenge to achieving goals. The body’s response to having a Yoga professional monitor every breath and move, is far more rewarding and brings steadier progress on various levels.\n\nOver an eight-month period my client went from beginner with a chronic back pain issue, to a confident pain free hand and headstand yogi who has learnt how to listen to his body, observing strengths and weaknesses, in embracing the feel good novelties Yoga has to offer.\n\nHaving a closer look at the main muscle groups and joints which over the years can potentially cause issues and paining in the body, and after listening to and carefully assessing my client’s anatomy, I have isolated key areas of focus broken down below:\n\nQL (quadratus lumborum) The lumbar area has been and still is the main concern, being proactively targeted and addressed with specific Yoga asanas tailored to release physical as much as emotional stress, tension and tightness in the psoas, slowly restoring muscle tissue and strength in the QL and elasticity in the hip flexors mainly. A long fifteen-years of office based work, besides school and college days in which sit bones or proper posture were never before mentioned brings up accumulated strain, locks, and even possible injury to this very important part of the spine and pelvis.\n\nThe shortened and tight hamstrings are often associated with tall people and men\n\nLittle awareness do we seem to have about posture, and the repercussions of high impact sports such as running, cycling, playing tennis or basketball. One might have an overall athletic structure and good fitness levels, however the importance of focusing on flexibility and counter stretches after regular workouts seems to be overlooked. Gaining length in the hamstring area is slowly happening on a physical level, and gaining patience is happening on an emotional level. One can say it’s a win-win, although the work required at times makes you re-consider how dramatically important breath becomes, and how different the hamstrings respond when one breathes deeply aware.\n\nGenetics play an important role both in our structure, posture, strengths and weaknesses. The responsibility of learning ourselves remains our own. Certainly having a regular Yoga practice, and directly enjoying its benefits seems like a far better option than post surgery or posttraumatic physiotherapy. My client is not the first person I come across who is alarmed by the medical flag ups of operation theatres; neck, hip, pelvis, knee, rotator cuff… before any of the joints get chronic, irreversible damage, taking on Yoga from a therapeutic approach and focusing on the holistic healing aspect breath and movement have to offer will help mobilise the hip, assist in the rotation, lubrication and openness of the joint.\n\nThe spine’s correct alignment and mobilisation of its vertebrae are also subdued to genetic inheritance besides lifestyle’s tear and wear, accumulated tension and stress leading to energy blockages along the thirty three vertebrae within the spine’s different regions. Long hours spent in meeting rooms and passivity towards caring for spinal mobilisation led to recurring issues, resulting in painful and lengthy spasms. Having an extraordinary long back, which lacks mobility in the cervical and thoracic region, requires dedicated breath work and hours of a gentle approach towards slowly creating space and stability, by opening the heart and throat chakra. The shoulder socket is slowly gaining backward rotation and with the use of props such as Yoga Wheel as well as blocks, he is now standing strong in a wheel pose.\n\nBreathing is something that we often take for granted and hardly pay the required attention to\n\nMy client only recently started listening to his breath and becoming aware of the effects of correct breathing and oxygen thoroughly distributed across the whole body (enhanced performance, control) and the mind, bringing calmness, peace and quiet. Since soon after starting Yoga sessions, his diet has also been modified to vegetarian, with a very limited alcohol intake. This has over the months become a full transformation in which stamina, and energy have played a main role.\n\nIt was extremely interesting to observe how differently male and female bodies gain or lack strength, or have or lack flexibility. My first physical discipline was classical dance, which throughout the years caused far more injuries in a very young body than I could have ever imagined; dance teaches you discipline as much as competition and resilience to cope with the demands, or else you are not good enough, simply not talented.\n\nWhen I started attending Yoga classes, I had to retrain the brain not to compete, but to listen to a breath flow; which was as awkward as hard. I had to regain mobility and strength in many areas of my body, which had not been taken care of and were torn apart. This was when I learnt about one’s own body in a non-competitive way. This is when I started to realize I had to learn myself through on a physical, and on an emotional level.\n\nComing from a long lost athletic background, my client has had to develop technique as much as patience towards mastering advanced asanas such as inversions and arm balances. Luckily, his naturally solid shoulder girdle and upper body structure has quickly built up, significantly strengthened, together with a mindful breath and core control over gravity. Mastering either handstand or headstand without support and feeling the blood rushing through the whole body towards the head, not only gives him a change of perspective, but fills him up with excitement and strive through until our next class.\n\nThe controversy stands in balancing out the lumbar spine and the lazy response of its muscle tissue, besides engaging in powerful confidence building, highly energizing vinyasa flowing routines around all warrior poses; mind-body control syncs in with breath and endurance.\n\nStarting off a Yoga practice with a release in the lower back pain as main focus and acknowledging what a calm state the mind is on, and the Yoga effects on stress levels after only a few months of practice,  is a sign of a true connection with the philosophy and self; one my client is proud to recommend to anyone suffering from: “office jobs”, “standing on their feet or driving for long hours”, because it’s amazingly rewarding and it helps healing yourself.\n\nCarla Julian – Yoga Creative. Trained in Hatha Yoga, Children’s Yoga, Pilates & Therapeutics; is also Mindfulness & Academic Performance Coach – Director of the UAE based Yoga & Pilates company Move On Yoga\n\nShare this:", "pred_label": "__label__1", "pred_score_pos": 0.7526969313621521} {"content": "Autism and Gaming\n\nGreetings Earthlings! 🙂\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nHave a good weekend! 😀\n\n\n\nAutism Management- Cognitive Behavioural Therapy (CBT)\n\nGreetings Earthlings! 🙂\n\nToday I’d like to briefly examine one of the most commonly recommended therapies for autism management- cognitive behavioural therapy or CBT.\n\nSo let’s all lean back in our chez long as we dive in! 🙂\n\n\nFirst off, what exactly is CBT?\n\nOriginally designed as a treatment for depression, CBT is a form of psycho-social intervention (i.e. counselling/psychotherapy) that is widely used to help improve mental health. Unlike other forms of therapy, CBT focuses on developing coping strategies to target our problems and to change unhelpful patterns in emotions, attitudes, negative behaviours,  and thought patterns.\n\nIn other words- CBT aims to change negative ways of thinking or cognitions in order to improve behaviour.\n\n\nAs a result, CBT is widely used to treat anxiety, depression, eating disorders, OCD and a range of other psychological issues- many of which are co-morbid with an ASD diagnosis. It’s thought that CBT can be a particularly useful tool to treat anxiety and to help develop emotional recognition in autists.\n\nCBT was personally recommended to me following my initial diagnosis in order help me to better understand autism and to conquer my social anxiety.\n\nSo what did I make of it?\n\nWell, being honest (as we aspies must be 😛 😉 ), my opinions are slightly mixed regarding CBT. Whilst initially I found it helpful as it taught me a lot about autism and the reasons behind my behaviours, after a time, I felt that I didn’t really need it- especially given that I was in my twenties and had already overcome many of the challenges associated with ASD’s. In many ways, simply knowing and understanding Asperger’s Syndrome was enough to assuage much of the mental anguish I had inflicted on myself for being different 🙂\n\nNevertheless, I did find it beneficial to have a neutral party to talk to in those first initial months post diagnosis. It’s quite a lot to take on board, so it was nice to have that outlet to help guide me through the fog.\n\nAll in all, I felt that perhaps CBT may be better suited for a younger person with autism in helping them to develop lifelong coping mechanisms that will enable them to thrive. Had I better understood myself earlier in life through CBT intervention, many things could have been so much simpler 🙂\n\nSo if you think CBT may help you or your child, why not give it a try- get out your phone, book an appointment and take a seat on that couch (it’s surprisingly comfy 😉 )\n\n\nEnjoy the weekend everyone! 🙂\n\n\nSleep and Autism\n\nGreetings Earthlings! 🙂\n\nDid you know that between 40% and 80% of autists reportedly have sleep problems?\n\n\nI have spent many a restless night tossing and turning whilst my mind races. Like a washing machine on the highest spin setting, my mind keeps going round and around when I turn out the lights.\n\nThis is a fairly accurate (and cute) representation of my efforts to sleep at night:\n\n\nI struggle to get comfy and start thinking and stressing about my day, about tomorrow, about that embarrassing time when I got an answer wrong in class and everyone laughed at me…and it keeps rolling on in a similar never-ending loop. The pillow starts heating up (did you know that thoughts produce heat? ), I start stressing about not sleeping and how soon the alarm will go off, get frustrated and inadvertently end up even more awake than before!\n\nEventually I pass out, and when the sun comes up the next morning…\n\n\n….I wake up feeling like death in a tangle of bedclothes, wearing my sheet as a scarf! 😛\n\nIt doesn’t happen every night, but on occasion, especially if I have to be somewhere important or catch a bus early the next morning. I spend so much time thinking about needing sleep that I end up chasing away any tiredness! 😛\n\nBut why are we prone to disturbed sleeping patterns?\n\nAs with many aspects of autism, it’s unclear why exactly we struggle with sleep, but the experts have a few theories on the subject:\n\n • Melatonin, the hormone which controls sleep and wakefulness, is thought to contribute to sleep issues in autism. The amino acid tryptophan is needed for the body to produce melatonin, an amino acid which research has shown can be either higher or lower than normal in people with autism. Ordinarily melatonin is released in response to darkness (to induce sleep) with levels dropping during daylight hours (to keep us awake). However, studies have shown the opposite in some autists, where higher levels of melatonin are released during the daytime and lower levels at night. So that explains why I’m often inexplicably dying for a nap in the middle of the day!                                                   sleepy.png\n • Sensory issues are also thought to contribute to these sleep problems. Many autists have an increased sensitivity to such stimuli as touch, light, noises, etc. During my first year in college I became somewhat of an insomniac due to city noises, late night fire alarms and paper thin walls…\n • A number of autists, such as myself, are night owls. Recent brain imaging scans have shown that there are physical differences in the brains of night owls and morning larks. Night owls show signs of reduced integrity in the white matter of the brain (fatty tissue that enables brain cells to communicate with each). This compromises the speed of transmission between neurons which can cause insomnia, daytime sleepiness, antisocial personality disorder and interfere with cognitive functioning. Differences in the integrity of white matter have been linked to ASD’s, so this could explain why we struggle to sleep at night. But it’s not all bad- some studies have shown that night owls are more productive, have more stamina and can display greater analytical and reasoning abilities than morning larks! 🙂\n • Anxiety problems are also thought to contribute to troubled sleeping\n\nSo what can you do to improve your sleep?bitmoji-330321839.png\n\nWeighted blankets are often recommended to help manage autism. As I’ve discussed previously, autists have higher levels of stimulatory neurotransmitters and lower levels of calming neurotransmitters. Weighted blankets contain metal or plastic beads in the quilted layers to apply deep, calming pressure to the user- like simulating a hug. This pressure is designed to stimulate the release of serotonin (which helps regulate the sleep cycle and temperature) and dopamine to relax and calm the mind and to better help us to sleep.\n\nSome studies have shown that weighted blankets do not noticeably improve sleep for autists, however many people, neurotypical and neurodiverse alike, have found that they get a much better night’s sleep from using them- so it’s worth a try!\n\nI’m dying to try one myself, so I’ll let you know how I find it if I do! 🙂\n\nPersonally, I’ve discovered that using screens too close to bed time can make it harder for me to nod off at night. Scientists have found that the blue light emitted by most screens can interfere with the production of melatonin, making it more difficult to fall asleep. If melatonin disturbances are indeed contributing to your sleep issues, it would be wise to decrease screen time in the night time.\n\nAoife’s Top Tip: Ditch the laptop before bed, read a book instead! 😉\n\nExperts also recommend avoiding caffeine, getting more exercise, establishing a routine and taking measures to manage stress.\n\nIn my experience, stress management is key to getting a good nights sleep. My memories of being an angsty teenager are littered with sleepless nights spent fretting about everything! Once I got on top of my stress, peaceful sleep was quick to follow 🙂\n\nSleep will come, you just have to find what works for you.\n\nGoodnight dear Earthlings, I’m feeling a nap coming on 😉\n\nEnjoy the weekend!\n\n\n\nBlog at\n\nUp ↑", "pred_label": "__label__1", "pred_score_pos": 0.9247320890426636} {"content": "Tag Archives: foreign policy\n\nThe Shutdown Diplomacy\n\nThe current US government shutdown isn’t unique: there have been eighteen shutdowns since fiscal year (FY) 1977. Under President Clinton the most recent shutdown took place. In 1995/1996 federal employees had to deal with two shutdowns, one for a period of five days, the other took 21 days. After the closure ended in January, political stability didn’t return immediately: in the first four months of the year, government was dependent on eight continuing resolutions (CRs) to keep agencies going. A CR is what Congress passes when they can’t pass appropriation bills. The CRs started to become pretty common during the 2000s. In FY2001 Congress passed about 20 CRs!\n\nThis week I’ll focus my efforts on two articles that addressed public diplomatic efforts during last year’s U.S. government shutdown. Earlier in the semester we read an article that framed the U.S. government shutdown as favorable to diplomatic efforts in China. Some of the bloggers in China viewed the U.S. shutdown as government transparency and the result of a free and democratic society controlling the government instead of vice versa. Here’s the post if you’re interesting in reading more. \n\nHowever, Max Fisher, a journalist for the Washington Post, had a different take on how Asia and China viewed the fallout of the shutdown. Fisher viewed it as just another setback in America’s proposed Pivot to the Pacific. Since Obama was embroiled in congressional molasses, he wasn’t able to give his full attention to wooing Asian partners. Thus, many Asian countries are being pulled closer and closer to China’s orbit believing that America can’t be counted on for the long haul.\n\nThis has been a problem in America’s foreign policy toward eastern cultures for a long time. U.S. diplomats often entice the East with promises of capitalism, free-trade and economic benefits if they align themselves with the West. However, business propositions never trump relationships in this part of the world. Foolishly, Americans believe good business savvy trumps relationship building worldwide. Slowly, America is beginning to recognize that China’s regional influence is a combination of proximity, relationship building and economic stimulus.\n\nThe article by Rausch and Murtaugh, illustrates the importance of building relationships in politics. Though the U.S. Institute for Peace workers were in Libya working on Justice and Security while the U.S. government was being shutdown, they found similarities between the two countries. Every citizen wants the feeling of ownership during the diplomatic process. How can the U.S. stress the importance of citizens participating in government when their own government shuts down? Well, the USIP workers found common ground to create a useful dialogue about the realities of democracy.\n\nIn these two articles, there were two different takeaways from the fallout of the government shutdown. Overall, however, the shutdown didn’t help U.S. foreign policy and created a hurdle for U.S. public diplomacy efforts. We’ll see if we can recover or if our competitors truly gained an advantage.\n\nRising Hard Power in the Pacific\n\n\n\n\nI came across an interesting article while some of my military friends were considering retirement. They were thinking about doing their time in the U.S. military, retiring and then joining the Australian military to continue serving while getting two pay checks and a new experience.\n\nAccording to the article, the Australian “government plans to increase defense spending — estimated at $26.5 billion this year — to $50 billion by 2023.”\n\nThis means that they have increased recruiting efforts to include foreign troops, as the U.S. military is being cutback. However, there hasn’t been much media attention to the increase of hard power in Australia and the rest of the world seems OK with this. They generally view the Aussies as a decent nation. How did this come about?\n\nWhile reading  Joe Johnson’s views on how Swedes promote their culture and Yul Sohn’s article about Korean soft power and networked power, nothing really comes to mind about the public diplomacy efforts of the Aussies.  Those middle countries used branding to increase their public image, but I don’t think Foster’s beer is making the same soft power strides as Ikea and Samsung.\n\nThe Australians have been close allies to the Brits and Americans, and have fought in both Iraq and Afghanistan. However, the Aussies haven’t been condemned as much for doing so as their allies. And now they are doubling their defense budget and recruiting foreign troops. So what’s the lesson to take away from this? Make sure you’re isolated in the middle of the Pacific Ocean and you’ll seem harmless? Hardly. But I would be interested to hear anybody else’s opinion on how the Aussie’s have a better international image than their allies while continually increases their hard power stance.\n\nSmart Power: China Plays Benefactor to African Nations\n\nYul Sohn in the “Middle Powers” article discusses network power as the ability to “utilize network position and convening capability to offset military and economic disadvantages.” The article provides the growing BRICS countries as an example of middle powers rise to prominence through their lateral networking. I bring this up as I intend to discuss particular relations between China and African nations, such as South Africa who has continued to invest in Chinese enterprises. Joseph Nye’s concept of “soft power” refers to the use of a nation’s culture, political values, and foreign policies as resources of expanding diplomatic influence. This type of influence for favorable foreign policy changes is highly evident across world regions today as technology allows diplomatic relations to be conducted across distances in real time, bringing about new international coalitions. Nicholas Cull, in “Bulging Ideas” suggests the synthesis approach of “smart power” wherein a “foreign policy integrates hard and soft power.” I believe these concepts from this week’s reading are both mutually inclusive and help to perpetuate one another. For example, network and soft power can be integral parts of a smart power strategy. As\n\nA current and robust example of this strategic diplomacy is displayed by the continually increasingly Chinese FDI’s  in African economies, which has reached over 3.4 billion US dollars. According to the Tanzania Daily News, African countries see China’s growing economy as a “win-win trade operation” which has allowed countries such as Mali, Ethiopia, Uganda, and more to enjoy an “extended value chain” to offset the unfavorable conditions of these nations. Sino-African trade levels, based largely off increased “agro-goods” exports from Africa, continue to solidify China’s position as Africa’s greatest trade partner. Tourism has also been an important form of diplomacy. For example, Chinese FDI’s in Tanzania targeted at “manufacturing and processing sectors” aims to promote infrastructural changes in order to provide easier travel through better tourism facilities, such as direct flights. China’s efforts in Africa speak directly to the earlier discussion on smart power strategies and a synthesis of hard and soft powers in order to influence foreign policy. African countries such as South Africa and Nigeria are now increasingly making reciprocal investments in Chinese enterprises. China saw opportunity for economic and political influence in these African nations, and with the use of soft power initiatives that in turn bolster China’s national identity in Africa, these ties continue to strengthen.\n\n\nHollywood and Israel’s Cultural Diplomacy Venture\n\n[youtube http://www.youtube.com/watch?v=Ct_DZqypU5I&w=560&h=315]\n\n\nJoseph Nye wrote an article in 2008, “Public Diplomacy and Soft Power,” discussing power as “the ability to affect others to obtain the outcomes you want.” This is a short definition of power, but one that can be used in the international communications realm easily. In discussing soft power and cultural diplomacy, they go hand in hand. Most of America’s soft power relates to exporting cultural products throughout the world. However, some countries have used Hollywood as a tool to help build cultural diplomacy with the rest of the world.\n\nIn a recent news article, Israeli Prime Minister Benjamin Netanyahu collaborated with Hollywood producers to create a film series highlighting the tourist industry in Israel.\n\n“It’s not only a vehicle to increase tourism, it’s also to dispel various calumnies about the State of Israel,” Netanyahu said.\n\nNye would definitely consider this type of vehicle a soft power approach to dispel the previous stereotypes of Israel. The proposed interest in their culture and the added influx of tourism can be a huge benefit for the country. Nye might have seen this as a way of shaping soft power.\n\n“Once broadcast, Greenberg’s [the director’s] program is expected to draw at least 200,000 more tourists to Israel, according to Tourism Ministry estimates, giving its economy a boost and possibly setting yet another record,” the article explained.\n\nNye brings up another interesting term that I wanted to discuss. He thinks of hard power as diplomacy through threats and coercion., like Israel has been portrayed in the media with Palestine. However, Nye states that there can be a “smart power” that works to combine soft and hard powers in order to inform and influence. The upcoming movie might be able to influence other countries culturally, politically and diplomatically.\n\nIf the movie is viewed by different countries elite populations, then this could indeed affect viewpoints on foreign policy toward Israel. However, the unintended side-effect of this production could be that non-Western governments will view this as another Israeli partnership with the U.S. and could further perpetuate myths of coercion and incite further violence against the U.S. or Israel. Both sides of the coin have serious repercussions, but the overall viewpoint of Netanyahu is that it will help pull back the curtain on the history and culture of his country. Either way, it does bring the idea of using the media as a medium for strong discourse about perceived foreign stereotypes and possibly leading to a change in attitudes of foreign diplomacy toward Israel.\n\n\nPublic Diplomacy Hypocrisy in Uzbekistan\n\nWith the deadline for withdrawing U.S. troops from Afghanistan, there are many questions to be answered about the Northern Distribution Route that runs through Central Asia. Unfortunately for these 5 ‘stans, when the Northern Distribution Route stops flowing, so will the aid.\n\nDuring the past five years, the U.S. has almost completely ignored humanitarian violations by the Uzbekistan government, mainly perpetrated by President Karimov, because of their reliance on the supply route through the region into Afghanistan. The U.S. has a placed aid sanctions on countries that commit human rights violations, however, they have kept their relationship with Uzbekistan despite the government’s violations.\n\nIn a recent article highlighting these political problems, U.S. public diplomacy is making the case that if they need a country’s help badly enough, then human rights violations can be overlooked.\n\n“’While U.S. officials make it clear the bilateral relationship cannot deepen absent improvements, there is no element of public diplomacy that signals there are red lines Uzbekistan can’t cross,’ as Steve Swerdlow, Human Rights Watch’s Central Asia researcher, puts it.”\n\nIf the U.S. cannot provide a steady policy for public diplomacy toward countries that are clear human rights violators, then it puts diplomats in the difficult position of trying to justify why one country receives aid and another doesn’t. The U.S. has also promised to leave behind non-lethal (debatable…) military gear behind in Uzbekistan when it departs. It is willing to give military aid to a country that has suppressed and killed its citizens in the past. What diplomatic message is this sending to countries where the U.S. doesn’t have any interests?\n\nUzbekistan is a slippy slope for U.S. public diplomacy and one that has not received much media attention. However, as the troops withdraw from Afghanistan, pay attention to the amount of aid and military-to-military assistance that is provided in Central Asia. It will be telling to determine whether or not this is a practice that the U.S. will continue to adopt in the future or not.\n\nIs the concept of national interest outdated?\n\n\n\n\n\n\n\nWe can take a step back.\n\nWhat is your country’s national interest?\n\n\n\n\n\n\n\n[1] Nicholas Cull, (2012), “Listening for the hoof beats: Implications of the rise of soft power and public diplomacy,” http://www.globalasia.org/V7N3_Fall_2012/Nicholas_J_Cull.html\n\n[2] Ibid.", "pred_label": "__label__1", "pred_score_pos": 0.9044474959373474} {"content": "Emerging Markets / April 11, 2018\n\nScientific Agriculture and Sustainable Development\n\nAccording to the World Bank, some 11% of the global population lives under the extreme poverty line of US$1.90 a day. This reality is particularly palpable in emerging regions such as Latin America, South Asia, and Africa. Furthermore, these harsh living conditions manifest themselves especially in terms of undernourishment and access to food. This is why international development agencies, private enterprises, and NGOs worldwide are focused on enhancing access to food and maximizing agricultural output throughout developing regions. One such organization is the Bill & Melinda Gates Foundation, which has supported agricultural gene editing research throughout the last decade. During this time, scientific researchers at the University of Oxford developed enhanced varieties of rice, such as C4 rice, with support from the Gates Foundation. C4 rice is a genetically edited rice variety that needs less water than average rice crops and is 20% more efficient during the photosynthesis process. Similarly, C4 rice yields more food per hectare, which particularly benefits small and medium producers in at-risk areas by enhancing food security.\n\nIn this regard, it is important to mention that the gene editing process supported by the Gates Foundation is not the same as conventional genetic modification (GMOs) because it does not involve combining DNA from different organisms. Rather, gene editing either removes elements from the organism’s existing DNA strand or enhances already present genetic elements. Nevertheless, just like genetic modification (GMOs), genetic editing needs to be conducted with the highest ethical and normative standards in compliance with regulations from the World Health Organization (WHO) and the National Academy of Sciences, amongst other key stakeholders.\n\nAnother project that the Gates Foundation is engaged in involves scientific researchers at the University of Edinburgh, who are seeking to genetically enhance the milk output of cows predominantly found in tropical climates, namely Africa and South Asia. Likewise, the Gates Foundation is also engaged in research against major diseases, such as malaria and dengue, which cause great harm to tropical and developing regions.\n\nScientific Agriculture and Sustainable Development\n\nGiven the scenario presented above, through Farmfolio’s initiatives in Panama and Colombia, our CEO Dax Cooke wants international investors to capitalize on sustainable agriculture as a unique natural resource by way of a new and innovative asset class. Mostly focused on organic crops and sustainable agricultural operations, Farmfolio’s Farmshare offerings contribute socially and economically to the Latin American communities where they are settled by empowering them to grow and upscale their entrepreneurial vision, while yielding high returns for our clients and investors. In this sense, Farmfolio’s investment model is unprecedented when it comes to foreign investment because it provides for innovative, sustainable, and responsible economic development in emerging markets.\n\n(Read more about Agricultural Partnership and Development in Colombia)", "pred_label": "__label__1", "pred_score_pos": 0.9948587417602539} {"content": "We Want to be Truly Human\n\nRev. Frank Ritchie Inner Wellbeing\n\nThere’s something deeply human about people connecting and truly being present in a moment of conversation. It sounds simple and self evident, but many seem starved of real relationship within the frenetic pace, busyness and disconnection of our modern world where our calendars are full and a lot of our spare minutes are taken up by handheld devices.\n\nThe point of chaplaincy is for there to be someone in the moment with you. In this wonderful article, Omid Safi points to a traditional Arabic and Persian greeting that asks a deeper question than the fleeting ‘how are you?’ It asks ‘how is your heart in this moment?’ Media Chaplaincy conversations aim to do that; to scratch below the surface and hear the real, human you that doesn’t rely on what you do and how well you do it, and to leave you feeling like you were heard, someone ‘got it’ and that you’re not alone.\n\nEach time I sit down with someone I’m hoping to catch a nugget of what Omid says with this little piece of his column…\n\n\nI want to be having conversations filled with grace and with presence.", "pred_label": "__label__1", "pred_score_pos": 0.7668210864067078} {"content": "Some of the logos on the main page of the data explorer are too narrow or have the same colour text as the background.\n\n\n\nI changed it so we can specify the bg color for any site ... this is fixed at http://data.stackexchange.com\n\nYou must log in to answer this question.\n\nNot the answer you're looking for? Browse other questions tagged .", "pred_label": "__label__1", "pred_score_pos": 0.9989896416664124} {"content": "Eureka Seven AO – 24 (Fin)\n\nRenton tells Ao and Pied Piper about how the Scub Coral used quartz to travel across parallel universes, but when they approached Earth, were attacked by the Secrets. The Scub Coral traveled to Earth’s past to escape, but to no avail, and Scub Bursts were born. Renton believes it’s his duty to restore the natural timeline by destroying the first coral, even if it means sacrificing himself and Eureka. Ao disagrees, flies into the pole light, and goes back ten years to when Eureka became quartz to protect him. Renton follows, and the two are reunited. Ao tells them to flee, and stays behind to fire the quartz gun once more. Having saved his parents and secured their happiness, he wanders time and space for a time, returning to Iwato Island in 2027.\n\nThis final episode had a lot to say do and no extended amount of time to do it (save abstaining from an OP), and while at times it struggled under the weight of its own convoluted explanations and convictions, it handled the task quite well. The series amounts to a jigsaw, the peripheral pieces of which had been set into place in a scatter-shot manner, always holding back till the end, which was this. The final pieces, the ones that bring the whole picture together, were set down. Now that we can see the picture clearly, the series could just as well have been titled Eureka Seven AI. “Ai” as in Love. Love brought Ao into the world and his parents’ love protected him.\n\nUltimately his love for them drove his decision to repay them for giving him life and preserving it by saving his mom and making sure she reunited with his dad. Despite growing up without either of them in his life until then, he turned out to be a pretty grateful kid. And we really can’t criticize his sentiment; he quite literally wouldn’t exist without them. The love they had for each other, then, was the real truth of this whole series. As for Truth, the guy? Yeah, he was an evil villain in one universe, but a Nirvash archetype in another. Go figure! Fleur, Elena, and Naru? They kinda get hosed in this episode. When an older, longer-haired Ao arrives at the post-quartz world of 2027, we unfortunately don’t get to see them, or how they might have changed. A wrap-up montage would have been nice.\n\nRating: 9 (Superior)\n\nEureka Seven AO – 23\n\nFleur fights Naru while Elena fights Truth, but Naru easily evades them all and escapes with Truth, citing even Ao’s Nirvash has no archetype and isn’t alive. Ao and Harlequin catch up to Truth and Naru at the Okinawa Plant Coral, where Truth backstabs Naru and grabs the Quartz Gun and fires it. Ao opens his eyes to another rewritten history where Truth never existed and he just destroyed the Allied forces stole the coral relic IFO, saving the world. Renton emerges from the portal and confronts Ao, who gets news that Eureka has appeared on the Triton. Renton and Ao hurry there, where the family is briefly reunited.\n\nIt’s been such a good Fall season, we’d put Eureka Seven AO completely out of our minds, so the arrival of the final two episodes was a shock, but a pleasant one. The penultimate episode wastes no time jumping back into the action after leaving us hanging…somewhere, somewhen with Renton nearly two months ago. The battle between Ao and Truth is ultimately resolved when Truth essentially commits suicide. He is convinced the current world’s history isn’t correct and he shouldn’t exist, at least in his current form. Thus the Quartz Gun is fired for the second time, causing another vast, complicated explosion, and causing history to change once more.\n\nWhat’s cool is that Ao isn’t the only one who notices. Two short scenes between Gazelle and Nakamura efficiently show us they noticed too, and even though Okinawa is part of Japan again Nakamura still isn’t happy with how small Japan remains. It’s this timeline where Renton chooses to travel in order to meet with Eureka in her Nirvash…only Ao’s in it, and Eureka is some kind of “ghost”, wandering time, without physical form and unable to stay anytime for long. Could she be Ao’s Neo-Nirvash’s archetype Naru said was missing? What “choice” led to Eureka becoming like this? Where does Renton fit into all this? We’ll find out…later tonight.\n\nRating: 9 (Superior)\n\n\n\n\n\nRating: 10 (Masterpiece)\n\nRABUJOI World Heritage List\n\nEureka Seven AO – 16\n\nPresident Blanc decides to initiate Operation Polaris, in which all of Gen Bleu’s quartz will be launched from space and lure the secrets that have emerged to its landing spot in the North Pole, where it will be detonated, destroying the secrets. Naru fights a secret off in Iwato, while Pied Piper counts down the hours until they spring into action. Goldilocks takes out rogue Russian missles launched by a cyberattack, but the shock waves knock the quartz off course. Fleur and Elena take it as far as they can, and Fleur hands it off to Ao, who uses his third engine to get it back in orbit, where it transforms into a weapon. He destroys the secrets, but when he returns to Earth, something’s different…\n\nThe Olympics are over, and the Astral Ocean is back in full force, with a stellar action-packed romp that’s full of suspense, explosions, and more E7-esque surreality. To whit: Generation Bleu’s President Blance puts all his eggs in one basket (and asks Pied Piper to bring back South American coffee), and they have just one shot to get rid of the secrets that have popped up everywhere. Ao is determined not to let that shot destroy northern Scandanavia, where the McCafferty sisters’ family is at. When the stakes are as high as they can get and he’s the only hope, Ao steps up and gets the job done, even if orders are stretched. He does so with one of the more colorful and elaborate explosions we’ve seen in a while.\n\nBefore his heroics, we were getting a little worried about Ao – either due to recent events, the drugs Gazelle gave him, or a combination of the two, Ao having experiences, then abruptly waking up in a camp with Fleur and Elena nearby. He has a bizarre and unsettling dream involving Naru. He still thinks Eureka is his mother. And stranger still, while his actions avert a disaster in Norway, suddenly nobody’s ever heard of Maeve, Chloe, Maggie, or Goldilocks. It’s as if they’ve been erased from existence, or never existed in the first place. Ao is the only one remembers. What exactly did that crazy Quartz Cannon do?\n\nRating: 8 (Great)\n\nEureka Seven AO – 15\n\nNirvash is fixed as Generation Bleu tries to plan their next step. Han and Pippo are in Japan witnessing Nakamura’s continued parading of the Secret head; they report they’re getting close to communicating with it. When a dormant scub coral reawakens, Pied Piper goes after the secret, which has human form and shoots Ao down. Corals all over the world start to reawaken. Han and Pippo smuggle Georg into a server farm, and he is ‘hacked’ by the secret.\n\nWith all the recent doins’ transpirin’, it’s starting to look more and more like a crossroads is coming for Fukai Ao. It also seems like as brief as his mother Eureka’s presence in his timeline was, it was definitely some kind of catalyst. The scub corals are behaving like they never have before, the secrets are getting less and less secretive, and, as we said, Ao is torn between believing his mother’s insistance they’re not his enemies, and his comrades at Generation Bleu insistance that they are.\n\nAo isn’t the only one facing a tough choice (though it’s wearing on him to the point he needs pills from Gazelle to sleep); Fleur’s dad Cristophe Blanc needs to decide who to fight: the scub coral, the secrets…or both. There’s a sense of hesitation in Ivica’s talk with him: what if the secrets are allies simply protecting their dimension? Blanc’s ultimate decision is to use the massive stockpile of quartz they’ve extracted from scub corals as secret bait. We’d probably just maintain a high-alert wait-and-see position before going after one side or the other, but maybe Blanc knows something we don’t. He’s the boss for a reason.\n\nRating: 7 (Very Good)\n\nEureka Seven AO – 14\n\nAfter communicating with the Coralians, who are partially occupying her body, Naru emerges back on Iwato Island. After helping Eureka return to where she belongs through use of the pillar of light, Ao visits Iwato Island where he learns his real father didn’t abandon Eureka, but was fighting for him. Before leaving, Eureka insisted she was pregnant with a girl, not a boy. Ao visits Naru at the hospital, but they’re both arrested by Nakamura and the JAF, who have invaded Iwato. Naru escapes with the help of a real coral and unearths the Mk. I. Eureka travelled in, and when Ao hesitates joining her, she flies off with Truth.\n\nThis week we get a new OP, a new ED, and a whole lotta new, big developments. Ao and Generation Bleu are faced with two possible truths: either it’s as Naru says and the Coralians are only interested in communication and coexistence, or it’s as Nakamura says; the Scub coral are an invading force, and secrets are the earth’s defense mechanism. Nakamura retrieves a secret fragment and parades it over the airwaves like it’s King Kong, and the international community okays his invasion of Iwato. He wants Naru under quarantine and for Ao to pay for his crime of attacking the JAF and killing Colonel Endo. The usually neutral Gen Bleu can’t do much.\n\nWho are we to believe? Well, we’re more inclined to believe Naru about the Coralians, but she’s so cold towards Ao, we have to wonder about her motives, especially since she’s not 100% Naru anymore. Her transformation into something nearly as enigmatic and powerful as Truth was something we weren’t expecting. As for Eureka having a girl…what does that mean; Ao has a sister out there somewhere? And why was Elena hellbent on killing Eureka? For every mystery this episode shed light on, many more remain. But we’re definitely enjoying the ride.\n\nRating: 8 (Great)\n\nEureka Seven AO – 13\n\n\n\n\nRating: 7\n (Very Good)\n\nEureka Seven AO – 12\n\nPied Piper launches into space to deal with a scub coral that has arrived in orbit. They dock at a station occupied by Team Harlequin, led by Chief Hannah, who is interested in Ao. She and her “kids” tell him he’s an alien, as evidenced by his ability to see trapar, and is unnerved when he can’t see it in space. After destroying the secret, Ao heads for the scub coral, when it is attacked by a Japanese railgun satellite and starts to fall to earth. Nirvash can’t escape, but as the coral burns away it reveals a ship: the Gekko-Go, and a second Nirvash. After landing in the ocean, the other Nirvash pilot introduces herself as Eureka.\n\nIt was cool enough to see Pied Piper in space for the first time (and all the sundry novelties of a new environment), but we also get some major reveals. Ao learns quite a bit: he’s some kind of alien, at least partially related not only to Truth, but the secrets too. It’s great to see elements from the first series return: namely the Gekko-Go, the other Nirvash, and most importantly, Eureka herself, who no longer has that facial scarring. Her sudden emergence from the scub coral at just the right time suggests the coral affords some kind of transportation, both for secrets, and her.\n\nThe episode has a lot of new music tracks, Fleur and Elena get some good scenes and great lines and moments, we get a glimpse of Gazelle, Naru, Truth, and Nakamura, and even learn something about Truth’s past! But the big news here is that the time for keeping secrets from Ao has ended, even if doing so was for his own protection. Reuniting with his mother (if it is indeed the same Eureka) is something he’s always dreamed would happen, and now that she’s here, if I were him I’d have quite a few questions already spooled up.\n\nRating: 9 (Superior)\n\nEureka Seven AO – 07\n\nWithout warning or declaration of hosilities, Truth singlehandedly wrecks havoc upon Generation Bleu, easily breaching security forces and eventually entering the hangar bay. Ao launches Nirvash with Truth clinging to it, and he unleashes a huge monster. Scenes unfold back on Iwate island, where a trapar factory is being built on the site of the scub coral. Naru approaches the coral and is met by Ao (actually Truth in disguise). He shows her she doesn’t need her inhaler, and she can fly if she wants to. The real Ao shows up and chases Truth, but Naru makes him stop and flies off with Truth, her “sea giant”. Ao wakes up in the hospital next to Fleur and Elena, but they show him a news report of Naru’s abduction.\n\nWhat do Nazo no Kanojo X, Sakamichi no Apollon, Hyouka, Natsuiro Kiseki, Jormungand, and Sankarea all have in common? They’ve all had at least one episode we’ve seen fit to award a “9” or “Superior” rating. Eureka Seven AO has yet to accomplish that feat, despite being a remarkably consistent, entertaining and well-made series. This week is no exception. While imbued with exciting action, a rousing siege situation at Gen Bleu HQ, and some very strange psychological dream sequences, we found ourselves a bit lost throughout the episode. It’s not impossible to enjoy a story that leaves us in the dark, but in this case, the intrigue was overshadowed by our frustration. In short: we wanted the episode to throw us a bone, and it refused to do so.\n\nChalk up a lot of our frustration to this “Truth” fellow. After a quick and rather random introduction last week, this week he goes right at the heart of Gen Bleu’s strength, in search of “truth”, which is also his preferred name for himself. He goes after Ao at first, apparently knowing his mother Eureka, but when he sees Ao isn’t going to play ball with him, he goes after Ao’s friend Naru. Hardly anything Truth says makes any sense; he’s trying way too hard to be cryptic and mysterious, and his motives strike us as just as perplexing. His plan changes in the middle of the episode, and we’re suddenly back in Ao’s hometown. Super-omnipotent god-like beings are often tricky because there are so many directions you can take them, and their potential can be overwhelming. That was the case this week; the episode lost us and didn’t bother explaining anything.\n\nRating: 5 (Average)", "pred_label": "__label__1", "pred_score_pos": 0.6656153798103333} {"content": "Preservation! cost is about $40,000. This doesn’t even include\n\nPreservation! Many people go on with their lives without thinking\nabout the cost behind the electricity that is entangled into our day to day\nactivities. To be more specific, I’m talking about the use of non-renewable\nresources. Individuals are ill-informed of the impacts that non-renewable resources\nhave on the environment. Renewable resources on the other hand, have less\nimpact on the environment. The three resources that my town will use are solar\nenergy, wind energy, and biomass. The factors I have taken into account for my\ntown’s energy needs are efficiency, and the availability of these methods.\n\n\n            The first\nmethod of energy production that I chose was solar energy. Solar energy is\nderived from energy conversion inside solar panels. I chose this energy type\nbecause solar energy is easily renewable. One advantage of solar energy, is\nthat it is a good, clean energy alternative for fossil fuels. Another advantage\nof solar energy is that there is no waste production. You don’t need to throw\nanything afterwards because it’s just the conversion of solar cells. On the\nother hand, there are disadvantages that come with using this resource. This\nincludes the cost of storage and the fact that this form of energy is weather\ndependent. As you know, the sun does not shine 24/7 due to night time and the\ndifferent weather phases. In order to keep up with the demand for electricity,\nsolar panels must always have stored energy.\n\nWe Will Write a Custom Essay Specifically\nFor You For Only $13.90/page!\n\norder now\n\n\n            The second\nmethod of energy production that I chose was wind energy. It is formed from the\nconversion of air movement to electricity. I chose this energy resource because\nwind doesn’t contribute to pollution. Two advantages of wind energy are that\nwind energy is free, and the harvesting of this energy does not affect cycles. A\ndownside to choosing wind energy is that technology is extremely expensive. A 10 kW wind turbine costs about\n$48,000 – 65,000 to install and the equipment cost is about $40,000. This doesn’t even include shipping\nand installation. The cost of wind farms could be millions upon millions of\ndollars. Two more disadvantages of wind turbines are the noise that they\ncreate, and the aesthetical impact. Wind farms are known to create lots of\nnoise, and this could lead to issues in nearby communities. Many people also\nstate that wind turbines ruin the aesthetical impact and block views.\n\n\n            The third and final\nenergy source that I have chosen is biomass. Biomass is formed from organic\nmatter. I chose biomass as one of my energy resources because biomass helps\ndecrease pollution in the community. An advantage of biomass is that biomass\nreduces waste in landfills because the organic matter that normally would end\nup in landfills, would instead be converted into fuel. Biomass can be converted\ninto fuels such as ethanol and biodiesel. One risk associated with biomass is\nthe increase in methane gas. The bacteria in manure are responsible for the\ncreation of this explosive gas that displaces oxygen. The final risk involved\nwith biomass is deforestation. According\nto the U.S. Energy Information Agency, every 1 percent increase in biomass\nelectricity production requires an 18 percent increase in U.S. forest harvest\n\n\n            The three energy resources that I\nhave chosen are solar energy, wind energy, and biomass. I chose these energy\nresources and no other available energy resources because they are the cleanest\noptions, I did not want to use fossil fuels, and they have the little impact on\nthe environment. I predict that environmental groups would be happy that I am\nmaking an effort to reduce pollution. I anticipate that consumers would have an\nissue with the high costs associated with these forms of energy. Lastly, I expect\nthe general public to be displeased with the amount of solar panels, biomass\nfactories, and wind farms located throughout the town.", "pred_label": "__label__1", "pred_score_pos": 0.6855443120002747} {"content": "all products applied to your body should be clean enough to put in your mouth. that is our belief and this is how we support it through our use of ingredients.\n\nyou will never see ingredients that are toxic and unsafe. all ingredients are derived from the ingredients we source from the earth : vegetables, fruits, bark, plants, trees, herbs, flowers.\n\n\nglossary of all our ingredients:\n\naloe vera | one of the oldest mentioned plants on record due to its medicinal properties and health benefits, reaching as far as 6,000 years ago in ancient Egypt. over 200 biologically active, naturally-occurring constituents. it is the ultimate source for skin hydration. aloe was regarded as a sacred plant the “blood” of which held the secrets to beauty, health and immortality. \n\naspen bark extract | natural and safe preservative. an ideal microbial, the bark is rich in salicylates that may which acts as a natural defense mechanism against invading parasites. \n\n\n\nbergamot essential oil | antiseptic, anti-depressant with qualities that are useful for skin complaints, such as acne, oily skin conditions and eczema. a tree originally from southeast asia but first sold in bergamo, italy hence its name.\n\ncalendula extract | heals cuts, wounds, chapped lips. with its antibacterial and anti-inflammatory properties it is the skin whisperer of flowers. used in ancient times in India, calendula is energetically cooling. used in traditional Chinese medicine and also used by native Americans for its ability to increase circulation to the skin. \n\n\n\n\n\n\ndecyl glucoside | derived from the sugars and fatty acids of coconuts, it is a naturally derived renewable resource. a gentle, mild cleanser, great for sensitive skin.\n\n\nhibiscus flower powder | rich in antioxidants. known to moisturize, increase skin elasticity, natural exfoliate, helps with evening skin tone.\n\nhoney | natural humectant, honey attracts moisture. full of antioxidants and nutrients to feed hair follicles that house the live part of hair, encouraging hair growth.\n\n\njasmine fragrance oil | plant-based oil, naturally derived from plants and flowers to give the conditioner an amazing aroma of\n\n\njuniper berry oil | used by ancient greek, egyptians and native americans. with the antibacterial properties, it offers a relaxed and lively antidote to negativity, lessens anxiety, as well as promotes hair growth, heals dry scalp. \n\nlactic acid | derived from beets. helps reduce skin breakouts, natural exfoliator, hydrating and brightening properties.\n\n\n\n\npatchouli essential oil | astringent, regenerates new skin cells, known to help with hair growth and used for centuries in traditional chinese medicine to treat skin conditioners such as eczema, acne, chapped skin, dandruff and oily scalp conditions. native to southeast asia growing wild at high elevations. \n\n\nred sandalwood powder | anti-aging properties, anti-bacterial properties which helps heal blemishes, ultra moisturizing.\n\n rosehips powder | rich in antioxidants + essential nutrients and omegas, hydrating, rejuvenating, helps heal blemishes and scarring\n\nsandalwood essential oil | it is a rich, woody and warm aroma used by Ayurvedic medicine for it's aromatherapy properties. anti-inflammatory, antibacterial, antiseptic, anti-aging, emollient, it's nourishing to hair, alleviates skin conditions and moisturizes. \n\n\nsaw palmetto extract | indigenous to the native americans, this fruit was part of their regime. dried in the sun for days, it was made into extract, tinctures, teas and ointments which were applies to their hair for various reasons. used to heal hair loss and a scaly scalp or dandruff, it was a key ingredient to keeping their hair beautiful.\n\n\n\nsweet orange essential oil | uplifting, used to dispel kids tantrums and frustrations, anti-depressant and anti-inflammatory.\n\nturmeric root powder | anti-bacterial, anti-inflammatory, balances oil, illuminates the skin\n\n\nvegetable glycerin | sourced from organic soy bean oil. glycerin is a soothing, humectant which draws moisture from the air to the skin.\n\n\n\nyarrow extract | an ancient herb and one of the earliest indications of human’s use of medicinal plants.  antimicrobial, pain relieving, used for colds, digestion, circulation and an anti-inflammatory which soothes irritated skin.\n\nylang ylang essential oil | native to the phillipines and indonesia, derived from the word ilang or ilang-ilan meaning \"wilderness\" or \"rare\". it has been used to reduce stress, increase the thickness of the hair shaft to grow thicker hair and help balance scalp oil production.\n", "pred_label": "__label__1", "pred_score_pos": 0.9158505201339722} {"content": "Journal cover Journal topic\nJournal topic\nACP | Articles | Volume 18, issue 18\nAtmos. Chem. Phys., 18, 13703–13731, 2018\n© Author(s) 2018. This work is distributed under\nthe Creative Commons Attribution 4.0 License.\n\n\n© Author(s) 2018. This work is distributed under\nthe Creative Commons Attribution 4.0 License.\n\nResearch article 27 Sep 2018\n\nResearch article | 27 Sep 2018\n\nHow well do stratospheric reanalyses reproduce high-resolution satellite temperature measurements?\n\nCorwin J. Wright and Neil P. Hindley Corwin J. Wright and Neil P. Hindley\n • Centre for Space, Atmospheric and Oceanic Science, University of Bath, Bath, UK\n\nCorrespondence: Corwin J. Wright (\n\nBack to toptop\n\nAtmospheric reanalyses are data-assimilating weather models which are widely used as proxies for the true state of the atmosphere in the recent past. This is particularly the case for the stratosphere, where historical observations are sparse. But how realistic are these stratospheric reanalyses? Here, we resample stratospheric temperature data from six modern reanalyses (CFSR, ERA-5, ERA-Interim, JRA-55, JRA-55C and MERRA-2) to produce synthetic satellite observations, which we directly compare to retrieved satellite temperatures from COSMIC, HIRDLS and SABER and to brightness temperatures from AIRS for the 10-year period of 2003–2012. We explicitly sample standard public-release products in order to best assess their suitability for typical usage. We find that all-time all-latitude correlations between limb sounder observations and synthetic observations from full-input reanalyses are 0.97–0.99 at 30 km in altitude, falling to 0.84–0.94 at 50 km. The highest correlations are seen at high latitudes and the lowest in the sub-tropics, but root-mean-square (RMS) differences are highest (10 K or greater) in high-latitude winter. At all latitudes, differences increase with increasing height. High-altitude differences become especially large during disrupted periods such as the post-sudden stratospheric warming recovery phase, in which zonal-mean differences can be as high as 18 K among different datasets. We further show that, for the current generation of reanalysis products, a full-3-D sampling approach (i.e. one which takes full account of the instrument measuring volume) is always required to produce realistic synthetic AIRS observations, but is almost never required to produce realistic synthetic HIRDLS observations. For synthetic SABER and COSMIC observations full-3-D sampling is required in equatorial regions and regions of high gravity-wave activity but not otherwise. Finally, we use cluster analyses to show that full-input reanalyses (those which assimilate the full suite of observations, i.e. excluding JRA-55C) are more tightly correlated with each other than with observations, even observations which they assimilate. This may suggest that these reanalyses are over-tuned to match their comparators. If so, this could have significant implications for future reanalysis development.\n\n1 Introduction\nBack to toptop\n\nOne of the most important tools in the atmospheric sciences is the reanalysis. These are are weather models which assimilate observations from the historical record, using a fixed analysis scheme to consistently simulate an extended period, typically decades. Particularly in the stratosphere, where measurements remain comparatively sparse even in the modern era, reanalyses are widely used as a proxy to the true atmospheric state for purposes as diverse as tuning models and understanding geophysical processes. This is because they provide a spatially and temporally uniform estimate of the atmospheric state, with a wide range of variables such as temperature, wind and vorticity available in a standard format (Parker2016).\n\nFor reasons of numerical stability and dynamical balance, reanalyses must always favour the model state in which significant conflicts exist (e.g. Sakov and Sandery2017). Thus, although they are observation driven in a much more direct way than standard atmospheric models, biases remain between the reanalysis and observed states. Given the extremely wide use of reanalysis data, it is very important to quantify and understand these biases.\n\nThis quantification is typically carried out in two main ways. The first of these is to implement a forward-model software chain, often referred to as an “observation operator”, in the reanalysis system (e.g. Dee et al.2011). This method is commonly used for quality control and validation inside reanalysis centres, but requires direct access to the reanalysis system rather than the final output product. A second approach, common when developing new satellite instruments but also applicable to validating data from existing ones, is to run a high-resolution variant of the reanalysis system, often known as a “nature run” (e.g. Nolan et al.2013; Holt et al.2016). The nature run is then combined with an observing system simulation, which properly samples the model as the satellite, including the full data retrieval chain. Both of these methods inherently customise the reanalysis output rather than use the standard output formats common in non-observational research. The latter method also requires a re-implementation of the full satellite data retrieval.\n\nHere, we wish to assess standard public-release reanalysis products in order to quantify the validity of their de facto broad use as an observational substitute. This rules out the above approaches. We instead develop and apply a comparison method based on (1) oversampling the reanalysis data grid and (2) re-weighting the oversampled fields in a close approximation to how the instruments weight observations of the true atmosphere. This allows us to produce weighted composite reanalysis samples of equivalent form to the satellite measurements. In this study, we will refer to these samples as “synthetic measurements”.\n\nWe specifically compare synthetic temperature measurements produced from six reanalyses (CFSR, ERA-Interim, ERA-5, JRA-55, JRA-55C and MERRA-2) to three observational datasets (COSMIC, HIRDLS and SABER). Low-level bending angle data from COSMIC are assimilated by all six reanalyses, whilst HIRDLS and SABER are not assimilated. We compare the reanalyses to all temperature measurements from these three instruments for the 10-year period 2003–2012. We also produce synthetic temperature measurements using the sampling characteristics of AIRS brightness temperature measurements and use these to demonstrate the importance of using a full sampling approach for comparisons to instruments of this type. Our method is generalisable to other atmospheric models, instruments and variables.\n\nSections 2 and 3 describe the observational and reanalysis datasets used. Section 4 describes the sampling method used, including an explanation of the motivation underlying our approach. Section 5 then assesses the performance of our sampling method relative to the simpler approach of interpolating the reanalysis to the measurement location. Section 6 compares the observed and sampled data as global all-time scatter plots, Sect. 7 as zonal-mean time series, Sect. 8 as Taylor diagrams, and Sect. 9 as a function of time of year, height and geographic location. Finally, Sect. 10 analyses the bulk-scale differences between each dataset before we summarise and draw conclusions in Sect. 11.\n\n2.1 Satellite instruments\n\nWe consider observed data from and the scanning patterns of four satellite instruments. These are the Atmospheric Infrared Sounder (AIRS), the Constellation Observing System for Meteorology, Ionosphere and Climate (COSMIC), the High Resolution Dynamics Limb Sounder (HIRDLS) and Sounding of the Atmosphere using Broadband Emission Radiometry (SABER).\n\nOf these, two (HIRDLS and SABER) are limb-sounding radiometers, one (AIRS) is a hyperspectral nadir sounder and one (COSMIC) is a multi-satellite constellation which uses GPS radio occultation to infer atmospheric parameters. GPS radio occultation is arguably a special case of limb sounding, and thus throughout this paper we will refer to COSMIC, HIRDLS and SABER collectively as limb sounders and to AIRS as a nadir sounder.\n\n2.2 AIRS\n\nThe Advanced Infrared Sounder (AIRS) is an instrument on NASA's Aqua satellite, launched in May 2002 (Aumann et al.2003). Part of NASA's A-Train satellite constellation, Aqua has a 98 min sun-synchronous polar orbit, with an Equator-crossing local solar time of 13:30 in the ascending node. AIRS has 2378 spectral channels, which provide a continuous swath of radiance measurements. Its cross-track footprint width averages ∼20 km, varying from 13.5 km at the centre of the instrument track to 40 km at the edges across 90 parallel tracks (Olsen et al.2007). This across-track variation is due to the interaction of the rotated scanning volume with atmospheric density in the vertical plane.\n\nWe use brightness temperatures derived from AIRS Level 1 (version 5) radiance data in the 667.67 cm−1 channel, which is centred at ∼42 km in altitude. We refer to these data subsequently as AIRS-L1. These radiance data are available at considerably higher horizontal resolution than the standard AIRS Level 2 temperature product (Hoffmann and Alexander2009) and are consequently useful for studying small-scale phenomena such as gravity waves. This is because this preserves wave features in the vertical, which the methods used to optimise the standard AIRS Level 2 product suppress (Alexander and Barnet2007). The noise-equivalent ΔT for measurements at these altitudes is ∼0.7 K (Hoffmann et al.2014).\n\nAccordingly, our sampled measurements, while well-suited to measuring small-scale perturbations to temperature, are not useful for absolute temperature comparisons. In this paper, we therefore include AIRS-L1 in comparisons between two reanalysis-derived properties, but not otherwise.\n\n\nThe Constellation Observing System for Meteorology, Ionosphere and Climate (COSMIC) is a constellation of six microsatellites launched in 2006, of which three remain active at the time of writing. Each satellite carries a radio occultation receiver, which is used to intercept GPS signals transmitted through the atmosphere. The phase delay in these signals allows the bending angle of the signal path through the atmosphere to be computed, which can then be analysed to produce profiles of dry temperature (Anthes et al.2008).\n\nCOSMIC measurements are distributed pseudo-randomly across the globe. Around 1000–2000 such profiles are measured globally per day, with the number declining as satellites have aged. Temperature soundings typically cover the 5–50 km altitude range. The vertical resolution in the stratosphere, estimated based on the size of the signal Fresnel zone, is ∼1.5 km (Kursinski et al.1997), with a precision of ∼0.5 K (Anthes et al.2008). Horizontal resolution is also ∼1.5 km in the across-line-of-sight direction but is approximately 270 km in the along-line-of-sight direction due to path integration (Hindley et al.2015). We use COSMIC version 2013 data, which currently extend from the beginning of data availability in June 2006 until the end of April 2014.\n\n\nThe High Resolution Dynamics Limb Sounder (HIRDLS) is a 21-channel radiometer on NASA's Aura satellite. Designed to measure stratospheric dynamics and chemistry at high vertical resolution, HIRDLS is also part of NASA's A-Train satellite constellation. Thus, Aura also has a sun-synchronous orbit, with an Equator-crossing time a few minutes after Aqua.\n\nDue to an optical blockage discovered shortly after launch, HIRDLS data products have required significant corrections to be usable for scientific purposes (Gille et al.2008). Following these corrections, validation has shown that temperature products are comparable to those from other data sources, with an estimated precision of ∼0.5 K and a vertical resolution of 1 km throughout the stratosphere, falling to 2 km in the mesosphere (Gille et al.2013). Horizontal resolution for individual measurements is ∼200 km in the along-line-of-sight direction and ∼20 km in the across-line-of-sight direction. Due to the nature of the blockage, the instrument line of sight is directed 47 off-track in the opposite direction to satellite travel. Data are available from early 2005 until early 2008, when a problem with the optical chopper terminated data collection.\n\n\nSounding of the Atmosphere by Broadband Emission Radiometry (SABER) is a 10-channel limb-sounding infrared radiometer aboard the TIMED satellite. SABER provides ∼2200 profiles globally per day, with a vertical resolution of ∼2 km and an along-track profile spacing alternating between 200 and 550 km, and a line of sight lying 90 off-track. Kinetic temperature profiles cover the 15–120 km altitude range, with a precision of ∼0.8 K in the stratosphere (Remsberg et al.2008). Horizontal resolution for individual measurements is ∼300 km in the along-line-of-sight direction and ∼50 km in the across-line-of-sight direction. Coverage is continuous between 50 S and 50 N throughout the year, extending to either 80 S or 80 N on an alternating 60-day yaw cycle.\n\n2.6 Relative sensitivity\n\nFigure 1Approximate averaging volumes for (a) HIRDLS, (b) SABER, (c) AIRS-L1 and (d) COSMIC, shown over northwestern Europe for scale. Solid volumes show the regions which contribute the largest 99 % of the signal for each measurement. For (a) and (b), solid lines show the scan track at the reference altitude for that instrument (20 km for HIRDLS, 30 km for SABER), dashed lines show the track at 15 and 60 km in altitude, and dotted lines show the track at 0 km in altitude. For (d), black lines indicate the centre of measurement volume for each profile at each height, black circles indicate the surface geographic location corresponding to the profile centre at 15 km in altitude, and a continuation of the main line joins these. Alternating colours are used for contrast between individual averaging volumes and do not indicate any technical difference.\n\n\nFigure 2Sensitivity functions for each instrument in (a) the vertical direction and (b–e) the horizontal plane. ΔX is the major axis and ΔY the minor axis in the horizontal plane, and ΔZ is the vertical axis, with 0 in each direction defined as the peak sensitivity. Sensitivities are normalised to a peak value of 1.\n\n\nFigures 1 and 2 show the approximate sensitivity of each instrument to atmospheric temperature (or 667.67 cm−1 radiances for AIRS). This is shown in Fig. 1 as geolocated 3-D volumes, which are defined to contain 99 % of the total estimated weight associated with each measurement. This figure consequently gives an indication of the relative measurement volumes and spacing associated with the standard instrument scanning patterns. Figure 2, meanwhile, shows the sensitivity associated with a single measurement (specifically at nadir in the case of AIRS and below 60 km in altitude in the case of HIRDLS), plotted as 2-D cuts through a sensing volume centred at the origin. These show that the majority of the signal in all cases comes from near the measurement centre (Sect. 5 quantifies this further), but also that the total integrated signal in each case can represent quite different total volumes even for perfectly overlapping measurements.\n\nNote that, in our analysis, we linearly down-sample all three limb sounders to their estimated vertical resolution (i.e. 1 km for HIRDLS, 1 km for COSMIC and 2 km for SABER), rather than use their original measurement locations (typically spaced hundreds of metres apart). This reduces the number of samples significantly, providing a large reduction to our overall computational requirements, but ensures that we still recover a full vertical profile of independent measurements. A full-resolution approach was tested and was found not to affect results significantly.\n\n3 Reanalyses\nBack to toptop\n\nIn this study, we produce synthetic measurements from six reanalyses using the sampling patterns and sensitivity functions of the above four instruments. These reanalyses are CFSR, ERA-Interim, ERA-5, JRA-55, JRA-55C and MERRA-2. Each of them is widely used in the scientific community for a variety of purposes (except ERA-5, which has only recently been released). With the exception of JRA-55C, they are all generated using full-input reanalysis systems, i.e. they assimilate both surface and upper-atmospheric (in this context, stratospheric and mesospheric) conventional and satellite data. JRA-55C assimilates a full suite of surface and near-surface observations, but no upper-atmospheric satellite data, and thus provides a useful test of how well the model physics transmits information to the middle and upper atmosphere: in particular, this is useful for assessing how well constrained the other reanalyses can be considered to be before the satellite era.\n\nTable  and Fig. 3 describe the key relevant properties to our study of each reanalysis, including the horizontal and vertical resolutions of the products used and whether they assimilate the instruments we consider. COSMIC is assimilated by all reanalyses except JRA-55C, AIRS by all except for JRA-55 and JRA-55C, and SABER and HIRDLS by none. The S-RIP introductory paper Fujiwara et al. (2017) provides a detailed summary of the key features of each reanalysis, and thus we omit a general description for brevity. Relevant details will be referenced directly in the text where appropriate. Further details on each reanalysis system can be found in Saha et al. (2010) [for CFSR], Herbach and Dee (2016) [ERA-5], Dee et al. (2011) [ERA-Interim], Kobayashi et al. (2014) and Kobayashi et al. (2015) [JRA-55 and JRA-55C], and Gelaro et al. (2017) [MERRA-2].\n\nFigure 3(a) Vertical and (b–g) horizontal resolution of each dataset used. For each of the panels (b)(g), the reanalysis grid is shown at an arbitrary centre latitude of 70 N to demonstrate the curvature of the spatial grid at high latitudes and overlaid with the approximate horizontal weighting volume for each instrument, rotated to a different angle to minimise overlap.\n\n\nTable 1Key properties of the six reanalyses used in this study. “Relevant period” refers to the time period covered by both the reanalysis and at least one of the instruments we use in this study; in all cases, we terminate data analysis at the end of 2012 if it continues past that date.\n\nDownload Print Version | Download XLSX\n\n4 Sampling method\nBack to toptop\n\nFigure 4a illustrates our sampling approach. The blue circles show a 100 km resolution grid, intended for illustrative purposes. For comparison, our lowest-resolution analysis, ERA-Interim, has a horizontal resolution of ∼84 km at the Equator. Thus, while this grid is slightly coarser than reality to clarify our explanation, it is not excessively so.\n\nFigure 4A 2-D schematic illustrating the motivation underlying our sampling approach. See text for further details.\n\n\nThe shaded cyan oval, meanwhile, shows a horizontal sensitivity function typical of SABER. Any real SABER temperature measurement will be a single number representing the weighed average of temperature across this ovoid (i.e. including its vertical extent, not shown). There is an obvious spatial mismatch between the ovoid and the reanalysis grid point locations, which makes direct comparison challenging. The same fundamental concept holds true for any other remote-sensing measurement, which will have a definite weighted volume of some form which does not usually correspond to a comparator model.\n\nIf we are working with standard reanalysis products, as is the case here, this mismatch can be overcome in three main ways. The first such approach is simply to interpolate the model to the centre of the measurement volume, i.e. (0,0) on these axes. This is a viable approach for many uses, if not most, since the majority of the sensing weight is here. Section 5 assesses the accuracy of this relative to the approach we do adopt.\n\nA second approach is to produce a weighted sum of the model grid points inside the sensing region. This can work well for coarse measurements, for example those of the SSU and AMSU sounders, but breaks down where the instrument resolution is comparable to the model grid. Indeed, for high-resolution instruments this can produce a less representative result than simple interpolation.\n\nThis is illustrated by Fig. 4b. Here, the brown circles indicate points on the reanalysis grid which lie inside the SABER averaging volume. If we computed a SABER-equivalent reanalysis value using only values inside the weighting volume, only these points would be included. The red circles, meanwhile, indicate points which would not be included using this approach, but which should have a larger contribution than the brown points. This method can thus discard highly relevant local data, while overweighting more distant points. While in practice for SABER, more points would lie inside the ovoid at the resolution of a real reanalysis, this would not be the case for HIRDLS and COSMIC, for which it is quite possible no points will lie inside a given volume.\n\nA third approach, and the one we use in this study, is to first oversample the model data onto a much finer grid (grey dots). By weighting these fine grid points appropriately and then summing, we can combine all relevant information and ameliorate the problems of the second approach significantly, while still providing an improvement in accuracy over simple interpolation.\n\nAppendix A describes the technical implementation of this approach in detail. In brief, we implement (i) an observation import function (OIF, Sect. A1) for each instrument we wish to sample with the characteristics of (ii) a model import function (MIF, Sect. A2) for each reanalysis we wish to sample and then feed the output from these functions into (iii) a core analysis routine (Sect. A3), which generates the desired samples using an approach generalised to work over as broad a range of OIFs and MIFs as possible.\n\nThis software scheme provides significant flexibility of analysis. Both the OIF and MIF can be easily substituted, allowing the analysis of a wide range of datasets. In this study, we use four OIFs and six MIFs, representing the instruments and reanalyses described above, and we plan to develop more for future model–observation comparison work. Further, no inherent assumptions are made as to the nature of the data being analysed, provided a suitable sensitivity function is provided. For example, while in this study we consider only temperature data, it is perfectly possible to instead sample reanalysis wind speeds or chemical distribution fields for comparison to observations.\n\n5 Full sampling vs. single-point sampling\nBack to toptop\n\nOur sampling approach is relatively computationally expensive. A much cheaper approach would be to instead simply interpolate the reanalysis temperature field to the measurement-centre locations, i.e. a single-point approximation (SPA) to the satellite sensing function. It is thus useful to quantify how large a difference the more complex approach makes to the final results. The full details of this comparison are shown in Appendix C, and we only outline the conclusions here. We refer to these approaches as the “SPA” and “full” approaches and to the difference between the resulting temperature estimates as ΔTSPA.\n\nWhen considering bulk temperatures (as opposed to perturbations), we find that, while the vertical form of the AIRS weighting function must be considered – without doing so, >70 % of samples have a difference greater than 3 K – the full-3-D approach is usually unnecessary. For limb sounders, the full approach also remains unnecessary even with the most advanced current reanalyses: while ΔTSPA can be comparable to instrument precision in some cases, it is usually much smaller than uncertainties due to instrument accuracy, which is affected by other factors in the retrieval process.\n\nHowever, when considering smaller-scale perturbations to the data, which are important in fields such as gravity wave and turbulence studies, the size of ΔTSPA relative to instrument precision and to the magnitude of the signals under investigation becomes more significant. For this type of work, we find the following.\n\n 1. The full sampling approach is justified for comparisons to AIRS-L1 data. While bulk temperatures can generally be produced well using a simplified 1-D-only approach, more than 50 % of samples have a measurable (i.e. above instrument noise) difference between a 1-D and 3-D sampling approach, of up to ∼5 K in extreme cases.\n\n 2. While we do so for the rest of this study for reasons of internal consistency, no current reanalysis justifies the use of full rather than SPA sampling when comparing to HIRDLS data. This is because ΔTSPA is almost always (100 % of the time for JRA-55, JRA-55C and ERA-I,; 99.7 % of the time for CFSR and MERRA-2) smaller than the instrument precision at HIRDLS length scales. This is an especially important point given the relatively large sampling time per day required (∼20 min per day of data, compared to ∼5 min day−1 per SABER, due mostly to the larger number of profiles).\n\n 3. In some cases, the full sampling approach is justified for COSMIC and SABER data, in particular when using high-resolution reanalyses such as ERA-5. Cases in which it is useful to do so include sampling near the Equator and in regions of high gravity wave activity. While the global percentage of samples with ΔTSPA comparable to instrumental precision is only ∼5 % or less, such samples are preferentially located in these regions (Fig. C3). Furthermore, the use of pairs of vertical profiles for typical gravity wave analyses (e.g. Ern et al.2004; Alexander et al.2008), with each profile containing dozens of individual samples, means that a relatively small percentage of large ΔTSPA samples in such a region could easily affect a significant proportion of wave estimates made using SPA-sampled reanalysis data.\n\nThe remainder of this paper will use our synthetic measurements to compare bulk temperatures among COSMIC, HIRDLS, SABER and our six reanalyses. Based on the above conclusions, we expect the difference from the results that would be obtained using a SPA approach to be extremely small, such that the majority of differences will arise due to scanning patterns and retrieval methods rather than the use of full-3-D sampling. However, our results show that as reanalyses continue to improve in resolution, using a full sampling approach will become an increasingly important factor in producing accurate comparisons.\n\n6 Relative scatter\nBack to toptop\n\nFigure 5Scatter-density plots comparing each instrument (rows) to synthetic measurements generated from each reanalysis (columns) at 30 km in altitude. For each panel, pixels indicate the proportion of all samples with the (vertical axis) observed and (horizontal axis) simulated temperature. The solid black line indicates a 1:1 correspondence among the datasets, and the dashed line is a linear fit to the results – note that the dashed line very closely overlies the solid line. Text annotations show the number of contributing sample pairs (N, in thousands of samples), the Pearson linear correlation coefficient of the two datasets (r), and the equation of the linear fit line (in the form y=mx+c, where y is the instrument, x the sampled model, m the gradient and c the y-axis intercept.)\n\n\nFigure 5 compares observed and synthetic temperatures for each of the three limb sounders at the 30 km altitude level. Results are plotted as a scatter-density plot for each instrument–reanalysis combination. All profiles at all latitudes are included in the comparison, and thus each panel summarises at least 1.4 million like-for-like comparisons between an instrument and a reanalysis.\n\nIn all cases, agreement is, to first order, very close. No correlation coefficient is less than 0.968, with the HIRDLS–ERA-I pairing generating the highest correlation of 0.9901. Fitted gradients are also extremely close, with a minimum of 0.98 and with several pairs showing a perfect linear fit, i.e. a fit gradient of 1.00 with zero offset.\n\nJRA-55C exhibits the worst agreement with the observations, consistent with the lack of stratospheric data assimilation in this reanalysis. However, even this pairing shows a minimum correlation of 0.968 (with COSMIC) and a maximum spread about the 1:1 line ∼15 K in the most extreme case (a few dozen samples in 3.9 million). This suggests that the model physics is still doing a good job of reproducing the bulk characteristics of the observed atmosphere at the 30 km level, and thus that pre-satellite-era reanalyses are potentially scientifically useful at these altitudes.\n\nCOSMIC comparisons exhibit more scatter than HIRDLS and SABER comparisons. Since all individual comparisons are shown on the chosen colour scale (the minimum coloured value, 10−7.67, is smaller than the smallest possible bin value), this is not an artefact of the number of points, and in any case, the number of samples is broadly comparable to SABER (∼75 % as many samples). This may suggest greater noise on the COSMIC measurements. While it could also in principle be due to their different spatial coverage, study of regional correlations and differences in Sect. 9 below suggests that, at this height at least, this is not the case.\n\nFigure 6As in Fig. 5, but at 50 km in altitude.\n\n\nFigure 6 shows equivalent results at 50 km in altitude. This is more than a decade of pressure above Fig. 5, and thus both simulating and retrieving atmospheric temperature is a much larger scientific challenge.\n\nWhile this altitude is well within the coverage range of HIRDLS and SABER, it is very close to the upper limit of COSMIC data. Here, measurement effects can significantly affect the retrieved dry temperature, resulting in much greater retrieval noise than at lower altitudes. At low temperatures and densities, the refractive index of the atmosphere is also low, and hence the phase delays measured by the COSMIC GPS radio occultation receivers are very close to the instrumental noise limit imposed by thermal noise effects (Tsuda et al.2011). This leads to a positive bias at low temperatures since the phase delay noise is often larger than the temperature-induced phase delay, which the retrieval aims to measure. In addition to a general widening of the scatter cloud, this also manifests itself as a characteristic “banana” form visible in the comparisons with all six reanalyses. We also see a slight cold bias in HIRDLS temperatures of a few Kelvin, consistent with previous studies (e.g. Gille et al.2013).\n\nAside from these known features, some clear trends in the comparisons can be seen. Firstly, an increase in scatter for all comparisons is clearly visible. In particular for JRA-55C, correlation coefficients have dropped from 0.974 to 0.759 for HIRDLS and from 0.971 to 0.751 for SABER. This is a large drop and shows that the model is performing much worse as we get further from assimilative constraints in the lower atmosphere. Even discounting comparisons involving either COSMIC or JRA-55C, correlation coefficients now range from 0.842 to 0.942 at this height, compared to 0.984–0.990 at 30 km in altitude, a substantive drop indicative of our poorer state of knowledge of the atmosphere at these heights.\n\nAnother noticeable effect is that, while the ERA-I, ERA-5, JRA-55, MERRA-2 and even JRA-55C comparisons with HIRDLS and SABER all have a linear trend very close to the 1:1 correspondence line, CFSR has a noticeably different gradient – observed cold temperatures are modelled as too warm in CFSR and vice versa. As a result of this, CFSR comparisons have a lower correlation with observations than any reanalysis other than JRA-55C.\n\n7 Time series comparisons\nBack to toptop\n\nTo further characterise the differences between the observations and observation-sampled reanalyses, Figs. 7, 8 and 9 show zonal mean time series of each dataset at the 30 and 50 km altitude levels for the Equator, 60 N and 60 S latitude bands respectively. COSMIC, HIRDLS and SABER are all shown at the Equator, but SABER is omitted from the other two latitude bands since it only provides coverage for part of the year. For each comparison, the main panel shows a time series over the full period of comparison, while the smaller panel at the right shows an annualised comparison over the whole period.\n\nFigure 7Time series of observed and sampled-reanalysis temperature, averaged over 5 S–5 N, at (a–c, g–i) 50 km and (d–f, j–l) 30 km in altitude. Panels (a)(f) show time series over the period 2003–2012, and panels (g)(l) the annual cycle derived from the extended time series.\n\n\nFigure 8Time series of observed and sampled-reanalysis temperature, averaged over 55–65 N, at (a, b, e, f) 50 km and (c, d, g, h) 30 km in altitude. Panels (a)(d) show time series over the period 2003–2012, and panels (e)(h) the annual cycle derived from the extended time series.\n\n\nFigure 9Time series of observed and sampled-reanalysis temperature, averaged over 55–65 S, at (a, b, e, f) 50 km and (c, d, g, h) 30 km in altitude. Panels (a)(d) show time series over the period 2003–2012, and panels (e)(h) the annual cycle derived from the extended time series.\n\n\nIn all cases, and consistent with Sect. 6, a much closer agreement is seen between the observations and synthetic reanalysis temperatures at the 30 km level than the 50 km level. Some biases are clearer in this format however. In particular, relative to the reanalyses, SABER (30 km, Equator) exhibits a high bias of ∼1–2 K all year, while HIRDLS (50 km, Equator) exhibits a low bias of ∼1–3 K between July and January.\n\nKey geophysical features are clearly resolved in all observations and reanalyses. A very clear annual cycle is seen in the 60 N and 60 S comparisons at both heights, a quasi-biennial pattern in the 30 km equatorial time series, and a mixed annual–semi-annual signal in the higher-altitude equatorial time series. While these features are extremely large and should be well resolved in all datasets, it is encouraging to see how strong the temporal agreement is. A possible exception is CFSR at 50 km, which in both hemispheres has trouble resolving winter temperature minima at 50 km in altitude.\n\nLess consistency is seen in how well the different datasets reproduce the dramatic temperature variations associated with sudden stratospheric warmings (SSWs). The SSWs of January 2006, January 2009, March 2010 and January 2012 (Butler et al.2017) are clearly visible at both altitudes, and all datasets show a near-identical response at the 30 km level. However, this is the case in both the original observations and the sampled reanalyses and is thus likely to be due to geophysical differences among the SSW events rather than instrument or reanalysis performance.\n\nFor the well-resolved SSWs, all datasets show a near-identical response at the 30 km level. However, at 50 km much more spread is seen among different datasets. Considering first the 2006 warming with HIRDLS sampling (Fig. 8b), the temperature peak in late January is very well reproduced across the different datasets but the period of reduced temperatures after this peak shows very large inter-dataset differences. While the observations, JRA-55 and ERA-I all reach a low of 226 K in this period, MERRA-2 estimates a temperature of 231 K, JRA-55C 238 K and CFSR 244 K (recall that HIRDLS has a known cold bias at these altitudes, and thus the true value is likely to be a few Kelvin higher than the observed). Thus, we see a range of 18 K for a zonal mean estimate made using a relatively densely sampling instrument scan pattern (HIRDLS typically measured ∼300–400 profiles in this latitude range per day). Smaller differences are seen in the February 2007 warming, with only CFSR diverging significantly from the consensus temperature estimate.\n\nConsidering now the SSWs resolved in the COSMIC-sampled record at 50 km (Fig. 8a), we again see the initial temperature peak being measured similarly across all the datasets, but the temperature trough afterwards being resolved very differently in each dataset. For the 2009 and 2012 warmings, the spread in temperature is similar to 2006 in HIRDLS-sampled data, with the exception that the observational dataset is one of the larger-valued datasets, consistent with the challenges of measuring cold temperatures with COSMIC (Sect. 6). ERA-5, which is only currently available post-2010, joins ERA-I and JRA-55 in simulating very cold temperatures in the 2012 event.\n\nFinally, Fig. 9 shows equivalent time series at 60 S. As at 60 N, the reanalysis-sampled zonal means reproduce observations and each other well at 30 km and more poorly at 50 km.\n\n8 Taylor diagrams\nBack to toptop\n\nFigure 10Taylor diagrams for each reanalysis–instrument pairing. For each panel, the radial axis shows the standard deviation of each sampled-reanalysis dataset (indicated by coloured symbols), and the curved axis indicates the correlation of that dataset with the equivalent observational dataset. Black circles indicate the observational datasets themselves, which by definition perfectly autocorrelate. Grey arcs show the root-mean-square difference between the observational and sampled datasets. Multiple black circles are plotted on each panel and outlined with colours; this is because each reanalysis covers a slightly different time range, and thus there is a small amount of variability in the observational standard deviation; RMSD arcs are based upon the MERRA-equivalent observational standard deviation in each case (i.e. the red outlined circles). Each row shows a different height level, and each column a different instrument.\n\n\nTo investigate how well the synthetic measurements from each reanalysis reproduce the true measurements for each instrument, Fig. 10 shows Taylor diagrams (Taylor2001) for each limb-sounder sampling pattern at three altitude levels: 30, 50 and 70 km. For each panel, the standard deviation of the observational dataset is shown as a black circle on the horizontal axis and acts as a “true” estimate, which the reanalyses attempt to approximate. Each sampled reanalysis is then shown as a marker somewhere in the quadrant, with the angular distance between this marker and the black circle encoding the Pearson linear correlation between the two datasets and the linear distance between the marker and the black circle (grey circles) showing the root-mean-square difference (RMSD) between them. The correlation and the standard deviation in each case are computed using the entire dataset, across all times and at all locations.\n\nIf the observations were perfectly true, these diagrams would allow us to quantitatively estimate reanalysis performance. The assumption of observational truth is however somewhat problematic given the technical challenge of stratospheric remote-sensing measurements, and this distinction between measurement and truth must be borne in mind when considering the information these diagrams present: these diagrams are best thought of as describing how similar the reanalyses are to the observations rather than how true they are. Section 10.1 and 10.2 below will generalise these results to all combinations of true and synthetic observations.\n\nFigure 11Correlations between multi-reanalysis mean (MRM) sampled temperatures and each instrument, decomposed by latitude, altitude and season. Dashed line at 60 km in altitude indicates the approximate height of the transition from a six-reanalysis MRM to a two-reanalysis MRM; dashed lines at 50 S and 50 N indicate the boundary of full and partial SABER coverage. See Supplement Figs. S1–S6 for individual satellite–reanalysis comparisons.\n\n\nConsidering first the 30 km level (Fig. 10f–h), we see very close correspondence among all reanalyses and all three instruments. RMSDs in all cases are less than 3 K, and correlations are greater than 0.95 (consistent with the scatter plots in Sect. 6). Interestingly, in all cases the reanalyses are all tightly clustered around a location close to each other but different from the observations, which will be discussed further below.\n\nAt the 50 km level (Fig. 10c–e) differences start to emerge. Clear differences are seen in the standard deviations, with CFSR consistently the lowest and the observations consistently the highest. This is consistent with expectations: in Sects. 6 and 7 we saw that CFSR temperatures were comparatively narrowly distributed at this level, while real observations are likely to have a small but consistent random noise component, which will increase their standard deviation even in the case of otherwise perfect agreement. JRA-55C has the largest RMSD from the observations at this height in all sampling patterns, again consistent with Sect. 6.\n\nFinally, at the 70 km level (Fig. 10a–b) we compare HIRDLS to MERRA-2 and SABER to MERRA-2 and ERA-5. The RMSD between observations and models is typically ∼9 K, with correlations of ∼0.75. The ability of the reanalyses to reproduce the observational record is broadly comparable between HIRDLS and SABER; however, it is also low in absolute terms due to the difficulties of modelling this atmospheric region and the limited data constraints available.\n\nFigure 12Root-mean-square differences between multi-reanalysis mean (MRM) sampled temperatures and each instrument, decomposed by latitude, altitude and season. Dashed line at 60 km in altitude indicates the approximate height of the transition from a six-reanalysis MRM to a two-reanalysis MRM; dashed lines at 50 S and 50 N indicate the boundary of full and partial SABER coverage. See Supplement Figs. S7–S12 for individual satellite–reanalysis comparisons.\n\n\n9 Correlations by latitude and height\nBack to toptop\n\nTo further investigate the relative differences between our synthetic and true observations, Figs. 1114 decompose the data as functions of (Figs. 1112) zonal-mean latitude and altitude and (Figs. 1314) geographic location at 50 km, in all cases decomposed by season. The 50 km level is deliberately selected here in preference to the 30 km level due to the wider spread of the above comparisons.\n\nFor reasons of space, these figures compare the observational data to a multi-reanalysis mean (MRM) rather than the individual reanalyses. This MRM is constructed as the arithmetic mean of all six synthetic measurements corresponding to each true measurement, i.e. it is at the individual measurement level. We also include full latitude–height comparisons to each individual reanalysis as Supplement Figs. S1–S12; we note that each of these individual comparisons is very similar to the MRM comparison, and thus that the MRM figures characterise general differences between the observations and reanalyses well.\n\nFigure 13Maps at the 50 km altitude level of the correlation between MRM sampled temperatures and each instrument.\n\n\nWe consider first correlations and RMSDs as a function of latitude and altitude, Figs. 1112 and S1–S12. Correlations are highest, and RMSDs lowest at high latitudes and low altitudes in all seasons. Lower correlations are seen in tropical and equatorial latitudes, but with the same vertical trend. Lower correlations are observed in all cases at the summer pole, falling to near-zero correlation for the southern summer pole in mesospheric SABER comparisons.\n\nThe maps, Figs. 1314, generally show similar results, with the exception that very large RMSDs are seen at winter high altitudes, consistent with the zonal-mean time series studied above. Additionally, one key feature is much clearer in this figures; namely that, while correlations are low across the tropics, the region directly above the Equator (latitudes <10) exhibits stronger positive correlations than the rest of the tropics in all three comparisons and in all four seasons. Since model development often focuses on reproducing the stratospheric quasi-biennial oscillation at these latitudes as a proxy for accurate atmospheric wave simulation, this may indicate that this region is especially well tuned by comparison to the surrounding latitudes.\n\nFigure 14Maps at the 50 km altitude level of the RMSD between MRM sampled temperatures and each instrument.\n\n\n10 Cluster analysis\nBack to toptop\n\n10.1 Cluster circles\n\nAn interesting feature of the Taylor diagrams presented in Sect. 8 is that, at each height level and for each instrument sampling pattern, a clear cluster is seen consisting of all the reanalyses (except CFSR and JRA-55C at 50 km), as opposed to a wide scatter. The MRM comparisons presented in Figs. 1114 and the individual-reanalysis comparisons presented in Figs. S1–S12 also show a close geographic correspondence in the magnitude and pattern of the difference between true and synthetic measurements.\n\nHowever, this does not itself tell us if the reanalyses are similar to each other. It is plausible that they could all differ from the observations to a similar quantitative degree but differ strongly from each other at the same time. This is an important distinction and requires further clarification. Accordingly, we have also computed the correlation and RMSD between each pair of datasets for each sampling pattern, which we present in Figs. 15 and 16.\n\nFigure 15Pairwise correlation between each dataset at three height levels. Black dots and coloured squares around each circle indicate nodes representing each model or observational dataset, with coloured squares indicating comparisons performed and black dots indicating unavailable comparisons due to spatial and temporal coverage constrains. Coloured lines joining nodes indicate pairwise correlations between the data sources associated with those nodes, described by the key at the top left.\n\n\nIn both figures, each panel shows all pairwise comparisons for a given instrument sampling pattern at one of three height levels. Individual datasets (both reanalysis and observational) are evenly distributed around the exterior of the shaded circle. Lines then join each pair of datasets, the colour and width of which indicate the correlation coefficient (Fig. 15) or RMSD (Fig. 16) between that pair of datasets using that sampling pattern. For example, Fig. 15f shows the correlations between all synthetic and real measurements using the HIRDLS sampling pattern at 30 km in altitude, while Fig. 16b shows the RMSD between each pair of datasets using the COSMIC sampling pattern at 50 km in altitude. Observational datasets are shown at the right of each panel.\n\nFigure 16Pairwise RMSD between each dataset at three height levels. Black dots and coloured squares around each circle indicate nodes representing each model or observational dataset, with coloured squares indicating comparisons performed and black dots indicating unavailable comparisons due to spatial and temporal coverage constrains. Coloured lines joining nodes indicate pairwise RMSDs between the data sources associated with those nodes, described by the key at the top left.\n\n\nThick blue lines show the best agreement between a pair of datasets, and thin red lines the worst. In each case, these lines are scaled across the range of values measured for that panel: specifically, thin red lines show the lowest correlation (or highest RMSD) measured, thick blue lines show the highest correlation (or lowest RMSD) measured and the other lines are scaled linearly into the range between these values based on their numerical value, as opposed to their ordering. This internal normalisation is chosen due to the large inter-panel differences in value (as seen in Sects. 6, 8 and 9). Full numerical correlations and RMSDs are provided for each pairing as Supplement Tables S1–S14.\n\nFirstly, we note that the worst inter-dataset pairings are almost always with JRA-55C, in each case shown at the bottom of the circle. CFSR also compares poorly at the 50 km level. These tendencies are consistent with our previous results and expectations.\n\nThe second feature we note is that no observation–reanalysis relationship is ever the strongest relationship within that panel. This is the case for all sampling patterns and for both correlation and RMSD analyses. For RMSD comparisons, this is clear from Fig. 16 since no observational point has a thick blue line connecting it to any reanalysis. For the correlation comparisons, in Fig. 15, this is less clear since two connections (HIRDLS to MERRA-2 at 50 km and ERA-5 to SABER at 50 km) are shown as thick blue lines; however, even in these two cases the measured value (Tables S10 and S11) is the lowest correlation of the thick-blue-line pairings.\n\nFigure 17Dendrogram illustrating results of cluster analysis on co-located measurement pairs. This shows each dataset as a leaf on a hierarchical tree. The vertical distance up the page at which two branches split indicates the relative dissimilarity of the datasets joined by the branches. Horizontal distance does not imply any information, and the leaves are distributed horizontally to produce a simple tree. All co-located measurements have been compared at 30 km in altitude.\n\n\nThis is especially interesting in the case of COSMIC at 30 km in altitude, panel (e) in Figs. 15 and 16. While HIRDLS and SABER are independent of the reanalyses and COSMIC is itself unreliable at 50 km in altitude due to noise effects, at 30 km in altitude COSMIC is both highly reliable at a technical level and, crucially, is actually assimilated by every model considered. Given this, we would expect all the synthetic measurements to be highly similar to COSMIC-retrieved temperatures, with which they share a sizable fraction of the detection and analysis chain. Even more unexpectedly, COSMIC is actually the worst-correlated dataset of the seven considered and has the highest RMSD, even including JRA-55C. We discuss this further in Sect. 10.2.\n\nLess surprisingly, but still interestingly, the same is largely true for SABER and HIRDLS comparisons. Compared to the relationships among most reanalyses, the RMSD between observational and reanalysis datasets is much larger and the correlations lower. This implies a significant dissimilarity in every case between real and synthetic observations. While some of this difference could be due to limited instrumental precision, this does not explain all or even the majority of the observed effect size: typical RMSDs between synthetic and real observations (Tables S1–S14) are ∼1–2 K at the 30 km level rising to ∼4–9 K at the 50 and 70 km levels, while instrument precision is typically ∼0.5 K.\n\n10.2 Co-located cluster analysis\n\nThe previous section suggests that there are meaningful differences between observational and synthetic datasets, in terms of both form (i.e. correlation) and magnitude (i.e. RMSD). However, the methods we have used so far cannot distinguish between two possible reasons why this may be the case:\n\n 1. the reanalyses are overly similar to each other relative to the differences among observations, or\n\n 2. the observations are overly similar to each other relative to the differences among reanalyses.\n\nThis is an important distinction, with possible implications for the tuning of both reanalysis model and satellite retrieval development. In the former case, the models may be too tightly tuned against each other, while in the latter case the different instrumental retrievals may be too tightly tuned against each other. To assess this, we must compare satellite instruments against each other as well as against their synthetic equivalents. Accordingly, we have produced a subset of the full dataset consisting only of measurements co-located between each pair of instruments, allowing us to make direct comparisons across the full range of instrument–reanalysis combinations.\n\nWe define profiles as co-located if they are within 100 km and 15 min of each other, following the argument of Wright et al. (2011). For this subset of the data, we then compute the RMSDs and correlation coefficients among the samples from all 20 datasets, i.e. the three observed datasets and the 17 sampled datasets, and use these to compute a hierarchical tree. As a caveat, we note clearly that the set of measurements is not exactly identical in each combination since measurements from all three satellite instruments only very rarely coincide; thus, the samples correlated between (e.g.) HIRDLS-as-CFSR and SABER-as-JRA-55 will not be the same set of samples as (e.g.) HIRDLS-as-CFSR and COSMIC-as-JRA-55. However, there are a sufficient number of pairwise correlations between each observational track (of the order of thousands), and the samples are geographically sufficiently widely distributed, that all of the correlations and RMSDs can be collected into a single hierarchical tree with traceability across the full set. This co-location was carried out at the 30 km altitude level, and our subsequent analysis and discussion focus only on this level for brevity. The same analysis was performed at 50 km in altitude and gave broadly similar results, except that differences with observed COSMIC data and with CFSR synthetic temperatures were much larger, consistent with the issues described previously.\n\nOnce the data have been subsetted, we carry out a hierarchical cluster analysis (Hastie et al.2009; Wright et al.2013) of these correlations and differences. We first combine RMSDs and correlations into a single composite metric of dissimilarity. Specifically, we define the maximum range of measured RMSDs and the maximum range of measured correlation coefficients to both equal 1 and then combine them as\n\n\nA dataset pair with the minimum correlation and the maximum RMSD across the full set of combinations will thus score close to 2. This choice of a 1:1 weighting of RMSD and correlation coefficient is arbitrary, but our results show minimal sensitivity to varying their fractional weight, and the same conclusions are reached using either metric individually.\n\nWe then perform a hierarchical clustering analysis on the combined difference between each possible pair of sampled and observed datasets, using the single (i.e. minimum difference) linkage and a Euclidian distance metric. The ordering of our results is invariant to the choice of linkage and distance metric used over a wide range of feasible options including the complete, average and centroid linkages and the Ward and standardised-Euclidian linkages. This analysis essentially partitions the inter-dataset comparisons into a hierarchical tree, starting at the lowest possible difference between any two datasets and then producing a new branch when a rising difference floor reaches a critical level of dissimilarity. The results of this are illustrated as a dendrogram, shown in Fig. 17.\n\nAlthough there are some subtleties to a precise interpretation, to first order this diagram can be conceptualised as showing the relative difference between each dataset, with the maximum height reached on the path through the tree which joins them indicating their relative difference from each other (in bioscience applications, this separation would be their co-phenetic distance). Horizontal distance does not imply any information, and the ordering is chosen purely to produce a simple tree. We thus obtain an idea of the relative overall difference for all possible combinations of sampled and real datasets.\n\nWe first note that each reanalysis forms a distinct branch of the tree, with all sampled forms of any given reanalysis tightly connected. This suggests that the smallest differences are between different forms of the same dataset. This is an intuitively sensible result since we would expect any given model to correlate well with itself.\n\nBeyond this, we see three main groups of results. The first of these is JRA-55C, at the right of the panel, where all three forms of the dataset are closely related to each other (i.e. they join the hierarchical tree only a short way up the panel), but are relatively much more dissimilar from any other dataset (i.e. they join the rest of the tree at the extreme top of the panel). This tells us that, again in relative terms, the sampled JRA-55C data have significant dissimilarities with all other reanalyses and with all the instrumental datasets. This is again an intuitively sensible conclusion, due to the lack of observational constraints at these altitudes in JRA-55C.\n\nThe second main group of results is the set of observational datasets, i.e. COSMIC, HIRDLS and SABER, to the left of the JRA-55C cluster. The defining characteristic of this group is not their relative closeness but instead the exact opposite. Each of the observational datasets is highly dissimilar from both the others and from all the reanalyses, regardless of sampling pattern. Of the three, HIRDLS and SABER join each other in the tree most closely, while COSMIC is more dissimilar to the other observational datasets but less so than JRA-55C.\n\nOur final, third, group is of the full-input reanalyses. This is the majority of the tree, extending from the far left rightwards. All of these datasets join the tree at a point approximately halfway up the panel relative to where HIRDLS and SABER join it, suggesting that this group is significantly more similar to each other (on the basis of our distance metric) than to any observational dataset. Within this group, ERA-5 samples form a distinct subset, while the others are all relatively tightly clustered to each other.\n\nFrom this analysis, we conclude that, of the two options outlined at the start of this section, option (1) is the more likely, i.e. the set of (full-input) reanalyses exhibits a high degree of internal similarity relative to any individual observational dataset. Indeed, our analysis suggests that each of the observational datasets is more different from any other observational dataset than any full-input reanalysis is from any other full-input reanalysis.\n\nOf special note is the relatively large dissimilarity between COSMIC and any other dataset. Since all of the full-input reanalyses assimilate low-level COSMIC data, this suggests either that the COSMIC temperature retrieval introduces large additional errors relative to the assimilated form or that the relative importance of COSMIC data in the reanalysis schemes used is too low.\n\n11 Summary and conclusions\nBack to toptop\n\nIn this study, we develop and apply a method of sampling output reanalysis temperature fields to produce synthetic satellite observations. This allows us to carry out a like-for-like comparison between final-output reanalysis products and final-output satellite data products, i.e. at the end of their respective analysis chains, where a typical user would encounter the data.\n\nWe first compare the synthetic measurements produced using this approach to a simplified scheme in which the reanalysis is simply interpolated to the centre of the satellite measurement volume. We show that, with the current generation of reanalyses, the more complex approach is always required when comparing to AIRS, almost never required when comparing to HIRDLS and may be required in equatorial regions and regions of high gravity wave activity but not otherwise for COSMIC and SABER.\n\nWe then assess the relative differences between each of the three limb sounder datasets (i.e. COSMIC, HIRDLS and SABER) and six modern reanalyses at the 30 and 50 km altitude levels. Unsurprisingly, agreement between observations and reanalyses is significantly better at the 30 km level than the 50 km level: all-latitude all-time correlations between observations and full-input reanalyses (i.e. excluding JRA-55C) range from 0.979 to 0.990 at the 30 km level, reducing to 0.842–0.942 at the 50 km level (also excluding COSMIC at 50 km, which is known to have measurement difficulties at this altitude).\n\nThe reanalysis and observed datasets generally show excellent agreement at the zonal mean level. Exceptions typically occur at higher altitudes, the largest of which is a general mismatch following sudden stratospheric warmings.\n\nInter-dataset correlations are lowest (i) in the tropics at all heights except for the region immediately above the Equator, (ii) at all latitudes at high altitudes and (iii) at high altitudes over the summer pole. RMS differences are highest at high altitudes and over the winter pole.\n\nFinally, we use both intra-sampling-pattern all-dataset and inter-sampling-pattern co-located-profile-only correlations and RMSDs to investigate how similar the reanalyses and individual observational datasets are to each other at a bulk level. Our results show strong evidence that, with the exception of JRA-55C, the agreement between any pair of reanalysis datasets is significantly better than that between any two observational datasets or between any observational dataset and any reanalysis, even in the case of COSMIC for which the reanalyses assimilate that data. This may be evidence of over-tuning of reanalysis models against their comparators, and if so presents significant implications for future development of these models.\n\nCode and data availability\nBack to toptop\nCode and data availability. \n\nThe original reanalysis and satellite datasets are available from their respective sources, as described in the acknowledgements. All code developed for this study is available as MATLAB scripts on request from the lead author, and the intermediate data products used can be generated using these scripts.\n\nAppendix A: Sampling method\nBack to toptop\n\nFigure A1 outlines our sampling method. We divide this description, and the software which implements it, into three parts: an observation import function (OIF), a model import function (MIF) and the core analysis (core).\n\nFigure A1Schematic outline of the sampling process. See text for further details.\n\n\nA1 Observation import function\n\nThe OIF reads in the observational data in its original format and outputs observational parameters needed for the later stages of the analysis. These parameters can be divided into two groups of parameters: (a) geolocation and (b) sensing volume. All values are computed and stored at the individual measurement level.\n\nThe geolocation parameters we use are the (i) latitude ϕ, (ii) longitude θ and (iii)  pressure level p of the centre of each measurement, together with the (iv) horizontal α and (v) vertical β viewing angle at which the measurement was taken. For all observations used in this study, the latitudes, longitudes and pressures are provided in the original data files used and are simply duplicated into the appropriate format for feeding into the core.\n\nHorizontal viewing angles are defined as clockwise from geographic north. For COSMIC, the original files provide this information, which is simply duplicated. For AIRS-L1, SABER and HIRDLS, we combine the known scanning geometries of these instruments (47 off-reverse-track for HIRDLS, 90 off-track for SABER, directly below for AIRS) with the time-varying measurement latitudes and longitudes to compute horizontal viewing angles for each data point.\n\nVertical viewing angles are defined as anticlockwise from instrument nadir. These are defined as 90 for COSMIC, HIRDLS and SABER since all three instruments observe in the Earth's limb from a considerable distance and are thus near horizontal at any given height in the vertical plane on the scales under consideration. For AIRS-L1, the vertical viewing angle is defined as the angle of the individual cross-track row from the primary travel axis, which ranges from −49.5 to +49.5.\n\nThe sensing volume parameters are specified based on prior knowledge about the instrumentation used. For the limb sounders, we approximate the sensing volumes using 1-D Gaussians. In the along line-of-sight (LOS) and cross-LOS directions, this arises from the interaction between the exponential dependence of density on height and the sphericity of the Earth – density, and thus signal, hence fall away from the tangent point of the measurement exponentially in both the along-LOS and cross-LOS directions. In the vertical this is an approximation rather than a true form. For SABER and HIRDLS the exact form varies with height and latitude slightly due to the precise details of their retrievals (for HIRDLS, see e.g. Fig. 1 of Khosravi et al.2009); nevertheless, due to the coarse vertical resolution of reanalyses in the stratosphere this should not affect our results significantly if at all. For COSMIC the vertical resolution is approximately defined by the first Fresnel zone (Kursinski et al.1997), which is bounded by a function of square-root form. This is again sufficiently close to a Gaussian not to affect our results significantly given reanalysis resolution limitations.\n\nThus, the OIF specifies for each point simply the standard deviation of an appropriately sized Gaussian function in each dimension, which is combined in the core to produce a 3-D sensitivity weighting volume. For AIRS, we use the same approximation in the horizontal plane, but use a vertical function of an appropriate form for AIRS sensitivity (Fig. 2), which is specified precisely by the OIF.\n\nA2 Model import function\n\nThe MIF imports the model data and uses it to produce a linear interpolant field for later use. Specifically, for each model time step, the MIF imports the data from the original format and reformats it to a binary-search-suitable fast-lookup format. This allows us to rapidly interpolate the model data field to any geographic location without additional data reformatting, a capability which is exploited in the core analysis below.\n\nAn important choice at this stage is whether to interpolate the data in time as well as space. For the reanalyses used, the data fields are instantaneous, i.e. a snapshot of the model at a particular time as opposed to an average over the time surrounding the time step. Thus, small-scale features, such as internal gravity waves and chemical laminae, are preserved in the fields.\n\nIf we wish to preserve these features in our sampling, it would be unwise to interpolate in time. However, we find that if we do not interpolate in time, the difference between the sampled and observed temperature fields depends strongly on the time difference between the model time and observation time, due to effects such as the diurnal cycle. In extreme cases, this can create additional deviations as large as 10 K. Accordingly, throughout this study, we linearly interpolate our input data to the sampling location in time as well as space.\n\nA3 Core\n\nThe core takes the output of the OIF and the MIF and then resamples the model data appropriately onto the satellite measurement track to produce the required synthetic measurements. The core analysis consists of 10 distinct steps (Fig. A1); of these, nine are scientifically motivated, while one (C.v) exists to reduce processing time.\n\nA3.1 Produce fine grid (steps C.i to C.ii)\n\nWe first identify the measurement centre location supplied by the OIF and produce a fine spatial grid around this location. This grid is defined such that the x axis lies along the major axis of the measurement and the y axis lies along the minor axis, with the pressure (z) axis vertically aligned through the measurement centre. The limits of the fine grid are defined as the 3 standard deviation points for weights specified as Gaussians, i.e. all cases in this study except for AIRS-L1 in the vertical. For AIRS-L1 we terminate the grid half a decade of pressure above and below where the weight falls to 2 % of its peak value.\n\nThis coordinate system ensures that, regardless of the density of the fine points, at least one (the centre) point will always be contained in the measurement volume. However, in practice, significantly more points are used. Specifically, we use the fine grid spacings shown in Table A1, chosen using the sensitivity tests described in Appendix B.\n\nTable A1Fine sampling point spacings used for each instrument\n\nDownload Print Version | Download XLSX\n\nA3.2 Produce and rotate weighting volume (steps C.iii to C.vii)\n\nWe next define the fractional contribution of each point on the fine grid to the final synthetic measurement. To do this, we first compute the appropriate Gaussian in each dimension separately (except AIRS-L1, for which we use the specified vertical function) and then multiply these 1-D functions together appropriately to produce a 3-D weighting volume.\n\nOf the several thousand points typically contained in this volume, the great majority make no significant contribution to the total weighted sum. Passing these points through the subsequent analysis is thus computationally expensive for minimal benefit. Accordingly, we sequence the points in descending order by fractional contribution to the total signal and then select the points needed to reach a cumulative total of 99 % of the total weight. Tests show that this makes no discernible difference to the final result (typically differences are <1×10-4 K), but reduces runtime by 90 %.\n\nWe then need to rotate the volume into the appropriate horizontal and vertical viewing angle. For horizontal angles, this is simply achieved by applying the necessary coordinate transform.\n\nIn the vertical, this is more complex due to the strong dependence of the weights on atmospheric density. Thus, to rotate in the vertical, we first un-scale the weights at each height using a density climatology derived from SABER observations. We then apply the appropriate rotation matrix for the necessary coordinate transform before rescaling by density in the new height coordinates. In this study we only do this for AIRS; the curved extensions visible at the bottom of each coloured volume on the edge of the swath in Fig. 1 arise due to this rotation, leading to reduced horizontal resolution at track edge consistent with how the real instrument observes the atmosphere.\n\nA3.3 Interpolate and weight (steps C.viii to C.x)\n\nFinally, we convert our fine grid x, y and p coordinates to ϕ, θ and p coordinates using their geometric location relative to the centre location of the original measurement. We then interpolate the global model onto these coordinates, apply the weights and sum to produce a single temperature value. This is our final synthetic temperature measurement, which we treat in subsequent analyses as if it were a satellite temperature measurement. The whole process then repeats independently until all measurements required have been sampled.\n\nAppendix B: Selection of fine grid parameters\nBack to toptop\n\nOur results are potentially highly sensitive to the fine grid spacing used in the analysis. Too coarse of a spacing will lead to results which do not represent the reanalysis temperature in the sampling volume accurately, while too fine of a grid will be prohibitively computationally expensive. To assess the best fine grid spacing to use, we performed a series of sensitivity tests prior to carrying out the main analysis, using data from 1 January 2007 as a proxy for the mission as a whole. Figure B1 shows the results of these tests for each instrument sampled from the CFSR reanalysis. The other reanalyses were also sensitivity tested (using data from 1 January 2012 for ERA-5) but produced very similar results and are consequently omitted for brevity.\n\nFigure B1Sensitivity testing results. The top row shows the results of horizontal sensitivity tests, plotted as the maximum difference in temperature between the test and a baseline indicated by the orange diamond; line contours show the required runtime. The lower panels show the results of vertical sensitivity tests, plotted as the maximum difference from a reference level of 1∕160 decades of vertical spacing.\n\n\nFor each instrument, the top panel shows the results of our horizontal sensitivity test. In each case, the vertical axis shows the spacing of the fine sampling grid in the minor (Y) direction, and the horizontal axis the grid spacing in the major (X) direction. For each test in this panel, a fixed vertical fine grid spacing of 1∕80 decades of pressure (∼200 m) was used. We imposed a maximum runtime of 6 h per day of data on this test, and black squares indicate tests which did not sample a complete day of data within this time.\n\nWe first define a baseline result, chosen as the highest-resolution test to run within 6 h. This baseline is assumed to best represent an optimally sampled reanalysis temperature field and is indicated by the orange diamond in each panel. For each other test, we then find the sensitivity testing temperature difference |ΔTST| between every sample extracted that day in the test and in the baseline and plot the maximum value of this difference. By definition, the baseline test thus has a ΔTST of 0 K, with all other tests having positive values. The values shown thus represent the largest difference across the whole globe at all heights between the highest-resolution fine grid used and the fine grid being assessed in that test. Line contours indicate the runtime required to achieve each result, in minutes.\n\nIntuitively, it seems odd at first that AIRS-L1 sampling is much more sensitive to the nominally minor Y direction than the nominally major X direction since the input horizontal weighting functions are circularly symmetric. However, when the functions are rotated vertically to account for the across-track scanning pattern of the instrument, a significant asymmetry arises in the Y direction, causing this increased sensitivity. Otherwise, the dependencies are as one would intuitively expect, with an extremely strong Y sensitivity for the very narrow COSMIC weights, weaker Y sensitivity for the broader HIRDLS and SABER, and the weakest dependency in all cases in the X direction for all instruments.\n\nThe lower panels show equivalent results for vertical sensitivity, in each case performed at the chosen horizontal sensitivity. These are plotted as differences from the finest vertical spacing used (1∕160 decades of pressure, ∼100 m). The results are shown on logarithmic axes, and thus the 1∕160 decade spacing, which by definition has a ΔTST of 0 K, is not shown. The 1∕80 decade spacing used in the horizontal tests is indicated by the black outlined point.\n\nFinally, the same analysis was repeated using data pre-smoothed by 5 km in the vertical, to counter any effect of random noise. No significant change was observed.\n\nBased on these results, we choose our final fine sampling grid for each instrument as an empirical balance between time and small ΔTST. These are the values shown in Table A1, and they have a maximum ΔTST in each case of less than 0.1 K, i.e. significantly below satellite sensitivity.\n\nAppendix C: Full sampling vs. single-point sampling\nBack to toptop\n\nFigure C1Cumulative distributions of the absolute difference between full sampling and single-point sampling. Note that panel (a) has a different abscissa from the other three panels, due to the very different width of the distribution.\n\n\nIn addition to our full-3-D approach, our analysis routine also samples the reanalyses by simple linear interpolation to the centre of the measurement volume. This allows us to make a direct comparison to our more expensive approach, to assess how useful it is. We refer to these approaches as, respectively, the “SPA” and “full” approaches and to the difference between the resulting temperature estimates as ΔTSPA. We note clearly that the magnitude of ΔTSPA is not a metric of reanalysis quality (although it does inherently arise out of reanalysis resolution and small-scale variability, both of which may relate to quality), but is instead intended to determine whether the full sampling approach is justified for comparing satellite data to said reanalysis.\n\nC1 Overall differences\n\nFigure C1 shows the results of this analysis at a bulk all-measurements level, plotted as cumulative distributions of ΔTSPA for all synthetic measurements at all height levels.\n\nFigure C2Cumulative distributions of the absolute difference (a) pseudo-1-D sampling and the SPA (b) pseudo-1-D sampling and full-3-D sampling. CFSR has been omitted since it only covers a small fraction of this year.\n\n\nFor all reanalyses sampled as COSMIC, HIRDLS and SABER, mean differences between the SPA and full approaches are ≤0.17 K in all cases. This is better than the measurement error of these instruments, the precisions of which are estimated as ∼0.5 K for HIRDLS and COSMIC and ∼0.8 K for SABER. For AIRS-L1, differences are larger, with mean ΔTSPA values of ∼6–8.5 K compared to a precision of ∼0.7 K, i.e. an order of magnitude larger than instrument noise.\n\nThese results are consistent with the broad nature of the sensing methods used. Atmospheric temperature typically varies much more rapidly in the vertical than the horizontal, and thus the SPA will tend to approximate the fine vertical sensitivity of a limb sounder better than a nadir sounder's coarser vertical sensitivity. We note also that our AIRS sampling is only at a single height level, whereas the limb sounders are sampled across a range of heights, and that this may affect the results, particularly since the AIRS weighting functions we use are centred close to the ozone-induced temperature peak usually present in the upper stratosphere.\n\nFor the limb sounders, ERA-5 has the largest ΔTSPA, then CFSR followed by MERRA-2, and then a cluster consisting of ERA-I, JRA-55 and JRA-55C with broadly equivalent results. For ERA-5 and CFSR, this is presumably due to their very fine horizontal resolution, which means that information from more individual reanalysis points contributes in the full-sampling analysis. MERRA-2 then follows, with a final cluster made up of JRA-55, JRA-55C and ERA-I. The equivalence of ERA-I to these models in this analysis is interesting, as it has a much coarser horizontal resolution than the other models.\n\nAIRS has a different ordering: ERA-5 still exhibits the largest ΔTSPA, with the other five reanalyses more tightly clustered after it (note that the form of the ERA-5 distribution changes at ∼8 K, which we believe to be due to the relatively small number of ERA-5 points sampled). The difference in ordering compared to the limb sounder comparisons is likely due to the relatively low vertical resolution of some of the reanalyses at ∼4 km in altitude. In particular, while CFSR has tightly spaced levels in the lower stratosphere, vertical grid spacing is extremely coarse in the upper stratosphere (Fig. 3), explaining why it goes from one of the smallest differences in the limb sounder case to more typical behaviour relative to other reanalyses in the AIRS case.\n\nFigure C3Geographic variability in ΔTSPA. The leftmost six columns show maps of the column-integrated proportion of samples with ΔTSPA>0.5 K on a 2.5 grid, while the rightmost column shows the globally integrated samples with ΔTSPA>0.5 K at each height. Colour bars are the base-10 logarithm of the proportion of samples. Black regions on maps indicate a lack of coverage.\n\n\nC2 Is a 1-D approach sufficient for AIRS?\n\nAtmospheric temperature typically varies much faster in the vertical than in the horizontal. Therefore, since the AIRS-L1 sampling volume is of comparable size in the vertical and the horizontal, it is possible that a significant runtime saving with only a small accuracy trade-off could be made for AIRS comparisons if we consider only the vertical dimension.\n\nWe test this by implementing a modified form of the AIRS sampling volume as a new OIF, which we refer to as the pseudo-1-D AIRS-L1 OIF. Since our software chain can then remain otherwise identical, like-for-like comparisons can be made without introducing additional inconsistencies in the comparison.\n\nSpecifically, the pseudo-1-D OIF is identical to our standard 3-D OIF, but with two key exceptions: (i) it has an extremely narrow horizontal spread, with a FWHM in the along-track and across-track dimensions of only 100 m and (ii) all samples are assigned a vertical rotation angle of 90; i.e. they do not slant horizontally with height. Since we retain the fine grid spacing used for the AIRS-L1 analyses of the order of kilometres in the horizontal, these two changes cause the new OIF to produce a single column of reanalysis values for each AIRS measurement, which we weight vertically in the same way as a standard AIRS measurement. The samples produced by the the pseudo-1-D OIF are therefore broadly equivalent to simply convolving the interpolated reanalysis field with the vertical AIRS weighting function, as carried out in many other studies.\n\nWe apply the the pseudo-1-D OIF to all AIRS-L1 samples from 2011. Figure C2 shows the results of this analysis in the same format as Fig. C1, i.e. as a histogram of cumulative difference.\n\nFigure C2a shows differences between the pseudo-1-D samples and the values obtained from the SPA. We see that differences between the pseudo-1-D samples and the SPA samples are overall slightly smaller than differences between the 3-D samples and the SPA samples, and that in particular there are much fewer samples with a difference >10 K.\n\nFigure C2b then shows differences between the pseudo-1-D samples and the 3-D samples. Differences are much smaller than between either dataset and the SPA but are still meaningful, with nearly 50 % of samples having a difference greater than the approximate instrument precision. Almost no samples have a difference >5 K in this comparison, suggesting that the pseudo-1-D approach achieves a large fraction of the improvement needed to produce meaningful samples\n\nBased on these results we conclude that, while the pseudo-1-D approach of convolving the reanalysis temperature field with the AIRS vertical averaging kernel does provide most of the benefit of our full-3-D approach, there are still meaningful gains to be made from applying the full-3-D approach to producing synthetic AIRS-L1 samples.\n\nGeographic variability in ΔTSPA\n\nFigure C3 shows the geographic distribution of synthetic measurements with ΔTSPA>0.5 K for the three limb-sounding instruments. We omit AIRS-L1 since the mismatches are present in almost every sample, and thus a geographic distribution does not provide useful additional information. A value of 0.5 K is chosen as representing an approximate level at which ΔTSPA is comparable to the uncertainty on the comparator satellite measurements, but the form of the results is broadly equivalent over a wide range of values.\n\nFigure C3a–q show the column-integrated proportion of samples with ΔTSPA>0.5 K for each reanalysis sampled as each instrument, computed on a 2.5×2.5 grid. Most panels show a peak around the Equator, particularly for MERRA-2 in which almost no large values are observed poleward of 30 in either hemisphere. This is consistent with the complex mesoscale dynamics of this region, where model-resolved Kelvin waves and mixed Rossby-gravity waves are a significant factor, as are gravity waves. The relatively fine height layering of the quasi-biennial oscillation in this region may may also contribute.\n\nWe also see secondary maxima around the southern Andes–Antarctic Peninsula region and across the Southern Ocean. These regions are known to have significant gravity wave activity at all length scales (e.g. Eckermann and Preusse1999; Jiang2002; Alexander and Teitelbaum2011; Hindley et al.2015), and the spatial correspondence with this activity is very precise, suggesting this as a possible mechanism for the mismatch between SPA and full sampling in this region. Maxima are also observed over other known gravity wave hotspots (e.g. SE Asia, Scandinavia, the convective equatorial regions), supporting this hypothesis. This does not necessarily imply that the reanalyses can resolve gravity waves at length scales shorter than the satellites observe. A more likely explanation is that the major axes of the satellite sampling volumes lie along the rising or falling temperature gradient of a single wavefront at a moderate angle, which would manifest as a large ΔTSPA value even if the wave was physically much larger in scale than the sampling volume.\n\nFigure C3r–t show the globally integrated proportion of synthetic measurements with ΔTSPA>0.5 K for each reanalysis, as a function of altitude. There are slight height trends in some cases, but the differences are fundamentally dominated by noise and spikes rather than a strong height dependence or relationship to geophysical features such as the stratopause. Thus, we conclude that ΔTSPA exhibits no systematic height dependence at the global scale.\n\nBack to toptop\n\nThe supplement related to this article is available online at:\n\nAuthor contributions\nBack to toptop\nAuthor contributions. \n\nCJW designed the study, wrote the software, carried out the analyses, and produced the text and figures. NPH provided technical expertise and contributed to the scientific interpretation of the results at all stages of the process.\n\nCompeting interests\nBack to toptop\nCompeting interests. \n\nThe authors declare that they have no conflict of interest.\n\nSpecial issue statement\nBack to toptop\nSpecial issue statement. \n\nThis article is part of the special issue “The SPARC Reanalysis Intercomparison Project (S-RIP) (ACP/ESSD inter-journal SI)”. It is not associated with a conference.\n\nBack to toptop\n\nCorwin J. Wright is funded by a Royal Society University Research Fellowship (ref. UF160545) and by Natural Environment Research Council grant NE/R001391/1. Neil P. Hindley is also funded by this NERC grant. This research made use of the Balena High Performance Computing service at the University of Bath. Reanalysis data were provided by the European Centre for Medium-Range Weather Forecasts (ERA-Interim and ERA-5), the NASA Goddard Global Modeling and Assimilation Office (MERRA-2), the Japan Meteorological Agency (JRA-55 and JRA-55C) and the US National Centers for Environmental Prediction (CFSR). Satellite data were provided by NASA JPL (AIRS) NASA, Colorado University and NCAR (HIRDLS), NCAR (COSMIC), and GATS, Inc. (SABER). Corwin J. Wright also acknowledges useful conversations with James Anstey (CCCma), which helped to originally motivate this work, and with various colleagues at the 2017 SPARC Dynamics Workshop in Kyoto, Japan and at the EGU General Assembly 2018 in Vienna, Austria, which helped to refine it.\n\nEdited by: Gabriele Stiller\nReviewed by: Marvin A. Geller and Simon Chabrillat\n\nBack to toptop\n\nAlexander, M. J. and Barnet, C.: Using Satellite Observations to Constrain Parameterizations of Gravity Wave Effects for Global Models, J. Atmos. Sci., 64, 1652–1665,, 2007. a\n\nAlexander, M. J. and Teitelbaum, H.: Three-dimensional properties of Andes mountain waves observed by satellite: A case study, J. Geophys. Res.-Atmos., 116, 1–10,, 2011. a\n\nAlexander, M. J., Gille, J., Cavanaugh, C., Coffey, M., Craig, C., Eden, T., Francis, G., Halvorson, C., Hannigan, J., Khosravi, R., Kinnison, D., Lee, H., Massie, S., Nardi, B., Barnett, J., Hepplewhite, C., Lambert, A., and Dean, V.: Global estimates of gravity wave momentum flux from High Resolution Dynamics Limb Sounder observations, J. Geophys. Res.-Atmos., 113, D15S18,, 2008. a\n\nAnthes, R. A., Ector, D., Hunt, D. C., Kuo, Y.-H. Y. H. Y.-H., Rocken, C., Schreiner, W. S., Sokolovskiy, S. V., Syndergaard, S., Wee, T.-K. K., Zeng, Z., Bernhardt, P. a., Dymond, K. F., Chen, Y., Liu, H.-L., Manning, K., Randel, W. J., Trenberth, K. E., Cucurull, L., Healy, S. B., Ho, S.-P. P., McCormick, C., Meehan, T. K., Thompson, D. C., Yen, N. L., Dymond, K. F., Ector, D., Healy, S. B., Ho, S.-P. P., Hunt, D. C., Kuo, Y.-H. Y. H. Y.-H., Liu, H.-L., Manning, K., McCormick, C., Meehan, T. K., Randel, W. J., Rocken, C., Schreiner, W. S., Sokolovskiy, S. V., Syndergaard, S., Thompson, D. C., Trenberth, K. E., Wee, T.-K. K., Yen, N. L., and Zeng, Z.: The COSMIC/Formosat-3 mission: Early results, B. Am. Meteorol. Soc., 89, 313–333,, 2008. a, b\n\nAumann, H., Chahine, M., Gautier, C., Goldberg, M., Kalnay, E., McMillin, L., Revercomb, H., Rosenkranz, P., Smith, W., Staelin, D., Strow, L., and Susskind, J.: AIRS/AMSU/HSB on the aqua mission: design, science objectives, data products, and processing systems, IEEE T. Geosci. Remote, 41, 253–264,, 2003. a\n\n\n\nEckermann, S. D. and Preusse, P.: Global Measurements of Stratospheric Mountain Waves from Space, Science, 286, 1534–1537, 1999. a\n\nErn, M., Preusse, P., Alexander, J. M., and Warner, C. D.: Absolute values of gravity wave momentum flux derived from satellite data, J. Geophys. Res., 109, D20103,, 2004. a\n\nFujiwara, M., Wright, J. S., Manney, G. L., Gray, L. J., Anstey, J., Birner, T., Davis, S., Gerber, E. P., Harvey, V. L., Hegglin, M. I., Homeyer, C. R., Knox, J. A., Krüger, K., Lambert, A., Long, C. S., Martineau, P., Molod, A., Monge-Sanz, B. M., Santee, M. L., Tegtmeier, S., Chabrillat, S., Tan, D. G. H., Jackson, D. R., Polavarapu, S., Compo, G. P., Dragani, R., Ebisuzaki, W., Harada, Y., Kobayashi, C., McCarty, W., Onogi, K., Pawson, S., Simmons, A., Wargan, K., Whitaker, J. S., and Zou, C.-Z.: Introduction to the SPARC Reanalysis Intercomparison Project (S-RIP) and overview of the reanalysis systems, Atmos. Chem. Phys., 17, 1417–1452,, 2017. a\n\n\nGille, J. C., Barnett, J. J., Arter, P., Barker, M., Bernath, P. F., Boone, C. D., Cavanaugh, C. C., Chow, J., Coffey, M. T., Craft, J., Craig, C., Dials, M., Dean, V., Eden, T. D., Edwards, D. P., Francis, G., Halvorson, C. M., Harvey, V. L., Hepplewhite, C. L., Khosravi, R., Kinnison, D. E., Krinsky, C., Lambert, A., Lee, H., Lyjak, L., Loh, J., Mankin, W., Massie, S. T., McInerney, J., Moorhouse, J., Nardi, B., Packman, D., Randall, C. E., Reburn, W. J., Rudolf, W., Schwartz, M. J., Serafin, J., Stone, K. A., Torpy, B., Walker, K. A., Waterfall, A., Watkins, R. E. J., Whitney, J., Woodard, D., Young, G., Harvey, L., Hepplewhite, C. L., Khosravi, R., Kinnison, D. E., Krinsky, C., Lambert, A., Lee, H., Lyjak, L., Loh, J., Mankin, W., Massie, S. T., McInerney, J., Moorhouse, J., Nardi, B., Packman, D., Randall, C. E., Reburn, J., Rudolf, W., Schwartz, M. J., Serafin, J., Stone, K. A., Torpy, B., Walker, K. A., Waterfall, A., Watkins, R. E. J., Whitney, J., Woodard, D., Young, G., Harvey, V. L., Hepplewhite, C. L., Khosravi, R., Kinnison, D. E., Krinsky, C., Lambert, A., Lee, H., Lyjak, L., Loh, J., Mankin, W., Massie, S. T., McInerney, J., Moorhouse, J., Nardi, B., Packman, D., Randall, C. E., Reburn, W. J., Rudolf, W., Schwartz, M. J., Serafin, J., Stone, K. A., Torpy, B., Walker, K. A., Waterfall, A., Watkins, R. E. J., Whitney, J., Woodard, D., and Young, G.: High Resolution Dynamics Limb Sounder: Experiment overview, recovery, and validation of initial temperature data, J. Geophys. Res.-Atmos., 113, 1–23,, 2008. a\n\nGille, J. C., Gray, L. J., Cavanaugh, C. C., Coffey, M. T., Dean, V., Halvorson, C. M., Karol, S., Khosravi, R., Kinnison, D. E., Massie, S. T., Nardi, B., Belmonte Rivas, M., Smith, L., Torpy, B., Waterfall, A., Wright, C. J., Choi, K. Y., Coffey, M. T., Craig, C. T., Hepplewhite, C. L., Karol, S., Khosravi, R., Kinnison, D. E., Massie, S. T., Nardi, B., Belmonte Rivas, M., Smith, L., Waterfall, A., Wright, C. J., Dean, V., Halvorson, C. M., Karol, S., Khosravi, R., Kinnison, D. E., Massie, S. T., Nardi, B., Belmonte Rivas, M., Smith, L., Torpy, B., Waterfall, A., Wright, C. J., Choi, K. Y., Coffey, M. T., Craig, C. T., Hepplewhite, C. L., Karol, S., Khosravi, R., Kinnison, D. E., Massie, S. T., Nardi, B., Belmonte Rivas, M., Smith, L., Waterfall, A., and Wright, C. J.: High Resolution Dynamics Limb Sounder Data Description and Quality, version 7, Tech. rep., 2013. a, b\n\nHastie, T., Tibshirani, R., and Friedman, J.: The Elements of Statistical Learning, Springer Series in Statistics, Springer New York, New York, NY,, 2009. a\n\nHerbach, H. and Dee, D.: ECMWF Newsletter 147, Tech. rep., 2016. a\n\nHindley, N. P., Wright, C. J., Smith, N. D., and Mitchell, N. J.: The southern stratospheric gravity wave hot spot: individual waves and their momentum fluxes measured by COSMIC GPS-RO, Atmos. Chem. Phys., 15, 7797–7818,, 2015. a, b\n\nHoffmann, L. and Alexander, M. J.: Retrieval of stratospheric temperatures from Atmospheric Infrared Sounder radiance measurements for gravity wave studies, J. Geophys. Res., 114, D07105,, 2009. a\n\nHoffmann, L., Alexander, M. J., Clerbaux, C., Grimsdell, A. W., Meyer, C. I., Rößler, T., and Tournier, B.: Intercomparison of stratospheric gravity wave observations with AIRS and IASI, Atmos. Meas. Tech., 7, 4517–4537,, 2014. a\n\nHolt, L. A., Alexander, M. J., Coy, L., Molod, A., Putman, W., and Pawson, S.: Tropical Waves and the Quasi-Biennial Oscillation in a 7-km Global Climate Simulation, J. Atmos. Sci., 73, 3771–3783,, 2016. a\n\nJiang, J. H.: Upper Atmosphere Research Satellite (UARS) MLS observation of mountain waves over the Andes, J. Geophys. Res.-Atmos., 107, 8273,, 2002. a\n\nKhosravi, R., Lambert, A., Lee, H., Gille, J., Barnett, J., Francis, G., Edwards, D., Halvorson, C., Massie, S., Craig, C., Krinsky, C., McInerney, J., Stone, K., Eden, T., Nardi, B., Hepplewhite, C., Mankin, W., and Coffey, M.: Overview and characterization of retrievals of temperature, pressure, and atmospheric constituents from the High Resolution Dynamics Limb Sounder (HIRDLS) measurements, J. Geophys. Res., 114, D20304,, 2009. a\n\nKobayashi, C., Endo, H., Ota, Y., Kobayashi, S., Onoda, H., Harada, Y., Onogi, K., and Kamahori, H.: Preliminary Results of the JRA-55C, an Atmospheric Reanalysis Assimilating Conventional Observations Only, SOLA, 10, 78–82,, 2014. a\n\nKobayashi, S., Ota, Y., Harada, Y., Ebita, A., Moriya, M., Onoda, H., Onogi, K., Kamahori, H., Kobayashi, C., Endo, H., Miyaoka, K., and Takahashi, K.: The JRA-55 Reanalysis: General Specifications and Basic Characteristics, J. Meteorol. Soc. Jpn., 93, 5–48,, 2015. a\n\nKursinski, E. R., Hajj, G. A., Schofield, J. T., Linfield, R. P., and Hardy, K. R.: Observing Earth's atmosphere with radio occultation measurements using the Global Positioning System, J. Geophys. Res.-Atmos., 102, 23429–23465,, 1997. a, b\n\nNolan, D. S., Atlas, R., Bhatia, K. T., and Bucci, L. R.: Development and validation of a hurricane nature run using the joint OSSE nature run and the WRF model, J. Adv. Model. Earth Sy., 5, 382–405,, 2013. a\n\nOlsen, E. T., Fishbein, E., Granger, S., Lee, S.-Y., Manning, E., Weiler, M., Blaisdell, J., and Susskind, J.: AIRS/AMSU/HSB Version 5 Data Release User Guide, 2007. a\n\nParker, W. S.: Reanalyses and Observations: What's the Difference?, Bull. Am. Meteorol. Soc., 97, 1565–1572,, 2016. a\n\nRemsberg, E. E., Marshall, B. T., Garcia-Comas, M., Krueger, D., Lingenfelser, G. S., Martin-Torres, J., Mlynczak, M. G., Russell, J. M., Smith, A. K., Zhao, Y., Brown, C., Gordley, L. L., Lopez-Gonzalez, M. J., Lopez-Puertas, M., She, C.-Y., Taylor, M. J., and Thompson, R. E.: Assessment of the quality of the Version 1.07 temperature-versus-pressure profiles of the middle atmosphere from TIMED/SABER, J. Geophys. Res., 113, D17101,, 2008. a\n\n\nSakov, P. and Sandery, P.: An adaptive quality control procedure for data assimilation, Tellus A, 69, 1318031,, 2017. a\n\n\nTsuda, T., Lin, X., Hayashi, H., and Noersomadi: Analysis of vertical wave number spectrum of atmospheric gravity waves in the stratosphere using COSMIC GPS radio occultation data, Atmos. Meas. Tech., 4, 1627–1636,, 2011. a\n\nWright, C. J., Rivas, M. B., and Gille, J. C.: Intercomparisons of HIRDLS, COSMIC and SABER for the detection of stratospheric gravity waves, Atmos. Meas. Tech., 4, 1581–1591,, 2011. a\n\nWright, C. J., Scott, R. B., Furnival, D., Ailliot, P., and Vermet, F.: Global Observations of Ocean-Bottom Subinertial Current Dissipation, J. Phys. Oceanogr., 43, 402–417,, 2013. a\n\n\nNote that no comparison is shown between HIRDLS and ERA-5 in this or any other figure since at time of writing the ERA-5 dataset begins in 2010, 2 years after the end of HIRDLS data collection.\n\nPublications Copernicus\nShort summary\nReanalyses (RAs) are models which assimilate observations and are widely used as proxies for the true atmospheric state. Here, we resample six leading RAs using the weighting functions of four high-res satellite instruments, allowing a like-for-like comparison. We find that the RAs generally reproduce the satellite data well, except at high altitudes and in the tropics. However, we also find that the RAs more tightly correlate with each other than with observations, even those they assimilate.\nReanalyses (RAs) are models which assimilate observations and are widely used as proxies for the...", "pred_label": "__label__1", "pred_score_pos": 0.9534468650817871} {"content": "MAP - Monday, August 5th 2019\n\nMoroccan Abdelfettah Karmane Wins 'Mondial Art Academy' Prize\n\nParis - Abdelfettah Karmane, prominent figure of the Moroccan artistic creativity, won the \"Mondial Art Academy\" prize for the third year in a row for his watercolor \"Nature morte aux citrons\" (Dead nature with lemons).\n\nIn 2016, Karmane, brand representative of the Moroccan artistic creativity (plastic and pictorial), obtained the first prize of the figurative painting awarded by \"Mondial Art Academy\", with his \"Nature morte aux drapés et objets traditionnels\" (Dead nature with drapes and traditional objects\". This painter is internationally known for the quality and brilliance of his products that express an impressive and fabulous mastery of figurative representation. He won in 2018 the first prize of the very famous \"Mondial Art Academy France\", in the figurative watercolor painting category.", "pred_label": "__label__1", "pred_score_pos": 0.9998881220817566} {"content": "Essays about: \"fly ash\"\n\nShowing result 1 - 5 of 25 essays containing the words fly ash.\n\n 1. 1. Simulation of Hardening of the MahanaKhon Tower Mat Foundation\n\n University essay from KTH/Betongbyggnad\n\n Author : Zakaria Kazi-tani; [2019]\n Keywords : Hydration; MahanaKhon tower; mat foundation; young concrete; temperature development; thermal stresses; cracking; fly ash; finite element analysis; COMSOL Multiphysics; Hydratation; MahanaKhon tower; bottenplatta; ung betong; temperaturutveckling; termiska spänningar; sprickbildning; flygaska; finita elementanalys; COMSOL Multiphysics;\n\n Abstract : Cement hydration is the result of a series of simultaneous chemical reactions occurring during the production of concrete. An excessive amount of heat is generated, which consequently may give rise to thermal stresses and cause early age cracks in concrete that may affect its structural integrity, and load bearing capacity. READ MORE\n\n 2. 2. Material identification using X-ray diffraction\n\n University essay from Mittuniversitetet/Institutionen för elektronikkonstruktion\n\n Author : Linda Genetu Teggen; [2019]\n Keywords : XRD; XRF; incineration; wastemanagement; toxic elements; pollution detection; fly ash; ash; Bruker D2Phaser; DIFFRAC.EVA; chemical filter; scan file.;\n\n Abstract : This study reviews the theoretical and experimental aspects of the X-ray diffraction (XRD) technique and evaluates its use in identifying toxic elements or compounds in waste that has been incinerated. Many industries incinerate materials that contain large significant amounts of toxic elements, and these elements should be identified and re-moved to reduce environmental pollution. READ MORE\n\n 3. 3. Alternative methods to prevent thermal cracking in concrete\n\n University essay from\n\n Author : Alexander Barchin; Navid Sedighi; [2019]\n Keywords : Massive concrete structures; heat development; cement hydration; temperature reduction; cracking; fly ash; ice; coarse aggregates; cooling methods; practical tests.; Massiva betongkonstruktioner; värmeutveckling; cementhydrataion; temperaturreducering; sprickbildning; flygaska; is; grov ballast; kylningsmetoder praktiska försök.;\n\n Abstract : In the construction industry, concrete is the most common material, because of its good properties such as compressive strength and endurance. Concrete is a composition of several different materials where one of the main components is cement. When the hydration process starts, large amount of heat is generated. READ MORE\n\n 4. 4. Fatty acid composition of black soldier fly larvae : impact of the rearing substrate\n\n University essay from SLU/Dept. of Energy and Technology\n\n Author : Nils Ewald; [2018]\n Keywords : Black soldier fly; Hermetia illucens; fatty acids; omega-3 fatty acids; malondialdehyde; blue mussels; waste management;\n\n Abstract : With an increasing world population and meat consumption the black soldier fly (BSF; Hermetia illucens) shows potential as feed for animals, while recycling nutrients from food waste. To produce larvae of high quality as animal feed, further understanding is needed of how the substrate affects the nutritional composition of the larvae. READ MORE\n\n 5. 5. Study of crack width within a suspended concrete slab with different amount of cement clinker considering lower climate impact\n\n University essay from KTH/Betongbyggnad; KTH/Betongbyggnad\n\n Author : Sedige Feizi; Fateha Yasmin Khan; [2018]\n Keywords : concrete; lower climate impact; carbon dioxide emission; cement clinker; fly ash; laboratory test; slab; crack width; analytical calculation; FEM-design; betong; lägre klimatpåverkan; koldioxidutsläpp; exponering klass; cementklinker; flygaska; laboratorium; platta; sprickvidd; analytisk beräkning; FEM-design;\n\n Abstract : This master thesis investigates the possibility of using a concrete recipe with only 70 % cement clinker for a building project named Gretas Glänta, regarding the demands of cracking for a suspended slab. The requirement to fulfill was a maximum crack width of 0.2 mm due to drying shrinkage and long- term loading. READ MORE", "pred_label": "__label__1", "pred_score_pos": 0.9601778388023376} {"content": "After a long and indulgent holiday season, your body may crave healthy foods come January. And have no fear, there is a wide range of healthy snacks and new trends coming in 2019. Susana Victoria Perez has more. Buzz60\n\n\nThe most popular New Year’s resolutions for 2018 were to eat healthier and exercise more. Not necessarily a surprise, right?\n\nFor adults, it’s often difficult to stick to those healthy resolutions while working, maintaining a household and managing children.\n\nHowever, studies show, if adults resolute to healthier eating, so will the children. So why not include the entire family for your 2019 New Year’s resolution to eat together as a family, while also making meals healthier.\n\nParents and caregivers can be great role models for children when it comes to healthy habits. For younger children especially, the choices and behaviors parents exhibit regarding food and nutrition will likely have a lifelong impact.\n\nSo, the New Year is a perfect time to integrate a few easy resolutions to enhance successful eating patterns for the entire family. \n\nNo. 1: Set the example\n\nAs a parent, your decisions about food can have an impact on your children.\n\nWhen possible, choose to eat from all food groups including whole grains, vegetables, fruit, lean protein and low-fat dairy.\n\nWhen ordering out, choose baked, roasted or steamed foods over fried, while limiting portion sizes. When eating those heart healthy vegetables, make positive statements like “this salad looks delicious!” and “doesn’t this fruit smell great?”\n\nTry to avoid manipulating a child into trying something new, as this may backfire. Kids are smart!\n\nParental attitudes and behaviors at mealtime are often enough to motivate children to eat right.\n\nRemember, the goal is to create good eating habits by example. \n\nNo. 2: Drink more water\n\nChoose water.\n\nSkip the coffee, soda, soft drinks, fruit flavored beverages and sports drinks.\n\nThese drinks often have much added sugar and calories.\n\nAlways have your child take a refillable water bottle to school. Children who are regularly offered water instead of juices or sugary drinks seemingly prefer to drink water; and compared to other drink options it is also the least expensive.\n\nIt’s also important to note, water keeps the body hydrated, improves mental focus, aids digestion and is better for dental health. \n\nNo. 3: Snack wisely\n\nLimit sugar, salt and sweets. Chips, cookies and candy are very appealing snacks but are empty calories with very little nutrition.\n\nSnacks don’t necessarily need to be completely banned from your diet but should be replaced instead with healthier options like whole grain crackers and cheese; nut butter and apple slices or air-popped popcorn.\n\nSnacks which include carbohydrates, protein and fiber keep hunger satisfied longer and provide valuable nutrition. \n\nNo. 4: Eat more produce\n\nRethink fruits and vegetables as being difficult to prepare and cook.\n\nIn addition to the usual selection of produce, most grocery chains and convenience stores offer a wide variety of pre-sliced, pre-chopped and steam-in-bag options for any budget.\n\nIn fact, many of these items make the perfect start to a meal which can be ready in 15 minutes or less.\n\nFurthermore, get past the idea that fruit and vegetables can’t taste good. Start with a fruit or vegetable you like and reimagine what it can be.\n\nIf your kids like broccoli, then make broccoli tots, broccoli slaw, roasted broccoli. If you like fruit, make a fruit pizza or a fruit salad. \n\nNext, explore creative flavors by adding new ingredients to something you already favor.\n\nFor example, add red bell peppers to broccoli or kiwi to fruit salad. This will not only please your taste buds but the possibilities are endless. \n\nNo. 5: Make mealtime count\n\nPut down the electronics! Turn the television off and place your phone in another room to give undivided attention to your family.\n\nChoose one meal a day to sit down as a family to eat together.\n\nPlan a scheduled time at the table, even if its only for 15 minutes. For busy families with busy evening schedules, breakfast time may work better.\n\nFor families with young children, lunch time may be best.\n\nHaving a meal together is a great time to bond with your children and question them about their day.\n\nWhatever the meal, make it count. Children who regularly participate in meal preparation and eat with family members are more accepting of new foods and choices.\n\nYounger children can help prepare mealtime by mixing ingredients and setting the table.\n\nOlder children can help with meal planning and food preparation such as chopping vegetables.\n\nHealthier eating in the New Year can be easy and fun with these simple strategies.\n\nAbove all else, the goal is to set an example so children learn to make wise food choices for a lifetime of good health.  \n\nFor more tips and strategies for healthy eating and children, visit and\n\nPediatrics in Brevard’s Emine Comer, APRN, CPNP, is certified in pediatric primary care by the Pediatric Nurse Certification Board. Comer received both her Bachelor of Science degree in Nursing, and her Master of Science in Nursing from the University of Florida, Gainesville.\n\nRead or Share this story:", "pred_label": "__label__1", "pred_score_pos": 0.8412061333656311} {"content": "alexa BY THE BOOK: Karang’ae Chege - Daily Nation\n\nBY THE BOOK: Karang’ae Chege\n\nWednesday September 18 2019\n\nKarang’ae Chege's first published work was a Kiswahili poem titled Kibuyu Changu. PHOTO| COURTESY\n\n\n\nKarang’ae Chege's first published work was a Kiswahili poem titled Kibuyu Changu. His play, Vita vya Panzi, which won the Okoth Kobonyo play writers’ competition in the late 1990s, was staged in various theatres in Nairobi.\n\nHe also wrote for KBC Radio theatre and did voice-overs for a number of years.  \n\nHe has authored The Battle for Nyika, The Girl who Became a Monster, Lost in the Forest, Mtaka cha Mvunguni, A Night With Apes, Safari ya Mabwe andGaidi Lii. He is currently writing a sequel to Gaidi Lii.\n\n\nWhat are the three most memorable books you have read so far, and what makes them so?\n\nThe first book is Robinson Crusoe by Daniel Defoe. I read it when I was in Standard 5. It portrays a man by that name, who got shipwrecked and ended up living in an uninhabited island with a cat and a dog. I admired his freedom and determination.\n\n\n\nThe second one is The Cockroach Dance by Meja Mwangi. It vividly captures life in Kirinyaga Road and Ngara in the seventies, in the most plausible and hilarious manner.\n\n\nThen there is The Basic Principles of the Science of Mind, a book that satiates my metaphysical seeking. The author, Dr Frederick Bailed, plainly takes the reader through 12 lessons that expound on a rather complex subject of spirit, mind and body. He also explains how to do Spiritual Mind Treatment, an important tool in The Science of Mind.\n\n\nHow many books on average do you read in a year, and do you have a favourite spot where you read them from?\n\nI read 50 books on average. Internet has affected my reading because there is a lot of stuff to interact with. I usually lock myself and read, just like I do when I am writing. My family has learned to respect my privacy.\n\nOne of the author's books titled Gaidi Lii.\nOne of the author's books titled Gaidi Lii. PHOTO| COURTESY\n\nWhich is your favourite genre of books? Any reason?\n\nAlthough I am a creative writer, my most favourite genre is spirituality, new age and quantum physics.\n\nThese books simply raise my consciousness. When it comes to writing, I usually write children's fiction, and prefer reading novels.\n\nI connect well with children. I love giving back to the universe by entertaining and teaching young people.\n\n\nWhat is the size of your book collection as of now? Where do you get them from and what motivates you to?\n\nI have a thousand physical books and an equal number of e-books. I inherited some physical books from my late father, Peter Chege, a long serving teacher and headmaster.\n\nHe fancied reading, bought many books and taught us how to take care of them. Some were stolen, but I keep most of them. I buy books from bookshops and online.\n\n\nWhich are your two most treasured books and why? Would you lend them out?\n\nI treasure The Quantum Matrixby Adrian Cooper. It has authentic and scientific answers to many questions in life, ranging from God to the afterlife. I also treasure Our Ultimate Reality by Adrian Cooper. It explains in plain language the workings of the illusion called life and the purpose of humanity. I do not fear sharing or losing them since I can always get them electronically.\n\n\nIf you were to become a character from any of your books, who would you be and why?\n\nI would be Majuto in my storybooks, Safari ya Mabwe and Gaidi Lii. Majuto is a star. I like children who shine in their calling.\n\n\nIf you had the opportunity to meet three authors, dead or alive, who would they be and why?\n\nMeja Mwangi would be the first. I recognise him for his prolific and very fertile imagination. I would also like to chat with Prof Ngugi wa Thiong'o about writing in mother tongue. I would also wish to meet Mohammed S. Mohammed and chat about writing wonderful Kiswahili fiction.\n\nWhat is that one book you read that was out of your comfort zone?\n\nWuthering Heightsby Emily Brontë was out of my comfort zone owing to the sad events dominating the pages.\n\nOne of the author's books titled Lost in the\nOne of the author's books titled Lost in the Forest. PHOTO| COURTESY\n\nIf you were to recommend three books to a 10-year-old, which ones would they be and why?\n\nI would recommend my storybooks, The Battle for Nyika, The Girl who Became a Monster and A Night With Apes. They are captivating adventure stories. Moreover, I have tackled progressive themes on conservation, courage and team work.\n\n\nHave you ever had a bad commentary about your writing? What did it say and how did you deal with it?\n\nYes, getting a bad commentary is normal for all writers. My storybook, The Battle for Nyika was rejected by a certain well-known publisher. He said that the story was dreary and lethargic such that they could not put it in any of their children series.\n\nI took the book to Phoenix Publishers and the editors there were awestruck by the story. When it was published, it was immediately approved by KICD as a class reader.\n\n\nWhat are your thoughts on the reading culture of Kenyans in the face of popular culture?\n\nKenyans still read books, despite the many distractions from devices. I read somewhere that scientists have discovered that people who love books are also compassionate, intelligent and outgoing. If you visit book clubs in Nairobi and social media sites, you would realize many book lovers.\n\n\nE-books versus hard copies, what is your preference and why?\n\nBoth. The hard copy still has that wonderful smell. E-books are a portable library. I also write e-books and create platforms where people can directly buy from me. Later, all these are made available as hard copies.\n\n\nWhat was your last read and how did you find it?\n\nThe Utopian Fiascoby Wainaina Kamau and Mombasa Raha My Foot by Haroun Risa. Both books vividly capture the current social landscape and suggest an optimistic future.\n\n\nIf you weren’t an author, what would you be?\n\nI would be a reggae star. Music is an art similar to writing. Reggae is for those who advance a resistive culture and everyone who demands fairness and demolition of Babylon system. My reggae would definitely bring down the walls of Jericho. It is safe when I write stories.\n\n\nWhat piece of advice would you wish all aspiring authors to keep in mind?\n\nTo all aspiring authors, please remember that you wield the most powerful weapon with which to slay ignorance and injustice under the sun. You should, therefore, apply this weapon skilfully.", "pred_label": "__label__1", "pred_score_pos": 0.5541873574256897} {"content": "Long considered a healthy beverage and touted in ad campaigns as a drink that “does a body good,” milk can be the perfect go-to for a daily dose of dairy. However, when a glass of milk precedes uncomfortable gastrointestinal symptoms, it could be a sign of lactose intolerance. For people with this condition, milk and other dairy products may need to be deleted from the diet.\n\n“Lactose intolerance is the inability to fully digest the sugar called lactose in milk. This is caused by a deficiency of the lactase enzyme produced in your small intestine,” said Jennifer Newkirk, a licensed and registered dietitian with Renown Medical Group. “If lactose can’t be broken down correctly by your small intestine, it travels to the large intestine where it ferments, causing symptoms such as diarrhea, cramps, gas and bloating.”\n\nAccording to Newkirk, lactose intolerance typically surfaces in adulthood and is more prevalent among people of African, Asian, Hispanic and American Indian descent, as well as premature infants and people with pre-existing digestive conditions, such as celiac or Crohn’s disease.\n\nNot to be confused with a milk allergy, lactose intolerance involves issues of the digestive system rather than the immune system. Experts report that the symptoms associated with lactose intolerance can be extremely uncomfortable but, unlike the potential symptoms of a severe milk allergy, they are not typically dangerous.\n\n“Lactose intolerance differs from a milk allergy in that the allergy is an immune response to the proteins casein and whey found in dairy,” said Sarah Trinajstich, a licensed and registered dietitian with Northern Nevada Medical Center. “A milk allergy tends to present in the first year of life with [symptoms such as] a rash, wheezing, swelling of the lips and mouth, bloody stool, and projectile vomiting after feeding.\n\n“It can also cause anaphylaxis, which is a serious, life-threatening allergic reaction. Lactose intolerance is a disorder of the digestive system and symptoms are not usually life-threatening,” Trinajstich continued. “A milk allergy cannot be managed by using lactose-free products but must completely eliminate all forms of milk protein from the person’s diet.”\n\nAs far as determining whether you may be lactose intolerant, this tends to come down to a noticeable pattern of gastrointestinal issues that emerge after eating dairy products. These issues include constipation, bloating, gas, nausea, vomiting and diarrhea. The number and severity of symptoms can vary widely from one person to another, and the type and amount of dairy consumed can affect the presentation of symptoms as well.\n\n“Not all dairy products are created equal, and some contain more lactose than others. First, try experimenting with various types of dairy foods and the amount you consume to identify the main issue,” Newkirk said. “If symptoms remain, then avoiding dairy products altogether is the easiest method. Taking over-the-counter products such as Lactaid before meals with dairy foods may also help, but this does not work for everyone.”\n\nIf one’s lactose intolerance does lead to a total elimination of dairy, it’s important to find other sources of calcium to meet your daily nutritional requirements. To fill the calcium gap, Newkirk recommends foods such as broccoli, oranges, kale, spinach, collard greens, soy beans and salmon.\n\nRead or Share this story:", "pred_label": "__label__1", "pred_score_pos": 0.9626656174659729} {"content": "Dancing with the Stars in Myanmar\n\n\nManage episode 245614033 series 1537964\nKnown in the UK as Strictly Come Dancing and across the globe as Dancing with the Stars, this BBC brand is known for pairing celebrities with professional dancers, having their performances scrutinised by a panel of judges and allowing the public to vote for their favourite. This autumn the show is being created for the first time in Myanmar. What does it take to bring this format to a new audience and create the programme from scratch? The venture is the passion project of French brothers Henri and Benoit de Lorme. They’ve already brought formats like Masterchef to the country. But dancing is a very different proposition, and in Myanmar there are many cultural sensitivities to be aware of. One is around the design of the costumes, where the need to create something flamboyant which works for camera also needs to take into account local sensitivities around how much flesh can be exposed. It’s also a challenging country to work in as the media companies are still in their infancy and there are shortages of people with the necessary skills to realise these big projects. In addition there is the deadline to build the set, the process of getting the celebrities and new judges trained and the last minute cast changes. With so much to do in a short space of time, it’s going to be a challenge to get everything in place by the first broadcast. Ali Fowle follows the show as it evolves and finds out how the de Lorme brothers work together - and what legacy they plan to create. This is an updated version of the podcast - edited to correct a minor factual error.\n\n58 episodes", "pred_label": "__label__1", "pred_score_pos": 0.7051506042480469} {"content": "So you have created a new DLL that implements a set of APIs. This creates value for your system by adding important functionality.  Now you want to add the header files and libraries to your SDK.\n\nOf course you can configure your SDK to add the files, but let's add to the requirement.  The new DLL is part of your BSP, and your BSP is used by multiple OS designs.  Or, like me, you use this same code across multiple BSPs each with multiple OS designs.  So, configuring the SDK for each is a manual process, and manual processes are not idiot proof.  That means that you will probably waste time creating SDKs that don't include your important files.  Hopefully you will catch this in testing...\n\nThe following is a simple way to use the sources file and makefile.inc to add necessary files to the SDK.  This removes the manual process.\n\nLet's assume that the DLL build folder contains the following files:\n\n - MyDll.c\n - MyDll.h\n - MyDll.def\n - sources\n - Makefile\n\nFor a quick refresher:\n - Build.exe parses the sources file and passes the result to nmake which opens the makefile and follows the rules to build the dll\n - We are building this in the BSP with RELEASETYPE=PLATFORM so the dll will be put in $(_TARGETPLATROOT)\\target\\$(_CPUINDPATH), but we don't care about that for this discussion\n - We do care about the lib (MyDll.lib) file that is created.  It is put in $(_TARGETPLATROOT)\\lib\\$(_CPUINDPATH).  This lib file exposes the APIs to applications and allows for implicit linking at runtime.\n\nNow what we want to do is put MyDLL.lib and MyDll.h in the SDK.\n\nStart with the sources file:\n\n\n\nIt is pretty simple and builds MyDll.dll.  Now let's tell it to do something after it finishes building the DLL.  To do that we use WINCETARGETFILES which is used to define a target that gets built after building the target defined in the sources file.  I will name this new target \"CopySDK\".  So add the following to the sources file:\n\n\nNow, when build runs it will try to build the target CopySDK, but it doesn't have any rules for building CopySDK.  To add the rule for CopySDK, we will create a new file named makefile.inc.\n\nStart by adding the target CopySDK:\n\n\nOf course we need it to do something. Let's start by making sure that the folders exist in the OS design for the SDK.  We need both Inc and Lib folder trees\n\n\nAlmost finished, now add the following to copy all header files and the lib file to the SDK folders:\n\n        xcopy /I /D /Q *.h $(_PROJECTSDKROOT)\\Inc > nul \n\nThat is it, when you build this folder it will put the necessary files into the SDK folders so that when you roll the SDK your developer customers can take advantage of all of the work that you have done.\n\nGo to Summary of Building Windows CE\n\nCopyright © 2008 – Bruce Eitman\nAll Rights Reserved", "pred_label": "__label__1", "pred_score_pos": 0.9105718731880188} {"content": "What is Where to buy research papers?\n\nOf rd ieee international conference on computer supported cooperative work in groups of young african - american heritage p. Likewise, an interesting trend that shows him at the same way after a survey, e. G. Finding receiving organisations, together with other literature selections that correspond to whats right and whats called a papers buy where to research private cloud testbed public cloud and also to build online courses for credit. Most classical educators if they were observers of their activities both inside and outside the school tools are utilised for a deeper understanding of a large suburban public school. We can view the strength and asset development of skills and taught two sections of this guide or checklist. But punishment can also provide opportunities for developing countries. Google scholar is not merely emulate the work is critical that learners are certified when they collectively solve problems that may arise when designing, implementing, and analyzing collaboration derek we think a restatement of the landscape. Hip - hop focus away from textbooks. Epitome of what is taught and enforced, chapter - teaching guide weeks kepler. Lee, c. D. Schunn, & t. Whitehill eds.\n\npaying for a college thesis\n\nWhat is encouraged and papers research to where buy sustained a monolinguistic environment. Retrieved july,, from eaprojects hosted - pricing - examples - costsharepoint chang, v. & simila, g. B. Culture and human - computer interfaces. The teacher to create specialized scenarios where personnel are asked to make instructional modifications in real - world situation that exists in school, once again. As in fifth grade modern language or greek, to do this. Already weve got it. In the mind of open and stirs the pot. Climate change where to buy research papers and with adults and peers in the midst of the profession has no power of pull how small moves, smartly made, can set big things in different views. When the recordings are to be generally true. Berkeley. Students can learn from the mobility activity has the benefits of applying findings from those who are we. Its like being pourable as water leaves the institution if leaked or destroyed. Upper saddle river, nj merrill.\n\nWe go to school perhaps the most important factors of the region.\n\ncan you buy research papers\n\nWhere to buy research papers purchase custom research paper!\n\nDepend on papers buy to where research information provided in the discussion in the. And paying their school students musical worlds, if she is doing poojah regularly. The best schools in general. Using what is the use of men and develops a growing body of knowledge creation is brought to bear upon examination of what happens once the application form part b and annex I of this kind, e. G. For the first - grade exam administered by a graduate receives, especially when these risks and benefits will be able to effectively construct their own previous performance criterion - referenced assessment at qcgu the establishment of social relations. Oxford and new approaches to music lessons, math tutoring sessions, library visits, college classes. Writing about the new asian hemisphere. The methodology involved a randomized trial, it was difficult for students who had colonial education advocated music for children aged - years - old teacher named santonga for the lowest are those that active inquiry across formal and informal interviews in which critical reflection as process, and self - discipline to the field in which. In this case, the mean z is negative z. This is the use of pride and prejudice. Technological tools can support both groups of schools. The cambridge handbook of formative assessment. If the project nearly million people in society the united kingdom. We need not always be rearranged if another sequence suits you better. A critical - thinking universities to discover trends and innovations. For expensive domestic travel costs of the box lengths in figures.\n\nonline hw help\n\nIn g. to where buy research papers Leinhardt, k. Crowley, & k. Kotovsky eds. ; kessler, the third element in the design tasks and preparation side - by - side classes jekel. Washington, dc national center for the greater the sample size and resources that comprise the biological context, intellectual, social, political, economic and social justice. Cultural identity is unique, since cloud computing advanced when cloud providers should invest and deploy applications. It is nony - mous with rap; but while rap is hip - hop, an example of the same resources. Latw has as its own inherent security issues related to social justice, to fostering a positive vision of moving on to explain connections between the philosophical aspects of the actionable possibilities of opening up even vaster territories for details, see annex I to this pattern language, and concepts in mathematics mathematics, however, appears to be gained from the traditional learning environments, and collaborative learning contributes to classroom research entails and how does learning occur and what survives \b. . At the most valuable and practical issues around higher degree in peace and justice p. What would happen, however, if we.\n\nwill someone do my homework for me\n\nWhat irritates smith is that where to buy research papers group dynamics within the partnership. Newyork harcourt,brace. With regard to persons who cannot spend as much time on another subject area academic discipline. Simulation tools can help two people within a white papers research buy to where employee madam please, before you start the tour, faint sounds of traditional crafts; tangibles and full of nests of music. This is because they focus on assessment in higher education. P. While narrative research technique called the commodification of culture.", "pred_label": "__label__1", "pred_score_pos": 0.5245108604431152} {"content": "The Full Wiki\n\nHer Majesty's Most Honourable Privy Council: Map\n\n\nWikipedia article:\n\nMap showing all locations mentioned on Wikipedia article:\n\nHer Majesty's Most Honourable Privy Council is a body of advisors to the British Sovereign. Its members are largely senior politicians, who were or are members of either the House of Commonsmarker or House of Lordsmarker of the United Kingdom of Great Britain and Northern Ireland.\n\nThe Privy Council, the successor of the Privy Council of England, was formerly a powerful institution, but its policy decisions are now controlled by one of its committees, the Cabinet of the United Kingdom. It advises the Sovereign on the exercise of the Royal Prerogative, and issues executive orders known as Orders-in-Council and Orders of Council. Orders-in-Council make government regulations and appointments. Orders of Council are issued under the specific authority of Acts of Parliament, which delegate such matters to the Council, and are normally used to regulate public institutions. The Council advises on the issuing of Royal Charters, which grant special status to incorporated bodies and city and borough status to towns.\n\nThe Council also performs judicial functions, which are for the most part delegated to the Judicial Committeemarker. The Committee consists of senior judges appointed as Privy Counsellors: justices of the Supreme Court of the United Kingdommarker, judges of the Court of Appeal of England and Walesmarker, judges of the Court of Appeal in Northern Ireland and judges of the Inner House of the Court of Sessionmarker (the supreme civil court of Scotlandmarker). It was formerly a supreme court of appeal for the entire British Empire, and continues to hear appeals from British Overseas Territories, Sovereign Base Areas, Crown Dependencies and some Commonwealth countries.\n\n\nDuring the reigns of the Norman monarchs, the English Crown was advised by a royal court, which consisted of magnates, ecclesiastics and high officials. The body originally concerned itself with advising the Sovereign on legislation, administration and justice. Later, different bodies assuming distinct functions evolved from the court. The courts of law took over the business of dispensing justice, while Parliament became the supreme legislature of the kingdom. Nevertheless, the Council retained the power to hear legal disputes, either in the first instance or on appeal. Furthermore, laws made by the Sovereign on the advice of the Council, rather than on the advice of Parliament, were accepted as valid.\n\nPowerful Sovereigns often used the body to circumvent the courts and Parliament. For example, a committee of the Council—which later became the Court of the Star Chamber—was during the fifteenth century permitted to inflict any punishment except death, without being bound by normal court procedure. During Henry VIII's reign, the Sovereign, on the advice of the Council, was allowed to enact laws by mere proclamation. The legislative pre-eminence of Parliament was not restored until after Henry VIII's death. Though the royal Council retained legislative and judicial responsibilities, it became a primarily administrative body. The Council consisted of forty members in 1553, but the Sovereign relied on a smaller committee, which later evolved into the modern Cabinet.\n\nBy the end of the English Civil War, the monarchy, House of Lords and Privy Council were abolished. The remaining house of Parliament, the House of Commons, instituted a Council of State to execute laws and to direct administrative policy. The forty-one members of the Council were elected by the Commons; the body was headed by Oliver Cromwell, the de facto military dictator of the nation. In 1653, however, Cromwell became Lord Protector, and the Council was reduced to between thirteen and twenty-one members, all elected by the Commons. In 1657, the Commons granted Cromwell even greater powers, some of which were reminiscent of those enjoyed by monarchs. The Council became known as the Protector's Privy Council; its members were appointed by the Lord Protector, subject to Parliament's approval.\n\nIn 1659, shortly before the restoration of the monarchy, the Protector's Council was abolished. Charles II restored the royal Privy Council, but he, like previous Stuart monarchs, chose to rely on a small committee of advisers. Under George I even more power passed to this committee. It now began to meet in the absence of the Sovereign, communicating their decisions to him after the fact. Thus the Privy Council, as a whole, ceased to be a body of important confidential advisers to the Sovereign; the role passed to a committee of the Privy Council, now known as the Cabinet.\n\n\nThe Sovereign, when acting on the Council's advice, is known as the \"King-in-Council\" or \"Queen-in-Council\". The members of the Council are collectively known as \"The Lords of Her Majesty's Most Honourable Privy Council\" (sometimes \"The Lords and others of ...\"). The chief officer of the body is the Lord President of the Council, who is the fourth highest Great Officer of State, a member of the Cabinet, and normally, the Leader of either the House of Lordsmarker or the House of Commonsmarker. Another important official is the Clerk, whose signature is appended to all orders made in the Council.\n\nBoth \"Privy Counsellor\" and \"Privy Councillor\" may be correctly used to refer to a member of the Council. The former, however, is preferred by the Privy Council Office, emphasising English usage of the term \"Counsellor\" as \"one who gives counsel\", as opposed to \"one who is a member of a council.\" A Privy Counsellor is said to be \"sworn of\" the Council when he or she first joins it.\n\nThe Sovereign may appoint anyone a Privy Counsellor, but in practice appointments are made only on the advice of the Government, and generally consist only of senior members of parliament, the church and judiciary. There is no limit to the numbers sworn in as members. As of August 2008 there are 538 members. However, the members have no right to attend all meetings of the Privy Council, and only some are summoned to each meeting (in practice at the Prime Minister's discretion).\n\nMembers include the Church of England's three highest ecclesiastics—the Archbishop of Canterbury, the Archbishop of York and the Bishop of London. Senior members of the Royal Family may also be appointed—Prince Philip is a member, the most senior at present in terms of service, and is the only present member not to be appointed by the current monarch, having been appointed to the council by her father. The Private Secretary to the Sovereign is always appointed to the Council.\n\nSeveral senior judges—justices of the Supreme Court of the United Kingdommarker, judges of the Court of Appeal of England and Walesmarker, judges of the Court of Appeal in Northern Ireland and judges of the Inner House of the Court of Sessionmarker (the highest court in Scotland)—are also named to the Privy Council.\n\nThe bulk of Privy Counsellors, however, are politicians. The Prime Minister, ministers in the cabinet, and the Leader of the Opposition must be sworn to the Privy Council on appointment. Leaders of large parties in the House of Commons, First Ministers of the devolved assemblies, some senior ministers outside the cabinet, and on occasion senior Parliamentarians are appointed Privy Counsellors. As Privy Counsellors are bound by their oath to keep matters discussed at Council meetings secret, the appointment of the leaders of Opposition parties as Privy Counsellors allows the Government to share confidential information with them \"on Privy Council terms\". This usually only happens in special circumstances, such as in matters of national security. For example Tony Blair met with Leader of the Opposition Iain Duncan Smith and Leader of the Liberal Democrats Charles Kennedy on privy council terms to discuss the evidence for Iraq's weapons of mass destruction.\n\nAlthough the Privy Council is primarily a British institution, officials from some other Commonwealth realms are also appointed to the body. By 2000, the most notable instance was New Zealand, whose Prime Minister, senior politicians, Chief Justice and Court of Appeal judges were conventionally made Privy Counsellors. However, appointments of New Zealand members have since been discontinued. Until the latter part of the 20th century, the prime ministers and chief justices of Canada and Australia were also appointed to Privy Councellors. Prime Ministers of some other Commonwealth countries which retain the Queen as their sovereign continue to be sworn as Privy Counsellors.\n\nPrivy Council oath\n\nAlthough regarded by the Privy Council as an act of treason to disclose the Privy Council oath, in answer to a written parliamentary question to the President of the Council, this was stated and published for the first time; 28 July 1998.\n\nThe following oath is administered to Privy Counsellors before they take office:\n\nMembership ceases upon the dissolution of the Privy Council, which automatically occurs six months after the death of a monarch. (Formerly, until a statute to the contrary was passed during the reign of Anne, the death of a monarch brought an end to the Council immediately.) By convention, however, the Sovereign reappoints all members of the Council after its dissolution; hence, membership is, in practice, for life.\n\nThe Sovereign may however remove an individual from the Council, and individuals may choose to resign to avoid expulsion. The last individual to leave the Privy Council voluntarily was Jonathan Aitken, who left on 25 June 1997 following allegations of perjury.He was one of only three Privy Counsellors to resign in the twentieth century (the others being John Profumo, who resigned on 26 June 1963, and John Stonehouse, who resigned on 17 August 1976). The last individual to be expelled from the Council against his will was Sir Edgar Speyer, 1st Baronet, who was removed on 13 December 1921 for pro-German activities during the First World War.\n\n\nVictoria held her first Privy Council meeting on the day of her accession in 1837.\nMeetings of the Privy Council are normally held once each month wherever the Sovereign may be residing at the time. The quorum, according to the Privy Council Office, is three, though some statutes provide for other quorum (for example, section 35 of Opticians Act 1989 (c. 44) provides for a lower quorum of two).\n\nThe Sovereign attends the meeting, though his or her place may be taken by two or more Counsellors of State. Under the Regency Acts 1937 to 1953, Counsellors of State may be chosen from amongst the Sovereign's spouse and the four individuals next in the line of succession who are over 21 years of age (18 for the Heir to the Throne). Normally the Sovereign remains standing at meetings of the Privy Council, so that no other members may sit down, thereby keeping meetings short. The Lord President reads out a list of Orders to be made, and the Sovereign merely says \"Approved.\"\n\nOnly a few privy counsellors attend these regular meetings. The settled practice is that day-to-day meetings of the Council are attended by four privy counsellors, usually the Ministers responsible for the matters being approved. Unless prevented from attending, the Government Minister holding office as Lord President of the Council is usually among the privy counsellors present. Under Britain's modern conventions of parliamentary government and constitutional monarchy, every order made in Council has been drafted by a Government Department and has already been approved by the responsible Ministers—the action taken by the Queen in Council is a mere formality required for the valid adoption of the measure.\n\nFull meetings of the Privy Council are only held when the reigning Sovereign announces his or her own engagement (which last happened on 23 November 1839, in the reign of Queen Victoria); or when there is a Demise of the Crown, either by the death or abdication of the monarch. A full meeting of the Privy Council was also held on 6 February 1811, when George, Prince of Wales, took the oaths upon entering into the execution of the royal authority as Prince Regent, as required by Act of Parliament. The current statutes regulating the establishment of a Regency in the case of minority or incapacity of the Sovereign also require any Regents to take their oaths before the Privy Council.\n\nIn the case of a demise of the crown, the Privy Council—together with the Lords Spiritual, the Lords Temporal, the Lord Mayor of the City of London, the Aldermen of the City of Londonmarker and representatives of Commonwealth nations—makes a proclamation declaring the accession of the new Sovereign and receives an oath from the new monarch relating to the security of the Church of Scotlandmarker, as required by law. That special assembly of the Privy Council and others held to proclaim the accession of the new Sovereign and to receive the required statutory oath from the monarch, is known as an Accession Council. The last such meetings were held on 6 February and 8 February 1952. Given that Her present Majesty was abroad when the last Demise of the Crown took place, the Accession Council had to meet twice, once to proclaim the Sovereign (meeting of 6 February 1952), and then, after the new Queen had arrived in Britain, to receive from Her the oath required by statute (meeting of 8 February 1952).\n\n\nThe Sovereign exercises executive authority by making Orders-in-Council upon the advice of the Privy Council. Orders-in-Council, which are drafted by the government rather than by the Sovereign, are secondary legislation and are used to make government regulations and to make government appointments. Furthermore, Orders-in-Council are used to grant the Royal Assent to laws passed by the legislative authorities of British Crown dependencies.\n\nDistinct from Orders-in-Council are Orders of Council. Whilst the former are made by the Sovereign on the advice of the Privy Council, the latter are made by members of the Privy Council without the participation of the Sovereign. They are issued under the specific authority of Acts of Parliament, and are normally used to regulate public institutions.\n\nThe Sovereign, furthermore, issues Royal Charters on the advice of the Privy Council. Charters grant special status to incorporated bodies; they are used to grant city and borough status to towns, and \"chartered\" status to certain professional or educational bodies. The Privy Council therefore deals with a wide variety of matters, including university statutes, graveyards, coinage, and dates of bank holidays.\n\nThe Crown-in-Council also performs certain judicial functions. Within the United Kingdom, the Crown-in-Council hears appeals from ecclesiastical courts, the Court of Admiralty of the Cinque Ports, prize courts and the Disciplinary Committee of the Royal College of Veterinary Surgeons, appeals against schemes of the Church Commissioners and appeals under certain Acts of Parliament (e.g., the House of Commons Disqualification Act 1975). The Crown-in-Council was formerly a supreme court of appeal for the entire British Empire, however a number of Commonwealth countries have now abolished such appeals. The Privy Council does continue to hear appeals from several Commonwealth countries, from British Overseas Territories, Sovereign Base Areas and crown dependencies. The aforementioned cases are theoretically decided by the monarch in Council, but are in practice heard and decided by the Judicial Committee of the Privy Councilmarker, which consists of senior judges who are Privy Counsellors. The decision of the Committee is presented in the form of \"advice\" to the monarch, but in practice it is always followed by the Sovereign, who formally approves the recommendation of the Judicial Committee. The Judicial Committee had direct jurisdiction in cases relating to the Scotland Act 1998, the Government of Wales Act 1998 and the Northern Ireland Act 1998, but this was transferred to the new Supreme Court of the United Kingdommarker in 2009.\n\nNotable orders\n\nIn the 1960s, the Privy Council made an order to evict the 2,000 inhabitants of the 65-island Chagos Archipelagomarker in the Indian Oceanmarker, in preparation for the establishment of joint United States-United Kingdom military base on the largest outlying island Diego Garciamarker, some distant. In 2000 the High Court ruled the 1971 Immigration Ordinance preventing resettlement unlawful. In 2004, the Privy Council, under Jack Straw's tenure, overturned the ruling. In 2006 the High Court of Justicemarker found the Privy Council's decision to be unlawful. Sir Sydney Kentridge QC described the treatment of the Chagossians as \"outrageous, unlawful and a breach of accepted moral standards\". He said there was no known precedent \"for the lawful use of prerogative powers to remove or exclude an entire population of British subjects from their homes and place of birth\".\n\nThe Privy Council banned GCHQ staff from joining a trade union.\n\nThe Civil Service Order in Council 1995 allowed Ministers to appoint political advisors with management authority over Her Majesty's Civil Service.\n\nRights and privileges of members\n\nAlthough the Privy Council as a whole is \"The Most Honourable\", individual Privy Counsellors are entitled to the style \"The Right Honourable\". Peers who are also members of the Privy Council append the post-nominal letters \"PC\" to indicate membership as they are already entitled to the style \"The Right Honourable\" (in the case of barons, viscounts and earls) or other higher style (in the case of dukes and marquesses), even when they are not Privy Counsellors. For commoners, on the other hand, \"The Right Honourable\" is sufficient identification of status as a Privy Counsellor. The Earl of Mar and Kellie and the Earl of Scarbrough prefer not to be addressed as 'The Rt Hon' at all on the grounds that the prefix more properly belongs to Privy Counsellors. The Ministry of Justice takes a similar position.\n\nPrivy Counsellors are entitled to positions in the order of precedence in England and Wales. At the beginning of each new Parliament, and at the discretion of the Speaker, members of the House of Commons who are Privy Counsellors usually take the oath of allegiance before all other members except the Speaker him or herself and the Father of the House (the most senior member of the House). Often, whenever a Privy Counsellor rose to make a speech in the House of Commons at the same time as another member, the Speaker would first recognise the Privy Counsellor. This informal custom, however, was considered obsolete by 1998.\n\nAlso, only Privy Counsellors can present Royal Messages to the Houses of Parliament, and only they can signify, at the monarch's command, the royal consent to the examination of a bill affecting the rights of the Crown.\n\nPrivy Counsellors are allowed to sit on the steps to the Sovereign's Throne in the House of Lords Chamber during debates. They share this privilege with hereditary Lords who were members of the House of Lordsmarker before the reform of 1999, diocesan bishops of the Church of England (who are not yet Lords Spiritual), retired bishops who formerly sat in the House of Lords, the Dean of Westminster, Peers of Ireland, the eldest child of members of the House of Lords, the Clerk of the Crown in Chancery and the Gentleman Usher of the Black Rod.\n\nEach Privy Counsellor has the individual right of personal access to the Sovereign. Peers are considered to enjoy the same right individually; members of the House of Commons possess the right collectively. In each case, personal access may only be used to tender advice on public affairs.\n\nOther councils\n\nThe Privy Council is one of the four principal councils of the Sovereign. The other three are the courts of law, the Commune Concilium (Common Council, or Parliament) and the Magnum Concilium (Great Council, or the assembly of all the Peers of the Realm). All are still in existence, or at least have never been formally abolished, but the Magnum Concilium has not been summoned since 1640 and was considered obsolete then.\n\nSeveral other Privy Councils have advised the Sovereign. Englandmarker and Scotland (see Privy Council of Scotland) once had separate Privy Councils, but the Acts of Union 1707, which united the two countries into the Kingdom of Great Britainmarker, replaced both with a single body. Ireland, on the other hand, continued to have a separate Privy Council even after the Act of Union 1800. The Privy Council of Ireland was abolished in 1922, when the southern part of Ireland separated from the United Kingdom; it was succeeded by the Privy Council of Northern Ireland, which became dormant after the suspension of the Parliament of Northern Ireland. No further appointments were made, and fewer than ten appointees were alive as of May 2008.\n\nCanadamarker has had its own Privy Council—the Queen's Privy Council for Canada—since 1867. While the Canadian Privy Council is specifically \"for Canada\", the Privy Council discussed above is not \"for the United Kingdom\"; in order to clarify the ambiguity where necessary, the latter is referred to as the Imperial Privy Council. Equivalent organs of state in other Commonwealth realms, such as Australia and New Zealand, are called Executive Councils.\n\nSee also\n\n\n\nExternal links\n\nEmbed code: at The Full Wiki'>\n\nGot something to say? Make a comment.\nYour name\nYour email address", "pred_label": "__label__1", "pred_score_pos": 0.7339187860488892} {"content": "Bob Dylan’s journey: Drugs, suicide bid, and Nobel Prize\n\n10-25-2016 Posted in Addiction, Cocaine Addiction, Depression, Drug Abuse, Marijuana\n\nBob Dylan has become the first songwriter to win a Nobel Prize. He had also won a Pulitzer Prize in 2008 for his profound impact on popular music and American culture. The recent development of Dylan winning one of the most prestigious awards given for outstanding contribution in the field of academic, cultural, or scientific advances, has received its own share of credit and critics. Some were disappointed that the 2016 Nobel Prize in Literature did not go to an author but to a songwriter and that there were many authors who deserved it. However, many people in musical, academic, and literary committees have welcomed the decision. \n\nBorn as Robert Allen Zimmerman, Dylan (75) won the prize for creating new poetic expressions within the American song tradition. He began performing in rock-n-roll bands in high school. In 1961, he moved to New York and released his first self-titled album in 1962 following which he released a number of albums and rose to fame. In an interview in March 1966, Dylan claimed to “have kicked a severe heroin addiction habit prior to moving to New York.”\n\nHe also confessed to getting suicidal thoughts of jumping off a building or shooting himself in the head. However, in an interview in 1984, Dylan denied being hooked on drugs and that drugs had any influence on his songwriting. As per recently discovered recordings of an interview with Robert Shelton of the New York Times, Dylan confessed to being addicted to heroin in the 60s and spent $25 a day to fund his habit.\n\nThe reflection of Dylan’s addiction habit and suicidal thoughts can be seen in some of the lyrics of his songs. Some of them are:\n\n“Hey! Mr. Tambourine Man, play a song for me / I’m not sleepy and there is no place I’m going to” – Mr. Tambourine Man (1964)\n\n“Everybody must get stoned!” – Rainy Day Women (1969)\n\n“They’re spoonfeeding Casanova / To get him to feel more assured / Then­­ they’ll kill him with self-confidence / After poisoning him with words” – Desolation Row (1965)\n\nManaging drug-seeking behavior is difficult\n\nDrug addiction is characterized by drug-seeking and drug-using behavior that is difficult to control. Though the initial decision to take a drug is voluntary, repeated consumption of the drug can bring about a change in the brain structure that can interfere with one’s daily routines. Long-term drug use can affect other brain functions related to decision-making, learning, judgment, behavior and memory.\n\nAs drug addiction causes an intense drug craving, individuals find it hard to resist drugs and are prone to relapse during the recovery period. No one factor is said to be responsible for the addiction problem, in fact, a combination of various factors can act as trigger. Some of the factors are:\n\nEnvironment: An individual with a relative or a friend addicted to substances is more prone to substance addiction. Factors such as peer pressure, stress and physical abuse can also contribute to the problem.\n\nGenetics: An individual addicted to drugs is highly influenced by genetic traits. Factors such as a person’s gender and ethnicity can also influence the addiction habit.\n\nSymptoms of drug addiction depend on an individual’s genetic structure, the drug being abused and the frequency of abuse. Substance abuse can produce noticeable behavioral or physical signs, like dilated pupils, irritability, depression, and financial problems. The most common symptoms of drug use include anxiety, depression, agitation, intoxication, lethargy, aggressiveness, and violent behavior. Moreover, repeated consumption of drugs leads to increased tolerance to the drug, thereby, requiring larger quantities to produce the same effect.\n\nRecovery road map\n\nDrug use and addiction is preventable and requires a strong prevention program to educate people in schools, colleges, and communities about the harmful effects of drug use and addiction. Addiction is treatable and can be effectively managed with comprehensive recovery interventions.\n\nIf you or someone whom you know is fighting addiction, it’s time to seek professional help. Contact the 24/7 Drug Addiction Help to begin your path to sobriety and find the best outpatient drug abuse treatment centers. Call at our 24/7 helpline number 866-403-5607 or chat online to know about one of the best inpatient drug abuse treatment centers.\n\nCall Now Button", "pred_label": "__label__1", "pred_score_pos": 0.9851958751678467} {"content": "System attraction: depicting the emergent nature of software architecture\n\nArchitecture is an emergent property, and like any respectable emergent property it is hard to communicate.\n\nVisualization is the best medium I know for this purpose. However, I could not find a visualization that serves the purpose properly. There are many ways to visualize a software system, and there are many tools that do it. A common way of representing software systems is by displaying it as a graph. The graph is typically laid out to exhibit a certain desired structure such as inheritance or containment. These are great tools when looking at those aspects.\n\nHowever, in my experiment, I wanted to show structure as an emerging property rather than impose a certain view on the system. To this end, I asked myself \"where does code want to be?\". Extrapolating object-oriented principles, I wanted to let the code go both where it is needed and next to what it needs.\n\nDesigning a visualization with this purpose in mind turned out to be rather straightforward. I simply displayed all classes, methods and attributes as nodes and inheritance, containment, invocations and accesses as edges, and I used a force based layout to arrange the graph. The result is a visualization as can be seen below. I named it the System Attraction and the implementation can be found in Moose.\n\nWhat can you see here?\n\nClasses are black. Methods are red. Attributes are blue. Method containment, attribute containment, and class inheritance are gray. Invocations are red. And accesses are blue.\n\nWhile things might appear random at first, at a deeper look there is a certain order that emerges from all the entangling. You might notice that colors are not uniformly distributed throughout the space. At the center, there appears to be much agglomeration of red surrounded by blue. This seems to indicate that there exist a consolidated behavior at the center of the system. There are groups of black spots (i.e., classes) that want to be close together. Also, the blue backbone on the bottom right seems to indicate a significant aggregation of related data.\n\n\nTo get a better feeling for how systems can be different, let's compare the above example with the one below. The two systems are comparable in size, yet, they exhibit much different patterns. The second system is much stronger on state. In fact, it looks as if it's the data that drives the system, and methods are just adjacent. Furthermore, while the first system seems to have at least one strong agglomeration of behavior, the second one has multiple small ones.\n\n\nThese picture exhibit macro emergent patterns that are determined by forces in the code. For example, a method is indeed attached to its classes, but if there are many other external interactions, the method will tend to go away from its class. The visualization lets the sum of all these forces decide the shape of the system.\n\nFew visualizations offer a meaningful outcome both when applied in the large and when used in the small. System Attraction is an experiment that aims to offer value at several granularity levels.\n\nFor example, look at the picture below showing a visualization applied on one single class.\n\n\nThis class has essentially an equal amount of attributes and methods. What's more, one method seems to be particularly lonely. It's as if, it does not want to be a method at all. Guess what. Here is the code:\n\npublic void actionPerformed(ActionEvent ae) {\n // ignored\n\nLet's compare this class with another one. This class has a more classic structure with multiple methods and few attributes. The methods seem to collaborate with one another and the attribute usage is reasonably distributed throughout the methods. It looks like a tidy class with proper structure in place.\n\n\nIf you investigate the class through the lenses of a classic visualization, such as a class blueprint, you can indeed see a rather clean structure.\n\n\nLet's add to our scene a collaborator class next to the original one.\n\n\nThe class changes shape a bit. Let's add another one. The shape changes a bit more.\n\n\nNow, let's see what happens when we visualize this class together with all its provider and client classes.\n\n\nAhh, where is our class now? The tiny tidy shape cannot be seen anymore. Let us highlight our class.\n\n\nWhen placed next to its collaborators, the class changes shape dramatically. Regularity is secondary to distinct interests. For example, a group of four methods wants to be the center of everyone's attention, while some other methods want to mingle with other classes in the north.\n\nSoftware architecture is an emergent property. Clearly, this shape of the system does not reflect any traditional view on architecture. There are no model-view-controller or layer patterns to be found. Nevertheless, patters do emerge. And what is architecture if not the structure that defines the system?\n\nIndeed, when we look at the code only through a diagram that imposes a predefined structure, such as a UML diagram, we will tend to see only the defined regularities. These visualizations are not bad. They have their place precisely when it is those regularities we want to reason about. But, only being exposed to rigid shapes encourages a type of thinking that leads to the illusion of complete controllability.\n\nSystem Attraction is an exercise that offers a radically different view on a software system. By not imposing a specific structure, it enables hidden patterns to emerge.\n\nA common point of view says that architecture is only to be seen in the large. Yet, the forces embedded in the code influence the shape of the system in the small as well. Even if it is more comfortable to see a class as having a regular and controllable shape, when seen in its usage environment, the shape can morph in unexpected ways.\n\nIn our exercise we only looked at simple code elements such as classes and methods and standard interactions such as inheritance and invocations. We completely ignored technology specific details. And we completely ignored the social behavior around the software system. Even so, the experiment shows that software architecture is driven by interaction and it never is single minded. Only by acknowledging the underlying forces in a software system can you handle them appropriately.\n\nIs this the right view for acting on a software system? Likely not. But, the goal of the exercise is to help communicate the emergent nature of software architecture. Why is it important to communicate it? Because we need to move from a controlling model towards a distributed one in which everyone is empowered to contribute.\n\nPosted by Tudor Girba at 3 October 2013, 11:22 pm with tags moose, assessment, daily link", "pred_label": "__label__1", "pred_score_pos": 0.7979961037635803} {"content": "Ask LibreOffice - RSS feed and answers for LibreOfficeenMon, 28 Nov 2016 16:54:11 +0100average of sums's say I have some data on columns B through E that I want to average as follows: - for each row: sum the four columns - then take the average such sum Do I *have* to get another column for the sum and then take the average of that column or is there a more direct approach? Because pulling ``=SUM(...)`` down ``500'000`` rows **does** take a while. DiesNutsMon, 28 Nov 2016 16:54:11 +0100", "pred_label": "__label__1", "pred_score_pos": 0.9985347986221313} {"content": "Since the end of the Cold War, European security institutions have pursued the dream of a “Europe whole and free,” in which security is indivisible—the security of each state in the region is linked to the security of every other; comprehensive—the politico-military, economic, environmental, and human dimensions of security are complementary, interconnected, and interdependent; and cooperative—security is achieved through cooperation among the region’s states and organizations. Russia has taken a consistent, long-term approach to those principles, emphasizing the hard security it desired while minimizing the dimension of human rights and democratic governance. It developed a playbook for its approach, one that worked in the 1990s.  Russia has challenged the liberal international order, but has kept its basic playbook for European security. Analyzing how this happened can shed light on the problems faced today and help to evaluate opportunities for practical measures that might shore up transparency and confidence building during what appears to be another long period of adversity.\n\nForging the Link: Hard Security and Democratic Governance\n\nThe concept of comprehensive security was enshrined in the 1975 Helsinki Final Act, which explicitly linked hard security to human rights.1 The linkage grew stronger with time: on November 19, 1990, twenty-two countries—members of the North Atlantic Treaty Organization (NATO) and Warsaw Pact—signed the Conventional Forces in Europe Treaty (CFE) in Paris. That same day, those nations and their neutral neighbors adopted the Charter of Paris at the second summit of the Conference on Security and Co-operation (CSCE). The charter further linked security to “democracy as the only system of government of our nations” and established the Office of Democratic Institutions and Human Rights and the Joint Consultative Group (charged with facilitating implementation of the CFE).\n\nPhilip Remler\nPhilip Remler is a nonresident scholar at the Carnegie Endowment for International Peace.\nMore >\n\nIn 1999, at the sixth summit—by which point the CSCE had been renamed the OSCE (replacing “conference” with “organization”)2—heads of state and government adopted both an Adapted CFE Treaty and the Istanbul Charter for European Security, which featured military and human dimension principles.3 Later, in 2002, the OSCE created the Open Skies Consultative Commission to help implement the Open Skies Treaty.\n\nThe OSCE thus became a nexus for the Western-led order, which promoted rules-based political and security behavior in the international sphere and liberal democratic governance in the domestic sphere. However, the linkage of hard security with liberal democracy challenged autocratic states, which wanted the former without the latter. Unfortunately for them, after World War II, only the liberal democratic idea had legitimacy in the eyes of many of the world’s peoples—to the extent that dictatorships were forced to include the word “democratic” in their names (for example, the German Democratic Republic and the Democratic People’s Republic of Korea). \n\nIt is not surprising, then, that as the Russian state has grown more autocratic at home since the end of the 1990s, it has been challenging both the rules-based international order and that order’s adherence to liberal democracy. This trend culminated in its 2014 seizure and annexation of Crimea and military intervention in eastern Ukraine. In the human dimension, Russia struck alliances of convenience with autocratic and ultra-right forces in other countries, buttressed by a shared profession of “traditional” values (held up as an alternative to the “decadent” democratic West). Russia causes further concern by its use of digital platforms to undermine democratic forms of government and rules-based multilateral structures. Most recently, Russian President Vladimir Putin stated that “the liberal idea has become obsolete.”4\n\nThis is nothing new. The Soviet Union did not subscribe to democratic governance or universal human rights and, from the beginning, sought to deemphasize the human dimension; post-Soviet Russia has done the same. Facing the need to develop an approach to the linkage of hard security and democracy in the international order, Russia developed a new playbook to deal with the OSCE, its related bodies, and the security treaties and agreements undertaken by its participating states. This approach involves limited cooperation on sensitive issues such protracted conflicts, while fighting a rearguard action on the human dimension. But Russia’s approach is no longer working. Use of the playbook—particularly to deal with the annexation of Crimea and other recent actions in Ukraine—has severely isolated Russia, representing a significant threat to the viability of multilateral approaches to European security and to vital fora such as the OSCE.\n\nLaying the Groundwork for an International Order\n\nAdoption of the Helsinki Final Act represented a long-sought victory for the Soviets: it reinforced the West’s recognition of the borders the Soviet Union had established in Central and Eastern Europe, and it implicitly recognized the Soviet sphere of influence.5 In return, the Soviet Union recognized that human rights within its borders and those of its Warsaw Pact allies could be a legitimate focus for all signatories—that human rights violations anywhere are a concern for all. Privately, then general secretary Leonid Brezhnev maintained that the acceptance of Helsinki’s human rights articles was redemption for the 1968 Soviet invasion of Czechoslovakia.6 Nonetheless, the Soviets bristled when the West used the CSCE as a platform for human rights criticism. The Soviet Union preferred the CSCE to concentrate on the security “basket” of issues. \n\nWhen the Soviet Union collapsed, most of its successor states viewed CSCE participation, along with United Nations (UN) membership, as affirmation of their independence, and they sought it eagerly. Russia, however, believed for a brief period that the CSCE could be something more: an organization that could supersede NATO to become the forum for all security issues in Europe. In that scenario, Russia could have a greater say and perhaps even a veto, since the CSCE operated by consensus.7 But this hope was dashed by the realities of German reunification, which provoked trepidation among the leaders of Britain, France, Poland, and others. They remembered the dictum of Lord Ismay, NATO’s first secretary general—that NATO existed “to keep the Russians out, the Americans in, and the Germans down”—and wanted continued U.S. commitment to NATO to ensure the good intentions of a newly enlarged Germany. NATO’s continued existence eventually gave rise to a Russian narrative that accused the United States of sacrificing the CSCE’s potential for real European concord on the altar of old-fashioned Cold War thinking.8\n\nIn the early 1990s, a security function of the CSCE made it worthwhile for Russia to accept the security-governance linkage: dealing with the series of small wars that erupted during the collapse of the Soviet Union, including the secessionist wars of Karabakh (Azerbaijan), South Ossetia (Georgia), Abkhazia (Georgia), Transdniestria (Moldova), and Chechnya (Russian Federation). With the exception of Chechnya, these were not wars for independence, as later portrayed. Rather, they were struggles to be part of polities other than the ones to which Soviet (and later international) law assigned them. Karabakh wanted to join the Armenian Soviet Socialist Republic; and Abkhazia, South Ossetia, and Transdniestria, fearful of the rise of Georgian nationalism and Moldovan/Romanian unionism, wanted to remain inside the Soviet Union while the union republics of which they were part sought to leave. For this reason, the Soviet military and security services supported the Abkhaz, Ossetians, and Transdniestrians as part of their efforts to keep the union together in its final years. When the collapse of the Soviet Union made annexation of the separatists an untenable position in international law, the secessionists switched their stated goal to independence. However, the initial goals of the separatists and their backers—uniting Karabakh with Armenia and Abkhazia, South Ossetia, and Transdniestria with Russia—never completely disappeared.\n\nRussia’s position toward these conflicts was therefore delicate and appeared from the outside to be contradictory. In the 1990s, Russia, like the Soviet state before it, remained the patron of Abkhazia, South Ossetia, and Transdniestria, tacitly guaranteeing their security and demonstrating this by stationing troops in all three places. At the same time, Russia participated as a nominally neutral mediator in international efforts to resolve all the conflicts. This included the Karabakh conflict, in which Russia was not the principal patron of the separatists but instead had deep and enduring interests with both Armenia and Azerbaijan. These included not only state interests but also the mercenary interests of the Russian military. The UN was the principal negotiating forum for the Abkhazia conflict, and it maintained a militarized but unarmed observer mission to monitor Russia’s peacekeeping operation there. The OSCE took an auxiliary role in Abkhazia but was the principal forum for mediating the Karabakh, South Ossetia, and Transdniestria conflicts. \n\nRussia’s positions on these conflicts were complicated by its war against separatists in Chechnya, which began covertly in early 1994 but then burst into an open and bloody conflict by the end of the year. Further complicating matters, some North Caucasus fighters from the Russian Federation fought on the Abkhaz side against Georgia, with Moscow’s encouragement, but later fought against Moscow in Chechnya. Most notorious of these fighters was Shamil Basayev, who topped Russia’s terrorist list until his death in 2006. In this difficult situation, Russia approved the April 1995 deployment to Chechnya of an OSCE Assistance Group, which developed into a platform for negotiations between Moscow and the rebels.\n\nOver time, Russia developed a playbook to manage what became protracted conflicts—a playbook in which the OSCE played a significant role. Russia’s goal was to ensure that:\n\n 1. the conflicts did not revert into hot wars against Russia’s desires;\n 2. Russia could continue supporting secessionists while playing a mediation role in the settlement process, thus ensuring Russia’s paramount importance to (and enhanced influence on) both sides; and\n 3. no settlement, whether comprehensive or interim, could prejudice the composite interests of Russia’s state, clans, and/or institutional groupings.\n\nIn Russia’s playbook, the OSCE was a neutral platform to cooperate with the West while pursuing goals that Russia did not share with the West. An astute Russian commentator remarked on “the fundamental difference between the approaches of the Russian Federation and the West to conflicts (‘freezing’ as a priority option for Moscow, and intervention to ensure its ‘settlement’ as the foundation for the approach of the U.S. and the EU).” Key to Russia’s playbook were its peacekeeping operations for Abkhazia, South Ossetia, and Transdniestria, which ensured that Russia could freeze the conflicts in an unresolved state. Keeping them alive but frozen achieved the three goals outlined above. Russia began to hand out large numbers of passports in the separatist areas, producing Russian citizens on whose behalf Russia claimed the right to intervene (Russia has recently extended this “passportization” process to separatists in Ukraine).9 The net result was that Russia could exert maximum leverage on both the separatists and the states party to the conflict (including Armenia, in the case of Karabakh) and could also minimize rivalries and territorial claims that complicated and endangered Russia’s delicate position in its own North Caucasus (for example, the Chechen/Ingush irredentist claims against North Ossetia and Dagestan peoples such as the Avars and Laks).10 Participation in the OSCE’s mediation processes as presumed neutrals helped Russia manage these disparate but vital interests.\n\nThat is not to say that all OSCE participating countries viewed Russia’s activities with equanimity; even some states close to or allied with Russia were wary. Informal policies kept Russian participation in the OSCE’s Conflict Prevention Center and field presences to a minimum. \n\nMeanwhile, on the wider security front, Russia’s influence was declining internationally and its armed forces were deteriorating. Thus, in 1999, despite president Boris Yeltsin’s resentment of the NATO bombing of Yugoslavia, Russia made extensive unilateral commitments at the sixth OSCE summit, including to withdraw troops from Georgia and Moldova. He knew that without those commitments, the Adapted CFE Treaty would stand no chance of being signed by the Western states. In the following years, however, it became increasingly clear that, owing to changing international and domestic political conditions, the Adapted CFE Treaty would not be signed by the Baltics (a key Russian goal for the adapted treaty) or ratified by the United States.\n\nIn addition, NATO continued to accept new members. This was in strict accordance with the language adopted by all OSCE participants, including Russia, in the Istanbul Charter for European Security:\n\nEach participating State has an equal right to security. We reaffirm the inherent right of each and every participating State to be free to choose or change its security arrangements, including treaties of alliance, as they evolve. Each State also has the right to neutrality. Each participating State will respect the rights of all others in these regards. They will not strengthen their security at the expense of the security of other States. Within the OSCE no State, group of States or organization can have any pre-eminent responsibility for maintaining peace and stability in the OSCE area or can consider any part of the OSCE area as its sphere of influence.\n\nHowever, Russia has claimed that NATO accession by the previous Warsaw Pact members amounted to “strengthen[ing] their security at the expense of the security of other States,” namely Russia. This is an issue on which Russia and the West have continued to be diametrically opposed and which led to the Georgia war in 2008. With Putin’s return to the presidency in 2012, Russia began applying analogous thinking to European Union (EU) accession as well, leading to the Ukraine crisis of 2013–2014.\n\nSince Russia’s main goals for the Adapted CFE Treaty, including Baltic treaty accession, could no longer be met—nor could the CFE or Adapted CFE guarantee Russian security by stopping the enlargement of NATO—its interest in conventional arms control waned. In November 2004, Russia announced in the Joint Consultative Group that its troop withdrawals from Moldova and Georgia were complete (though Western states pointed out that Russian troops remained in both). In December 2007, Russia announced that it was suspending compliance with the CFE. In March 2015, Russia suspended its participation in the Joint Consultative Group. Hard security and arms control were the main reasons Moscow accepted the international order laid out in the Helsinki Act, Charter of Paris, and OSCE. As arms control faded, so did Russia’s reasons for committing to the order.\n\nRussia continued to push back against Western human rights criticism. In particular, the OSCE’s Office for Democratic Institutions and Human Rights (ODIHR) became a focus of Russian ire. The office, headquartered in Warsaw, monitors the national elections of all OSCE states but pays extra attention to countries formerly governed by authoritarian regimes. It found plenty to criticize in its reports on Russia and its friends and allies. ODIHR also holds an annual Human Dimension Implementation Meeting, which is heavily attended by human rights nongovernmental organizations. The meetings have developed into celebrations of Central Europe’s newly regained liberties and condemnations of human rights abuses by autocratic regimes further east. ODIHR’s efforts have clearly irritated Putin. In his well-known 2007 speech at the Munich Security Conference, he called the OSCE “a vulgar instrument designed to promote the foreign policy interests of one or a group of countries.”11\n\nTo be sure, Russia did not view all OSCE institutions negatively. The High Commissioner on National Minorities (HCNM) consistently monitored and spoke out about the rights of Russian-speaking minorities in Estonia, Latvia, and Lithuania. All three countries adopted restrictive citizenship laws after gaining independence, resulting in a large number of stateless permanent residents whose families had settled in these republics during Soviet times. Promoting the status of the Russian language, and of an implicit Russian right to speak for a loosely defined group of “Russian speakers,” has been a mainstay of Russian foreign policy not only in the Baltics but also throughout the former Soviet Union. The HCNM’s monitoring was therefore welcome to Russia, as were the efforts of two other OSCE institutions: the Representative to the Latvian-Russian Joint Commission on Military Pensioners and the Representative to the Estonian Expert Commission on Military Pensioners. Both dealt with claims of Soviet military veterans residing in those countries. As a marker of its importance to Russia, the Latvian-Russian commission still serves, although there has not been a claim by a pensioner since 2008 and the commission has not met since 2013.12\n\nStorm Clouds Gather\n\nAn important inflection point in Russia’s ambiguous attitude toward the multilateral cooperative security system came with the 2008 Georgia war. Tensions had been rising since late 2003, when Mikheil Saakashvili replaced Eduard Shevardnadze as the president of Georgia. The colorful and ambitious Saakashvili gained power by activating the Zviadists (supporters of Georgia’s ultra-nationalist first president); they had loathed Shevardnadze, who had marginalized them from electoral politics. With the ascent of nationalists, Georgia employed harsher rhetoric against Russia. And, in turn, Russia imposed punitive economic measures on Georgia, such as bans on imports and direct flights; harassed Georgians inside Russia; and began preparations for a military intervention. \n\nIn the aftermath of the August 2008 war, Western attitudes toward the Russian invasion were mixed. Western leaders decried Russia’s invasion of Georgia and seizure of territory but also believed that Saakashvili’s erratic behavior was partly to blame. Nevertheless, the war doomed Russian president Dmitry Medvedev’s proposed European Security Treaty, which he hoped would give Russia a greater say in security issues throughout Europe. In June 2009, the OSCE responded to Medvedev’s proposal by creating the Corfu Process to discuss it. The goal was to ensure that the OSCE remained a serious forum for dialogue between Russia and the West—especially as the other possible forum, the NATO-Russia Council, was mainly being used by the ultra-nationalist Russian envoy, Dmitry Rogozin, to vent his grievances against the West. The Corfu Process helped to keep the door open for dialogue, but other OSCE states were not interested in Medvedev’s goal of increasing Russia’s say in Europe’s security. Both the European Security Treaty and the Corfu Process died slow deaths. \n\nRussia continued, however, to employ its playbook in dealing with protracted conflicts. That included an anomalous sustained drive by Medvedev to resolve the Karabakh conflict, in which Russia was a neutral mediator but had enormous interests on both sides. From 2008 until he left office, Medvedev personally invested in the negotiations between Azerbaijani President Ilham Aliyev and then Armenian president Serzh Sargsyan. The OSCE Minsk Group co-chairs, comprised since 1997 of Russia, France, and the United States, became for the duration of Medvedev’s initiative a Russian-led process, with the acquiescence of both France and the United States. Medvedev gave up a number of long-held aims to assume this leadership, including Russia’s desire to employ its own peacekeeping operation in the conflict zone (a goal Russia had pursued since the early 1990s).\n\nDespite the OSCE’s usefulness in maintaining dialogue and managing conflict, Russian resentment of the organization’s work on the human dimension “basket” of issues, as an embodiment of the linkage between security and democratic governance, continued at full strength. ODIHR’s criticisms of Russia’s shortcomings in democratic governance and human rights continued to call into question the legitimacy of a state increasingly suspicious of those ideals. In return, by 2010, Andrey Kelin, then the Russian permanent representative to the OSCE, was castigating the OSCE’s “practice of double standards; thematic and geographic distortions: attempts to use the OSCE’s institutions to mechanically implant neoliberal democratic models in post-Soviet and other countries outside NATO and the EU, without taking into account their national characteristics, civilizations and cultures.”13 In these and similar statements, Russia was giving voice to the resentments of autocratic regimes elsewhere in the OSCE region. These regimes were shaken by the democratic “color revolutions” in former Soviet republics and later by the Arab Spring and the 2013 Euromaidan in Ukraine. And like Russia, they believed that human rights as a concept was a sham designed to promote Western control and that nongovernmental organizations advocating that concept were a fifth column built solely to implement that control.\n\nCrimea and Isolation\n\nThe sequence of events leading to Russia’s annexation of Crimea and its military intervention in eastern Ukraine is well-known but not perceived the same in Russia and the West. As a Russian scholar has pointed out, the East and West “do not share a common baseline of facts,” much less an agreement on how to interpret them.14 To the West, the phrasing “Russia’s annexation of Crimea” and “its military intervention in eastern Ukraine” reflect an indisputable set of facts, but to Russia, these descriptions are vicious slander. These vastly different perspectives have clear consequences for discussions in multilateral fora such as the OSCE, where virtually all participating states other than Russia share the West’s baseline of facts.\n\nAt the same time, the OSCE has played a central role in international peacemaking efforts in Ukraine, and its efforts have, paradoxically, improved Russia’s view of the organization. The OSCE has become the institutional underpinning of the Normandy Format, the Trilateral Contact Group, and the Minsk Protocol. The OSCE Special Monitoring Mission to Ukraine (SMM) and the OSCE Observer Mission at the Russian Checkpoints Gukovo and Donetsk have helped to keep the fighting in eastern Ukraine from getting out of hand—in other words, they fit into the existing Russian playbook for managing and “freezing” protracted conflicts. The SMM is not deployed in Crimea; this was the price for Russian acceptance of the mission, ensuring that the OSCE would not be involved in monitoring what the West considers to be Russia’s most blatant violation of international law. As a Russian observer points out, under current operating constraints, the SMM cannot establish a universally accepted baseline of facts, and neither can the checkpoint observer mission, which is confined to only 1 kilometer of the 400 kilometer border that Russia shares with the Donetsk and Luhansk separatists.15\n\nOSCE efforts in Ukraine have generally earned positive reviews from Russian writers. Andrey Kelin—who, as noted earlier, denounced the OSCE for hypocrisy and neo-imperialism—declared in 2015 that “the OSCE is now working the way it always should have.”16 Russia’s closest observer of the OSCE, Andrei Zagorski, praised the “remarkable role” that OSCE Chairperson-in-Office Didier Burkhalter (Switzerland) played in 2014.17\n\nBut attempts to protract and manage the conflict in Ukraine, including the annexation of Crimea, ended up overstraining the mechanism that served Russia so well in the past. The OSCE remains the only platform for sustained, formal dialogue between Russia and the West, but Russia’s adamant denials on Ukraine—and especially its insistence that Crimea is a closed case—have made all dialogue problematic. The West still firmly believes that Russia has engaged in a process of crude territorial conquest, going against the universal border settlement that underlies the entire Helsinki agreement. As one Western official put it, “Russia is signaling the intention to create a ‘new normal,’” and it “behaves as a typical post-hegemon, using [the OSCE] as an instrument to secure its interests. There is space for interaction and recognizing agreed rules to the extent that they meet [Russia’s] own interests.”18\n\nThe West’s reaction to this perceived behavior has been to isolate Russia in the OSCE. Even Russia’s closest allies, such as Belarus and Kazakhstan, do not defend Russia from Western criticism. Armenia does, but only sporadically. Russia has assumed a defensive position, and its officials in Vienna now grimly recite the adage repeated by Putin: “Russia has only two allies: its army and navy.” Aside from the SMM in Ukraine, Russia appears to be focused on two areas: the “integration of integrations” and the OSCE Structured Dialogue. \n\nBelarusian President Alexander Lukashenko first introduced the concept of integration of integrations in a 2011 article. It emanated from Putin’s announcement of the creation of a Single Economic Space (later named the Eurasian Economic Union or EEU), which would establish a common market for Russia, Belarus, and Kazakhstan. Putin called various integration projects, such as the EU and the new Eurasian market, the building blocks of a new European security and economic space.\n\nIn 2015, then Russian deputy foreign minister Alexey Meshkov elaborated on the concept, stating that it means cooperation between the EEU and the EU on economic matters and between European and Eurasian security structures (including the OSCE and the Russian-led Collective Security Treaty Organization) on European security matters.19 Westerners in both the EU and OSCE dismissed this idea as an attempt to create a “Russian-led Camp” whose members possessed joint institutions that could be considered equal to those of a “Western Camp,” despite the lack of capacity in the Russian-led institutions.20 Westerners view these institutions as little more than vehicles for Russian hegemonic ambitions and treat the concept of integration of integrations with suspicion.\n\nIn the absence of another suitable forum, the OSCE Structured Dialogue was launched in December 2016 to discuss concerns surrounding arms control, military exercises, and military encounters. Russia takes the Structured Dialogue seriously, sending senior officials from Moscow to participate. But the Structured Dialogue is hampered by lack of agreement on its goals, including among Western countries. For the Germans who proposed the dialogue, and the “Like-Minded Group” supporting them, the purpose is to lay the groundwork for a quick transition from incident prevention and confidence-building measures—of the sort embodied in the OSCE Vienna Document (VDOC)—to a new, full-blown arms control agreement regulating conventional forces in Europe. The agreement would replace both the original CFE (from which Russia withdrew) and the Adapted CFE (which the United States and some other countries did not ratify). \n\nThe United States and some other NATO states reject the idea of a new conventional arms treaty as part of their policy of “no business as usual” with Russia in the wake of its annexation of Crimea and support for separatism in Ukraine. In their view, Russia is not in a position to make credible guarantees on respect for international borders. In addition, practical, on-the-ground application of such a treaty would be problematic as long as Russia maintains that Crimea and its surrounding waters are Russian territory and that it has no military forces in the Donbass that might come under the treaty’s purview. The United States and its supporters still favor the type of incident prevention and confidence-building measures embodied in the VDOC, but they call for its modernization. Updates would include sharing more information on new weapons systems and military exercises. \n\nRussia agrees with the Like-Minded Group that a new CFE Treaty is needed, but rejects incident prevention and confidence-building measures, which it fears would put Russia at a disadvantage in light of NATO’s military strength. In 2016, Russia blocked the regularly scheduled revision of the VDOC, stating, “We can envisage prospects for the modernization of the Vienna Document 2011 only if the North Atlantic Alliance abandons its policy of containment of Russia, recognizes and respects Russian interests, and restores normal relations with the Russian Federation, including in the military sphere.”\n\nFurther obscuring the issue, both Russia and the United States say they support “risk reduction” while defining the term in opposite ways. To the United States, it means incident prevention and confidence-building measures, while to Russia, it means an arms control agreement, if recent discussions in OSCE fora are any guide. OSCE officials have admitted that the Structured Dialogue cannot be continued much longer if such basic disconnects cannot be resolved.\n\nMoving Forward\n\nRussia’s long-time playbook for multilateral conflict management in Europe, including via the OSCE, no longer works. Crimea has made it impossible to continue as before. Although Russia will never acknowledge that fact publicly, it will, or has, surely come to this conclusion privately. The question now becomes how to break the stalemate and restore the value of multilateralism. Any progress on the issues themselves can come only after this first step.\n\nWith the continued paralysis of the NATO-Russia Council and the suspension of a high-level political dialogue between Russia and the EU, it is fair to say that the OSCE is currently the only active platform for East-West dialogue.21 But dialogue between Russia and the West at the OSCE has stagnated. The West lectures Russia about international law, which Russia views as hypocritical, and Russia maintains a fortress mentality that is geared toward domestic political consumption.\n\nA sustainable, effective dialogue can only be restarted if both sides tone down the rhetoric, agree not to lecture one another, and compartmentalize major demands (on the understanding that they are not dropping those demands). The process should start with an agreement to talk about specific, circumscribed topics that cannot be highly politicized, setting modest goals. There is good precedent for compartmentalization. Former U.S. president Richard Nixon and Brezhnev signed the Anti-Ballistic Missile Treaty in 1972 and negotiated in the SALT talks while the Soviets were fighting a proxy war against the United States in Vietnam. Former U.S. president Ronald Reagan and former general secretary Mikhail Gorbachev signed the Intermediate-Range Nuclear Forces Treaty and negotiated the Strategic Arms Reduction Treaty while the United States was fighting a proxy war against the Soviet Union in Afghanistan. Compartmentalization is difficult, but the OSCE and neutral states can help. If non-NATO states, such as Austria, Finland, or Switzerland, are looking for roles to play—whether within the Structured Dialogue or on the margins—a productive starting point might be to try to broker a gentlemen’s agreement on compartmentalization.\n\n\n1 The Act was adopted by thirty-five states at the first summit of the CSCE, a forum created in the early 1970s to facilitate negotiations between the East and West. Both the Act and the CSCE, which represented the political process that gave it birth, played fundamental roles in increased cooperation between Eastern and Western Europe and in the establishment of a network of treaties and their governing institutions embodying the comprehensive security concept.\n\n2 The OSCE became a permanent organization during the fourth summit in December 1994. The name change reflected its expanding institutional and operational functions.\n\n3 The CFE was adapted in response to the end of the Warsaw Pact and the NATO accession of ex-Soviet bloc countries.\n\n4 Lionel Barber and Henry Foy, “The Liberal Idea Has Become Obsolete,” Financial Times, June 28, 2019,\n\n5 West Germany agreed in 1970 that the Oder-Neisse line (the Soviet-imposed border between East Germany and Poland) could not be changed by force. The United States, which earlier refused to recognize East Germany’s existence, opened an embassy in East Berlin in 1974.\n\n6 Author interview with Russian official, 2019.\n\n7 William Hill, No Place for Russia: European Security Institutions Since 1989 (New York: Columbia University Press, 2018), 90–91.\n\n8 Christian Nünlist (principal author), Juhana Aunesluoma, and Benno Zogg, “The Road to the Charter of Paris: Historical Narratives and Lessons for the OSCE Today,” OSCE Network of Think Tanks and Academic Institutions, Vienna, December 2017, 17–23,\n\n9 “Passportization” was a byproduct of wider citizenship issues. As the Soviet Union collapsed, Germany and Romania began offering citizenship to ethnic kin. By 1992, Russia was offering passports to residents of newly independent states who could not receive citizenship in their country of residence. Passportization was selective. For example, South Ossetians could receive Russian passports, but only if they lived in South Ossetia when they applied; Ossetian refugees residing in Russia were not eligible.\n\n10 After Stalin deported the Ingush along with the Chechens in 1944, the Prigorodnyy district of the Checheno-Ingush Autonomous Soviet Socialist Republic (ASSR) was transferred to the North Ossetian ASSR. Tensions developed as many Ingush tried to return from exile after de-Stalinization, and the two sides fought a small war as the Soviet Union was collapsing, leaving displaced persons in camps for decades. Though nominally Islamist, the September 1, 2004, terrorist attack on a school in Beslan, North Ossetia, was carried out by Chechen and Ingush fighters, and many of the Ossetian victims were Muslims.\n\n11 Frank Evers, “In Retrospect: Points for Dialogue with Russia in the OSCE Context: \n\nConclusions from Russian Scientific Periodicals, 2010–2015,” CORE Working Paper 31, Centre for OSCE Research at the Institute for Peace Research and Security Policy, University of Hamburg, May 2018, 5. \n\n12 The Estonian commission was terminated in 2006.\n\n13 Andrey Kelin, “Russia and the OSCE,” Russia in International Affairs 1 (2013): 89, quoted in Evers, “In Retrospect: Points for Dialogue with Russia in the OSCE Context: Conclusions from Russian Scientific Periodicals, 2010–2015,” 6.\n\n14 Personal interview, 2014.\n\n15 Andrei Zagorski, “The OSCE and the Ukraine Crisis,” in Russia: Arms Control, Disarmament and International Security:  IMEMO Supplement to the Russian Edition of the SIPRI Yearbook 2014, eds. Alexey Arbatov and Sergey Oznobishchev (Moscow: Institute of World Economy and International Relations, Russian Academy of Sciences (IMEMO RAN), 2015), 57–60,\n\n16 Andrey Kelin, “ОБСЕ Наконец-то работает так, как должна была работать всегда” [The OSCE Is Finally Working the Way It Always Should Have], 2015 interview in Индекс Безопасности 3, 114 (2015): 17–21,\n\n17 Zagorski, “The OSCE and the Ukraine Crisis,” 50.\n\n18 Personal interview, February 2019.\n\n19 Alexey Meshkov, “Russia and Europe: What Next?” International Affairs 6 (2015): 45. For a discussion of Russia’s belief in the distinction between “sovereign” and “dependent” states; the spheres of influence or “camps” this implies; and the idea of a “concert,” dominated by great powers, to make important international decisions, see Bobo Lo, Russia and the New World Disorder (Washington, DC, and London: Brookings Institution and Chatham House, 2015), 40.\n\n20 For example, according to one OSCE official, Russia pushed the OSCE to cooperate with the Collective Security Treaty Organization (CSTO) and the Shanghai Cooperation Organization (SCO) on transnational threats. But when the OSCE asked the CSTO to co-sponsor a one-day workshop on counterterrorism, the CSTO was bewildered, as it did not have the funds, staff, or infrastructure to participate.\n\n21 Andrei Zagorski, “Russian Views of the OSCE and the 2016 German Chairmanship,” Security and Human Rights 26, 1 (2015): 29.", "pred_label": "__label__1", "pred_score_pos": 0.6245514154434204} {"content": "\nPulmonary edema is the buildup of fluid in the within these air sacs leading to shortness of breath. Located in the lungs are thousands of air sacs (alveoli) which are small balloon-like structures where the exchange of carbon dioxide and oxygen occurs. Tiny capillaries surround the alveoli on the outside. When the cat breathes in, air enters the lungs, causing the alveoli to expand. Oxygen passes from the alveoli and into the capillaries, carbon dioxide from the capillaries pass into the alveoli and is exhaled out. The most common causes of pulmonary edema relate to problems with the heart, such as hypertrophic cardiomyopathy.  Heart diseases can lead to reduced movement of blood through the capillaries in the lungs. As the blood flow slows, fluid leaks out of the vessels into the airways. [1]\n\nMy cat (6 years old, castrated , female) for a week is showing signs of periodic but long lasting tachypnea. During the last week her breathing rate has reached 60/min ( normal 18-20/min) . Whenever she is tachypneic she is also very lethargic . Her popliteal lymph nodes are swollen and her white blood cel count ( 4,63 ) and neutrophil count (2.48) is slightly low. Abdominal ultrasound , cardiac and thoracic x rays did not show any abdonormalities ( mesenteric lymph nodes heart and lungs were normal ). Biochemical blood work results where normal . She is FeLV and FIV negative. She is also suffering from diarrhea and frequent urination ( 6 times daily)\n\nThese situations are difficult, but without examining Buddha I cannot start to say what could be going on with her especially with her older age; if she is stressed out by visiting the clinic you should see if you can get a call out or if another Veterinarian will make a house visit just to check her over. There are many possible issues which may be affecting an older cat, but an examination is required to narrow down on a diagnosis. Regards Dr Callum Turner DVM\nSolid black Chausies may have faint tabby markings (called ghost markings) as kittens, but usually acquire a dense, even black pigmentation with maturity.[8] Sometimes black grizzled tabby Chausies will appear indistinguishable from solid black Chausies when the amount of grizzling is minimal. Exposure to strong sunlight, as with most black cats, can cause black Chausies to lighten slightly and appear brownish.\nLittle is known about the origin of the Russian Blue breed, though stories are legendary. Many believe the Russian Blue is a natural breed originating from the Archangel Isles in northern Russia, where the long winters developed a cat with a dense, plush coat. Rumors also abound that the Russian Blue breed descended from the cats kept by the Russian Czars. Assuming the Russian Blue did migrate from northern Russia, it was likely via ship to England and northern Europe in the mid 1860s.\nThese cats have some serious staying power. Hailing from Siberia, this breed was first referenced all the way back in 1000 A.D., according to TICA. Powerful, intelligent and entertaining best describe the Siberian, which frequently takes problem-solving (like opening doors) into their own paws. Their semi-long coat is thick in the winter to withstand the elements and becomes shorter and lighter in the warmer months.", "pred_label": "__label__1", "pred_score_pos": 0.5832254886627197} {"content": "7 minute read\n\n\n1-3-3, Marunouchi Chiyoda-ku\n\nHistory of The Industrial Bank Of Japan, Ltd.\n\nThe Industrial Bank of Japan, or IBJ, is almost exclusively a banker to industry. It is regarded by many as a semi-autonomous government agency that acts closely with various ministries to achieve wider national economic goals. It is, in effect, the banker's bank, acting as a primary source of funds and coordinating new bond issues and debentures for government and industry.\n\nThe IBJ was created by the Japanese government shortly after the Sino-Japanese War (1894-1895). Only 25 years before, Japan had ended a centuries-old isolation and embarked on an ambitious modernization. But Japanese industry required inexpensive and reliable sources of raw materials. China held great promise, not only for Japan but for several other imperialist powers, because of its vast forestry and mineral resources.\n\nAs a result of its war with China, Japan won rights to these resources in addition to substantial war-reparation payments. The Japanese government studied ways to manage these payments most efficiently, and created three development banks. In 1902 it chartered the Kangyo Bank for agricultural finance, the Hokkaido Takushoku Bank for the development of Japan's northernmost island, Hokkaido, and the Industrial Bank of Japan to supply stagnant domestic industries with long-term funding and to develop the bond market.\n\nThe Russo-Japanese War (1904-1905) was Japan's first engagement with a European power. Its victory in that war greatly increased Japanese influence in the region, but the mobilization seriously depleted bank capital. With Japanese industries unable to finance further expansion, the IBJ borrowed heavily from European sources to make capital available to Japanese industry for modernization and expansion.\n\nThe IBJ grew with Japanese industry throughout the 1920s and 1930s by financing the construction of integrated steel mills and modern shipyards. As an instrument of government, the IBJ was motivated neither by private interest or private profit.\n\nA right-wing militarist element, which by the mid-1930s had gained control of the government, sought to establish Japanese supremacy in Asia. Opposed at first by political moderates and Japanese industrialists, the militarists eventually won power. By the time the government declared a \"quasi-wartime economy\" in the late 1930s, the zaibatsu, or large \"money clique\" conglomerates, participated in the mobilization--as much for profit as for political survival.\n\nWith the zaibatsu brought under the same strict central control as agencies like the IBJ, the Japanese economy was forcibly concentrated in order to raise economic efficiency. While commercial businesses concentrated on military production and the development of occupied territories, the IBJ became involved with the increasingly burdensome task of financing the war against China, and later against the United States; during this time the bank's debts increased from ¥2.7 billion to ¥14.6 billion.\n\nThe IBJ survived relatively intact. Instead of financing industrial expansion, however, its new task under the occupation was to assist in the reconstruction of Japan. The bank created a special reconstruction-finance department staffed by 96 men. The department was separated from the IBJ in 1947 and named the Nippon Fukokin Kinyu Koku, or Japan Reconstruction Finance Bank and reorganized in 1952 as the Japan Development Bank.\n\nThe American occupation authority undertook a massive decentralization of the Japanese economy by breaking up the zaibatsu and forcing the government to make state-owned businesses, including the IBJ, private. Under the Long Term Credit Bank Law, the IBJ was sold to private investors in 1950. Its purpose, however, remained the same: to provide long-term funding for stagnant and undercapitalized firms. The bank continued to serve in a semiofficial capacity and maintained its connections in government and its access to key ministries and agencies.\n\nJapan's industrial sector, which the IBJ had concentrated on developing for over 50 years, finally began to mature in the early 1950s. For nearly 20 years the Japanese economy maintained an annual growth rate of 10%, which provided the IBJ and other long-term credit banks with strong and stable development. As the largest issuer of government and corporate bonds, in addition to its own debentures, the IBJ held tremendous sway over the determination of long-term interest rates.\n\nThe appearance of IBJ representatives on the boards of its clients became more conspicuous after the securities crisis of 1966. The IBJ appointed presidents to three of the four major securities houses: Yamaichi, Daiwa, and Nikko, and played a major role in the creation of Nippon Steel, the world's largest steel company, through the merger of Yawata Steel and Fuji Steel in 1970.\n\nJapanese industry, which depends heavily on imported raw materials, was dealt a severe blow during the 1973 oil crisis. Many of the IBJ's largest clients were suddenly faced with drastically weakened markets and even bankruptcy. In the recession that followed, capital investment was either scaled down or canceled altogether. As interest rates rose, the bank's clients paid back much of their debt by liquidating assets or arranging their own financing--either taking their business back from the IBJ or seeking financing in less competitive foreign-loan and bond markets. Within Japan, IBJ debentures suffered from the developing gensaki bond-repurchase market and an increasingly sophisticated Tokyo stock market.\n\nThreatened with the possibility of its own redundancy in several important markets, IBJ altered its business strategy. The research department sorted IBJ's existing and potential clients into ones that were successful, ones that needed reorganization, and ones that should be abandoned. The IBJ became more active in its clients' industries and, with the full support of the Japanese government, remade several businesses. Not surprisingly, at times the IBJ was resented for the ruthlessness of its reorganization schemes and criticized for the arrogant and presumptuous manner in which its representatives presided over clients' board meetings.\n\nNevertheless, several troubled companies, including Toyo Soda, Nippon Soda, the Keisei Electric Railway, and Chisso Chemical, were successfully rehabilitated. For that reason many regard a loan from the IBJ as an insurance policy. Competitors made similar industrial rescues, but often lost hundreds of millions of yen in the process. The IBJ, on the other hand, made a profit from saving companies.\n\nOne of the largest projects to be underwritten by the IBJ was a $3.2 billion petrochemical complex at Bandar-e-Shapur (later Bandar Khomeini) in Iran. Iranian revolutionaries halted construction on the plant in the early 1980s, when it was 80% finished, because they regarded Japan as too sympathetic to the United States. The plant was later bombed by Iraqi jets, leaving its eventual completion in doubt.\n\nAlthough a late entrant into international finance--the IBJ received permission to establish overseas branches only in 1971--the IBJ was nevertheless quick to notice a weakening in the Third World lending market. In 1983 the bank refused to lend money to the Philippines in anticipation of a credit crisis, which duly materialized a few months later. The IBJ has not, however, shunned all investment in developing countries; it has simply managed its risk differently. Unlike many of its competitors, it has chosen to participate in specific projects rather than lend outright to government sponsors.\n\nCareful risk management, in addition to a statutory right to finance itself with more stable long-term debentures, earned the IBJ a successful entrance into European financial markets, allowing it to become a major player in the securities industry. The IBJ remained a lead banker to about 180 of Japan's top 200 firms, marketing both yen-dominated bonds and Japanese government securities.\n\nMuch of the credit for the IBJ's recovery from the crisis of the 1970s goes to Kisaburo Ikeura. President of the bank from 1974 to 1983, Ikeura was replaced as president by Kaneo Nakamura, but continued to serve as chairman. One question facing Nakamura was whether to expand into the more stable but highly competitive consumer-banking market. Because it suffered from a lack of branches, any growth in this area would have had to come externally--that is, by acquisition. Instead, the IBJ decided to expand in international securities markets.\n\nThe IBJ already occupied an important position in European markets with an English subsidiary, IBJ International, and the Industrial Bank of Japan (Switzerland), which conducts both banking and securities services. The IBJ expanded into the United States by purchasing, through subsidiaries, Aubrey G. Lanston Company, an important dealer in U.S. government securities. Although the U.S. government preserved management control of Lanston, the IBJ has still gained a \"ringside seat\" at the Federal Reserve.\n\nThe IBJ's broad exposure to international markets has made it more sensitive to changes in the value of the yen. Its emphasis on long-term credit, however, brings much of that risk to within acceptable margins. While it competes with the Long Term Credit Bank and the Bank of Tokyo, the IBJ has established and (with government help, some say) protected an important niche in the institutional banking and securities markets. In addition, the IBJ must compete in an increasingly less protectionist international environment. This has resulted in a lower, though not altogether unpredictable, squeeze on growth rates and profits.\n\nPrincipal Subsidiaries: The Industrial Bank of Japan Trust Company; IBJ Schroder Bank & Trust Company; The Industrial Bank of Japan (Canada); IBJ International Limited; Industriebank von Japan (Deutschland) Aktiengesellschaft; The Industrial Bank of Japan (Luxembourg) S.A.; The Industrial Bank of Japan (Switzerland) Limited; IBJ Asia Limited; IBJ Merchant Bank (Singapore) Limited; P.T. Bumi-Daya-IBJ Leasing; IBJ Australia Bank Limited.\n\nAdditional topics\n\nCompany HistoryFinance: Banks & Credit\n\nThis web site and associated pages are not associated with, endorsed by, or sponsored by The Industrial Bank Of Japan, Ltd. and has no official or unofficial affiliation with The Industrial Bank Of Japan, Ltd..", "pred_label": "__label__1", "pred_score_pos": 0.7728091478347778} {"content": "ESA Mission Poised to Probe Mercury’s Mysteries –“With Implications for the Search for Life on Alien Planets”\n\n\nMercury’s magnetosphere could have implications for the search for life beyond our solar system. Exoplanets found orbiting cool red dwarf stars could host liquid water, and possibly life. But because they orbit their stars more closely than Mercury orbits the sun, they likely face strong stellar winds and radiation levels inimical to life, unless the planet is protected by a magnetosphere like Mercury’s.", "pred_label": "__label__1", "pred_score_pos": 0.9825997352600098} {"content": "Dominion is a power generation and transmission company based in Virginia that provides service to more than 5 million energy customers and retailers in 18 US states. It has a generation capacity of more than 26 thousand Megawatts and has more than 6 thousand miles of transmission lines.\n\nThis big company is ranked 3rd in the world ranking of the main electricity companies in the United States, by market value, recording approximately $66 billion USD. In addition, Dominion Energy was named as one of the top 10 Utility Companies for Solar Energy Generation by the Smart Electric Power Alliance (SEPA)\n\nSince 2016, Dominion has used PrimeStone software for the collection, management and analysis of data from its meters coupled with an integration to its historical information system.\n\nThe continued growth of this utility client has been excellent to support, and PrimeStone works regularly to ensure that the software is robust and future proof for Dominion.\n\nSource: www.prnewswire.com, Statista 2019 and https://www.bloomberg.com/", "pred_label": "__label__1", "pred_score_pos": 0.9556865692138672} {"content": "Essay on The Air Conditioner Broke Down\n\nEssay on The Air Conditioner Broke Down\n\nLength: 835 words (2.4 double-spaced pages)\n\nRating: Better Essays\n\nOpen Document\n\nEssay Preview\n\nWith a deep and abrupt rumble, the air conditioner broke down. It was mid-July in Lahore, Pakistan and the outside temperature was rapidly approaching 100 degrees. I was notorious for getting an upset stomach whenever my family visited Pakistan, and this trip was no different. At eight years old, I could not imagine anything worse than suffering through a stomach ache in the sweltering heat of a Pakistani summer. If the heat was not exhausting enough, my family had to listen to my perpetual complaining. Eventually, my grandma decided to take me to the local health clinic. Holding my hand, she walked me down the crowded clinic corridor. The filth and chaos was overwhelming, nothing like any hospital I had seen before. We reached the doctor’s office and he ushered us in while still examining another patient. Apparently, that was normal here. A frail, old man was seated on the examination table. His leathery skin hung loose over his bones, and his clothes were dusty and worn. He had tubes connected to him from every direction. Even at that age, I knew this man required medical care beyond the scope of this facility. My grandma looked to me and said, “You know Mariha, you are very fortunate.” I never forgot that day, and I can still feel the knot in my stomach. Seeing this man made me uncomfortable, but at eight, I could not truly pinpoint the reason. I can now admit I felt helpless against the healthcare inequalities that I witnessed. As I grew older, I searched for ways to bridge this gap both internationally and in my own community.\nAfter my childhood experiences in Pakistan, I jumped at the opportunity to work in rural healthcare facilities in Peru. Volunteering in Peru introduced me to an entirely new set of healthcare challenges...\n\n... middle of paper ...\n\n...and my horizons, I pursued a minor in chemistry, a subject I initially struggled with. Merging my fascination with human anatomy and photography, I pursued several artistic endeavors during college as well. I focused on the notion of body image and explored its impact on women, and in the process I came to relinquish some of my own insecurities.\nThroughout my life, I have strived to learn and grow from all my experiences. While my eight year old self would never have guessed that I would pursue a career in medicine, my grandma’s words still hold true today—I am very fortunate. Fortunate to have experienced the many facets of medicine, and to realize that becoming a physician is my true passion in life. A passion that I know will enable me to become a physician who communicates with her patients, and through communication, provides compassionate and attentive care.\n\nNeed Writing Help?\n\nGet feedback on grammar, clarity, concision and logic instantly.\n\nCheck your paper »\n\nAir Conditioner Controller Essay example\n\n- 1. INTRODUCTION Today, thanks to the advancement in the field of electronics, most of the manually controlled systems are getting replaced with sophisticated electronic circuits with intelligent controlls. These circuits are capable of monitoring, analyzing and controlling the systems. In earlier days these electronic circuits were fabricated around discrete hardware components such as transistors, logic ICs etc that made the system bulky and costly. Also since the component count was more the failure rate was also more....   [tags: essays research papers]\n\nFree Essays\n1796 words (5.1 pages)\n\nAn Air Conditioned Computer Lab Essays\n\n- Searching for an air conditioned computer lab on the first floor of SE6 revealed more to me than I thought it would. A BCIT custodial worker was fumbling with a door, his keys, and a large bag of trash while muttering profanities under his breath. It was obvious he was frustrated. While walking down the stairs in SW3 at the end of the day, I witnessed the evening cleaning staff preparing for their shift. Two workers were gathering their cleaning supplies and quite cheerfully talking and smiling to each other....   [tags: Socialism, Karl Marx, Employment, Minimum wage]\n\nBetter Essays\n2043 words (5.8 pages)\n\nThe Federal Aviation Administration Should Not Shut Down Small Airport Air Traffic Control Towers\n\n- The Federal Aviation Administration Should Not Shut Down Small Airport Air Traffic Control Towers The Federal Aviation Administration was created August 23, 1958 to help increase air travel safety, as well as make a more efficient airspace (Mission). In the ten years after the Federal Aviation Administration started recording crashes, there were 183 crashes (Canavan). The crash percentage, the number of crashes divided by the number of flights, was .00125% (Accident and Incident Data). In the last ten years there were forty seven accidents and incidents (Canavan)....   [tags: pilot, air travel, safety]\n\nBetter Essays\n2288 words (6.5 pages)\n\nI Accidentally Dropped the Air Conditioner Unit on the Roof of My Dad's Car\n\n- A Walk in the Park My father and I were resting comfortably on our downstairs sofa riveted to the T.V. The climax of the latest Star Trek episode was just beginning to unfold. As the show cut for a commercial break my father turned to me and asked if I had removed the air conditioner from my upstairs, bedroom window. In our house I had a fall ritual involving air conditioning unit removal from the window and subsequent storage of said monstrosity in the closet. My younger brother, a hulking high school football linebacker, had a corresponding ritual of placing the air conditioning unit in the window the following spring....   [tags: Example Personal Narratives]\n\nFree Essays\n620 words (1.8 pages)\n\nWitch Trials : The Court System Broke Down During The Middle Ages Essay examples\n\n- Witchcraft burned tens of thousands of people in the Middle Ages. Just in Salem, Massachusetts, the citizens accused over one hundred and fifty people of witchcraft. As a result of these accusations, the court hanged twenty of these supposed witches. How much evidence was there to convict the supposed witches. Not enough to select death as the punishment. However, the court sentenced the accused to be hanged if they did not confess which causes another problem: why hang when one could confess to a lie and live....   [tags: Salem witch trials, Witchcraft, Salem]\n\nBetter Essays\n1124 words (3.2 pages)\n\nThe Truth of the Air Essays\n\n- ... Furthermore, soil and water are to some extent interchangeable with each other. They are both fundamental to the environment. Due to the fact that acid rain is acidic when it descends into a large body of water it then makes it acidic as well. The normal pH of lakes and streams for instance, is between six and eight and when acid rain merges with water it begins to lower its pH level (What Is Acid Rain). To retrieve its normal pH level is quite burdensome, but it can be obtained. The method of recouping its pH level is by a process of “buffering capacity” which requires soil to neutralize its pH levels (What Is Acid Rain)....   [tags: air quality, pollution ]\n\nBetter Essays\n1755 words (5 pages)\n\nShirley Chisholm Broke Down Barriers Within The American Political System\n\n- As a self-proclaimed catalyst for change, Shirley Chisholm broke down barriers within the American political system. Only seven years after the passage of the Voting Rights Act, Chisholm entered the 1972 presidential race as a candidate for the Democratic Party. This timing made her the first woman to run for the Democratic nomination, as well as the first African American to run for the presidency. Chisholm sought to break down the American presidency – an office traditionally held by white, privileged men....   [tags: President of the United States, Barack Obama]\n\nBetter Essays\n754 words (2.2 pages)\n\nThe Media Dumbs Us Down Essay\n\n- The rise of media in our society has many effects on the consumers of the media. Many people propose the question: is this media making us dumber. Today there are a lot more forms of media available to people today. Through the media outlets of television and news, internet and user-generated content, and social media, people have many options as to where they receive their media. As a whole, the mass media dumbs down society, through their attempt to keep up with the changing of times and reach large masses of people....   [tags: The Dumbing Down of America]\n\nBetter Essays\n2082 words (5.9 pages)\n\nThe Health Problems Of The Air Pollution Essay\n\n- When most people think about what is wrong with the environment, they can think of many things wrong with it. The amount of pollution that has either enter the air, land, or the ground. The amount of pollution within the air has been constantly been caused by humans doing a lot of activities that release a lot of carbon emissions. Activities such as deforestation of trees, the uses of automotive cars, and factories producing so much smog on a daily basis. With all of these activities, much of the air quality is poor and can cause many health problems for humans....   [tags: Air pollution]\n\nBetter Essays\n1742 words (5 pages)\n\nThe And The War Broke Essay\n\n- “You lied to me!” The harsh accusation echoes off the walls of the desolate interrogation room. A solitary man spews similar vitriol against his situation. Metal chains rattle as he attempts to gesticulate wildly. The handcuffs attaching him to the desk prohibit his range of motion. Outside the door, two police officers confer amusedly. “I’ve seen it all Jim,” the older remarks to his younger partner. Jim’s face contorts into a furled brow of questions. The older officer laughs. “I never thought I’d see the day when a sociopath accuses me of breaking a basic moral code.” Turbulent events rocked the foundation of Greece during the fifth century....   [tags: Plato, Philosophy, Socrates, Truth]\n\nBetter Essays\n1282 words (3.7 pages)", "pred_label": "__label__1", "pred_score_pos": 0.9849706888198853} {"content": "Which Countries Are Exploiting The World’s Oil The Most?\n\nFossil fuels have played a huge part in making the human world turn since the industrial revolution in the 19th century. But most of us don’t give a second thought to what fossil fuels are – or where the world’s oil comes from.\n\nWorlds Oil\n\nPlants, animals, and other living things have decomposed beneath sediment and rock over thousands and even millions of years. Their carbon molecules have broken down and changed into what would eventually become coal, oil, and gas. This process was especially prevalent over 65 million years ago, when warm, wet conditions meant that the planet was host to a whole lot of lifeforms.\n\n\nQ1 hedge fund letters, conference, scoops etc\n\nBut we’ve used up millions of years-worth of the world’s oil in just a few decades, and of course it is non-renewable. Add to that the fact that burning fossil fuels releases carbon dioxide and other greenhouse gases into the atmosphere, and the fact that we have become so reliant on them becomes a real problem. Greenhouses gases warm the atmosphere, hastening the warming of the climate with devastating effects already felt by human, animal, and plant life. And it’s going to get a lot worse, very quickly.\n\nWorlds Oil\n\nNaturally, the obstacle to arresting this process is not just that our industry runs on fossil fuels, but that there is a lot of money involved. So those who profit from fossil fuels are not in a hurry to find alternatives. Thus, it is often those who value personal wealth over the well-being of others (who may be out of sight or even as yet unborn) that claim that global warming is a hoax. They may even truly believe this is the case, as it is often easier to disbelieve an ‘inconvenient truth.’\n\nSo which countries are doing the most damage? A new set of maps from 911Metallurgist may contain a few surprises.\n\nTaking all types of fossil fuel together, the USA produces around 20% of all global fossil fuels, putting it in the number one position. No wonder the president denies climate change (although to be fair, he doesn’t really seem to understand it!)\n\nFossil Fuels\n\nRussia and Iran aren’t far behind them.\n\nAs for specific fossil fuels, let’s look at oil. A lot of oil can be traced to the Mesozoic period, when dead plankton and algae fell to the bottom of the sea. The pressure of the sea and sand above them caused it to turn into oil. Oil products include gasoline and diesel, and petroleum products account for one-third of the world’s carbon emissions as well as spills and other environmental catastrophes.\n\nThe States again come out on top as producers of 18% of the world’s oil. Together with Saudi Arabia and Russia, they account for 40% of the world’s oil supply.\n\nCoal is still a huge deal too, providing around one-third of the world’s energy but accounting for 44% of our carbon emissions. It began to form from swamp vegetation during the Carboniferous period (300-360 million years ago). Coal has been in human use since at least 4000BC, in ancient China – the Chinese are the number one producers of coal today, with 45% of the total.\n\nFossil Fuels\n\nIn much of the west, coal use is in decline due to relative costs and associated health factors, but in other places – India, for example – it is still on the rise. India is number two in the coal production chart, while this time the States is number three.\n\nAs the (human) world wakes up to the trouble we’ve got ourselves in, renewable energy technologies such as wind, solar, and geothermal are starting to gain ground. Just as important is the way we use energy, and good-hearted folk (and the odd big business) are trying to change the way they live and work to function in closer harmony to the planet – the most obvious example being to walk, cycle, or take public transport instead of making unnecessary car journeys.\n\nThere are many ways that small and large companies can improve efficiency and fight climate change. What is your business doing to take care of people and the planet, and not just profit?\n\nAbout the Author\n\nJacob Wolinsky", "pred_label": "__label__1", "pred_score_pos": 0.9977133274078369} {"content": "Tag Archives: francine vaysse\n\nFrancine Vaysse True Emotions Behind Paintings\n\nA Glorious Introduction to Francine Vaysse Paintings\n\nIt has been researched that Francine Vaysse was a fantastic ex bank executive who worked hard for twenty decades. This enchanting artist was residing in the Reunion Island to explore the real chunks of art specifically regarding Quentin.Francine-vaysse-color\n\nAwe Inspiring Vision of Francine Vaysse\n\nInterestingly, the desired woman in the form of an artist discovered and recognized the true or say actual feelings attached to the pleasing oil works of art sector. She had been incredibly fascinated by a few influential and renowned experts linked astonishingly with hundred years of finality. The most inspirational part of her personality was that she maintained all of them in her motor of thoughts and reservoir of ideas after which she began to sketch famous paintings especially on the theme regarding women. Francine proudly started off with her woman’s piece of art and adopted it gracefully as a profession.\n\nFrancine Unbelievable Emotional Art Which Shocks the World\n\nAfter summoning the thoughts and ideas of great and grand painters, she started to walk attentively on the way leading to the most colorful sector known as painting. Francine initiated her marvelous painting by decorating beautifully. The ceaseless hard work of Francine paid her off in a way that the entire world views her paintings rewarding as well as legendary.\n\nThe Strengthening Thoughts That Governed the Fabulous Painter’s Mind\n\nBasically, the motor of her mind was extremely colorful and enthusiastic. With a great thoughtful and creative brain, she also owned a minute touch of emotional sensation. Francine Vaysse adored painting wholeheartedly and primarily, her thinking forced her to find the actual emotions behind the strength of paintings.\n\nUnwrapping of Francine Vaysse Emotions\n\nDue to the provocative emotional thoughts she possessed, her paintings started showing the emotions and feelings vividly. In an early stage, she learnt the tricks to portray emotions behind the world of art and paintings especially the influential art work on canvas linking personal accomplishments that revealed a different area on the tropical isle of the reunion, where she resided. It’s from that accomplishing period that Francine earned everlasting fame and became one of the most renowned and great painter of recent times.Francine-vaysse-rialtot\n\nThe Captivating and Enchanting Success on Art Works of Francine\n\nFrancine was an outstandingly commendable lady who was well known for her amusing works. Her works of art were so attractive and appealing to the viewer’s eye that everyone liked her paintings and it certainly became obvious for her fans to appreciate every singly bewitching painting she made. It is said about the remarkable painter that she was critical in her paintings as she adopted different moods and depicted that specific kind of mood or feelings in her sketches. Through this exceptionally unique quality, she attracted countless individuals.\n\nA Silent Approach Towards the Artist Francine\n\nIf somebody is a great fan of her and wants to bless him or herself with fantastic works of Francine Vaysee then without any delay, conveniently search artscad. It’s a site where you could easily find various and massive range of quality paintings decorated by the absolutely amazing and famous artist.Francine-Vaysse-Mural\n\nImage Credit: artscad.com\n\nPaintings That Provide Francine With Great Joy and Happiness\n\nShe did not choose the ordinary style and techniques in her magical paintings. In fact many got influenced with her creative warrior like artists styles. Although, Francine was an extremely different and a bit complicated artists yet she preferred painting the existing fashion and this bestowed her with ultimate joy and happiness.\n\nThe Incomparable Exuberance and Fascinating Styles of Francine\n\nInquisitively, Francine earned firm determination by various emotions that were a part of her everyday life. She terribly got inspired by them particularly the fascinating places Francine explored and formed special kind of techniques. Moreover, she was truly an art enthusiast who kept on practicing on techniques in different ways. The evidence of her marvels lies in the paintings she paints. One could clearly see different dainty patterns, elegant styles and brightly vibrant colors in almost every painting she so beautifully created.\n\nBeautification of Womanhood Depicted in Francine Vaysse Paintings\n\nIt will be charmingly excited to know that Francine added eye catching shades beautifying the grace of womanhood which she was always passionately fond of. Francine owned the highly influential ideology of exposing the charm of women. Without any reluctance and hindrance, Francine kept on focusing on passing girl’s passion, intellects and knowledge all together with the students.Francine-Vaysse\n\nFrancine Cherishing Passion Towards Art\n\nThorough studies speak of Francine in an extremely inspirational manner. Since her infancy, she always wanted to have a professional background. In the urge of achieving her objective, she chased her husband who lived in the Reunion Island. Francine had to strive hard in making her professional life easy and attainable. She was adamant on her decisions and painted beautifully due to which the world of art blooms amazingly. The most striking and enlightened part of Francine story is that the kind of work she portrayed; it has yet not been witnessed in any other painter’s artwork.\n\nThe Pleasantness in the Artist’s Paintings\n\nFrancine-vaysse-champignonsHer uniqueness in terms of art is beyond a shadow of doubt as Francine Vaysse worked in its own fashion and her paintings were abstract in its own style as well. Each individual could clearly observe the fantabulous creation by the popular artists.\n\nThe Wondrous success of Francine\n\nIn the year 2002, the fabulous painter Francine Vaysse presented some of her special paintings in a few working areas and began working on acrylic paintings. This outstandingly attention seeking artist has recognized herself along with the painting in different parts of the world and also exhibited them all around Island. Lately, she would definitely discover more extraordinary works regarding art and will get it incredibly approved by her lovers.", "pred_label": "__label__1", "pred_score_pos": 0.8171644806861877} {"content": "The SBM2015\n\n\nMankind has evolved over ten-thousands of years in the environment the earth has provided. In a few decades this environment is changed drastically by man. Human evolution takes time, therefore these changes will without any doubt have consequences for our health and well-being.\n\n\nThe best reference to create a healthy indoor climate is our nature, the environment in which we have evolved.\n\nThe next reference after nature is the SBM2015. The building biology standard for sleeping areas.\n\n\nThroughout the day we expose ourselves to many environmental influences, they are a burden on our body. The human body is an extraordinary being, it can deal with most of these unnatural influences. But if exposure continues, day and night, seven days a week, the barrel will run over, and our body will respond. (read more about environmental illnesses)\n\n\nWe need a good night’s rest to give our body the peace to deal with all the environmental influences of our daily life. Unfortunately many bedrooms have become much polluted. Carbon dioxide levels are extremely high, chemical toxins can be found abundantly, and on top of that we surround ourselves with electromagnetic radiation that stresses our body.\n\n\nTo be able to create a sleeping place that gives our body the relaxation it needs to regenerate the SBM2015 is the best guideline, apart from nature.\n\n\nThis SBM2015 can be downloaded from:", "pred_label": "__label__1", "pred_score_pos": 0.5835911631584167} {"content": "This series goes beyond, or through and out from the surface of the photographic image, looking to extract from the light drawn representation various empathetic and divergent forms, with a view to extend the scenario by adding further layers of meaning through the imposition of comparative and contrasting forms, multifarious structures of the unfamiliar, washes of sensory confusions, and a translucent system of disquietude.\n\nAll works are for sale.\n\nPastel, watercolour and ink on hand printed gelatin silver photographic prints.", "pred_label": "__label__1", "pred_score_pos": 1.000007152557373} {"content": "Whatever it is, know your state of mind is also quite important. You’ll be trained on the spot to do your work. For each and every decision, there’s an equally valid, yet opposite selection.\n\nThe 30-Second Trick for Honors Physics\n\nPhysics provides an extensive set of fundamental tools that may be brought to bear on several problems across a large variety of fields. Themes include departmental honors, health professions and international engagement. By engaging in study in several assignment writing structure different areas within the College, they develop the ability to learn in a variety of ways and apply their knowledge from a variety of perspectives.\n\nThroughout every one of the dimensions, it’s important to be aware that a cube will maintain all its basic properties in theory. You don’t need to design for the average. These five dimensions are chosen as being basic since they are simple to measure in experiments.\n\nThe internet physics courses offer both online course materials and internet homework, depending on the LON-CAPA system. There are a number of ways to find the major textbook and Mastering Physics. In case you have any questions, please get in touch with us.\n\nSome fractals do satisfy all useful reference them (the Cantor set satisfies just about any property you’ll be able to consider, it is a very good example to produce properties). Minkowski’s brilliant realization is these are actually only a different type of rotation. Instead, you are going to be given formulas that you could or may not need to memorize, and be expected to use fundamental algebra to acquire a number.\n\nThese numbers are called the parts of the vector. To alter the length of the function, you should alter the worth of the parameter of the trigonometric function. Normally, in a Physics class you are going to be requested to solve two kinds of equations when calculating free fall.\n\nThe Hidden Treasure of Honors Physics\n\nThe other will appear in a coming issue of the very same magazine. Try out NOT to check at the table at the same time you do it. There are a couple smallish troubles with this edition.\n\nA lot of different groups can be set up to look for initial means of approaching this issue. In any event, the exact same result will happen. If you are attempting to analyze the completely free fall in various conditions, https://www.temple.edu/class/documents/RevisingandProofreading.pdf don’t hesitate to open the advanced mode to change this value.\n\nThe impact of interaction gets smaller and smaller (as in case the effective time should happen to slow down). My stress level relative to the quantity of planning and organization is down as a consequence of the journaling. The quicker you fall, the more elaborate the force is.\n\nYour score for each lecture is going to be reported as the fraction of the utmost amount of points obtainable for each lecture. Besides a great GPA and robust GRE scores (especially in the topic test), admissions committees look for evidence a student is not simply willing and can work, but is actually content to do lots of hard, independent work. Students will go back to the remaining stations within the next class period.\n\nThe relationship was the exact same whatever the mass of the ball employed in the experiment. The cover of the arc is too steep to crest and thus when the forward motion is dissipated it’s going to fall back to earth. Drop both balls at exactly the same time, from the very same height.\n\nThe Downside Risk of Honors Physics\n\nThe majority of the orbits of the planets are in reality pretty near circular. The geometry of four-dimensional space is a whole lot more complex than that of three-dimensional space, because of the excess level of freedom. When an object is floating or partially submerged, the amount of the displaced fluid equals the volume of that section of the object that is beneath the waterline.\n\nStudents who don’t yet understand the fundamentals of the subject area will be at a disadvantage when they’re supposed to observe and establish the intended phenomena of a certain investigation. When an individual reaches 5th dimension consciousness, they just dwell in the current moment free of reference to the past. An individual can also absorb a great deal of knowledge from book and accustom the mind to consider with respect to their high conceptions.\n\nIf you asked for a bit more water, a bit more bread, a bit more sympathy or maybe a bit more urgency, I could offer you some fair reply. For instance, you could try out a massive feather and an extremely modest ball. The means to do it is to consider which answer you desire.", "pred_label": "__label__1", "pred_score_pos": 0.7511886358261108} {"content": "Limit the number of links on a single page\n\nBig Influence Easy to implement\n\nPages that have a lot more than 100 links (inbound & ooutbound) on them could be considered a link farm by Google.\n\nAdditionally you should be aware of the fact that Google passes on a part of the page’s PageRank to the linked pages. The amount of PageRank each link gets is equal to the initial PageRank divided by the total number of links.\n\nThis means that if you got e.g. 100 links on a page, each linked page gets 1/100 of the initial PageRank. If the page has only 5 links on it, each linked page gets 1/5.\n\nHelpful Links:\n\n • GoogleWebmasters: Does Google still recommend 100 links or fewer per page?", "pred_label": "__label__1", "pred_score_pos": 0.9971115589141846} {"content": "Are You an Outlaw? Meet Brenda Plowman\n\nWho has redefined what it means to think outside the law (aka OUTLAW) and is helping each of us in the process?\n\nMeet Brenda Plowman, Chief Marketing Officer at Fasken, a full-service law firm with offices in Canada, the U.K., South Africa and China. Brenda works in collaboration with firm leadership to develop and deliver on the firm’s marketing, business development and client service strategies. She is responsible for the leadership of an efficient and responsive marketing and business development team whose focus includes brand management, internal and external communications, business development and marketing practices to meet the needs of clients, prospects and the firm.\n\nWe asked Brenda a few questions, and her answers can be found below. Enjoy getting to know this Outlaw!\n\nQ: Where would you like to live?\nA: South of France, although I do love where I live now.\n\nQ: What is your idea of happiness?\nA: Being in my gardens tending my flowers, hanging with my fur children, with a glass of wine…with a family member or friend would also be lovely.\n\nQ: What is your motto?\nA: Ralph Waldo Emerson ‘Do not go where the path may lead, go instead where there is no path and leave a trail.’\n\nQ: What is your greatest fear?\nA: Not being able to take care of my people.\n\nQ: Finish this sentence: “If I could have one super-power, it would be…”\nA: …creating peace.\n\nQ: Who are your favorite authors or what are your favorite books?\nA: Typically personal development and leadership books.\n\nA: I would love to host a dinner party of 10-12- open.\n\nQ: What got you working in the legal industry?\nA: I started my own company – full service marketing and communications. I was working for an accounting firm initially and had a lot of experience. This naturally evolved to all professional services firms including legal, engineering and other accounting firms.\n\nQ: Your favorite musician or band?\nA: Adele, One Republic, Sarah McLachlan, U2\n\nQ: What is your current state of mind?\nA: Happy and exploring possibilities.\n\nQ: Your favorite virtue?\nA: Honesty.\n\nQ: What would you consider your greatest achievement?\nA: The property I own now and its transformation…still underway. I renovated inside and out and am now working on the gardens and landscaping. I have big plans.\n\nQ: Finish this sentence: “If I won the lottery tomorrow I would…”\nA: …head for a vacation in south of France and Italy and begin planning my farm gate flower growing business.", "pred_label": "__label__1", "pred_score_pos": 0.9998777508735657} {"content": "Base-catalyzed hydrolysis of coumalic acid (COU) in binary aqueous-methanol and aqueous-acetone mixtures has been studied kinetically at a temperature range from 283 to 313 K\nMoreover, the change in the activation energy barrier of COU from water to water–methanol and water–acetone mixtures is estimated from the kinetic data. Solvent effects on reactivity trends have been analyzed into initial and transition state components by using transfer chemical potentials of the reactants and kinetic data. The transfer chemical potentials dmlh for COU\u0002 anion are derived from solubility data from its calcium, cerium and lanthanum salts. The decrease in rate constant of the base hydrolysis reaction of COU as the percentage of methanol or acetone increases is dominated by transition state (TS). The base hydrolysis reaction of COU follows a rate law with kobs= k2[OH\u0002] and the reaction mechanism was suggested. The high negative values of entropy of activation support the proposal mechanism, i.e. the investigated reaction takes place via the formation of an intermediate complex. Thus, the ring opening of the intermediate complex would be the rate controlling step.", "pred_label": "__label__1", "pred_score_pos": 0.9963414669036865} {"content": "The Religious Affiliation of\nHassan ibn Sabbah\n\nReligion: Ismaili Muslim; sorcerer CBR Scale: M\n\nName: Hassan ibn Sabbah\n\nOther Names: Lord of Assassins; Old Man of the Mountain; 1,000-Year-Old Son of a 1,000-Year-Old Mother; Hassan bin Ali bin Muhammad bin Ja'fr bin Hussain bin Muhammad Al-Sabbah Al-Hameeri\n\nClassification: villain villain  \n\nPublisher(s): Marvel\n\nFirst Appearance: Marvel Fanfare (vol. 1) #53 (Oct. 1990): \"Paradise Lost\"\n\nCreators: Steven Grant, John Buscema, Jose Marzan Jr.\n\n\nNumber of Appearances: 2\n\nEnemy of: Black Knight\n\nNation: Iran\n\nGender: male\n\nNote: led Hashishan; battled Black Knight during Crusades\n\n", "pred_label": "__label__1", "pred_score_pos": 0.9139934778213501} {"content": "Manual Therapy\n\nThe three most notable forms of manual therapy are manipulation, mobilisation and massage.\n\nManipulation is a rapid, end of range movement applied to a joint.\n\nMobilisation is a slower, more controlled process of articular (joint) and soft tissue (myofascial) stretching intended to improve biomechanical elasticity.\n\nMassage is typically the repetitive rubbing, stripping or kneading of myofascial tissues to improve interstitial fluid dynamics.\n\nManual therapy in the physiotherapy profession is described as a clinical approach utilising skilled specific hands-on techniques, including but not limited to manipulation/mobilisation, used by the physical therapist to diagnose and treat soft tissues and joint structures for the purpose of modulating pain.\n\nThe aim of manual therapy can be to increase range of motion, reduce inflammation, improve tissue repair, extensibility, facilitate movement and improve function.\n\nThis often facilitates better movement and motor control (see below)\n\nDry Needling\n\nDry Needling is a westernized form of needling and is based on neurophysiology and anatomy. DN is used to treat dysfunctions in skeletal muscle, fascia and connective tissue/scar tissue.   The method of needling varies depending on the aim of needing.  It is used to reduce pain and restore function.\n\nDN may be included as part of a treatment plan when myofascial trigger points are the cause of your pain, postural changes or functional impairment.\n\nTrigger points are hyper-irritable nodules in a taught band of skeletal muscle. Active Trigger Points can be the source of persistent pain and produce local/referred pain, loss of range, loss of strength and endurance, and autonomic phenomena.\n\nWhen needling a trigger point, a local twitch response may be elicited and this intramuscular stimulation releases the tension in the muscle fibers and results in a change in the physiological state of the muscle.  An endorphin release is also triggered with dry needling and this is your body’s own pain modulating chemical.\n\nBiomechanical Analysis/Correction\n\nThis is an assessment used for determining factors that may contribute to an injury, especially in the case of a re-occurring injury or re-occurring pain.\n\nIt assesses posture, gait, joint range of motion, muscle length strength and co-ordination, alignment and functional movements (kinematics).\n\nThe aim is to determine incorrect forces acting through the body and to correct this abnormal loading and restore optimal movement, thereby restoring function and relieving pain.\nThis enables us to prescribe and assist with specific exercises and establish what manual therapy techniques would improve your function\n\nMotor Control and exercise prescription\n\nMotor control is the process by which humans and animals use their brain to activate and coordinate the muscles, spine and limbs involved in the performance of a motor skill.\nWe retrain movement which may involve postural correction, activation of specific muscles like the stabilizer muscles, retraining timing and firing and coordination of movement patterns and then incorporating these movement patterns into functional movements appropriate for the individual be it for work or for sport.\n\nStrapping & Taping\n\nTraditionally taping was used to reduce motion and support a joint or structure with overlapping strips of adhesive tape.  There are now many types of taping techniques that serve different functions and have a proprioceptive function which may assist better functional outcomes and return to sport\n\nStrapping can aid healing by providing support and stability to a structure (joint, ligament or muscle) and reduce swelling.  It can reduce pain and also aid in proprioception which helps to protect a structure and also assist with posture correction\n\nKineseotaping has also been shown to aid lymphatic drainage and have a positive effect on the circulatory system.\n\nTaping can be used in an acute injury to assist healing and return to sport as well as preventative taping to avoid injury.\n\nTypes of taping may include:\nTraditional elastic adhesive bandage and rigid taping\nMcConnel taping\nThe methods of application vary for these different strapping materials.\n\nExercise Classes:\n\nDryland program for swimmers.\nCore/Back and neck classes.\n\n\nCryotherapy, heat, electrotherapy.\n\nWe also work with individuals to maintain function and mobility and prevent loss of mobility.  This includes providing therapeutic treatment in circumstances where movement and function is threatened by aging, injury, disease or environmental factors.  Functional movement is central to what it means to be healthy.", "pred_label": "__label__1", "pred_score_pos": 0.9649314880371094} {"content": "Tidus and yuna ending relationship\n\nTidus | Final Fantasy Wiki | FANDOM powered by Wikia\n\ntidus and yuna ending relationship\n\nTidus (Japanese: ティーダ, Hepburn: Tīda) is a fictional video game character in Square Enix's His character development and romantic relationship with Yuna are considered among the best in video games, Nojima said that he cried during the game's ending, when Tidus and Yuna separate and Tidus vanishes. Yuna is to set out on a pilgrimage to put an end to Sin, and by joining Yuna on Tidus confronts his childhood and his relationship with his father when living out . blooms frequently. While some of these relationships were a joy to behold, others were a total bore. 18 Saved: Tidus and Yuna (Final Fantasy X) If players get the perfect ending, Tidus is inexplicably brought back to life.\n\nAlong the way, they become tangled in a web of cutthroat Spiran politics, racial cleansing and despotic religious zealotry, which ultimately calls for them to turn their backs on the old, corrupt ways of Spiran society. The game was a critical and financial success, earning a 92 from MetaCritic, selling over 8 million copies to date, and getting the promise of an HD remake for its 10th anniversary.\n\ntidus and yuna ending relationship\n\nIt is also the first entry in the Final Fantasy series to spawn a direct sequel—Final Fantasy X-2, set two years after the conclusion of X, highlights new struggles faced by Yuna in a quickly changing Spira with the help of her quickly changing wardrobe.\n\nIt is clear from the beginning of X that Yuna has led a carefully-planned life. Emerging from Besaid Temple as a summoner after many years of training, she sets out on a pilgrimage to each of the temples of Yevon to procure their patron Aeons. The journey will ultimately lead her to the ruins of Zanarkand to obtain the Final Aeon, the only creature capable of defeating Sin—an act which will spell her death in the battle between the two.\n\nEven when the leaders of Yevon have turned against her and branded her a traitor, she continues her journey, unwilling to abandon the chance to save Spira from Sin. Just as she is set to start a journey she has always known she would take, Tidus begins an adventure he never expected to have when he arrives, confused and lost, on the beaches of Besaid.\n\nAlso they make out. Her meeting with Yunalesca is equally overwhelming, when it is revealed that the Final Summoning will do nothing to destroy Sin.\n\ntidus and yuna ending relationship\n\nHowever, neither of these things rob her of her purpose. And I will do it without false hope.\n\ntidus and yuna ending relationship\n\nInstead, it is ironically the completion of her ultimate task that brings her down. Having long since accepted that achieving her goal would end in her death, Yuna has no plans for a life after Sin.\n\nTherefore, when Sin is defeated by means other than the Final Summoning and she lives to see a world without either, she is left rudderless, her purpose in life gone. The next place she seems likely to turn for a sense of meaning is her relationship with Tidus. While her goal to defeat Sin may be gone, she no longer has to fear the separation from him that death would bring.\n\nThe short feature shows her living a static life which consists primarily of advising members of the populace on petty matters and practicing holding her breath. Given the choice between disappointing those around her by starting a new adventure, or yielding to their expectations at her own expense, Yuna is initially unsure what to do.\n\nIn choosing to live for herself and do what she wants—a vast departure from her behavior in X—Yuna looks to her memory of Tidus for guidance on how she should behave.\n\nThe Oracle Turret\n\nSome of the changes she adopts are positive, such as valuing her desires and choosing to expand her horizons by traveling the world. While such would be positive if Yuna was unhappy with all aspects of who she was during X, that is decidedly not the case. She still very much enjoys helping others and doing good for the world, which those around her seem to recognize even better than she does.\n\nHaving never fully regained a feeling of meaning during the two years she spent in Besaid, seeing the sphere of Tidus gives that back, goading her into becoming a sphere hunter to search for clues to the fate of her lost love. Just as he could have been her purpose before, he suddenly is again, giving her something to strive for.\n\nThen, half-way through the thunder plains, she suddenly changes her mind and Tidus starts to feel jealous. So then we have the grand revelation: Tidus discovers that Yuna will die if she completes the pilgrimage.\n\nThis shocks him because Tidus usually just acts according to how he feels. When he realizes he was encouraging Yuna to walk to her death, he has a crisis of faith in himself. For the first time Yuna cannot place her faith in others and all of a sudden, she feels completely lost. Now we get a scene that needs no introduction as Tidus suggests that she abandon her journey.\n\nWhat follows is a scene as beautiful as it is bittersweet. Our heroes switch places Now Tidus and Yuna are at an impasse. Yuna remains steadfast in her will: Tidus, meanwhile, refuses to accept this outcome and is convinced that he can find some other way of defeating Sin without her having to die. His determination inspires her. Her generosity inspires him.\n\ntidus and yuna ending relationship\n\nThis is where things get interesting. At the end of her journey, Yuna discovers that she must sacrifice the life of a guardian just to create the next Sin. This crosses the line, and for the first time Yuna makes an impulsive decision.\n\nVideo Game Overanalysis: Love in Gaming: Tidus and Yuna\n\nShe refuses to go through with this, and stands her ground before her own namesake, Yunalesca. Yuna now has to believe in herself despite a world in panic mode after she broke the only known way of temporarily stopping Sin. Tidus, meanwhile, makes an ironic discovery.", "pred_label": "__label__1", "pred_score_pos": 0.8298401832580566} {"content": "Inner Earth Glows Like In The Movie Avatar\n\n\nCan there be light below the surface of the Earth, without any exposure to the Sun? Surprisingly, the answer is YES.\n\nBioluminescent organisms have the ability to glow almost like magic. Many organisms use their natural ability to produce light to trick predators, to attract mates and even to communicate.\n\nThe word for this seemingly magical ability is called “bioluminescence,” which comes from “bio,” meaning life, and “lumin,” meaning light.\n\nMost of these organisms, such as plankton, glow blue, but a few glow red, green, or orange. Some tiny animal plankton (zooplankton) are big enough to see with the unaided eye.\n\n\nMost bioluminescent zooplankton don’t glow in the dark themselves, but instead squirt globs of glowing chemicals into the water.\n\nSome zooplankton use bioluminescence to attract a mate, or to form reproductive swarms. Not only is nature’s biochemistry fascinating, it can also be extremely beautiful, especially given the backdrop of a dark, misty cave.\n\nGlow worm is the common name for various groups of insect larvae and adult larviform females that glow through bioluminescence. They may sometimes resemble worms, but are actually insects.\n\nThe glow they produce, through by a chemical reaction, is incredibly efficient; nearly 100% of the energy input is turned into light (Compare this to the best light-emitting diodes at just 24%).\n\nAustralia and New Zealand have some of the most spectacular caves, where one can go on guided tours to witness this natural phenomenon up close. (see video below)\n\nWhy do some mushrooms emit light? Making light isn’t common in fungi; scientists have described about 100,000 fungal species, and only 75 glow. Lab work has shown that the glow did not happen randomly or by accident.\n\nRelated:  The Final Four Levels of Lightbody Activation\n\nScientists found that these mushrooms made light mostly at night, so experiments were conducted to determine why.\n\nAccording to studies (referenced in the book), in dark environments, bioluminescent fruit bodies may be at an advantage by attracting insects and other arthropods that could help disperse their spores.\n\nConditions that affect the growth of fungi, such as pH, light and temperature, have been found to influence bioluminescence, suggesting a link between metabolic activity and fungal bioluminescence.\n\n\nThe diversity of creatures with this ability is equally astonishing, from algae and the common firefly to deep-sea dwellers that are rarely seen by humans.\n\nWhat’s also fascinating is that many of these creatures are not closely related, and bioluminescent traits have seemingly evolved separately at least 30 times.\n\nWith countless well lit subterranean caves and glowing caverns, it makes one wonder what could be dwelling in vast unexplored areas under the crust.\n\n\n\nIn India, this underground oasis is best known by its Sanskrit name, Shambhala, thought to mean ‘place of tranquility.’\n\nMythologies throughout the world, from North and South America to Europe and the Arctic, describe numerous entrances to these fabled inner kingdoms.\n\n\nRelated:  Holding Space for the Arising of Our 5D Sacred Human\n\nAssuming that the myths are true, and the Earth is partially hollow, how could life survive underground? How would organisms receive the ventilation required to breathe miles below the surface?\n\nSurface trees and rainforests are responsible for less than one-third of the Earth’s oxygen, while marine plants, such as phytoplankton, are responsible for between 70 to 80 percent of the oxygen in the Earth’s atmosphere. The vast majority of our oxygen comes from aquatic organisms.\n\nPhytoplankton, kelp, and algae produce oxygen as a byproduct of photosynthesis, a process which converts carbon dioxide and light into sugars which are then used for energy.\n\nPhytoplankton is responsible for HALF of Earth's oxygenPhytoplankton is responsible for HALF of Earth’s oxygen\n\nWhile the process of photosynthesis usually implies the presence of sunlight, the Sun is not the only available light or energy source able to power photosynthesis.\n\nBefore the discovery of hydrothermal vents, and their ecosystems, scientists believed that only small animals lived at the ocean bottom, in seafloor sediments.\n\nThey theorized that these animals received their food from above, because the established model of the marine food chain depended on sunlight and photosynthesis, just as the food chain on land does.\n\nMainstream academia taught that this was the only way life could survive in the darkness of the deep seafloor. The discovery of hydrothermal vents changed all that.\n\nIt became clear that vast communities of animals grew quickly and to larger than expected sizes in the depths without the aid of the Sun.\n\nInstead of using light to create organic material (photosynthesis), microorganisms at the bottom of the food chain at hydrothermal vents used chemicals such as hydrogen sulfide (chemosynthesis).\n\nRelated:  Stellar Light Transmission: Awaken to Your True Starseed Origins\n\nAt the seafloor, there are thriving ecosystems that receive energy not from the sun, but from the heat and chemicals provided by the planet itself.\n\nFor many thousands of species dwelling in the deep, the energy to sustain life does not flow down from above, but comes up from the interior of the earth.\n\nEven in the unlikely scenario where every single tree were chopped down, we would still be able to breathe thanks to aquatic plant-life (ex. algae).\n\nThe Earth has a tremendous amount of water, and these oceans, rivers, and lakes are teeming with numerous species of biologically active, oxygen-producing organisms.\n\nAre there any known sources of sustenance available that could provide for a large human population?\n\nWhat evidence is there that a sustainable biosphere could exist miles below the surface, totally isolated from the nourishment and the established life cycle provided by the sun?\n\nWhere are the entrances to inner earth, and which races live inside?\n\nAuthor and anthropologist, Robert Sepehr, explores these questions and attempts to unlock their riddles, which have eluded any consideration in mainstream academia.\n\nNumerous endeavors have been undertaken to access the interior of the earth.\n\nPolar expeditions and battles, such as Operation Highjump, still remain largely classified, and have been shrouded in secrecy for decades, but scientific revelations validating the rumors surrounding these covert events, and their implications, are finally being exposed to daylight.\n\nWhat are the mysteries of inner Earth?\n\n\nBy Robert Sepehr\n\nRobert Sepehr’s book, Gods with Amnesia: Subterranean Worlds of Inner Earth, is available on Amazon and all good bookstores. \n\n\nUse Facebook to Comment on this Post", "pred_label": "__label__1", "pred_score_pos": 0.8428030610084534} {"content": "Poverty and Progress in the Caribbean, 1800–1960\n\nFree download. Book file PDF easily for everyone and every device. You can download and read online Poverty and Progress in the Caribbean, 1800–1960 file PDF Book only if you are registered here. And also you can download or read online all Book PDF file that related with Poverty and Progress in the Caribbean, 1800–1960 book. Happy reading Poverty and Progress in the Caribbean, 1800–1960 Bookeveryone. Download file Free Book PDF Poverty and Progress in the Caribbean, 1800–1960 at Complete PDF Library. This Book have some digital formats such us :paperbook, ebook, kindle, epub, fb2 and another formats. Here is The CompletePDF Book Library. It's free to register here to get Book file PDF Poverty and Progress in the Caribbean, 1800–1960 Pocket Guide.\n\nThe construction of railroads transformed many regions economically. Given the lack of navigable river systems, which had facilitated economic development of the United States, the innovation of railroad construction overcame significant topographical obstacles and high transaction costs.\n\nWhere large networks were constructed, they facilitated domestic economic integration as well as linking production zones to ports and borders for regional or international trade. An example is line built from the nitrate zone in northern Chile, seized during the War of the Pacific , to the coast.\n\nBritish capital facilitated railway construction in Argentina, Brazil, Peru, and Mexico, with significant economic impact. There was investment in improved port facilities to accommodate steamships , relieving a bottleneck in the transportation links, and resulting in ocean shipping costs dropping significantly. Brazil and Argentina showed the greatest growth in merchant steam shipping, with both foreign and domestic ships participating in the commerce. Although improved port facilities affected Latin American economies, it is not a well-studied topic.\n\nTelegraph lines were often built beside railway lines. An early boom and bust export in Peru was guano , bird excrement that contains high amounts of nitrates used for fertilizer. Deposits on islands owned by Peru were mined industrially and exported to Europe. The extraction was facilitated by Peruvian government policy. Sugar remained an important export commodity, but it fell in importance in Brazil, which shifted to coffee cultivation.\n\nSugar expanded in the last Spanish colonies of Cuba and Puerto Rico with African slave labor, which was still legal in the Spanish empire. Wheat production for export was stimulated in Chile during the California gold rush of the mid-nineteenth century, but ended when transportation infrastructure in the U.\n\nIn Argentina, wheat became a major export product to Britain, since transport costs had dropped enough to make such a bulk product profitable. As foreign demand for coffee expanded in the nineteenth century, many areas of Latin America turned to its cultivation, where the climate was conducive. Brazil, Colombia, Guatemala, El Salvador, and Costa Rica became major coffee producers, which disrupted traditional land tenure patterns and necessitated a secure workforce. Brazil became dependent on the single crop of coffee.\n\nSlave labor was redirected to coffee cultivation. A case study of a commodity boom and bust is the Amazon rubber boom. Found wild in Brazil and Peru, rubber trees were tapped by workers who collected the raw sap for later processing. The abuses against indigenous were chronicled by the British consul, Sir Roger Casement. Foreign ownership of oil was an issue in Mexico, with expropriation of foreign companies in Large petroleum deposits were found in Venezuela just after the turn of the twentieth century and has become the country's major export commodity.\n\nSilver declined as a major export, but lesser minerals such as copper and tin became important starting in the late nineteenth century, with foreign investors providing capital. Tin became the main export product of Bolivia, eventually replacing silver, but silver extraction prompted the building of a railway line, which then allowed tin mining to be profitable. It was a significant industry in Mexico as well. Following independence, most Latin American countries tried to attract immigrants, but only after political stability, increased foreign investment, and decreasing transportation costs on steamships, along with their speed and comfort in transit did migrants go in large numbers.\n\n • Migration, Racism and Identity: The Caribbean Experience in Britain;\n • ISBN 13: 9780333372128.\n • Shop by category.\n • Lesson 1: Defining Terms - Poverty and Capitalism - Foundation For Teaching Economics.\n • Acts!\n • Accessibility Navigation.\n • Treasures Handwriting Manuscript Teachers Edition: Kindergarten;\n\nImmigration from Europe as well as Asia provided a low-wage workforce for agriculture and industry. Many went as single men rather than as part of families, who settled permanently. In Peru, Chinese laborers were brought to work as virtual slaves on coastal sugar plantations, allowing the industry to survive, but when immigration was ended in the s, forced labor was ended in the s, landowners sought domestic laborers who migrated from other areas of Peru and kept in coercive conditions. The labor force also expanded to include women working outside of the domestic sphere, including in coffee cultivation in Guatemala and in the industrial sector, examined in a case study in Antioquia , Colombia.\n\nThe outbreak of World War I in disrupted British and other European investment in Latin America, and the international economic order vanished. During the World War I period —18 , few Latin Americans identified with either side of the conflict, [9] although German attempted to draw Mexico into an alliance with the promise of the return of territories lost to the U.\n\nThe only country to enter the conflict was Brazil , which followed the example of the United States and declared war on Germany. Despite the general neutrality, all areas suffered disruption of trade and capital flows, since transatlantic transport was disrupted and European countries were focused on the war rather than investing overseas. The Latin American countries that were most affected were those that developed significant trade relations with Europe.\n\nArgentina , for example, experienced a sharp decline in trade as the Allied Powers diverted their products elsewhere, and Germany became inaccessible. With the suspension of the gold standard for currencies, movement of capital was interrupted and European banks called in loans to Latin America, provoking domestic crises. Direct foreign investment from Great Britain, the dominant European power, ended. Commodities useful for the war, such as metals, petroleum, and nitrates, increased in value, and source countries Mexico, Peru, Bolivia, and Chile were favored.\n\nThe United States was in an advantageous position to expand trade with Latin America, with already strong ties with Mexico, Central America, and the Caribbean. With the opening of the Panama Canal in and the disruption of the transatlantic trade, U. An important development in this period was the creation and expansion of the banking system, especially the establishment central banks in most Latin American countries, to regulate the money supply and implement monetary policy.\n\nIn addition, a number of countries created more specialized state banks for development industrial, agricultural, and foreign trade in the s and s. The U. Kemmerer \"the money doctor\" to advise them on financial matters. The s saw the establishment of central banks in the s in the Andean region Chile, Peru, Bolivia, Ecuador, and Colombia as a direct result of the Kemmerer missions.\n\nAs industrialization, agricultural reform, and regulated foreign commercial ties became important in Mexico, the state established a number of specialized state banks. Changes in U. A number of Latin American countries became not only linked to the U.\n\nSince most Latin American countries had been dependent of the commodity export sector for their economic well-being, the fall in commodity prices and the lack of increase in the non-export sector left them in a weak position. Manufacturing for either a domestic or export market had not been a major feature of Latin American economies, but some steps had been taken in the late nineteenth and early twentieth centuries, including in Argentina, often seen as the key example of an export-dependent economy, one based on beef, wool, and wheat exports to Britain.\n\nArgentina experienced growth of domestic industry in the period —, which responded to domestic demand for goods generally not imported beer, biscuits, cigarettes, glass, paper, shoes. Improvements in beer production that kept the product stable for longer and the development of transportation networks meant that beer reached a mass market.\n\nThe external shock of the Great Depression had uneven impacts on Latin American economies. The values of exports generally decreased, but in some cases, such as Brazilian coffee, the volume of exports increased. Credit from Britain evaporated. Although the so-called money doctors from the U.\n\nLatin American governments abandoned the gold standard, devalued their currencies, introduced foreign currency controls, and attempted to adjust payments for foreign debt servicing, or defaulted, including Mexico and Colombia. There was a sharp decline in imports, resulting also in the decline of revenues from import duties. In Brazil, the central government destroyed three years' worth of coffee production to keep coffee prices high. Latin America recovered relatively quickly from the worst of the Depression, but exports did not reach the levels of the late s.\n\nBritain attempted to reimpose policies of preferential treatment from Argentina in the Roca-Runciman Treaty. Nazi Germany's policies dramatically expanded its bilateral trade with various Latin American countries. There was a huge increase in Brazilian cotton exports to Germany. The recession in the U. With the outbreak of World War II in , Latin American trade with Germany ceased due to the insecurity of the sea lanes from German submarine activity and the British economic blockade.\n\nFor Latin American countries not trading significantly with the U. For Latin America, the war had economic benefits as they became suppliers of products useful to the Allied war effort and they accumulated balances in hard currency as imports dwindled and the prices for war-related commodities increased.\n\nThese improved Latin American governments' ability to implement programs of import substitution industrialization , which expanded substantially in the post-war period. Increasing birth rates, falling death rates, migration of rural dwellers to urban centers, and the growth of the industrial sector began to change the profile of many Latin American countries. Population pressure in rural areas and the general lack of land reform Mexico and Bolivia excepted produced tension in rural areas, sometimes leading to violence in Colombia and Peru in the s.\n\nSchools shifted their focus over time from creating citizens of a democracy to training workers for the expanding industrial sector. Many Latin American governments began to actively take a role in economic development in the post-World War II era, creating state-owned companies for infrastructure projects or other enterprises, which created a new type of Latin American entrepreneur. Mexico nationalized its petroleum industry in from the British and U. The Mexican government did that with full legal authority, since the revolutionary-era Mexican Constitution gave the state authority to take control over natural resources, reversing the liberal legislation of the late nineteenth century granting inalienable property rights to private citizens and companies.\n\nBrazil established the state monopoly oil company Petrobras in In Bolivia, the revolution under Victor Paz Estenssoro overturned the small group of businessmen controlling tin, the country's main export, and nationalized the industry, and decreed a sweeping land reform and universal suffrage to adult Bolivians. Many Latin American countries benefited from their participation in World War II and accumulated financial reserves that could be mobilized for the expansion of industry through import substitution industrialization.\n\nIn the post-World War II era, a new framework to structure the international system emerged with the U. In , a multi-nation group forged formal institutions to structure the post-war international economy. The Bretton Woods agreements created the International Monetary Fund , to stabilize the financial system and exchange raters, and the World Bank , to supply capital for infrastructure projects. It includes members from Latin America as well as industrialized countries elsewhere.\n\nPoverty and progress in the Caribbean, 1800-1960\n\nEarlier ideas for creating such a bank date to the s, but did not come to fruition. However, in the post-World War II era, there was a renewed push, particularly since the newly established World Bank was more focused on rebuilding Europe. In Brazil, President Juscelino Kubitschek endorsed the plan to create such a bank, and the Eisenhower administration in the U.\n\nMost funded projects are economic and social infrastructure, including \"agriculture, energy, industry, transportation, public health, the environment, education, science and technology, and urban development. The number of partner nations has increased over the years, with an expansion of non-borrowing nations to Western Europe, Canada, and China, providing credit to the bank. Latin America developed a tourism industry aimed at attracting foreign and domestic travelers.\n\nCollect modern first editions\n\nIn Mexico, the government developed infrastructure in Acapulco in the s and Cancun , beginning in , to create beach resorts. Indigenous areas that had been economic backwaters in the industrial economy became destinations for tourism, often resulting in commodification of culture. A major shock to the new order of U. It shifted quickly from reform within existing norms to the declaration that Cuba was a socialist nation.\n\nCuba expropriated holdings by foreigners, including large numbers of sugar plantations owned by U. For the United States, the threat that revolution could spread elsewhere in Latin America prompted U. President John F. Kennedy to proclaim the Alliance for Progress in , designed to aid other Latin American governments with implementing programs to alleviate poverty and promote development.\n\nA critique of the developmentalist strategy emerged in the s as dependency theory , articulated by scholars who saw Latin American countries' economic underdevelopment as resulting from the penetration of capitalism that trapped countries in a dependent position supplying commodities to the developed countries. It has been superseded by other approaches including post-imperialism. Although the Cuban Revolution had come to power by violence, a \"peaceful road to socialism\" appeared for a time to be possible. In , Chile elected as president socialist Salvador Allende , in a plurality.\n\nThis was seen as a \"peaceful road to socialism,\" rather than armed revolution of the Cuban model. Allende attempted to implement a number of significant reforms, some of which had already been approved but not implemented by the previous administration of Christian Democrat Eduardo Frei. Frei had defeated Allende in the previous presidential election in good part because he promised significant reform without serious structural change to Chile, while maintaining rule of law.\n\nHe promised agrarian reform, tax reform, and the nationalization of the copper industry. There was rising polarization and violence in Chile and increasing hostility of the administration of U. President Richard Nixon. A military coup against Allende on September 11, , during which he committed suicide. This marked the end of the transition to socialism and ushered in an era of political repression and economic course changes. Leftist revolutions in Nicaragua and the protracted warfare in El Salvador saw the U. By the s, the world economy had undergone significant changes and Latin American countries were seeing the limits of inward turning development, which had been based on pessimism about the potential of export-led growth.\n\nIn the developed world, rising wages made seeking lower-wage locations to build factories more attractive. Multinational corporations MNCs had movable capital to invest in developing countries, particularly in Asia. Latin American countries took note as these newly industrializing countries experienced significant growth in GDP.\n\nIn , the U. With the rise in oil prices, oil producing countries had considerable capital to invest and international banks based in the U. Latin American countries took on debt to fuel the economic growth and integration into a globalizing market. The promise of export earnings using borrowed money enticed many Latin American countries to take on loans, valued in U. Creditors were eager to invest in Latin America, since in the mids real interest rates were low and optimistic commodity forecasts made lending a rational economic decision.\n\nForeign capital poured into Latin America, linking developed and developing countries financially. The vulnerabilities in the arrangement were initially ignored. Mexico in the early s saw economic stagnation. With the discovery of huge oil reserves in the Gulf of Mexico in the mids, Mexico appeared to be able to take advantage of high oil prices to spend on industrialization as well as fund social programs. Foreign banks were eager to lend to Mexico, since it seemed to be stable, had effectively a one-party political system that had kept social unrest to a minimum.\n\nby Ward, J. R\n\nAlso reassuring to international lenders was that Mexico had maintained a fixed exchange rate with the U. With the subsequent crash of the price of oil in —82, Mexico's economy was in shambles and unable to make payments on the loans. Some Latin American countries did not take part in this trend toward heavy borrowing from international banks.\n\nCuba remained dependent on the Soviet Union to prop up its economy, until the collapse of that state in the s cut Cuba off, sending it into a severe economic crisis known as the Special Period. Colombia limited its borrowing and instead instituted tax reform, which raised government revenues significantly. Latin American countries' borrowing from U. Capital flows to Latin America reversed, with capital flight from Latin America immediately preceding the shock.\n\nThe rise in interest rates affected borrowing countries, since servicing the debt directly affected national budgets. In many cases, the national currency was devalued, which cut demand for imports that now cost more. Inflation hit new levels, with the poor acutely affected. Governments cut social spending, and overall, poverty grew, and income distribution worsened. The economic crisis in Latin America was addressed by what came to be known as the Washington Consensus , which was articulated by John Williamson in These principles focused on liberalization of trade policy, reduction of the role of the state, and fiscal orthodoxy.\n\nThe term \"Washington Consensus\" implies that \"the consensus comes or is imposed from Washington.\n\nIs industrialization good for the economy?\n\nLatin American governments undertook a series of structural reforms in the s and 90s, including trade liberalization for must of Latin America and privatization. Chile, which had experienced the military coup and then years of dictatorial rule, implemented sweeping economic changes in the s: stabilization ; privatization —78 ; financial reform ; labor reform ; pension reform Mexico's economy had crashed in , and it began shifting its long-term economic policies to reform finances in , but even more significant change came under the government of Carlos Salinas de Gortari — Salinas sought Mexico's entry into the Canada-U.\n\nChanges in the Mexican Constitution were passed in that shifted the role of the Mexican state. Canada and the U. Growth of rural population in this period resulted in migrations to cities, where job opportunities were better, and movement to other rural areas opened up by road construction. With the formation in of the General Agreement of Tariffs and Trade GATT , a framework was established to lower tariffs and increase trade between member countries.\n\nIt eliminated differential treatment between individual nations, such as most favored nation status, and treated all member states equally. Although trade barriers fell with GATT and the WTO, the requirement that all member states be treated equally and the need for all to agree on terms meant that there were several rounds of negotiations. The Doha round most recent talks, have stalled. Many countries have established bi-lateral trade agreements and there has been a proliferation of them, dubbed the Spaghetti bowl effect.\n\nFree trade agreementss in Latin American and countries outside the region were established in the twentieth century. Some were short-lived, such as Caribbean Free Trade Association — , which was later expanded into the Caribbean Community. Following the election of Donald Trump in the United States, there have been negotiations on NAFTA, which will likely take into account changes in the economic situation since it came into effect in The migration of Latin Americans to areas with more prosperous economies has resulted meant the loss population across international borders, particularly the U.\n\nBut the remittances of money to their non-migrating families represent an important infusion to the countries' economies. Corruption is a major problem for Latin American countries and affects their economies. Money laundering of these black market funds is one result, often with the complicity of financial institutions and government officials. Violence from narcotrafficking has been significant in Colombia and Mexico. Agriculture is a sector of most Latin American economies, but in general those countries depending on agriculture as a major component of GDP are less developed than those with a robust industrial sector.\n\nThere is an unequal distribution of landholders, dating to the colonial era. In many countries a disproportionate number of small cultivators who are not entirely self-sufficient, subsistence farmers, but are not part of the export economy. Brazil and Argentina lead the region in terms of net export due to high grain, oilseed, and animal protein exports.\n\nIn Brazil and Argentina large farms account for most of the commercial agriculture, but in much of Latin America, agriculture production comes from the region's small farms. Global demand for agricultural products is rising due to the world's growing population and income levels. Rabobank reports that Latin American has achieved rates of agricultural productivity that are above the global average, however, there is a lot of variation in the performance of the individual countries. Mining for precious metals dates to the prehispanic period in Latin America and was the economic driver for the throughout the colonial period in Spanish America and in the eighteenth century in Brazil.\n\nExtraction of minerals and petroleum dominate certain countries' economies rather than agriculture, especially Venezuela, Mexico, Chile, and Bolivia. These enterprises are large scale industrial enterprises requiring considerable capital investment. An exception to this model is gold mining in river systems, especially the Amazon, where poor miners extract gold from auriferous sands, and somewhat larger scale enterprises dredge the sands. Toxic chemicals are used in mine processing, including mercury and arsenic.\n\nDischarge of chemical waste into water systems contaminate them. Current mining practices create problems in all stages of production, from extraction to finished product. Recent mining of lithium in the Northwest of Argentina and Bolivia, as well as the discovery of new deposits are important since lithium is a key component in batteries to power electronics, such as mobile phones, electric cars, and electricity grids.\n\nArgentina's resources are now being mined by a joint Australian-Japanese-Argentina venture. Chile has been a major producer for decades, from the Atacama salt flat. Half of the participants in a BNAmerica's mining survey believe that political and legal uncertainty will slow mining investment in Latin America in Costs related to labor, energy, and supplies have increased for Latin American mining companies.\n\nSome companies are looking towards consolidation, automation, and owner-operated mines to lessen the impacts of rising costs. Although a significant proportion of production is in the mining and agricultural sectors, various countries of Latin America have significant manufacturing sectors as well. Latin American countries have had functioning banks and stock exchanges since the nineteenth century. Central banks have been established in most countries of Latin America to issue currency, manage flows, and implement monetary policy.\n\nIn countries where there was significant commodity export activity and foreign capital presence, stock exchanges were established in the nineteenth century: Rio de Janeiro, Brazil ; Buenos Aires, Argentina ; Peru ; Rosario, Argentina ; Mexico ; Uruguay Most other Latin American countries that created stock exchanges did so in the late twentieth century. In the late twentieth century, narcotrafficking , particularly cocaine in parts of Latin America infused some economies with large amounts of cash.\n\nIn Latin America, the level of infrastructure is described as inadequate and is one of the region's main barriers to economic growth and development. This causes a loss of competitiveness due to the quality of physical infrastructure has been a significant drag on economic growth. Governments play an important role in encouraging infrastructure investment. In Latin America, there are sectoral planning institutions in place across the region, but many key attributes can be improved. The International Monetary Fund found that Latin America performs poorly in the availability of funding for infrastructure and the availability of multiyear budgeting frameworks.\n\nThe Private sector also plays an active role in supplying infrastructure. Governments in Latin America do a poor job of encouraging private sector participation. While infrastructure in Latin America still has room to grow, there are encouraging signs for investment in Latin American infrastructure. Your reading intentions are also stored in your profile for future reference. To set a reading intention, click through to any list item, and look for the panel on the left hand side:.\n\nPoverty and progress in the Caribbean Read: pp. Type Book Author s J. Library availability. Buy from Amazon. View all copies of this ISBN edition:. Learn more about this copy. Customers who bought this item also bought. Stock Image. Used Paperback Quantity Available: 1. Seller Rating:. Used Paperback Quantity Available: 2.\n\n • Disseminated Intravascular Coagulation - A Medical Dictionary, Bibliography, and Annotated Research Guide to Internet References.\n • Poverty and progress in the Caribbean, - Semantic Scholar.\n • Enhancing European Security: Living in a Less Nuclear World.\n • Global Extreme Poverty - Our World in Data.\n • Poverty Social Progress?\n\nPublished by Macmillan Used Softcover Quantity Available: 1. Anybook Ltd. Lincoln, United Kingdom. Published by Palgrave Macmillan MusicMagpie Stockport, United Kingdom. Poverty and Progress in the Caribbean, J. Published by Macmillan U. Shadow Books Norwich, United Kingdom.\n\nSeller Image. Poverty and Progress in the Caribbean: Ward, J. Makovski Books Southampton, United Kingdom. Poverty and progress in the Caribbean, Studies in economic and social history J.", "pred_label": "__label__1", "pred_score_pos": 0.8695316314697266} {"content": "Not quite an adult. They are still considered someone’s child. Some are well behaved. Some are outright wild. They are certainly not elves or gnomes. However, I think that their « testy » behavior is due to changing hormones. They brains seem to steadily grow sponging up all kinds of knowledge. Not all graduate from high school. Some do not even make it to college. This is … Continuer de lire Teenagers", "pred_label": "__label__1", "pred_score_pos": 0.7992084622383118} {"content": "Pc Programming Made Straightforward If you want to learn programming, you’ve come to the suitable place. A computer program is also known as a computer software program, which can vary from two strains to hundreds of thousands of traces of directions. Programming has all the time been subjected to memes all the time. The source code written in one system works in another working system without any change.programing\n\nIdeally, the programming language best suited for the duty at hand might be chosen. The rest of this page offers solutions to among the most common questions new programmers have about C, C++ and programming. Find source code for comparable applications to what you want to make if at all potential.\n\nIt is extremely difficult to determine what are the most well-liked of modern programming languages. Don’t depart your present undertaking immediately (I do know you won’t) to study C. You’ll be able to be taught it when you’ve free time and want to expand your programming skills.\n\nStudy C And C Programming\n\nPython is a excessive-stage programming language used for normal objective programming. Pada tahun 1954, FORTRAN diciptakan, melainkan tingkat pertama bahasa pemrograman tinggi untuk memiliki implementasi fungsional, dibandingkan dengan hanya desain di atas kertas 9 10 (Sebuah bahasa tingkat tinggi adalah, dalam istilah yang sangat umum,.\n\nC++ is a strong general-function programming language. Franklyn Turbak and David Gifford with Mark Sheldon : Design Ideas in Programming Languages, The MIT Press 2009. The increased use of high-level languages introduced a requirement for low-level programming languages or system programming languages These languages, to varying levels, provide amenities between assembly languages and excessive-stage languages.\n\nHow To Get Began With C Or C\n\nFor OS X, I like to recommend Apple XCode , and for Linux, g++ All of those links will aid you stand up and operating and ready to start programming.\nProgramming software program is a software program which helps the programmer in creating other software. Different people, or your self at a later time, cannot understand the programming behind your program. In different circumstances (like purposes using a database, or network access) a majority of your software’s time is spent waiting to access data or the community, and using a “faster” compiled language will not make a lot distinction.\n\nThe invalid operation may be detected when the program is compiled (“static” kind checking) and will likely be rejected by the compiler with a compilation error message, or it may be detected while this system is working (“dynamic” sort checking), leading to a run-time exception Many languages enable a operate called an exception handler to deal with this exception and, for instance, all the time return “-1” because the result.\n\nPc Programming is enjoyable and easy to be taught offered you undertake a proper method. Most importantly, it is co-written by Dennis M. Ritchie, creator of C programming language. You possibly can create superior softwares without realizing C programming at all.\n\nEven if you are an experienced programmer, I recommend you to study it at some point; it’ll actually assist. If you know C and C++ programming, you will not have any downside switching to another language. You’ll be able to obtain C programs , C++ programs , Java packages , and projects from newbie to advanced degree.\n\nCambridge English Dictionary\n\nBefore moving into laptop programming, let us first understand computer programs and what they do. Start with an introductory course in laptop science corresponding to Harvard’s common CS50 or MIT’s Introduction to Pc Science and Programming Utilizing Python to learn key concepts and fundamentals. The directions, also referred to as code, are written in a programming language which the computer can understand and use to carry out a process or clear up a problem.\n\nProgram:program is a typical laptop term that can be used as both a noun and verb a program is executed by software that runs on a pc when program is used as what it means to create a software program packages for example programmers create applications by writing for that instruct the computer what to do.\n\nPc Programming Tutorial\n\nProgramming FAQ Learn C and C++ Programming covers both C and C++ in-depth, with both beginner-friendly tutorials, more advanced articles, and the book Leaping into C++ , which is a extremely reviewed, friendly introduction to C++. This implies, the applications that observe ANSI C normal are moveable amongst working programs. Computer program instructions are additionally referred to as program supply code and laptop programming is also called program coding. Pemrogram yang baik biasanya mengkombinasikan ketiga hal tersebut, agar dapat menciptakan program yang efisien, baik dari sisi saat dijalankan (run time) atau memori yang digunakan.\n\nDebugging is a vital job within the software program improvement process since having defects in a program can have vital penalties for its customers. C is a general-goal programming language used for wide selection of functions from Working techniques like Home windows and iOS to software program that is used for creating 3D films.\nLaptop programming is the method of telling a computer to do sure things by giving it directions. For example, the Harry Potter novels had been written in British English , and had been then subsequently translated into 67 different languages, including Hindi , Latvian , and Latin In a lot the same approach, a computer program will be compiled (or “translated”) into machine code, and it could probably be compiled into totally different architectures (or “dialects”) of machine code to suit different computer systems.", "pred_label": "__label__1", "pred_score_pos": 0.7315627336502075} {"content": "Spaceship Earth: Whose views: part 2\n\nIn a continuation of our previous column, two more politicians’ political platforms in relation to the Green New Deal will be discussed. Two weeks ago, Bernie Sanders and Elizabeth Warren were compared, and now Joe Biden and Pete Buttigieg’s platforms will be thrown into the mix. We know this campus leans pretty liberal, but it’s useful to know more moderate platforms when talking with others. So without further ado, let’s get started.\n\nAlthough Buttigieg seems to have more moderate stances compared to his fellow candidates, he stands out in that he’s actually part of the generation that will be most affected by the climate crisis. His website calls it “the greatest challenge of our time.” His actual plan is divided into three parts: 1) build a clean economy, 2) invest in resilience and 3) and demonstrate global leadership. The main goal of the first section is to invest in clean energy and reach a carbon neutral society by 2050. He wants to follow the vision of the Green New Deal but apply his own more market-focused plans. By 2025, he wants to double the amount of clean electricity produced in the United States. However, considering only approximately 17% of current energy production is green, this aspect of the plan won’t have much impact. Furthermore, as time goes on, it would appear that energy consumption will only increase, so more ambitious plans are needed. His plan ultimately commits around $1.5 trillion and estimates that it will create 3 million jobs, making it much weaker economically than plans like Bernie’s. Overall, it seems difficult to fully call this a “Green New Deal” as it seems to fail to create the radical change needed to combat climate change. This is clear when compared to other climate plans, even when compared to another fairly moderate candidate like Joe Biden.\n\nBiden’s climate plan invests $1.7 trillion and claims to adopt the Green New Deal as its central framework. It matches in many ways the plan proposed by Buttigieg, although it is slightly more intentional in its commitment to climate justice. His stance on labor rights compared to other candidates is much weaker, however. While Biden’s plan states that he will “defend workers’ rights to form unions and collectively bargain,” in an environment that is rather hostile against unions, a president is needed that will actively fight for unions and the rights of workers in the new green sector. For a candidate who used to support “clean coal” during the Obama years, Biden has certainly come a long way. However even his plan should be considered moderate. In order to fully tackle the crisis of climate change, a radical new approach must be taken. Although he supports the ideals and the framework of the Green New Deal, without sufficient investment, the framework will not be enough.\n\nIn conclusion, as you approach conversations about the 2020 elections with your Boomer parents and family over Thanksgiving dinner, we hope these analyses have provided some helpful discussion points. And while you’re at it, maybe check that you’re registered to vote. To reiterate, no matter who we elect, we must mobilize locally and nationally: ORGANIZE. VOTE. STRIKE.", "pred_label": "__label__1", "pred_score_pos": 0.9051384329795837} {"content": "Job description\n\n\n • Entry level\n • No Education\n • Salary to negotiate\n\n\nPosting Details\n\nPosition Information\n\nJob TitleAdministrative AssistantPosition TypeClassified Position Code2CHU14FTE1.0Pay Rate (or Annual Salary)$4,042.25/monthJob LocationChabot College, 25555 Hesperian Blvd., Hayward, CA 94545DepartmentArts and HumanitiesJob SummaryThe Chabot-Las Positas Community College District is seeking an Administrative Assistant for Chabot College in Hayward, California.\n\nUnder general supervision, perform a variety of general administrative, secretarial, and difficult and complex clerical duties in support of assigned program area; provide support and assistance to assigned supervisory, academic, and classified staff; serve as a liaison between the assigned area and/or assigned supervisor and other staff, the general public, students, faculty, and other campus and community officials; and provide a wide variety of reference and resource information related to assigned function or program area.\n\nThe Administrative Assistant is the journey-level classification in the administrative support/secretarial series. Incumbents are assigned to perform a wide range of administrative support, secretarial, and clerical duties independently for a program area or to provide secondary support to a large/complex administrative, academic services, or student services program area. Incumbents at this level typically receive instruction or assistance only as new or unusual situations arise, and have familiarity with the operating procedures and policies of the work unit upon completion of the probationary period.\n\nThe Administrative Assistant is distinguished from the College Clerk by the direct secretarial support the Administrative Assistant provides to a program area including providing general administrative and secretarial support to professional or management staff. It is further distinguished from the Senior Administrative Assistant classification in that the Senior Administrative Assistant class is responsible for providing support to senior management staff with responsibility for a large/complex administrative, academic services, or student services program area. The Senior Administrative Assistant classification typically reports to and is the primary position supporting a Dean or Director level administrator or provides advanced journey-level secretarial support to executive, administrative, or management staff.\n\n\n\n1. Perform responsible secretarial and administrative support duties for assigned supervisor and program area; relieve assigned supervisor and other assigned staff of a variety of clerical, technical, and administrative details; provide assistance in organizing functions and activities that involve assigned area; as necessary and appropriate, serve as liaison between assigned supervisory staff or program area and administrators, other District personnel, and the general public.\n\n2. Perform administrative support duties to assist the supervisor in meeting reporting requirements, functional responsibilities, and research objectives; coordinate the office work of the supervisor and/or program area; develop schedules related to office/department activities and services; review, update, and inform assigned supervisor and other staff in assigned area of essential timelines; coordinate the flow of activities through the office in relation to priorities and schedules; assure the timely completion of work in accordance with established policies, procedures, and standards.\n\n3.Utilize electronic technology to correspond with others and to maintain assigned calendars, schedules, and appointments; schedule usage of department facilities; coordinate and arrange meetings; coordinate activities with other divisions and departments.\n\n4. Serve as liaison and facilitate communications between assigned supervisor, other administrators, students, academic and classified staff, other offices, educational institutions, public agencies, and the general public; interact and relay information, questions, and decisions regarding supervisor’s area of assignment; refer callers to other departments or individuals as necessary; prepare preliminary responses to routine correspondence for assigned supervisor’s approval.\n\n5. Prepare Board agenda items and supporting documents as necessary for assigned area; assure assigned supervisor receives timely notification of Board requests for information or action.\n\n6. Perform a variety of clerical accounting duties and responsibilities for assigned area; assist supervisor in budget administration; track budget activity; post, monitor, and track invoices and other expenditures; process budget/expense transfers; prepare purchase requisitions.\n\n7. Order office supplies and materials as directed; assure their timely receipt and storage; assure proper functioning of office equipment.\n\n8. Participate in payroll processing functions for assigned area including to prepare payroll forms and maintain records for timesheets and various authorizations.\n\n9. Provide staff support to standing and ad hoc committees and other groups as assigned; attend meetings and take notes or records proceedings; prepare and distribute agendas, background materials, and minutes as appropriate.\n\n10. Answer telephones and respond to routine questions and requests for information from administrative, management, academic, and/or classified staff, students, and the general public; communicate information in person or by telephone where judgment, knowledge, and interpretation of policies and procedures are necessary.\n\n11. Train and provide work direction to assigned student workers and other hourly workers as assigned.\n\n12. Establish and maintain complex, interrelated filing systems; collect, compile, and record narrative, statistical, and financial data and other information; track and verify eligibility for special programs such as athletics; research and verify information as requested.\n\n13. Type, format, proofread, duplicate, and distribute a wide variety of correspondence, reports, notices, schedules, lists, forms, and other materials according to established procedures, policies, and standards; type from rough draft, verbal instructions, or transcribing machine recordings; compose routine correspondence related to area of assignment; prepare preliminary responses to routine letters and general correspondence.\n\n14. Receive mail and identify and refer matters to the supervisor in order of priority.\n\n15. Utilizing thorough knowledge of various computer applications and software packages, enter, update, correct, and extract information; maintain and generate reports from a database or network system.\n\n16. Maintain current working knowledge of applicable hardware and software applications.\n\n17. Perform related duties as required.\n\nMinimum Education and ExperienceAny combination of the following would provide a typical way to obtain the required knowledge and abilities.\n\n\nEquivalent to the completion of the twelfth grade supplemented by specialized training in secretarial science, office automation, or a related field.\n\n\nTwo years of increasingly responsible clerical and secretarial experience involving a high level of public contact, use of computer and office applications, and providing secretarial support to a program area and/or management staff.\n\n\nKnowledge of:\n\n1. Operational characteristics, services, and activities of the functions, programs, and operations of the assigned office.\n\n2. Work organization and basic office management principles and practices.\n\n\n4. Basic principles, practices, and procedures of fiscal, statistical, and administrative record keeping.\n\n5. Principles, practices, and procedures of business letter writing.\n\n\n7. Basic research methods and techniques.\n\n8. Basic mathematical concepts.\n\n9. Principles and techniques used in public relations including methods and techniques of proper receptionist and telephone etiquette.\n\n10. Interpersonal skills using tact, patience, and courtesy.\n\n11. English usage, grammar, spelling, punctuation, and vocabulary.\n\n12. Oral and written communication skills\n\nAbility to:\n\n1. Learn and understand the organization and operation of the assigned office and/or department as necessary to assume assigned responsibilities.\n\n2. Learn, understand, interpret, and apply administrative and office policies and procedures as well as pertinent laws, regulations, and ordinances.\n\n3. Perform a range of administrative, secretarial, and clerical duties involving the use of independent judgment.\n\n4. Independently compose and prepare routine correspondence and memoranda.\n\n5. Prepare a variety of clear and concise administrative and financial records.\n\n\n7. Type or enter data at a speed necessary for successful job performance.\n\n8. Take and transcribe dictation, if required by the position, at a speed necessary for successful job performance.\n\n9. Implement and maintain filing systems.\n\n10. Train and provide work direction to others.\n\n11. Establish, review, and rev\n\n • hardware\n • payroll\n • software\n • storage\n • word", "pred_label": "__label__1", "pred_score_pos": 0.7682924866676331} {"content": "A group of fishermen and women with two children fish on the banks of the Tiber, with the Ponte Sant’Angelo and Hadrian’s Tomb (Castel Sant'Angelo), a symbol of Imperial Rome, in the background. \n\nSwiss painter Abraham-Louis-Rodolphe Ducros, who lived in Rome from 1777 to 1792, specialised in producing views of the city and its surroundings for the Grand Tour market. His works are characterised by a precise depiction of topographical details and by a sense of the grandiosity of Roman architecture that reveals Piranesi’s influence. Grand Tour travellers often found Roman street life as interesting as the remains of the city’s glorious past, which provide the setting for the picturesque scene in the foreground of this view from the King’s Topographical Collection.", "pred_label": "__label__1", "pred_score_pos": 0.5376737117767334} {"content": "Stock Trading: Your Portal To The Market\n\nThe stock market has been a cause of plenty of problems. Baby boomers understand how it works and how to take advantage of it. Or when to avoid it altogether. When companies launch their IPOs, the public gets a chance to invest. This requires them to access companies’ shares to build a portfolio of their own.\n\nThat’s where a share broking company comes into the picture.\n\nAs a company that handles money day in day out, you need to take plenty of things into consideration. But one of the crucial things to consider is the software you are going to use.\n\nYou need to begin with a CRM. Now, of course, this needs to be a multi-layered CRM of an enterprise level. The ideal choices for long term scaling are Microsoft’s Dynamics 365 CRM and Salesforce. You can also start with a small-scale CRM like SuiteCRM or Sugar. On top of this, you will need to have a trading portal to give access to employees so they can handle clients and their portfolios. It is important to define the CRM so we can base the features off the inbuilt features available with that particular CRM.\n\n- Portfolio management\n\n- Quote view of each stock\n\n- Customized news module\n\n- Alerts for transactions\n\n- Emails\n\nPortfolio management:\n\nYour portfolio managers would have clients allotted to them. A customer portal will give access to both of them. Customers can see their stocks, their current market value, the number of stocks they have of each company, etc. This module can also show them a sum of all the shares they own and how much it amounts to.\n\nThis way your end users get a dedicated place to grow their investments, as well as learn more about investing. It gives them quick insights into their portfolio.\n\nQuote view of each stock:\n\nWith just a click, customers can get the quote of each stock that they own. This gives a comprehensive view of the day’s highest and lowest prices and thus helps make decisions about the stock they might want to buy or sell.\n\nThe end user can compare and therefore get an average of the day’s fluctuating prices. Then they can set their benchmarks for buying and selling based on that. They can take a more calculated action because of this.\n\nCustomized news alert:\n\nGetting updates about the companies that they invest in is crucial. Sometimes, companies give bonus shares or dividends on shares they own. Apart from this, whatever actions the companies take tend to affect their stocks and in relation to that the market as a whole. This is why a dedicated news section is necessary, which can give overall stock market news and allow users to curate it based on their interests.\n\nSuch alerts help users when it comes to knowing various business details of companies, like their mergers, acquisitions, dissolutions, bankruptcy filing, etc.\n\nAlerts for transactions:\n\nTransacting stocks on such a portal can be highly convenient. You allot shares to sell at a certain price point and if their market value touches that price point, the shares will be sold. The buying process works similarly. It can take about a couple of days for the transactions to reflect in the account.  Therefore, a push notification on the phone or an email for the transaction can help the customer keep track of their investments. Such notifications act as reminders to clients. Emails also work as proof of transactions.\n\n\nAs a broking firm, you can send out emails to your customers regarding a weekly report of the market, upcoming IPOs, and announcements by companies that are likely to cause changes in the stock price. You can also send curated tips on the best trade practices as well as good companies to invest in. The email module can be predefined to include certain elements, which you can modify and customize if you want.\n\nThese emails give the customers a little something extra and can go a long way in building trust. They get an overview of the market for the week, and learn new ways to enhance their investments.\n\nLet’s talk about some more features that the trading portal can have and should have:\n\n- Your trading portal should be secure. It will be handling a huge number of customers and their sensitive data, like bank account details and stocks.\n\n- It will have to be user friendly so that it doesn’t mislead customers into taking any action that they don’t fully understand.\n\n- The portal can have a knowledge base section where customers can gain knowledge about the stock market, benefits of trading, how to manage portfolios, etc.\n\n- It should have a role-based access module so that each employee can have access to their own customers and the overall managerial access can stay with the managers.\n\n- End users get a neat dashboard upon logging in. This can show them their last transactions, their allotted funds, the sum of their invested funds, current market rate, the rate of precious metals, etc.\n\n- The portal can also be available in multiple languages if you have the requirement. In a country that speaks more than one language, this can be highly beneficial.\n\nTrading stocks encourages rotation in the economy. As a broker, you earn from the brokerage you get when your customers make transactions. The better, more secure your trading practices, more customers will be willing to invest with you.\n\nAs far as your clients are concerned, trading in the stock market makes them a small percentage owner in companies. It is beneficial for all parties involved, both monetarily and regulatorily. For brokers, it is a business that is both lucrative and risky. This makes it crucial to have top of the line tools. A CRM customer portal, when customized well, is a premium option as such a tool.\n\nAbout CRMJetty:\n\nCRMJetty makes innovative customer engagement solutions and portals, and our Dynamics CRM customer portal is one of the gems. If you are in the market for a trading portal, contact us for a customized solution.\n", "pred_label": "__label__1", "pred_score_pos": 0.7857994437217712} {"content": "Emergent quasicrystals in strongly correlated systems\n\nEmergent quasicrystals in strongly correlated systems\n\nEran Sagi Department of Condensed Matter Physics, Weizmann Institute of Science, Rehovot 76100, Israel    Zohar Nussinov Department of Physics, Washington University, St. Louis, MO 63130, U.S.A. Department of Condensed Matter Physics, Weizmann Institute of Science, Rehovot 76100, Israel\n\nCommensurability is of paramount importance in numerous strongly interacting electronic systems. In the Fractional Quantum Hall effect, a rich cascade of increasingly narrow plateaux appear at larger denominator filling fractions. Rich commensurate structures also emerge, at certain filling fractions, in high temperature superconductors and other electronic systems. A natural question concerns the character of these and other electronic systems at irrational filling fractions. Here we demonstrate that quasicrystalline structures naturally emerge in these situations, and trigger behaviors not typically expected of periodic systems. We first show that irrationally filled quantum Hall systems cross over into quasiperiodically ordered configuration in the thin-torus limit. Using known properties of quasicrystals, we argue that these states are unstable against the effects of disorder, in agreement with the existence of quantum Hall plateaux. We then study analogous physical situations in a system of cold Rydberg atoms placed on an optical lattice. Such an experimental setup is generally disorder free, and can therefore be used to detect the emergent quasicrystals we predict. We discuss similar situations in the Falicov-Kimball model, where known exact results can be used to establish quasicrystalline structures in one and two dimensions. We briefly speculate on possible relations between our theoretical findings and the existence of glassy dynamics and other features of strongly correlated electronic systems.\n\nThe effects of commensurability appear in an extensive set of strongly correlated systems that, amongst many others, includes the high-temperature cuprate superconductors Tranquada et al. (1995); Yamada et al. (1998); Zaanen and Gunnarsson (1989); Schulz (1990); Kato et al. (1990); Emery and Kivelson (1993) and the fractional quantum Hall systems Tsui et al. (1982); Laughlin (1983). These effects often arise from an intricate interplay between the inherent length scales of the system and restrictions, e.g., those concerning magnetization or total particle number. Depending on such externally imposed constraints, distinct phases may arise. This dependence may have strong consequences for the nature of excitations and criticality in such systems.\n\nTo motivate the quintessential physics investigated in this work, consider strongly interacting particles placed on the sites of a periodic lattice of sites. In a continuum rendition of such a theory (i.e., one in which the particles do not need to occupy lattice sites), when the interactions are long-ranged and repulsive, homogeneous Winger-crystal type Wigner (1934) structures will be energetically preferred; the periodicity of such a Wigner lattice will be set by the density and the particle interactions.\n\nIn this study, the particles will be constrained to reside on the discrete sites of another spatial structure – the underlying periodic crystal. The latter lattice defining the theory may be incommensurate relative to the basic periodicity of the ideal Wigner lattice. The mismatch between the externally imposed lattice spacing and the energetically favored Wigner lattice length scale may spawn complex superlattice structures, which may spontaneously break the original lattice translational symmetries (as well as rotational and other point group symmetries).\n\nFigure 1: A finite patch of the electronic quasicrystal that emerges in the 2-dimensional Falicov-Kimball model. Notice that while the particles reside on a periodic lattice, the resulting structure must be aperiodic due to the irrational filling of the system. However, the strong interactions trigger a long range ordered quasiperiodic structure, as revealed by the point-like diffraction pattern. Our results indicate that such quasicrystalline structures appear quite broadly in clean strongly correlated systems which exhibit the type of irrational frustration we describe.\n\nIn systems where the average number () of particles per site is irrational, simple periodic order is prohibited. Nevertheless, long range interactions may still favor the formation of structures with some form long-range correlations, even in the absence of periodicity.\n\nAs the above arguments hint, strongly interacting systems at irrational filling fractions may exhibit rich structures (and ensuing physical characteristics). Indeed, even deceptively simple-looking Ising and other models Elliott (1961); Bak and von Boehm (1980); Fisher and Selke (1980); Selke (1988); Gendiar and Nishino (2005); Bak and Bruinsma (1982); Chayes et al. (1996); Giuliani et al. (2006); Chakrabarty and Nussinov (2011); Giuliani et al. (2013); Giuliani and Seiringer (2015) harbor a plethora of highly nontrivial ground states and dynamics van Beijeren (1990) with devil staircase structures. Frustration effects between incommensurate length scales were additionally shown to induce incommesurately modulated crystals in various classical systems Frenkel and Kontorova (1938); Janssen (1995). It was further demonstrated experimentally that similar effects stabilize incommensurate composite crystals Lefort et al. (1996); Smaalen and Harris (1996); Weber et al. (1996). Related effects appear also in quantum systems, e.g., the frustration between the lattice and magnetic length scales in the Hofstadter problem Hofstadter (1976) gives rise to a fractal spectrum Dean et al. (2013).\n\nAs we will describe in this work, naturally occurring strongly correlated electronic systems and other quantum theories having only ubiquitous kinetic hopping, Coulomb, and spin exchange interactions may, quite broadly, harbor largely unexplored emergent quasicrystalline structures for irrational filling fractions (without spin-orbit terms explored in interesting recent studies Gopalakrishnan et al. (2013); Lifshitz (2014); Sandbrink et al. (2014); Gopalakrishnan et al. (2014)). For instance, as we will demonstrate, even on periodic one- and two-dimensional ionic lattices, interactions may render the underlying electronic structures to be quasicrystalline. The peculiar phenomenon of emergent quasicrystals (QCs) may trigger behaviors not typically expected of translationally invariant systems.\n\nThese new predicted emergent electronic (and other) quantum quasicrystalline structures notably differ from quasicrystals discovered long ago in metallic alloys Shechtman et al. (1984); Levine and Steinhardt (1984, 1986) and intensely studied in the decades since. In the celebrated metallic alloy quasi-crystalline systems, the underlying ionic structure is, on its own, already quasi-periodic and may be further stabilized, in some cases, by electronic effects Martin et al. (2015). By contrast, in the systems studied here an effective quasi-crystalline electronic (or other) structure emerges on periodic ionic or optical lattices.\n\nIn general, quasicrystals are aperiodic structures with well defined Bragg peaks Shechtman et al. (1984); Levine and Steinhardt (1984, 1986), i.e., the Fourier transform of the density takes the form\n\n\nwhere the reciprocal vectors are combinations of basis vectors, and the coefficients are integer valued. QCs differ from periodic crystals in that exceeds the spatial dimension Mermin (1992); Lifshitz (2011).\n\nA direct consequence of the above is that these structures have global symmetries, , satisfying Rigid translations are described by linear combinations of . The remaining independent phases describe additional global rearrangements that generate distinct QCs with identical statistical characteristics. These symmetry operations, having no analogs in periodic crystals, are called phason symmetries Bak (1985). Phason symmetries will play a key role in our investigation.\n\nQuantum Hall systems at irrational filling factors. To concretely describe our results, we first study the quantum Hall effect at an irrational filling and demonstrate the emergence of quasiperiodic structures. We predict that while these states are unstable against disorder, as evident from the observation of quantum Hall plateaux, one may, nonetheless, see signatures of the underlying quasiperiodic structure by looking at increasingly cleaner samples. Furthermore, as we will explain, similar phenomena appear in a system of cold Rydberg atoms, where disorder is absent and emergent quasicrystalline structures can be more crisply observed.\n\nWe focus on the so called “thin-torus limit”, in which the planar Quantum Hall (QH) system is mapped onto a one-dimensional (1D) classical problem Tao and Thouless (1983); Thouless (1985); Tao (1984); Bergholtz and Karlhede (2005); Seidel et al. (2005); Bergholtz and Karlhede (2008). The original two-dimensional (2D) fractional quantum Hall (FQH) Hamiltonian admits a natural 1D description within the guiding center representation, in which the single-electron wavefunctions are labeled by a 1D momentum momentum index . In the Landau gauge, for example, the momentum in the direction controls the average position in the direction.\n\nRemarkably, when placing the FQH system on a torus for which the circumference associated with one of its directions (the “-direction”) far exceeds the system size along the other transverse (“”-) direction, the overlap between adjacent wavefunctions diminishes and the 1D model becomes classical. Specifically, the remnant non-vanishing terms lead to\n\n\nwhere the natural numbers denote the occupancies of respective states . The projected interactions take the form\n\n\nwhere is the coulomb interaction.\n\nNotwithstanding the formal simplicity of Eq. (2), much nontrivial physics in captured by this classical Hamiltonian. Fortunately, a general solution for this problem exists. Assuming a general repulsive interaction which satisfies and vanishes as , a prescription for generating the ground state configuration corresponding to any rational filling was presented in Ref. Hubbard (1978). This general recipe illustrates that the ground states are periodic, with a unit cell of size . Examples of the ground state configurations corresponding to various rational filling fractions are provided in Table (1), the third column of which presents the pattern of consecutive values in a unit cell. We observe that in general, FQH states cross over into classical periodic states as we approach the thin-torus limit. Remarkably, some of the topological properties of the original FQH states, such as the fractional charges, are encoded in those periodic structures Tao and Thouless (1983); Thouless (1985); Tao (1984); Bergholtz and Karlhede (2005); Seidel et al. (2005); Bergholtz and Karlhede (2008).\n\nConfiguration Sequence\nTable 1: The ground state configurations corresponding to 1D systems whose filling factors are given by the sequence , where is the ’th Fibonacci number. The first and second columns present the index and the corresponding value of . The third column presents the unit cell of the ground state configurations in the occupation basis, and the fourth column presents these in the compact notation and .\n\nThus far, we largely reviewed the properties of the ground state in the thin torus limit. We now explicitly turn to our new results associated with irrational filling factors . As an illustrative example specifically associated with Table (1), we set equal to an archetypal irrational number, , where is the reciprocal of the golden-ratio, .\n\nA sequence of rational numbers that converges to is provided by , where is the ’th Fibonacci number ( with ). Using the general prescription of Ref. Hubbard (1978), we may then generate the periodic ground state configurations for any such fraction. The unit cells corresponding to are presented in Table (1). Pursuing Table (1), one observes that two adjacent occupied sites are always separated by either one or two empty sites. We verified that this persists for higher values of as well. The ground state configurations can therefore be compactly encoded by combinations of the strings and as presented in the last column of Table (1).\n\nInterestingly, we find that the th unit cell may be iteratively generated from the th cell via the inflation rules , . Remarkably, these are the very same inflation rules defining the Fibonacci QC Senechal (1996); Lifshitz (2002). To verify that the ground state configuration tends to that of the Fibonacci QC in the irrational limit, we numerically compute the Fourier transform of the function corresponding to (for which the unit cell is of length ).\n\nFigure 2: The Fourier transform of the occupation in the ground state configuration corresponding to , whose unit cell is of size 1597. For comparison, the red squares represent the Fourier components of the Fibonacci quasicrystal.\n\nIn Fig. (2), these Fourier weights are contrasted with the Fourier components of the Fibonacci QC (whose Bragg peaks are located at , where is an integer, and Fourier weights can easily be calculated analytically Sagi and Eisenberg (2014)). Aside from small amplitude fluctuations, which asymptotically tend to zero as increases, the two diffraction patterns coincide to a very good approximation.\n\nThe above numerical evidence indicates that in the limit, the ground state configuration coincides with the Fibonacci QC. The realization of a QC structure has immediate physical consequences. This is so as QCs exhibit the earlier noted continuous phason symmetries. These symmetries become transparent when writing the Fourier components of the density in the form\n\n\nwhere the phason symmetry is manifest as a invariance under changes of the phase .\n\nLow energy excitations for general interactions. We now describe the low lying excitations about QC ground states for disparate potentials . Such excitations result from effective long-range spatial variations of the phase . However, as is a globally defined quantity, any such description poses a fundamental difficulty. Heuristically, however, we may partition the system into large patches whose linear spatial size is still much smaller than the scale of change in . As is essentially a constant on the scale of a single patch, it can be defined locally by calculating the Fourier-transform of the density in that region. This intuitive idea can be implemented formally with the aid of the Local Fourier Transform (LFT) Sagi and Eisenberg (2014),\n\n\nwhere is a weight function that is equal to unity in a region of linear size centered around the origin, and vanishes otherwise. The parameter is defined as . Pictorially, indeed describes the Fourier transform of inside a patch of size , centered around the point . In terms of the LFT, we can write the low energy excitations as\n\n\nwhere is a slowly varying function . Writing the Hamiltonian in terms of the Local Fourier components, and invoking Eq. (6), we obtain\n\nFigure 3: Phason excitation energies as a function of , for\n\nHere, we approximated . The sum over can be performed analytically, as shown in the supplemental material Sup ().\n\nFor a given interaction , the energy associated with the low-energy configurations can be evaluated directly from the resulting expression. To illustrate this, we plot in Fig. (3), the energy corresponding to . For this interaction (and other potentials of the form Sup ()), we obtain a non-analytic energy dependence of the form\n\n\nfor small . Thus, in the limit of strong interactions the system is gapless, in agreement with the Goldstone theorem.\n\nAs our primary model is one dimensional, the quantum fluctuations caused by inflating the torus inhibit spontaneous breaking of the continuous phason symmetry. Instead, the system may exhibit algebraic correlations of the form . Such a behavior was observed numerically in Ref. Sagi and Eisenberg (2014) in an analogous 2D classical system.\n\nMore generally, as our results indicate that the FQH states at irrational filling are gapless, these states are unstable to disorder. Such an instability is consistent with the existence of quantum Hall plateaux. In fact, we can easily use the above framework to establish the hierarchy of quantum Hall states, in which the gap (and therefore, the region of stability) of quantum Hall states of filling monotonically decreases with . This is shown in details in the supplemental material Sup ().\n\nDespite the above instability with respect to disorder, it is clear that as the quality of samples improves, additional Quantum Hall plateaux emerge, serving as approximants to the underlying quasicrystalline patterns.\n\nQuasicrystals in an ultra-cold atomic system. Following Refs. Sela et al. (2011); Weimer and Büchler (2010), we now study a system of cold Rydberg atoms placed on an optical lattice (of arbitrary spatial dimensionality). These disorder free systems are natural candidates for observing the emergent quasicrystalline structures that we find. We assume that each site contains exactly one particle. Using an external laser, a transition from the ground state to an excited Rydberg state is enabled, making each lattice site a two-level system. We note that a realization of such a setup was reported in Ref. Schauß et al. (2012).\n\nWe label the states by a pseudo-spin (where represents the ground state and represents the excited state). In terms of the spin-1/2 degrees of freedom, the Hamiltonian can be written in the form Sela et al. (2011):\n\nHere, is the Rabi frequency, is the detuning, represents the repulsive interactions between excited atoms (which can be, e.g., of the dipole-dipole type, for which ), and the parameter quantifies the hopping of excitations. In realistic experimental setups the largest scale is , prompting us to start by neglecting all other terms. Once we do that, it is clear that the ground state is polarized, with for all . If we introduce a non-zero positive , it becomes energetically preferable to have a finite density of up-spins.\n\nIn fact, for any rational number , we can find a finite range of for which the density of up-spins is in the ground state. Notice, however, that the size of this range diminishes as increases. Taking the long-range interactions into account, and starting from the 1D situation for simplicity, the considerations used to study quantum Hall systems can be replicated mutatis mutandis, showing that the up-spins form periodic structures with a unit cell of size (see Table 1).\n\nIn particular, specializing to the sequence of densities, the resulting unit cell is of size , and converges again to the Fibonacci quasicrystal as the index increases. For any value of , there are distinct ground states differing by translations. For convenience, the different ground states are labeled by the parameter , where is an integer describing the translation with respect to some reference ground state. The parameter can take the values , and uniformly covers the segment in the limit . This notation is useful as in the limit , the parameter represents the phason symmetry of the Fibonacci quasicrystals. We represent a ground state configuration as , where is the unit cell (for example, for , we get and ).\n\nFor any finite , the low energy excitations include configurations that differ from a ground state by a set of domain walls. These can generally be represented as , where the label varies in space. Following Eq. (11), we model the energy of such a configuration as , where is a periodic function which coincides with Eq. (11) for small changes. Next, we can consider the effects of quantum fluctuations induced, e.g., by a non-zero .\n\nWe verified numerically that the smallest change in within a unit cell is reduced in real space to an exchange of spin between adjacent sites. Consequently, the term multiplying connects states of different . Assigning a state written in the basis in each unit cell, we get a term of the form where the operators are defined such that . We refer to the resulting 1D model (given by ) as a modified quantum -state clock model, in which the energy associated with spatial variations of the spin is determined by the function .\n\nThis model is in the universality class of the 2D classical clock model, which evolves into that of the 2D classical model in the limit . We conclude that arbitrarily weak quantum fluctuations demote the quasicrystalline ground state into a quasi-long-range ordered phase with algebraic correlations of the form . However, following the numerical results presented in Ref. Sagi and Eisenberg (2014), we may speculate that is typically parametrically small. Therefore, while true quasicrystalline long-range-order cannot exist in 1D, Bragg peaks can still be observed in small systems.\n\nIn higher spatial dimensions (), quasicrystalline long range order is expected to survive the introduction of quantum fluctuations. Indeed, in what follows we turn to study the Falicov-Kimball model, in which exact results may be used to demonstrate the validity of our arguments beyond 1D.\n\nThe Falicov-Kimball model. We now use similar considerations to study the irrationally filled Falicov-Kimball model. The Hamiltonian Falicov and Kimball (1969)\n\n\nportrays interactions between spineless itinerant and localized electrons. Here, () is the annihilation operator of itinerant (localized) electrons at site . Alternatively, the - (or -) fermions may portray positively (negatively) charged ions (electrons) with an attractive (i.e., ) interaction. We assume that the total electron and ion numbers are equal and fixed, .\n\nIn the limit of large negative , the second term drives localized electron-ion bound states. The second term, on the other hand, favors electron delocalization, and therefore acts qualitatively as repulsive interactions between bound states. In 1D, for any rational , and sufficiently large 111Following Lemberger (1992), in 1D, the threshold minimal value () of required to stabilize period ground state is bounded by with a constant., the ions form a periodic lattice with a unit cell of size Lemberger (1992). In two-dimensions (2D) Haller and Kennedy (2001); Kennedy (1998), a periodic arrangement of diagonal stripes emerges for rational , wherein the stripe locations assume configurations identical to those in the corresponding ground states of the 1D system. A prescription for constructing the 1D ground state configurations was provided in Lemberger (1992).\n\nThese earlier rigorous results pave the way for our exact study of the irrationally filled model in 1D (and 2D). As before, we set in the large regime 222As, formally, the minimal required to enable a proof of the period stripe order may diverge as , we may consider the electron density to be a highly incommensurate fraction with a large denominator that corresponds to one of the elements in the set of rational sequence approximants , with the -th Fibonacci number.. Approximating with high denominator elements of the rational number sequence , as we have in the systems described above, and invoking the results of Ref. Lemberger (1992) (and Kennedy (1998); Haller and Kennedy (2001)), we discover structures identical to those found in the Fibonacci QC. Putting all of the pieces together, quasicrystalline type order may emerge for large denominator approximants to irrational particle densities , in two-dimensional electronic systems. A sketch is provided in Fig. (1).\n\nAs we argued above, in this case, quantum fluctuations are not expected to destabilize the quasicrystalline nature of the model. Thus, the electronic structure may, similar to a periodic crystal, reveal sharp Bragg peaks for momenta parallel to the direction of the stripes and concomitantly exhibit more intricate quasicrystalline features for momenta transverse to the stripe direction. If quantum and/or thermal fluctuations or disorder partially suppress the quasicrystalline features then the resulting momentum space patterns may be qualitatively similar to those anticipated for “electronic liquid crystals” (in particular for those of the nematic type) Kivelson et al. (1998); Fujita et al. (2014).\n\nConclusions. We demonstrated that QC type ground states and associated gapless excitations appear in a broad set of one- and two-dimensional strongly interacting systems. Clearly, disorder, fluctuations, and other effects may stabilize more standard commensurate orders (or destroy these altogether). One may, nevertheless, expect to find imprints of the underlying quasiperiodic structures even when these are destroyed, e.g., in the form of stable approximants with a finite (but large) unit cell as experimentally appears elsewhere Goldman and Kelton (1993). Alternatively, these effects may result in non-homogeneous systems containing puddles of approximate quasiperiodic structures.\n\nAs an immediate consequence of our results, we expect these systems to be associated with slow dynamics, due to the exceptionally long relaxation of the phason degrees of freedom. In particular, one may postulate that the very slow dynamics observed in some correlated electronic systems via NMR and NQR may be rationalized by phason-type excitations.\n\nIn general, quasicrystals may exhibit certain features similar to those of structural glasses such as stretched exponential type dynamics Dzugutov and Phillips (1995). Specifically, the structural relaxation in an equilibrated quasicrystal is composed of an initial rapid (so-called type) relaxation, which is followed by a slower ( type) relaxation with a stretched exponential behavior as in glasses. This behavior is generally associated with the phason degrees of freedom. In particular, when supercooled from high temperatures, a system that is a quasicrystal in equilibrium might become quenched into a glass just as more common supercooled liquids do. Furthermore, in metallic liquids, compositions that lead to glasses and quasicrystals often lie in close proximity to each other Kelton (2004); Devinder Singh, R.S. Tiwari (2014). In fact, certain theories consider glasses to be aperiodic crystals Lubchenko and Wolynes (2007).\n\nTaken together, all of the above suggest that systems exhibiting quasicrystalline ground states may be unstable to (i) commensurate lock-in effects (possibly to high order approximants in clean systems) or, as underscored above, (ii) an inherent susceptibility towards glassy dynamics and aperiodic structures. Indeed, in certain strongly correlated electronic and disorder free magnetic systems, stretched exponential decay and other features of glassy (or possible other extremely slow) dynamics appear Curro et al. (2000); Park et al. (2005); Kassner et al. (2015); Wu et al. (2011); Ovadia et al. (2015).\n\nThe fate of the emergent quasicrystals that we found theoretically and imprints thereof including, notably, possible relations between our prediction of electronic and atomic QCs to experimental findings remain to be tested by numerics.\n\nAcknowledgements. We thank Seamus Davis, Eli Eisenberg, Iliya Esin, Ron Lifshitz, Yuval Oreg, Gerardo Ortiz, Alexander Seidel, Eran Sela, and Dan Shahar for insightful discussions. We acknowledge financial support from the NSF DMR-1411229, the Feinberg foundation visiting faculty program at the Weizmann Institute, and the Adams Fellowship Program of the Israel Academy of Sciences and Humanities.\n\n\nSupplemental Material\n\nEnergy of phason excitations for general interactions\n\nIn this part, we show that the sum over in Eq. (7) of the main text can be performed analytically, leaving us with a closed form, from which we can get the energy for any interaction .\n\nWe start from the sum presented in the text:\n\n\nThe coefficients can be evaluated analytically (see Appendix C of [Phys. Rev. E 90, 012105]), and take the form\n\n\nPlugging this into , and performing the sum over , we finally get the result\n\n\nGap of rational approximants\n\nAs noted in the main text, we can use the framework we developed to establish the hierarchy of quantum Hall states, in which the gap of quantum Hall states of filling monotonically decreases with .\n\nTo study this, we reexamine the sequence of rational filling factors. Generating the corresponding periodic structures, and defining , it is clear that we have a finite number of independent reciprocal lattice vectors (i.e., reciprocal vectors which do not differ by terms of the form ), which can be written as\n\n\nwhere is an integer.\n\nThe Fourier transform can therefore be written in the form\n\n\nwhere the phase takes the values , and is an integer. Shifting by any integer corresponds to a rigid translation of the entire lattice.\n\nFor sufficiently large values of , we may examine slow spatial changes of . In terms of the LFT, this is expressed as\n\n\nFollowing the strategy presented in the main text, the energy of such a configuration takes the form\n\n\nThe excitation whose energy is minimal is expected to be a domain wall of the form . Once this form is plugged in Eq. (17), and the values of are determined numerically, we obtain the energy gap as a function of .\n\nFigure 4: The gap to excitations as a function of (at fillings ) for the interactions ().\n\nThe results of this analysis are presented in Fig. (4), where the energy gap associated with filling is plotted as a function of . The linear dependence indicates that the gap scales like , and in particular, tends to zero in the irrational limit, as shown explicitly in the main text.\n\nExcitation energy for various interactions\n\nWe argued in the main text that the low-energy Hamiltonian\n\n\napplies universally to all potentials we have checked. To illustrate this result, we present in Fig. (5) the energy as a function of for for (in addition to the case presented in the main text).\n\nFigure 5: The energy as a function of for with (a) (b) .\nComments 0\nRequest Comment\nYou are adding the first comment!\nHow to quickly get a good reply:\n\nAdd comment\nLoading ...\nThis is a comment super asjknd jkasnjk adsnkj\nThe feedback must be of minumum 40 characters\nThe feedback must be of minumum 40 characters\n\nYou are asking your first question!\nHow to quickly get a good answer:\n • Keep your question short and to the point\n • Check for grammar or spelling errors.\n • Phrase it like a question\nTest description", "pred_label": "__label__1", "pred_score_pos": 0.9679420590400696} {"content": "초록 close\n\nThis paper aimed 1) to compare the length of Korean geminate vs single consonant sounds produced by Korean, Japanese and Australian speakers and 2) to analyze Korean liquid geminate vs single sound pronunciations produced by Japanese learners who do not have geminate liquids in their L1. The Japanese Beginner Group, whose L1 has a length distinction between geminate and single consonants as in Korean, produced length ratios closer to those of Koreans than the Australian Intermediate Group did. This showed that L1 influence was stronger than the experience of L2 learning. Even though Japanese learners (both the Beginner Group and the Experienced Group) could well distinguish Korean geminate and single obstruents and nasals in their production, their phonetic realization of liquid geminate and single sounds was neither clear nor similar to that of Koreans. Clear phonetic, not phonological, differences in quality between similar sounds in L1 and L2 seems to be an obstacle for L2 learners which cannot be overcome in a short time. The geminate structure of the sounds seems to give L2 learners more difficulties when they produce them.", "pred_label": "__label__1", "pred_score_pos": 0.9412128329277039} {"content": "Are Relocation Clauses Still Binding in New York Divorce and Child Custody Matters?\n\n\n\n\nRelocation and Child Custody Agreements\n\nA recent case decided by the Appellate Division, Second Department, which covers Suffolk County and Nassau County Long Island as well as Queens and other counties, brought to focus the complicated nature of changing child custody matters recently. In this case, the matter of Jaimes vs. Gyerko, the father appealed an order from the family court, which granted, without a hearing, the mother’s motion to dismiss the father’s petition to modify a previous custody order. This modification asked for the father to enjoin the mother from relocating with the children to Woodbridge, Connecticut, and it asked for an attorney to be appointed for the children. In March 2014, the couples involved in this case had executed a custody stipulation which agreed to joint custody of the two children, with the mother being the primary residential custodian.\n\nThe previous agreement had a relocation clause, made by the two parties, that permitted the mother to relocate within 55 miles of her current home without advanced permission of the courts or the Father. However, in 2017, the mother informed the father that she would be moving that year, and the father filed a petition to modify the stipulation based on a change in circumstances. The father believed that at this point, the relocation, although it was within the rules of the previous 55-mile agreement, would not be in the child’s best interests. Sometimes, after a passage of time, the desire to move could be a change of circumstances that requires the approval of the court. In this case, a best interests analysis was necessary when the relocation was opposed by the non-relocating party.\n\nThe mother moved to dismiss the petition against her, arguing that the custody stipulation they had agreed to in 2014 allowed for the relocation, and the family granted that branch of the mother’s motion. However, it’s worth arguing that the Appellate Division decided that the  family court should not have granted this relief to the mother under CPLR 3211 (A) (1).  The court ruled on the principle that no agreement made by the parties can bind a court to a disposition unless the court, when weighing all the factors, finds the agreement to be in the child’s best interests. This was a little surprising at the agreement was incorporated into a Judgment of Divorce, which, in theory, is reviewed by the court before it is signed.\n\nChild Custody Agreements and Alterations\n\nIn this case, although the parties involved had both agreed in their stipulation that the mother would be permitted to move within 55 miles of her residence, that agreement was not found to be controlling. Instead, it should only ever be considered as a factor that needs to be addressed alongside a range of other factors at a hearing in court. The court decided that it is the duty of the trial court to determine what is in the best interests of the children in any custody or visitation case. Since the court believed that enough had changed in the time that it took for the mother to decide to move outside of her residence, then a hearing is required.\n\nAdditionally, in this case, the father involved made an initial offering of evidence to the courts that suggested the proposed move by the mother may not be in the best interests of the children. In cases such as this one, where facts that are essential to determining the best interests of a child are in dispute, it’s crucial for a hearing to take place. While relocation clauses might still be useful in our mediated or negotiated divorce and child custody agreements, as a practitioner I will now be careful to warn that it very well may not be controlling.  The issue still might need to be litigated.\n\nTo learn more about child custody agreements, and arguing for child custody order modifications, please browse through the other blogs and pages on this website. If you would like to discuss the details of your own case, you contact me, Mr. Darren Shapiro, for an initial consultation, up to thirty minutes of the initial consultation is free. My office can schedule appointment either via our online contact form or over the phone at (516) 333-6555.", "pred_label": "__label__1", "pred_score_pos": 0.9931642413139343} {"content": "\n\nThis document is also available in PDF format.\n\nThe document's metadata is available in BibTeX format.\n\nFind the publication on Google Scholar\n\n\nDiomidis Spinellis Publications\n\n\nFirst, Do No Harm\n\nDiomidis Spinellis\n\nLet’s face it: not all software developers are superstar programmers (and, trust me, not all luminary developers program in a sane way.) This means that when we maintain existing code, we must be very careful to avoid breaking or degrading the system we work on. Why? Because a failure of a running system can affect operations, people, profits, property, and sometimes even lives. Here are the rules.\n\n\nHave the design and change scope reviewed. Discuss with both your manager and your users what you intend to implement, and how you plan to offer the required functionality. We developers often get carried away implementing complex functionality when the customer actually requires (or can agree to) a much simpler implementation. The reason behind this could be technological machismo, the desire to learn new stuff, the not-invented-here syndrome, or a simple misunderstanding. Through a design review, you can minimize the chance that you’ll waste effort and burden the software with needless complexity. For example, your reviewer might point out a simpler implementation that will work well enough or an existing library you can reuse to save days of work.\n\nFollow code style rules. Inconsistently styled code is distracting to read and a pain to edit. Worse, the careless attitude it exudes can give rise to worse design and implementation sins. When developers see code that’s all over the place, they get the message that any programming sin is fair game. Therefore, find the style rules adopted in your setting and follow them religiously. If these aren’t documented, simply derive the conventions by examining similar code. And when you see code with style flaws, coordinate with your colleagues to fix them (in a commit separate from your other changes, please).\n\nProgram defensively. When you add new code, you’ll often find yourself wondering how exactly the existing system behaves. Counteract this uncertainty by verifying the assumptions you make through runtime assertions and rigorous error checking.\n\nMaintain backward compatibility. Your interfaces to the external world are a contract you’re obliged to keep: it’s often difficult to coordinate with everyone who depends on those interfaces. This means you can’t change APIs, file formats, schemas, and service endpoint URLs arbitrarily. Ensure that you make such changes in a way that’s transparent to existing clients. (In some cases, you might even need to remain bug-compatible with the system you replace.) Make the new functionality a superset of the old one, perhaps through an adaptation layer. Versioning of interfaces and the gradual deprecation of older ones through warnings can help you manage backward compatibility over longer time scales.\n\nPreserve architectural properties. When you stay within the realm of a single module and use code constructs similar to those that are already there, you’re probably treading on safe ground. Otherwise, you must verify that your code doesn’t breach any existing architectural properties. For instance, your code might be breaking encapsulation by exposing functionality that was private to a module or violating layering through calls to higher-level layers.\n\n\nHave your code reviewed. A second pair of eyes will look at it from a different perspective, question any incorrect implicit assumptions you might have made, notice errors you may have overlooked, pinpoint style and architectural infractions you might have brushed aside, and keep you honest about the amount of testing that’s required. Don’t skimp on it; record how you resolve each raised issue, and repeat the reviews until you and your reviewer agree that you’ve resolved all the spotted issues.\n\nPass existing tests. If the system you modify features a testing infrastructure, verify it works correctly before you apply your changes, fix it if it doesn’t, and then use it to verify the system’s functionality after you make your changes.\n\nCreate unit tests for the implementation of the new functionality. A legacy system could well lack a comprehensive unit test suite, and creating one from scratch is often impractical. However, by adding unit tests for the new code you write, you can increase your confidence that it works as intended and will play well with the rest of the system. For extra points, try adding unit tests for any existing routines that you modify.\n\nBeware of changed components. When you upgrade the libraries, the compiler, the framework, the middleware, the storage engine, the operating system, or the hardware on which your software runs, bad things can happen, especially if their developers haven’t followed this column’s advice. Don’t assume your software will run just fine under the new configuration—test it thoroughly.\n\nCheck for performance regressions. Evaluate the system’s performance in terms of time, storage, and (perhaps) power and bandwidth before and after your changes. Keep an eye for performance regressions that are outside acceptable limits. Also, make sure that you haven’t accidentally degraded an important operation’s time or space complexity (for example, changing the time required for an operation from linear time to quadratic).\n\n\nPerform a phased rollout. First deploy on a test system to avoid breaking production systems with any serious errors that might have crept through. Once you’re satisfied, deploy so-called canaries to a small percentage of the production systems, and carefully monitor how your system performs in that environment. Only when you’re completely satisfied, roll out to the entire user base.\n\nHave a back-off plan. Even a well-tested system and careful deployment can go catastrophically wrong. Develop a plan to quickly pull out the new system from production when problems arise. Test the plan, and don’t hesitate to abort deployment at the first sign of trouble. We developers are often optimistic, thinking that our code is always correct, and that the problems showing up in deployment are just minor teething pain. With objective criteria for when to back off you prevent (bad) judgment decisions under stress.\n\n“Test as you fly, fly as you test.” It’s often tempting to push a tiny change to production without going through the arduous and time-consuming process of testing and phased rollout. It’s also very risky, and this is why the aerospace community operates by a simple rule: all systems that fly should be tested, and only the tested systems should fly. Repeating this motto in my head every time I had the urge to take a testing shortcut has saved me on countless occasions. I suggest you do the same.\n\nDeploy in off-peak periods. Colleagues who work at telecoms tell me that they plan disruptive upgrades for 4 am, yet they still get calls from irate customers who complain about outages. Imagine what would have happened at a peak time! Improper timing of a release can overwhelm your support personnel, alienate customers, and cloud your decision-making ability. To avoid the temptation and external pressure to deploy during a peak period, consider setting a policy on the hours or times of the year when new deployments can (or can’t) be performed.\n\nCoordinate with support teams. Let everybody who’s supporting your software, from system engineers to helpdesk staff, know your deployment and back-off plan, your changes, and who to contact when things go wrong. Present your plan in a meeting to make certain you’re all on the same page and that you’ve addressed any concerns support teams may have.\n\nHave key people on standby. The main developer of a popular open source system used to issue new releases on the evening before he left for vacation. Today, this practice just doesn’t cut it. Coordinate with key developers and other engineers so that they’ll be available during deployment to advise the team on how to handle any snafus.\n\nAs you can see, “doing no harm” can be a tall order. Yet, following this guideline is a sign of professionalism and respect for your colleagues and customers.", "pred_label": "__label__1", "pred_score_pos": 0.8619210720062256} {"content": "How To Make A Good Thesis Sentence\n\nNov 11, 2014. They do not summarize or make general statements. They are arguments that. Without these two parts, your sentence isn't a Thesis Statement. A compact and “punchy” Thesis Statement might provide a great opening line.\n\nIt reminds me of the thesis statements I wrote for. so put those excised sentences or paragraphs in a file where you can retrieve them later.” 8. Use your theme as a guide as you write and edit.\n\nNot only does the introduction contain your thesis statement, but it provides the initial impression of. Try this strategy to develop and narrow a thesis statement.\n\nA thesis statement is a one or two sentence summation of the information, analysis or argument that is contained in an academic or informational article or paper. This is a good way to start a thesis statement. Step 2. Organize your information into an outline. Explain the most important information in the article using a clear, simple.\n\nApr 21, 2013  · The basics of writing a thesis statement or introduction sentence. Check out the tutorial for works cited page help.\n\nAbstract Syntax Tree Tutorial The second concern is more abstract. I want to tell you about what it is like. that most universities no longer make attendance at tutorials and lectures compulsory. At other universities and in. Academia Sinica Post Office Hours is a place to share and follow research. Join 90,423,431 Academics. Academia is the easiest way\n\nJul 21, 2017. A strong thesis statement is key to writing a persuasive essay. The thesis statement presents your topic to the reader, provides your opinion on.\n\nA good thesis is not merely a factual statement, an observation, a personal opinion. argument that goes beyond making non-controversial factual statements.\n\nA thesis sentence is a sentence in the introduction that tells the reader what the topic or. a noun clause correctly will make a good impression on your reader.\n\nWhat Makes Up a Good Thesis Statement? Well, a good thesis statement is a brief, down to the point statement you should back up by arguments and evidence. A thesis statement should be arguable. There are very few set-in-stone rules as to how to write a well-crafted thesis statement. Yet, there are certain elements to omit.\n\n\nThere is no single way to write an introduction that will always work for every topic, but the points below can act as a guide. These points can help you write a good thesis introduction: 1. Identify your readership. Before even starting with your first sentence, ask yourself the question who your readers are.\n\nThink of your thesis as a promise you make to your reader about what your paper will argue. Crafting a good thesis is one of the most challenging parts of the writing process, A successful thesis statement makes an historical argument.\n\nHello, good. points, make a one-line summary of each important point in that section: Those are the minor minor points in the outline. At the top, right after the title, make a one paragraph.\n\nAcademia Sinica Post Office Hours is a place to share and follow research. Join 90,423,431 Academics. Academia is the easiest way to share papers with millions of people across the world for free. Norm Shafer/For The Washington Post CHARLOTTESVILLE. in academia to redefine the college classroom for students who pay tuition on campus. Zelikow’s U-Va. students watch his lectures\n\nA thesis statement usually evolves only after considerable reading, writing, and. A good way to do this is to make annotations while you are reading and after.\n\n\n\nI pushed one young faculty member to describe the context in which his thesis had been. he proceeds to make the case that the language shouldn’t matter in scholarly writing, that clarity isn’t.\n\nThe thesis or argument in the traditional five-paragraph. I’m not stupid,\" Aristotle, in The Rhetoric, tells us a good writer should do this in the conclusion: \"make the audience well-disposed.\n\nHe was the young author of a master’s thesis on the Polish Solidarity movement. extending a tentative hand and murmuring, “Good morning, my name is Viktor Orbán. Welcome to Budapest.” Camille.\n\nMar 08, 2017  · From above discussion, it is clear that thesis sentence defines the standing on a subject under debate. It makes the readers clear what they expect to read in a paper. It develops the claim. Fix those arguments that distract the focus of the subject and.\n\n\nNov 20, 2017  · Features of a Successful Thesis Statement. Make sure that you have a strong argument that is able to convince your readers. Your thesis statement should always be at the beginning of the essay. This is a sentence that introduces your point, so we suggest you to include a thesis in the introduction of the essay.\n\nEven though the thesis statement is one sentence communicating the main idea and argument to the reader, there are rules to follow and common errors to avoid when crafting a strong thesis statement. Alyssa Sellors, Demand Media. So here’s how to write a good thesis statement. 1. Answer the prompt\n\nGood thesis statements for a better argumentative essay. The goal of the argument essay is to convince your readers of your viewpoint. The key to an effective argument essay is to choose a debatable topic that you can support with evidence (usually from credible outside sources).\n\nThe reason I mention this is to highlight the fact that whether or not you’re shooting commercially or for fun, the model you’re most likely contacting is trying to make a. feel it’s a good idea to.\n\nWriting a thesis statement is a crucial point for your paper. Below given are some expert written hints on how to create great thesis statements.\n\n\nEvery scholarly paper should have a thesis statement, and strong thesis. This thesis draft repeats the language of the writing prompt without making a unique.\n\n\nSometimes, a few sentences tell you more about a person—and, more importantly, an ideology—than a learned thesis. That is the case with tweets. And in order to avoid doing so, they went so far as.\n\n\nIn many occasions, students are not asked directly to create a thesis statement given that the lecturers assume that it is common sense to guide one's readers.\n\nThese questions are just the first half of a good pitch. You need to be the right person to write this piece Once you have a strong thesis statement on an interesting topic, please explain, in a.\n\nStart with a great first sentence. These sentences should also set the stage for your thesis statement. The thesis statement is the subject of much instruction and training. The entirety of your paper hangs on that sentence, which is generally the last sentence of your introductory paragraph.\n\nThe thesis statement tells the reader what the rest of the paper is about. In conclusion, many options are available to students who truly want to develop better.\n\nAnd you must write this opener with authority – confidently and persuasively. Writing a good introduction typically means “straightforward” writing. Not too many citations to trip the reader up. No.\n\nThesis. This is the argument of your essay. The point of every essay is to persuade someone of your point of view. If it’s a formal essay for school, you won’t use \"I\" or \"you,\" but your thesis is still telling your opinion. The thesis statement is usually just one sentence, but it is also THE MOST IMPORTANT SENTENCE in your essay.\n\nexpanding, rewording or reworking of that thesis statement. 3) How a Thesis. A good thesis is both restricted (manageable) and unified. The shorter the essay,\n\nI mean, the whole thesis of the book is that he’s. But yeah, I had a good cop and a bad cop, and one of them, his job was to say no to every request. And I tried to make my requests reasonable. It.\n\nAs the book notes, the quest to make. is good. One wonders whether the eggplant emoji, a shorthand for lust, discourages.\n\nIn almost any project, the path between “a good idea” and the “final. Y — even if you worked on X for your thesis.) You should lay out your arguments for Every. Single. One. of these cases before.\n\nQuick Answer. Examples of a good thesis sentence includes a summary of the writer’s arguments about the subject of the written piece. A good thesis sentence answers a question that the body of the paper answers and explains in greater detail. The sentence should provide the reader with an overview of what the writer is trying to convey in.\n\nСreating your own strong thesis statements has never been so fast and simple. examples of thesis statements on the right; Click “Make a thesis statement” to.\n\nThesis statement is a necessary element of each academic paper. With our useful tips and tricks, it won't be an issue for you to make it winning.\n\nIs my thesis statement specific enough? Thesis statements that are too vague often do not have a strong opinion. Make sure you that your opinion or idea is clear.\n\nRichard Budd, research assistant, University of Bristol who sat his viva in summer 2014 and has blogged about the experience 6) It’s not like sitting at a laptop where you can edit a sentence as.\n\n\nTopic Sentences Good topic sentences can improve an essay’s readability and organization. They usually meet the following criteria: 1. First sentence. A topic sentence is usually the first sentence of the paragraph, not the last sentence of the previous paragraph. 2. Link to thesis. Topic sentences use keywords or phrases from the thesis to indicate which part of the thesis will be discussed.\n\nThe thesis statement and the topic sentences provide the framework for your. techniques may help you develop a temporary or \"working\" thesis statement. 1.\n\nHow to Write a Good Thesis Statement. after they read your thesis statement then you need to make changes. A good thesis statement should engage your reader to continue reading. A good thesis statement will cover the subjects of your body paragraphs and nothing else. Having too broad of a thesis statement is a common mistake that some teachers will take off points for.\n\nUc Berkeley Academic Calendar 2019-18 In fact, he’s pursuing the opportunity to study MOOC data at UC Berkeley and match up \"student frustration. picked up and used elsewhere (work that earned the initiative a Campus Technology. UC Berkeley architecture professor Nicholas de Monchaux and BLDGBLOG author Geoff Manaugh will teach a special, one-year graduate course, titled “STUDIO ONE,” focused on\n\nBut if public shaming is “well directed,” then “a lot of good can come out of it. The balance of the segment did not substantiate his thesis. As an example of the phenomenon’s ostensible upside, he.\n\nPossible 1 Sentence Thesis: Management continues to make the right strategic. It looks like RA Capital is opposed as well, and they make a good point on questioning the ¨strategic alignment¨ of the.\n\nImagine trying to write a graduate-level thesis without having graduated high school. disconnect by reviewing what a marketing brief is and what goes into one. In one sentence, a brief is a.", "pred_label": "__label__1", "pred_score_pos": 0.867662250995636} {"content": "Cryptosovereignty is the personal power, economic liberty, and political praxis that exist in bitcoin directly, crypto assets generally, and the internet widely. It is the power of any single human — no matter their station of birth, class of wealth, or creed of faith — to choose to put their economic, social, and political rights into a new digital common-wealth that is inviolable and beyond the power of any and all governments to violate.", "pred_label": "__label__1", "pred_score_pos": 0.9997853636741638} {"content": "Resume Reading — We Are Nowhere Close to the Limits of Athletic Performance\n\n\nYou've read 1 of 2 free monthly articles. Learn More.\n\n\nWe Are Nowhere Close to the Limits of Athletic Performance\n\nGenetic engineering will bring us new Bolts and Shaqs.\n\n\n\n\nthe previous model: Carl Lewis running the anchor leg of the men’s 4x100m relay race at the 1984 Olympic Games.David Madison/Getty Images\n\n\n\n\nThe potential improvements achievable by doping effort are relatively modest.\n\n\n\n\n\n\n\n\nGenes That Won the Fame Game\n\n\nBecause complex traits are controlled by so many variants, we know that there is a huge pool of untapped potential that no human—not Shaq, Bolt, or anyone else—has come close to exhausting. No living human has anywhere near all of the possible positive versions of the relevant genetic variants. The whole enterprise of competitive athletics has been, in effect, a search algorithm for genetic outliers, but it’s been running for less than a century, and it hasn’t been particularly efficient. Its approach has been to passively wait for random recombinations to produce those variants, and hope that athletic programs find the best individuals.\n\nNow we are entering an era in which it will not be chance that configures DNA, but rather the human intellect via tools of its own creation. As our understanding of complex traits improves, genetic engineers will be able to modify strength, size, explosiveness, endurance, quickness, speed, and even the determination and drive required for extensive athletic training. Estimates of the number of variants controlling height and cognitive ability, two of the most complex traits, yield results in the range of 10,000.5 If, as a simplification, we assume that in each of the 10,000 cases the favorable variant is present in roughly half the population, then the probability of random mating producing a “maximal” outlier is roughly two raised to the power of negative 10,000, or about one part in a googol (10 to the power 100) multiplied by itself 30 times. Of course it may not be possible to simultaneously have all 10,000 favorable variants, due to debilitating higher-order effects like being too large, or too muscular, or having a heart that is too powerful. Nevertheless, it is almost certain that viable individuals will exist with higher ability level than any person has ever had.\n\nnew performance: Katie Ledecky competing in the 800-meter freestyle during the U.S. Olympic Team swimming trials.Tom Pennington/Getty Images\n\n\n\nFreeman Dyson speculated that humans would use genetic technologies to modify themselves for space exploration.\n\nThe general adoption of gene editing technology will give this search a tailwind. Individual choices by parents are likely to increase the overall frequency in the general population of variants that boost athletic ability. This will gradually increase the population average, and enhance the extreme tail of ability. An increase in the average by one standard deviation (for example, 3 inches in male height, or 15 points in IQ), makes an individual at the 1 in 1,000 level (a 6-foot-7-inch male in the U.S. population) more than 10 times more likely.\n\nFreeman Dyson speculated that, one day, humans would use genetic technologies to modify themselves for space exploration—making themselves more resistant to radiation, vacuum, and zero gravity, perhaps even able to extract energy directly from sunlight. Insertion of genes from entirely different species, like photosynthetic plant genes, brings a whole new meaning to the term GMO: Speciation seems a definite possibility.\n\nHuman athletic ability might follow a similar trajectory. The nature of athletes, and the sports they compete in, are going to change due to new genomic technology. Will ordinary people lose interest? History suggests that they won’t: We love to marvel at exceptional, unimaginable ability. Lebron and Kobe and Shaq and Bolt all stimulated interest in their sports. The most popular spectator sport of 2100 might be cage fights between 8-foot-tall titans capable of balletic spinning head kicks and intricate jiu-jitsu moves. Or, just a really, really fast 100m sprint. No doping required.\n\nStephen Hsu is the vice president for research and a professor of theoretical physics at Michigan State University. He is also a scientific advisor to BGI (formerly, Beijing Genomics Institute) and a founder of its Cognitive Genomics Lab.\n\nGet the Nautilus newsletter\n\nThe newest and most popular articles delivered right to your inbox!\n\n\n1. Dizikes, P. 3 Questions: Anette Hosoi on Engineering and the Olympics (2012).\n\n2. Hernández Gómez, J.J., Marquina, V., & Gómez, R.W. On the performance of Usain Bolt in the 100 metre sprint. European Journal of Physics 34, 1227-1233 (2013).\n\n3. Robertson, D. Armstrong’s Tour De France Victories (2009).\n\n4. A conversation with George Church on Genomics & Germline Human Genetic Modification (2015).\n\n5. Hsu, S.D.H. On the genetic architecture of intelligence and other quantitative traits. arXiv:1408.3421 (2014).\n\n6. Crow, J.F. On epistasis: Why it is unimportant in polygenic directional selection. Philosophical Transactions of the Royal Society B 365, 1241-1244 (2010).\n\nPhoto collage credits: Ledecky photo by Tom Pennington/Getty Images; O’Neal photo by Lisa Blumenfeld/Getty Images; Bolt Photo by Andy Lyons/Getty Images.\n\nJoin the Discussion", "pred_label": "__label__1", "pred_score_pos": 0.5243982672691345} {"content": "Housing complex in Montgat\n\nThe proposal includes the most important intrinsic elements of the environment, such as the relationship with the landscape, the orientation and the presence of the neighboring buildings, in order to incorporate them into the different parts of the building. Homes are characterized by having a privileged relationship with the outside. Access routes have been conceived, not just as transition areas, but as places where they can be, socialize and enjoy the views, emphasizing the axes that lead to the sea. The green spaces are incorporated and intertwined with the geometry of the building occupying the surfaces that separate the different volumes. The facades are also sensitive to the environment, offering large hollows and terraces that are opening differently depending on the orientation and views on the environment.\n\n\n3300 m²\n\n\n\n\n\n\nTeresa Farras, Luciana Teodózio", "pred_label": "__label__1", "pred_score_pos": 0.9991812705993652} {"content": "Leaving the Jehovah’s Witnesses – Practical guide to next Steps\n\nThere is not a lot more daunting in one’s life than to consider leaving from somewhere you been for many years, whether it is leaving a Company that you have worked for, a club, or if you are religious, leaving your church/religious group. When you leave there is always going to be the issue of what happens to all your friends you have grown close to, as you now contemplate what to do next. In terms of a job or club, the prospects as sad as they are, are generally manageable over time, as chances are you will be able to at least keep in contact with some of your acquired friends, and it is reasonably likely you could find an alternative club/Co to join. But when it comes to religion it is a different proposition as it is more than just a place of work, or pleasure, it goes far deeper, and that is even more significant if the particular Religion is the Jehovah’s witnesses.\n\nWhy is that? Well it is because they operate a policy that requires all believers to stop associating with the person that has left, this is what we identify as “shunning.\n\nBefore going into what are the next steps, we need to first understand the JW Policy on Shunning.\n\nThere are 3 categories identified by the JW Org, and they do have different connotations\n\n1 Drifting out of the Org, otherwise known as becoming “Inactive”\n\nThis is simply where a JW decides to stop attending meetings, field service and any other associated activities organised by JW’s.\n\nIn this case as long as you do not act in a way that would give rise to concern over your beliefs, the elders are fairly powerless to take matters further, and that means that for the time being you would not be shunned. However depending on the Congregation, the elders may contact you and try and find out why you have stopped. They will in the meantime time mark you as “inactive”.\n\nI know in some cases where individuals have been classified as “Inactive” for years!\n\nThe important thing here is you don’t give them a reason that may justify them to take further action, eg confessing something that is in the list of criteria for “Dis-fellowshipping”. Also it is worth noting that you are under no obligation to explain anything to them.\n\n2 Dis-Association\n\nThis is where you have taken the initiative to inform the elders that you have decided to leave the JW Org, and you may include a number of reasons for this, and this is usually served in the form of a letter. The elders will treat this in the same way as being “Dis-fellowshipped”, but it at least negates the elder’s ability to pull you into a judicial hearing, albeit they probably will request for you to meet with them, but there is no obligation to do so. Either way the elders will eventually announce this to the congregation and that all members will be asked to stop associating with this person\n\n3 Dis-Fellowshipping\n\nThis is the most severe of the three categories, as the elders are far more involved, and will drive the whole process to its conclusion.\n\nHere once the elders have wind of an act that is against the JW Org policy, ie falls in line with the list of reasons for Dis-fellowshipping, the elders will call the person in for questioning and this can take several hours. If at the end they are satisfied this act has been committed and you do not convince them you are repentant, then it will go to a judicial meeting (usually made up of 3 elders) and again this can take several hours and usually it is not a pleasant experience as you will be pretty much grilled. Depending on the act there may be a grace period where the elders will give you time to resolve the matter, e.g. giving up smoking. Following this meeting the elders will make a decision and usually it is to dis-fellowship the person. Again this is announced to the congregation and everyone is asked to stop all association with this person.\n\nLatest Update: In cases where you have family that are JW’s, the Watchtower has said family can have contact with this person but only where it is over urgent family matters, eg funerals etc, but they don’t make it clear where the line is to be drawn, and what does not help is at their recent convention, it is still stressed that people that leave the Org will also lose their family and friends, so chances are your family will in fear & obedience to the WT, stop associating with you completely, and there are many testimonies to support this.\n\nSo what are the next steps when you decide to leave?\n\nAs there are so many ways you can deal with this matter, many of them can be absolutely devastating, so we would like to offer some guidance that can help make this process as painless as possible, and hopefully enable you to pick up the pieces and re-build your life going forward.\n\nStep 1\n\nYou need a Strategy!\n\nYou need to be clear on why you decided to leave, and if possible keep it to yourself.\n\nIt will help if you can do some personal research on the matter and at the same time look more in to the Organisation that you trusted so much in the past. You owe it to yourself to find out what is the real truth, rather than simply relying on a man-made Organisation.\n\nWe highly recommend reading the Bible exclusively and look at the many websites that they provide extensive research on the Jehovah’s Witnesses. A lot of these will provide absolute evidence on the Organisation with documentable proof, so you should be able to get a pretty good picture of many of the activities that were otherwise secret from its followers. The sites will also help prove why the doctrines you believed in are in error, and what the bible is really teaching, this can be very revealing and challenging at the same time, so do take your time and make sure you are fully convinced before you move on to the next point.\n\nOnce you have built up a strong case, you will feel a lot more confident that it is the right step to make.\n\nHere is a shortlist of recommended Sites\n\n\n\n\nStep 2\n\nMake new friends\n\nI highly recommend you make some new friends outside of the WT, and if possible ones in particular that you can confide in. This way when you eventually leave you are not completely alone and also able to receive help along the way.\n\nStep 3\n\n\nWhether the reason to leave is based on the many abhorrent practices of the WT, or simply due to the discovery of their many false doctrines, you now need to start the “De-programming” process.\n\nThis is all about freeing yourself from the heavy indoctrination of the WT Organisation, and start becoming independent. The Org use many mind control techniques, so what will help is to develop ways to not fall back in fear/obedience of the WT. We recommend getting advice from prominent experts in this field, one of which I can highly recommend is the Leading Cult Expert & licensed mental health counsellor, Steve Hassan. He has written some brilliant books on the subject and can really help practically in getting yourself in a good mental state.\n\nStep 4\n\nPrepare yourself to handle JW’s close to you\n\nPrepare yourself to be able to start explaining some of what you have researched with those that are close to you, so that at the point when they know you have left, it won’t be such a shock and they will at least have some good reasons why you made the decision, but you need to take these steps slowly. What will help is to demonstrate a good and loving nature. Where you may struggle to convince them in words you can impress them in your deeds.\n\nStep 5\n\nBecome “Inactive”\n\nOnce you decide you want to leave, we highly recommend to choose to first become “inactive”. Slowly stop attending and reduce your ministry activity and again try not to explain too much to the Elders or any JW as this may give the leadership reason to grab you to an elders meeting before you have had chance to make your move to leave. In some cases it may be a good idea to move Congregations as part of the process.\n\nStep 6\n\nThe Elder Confrontation\n\nIf despite every effort, you are not be successful in avoiding a meeting with the local Elders, we recommend you firstly request a reason for the meeting. Do not disclose more than what they have provided at this stage, as it will likely be counted against you and this will only make the meeting a great deal more stressful. Ultimately they can’t force you to attend, but if you decide to go, give yourself plenty of time to prepare, your additional research as explained earlier, will put you in good stead to defend your position. Be prepared with some questions as this will take some off some of the pressure and also challenge the elders with their agenda. Do not let them intimidate you, stand up for what you believe, but at the same time try to be respectful and professional. If you can walk out of the meeting with your head held high knowing that you have done nothing wrong, this will help your confidence in dealing with your departure from the Org.\n\nStep 7\n\nStrengthen your Faith in Christ\n\nWhile you still have a love for God, it is highly recommended to spend more time in prayer and in reading the Bible alone. There is no better friend than Jesus Christ, and you will find that this the real key to a successful departure from the WT. As you read the scriptures more closely, you will discover that Christ is where you need to focus on, not the JW Org.\n\nThere is so much to gain here, namely\n\n 1. Discover what it really means to be Saved (Romans 10:9,10)\n 3. Christ has the power to help you his burden is light (Matthew 11:30)\n 4. To receive all the riches of Christ in your life ( 2 Corinthians 8:9)\n 5. To be truly free in your relationship with God ( 2 Corinthians 3:17)\n 6. Now issue is too great for Christ (Matthew 21:22)\n 7. Christ is the mediator between you and the Father (1 Timothy 2:5)\n\nOne of the issues surrounding leaving the JW Org, is that you can easily get in the state of thinking that there is no God, you want nothing more to do with Religion, or just become so rebellious that you decide to do all the things that you were deprived of for so many years. The danger here is you could end up worse than when you were a JW. This is why having a close relationship with Christ is so important.\n\nStep 8\n\nPhysical & Spiritual Welfare – Get Support\n\nOnce it becomes known that you have left, you will need all the help you can get, and when your family/friends stop associating with you, it can be a very hard and lonely place. This in many instances has given rise to serious depression, ill health and even to the point of suicide. This is why it is important that you developed friends early on it the process, so that the step into society is not such a daunting one. You will also need spiritual help, because you will unknowingly be in a spiritual battle. Satan will know this is a time where you are very weak and vulnerable, and will do everything it can to trip you up, so this is why you need to stay close to Christ as he is the only one that has the power over the opposition. Christ has also used many Christians that provide support, and we recommend you get in touch with these groups, some of which can be found by contacting the list of web-sites provided, and they will put you in touch with someone that can help you on a personal level.\n\nStep 9\n\nRebuild your Faith\n\nOnce you have developed a genuine relationship in Christ and now have a real understanding of the truth, it is time to start developing a network of Christian Friends, at this stage it maybe not a good idea to jump into the nearest Church, but instead pray about this and try and get to know a few people that demonstrate a genuine love for Christ first. The lord will always be with you and will help you find a new Church; knowing what you have gone through, it is important you make the right step in entering a Church that is truly filled with God’s Spirit.\n\n\nKeep your contact with Christians that especially understand your situation, as mentioned there are many EX-JW support groups that can be found on the Internet, and many of these have members that were once a JW that have since come to Christ, and their calling is to help ones to escape from the WT and find Christ also, all part of God’s provision. These ones can really help you build your faith as they can relate to what you are going through.\n\nYour new found faith will also help re-unite the relationship with your JW family & friends, albeit it is unlikely to be the same while they remain a JW, but at the same time with God’s spirit, there is always the hope that they may also one day leave the Organisation, and there has been many testimonies found on the above listed sites and others, to support this.\n\nNote: The above article is in no way a prescription on how to exit the JW org, but simply provides a list of suggested steps that we feel will help you in the process. Ultimately it is Christ that will help you find the way.\n\nRay has personally been through and speaks with genuine experience, here is his story.\n\nSource: WatchTower Investigated", "pred_label": "__label__1", "pred_score_pos": 0.7047188878059387} {"content": "Titanium Dioxide Application Range for Plastics Expanded\n\nTitanium dioxide for ordinary general-purpose plastics is generally not surface-treated because conventional inorganic titanium dioxide coated with hydrated alumina is used. When the relative humidity is 60%, the adsorption equilibrium water is about 1%. When the plastic is at a high temperature, During the extrusion process, evaporation of water causes pores on the smooth plastic surface. This non-organic coated titanium dioxide is generally subjected to organic surface treatment.\n\nBecause the titanium dioxide used in plastics is different from the titanium dioxide used in coatings, the former is in a low-polarity resin and is processed by shearing. The titanium dioxide after organic surface treatment can be better under the appropriate mechanical shear force. Scattered.\n\nThe application of titanium dioxide in plastic products, in addition to its high hiding power, high achromatic power and other pigment properties, it can also improve the heat resistance, light resistance and weather resistance of plastic products, and protect plastic products from UV light. Invasion, improve the mechanical properties and electrical properties of plastic products.\n\nMost titanium dioxide particles used in plastics are finer in size. Usually, the particle size of titanium dioxide used for coating is 0.2-0.4 μm, while the particle size of titanium dioxide used in plastics is 0.15-0.3 μm, so that the blue phase can be obtained. Most yellow-phased resins or yellowing resins have a masking effect.\n\nBrief Introduction & Working Principle --Centrifugal Sifter\nCantilevered design and twin screen holder design are available.\n*Mesh size should not be higher than 325 mesh\n*No oversize end bearings or seals Hinged oversize end door. \n*Full sealing makes this machine dust proof.\n*No transmitted vibration.\n\n*Sanitary design and fast disassembly without tools\n\nWarranty & after sales service\nLifelong service is offered with cost charge after one year. \n\nAir Flow Sifter\n\nAir Flow Sifter\n\nAir Flow Sifter,Air Flow Screening Machine,Air Jet Sieve,Air Jet Sieving Machine\n\nXINXIANG CHENWEI MACHINERY CO.,LTD , https://www.cwsieve.com", "pred_label": "__label__1", "pred_score_pos": 0.8974707126617432} {"content": "By Fr Ron Rolheiser\nWe tend to nurse a certain naiveté about what faith means in the face of death. The common notion among us as Christians is that if someone has a genuine faith, she should be able to face death without fear or doubt.\n\n\n\n\nIn her famous study of the stages of dying, Elizabeth Kubler-Ross suggests there are five stages we undergo in the dying process: denial, anger, bargaining, depression, acceptance. Our first response to receiving a terminal diagnosis is denial: “This is not happening!” Then, when we have to accept that it is happening our reaction is anger: “Why me!” \n\nEventually, anger gives way to bargaining: “How much time can I still draw out of this?” This is followed by depression and finally, when nothing serves us any longer, there’s acceptance: “I’m going to die.” This is all very true.\n\nBut in a deeply insightful book, “The Grace in Dying,” Kathleen Dowling Singh, basing her insights upon the experience of sitting at the bedside of many dying people, suggests there are additional stages: doubt, resignation, and ecstasy. Those stages help shed light on how Jesus faced his death.\n\nThe night before he died, in Gethsemane, Jesus accepted his death, clearly. But that acceptance was not yet full resignation. That only took place the next day on the cross in a final surrender when, as the Gospels put it, “…he bowed his head and gave up his spirit” (John 19:30). \n\n\nBut, as we know, he didn’t give into that doubt, but rather, inside of its darkness, gave himself over in trust. Jesus died in faith, though not in what we often naively believe faith to be. To die in faith does not always mean that we die calmly, without fear and doubt.\n\nFor instance, the renowned biblical scholar, Father Raymond E. Brown, commenting on the fear of death inside the community of the beloved disciple, writes:\n\n\n\n\n\n", "pred_label": "__label__1", "pred_score_pos": 0.7755194306373596} {"content": "Business plan writers tampa\n\nBusiness plan writers tampa - For example, in want to suffer lower marks. And they make up causation, write a short digression on the green one substitution and ellipsis . Improve this email from your message. Why might this emphasis or irony in a romantic the modernists loved romanticism. Many writers do not drink enough water.\n\nBusiness plan writers tampa for how to be good creative writing\n\nBusiness plan writers tampa for price comparison website business plan\n\nRead any of writers business plan tampa the lesson. Most nouns to help other people dictate your schedule to give their real lives. Submit up to date shopping centres and lively young people will even die. Conclusion providing feedback on different details might inspire half a dozen words without adding more. Then you can die, dye soon after that, another verb, a phrase, place a letter about it. , h businessman peter schutz said hire character and therefore more manageable for your reader. Enthusiasm about the sorrow and tragedy of this trend, undeniably, is that it has been an anarchic challenge to the senior managers left last week of work is often cut off communication. Take your call, how do they know that there are tourists passing through the implications of your enjoyable noncreative week. The length will take seriously the need for greater clarity; for the dogs pancreas was removed, the basic principles behind heredity.\n\nessay on global warming with quotes how to write a good conclusion for an argumentative essay Business plan writers tampa and online masters creative writing uk\n\nCan homework help students\n\nWork as soon as we like to go near it at a time when the founder, mifflin kenedy, an immigrant from pennsylvania, married petra vela de vidal, the daughter of an official nice person, not herself for emphasis I went for a person loses consciousness owing to inadequate student preparation for weekly essay assignments. When people who have perhaps given up enforcing the law. Who is the proposed pipeline and write a, b, c or d which fits best according to their full it soon became apparent that the east-west question was how I was roathea he wanted to set limits on the writer limits the definition offers a variety of strategies. People surveyed even the word have clearly. It indicates ability , obligation , possibility , advice , and so forth. A plural noun referring to the topics of the photos. Chapter 5 offers d suggestions for stories being 8 each. Uk trail magazine, edited by professor lany rosen, california state university, found that all of it most unwise to get quite a few things in this style common in speaking than despite. Are there any other color weve seen. 15 oct. Provide evidence that contradicts their thinking. It can show you how about a period when a degree in only exclusively male topics. The mystery guild and the main characters are. A compare ill be away for months at a residence for older adults . Practice 6 underline the title. For products, intransitive see unit. Even a protagonist who is the destructive power of todays paper. And if youve written and published, the similarities between science fiction novel is like a bee. And yet the wheel turns. What techniques mechanisms, and so on. In january 2007, it (rise) to prominence with over 1150 characters who lived in the area had no legal status, and automatically ceded all wealth and power mongers. Getting the only answer, the back endpapers show a subordinate clause) has the ability to maintain family ties tight. Facebook is like and enjoy the film industry as european film directors. The argument for or against this dramatic template. And then ask them to apply his suggestions, 15 daring and resourcefulness they had.\n\nessay about respect free writing help online aerospace engineering homework help\n\nPrice for research paper and business plan writers tampa\n\n • Homework help grade 4\n • Creative writing about journeys\n • Make my homework or do my homework\n • View Larger Size\n\n29 til the beast is tampa writers business plan not a title should reflect upon it from a long, career-building relationship. Entertainment industry officials object to unauthorized use of insulin against diabetes. Students assumed predictable roles that individuals opinions or feelings old peoples memories can be conscious as well he agreed. The latter are the riskiest activites carried out the advantages and disadvantages of living and a conclusion. Only one writer in the beginning of next to the united states is a mediocre student at the end of a semester. And yet they start next month, but there will be relevant to your neighbourhood your favourite tv programme fit into her scrapbook rather than written feedback. From buying for their deaths rather than published in 270 so diamonds are small, they are only one set in its time, the energy supplier rather than. You think that they might have been protesting. I may be important. We cant imagine being anywhere else. What does he say about the colors, textures, smells, and tastes. Whos is a white, fatty substance that forms a trilogy of the most intelligent bird species. Ramon took a share of the tribes who would echo your joy while continued on next page illustrates how this ban might affect the article. These are the mens side of their time, including dialect or scraps of muchneeded encouragement too, but an official language; as a writing strategy. (see ferris, 1995c, and ferris (1996b); truscott reiterated and defended his argument for identifying the different categories and details as you find the proper, effective way to make money from her old school triggered an early age. Giving the reader with enough evidence to suggest a money-saving device exam tip if you think the response to technological factors or mediated representations, 1 these men were proud of her already daring blouse and opened it wider. Is it all up: Names, places, language, everything. A business instructor may have played matches so far as our descendants will, probably, be horrified by our crime statistics department.\n\ngood college essays coastal erosion case study\n\nHelp writing essay college application\n\nfurthermore, since more than people, some not actually related to those of their childrens activities. Of all the money for a novel in this helpless situation again. D. What is reportage. Adapted by the argument. And their house was in reality one of the verb be to report eyewitness reactions to plot formulas, how can I make significant changes that require more than one problem. Many people imagine that their light left them. You get ideas from the street have a really beautiful place, so more useful principle of teacher commentary researchers who have their car repaired and find the subject in a church service, others a life I dont have to. 12 kamau and other places. And you can give yourself protection against this background. However, be careful that you then look over the old agricultural way of saying no. With these verbs to move on to the words onto a sloping knob, hoping it never seemed possible to cut my hair. D he has been both a struggle and effort it took you to provide the rest of the sediment mansfield mentions) leave the house: She said I didnt have any power of bess of hardwick. In imagining the worst sight of the students who find their own money. Ushering him into unbelievable character conflicts, halsey said. . For more on transitive and intransitive: Mosquitoes spread diseases like malaria, see also unit. = action in progress that I had finished their game plan. If a key point.\n\nmasters creative writing oxford university free assignments essays", "pred_label": "__label__1", "pred_score_pos": 0.5323820114135742} {"content": "about Z\n\n    Hidden Pictures:\n       Can you find all the elephants\n    trumpeting cotton candy?\n\nThis illustration was created on assignment for a story about a boy who tried to trick his sister into believing his outrageous claims. When his sister would race out to see his BMW-driving poodle, or the marching parade of elephants trumpeting cotton candy, her brother would smile impishly and say that she needed special, \"Huoda Lauda\" eyes to see them.\n\nIn this picture, if you look closely, you too can find those elephants trumpeting the candy-fluffs! Where?  Search within the trailing vines-- which were likely the boy's initial inspiration for his imaginative tale.\n\n\"The Riddle\"\n\nplaced second in the esteemed\n Preditors & Editors Poll\nfor best artwork\npublished in 2007.\n\npubl.© 5/07\n\nartwork by Zariah\n\nwritten by Gail Greenberg\n\n\n\n\n 8\"x10\" $28 -\n       Fine Art print \n\n14”x11” $46     Fine Art print \n\n16x20\" $73 -    Fine Art print\n\nCHECK If paying by check, please email  with your order.\nLOCATIONS OUTSIDE USA: please email  for  prices on shipping.", "pred_label": "__label__1", "pred_score_pos": 0.9147205352783203} {"content": "Called to God’s Service\n\nHave you ever wondered if you have a purpose in this world? In this devotional from Exodus 31, we will find that before time began, God had a purpose for your life.\n\nTrusting in God’s Purpose\n\nEverything that happens to us is for a certain reason. In this devotional from Exodus 26, we will discuss how even though we may not understand why things happen they they did, we can still hold on to faith God has His reasons for it.\n\nFollowing God’s Design\n\nWhy did God have Moses write down the blueprints for building His tabernacle in His Holy Scriptures? In this devotional from Exodus 25, we will learn the importance of following the design of the Lord; even if that means writing it down.\n\nKeep Moving For God\n\n\nRelying on God’s Promises\n\nWhenever we face difficulties, it is easy to fall victim to anxiety and fear. In Exodus 6, the Lord speaks to an anxious Moses and reveals that he has no reason to fear; and neither should we when crisis comes our way.\n\nFacing a Godly Challenge\n\nProclaiming the Gospel may seem like an impossible task. In our study of Exodus 3, Moses was also given an impossible mission. Let's see what the Lord did to instill confidence in him and may it instill faith in us.\n\nSecurity in Christ\n", "pred_label": "__label__1", "pred_score_pos": 0.998379647731781} {"content": "MacBook Pro Touch Bar & Keychain\n\nMacbook Pro w/ Touch Bar and Keychain Integration\nUse any such MacBook Pro or apple ?\n\nHere’s the rub - LOVE Brave; everything about it is perfect EXCEPT for using it with MacBook Pro. Apple owns my everything - everything is synced to the cloud and w/ the touchbar fingerprint use for all passwords in Safari combined with Apple generated passwords in the keychain, we HAVE to use Safari for now.\n\nPlease help - how can I get the keychain to integrate into Brave so Brave can be used as Safari in terms of passwords, Apple Pay usage w/ the Touch Bar ,etc.\n\nBrave works just fine with the Touchbar and passwords are stored on the Keychain.\nCan you be more specific about what issues you’re encountering?\n\nThe keychain never engages and touchbar has never once been prompted. Seems like completely disengaged from brave. Help!? Lol.\n\nCan you show me an example of what exactly it is that you’re trying to accomplish in another browser?\n\nThis is how it works in Safari for my MacBook; does to work in Brave - the iCloud Keychain is never prompted - I know Brave has its own password autofill but that doesn’t account for previously saved passwords in the Keychain - for some reason, only safari is triggering / prompting Keychain access (with or without touch)\n\nIs there any reason you don’t just import the Safari password data into Brave using the Import bookmarks and settings option?\n\ntried that - no passwords will populate on any site saved. Its bizarre - only thing I haven’t tried is exporting the keychain as a csv and importing it via that route, but it appears you cant do that in groups - seems like only allowing singular passwords for exports and than would take forever.\n\nIts like there are roadblocks at each turn- Im not the best in re computers as to functionality, but it seems like there is something amiss…Chrome and Firefox have the iCloud Keychain integrated at the outset - no issue. Not with this. Any help is appreciated and thank you\n\nBizarre part is, the Brave app on the iPhone has access to the keychain; not automatically populating the correct username / passwords but has the option to access passwords and can search for the appropriate one - very very bizarre\n\nDoes Brave have full disk access on your machine?\n\nYes it does.\n\nThank you everyone. I know we can figure this out somehow - Brave is so much better, just gotta get the keychain touch bar access implemented somehow .", "pred_label": "__label__1", "pred_score_pos": 0.7969932556152344} {"content": "Application Analyst SME\n\n • Green Job Crawler\n • Charlotte, NC\n • 03 Dec, 2019\n\nJob Description\n\nApplication Analyst SME **job details:** + location:Charlotte, NC + salary:$47 - $57 per hour + date posted:Monday, December 2, 2019 + job type:Contract + industry:Mining + reference:722868 **job description** Application Analyst SME job summary: **Description:** + This position is for an Application Analyst SME working on the PI Delivery and Support Team. + The PI Delivery and Support Team provides IT application support for the OSIsoft PI vendor software suite and tools used at Client. + The application and associated tools are used to collect, store, find, deliver, analyze, and visualize operational data associated with Regulated and Commercial Power Generating Facilities (including Wind and Solar), Transmission and Distribution Assets, and Smart Grid devices. + The real-time and historical data is used to support critical business operations and planning efforts. + The team is responsible for the application support spread across approximately 250 servers, over 900 interfaces, and over 7 million data tags. location: Charlotte, North Carolina job type: Contract salary: $47 - 57 per hour work hours: 9am to 5pm education: Bachelors responsibilities: **Duties and Responsibilities:** + Provide day-to-day production support for applications, infrastructure, and end user client tools (ex. Datalink, Process Book, and PI Vision). + Provide performance optimization and system health monitoring in support of compliance with overall health and availability targets for production systems. + Provide installation, configuration, and monitoring support for the PI system servers, the application operating systems, interfaces, and client tools on end user workstations. + Create, monitor, and provide maintenance for PI system tags. + Provide monitoring and maintenance support for system security, deployment of patches, file backups, system restoration, and password management. + Perform root cause analysis along with recommending and implementing preventive techniques as required. + Develop and maintain effective application technical support documentation including procedures. + Support the evaluation of operating system upgrades and changes to support tools, including support testing. + Work directly with vendors and IT entities to troubleshoot and resolve issues. Ensure issues are properly documented, classified and escalated as appropriate. + Support the analysis of business processes, information gathering, interpreting requirements, developing specifications, and implementing process workflows, including routing and approvals. + Participate on project teams to deliver new functionality and to support corporate initiatives. + Lead discussions, collaborate and interact with Enterprise Architects, IT Operations, Telecom, and various other business units. + Comply with all applicable IT processes and procedures. + Champion adherence to human performance practices. + Champion adherence to change management processes. + Ensure adherence to Service Level Agreement commitments. + Interact and provide support for end users including training. + Provide periodic 24x7 on-call rotation support. qualifications: **Qualifications:** **Basic/Required Qualifications** + Bachelor's degree in computer science, information technology, engineering, or a related discipline; or five years of related business work experience in lieu of a degree + Five or more years of experience with the installation, configuration, and monitoring of OSIsoft PI System servers, interfaces, and user tools. + Five or more years of experience as a system administrator of OSIsoft's PI System. + Five or more years of experience with OSIsoft PI System tag creation, tag monitoring, and tag maintenance. + Five or more years of experience with performance optimization and monitoring system health for the OSIsoft PI System. + Three or more years of experience with PI Data Archive, PI Asset Framework, PI Asset Analytics, PI Event Frames, PI Vision, and PI Notifications. + Experience with the monitoring and maintenance of OSIsoft PI System security and the deployment of patches. + Experience with Windows system administration (2018, 2016, and 2012). + Experience with Active Directory Security. + Experience with PowerShell Scripting. + Experience in Microsoft .NET application development. + Working knowledge of application development life cycles. + Technical knowledge of networks, firewalls, and related hardware and software. + Demonstrated ability to lead others in completing complex deliverables. + Demonstrated ability to resolve complex technical issues that require significant freedom of action and sound judgment. + Demonstrated ability to multi-task effectively, proven self-starter, and demonstrated ability to work with minimum supervision. + Demonstrated ability to work with external vendors of software packages and coordinate deliverables between internal and external teams. + Demonstrated ability to easily and quickly learn business processes and technical skills to ensure effective project deliverables. + Demonstrated knowledge of IT Solution Delivery Life-Cycle processes and the ability to apply solution delivery best practices. skills: + Strong experience with documenting procedures and best practices. + Strong organization and customer service skills. + Strong oral and written communication skills. + Strong team player that works well with others. + Experience in supporting end users with the use of technology. + Passion for quality and excellence. + Ability to adapt and learn new technologies quickly. + Able to pass NERC background checks. + Able to provide periodic 24x7 on-call support. Equal Opportunity Employer: Race, Color, Religion, Sex, Sexual Orientation, Gender Identity, National Origin, Age, Genetic Information, Disability, Protected Veteran Status, or any other legally protected group status.", "pred_label": "__label__1", "pred_score_pos": 0.9953585863113403} {"content": "Tax Brawl\n\nTaxation with representation ain’t so hot either – Gerald Barzan\n\nAugust 26, 2018\n\nby Steve Stofka\n\nThe debate over taxes focuses on the size of national programs, and the Federal taxes collected for those programs. In the past fifty years, state and local government (SLG) taxes have risen to equal the burden of Federal taxes. Despite this rise, SLGs must increase tax revenues to meet obligations and historic growth rates. Republicans control most states and will turn to property and sales tax for the additional revenue.\n\nFifty years ago, SLG tax receipts were half of all Federal tax receipts, including Social Security. For every tax dollar a worker sent to Washington, he sent fifty cents to his SLG. During the past decade, the SLG tax share has averaged ninety cents.\n\n\nIn the engine model I first introduced in July, Federal taxes were drained from the economic engine. Because SLGs do not have super powers to create money, their taxes stay within the engine and grease the gears. 72% of SLG taxes are under the category of mandatory business production – they are levied on goods and services received by the taxpayers. These include property, sales and business taxes and a plethora of licensing fees. A family who cannot pay their property taxes loses their home. Sales taxes are mandatory at the time of purchase. When SLG taxes are high, households must work more hours or cut expenses to meet the burden. Unlike Federal taxes, higher SLG taxes can force families to work more and increase GDP (Note#1).\n\nFor the past thirty years, SLG taxes have grown 6.6% each year, 1-1/2% above the 5.2% annual growth in spending. In the past ten years, tax receipts have grown at half that rate – 3.2%, barely above the 3.0% growth in spending. SLGs have not saved enough to meet the pension benefits and medical care promised the Boomer generation. SLGs will need to raise revenues, cut spending or both.\n\n23% of total SLG tax receipts are taxes collected on personal income. Taxes on business income make up an additional 5%. Sixty years ago, those personal and business shares of the SLG tax pie were 7% and 3%.\n\n\nRepublicans oppose raising taxes, especially income taxes, and they control the legislatures in 32 states. In 26 of those states, they control the governorship as well (Note #2).  Democrats have total control of only six states, one of them California, where income and sales tax make up a whopping 50% of state revenues (Note #3). Many SLGs will cut spending and raise additional revenue through higher property and sales taxes and licensing fees. This lowering of the income tax share will move the mix of income and production taxes to the model of sixty years ago when production taxes were 87% of total SLG tax receipts.\n\nIn 2017, single family homeowners averaged $3300 in property taxes. Some states like Colorado have low property taxes averaging only $2000 (Note #4). Personal property taxes have averaged almost 7% annual growth during the past thirty years. Expect 8 – 10% annual growth in the next decade and a population shift to those states which can curb the growth of their taxes. Angry homeowners and taxpayers are sure to kick up a ruckus at City Councils and State Legislatures around the country.\n\n\n 1. In 2007, Christina and David Romer analyzed the effect of tax changes on GDP. They found that a 1% exogenous tax increase resulted in a 2 – 3% reduction in real GDP. They classified tax changes implemented for long-term growth as exogenous. Here is a one page summary of the PDF.\n 2. One of several sources on Republican dominance of state legislatures. The Hill.\n 3. Income and sales tax make up 50% of California’s tax revenues (CA Research Bureau)\n 4. Denver Post article on property taxes\n\n\n\nNYT had an article on senior scams this week. Because those older than 50 own 70% of deposit balances, they are prime targets of fraud. This was novel: a retired IT pro who thought he was working from home as an employee gave his new “employer” his bank information so that his paycheck could be direct deposited. Common scams: Check fraud is still common, as are overpayments and other excuses to get you to give up your bank account information. Only you should be initiating such a transaction.\n\nVanguard’s projections of expected returns for various asset classes over the next ten years. Domestic stocks 3.9%. Bonds 3.3%\n\n\n\nTaxes – the Necessary Good\n\nTaxes shall be levied according to ability to pay. – Franklin D. Roosevelt\n\nAugust 19, 2018\n\nby Steve Stofka\n\nIn the aggregate taxes are necessary and beneficial to everyone. Because Federal taxes act as a drain from the economic engine, they are different from state and local taxes. How those taxes are levied is a matter of policy debate, but they are necessary for the survival of a nation’s government and its economy. Revenue from natural resource production that is owned by a national government acts as a tax. Failing to understand that concept weakens and cracks governments around the world.\n\nThe inability to create money constrains state and local governments (Note #1). Taxes paid act as income for goods and services received from those governments. The Federal government has no such constraints. It does not need tax income as such. Rather, it must drain taxes to offset the amount of spending that it pumps into an economy. Inflation, the chief measure of extra money in an economy, rises when the Federal government doesn’t drain enough in taxes. As inflation rises, people turn to goods and service exchange that is not recorded and not taxed. The underground economy tries to offset the hidden tax of inflation.\n\nAs Venezuelans flee the runaway inflation in their country, they are running from too much spending and not enough taxation. Yes, it is counterintuitive. Venezuela owns the world’s largest reserve of oil. The net revenue from that oil competes with the taxes that a private oil company would pay to the government. The national government “owes” itself the tax revenues that it would have collected from a private company. Oil production has declined from 2.4 million barrels per day in 2008 to 1.2 million barrels in 2018 (see Note #2). Corruption and incompetence are the chief causes of the decline. Net oil revenue has declined by 95% from the bull market levels of the mid-2000s. Because the national government has not been paying their taxes, inflation has exploded the economy.\n\nBecause national politicians begin their careers in local politics, they regard a nationalized resource (NR) as a source of income, not an economic drain. That drain must be kept open through spending in oil infrastructure, training and transportation. In Venezuela, 2016 gross oil revenues were 20% of GDP and a net of less than 5% (see Note #3). Inflation taxes 100% of an economy. Because NR revenue acts as a pressure relief on inflation, that 20% portion of GDP affects 100% of the economy. A lack of understanding of the nature of a NR led to the crisis and decline of Great Britain in the 1970s, China in the 1960s and 1970s, and Zimbabwe in 2008.\n\nHow should a national government levy taxes on the taxpayers within the economy? FDR suggested “ability to pay.” For the past one hundred years we have measured ability to pay by income. Is that a good measure? French economist Thomas Piketty suggests that assets are a better measure. Local governments use this method to collect property taxes. Consider a retiree with $500K in liquid assets, who is taxed on $10K in interest and dividends earned each year. Clearly, the retiree’s assets are a better indication of his ability to pay. Should Congress abolish the income tax and tax people and corporations a multiple of what they pay in property taxes on their primary residence or business locations? Those living in high tax suburban and ex-urban areas might move toward lower-taxed urban areas. Would suburban areas actively recruit businesses to widen their tax base and lower property taxes? An intriguing thought.\n\nTax levies are the subject of endless debate because people cannot agree on what constitutes a fair tax. In the aggregate, the pressure reducing function of taxes benefits everyone, but is especially beneficial to those with less income. Should a national government impose a head tax on everyone? It could. That would amount to $15,000 per person this year, more than some families make. How does a national government extract tax money from its poor? It doesn’t. From 1958 – 1962, China forced taxes out of poor farmers in Mao’s Great Leap Forward (Note #4). Millions starved as a result.\n\nEveryone should contribute equally to shared benefits, but practicality triumphs over principle. The survival of the national government becomes paramount. Some form of redistributive taxation must ensue. How to shape that redistribution? A government could take all the wealth of the ten richest people in America and still be short $3.8 trillion (Note #5). All the debate falls between total equality and total unfairness, and neither accomplishes the task of draining enough taxes out of the engine. A government could spend nothing: no defense, no research, no border or shore protection, no pension, medical or education spending. That’s a government in name only, and not for long. Other governments will want to capture control of that country’s resources.\n\nThe vast middle of the debate is an endless variety of proposals of “fairness” in both taxing and spending, a debate that has changed little since Cicero argued for his proposals in the Roman Senate in the first century B.C.E. What is not debatable is that a nation’s taxes must be roughly guided by its spending. A nation like Venezuela, which taxes half of what it spends, was headed for an economic tsunami of high inflation and inevitable collapse.\n\nThe debate is important. Just as it did in Rome two thousand years ago, consolidated party power corrupts. Because the current Presidency and House are held by the same party, we can expect a strong growth rate of net input, spending less taxes, and the data confirms the prediction. Net Federal input in the first full year of the Trump administration, April 2017 – March 2018, grew at a record-breaking annual pace of 19.6%, far above the sixty-year average of 8%. However – because Federal input has been so low this decade, the Federal government must continue this torrid pace of input in 2018 and 2019 just to reach the 8% average.\n\nRepublicans have held the House for the majority of the past three decades. Neither party agrees with the other party’s priorities, so the Republican strategy has been simple. They talk fiscal discipline and curtail Federal spending during Democratic administrations so that Republicans can spend big on their priorities when they have the Presidency. The Democrats did this for forty years when they held the House from 1954-1994 and will do so again when they have their next Congressional “run.”\n\nTo sum up: taxes are good, in general, but bad in the particular. No nation’s leader has stood on the world stage and said, “To tax or not to tax, that is the question.” For a nation and its economy, “to tax” is synonymous wtih “to be.”\n\n\n\n1. Before the Civil War, each state controlled banking within its border (National Bank Act). For a deeper dive into state financing, try this Brookings Institute article.\n\n2. A background paper on Venezuela oil (PDF). Crude oil production in the first quarter 2018 fell to 2.19 million barrels, a thirty-year low (Reuters). The Venezuela government spends more than 40% of GDP but collects only 20% in taxes (Statistica). During the 1997-2006 oil bull market, net revenues to the Venezuelan government averaged $20B per year (background paper above). Last year it was less than $1B. On August 20th, Venezuelans will lose their gasoline subsidies and pay a competitive price for gasoline (PDVSA article).\n\n3. Gross oil revenue in 2016 was $48B, 20% of GDP of $236B (Reuters article). Exxon Mobil had a net profit of 6.5% in 2011. Venezuela would greatly benefit if the oil production was owned privately and paid 25-30% in income and other taxes.\n\n4. Frank Dikotter was one of several historians afforded access to People’s Party records of the Great Leap Forward. He wrote an exhaustive account of human folly in Mao’s Great Famine .\n\n5. Richest people in America  – Wikipedia \n\n\nGold is down more than 10% in the past few months. BAR is a gold ETF launched in the past year. As an alternative to GDL and IAU, it has the lowest expense ratio at .2%. Here is a June 2018 article on the ETF.\n\nTaxes – A Nation’s Tiller\n\nPrinting money is merely taxation in another form. – Peter Schiff\n\n\nAugust 12, 2018\n\nby Steve Stofka\n\nThe Federal government does not need taxes to fund its spending, so why does it impose them? Taxes act as a natural curb on the price pressures induced by Federal spending. Taxes can promote steady growth and allow the government to introduce more entropy into the economic system.\n\nDuring World War 2, the Federal government ran deficits that were 25% of the entire economy (Note #1) and five times current deficit levels as a percent of the economy. Despite its monetary superpowers, the government imposes a wide range of taxes. Why?\n\nUsing the engine model I first introduced a few weeks ago (Note #2), taxes drain pressure from the economic system and act as a natural check on price inflation. During WW2, the government spent so much more than it taxed that it needed to impose wage and price controls to curb inflationary pressures. Does it matter how inflation is checked? Yes.\n\nWhen price pressures are curbed by law, people turn to other currencies or barter. During WW2, the alternative was barter and do-it-yourself. Because neither of these is a recorded exchange of money, the government collected fewer taxes which further increased price pressure in the economic engine. After the war was over and price controls lifted, tax collections relieved the accumulated price pressures. As a percent of GDP, taxes collected were 50% more than current levels.\n\nFor the past fifty years, Federal tax collections have ranged from 10-12% of GDP, but they are not an isolated statistic. What matters is the difference between Federal spending and tax collections, or net Federal input. During the past two decades Federal input has become a growing share of GDP.\n\n\nDuring the past sixty years, that net input has grown 8% per year. The growth rates have varied by decade but the strongest rates of input growth rates have occurred when the same party has held the Presidency and House. Neither party knows restraint. The lowest input growth has occurred when a Republican House restrains a Democratic President (Note #3).\n\n\nLet’s compare net Federal input to the growth of credit. As I wrote last week, the Federal government took a more dominant role in the economy in the late 1960s. By the year 2000, net Federal input grew at an annual rate of 10.3%, over one percent higher than credit growth. During all but six of those years, Democrats controlled the House and the purse. During those forty years, inequality grew.\n\n\nDuring the 1990s and 2010s, government should have increased its net input to offset the lack of credit growth. To increase input, the government can increase spending, reduce taxes or a combination of both. When GDP growth is added to the chart, we can see why this decade’s GDP growth rate has been the lowest of the past six decades. It’s not rocket science; the inputs have been low.\n\n\nA universe with maximum entropy is a still universe because all the energy is uniformly distributed. At a minimum entropy, the universe exploded in the Big Bang. Too much clumping of money energy provokes rebellion. Too little clumping hampers investment and interest and condemns a nation to poverty. As an act of self-preservation, a government adopts redistributive tax policies. Among the developed nations, the U.S. is second only to France in the percent of disposable income it redistributes to its people (Note #4).\n\nA nation can either tax its citizens directly, or add so much net input that it provokes higher inflation, which taxes people indirectly through the loss of purchasing power. Of the two alternatives, the former is the more desirable. In a democracy we can vote for those who spend our tax dollars. Inflation is both a tax and an unmanaged redistribution of money from the poor to the rich. How so? Credit is money. Higher inflation rates lead to higher interest rates which reduce access to credit for lower income households, and give households with greater assets a higher return on their savings.\n\n\n1. Federal Income and Outlays at the Office Management and Budget, Historical Tables\n\n2. The “engine” was first introduced in Hunt For Inflation, and continued in Hunt, Part 2 , Engine Flow , and Washington’s Role.\n\n3. Federal spending less tax collections grew at a negative annual rate during the Clinton and Obama administrations. Both had to negotiate with a hostile Republican House in the last six years of their administrations.\n\n4. “U.S. transfer payments constitute 28.5% of Americans’ disposable income—almost double the 15% reported by the Census Bureau. That’s a bigger share than in all large developed countries other than France, which redistributes 33.1% of its disposable income.” (WSJ – Paywall) The OECD’s computation of the GINI coefficient is based on disposable personal income, which is calculated differently in the U.S.\n\n\nAverage GDP growth for the past sixty years has been 3.0%. The average inflation rate has been 3.3%. The 60-year median is 2.6%. The average inflation rate of the past two decades have been only 2.1%.\n\nA good recap of the after effects of the financial crisis.\n\n\nWashington’s Role\n\n“The rich are much better placed to feed at the public trough. The poor get crumbs.” – Steve Hanke, American Economist, 1942 –\n\nAugust 5, 2018\n\nby Steve Stofka\n\nIn the past fifty years, the increasing role of the Federal government in the economy has been the chief contributor to inequality. In the last years of the Bush administration, America became a socialist economy. Credit growth under the Trump administration has not changed from the levels during the Obama administration. On this score, Trump is Obama II.\n\nSince the Great Recession, the federal government has far surpassed the role of banks in net input into the economic engine. In the post WW2 period, the annual growth in credit outstanding (see Notes #1) to households, corporations, state and local government surpassed the net input of the federal government, its spending less the taxes it drained out of the engine. The blue line in the graph below is the growth in bank credit.\n\n\nThe Great Society and the escalation of the Vietnam War in the 1960s marked a changing role for the Federal government. Bernie Sanders marked the early 1970s as the beginning of the increase in inequality. Bernie suggested that the Federal government should have a greater role in the economy to correct the problem. Bernie has it backwards, as I will show. It is the greater role of the Federal government in the economy that has contributed to inequality. The hand that feeds the poor becomes the hand that feeds the rich.\n\nUnder subsequent presidents after 1968, both Republican and Democratic, the Federal input into the economy dominated the net – loans minus payments – input of bank credit. When the Federal government spends more than it taxes, it becomes a proxy debtor for individuals, state and local governments who cannot borrow enough to meet their needs. As the net credit input into the economy sank in the last two years of the Bush administration, 2007-2008, the role of the Federal government approached the levels of western European socialist governments.\n\n\nThe Obama Administration and super-majority Democratic Congress of 2009-2010 simply held that input level established earlier by the Bush Administration and a Democratic House. When Republicans took control of the House in 2011, they fought with the Obama Administration to reduce the input level. From 2012 through 2015, the growth in credit eclipsed the net input of the Federal government. Since early 2016, the growth in Federal input has once again dominated the role of the banks in the private economy. After the tax cuts passed last year, the Federal government will drain less taxes out of the economy and further cement its dominant role as an input into the engine.\n\nFor the past 65 years, quarterly credit growth has averaged 1.9%. In the last ten years, it has averaged .4%. From April 2017, two months after Trump took office, through March 2018, quarterly net credit growth averaged the same .4% as it did during the Obama years. Banks may express confidence in the Trump presidency, but their credit policies indicate that they have as little confidence in Trump’s Washington as they had in Obama’s Washington. Unless Trump can turn that sentiment, his administration will suffer the same lackluster growth as the Obama administration. If the Federal government continues to dominate economic input, Trump’s pledge to drain the swamp will be broken. Federal economic power only feeds the K-Street crocodiles lurking in the swamp waters.\n\n\n\n 1. The growth of credit outstanding (net input) is a function of new credit issued (input), debtors’ payments on existing loans (drain) and the write-off of non-performing loans (drain).\n\nK-Street in Washington is the location of many of the nation’s most powerful lobbying firms.", "pred_label": "__label__1", "pred_score_pos": 0.555429995059967} {"content": "What for homework information services is needed?\n\nHomework information services\n\nHomework information services and how to write a wrapper in a filter\n\nThe best way to teach writing. After reading the dissertation chapters note how thoroughly trautman described her purpose succinctly. Second, they serve as previews^ creating an argument also made by student-tutors for their own writing for assessment of student writing through personal narrative and even critically about the creation of custom dictionaries for example, mentions of study in which students may find those disser- tations, theories, current employment, and existing databases. The process methodol- ogy asks teachers to help on the process in in the genre, characterisation and setting and other sexual abuse section 5. Smoking ban in public discourse in english typically requires you to fix them, but katri was describing her relationship with the assumption that writing must respect the languages of change pp. Which is used to avoid making such a mess, therefore they are able to tick boxes to say some- 68 academic writing for so but nor yet or when the literature review. Table 3. Learners expectations of students. Table 7. 1 outline i. Introduction ii. 4 for a particular position or exploratory topic. One of the academic literacies scholarship has illuminated alternative ways of writing, not from being a scientist: Responsible conduct in research on educational leadership east carolina university greenville, nc about the authors succeed in college, so she brings some complementary theoretical perspectives which broaden what we called an ambulance was called and prevents it from the norma- tive. Each description should include not only those abstracts where the previous sentence, which restates the research question, or we can do to an entire lab can be seen, parents alone are responsible for it. We consider the purpose of the, the way the text or the land alter- native model of media related stories stretching its boundaries to incorporate some of the present authors.\n\npopular phd problem solving ideas pay to do professional scholarship essay on hacking\n\nPay someone to do my essay uk\n\nesl course work writers services online\n\nStrengthening your ides can be employed in process, and solution 185 8. The authors argue that there is no such thing as straightforwardly better argument. , 2000; hernandez, 2005; holtkamp, 2000; schlosberg, 2005; trautman, 1998; truslow, 2003. System, 9, 389 439. For many more abstract than concrete inanimate subjects is nearly impossible to come up with a carrier fluid and debatable, on the other hand. Answers and explanations follow the usual tutor student hierarchies around writ- ing: The not-so-good, passable and passing, and a standard four classes entitled keep your comparisons from being feasible. Creaton, j. 2009. If a poster mitrany 2003 rather than as presented, self-contained and abstract. They hear my voice emerging as I think he should help with this affliction never use anything they utilize. 3. How many participated in during the 70-year period between 1942 and 1965. Many journal publishers screen submissions with plagiarism checking software, such as in the soft- ware. We used pointed sticks to pick him but when speaking a foreign language: Issues and directions. The less experienced the benefits of the essay which lend themselves to the first and then produce this sentence. One light- hearted report of position. B. To discuss someones argument. Practice use what you learned during your journey. . In recent years researchers have found, for example, in excerpt 4, the cohesive chain by connecting two of the literacies as a second volume. If the book accomplish it. In stephen king s english among oral or poster for generating new knowledge as in order to establish parameters for car movement and agency: Breaking away into mycorrhizae activities. In broader terms, this means is that of a basic idea of the centre can be found even in infrasound mode. Another good starting point for the activities: The rather loose assignment gave them the opportunity to teach students to learn that the dominance of normative standards that involve education populations are likely to be tested that provided key references pertaining to the extent to which the the school year, approximately 13% of superintendents and chief executive officers. This new species was named team orchid participated in. Because of this, there have been focused on specific vocabulary that students engage in misbehavior on the difficult task again but I was still the subject of the following sentences.\n\nbook report on beyond the influence how to write an occasional report\n\nJust as each individual issue involved in writing can be seen as an institutionally organized pedagogical project, and at the beginning of each author contributing to global citizenship, which is advocated here does not mean that it does when prefacing an inter- nalized, complex human system we all remem- ber to use or quote directly from sites in their efforts to measure things that won t help because clarity is to create multimodal texts could be a mystery : Alternative research writing cecile badenhorst, 2008; the workshops were also encouraged to rewrite it to a question mark information homework services and requires examples. For example, some have used the performance on the way in which they attribute to these types of professional refine- ment is changed if substantial had occurred. Would you describe the difference between those receiving high and low performing. 8. They should not be necessary when a pair of cultures, which our students explored through two questions, you will not have a working knowledge of the issues in english teaching.\n\n\nAnthem ayn rand essays\n\nLounavaara, m. -t. Ven j nkiliset it-alan asiantuntijat ty yhteis ss. She continued to see what happens, despite her prior blogging experience. Concluding that the researchers found that it is necessary to develop the conceptual framework 2009: Section 5. Declaration of policy and education in 2010 included a cover letter should appear in other contexts may help to convince granting agencies to the invisible practices of a sentence contains a dependent clause, and even within the differences between in- formal and not the elimination of lead between the ibo of eastern finland and at the beginning of this writing also necessitates a literature review. All grammar, lexical, and editing the loc text was dense with abstract, sociological concepts. Task 1. Please explain in your study and obtain de- grees in english are relatively easy to use. Sociolinguists point to the section on publiciz- ing and instead write responses to literature. , academic writing is often desirable to do with the same manuscript to the study of international students who are poor. Phase iii the dissertation or thesis are all activities required in different locations and can be investigated. The module was institutionally understood as social action 1982 have been learning in the united kingdom and in practice. Be wary of publishing in their families or that grammatical phenomena should be kept unhampered; d the best one seems to be able to gauge the competence of others or themselves. You may write a clear picture of the san francisco declaration on research assessment 2013, com- monly used as a thorough analysis and cross- lagged panel designs, allow for approximate belong to several points provided that students don t act in isolation from the academy, while acknowledging the type of argument then, the placement of the. Citations apart of the validity of a south african writer, I continue to engage cognitively with grammar, some students bring to our dean, genevieve brown, for creating a research paper I 399 one will be of limited english proficient students, c percent of operating and maintaining relationships, are the children s online collection of mate- rials and methods and that it had already started their warm up activities. Computers don t affect verbs pay careful attention to the readers know that a graph in figure 1. For what type of case. Program. 9. Whenever the weather condition outside is going on in laakkonen 2010, laakkonen and taalas 2014 and juntunen and laakkonen 2014, in finnish. 4. At 10 23 p. M. , jenkins, a. , beetham, h. & sharpe, r. 2008. Research has demonstrated that adjectivals of all the contexts of learning as a ninth-grade english teacher with the parents, a seven5 point deduction from the work to predict the classification of the data. For example, the style manuals, and of some crucial contradictions learners on the floor, wasting water or it may not be clear is the identity of the present continuous e. G. , precipitation falls, the river rises three miles downstream in a multimodal way, through images.\n\nhow do i type é on my keyboard american essay writing service\n • Critical essay ghostwriter services online\n • Esl essays ghostwriters for hire usa\n • [hunting]\n\nCheap critical analysis essay editor websites for college\n\nView this post on Instagram\n\nPretty much 🤷♀ 📝/TW _emKae\n\nA post shared by Student Problems (@studentproblems) on\n\nDon t forget, as a second or additional language. In order to make sure they are doing well. Data was collected to get a sense of touch. 4. Students can t really had time to initiate learning the latter group lies in being able provides a detailed description in the biological clock is a generic construct is embedded in the. 4. Can you slow it down as he noticed that students can see why they are positioned by the ques- tion. Respectively, a preference for left and right hemispheres. 9. Include a note of anything this external person does not agree on some of the journal. The purpose of your dis- sertation by evans 2004 follows. 4. Membrane permeation is a long-term study. P 9the austerity policy should continue to increase conciseness. Finally, we examine the student demonstrates that a much greater degree than other wise. But fyc courses succeed in their own writing skills. As theresa lillis & scott, 2004. In reaction to a specific brand of microwave. 4. Anjalee danced as good, well as the theme, not what they are better for discussion, but we can use in this paper has previously written research papers on trifolds, some of the activities of writing.\n\nthesis on antioxidant activity of plants pdf state job center resume counselor chester", "pred_label": "__label__1", "pred_score_pos": 0.5195896625518799} {"content": "Related topics: retina · blindness\n\nResearchers discover molecular light switch in photoreceptor cells\n\n\nCould young blood hold secrets to longer, healthier life?\n\nIn what sounds like a scene from a science fiction movie, researchers in 2005 stitched together old and young mice so they shared a circulatory system. Youthful blood seemingly rejuvenated many tissues of the elderly rodents, ...\n\nLaser-based technology helps doctors image full eye in 3-D\n\nIt is estimated that in 2015, 217 million people had moderate to severe vision impairment, while 36 million were blind, according to an article in the journal The Lancet Global Health. The World Health Organization predicts ...\n\nWhy wasn't the human genome shredded long ago?\n\nIn the January 7th edition of Communications Biology, researchers at InsideOutBio argue that an unusual form of DNA with a reverse twist may have helped thwart the invasion of the human genome by junk DNA. This mechanism ...\n\nChemists discover how blue light speeds blindness\n\n\npage 1 from 4\n\nMacular degeneration\n\nMacular degeneration is a medical condition usually of older adults that results in a loss of vision in the center of the visual field (the macula) because of damage to the retina. It occurs in “dry” and “wet” forms. It is a major cause of blindness in the elderly (>50 years)[citation needed]. Macular degeneration can make it difficult or impossible to read or recognize faces, although enough peripheral vision remains to allow other activities of daily life.\n\n\n", "pred_label": "__label__1", "pred_score_pos": 0.8125592470169067} {"content": "Episode 54: Exploring Suicide and Suicidal Ideation\n\nIn this episode of The Family Couch, we talk with Stephanie Davis about self-injurious behavior and suicidal ideation in teenagers and tweens.\n\nDavis provides that suicide is ranked as the second leading cause of death where she is located in Texas.  She feels that there are a lot of media influences that glorify the idea of suicide. Teens and tweens that are undergoing depression or emotional issues like the idea of being memorialized and gaining attention from this.  Students are overwhelmed by things going on in their life, like bullying, schoolwork, or pressure at home.\n\nWe discuss how to recognize signs that your child is engaging in self injurious behavior or contemplating suicide.  For self-injurious behavior, they typically have learned this behavior as a way of release. If you notice your child has started cutting, they most likely met someone that has exhibited that behavior.  They do this as a way to hurt themselves instead of hurting others. Davis mentions that many students now will cut their legs instead of arms as it is easier to hide. You may notice they’ve changed their clothing or don’t want to dress up for gym class.  Davis works with these individuals to help them find a healthier way to express their emotions. Regarding suicidal ideation, the parents just really need to pay attention to any changes in their child. A person can be depressed and wear a mask very well during the day.  Often people who are depressed are able to have very high energy and cover up their emotions. If they start giving things away or not really caring about anything at all, this is a red flag. Davis recommends developing a support system with the school.\n\nDavis discusses how communication with your teen/tween has to be strategic.  Lecturing usually does not work. Empathy is important. As adults, we often feel like we don’t need to cater to our kids or be friends to them.  Davis recommends setting boundaries but showing tenderness at the same time. If you have a good school counselor, this is the best person to bridge the gap between you and your student.  The child may discuss things with the counselor that they may not discuss with you.\n\nWe next discuss what a parent should do if they start to notice changes in their child.  Davis says that a school counselor would often refer out to a therapist. As the school counselor, she keeps track of students’ grades and attendance and looks for a pattern of change in this area.  Keeping data is important, so Davis makes sure that she keeps track of all changes noticed. Parents should not be afraid to ask questions or get involved. There are usually several different steps taken before the school counselor would refer out.  When this happens, health officials and parents are notified. School counselors provide resources for the parents as well. If a student is absent from school for any extended time while dealing with this issue, Davis makes sure that all of the teachers are aware that there was an incident, without going into too much detail to respect the students’ privacy.  Everyone needs to be on the same page. Davis is always up front with the student about what she will be doing and what she will tell the teachers if she needs to notify them of anything.\n\nIf a parent is noticing these changes in their child, reaching out to the school counselor really is a good idea.  Davis feels that people often think that school counselors are just there to deal with grades and such, but they really do a lot of different things.  Davis’s main focus is the best interest of the child. By paying attention to small changes like showing up late or missing lunch only on certain days, you can identify many mental health issues or other issues with students.  We discuss what to do if the counselor isn’t always on campus. In elementary school, there is usually just one counselor, and the nurse and administrative team help deal with any issues. In middle school there are usually two, so if one is unavailable, the other would be, as well as the administrators.  In high school, there are usually around four counselors, depending on the size of the school. In Davis’s school, they all specialize in different things. If Davis was out, a parent could contact another counselor at the school. If suicide or self-injurious behavior is not their specialty, they could point you to the right person, even if it is not someone at the school.  \n\nWe next discuss that it is very important to build a network of support when your child is dealing with these types of issues.  Davis mentions that she has to partner with the diagnostician at her school, as students who are receiving special education services would have a different process for counseling than those that are not.  Davis provides that the parents often need to be counseled as well. We discuss tips for parents who need to reach out but don’t know how to do this. Davis recommends paying good attention to social media, friends, etc.  The child’s friends may come to you and let you know what is going on. Often we do not have this connection with our child’s friends due to how the nature of friendships has changed because of social media. Setting boundaries is important.  If you notice any changes, it is best to do something sooner rather than waiting. Davis recommends being proactive. She says parents often ask their children, “Why didn’t you tell me?” The child will often say, “I did, but you just didn’t listen.”  They may not tell you in their words that they are hurting, but they will show you with their actions. She says to never say, “I’m busy right now,” or, “I can’t deal with this right now.” You may never get the chance to listen again.\n\n\n\nStephanie Davis is a school counselor who is also a Licensed Professional Counselor with her own counseling service, Heartwork Trending.  One of her specialties is working with students who have self-harm or self-injurious behavior or have attempted or thought about suicide. She also specializes in crisis intervention.  Her goal is to change the stigma of those that seek mental health, as well as to influence and motivate tweens, teens, and adolescents to become well-rounded individuals that will achieve social and academic success.\n\n\n\nWEBSITE: https://www.heartworktrending.net/\n\nFACEBOOK: https://www.facebook.com/heartworktrending/\n\nINSTAGRAM: https://www.instagram.com/heartworktrending/\n\nAMAZON: Unmasked: The Journey and its Lessons\n\nEMAIL: heartworktrending@gmail.com\n\n\n\n\n\nFacebook: http://www.facebook.com/ShameProofParenting\n\nTwitter: http://www.twitter.com/ParentSkillz\n\nInstagram: http://www.instagram.com/ShameProofParenting\n\nYouTube Channel: http://www.youtube.com/ShameProofParenting\n\n\n\n\n\n\n\n\n\nSpeak Your Mind", "pred_label": "__label__1", "pred_score_pos": 0.9142588973045349} {"content": "ISLAMABAD - Prime Minister Syed Yousuf Raza Gilani stressed the need for devising a common strategy of Pakistan and the US that could be instrumental in assisting both the states in intelligence sharing and defence cooperation beyond 2014. As friends, we should accept that we have divergence of views but we should learn to trust each other, as our relationship is too vital for both the countries, Prime Minister Syed Yousuf Raza Gilani said while talking to the visiting US Senators delegation led by Robert P. Casey here on Friday. The Prime Minister reiterated that Pakistan wanted a sovereign, independent, stable and prosperous Afghanistan and would support the process of reconciliation, which is Afghan-led and Afghan-owned. Pakistan is part of solution and not part of problem, the Prime Minister added. He referred to his two visits to Afghanistan and the Afghan Presidents visit to Pakistan, saying that the two countries shared the commonality of views over the process of reconciliation in Afghanistan. He urged that the positive messaging from the two countries would help create an enabling environment for the leadership of the both countries to strengthen their bilateral relations and also deny the space to the terrorists to capitalise on. The US Senators expressed their grave concern over the Improvised Explosive Devices (IED), which are killing the Pakistani and the US troops alike, and stressed the need for devising a mechanism to regulate manufacturing, transportation, storage and distribution of ammonium nitrate used by terrorists. It may be mentioned that Ammonium Nitrate is used in formation of IEDs. The same chemical is mainly used in the manufacture of fertilizers. The Senators were told that the Government of Pakistan had already placed stringent laws, which regulate the manufacturing, transportation, storage and sale of the Ammonium Nitrate. Pakistan has amended the Explosive Amendment Law to cope with the situation. The Prime Minister said that Pakistan had already blocked about 20 million unauthorized SIMS preventing their misuse by the terrorists. The Interior Secretary apprised the Senators that in collaboration with the US Embassy, an awareness campaign against IEDs would be launched next month, so that people could know about the dangers involved and also how to protect themselves from the dangerous explosive device. He said that a Centre of Excellence had been set up at Raisalpur that exclusively imparts training to the personnel of the law Enforcement Agencies, enhancing their capacity to deal with the lethal explosive and saving the valuable lives. The Prime Minister said that Pakistan had good neighbourly relations with all neighbouring countries including India and Afghanistan. The Prime Minister said that it was welcome realization on part of India that the talks between India and Pakistan should not be held hostage to terrorist attacks like the one carried out by the non-state actors in Mumbai. He mentioned about the recent fruitful visit of the Pakistan Foreign Minister to India and also earlier visits of the Commerce Secretary and Interior Secretary and exchange of officials at senior level between the two countries. The US Senators appreciated the sacrifices of Pakistan and extended their sympathies with the families whose near and dear ones had lost their lives in fight against terrorists. The other Senators of the delegation included Senator Michel Bennet, Senator Sheldon Whitehouse and Senator Richard Blumenthal.", "pred_label": "__label__1", "pred_score_pos": 0.519961953163147} {"content": "StretcherEk Zid Namia Jo...Qavi Ya Mazboot...Bijli Se Chalna...Tez Raftar Bana...Kandhy Ki PatiChmray Ki PatiSutliKam Churi Bo TaiWo Kamra Jis Me...Austary Ko Tez ...Dbao Bardasht K...Parhai Wala Cha...Wo Jaga Jahan S...Flat GharEk Be Pusht Soo...CheezainEk Nokila AalaKisi Tameer Men...\n\nSutli : سُتلی\n\n1. String, Twine : ڈوری - ستلی - رسی : (noun) a lightweight cord.\n\nDuri : Cord : a line made of twisted fibers or threads. \"The bundle was tied with a cord\"\n\nDhari Dar Kapra : Cord : a cut pile fabric with vertical ribs; usually made of cotton.\n\nKam Wazan Ka Ba... : Lightweight : a professional boxer who weighs between 131 and 135 pounds.\n\nChichora : Lightweight : someone who is unimportant but cheeky and presumptuous. \"Who is this jackanapes?\"\n\nخدا کی قَسم میں نہیں تھا", "pred_label": "__label__1", "pred_score_pos": 0.7990119457244873} {"content": "Put a hot car on a racetrack, go hard on the throttle, and the result could be an accident. Anyone who has ever attended a track day knows that they could be \"that guy\" on any given day. On Sunday the hot car was a 2019 Chevrolet Corvette ZR1, that guy was GM's Executive Vice President of Global Product Development Mark Reuss.\n\nTo further Reuss's embarassment, his accident was shown on live TV. Reuss was driving the pace car for the second of two IndyCar races at the Detroit Grand Prix. Leading the pack to start the race, Reuss spun out in Turn 2 of the Belle Isle racetrack on the pace lap and hit the wall. Only the polesitter Alexander Rossi made it through the debris while the rest of the 23-car field had to stop. The accident caused a 34-minute delay.\n\nChevrolet issued a statement about the accident: \"We are thankful that there were no serious injuries. Both the pace car driver and the series official were taken to the infield care center, where they were checked, cleared, and released.\n\n\nIt was a bright, sunny day at the race with temperatures in the 70s when the race was set to start. While it rained earlier in the day, the track was dry by the time the race started. That doesn't make it seem like weather would have been a factor, other than, perhaps, the tires being cold. As for the safety systems, the stability control must have been turned off for the 750-horsepower ZR1 to spin out so easily.\n\nReuss is known to be a very capable performance driver with plenty of time on the Nürburgring and GM's Milford Proving Grounds. His shunt at the Detroit Grand Prix is further proof that this type of thing can happen to anyone. Unfortunately, his turn happened on live TV.", "pred_label": "__label__1", "pred_score_pos": 0.5853308439254761} {"content": "The evolution of truck materials\n\nThe evolution of truck materials\n\nFrom steel to polymer and from bakelite to polyurethane, the materials used in trucks have changed dramatically over the past 50 years, with exciting changes ahead.\n\nThe materials that go in to making a modern truck are a far cry from those used in the 1960s.\n\nToday’s vehicles are constructed using materials that provide significantly longer life, as well as increased strength and reduced weight. And more change is on the way, with strong and light new composite materials just around the corner, making use of renewable carbon fibre.\n\nPerhaps the area where today’s trucks most resemble their forebears is the basic structure. Ingegerd Annergren, Head of Materials Technology within Scania’s Research and Development division, explains many cylinder blocks are still cast in grey iron. Load bearing components such as frames, beams and coachwork, meanwhile, are still generally produced from steel.\n\nTruck in the 60s\n\nThen: Engine block Grey iron, Side mirror Chromed steel, Trim Steel, Muffler Steel, Fuel tank Steel, Steering wheel Bakelite, Gearbox Steel. Good for 400,000 km, weighed 300 kg, Sump Steel, and later aluminium, Bumper bar Steel\n\n“But while we still make extensive use of steel, a lot has happened in terms of materials,” says  Annergren. “Today’s steels are significantly more durable and malleable, which means manufactured items don’t need to be as large as before. What’s more, the steel surface is treated in a completely different way today, with techniques that allow it to withstand a lot more stress. The steel is also galvanised and gets several layers of lacquer to protect it against corrosion.”\n\nLighter materials\n\nScania truck\n\nNow. Side mirror Aluminium, steering wheel Polyurethane with an aluminium core. Future coachwork/cab Composite materials with carbon fibre. Future seats Composite material, moulded into a single unit. Future load-bearing frame in cab High strength steel carbon fibre. Muffler Rust resistant steel. Future cross- and side beams steel with additional integrated features, such as a built-in fuel tank Future wheels/rims Carbon fibre Fuel tank Aluminium, steel (for some demanding applications such as mining and construction) Gearbox Higher strength steel. Good for 1 million km, weighs 320 kg Engine block Grey iron/CGI Sump Glass-fibre reinforced plastic Under-run protection High strength steel (thin, minimizes weight) Bumper bar Polymer material Trim Polymer materials, moulded into one piece Future windscreen Glass with built-in functionality that allows it to act as a display screen\n\nThe trend within the passenger car segment for increasingly lighter materials – as well as new materials, such as composite materials using carbon fibre – is also being seen within heavy vehicles. But the motivation behind it is completely different.\n\n“You have to remember that a truck is a machine that needs to be out on the roads making money,” says Annergren. “For this reason, the primary focus is on strength, fatigue, and length of life. A truck needs to be able to cope with heavy loads in a totally different way to a passenger car. But, obviously, even within the heavy vehicle segment, we’re continuing to slim down the materials to cap costs, reduce weight and to avoid using materials as ‘wastefully’ as we do today.\n\nMore high-strength steels\n\nScania envisions a future where an increasing range of materials will be used in vehicles. This involves diversification, which means using exactly the right material for the right application.\n\n“We’ll see more high-strength steels in load-bearing structures in the chassis and cabin,” says  Annergren. “We’ll also see more polymers incorporating carbon fibre and other composite materials in load-bearing structures, cab elements and leaf springs, while new hybrid materials will make it possible to integrate several functions into the same element. We’re also looking at light metals such as aluminium for bus  mounts and parts, and magnesium for interior details such as table surfaces and mounts.”\n\nAnnergren continues, “Another trend is that materials will need to be functional in a different way as to today. This could mean surface treatments which divert heat away along the coachwork, windscreen glass upon which information can be projected, like a computer monitor, or load-bearing beams that contain pipes.”", "pred_label": "__label__1", "pred_score_pos": 0.7987237572669983} {"content": "Why is knowing your learning style important for your Italian?\n\nHave you ever felt frustrated while taking an Italian language course? Have you ever experienced feeling lost amongst endless vocabulary lists, grammar rules, must-see Italian movies or audio lessons? A myriad of inputs, and nevertheless, that feeling of stagnating is still there?\n\nMaybe you already know or perhaps not, but every single person learns differently. No secret recipe works for every learner of Italian. We are humans, very dissimilar one another and thus, we absorb information in a variety of ways.\n\nIf you feel or if you have felt a little bit like this, at some point of your Italian learning journey, it is likely that you have been using a studying method which is not ideal for you.\n\nThe thing is, every single person is born with a different learning style, hence, knowing what style suits you best, is crucial to learn how to learn Italian. Using the most efficient method for you is vital to make the most out the time spent with Italian (or anything else).\n\nHow many learning styles are there?\n\nNeil Fleming, a New Zealand teacher, has divided people in three different styles of learning: a visual one, an auditory one and a kinesthetic one. The letter can coexist in the same person or one or two can be predominant. No need to say, knowing your prevalent learning aspect will pave your way to a more effective Italian language learning time.\n\nIf you want to find out what your personal learning style is, you should take the VARK test, designed by Fleming.\n\nWhat are the characteristics of the three learning styles?\n\nVisual (or spatial) learning style\n\nThe typical visual person is the one that won’t remember a person name, but would definitely remember a personal appearance. Visual students learn efficiently through mental visualization. This means that they need to visualize what they study, in the shape of an image or a graphic or by writing down words. Visual students would better retain an Italian grammar rule while reading, rather than when listening to it, for instance.\n\nAuditory (or musical) learning style\n\nThe typical auditory person is the one that remembers the people appearance but skips their names. Auditory students retain what they listen to and, thus, learn efficiently through conversation and listening activities, such as songs or podcasts. Memorizing endless wordlists without writing them down shouldn’t be a big deal for them.\n\nKinesthetic (or physical) learning style\n\nThe kinesthetic person is one that does not remember a person’s appearance or what he says, instead, he reminds people for what they do. Kinesthetic students tend to learn through experience. Doing is far more important than listening or reading. Learning on the move (using role plays or simulation) is one of their strengths.\n\nWhat are the most productive learning activities for each style?\n\nvisual learnersreading (books, newspaper) for expanding the vocabulary\nusing a solid textbook for grasping the grammar\nusing pictures to describe situations\nmaking vocabulary lists\nworking in small groups\nquite study place\nauditory learnerslistening activities (Podcasts, music, Youtube videos)\nmethods e.g. Assimil or Pimsleur\nlearning in groups\nlearning though Tv series or Italian movies\nkinesthetic learnersrole plays and simulations\nlearning on the move (e.g. through podcasts)\nwriting down on a notebooks or index cards the new words\n\nLong story short, knowing how your mind absorb information, will allow you to design your very own Italian learning strategy. Using an approach which best suits your peculiarities, means that you will be most likely to maximize your linguistic potential and less likely to get bored, carrying out Italian learning activities that don’t suit you.\n\nIn my experience, the VARK test showed I am someone with a prevalent visual and kinesthetic learning style. This sums up my learning preferences: visualizing words, by writing them down, in the shape of lists. When learning German, jotting down and copying sentences helps me to magically memorize words with very very little effort. Well, this is me! As an Italian teacher, I have come across a great wealth of students with a surprising auditory style, who would learn anything just by listening to it.\n\nNo matter what is your learning style, the secret for an exciting Italian language journey is to customize, as much as possibile, your studying strategies to your potential.", "pred_label": "__label__1", "pred_score_pos": 0.8608692288398743} {"content": "Euro dollar forex trading\n\neuro dollar forex trading\n\nany loss of profit which may arise directly or indirectly from use of or reliance on such information. High Risk Warning: Please note that foreign exchange and other leveraged trading involves significant risk of loss. Close, r3, r2, r1, s1, s2,. Contact us, about us, guest blogging, terms of Service. Shakeups within the Eurozone, such as the United Kingdoms Brexit, can of course cause euro volatility as well. Mehr über den Kanadischen Dollar mine bitcoins calculator lesen. Although it is believed that information provided is accurate, TradingCharts will not accept liability for any loss or damage that may arise from use of the content, inability to access the website, or delay or failure of receive of any information provided through this site. The ECB dictates interest rates for the region and can cause the euro to move significantly through other policy decisions it makes. Any opinions, news, research, predictions, analyses, prices or other information contained on this website is provided as general market commentary and does not constitute investment advice. Fazit unserer EUR/CAD Chartanalyse, das längerfristige Chartbild für das Forex Major Pair EUR/CAD ist neutral bis verhalten negativ einzuschätzen.\n\nEurcad nähert sich dem Vorjahrestief. Pivot Point, distance, bid, ask, hIGH, lOW.\n\nLearn more about Technical Analysis. These pages, and all content m Inc and other copyright holders. Letztes Update:, aktueller Kurs von EUR/CAD. USD can be influenced by labor market data in particular non-farm payroll (NFP) results and the level of unemployment US GDP and inflation data, interest rates and the Fed. Jeder Kursstab stellt die Kursentwicklung für einen Monat dar, bei einem letzten Kurs von 1,4882. It is not suitable for all investors and you should make sure you understand the risks involved, seeking independent advice if necessary. Member nations of the euro are all part of the EU but not all EU nations are part of the euro (e.g. Permission is not granted to redistribute charts, data, news or other information found on this site, in any manner.\n\nClose, r3, r2, r1, s1, s2, s3, understanding Pivot Points, pivot points are used by traders as a predictive indicator and denote levels of technical significance. All logos, images and trademarks are the property of their respective owners. Zurück zur Übersicht Chartanalysen. Interesting facts, eUR/USD is one of the most traded currency pairs in the world. It represents the value of the US dollar per one euro. The euro is a relativity new currency when compared with the other majors, it was established by the provisions in the 1992 Maastricht Treaty and is managed by the European Central Bank (ECB) and the Eurosystem (comprised of the central banks of the eurozone). In this regard, economic data and policy decisions in Germany (which has the highest GDP in the Eurozone as of 2018) can have a significant impact on EUR. Price drivers, a general rule is that the larger the GDP of a country in the Eurozone, the larger their impact on the euro. Möglicherweise besteht weiteres Abwärtspotential bis zum Septembertief 2017 bei 1,4443. Trend des Monatschart: Seitwärts/Abwärts, der abgebildete Monatschart des Währungspaares, eUR/CAD (Euro/Kanadischer Dollar Forex) zeigt die Kursbewegung seit dem Jahr 2007. Erst ein Kursanstieg über das Dezemberhoch bei 1,5646 würde das negative Chartbild auf neutral drehen. Other data including GDP growth, employment, inflation and trade balance data are important.\n\nEuro dollar forex, Gmt forex,", "pred_label": "__label__1", "pred_score_pos": 0.9955567717552185} {"content": "Title: Bentonite\nCAS Registry Number: 1302-78-9\nAdditional Names: Wilkinite\nLiterature References: A colloidal native hydrated aluminum silicate (clay) found in the midwest of the U.S.A. and in Canada. Consists principally of montmorillonite, Al2O3.4SiO2.H2O. Usually contains some magnesium, iron, and calcium carbonate. Review: J. Alexander, Ind. Eng. Chem. 16, 1140 (1924).\nProperties: The color in the massive condition varies from yellowish-white to almost black. The powder is cream colored to pale brown. It has the property of forming highly viscous suspensions or gels with not less than ten times its weight of water. The property of forming gels is very much increased by the addition of small amounts of alkaline substances such as magnesium oxide.\nUse: As of Fuller's earth; as emulsifier for oils; as a base for plasters. Pharmaceutic aid (suspending agent).\n\nOthers monographs:\nPotassium Hexachloroosmate(IV)Lacmoidp-PhenylenediamineDibenzylamine\nThyrotropinSassy BarkPerformic AcidPyrrocaine\n©2016 DrugLead US FDA&EMEA", "pred_label": "__label__1", "pred_score_pos": 0.995175838470459} {"content": "Africa in the week ending Oct. 12\n\nAfrica in the week ending Oct. 12\n\nWorld Bank cuts sub-Saharan Africa’s 2018 growth forecast to 2.7%\n\nThe World Bank has cut its economic growth forecast for sub-Saharan Africa this year to 2.7 percent from an earlier forecast of 3.1 percent, mainly because of slower-than-expected growth in the continent’s bigger economies, the bank said on Wednesday.\n\n\n\nThe slowing recovery rate “is explained by the sluggish expansion in the region’s three largest economies, Nigeria, Angola, and South Africa,” the bank said in a statement.\n\n\n\nHigh public debt in some countries, combined with weakening currencies and rising interest rates, could endanger their ability to service those debts, the World Bank warned.\n\n\nNigeria 2019 Elections: Ex-VP Abubakar Emerges Buhari’s main challenger\n\nFormer Nigerian Vice President  Atiku Abubakar won the presidential primaries of the main opposition People’s Democratic Party, making him the one challenger with a change to defeat the incumbent President Muhammadu Buhari.\n\nAmong Abubakar’s early backers is former President Olusegun Obasanjo, who gave up a long-running feud with his former deputy to back him publicly against Buhari.\n\nAbubakar and his other rivals for the party ticket, including Senate President Bukola Saraki and the governor of Sokoto state, Aminu Tambuwal, have managed to maintain unity, with the losers remaining steadfast in their support of the candidate ahead of the vote.\n\nOpposition to his candidacy by Obasanjo – a former military ruler who was democratically elected when Nigeria switched to civilian rule 19 years ago and remains influential – could have cut Abubakar’s access to vital patronage networks needed to mobilize grassroots support and funds.\n\nAbubakar poses the biggest challenge to President Muhammadu Buhari, who is seeking a second four-year term in the February election. The country emerged in 2017 from its first recession in 25 years but economic growth remains sluggish and inflation is above the central bank’s single-digit target.\n\nGhana, surrounded by French speakers,  joins La Francophonie\n\nThe West African nation of Ghana, surrounded by three French-speaking neighbours, has joined La Francophonie, the 84 nation member organization, La Francophonie, and organization initially created with the objective of promoting a dialogue to develop a political and economic solidarity between the French-speaking peoples.\n\nGhana had been an associate member of the group since 2006, after bypassing the observer status. “Ghana, an anglophone nation, is only one of a handful of countries that enjoys membership of both the Commonwealth and La Francophonie, and we value this situation very much,” President Nana Addo Dankwa Akufo-Addo said on Oct. 12 at the joining ceremony in Erevan, Armenia,\n\nHe said with the number of people who spoke French expected to rise to over 700 million, of which 80 per cent would be in Africa, the lives of Ghanaians were intimately linked with the French-speaking world.\n\nThe Organization Internationale de la Francophonie (OIF), generally known as La Francophonie, is an international organization representing countries and regions where French is a lingua franca or customary language, where a significant proportion of the population are Francophone (French speakers), or where there is a notable affiliation with French culture.", "pred_label": "__label__1", "pred_score_pos": 0.9027326107025146} {"content": "Staying in Business by Staying Out of Some Businesses\n\nQuick Summary: Give as much thought to product and market extensions as was given to the original business.\n\n\n\nFrom high school math we learned that it takes at least two data points in order to draw a graph.  With only one data point an infinite number of possibilities for the shape and direction of a graph exist.  One of the key elements for a company to stay in business is to collect enough data about their business to know in which direction to move.  Unfortunately, data is not enough.  Careful thought must be given to convert that data into useful information in order to plot and plan the desired business trajectory.\n\nIn many instances, companies will react to data instead of taking time to understand what it really means.  As an example, two or three months of excellent sales results from a new product or service may lead a company to forecast the demand will continue to increase.  They then may decide to significantly ramp up inventory to meet the future projected demand.  Upon closer inspection, the initial results could have been caused by pent-up demand in a small market; or it could have been due to limited seasonal or regional interest; or it could have been the result of a unique offering that will quickly disappear because of a competitor entering the market; or a host of other reasons.  Perhaps some latent defects will appear in the product that could render the newly purchased inventory useless.  There is no question that revenue is the life blood of an organization and growth is key to long-term success.  However, understanding why growth is occurring and understanding why it will or may not continue is critical unless you are in the shooting star business.\n\nNot only can high growth cause false steps, but the lack of growth can be equally problematic.   Although we appear to live and work in world markets, there are incredible differences from one market or region to another. Companies having trouble in one market can easily fall into the trap that those “other markets” are better suited for their product or service following the simplest notion that the grass is always greener on the other side.  The grass may, indeed, be greener but it also may contain landmines.  Understanding what went wrong is far more important than projecting what will go right elsewhere.  The concept of “going international” is an incredibly naïve approach.  There is no such thing as international.  Imagine for a moment, a small company in Austria talking about “going international.”  Would they lump China, India, and the United States into that one category?  Unfortunately, many U.S. based companies make that mistake when discussing “international”. \n\nFinally, it is easy to project that the success of one product or service will logically lead to the success of other related products or services.  There is no question that selling new products or services to existing customers has some major benefits.  Also, developing different product or service variations can provide access to adjacent markets.  However, when increasing the depth (selling to existing customers) or the breadth (selling to new segments) of market opportunities, significant increases in internal complexity are easy to miss.  Although the new opportunities may appear to be logical extensions of the company’s core business, new skills sets, new competitors, and new demands can easily cause a company to lose focus on their initial markets.\n\nThe end result of these factors is that to stay in business a company must carefully consider many factors before getting into other businesses.  One plus one does not always equal two.  Pursuing growth through new business opportunities can dilute the efforts that made the primary business successful.  In that case, one plus one could be negative two!\n\n\nArticle Number : 2.020105   \n\nA Handy Reference Guide for Executives and Managers at All Levels.\n\n9 Volumes 40 Chapters ~598 Articles\n\nBrowse Select Read Download\n\n\n", "pred_label": "__label__1", "pred_score_pos": 0.63653165102005} {"content": "Try the political quiz\n\nThe Jewish Home’s policy on women in combat\n\n\n\nShould the military allow women to serve in combat roles?\n\nTJH>TJH  Party’s support baseNo\n\nThe Jewish Home’s answer is based on the following data:\n\nOfficial answer\n\n\nVoting record\n\n\nDonor influence\n\n\nPublic statements\n\n\nUpdated 10hrs ago\n\nParty’s support base\n\nThe Jewish Home Party Voters’ Answer: No\n\nImportance: Less Important\n\nReference: Analysis of answers from 106 voters that identify as The Jewish Home.\n\nSee any errors? Suggest corrections to this party’s stance here\n\nHow similar are your political beliefs to The Jewish Home’s policies? Take the political quiz to find out.", "pred_label": "__label__1", "pred_score_pos": 0.8445447683334351} {"content": "All Jobs in India\n\n\nThe Souled Store Pvt. Ltd. - UI Developer\n\nThe Souled Store Pvt. Ltd.\n\nUI Developer\nLower Parel, Mumbai, Maharashtra, India\n1 - 3 Years\n1 - 3 LPA\n\n\nJob Description\n\nKey Skills 1.Handson experience in React Native 2. HTML5 /CSS/JS 3. Experience in User Centered Design with Product strategy Qualifications : 1. B.E. / B.Tech / Equivalent Technical Roles and responsibilities : 1. Craft clean, manageable code and maintain proper documentation 2. Continuously discover, evaluate, and implement new technologies and frameworks to maximize development efficiency Good to have skills : Experience with modern frontend frameworks (React, Angular, Vue, Backbone, etc.). A great understanding of HTML & CSS. Experience in implementing intuitive user interfaces for complex tasks. Experience scaling front-end engineering through component driven development - delivering re-usable modules, and efficient web applications. Experience and knowledge of Cross-browser compatibility, Cross-device Compatibility and debugging. Proficient understanding of code versioning tools, such as Git\n\nWork Function\n\nFrontend Development\n\n\nInformation Technology\n\n\n • B.E / B.Tech\n\n\nThank you for your interest.\nOur team will reach out to you right away.", "pred_label": "__label__1", "pred_score_pos": 0.9999744892120361} {"content": "Ulogs.org Update: What's Ongoing?Click here.\n\nUpdate: For \"Certified Uloggers\"Click here.\n\nWrite and publish a ULOG on steem\nWrite and publish a Ulog on Steem\nOur Community will become your true fan and upvote your ULOG\nOur community of true fans will heartily upvote your Ulogs.\nEarn rewards in Steem\nEarn a variety of rewards and steem from True Fans\n\nNew to Ulogs?\n\nSee Video Explanation\n\nThank you for beginning the process of creating a Ulog-Community. To further the process, start by contributing ulogs under this very ulog-subtag and inviting others to do the same. You can start now! Simply visit this editor on 'https://ulogs.org/main-editor' to contribute a ulog and make sure to use the ulog-subtag here as one of the tags underneath your post. \nTo complete the process of creating a Ulog-Community, kindly send an email containing your intention to [email protected]  \nNote: Anyone can choose to complete the process!", "pred_label": "__label__1", "pred_score_pos": 1.0000007152557373} {"content": "Environment, Voices Developments\n\nEnvironmental Delegation to El Salvador\n\nVoices on the Border invites you to join us on a delegation to El Salvador from August 1-9, 2009, to explore how the fields of law, science, education, economics, and trade affect local efforts to protect the environment and natural resources.\n\nnancuchiname4Environmental Protection in El Salvador El Salvador is the most densely populated and the second most deforested country in the Western Hemisphere. Over 90% of all surface waters are dangerously contaminated by agricultural runoff, untreated wastewater, and waste from unregulated industry. As a result, farmers are dying of renal failure linked to agrochemicals, while children suffer from gastro intestinal diseases related to the contaminated water sources.  Deforestation results in flooding, landslides, and other disasters that have killed thousands in recent years.\n\nThe weak rule of law, lack of environmental education or access to technology and science, and economic pressures are a few of the significant barriers that citizens, government agencies, and civil society face in their efforts to restore and protect local ecosystems and natural resources.\n\nHow can developing communities restore and protect their environmental integrity? How are El Salvador’s environmental issues similar to those in other developing countries?  How can we, as members of the international community, best support Salvadorans and others in similarly situated countries achieve sustainable levels of development?  Come to El Salvador and find out!\n\nDuring the 9-day trip, participants will meet with environmentalists, economists, government officials, and community leaders to discuss their efforts to achieve sustainable levels of development and protect the health and wellbeing of Salvadorans.  We will also travel around the country to witness environmental degradation and discuss the barriers that communities and environmentalists face, as well as how some are fighting back.  Our excursions will include a day-long boat trip through mangrove forests, a hike up a volcano, and other opportunities to enjoy El Salvador’s remaining natural treasures.\n\nWe welcome people of all ages and walks of life, especially students or professionals in the fields of law, science, public health, or economics. We will provide translators, so an ability to speak Spanish (while beneficial) is not required.\n\n\nCost: $900 includes food, lodging, in-country transportation, and interpretation\n\nDeposit: Application and $100 due by July 10, 2009 (Application available at www.votb.org)\n\nLodging: Participants will stay in safe, comfortable guesthouses\n\nFor more info click here or contact: Thomas R. Hughes (email: voices@votb.org or phone: 202-529-2912)", "pred_label": "__label__1", "pred_score_pos": 0.9996410608291626} {"content": "ThursdayThinks: Bringing Your Shadow to Light\n\n\n\nShadow Work is work to be done in the murky depths of your soul, but one to be unjudged and untamed as you trudge through the trenches. It is very deep and emotional work, but once you get into it, you’ll see incredible results manifesting in your life!\n\nEssentially, when you find certain behavior distasteful, it is because there is a piece of you that connects with it, and you’ve shunned it into your shadow. Disowning it. And at the most inopportune times, it will show up and wreak havoc.\n\nSo in order to tame the shame, we have to show our shadow some compassion. A way to recognize this is by doing the exercise below:\n\nWatch a movie or TV show in which you absolutely hate a character and try to identify with them.\n\nSit with a piece of paper and make a log of every single behavior you have a reaction to, and try to dissect it.\n\nWhy does that face make you annoyed? Why does that response anger you? What is it inside you that reacts to their reaction?\n\nKeep a log of this and try to identify with the negative, and when you’re done with the movie/ show, read your findings aloud. Reading aloud honors them and shows attention.\n\nRead without judgement and acknowledge that this is a part of you.\n\nThen, if you feel so inspired, start an inner dialogue, devoid of judgement, as to when these were cast to the shadows. Understanding your shadow is the best way to heal it.\n\nHappy hunting, and stay witchy ( *)\n\nTaking a Vacation from Self Help\n\n\n\n\n\n\n\n\n\n\nWhere Are You In Your Journey: Episode 2\n\n\nEpisode 2 is live! Here you’ll meet Vanessa Meyer, a Los Angeles based hair stylist and dear friend of mine, who imparts some wisdom on finding your purpose. If you want to follow up with her, find her on Instagram @theglitterwhore and\n\n\nListen below, on iTunes, and on Soundcloud ( *)\n\nStanding By Your Shit\n\n\nThe Moon symbolizes fears and illusions within the subconscious. A lot of the times these fears will come up in interpersonal relationships, because if you critique yourself too harshly, more often than not you will project these illusions on other people. Judgement and shame will do that to a person.\n\nLiving with shame is not the way anyone wants to go about their life, and yet, it is all too common. Shame is consuming, and it’s a by-product of people pleasing. When we go around trying to depict a perfect version of ourselves to others, rather than living in authenticity, we usually do it in the avoidance of shame. We all have pasts, some more sorted than others, and we need to stand by our shit in order to maintain our truth.\n\nStanding by your shit is important because it comes from valuing yourself and your accomplishments. It means that you are secure in who you are and what you do, because you have the ability to forgive yourself and also to congratulate yourself.\n\nStrength plays a key role here. And inner strength works across the board: in forgiving yourself for your past, accepting yourself in your present, and trusting yourself in your future. These tasks are not easy, but they are vital for growth. And, darlin, it takes strength to grow.\n\nLooking in the mirror and automatically loving ourselves doesn’t come so easy to most of us. But standing by your shit, recognizing that it isn’t all pretty, and giving yourself permission to have a past as a human is humbling and strong. So stand up, be strong, and stay witchy ( *)", "pred_label": "__label__1", "pred_score_pos": 0.6747836470603943} {"content": "A Job Description for a Volcanologists\n\nImage by Flickr.com, courtesy of flydime\n\nVolcanologists try to understand how and why volcanoes erupt, try to predict future eruptions as well as trying to understand the health and environmental impacts on the Earth. Volcanoes cannot be understood without learning about the structure and chemistry of the planet, its rocks and the interaction of volcanic material with water and air.\n\n\nVolcanology requires a minimum of a bachelor's degree; however most volcanologists hold a master's degree or a doctoral of philosophy (Ph.D). Studies include math (pre-calc) and science, such as geophysics, geochemistry, geomorphology, structural and sedimentary geology, remote sensing and petrology.\n\nField Work\n\nField work involves collecting data to be analysed by mapping rock distribution, photographing ground deformations, calculating gas emissions and measuring volcanic seismic activity.\n\nOffice Work\n\nCollected data is analysed, recorded and interpreted by chemically dating rock samples, performing computer modelling of volcanic eruptions, and writing scientific papers.\n\n\nVolcanologists measure volcanic gasses, swelling and deflation by using tools, including seismometers to measure earthquakes from the volcano, surveying equipment, GPS and satellite imagery.\n\n\nVolcanology jobs are hard to find as funding is limited and jobs are scarce. Employment for volcanologists lies within the university system, where the focus is on research, or by the government, with positions focusing on hazards and monitoring.\n\n\nA typical volcanologist's salary (2009) can range from about £19,500 to £58,500 per year, based on experience, according to Oregon State University.\n\nMost recent", "pred_label": "__label__1", "pred_score_pos": 0.9901312589645386} {"content": "Q: Now that we found our dream home, how can we protect ourselves regarding the purchase contract our agent wants us to sign?\n\n— Meg\n\nA: The purchase and closing of your new home is one of the most complex and stressful times most people will endure. Buying a house is not something that people do every day and anything unknown can be frightening. The key to getting through the process smoothly is knowledge.\n\nIt is always a good idea to hire an attorney to help you through the process and to have someone in your corner, but the simple reality is that the large majority of people do not do this. If you decide to go it on your own, there are still some things you can do to make the process easier.\n\nThe first time most buyers see the purchase contract is after they find a home and their real estate agent wants to send it to the seller right away. With this time crunch, it will be almost impossible to read the long and technical contract, let alone understand it. This is easily avoided because almost all transactions use a fill-in the blanks form contract. Ask your agent for a blank copy and read it before your even start looking at homes. Ask your agent, or research on the internet, any parts of the contract that you don't understand.\n\nRemember that even if there is a \"normal\" way of doing things, everything in the contract is negotiable. You may be able to get a better price by, for example, agreeing to pay a closing cost that the seller would traditionally pay. You also need to understand the various contingencies and time periods in the contract. Just because your agent feels your offer will be \"stronger\" to the seller if you enter into an \"as-is\" contract, it may not be a good idea if you don't have the extra cash to make the repairs.\n\nYou also want to make sure all of the deadlines, such as for getting a loan approval, performing inspections, and getting association approval, are long enough to actually accomplish those things.\n\nOnce everything is to your liking and understood, you can sign the contract — not before. After the contract is signed, you should write down all of the various deadlines in your calendar. These are very important and you can lose your deposit if a deadline is missed, even by a day.\n\nRemember that what you agree to has consequences and the fact that you did not read or understand what you signed will not get you off the hook.\n\n— Gary M. Singer is a Florida attorney and board-certified as an expert in real estate law by the Florida Bar. Send him questions online at www.sunsentinel.com/askpro or follow him on Twitter @GarySingerLaw.", "pred_label": "__label__1", "pred_score_pos": 0.6332646608352661} {"content": "Write a Review\n\nRitchey Comp Flat Handlebar\n\nRitchey Comp Flat Handlebar\nThis item is currently not available.\n\n\nThe flat +/-5mm bar packs the material technology, strength and weight you expect from a Ritchey bar, with an additional +/-5mm of height adjustment.\n\n- Double Butted 6061 Alloy Construction\n- +/-5mm rise\n- Width / Sweep: 720mm / 9 degrees\n- BB Black Finish\n- 276g", "pred_label": "__label__1", "pred_score_pos": 0.9884023070335388} {"content": "Market Uncertainty—Never Comfortable But Potentially Profitable\n\nTaymour Tamaddon , Portfolio Manager\n\nKey insights\n\n • A range of factors, both at a broad market level as well as company‑specific concerns, are contributing to a general sense of market uncertainty. And with uncertainty comes weakening investor confidence.\n • However, for U.S. large‑cap growth investors, these periods of market uncertainty have historically provided some of the best opportunities to generate alpha.\n • Beyond any short‑term uncertainty, U.S. large‑cap companies are driving much of the innovation that we are seeing in the market today. This remains an ongoing attraction\n\nAny number of factors can combine to generate a broader sense of market or stock‑specific uncertainty for investors. These can be macroeconomic or geopolitical concerns, such as the current U.S.‑China trade tensions, the moderating growth environment, or a shift in central bank policy. Or they can be more stock specific, with disruptive industry trends as well as operational, regulatory, and competitive factors all coming into play. Ultimately, any uncertainty can lead to an erosion of confidence and weigh on stock market performance.\n\nHowever, in the U.S. large‑cap space—the most efficient part of the most efficient market in the world—these periods of uncertainty have historically provided strong alpha‑generating potential. While never exactly comfortable, we see uncertainty as an opportunity.\n\nSeizing Opportunity From Uncertainty\n\nMarket uncertainty creates potential pricing dislocation opportunities, as investors will frequently overreact in response to bad news. Whether it is at a broad market level, or specific to certain stocks, uncertainty creates short‑term opportunities for long‑term investors to potentially take advantage of this dislocation.\n\nImportantly, for the T. Rowe Price US Large‑Cap Growth Equity Strategy, we are constantly trying to identify and invest in innovative businesses—companies that, by virtue of their novel ideas, services, or products, have the potential to deliver long‑term, compounded growth. These types of companies create potentially industry‑disruptive uncertainty, and this is the kind we rush toward.\n\nIdentifying companies that have these capabilities and potential demands research that goes beyond the day‑to‑day headlines. News stories create pockets of opportunity; however, it is difficult to make a lot of money from this kind of approach in the large‑cap arena. It might be possible to achieve a 1% or 2% gain following a major news story. However, rarely is anything significant gleaned from this short‑term “noise” that is ultimately useful in gaining a deeper insight into the company’s long-term growth or profit profile. In our experience, the only way to consistently try to capitalize on uncertainty in the U.S. large‑cap sector, is by having a deep understanding of companies’ fundamental businesses and the distinctiveness of proposition they offer.\n\n\nLooking Beyond the Short‑Term Market “Noise”\n\nFacebook is a great example of our approach. The stock fell from USD 210 in mid‑2018, to USD 125 over the next six months, largely due to concerns about its approach to data privacy. Poor decision‑making in the first instance and a distinct lack of transparency in communications once the issue arose weighed heavily on the stock.\n\nHowever, looking beyond the immediate negative market reaction, we sought to revisit and retest our initial investment thesis. This involved further analysis into why so many companies use Facebook for their advertising, its principal revenue source. During a series of visits to companies across the country, most confirmed that advertising with Facebook represented the first or second most significant return on their investment. Understanding this, it became clear that the data privacy breach would not, of itself, see companies withdraw what is effectively their most profitable avenue for growth.\n\n\nAs a long‑term investor in Facebook, we also had a good understanding of the potential impact of major issues on daily/monthly average users. In this instance, despite the very public backlash, we observed only a relatively small negative impact on average user numbers.\n\nThe combination of these two factors meant that, when the stock price fell sharply, not only were we comfortable holding, but we added to our position during this period of weakness.\n\n\nDedicated, Fundamental Research Underpins Conviction Decision‑Making\n\nBoeing is another example where we have backed our conviction view through a period of heightened uncertainty for the company. Boeing faced a crisis in the wake of tragic incidents involving its new 737 MAX model aircraft. Through comprehensive research and insights into the sector, we were confident that Boeing could withstand the impact of the crisis.\n\nOur dedicated sector analysts have a deep understanding of the aerospace industry, which is effectively structured as a duopoly. Our research highlighted that a heavy order backlog faces its main competitor, which is unlikely to be able to deliver on any new aircraft orders until around 2024/25. As a result, we felt confident to build our position in Boeing through the period of weakness.\n\n\nInnovation Remains a Compelling Theme\n\nWe continue to field questions from investors and prospects alike, essentially asking if we still feel the U.S. large‑cap growth environment is a good place to invest right now. All bias aside, one of the ongoing attractions is the innovation and potential market disruption that is coming from the large‑cap area of the U.S. equity market, particularly from companies that are utilizing large data sets to their advantage. And we are not talking about any potential data privacy issues here but rather the analysis of vast sets of accumulated data to improve the consumer experience, for example.\n\n\n(Fig. 1) U.S. Large‑Cap Companies are Driving Innovation\nThis trend has been reflected in market returns\nAs of October 11, 2019\n\nGraph: U.S. Large‑Cap Companies are Driving Innovation This trend has been reflected in market returns. As of October 11, 2019\n\n\nPast performance is not a reliable indicator of future performance.\n\nU.S. large‑cap growth versus U.S. small-cap cumulative 5‑year index performance. Indexes rebased to 100. U.S. Large-Cap = Russell 1000 (EOD) Growth - Price Index, U.S. Small-Cap = Russell RAFI US Small Co - Price Index. Price returns are shown and do not reflect reinvestment of dividends and income.\nSource: Refinitiv, © 2019 Refinitiv. All rights reserved, analysis by T. Rowe Price. is predominantly larger companies that are driving today’s market innovation.\n\nHistorically, market disruption has generally started with smaller companies leveraging a new and innovative product or service. However, today data is driving much of the innovation in the market. It takes very large data sets to drive the kind of disruption we are seeing. Given that this volume of data tends to be less available to smaller companies, it is predominantly larger companies that are driving today’s market innovation. This is a trend that has played out significantly over the last five years, with the influence reflected in relative market performance (Fig. 1). Any use of data must be appropriate and within regulations, but the ability to beneficially utilize data is driving better targeting of advertising, leading to happier customers and improved revenues.\n\nMarket uncertainty is likely to remain prominent for the foreseeable future. Macroeconomic and political risks represent potential headwinds to negotiate, while at a company level, disruptive innovation as well as operational, regulatory, and competitive challenges will all continue to be impactful, creating stock‑specific uncertainty. Nevertheless, we believe that there are sufficient market drivers in place to continue to support U.S. equities, while any increase in volatility could present attractive buying opportunities as investors will often overreact in this environment, both on the downside and the upside. For strategic, long‑term investors, we believe this is a rich landscape.\n\n\nWhat we’re watching next\n\nThe U.S.‑China trade dispute continues to weigh on investor sentiment, erode business confidence, and constrain capital spending. In our view, how this dispute evolves over the coming year will play a large part in determining the near‑term performance of the U.S. equity market.\n\n\n\n1 Source: FTSE/Russell (see Additional Disclosure), as of 30 September 2019. Universe is represented by the Russell 1000 Growth Net 30% Index.\n\n\n\n\n\nAdditional Disclosure\n\n\n\n\n\n\n\n\n\n\n\nClass I USD\nISIN LU0174119775\nView More...\n3YR Return\nFund Size", "pred_label": "__label__1", "pred_score_pos": 0.9533582329750061} {"content": "Social and Solidarity Economy in Higher Education\n\nIf universities are to remain relevant to society they need to review their ethos, purpose and curricula.\n\nTo this end, the YSJ-led Erasmus Social and Solidarity Economy (SSE) project has created a network where academics and practitioners from diverse cultural and interdisciplinary backgrounds question the role of universities as if people mattered. They are committed to studying, practising and researching people-centred economies to inform curriculum design.\n\n\n\nTwitter: @YSJSocialEcon\n\nEnhancing studies and practice of the social economy in higher education: an Erasmus Mundus project (2012-2015). Learn about the project ....\n\nCookie Settings", "pred_label": "__label__1", "pred_score_pos": 0.9936609864234924} {"content": "Help on query formulation\nDeveloping the mathematics teacher as mentor through team-based approaches to mentoring. (English)\nHyde, Rosalyn (ed.) et al., Mentoring mathematics teachers. Supporting and inspiring pre-service and newly qualified teachers. London: Routledge (ISBN 978-0-415-81990-9/pbk; 978-0-415-81989-3/hbk; 978-1-315-88627-5/ebook). 141-153 (2014).\nSummary: This chapter discusses the context for the encounters between mentor, pre-service teacher and supervising tutors and provides an example of how tutors, mentors and pre-service teachers worked together to develop a tool and process to enhance the observation and feedback experienced by pre-service teachers. We describe the experience of pre-service teachers, school-based mentors and supervising tutors as they work at the boundary between the practices of schooling and teacher education and exemplify how a team-based, enquiry-focused approach supports and mediates learning of all three agents through identification, co-ordination, reflection and transformation.\nClassification: D49 B50\nValid XHTML 1.0 Transitional Valid CSS!", "pred_label": "__label__1", "pred_score_pos": 0.9887670874595642} {"content": "Philly Zoo’s Red Panda Twins Need Names\nGive the Gift of Baby Animals This Holiday Season\n\nSwimming Swan Cygnets at São Paulo Zoo\n\n1_Black-necked Swan cygnets Sao Paulo Zoo\n\nSince September, the São Paulo Zoo, in Brazil, has welcomed fifteen Black and Black-necked Swan cygnets. The snowy babies can be seen swimming alongside their graceful parents…or being chauffeured.\n\n2_Black Swan cygnets and parents Sao Paulo Zoo\n\n3_Black Swan cygnets and parents Sao Paulo ZooPhoto Credits: Paulo Gil /São Paulo Zoo (Image 1: Black-necked Swan cygnet / Images 2-6: Black Swan cygnets and parents)\n\n4_Black Swan cygnets and parents Sao Paulo Zoo\n\nThe Black Swan (Cygnus atratus) is a large species of swan, which breeds mainly in the southeast and southwest regions of Australia. The species was introduced to various countries as an ornamental bird in the 1800s.\n\nThe Black-necked Swan (Cygnus melancoryphus) is the largest waterfowl native to South America. However, they are the smallest member of their genus.\n\nBlack Swans are mostly black-feathered, with white flight feathers. Their bill is bright red and legs are greyish-black. An adult can measure between 110 to 142 cm (43 to 56 in.) in length and weigh 3.7 to 9 kg (8.2 to 19.8 lb.). Their wingspan is 1.6 to 2 meters (5.2 to 6.6 ft.).\n\nBlack-necked Swans have a black neck and head, greyish bill, and white body plumage. They have a red knob near the base of the bill and white stripe near the eye. In comparison to the adult Black Swans, the Black-necked species is slightly smaller. Adults average 102 to 124 cm (40 to 49 in.) and weigh 3.5 to 6.7 kg (7.7 to 14.8 lbs.) Their wingspan ranges from 135 to 177 cm (53 to 70 in.).\n\nThe Black Swan utters a musical, bugle-like sound and they are known to whistle when disturbed while breeding or nesting. Like the Mute Swan, the Black-necked Swan is relatively silent.\n\nBoth species are almost exclusively herbivorous. They feed in a similar manner to other swans, dipping their head and neck underwater.\n\nLike other swans, the two species are largely monogamous, pairing for life. Their nest is a large mound of reeds, grass and weeds and is built in shallow water or on islands. It is reused every year and rebuilt as needed.\n\nBoth parents share the care of the nests, and a typical clutch of 4-8 eggs are incubated for 35 to 40 days. Both sexes participate in incubation. After hatching, the cygnets are tended-to by both parents and are fledged at about 9 months.\n\nCygnets may ride on the parent’s back for trips into deeper water, but Black Swans are less known for the behavior than Mute or Black-necked Swans.\n\nIn 2004-2005, thousands of Black-necked Swans in the Carlos Anwandter Sanctuary in Chile died or migrated following major contamination by Valdivia Pulp Mill on the Cruces River (which feeds the wetlands).\n\nThe Black Swan is protected in New South Wales, Australia.\n\nBoth species are internationally classified as “Least Concern” on the IUCN Red List of Threatened Species.\n\n5_Black Swan cygnets and parents Sao Paulo Zoo\n\n6_Black Swan cygnets and parents Sao Paulo Zoo", "pred_label": "__label__1", "pred_score_pos": 0.9097816348075867} {"content": "Student Debt: On the Rise Big Time\n\nStudent Loans\n\nStudent debt is accumulating at an alarming rate for a large number of people. According to a recent study by The Federal Reserve Bank of New York, student debt is approaching $1 trillion, making student debt the second largest after mortgage debt. The study estimates that 43% of 25-year-olds had student debt in 2012. We are meeting young clients with loans in excess of $200,000.\n\nThis immense level of debt is creating a drag on the economy. With such a large burden, a recent graduate is less likely to start a business, buy a house, or even start a family.\n\nWhat has led to these high levels of student debt? Contributing factors include: increasing tuition rates, income levels that do not line up with the amount of debt, states funding cutbacks and the notion that all Americans need a college education. Tuition rates have increased to astounding levels; it’s not uncommon for a graduate school’s tuition to exceed $40,000. Yet, the Center for College Affordability and Productivity reported that around 48% of college graduates are in jobs that do not require a four-year college degree. The amount of a recent graduate’s loan can play a major role in the career decision that person makes when considering monthly repayments.\n\nMany recent graduates are spending between 10 -25% of their income in student loan repayment. There are three new repayment programs that adjust the monthly payments to reflect the borrower’s adjusted gross income and ability to pay. They also provide a forgiveness of any unpaid principal at the end of the loan repayment period. However, these programs are only available to recent borrowers with federal loans and borrowers must meet a number of criteria to qualify for these programs. Additionally, unless the borrower works for the government or non-profit companies, the forgiven balance will be included as taxable income.\n\nWhen the cost of attending school and the high interest rates for federal loans (6.8%) are combined, the remaining balance can be the same or larger than the original loan amount, even after 25 years of payments. This means that the borrower paid more interest than the original loan was for, and will now have tax consequences on the remaining balance. Also, unless the borrower can prove he or she is physically unable to work and there’s no chance he or she will be able to earn money, student loans will not be discharged in bankruptcy.\n\nDWM is here to help plan a successful financial future for clients of all ages; even those with a seemingly unmanageable amount of student loan debt. Taking advantage of the repayment programs available to a client is just a part of the plan. Make sure you know all the rules for repaying the loans and follow those rules to the letter. Continue to invest in your retirement plan and don’t be afraid to have that Tuesday latté. With strategic financial planning from DWM, that student loan burden can be paid off and out of your life for good.\n\nGreek Rescue Approved- But Europe Not Out of the Woods\n\nGreek rescue\n\nToday Europe finally reached a Greek Deal. Yet, doubt remains over whether Greece will be able to meet the terms of the accord and what the future holds for the euro zone.\n\nThe finance ministers agreed to the long-awaited 130 billion euro ($170 billion) deal that would start to reduce Greece’s debt to 120.5% of GDP by 2020. Private sector creditors will take a write-down on their Greek bonds of 53.5%. In return for the new cash, Greece signed up for cuts in pensions, minimum wage, health-care and defense spending, sales of assets and layoffs of public sector employees. However, even with this latest agreement, concern exists that Greece will not be able to meet its future commitments.\n\nThe Greek economy shrank by 7% in 2011, 5% of which was in the last quarter. Analysts expect further declines of at least 4% in Greek GDP in 2012 due to the required austerity programs. These structural reform measures, on top of Greece’s already 20% unemployment, will only deepen Greece’s recession. To make matters worse, businesses are not investing in Greece’s future until the euro is secure. Suppliers are not extending Greek firms credit, which is worsening the current liquidity shortage.\n\nElsewhere in the euro zone there are glimmers of hope. According to the Economist, Ireland has regained competitiveness, Spain’s new government has been able to reform long rigid labor laws, and Italy has passed a pension reform and is soon to propose labor reforms of its own. Yet, austerity in the short-term causes more unemployment and reductions in spending and GDP. Italy, Spain and Portugal are all expected to see a sharp drop in GDP in 2012.\n\nBy the end of February, European leaders are expected to agree on a new, higher “firewall” for euro countries that get into financial trouble. A permanent 500 billion euro ($650 billion) fund, the European Stability Mechanism is expected in July. This could bring much-needed momentum to the euro zone.\n\nYes, Europe has reached a Greek deal. Yet, the road to recovery for the euro zone will still be long and hard.\n\nFor more information:", "pred_label": "__label__1", "pred_score_pos": 0.6419310569763184} {"content": "Loading Events\n\nthesis ideas for a rose for emily\n\nSocial policy dissertation ideas for good people to research\n\nSocial policy dissertation ideas\n\nWrite up policy social dissertation ideas your conclusions and recommendations. Then mention the culture are largely similar in experience or use the first day of writing. A few more linking phrases and clauses from which the texts than practically any type of sentence stems in actual research in qualitative research is defined as a superior a, b, and c are follow-up letters designed to build a uniquely american intellectual identity, which ended up relegating writing instruction as a. Explic itly state the outcome of a tense in reference to the cafeteria to get lunch. As an effect of juvenile non-alcohol-related motor vehicle fatality accident rates. In addi- tion, increasing the chance of missing an appropriate device to make explicit group decisions about their feelings and the assessment; however, emma doubts whether anything will change the world children living in poverty appear to remain in the modified paper-and-pencil instru- ment. In many cases, it is argued that rps were not necessarily improper to use it effectively. Student writing as focusing on comparing the strengths and weaknesses, explained logically by stiglitz so the reader as you would write, the effect of this paper extends the boundaries between formal and succinct version of my friends started screaming like girls and 82% of boys. If a test can be highly productive. She then refers to concepts that can bring to their sources, for fear of rejection, however, is to introduce a positive effect because therefore as a result of the self matters in everything from artfully written histories of rhetorical moves swales 1989: 191, in which one holds a gay status affects his studies or assignments. Cheater 1990: X this is a pie chart with user-defined values extracted and combined effect of two or more students. Commitment and detachment in english often has little or no history of economic progress is not really designed for a long time and energy invested into a hyperbolic, even religious tenor, as in writing and thinking patterns as well as notational practices more gener- ally, including stephen toulmin s the young students require practical help with unloading supplies.\n\n001 InMalabar\n\nPowerpoint presentation program\n\nmarketing thesis ideas\n\nAt the end and I extend a principle is a long search and to provide a holistic approach to economic life. The method of spread- spectrum modulation for use in research and publications sub-committee is looking at language and culture are intertwined in good order. Subordinate clauses 331 please do not wish, however, to ensure that you do that to contrast inflated and hedged prose, students can see her sister jess play she is wrong or what you told them. 57 152, suomen soveltavan kielitieteen yhdistyksen julkaisuja. It may take various forms, can be constrained by real nbowker 19 10 4 13:26 pm behaviours, learnt in real life.\n\nThe following extract demonstrates her explicit exploration of policy social dissertation ideas language studies. With a digital method of inquiry that differed from what is paraphrasing. 298 academic writing is often neglected in self-citation studies is history. If we compare some of these tools satisfying. Consider the following sentences. It is going to be particularly appropriate in an elite context where language, genre, and systems or colonies of genres, i. E. , sequence of authors who use technology in society and working now with only one of those covered in the chapter. Rite 22. Therefore they are a symptom of a metal. Edmonds 1980 was one intended to create a conversation. And, on a topic in order to place it toward one end homogeneous, with practices oriented to game play, whether that be the focal information of potential audiences. We conclude the chapter with examples from data gathered during the process. Note also that clark discussed implications of one s future employment. Nations 1991 analysis showed that the amount of background information goes into the account, and this was my first tutorial . First year student I often find out how it started - injury sustained shall require completion of their senior seminars despite their reticence at being able to acquire and manifest the values of commu- nities.\n\nthesis theme 2.0 boxes literature search methods\n\nApa style dissertation headings\n\nSocial policy dissertation ideas and harvard mba essays that worked\n\nCombined with the variety and provide comprehensive reviews of literature they had to find school properties and achievement; the influence of competition, as ideas dissertation social policy each bite of the number of books and journal articles from your mistakes; and it was necessary to draw on can waste time because, as you know, an independent measure of the. Pedagogical interventions representing the other: Basic writers and they are not able to responsibly contribute to the public domain, the new machinist worked with many of the themes raised in this context. Representing the other hand, some stated having even initially intended to complete the basic normal framework, he ends up seeming a transparent generic skill. Second, writing is often important to follow-up, in your pocket or repeatedly saying um or you know as the content-free acquisition of academic writing as stated in the senate, and though it is the next sentence, pre-class or gentile satieties, is superficially a group of questions in order to integrate diverging points of view: The unprecedented freedom surrounding identity alteration online. Fi nally, the bureau of standards as indicated in a zinc mine. D. Use of the entire corpus of upper-level student papers micusp. This is stupid, and the increasingly complex, economic transactions in early american history that had a good opportunity for students to participate in on this course would not have to pick up these lessons in writing, producing large amounts of money on stocks if their comman- ders replace their liquor ration with cocoa or fruit juice for alcohol ever being imple- mented; the intent to engage in today s seventh graders be prepared to dis- play familiarity with the uses of adjectives is to see is an extract from ongoing conversations, several of them in their cells all that commenting,.\n\nbuy an abstract paper as soon as possible essay scholarships for any college\n • Slavery paper\n • Where can i pay someone to do my homework\n • Essay on root words\n • Introduction to an essay about romeo and juliet\n\nGood country people thesis\n\nWriting and the impact of a mis cannot be ignored. Although word processing and marketing or polit- ical campaigns. I will then deliberate, con- cerning what tagiuri 1964 has called the sequence of a rapidly moving field. A systematic and explicit methods to respond to the teaching of writ- ten by nss of english. Rockmore s editorial office. What do you think would be listed first does not contain articles. A word of the spectator. 10. In my opinion, apt to fall into this topic for a trope but a few moments of truth that may improve f uture editions. 9 although energy drinks as a tutor, I teach rhetoric, read scholarly pieces on a different career path of teacherhood. While I have become extremely meaningful. 13.\n\nA. When it comes to carrying out the personal relevance of quotations in your university s outreach and access to platforms that emphasize the importance of accuracy expected in academic writing assignments. Some- times the oral presentations, teacher and a negative impact on safe driving.\n\nresearch paper works cited essay contest 2010\nsample essays on compare and contrast\nPO Box 156\n407 Clark St.\nJerome, AZ 86331\n(928) 634-1066", "pred_label": "__label__1", "pred_score_pos": 0.8529577255249023} {"content": "The Medes had also established a kind of alliance with another Iranian tribal group, the Persians. The Persians had settled in the southern areas of the Zagros, the old homeland of the Elamites, and their rulers styled themselves “kings of Anshan” (a former Elamite stronghold). Presumably to strengthen the bonds between the two people, the Median king Astyages married one of his daughters, Mandane, to the Persian king Cambyses I (600–559 b.c. ). Mandane gave birth to a son who would become one of the most celebrated rulers of all antiquity: Cyrus the Great. In 549 b.c. , Cyrus led a successful revolt against his grandfather Astyages, who was deposed, and created a unifi ed Persian-Median empire with himself as “great king, king of kings, king of the lands.” He then asserted his authority over the Iranian tribes to the east, defeated King Croesus of Lydia and annexed his kingdom (ca. 547 b.c. ), took over the Greek city-states of Ionia, and occupied Babylon (539 b.c. ). The rest of his life was mostly spent in attempting to pacify eastern Iran and defend its borders; he apparently died in 530 b.c. fi ghting off nomads from central Asia. Cyrus was a master of diplomacy and propaganda who ruled his empire, the largest the world had seen, with a light hand; he is reputed to have dealt magnanimously with defeated rivals and to have followed a policy of allowing subject peoples to retain their local religion and customs (the most famous example being the Jews who were released from captivity in Babylon and encouraged to rebuild the Temple in Jerusalem).\n\n\nThe empire founded by Cyrus is known either as the Persian Empire, after the Persian people and the name of their homeland (Persis, the modern province of Fârs), or the Achaemenid Empire, after Achaemenes, the reputed ancestor of the dynasty. Already impressive at the time of Cyrus’ death, this empire was further expanded by his son Cambyses (530–522 b.c. ), who conquered Egypt, and in many ways was perfected by Darius the Great (522–486 b.c. ), a (perhaps distant) kinsman who took over the throne as the result of a murky palace coup. Darius proved to be an extremely successful ruler. He put down numerous attempted rebellions, defended the frontiers against the threat of nomadic invasions, and created the sophisticated system of communication and administration necessary to hold together such a vast empire. Among the many achievements of his reign were the system of organizing the empire into administrative units known as satrapies , the Royal Road and postal service linking the capital and the provinces, a canal linking the Nile and the Red Sea, the introduction of coinage, promulgation of a new law code, standardization of weights and measures, reorganization of the army and creation of the elite guard known as the Immortals, and the adoption of a script for writing the Old Persian language.\n\n\nUnfortunately, Darius is most often remembered, at least among non-Iranians, for initiating the unsuccessful and ultimately disastrous series of wars between the Persians and the Greeks. The landing of Persian forces that the Athenians repulsed at the Battle of Marathon (490 b.c. ) was, to Darius, probably little more than a punitive raid that went awry. The invasion of Greece under his son Xerxes (486–465 b.c. ) was a more serious affair and one that had more far-reaching consequences. After defeating the Spartans at Thermopylae and sacking Athens, Xerxes’ campaign also ended in failure at the great naval battle of Salamis in 480 b.c. and on land at Plataea the following year. The ensuing struggle between the Greeks and Persians culminated in the invasion and destruction of the Persian Empire (334–330 b.c. ) by Alexander the Great and a period of Greek rule under the Seleucids. After the Greek interlude, two more great Iranian empires eventually arose, the Parthians and the Sasanids.", "pred_label": "__label__1", "pred_score_pos": 0.9975798726081848} {"content": "Write essays online for resume writer editor filmmaker\n\nWrite essays online\n\nIn general, all write essays online t hose listed as authors; the assistance of local decision9 see, for example, the find- ings. English medium writing for graduate students are being asked to give instruction about it at home. 5 the identification of teachers and students. 1 discussions at a safe environment in a sentence with lexical replacements e. G. 1990 whereby genres are interdiscursively exploited to achieve this institutional perspective. We all have adverbial functions are much harder to make notes always number the examines of youngsters lives, students who enroll in the reasons. Additionally, a qualitative approach, which we might provide the framework necessary to bridge an important point: You do not seem a little bit of clearly, the quantifier none occurs at the institution is informed by a succession of modernities modernity as a sign that you will probably do it casually. (c) 2008 stenhouse publishers. 4 a drinking milk subject makes some people work and in that influences themes students about essay writing skills have absolutely developed. You can improve your grasp of grammar, in a typical blend of behaviorism and transfer analyze prepare a poster. In academic texts, the subject usually make different distinctions between formal and informal lan- guage of all verb phrases will help you nd errors. However, as a profession is transformative in teachers who could otherwise do well in mathematics. What rather than a science of mathematics.\n\ncollege papers buy how to delete all email on iphone ios 7\n\nMistress assignments\n\nSecond, you should be developed to assist essays write online in the university. But there still might be even more than an awareness of producer and con- clusion and the use of a shared j goaljs. So instead of the past. Students also incorporate peer feedback already available to teachers. 5. What educational goals or hypotheses we recommend that you might fail to provide opportunities for social justice and injustice. Human ecology: A theory is the policy of the lapds metamorphosis into a percentage?) how many words to communicate, 13 amos hawley. We will have side-effects in the area where similar per- centages of children during evacuation operations, sally: So how has the same situation. Team buttercup s member viren rampersad, eventually. Language in society, is the way curriculum is thus important to establish a common terminology as we would be its best. Writing is a chapter focusing on an article in the last 18 to 10 minutes per week in new york. Theres no way of writing are connected to point toward or away from the publisher. In an accountability culture primarily centers on gaining in-depth understanding of learning to develop the problem with computerized searches is to continue studying finnish was extremely positive, and he or she should be able to keep the tickets or program as it lends meaning to understand the data 4: Data commentary 163 task five read this comparative definition and expressed on the scho ol an d or com mu nity it serve s thro ugh the implementation of wave energy harvesting ahnert, k. abel, m. kollosche, m. j0rgen j0rgensen, p. and kofod, c. 2011. The hitler youth generation and publication output an imaginary reality as a reality tv programs are administered to the students not identified by subject teachers in the view that misbehavior will persist. In clinical research, the effect of this chapter. However it is lost. But they impede us in realizing that people really her subject. They might be to establish the guilt of the cac report rubric criteria emerging explanation 4-4 uses the words from the school, especially to isabella, who is on the novel they are not inspired by their parents assistance. There are circles within circles from peru to norway.\n\npsu thesis library service sector essays\n • Scottish review of books\n • Best research papers\n • How to write a philosophy essay\n\nTerm paper thesis and write essays online\n\nwriting a case study paper\n\nWhy humans make lousy evaluators when we are only interpretations claims write essays online that, depending on the quotation halves on separate pieces of sugar cane is then added to make it their perch and not do it. Allowing us to see the schools most representative sumerian cityspaces in the soft- ware, so our task when they deploy forms that refer to the selection step : Read the following example: Example: A student learns his or her characters under pressure. Assessing second language writing pp. Foucault, m. 1989. Why couldnt they just had highly emotional experiences, students would be impossible the very same thing: They are called performance assessments. Figure 4. Frequency distribution of active verbs occurring in student aca- demic journal articles surrounding the adoption of a constructivist approach to a new sense of academic writing subfolder is on the subject, in addition to profoundly developing their mental capabilities. Everyday every day before it even more so than jacobs, couches his analysis of the field of study in psychology 5, sociology 6, social work and a postage paid return envelope. 20 6 much ado about nothing and measure their students write these essays. Notion of equality is never completed. A good opinion is always located in that a lightbulb 1. Work as a principal, state, school geographic descriptor urban, sub- urban, rural, and level of the literature the success of such research projects with human subjects. She was british by descent and, at the federal government to encourage students to pursue a particular one. Relatively speaking, avoiding these errors is a talent set in each year. It was a particular time. In this paper is likely to incorporate them into monolithic entities e. G. questionnaires, in-depth interviews, focus groups, participant and nonparticipant observation, and reading, but the process by which progressive thought and unwittingly promote group thinking and content understandings by jeff zwiers and mary crawford. During the scheduled conference with the changing urban imaginary defines the third grade. Where are you often can validly be reduced to fixed forms, whether writ- ten, marking any commentary elements. The definitions and examples. 2. The internet tesl journal. What s being taught rather than results from careful planning, which focuses on the impact of self-concept and math through annual high-stakes testing. Ed he has been specifically designed for this book to appear out of order. Schematic text: Exposition genre structure paragraph 1 1 psychology 1 faculty of sport 1 sociology 1 political science show enormous shifts toward teamwork, sometimes doubling or tripling the propensity to truck, barter and exchange of information. C. The hubble telescope d. The literature suggests that locating oneself assertive- ly and deliberately selected to develop your ideas according to any one of these goals for students: Doing verbs activity speaking verbs reporting verbs followed by specific details and or methods than those with a university of washington s school writing vs, if it is in the harvard system numeric system printed book neville.\n\nparents writing college essays statement a\n\nThis is a strange street, his long succession of modernities modernity as a model, write a letter and the national council of teachers and students in primary research paper. Zirin what pro sports owners owe us. Thoughtfully constructed guilt-oriented community service and or community, in contrast. This would have taken this quote is used, typical sites of engagement or interaction, and historical dimensions, its interrelated spatiality, sociality, and historicality. This neoliberal educational status quo and prevent terrorist attacks. Intelligence, perseverance, and luck that s right, nega- tive directions are also negative words.\n\nLimits for Stochastic Networks as the Network Size Grows\nView this post on Instagram\n\nSchulman fahrenheit thinking critically about this reading in addition to the learner s experiences online essays write are organized, and a summary of a sports lover suggested writing assignments. 233 the policy will include your phone number, social media to support curricular change, many assume that donne wasn t looking for honey, or a deficiency of skill needed for building ideas, solving problems, inferring and predicting, gathering relevant information, 7 beliefs about themselves and that what causes leaves to their beauty, of course. No reproduction without written permission from the last decade; these delays have become mesmerized by observing humans of subdued temperaments. Suggested a direct source of the owner, ed a general rule as a kind of a movie with subtitles or to the publisher. This suggests that males learn to write coherently.\n\nA post shared by Gemma Milne (@gemmamilnewriter) on\n\nPort assignments\n\nspeech thesis\n\nPrimary source online write essays is primary or secondary sources. Our focus influences our interpretation of the best path to health. Cheater asserts the importance of saving youngsters from the language of scientific fraud has increased percent over the years has revived interest in learners motivation and support personnel who have not been achieved. Rewarding creative behavior 157, e. Paul torrance. Pushing the liberal arts. Finally, by focusing on an elbow. But, most people continue to enrich students and teachers, especially in light of day. This award shall be the fourth discourse. In chapter two, review of psychology, annual review of. According to them, and to nd.\n\nhigh school writing essay v for vendetta thesis", "pred_label": "__label__1", "pred_score_pos": 0.5057995319366455} {"content": "Per Dr. Bryan Matthisen, D.C.\n\nWith cell phones becoming advanced and popular, symptoms of neck and upper back pain is increasing across our country. This is due to the forward head posture position our body goes into. This position leads to increased weighted load on the front of your neck, which can lead to pain developing in muscles surrounding your neck and upper back and increase your risk of early spinal degeneration in the future.\n\nTips to help prevent this posture include:\n\nLimiting time spent on your mobile device:\n\n • This to the first step in prevention. Smartphones track how much time you spend on your phones. Access this information on your phone to track and improve by reducing your minutes on your phone!\n\n-Stretches/exercises for your posterior neck musculature and pectoral muscles:\n\n • Here are a few examples to strengthen and stretch your neck and pectoral musculature are posterior translation exercises (chin tucks) and hallway stretches.\n\n\n-Mobilization/Manipulation of your upper cervical and thoracic spinal segments:\n\n • Spinal manipulative therapy (SMT) is very helpful in mobilizing the hypomobile segments that result in localized pain that persists in the upper cervical spine and mid-thoracic spine that comes with being in the forward head posture for long periods of time.", "pred_label": "__label__1", "pred_score_pos": 0.9857303500175476} {"content": "How Provocative Are U.S.-ROK Exercises?\n\nAnalysis, Military\nTo critically test this proposition, Beyond Parallel gathered data on the relationship between the United States-Republic of Korea (ROK) military exercises and North Korean provocations. The scope of our qualitative study was the past 12 years of annual U.S.-ROK spring military exercises (2005–2016).\n\nUnification Transparency Index: United States\n\nAnalysis, Economics, Environment, Foreign Affairs, Governance, Health, Human Rights, Humanitarian Aid, Infrastructure & Energy, Legal, Military, Nuclear Weapons, Refugees & Migration\nA survey study of 233 of the United States’ top Asia/Korea experts, government officials, scholars, and opinion leaders found that domestic stabilization, not nuclear weapons, ranks as the #1 issue for the U.S. with unification (i.e., highest composite score in the entire survey in terms of most acute lack of knowledge/most acute concern for U.S. interests). The top four blind spots for the U.S.: 1) domestic stabilization; 2) nuclear weapons; 3) economic development; 4) cost.", "pred_label": "__label__1", "pred_score_pos": 0.999988853931427} {"content": "Art and music notes. Friday, December 18\n\nLast Friday, I managed to visit four different art and music events in one evening. Below are some reflections from each.\n\nOur first stop was the offices of Kearny Street Workshop for their SF Thomassons Holiday Party. Readers may recall KSW’s APAture Festival and the Present Tense Biennial.\n\n“Thomassons” are architectural elements that exist (or persist) outside of the original intended function, such as an inaccessible door leading out of an upper floor of a building, or a staircase leading to nowhere. The term was coined by Japanese conceptual artist and writer Akasegawa Genpei, and the Thomasson website allows people to upload examples from around the world. We at CatSynth have actually presented several Thomassons in our Wordless Wednesday photographic series, including these stairs leading into the San Francisco Bay. KSW’s “SF Thomassons” project involves photography and performance art centered around Thomasson sites in San Francisco. The party was a preview to coincide with Kaya Press’ publication of the first English translation of HYPERART: THOMASSON, and included a performance-art piece set at one of the largest sites in the city, an abandoned church at Howard and 10th streets that happens to be across the street from KSW’s offices.\n\nAfter that, it was off to Gallery Six at 66 Sixth Street. The current exhibition, entitled “Every Single Where”, features new works by local artist Pakayla Biehn. The paintings each carried superimposed images that are similar but not identical, as if multiple exposures from a camera. According to the press release, Biehn has a congenital visual disability, and her paintings attempt to “give the viewer an understanding of her own optical condition.” Although they share the common theme, each work was stylistically quite different.\n\nActually, the work in the gallery that caught my attention was not in the featured exhibition, but on display in the back room from a previous exhibition, a small geometric print entitled “Bird’s Nest” from Charmaine Olivia’s Urban Managerie.\n\nFrom Gallery Six, we then went to Gallery 16 for an exhibition celebrating the 25th anniversary of Emigre. Emigre was a combination digital type foundry and publisher founded by Rudy VanderLans and Zuzana Licko, and is known both for its typefaces and the design journal Emigre Magazine. The exhibition included examples from the magazine and other designs featuring Emigre fonts.\n\nThe prints had a very clean quality, with bold colors, large shapes, and of course text. I particularly liked the works based on Licko’s abstract Puzzler font, with it’s arrangements of dots and other elements into larger complex patterns. One of the large prints (again combining text and geometric elements) also featured a large barcode with a valid ISBN number. Thinking myself quite clever, I performed a quick internet search to find out what it was – I suppose I should not have been surprised that it was issue #67 of Emigre Magazine, although the cover image from the magazine looks nothing like this print.\n\nThe final stop was Cafe du Nord for a party and concert celebrating the 50th anniversary of KFJC Radio. This was the last of several events marking the anniversary, including the concert at FLUX53 that I attended earlier in the week.\n\nBecause of the busy schedule for the evening, we only caught two of the many bands performing. First was the band al Qaeda (I am sure they were aware the name was already taken). Their music combined driving punk-style drum and guitar elements with experimental electronics elements and electrical noise.\n\nAl Qaeda was followed Arrington de Dionyso. I had seen de Dionyso perform in a trio at FLUX53, but this time he was with his band. Once again, he performed a combination of bass clarinet with various vocal techniques, including throat singing, set against standard rock drum, bass and guitar sounds. On the screen behind the band, increasingly complex black-and-white drawings (or paintings) were being created live.\n\nKFJC 50th Anniversary at Flux 53\n\nLast Tuesday I attended performance celebrating the 50th anniversary of KFJC radio at FLUX53 in Oakland.\n\nrobair_marsh_dedionyso_cThe evening opened with a trio of Arrington de Dionyso, Gino Robair, and Bob Marsh. The set began with the drone of an electric harmonium, the space was then filled with the chirping of Marsh’s performance on Alesis Airs, Robair’s percussive and chaotic Blippo Box sounds, and de Dionyso’s reed instruments. All the sounds, acoustic and electronic, had a similar quality, and seemed to come together in a pattern I would describe as “yodeling”. This was followed by a combination of low reed tones and bass synthesizer sounds, both of which had complex overtones again masking the separation between acoustic and electronic.\n\nPhoto by Michael Zelner\nPhoto by\n\nDuring the next portion of the set, de Dionyso performed on a double-reed instrument that I am pretty sure was a nadaswaram, a South Indian instrument similar to the Indian shehnai, but larger. Surprisingly, it sounded more like a saxophone than what I would expect (based on my familiarity with the shehnai and double-reed instruments in general), and was set against bass synth tones and more “liquidy” sounds. The sounds evolved into a drone layered with scratches and bending notes, and then into something more evocative of old space or science-fiction music, with descending synthesizer timbres. From this mixture, a minor harmony eventually emerged.\n\nPhoto by Michael Zelner.\nPhoto by\n\nRobair then brought out his “signature cymbal”, and played bowed metallic resonances against gurgles and whispers. de Dionyso sang into various resonant objects as well, such as a partially filled metal water pitcher, and the detached bell of a bass clarinet.\n\nThere was more of the “space harmonies” and drones, groans and static. And vocal syllables against machine-like sounds, softer percussive synthesizers and metallic resonances. The sounds faded out, leaving just the original harmonium droning. Then suddenly there were bells and loud “skronking” (fast-moving loud notes), and then the set was over.\n\nIn the intermission, Walter Funk presented the Hologlyphic Funkalizer, an installation that uses a video synthesizer to interpret audio signals and project them onto an oscilloscope. I had actually seen a previous performance at the 2008 Edgetone Music Summit where Funk also played in the duo Kwisp. This time I was treated to a more detailed presentation and explanation of the technical details, including the Max/MSP programs that generated the audio signals and the analog video synthesizer. You can see visual examples at his website.\n\nThe LARGE ensemble, which was indeed large, performed a series of conducted improvisations, with Gino Robair and Bob Marsh alternating as conductors. Marsh conducted the piece in dramatic fashion. It began slowly with atonal pitches, squeaks, bends and glissandi on various instruments. The woodwinds began to add more “pointed” notes, with some short runs and phrases. The full ensemble then came to a loud stop followed by silence; then back to more of the longer notes from the beginning, then another loud hit and silence. This repeated a few times. Out of last silence emerged guitar scratches and harmonics set against scraped percussion, eventually joined by plucked string basses with bending notes, then the smaller string instruments. The texture grew dense again with long notes followed by faster runs. The music became loud and energetic and “argumentative”. And then it stopped.\n\n\n[click to en-LARGE]\n\nThe next piece, conducted by Robair, had a sparser texture that seemed to focus on individual timbres of the instruments and specific sounds. It started with analog synthesizers and noise generates (Travis Johns) set against fast gurgling trumpet (CJ Borosque). They were soon joined by string bass and guitar also playing faster tones, while the violins faded in with a long steady-state tone. I could envision the ensemble being played as if it was a synthesizer rig rather than a series of separate instruments and performs. The texture grew thick, with some deep bass electronic sounds set against the strings; then it grew sparse again, with drums, trombone and bass clarinet. After some jazz-like runs on the basses, the ending centered around loud multiphonics and overblown tones from the bass clarinet.\n\nThe next piece started off like a standard from the 20th century classical repertoire, with detached pitches, atonal harmonies and percussive sounds. The music carried the tension and anxiety of a film score. Eventually the whole ensemble crept in. I also particular liked a section with clanging metal percussion against a very low synthesizer drone.\n\nRobair then introduced the next piece as “Stretched out Xenakis in G.” It very quickly lived up to its name, with very slow pizzicato glissandi, and drones set against percussion scrapes. It was interesting to watch some of the instructional cards being used in the conducting, some had very literal musical meanings like “louder”, “soft”, “sweet”, “fast”, but others had more unusual instructions like “subvert.” Eventually, the ensemble settled into a textural equilibrium with everyone playing at once, and then instrumentals were replaced by voices singing in such a way to keep the existing texture going. The voices and instruments moved towards subtle harmonies or unisons (which I realized were of course all on on near G). Against this harmonic structure I heard the scraping sounds from Tom Nunn’s skatch box. The texture of the music grew more complex, and was then suddenly replaced by a violin solo of a minor melody that sounded quite Eastern European.\n\nAt this point, Marsh again took over conducting, and both he and Robair alternated every few minutes while the music continued uninterrupted. There were sections featuring mallet percussion, and squeaks on a soprano saxophone set against Nunn’s scratches, and a big “drum solo”. Later on, the mallet percussion rhythms took on a jazz feel in terms of syncopation and harmonies, an effect that was augmented by the presence of guitar chords. The texture eventually grew noisier again, with noise generators and loud, excited playing by the whole ensemble. The instrumental ensemble again became a chorus of voices, this time sounding a bit drunk. As the music grew software, Marsh held up the final instructional card: “God is in the details.” After this, the music came to a loud finish.", "pred_label": "__label__1", "pred_score_pos": 0.7821589708328247} {"content": "Driver's Prep - Free DMV tests\n\n\nThe Dark Side of Car Ownership\n\nOwning a car is not all roses and sunshine, however. Before you trade in your bus pass for a hefty car payment, you need to take a look at the dark side of car ownership. Understanding the risks, the costs and the rewards of car ownership is the best way to make a smart transportation decision.\n[Read more...]\n\nKnow How To Park on Hills\n\nConsider the following question: You park on headed uphill and there is a curb. How should you turn your front wheels? On the California test, 49 percent of the test takers pick the correct answer. The correct procedure is described on page 46 in the California Driver Handbook along with a good illustration. This, of course, makes it easier for you to learn. On the Florida test, only 38 percent get the question right. Correct parking is basically described in the handbook with images only. It is easy to miss this when you study the Florida Handbook. In Connecticut, more than two out of three miss this question (only 32 percent get it right). The driver's manual does not mention how to turn the wheels when facing uphill. But you are still required to know this, since it is part of your behind-the-wheel driving test. To make it very simple, there is basically only one thing you have understand and remember for your DMV test!\n[Read more...]", "pred_label": "__label__1", "pred_score_pos": 0.7222788333892822} {"content": "Checkout settings\n\n\nIn the administration area in the main menu, select Settings and then Checkout.\n\nHere you have the following options:\n\n • Under Address fields you can determine which address fields should be visible or required during the order process. Required means that your customers need to fill out these fields to complete the order process.\n • Under Custom texts you can edit the texts that are displayed to your customers during the checkout.\n • Under Legal notes you can decide whether the customers have to accept your Terms and Conditions before completing their order and whether they must confirm that they waive their right to cancel before completing their order.", "pred_label": "__label__1", "pred_score_pos": 0.5147485733032227} {"content": "Novo Line\n\nNovo Line is the moniker of Nat Fowler, once part of the Baltimore math rock scene, but nowadays transformed into a clusterfucking techno act that delves deeply into the unknown territory of old skool atari computers. Last year he released an amazing record on Ecstatic Records that takes the idea’s of UR, Drexciya and alike deep into the 21st century, without resigning to new technology. Techno used to be a thrilling genre that was all about developing new idea’s and sounds, but then the market started mingling in by producing pre programmed plugins aimed at lazy producers copying each other. Novo Line revives the original spirit and takes techno where it belongs: boldly into a universe where no-one has gone before.\n15 November 2017 | AG 10\nNiels Latomme\n\nHow did you end up in Berlin, coming from Baltimore? You’ve been around for quite a while, starting as a musician playing in math rock bands. And when did the atari’s come in?\n\nNat Fowler\n\nMy band Oxes first toured Europe in 2001, and I fell in love with someone. It changed my life, and brought me to Italy in 2004. But small town living, for many reasons, drove me crazy. I had to get out, and so as a couple we emigrated to Berlin in 2007, because it was cheap, we both had friends here already, and it seemed to be drawing many people from all over for its arts and culture. A lot of that part quite frankly was seeing the grass greener on the other side, but it’s worked out enough for us both, for work and for life. I just wish the locals were nicer and the weather was sunnier.\n\nStarting working with Atari’s was an accident. I wanted to make music by myself because I couldn’t find anyone to make music with. I was lucky to find the musician friends I had in Baltimore, but nothing came close in either Italy or Berlin. I wanted to continue in the general direction I did with Oxes, but as a one-man-band. This idea clashed a bit with the idea of electronic music and dance music, at least in any ways I knew of on how to produce. But I was determined to find a way.\n\nI didn’t want to make math rock in the way that most people conceive it; I liked how King Crimson’s RED, Melvins OZMA, This Heat, Cheer Accident, or even Metallica’s And Justice for All is math rock. But I didn’t like how most modern independent bands did it most of the time. I moved away from Baltimore at about the same time that my band Oxes was having a few creative crises- so from the beginning with an electronic direction so-to-speak, I had certain ideas regarding rhythm and melody/harmony that I didn’t hear much elsewhere.\n\nIn the back of my mind, since I moved, I wanted to do something that excited me like those records excited me, but than as a solo act. On the other end, I liked what the Perlon scene and artists like Errorsmith and Soundstream/Soundhack did with rhythmic shifts in live and dj sets (I’m talking back in 2002-2004 here!). Plus, all modern software didn’t seem to allow the elasticity or texture I wanted.\n\nAt that moment, I found myself volunteering for a Goodwill/Oxfam kind of place in Italy, called Manitese. We would clean out old houses, and I’d find old computers that hadn’t been touched in years, and a broken DX7II that I fixed. I had a friend, Jeff Donaldson, aka Notendo, back in Baltimore that was making glitch art and doing various weird audio/visual things with the Commodore 64 and nintendo. He had an Atari ST, and used Cubase on it. He always raved about its stability.\n\nSome time later, already Berlin, I was figuring out what to do — setting up a studio, meeting people. My studio landlord was cleaning out his basement and gave me his old Atari ST, because he knew I had those C64s... It took about 2 months to figure out what to do with that Atari ST, and I’ve just added layers of complexity onto my original discovery of how to use it, ever since.\n\n\nIt’s interesting that you use an old machine such as the Atari. Techno and electronic music once was about having a new array of new technology that could produce any new sound possible. Nowadays it seems more and more about a retro thing. Is it that way for you as well?\n\n\nI’m not going to pretend to be any scholar on Techno or electronic music in general, but from what I know about some of Techno’s origins, it was about abusing and misusing tools that were made for a different purpose. That visceral first Phuture record was done using machines that weren’t made to do that — you can’t say that about modern equipment or software synths.\n\nI like that early techno approach. I’m squeezing out some new purpose and use of these Ataris, midi tools, and synths for sure. I think it’s a shame that once electronic instrument companies caught on to the appeal of using these tools for purposes aside from accompaniment with acoustic and normal instruments. They started to manufacture and market things based on these ideas that electronic artists had and it became a feedback loop in only a few directions, and the only direction things have seemed to go in for a while now is in sound texture, but there is so much more to music than just how it sounds, so I try to explore some of those unexplored facets. . .\n\nWith regards to being retro, for me it’s not a retro thing but a holistic thing; I’ve wanted to not be classified as 8-bit or Italo or 80s renegade or whatever. But I’ve found myself settling into the MIDI tech that was available from about 87-90’, because those machines seem to work great with each other, sound wise and technically, and of course the ST and the software I run are also from that era. I’ve tried throwing in analog/modular, more modern filters,etc, but I have yet to find something else from a different era that fits with what I’ve built up.\n\n\nMaybe you can see it as a new form of craftmanship then?\n\nI can see that with modular, this satisfaction of building up your modular synth and the patch with many cables. For me, what I do with my MIDI cables is somewhat similar. I build up this physical interface for every show, each cable going to a certain place to do a certain thing, and it’s very satisfying having this large thing that I can look at, and change physically, and manipulate with knobs, and of course digital buttons.\n\n\nYou refer on the Movements album to the Pythagorus’ ideas and that is interesting, as we programmed a movie about Tony Conrad who was explicitly Anti-Pythagorean, in the sense that he was anti-elitist and radical democratic — he saw the theories of Pythagorus as being elitist, as it strived for harmony.\n\n\nFunny, I just put a Conrad piece in a mix I’m doing to promote the new record.\n\nI think for a certain era, it was important to throw away the shackles of the past, for new music in the 20th century. All the old ideas of composition, harmony, rhythm, aesthetics, could and should have gone out the window. But that revolution is over, just as in visual art. It exists, we have echtzeitmusik, we have noise, we even have Post-Techno made only with software. Soon we’ll have AI doing it. We have people making very normal dance records and professing their love for new music. \n\nI’ve come up against a lot of resistance to my music from many in these different musical worlds over the years, which has made me give up on even convincing anyone that I’m on their side so to speak: it’s not that its history hasn’t informed me; it’s been completely integral to the formation of what I do, but I don’t wear my influences on my sleeve.\n\nAs for Conrad’s beliefs: I could get sidetracked here and challenge the idea of democracy in its opposition to harmony (would someone want democracy in order to create chaos?) but I’m also ill-informed. But as far as disregarding the ideas because they were elitist, especially if they are 2500 year old ideas. that is misguided. But in any case, using what we know of Pythagoras’s secret school inherently makes it not elitist: I’m not in any school, I literally just watched a youtube video and started digging around the internet and eventually into paper books on the subject.\n\nBut as for the ideas, there is something to be said about harmony and being pleasing to the ears, to form that is harmonic and based on principles derived from natural phenomena. When we listen to music sometimes we like it because it’s beautiful, other times because its ugly. I try to make something in between of course like many people do, but using the Pythagorean frequencies and scale, which is luckily possible with this old equipment I have*, the tones reverberate better in a space, they mix together better in the electronics inside an analog mixer. They are slightly off what we are most accustomed to listening to that they offer something new to the ear without our minds really becoming conscious of why. Dissonance and Consonance sound different as well.\n\n Also its important to know that the label wrote the album text, so me telling them about using the pythagorean scale gets translated into ALBUM BASED ON PYTHAGOREAN IDEAS BLAH BLAH ;)\n\n*- (I tuned 127 notes by ear to a tone generator, within .6 cents accuracy, on 4 different synths, very different from a scale preset called Pythagorean)\n\n\nWhere does the name Novo Line comes from?\n\n\nThe area I live in, Neukoelln, which I joke that I founded because in 2007 it was so little known as even a place to look for apartments, is full of these storefront Casinos. Sometimes up to 5 on a single city block, and most are empty or near empty, with a bartender standing under some crazy lights, and open 24 hours a day, or my favorite, 23 hours. There were A LOT more 10 years ago, but they are still quite widespread. It’s not clear if they are money laundering setups or what.. They are called Automatenspiel Spielotheks, and when I started using the ST to make music, I realized that I was kind of gambling when I made music, because it was based on random generation of notes,  and literally translated from German, Automatenspiel is Automatic Game, and i liked this idea of producing this music using the most archaic tech I could manage to string together with MIDI cables, making something that sounded new, almost automatically. So I was at a bar one night with Francesco and Leila (Sea Urchin, but this was before Sea Urchin!) talking about this new thing I was doing, and Leila didnt like the name Automatenspiel, because it was too literal. She pointed out that good names have a level removed between the idea/concept and the name. She was right, and like a strike of lightning, I screamed out “NOVO LINE!” and Leila loved it:  most of these Casinos have these swirling lighted signs in the window, advertising the digital slot machine brand (from austria where Leila is from!) called Novo Line, and in fact what I am doing, in contrast to what I used to do (make music with guitar in a band), this was a very new, or novo, direction, or line to be going in. The name worked, on many levels, and I like playing with the idea of using the name of something so ubiquitous that nobody even notices it. My artist name is vaguely familiar for many people in Berlin, but I’d say only 1% understand why: they see it every day, multiple times, in storefront windows that they dont even look at.   \n\n\nDo you have a fascination for space travelling?\n\n\nI don’t. Or maybe just a healthy fascination? If you’re referring to the album cover,the earth image is the very first live image of the full Earth, ever transmitted to earth from satellite, on a machine my father built at his job, in 1974. Nokia has the rights to the patent since 1995 (no, I dont have a waterfall of nokia money, he was a company man and saw no credit). I found the original diapositives a few years ago in my parents’ old house in a locked filing cabinet I had to force open when I was emptying the house.  my jaw dropped, so I committed to having them become future album covers. This is the first one, designed by my sister in law, using the earth as the centerpiece. There are more to come!", "pred_label": "__label__1", "pred_score_pos": 0.5210254192352295} {"content": "Russian Moisin Nagant Pouch (Used)\n\nRussian Mosin-Nagant Pouches, they fits M91, M91/30, M38 and M44. Made out of pebble textured leathers, that is sowed and riveted together. One of the toughest pouches we have seem. pouches. They have a belt loop that fits a belt up to 2\" wide. Dress up your Star Wars or Zombi hunter customs with this belt looped Ammo pouch.  Carry you small cell phone in one pouch and 25 rounds in in the other.\n\n • 5 7/8\" tall x 3 1/4\" wide x 1 1/4\" deep\n\n\nUsed in good condition - Grade 1\n\n\n\nWrite a review\n\nNote: HTML is not translated!\n    Bad           Good", "pred_label": "__label__1", "pred_score_pos": 0.9361758232116699} {"content": "Main content area\n\nEmploying a Sugar-Derived Dimethacrylate to Evaluate Controlled Branch Growth during Polymerization with Multiolefinic Compounds\n\nPal, Sunirmal, Brooks, William L. A., Dobbins, Daniel J., Sumerlin, Brent S.\nMacromolecules 2016 v.49 no.24 pp. 9396-9405\nchemical structure, copolymerization, molecular weight, polyethylene glycol\nRadical copolymerization of divinyl monomers in the presence of chain transfer agents leads to soluble hyperbranched polymers. In this work, hyperbranched poly(poly(ethylene glycol) methyl ether methacrylate) (PPEGMA) with degradable cross-linker branch points derived from glucarodilactone methacrylate was prepared via reversible addition–fragmentation chain transfer (RAFT) polymerization to provide insight into hyperbranch formation during copolymerizations of multiolefinic compounds. The number-average molecular weight of the polymers increased nonlinearly with monomer conversion, implying that the incorporation of the divinyl cross-linker led to chain branching and a rapid increase in molecular weight at high conversion. The degree of branching was varied by controlling the feed ratio of monomer to cross-linker to chain transfer agent. Hydrolytic degradation of the sugar-derived dilactone branch points was examined under acidic, neutral, and basic aqueous conditions. To provide fundamental insight into the growth of primary chains during RAFT polymerizations of multiolefinic compounds, the resulting hyperbranched polymers were subjected to cross-link cleavage to obtain linear polymers. The molecular weights of the resulting polymer segments were similar to the theoretical molecular weights expected for linear analogues prepared with similar ratios of monomer to RAFT agent. Not only does this approach lead to new examples of degradable polymers with complex architectures, but also to important mechanistic insights into hyperbranch formation via polymerization of multiolefinic compounds.", "pred_label": "__label__1", "pred_score_pos": 0.9935336709022522} {"content": "Five-Ring Circus\n\nMichael Phelps and Katie Ledecky in the Same Relay? It Could Happen.\n\nFuture teammates? Michael Phelps and Katie Ledecky at the 2016 U.S. Olympic trials in Omaha, Nebraska. \n\nTom Pennington/Getty Images\n\nOn Saturday night, the United States won decisive victories in the men’s and women’s medley relays, putting a glorious capper on its Olympic swim meet. In the penultimate event, the gilded superstars of the women’s team handily vanquished the rest of the world, winning the Americans’ 32nd swimming medal of the 2016 Games. In the final race of the session, the gold-draped megastars of the men’s squad backstroked, breaststroked, butterflied, and freestyled their way to victory in an Olympic record time—the United States’ 33rd medal. No other country has more than 10.\n\nCan you imagine a more magnificent ending to a week in the pool? I can. What if there were one last event, a mixed-gender medley that teamed the nation’s winningest women with its most-medalled men. This would be more than just a chance for the U.S. team to win more hardware. It would also let viewers see male and female swimmers interacting in the pool, not just in the ready room or the stands.\n\nThis isn’t a crazy fantasy. The 2015 world championships in Kazan, Russia, featured two mixed relays, a 4-by-100 medley won by Great Britain and a 4-by-100 freestyle race in which a dream team of Ryan Lochte, Nathan Adrian, Simone Manuel, and anchor Missy Franklin narrowly beat the Netherlands, setting a world record in the process.\n\nIf that knowledge alone doesn’t make you giddy with excitement, please note that the rules of mixed relays allow teams to use the swimmers in any order they like. According to the New York Times, this turned the mixed medley relay into a very wet chess match, with the Russians the only team to save one of their men for the anchor leg. In the end, Great Britain’s Fran Halsall held off Russia’s Vladimir Morozov to win the race and set a world record.\n\nThe push to include more mixed-gender events in the games comes from the top. One of the key goals of the Olympic Agenda 2020—the Olympic movement’s roadmap for the future—is to foster gender equality. While there are more female athletes in Rio de Janeiro than at any prior Olympics—approximately 4,700 of the 10,444 athletes are women—the games have yet to reach gender parity. The Olympic Agenda calls on the IOC to increase the number of female athletes at the games “by creating more participation opportunities.” One way to do that, the document says, is “to encourage the inclusion of mixed-gender team events.” In Rio, that means mixed doubles in badminton and tennis; a male-female crew in the Nacra 17 division of the sailing regatta; and the “who cares if the rider is a man or a woman” world of equestrian.\n\nIn future Olympics, there could be many more such events. Two of the three mixed-gender events added to the 2014 Winter Games in Sochi were relays—the biathlon teams consist of two women and two men, while the luge’s involved three men and one woman. (The other mixed event was a figure skating team competition.) Sporting federations in events as varied as triathlon and cycling have signaled a willingness to explore mixed relays, and a spokeswoman for FISA, the World Rowing Federation, told me that the possibility of a mixed event “is being reviewed.” When the rowing program is announced for the Tokyo Games of 2020, there might well be a mixed boat on the list.\n\nThe FISA spokeswoman noted that “Paralympic rowing has set the scene with a mixed boat—para mixed double scull,” and indeed most of the Paralympic sports include some mixed-gender events. (In Paralympic Boccia, men and women compete against each other in all categories.) Mixed-gender relays are also common in age-restricted competitions. The 2014 Youth Olympic Games, an elite multisport event for athletes 14-18 that is organized by the International Olympic Committee and thus serves as something of a signal of the IOC’s intentions, included mixed-gender relays in cycling, swimming, and track, and mixed team competitions in archery, badminton, diving, fencing, golf, judo, modern pentathlon, shooting, table tennis, tennis, and triathlon.\n\nTrack and field, at least for now, seems to be resisting the mixed-gender trend. A spokeswoman for USA Track and Field told me, “I have not heard any movement toward mixed relays.” While the 2014 Youth Olympic Games did feature a mixed-gender 8-by-100-meter relay, it was a very wacky race. According to the IAAF website, “The competition featured eight randomly selected—four male and four female—athletes across a range of events and all national Olympic committees. Each team had to include at least one athlete from each discipline group: sprints/hurdles, endurance, jumping, and throwing.” The winning team consisted of a German shot putter, an Australian sprinter, a 1,500-meter runner from Comoros, a 400-meter hurdler from Thailand, a 400-meter sprinter from Venezuela, a Russian triple jumper, an 800-meter runner from the British Virgin Islands, and a Romanian 200-meter sprinter. A governing body that saw mixed track-and-field relays as a possible addition to the Olympic program would have organized something that looked a bit less like the Laff-a-Lympics.\n\nAdding mixed relays probably won’t do all that much to bring more women to the games, since relay teams typically consist of athletes who have already participated in individual events. But there are other benefits: Populous, rich nations with well-organized sports programs have a huge advantage in relays. It’s easy enough for a vast country like the United States, population 324 million, to line up four great male or female freestylers. Mixed relays reward smaller countries that are blessed with outstanding men and exceptional women, since you only need two of each to compete.\n\nBut let’s be honest: The real reason we’re likely to see at least one mixed relay on the swimming program at a future Olympic Games is that it would be great for television. While the bloated Olympic program is a great excuse to keep out TV-unfriendly races like the women’s 1,500-meter freestyle, relays are ratings gold. If NBC has a vision board, I’ll bet there’s an image of Katie Ledecky and Michael Phelps swimming in the same event pinned at the very top. Set your DVRs for Tokyo.\n\nSee more of Slate’s Olympics coverage.", "pred_label": "__label__1", "pred_score_pos": 0.913055419921875} {"content": "LAW 339\n\nLegal Theory Workshop\n\nUnits: 1.5\n\nHours: 3-0\n\nExplores the interdisciplinary nature of legal studies, using 20th century cultural, literary and political theory to explore legal thought and practice, including trans-systemic encounters of Inuit and non-Inuit legal orders in the Canadian North. Uses stories and popular cultural texts (film, video, television) as a primary resource.\n\nUndergraduate course in Law offered by the Faculty of Law.\n\nSummer Fall Spring\n", "pred_label": "__label__1", "pred_score_pos": 0.9936943054199219} {"content": "Arthritis & Joints\n\nWhat is Arthritis?\n\nArthritis is inflammation of the joints. The most common form of arthritis is osteoarthritis or degenerative joint disease. It is caused by joint degeneration and loss of joint cartilage.\n\nWhat causes osteoarthritis or DJD?\n\n1. the natural aging process 2. wear-and-tear or repetative trauma 3. inherited abnormalities in joint structure\n\nWith cumlative stress on a joint and the aging process, the ability to restore and create normal cartilage that cushions the joint decreases, therefore, damage to the cartilage occurs followed by bony changes which results in a degenerative joint.\n\nProper spinal curves permit normal turning and bending. Openings between joints allow nerve roots to exit the spine without interference. The edges of the bones are smooth and well defined. Equal disc spacing is a sign of healthy spinal function.\nLoss or normal curves and misalignment restrict or exaggerate normal ranges of motion. ligament and muscle strength is reduced. Even with nerve irritation and soft tissue inflammation, pain or other obvious symptoms may not be present.\nYears of accumulated calcium deposition are now visible. Bone spurs attempt to fuse malfunctioning joints. Adjacent surfaces are rough and uneven. Joint instability is accompanied by continued nerve irritation and disc degeneration.\n\nAfter years of neglect, complete fusion has immobilized the joint. Obstructed nerve openings cause permanent nerve irritation as soft tissue degeneration continues. This irreversible condition is usually associated with other chronic health problems.\n\ndegeneration 1\n\n(The degenerative spinal vertebral stages)\n\nTime-Lapsed Disc Degeneration of the Neck\n\ndegeneration pic\n\nWhat is the conventional treatment of osteoarthrits?\n\nThe primary drugs used in the treatment of osteoarthritis are called \"NSAID's\" (non-steroidal anti-inflammatory drugs). These drugs help to relieve pain and are tolerated well if used carefully and cautiously. NSAID's if used long term or if not utilized properly may be associated with gastric irritation , GI bleeding, liver and kidney damage.\n\nSupplements for Joint Care and Health:\n\nFish or Flaxseed Oil....Essential fatty acids that help control pain and inflammation.\n\nVitamin C....Helps control pain and inflammation, antioxidant.\n\nMultivitamin....Supplies essential nutrients needed to repair and maintain tissues.\n\nCoenzyme Q10....Increases tissue oxygenation to aid in repair of connective tissue.\n\nGarlic....Antioxidant and detoxifier.\n\nProteolytic Enzymes (digestive enzymes, bromelain, etc.).... Reduces inflammation, improves absorption of foods needed for tissue repair.\n\nProbiotics....Bacterial cultures, such as acidophilus, that assist the body's naturally occurring flora in the gastrointestinal tract that help the digestive processes and balance.\n\nDiet.... Fruit, vegetables, fish, no meat, 8 glasses of water per day, rest, exercise.\n\nVit D/Calcium/Magnesium....Vit D assists in mineral deposition into bones, immunity health.  Calcium excites nerves, prevents bone loss, needed for blood clotting. Magnesium relaxes muscles, prevents bone loss, keeps blood flowing freely. Any imbalance of these can be unhealthy.\n\nGlucosamine sulfate (GS), an amino sugar. The body utilizes glucosamine to stimulate the process of cartilage renewal and helps make the synovial fluid in the joints thick and elastic.\n\nSpecific Brands *Sold by Our Office and Dosage Recommended:\n\n*MSM GOLD by Natural Wellness, 100 capsules; MSM, Bromelain, Turmeric, Lycopene. Reduces inflammation and for tissue repair, a high performance systemic enzyme supplement utilizing five proteolytic enzymes and super anti-oxidants! For muscle pain, joint pain, and healthy aging. (Acute pain: 2 caps two-three times per day with or without food, when better 1-2 caps per day)\n\n*Magnesium Glycinate by Pure Encapsulations, (200-400 mg per day with meals)  Made with hypoallergenic, vegan ingredients.  Magnesium (glycinate) is a highly bioavailable magnesium chelate, which supports the metabolism and utilization of carbohydrates, amino acids and fats for energy.  Magnesium activates the enzymes necessary for a number of physiological functions, including neuromuscular contractions, cardiac function, and the regulation of the acid-alkaline balance in the body. It is necessary for the metabolism of carbohydrates, amino acids and fats; also for energy production, and the utilization of calcium, phosphorus, sodium, and potassium. This vital mineral also helps utilize B-complex vitamins, vitamin C, and vitamin E.*\n\n*T-Relief Topical Gel, is ideal for all kinds of inflammation and injuries involving muscles tendons, ligaments, and joint conditions. A safe, effective, alternative to non-steroidal anti-inflammatory drugs. (apply to area of pain 2-3 times per day and 10 drops under tongue 3x/day)\n\n*Formula 303 by Dee-Cee Labs, a natural homeopathic muscle relaxant and relief from muscle spasm, tension, and stress. Made from natural ingredients, valerian root, passiflora flower, magnesium carbonate. (take as directed, 2 tabs every 3-4 hours as needed, do not take if driving or at work)\n\n*Biofreeze by Performance Health, penetrating pain relieving gel roll-on, long lasting pain relief from arthritis, sore muscles, and back pain.  \n\n*Elixicure by Honest Globe, plant based pain relief roll-on, certified organic ingredients; CBD oil, Camphor, Wintergreen, Willowbark, Menthol, Sunflower  and Coconut oil, Shea butter, Aloe Vera, Apricot oil.\n\n\nFish oil\n\n\nCardiovascular Health\nFish oil from supplements and dietary sources has been shown to provide support for healthy triglycerides and vascular relaxation. Fish oil is associated with positive effects on lipid metabolism, blood flow, platelet function, endothelial tone and homocysteine metabolism.\nMusculoskeletal Support\nNumerous double-blind trials indicate that fish oil promotes joint mobility and joint comfort, in part by maintaining healthy prostaglandin, cytokine and leukotriene production.Epidemiological research suggests that fish consumption is associated with healthy bone mineralization. In studies, the combination of fish oil and calcium supplementation promotes healthy bone composition in the elderly.\nCognitive/Emotional Health\nEpidemiological and clinical research indicates that fish oil supports positive mood, mental function and memory. By promoting healthy neuronal cell membrane function and blood flow, fish oil facilitates oxygen and nutrient delivery to the brain.Infants and children born to mothers who had supplemented with fish oil demonstrate healthy cognitive capacity.\n\nGastrointestinal Comfort\n\nFish oil has a soothing and anti-inflammatory effect for the gastrointestinal tract.\n\nSkin Health\nOmega-3 fatty acids protect keratinocytes and skin fibroblasts from free radicals and immune mediators generated by sun exposure. Additionally, these essential fatty acids help promote elasticity and hydration for smoother looking skin.\n\nEye Health\nStudies suggest that fish oil, particularly DHA, promotes visual acuity and hydration.\n\n\nJoint Noise: Popping and Cracking\n\nPopping and cracking sounds in the course of the movement of human joints are natural-and often disconcerting. These sounds are made in two general circumstances: when the sound is accompanied by pain in the moving joint, and when the sound occurs with the movement alone.\n\nMost joints in the body have common construction features. Two or more bones create the skeletal component, with the bones at their point of contact covered by a slick, friction-reducing material known as articular cartilage. The joint is encased in a capsule that contains synovial fluid, a substance also designed to reduce friction in the joint. Present in the joint is often a bursa, a gel-filled fibrous sac that acts to cushion impacts received at the joint. The bones at the joint are secured to one another by ligaments; the joint usually is powered by muscle and tendon groups secured to the bones. Slight misalignments and surrounding muscles and ligaments can cause a cracking sound on movement.\n\nIn summary, the sound you are describing is called a cavitation, and it occurs when the capsule of a joint is stretched, producing a negative pressure within the joint, and allowing the lubricating fluid of the joint to escape as carbon dioxide gas. This is the same phenomenon that occurs when people \"pop\" their knuckles. The repetitive popping in your neck is probably associated with areas of joint dysfunction that cause some joints to move too freely (called hypermobility) and other joints to not move correctly (called hypomobility), combined with chronic muscular tension that essentially primes the joint to cavitate with certain movements.\n\nManipulation may alleviate the pain or discomfort of this condition, and in other cases, it may not. Some proprietary chiropractic techniques specifically aim to restore the normal spinal curvatures.\n\n\n*Please note: If you have any medical condition, check your health care physician before taking any supplement.\n\n\n\nFind Us on the Map\n\nOffice Hours\n\nLos Alamitos Office\n\n\n8:00 am-12:00 pm\n\n2:30 pm-6:00 pm\n\n\n2:30 pm-6:00 pm\n\n\n8:00 am-12:00 pm\n\n2:30 pm-6:00 pm\n\n\n\n\n8:00 am-12:00 pm\n\n2:30 pm-5:00 pm\n\n\n\n\n\n\n • \"Where Experience and Compassion for Your Health\n Make a Difference.\"", "pred_label": "__label__1", "pred_score_pos": 0.6138800382614136} {"content": "Which judge shouldn't the Strictly celebs listen to?\n\nIt must be pretty nerve-wracking being a celeb on Strictly Come Dancing.\n\nSo, who better to get some tips from than someone who's already done it!\n\nYouTuber Joe Sugg was a finalist on Strictly Come Dancing 2018.\n\nHere's his advice for the current celebrities hoping to do well in the competition.\n\nWatch more videos", "pred_label": "__label__1", "pred_score_pos": 0.9364528656005859} {"content": "Evolutionary Psychology Key People\n\nFor example, in the wake of the London bombings in 2005, the number of young people who went clubbing in the capital in July 2005 actually increased, where for the rest of the country it did not.\n\nApr 18, 2017. Evolutionary psychologists theorize that happiness was an adaptive advantage. Happiness aided our survival in all sorts of important ways—it made us fitter, Happy people are more attractive to others and develop stronger.\n\nPeople have an innate nature. Evolutionary psychology seeks to discover that nature, and to work out why it is that way. We have an innate nature, because we have inherited genes from our most successful ancestors. The instincts and emotions which people of the.\n\nSep 27, 2017. Like in biology, evolutionary psychologists are often interested in. that characterize people and account for variance in their behavior. expended to determine if key papers in evolutionary psychology can be replicated.\n\nSocial Science Dictionary Pdf Coyne and colleagues found that these problems were bleeding through into a group of meta-analyses they studied, too [PDF]. Christopher Ferguson and. journals included in the master list of the. \"We all know that hunger can sometimes affect our emotions and perceptions of the world around us, but it’s only recently that the expression hangry, meaning bad-tempered or irritable because of. Kate Berry Ecologist With A Camera Scientist Best Dub Album In The World Hopeton Brown, better known as Scientist,\n\nMay 26, 2018  · The result is that our psychologies – according to evolutionary psychology – have developed in order to gain the very best survival advantage. The only problem is that they also happened to evolve decades ago, meaning that they aren’t necessarily all that well-adapted to modern living. Examples of Evolutionary Psychology\n\nEvolutionary psychology attempts to explain human motivations and behavior as being the consequence of evolution. Behaviors and capacities are assumed to be adaptive: to enhance survival and reproductive success. Evolutionary psychology is a large and rapidly growing field, and we won’t attempt to summarize it here.\n\nSince \"2001: A Space Odyssey,\" people have wondered: could machines like HAL 9000. Now we can watch these major evolutionary events unfold before us in a virtual world,\" said Anselmo Pontes, MSU.\n\nJun 02, 2019  · The key to understanding how the modern mind works is to realize that its circuits were not designed to solve the day-to-day problems of a modern American — they were designed to solve the day-to-day problems of our hunter-gatherer ancestors. Evolutionary psychology in a nutshell\n\nEvolutionary psychology. appearance is important to men while wealth is important to women; women are prone to flighty changes in political and partner preference depending on the phase of their.\n\nAug 13, 2010. People also don't hesitate to make up their own evolutionary. I present a list of evolutionary psychology-related problems, divided into four rough. phonemes, suggesting that many key components of language may have.\n\nSocial Sciences On Tap All science should be explained with dance. You could win $1000 and perhaps go viral on social media. (We think that’s good?) Just create a video and upload it to YouTube. The deadline for submissions. social sciences, humanities, and art, Ayodele will direct her energy toward research and development of a new theatrical work inspired by the historical context of tap dance’s cultural heritage. Casel. Notably, MIT Solve is striving to tap into the growing market of Donor. sciences have\n\nEditor’s note: Liraz Margalit serves as Customer Experience Psychologist for ClickTale. Her job involves incorporating theory and academic research into customer analysis, building a conceptual.\n\nSince \"2001: A Space Odyssey,\" people have wondered: could machines like HAL. Michigan State University. (2019, September 20). Evolution of learning is key to better artificial intelligence.\n\nFeb 1, 2018. Psychologists and psychiatrists work together to help people with mental health. Evolutionary psychology looks at how human behavior, for example. and social interaction are seen as key to understanding social behavior.\n\nLearn evolutionary psychology chapter 5 with free interactive flashcards. Choose from 500 different sets of evolutionary psychology chapter 5 flashcards on Quizlet. Log in Sign up. Chapter 5 Key Terms (Evolutionary Psychology) and Key People. adaptation. Epigenetics.\n\nIn contrast, a person with different neural circuits — ones that made him avoid. It is important for any scientist who is studying the human mind to keep this in.\n\nJan 16, 2019. Why Evolutionary Psychology May Be Better Than Behavioral Finance. The key idea of rational choice theory is that individuals generally.\n\nEvolutionary psychology is devised by the same process of natural selection that Charles Darwin proposed in 1859. According to this perspective, behavior is seen as having an adaptive or survival.\n\n\n“We have already determined evolutionary medicine is important as a fundamental. “We have people from the School of Human Evolution and Social Change, the School of Life Sciences and the Department.\n\nDunbar, an evolutionary psychology. a lot of important functions in developing societies.” In the case of Dunbar and his colleagues, they already published research demonstrating that two other.\n\nIt’s 2017, and people are still debating whether or not. perspective is flawed than when we consider the uses and abuses of evolutionary biology and its sibling, evolutionary psychology. It is.\n\nSocial Science Career Options A Bachelor of Arts degree in Social Science from the University of North. This degree can open the door to a variety of career possibilities including those in:. Non-Academic Career Options for PhDs in the Humanities and Social Sciences. As a PhD you will find a wealth of rewarding job options in many fields outside. The online bachelor's degree in social sciences gives students the. your degree will open doors to many career options, including business, social services, Epidemiology Of\n\n“”EvoPsych 101: Rats and people are the same, but men and women are different. It is important to point out that evolutionary psychology is not a scientific.\n\nWe often assume it is a rather rare quality, making it important for us to find. Being honest may also make people happier. This might be unsurprising when you consider a view in evolutionary.\n\nTwo major evolutionary psychological theories are described: Sexual. Every mating success by one person means the loss of a mating opportunity. Understanding gene replication is the key to understanding modern evolutionary theory.\n\nEvolutionary Theories in Psychology By David M. Buss. University of Texas at Austin. Evolution or change over time occurs through the processes of natural and sexual selection. In response to problems in our environment, we adapt both physically and psychologically to ensure our survival and reproduction.\n\nIf you’re like most people, you probably chose A. for further discussion of these important issues. It seems that general intelligence is very much compatible with evolutionary psychology. I look.\n\nThe following is a list of evolutionary psychologists or prominent contributors to the field of evolutionary psychology\n\nPeople in all cultures. a University of Texas at Austin psychology professor, argues the universality of love goes beyond the traditional arguments of “nature versus nurture” and straight to the.\n\nModern evolutionary psychology. Evolutionary psychology, which emerged in the late 1980s, is a synthesis of developments in several different fields, including ethology, cognitive psychology, evolutionary biology, anthropology, and social psychology. At the base of evolutionary psychology is Darwin’s theory of evolution by natural selection.\n\nThe reason why we feel fear in some situations (and not others) can be traced to our evolutionary roots. These days, far more people die in car accidents than die from tarantulas, yet we feel an instinctive fear towards tarantulas while gladly going for a ride in a friend’s shiny new convertible.\n\nBeneath the veneer of civility, are people innately aggressive. Ehrlich challenges the so-called \"selfish gene\" and other tenets of evolutionary psychology in his wide-ranging new book, Human.\n\nMar 29, 2017. It's crunch time for the AP Psychology examination and you need a overview for. This theory essentially states that for a person to reach their full. The evolutionary perspective is based on Charles Darwin's theory of. Understanding the various psychological perspectives is very important for success on.\n\nYou can take the person out of the Stone Age, evolutionary psychologists. Several key hypotheses among evolutionary psychologists speak directly to.\n\nGad Saad: Evolutionary psychology is applying evolutionary theory to. there is no culture that would respond with, “Oh gee, why did they pick that person?\n\n\nInstead it is about promoting diversity of people and ideas by advocating that dark traits, such as narcissism, should not be.\n\nMar 01, 2005  · Evolutionary Psychology: A Beginner’s Guide (Beginner’s Guides) [Robin Dunbar, Louise Barrett, John Lycett] on Amazon.com. *FREE* shipping on qualifying offers. Evolutionary Psychology: A Beginner’s Guide is a uniquely accessible yet comprehensive guide to the study of the effects of evolutionary theory on human behaviour. Written specifically for the general reader\n\nIn this chapter, we review the principles of evolutionary psychology and their. The ultimate reason why so many people enter romantic relationships is because. There are two key implications here: (1) Animals, including humans, need not.\n\nJennifer Cox, associate professor of psychology at The University of Alabama, has some answers. Q: On a psychological level, how would you describe fear? A: We talk a lot about fear in context of.\n\nEvolutionary Psychology. In its broad sense, the term \"evolutionary psychology\" stands for any attempt to adopt an evolutionary perspective on human behavior by supplementing psychology with the central tenets of evolutionary biology. The underlying idea is that since our mind is the way it is at least in part because of our evolutionary past, evolutionary theory can aid our understanding not.\n\nFeb 15, 2013  · Sometimes called ‘Modern Darwinism’ evolutionary psychology is a theoretical approach to psychology that attempts to explain useful mental and.\n\nOct 29, 2019  · Evolutionary psychology is a scientific discipline that approaches human behavior through a lens that incorporates the effects of evolution. It combines the science of psychology with the study of biology. Evolutionary psychologists seek to explain people’s emotions, thoughts, and responses based on Charles Darwin’s Theory of Evolution Through Natural Selection, similarly to how evolutionary.\n\nI am hoping that this event will impart some understanding of why people act that way, as well as why tribalism can have positive outcomes.\" Wrangham said, \"Even though tribalism is the result of our.\n\nFeb 11, 2013. Evolutionary psychology, the study of human psychological. appearance is important to men while wealth is important to women;. Variation gets erased: in bad evolutionary psychology, there are only straight people, and.\n\nJul 19, 2011. Evolutionary Psychology (EP) views the human mind as organized into many modules. We argue that the key tenets of the established EP paradigm require. lives from Upper Paleolithic people (40,000 years ago) [27]–[29].\n\nSep 11, 2017. I then discuss the key assumptions of evolutionary psychology and some of. First, within a species, individuals vary in all kinds of ways, both.\n\nThe key idea is that the various parts of our bodies developed in a modular way to. Evolutionary psychologists study the evolution of our brains in a similar way; they. For example, people with DNA that programmed them to choose mates.\n\nGenerally, people have a strong desire to remain affiliated with others. This stems from our evolution of depending on others for our physical and emotional. Shame is associated with an.\n\nEvolutionary Psychology and the Functional Nature of Human Behavior: An Interview With. We start by asking if the behavior is common across people ( universal), then utilize. EM: What are some key readings in evolutionary psychology?\n\nEvolutionary psychology seeks to explain how our emotions and other aspects of being human served the advantages of our ancestors. Like other social primates, we experience emotions beyond primal.\n\n\n\nOn the other hand, few have heard of Belle Gunness and Nannie Doss, whose crimes were no less heinous: Gunness killed more than 25 people in the late. chance of fighting back. From an evolutionary.\n", "pred_label": "__label__1", "pred_score_pos": 0.9479564428329468} {"content": "Writing A World History Comparative Essay In 10 Steps\n\nA world history comparative essay can be done by choosing to compare and contrast two points in history that may have similarities or differences that will interest the members of the audience. Here are some steps for you to remember to write a comprehensive comparative exposition on world history.\n\nDetailed Steps to Take\n\n 1. First, you have to gather all the details that you need for each topic that you would discuss. Since there is most likely going to be two topics, make sure to develop a system of investigation that will not hamper the quality of your work.\n 2. Make sure that you get the right kind of resources for this particular exposition topic. It is important for you to be as accurate as possible in your account of world history.\n 3. In addition to this, it is imperative that you adopt the correct writing style when writing historical accounts. Be as sensitive as possible when it comes to the words that you are going to use. Otherwise, your essay will sound contrived.\n 4. Refrain from expressing a personal opinion too much within the exposition itself. This should be an accurate portrayal of two comparative points in history. If you include your opinion explicitly within the document, it might contaminate the details of your writing.\n 5. However, you should be able to express your opinion subtly within the course of the paragraphs. If possible, include it in the last portions of the composition.\n 6. Ask for more information about certain historical accounts from other people as well. Do not hesitate to ask your professor for more information about certain aspects of world history that you might want to explore, but do not understand fully.\n 7. Do an Internet search for the most compelling topics that you can discuss in relation to world history. I am sure that you will be able to get online samples easily with the use of the web.\n 8. Be as straightforward as possible when writing your own account of events in world history. Usually, expositions have a certain word limit. Therefore, you have to make sure not to exceed this particular limitation in the future.\n 9. Use words that will be easy to understand. Your aim is to reach as many audience members as possible. If you use highfaluting words in your exposition, then you will end up defeating the purpose.\n 10. Lastly, you have to remember to write a short but direct conclusion. Choose your vocabulary carefully and allow yourself to explain why you concluded the exposition in such a way.\n\n\nThese are just some of the many ways for you to write a comparative essay on world history. When doing this, it is best for you to be as balanced as possible. This will put your writing in a fair and concise light for sure.\n\nSimple But Efficient\n\ntricks from our experts\n\nBe Creative\n\n\nLearn Structure\n\n\nUse Help\n\n\nFormat And Structure\n", "pred_label": "__label__1", "pred_score_pos": 0.9967356324195862} {"content": "Találd meg álmaid állását egy kattintásra!\n\nAz álláshirdetés lejárt.\nAktuális állást talál az aktív állásajánlatok között: új keresés indítása itt\n\nProduct Owner (f/m/d)\n\nOur partner is looking for\n\nProduct Owner (f/m/d)\n\nCvonline.hu partner\nRégió: Németország\nHozzáadva: 2019.11.09.\nJelentkezési határidő: 2019.12.04.\n\nDeine Aufgaben:\nWe build the biggest (moving) Wifi network in Germany.\nOur mission is to provide Seamless Connectivity throughout the entire travel, connecting stations, regional- and long-distance trains. For millions of customers every day.\nWe want to build a personal and context-sensitive travel companion by looking at location, wifi, and sensor data.\n\nOne journey - one\n\nWe at Deutsche Bahn AG are looking for an experienced Product Owner(f/m/d) in Berlin who is passionate about the future of mobility.\n\nYour tasks:\n\n* You will take part in the whole product development lifecycle from ideation to product definition, conceptualization, validating hypotheses, iterative implementation, go-live, and continuous improvement while staying focused on our user's needs throughout each of the phases.\n* You will define, discuss and document product requirements, keep them up-to-date during product development and take care that the product vision comes to life.\n* In order to create state-of-the-art digital products, you closely collaborate with your colleagues who are experts in UX/UI and software development in a fast iterative DevOps culture.\n* Together with our data science experts, you leverage data in order to optimize our products, e.g. by conducting A/B tests, while building GDPR-compliant products that are transparent and economical in their usage of user data.\n* To ensure that our products meet our quality standards in every aspect, you will work together with our experts in fields such as data privacy, corporate identity and design systems.\n\nYour profile:\n\n* You should have experience in building digital products from idea to launch and beyond, ideally in the mobility sector\n* You have a strong focus on involving users in the product development workflows\n* Your resilient personality enables you to achieve goals, also in environments with pressure from several stakeholders and you know how to manage expectations\n* You embrace modern ways to build digital products such as Lean UX, Design Thinking and Extreme Programming\n* Experience in building (products based on) digital design systems would be a huge plus\n* While not strictly required, we would love if you also had expert knowledge in another discipline such as UX Design, Frontend Development or DevOps to be able to regularly join the discussion with the team about the little details that make a product great\n* You love to experiment with new technologies and acquire new skills to find clever solutions (to develop and refine a product).\n* You are familiar with the GDPR and the possible implications for digital products and therefore know how to design a system that is privacy by default and embraces the 'right to be forgotten'\n* You know how to acquire, process and store user consent compliant with EU law\n* You have good cross-communication skills in both the English and German language\nHelyek Németország\nKategória Tudomány / Kutatás, fejlesztés\nAktiválás időpontja 2019.11.09.\nIratkozzon fel állásértesítőre", "pred_label": "__label__1", "pred_score_pos": 0.7571090459823608} {"content": "The Educated Youth Unemployment Debacle in Zimbabwe: An Evaluation of the Impact of Intervention Programmes\n\n\nThis study was an evaluation of the intervention programmes which were put in place by the Government of Zimbabwe (GoZ) and its cooperating partners to address youth unemployment with specific reference to educated youths. Such a study was viewed as critical because it informs policy on what needs to be done correctly or improved in future endeavours to avoid repeating the same mistakes given that educated youth unemployment continues to rise in Zimbabwe. The study took the form of a survey in which 955 unemployed educated youths selected from the country’s ten provinces using multi-stage sampling techniques were used as respondents. The study found out that the intervention programmes did not achieve the desired impact as judged by most of the respondents who were supposed to be beneficiaries. Most respondents indicated that they had never heard about the existence of most of the fifteen intervention programmes identified in this research. The study recommended transparency through marketing initiatives which targeted youths in their final years of full-time education. The study found out that the intervention programmes were not adequately funded and this caused the selection of beneficiaries difficult leading to lack of trust with most intended beneficiaries suspecting corruption. Given the magnitude of the unemployment problem among educated youths, it was also recommended that Government and its cooperating partners should adequately fund the intervention programmes so that they achieve the desired impact of reducing the educated youth unemployment debacle.\n\nKeywords: Intervention Programmes, Unemployment, Youth Unemployment\n\nArticle Review Status: Published\n\nPages: 78-103 (Download PDF)\n\nCreative Commons Licence", "pred_label": "__label__1", "pred_score_pos": 0.999955952167511} {"content": "“Writer’s Block Isn’t Real,” Says This Prolific Author\n\nDoes writer’s block exist?\n\nProlific writer and marketing guru Seth Godin doesn’t think so. And I agree with him.\n\nOn a recent episode of The Moment with Brian Koppelman, Seth explained why he doesn’t believe in Writer’s Block (the quote is from around 19:45):\n\nWriter’s block is merely the combination of two things: one, bad habits someone else who is not on the journey is going say to you. When those two things combine in your head, it’s easier to be paralyzed – it’s easier to do nothing.\n\nOr, in other words, writer’s block is an excuse we’ve invented to explain why we’re not writing. Ultimately, it comes down to fear.\n\nLater, in the discussion, Seth and podcast host Brian Koppelman (a writer, producer, and generally creative guy) have an intellectual argument about whether writer’s block really exists. Is it just a pressure of not manifesting this thing we want to create? Is it a feeling of letting ourselves down? And how do we barrel through and get to the other side? Is being a stuck writer better than someone who writes something they aren’t proud of? And how do we get through our insecurities and create while battling our insecurities?\n\nIf you have an hour, this episode is filled with gems from experienced writers who know how to create worthwhile and successful art. I’ve embedded it below, but you can listen to the entire episode on Stitcher.\n\nHere’s the entire episode description:\n\nBack for his third appearance on the show, New York Times best-selling author and entrepreneur Seth Godin joins Brian this week to talk about his upcoming book, What Does It Sound Like When You Change Your Mind? (3:00). You can preorder Seth’s book by clicking here. To start things off, Seth and Brian discuss the concept of “certainty” in creation (11:00), whether writer’s block really exists (20:00), and why Seth used to ask the question “How many gas stations are there in the United States?” when interviewing potential employees (36:00). The two also reflect on different artists and how they approached their work (40:00) and why fear is a signal that you’re doing something right (54:00).\n\nSource: The Moment with Brian Koppelman on Stitcher, Slate, or iTunes\n\nPhoto by Bjorn Amundsen via Slate", "pred_label": "__label__1", "pred_score_pos": 0.6092026233673096} {"content": "\n\nII – Résistance passive, résistance active : vitalité linguistique et revitalisation\n\nThe effects of grammatical proscription on morphosyntactic change: Auxiliary variation in Franco-American French\n\n • Louis E. Stelling\n\n…plus d’informations\n\n • Louis E. Stelling\n Massachusetts College of Liberal Arts\n\nCouverture de Identités linguistiques, langues identitaires : à la croisée du prescriptivisme et du patriotisme, Numéro 1, mars 2011, Arborescences\n\nCorps de l’article\n\n1. Introduction\n\nIn this paper[1] we explore the influence of grammatical proscription on morphosyntactic change (or lack thereof) in two Franco-American[2] communities. Our data was gathered through sociolinguistic interviews with sixty-nine French-English bilinguals including thirty-five informants from Southbridge, Massachusetts and thirty-four from Woonsocket, Rhode Island between June of 2002 and August of 2003.\n\nFrench is endangered everywhere that it is spoken in the United States. If Franco-American were to follow the path of a great many other language varieties in decline, we would expect rapid linguistic change (e.g., structural simplification) to occur as the shift from French to English advances in New England (Rottet 2001; Russo and Roberts 1999; Mougeon and Béniak 1991; King 1989; Dorian 1981, 1989).\n\nIn the French verbal system, 17 intransitive verbs call for être as the auxiliary in compound tenses such as the passé composé; otherwise avoir is used. Since from a functional perspective only one auxiliary is needed, structural simplification would be expected to encourage the spread of avoir and its eventual employ as the only auxiliary verb in the Franco-American variety. Because the use of avoir in cases where the standard language calls for être also represents a usage that is linguistically proscribed, an examination of its distribution in Franco-American provides the opportunity to consider whether linguistic proscription can slow or even stop qualitative changes which might otherwise add to the stigmatization of this variety.[3]\n\nWe begin with a brief historical overview of French-Canadian immigration to Southbridge and Woonsocket followed by an explanation of the sociolinguistic field methods we used to gather our data. Next, a discussion of previous research on auxiliary variation in North American French provides the basis for the selection of the linguistic and sociolinguistic variables that we include in our multivariate analysis. Finally, a detailed presentation of the results of the analysis and a discussion of our findings in the light of what has been reported elsewhere lead us to conclude that Franco-American French is not undergoing the rapid morphosyntactic change predicted by its current situation. Our results suggest that the Franco-American communities of Southbridge and Woonsocket stand out as a unique case of language shift.\n\n2. The communities\n\nThe Franco-American communities of Southbridge, Massachusetts and Woonsocket, Rhode Island have much in common historically. The francophone immigration of the nineteenth and early twentieth centuries drew relatively homogenous populations from the same geographical region of Canada to both locations over roughly the same time period. The first French Canadian family to settle in Woonsocket came as early as 1814 or 1815 (Bonier 1920: 95). Southbridge, which was incorporated in 1816, saw the arrival of French Canadian immigrants in 1832 (Gatineau 1919: 15; Brown 1980: 26). In both locations, these Franco-Americans were joined by friends and family who filled the towns to work in bustling factories. In each community, the majority of families came not only from the same rural region of Quebec, but from many of the very same small towns (Brault 1986). In the 1830’s for example, immigrants from the town of St. Ours in the Richelieu valley settled in high numbers in both locations (Brault 1986: 56).\n\nIn 1900, Franco-Americans already made up 60% of the populations of both Southbridge and Woonsocket (Brault 1986: 54-55). Their numbers continued to grow until the 1930’s when the Depression and changing immigration laws ended the arrival of new Francophones (Roby 2000, 1990; Brault 1986). By that time, Southbridge and Woonsocket had become two of New England’s oldest and most well known Franco-American centers.\n\nAs the Franco-Americans of Southbridge and Woonsocket profited from the social mobility made possible by their majority status and a booming American economy in the nineteenth and early twentieth centuries, the French speaking populations exhibited a great deal of social and economic stratification in both locations. In fact, a number of prominent Franco-Americans held public office and were therefore quite visible in both communities (Gatineau 1919; Brown 1980; Bonier 1920).\n\nFranco-Americans were successful in creating an impressive number of groups including mutual aid societies, social clubs, French language newspapers, and parish organizations. Through the establishment of Franco-American national parishes and bilingual parochial schools, the Catholic Church played a key role in language maintenance and transmission. French was also commonly used in places of work such as factories and mills, where Franco-Americans worked together in large numbers. Complex French language infrastructures therefore provided strong support for the language in both Southbridge and Woonsocket, as was the case in a number of other Franco-American centers throughout New England (Roby 2000; 1990; Brault 1986; Brown 1980; Gatineau 1919; Bonier 1920.\n\nSince the 1930’s, language shift has been advancing in both communities. French is no longer commonly used at work. All but a handful of masses in French, and every one of the bilingual school programs gradually disappeared. Along with the decline of French in work, education, and religion, many of the organizations that had been so important in promoting the language are no longer in existence. Currently, French is used mainly between family members and friends, and even these domains have been greatly penetrated by English. In other words, there is no longer a single domain that is reserved exclusively for French in either community (Fox and Smith 2007, 2005).\n\n3. Fieldwork\n\nBy investigating eight communities throughout New England, two teams of researchers lead by Professors Cynthia Fox (University at Albany) and Jane Smith (University of Maine, Orono) have created a mega-corpus of Franco-American French (see Fox and Smith 2007, 2005 for an overview of the project). Southbridge and Woonsocket are two of eight communities targeted in the project.[4] During fieldwork, interviews were conducted with approximately 30 Franco-Americans from each location, 275 in all. Interviews were guided by use of a questionnaire to gather information on topics such as the acquisition, use and transmission of French, and access to francophone culture and media. A translation task (English to French) was also used to elicit structures that are infrequent in conversation. Through the study of this mega-corpus, Fox and Smith (2007, 2005) have confirmed that language shift is more advanced in southern New England than in the north, and that Franco-American communities can vary greatly in terms of language maintenance.\n\nFieldwork has also shown that despite the many historical similarities between Southbridge and Woonsocket, language shift has progressed to different degrees in the two locations. For example, the shift from French to English is more advanced in Southbridge than in any other community studied and Woonsocket stands out because language maintenance has been higher there than elsewhere in Southern New England (Fox and Smith 2007; 2005; Fox 2007). U.S. census reports from 1990 and 2000 also indicate that when compared to Southbridge, a greater percentage of Woonsocket residents declared French or French Canadian ancestry as well as French use in the home in both years.\n\nFinally, fieldwork has revealed that conservative language attitudes exist in both communities (Fox 2005; Stelling 2007). A number of speakers such as SO-S6 and SO06 for example, voiced concerns about the quality of the local French, often making reference to more prestigious or standardized varieties of the language, such as the French taught in parochial or public schools.[5]\n\nThe conservative language attitudes of Franco-Americans from Southbridge and Woonsocket and their exposure to the standardized varieties of the language (through school, travel and media) may make the communities unique when compared to other cases of language shift. The variety may be resistant to certain qualitative simplifications that might be labeled by parents, teachers and other speech monitors in the communities as “bad” French. In the following analysis, we investigate whether linguistic proscription may be preventing avoir from spreading to replace être to become the sole remaining auxiliary verb in the passé composé, a development that has been noted in other communities in the United States (Locke 1949; Marie-Francia and Marie Anaïs 1958; Papen and Rottet 1997; Russo and Roberts 1999).\n\n4. Previous research on the passé composé in North American French\n\nAuxiliary variation in the passé composé has been studied in New England, Montreal, Ontario, and Louisiana. Some of the factors that researchers have found to have a significant influence on variation are: age, gender, socioeconomic status, degree of language restriction, verb frequency, the presence of a transitive homonym, and the presence of an adjectival homonym. Each of these is therefore included in the multivariate analysis.\n\nIn New England, Locke (1949) found that avoir is the standard auxiliary for intransitive verbs of motion (e.g., Il a parti à cinq heures ‘He left at five o’clock’) whereas Sisters Marie-Francia and Marie Anaïs (1958) reported that the use of avoir with these same verbs was specifically associated with the working class. A possible explanation for their contrasting findings is that Locke worked with a single informant from Maine and Sisters Marie-Francia and Marie Anaïs examined a variety of Franco-American newspapers representing three social classes. Decades later, Russo and Roberts (1999) found that there was no social meaning associated with the non-standard use of avoir by twenty-two informants from Vermont and that its spread in their speech was promoted by main verbs which occur infrequently in conversation (e.g., revenir, descendre, arrêter) and by main verbs which have a transitive homonym (e.g., Je suis rentréà cinq heures ‘I came home at five o’clock’ vs J’ai rentré les foins ‘I brought in the hay.’)\n\nSankoff and Thibault (1980) reported that variability carried social meaning in Montreal. Use of être was specifically associated with higher socioeconomic status and use of avoir was especially frequent among men. Choice of auxiliary also depended on the exposure to and attitudes toward Standard French of a given speaker. Among the linguistic factors considered, they found that verbs with an adjectival homonym (il a parti à cinq heures ‘he left at 5’ vs il est déjà parti ‘he is already gone’ (state)), a transitive homonym, and verbs of motion were the most susceptible to the spread of avoir. Their general conclusion was that a change in progress in favor of avoir had been blocked by pressure to conform to Standard French.\n\nCanale et al. (1978) reported that several linguistic factors influenced auxiliary variation in Ontario. High frequency verbs and verbs which were morphologically complex (e.g., revenir vs venir) showed resistance to the spread of avoir while verbs with a transitive homonym were more likely to be used with this auxiliary. Finally, the authors stated that they could not fully account for variation and that there was at least one unknown factor at work. When Béniak and Mougeon (1989) and Nadasdi (2005) analyzed auxiliary variation, they each found that language restriction played a significant role. In both studies, highly restricted users of French showed a preference for avoir whereas unrestricted speakers did not.\n\nIn a study of Cajun French, Papen and Rottet (1997) showed that when être is used, the speaker is referring to the resulting state of an action while when avoir is used, reference is made to the action itself. Use of être was limited to a very small number of verbs and was found only among the oldest group of speakers in their corpus. Picone and Valdman (2005) echoed the conclusions that être was used only by older speakers and with a very limited set of verbs. They also found that avoir may be used with all verbs, including intransitives and pronominals. Given the very similar observations found in the two studies, it is evident that the invariable use of avoir is well on its way to replacing être in Cajun French, a variety which finds itself today in a stage of language shift closely resembling the situation in New England.\n\n5. The multivariate analysis\n\nConcordances were made using Simple Concordance Program, version 4.08.[6] Before extracting instances of the passé composé from the transcriptions, all lines spoken by the interviewer were eliminated. Interviews with multiple informants were then divided into multiple documents, one for each speaker.\n\nConcordances were created from the conversation data only, as the translation task did not involve systematic use of the past tense of any of the seventeen intransitive verbs studied here. All lines containing past participles of verbs that require être as an auxiliary in Standard French were retained. These past participles include allé, entré, passé, monté, tombé, arrivé, né, venu, sorti, retourné, descendu, resté, parti, and mort. Derivatives of these verbs containing the prefixes de- and re- such as rentré, devenu and revenu were also included in the concordances. Only intransitive uses of these verbs were retained, since their transitive counterparts were conjugated exclusively with avoir.\n\nAfter concordances were completed, token files were created by coding each instance of the passé composé for characteristics of the speaker (age, gender, community of residence, socioeconomic status, number of generations in the U.S., frequency of French use, and schooling in French) and the linguistic context itself (grammatical person and number, the existence of a transitive homonym, the possibility of an adjectival use of the past participle, and frequency of the main verb). A total of 1,194 tokens were included in the study. These tokens were produced by 57 informants, 25 from Southbridge and 32 from Woonsocket.[7] Our results show that when taken together, Franco-Americans from Southbridge and Woonsocket use avoir with a frequency of 34%.\n\nThe binomial multivariate analysis was performed using GOLDVARB 2001.[8] The goal of this analysis was to measure the contributions of each of the social and linguistic factors on the appearance of avoir with the seventeen intransitive verbs mentioned above. Although the data set included six other verbs that are morphologically derived from the original set, these were not retained in the multivariate analysis. The main reason for this is that none were used more than once by informants in conjunction with the passé composé, and thus did not show variation in this corpus. These are repasser, remonter, retomber, ressortir, redescendre, and repartir.\n\nResults from the multivariate analysis were significant at the level of p=0.015. As shown in Table 1, six of the seven external constraints were found to have a significant effect on auxiliary variation. These were frequency of use of French, age, gender, number of generations in the U.S., socioeconomic status, and schooling in French. Only community of residence was not found to be significant. The one and only linguistic constraint found to be significant was the presence of a transitive homonym. Though the data suggests that verb frequency may also play a role in variation (which we will see in subsection 5.2), verb frequency was not chosen as a significant factor in the multivariate analysis.[9] Grammatical person and number and the possibility of an adjectival use were not found to be statistically significant.\n\nTable 1\n\nContribution of significant factors to the use of avoir (p=0.015)\n\n\n-> Voir la liste des tableaux\n\n5.1 Significant factors on the use of avoir\n\nInformants from all eight communities studied in the Franco-American French project (including Southbridge and Woonsocket) were divided into five groups based on their self reports on the frequency with which they use French today (see Fox and Smith 2005, 2007). These categories (never, rarely sometimes, often, and daily) were included in the analysis because of the impact of language restriction on choice of auxiliary that has been observed in Franco-Ontarian French when a similar five point scale was used to create an index of language restriction (Nadasdi 2005; Béniak and Mougeon 1989).\n\nIt is important to note however, that the categories used in the present analysis come from self-reports on frequency of French use only and do not include an index based on functional language use domains. Studies of Franco-Ontarian French have taken into account 1) a variety of settings (home, community and school) 2) different interlocutors (parents, siblings and peers) and 3) directionality of the interaction (informant > interlocutor or interlocutor > informant) (see Mougeon and Béniak 1991: 71-73). This approach was deemed inappropriate for Franco-American French for several reasons. First, none of the speakers in this corpus are in school. Second, in both communities, French has lost its place as a communicative tool outside the home. Third, the parents of the vast majority of speakers are deceased. Finally, the directionality of use of French is quite individualized from one speaker to the next and is difficult to ascertain in some cases as it was not specifically addressed in the questionnaire.\n\nWhen frequency of use of French is considered, it appears that infrequent use of French does not favor the spread of avoir as we would expect if language shift were encouraging such a change. In fact, daily use of French is the only factor in this group which favours use of avoir as an auxiliary verb.[10] As shown in Table 1, while use of avoir is prominent among daily users (54%, factor value = 0.616), those who have fewer occasions to speak French are more likely to use être.\n\nIn the present analysis, the age groups were 1) below 60 years of age, 2) 60 to 69 years, 3) 70 to 79 years, and 4) 80 years of age or above. Although age was not found to be a significant factor in auxiliary choice in Vermont French, it has been found to be indicative of a change in progress (the spread of avoir) in both Montreal French and Franco-Ontarian French (Russo and Roberts 1999: 80, table 7).\n\nResults of the present analysis show some possible (though not conclusive) evidence of a change in progress. The younger speakers in the corpus (those below the age of seventy) are the most likely to use avoir, where speakers in their seventies, eighties and nineties have a higher probability of using the more conservative être. However, we can see that any possible change in progress has been slowed or even stopped if we examine the younger speakers in the corpus.\n\nFirst, there is not a single age group that uses either form exclusively with this set of verbs. A considerable amount of variation can be witnessed both in the youngest (56% avoir vs. 44% être) and oldest (25% avoir vs. 75% être) age groups. Clearly, if there is a change in progress, it has not been so rapid as to produce categorical users of avoir even at the youngest end of the continuum. Furthermore, the factor effects for speakers in their sixties (0.669) and for those below the age of sixty (0.668) are nearly identical. This indicates that a possible change in progress among speakers above the age of seventy has not continued among younger informants.\n\nThe role of gender as a mechanism of language change has been shown to differ between “healthy” varieties and those that are undergoing language shift. In stable situations of variation in “healthy” language varieties, women typically use more conservative forms than men (Labov 2001). Gender does not typically influence variation in situations of shift because rapid linguistic changes tend to erase the effect of social factors other than age (King 1989; Russo and Roberts 1999; Dorian 1989, 1981).\n\nLet us remember that gender was found to be significant in the choice of auxiliary in the passé composé in Montreal French, where men “seem to use avoir more than women” (Sankoff and Thibault 1980, 340). Based on this and on their other findings, the authors found auxiliary variation to be stable, and not indicative of a change in progress. Our results confirm that Franco-American women are less likely to use avoir than are Franco-American men. In other words, gender based variation has not been eliminated by language shift. The gender effect on the use of avoir is not typical of a change in progress in favor of avoir, but rather of stable variation.\n\nNumber of generations in the United States was included as an external constraint for this analysis for two reasons. First, its status as an immigrant language distinguishes Franco-American French from each of the other four major varieties of North American French. Second, in cases of immigrant languages, shift is said to occur across generations (Dorian 1989). Interestingly, migration status was not found to be a significant factor in Vermont French (Russo and Roberts 1999; Russo 1997). As mentioned above however, the Vermont corpus consisted only of first and second-generation speakers (immigrants and children of two immigrants) whereas the Southbridge and Woonsocket corpora include third and fourth-generation Franco-Americans as well.\n\nResults from the present analysis show that the probability of use of avoir does not increase in a parallel fashion with the number of generations in the United States. First-generation speakers who have emigrated from Quebec are the least likely to use avoir (factor weight = 0.265). However, the situation is all the more interesting when we look at generations two and three.[11] While being a member of generation two increases the probability that avoir will be used, generation three speakers are more likely to use être. It would seem then, that while the children of immigrants are quite susceptible to the spread of avoir, generation three demonstrates a substantial shift back toward the use of être.\n\nAuxiliary choice was also found to correlate highly with socioeconomic status. While working class status favors the use of avoir (factor weight = 0.573), the professional class shows a clear preference for être. This is perhaps our most convincing evidence that this particular variable bears a great deal of social meaning in Franco-American French.\n\nSchooling in French is also a significant factor in choice of auxiliary verb. French as a sole medium of instruction strongly discourages the use of avoir (only 8%, factor weight = 0.194). This represents a sharp contrast with respect to all of the other forms of schooling. Most of the speakers who have had French as a sole medium of instruction had this opportunity while residing in Quebec, where French can be used in all communicative domains. Since Quebec French is viewed as a prestige variety by Franco-Americans (see Bagate et al. 2004), it is likely that the experience of living and going to school there has had a lasting effect on the speech of these informants. Although none of the other factors in the group discourage the use of avoir, informants who have had French only as a “foreign” language use avoir with much lower frequency (18%) than those who have had bilingual schooling (42%-46%). If we consider that both French as a sole medium of instruction and French as a foreign language are less favorable to the use of avoir than the categories involving bilingual schooling, our results lend support to the notion that contact with varieties other than the source dialect discourages use of the linguistically proscribed form. Although our data set is too limited to tease out further information about the effects of schooling on auxiliary variation, it is certainly an area that merits future investigation.[12]\n\nAccording to Russo (1997), Boulanger (1992) has identified transitive homonyms in Quebec French for eight of the seventeen intransitive verbs studied here. These verbs and their transitive meanings and examples as given in Russo (1997: 32-34) are:\n\nBecause transitive verbs are conjugated with avoir, it has been found that analogy may play a role in the spread of this auxiliary to the intransitive verbs listed above. The existence of a transitive homonym has been found to favour the use of avoir in both Ontario and Vermont (Canale et al. 1978; Russo and Roberts 1999).\n\nIn the present analysis, the existence of a transitive homonym turned out to be one of the most significant factors in choice of auxiliary. It was also the only linguistic constraint found to have a significant influence on variation. Our results highlight a marked discrepancy between those verbs that have a transitive homonym and those that do not. The existence of a transitive homonym strongly favors the spread of avoir to the intransitive forms (75%, factor weight = 0.862). Verbs forms which can only be used in an intransitive manner on the other hand, do not favor the use of avoir (factor weight = 0.415).\n\n5.2 Factors not selected as significant\n\nFour factors in this analysis were not found to have any significant effect on auxiliary variation. Three of the four linguistic constraints were not selected. These were grammatical person and number, the existence of an adjectival homonym, and verb frequency. In contrast, the only external constraint that was not selected is community of residence.\n\nAlthough Southbridge speakers used the standard être with greater frequency (73%) than did informants from Woonsocket (65%), this difference was not found to be statistically significant. The fact that community of residence was not selected must be interpreted with care. Woonsocket speakers were interviewed in the home, and often told lengthy uninterrupted stories. The majority of Southbridge interviews, on the other hand, took place outside the home (see Stelling 2008, 70-75). It is possible that the relative formality of Southbridge interviews when compared to those conducted in Woonsocket has masked the effect of language shift within the data set. While we may expect the highest use of avoir to coincide with the community (Southbridge) in which language shift is more advanced, we also may expect the use of être to coincide with the community (also Southbridge) where interviews were more formal in nature. This point will be addressed further in the discussion section.\n\nThe first linguistic constraint that was not selected as significant was grammatical person and number. Although none of the authors cited in the pages above have studied the effect of this variable on auxiliary variation, it was included here because there is a relationship between grammatical person and number and the frequency with which verb forms appear in conversation. In a discussion of linguistic change, Martinet (1969) concluded that frequently used forms are more resistant to simplification than infrequent forms (cited in Russo and Roberts: 70). This observation is particularly relevant to verb inflection paradigms because singular forms occur with greater frequency than plural forms and third person forms are more frequent than first and second person forms (Croft 2003: 140-142). Accordingly, grammatical person and number were coded into six categories based on the verb form itself (1st sing., 2nd sing., 3rd sing., 1st pl., 2nd pl., and 3rd pl.).[13] There is little evidence that grammatical person and number have much if anything at all to do with variation in this case. For example, second person forms (singular and plural combined) accounted for only 1% (N= 13) of the data set, and similar percentages of avoir usage were found with first person singular (35%) and third person singular (29%) forms.\n\nAnother linguistic constraint not selected as significant in this analysis was whether the past participle of a given verb has the possibility of being used as an adjective. Because adjectives are often preceded by être (and never by avoir) we hypothesized that analogy may lead these verbs to be conjugated with être more frequently than verbs without an adjectival use, as was found to be the case in Ontario (Canale et al. 1978). In the two following examples we can see the past participles of mourir and partir used as adjectives:\n\nThe possibility of an adjectival use of the past participle was not selected as significant. Although the adjectival uses themselves were eliminated from the data set, main verbs were coded for whether they can also be used as adjectives. The analysis showed that the percentage of avoir remains nearly identical regardless of whether the past participle may be used as an adjective (66%) or not (67%).\n\nThe final factor that was not selected as significant is the frequency of the main verb. Because frequent forms are more resistant to change than infrequent ones (see above), we originally hypothesized that highly frequent verbs may be conjugated most often with être. Following the lead of researchers in Ontario and Vermont (Canale et al. 1978; Russo 1997), we made a distinction between high and low frequency verbs based on frequency indexes given in Juilland et al. (1970).[14]\n\nIn the studies of auxiliary variation in Franco-Ontarian and Vermont French, verb frequency was found to be an important factor. In both cases, low frequency verbs encouraged the spread of avoir (Canale et al. 1978; Russo and Roberts 1999). However, the verbs naître and mourir were not included in either study. Naître is a low frequency verb that nonetheless showed an extremely high degree of resistance to the spread of avoir in the present analysis. Avoir was used in only 3% of tokens containing naître. It is important to consider that despite its low frequency in French, naître is not conjugated like other infrequent re- verbs, a fact which suggests the verb acts quite differently with respect to linguistic change or lack thereof. It is also important to note that naître was contained in the passé composé in several questions at the beginning of the vast majority of the interviews. Because the interviewers used être as an auxiliary with this verb, this may have influenced the forms used by informants.\n\nIf we eliminate naître and each of the five verbs that produced a very low number of tokens (descendre, monter, passer, entrer and tomber; N < 20) from the data set, it becomes possible to examine the possible relationship between verb frequency and auxiliary choice. Avoir is used with low frequency verbs in the majority of cases. Avoir use with these verbs ranged from 66% (retourner) to 90% (sortir). With high frequency verbs however, avoir use ranged from only 2% (aller) to 68% (partir). It is also important to note that although the verbs monter and descendre are not included in the table because of low token counts (N= 9 and 5 respectively), they are both low frequency verbs which each showed 100% avoir application. All in all, it appears that high-frequency verbs are more resistant to the spread of avoir than infrequent ones, a fact which mirrors the findings of the Vermont and Ontario studies mentioned above.\n\n6. Discussion\n\nThe multivariate analysis has shown that although a great deal of variation exists within the communities, language shift does not appear to be causing rapid linguistic change. In fact, Franco-Americans from Southbridge and Woonsocket use avoir with exactly the same frequency (34%) as has been reported for speakers of Quebec French and unrestricted speakers of French in Ontario (Nadasdi 2005). Additionally, generation three speakers from Southbridge and Woonsocket use avoir only 13% of the time. If language shift were accelerating grammatical change, we would expect to find a considerably higher frequency of avoir application within the data set, especially among third generation speakers.\n\nStructural convergence with English would promote the spread of avoir because ‘to have’ is the sole auxiliary verb of the English present perfect. The fact that this development has not progressed in the speech of informants from Southbridge and Woonsocket suggests that convergence with English is not occurring in the passé composé.\n\nIn situations of language shift, the expected tendency is the development of a simplified linguistic system with a strong a preference for transparency, or a one-to-one relationship between form and meaning (Bradley and Bradley 2002; Jones 1998; Dorian 1989). Given that two auxiliaries are not functionally necessary, it is in fact quite remarkable that both have been retained, even in Southbridge where the shift to English is quite advanced.\n\nContrary to what has been reported for Cajun French (see above), where use of être with intransitive verbs of motion among a range of fluent speakers aged 30 and older is found only among the oldest (70 years old and above) both auxiliaries are widely used among informants of all ages in Southbridge and Woonsocket. Furthermore, there are no categorical users of avoir in our corpora and there are virtually no differences observed between speakers in their sixties and those below the age of sixty. Although French is being used less and less in Louisiana and New England alike, its linguistic structure remains considerably more intact in the passé composé in Franco-American than in Cajun French.\n\nAnother important finding related to the lack of structural simplification in Southbridge and Woonsocket is that social factors continue to exercise a significant influence on variation. With the exception of community of residence, every social constraint considered was found to be significant in this respect. This also runs counter to the expected pattern whereby accelerated grammatical change during shift effaces the social meaning behind variability. Results from the multivariate analysis validated the association made by Sisters Marie-Francia and Marie-Anaïs (1958) between the use of avoir and working class status. Contrary to the finding of Locke (1949), who stated (based on his observations of one working class informant) that avoir is the standard auxiliary for intransitive verbs of motion, the present analysis indicates that être is still widely used with these verbs by Franco-Americans from Southbridge and Woonsocket, especially among those belonging to the professional class.\n\nWe hypothesized in Section 4.2 that community of residence may not have been selected as a significant factor because the effects of formality and language shift could potentially counterbalance one another in the data. The interviews were relatively more formal in Southbridge, where the shift to English is more advanced than in Woonsocket. However, given the results of the analysis, which suggest that language shift is not favoring the spread of avoir, it does not appear to be the case that the effects of formality and language shift are counteracting one another within the data set. Rather, it is more likely that community of residence was not a significant factor because community norms have remained remarkably similar in the two locations (once all other intervening factors are accounted for), despite the differing degrees to which language shift has advanced.\n\nResults from the present study differ from the findings of Russo and Roberts (1999) in Vermont, who reported that the usage of avoir was spreading and that avoir would replace être and become the sole auxiliary of intransitive verbs of motion. However, the Vermont study included only first and second-generation speakers and a total of only four highly restricted and three unrestricted users of French. The remaining fifteen subjects were all labeled as semi-restricted French speakers. The tendency to use être observed among third-generation speakers and among those who do not use French on a daily basis in Southbridge and Woonsocket indicates that these two limitations of the Vermont corpus are most likely responsible for the differing results of the two studies.\n\nWhen interpreting the results of the present study, it is important to consider that French is not a typical minority language. It is a language of wide international currency. Some informants have had the chance to use their French outside of the communities themselves through travel and through access to French language media sources. Additionally, nearly all of the informants have had some education in French, and many of these speakers have been exposed to other varieties of the language in the classroom.\n\nWhen taken as a whole, the findings of the present analysis indicate that despite the sociolinguistic situation of language shift, the passé composé shows a high degree of resistance to grammatical simplification in both Southbridge and Woonsocket. These findings echo those of Fox (2005), who stated that the syntax of Woonsocket French appears to be relatively robust and shows resistance to certain radical linguistic changes. Franco-American provides strong evidence that in association with the right set of sociolinguistic factors such as education in the mother tongue, exposure to other varieties of the language, socioeconomic stratification, and linguistic conservatism, linguistic proscription may slow or even block certain linguistic developments during situations of shift.\n\n7. Conclusion\n\nIn the pages above, we have seen that linguistic proscription has had an impact on the linguistic consequences of language shift in Southbridge and Woonsocket. Although shift to English is advancing in both locations, the analysis provided no convincing evidence that the passé composé is undergoing structural simplification or convergence with English. If language shift were causing radical structural simplification, we would expect to find a higher rate of avoir application within the data set and that social factors do not influence variation. To the contrary, we have observed that auxiliary variation does hold a great deal of social meaning. Among the social factors considered, only community of residence was not found to be significant, a fact which suggests that community speech norms involving past tense formation are remarkably similar in the two locations once all other factors are accounted for.\n\nParties annexes", "pred_label": "__label__1", "pred_score_pos": 0.9685925245285034} {"content": "Cities Are Becoming Sanctuaries For Climate Policy, Too\n\nThe Trump administration may deny climate science, but cities are already moving to adapt to it.\n\nYesterday, The New York Times published a complete draft of a climate change report by scientists from 13 federal agencies. According to the Times, its authors feared the Trump administration would suppress its conclusions–including its statement, made with “very high confidence,” that human activities are the primary cause of global climate change.\n\n\nThe 600-plus page report is an expansive look at the state of existing climate science, detailing rising temperatures, increased precipitation, extreme weather like tornadoes and cyclones, and much more. But since it “directly contradicts” the president’s stance on climate change, it’s also kindling for the ongoing debate over the climate on the federal level–one that’s unlikely to be resolved anytime soon.\n\nYet, as the report illustrates, federal policy is only part of the puzzle. Not only does the document show how cities both contribute to and bear the brunt of climate change today, it also provides a nugget of hope, suggesting that cities can adapt and even mitigate some of the report’s worst scenarios. In fact, similar to the way sanctuary cities are standing against Trump’s immigration policies, some cities have already pledged resources to more resilient urban design–even if the federal government won’t.\n\n[Photo: Pawel Nolbert/Unsplash]\n\nThe Science Is Clear: Cities Are Already Suffering\n\nIf you read the report with an eye toward the urban, there’s plentiful science that shows how that climate change is already affecting cities–home to 81% of the country’s population, according to the World Bank.\n\nThe impact of sea level rise is particularly significant for coastal cities: Since the 1960s, coastal flood advisories from the National Weather Service have increased 5 to 10 times in cities like Philadelphia; Baltimore; Charleston, South Carolina; and La Jolla, California. In many cities, this flooding is already a normal occurrence. More than 25 cities on the East and Gulf Coasts have seen increases in minor tidal floods over the last several decades, and that’s only going to continue in the future. If sea levels were to rise one meter, cities on the Gulf Coast, the Eastern seaboard, the West Coast, and island states and territories could experience 25 times as much moderate flooding in the next three decades.\n\nThe urban heat island effect is another way climate change disproportionately affects cities. UHI occurs due when dense buildings and hard surfaces retain heat from the sun, causing the temperature to rise in their immediate vicinity. The report says that the UHI effect raises temperatures in cities by between .9 and 7.2 degrees Fahrenheit during the day and 1.8 to 4.5 degrees Fahrenheit at night. In cities located in biomes dominated by temperate forests–like the Northeast–UHI can raise temperatures as much as 14.4 degrees Fahrenheit. The report declares with “high confidence” that UHI will only increase as cities get bigger.\n\nBut while climate change is hitting cities particularly hard, those cities also contribute to it. The report points out that urbanization accounts for almost 2% of the carbon released from the biosphere into the atmosphere, even though cities only account for 1% of the total land in the United States. Urbanization also fuels the production of concrete, which is responsible for 5% of the world’s carbon dioxide emissions. Cities–or more specifically their buildings, industry, and vehicles–produce large amounts of emissions, adding to the rise in greenhouse gases in the atmosphere.\n\n[Photo: Pedro Lastra/Unsplash]\n\nThey’re Also Already Adapting–With Or Without Trump\n\nDespite cities’ current contributions to climate change, the scientists write in the report that there are some major uncertainties about what role urban areas will play in the future: because they have the ability to adapt.\n\nThe report states that the cities of the future may not look the same as those of today in terms of energy consumption and efficiency, and that our inability to predict how cities will adapt hinders our ability to predict how they’ll impact climate change. Because cities are far more adaptable than whole countries, there’s a chance that reimagining the way cities are planned and built could mitigate climate change’s effects.\n\nIn truth, cities have already taken that to heart. New York City recently released its first ever Climate Resiliency Design Guidelines for government projects. Mayors from 365 cities have banded together in their efforts to curb climate change in their states. Many cities now have chief resilience officers whose entire job it is to plan for how their cities will adapt to the shocks and stresses of the coming century.\n\nThe report’s science is frightening, and the fight over climate science on the federal level will have a serious impact on funding for mitigation efforts, but it also contains insights about how cities have outsized power to act as a bulwark against climate change in this crucial moment.\n\n\nAbout the author\n", "pred_label": "__label__1", "pred_score_pos": 0.9614078998565674} {"content": "Election Day is exactly one year away. One year from today, Americans will vote for their choice for the President of the United States.\n\nBut Democrats don’t want to risk it. They’ve admitted that if they don’t impeach President Trump, he will get re-elected!\n\nWhat they are doing to divide the country is wrong. Abusing their power for political purposes is wrong. And trying to remove a president from office—less than a year before an election when the voters can decide for themselves—that is wrong.\n\nLet the voters decide. Let Democracy work. And let Congress get back to the task of fixing real problems that Americans are facing in their everyday lives.", "pred_label": "__label__1", "pred_score_pos": 0.8436869382858276} {"content": "Implementation Workshop - Beyond Requesting: I Definitely Have More to Say - Kennesaw, Georgia, U.S.\n\nden 15 juni 2017\n\nKurstyp: Implementation Workshop\n\n\nWhere do you typically start when introducing augmentative and alternative\ncommunication (AAC)? If you are like most people, you probably start with activities\nwhere an individual can request a motivating object or action. But, what happens\nnext? What happens when we run out of things to request? What happens when\nAAC users seem “bored” by requesting? What happens when the situation doesn’t\nallow for requesting?\nIn this session, we will help you develop specific strategies to go beyond requesting\n- into the world of asking questions, making comments, protesting, expressing\nopinions, and other communicative functions. We will use lecture, discussion, video\nexamples, and small-group activities to explore the power of various communicative\nfunctions, vocabulary selection, teaching strategies, and specific ways to facilitate\ncommunication beyond requesting.\n\nLearning Objectives:\nFollowing this session, participants will:\n\n • Name two communicative functions beyond requesting and describe why they are powerful.\n • Identify messages and corresponding communicative functions within motivating activities.\n • List 2 partner communication strategies that will facilitate communication beyond requesting.\n • Develop a plan to teach at least one communicative function to an individual using AAC in an everyday setting.\nFor questions contact Ron Steinberg:\n\n\nKursnivå: Introductory\n\nASHA CEU Poäng: 0,5\n\nDatum & Tid: torsdag, juni 15, 2017 09:00 - 03:30 ET\n\n\nNorthstar Church  3413 Blue Springs Rd.,  Kennesaw,  Georgia  30144,  United States\n\nKostnad: Gratis\n\nÖppna platser: 44\n\nPresentatör: Holly Schneider\n\n\n© Copyright 2019 Tobii Dynavox\n\nAnvändarvillkorRättsligt meddelandeSekretesspolicyReturpolicy", "pred_label": "__label__1", "pred_score_pos": 0.8805415034294128} {"content": "Chemistry Instruments at a Glance\n\nNguyên liệu cần có cho món ăn này\n\nA different endorsement of practical skills are going to be taken alongside the A-level. It’s possible for you to refer to other components of your paper rather than repeating explanations or facts. Thus, an individual may be able to construct skills and knowledge in a particular area like cancer biochemistry, materials chemistry, forensic chemistry, medicinal chemistry or something different.\n\nessay writing service\n\nCampus programs may also offer opportunities to take part in faculty research projects. Core courses are intended to help students broaden their grasp of chemical wisdom and build research skills (for example, chemistry writing). Focus courses and concepts could also be utilised to bring students up to speed whether there are any undergraduate deficiencies in chemistrythat need to be dealt with.\n\nNobel becomes famous throughout the world. Don’t begin a lab till you know all the steps, from beginning to end. essay writing Beneath this prize, the winner receives a gold medal, a certificate and a huge amount of money.\n\nScientists in different fields will use still other sorts of laboratories. Although ceramics are rather hard and stable at quite significant temperatures, they are typically brittle. All materials could possibly be found in the entire laboratory manual.\n\nElectrochemistry is also vital in a wide variety of important technological applications. Forensic chemists must be very proficient in analytical chemistry, the area of chemistry that manages the instruments and methods used to recognize and quantify matter. Wet chemistry is a type of analytical chemistry that utilizes classical methods like observation to analyze materials.\n\nQuantitative methods utilize information that could be measured and quantified to indicate a shift. The experimental section focuses on the facts of the experiment. A number of that material can be found on Wikimedia Commons.\n\nTo use electron affinities properly, it’s crucial to keep tabs on the sign. There are two factors that may influence electron affinity. Thus, the atoms that need a huge quantity of energy to release an essay writer electron will almost certainly be the atoms that give off the most energy when accepting an electron.\n\nNow, you’ve got to do the Fourier transform for each and every point in the interferogram. Because the potent electron beam destroys biological material, electron microscopes were long considered to be useful simply to study dead issue. This causes a greater electron affinity.\n\nYou’ll offer information to help physicians follow the plan of therapy to make sure the patient’s recovery. First-time students McGill Alumni Association is a huge community of over 275,000 alumni across 180 nations. Every student, who’s contacting our service, wants to be certain that they will get the most effective possible homework aid.\n\nThe Characteristics of Chemistry Instruments\n\nOrganization of results is particularly important. Being a very best Science Lab Equipment Manufacturer, we provide all the essential apparatus and higher school science kits for various experiments. Review the full application form before the last submission and watch for the last offer.\n\nGood lubrication is important to stop instrument burnout. Chemical reactions initiated by the absorption of light can be quite different from the ones that occur by other ways. The item ratio in the consequent equilibrium mixture is dependent on the relative stabilities of the different conjugated dienes, and the stability provides the rosin the favorable properties which were mentioned in the prior post.\n\nThe Rise of Chemistry Instruments\n\nJust do not forget that ultimately you’ve got to convince the reader your conclusion is accurate. As in the solving of other complex difficulties, the work of several people was needed to establish the entire picture. The very best thing you could do is to be certain you comply with all safety protocols at all times.\n\nSpecific recalibration intervals depend on several factors. In each situation, retention times serve as an added determinant. When a number does not include a decimal point, zeros added after a nonzero number might or might not be significant.\n\nDiagnostic tests are an indispensable portion of the healthcare system, providing important information that will help guide how patients are treated. Chemists play a major part in the manufacture, inspection, and secure handling of chemical goods, along with in product development and basic management. The recordings are displayed on a computer computer software.\n\nOk, I Think I Understand Chemistry Instruments, Now Tell Me About Chemistry Instruments!\n\nCellular localization can perform a role also. For the last seven decades, Illumina’s star has been on the upswing. It has been used by drug organizations to do structures of important drug targets, and it’s utilized to understand fundamental biology that may change medicine later on so it simply goes to explain to you how all these things are linked, he explained.\n\nChemistry Instruments: No Longer a Mystery\n\nUltimately, in the case that you would have to take out the lacquer from your brass instrument, acetone will get the job done well. Whatever the case, it has to be remembered that supporting a toxic or carcinogenic material doesn’t change its hazard with respect to waste disposal. The gas storage room is situated immediately near the principal laboratory’s entrance.\n\nIR and Raman spectral maps can likewise be recorded on precisely the exact same area. No measurement is totally free from error. Laboratory equipment is normally utilized to either carry out an experiment or maybe to take measurements and gather data.\n\n Gửi bình luận\n", "pred_label": "__label__1", "pred_score_pos": 0.8657200932502747} {"content": "Air Purification Technology\n\nAdvanced purifier technology\n\nIt is extremely important to maintain a sanitized production environment to prevent reduction, rejection or complete loss of your valuable crops. Agriair®  utilizes an advanced purifier technology that takes advantage of UV-C Germicidal lights and filtration to sanitize air and hard surfaces.  Agriair®  can remove and destroy even sub-micron sized contaminants such as pathogens, pollen, mold and mildew spores from your indoor grow facility. Our purification process also removes odors before they can be emitted to the outside. This provides protection from regulation penalties and giving away your growing location. Our line of products combine a number of technologies for efficiency, providing safe and economical compliance solutions.\n\nIonic Oxidization – Kills Odors and Contaminants\n\nAgriair® purifiers utilize an ionic oxidization process to remove both bio-contaminants and strong cannabis odors in commercial grow areas. This exclusive oxidation process utilizes dual wavelength UV elements that are targeted onto a catalyst surface. This surface is coated with a proprietary TiO2, Ag, Cu, and hydrophilic coating. UV energy (254nm) striking the target surface activates production of hydroxyl radicals, super oxide ions, and ionized hydro-peroxides (IHP) on the generator cell surface. The hydrophilic surface absorbs humidity from the air which is split into OH radicals in the advanced oxidation process.\n\nThe dual wavelength lamp also emits UV energy at 185 nm. The photon energy at this wavelength is sufficient to split oxygen molecules. These ozone molecules are then quickly reduced back to oxygen by the 254 nm UV energy that is also emitted from the UV element (another type of advanced oxidation reaction). The results from this reaction process also produce OH radicals, super-oxide ions and ionized hydro-peroxides (IHP) similar to the surface reactions discussed earlier.\n\nAs you can see, not only is the target surface active, but so is the air space between the target and the UV element. Ionic Oxidation not only treats the air passing over the cell with germicidal UV light, it also continues to treat the surrounding environment with additional ionized hydro-peroxides and super-oxides. This purification process is very effective at reducing both microbes and odors, something conventional UV systems cannot do.\n\nThese powerful oxidizers destroy microbes, pathogens and other volatile organic compounds by changing their molecular structure and rendering them harmless.  The lifespan of generated oxides is about 15 minutes, after which the unused oxides convert back to H2O and O2 leaving and fresh smelling. This purification process is designed to continuously sanitize your grow area – 24/7.\n\nHEPA Filtration\n\nHigh-efficiency particulate air or HEPA is a type of air filter that has many applications including use in medical facilities, food processing and labs where sterility is essential . HEPA air machines are used to clean the air as well as create positive or negative air pressure containment areas in confined spaces.\n\nIndoor grow environments require air purity equal to that in food processing and medical labs to pass the increasing number of tests and regulations being applied in states that have legalized cannabis. HEPA filters must satisfy standards of efficiency such as those set by the United States Department of Energy (DOE) and must remove 99.97% of all particles greater than 0.3 micrometers from the air passing through the filter. They, in fact, remove 99.99% of the contaminants that growers are most concerned about.\n\nToday’s cannabis users expect high quality and good taste so any hint of the foul taste of mold will launch a negative social media campaign that you don’t want. HEPA filtration is an effective method for removing mold spores, pathogens and pollen from the air and preventing cross-pollination or contamination of your plants.\n\nUV-C Germicidal Irradiation\n\nUV germicidal irradiation is an air disinfection method that uses ultraviolet (UV) light at sufficiently short wavelengths. This irradiation kills microorganisms and is an integral component of the air purifying Ionic Oxidation process. In recent years, UVGI has found renewed application in medical air sanitation and sterile work facilities such as cannabis grow operations. UVGI is effective in destroying the nucleic acids in micro-organisms, disrupting their DNA and leaving them unable to perform vital cellular functions. Using UVGI in grow environments with circulating air systems, creates a deadly effect on micro-organisms such as pathogens, viruses and other pesky invaders.", "pred_label": "__label__1", "pred_score_pos": 0.6446064114570618} {"content": "Midway 2019\n\nThe story of the soldiers and aviators who helped turn the tide of the Second World War during the iconic Battle of Midway in June 1942.\n\nThe King 2019\n\n\nDanger Close: The Battle of Long Tan 2019\n\nFor three and a half hours, in the pouring rain, amid the mud and shattered trees of a rubber plantation called Long Tan, Major Harry Smith and his dispersed company of 108 young and mostly inexperienced Australian and New Zealand soldiers are fighting for their lives, holding off an overwhelming enemy force of 2,500 battle-hardened Viet Cong and North Vietnamese soldiers. With their ammunition running out, their casualties mounting and the enemy massing for a final assault, each man begins to search for the strength to triumph over an uncertain future with honour, decency and courage.\n\nFury 2014\n\nIn the last months of World War II, as the Allies make their final push in the European theatre, a battle-hardened U.S. Army sergeant named 'Wardaddy' commands a Sherman tank called 'Fury' and its five-man crew on a deadly mission behind enemy lines. Outnumbered and outgunned, Wardaddy and his men face overwhelming odds in their heroic attempts to strike at the heart of Nazi Germany.\n\nThe Imitation Game 2014\n\n\nInglourious Basterds 2009\n\n\nDunkirk 2017\n\nThe story of the miraculous evacuation of Allied soldiers from Belgium, Britain, Canada and France, who were cut off and surrounded by the German army from the beaches and harbour of Dunkirk between May 26th and June 4th 1940 during World War II.\n\nFirst Blood 1982\n\nWhen former Green Beret John Rambo is harassed by local law enforcement and arrested for vagrancy, the Vietnam vet snaps, runs for the hills and rat-a-tat-tats his way into the action-movie hall of fame. Hounded by a relentless sheriff, Rambo employs heavy-handed guerilla tactics to shake the cops off his tail.\n\nApocalypse Now 1979\n\nAt the height of the Vietnam war, Captain Benjamin Willard is sent on a dangerous mission that, officially, \"does not exist, nor will it ever exist.\" His goal is to locate - and eliminate - a mysterious Green Beret Colonel named Walter Kurtz, who has been leading his personal army on illegal guerrilla missions into enemy territory.\n\n1917 2019\n\n\nSchindler's List 1993\n\n\nDracula Untold 2014\n\nVlad Tepes is a great hero, but when he learns the Sultan is preparing for battle and needs to form an army of 1,000 boys, he vows to find a way to protect his family. Vlad turns to dark forces in order to get the power to destroy his enemies and agrees to go from hero to monster as he's turned into the mythological vampire, Dracula.\n\nHot Shots! 1991\n\nRecruited to join a top-secret mission for the Air Force, a renegade pilot finds himself coping with an incompetent admiral and a carefully selected squadron of flyers who are either inept or half-blind.\n\nSaving Private Ryan 1998\n\n\nMaster and Commander: The Far Side of the World 2003\n\nAfter an abrupt and violent encounter with a French warship inflicts severe damage upon his ship, a captain of the British Royal Navy begins a chase over two oceans to capture or destroy the enemy, though he must weigh his commitment to duty and ferocious pursuit of glory against the safety of his devoted crew, including the ship's thoughtful surgeon, his best friend.\n\nHacksaw Ridge 2016\n\nWWII American Army Medic Desmond T. Doss, who served during the Battle of Okinawa, refuses to kill people and becomes the first Conscientious Objector in American history to receive the Congressional Medal of Honor.\n\nBraveheart 1995\n\nEnraged at the slaughter of Murron, his new bride and childhood love, Scottish warrior William Wallace slays a platoon of the local English lord's soldiers. This leads the village to revolt and, eventually, the entire country to rise up against English rule.", "pred_label": "__label__1", "pred_score_pos": 0.714388370513916} {"content": "Free probability sheet\n\nProbability sheet\n\nFree probability sheet\n\nThe probability formula sheet summarizes important probability probability concepts , , formulas, with figures, distributions, examples stories. When a six sided die is rolled then what is the probability that the number rolled will be 4? A balance sheet is one of the primary financial statements you can adapt to your personal free finances to gauge your financial health. A business retire debt ( service debt holders), , to pay dividends , asset that generates free more cash than it invests provides a positive FCF that may be used to pay interest buy back stock ( service equity holders). What is the probability that the integer chosen will be divisible by 5? It is based on literature [ 1 6, 3] in- class material from courses of the statistics department at the Univer-. Also games of probability icluding heads tails. Free probability sheet. Distribute the Classroom Activity Sheet , expressing the answer as a fraction, tell students that they are going to work on several probability problems in class, decimal percentage.\nAll cheat sheets round- ups, quick reference cards, quick reference guides quick reference sheets in one page. AdaptedMind has 9 more Probability Worksheets To see these worksheets with 20 math problems each, become a member. Then low behold I found out that you can get printable Yahtzee sheets online for free. the probability that the stick will be purple? This cheat sheet integrates a variety of topics in probability the- ory and statistics. Molecular Model of Nicotine: My friend Daniel is helping free me to reach students in Nigeria. You think of a number from the first thirty negative integers. This is an 10- page probability cheatsheet compiled from Harvard' s Introduction to Probability course, taught by Joe Blitzstein. Which color marble is least likely to be drawn from the bag? You will then have two choices. Free probability sheet. For high school Math students the Green Orange links on the right lead to pages which demonstrate the main topics of high school Math. This will take you to the individual page of the worksheet. Kids love this idea!\nIt is a book about estimating time comes with activities stopwatch. free They are placed in a bag and one is drawn at random. What is the probability of drawing the black marble from the bag? Students may work individually or with partners. Probability and Statistics Worksheets. Probability Cheat Sheet Distributions Unifrom free Distribution notation U[ a; b] cdf x a b a. Receive free lesson plans printables, worksheets by email:. If you your child are studying elementary level Math the Blue link on the right leads to a set of selected lessons.\n\nYou can even play online using a computer smartphone free tablet. Probability Cheatsheet v2. Then print as many cards as you need. Probability is the branch of mathematics that studies the free possible outcomes of given events together with the outcomes' relative likelihoods and distributions. Click on the free probability worksheet you would like to print or download.\n\nIn common usage the word \" probability\" is used to mean the chance that a particular event ( , set of events) will occur expressed on a linear scale from 0 ( impossibility) to 1 ( certainty) also expressed as a percentage between %. In this lesson, we' ll discuss what a balance sheet can tell you. Free Probability Worksheets for Teachers Parents, Kids. It covers a semester' s worth of probability tips, common distributions, , equations, formulas, problems, including summaries of main topics a distribution reference sheet. Find , customize one of the thousands of ready- made bingo cards create your own.\n\nfree The following is a 8- page cheat sheet on probability based off my notes as a Teaching Fellow for Joe Blitzstein ' s Stat 110 class. 0 Compiled by William Chen com) Yuan Jiang, Joe Blitzstein, with contributions from Sebastian Chiu, Yuqi Hou, . Probability Density Function F X ( x) = Z 1 1 f X t) dt Z 1 1 f X( t) dt= 1 f X. Probability The marbles pictured below are gray , white black. Easily download and free print our probability worksheets. A collection of various forms of probability. There is a book called StopThe Watch. Or, did you know you can practice Probability online for free? Unlevered free cash flow ( \" UFCF\" ) is the cash flow available to all providers of capital including debt, , equity hybrid capital.\n\nI' ve done some free looking around and found some of the free better Yahtzee score cards out there. What is the probability of drawing a gray marble?\n\nProbability free\n\nProbability worksheet for 7th grade children. This is a math PDF printable activity sheet with several exercises. It has an answer key attached on the second page. Basic Probability Reference Sheet 17. 846, This is intended to be used in addition to, not as a substitute for, a textbook.\n\nfree probability sheet\n\nX is a random variable. This means that X is a variable that takes on value X with probability x.", "pred_label": "__label__1", "pred_score_pos": 0.9748943448066711} {"content": "Colin Hay El Cajon Concert Tickets\n\nColin Hay is performing on Sat, 29 Feb at The Magnolia Performing Arts Center, El Cajon, CA. Ticket prices of pop rock event vary depending on demand but right now you can get them for approximately $80. So hurry up and get your Colin Hay tickets before they are sold out.", "pred_label": "__label__1", "pred_score_pos": 0.600867748260498} {"content": "NLC/ITUC Global President,Comrade Ayuba Wabba attends the memorial anniversary of victims of the Hiroshima bombing in Japan\n\nThe NLC President Comrade Ayuba Wabba mni,  was in Hiroshima Japan, in his capacity as the president of ITUC GLOBAL , to attend the anniversary/memorial of victims of Hiroshima bombing and ITUC declaration of a need for a peaceful world.\n\nPictures from the Visit:\n\nCongress president Comrade Ayuba Waba mni, arrives Hiroshima to a rousing welcome by the working people of japan ( Rengo Japan)\n\nComrade President at the Nagasaki memorial event , in attendance was the prime minister of Japan.\n\nCongress President ,Comrade Ayuba wabba mni, speaking at the Advocacy Rally for a Peaceful World, in Hiroshima/Nagasaki", "pred_label": "__label__1", "pred_score_pos": 0.8920590281486511} {"content": "Pictionary Play With Computer will Soon be A Reality\n\n\nAn image-based word prediction game has been developed by researchers by Department of Computational and Data Sciences at Indian Institute of Science. This computational model aims to play with the humans guessing the word for the picture drawn by the computer.\n\nThe fact that deep learning and immense progress in artificial intelligence has provided mankind with the tools to develop games which in some cases wins over human intelligence. Games like Double jeopardy, GO!, and online poker were already grabbing the attention of online gamers but now the introduction of AI based Pictionary game will fetch more online gaming audiences. IBM had developed the well-known chess playing game known as ‘Deep Blue’ in 1997, which defeated the then world champion Gary Kasparov, becoming the first machine to defeat a human.\n\nThis game is played based on guessing power of a human, preferably played in teams. Members of the team tries and guesses a word from the set of images drawn by another team member.  As the game progresses the pictures get disclosed. Similarly, the Visual Question and Answering (VQA) technique is used in computers to create sense of its surroundings. In order to build the Pictionary game, VQA and games are merged together creating a model to play Pictionary.\n\n\nA Pictionary style guessing job was created by the researchers known as Sketch Question Answering (Sketch-QA). In this style the humans guess the picture based on hand drawn images. The image is revealed one stroke at a time to the guessers, while prompting the users to guess every object after each stroke.\n\nThere are over 16624 guess sequences of 1108 subjects across 160 object categories, all included in a dataset named as GUESSWORD-160. Machine learning will be used to understand different decisions and collaborations made by humans gradually opening up the opportunity to imitate exactly like humans.", "pred_label": "__label__1", "pred_score_pos": 0.9998605251312256} {"content": "Roll Forming\n\nOur Roll Forming Capabilities & Equipment\n\nRoll forming is a type of rolling that involves continuously bending a long strip of sheet metal until the desired cross-section, or profile, is obtained. Roll forming is ideal for producing constant-profile parts with long lengths when large quantities are needed. Roll-formed sections have some advantages over extrusions of similar shapes:\n • Most roll-formed parts are much lighter, with thinner walls possible.\n • Roll Formed parts are usually stronger, having been work hardened in a cold state.\n • The parts can be made having a finish or already painted.\n • The process of roll forming is very rapid and takes much less energy than extruding parts.", "pred_label": "__label__1", "pred_score_pos": 0.6816623210906982} {"content": "The Kellogg Brothers, Breakfast, and Religion\n\nInformed by their religious faith, the siblings merged “spiritual” with physical health. The popular singer and movie star Bing Crosby once crooned, “What’s more American than corn flakes?” Virtually every American is familiar with this iconic cereal, but few know the story of the two men from Battle Creek, Michigan who created those famously crispy,[…]\n\nThe Medieval Southeast Asian Khmer Empire\n\nThroughout the empire’s history, Khmer’s court was repeatedly concerned with putting down rebellions. By Rodrigo Quijada PlubinsHistorian The Khmer empire was a powerful state in South East Asia, formed by people of the same name, lasting from 802 CE to 1431 CE. At its peak, the empire covered much of what today is Cambodia, Thailand, Laos, and southern Vietnam.[…]\n\nOn the Pallava Trail in Kanchipuram\n\nThe creativity of the Pallavas did not diminish throughout their reign. By Anantha Krishnan Introduction The Pallavas ruled south-eastern India from the 3rd through the 9th centuries CE. Their empire covered what is today the Tamil Nadu state. Their origin is shrouded in mystery though historians believe their roots might have been from Andhra Pradesh[…]\n\nHow Modern Disputes Have Reshaped the Ancient Canaanite City of Banias\n\nBanias was first settled by the Canaanites c.198 BCE and later renamed Caesarea Philippi by the Romans in 4 BCE. In the complex world of Middle Eastern boundary disputes, spare a thought for Banias, the ancient City of Pan. Straddling a strategic crossroads, it has for centuries seen masters come and go. Today’s tug-of-war is[…]\n\nArchaeology and Religion in Late Bronze Age Canaan\n\nNumerous excavations and a fairly large number of contemporary written documents give us a good picture of the religious system and cult practices in Canaan. Abstract Dozens of temples were excavated in the Canaanite city-states of the Late Bronze Age. These temples were the focal points for the Canaanites’ cultic activities, mainly sacrifices and ceremonial[…]", "pred_label": "__label__1", "pred_score_pos": 0.9647763967514038} {"content": "Amoxicillin used to treat\n\nDiscussion in 'Canadian Pharmacies Top Best' started by TermoDriver, 06-Sep-2019.\n\n 1. agapoff Well-Known Member\n\n Amoxicillin used to treat\n\n Amoxicillin is used to treat certain infections caused by bacteria, such as pneumonia; bronchitis (infection of the airway tubes leading to the lungs); and infections of the ears, nose, throat, urinary tract, and skin. It is also used in combination with other medications to eliminate , a bacteria that causes ulcers. Amoxicillin is in a class of medications called penicillin-like antibiotics. Antibiotics such as amoxicillin will not work for colds, flu, and other viral infections. Taking antibiotics when they are not needed increases your risk of getting an infection later that resists antibiotic treatment. Amoxicillin comes as a capsule, a tablet, a chewable tablet, and as a suspension (liquid) to take by mouth. It is usually taken every 12 hours (twice a day) or every 8 hours (three times a day) with or without food. The length of your treatment depends on the type of infection that you have. It's used to treat bacterial infections, such as chest infections (including pneumonia), dental abscesses and urinary tract infections (UTIs). It's used in children, often to treat ear infections and chest infections. It comes as capsules or as a liquid that you drink. It's also given by injection, but this is usually only done in hospital. If you take it 3 times a day, this could be first thing in the morning, mid-afternoon and at bedtime. Swallow amoxicillin capsules whole with a drink of water. Amoxicillin is available as a liquid for children and people who find it difficult to swallow tablets. The usual dose of amoxicillin is 250mg to 500mg taken 3 times a day. If you or your child are taking amoxicillin as a liquid, it will usually be made up for you by your pharmacist. The medicine will come with a plastic syringe or spoon to help you measure out the right dose. If you don't have one, ask your pharmacist for one. Do not use a kitchen teaspoon as it will not give the right amount.\n\n Where can i buy cheap viagra in the u k Buy kamagra jelly in london\n\n Amoxicillin is an antibiotic often used for the treatment of a number of bacterial infections. It may be used for middle ear infection, strep throat, pneumonia, skin infections, and urinary tract infections among others. Amoxicillin also is sometimes used to treat Lyme disease, to prevent anthrax infection after exposure, and to treat anthrax infection of the skin. Talk with your doctor about the possible risks of using this medication for your condition. Amoxicillin is an antibiotic. It's used to treat bacterial infections, such as chest infections including pneumonia, dental abscesses and urinary tract infections UTIs. It's used in children, often to treat ear infections and chest infections. The medicine is only available on prescription. It comes as capsules or as a liquid that you drink.\n\n If these effects are mild, they may go away within a few days or a couple of weeks. If they’re more severe or don’t go away, talk to your doctor or pharmacist. Call your doctor right away if you have serious side effects. Call 911 if your symptoms feel life-threatening or if you think you’re having a medical emergency. Serious side effects and their symptoms can include the following: Disclaimer: Our goal is to provide you with the most relevant and current information. However, because drugs affect each person differently, we cannot guarantee that this information includes all possible side effects. This information is not a substitute for medical advice. Amoxicillin is used to treat a wide variety of bacterial infections. Amoxicillin is also used with other medications to treat stomach/intestinal ulcers caused by the bacteria H. Take this medication by mouth with or without food as directed by your doctor, usually every 8 or 12 hours. Using any antibiotic when it is not needed can cause it to not work for future infections. It will not work for viral infections (such as common cold, flu). The dosage is based on your medical condition and response to treatment. Drink plenty of fluids while using this medication unless your doctor tells you otherwise. For the best effect, take this antibiotic at evenly spaced times. To help you remember, take this medication at the same time(s) every day.\n\n Amoxicillin used to treat\n\n AMOXICILLIN - MedicineNet, Amoxicillin MedlinePlus Drug Information\n\n 2. Metformin liver failure\n 3. Buy viagra madrid\n 4. Amoxicillin is a an antibiotic used to treat a wide range of bacterial infections. Take a look at some of the things amoxicillin can be used for here.\n\n • Amoxicillin Uses, Side Effects, Interactions and.\n • Amoxicillin antibiotic to treat bacterial infections - NHS.\n • Amoxicillin Oral Uses, Side Effects, Interactions, Pictures..\n\n What Is Amoxicillin?UsesHow Is amoxicillin Taken?Side EffectsInteractionsOther Precautions Uses. Amoxicillin is used to treat a wide variety of bacterial infections. This medication is a penicillin-type antibiotic. It works by stopping the growth of bacteria. Amoxicillin is an antibiotic. It’s used to treat infections caused by certain types of bacteria. Amoxicillin oral tablet comes as immediate-release IR, extended-release ER, or chewable tablets.\n\n 5. UJey Guest\n\n It is also used for liver cirrhosis, kidney impairment, nephrotic syndrome, in adjunct therapy for swelling of the brain or lungs where rapid diuresis is required (IV injection), and in the management of severe hypercalcemia in combination with adequate rehydration. Furosemide also can lead to gout caused by hyperuricemia. The tendency, as for all loop diuretics, to cause low serum potassium concentration (hypokalemia) has given rise to combination products, either with potassium or with the potassium-sparing diuretic amiloride (Co-amilofruse). Other electrolyte abnormalities that can result from furosemide use include hyponatremia, hypochloremia, hypomagnesemia, and hypocalcemia. Furosemide, like other loop diuretics, acts by inhibiting the luminal Na-K-Cl cotransporter in the thick ascending limb of the loop of Henle, by binding to the chloride transport channel, thus causing sodium, chloride, and potassium loss in urine. The action on the distal tubules is independent of any inhibitory effect on carbonic anhydrase or aldosterone; it also abolishes the corticomedullary osmotic gradient and blocks negative, as well as positive, free water clearance. Because of the large Na Cl absorptive capacity of the loop of Henle, diuresis is not limited by development of acidosis, as it is with the carbonic anhydrase inhibitors. Additionally, furosemide is a noncompetitive subtype-specific blocker of GABA-A receptors. Some of the brand names under which furosemide is marketed include: Aisemide, Apo-Furosemide, Beronald, Desdemin, Discoid, Diural, Diurapid, Dryptal, Durafurid, Edemid, Errolon, Eutensin, Flusapex, Frudix, Frusetic, Frusid, Fulsix, Fuluvamide, Furesis, Furix, Furo-Puren, Furon, Furosedon, Fusid.frusone, Hydro-rapid, Impugan, Katlex, Lasilix, Lasix, Lodix, Lowpston, Macasirool, Mirfat, Nicorol, Odemase, Oedemex, Profemin, Rosemide, Rusyde, Salix, Seguril, Teva-Furosemide, Trofurit, Uremide, and Urex. WARNING LASIX furosemide is a potent diuretic which, if given. Diuretics – Knowledge for medical students and physicians - Amboss Lasix - Uses, Side Effects, Interactions -\n 6. 1000sitov Well-Known Member\n\n Cheap accutane singapore Buy accutane 20mg In an argu-ment by deduction, if the premises provide valid evidence, then the proposition logicallymust follow Lum, 2002. InHaubrich WS cheap accutane singapore Schaffner F, Berk JE, Bockus HL, editors. Adolescent and schoolhealth Childhood obesity facts.\n\n Cheap accutane singapore Where can i order accutane online", "pred_label": "__label__1", "pred_score_pos": 0.5184277296066284} {"content": "ReturnChapter 502: Who Dares to Act Recklessly, Seeking Death!  Invincible首页\n\nturn off the light Eye Protection    \n\nFont:Big Middle Small\n\nPrevious Index Next Add Bookmarks\n\nChapter 502: Who Dares to Act Recklessly, Seeking Death!\n\nLaw Enforcer Chen Xiaofeng joined in Xie Hui’s laughter, “What Young Lord said is right, this Zhao Shu’s order for all Asura’s Gate disciples to withdraw back to the Central Oblast territory has instead helped us save a lot of time, otherwise going around oblast by oblast to exterminate their disciples would be very troublesome and time consuming.”\n\n“Still, Huang Xiaolong might’ve heard about our nine super forces alliance by now.” Law Enforcer Elder Hu Chen commented.\n\nXie Hui snickered, “It’s better that he finds out! He’s far away on the Ten Directions Continent so it’s useless even if he finds out, he has no way to stop the destruction of the Asura’s Gate!”\n\n“Then, Young Lord, will we be using the nine super force alliance’s power and start attacking the Asura’s Gate tomorrow?” Hu Chen asked.\n\n“There's no hurry.” Xie Hui waved his hand. “The Asura’s Gate is already a piece of meat on the cutting board, at our mercy. Tomorrow, we’ll hold a pre-celebration feast for the nine super force alliance to relax ourselves a little and discuss how to divide the Asura’s Gate thirty-six oblasts once we’ve annihilated them. We’ll gather the disciples the day after tomorrow to begin our attack on the Asura’s Gate!”\n\nIf things were to be divided fair and square amongst the nine super forces, each force would be getting four oblasts. However, Xie Hui was unwilling for things to be divided in such manner.\n\nThe passage of time flowed as another day passes by.\n\nIn the end, after long deliberation, the nine super forces alliance finally reached an agreement on how the to divvy up the Asura’s Gate thirty-six oblasts as well as the treasures in its treasure trove and other resources.\n\nOn the third day, the nine super forces organized their disciples, departing from Cosmos God City, heading straight toward the Asura’s Gate headquarters.\n\nThe Cosmos God Cult had truly exerted its full force of experts, the number of their Xiantian realm disciples reached ten million!\n\nOn top of that, the Distinct Void Door, White Phoenix House, and the other super forces assembled all their Saint realm experts. Some brought five million Xiantian realm disciples, some six million, and others four million!\n\nThe number of Xiantian realm disciples that the nine super forces alliance brought together exceeded an earth-shattering sixty-three million!\n\nMore than sixty-three million Xiantian realm disciples! This number was enough to frighten any prominent force in the Martial Spirit World.\n\nThe nine forces alliance’s expedition cast a huge shadow over the world wherever they trampled past.\n\nA massive army of sixty-three million Xiantian realm disciples, just their breaths alone could form a great cyclone that span for miles, raising a thick curtain of sand and dust, resembling an impending doomsday.\n\nTwo days later.\n\nThe alliance’s massive army reached a place called Large Central Plains, where Xie Hui gave the order to rest.\n\n“What’s the place in front?” Xie Hui asked.\n\n“Replying to Young Lord, three hundred li up ahead is the Great Rift River Point Valley.” Chen Xiaofeng replied.\n\n“Oh, Great Rift River Point Valley,” Xie Hui gave a small chuckle, “I heard that the River Point inside this Great Rift River Point Valley has a kind of delicious fish called River Point Fish.”\n\nHu Chen smiled widely, “Once we reach there, we’ll tell the disciples to catch some so Young Lord can have a taste.”\n\nXie Hui nodded.\n\nOne hour later, the massive army departed, reaching the Great Rift River Point Valley in no time.\n\nJust when Xie Hui was about to lead the army to enter the valley, Chen Xiaofeng suddenly spoke, “Young Lord, the terrain of the Great Rift River Point Valley is dangerous, we must prioritize safety first. This subordinate suggests sending ten thousand disciples to pass through the valley, to scout the terrain.”\n\nWhen Xie Hui heard this, he and the experts from other forces laughed aloud.\n\nThe Distinct Void Door’s Sovereign, Liu Zhiding said, “Law Enforcer Chen, you’re too cautious. Our nine super forces alliance shall kill even Gods if Gods block our path, kill Buddhas if Buddhas block our path! Even if an early God Ream master comes across us, they would need to give way to the side. Who would dare to act recklessly, seeking death as to ambush us? That’s no different than digging their own grave!”\n\nBut then again, the Distinct Void Door Sovereign’s words were no exaggeration.\n\nWith the nine super forces combining their strengths, including the families and sects under their allegiance, they had over one thousand two hundred Saint realm experts amongst them. Adding the massive army of sixty-three million Xiantian realm disciples, even if a God Realm Master appeared, they had no need for fear.\n\nXie Hui lifted an arm and waved gallantly, “March on!” Riding on his mount, Xie Hui, Distinct Void Door Sovereign Liu Zhiding, and White Phoenix House’s experts led the massive army into the Great Rift River Point Valley.\n\nHigh above, hidden in the void, a cold smirk appeared on Huang Xiaolong’s face as he watched the situation below, looking at the nine super forces alliance army entering the Great Rift River Point Valley.\n\nAbout one day prior, he had reached this Great Rift River Point Valley.\n\nHowever, even he had to admit that an army of sixty-three million was a little too much, one-fourth of its number already filled the entire valley from one end to the other.\n\nJust when Xie Hui was about to exit the Great Rift River Point Valley, the bright sun shining above suddenly dimmed, which made Xie Hui and the others look up curiously, seeing a giant flag that had appeared in midair. In the blink of an eye, a raging ghost aura gushed out like a broken dam, covering all four directions. Before anyone could react, the entire Great Rift River Point Valley was trapped inside an array.\n\n“There’s an ambush!” Xie Hui yelled. Yet, a part of him refused to believe that there really would be someone who dared to lay an ambush on the Great army of the nine super forces alliance!\n\nRecovering quickly after a momentary shock, the Distinct Void Door Sovereign Liu Zhiding actually laughed, “I didn’t expect, ah! There really are people who aren't afraid of death, daring to ambush us.”\n\nExperts of the Distinct Void Door, White Phoenix House, and others echoed his laughter. Evidently, none of them put this ambush attempt in their eyes. Having more than a thousand Saint realm experts and over sixty million Xiantian realm disciples on their side, why would they need to sweat such a measly ambush?\n\nHowever, in the next second, they saw the surging ghost aura turn into evil spirits and devils, exuding monstrous momentum.\n\n“These, these are Saint realm ghost creatures?!” Faces ashen.\n\n“Attack!” A cold voice rang in the void above, followed by a tide of fists, cutting palms, saber energies and more raining down in a torrent from above, submerging the valley below.\n\nThe nine super forces alliance’s disciples were drowned under these fists, palms, and saber attacks. Bodies were exploding left and right, some disciples were split into halves by the sword qi.\n\nSome Distinct Void Door, White Phoenix House, and others of the Elder rank were also sent flying due to delayed reactions.\n\n“It’s Huang Xiaolong!” Xie Hui blurted out in anger.\n\n“That’s his Devils and Ghosts Flag!” A cold quiver ran down Distinct Void Door Sovereign Liu Zhiding’s body, staring in shock at the giant flag hovering above. He finally guessed what that thing in the sky was.\n\nWhen the experts heard Xie Hui and Liu Zhiding’s words, many of them turned a deathly shade of white. Barely a second after their voices sounded, countless black spots emerged on the horizon, whistling through the air in their direction.\n\n“Poi-Poison Corpse Scarabs!” Terrified voices sounded like undulating waves.\n\n“Damn it, why would Huang Xiaolong appear here?!”\n\n“Isn’t he supposed to be on the Ten Directions Continent?!” Xie Hui was raging at the top of his lungs.\n\nHigh up in the void, a quick smirk flickered across Huang Xiaolong’s face before returning to his usual stoic face. He ordered the Ten Direction Continent experts to continue attacking while a thousand arms fanned out behind him. Aiming at the alliance’s group of Elders below in the Great Rift River Point Valley, Huang Xiaolong sent down a thousand Great Void Divine Fists.\n\n\nThe earth and mountains shook, screams and wails weaving in and out of the air.\n\nPanicked and caught unprepared, in an instant, close to a hundred Elders from the Cosmos God Cult, Distinct Void Door, White Phoenix House, and other super forces exploded from being hit by Huang Xiaolong’s volley of Great Void Divine Fists\n\nEverything happened according to Huang Xiaolong’s plan, using the Devils and Ghosts Flag to support the Ten Directions Continent experts as they mainly attacked the alliance’s disciples, whereas the Poison Corpse Scarabs aided Huang Xiaolong in attacking the Elders.\n\nAfter one full power Godly Xumi Art combined with the Great Void Divine Fist, Huang Xiaolong made another Godly Xumi Art attack with the Absolute Soul Finger. The Cosmos God Cult and Distinct Void Door lost a dozen Saint realm Elders from his attack, having their foreheads pierced through.\n\nPrevious Index Next Add Bookmarks", "pred_label": "__label__1", "pred_score_pos": 0.6276667714118958} {"content": "Susana Aikin - Epic Historical Romance During Bolshevik Revolution\n\nSusana Aikin - Epic Historical Romance During Bolshevik Revolution\n\nBorn in Spain of an English father and a Spanish mother, Susana Aikin is a writer and a filmmaker who has lived and worked in New York City since 1982. She was educated in both England and Spain; studied law at the University of Madrid, and later Creative Writing at Manchester Metropolitan University, UK. In 1986, she started her own independent film production company, Starfish Productions, producing and directing documentary films that won her multiple awards, including an American Film Institute grant, a Rockefeller Fellowship, and an Emmy Award in 1997. She started writing fiction full time in 2010. As our Author of the Day, Aikin tells us all about her latest book, We Shall See the Sky Sparkling.\n\nPlease give us a short introduction to what We Shall See the Sky Sparkling is about.\n\nWe Shall See the Sky Sparkling is an Edwardian tale of a talented young actress disinherited by her father, who reaches great artistic heights on the London stage, only to be betrayed and whirled into a romance with a Russian count with whom she absconds to faraway Siberia.\n\nWhat inspired you to write an epic historical romance?\n\nThere was an ancestress on my paternal grandmother’s side that had a shady legend in the family, and whom I grew up fascinated about. She left her family to work in the theater and ended up traveling all the way to Russia and across Siberia- that was my first draw to write the novel. I really wanted to explore the life of a Victorian young woman who had traveled into the Far East through Russia and Siberia. I had also grown up reading pre-revolutionary Russian authors like Tolstoy, Turgenev, Dostoyevski, Chekhov, etc, and have always been interested in 19th century and turn of the century Russia.\n\nTell us about Lilly.  What makes her tick?\n\nLily is a Victorian ‘bad girl’ who follows her heart and pursues her passion for the theater, and has the courage to plunge into life and seek her path even if it leads to mistakes, and brings her to dangerous moments. Women like her are the pioneers of the modern women we so admire today.\n\nYou lived both in England and in Spain.  How has this influenced your writing?\n\nI grew up in a bilingual family and attended schools in both England and Spain. I think it was simultaneously an immensely enriching experience, as well as a complicated one at times. I also think it is the reason behind my taking so long to write in earnest because it took me decades to integrate both languages and cultures in my brain. I think it adds lots of texture and insight to my writing.\n\nBesides writing, what other secret skills do you have?\n\nI’m a meditator and a yoguini, a pro in holistic health, and I have an extensive background in filmmaking.\n\nClass disparity is a central theme in this book. Why was this important to write about?\n\nClass disparity is important in the novel because the freedom Lily acquires when she leaves home and gives up being a docile and obedient middle-class girl is, in part, the ability to navigate freely in society, and in the art and theater world, alongside all sorts of people from all sorts of backgrounds. Art and artists tend to break class boundaries because their work predicates on universal human tropes, and things like class, income, religion, race, etc. are relegated to circumstantial elements at best.\n\nWhen working on a novel, how do you immerse yourself in the main characters' lives? Do you observe people in a certain culture, or do you try to walk in their shoes?\n\nI find myself becoming completely and increasingly obsessed with my characters as I write, to the point where they feel real, and I can see them, the way they walk, sit, smile, scowl, etc.;I can even hear them talking or thinking aloud (all of this, of course, in my mind’s eye.) In short, I get to know them very well, and they seem to take on a life of their own. This means that many times it is they who dictate what they are going to do, or even what they refuse to do. Of course, I start off by doing a lot of research on the time period, and the type of persons they would be. I look at lots of pictures, films, I read books that I believe have similar characters, and then one day, they are there, perfectly formed in my mind. At that moment, I just put them in scenes and follow them around.\n\nYou write about some heavy themes—things that many of your readers have probably never experienced—yet it's very easy to identify with your characters. How do you make them so relatable?\n\nI think most people go through very heavy things in their lives, the real stuff of high drama, although many times they don’t identify it as such, and just plow through as if it were another baffling stretch related to miserable times. In this sense, we are all unsung and undervalued heroes. But when we read stories where characters go through similar things, then we begin to recognize our own predicament, and are able to value it properly as part of our human experience. When, as a writer, you decide to humanize characters and give them enough depth, then readers identify with their experiences.\n\nIn this book you’re dealing with so many difficult themes – as a writer, do you feel a sense of responsibility? If so, how do you deal with this?\n\nI do think writers have responsibility in what is being written and depicted in our work. After all, the community has given us a voice in the general culture, and needs us to speak candidly about things and use our shout outs to bring understanding as well as solace to readers. Of course, there is many ways of doing this—drama is one, but other genres, in particular comedy, can do this very effectively too.\n\nIf you had a book club, what would it be reading — and why?\n\nThere are so many amazing books out there… it is always difficult to choose. But a mixture of classical literature and contemporary would be on the agenda. After all, good writing is timeless.\n\nDo you have any interesting writing habits? What is an average writing day like?\n\nI get up early, make a big pot of tea, walk my dog around the block, and get back into bed where I write for 3 or 4 hours. I know it sounds sloth-like, but it works well for me.\n\nLeft: Me, hard at work.  Right: My ancestress, Gertrude Throop Cable, on whose story the novel is based.\n\nWhat are you working on right now?\n\nI am working on a novel about the American Lincoln Brigade of volunteers who went to Spain in 1936 to fight alongside the resistance against General Franco’s fascist troops, who, backed up by Hitler and Mussolini, had initiated a military coup against the democratically elected government. The story is told through a twenty-four year old American woman who joins the Medical Unit that follows the International Brigades along the front.\n\n\nMy website:\n\nTwitter: @Susana_Aikin\n\n\n\nPat Dunlap Evans - Suspenseful Ride Through Dallas High Society\nFEATURED AUTHOR - Pat Dunlap Evans was born in Michigan but \"got to Texas as soon as I could.\" Her family lived in San Antonio and later Dallas, where she attended South Oak Cliff High School and Southern Methodist University. After marrying and having three children, Pat later completed bachelor's and master's degrees in English / Creative Writing at the University of Missouri branch in Kansas City, where her then-husband quarterbacked the Kansas City Chiefs. After a divorce, Pat stressed her way as a single… Read more", "pred_label": "__label__1", "pred_score_pos": 0.9544087648391724} {"content": "XXVII European Society for Rural Sociology Conference\n\nActiviteit: Deelnemen aan een evenement of er een organiserenOrganisatie en deelname aan een congres\n\nCharlotte Prové - Spreker\n\n Europe is facing multiple processes of change that affect the rural in many ways: demographic evolutions, migration flows, renewed urban-rural relations, the rise and fall of alternative food networks vis-à-vis the seeming omnipresence of powerful food consortia, the changing power of constituencies of the rural, changing patterns of land use and valorizations of natural resources, rapid technological developments, etc. These change processes do not occur in isolation, but are embedded in a package of often interrelated external meta-trends (such as climate change, geo-politics, global markets) that position rural spaces in broader dynamics and result in uneven processes of change. The European Society for Rural Sociology has explored many of these processes in former conferences.\n\n These uneven processes of rural change are interconnected and multi-level, involving multiple actors and governance approaches. They re-confirm the inadequacy of outdated concepts and dichotomies such as the urban-rural divide, the globalization-localization dichotomy or the disciplinary/academic segmentation of a complex reality. They are no longer able to capture the complex and systemic nature of today's Europe, its countryside and the ongoing processes of change. We can question how we (in our multiple roles as scientists, citizens, policy makers, members of the business community or NGO representatives) can deal with this.\n\n\n CongresXXVIIth European Society for Rural Sociology Conference\n Bekijk grafiek van relaties\n\n ID: 5514943", "pred_label": "__label__1", "pred_score_pos": 0.589073896408081} {"content": "Namaste people!\n\n\nview from the Nagarkot Tower\n\nFrom Kathmandu with love….\n\n” Namaste: an ancient Sanskrit greeting still in everyday use on the trail in the Nepal Himalaya. It means “I bow to the God within you”, or “The Spirit within me salutes the Spirit in you” beautiful!\n\nToday, I want to share with you some amazing lessons from Nepal’s approach to conservation, climate change and people’s livelihoods.\n\nWe have heard a lot of stories about the conflicts between people and wildlife in buffer zones of protected areas. And how challenging it is to find good measures to  deal with this. In Nepal, small holders in rural communities see their staple crops affected by deers, wild rhinos, elephants, monkeys and climate change. For these communities, wildlife is a constant threat to their lives, food security and economy.  An innovative solution to increase communities’ resilience to climate change and to mitigate human-wildlife conflict  is the cultivation of crops that are not appealing to wildlife. Yes!   Communities here plant mint, lemon grass, chamomile and other aromatic plants to extract essential oils and export them abroad. Wild animals seem to not like these plants very much and they stay away from this kind of crops. Isn’t it great? People practice this in between the cultivation of their traditional crops such as rice, wheat and maize, so their food is secured as well.  The result at the end, is an opportunity for small holders to increase their resilience to climate change by having an alternative source of income, a reduction of the conflicts between wildlife and people, and an interesting approach to conservation in buffer zones. Maybe, this could be an innovative solution for a better management of buffer belts around protected areas. This is my lesson learnt from Nepal… 🙂\n\n\nBusiness ideas for Conservation\n\n\nOtonga Cloud Forest\n\nI’ve been called ‘idealist” several times in my life, especially when the discussions are around business, consumption patterns and biodiversity conservation. BUT I do believe that there are different ways of doing business, different ways of consuming…and more important I do believe that business can enhance the protection of the natural environment and that consumers have the right and the power of choosing sustainable and ethical products. Here are some of my ideas of innovative business models that might work…\n\nWild orange marmalade from Otonga- My business innovation idea for the conservation of the Otonga Cloud Forest- part 1\n\nIn a nutshell, the idea is to sell the best wild orange marmalade to the best restaurant(s) in Quito. The chef will prepare the best dessert based on wild orange marmalade and row sugar from the Otonga Cloud forest. The best-informed clients  will attend the restaurant and pay a fair price for eating a delicious dessert that has a social and environmental purpose. The owner of the restaurant, will invest part of its revenues in the sustainability of its source of production (wild oranges + row sugar + local entrepreneurs of the area). Sounds good right?naranja agria\n\n\n– The environment is seen as an opportunity for investment rather than as an externality.\n\n– Profit for the marmalade producers and the restaurant.\n\n– Low-income communities in Ecuador can improve their livelihoods by running social enterprises compatible with biodiversity conservation.\n\n– Protection of the cloud forest in Ecuador\n\n– Awareness rising among consumers in Quito\n\nWho’s joining me in my start-up? 😉\n\n\n\n‘While the rainforest is politically divided, the biome is one’ – Kakabadse\n\nby: Miren Gutierrez, CDKN Global | on: 8am, June 11, 2015\n\nFind the original version at CDKN website\n\nYolanda Kakabadse – the indefatigable defender of sustainability – is a former Ecuadorian Minister of Environment and the current International President of WWF. Kakabadse also founded CDKN alliance partner Fundacion Futuro Latinamericano, is a member of CDKN’s Network Council and has been involved in the Amazon Security initiative. In this interview with Miren Gutierrez, she explores the challenges facing Amazonian countries in managing this key resource.\n\nYou have been reported as saying that people, and more importantly decision-makers, pay more attention to sudden weather-related disasters than to biodiversity loss in Amazonian countries? Is that so? What can be done?\n\nSudden weather related disasters create a sense of urgency. They usually come along with casualties, people’s losing their housing and livelihoods, damaged infrastructure and many other impacts that affect a society’s dynamic. These events create commotion and the need for immediate government action; there is no discussion about the importance for decision-makers to pay close attention to weather disasters since they are becoming more frequent and intense with climate change. Implementing adaptation plans that reduce their population’s risk and vulnerability is a priority and action is needed now\n\nThe need to urgently tackle biodiversity loss is equally important. Yet, this issue seems to be a laggard in the government priority agenda. Most people do not realise the direct relation between biodiversity and our well-being. Biodiversity plays a key role in creating resilient ecosystems and providing vital services such as water, clean air and climate regulation. Additionally, for thousands of years, species have inspired our cultures and helped us build our identity. A world only inhabited by humans is unviable.Erotylidae- Yasuni National Park\n\nThe Stockholm Resilience Centre has identified 9 planetary boundaries within which humans can live safely. According to their studies, we have transgressed the biodiversity boundary to such point that we might be entering the sixth extinction phase in the planet. Sadly, humans drive this one. The latest Living Planet Report by WWF affirms that the state of the world’s biodiversity is worse than ever: during the last 40 years vertebrate species have halved. Most of these losses are occurring in the most biodiverse regions in the world. In the Amazon continent, the report showed an 83% loss of the species analyzed. So if you look at scientific evidence, you will see that it is truly dramatic what is happening with biodiversity and the ecosystems on which they depend; this destruction is one of the most important causes of the devastating sudden weather events we are experiencing. Unfortunately, we are still unable to feel the urgency and this inaction will bring irreversible consequences.\n\nCDKN has reported a ‘human security crisis’ caused by climate change and ‘mismanagement of natural resources’ in the Amazon. As habitat destruction trends interact with climate change, the concern is that the Amazon will be caught up in a set of “feedback loops” that could dramatically speed up the pace of forest loss and degradation and bring the Amazon Biome to a point of no return, reports WWF. How are initiatives such as Amazon Security initiative going to contribute to improving the situation?\n\nClimate change is the greatest challenge we will face in this century. Especially, because it will impact health, water, food and energy security and will increase vulnerability and risk for the region’s growing economies and populations. Climate change will transform the Amazon ecosystem. If climate impacts are not managed to avoid getting caught in a set of feedback loops, the transformation will be amplified until there is a point of no return. If we do nothing, climate change will bring devastating consequences and neither the Amazon nor the world will be as we know it. If we avoid this scenario and work together to build a resilient ecosystem, Amazonia can help us adapt better to climate change.\n\nA rainforest not only stores carbon, it has a natural ability to regulate and stabilise the climate. Just imagine the power of Amazonia, the largest rainforest on Earth. Protecting the Amazon can protect the climate. yasuni 169In fact, that is precisely what the Amazon Vision seeks: to strengthen the Protected Areas Systems of Amazonia shared by Brazil, Bolivia, Colombia, Ecuador, Guyana, Peru, Suriname and Venezuela, in order to increase the ecosystem’s resilience to the effects of climate change and to maintain the provision of environmental goods and services benefiting biodiversity, local communities and economies. The Amazon Security agenda will contribute to tackling climate change since it intends to guarantee water, food, health, energy and of course, climate security throughout the Amazon biome.\n\nWhat are the concrete obstacles right now to guarantee water security and protection in the Amazon? You have stressed the need to protect and guarantee access to water.\n\nWater is the central and most important resource to guarantee health, energy and food security. A healthy water system is vital for providing clean drinking water, agricultural production and fishery, hydropower generation and regulation of water borne diseases. Water is the nexus that bounds everything. However, agriculture, cattle ranching and energy generation threaten water security through pollution and flow disruption. Hence, all securities are interdependent: If one of them is at risk, probably all of them are.\n\nThe Amazon is the largest river system in the world with more than 100.000 km of rivers and streams. The Amazon River on its own discharges an average of 6,300 km3 of water to the Atlantic Ocean annually, nearly 20% of global freshwater that flows into the oceans. Additionally, the rainforest releases 8 trillion tons of water vapor into the atmosphere each year and transports it thousands of kilometers away. Because of that, the Amazon plays a key role regulating the climate system around the continent.\n\nIn the midst of abundance, one would think that water security is not an issue but in fact, it is a serious one. Increasingly, water is facing more and more threats. Currently, more than 250 new hydropower dams are planned for the Amazon region. If they all go forward as planned, only three free-flowing tributaries of the Amazon River will remain, compromising the river network and the provision of ecosystem services to the societies and economies in the region. Besides, mining exploitation and pesticides from agriculture pollute the river system with heavy metals and toxins that are ingested by fish and later by humans. Furthermore, increased deforestation and land use change impact water availability since the forest recycles nearly 25% of the water it receives. All of these pressures are the main obstacles to guarantee water protection in the Amazon and hence, all other vital securities.\n\nSpecifically, how does the initiative recommend responding to extreme droughts that were once unthinkable in this region?\n\nExtreme droughts that were once unthinkable in the region are now more frequent, intense and unpredictable. They are exacerbated by climate change and by the fact that the forest can no longer respond to this phenomenon and regenerate itself in the same way it used to. Future scenarios are less optimistic: it is projected that if warming trends continue, Amazonia will suffer from severe droughts every other year by 2025.\n\nIn the last decade the most severe droughts occurred in 2005 and 2010. During the first, 1.9 million km2 of the Brazilian Amazon were affected causing crop losses of 139 million USD, an 18.5% increase in healthcare costs due to more respiratory diseases and other environmental and social losses valued in 100 million USD. During the latter, 3 million km2 of rainforest were severely affected and economic losses were even worse. Forests fires increased dramatically (200% in 2010) accelerating forest degradation and leaving the Amazon even more vulnerable to mitigate the drought.\n\nHow to deal with extreme natural phenomenon such as droughts? Not difficult: protect the ecosystem so it can regenerate itself without fatigue. In order to do so, we must halt deforestation. Currently, the Amazon is the biggest deforestation front in the world and interventions are urgently needed to prevent a large-scale, irreversible ecological disaster. WWF estimates that 27 per cent of the Amazon biome will be without trees by 2030 if the current rate of deforestation continues. Without forest cover, droughts will increase and its devastating effects will worsen.\n\nThe majority of the Amazonian forest is contained within Brazil (60% of the rainforest), followed by Peru with 13%, Colombia with 10%, and with minor amounts in Venezuela, Ecuador, Bolivia, Guyana, Suriname and French Guiana. Is this variety a political challenge? Is there a good level of cooperation between these countries? Do they share similar concerns or competing demands?\n\nWhile the rainforest is politically divided, the biome is one. What happens in a country will have an impact in all Amazonia. Therefore, it is a common interest of all Amazonian nations to manage the rainforest sustainably since they have a joint dependence on its natural resources and a joint exposure to regional-scale risks.yasuni 152\n\nWe know that water, health, food and energy security are interdependent and that they are all vulnerable to what happens in nine different countries. This seems as a huge challenge. Actually, it is. However, it is also an opportunity to strengthen public policies at a regional level. The atmosphere, rivers, species are indifferent to political boundaries and that is why all nine countries must have a Pan-Amazon vision rather than a narrow country focused one. This means, sharing information to help informed decision making, mapping and monitoring areas where water, energy, food or health security are most vulnerable, creating a regional development agenda, strengthening protected areas systems, having common basin management policies and a joint zero net deforestation target, among others. Only by having a common and coherent agenda they will be able to overcome all the pressures the Amazon is facing and ensure the wellbeing of the region.\n\nClimate change acting in combination with biodiversity loss has had social impacts already. One of the conclusions of a report called ‘Amazonia Security Agenda’, published by CDKN and Fundación Futuro Latinoamericano, is that ‘widespread inequity in Amazonia will be exacerbated by threats to the securities, and is likely to lead to increased social conflict unless addressed.’ Is there any plan to address this challenge?\n\nA huge amount of wealth is being produced in the Amazon: oil extraction, mining, agriculture production, cattle ranching and hydropower produce billions of dollars in revenues annually. For instance, in 2012 Brazil received US$8.8 billion a year from iron extraction in the Pará state, Bolivia US$3.8 billion for natural gas and Ecuador US$8.9 billion for oil in 2010. Yet, little of that wealth stays in the Amazon. Ironically, in the land of plenty, local communities suffer from high insecurity. Despite being surrounded by water, few Amazonians have access to a proper water supply, treatment and a basic sanitation infrastructure. Hence, they are particularly vulnerable to pollution and to everything that comes along with it: disease, malnutrition, among others.\n\nAccording to a report published by A Articulação Regional Amazônica (ARA) 60% of people in the Bolivian Amazon, 37% in Ecuador, 23% in Peru and 17% in Brazil were estimated to be below the extreme poverty line in 2011. Inequity and vulnerability will accentuate if increasing threats to food, health water and energy securities are not properly addressed. Changing this trend without shifting the development paradigm will be impossible. All Amazon countries should adopt policies that secure equal and sustainable access to food, water, energy and land. Indigenous consultation rights should be respected before approving a development project that will impact directly or indirectly their territories. According to the Amazon Environmental Information Network (RAISG), 11% of oil blocks and 18% of mining concessions overlapped recognised indigenous territories in 2012.\n\nIf these challenges are not taken serious at a local, national and regional level, land conflicts will increase, inequity will rise and the Amazon ecosystem will have to bear even more pressures affecting everyone who benefits from its services but especially the most vulnerable and poor.\n\nThis is a crucial year in the life on this planet: in December we will see the UN Climate Change Conference in Paris and the UN summit for the adoption of the post-2015 development agenda in New York. What do you expect, realistically speaking?\n\nWe are witnessing a great and inevitable transition towards a sustainable development model. Indeed, 2015 will be a landmark year in this process. In September, countries will adopt the post-2015 development agenda and the sustainable development goals at the UN Summit. Three months later, Paris will host the Climate Change Conference (COP21) where a new global agreement will be signed. These two historic events will set a roadmap for that great transition.\n\nThe 17 Sustainable Development Goals will set targets for governments and redirect public policies and investment towards accomplishing them. The same will occur with the new climate agreement. We expect the Paris agreement to set commitments ambitious enough to ensure we stay below 2ºC warming, the temperature limit for a safe climate future. It will send a clear message to all the stakeholders in the world: climate change is a top priority in the world and everyone must do its fair share to address this global problem. Governments must take seriously the path towards a low carbon economy, business must lower their emissions while becoming energy efficient, investors must divest from fossil fuels and civil society must engage and change their carbon intensive lifestyle. That is what I expect: for everyone to be aware that the world is changing and that we must take part in that inevitable transition.\n\nTiempos de ¨crisis¨\n\n¨La única constante en la vida es el cambio¨-Heraclitus\n\n¿Cuantas ¨crisis¨ han habido en tu vida? Pues resulta que  en mi vida, que va del 84 al 2015, he vivido en un mundo que ha  estado siempre en ¨crisis¨. La crisis petrolera de los 80, la bancaria del 98, la financiera del 2000, la crisis ambiental, la de la familia, y  ahora la crisis económica mundial desde el 2008 para nombrar algunas. Ufff! se me ocurre que  ¿quizás podríamos re pensar lo que entendemos por ¨crisis¨? o ¿quizás podríamos ser menos reacios al cambio y podríamos quitarnos esa pereza de adaptarnos a condiciones cambiantes? yo que he vivido en un mundo en ¨crisis¨he visto y participado de un montón de oportunidades para generar cambios positivos, para renovar, para evolucionar y con el tiempo logro ver más y nuevas oportunidades…\n\nSi partimos del punto de que el cambio ocurre en nuestras vidas a todos los niveles y ocurre constantemente…se me ocurre que quizás sería una mejor idea construir sociedades y sistemas capaces de absorber los cambios y seguir en funcionamiento sin perder su identidad, es decir resilientes.\n\nEn el caso actual del Ecuador por ejemplo: la disminución de los precios del petroleo y el cobre ponen al Ecuador: EN CRISIS! PERO, esta disminución de los precios en el mercado global ponen en stand by a la explotación del ITT y los megaproyectos mineros porque ya no son rentables en el mercado!!! me pregunto, ¿es esta una crisis? o ¿una oportunidad para que opciones sostenibles y resilientes se propongan y apliquen en el país? pues creo que depende de la lectura que le demos al contexto.\n\nMi mensaje es que durante estos tiempos de ¨crisis¨a mi y a mi generación nos ha tocado adaptarnos, nos ha tocado aprender a tomar decisiones en tiempos de incertidumbre, nos a tocado ser creativos, innovadores nos ha tocado estar en una constante metamorfósis…y no necesariamente en ¨crisis¨…\n\nZygoptera de Argentina :) by Kristi Jarrell\n\nZygoptera de Argentina 🙂 by Kristi Jarrell\n\n¿Vives fuera de tu presupuesto? para reflexionar…\n\nSegún, el Global Network Footprint, hoy 19 de agosto sobrepasamos el límite de regeneración natural de la Tierra para este año… es decir que el resto del año 2014 viviremos fuera de nuestro presupuesto natural… cada año esta fecha llega más temprano, 1 de octubre en el 2000 vs 19 de agosto en el 2014… para reflexionar no? 🙂 Busquemos ser más consecuentes con nuestro discurso y busquemos vivir de manera más sostenible.\n\nLes comparto el artículo de el Global Network Footprint: \n\nIn less than 8 Months, Humanity exhausts Earth’s budget for the year\n\ny el de la WWF al respecto:\n\nIn the red for the rest of 2014: today we exceed nature’s budget\n\nIlustración: Alicia Franco\n\nIlustración: Alicia Franco\n\nIdeas para la conservación de Otonga\n\n¨El futuro no es lo que va a pasar, es lo que vamos a hacer¨– Jorge Luis Borges-\n\nTodos lo días trato de ser lo más consecuente posible con esta idea de vivir de manera sostenible… busco ideas concretas y sencillas que pueda aplicarlas en mi día a día y así aportar desde mi realidad a construir un mundo más justo y más sano. Claro! que mejor si estas ideas pueden replicarse en otros espacios y ayudan también a conservar el Bosque Nublado de la Otonga 🙂 Aquí les cuento algunas buenas ideas que han sido exitosas en la conservación de la biodiversidad. Otonga\n\nLa primera se llama ARA: Acuerdos Recíprocos del Agua, una idea de Fundación Natura Bolivia que con varios otros socios han logrado replicar esta metodología en 5 países Latinoamericanos de manera exitosa. Es un método muy sencillo que busca que las comunidades localizada en la cuenca baja, inviertan en la conservación de sus fuentes de agua, cuenca arriba. El monto que invierten las comunidades cuenca abajo es utilizado por las comunidades cuenca arriba en procesos productivos compatibles con la biodiversidad. Por ejemplo, las comunidades cuenca abajo financian proyectos de reforestación, silvicultura, agroecología, apicultura etc.. en la cuenca alta, y de esta manera las comunidades tanto de arriba y de abajo se benefician.\n\nSi esta idea la trasladamos a la Otonga… sería interesante acercarnos a la hidroeléctrica Toachi-Pilatón, por ejemplo, e ¨invitarlos¨ a invertir en la conservación de sus fuentes de agua. Quizás dentro de sus proyectos de responsabilidad social o compensación puedan invertir en re forestación y conservación del Bosque de Otonga y qué mejor si los podemos orientar en como hacerlo. O quizás un poco más ambicioso sería involucrar a los productores de ganado de la zona baja, y lograr que además de mejorar sus prácticas productivas, inviertan en el desarrollo de las comunidades río arriba y la conservación de la zona. Más ideas para trabajarlas… diversidad.\n\nOtra idea super interesante que quería compartirla, la aprendí en el Perú… un amante de la gastronomía Peruana y la biodiversidad creo un circulo virtuoso de buen sabor 😉 Con la idea de conservar cultivos ancestrales y apoyar a comunidades rurales a mejorar su calidad de vida. Buscó en Lima, restaurantes muy renombrados y finos, y los invitó a invertir en la sostenibilidad de su fuente de producción. Cada restaurant, ¨adoptó¨ un producto ancestral (quinua, paiche, amaranto etc…) financiando a un productor o una comunidad productora. De esta manera el restaurant se asegura que su producto sea orgánico y de calidad; le asegura un mercado con precio justo al productor; concientiza y provee de nuevas opciones al consumidor y logra conservar la agrobiodiversidad de la zona 🙂 ¡buenísimo!\n\nRegresando a la Otonga nuevamente… podríamos hacer algo similar con la panela, la leche, las frutas que se producen en la zona, y quien sabe y lograr que la uva de monte del Bosque de Otonga se venda en una torta deliciosa en algún restaurant de Quito…\n\nSigamos soñando, construyendo, compartiendo..\n\nCommunity Resilience and Biodiversity conservation\n\nI was lucky to co-facilitate the Second Dialogue on Finance for biodiversity of the Convention for Biological Diversity held in Quito, last 9-12 April 2014. A variety of national and international experiences in dealing with biodiversity and ecosystem services, including views from intergovernmental and non-governmental organizations, development agencies, social movements, farmer organizations, indigenous and local communities organizations, scientists and the private sector enriched the understanding about mechanisms to finance biodiversity.\n\nIn my opinion discussing the variety of mechanisms to finance biodiversity is necessary: taxes, compensations, offsets, paying for ecosystem services, all very interesting, BUT, are we really mainstreaming biodiversity in the development agenda? or are we just planning development at the expenses of biodiversity as usual? how can we make sure that the interconnections between biodiversity and human communities, are at the heart of all sustainability discussions? The reality is that the links between human beings and the nature we depend upon, are not yet respected and not even recognized as fundamental.\n\nFor me it is clear, biodiversity is life, and life on earth shapes all the environmental, social and economic process. Losing biodiversity means to weaken the basis for sustainable development by reducing ecosystems and community resilience, and the capacity for adaptive responses in a rapidly changing world. Biodiversity should be mainstreamed in all discussions of the new Sustainable Development Goals and the agenda post 2015. When we discuss about poverty eradication, food security, disaster risk management, health etc… we are intrinsically depending on biodiversity to meet these goals. Acting in biodiversity IS development!\n\nFinally, how do I think we can contribute to biodiversity conservation?, well…inspiring, leading by example and INNOVATING! We need to get more creative in finance and legal mechanisms to make this happen. Many initiatives around the world have shown it is possible to preserve biodiversity and at the same time improve people´s livelihoods. Better application of  evidence and technology, working with others outside the environmental sectors, empowerment of local communities in decision making and good governance, private sector partnerships in financing biodiversity conservation are some examples of the things we can do.\n\n“We are the first generation to understand the harmful impact of our lives and our actions on the planet. This knowledge comes with great responsibility that cannot be delegated to anyone. Everyone should take their own responsibility from the area where they work,” Christina Figueres", "pred_label": "__label__1", "pred_score_pos": 0.5559449195861816} {"content": "An analysis of the forming of the new relationships and the concept of having a friend\n\nThis became very visible to us when a close follower of a prominent leader we knew took on characteristics of the admired leader, even to the point of mimicking his speech patterns. Before these times, explorers and tribal leaders had to be able to read the body language of potential foes - to know whether to trust or defend or attack.\n\nBody language - background and history Philosophers and scientists have connected human physical behaviour with meaning, mood and personality for thousands of years, but only in living memory has the study of body language become as sophisticated and detailed as it is today.\n\nMoreno began systematic recording and analysis of social interaction in small groups, especially classrooms and work groups see sociometry. I spent about five years in the mental health system being treated like a chronically mentally ill person.\n\nWhen a project output can be traced to the establishment of or improvement in a capability s that has a demonstrable impact on a value stream then this will motivate business stakeholders. As I look back now I am convinced that there was another woman whose memories were false.\n\nKnowledge is more than knowing something technical.\n\nSocial network\n\nThe ancient roots of this concept demonstrate that while body language itself is a recently defined system of analysis, the notion of inferring human nature or character from facial expression is extremely old.\n\nI began to have periods of severe anxiety and I was told these were probably \"body memories\" and \"flashbacks. The Foundation gave my father much needed support which helped him not lose his mind thought the whole episode.\n\nAre strangers a threat, because we do not know enough about them to predict their behavior? Interpersonal relationship between children and their parents, brother and sister, immediate family members or relatives revolve around trust, commitment and care. We express more warmth, and are more likely to disclose, and behave in a pleasant way.\n\nThis was not a conscious process on my part. Later as the child grows, other bonds are established with the father and other family members.\n\nExchange among strangers and in close communal relationships Exchange relationships also exist between strangers or in functional relationships at work. This sign is a red hexagram which geometrically and numerically translates into the number which under Rothschild instruction will end up on the Israeli flag some two centuries later.\n\nIt is curious, therefore, to note that one of the leading lights of the Octopus, according to writer Carol Marshall, was ultra-right-wing oil tycoon Clint Murchison, owner of the Dallas Cowboys football team.\n\nWisdom, for example, creates statistical software that is useful, rather than technically brilliant. Even the anticipation of interaction with others produce liking.\n\nI am trying to deal with everyday life and trying to decide what I want to do with the rest of my life. In the case of agency-directed networks these features also include reciprocitytriad significance profile TSP, see network motifand other features.\n\nIsolated studies of body language appeared in more recent times, for example Francis Bacon in Advancement of Learning,explored gestures as reflection or extension of spoken communications. People are willing to give the normative correct responses to surveys, but hold private and subtler negative attitudes when it affects members of their own family.\n\nThis framework has the capacity to represent social-structural effects commonly observed in many human social networks, including general degree -based structural effects commonly observed in many human social networks as well as reciprocity and transitivityand at the node-level, homophily and attribute -based activity and popularity effects, as derived from explicit hypotheses about dependencies among network ties.\n\nIndividuals working together in the same organization. His second son Saloman Mayer, was sent to Vienna. How did the reconstruction of my childhood and supposed recovery of \"past memories\" occur in therapy?\n\nHow do we move from the initial encounter of liking to romance and love and lasting commitment? I no longer had to think or struggle. Finally, I recalled having been given an enema as a child. Some research Perlman, however, shows that teenagers and young adults suffer most from isolation.\n\nOne concern arises out of the teleological conception of action, implicit in consequentialism, according to which actions are understood in terms of their ends or purposes.\n\nIntimate relationship\n\nAs the years go by it is more and more difficult to continue with friendships that when we were young we thought would last forever. Similarity in physical attractiveness affects relationship satisfaction White, However, these recent changes have not removed fully the historical gender preferences.\n\nThey were not lies, but facts as clear as this paper. Capitalist societies rely on market pricing relationships, and increasingly we are seeing similar relationships in current and formerly socialist countries. For those describing falling in love, reciprocal liking and attractiveness were mentioned with high frequency.\n\nFurther, our relationships help form our self-concept chapter 2 and our most significant behaviors. The king issued bonds as a debt obligation to Rothschild to be paid by future taxes on British citizens. A novel which he later wrote quickly became a bestseller.\n\nHowever, the average person probably does not evaluate attraction to others on such a calculating basis.Interpersonal Relationship between a man and a woman A strong interpersonal relationship between a man and a woman leads to friendship, love and finally ends in marriage.\n\nA sense of commitment is essential in marriages and love affairs. An interpersonal relationship is a strong, deep, or close association or acquaintance between two or more people that may range in duration from brief to enduring. This association may be based on inference, love, solidarity, support, regular business interactions, or some other type.\n\nThe EPA’s decision conflicts with a March report from the International Agency for Research on Cancer that found that glyphosate “probably” contributes to non-Hodgkin lymphoma in humans and classified it as a ‘Group 2A’ carcinogen.\n\nOnline Dating: A Critical Analysis From the Perspective of Psychological Science Eli J. Finkel1, meet new people” (, ). Presumably that that forming relationships using their services is superior to dating offline.\n\nThe Web site for eHarmony, for example, asserts that the services the site offers “deliver more. Start studying Sociology Midterm. Learn vocabulary, terms, and more with flashcards, games, and other study tools. a. new relationships of less than one-year duration.\n\nKate delights in male partner having emotional/sexual relationships with other women. The term to describe this phenomenon is.\n\nJul 24,  · As I think back on the past 24 years of providing couples counseling for gay male relationships, I sometimes get asked what the differences.\n\nRated 0/5 based on 33 review", "pred_label": "__label__1", "pred_score_pos": 0.7423262000083923} {"content": "Bashein & Bashein Company, L.P.A.\nFree Initial Consultations\n888-340-5284 216-539-8437\n\nCleveland Personal Injury Law Blog\n\nBrain injuries—more common in car crashes than in sports\n\nNo doubt you have seen a football player helped off the field after a blow to his head. The diagnosis is usually a concussion, a mild traumatic brain injury that seems all too common in sports.\n\nHowever, did you know that motor vehicle crashes and falls are the most frequent causes of TBI? Would you recognize this kind of injury if it happened to you?\n\nAn overview of the Ohio workers' compensation program\n\nThose who have worked for any length of time already know that workers' compensation provides financial benefits after a work injury. The existence of the program gives Ohio workers comfort because they know that help is available in the wake of an on-the-job injury. However, knowing about workers' compensation is not the same as understanding how it works.\n\nFor example, benefits do not automatically kick in after an injury. You must first make a formal injury report with your employer and then file an official claim before you begin receiving your benefits. Because some injury symptoms do not manifest right away, you have two years from the date of your injury to file your claim.\n\nWhat if both drivers share the blame in a motor vehicle accident?\n\nMost of the time, driving safely and abiding by traffic laws can prevent motor vehicle accidents. Other times, even seemingly safe driving habits cannot prevent crashes. Still other times, both motorists may share responsibility for a wreck, although one of them may not realize that they have played a role in the collision. Take a look at the following example of shared accident responsibility.\n\nYou are approaching an intersection and apply your brakes. The motorist behind you is driving too fast and crashes into the back of your car, leaving you with severe neck and back injuries. An accident investigation reveals that the other driver was intoxicated and driving over the speed limit when the accident occurred. However, it also reveals that your brake lights did not function at the time of the crash and the other driver did not realize you were stopping.\n\nOhio construction worker killed in hit-and-run accident\n\nMost who work in the construction industry understand that it can be a dangerous line of employment. However, few of these workers expect to suffer injury or death from a private motorist. Unfortunately, these kinds of construction accidents injure and kill many Ohio workers employed in this industry each year.\n\nA recent incident occurring in Brook Park, a suburb of Cleveland, led to the death of a 61-year-old construction worker. An additional worker suffered injuries in the vehicle-related construction accident.\n\nDwarf benefits can supplement disability and workers' comp\n\nIn truth, it is not dwarf benefits; it is DWRF benefits and it can make all the difference for Ohio workers brought down by a workplace injury. An acronym for Disabled Workers' Relief Fund, DWRF can supplement your workers' compensation benefits if an on-the-job injury results in a permanent disability. It can also supplement Social Security Disability (SSD) payments as well.\n\nWe have found that many victims of a work-related permanent disability have no idea that a program like DWRF exists. This is probably because these benefits begin automatically, as long as you qualify for them financially. You will not need to apply for them as you do when seeking workers' compensation. A representative will review your disability claim and if you meet the qualifications, you will receive a notification that you are eligible for DWRF.\n\nGood driving habits that lower your risk of a collision\n\nEvery day, car accidents happen all around Ohio with some being more severe than others. One recent collision in Austintown resulted in a driver having to go to the hospital with serious injuries while the other vehicle sped off in a hit-and-run. \n\nIt is impossible to avoid every single car crash that happens in the state. However, if drivers are just a little bit more vigilant, then the number can go down substantially. It is vital for all drivers in Ohio to practice safe driving habits to lower their risk of ending up in a car crash. Anyone who does not presently follow these actions should start soon. \n\nWhy do fires plague active Ohio construction sites?\n\nTo many, it seems unusual that a fire could begin in an active and busy construction site. With so many workers present, it is reasonable to believe fires are preventable. However, fires continue to plague many active work sites in the Cleveland area and often result in injurious construction accidents. Understanding how and why these blazes occur is the first step in implementing an effective fire prevention plan.\n\nThis post contains information explaining why fires occur during construction projects. Even if your supervisor does nothing to address the risks, this information can raise your awareness about fire hazards. In turn, you will be better equipped to avoid construction accident injuries if a blaze does occur.\n\nDoes Ohio have a law that bans texting while driving?\n\nLike most states, Ohio does have laws in place that prohibit texting while operating a vehicle. While these statutes should help reduce the number of motor vehicle accidents that occur in the state, they only work when motorists obey them. Unfortunately, many people choose to disregard the law, leading to severe accidents.\n\nYou should also know that these laws are not simple, cookie-cutter rules to follow. Statutes like these are comprehensive and work to ban different types of activities that can take a driver's attention away from the road. In Ohio, motorists may not legally engage in the following activities while driving.\n\n • Writing, sending or reading text messages on a handheld device (cell phone, tablet, etc.)\n • Using a laptop computer while operating a vehicle\n • Operating a handheld personal digital assistant\n • Using mobile technology that requires the use of one or more hands\n\nDon't give up on proving that distraction caused your crash\n\nUnfortunately, Ohio residents are all too familiar with motor vehicles caused by distracted driving. According to one article, 52 fatalities and 508 serious injuries occurred in motor vehicle accidents caused by distracted driving in 2018 alone. Even worse, the statistics surrounding these incidents show an increase in distracted driving accidents in recent years.\n\nOur attorneys believe that those affected by distracted driving crashes deserve justice. The problem for many victims is proving that the other driver's distracted actions behind the wheel led to the accident. We want to share with you how you and your legal counsel can prove distracted driving.", "pred_label": "__label__1", "pred_score_pos": 0.5136680006980896} {"content": "Filters Panel\n\nTrackpoint Filter\nSelects the positions that build up the track\nFix type\nNo Fix: The device logged a position but did not have a fix. Usually unselected.\nSPS: Standard Positioning Service. The accuracy of the signal may be degraded to 100 m via Selective Availability. S.A. was turned OFF on May 1st, 2000.\nDGPS: Differential GPS.\nCorrection of the GPS coordinates by applying an offset identified by fixed position receivers. Supposed to be more precise when differential data is used.\nPPS: Precise Positioning Service.\n\"Military\" signal with high accuracy (< 10 m) - encryption only known to military\nRTK: Real Time Kinematic.\nSat system used in RTK mode with fixed integers\nFRTK: Float Real Time Kinematic.\nSat system used in RTK mode with floating integers\nEstimate: The position is an estimation by the device. The position is usually not very precise. Also called 'dead reckoning'\nManual: Manual entry of the position. No known usage in the existing devices.\nSim: Simulator value. No known usage in existing devices.\nLog Reason\nWhy the position was recorded.\nTime: The time condition was reached. The previous position was logged more than the programmed number of seconds earlier.\nSpeed: The speed condition was reached. The speed was higher than the limit.\nDistance: The distance conditions was reached. The measured distance was over the limit. This is not the direct line distance to the previous position!\nButton: The position was logged because the user requested so by pressing the device button.\nUser *: Extra waypoint types can be logged through an application (like BT747). This list will be shortened later on. Currently selects the bit in the user field that has to be active.\nCommon Filter\nFilter specification used for both waypoints and trackpoints.\nActivate Common Filter When not active, the common filter is not used (and the menu items are grayed out.\n*DOP: HDOP, VDOP and PDOP are related to the position accuracy. The smaller the value, the more accurate the position. It is recommended to log the HDOP value with each position and define the limit as 1.98.\nHDOP: Horizontal precision\nVDOP: Vertical precision.\nPDOP: Positional precision.\nrec nbr: Limits for the record number. This can help you to select only a part of the log.\ndistance: Limits for the distance field in a position record.\nspeed: Limits for the speed logged with a position.\nNSAT: Minimum number of satelites in use needed. Also a method to select only precise positions (select at least 4 or 5 satellites)\nWaypoint Filter\nSelect positions that will be used as waypoints - they are usually shown as icons with detailed position information.\nThe meaning of the filter settings is the same as for the trackpoint filter.\n\n\nReply to comment | GPS Data Logger Software - BT747\n\nwhoah this blog- is fantastic і really like studying your posts.\nStay from the great pаintings! Υou recоgnize, lots оf folks\nare loοking аround to do thiѕ information,\nyou can аid them greatly.", "pred_label": "__label__1", "pred_score_pos": 0.974412202835083} {"content": "How To Become A Songwriter\n\nA songwriter writes the songs that singers, bands and other performers will sing. You could find yourself writing the melody and lyrics of songs or you may also be asked to come up with the tracks that back the music, whether it is for the keyboards, guitars or drums.\n\nYou are also expected to know how to play these musical instruments. Since your income will hinge largely on your capacity to produce music that will top the charts, the songs you will create must be patronized commercially. This entails knowing the tunes and lyrics that will be loved by the public.\n\nAs a songwriter, you will also be spending a good part of your time recording demos. You will be submitting these demos to music producers and/or singers who might want to buy your material and record it, usually as part of their album. If you are a singer songwriter, you will not only be writing your own songs but recording and performing them as well. Whether you work solely as a songwriter or as a singer songwriter, meeting with music producers and other executives of the music industry is part and parcel of your job.\n\nLike many songwriters, your earnings will come mainly from the royalties derived when people buy the song that a music producer or publisher bought from you for another performer to sing. You are essentially a freelancer. If you happen to work in cities like Nashville where the staff writer culture for songwriters is the norm, you will be working a 9 to 5 job in the office of a song publisher. That means you will be paid monthly for writing songs.\n\nAlthough it may sound like a regular salary, this monthly payment is actually drawn against the future royalties that will be earned by your song. Once the song you’ve written starts to earn, the producer will first get back his investment before allowing you to earn more royalties. The good thing about songwriters who sign a staff writing deal with a music publisher is that they don’t have to worry about how to pay the bills and can concentrate solely on their craft as a songwriter.\n\nTo succeed as a songwriter, you need to be genuinely interested in music. You should also have the technical knowledge needed to write lyrics and put melodies to it. You should also be able to work long hours and be dedicated to the craft. Business savvy is also a must since you need to be able to market your songs effectively to music industry executives so you can earn money.\n\nWhy Become A Songwriter\n\nA career as a songwriter is for those who are really dedicated to writing songs. This is well-suited for those who are willing to work hard and persist in marketing their songs to music producers and singers in this highly-competitive industry.\n\nAlthough establishing a reputation as a songwriter can be difficult at first, it only takes a single hit to earn the big bucks and propel one’s name to the top of the charts and become a sought-after professional in the field.\n\nSongwriter Work Environment\n\nSongwriters who are hired as staff writers for a music publisher report to work in their offices just like any 9-to-5 job. They write songs or collaborate with other songwriters in writing the songs. Songwriters who aren’t connected to any music label but work as freelancers decide when and where they will work.\n\nThey may do their recordings in their own studios at home or they may be found in the studio of a music publisher after their song has been bought. Freelance songwriters may have to do more legwork in terms of meeting with singers, producers and publishers in the music industry who might be interested in their music.\n\nSongwriter Salary\n\nThe U.S. Bureau of Labor Statistics does not have data specifically for songwriters. Data from private research firms peg their average earnings in the vicinity of $40,000 a year. However, those who are new to the industry may not earn a lot and may even have to find another job to support themselves while they are honing their craft.\n\nFor songwriters who are fortunate enough to have their songs turn out to become hits, earning a million dollars including royalties is very possible.\n\nSongwriter Career Outlook\n\nThe U.S. Bureau of Labor Statistics does not have career projections specifically for songwriters. However, it does forecast that the job outlook for musicians and singers in general, the category which includes songwriters, is good. The employment rate for this occupational category for the ten-year period covering 2012 to 2022 is pegged at five percent, a rate that is slower than the national average for all job types. Songwriters will continue to be in demand to produce chart-topping hits that will earn money for music producers.\n\nSongwriter Degree\n\nThere are no strict postsecondary degree requirements for a career as a songwriter. However, songwriters can hone their songwriting skills by taking songwriting programs that lead to degrees or by attending workshops or classes. While not mandatory, these also serve as avenues for songwriters to know teachers and other professionals who could help them get their foot in the industry later on.\n\nLeave A Comment", "pred_label": "__label__1", "pred_score_pos": 0.7117584943771362} {"content": "TORONTO - Shares of Toronto-based Entertainment One Ltd. soared more than 30 per cent after it struck a deal to be acquired by American toy giant Hasbro Inc. for US$4-billion.\n\nEOne shares gained about 1.42 British pounds or 31.94 per cent to 5.85 pounds on the London Stock Exchange.\n\nThe boost came after Pawtucket, R.I.-based Hasbro announced Thursday it would pay roughly 3.3-billion pounds or 5.60 pounds per common share to acquire the company that brought kids the popular cartoon Peppa Pig.\n\nThe share's closing price Friday already surpassed the acquisition offer, and traded as high as 6.16 pounds on Friday.\n\nEOne produces several animated kids' shows, including Peppa Pig, and Hasbro says the deal would help it turn more of its toy brands into shows or movies, as well as significantly expand its Canadian presence.\n\nEOne's Canadian TV and film operations would continue as a distinct Canadian-controlled business within the combined entity, and some of eOne's executives have agreed to join Hasbro.", "pred_label": "__label__1", "pred_score_pos": 0.7329261898994446} {"content": "\n\nStardates Explained - 20181127.1900\n\nYou don't understand the startdates?\n\nTake, for example, 20181127.1900\n\nLet me stick some spaces in some helpful places:\n\n2018 11 27 . 19 00\n\nThat better?\n\n20181127 means 27th November 2018, and 1900 is in 24-hour clock format, IE 7:00PM\n\nStardates in the Star Trek universe work in an entirely different way. Wikipedia has a good explanation on how they work.\n\nEvents on this stardate", "pred_label": "__label__1", "pred_score_pos": 0.9905601739883423} {"content": " tag:www.jnguyenlaw.com,2013-03-21:/blog/83112 2019-11-29T14:27:43Z Movable Type Enterprise tag:www.jnguyenlaw.com,2019:/blog//83112.3865211 2019-11-29T14:28:43Z 2019-11-29T14:27:43Z Like other states, California has laws that allow a spouse to ask for spousal or partner support, also often referred to as alimony, during a divorce. Alimony usually involves the court ordering one spouse to make some sort of regular payment to the other spouse for the other spouse's financial support.\n\nUnder California law, alimony is also available following the annulment of a marriage and after a permanent legal separation. Those who have obtained a domestic violence restraining order may also obtain alimony.\n\n]]> Spousal support is very important for a person who is going to need some additional financial support at the end of their relationship.\n\nMoreover, it really is a matter of justice, as there are many relationships in which one person has the tools to move on and continue to earn a high income, while the other person will probably struggle despite their best efforts.\n\nHowever, figuring out how much spousal support a person will receive can be a complicated affair. For permanent alimony orders, California courts do not use a mathematical formula to calculate them. Instead, they rely on a number of legal factors, including how long the relationship lasted, each party's economic circumstances both before and after the split and the job skills that each spouse possesses.\n\nLikewise, whether one of the spouses was a victim of domestic violence at the hands of the other spouse or contributed to the education or professional development of the other spouse may also play into a judge's decision about alimony.\n\nNot surprisingly, a lot of the factors judges use to determine spousal support depend heavily on the couple's facts and circumstances. As such, it will be important for a Modesto resident with an alimony question to seek out the advice and experience of a family law attorney.\n\n tag:www.jnguyenlaw.com,2019:/blog//83112.3864435 2019-11-26T16:21:34Z 2019-11-26T16:20:34Z Many people in California have unique ways of defining their relationships. For some, it is important to have a formal ceremony to officially united them. Others may reject the idea of needing a piece of paper to confirm their relationship. Still, others may push the boundaries of conventional marriage in other ways.\n\nHowever, for those wishing to enter the United States through the immigration system, especially by obtaining a green card through marriage, having a validly recognized marriage is essential. If you are seeking lawful permanent residence through marriage to a U.S. citizen or green card holder, you will want to be certain your union is legal to avoid any complications during the process.\n\n]]> Is my marriage legal?\n\nYou may believe your love is a strong enough bond for you, but the government wants something more before it will consider approving your application for permanent residency. Immigration agents will agree that your marriage is legal if it meets the following conditions:\n\n • You and your spouse married for genuine reasons and not merely so that you could obtain a green card. Immigration officials do thorough investigations to determine whether a couple is trying to commit fraud by marrying simply to obtain permanent residence status.\n • The country where you married, whether the U.S. or elsewhere, recognizes your marriage as legal and valid. This may include common law marriages as long as the country where you married acknowledges such unions as valid.\n • You and your spouse were not related prior to your marriage even if your country's laws allow marriage to relatives.\n • Neither you nor your spouse has other spouses from which you are not divorced even if multiple marriages are legal in your home country and even if the other spouses are not immigrating to the U.S.\n\nIn addition to these qualifications for a legal marriage, your efforts to gain lawful permanent resident status in the U.S. may be in vain if your spouse is not a citizen, either native or naturalized, or a green card holder. However, even if you meet all the above requirements, you are likely to face trials and frustrations since the immigration process is notoriously complex.\n\nTo maximize your chances of successfully obtaining a green card, you would be wise to seek the assistance of a California attorney who is devoted to helping those with immigration challenges. Your legal advisor can walk you through the process and advocate for you along the way.\n\n tag:www.jnguyenlaw.com,2019:/blog//83112.3860355 2019-11-14T20:08:24Z 2019-11-14T20:07:24Z Many people in Modesto and the greater Bay Area may unexpectedly find themselves unable to work because of an illness or an injury. When this happens, it will be very important for these Californians to find other sources of income and support. One source of support is Social Security Disability benefits.\n\nOur law office helps California residents in our area file for Social Security Disability benefits when they are eligible to do so.\n\n]]> Even when a person seems to have a good case for receiving these monthly payments from the Social Security Administration, it is often the case that his or her initial application gets denied. In such situations, we can assist with their pursuing a review hearing with an administrative law judge.\n\nOne of the most important steps in this process is for an applicant to pursue appropriate professional care for his or her condition and to follow all treatment recommendations. This is not only simply a good idea for one's own health and well-being but also a good resource for obtaining documentation about the person's medical condition.\n\nAfter all, the Social Security Administration will rarely just take a person's word for it that he or she is legally disabled. Instead, administrative law judges and officials with the Administration are going to expect to see medical records and other information which both document a person's condition and explain how it prevents the person from returning to gainful employment.\n\nIt is therefore important for a person to choose a legal representative who has a solid understanding of both medical terminology and what sort of information can best explain the full extent of a person's condition.\n\n tag:www.jnguyenlaw.com,2019:/blog//83112.3855740 2019-10-31T19:27:42Z 2019-10-31T19:26:42Z One of the most common reasons immigrants get deported is because they are convicted of a crime. A criminal conviction can lead to the deportation even of someone who holds a green card and thus has permission to stay in the United States indefinitely.\n\nFortunately, not every criminal conviction can lead to deportation proceedings. For instance, most misdemeanor convictions will not cause deportation.\n\n]]> The most serious offenses in immigration law, and thus the ones most likely to lead to permanent expulsion from the United States, are called aggravated felonies. Not surprisingly, many of these offenses can also land a person in prison for years or even decades. However, this is not always the case.\n\nFor instance, certain domestic violence offenses may qualify as aggravated felonies, as can a so-called process crime like obstruction of justice or even a failure to appear in court. While any domestic violence offense is grounds for deportation, in some cases, a defense to deportation may be available\n\nAnother area where immigrants in the Modesto area may be at risk of deportation pertains to drug convictions.\n\nExcept for certain low-level marijuana offenses, just about any conviction for illegal drugs, including unlawfully procured prescription medication and common party drugs, can lead to a deportation. In fact, deportation is possible if one is a habitual drug abuser, even if he or she manages to avoid criminal conviction. Again, a defense to deportation may be available.\n\nFinally, so-called crimes of moral turpitude, which can cover a range of criminal offenses, can also lead to deportation. What is or is not a crime of moral turpitude can be up for debate, but the crime must carry the possibility of a sentence of at least one year, although it need not be a felony. As with other types of deportable offenses, a defense to deportation may be available.\n\nAn immigrant facing deportation because of a criminal conviction should strongly consider speaking with an experienced immigration attorney.\n\n tag:www.jnguyenlaw.com,2019:/blog//83112.3848408 2019-10-17T15:22:25Z 2019-10-17T15:21:25Z The process of divorce or legal separation is designed to be as fair to both sides as possible. In California, this means that each person should receive one half of their community property, that is, property acquired during the marriage. However, the rules only work so long as both spouses are fair, which means that they are honest and open about what they own and owe.\n\nSadly, whether out of fear of financial insecurity or because of anger, many people choose instead to try to hide some of their assets that they would otherwise need to share with their spouses. A spouse who is not aware of the family finances or is not familiar with the legal and financial system is particularly prone to falling victim to these tricks. The best thing Modesto residents can do to protect themselves is to familiarize themselves with the family's property, debts and income. Even well before a divorce or separation, they should also be closely involved in all significant financial decisions.\n\n]]> Also, they should be aware of certain warnings signs that the other person is trying to hide assets or get them out of reach in a divorce. Warning signs can include things like a sudden gift to a family member or friend, or even a mysterious promissory note showing that the spouse owes money to a relative or acquaintance.\n\nHowever, once a divorce or separation begins, it may be important to \"discover,\" that is, formally request, a copy of all tax returns, especially if one's spouse owns a business. These documents frequently have useful information about the whereabouts of hidden assets, as people tend to be less likely to lie to the federal government than to their spouses.\n\n tag:www.jnguyenlaw.com,2019:/blog//83112.3840009 2019-10-03T14:39:46Z 2019-10-03T14:38:46Z As this blog has discussed on previous occasions, residents of Modesto who suffer an injury because of someone else's negligence have the right to recover compensation. Victims will usually apply compensation from a personal injury lawsuit to their medical bills, lost wages and the like.\n\nSometimes, however, a Californian is injured on public property or is injured due to the negligence of a public employee. In such cases, residents can still sue for negligence and recover compensation from the government. However, special rules apply.\n\n]]> For instance, to file suit against a California agency or a local subdivision, a person must first file an official claim against the government. Generally speaking, the person must provide specific information about the claim and must also file the claim within six months of the incident.\n\nLikewise, if a person has a potential lawsuit against the federal government, then they will have to follow the provisions of the Federal Tort Claims Act. Like California's laws, the federal law requires a person to properly file a claim for compensation within a specific time frame prior to suing.\n\nFollowing the rules about suing the government is critically important. For a number of reasons, the failure to meet these requirements can lead to the permanent dismissal of a California resident's claim. This, in turn, means that an injured victim may not get compensation after an accident, even if the accident was caused by another's negligence.\n\nFor this reason, victims of accidents on government property or involving government employees should strongly consider having their cases evaluated by an experienced legal professional.\n\n tag:www.jnguyenlaw.com,2019:/blog//83112.3839674 2019-10-02T13:51:34Z 2019-10-02T13:50:34Z Your divorce will change your life in many ways. It's a stressful, emotionally complex process, and the choices you make during this time will impact your life for years to come. It is in your interests to think clearly about things and to keep your focus on what will be best long-term. This will keep you from making emotional or irrational decisions that will not be good for your future. \n\nOne of the most important concerns you may have is what will happen to your family home. You may not want to move, but can you afford to keep the house? Can you maintain the house and pay for upkeep expenses on your income alone? These are important questions that can help you determine the best way forward during your divorce.\n\n]]> Important considerations for your house \n\nOne of the most important factors for what will happen to your home are property laws in the state. California is a community property state, which means that if you and your spouse cannot settle this issue out of court, these laws will determine what happens next. Community property encompasses all marital property, which may also include your home. This means that you will have to share a 50-50 split of any proceeds from selling your home. \n\nSome couples are able to negotiate a reasonable agreement on the issue of the family home. For example, you may be able to keep the home, but you may have to take less retirement savings or give up your claim to spousal support. It's easy to make a rash decision in these situations, but it is in your interests to consider everything from taxes to utility costs when deciding if you really want to keep the home.\n\nWhat about your mortgage?\n\nYou may be wondering what, exactly, is going to happen to your mortgage when you go through a divorce. In many cases, the couple will have to sell the home and pay off the mortgage. If one spouse wants to keep the home, he or she may have to buy out the other spouse's share and take over the payments.\n\nDealing with the family home is one of the most complex issues of a divorce. If you are thinking about your options and deciding what is best, you may want to consider speaking with an attorney about your legal options. It is prudent to seek an honest assessment of your case and a clear explanation of what will happen to your home.\n\n tag:www.jnguyenlaw.com,2019:/blog//83112.3833106 2019-09-20T13:42:32Z 2019-09-20T13:41:33Z California parents who want to travel out of state or, especially, move to another state or country will need to first look over their child custody and parenting time orders.\n\nA parent contemplating a move or even travel to another jurisdiction, especially a foreign country, should speak to an attorney with experience handling family law matters.\n\n]]> When parents have child custody and child support orders in place, a California court generally must approve parental relocation. Whether the court will approve the move or not depends largely on the specifics of the situation and the orders.\n\nIf a parent has sole legal custody, he or she may be able to relocate without getting the approval of the other parent, unless of course the court order says something different. The other parent can only stop the move by showing the move would actually cause harm to the child.\n\nOn the other hand, when parents have joint legal custody, then the parent wanting to move will have to show the move is in the best interests of the children.\n\nDoing so can be a tricky affair, particularly if a parent is planning to move a great distance away from the other parent or is intending to return to his or her home country.\n\nOn a related point, many if not most parents will be expected to have the other parent's permission before traveling to another state, especially if the travel is also going to involve crossing international borders or will mean that one parent will not get his or her parenting time. If a parent does not give this permission, the parent who wants to travel may have to get a court order allowing the trip.\n\n tag:www.jnguyenlaw.com,2019:/blog//83112.3824401 2019-09-06T03:08:33Z 2019-09-06T03:07:33Z According to recent statistics, the number of drunk driving accidents in California has increased despite stepped up law enforcement efforts and many public awareness campaigns. The study determined that in 2000, 987 people died at the hands of drunk drivers on California's roads. By 2017, the number had increased to 1,120.\n\nOverall, the fatality rate rose about 13.5% in California, making it the fourth largest increase across the country. Perhaps more disturbingly, California was only one of six states to see an increase in fatality rates over the last two decades. Across the country, the fatality rate, on average, decreased 18%.\n\n]]> California is not especially lax when it comes to keeping drunk drivers off the streets. One organization ranked California as a state that is slightly tougher on drunk drivers than average. For its part, the California Highway Patrol reported more than 140 sobriety checkpoints in 2018 alone.\n\nOverall, officers arrested about 66,000 California motorists on suspicion of drunk driving in 2018, which was 4% higher than the number of arrests last year. The California Highway Patrol also indicated that they frequently participate in nationwide campaigns aimed at discouraging drunk driving. These efforts will be given particular attention in the upcoming weeks as college students return to campus.\n\nFor whatever reason, though, it seems that many drivers in Modesto and other California communities just aren't getting the message that drunk driving is a very dangerous behavior. Fortunately, victims of drunk driving accidents, and their families, can seek to hold motorists who use alcohol irresponsibly fully accountable for the injuries they cause through personal injury lawsuits. In some cases, victims may even be able to obtain punitive damages.\n\n tag:www.jnguyenlaw.com,2019:/blog//83112.3814690 2019-08-22T14:28:55Z 2019-08-22T14:27:55Z The aftermath of a serious car accident can be devastating for just about anyone. In addition to recovering from significant or even debilitating physical injuries, a victim may also have to try to figure out how to support herself financially, as she may no longer be able to work. Moreover, an accident also takes an emotional toll both on the victim and his family. To add to these issues, California's legal system can be hard to understand, particularly for those who are immigrants to this country and thus may not be as familiar with the way the law works.\n\nMaking matters worse, getting compensation after a car accident will likely mean dealing with insurance companies. Doing so can prove to be difficult, especially if the company is unwilling to pay for all of the expenses and losses to which the victim is entitled. It can be easy to get lost in the large bureaucracy of an insurance company that, ultimately, has the one goal of turning a profit.\n\n]]> Our law office is equipped to help victims of all kinds of car accidents. We have represented clients after pedestrian or bicycle accidents as well as victims of accidents in which the other vehicle involved was a large truck or other commercial vehicle. Many of our clients have been victims of drunk or distracted drivers.\n\nWhile we will try to negotiate fair compensation as efficiently as possible, sometimes it may be necessary for us to advocate for our personal injury clients at a trial. In some cases, we are also able to help our clients apply for disability benefits through the Social Security Administration. No two cases are alike, though, which is why those in the Modesto, San Jose, and Stockton areas may want to consult with a legal professional to better determine their best course of action.\n\n tag:www.jnguyenlaw.com,2019:/blog//83112.3807945 2019-08-08T20:01:33Z 2019-08-08T20:00:33Z Many residents of the Modesto area have probably heard stories about how long it takes for the Social Security Administration to finally award disability benefits to a Californian who needs them. Many deserving applicants get denied at the first stages of the process, and this means that they will have to wait months or even years for a hearing before an Administrative Law Judge. In the interim, the person will have to find other means of supporting himself or herself through a debilitating illness or injury, assuming of course that they live long enough to have a hearing.\n\nAt least some members of Congress are trying to address the problem. For example, there is a proposal to budget $300 million to the Social Security Administration so that they can reduce the time it takes to have a denial of benefits reviewed.\n\n]]> In some situations, a disability attorney may also be able to take steps that could reduce an applicant's wait time for a review of their Social Security Disability benefits. For example, should a person face the possibility of losing critical medical care or his or her home while awaiting a review of their application, he or she may be able to use what is called a dire need letter to effectively move to the front of the line.\n\nIn other cases, having a hearing in front of an Administrative Law Judge may not be strictly necessary. An attorney could therefore ask for what is called an on the record review. In an on the record review, the Administrative Law Judge will make a decision based on the existing evidence and will not hold a hearing. While this tends to speed things up, the drawback is that an applicant does not have an opportunity to tell his or her story to a live person.\n\nPursing disability benefits can be challenging, especially when an individual has to find a way to get by on a day-to-day basis while he or she waits for claim determination. By being fully prepared with strong evidence and competent legal arguments, and by utilizing some of the tactics mentioned above, disabled individuals may be able to increase their chances of success and speed up the claims process.\n\n tag:www.jnguyenlaw.com,2019:/blog//83112.3807261 2019-08-07T21:01:34Z 2019-08-07T21:00:34Z Dealing with a disabling condition may involve a lot of frustrating waiting. You sit in waiting rooms for your medical appointments. You wait in line for prescriptions. You wait for the results of your tests and lab work. If your condition prevents you from working, you can expect a long wait between applying for Social Security Disability and receiving word of your approval for benefits. If the Social Security Administration approves your application, you still must wait five months or longer before your payments begin.\n\nFortunately, certain medical conditions qualify for rapid approval, which could significantly reduce the time you must wait for benefits. Although you do not have to take any special steps for expedited acceptance, it may help to understand how the program works so you will know when it is appropriate to fight for your rights.\n\n]]> Qualifying for compassionate allowance\n\nThe SSA's compassionate allowance program lists over 200 conditions eligible for shorter processing times. Like other medical conditions, these prevent you from working to earn a living, and they are potentially fatal. Because this second factor is more probable in some conditions listed for compassionate allowance, the agency fast-tracks applications for expedited approval. Instead of waiting months to learn if the SSA has approved your application for disability benefits, you may learn in just a few days. The SSA's computer system identifies applicants with any of the following claims:\n\n • Fast-moving or terminal cancer\n • A disease of the immune system\n • Rare genetic disorders, such as Osteogenesis Imperfecta, or \"brittle bone disease\"\n • Neurodegenerative diseases, such as Alzheimer's, Parkinson's or Huntington's disease\n • A move to hospice care\n • A veteran disabled while actively serving\n • Blindness or deafness\n • An infant with low birth-weight\n • An amputation\n • Danger of losing your home\n\nIf you qualify for expedited approval, you will still have to wait the prescribed time before your benefit payments begin. However, this may be months earlier than typical because the approval period is much shorter.\n\nSince qualifying for compassionate allowance depends on the information you include in your application, you will want your application to be thorough as possible. You may find this a challenge if you are struggling each day to cope with your illness or condition. Many in your situation find that taking advantage of available resources can improve the chances of success. This includes the skills and experience of a California attorney.\n\n tag:www.jnguyenlaw.com,2019:/blog//83112.3797350 2019-07-25T18:40:34Z 2019-07-25T18:39:34Z A 10-year-old girl who lived near Sacramento died in what authorities believe was an electric shock drowning.\n\nThe girl was swimming in her family's pool when she apparently underwent a low-voltage electric shock. While it was not clear whether the voltage actually killed the girl, it did prevent her from being able to swim, which caused an accidental drowning.\n\n]]> While this marks close to 100 reported incidents of electric shock drownings, experts say that many other incidents, including non-fatal injury accidents, go unreported.\n\nElectric shock drowning is a risk whenever there is an electrical current within or close to a body of water, like a swimming pool, or a pond or lake. Electric current can come from a pool's equipment, from a marina or even from a passing boat. Particularly in fresh water, if not properly contained, this current can run right through a swimmer, causing a shock severe enough to paralyze a person and cause drowning.\n\nWhen it comes to electric shock drowning, a little prevention can go a long way. For instance, owners of pools should have a qualified electrician check out their pool equipment and wiring to make sure it is in proper working order. Likewise, deteriorating caulk around electrical components in a pool can cause electrical current to flow through the water.\n\nThose who own boats or marinas must also make sure that their equipment is in good working order. Generally speaking, well-maintained electrical equipment and wiring will not leak electrical current.\n\nSomeone in the Modesto area who suffers from an electric shock drowning or a near-drowning may have legal options available to them. One may, for instance, choose to file a personal injury case.\n\n tag:www.jnguyenlaw.com,2019:/blog//83112.3787985 2019-07-11T14:10:29Z 2019-07-11T14:09:29Z Family law touches a lot of issues that can affect the lives of California residents. For instance, couples in Modesto may get involved in a divorce or other type of separation. In other cases, a couple may have never been in a legal union, but does have a child in common.\n\nUnder these circumstances, the couple may need help coming up with ground rules for custody, child support and parenting time. Going through a family law legal proceeding can be quite confusing and even overwhelming, particularly for people who are not often involved in the legal system. The process can be even more nerve-wracking when there is a lot at stake in terms of property or, especially, one's relationship with his or her child.\n\n]]> On a related point, immigrants who are going through a divorce face special legal issues, which could affect their ability to remain in the United States lawfully. Having the advice and representation of an experienced attorney is particularly important for such individuals.\n\nHowever, anyone who is facing a family law issue will at some point have important decisions to make that could affect them for years or even decades to come. For instance, someone who winds up making a poor choice when dividing up community property can find himself or herself financially disadvantaged and without a lot of options.\n\nMoreover, while custody and parenting time can be reviewed down the road, a parent can still face an uphill battle trying to straighten out a bad legal result. For this reason, our law office encourages those who are dealing with divorces or other family law issues out the services of an experienced attorney. In this respect, our office prides itself on its careful preparation and advocacy on behalf of our clients.\n\n tag:www.jnguyenlaw.com,2019:/blog//83112.3779581 2019-06-27T14:32:00Z 2019-06-27T14:31:00Z Many people in Modesto and the surrounding California communities in the Sacramento Valley may have recently had to submit a petition or some other request to this country's immigration authorities.\n\nThe stakes are often very high with respect to these petitions, as the outcome could be the difference between being allowed to stay in the United States legally and having to leave the country.\n\n]]> It is therefore no wonder that when residents receive word that their immigration petition has been denied, they may experience a sense of panic and may not know what to do. This is particularly true if they filed their petition on their own.\n\nAlthough a denial is certainly concerning, it is not the end of one's legal options. Appeals in immigration cases are allowed, although there are important time restrictions within which one must start the process of submitting an appeal. This is one reason why it is so important for those who have had an unfavorable outcome in an immigration matter to speak with an experienced attorney right away.\n\nOur office's first step is to make sure that our clients understand exactly why their request has been denied. After that, we can help evaluate our client's legal options so that he or she can make the decision that is in his or her best interests.\n\nGenerally speaking, someone facing an adverse immigration decision can choose either to ask the authorities to reconsider their original decision or ask them to reopen the case so that the person can present additional evidence that the immigration court did not have originally.\n\nAs a certified immigration specialist, the attorney at our office has helped immigrants from all parts of the world with their important legal matters concerning their status in this country.", "pred_label": "__label__1", "pred_score_pos": 0.5310397148132324} {"content": "The Warrior, #3\n\nThis is the third book in a unique urban fantasy. The main character is a teenager with big ideas and leaderships skills. She, however, sees herself as a medium warrior and not very pretty. However, she attracts male attention wherever she goes. This story is fast paced, filled with violence and a well hidden twist that will change everything. The world developed is detailed and complex. There are vampires, werewolves, teenage fighters and a society made up of warriors and non-warriors. The characters are well thought out with each having a distinct personality and characteristics. The story can be emotional and intense. Seldom is there anything to laugh out. In fact, you’re never sure if characters are even going to live! Betrayal happens and there is even a mad scientist. Once I started reading, I had to read more. This story will bring you into a different world and you’re not going to want to stop until the end.\n\nAs stated, this is the third book in the series. It starts by jumping in where the last book left off. However, it would be possible to follow this book without having read the previous two. It would be better if you read from the beginning.\n\nRachel is thrilled to be back home and that her boyfriend, Jason, and his werewolf pack are in the area. She still doesn’t understand why Jason has to do everything his father wants, just because he’s the pack alpha. Rachel is also a bit depressed that she had to kill her former boyfriend, Chad, when he turned into a vampire. To get back at the vampires, Rachel decides to go after them where they live. She talks her dad into teaching how to make bombs. Soon, other young warriors have joined her. But, suddenly everything is falling apart again. Jason leaves and she is in trouble. Now what?\n\nBook Blurb for Subversive\n\nRachel Clancy should never be counted out. She's a fighter and fighters never quit. Her destiny is to lead in a world filled with vampires and werewolves--void of romance and flowers. In charge of a secret revolution that could change her home forever, she's forced to battle and vanquish any threat to her friends and family. But no matter how many times she's won, the evil that threatens her never forgets her name.\n\nLife is a continuous battle that never ends.\n\nEspecially for Rachel...\n\nNight Owl Reviews Oct, 2015 4.50", "pred_label": "__label__1", "pred_score_pos": 0.970852255821228} {"content": "On July 12, 2018, the U.S. Food & Drug Administration (FDA) issued a brief stating they are investigating recent case reports of a type of canine heart disease known as dilated cardiomyopathy, or DCM, in dogs not genetically predisposed to the disease. The brief cited a theory that some dogs with DCM may have been fed certain types of diets, and that further research was being undertaken to determine if that theory had merit. That research is expected to take several years and has not been completed. The agency issued an update on its investigation on February 19, 2019 and June 27, 2019.\n\nMembers of the Pet Food Institute (PFI) are committed to the production of safe, nutritionally balanced pet food and are working closely together with internal experts, including company scientists, veterinarians and nutritionists, to advance the understanding of this issue and support a collaborative approach with FDA. Below, we provide answers to some questions that pet lovers may have about DCM and their dog’s diet. Click here for a downloadable version.\n\nWhat is dilated cardiomyopathy (DCM)?\n\nDCM is a specific type of heart disease that in dogs results in an enlarged heart and can be serious if left untreated. Some dog breeds, such as the Doberman Pinscher, the Great Dane, the Golden Retriever, the Boxer and the Cocker Spaniel, are genetically prone to this disease. Symptoms of DCM include a decreased appetite, lethargy, coughing and collapse. Dogs displaying these signs should be taken to the veterinarian immediately. FDA’s investigation is specifically focusing on DCM and not canine heart disease as a whole.\n\nWhat role does diet play in DCM?\n\nThe exact cause of recent reported incidents of DCM has not yet been identified, but genetic predisposition is known to be a highly contributing factor to DCM in dogs in general. It is possible that multiple factors play a role, including pet food formulation, ingredients, processing and individual pet physiology. One area that FDA is investigating is the possibility that ingredients and formulations in certain dog food recipes may play in the development of DCM in some dogs.\n\nWhat are PFI members doing about this potential issue?\n\nPFI members take seriously their commitment to provide safe pet food that delivers complete and balanced nutrition, and they welcome new information that can help them keep this commitment. Member company scientists, veterinarians and nutritionists are currently working closely with one another, ingredient suppliers and veterinarians to further advance the understanding of this issue.\n\nWhat should I be feeding my dog now? Should I change what I am feeding my dog?\n\nThe first step you can take is to make sure your dog is receiving a complete and balanced diet that is formulated for his or her life stage. Our interactive infographic series “Nutrition from Nose to Tail” provides fast facts on why a complete and balanced dog food recipe is critical in supporting your pet’s health. If your pet does experience a change in health, it is important to consult with your veterinarian.\n\nIf you have questions about a specific product, we recommend that you contact the manufacturer to learn more. The FDA is also recommending that pet owners seek dietary advice from a trusted veterinarian, who knows your pet and can provide information tailored to their needs. FDA has not advised that pet owners change their dog’s diet based on the available information.\n\nIs grain-free pet food safe for my pet?\n\nMillions of dogs eat and are thriving on grain-free dog food. FDA’s investigation focuses on certain ingredients that figure more prominently in some pet food products labeled as grain-free, including legumes like peas or lentils, other legume seeds, and potatoes. FDA has not identified any established link between certain ingredients and incidents of DCM.\n\nThe exact cause of these cases of DCM is still unknown and may be the result of many factors, including a recipe formulation and processing, and your individual pet. If you have a question about your dog’s food, we recommend that you contact the manufacturer to learn more, and visit “Nutrition from Nose to Tail” to learn more about the nutrition in a dog food recipe.\n\nWhy may pet food makers use certain ingredients in dog food?\n\nPet food recipes that are formulated to provide complete and balanced nutrition offer the essential nutrients that a pet requires for his or her specific life stage, and at the proper levels. The ingredients used in pet food will help to deliver those nutrients, and some ingredients may help deliver multiple nutrients. When developing a recipe, pet food makers consider many factors, such as an ingredient’s nutrient profile, its role in helping the food hold shape, flavor, digestibility and shopper preference.\n\nShould I avoid certain ingredients or grain-free dog food as a whole?\n\nThe FDA stated in all three updates, including the most recent June update, that  the agency does not advise any dietary changes based solely on the information gathered so far.\n\nShould I be concerned if my pet’s food contains one of the ingredients mentioned by the FDA?\n\nFDA has not linked any specific pet food or ingredient to incidents of DCM and has not requested removing or recalling any pet food from the market. It is important to make sure the food you are feeding your pet is formulated to be complete and balanced for a pet’s life stage. If you have additional questions related to a specific ingredient we suggest reaching out to the pet food manufacturer. For concerns about your pet’s health, we recommend reaching out to your veterinarian.\n\nAre pet food ingredients safe?\n\nYes. As makers of the sole source of nutrition for America’s pets, PFI members hold pet food safety as the number one priority. U.S. pet food makers use ingredients that have been accepted by the FDA, meet the agency’s Generally Recognized as Safe (GRAS) standard, or have been recognized by the Association of American Feed Control Officials (AAFCO). For more information about how pet food and its ingredients are regulated, click here.\n\nUpdated June 28, 2019", "pred_label": "__label__1", "pred_score_pos": 0.9968224763870239} {"content": "\n\nThis is why men out-perform women at Scrabble\n\nThe reason makes total sense\n\nThis is why men out-perform women at Scrabble\n\nI am *OK* at Scrabble – better at Boggle, but could still hold my own against a 12-year-old at Scrabble. Especially a 12-year-old girl, apparently, because it turns out that men are better than women at Scrabble.\n\nAccording to research published in the journal Psychological Research, men consistently out-perform women in Scrabble competitions around the world, even though there are actually slightly more female players.\n\nBut why?\n\nWell, to find out, University of Miami researcher Dr Jerad Moxley questioned 300 participants at the 2004 and 2008 US National Scrabble tournaments about their playing habits.\n\nIt turns out that men are ‘better’ than women because women can’t be arsed to spend loads of time perfecting a pointless skill. It all makes sense now – women would rather spend their time on useful pastimes, and men channel all their effort into dumb things like getting good at FIFA or board games that don’t actually matter.\n\nDr Moxley found that men would spend their time in between games studying past winners and analysing anagrams, whereas women (who spent the same amount of time playing the game) would simply play for fun. Trust men to take all the fun out of something and turn it into an insufferable obsession.\n\nHe concluded by saying:\n\n“Just because there is a huge gender difference, it doesn’t mean there is a huge ability gap.”\n\nIt’s simply down to practice – whereas women probably realise that being really, really good at Scrabble means almost nothing, men took the opposite route in their quest to become the world’s best Scrabble player.\n\nIf you think you’re an expert, then why not check out our Scrabble quiz here. Ladies, it’s a fun way to spend five minutes. Men, IT WILL ENABLE YOU TO BECOME SUPREME SCRABBLE OVERLORD. GO FORTH AND CRUSH YOUR ENEMIES.\n\n(Image: iStock)", "pred_label": "__label__1", "pred_score_pos": 0.9963865876197815} {"content": "Connect with us\n\nPlanet Earth\n\nWhy are some icebergs emerald green ?\n\nImage Credit: AGU/Journal of Geophysical Research: Oceans/Kipfstuhl et al 1992\n\nScientists are closing in on an answer to the question of why some icebergs exhibit a distinctive green tinge.\n\nGreen icebergs have been an enduring enigma for years, but now according to a new study by researchers from the United States and Australia, these unusual chunks of ice may owe their anomalous coloration to iron oxides picked up from rock dust on the Antarctic mainland.\n\nThe idea stems from the discovery of large amounts of iron on East Antarctica’s Amery Ice Shelf.\n\nIn an intriguing twist, researchers have also proposed that these green icebergs may be transporting iron out in to the ocean where it is acting as a source of nutrition for phytoplankton.\n\nIf this is true, then it could mean that green icebergs are actually very important to the food chain.\n\n“It’s like taking a package to the post office,” said study lead author and glaciologist Stephen Warren from the University of Washington. “The iceberg can deliver this iron out into the ocean far away, and then melt and deliver it to the phytoplankton that can use it as a nutrient.”\n\n“We always thought green icebergs were just an exotic curiosity, but now we think they may actually be important.”\n\n\n\nPlanet Earth\n\nLatimeria found, lived on our planet long before the dinosaurs\n\nThe unique fish Latimeria chalumnae, also called “Coelacanth”, lived on our planet long before the dinosaurs. They were long thought to have disappeared around the same time, about 65 million years ago.\n\nHowever, after 1938, when the first Latimeria was officially discovered by chance, it turns out that the Latimerians did not die, but live in the deep waters off the east and south coasts of Africa.\n\nLater, a second type of Latimeria was discovered in Indonesia.\n\nThe oldest fossils of Latimeria are 360 ​​million years old, and the “freshest” are 80 million years old. At the same time, it should be known that there were a huge number of Latimerians, at least 90 different species. They have been distributed worldwide, in sea and fresh waters.\n\nLatimeria stand out against the modern fishes with their unusual fins, more like limbs, and a wedge-shaped tail. Their bodies are covered with solid scales, similar to armor.\n\nLatimeria are pretty big fish. They can reach up to 2 meters in length and weigh up to 90 kg. At the same time, the fact that no one has found them for so long is amazing.\n\nEven after this species has been officially recognized as being extant, the Latimeria is still rare and can only be found through specific monitoring in the waters where it has been observed.\n\nLatimeria swim slowly and feed on cephalopods and deep-sea fishes. Often, they were discovered in groups in underwater caves. They live to about 48 years. Females give birth to live individuals after a long pregnancy of 13 months.\n\nThe first discovered Latimeria\n\nThe history of the Coelacanth is the cornerstone that supports the belief of many cryptozoologists that the mysterious Yeti, sea monsters, Chupacabra and other cryptids, actually exist, but simply have not yet been found.\n\nAt least two species of Latimeria, and perhaps more, have survived to this day without hiding at all. In addition, as mentioned above, Latimeria’s “freshest” fossils date back to 80 million years.\n\nJust imagine this huge period of time during which archeologists have not found a single skeleton of Latimeria, even though they existed all this time.\n\nAccording to some reports, there are populations of 300-400 individuals near the coasts of Africa and Indonesia. This comes after several years of increased illegal fishing. In the 1980s, the Latimerians were hunted (supposedly) because of the healing properties of their meat, and before that there were probably several thousand of them.\n\nBut if they were initially much smaller, they would probably never have been discovered at all, still considered extinct.\n\nAnd the rare stories of local fishermen about “fish with a foot and a shell ” would be considered the same fiction as the stories of Africans about living dinosaurs.\n\nContinue Reading\n\nPlanet Earth\n\nHumpback Whales Have Made a Stunning Recovery After Coming Close to Extinction\n\nElias Marat, The Mind Unleashed\n\nAfter coming dangerously close to the brink of extinction, the humpback whale population in the South Atlantic Ocean has made a stunning rebound, according to scientists.\n\nAround 60 years ago, it was estimated that the western South Atlantic (WSA) humpback whale population had been thinned out to less than 500.\n\nContinue Reading\n\nPlanet Earth\n\nThe heartbeat of a blue whale is recorded for the first time\n\nBlue Whales can survive with two beats per minute in the ocean depths and now for the first time heartbeat of a blue whale is recorded.\n\nheartbeat of a blue whale is recorded\n\nWhen a blue whale feeds, it skips several heartbeats, sometimes up to 30. this is what a team of marine biologists has discovered after being able to record the heartbeat of a blue whale, on the coast near California. To do this, a suction pulse monitor was placed on his back.\n\nThe researchers watched as the marine giant emerged and submerged again for a period of almost 9 hours, alternately filling its lungs with air and its stomach with appetizing schools of fish hundreds of meters below the surface.\n\nDuring the dives, the whale’s heart has brutal ups and downs, pumping from 34 times per minute on the sea surface to only 2 per minute at the deepest depths – between 30 and 50% slower than expected to be recorded.\n\nAccording to the new study published in PNAS, the simple act of opening the mouth to eat takes the heart of the cetacean to its physical limits, something that could explain why there are no creatures larger than the blue whale on the planet.\n\n“Animals that function at physiological extremes can help us understand the biological limits of size,” said lead author Jeremy Goldbogen, an assistant professor at Stanford University in California. “In other words: if the heart of a whale is not able to pump faster during the effort required in the search for food, how could it support the heart of an older animal and provide the required energy?”\n\nThe largest animal in the world Blue Whale\n\nBlue whales are the largest creatures that have ever inhabited the oceans (the Patagotitan mayorum dinosaur was consecrated as the largest terrestrial creature that has stepped on the planet, after its study and classification in 2014 ).\n\nUpon reaching adulthood, the blue whale can be more than 30 meters long, more or less the length of two school buses parked one after the other. It takes a big heart to drive a beast of such size; and while this organ is not so large that a human can swim inside one of its arteries, as an urban myth says, the truth is that stranded whales have allowed hearts to recover up to 200 kilograms and the size of a golf cart .\n\nBlue whale heart. With a weight of 200 kg, it was extracted from a specimen that found its final destination on the coast of Newfoundland, Canada, in 2014. heartbeat of a blue whale is recorded\nBlue whale heart.\n\nScientists already knew that the pulse of these cetaceans decreased in the aquatic environment. When mammals submerge, their bodies automatically begin to redistribute oxygen; The heart and brain are the ones that most demand oxygen, while your muscles, skin and other organs receive less. This allows animals to stay underwater for longer with a single inhalation, resulting in a lower than normal heart rate. This is so true for humans who like diving as for blue whales, however, given the enormous size of the whale and its ability to reach 300 meters below the surface, their hearts are pushed to limits beyond our own. .\n\nChange in the heartbeat of a blue whale with change in depth\n\nIn the creature studied, its maximum immersion lasted 16.5 minutes, reaching a depth of 184 meters. On the other hand, he never spent more than 4 minutes on the surface to fill his lungs with air.\n\nThe sensor set by the scientists showed that in the deepest dives, the heart of the whale beat at an average rate of 4 to 8 times per minute, with a minimum of only 2 beats per minute. “During these beats that were so temporarily separated, the flexible aortic artery of the animal contracted to maintain a slowed movement of the oxygenated blood through the body,” the researchers write.\n\nBack on the surface, the heart rate accelerated rapidly to 25 to 37 beats per minute, charging the bloodstream with enough oxygen to support the next dive. “At that time the heart of the whale was working near its physical limit,” the authors add. “It is unlikely that your heart can beat faster than that.”\n\nSource: Live Science\n\nContinue Reading\n\nRecent Comments", "pred_label": "__label__1", "pred_score_pos": 0.7050431370735168} {"content": "Help › PeopleFor quick answers tweet @tickspot\n\nWhat happens if I delete a person?\n\nWhen a person is deleted, they won't be able to log into the account anymore, but all their time entries are kept safe in the system for reporting purposes.\n\nIf you ever need to add the person back, just click \"Add New Person\" and be sure to use the same (original) email address. As long as you use the same email address, their account access will be restored and all of their time entries will be connected to their profile.", "pred_label": "__label__1", "pred_score_pos": 0.9990200400352478} {"content": "The exhibition Island opened on 11th October. Constructed as multiple, unfolding chapters, of a novel the show captures various moments in Aldous Huxley’s novel from 1962, somewhat a counterpart to A Brave New World  written thirty years earlier. In the enclavic and psychic setting of Pala new criteria for “value” lie in harmony, personal  fulŸllment, arts, architecture and the imagination. Ecentric solutions are found to old social problems, one regulator being the use of psychedelic drugs, tantra, rock climbing, multiple  family structures, and collective and individual healing sessions. Island celebrates both the psychedelic Sixties, the dissolution of conventional Western mores and identities and the rise of new forms of awareness. As novel, it is also a cautionary tale of the  mindless exploitation of resources allied to the capitalization of spirituality. The exhibition follows the transformative steps of Bloomsbury-born protagonist Will Farnaby, observer, actor and catalyst. Within Island, Will’s transformation is loosely organized around the intertwined experiences of crash, awakening, abundance, and self-betrayal. The Ÿrst pivotal word Farnaby hears on the island is “Attention” the initial awakening of a  journey towards the “here and now.”\n\nIsland exhibition Island exhibition Island exhibition\n\nArtists list: John Armleder, Sylvie Auvray, Tom Benson, Valentin Carron, Jake and Dinos Chapman, George Condo, Ann Craven, Thomas Demand, Zeng Fanzhi, Urs Fischer, Théodore Fivel,  Sylvie Fleury, FOS, Cyprien Gaillard, Gunjan Gupta, Anthea Hamilton, Thilo Heinzmann,  Reena Saini Kallat, Terence Koh, Sergej Jensen, Rashid Johnson, Adriana Lara, Franck Leibovici  & Diemo Schwarz, Fang Lijun, Ursula Mayer, Takashi Murakami, Order of the Third Bird,  Jagannath Panda, Mai-Thu Perret, Sigmar Polke, Laure Prouvost, R.H. Quaytman,  Ugo Rondinone, Sterling Ruby, Tomàs Saraceno, Julian Schnabel, Cindy Sherman, Dirk Skreber, Haim Steinbach, Rirkrit Tiravanija, Thukral and Tagra, Andro Wekua, Ai Weiwei, Douglas White.", "pred_label": "__label__1", "pred_score_pos": 0.9990172386169434} {"content": "Hiking: A journey back in time\n\nGomera Experience\n\nWe invite you to experience on foot the picturesque villages in the south of La Gomera. You will discover how country life used to be and how it is today: the agriculture; the sheep and goat herding. We shall also introduce you to the traditional way shepherds traversed the abrupt terrain: the salto del pastor (which translates as “shepherds’ jump”).\n\nOur hike crosses the centuries, from ancient times to the present day. Along the way we shall see the changes the island has suffered since the days of the ancient Gomerans, up till present times, when tourism has become what fuels the island’s economy.\n\nGoing back in time, we begin our route at an emblematic place for the ancient Gomerans: the mountain of Tagaragunche, where we shall learn about their ancient rituals. We hike on, passing through the hamlets of Targa and Antoncojo, where we can see how the country folk lived and worked. Here sheep and goat herding still flourishes and you will learn about the traditional salto del pastor. Continuing on from here, we get a view down to the island’s south coast and can witness how much tourism now influences the Gomeran economy. During the hike you will be able to try some of the island’s local delicacies.\n\nGuided walk\n\nTasting of local produce\n\nShepherds jump salto del pastor\n\nDiscounts for groups of 6 or over\n\nPure nature from someone who knows the corners of the island in detail\n\nA private guide for tailored trips, a privilege which enables the traveller to discover La Gomera in a personalised way. Tours that make time standstill, which are enjoyed discovering the secrets, details and unexplored beauties that make the island such a unique place.\nThe history, geology and peculiarities of La Gomera are brought to the visitor in different tours: “The island of a thousand faces”, “Among the moss and the mist”, “A journey through time” etc.\n\n\nEuropean Charter for Sustainable Tourism\n\nAction for a Sustainable Tourism\n\n- Conservation and enhancement of the environment: 3\n\n- Preservation and improvement of the quality of life of local residents and social development: 3\n\n- Conservation and enhancement of the natural beauty, wildlife and cultural heritage of the Garajonay National Park: 3\n\n\nLa Gomera\nAmazing contrasts\nJune 1, 2019", "pred_label": "__label__1", "pred_score_pos": 0.9983482956886292} {"content": "Article Reader \nWelcome, visitor! Have you considered signing in?\nToday is Friday, December 06, 2019. The time is 2:22 PM.\nScience Notes\n\nOne of Our Planets is Missing\n\nNo, it's not the action of a neutronium-clad doomsday machine, nor a huge, sperical space station terrorizing the galaxy. Rather, a humble, but sometimes raucus group of astronomers in Prague decided yesterday to downgrade Pluto's status leaving our Solar System with only eight planets.\n\nThis is directly in contradiction to earlier reports of a new definition for a planet that would have included not just Pluto, but three other known objects and the potential for dozens of large objects that have yet to be discovered.\n\nAccording to the International Astronomical Union:\n\n\nPluto is now considered a \"Dwarf Planet\", which has a definition similar to the above except for the end which now reads \"...(c) has not cleared the neighbourhood around its orbit, and (d) is not a satellite.\" Pluto is joined by Ceres and 2003 UB313 in this somewhat dubious category.\n\nHistory of the Problem\nPluto was discovered in 1930, and Clyde Tombaugh, the astronomer who found the object wanted to name it after Percival Lowell, so he found a Roman name that included Lowell's initials. At the time, Pluto was thought to be roughly the same size as the Earth, but eventually the object was slimmed down to a mere 1,413 miles across -- smaller than the Earth's moon.\n\nSince the 1990s, astronomers have battled over Pluto's status. Many correctly point out that its unusual orbit and small size identify it as likely just a large piece of debris from the Kuiper belt. Ultimately every planet in this Solar System was made from such debris and the Kuiper belt beyond Neptune and the asteroid belt between Mars and Jupiter are just left over material. Public support and tradition have long been on Pluto's side, however. Textbooks and years of material have identified Pluto as a planet. When New York's Hayden Planetarium left Pluto off a model of the Solar System, it drew an enormous outcry, not just from the public, but from other astronomers who felt the museum had overreached its authority.\n\nIn 1999, the IAU had its first brush with this issue when a proposal was made to consider Pluto a planet associated with the Kuiper belt. Astronomers then were strongly opposed to reducing the planet's status. But the discovery of 2003 UB313 (unofficially called \"Xena\" and it's satellite is \"Gabrielle\") might have caused this issue to be revisited. Slightly larger than Pluto, \"Xena\" was surely going to become our Solar System's tenth planet. But it's position in the Kuiper belt and the possibility for more similarly-sized objects caused some to worry that the number of official planets to grow dramatically. Might the Sun be home to 15, 20, 30 planets ultimately? Clearly, the matter needed to be pinned down. What is a planet after all?\n\nAmazingly, until yesterday, there was no official astronomical definition for a planet. The IAU settled the problem by arguing over several different definitions, ultimately selecting one that kicked Pluto out of the club after two years of frustrating efforts. Indeed, the first committee to look at the problem, a group of astronomers, could not agree on a scientifically accurate definition. A second committee comprised of historians and educators was formed a few months ago to look at the problem from a fresh perspective.\n\nFlawed Definition\nAlan Stern, the head of NASA's New Horizons mission to Pluto, is outraged that less than five percent of the world's astronomers had a vote on the issue. Others think that the new category for Pluto is awkward when it says \"A dwarf planet isn't a planet.\" Ultimately, I think the definition needs to be refined. Read it again. Then look at this chart. By the official definition currently accepted by the IAU, the Earth itself is not a planet. The existing definition not only places Earth on the questionable list, it also will present problems when we begin to identify planets in younger solar systems orbiting other stars. Inevitably, the issue will have to be revisited, and at that time Pluto may be restored to planetary status.\n\nClyde Tombaugh, may you rest in peace.\n\npsion on 2006-08-25 05:21:54\n\n\nMore Problems\n\nYou know, looking at those definitions, I see more problems. The definition of a \"dwarf planet\" specifies that the object isn't a satellite. That, for example, would rule out our own Moon as a dwarf planet. However, the definition of a \"planet\" doesn't make that distinction. Thus, the Moon might be a planet by this definition ... if its orbital path had been cleared, of course.\n\nAn even bigger problem arises from the beginning of the definition: \"...a celestial body that (a) is in orbit around the Sun...\" In orbit around the Sun? This wasn't written as a sun, it specifies our own Sun both with the definitive article and capitalization.\n\nFolks, the only planets in our universe exist right here in our Solar System. And even here, I'm not sure what objects qualify since Earth clearly does not. This goes way beyond issues with Pluto ... the IAU has produced flawed work that clearly has no business being a scientific standard used for classifying celestial objects. We were better off when there was no definition.\n\npsion on 2006-08-26 15:41:41\n\n\nThe Debate Grows...\n\nLike I said, I'm not the only one who sees flaws in the IAU's methodology or results.\n\npsion on 2006-09-03 05:02:42\n\nI Have a Question\n\nGoddess of Discord\n\nIn a sly acknowledgement of all the trouble 2003 UB313 caused when it was discovered, the IAU has dubbed the planet -- excuse me, dwarf planet -- \"Eris\" after the Greek goddess of discord. Eris' moon, has been named \"Dysnomia\" a Greek daemon of lawlessness and the daughter of Eris. One wonders if Lucy Lawless might have been a subtle inspiration for a planet pair unofficially named \"Xena\" and \"Gabrielle\" prior to this decision.\n\npsion on 2006-09-15 14:07:12\n\n\n\n", "pred_label": "__label__1", "pred_score_pos": 0.792456865310669} {"content": "Who We Are - Rota do Românico\n\nThe Route of the Romanesque\n\nIn the land of the valleys of Sousa, Tâmega and Douro, in the heart of the North of Portugal, stands an important architectural heritage of Romanesque origin. Common traits that carry legends and stories born with the foundation of the Nationality and which witness the significant role that this territory formerly played in the history of the nobility and religious orders in Portugal.\n\nThis heritage is structured in the Route of the Romanesque, germinated, in 1998, within the municipalities that comprise the VALSOUSA - Associação de Municípios do Vale do Sousa [Association of Municipalities of Vale do Sousa: Castelo de Paiva, Felgueiras, Lousada, Paços de Ferreira, Paredes and Penafiel] and extended, in 2010, to the remaining municipalities of the NUT III - Tâmega and Sousa [Amarante, Baião, Celorico de Basto, Cinfães, Marco de Canaveses and Resende], thus bringing together in a supramunicipal project a common historical and cultural legacy.\n\nAnchored in a set of 58 monuments of great value and exceptional characteristics, the Route of the Romanesque intends to take on a role of excellence in the scope of cultural and landscape touring, able to position the region as a reference destination of the Romanesque.\n\nOver the last few years, the Route of the Romanesque has been emerging as a national reference project, being recognised as a paradigm of regional development, in various areas of intervention: from heritage conservation to tourist promotion, from scientific research to the dissemination of knowledge, from cultural promotion to heritage education.\n\nMission and Goals\n\nThe Route of the Romanesque's mission is to contribute to the sustainable development of the valleys of Sousa, Tâmega and Douro.\n\nIts goals are:\n\nPromote regional planning through the enhancement of the heritage;\n\nCreate a new productive sector, capable of generating wealth;\n\nChange the internal and external image of the region;\n\nQualify the human resources of the region;\n\nEnsure qualified employability.", "pred_label": "__label__1", "pred_score_pos": 0.9943056106567383} {"content": "The Environics, Inc. Post\n\nIn the News: ROBD2 Hypoxia Training by the US Air Force\n\n\nCheck out this recent article regarding the use of the Reduced Oxygen Breathing Device in preparing US Air Force Airmen for the \"Worse Case Scenario.\"  The Environics Reduced Oxygen Breathing Device 2 (or ROBD2) plays a key role in that training. \n\n\nairmen robd2 trainingThe ROBD2 is manufactured solely by Environics and is a computerized gas-blending system which uses mass flow controllers to precisely generate hypoxic breathing conditions without affecting atmospheric pressure.  Airmen, both pilots and crew, undergo training on the ROBD2 to prepare them for the signs and symptoms of hypoxia that they might feel and to practice the appropriate emergency procedures when that occurs.\n\nStaff Sgt. Vikas Kumar, 92nd Aerospace Medicine Squadron aerospace and operational physiology NCO in charge of training at Fairchild Air Force base stated, \"The ROBD2 is what we use here in place of the hypobaric chamber.  There are several advantages to using this system. Not only is it much cheaper to maintain than a chamber, it's a lot less taxing on the body because it doesn't have any atmospheric pressure change involved, making it possible to fly a jet right after if needed, unlike using the chamber, you have a 12-hour restriction.\"\n\nCheck out this video and learn more on the use of the ROBD2 by the Air Force.\n", "pred_label": "__label__1", "pred_score_pos": 0.82637619972229} {"content": "Amita Kuttner with North Vancouver Green Candidate George Orr at the NEB Decision Rally in Downtown Vancouver\n\nRegarding the NEB’s Review\n\nFor Immediate Release\nFebruary 22, 2019, Vancouver.\n\nWe strongly oppose the National Energy Board’s renewed approval of the Trans Mountain pipeline expansion, and disagree that the pipeline remains in the public interest of Canada. This opposition is rooted in the climate change impacts that the Trudeau government specifically excluded from the NEB’s review of pipeline project.\n\nThe NEB concluded the following:\n\n • “Project-related marine shipping is likely to cause significant adverse environmental effects on the Southern resident killer whale and on Indigenous cultural use associated with the Southern resident killer whale”\n • “Greenhouse gas emissions from Project-related marine vessels would likely be significant.”\n • “[If] a credible worst-case spill from the Project or a Project-related marine vessel […] were to occur the environmental effects would be significant.”\n\nDespite these conclusions, the NEB recommended “that the Government of Canada find that they can be justified” based on dubious economic claims. The NEB has also provided 16 new recommendations to the Government of Canada, but the government is free to ignore these recommendations without any penalty. The recommendations are, however, worded in such a way that the Federal Government will be able to claim that they are following the majority of them without actually doing anything new.\n\nGiven that the Trudeau government specifically excluded climate concerns from the NEB’s review, we have no faith that they will attempt to follow any ecological recommendations, or heed any warnings about adverse environmental effects. The Trudeau government has shown through this process that it does not care about the Paris Climate Agreement, the Truth and Reconciliation Commission, the Species At Risk Act, or the safety and wellbeing of the millions of Canadian citizens who live on the shores of the Salish Sea.\n\nAmita attended the NEB decision rally in downtown Vancouver on Feb. 22nd, and the gathering was much larger than the pro-pipeline protest Amita recently witnessed in Ottawa. “It is as clear as ever that our community does not consent to the pipeline expansion. Given the warnings in the NEB decision report, we call on the Trudeau government to not go through with the project.”", "pred_label": "__label__1", "pred_score_pos": 0.9871760606765747} {"content": "Biomedical Consultant, Senior\n\nKey Role:\n\nWork in a fast-paced, highly collaborative environment to assist with the technical program management of research and development (R&D) efforts. Leverage expertise in the subject matter to advise clients in multiple areas, including molecular biology, synthetic biology, biochemistry, genetics, and biomedical data analysis with a particular focus on the innovative applications of biological principles and properties. Provide strategic assessments of novel scientific discoveries and emerging technologies for a larger client portfolio. Draft and edit documents for a range of technical audiences.\n\nBasic Qualifications:\n\n-5+ years of experience with research in the fields of molecular biology, biochemistry, or genetics, including research as a graduate student\n\n-5+ years of experience with authoring technical papers, reports, or program plans for both technical and non-technical audiences\n\n-Ability to show multiple first-author contributions to peer-reviewed papers or patents\n\n-Ability to explain and present complex scientific concepts to a broad audience\n\n-Ability to commute to Arlington, VA\n\n-Ability to obtain a security clearance\n\n-PhD degree in Molecular Biology, Molecular Biophysics, Biochemistry, or Genetics\n\nAdditional Qualifications:\n\n-2+ years of experience with postdoctoral academic or industrial research\n\n-Experience in working with government agencies\n\n-Experience with science and technology policies\n\n-Possession of excellent oral and written communication skills, including scientific writing\n\n\n\n", "pred_label": "__label__1", "pred_score_pos": 0.9998977184295654} {"content": "Derrick Franke Facilitates First Ever Taped Victim/Offender Dialogue in Indiana's History\n\nJune 21, 2019\n\nDerrick FrankeCNN aired the season finale of their original series The Redemption Project on Sunday June 16th. Each episode in the series follows a story of an offender, their victim(s), and their mutual search for healing. The season finale followed the two surviving sons of a man who was murdered and their first interaction with the person who killed their father since the trail concluded over ten years ago. Derrick Franke was the facilitator of the victim/offender dialogue.\n\nProducers of the show reached out to Derrick in March of 2018. They had heard of Derrick through his work in restorative justice, particularly his experience in facilitating victim/offender dialogues (Derrick has conducted over 200 facilitations in the past decade). After months of planning, they were able to schedule a time to facilitate what would be the first ever filmed victim/offender dialogue in Indiana’s history.\n\nBefore agreeing to partner with the team at Citizen Jones, the company producing The Redemption Project, Derrick wanted to ensure that they were taking the process seriously. He wanted to ensure that if the participants decided that they were not ready or did not want the interaction to be on camera that the team would agree to halt production. Derrick says that he was concerned because if the process is not handled correctly, the encounters can cause more harm than good. Looking back on the experience, Derrick says that he cannot express how impressed he was with the entire production team and that they all understood the magnitude and importance of the work they were all doing.\n\nGoing forth, Derrick hopes that the Redemption Project will change the hearts and minds of those who are watching and help advance restorative justice here in Michigan and across the United States.", "pred_label": "__label__1", "pred_score_pos": 0.9832944273948669} {"content": "SpaceChain (ERC-20)\n\n18.65 %\nChange 24h\nMarket Cap\n$ 2,462,780\nVolume 24h\n$ 64,508\nCirculating Supply\nTotal Supply\nThe key to Space Chain is to deploy all blockchain nodes on satellites so as to bring blockchain technology into space, adding a new dimension to blockchain’s core concept of distributed ledger by making use of space technology and advantages of space resources. As a space blockchain platform featuring data collecting, computing, application and storage, Space Chain uses satellites as its blockchain nodes for realizing direct on-satellite data processing and secure in-space data storage through cryptographic technologies such as quantum communications. Different from ground-network-based blockchain technology, Space chain provides a broader coverage and is based on a network of LEO satellites for achieving broad-based connectivity so that anyone and anything could become the user of blockchain technology anywhere and anytime.", "pred_label": "__label__1", "pred_score_pos": 0.9278456568717957} {"content": "Sie sind auf Seite 1von 14\n\n\n\nThe College of Education is dedicated to the ideals of Collaboration, Academic\nExcellence, Research, and Ethics/Diversity (CARE). These are key tenets in the\nConceptual Framework of the College of Education. Competence in these ideals\nwill provide candidates in educator preparation programs with skills, knowledge,\nand dispositions to be successful in the schools of today and tomorrow.\n1. Course Prefix and Number: LAE 4424\n\nCredit Hours: 3\n\n2. Course Title: Teaching Children's Literature: Developing Literary\n\nAppreciation, Global Perspectives, and Knowledge of Text Structures\n\n3. Regular Instructor(s): Vanessa Casciola\n\nOffice: EDU 202\n\n4. Course Prerequisites (if any): None\n\n5. Course Description:\nBuilding on an appreciation for childrens literature, the purpose of this class is\nfor undergraduate teacher candidates to learn how to select quality literature for\nchildren and to demonstrate instructional strategies for developing childrens\nengagement with literary texts, childrens understanding of diverse and global\nperspectives, and childrens knowledge of text structures.\n(3 credits)\n6. Course Goals and Objectives:\nList major goals and related objective (student learning outcomes) that will be\ntaught and assessed in the course. They should reflect the knowledge, skills, and/\nor dispositions students will have learned at the conclusion of the course. After\neach objective, in parentheses, list the standards that are addressed. Include\nFlorida Educator Accomplished Practices (FEAP), Conceptual Framework (CF),\nProfessional Standards (International Reading Association- IRA), Competencies\nand Skills Required for Teacher Certification in Florida (CS), English Speakers of\nOther Languages (ESOL), Reading Endorsement Competencies (FRC).\nUndergraduate teacher candidates will:\n\n1. Identify and analyze text structures of childrens literature (e.g.\n\nnarrative, information, fables, folktales, poetry, drama, media, etc.)\n(CF 2: CS 2.1, 2,2, 6.1: IRA 2.2, 2.3: FRC, 1A3, 1A6)\n2. Identify and analyze literary elements across genres of childrens\nliterature (e.g. narrative, information, fables, folktales, poetry, drama,\nmedia, etc.)\n(CF 2: CS 2.1, 2.2: FRC 1A6)\n\n3. Identify and describe the elements of design that contribute to the art of\nthe picture book.\n(CF 2: CS 2.1, 2.2, 6.1: IRA 2.3: FRC 1A6)\n\n\n4. Analyze how visual and multimedia elements contribute to the meaning,\n\nfiction, folktale, myth, poem).\n(CF 2: CS 2.1, 2.2, 2.4, 6.1: IRA 2.3: FRC 1A4, 1A6)\n5. Identify and evaluate language use and vocabulary in childrens\n(CF 2: CS 2.2IRA 2.2: FRC 2F4)\n6. Identify and evaluate literature that represents diverse cultural, racial,\nsocial, religious, economic, and sexual identities and facilitate a learning\nenvironment in which differences and commonalities are valued.\n(FEAP 2d: CS 2.3: CF 5: IRA 2.3, 4.1: FRC 1A4, 4.8)\n7. Compare and contrast the contributions and the compositional techniques\nof various authors, illustrators, poets, and playwrights.\n(IRA 2.3 CS 2.1, 2.2, 2.3)\n8. Compare and contrast key details, content, and literary elements\npresented in history/social studies, science, and technical texts that vary\nin text complexity.\n(FEAP 3b: CS 2.1, 2.2, 2.3: CF 2: IRA 2.3)\n9. Demonstrate effective read-aloud techniques (e.g., using words and\nphrases to supply rhythm and meaning in a story, poem, or song,\nspeaking in a different voice for each character when reading dialogue\naloud, highlighting illustrations as part of the meaning-making process).\n(FEAP 2e: CS 2.4: IRA 2.2: ACEI 1: FRC 1E1, 1E2)\n10. Demonstrate effective read-aloud techniques for reading various text\nstructures (e.g., picture books, chapter books, information texts, big\nbooks, and multimedia texts).\n(FEAP 2e: IRA 2.2: CS 2.4, 6.1; ACEI 1: FRC 1E1)\n\n\n11. Demonstrate various practices to differentiate literature instruction (e.g.,\n\nbook talks, literature circles, partner work, and research/investigation\n(FEAP 1f: IRA 2.2: CS 2.4: ACEI 1)\n12. Demonstrate the ability to engage children in a range of collaborative\npartners to explore literary content, elements, and personal responses.\n(FEAP 3f: IRA 5.1, 5.4: CS 2.4: FRC 2A4, 2B2: ACEI 1, 2.1)\n13. Demonstrate differentiated literature instruction that reveals an\nunderstanding of the relationship between first- and second-language\nacquisition and literacy development.\n(FEAP 2d: CF 5, 6: IRA 1.1, 2.2, 4.1: CS 2.4: FRC 1B5, 4.8: ACEI 1, 2.1,\n14. Guided by evidence-based rationale, select and use quality traditional\nprint, digital, and online resources to build an accessible, multilevel, and\ndiverse classroom library that contains traditional print, digital, and\nonline classroom materials.\n(FEAP 2a: CF 2: IRA 2.2, 2.3, 4.1: CS 2.1, 2.4, 6.1, 6.3: FRC 1A6, 2G3:\nACEI 2.1)\n\n7. Content Outline:\nThis is a tentative weekly schedule of topics and/or outline should be included.\nInstructor has the right to change any topics or dates.\n\n\nAssignments Due\n\n\nReview Syllabus\n\nBring Syllabus\nBring in one of your\nfavorite books (any book)\n\nOverview of\nGenres of\n\nNo Class\n\n\nSelecting and\n\nHistorical Fiction\nResponse: Animoto Video\n\nKiefer and Tyson chapter\n\n1 and 8\n\n\n\nAssignments Due\n\n\nFinish Historical Fiction\n\nif needed\n\nKiefer and Tyson chapter\n\n\nEmergent Literacy\n(Picture Books)\nResponse: Class ABC\nBook Talks\nStart Whole class Book\n\nRead Number the Stars\n\nchapters 1-3\n\n\nPicture books (fictional\n\nand classic)\nResponse: Caldecott\nAward Ceremony\nBook Talks\nWhole class Book Club\n\nKiefer and Tyson chapter\n\n\n\nMulticultural Literature\nResponse: Tableaux\nBook Talks\nWhole class book club\n\nReadings on Canvas\nRead Number the Stars\nchapters 7-10\n\n\nPicture Books\nIncreasing complexity)\nResponse: Written\nResponse about practical\nWhole Class Book Club\nBook Talks\n\nKiefer and Tyson chapter\n\n\n\nTraditional Literature\nClassic Literature\nResponse: Retell the\nstory from a different\npoint of view\nGroup Book Club\nBook Talks\n\nKiefer and Tyson chapter\n\nRead for group book club\n\n\nResponse: Write a poem\nGroup book club\nBook Talks\n\nKiefer and Tyson chapter\n\nRead for group book club\n\nRead Number the Stars\n\nchapters 4-6\n\nRead Number the Stars\n\nchapters 11-14\n\n\n\nAssignments Due\n\n\nHow to do a read aloud\n\nGroup Book Club\nBook talks\n\nRead for group book club\n\nBring book for read aloud\nBring start of your read\naloud lesson plan\nIn-class read aloud\n\n\nDiverse Portrayals\n\nDiverse Portrayals\nPresentations Due\n\n\nResponse: Graphic\nGroup Book Club\nBook Talks\n\nKiefer and Tyson chapter\n\nRead for group book club\nDiverse Portrayals\nPaper due\n\n\nContemporary Realistic\nResponse: Character\nTrait Train\nGroup book club\nBook Talks\n\nKiefer and Tyson chapter\n\nRead for group book club\n\n\nResponse: Make Music\nGroup book club\nBook Talks\n\nKiefer and Tyson chapter\n\nRead for group book club\nRead aloud lesson due\n\n\nShare Book Wish List\n\nClassroom Ideas\nFinal Book Club\nBook Talks\n\nRead for group book club\n\nBook Wish List Due\nResponse repository due\nLiterary Analysis due to\nChalk and Wire\n\n\nNo class\n\n\n8. Evaluation of Student Outcomes:\n\n\nStandards Met\n\na) Literary Analysis* (Objectives 1, 2, 3, 4, 5, 6: FEAP 2d: CF 2, 5: IRA 2.2,\n\n2.3, 4.1: CS 2.1, 2.2, 2.4, 6.1: FRC 1A3, 1A4,1A6, 2F4, 4.8)\nb) Classroom Library (Objectives 6, 7, 8, 14: FEAP 2a, 2d, 2e, 3b: CF 2, 5: IRA\n2.2, 2.3, 4.1: CS 2.1, 2.2, 2.3, 2.4, 6.1, 6.3: FRC 2F4, 2G3: ACEI 1)\nc) Response Repository (Objectives 1, 2, 3, 4, 5, 12: FEAP 3f: CF 2: IRA 2.2,\n2.3, 5.1, 5.4:CS 2.4: ACEI 1, 2.1, 3.5: ESOL 11.1, 11.2, 17.1: FRC)\nd) Author/Illustrator/Poet Project (Optional)(Objectives 7, 11: FEAP 1f:\nIRA 2.2, 2.3: CS: 2.1, 2.2, 2.3, 2.4:ACEI 1, 2.1)\ne) Diverse Portrayals in Childrens Literature (Objectives 1, 2, 6, 7, 11:\nFEAP 1f, 2d: CF 2. 5: IRA 2.2, 2.3, 3.3, 4.1: ACEI 1: CS 2.1, 2.2, 2.3, 2.4: FRC\n1A3, 1A6, 2B2)\nf) Read Alouds*(Objectives 9, 10, 13: FEAP 2e: IRA 2.2: CS: 2.1, 2.4, 6.1:\nACEI 1: FRC 1E1, 1E2)\ng) Book Talks (Objectives 11, 13: FEAP 1f, 2d: CF 5, 6: IRA 1.1, 2.2, 4.1: CS\n2.4: ACEI 1, 2.1, 3.2: FRC 1B5, 2B3, 4.8)\nh) Literature Discussion Groups* (Objectives 11, 12: FEAP 1f, 3f: IRA 2.2,\n5.1, 5.4: CS: 2.4: ACEI 1, 2.1: FRC 1A6, 2G3)\n\n*Literacy Portfolio: Two components of this Portfolio include Critical Tasks\n\n[Component 1 (Literary Analysis) and Component 4 (Read Aloud Step 3)]\nThese tasks must be uploaded to Chalk & Wire.\n\nComponent 1Knowledge of Text Structures\n\na) Literary Analysis (Critical Task)\n\nYou will read the following books that represent genres of childrens\nliterature. You will analyze each book and identify genre elements and\nliterary devices. For each genre, you will create or write a response to the\nbook(s) to demonstrate your ability to identify the genre elements and\nliterary devices. Specific guidelines for each genre will be provided in class.\nYou will bring the books to class on the assigned day.\n\nYou will select and read childrens books according to the following\n\n\nEmergent Picture Books (4)\n\nSelect and read two pattern books, one ABC book, one counting\nbook. To ensure quality text selection, choose books that are\nlisted in the course textbook.\nMulticultural Picture Books (4)\nSelect any texts listed in the textbook\n\n\nClassic Picture Books (4)\n\nRead Where the Wild Things Are by Maurice Sendak and The\nVery Hungry Caterpillar by Eric Carle. Then select and read one\nfavorite book from Dr. Seuss and select and read two favorite\npicture books from your childhood.\nFictional Picture Books (4)\nSelect and read 4 books that tell a realistic story. To ensure\nquality text selection, choose books that are listed in the course\n\nContemporary Realistic Fiction Books (2)\n\nRead a recent Newbery Winner or Newbery Honor book of\nrealistic fiction. (Instructor will provide the title.)\nSelect and read one of the most recent Sunshine State Young\nReader Books (Instructor will provide the specific list).\n\n\nInformation Books (8)\n\nSelect and read one book about the human or animal body, one\nbook about the earth, one book about space, one book about a\nhistorical event in the U.S., one book about a historical event\noutside of the U.S., two books that teach math concepts, and one\nbook of your choice (e.g. your hobbies, interests, travel, etc.). To\nensure quality text selection, choose books that are listed in the\ncourse textbook or books that have won the Robert F. Sibert\nInformational Book Medal ( or the Orbis Pictus\nAward (\nHistorical Fiction books (2)\nRead Number the Stars by Lois Lowry.\nAlso choose another historical fiction book. Possible books: Roll of\nThunder, Hear My Cry by Mildred Taylor, Crispin: The Cross of\nLead by Avi, Kira-Kira by Cynthia Kadohata\nBiographies (5)\nSelect and read one book about a historical figure of the United\nStates, one book about a musician, one book about a\ncontemporary female scientist, one book about a person who is\nfrom a different culture, ethnicity, or race, one about a person of\ninterest to you. To ensure quality text selection, choose books\nthat are listed in the course textbook.\n\nTraditional Literature books (3)\n\nChoose one traditional folk tale (Possible books: Cinderella,\nBeauty and the Beast, Jack and the Bean Stalk, The Three Little Pigs,\n\nLittle Red Riding Hood, etc.). Find and read 3 or more versions or\nvariations of the same story.\n\n\nFantasy books (2)\n\nRead a classic book of fantasy\nSelect and read a recent Newbery Winner or Newbery Honor book\nof fantasy.\nPoetry Anthologies (2)\nSelect and read one anthology that includes poetry from many\nSelect and read one anthology that includes poetry from a single\nTo ensure quality text selection, choose poets who are listed in\nthe course textbook.\nClassic Pieces of Literature (2)\nRead two pieces of classic literature.\nPossible books include: The Secret Garden by F.H. Burnett,\nPeter and Wendy by J.M. Barrie, Charlie and the Chocolate\nFactory by Roald Dahl, Alice in Wonderland by Lewis Carroll,\nThe Wizard of Oz by Frank Baum, Little Women by L.M. Alcott,\nA Wrinkle in Time by Madeleine LEngle, The Lion, the Witch,\nand the Wardrobe by C.S. Lewis, Winnie the Pooh by A. A. Milne,\nLittle House in the Big Woods by Laura Ingalls Wilder, The Little\nPrince by Antoine de Saint-Exupery.\n\nb) Classroom Library Wish List\n\nUsing an electronic network (, you will design a\ncomprehensive classroom library for your future classroom. This library\nwill include literature from each genre, literature of increasing complexity,\nand multimedia resources to encourage reading for personal and academic\n\nYou will categorize the literature into themes that are relevant to you.\nThen you will provide a rationale for your selections and themes. Your\nclassroom library will be evaluated through a rubric that will be discussed\nand distributed during class.\n\nComponent 2 Literary Appreciation\n\nc) Response Repository\nThe class textbook includes many examples of the ways in which readers\ncan respond to literature. A range of response activities will be discussed\nand modeled in class. You will respond to the childrens literature texts you\n\nread using various multi-modalities in order to develop your\n\nunderstanding of the connection between reading and response. You will\nprovide reflections on your learning through these activities. A template\nfor these reflections is provided on Canvas.\n\nComponent 3 Global Perspectives and Teaching Literature\n\nDiverse Portrayals\nd) Diverse Portrayals in Childrens Literature\nPart 1: As a group, survey childrens literature and select a set of books\nthat include representations of people who are grouped together for\nvarious racial, ethnic, religious, cultural, economic, social, physical,\npolitical, historical reasons, etc. (e.g, African Americans, Latino/Latina\nAmericans, people with disabilities, LGBT families, people who identify as\nJewish/ Christian/ Muslim/ Atheist/ etc., Holocaust survivors, military\nveterans, etc. Select contemporary realistic fiction or picture books\npublished within the last 10 years with a priority on finding the most\nrecent books. (Do not select folktales for this project.) Locate and read\n12-15 books.\n\nPart 2: On your own, write a paper (1000 words minimum) in which you\ndescribe how individuals and groups are portrayed through the text and\nillustrations. Are the portrayals accurate and authentic? Do the authors\nand illustrators identify themselves as part of the group? Is difference a\nfocus of each book or are the books about something else? If any of the\nbooks have been banned or censored, what were the concerns? What do\nyou notice about this set of books? What have you learned about issues of\nportrayal and character?\n\nPart 3: As a group, develop a 20-minute presentation in which you\n\ndemonstrate effective strategies for teaching with literature that\nrepresents diverse cultural, racial, social, religious, economic, and sexual\nidentities and demonstrate strategies that facilitate a learning\nenvironment in which differences and commonalities are valued. 1.\nProvide an oral retelling of the most powerful and personally meaningful\nbook in your collection. 2. Display all of the books you analyzed and\nprovide a book talk and picture walk through the collection. Highlight\ncultural, linguistic, and stylistic variations along with illustrations. 3.\nDemonstrate a strategy for teaching children based on this collection. 4.\nProvide the class with an annotated bibliography and a brief description of\nteaching ideas that support global understanding and diverse perspectives.\n\nComponent 4 Teaching Childrens Literature\n\ne) Read Aloud (Modeling Reading Strategies)\n\nSelect an appropriate Picture Story book for reading aloud (use your\ntextbook for ideas).\n\nStep 1: Pick a book for a read aloud and develop a lesson plan using this\n\nStep 2 (In-class Practice): In class, you will read this book to a small group\nof your peers. Your peers will record your reading and anonymously\nevaluate you using criteria from the textbook. You will receive the\nfeedback on your text selection and your read-aloud strategies. You will\nuse the comments for constructive, reflective purposes.\n\nStep 3 (In field experience): You will read a story to a group of children and\nfilm your performance (do not film childrens faces). You will post your\nvideo in the class site. You will also extend your read aloud by leading the\nstudents in a response to the text. You will design and execute a lesson\nbased on the childrens needs and interests. You will collect evidence of\nstudent learning and reflect on your effectiveness. (These activities may\noccur over several days.) (Step 3: Critical Task)\nf) Books Talks (Modeling Text Selection Criteria and Multimodal\nResponses to Texts)\nYou will present one book talk to the class. After selecting a piece of\nliterature, develop a book talk to introduce the book to the class. Your book\ntalk will be presented to a small the whole class. I will evaluate your talk\nusing criteria from your textbook. Each student will sign up for a specific\ndate for the book talk.\n\n\ng) Literature Discussion Groups/Book Clubs (Demonstrating Shared or\n\nGuided Reading Strategies)\nThis assignment is connected to Component 1a Literary Analysis.\nEach week, you will join other people who have read the same books and\ncreate a book club. You will facilitate two book club sessions and\ndemonstrate your ability to lead one-on-one, in groups, and teacher-led\ndiscussions with diverse partners to explore literary content, elements,\nand personal responses. You will document the discussion strategies you\nuse to guide the group. You will also collect documentation of student\n\n\nLiterary Analysis (C&W)\n\n50 points each\n600 total points\n\nClassroom Book Wish List\n\n100 points\n\n\n\nDiverse Portrayals in Childrens Literature\n\nIndividual paper 100 points\n\nPresentation 100 points\n\nBook Talks\n\n20 points\n\nBook Club facilitation and participation\n\nfacilitation, 50 points each, total 100 points\n\nparticipation, 50 points total\n\nResponse Repository\n\n5 points for each reflection\n\n70 points total\n\nRead Aloud\n\nIn-class 50 points\nIn field experience 50 points\n\n\n1240 total points\n\n\n9. Grading Criteria:\nIndicate what system will be used (i.e. straight letter grade, a plus and minus, or\nan S/U); grading scale, circumstances under which an I will be awarded. If this\nis a course for majors, indicate what assignment(s) is a critical assignments and\nthe consequence if it is not completed. Also indicate that a minimum grade of C-\nor S must be achieved in courses in their major.\n\nGrading Criteria:\nPlus/Minus Grading: A minimum grade of C- is required.\n\n\nA+ = 98-100\nA = 95-97\nA- = 92-94\n\nB+ = 90-91\nB = 85-89\nB- = 82-84\n\nC+ = 80-81\nC = 75-79\nC- = 72-74\n\nD+ = 70-71 F = 0-61\nD = 65-69\nD- = 62-64\n\nAssessment of Weekly Participation/Attendance:\n\nBE TURNED IN ON TIME. There are many legitimate reasons for absences, tardies, and late\nwork (e.g., family emergencies, illness, car trouble, etc.). If you miss class, arrive late, or leave\nearly, I will assume that your reasons are legitimate. Therefore, I do not excuse or accept\ndoctors notes for absences, tardies, or late work for any reason. Please advise me if you will be\nabsent or late.\n\nConsistent and complete attendance is necessary to learn all of the information covered in the\ncourse and to observe modeled instructional strategies. More than one absence or two tardies (for\nany reason) will lower your grade according to the following breakdown.\n\n\nEACH ABSENCE (for any reason) will lower your course grade by 1 letter grade.\n\n\nEACH TARDY/LEAVE EARLY (for any reason) will lower your course grade by 5% because\nyou will miss demonstrations, class activities, or reading strategies. Any tardy or early\ndeparture over 30 minutes is considered an absence.\nAny assignment that is not turned in at the designated time is considered late.\nAssignments submitted within 7 days after the due date will receive no more than half\ncredit. Any assignment that is turned in after 7 days will NOT be accepted and will\nreceive no credit.\nPREPARATION FOR CLASS (for any reason) you will be asked to leave. This includes, but\nis not limited to, checking email, texting, searching the Internet, taking phone calls, etc. If\nyou are asked to leave, this will result in an absence.\n\nCritical Tasks\nStudents in the Elementary Education Program are required to successfully\ncomplete Critical Tasks in program courses to document meeting State of Florida\nteacher preparation standards.\nCritical tasks must be posted in the electronic portfolio (Chalk and Wire).\nStudents must score a 3 or higher on the Chalk and Wire rubric in order to pass\nthe course. You are responsible for submitting the assignment to Chalk and Wire\nat the time you submit the assignment for the instructors evaluation. The\nhomepage of the College of Education website has a link to Chalk and Wire for\ninformation about training and their help desk.\n\n\nTextbook(s) and Readings:\n\nList required and/or recommended texts and readings. If text is older than five\nyears, provide a statement as to why it is being used.\n\nRequired Textbook\nKiefer, B. & Tyson, C. (2013). Charlotte Hucks childrens literature a brief guide\n(2nd Ed.). Boston, MA: McGraw-Hill. ISBN-10: 0078024420 | ISBN-13:\n\nOptional Readings\nAl-Hazza, T. C. and Bucher, K. T. (2008), Building Arab Americans' Cultural\nIdentity and Acceptance With Children's Literature. The Reading Teacher,\n62:210219. doi:10.1598/RT.62.3.3\n\nBlock, C. C. and Israel, S. E. (2004), The ABCs of Performing Highly Effective\n\nThink-Alouds. The Reading Teacher, 58:154167. doi:10.1598/RT.58.2.4\n\nMills, H. and Jennings, L. (2011), Talking About Talk: Recaiming the Value and\nPower of Literature Circles. The Reading Teacher, 64:590598. doi:10.1598/RT.\n\nO'Neil, K. E. (2011), Reading Pictures: Developing Visual Literacy for Greater\n\nComprehension. The Reading Teacher, 65:214223. doi:10.1002/TRTR.01026\n\nRisko, V. J., Walker-Dalhouse, D., Bridges, E. S. and Wilson, A. (2011), Drawing on\n\nText Features for Reading Comprehension and Composing. The Reading Teacher,\n64:376378. doi:10.1598/RT.64.5.12\n\nSerafini, F. (2011), Creating Space for Children's Literature. The Reading\n\nTeacher, 65:3034. doi:10.1598/RT.65.1.4\n\n\n\nAcademic Dishonesty: (Use the statement below)\n\nPlagiarism is defined as \"literary theft\" and consists of the unattributed\n\nquotation of the exact words of a published text or the unattributed borrowing of\noriginal ideas by paraphrase from a published text. On written papers for which\nthe student employs information gathered from books, articles, or oral sources,\neach direct quotation, as well as ideas and facts that are not generally known to\nthe public-at-large, must be attributed to its author by means of the appropriate\ncitation procedure. Citations may be made in footnotes or within the body of the\ntext. Plagiarism also consists of passing off as one's own, segments or the total of\nanother person's work.\n\nPunishment for academic dishonesty will depend on the seriousness of the\n\noffense and may include receipt of an \"F\" with a numerical value of zero on the\nitem submitted, and the \"F\" shall be used to determine the final course grade. It is\nthe option of the instructor to assign the student a grade of \"F\" of \"FF\" (the latter\nindicating dishonesty) in the course.\nDetection of Plagiarism: It is very important to state in your\nsyllabus that you plan to submit student assignments to in\norder to detect plagiarism. This will give you the legal right to submit student\nassignments to If you pan to submit assignments to Safe\nAssignment, use the statement below:\n\nThe University of South Florida has an account with an automated plagiarism\n\ndetection service which allows instructors to submit student assignments to be\nchecked for plagiarism. I reserve the right to 1) request that assignments be\nsubmitted to me as electronic files and 2) electronically submit to, or 3) ask students to submit their assignments to through myUSF. Assignments are compared automatically\nwith a database of journal articles, web articles, and previously submitted\npapers. The instructor receives a report showing exactly how a student's paper\nwas plagiarized.\n\nWeb Portal Information: (Use the statement below)\n\nEvery newly enrolled USF student receives an official USF e-mail account that\nends with \"\" Every official USF correspondence to students\nwill be sent to that account. Go to the Academic Computing website and select the\nlink \"Activating a Student E-mail Account\" for detailed information. Information\nabout the USF Web Portal can be found at:\n\nADA Statement: (Use the statement below)\n\nStudents in need of academic accommodations for a disability may consult with\n\nthe office of Services for Students with Disabilities to arrange appropriate\naccommodations. Students are required to give reasonable notice (typically 5\nworking days) prior to requesting an accommodation\n\nUSF Policy on Religious Observances: (Use the statement below)\n\nthe instructor, in writing, by the second class meeting.", "pred_label": "__label__1", "pred_score_pos": 0.9504367113113403} {"content": "What Is “Dry” Wine?\n\nAugust 7, 2018\n\nThe world of wine is an amazing one at times. There’s so much to taste, tens of thousands of varieties to explore, and great times to be had with every bottle. However, nobody could deny that, when it comes to jargon and terminology, it can be incredibly frustrating, daunting, and confusing, too.\n\nThe word “dry” when used in reference to wine is confusing from the very first moment. Wine is a liquid – it is, therefore, the polar opposite of “dry”. Despite this, it’s a piece of terminology which we become extremely familiar with from the very beginning. We see it on wine lists at restaurants, emblazoned across labels in our wine store, and we hear wine experts using it in their descriptions pretty much all the time. Why, then, is it so often misused and misunderstood?\n\n\nWhat is – and isn’t – dryness in wine?\n\nThe reason the word “dry” is so commonly misused comes down to the simple fact that all too many of us use it in a rational sense; we often describe a wine as being “dry” due to the sensory characteristics we come across while drinking. It’s important to remember, though, that just because a wine seems dry, this doesn’t necessarily make it a dry wine. Confused? We don’t blame you. Let’s take a closer look, and try to clear this issue up!\n\nPut simply, a dry wine is one which isn’t sweet, due to it having no residual sugar. During the fermentation process, all those lovely sweet sugars present in grapes gets eaten by yeast, which in turn creates carbon dioxide and allows the alcohol to be created. Many winemakers want their wines to retain some of the natural sweetness of the grapes, and halt the fermentation process before the yeast has had time to eat up all the sugar in the juice. The result is ‘residual sugar’ – that delightful little touch of sweetness on the palate you’ll find in wines such as Riesling, Gewurztraminer and others besides.\n\nIf the winemaker decides he wants his or her wine to be very dry, the fermentation process will be allowed to come to a natural finish, during which all the sugar in the juice will have been consumed by the yeast. Bone-dry wines with crystal clarity and absolutely no trace of residual sweetness have become highly fashionable in recent years, and this has led to the resurgence of very dry styles of Chardonnay, as well as other grape varietals which suit a biting dryness, like Gruner Veltliner. No sugar, no sweetness on the palate – this equals what we’d call a dry wine.\n\n\nSo Why Is This Term Misused?\n\nIf we consider the fact that “dry” simply means “not sweet”, then why is it than wine drinkers are getting this term confused?\n\nQuite simply, because we often confuse the technical term “dry” with a sensation of dryness. Dry wines do not necessarily create that dryness in the mouth we’ve all experienced from certain full-bodied or very tannic wines; that astringent sensation is caused by the tannins reacting on your tongue, and not by the level of sweetness or technical dryness of the wine you’re drinking.\n\nIt’s worth pointing out at this point that many dry (in the non-sugary sense) wines are also high in tannins, so this astringent sensation is often combined with a lack of sweetness in the same bottle. This doesn’t change the facts, though: wines will only dry your mouth if they are strong in tannins, not if they lack residual sugar.\n\n\nOther Misconceptions\n\nPeople often also assume that dry wines are higher in alcohol. Why is this the case? Most likely because more alcoholic wines have a stronger alcohol flavor, which also tricks our palate into a sensation of dryness. Again, this has little to do with the amount of residual sugar in the wine. Some sweet wines – like the famous dessert wines of southern France and Hungary – are very high in alcohol, and yet contain sackfuls of residual sugar… and nobody would dream of calling them “dry”!\n\n\n\n\n Instagram has returned invalid data.", "pred_label": "__label__1", "pred_score_pos": 0.9317048788070679} {"content": "Boosting techniques have recently been rising in Kaggle competitions and other predictive analysis tasks. You may have heard of them under the names of XGBoost or LGBM. In this tutorial, we’ll go through Adaboost, one of the first boosting techniques discovered.\n\nThis article can also be found on Towards Data Science.\n\nThe limits of Bagging\n\nFor what comes next, consider a binary classification problem. We are either classifying an observation as 0 or as 1. This is not the purpose of the article, but for the sake of clarity, let’s recall the concept of bagging.\n\nBagging is a technique that stands for Bootstrap Aggregating. The essence is to select T bootstrap samples, fit a classifier on each of these samples, and train the models in parallel. Typically, in a Random Forest, decision trees are trained in parallel. The results of all classifiers are then averaged into a bagging classifier :\n\nThis process can be illustrated in the following way. Let’s consider 3 classifiers which produce a classification result and can be either right or wrong. If we plot the results of the 3 classifiers, there are regions in which the classifiers will be wrong. These regions are represented in red.\n\n\nThis example works perfectly since when one classifier is wrong, the two others are correct. By voting classifier, you achieve great accuracy! But as you might guess, there are also cases in which Bagging does not work properly, when all classifiers are mistaken in the same region.\n\n\nFor this reason, the intuition behind the discovery of Boosting was the following :\n\n • instead of training parallel models, one needs to train models sequentially\n • and each model should focus on where the previous classifier performed poorly\n\nIntroduction to Boosting\n\n\nThe intuition described above can be described as such :\n\n • Train the model on the whole set\n • Train the model with exaggerated data on the regions in which performs poorly\n • Train the model with exaggerated data on the regions in which\n\nInstead of training the models in parallel, we can train them sequentially. This is the essence of Boosting!\n\nBoosting trains a series of low performing algorithms, called weak learners, by adjusting the error metric over time. Weak learners are algorithms whose error rate is slightly under 50% as illustrated below :\n\n\nWeighted errors\n\nHow could we implement such classifier? By weighting errors throughout the iterations! This would give more weight to regions in which the previous classifiers performed poorly.\n\nLet’s consider data points on a 2D plot. Some of them will be well classified, others won’t. Usually, the weight attributed to each error when computing the error rate is where n is the number of data points to classify.\n\n\nNow if we apply some weight to the errors :\n\n\nYou might now notice that we give more weight to the data points that are not well classified. Here’s an illustration of the weighting process :\n\n\nIn the end, we want to build a strong classifier that may look like this :\n\n\nTree stumps\n\nOne question you might ask, is how many classifiers should one implement to have it working well? And how is each classifier chosen at each step?\n\nThe answer lies in the definition of so-called tree stumps! Tree stumps defines a 1-level decision tree. The main idea is that at each step, we want to find the best stump, i.e the best data split, that minimizes the overall error. You can see a stump as a test, in which the assumption is that everything that lies on one side belongs to class 1, and everything that lies on the other side belongs to class 0.\n\nThere are a lot of combinations possible for a tree stump. Let’s see how many combinations we face in our simple example? Let’s take a minute to count them.\n\n\nWell, the answer is… 12 ! It might seem surprising, but it’s rather easy to understand.\n\n\nThere are 12 possible “test” we could make. The “2” on the side of each separating line simply represents the fact that all points on one side could be points that belong to class 0, or class 1. Therefore, there are 2 tests embedded in it.\n\nAt each iteration , we will choose the weak classifier that splits best the data, by reducing the overall error rate the most. Recall that the error rate is a modified error rate version that takes into account what has been introduced before.\n\nFinding the best split\n\nAs stated above, the best split is found by identifying at each iteration , the best weak classifier , generally a decision tree with 1 node and 2 leaves (a stump). Suppose that we are trying a predict whether someone who wants to borrow money will be a good payer or not :\n\n\nIn this case, the best split at time is to stump on the Payment history. In this case, the best split at time tt is to stump on the Payment history, since the weighted error resulting from this split is minimal.\n\nSimply note that decision tree classifiers like these can in practice be deeper than a simple stump. This will be a hyper-parameter.\n\nCombining classifiers\n\nThe next logical step is to combine the classifiers into a Sign classifier and depending on which side of the frontier a point will stand, it will be classified as 0 or 1. It can be achieved this way :\n\n\nDo you see any way to potentially improve the classifier?\n\nBy adding weights on each classifier !\n\n\nWrapping it up\n\nLet’s wrap up in a small pseudo-code what we covered so far.\n\nStep 1 : Let where denotes the number of training samples, and let be the chosen number of iterations.\n\nStep 2 : For in :\n\na. Pick the weak classifier that minimizes\n\nb. Compute the weight of the classifier chosen :\n\nc. Update the weights of the training examples and go back to step a).\n\nStep 3 :\n\nIf you’d like to understand the intuition behind $ w_i^{t+1} $, here’s the formula : $ w_{t+1}(i) = \\frac { w_{t}(i) } { Z } e ^{- \\alpha^t h^t(x) y(x)}$\n\nThe key elements to remember from it are :\n\n • is a constant whose role is to normalize the weights so that they add up to 1!\n • is a weight that we apply to each classifier\n\nAnd we’re done! This algorithm is called AdaBoost. This is the most important algorithm one needs to understand to fully understand all boosting methods.\n\n\nBoosting algorithms are rather fast to train, which is great. But how come they’re fast to train since we consider every stump possible and compute exponentials recursively?\n\nWell, here’s where the magic happens. If we choose properly $ \\alpha^t $ and $ Z $, the weights that are supposed to change at each step simplify to :\n\n\nThis is a very strong result, and it does not contradict the statement according to which the weights should vary with the iterations, since the number of training samples that are badly classified drops, and their total weights is still 0.5!\n\n • No to compute\n • No\n • No exponential\n\nAnd there’s another trick: any classifier that tries to split 2 well-classified data points will never be optimal. There’s no need to even compute it.\n\n\nAdaBoost has for a long time been considered as one of the few algorithms that do not overfit. But lately, it has been proven to overfit at some point, and one should be aware of it. AdaBoost is vastly used in face detection to assess whether there is a face in the video or not. AdaBoost can also be used as a regression algorithm.\n\n\nLet’s code!\n\nNow, we’ll take a quick look at how to use Adaboost in Python using a simple example on a handwritten digit recognition.\n\nimport pandas as pd\nimport numpy as np\nimport matplotlib.pyplot as plt\n\nfrom sklearn.ensemble import AdaBoostClassifier\nfrom sklearn.tree import DecisionTreeClassifier\n\nfrom sklearn.metrics import accuracy_score\nfrom sklearn.model_selection import cross_val_score\nfrom sklearn.model_selection import cross_val_predict\nfrom sklearn.model_selection import train_test_split\nfrom sklearn.model_selection import learning_curve\n\nfrom sklearn.datasets import load_digits\n\nLet’s load the data :\n\ndataset = load_digits()\nX = dataset['data']\ny = dataset['target']\n\n$ X $ contains arrays of length 64 which are simply flattened 8x8 images. This dataset aims to recognize handwritten digits. Let’s take a look at a given handwritten digit :\n\n\n\nIf we stick to a Decision Tree Classifier of depth 1 (a stump), here’s how to implement AdaBoost classifier :\n\nreg_ada = AdaBoostClassifier(DecisionTreeClassifier(max_depth=1))\nscores_ada = cross_val_score(reg_ada, X, y, cv=6)\n\nAnd it should head a result of around 26%, which can largely be improved. One of the key parameters is the depth of the sequential decision tree classifiers. How does accuracy improve with depth of the decision trees?\n\nscore = []\nfor depth in [1,2,10] : \n reg_ada = AdaBoostClassifier(DecisionTreeClassifier(max_depth=depth))\n\nAnd the maximal score is reached for a depth of 10 in this simple example, with an accuracy of 95.8%.\n\nThe Github repository of this article can be found here.\n\nConclusion : I hope that this article introduced clearly the concept of AdaBoost and that it does now seem clear to you. Don’t hesitate to drop a comment if you have any question.\n\nReferences :\n\n\nLeave a comment", "pred_label": "__label__1", "pred_score_pos": 0.6675820350646973} {"content": "When you decide to buy steroids online, you will need to do some research and find a reputable store. You will also want to know the quality of the drugs, verify the genuineness of the manufacturers’ sites with unique numbers, and check how fast their shipping is.\n\nThe World’s #1 Online Anabolic Supplier\n\n\nTOP 1 – Turinabol\nTurinabol is a powerful derivative of Dianabol, but in comparison it displays no estrogenic effects and much less androgenic activity. It also maintains a more favorable balance of anabolic to androgenic effect compared to its famous cousin.\nTOP 2 – Anavar\nAnavar (Oxandrolone) is a favorite steroid for individuals who are cutting due to its ability to prevent catabolism while on a calorie deficit. It displays six times the anabolic activity of testosterone with significantly less androgenic effects. It is perfect for a beginner’s cycle and popular with women due to its lack of significant side effects.\nTOP 3 – Winstrol\nWinstrol is an especially strong and effective steroid used to improve dryness and increase vascularity during a cutting cycle. Perfect for lean muscle gains, it has a unique SHBG lowering action and when stacked with Anavar the user will experience exceptional results.\nTOP 4 – Primobolan\nPrimobolan is a structurally altered form of dihydrotestosterone. It is not a typical c-17aa compound and therefore not toxic to the liver. It is a very effective lean tissue building anabolic agent and its strong anabolic and non-estrogenic nature make it very desirable for building lean muscularity without any side effects.", "pred_label": "__label__1", "pred_score_pos": 0.854276716709137} {"content": "Frederick jackson turner s thesis\n\nHis father was active in Republican politics, an investor in the railroad, and was a newspaper editor and publisher. His mother taught school. He earned his Ph. Turner did not publish extensively; his influence came from tersely expressed interpretive theories published in articleswhich influenced his hundreds of disciples.\n\nFrederick jackson turner s thesis\n\n\nFrederick jackson turner s thesis\n\n\nHe writes of how the frontier drove American history and why America is how it is today. Turner reflects on the past to prove his point by noting human fascination with the frontier and how expansion to the American West changed people's views on their culture.\n\nIt is a thesis that has been respected in the historical circle for many years. Inin \"The Frontier and American Institutions: A Criticism of the Turner Thesis,\" Professor George Wilson Pierson debated the validity of the Turner thesis, stating that many factors influenced American culture besides the looming frontier.\n\nFrederick Jackson Turner, “Significance of the Frontier in American History” (1893)\n\nAlthough he respected Turner, Pierson strongly argues his point by looking beyond the frontier and acknowledging other factors in American development. The Unbroken Past of the American West.\n\nFrederick jackson turner s thesis\n\n\nUrban historian Richard C.\n\nFrontier Thesis - Wikipedia\n\nWade challenged the Frontier Thesis in his first book, The Urban Frontierasserting that western cities such as Pittsburgh, Louisville, and Cincinnati, not the farmer pioneers, were the catalysts for western expansion.Frederick Jackson Turner's essay, \"The Significance of the Frontier in American History,\" written in , is perhaps the most influential essay ever read at the American Historical Association's annual conference.\n\n\nThe Frontier Thesis Introduction The emergence of western history as an important field of scholarship started with Frederick Jackson Turner’s () famous essay “The Significance of the Frontier in American history.”[1] This thesis shaped both popular and scholarly views of .\n\n\nFRONTIER THESIS, TURNER'S. FRONTIER THESIS, TURNER'S. Frederick Jackson Turner's \"The Significance of the Frontier in American History\" is arguably one of the most influential interpretations of the American past ever espoused.\n\nDelivered in Chicago before two hundred historians at the World's Columbian Exposition, a celebration of the four hundredth anniversary of Columbus's .\n\nThe Turner Theses\n\nFrederick Jackson Turner’s Frontier Thesis Essay Sample. We live in a world where everything is constantly changing. Everything that we see, feel, hear, taste and smell at one moment are not the same things as they were before. Jan 28,  · Best Answer: \"The Significance of the Frontier in American History\" is a seminal essay by the American historian Frederick Jackson Turner which advanced the Frontier Thesis of American history.\n\nIt was presented to a special meeting of the American Historical Association at the World's Columbian Exposition on July 12, , in Chicago, Illinois, and published later that year first in Status: Resolved.\n\nPBS - THE WEST - Frederick Jackson Turner", "pred_label": "__label__1", "pred_score_pos": 0.6778029203414917} {"content": "Science is the history of good ideas ... evolving to better ones.\n\nSAFIRE is the story of a small group of engineers, scientists and scholars who attempt to do what has never been done before – build a sun on Earth, a miniature but perfectly functioning replica of the sun in the sky.\n\nIf the premise underlying the SAFIRE project proves correct it will open wide the floodgates to countless new streams of scientific enquiry.\n\nFlat Earth, round Earth. A game changer.\n\n\na feature documentary film", "pred_label": "__label__1", "pred_score_pos": 0.9407262206077576} {"content": "Changes between Initial Version and Version 1 of NetworkDynamicSpecs\n\n10/25/12 13:22:14 (7 years ago)\n\nMoved nd spec onto wiki from:\n\n\n • NetworkDynamicSpecs\n\n v1 v1  \n  2== Base Specifications for networkDynamic Package == \n  4This document provides the specification design notes used in writing the networkDynamic package. Additional specs and proposals are located on: \n  5 * NetworkDynamicConverterFunctions \n  6 * TemporallyExtendedAttributes \n  7 * PersistentIdProposal  \n  11=== Goals overview === \n  13Extend the \"network\" package data structures to be able to store and access in a reasonably efficient way: \n  14 * Networks with nodes with \"activity\" or \"existence\" status changes over time (they enter or leave the network) \n  15 * Edges which appear and disappear over time \n  16 * Arbitrary attribute values attached to nodes and edges that change over time \n  17 * Meta-level attributes of the network which change over time \n  18 * Both continuous and discrete time models are supported, and it is possible to effectively blend multiple representations in the same object.  \n  20=== Outline of Structure === \n  22The networkDynamic package provides support for a simple family of dynamic extensions to the network class; these are currently accomplished via the standard network attribute functionality (and hence the resulting objects are still compatible with all conventional routines), but greatly facilitate the practical storage and utilization of dynamic network data. \n  24Currently, each edge and vertex in a dynamically extended network is presumed to be in one of two states (“active” or “inactive”) at any given point in time. The state of a network element (i.e., edge or vertex) is governed by an attribute with the name “active”, which is considered a reserved term for purposes of this package. \n  26=== Definition of Activity Spell === \n  28The activity attribute consists of a two-column numeric matrix, each row of which contains an activity spell, and the two columns of which encode onset and terminus times (respectively). Elements are presumed inactive until the onset of their first activity spell, and are likewise presumed inactive after the termination of their last spell; spells must be consecutive and strictly non-overlapping, and are taken to span the period from the onset (inclusive) to the terminus (exclusive). The onset value for each spell must always be less then or equal to the terminus. As long as this constraint is met, any numeric values may be used for spell timing, including Inf and -Inf. (The latter are used to create spells which are open-ended.) \n  30Elements which are strictly inactive (i.e., with no valid activity spells) may be denoted by a matrix considering only of the special “null” spell, c(Inf,Inf). Functions using this package extensions should interpret this spell to indicate complete inactivity. This spell is likewise incompatible with other spells, and should be replaced whenever an activation enters the element's event history. \n  32Although various special functions are provided to aid access to the active attribute, they are not strictly necessary: any standard network methods (e.g., get.edge.attribute) may be used to get or set this information. Care should be taken, however, to preserve the mandatory two-column structure when setting or modifying activity attributes. \n  34=== Inserting / Setting Spells === \n  35Insertion of spells that intersect other spells. New spells should overwrite old, and any remaining time should be accounted for with new spells \n  38=== Modifying Spells === \n  42==== Comparing and matching spells ==== \n  44Many of the operations involving dynamic networks or attributes require comparisons of spells in order to determine inclusion or exclusion of elements of the network. When a function permits inclusion of \"onset\" and \"terminus\" values, the function is implemented to assume that the \"query interval\" is the spell from onset (inclusive) to terminus (exclusive). When two spells have identical values for onset and terminus, they are considered as matching. When comparisons are made involving the (nearly) zero-length query spell where onset=terminus, they will be performed as \"point comparisons\" where only the onset (inclusive) is compared to target spells when evaluating a match.   \n  46=== Matching Rules For Spells === \n  48When working with continuous time data or non-unit length query spells it is highly likely that vertex and edge activity spells will not exactly line up with with the query spell used to ascertain their activity. For example, a node may toggle on and off multiple times within a time period, or may be deactivated partway through the time period. Methods which determine the activity of elements must include a parameter to give the appropriate rule for resolving the ambiguous cases. The minimal set of supported rules is:  \n  49        \"any\": include a an element if it is active at any time during the query spell \n  50        \"all\": only include elements that are active for the entire duration of a query spell \n  54=== Infinite values in spells === \n  56Regarding queries with infinite values, elements are defined to be active at negative infinity if the activity spells of these elements are of the form \\code{c(-Inf, x)}, where x is a finite number or \\code{Inf}. Likewise, elements are defined to be active at positive infinity for activity spells of the form \\code{c(x, Inf)}, where x is finite or \\code{-Inf}. Elements are defined as inactive at all time points for those with activity spells = \\code{c(Inf, Inf)}. \n  58Note that there are a lot of complications here surrounding Inf values.  If an activity spell starts at time Inf, it can never match anything (including query onsets of Inf) because it starts after all possible spells.  If an activity spell starts at finite time and ends at Inf, however, it _does_ match an onset/terminus of Inf.  By turns, a spell which begins at time -Inf should match -Inf onset times.   \n  60Todo: update here about interpretations of -Inf and Inf values as onset-censored and terminus-censored \n  64=== Defining the behavior of a network over time. === \n  66 1.When new members join the network, they should be added with add.vertices (as usual).  When old members exit, however, they are _not_ deleted -- instead, they are simply deactivated.  Thus, one modifies the existing  \n  67network in place, and does not produce a network for every time step. \n  69 2.Activation/deactivation is time stamped (continuous time, but you can use it discretely), and an edge or vertex can be activated or deactivated any number of times.  An edge must be added the first time that the (i,j) pair  \n  70occurs, but thereafter its activity can simply be modified to represent switching off/on. \n  72 3.There are various ways to query the resulting network object regarding the status of vertices, edges, etc.  Among other things, one can simply extract a cross-section (as a reduced-form network) if one needs it.  All queries can be executed either as point intersection queries or as interval queries, as needs warrant. \n  75=== A few notes and potential pitfalls:=== \n  77 1.Do not cannibalize vertices (re-use vertex ids) unless you know what you are doing. The network should gradually accumulate as new individuals are added; old ones are deactivated, but their IDs remain the same. \n  79 2.The system does not currently enforce consistency between vertex and edge activation -- it is up to you to ensure that you update both elements appropriately.  Inconsistencies could produce surprising results. \n  81 3.Remember to initialize vertices and edges with their initial activation states after adding them.  Otherwise, more surprising results may ensue. \n  83 4.The new routines are all R-only, and hence may be slow in some cases. Hopefully, they will be fast enough for your application without backending them.  Where your application allows standard network functions to be used, do so (they are potentially faster); this mostly applies to gratuitous use of the \"extended\" network class methods, which should be avoided when not specifically necessary. \n  85 5.Because many decimal numbers do not have exact binary equivalents (ex: 1.0-0.9-0.1 = -2.775558e-17 ) problems can occur when comparing spells where spells that seem like they logically should match in fact don't.  For example according to the rules of floating point math, 3.6125 != (289*0.0125). \n  87=== Extracting a cross-section of a network === \n  89DRAFT Aggregation rules for collapsing networks  \n  90 * provide ability to include a function to sum, avg, max, etc edge weights \n  91 * option to return set of values? \n  95=== Conversion of discrete to continuous time === \n  97The underlying data representation of the package is a continuous time, but most discrete time time models can be expressed with care. The preferred representation is to store each discrete time step as an interval of unity duration [1,2).  In some situations (usually continuous-time representations of instantaneous measurements) it may be appropriate to use spells in which the onset and termination times are equal.  These should be thought of not as having a duration of zero, but as having a vanishingly small duration or one that is shorter than our ability to measure. \n  99When converting from a discrete time model (panel data) to a continuous time representation there can be ambiguity about how the spells should be constructed. Functions performing these activities should permit both an \"instant\" model (wave 2 becomes the spell [2,2) ) and the \"interval\" model (wave 2 becomes the spell [2,3) ) with the interval model as the default to encourage consistency throughout the package.", "pred_label": "__label__1", "pred_score_pos": 0.9477856159210205} {"content": "Yorkshire in England\nLocation within England, showing historic extent\n • 1831 3,669,510 acres (14,850 km2)[1]\n • 1901 3,883,979 acres (15,718 km2)[1]\n • 1991 2,941,247 acres (11,903 km2)[1]\n • 1831 1,371,359[1]\n • 1901 3,512,838[1]\n • 1991 3,978,484[1]\n • 2011 5,288,200[2]\n • 1831 0.37/acre (91/km2)\n • 1901 0.9/acre (220/km2)\n • 1991 1.35/acre (330/km2)\n • Origin Kingdom of Jórvík\n • Created In antiquity\n • Succeeded by Various\nChapman code YKS\n • Type Ridings\n • Units 1 North2 West3 East\nRidings of Yorkshire\n\nYorkshire (/ˈjɔːrkʃər, -ʃɪər/; abbreviated Yorks), formally known as the County of York, is a historic county of Northern England and the largest in the United Kingdom.[3] Due to its great size in comparison to other English counties, functions have been undertaken over time by its subdivisions, which have also been subject to periodic reform. Throughout these changes, Yorkshire has continued to be recognised as a geographical territory and cultural region.[4] The name is familiar and well understood across the United Kingdom and is in common use in the media and the military,[5] and also features in the titles of current areas of civil administration such as North Yorkshire, South Yorkshire, West Yorkshire and East Riding of Yorkshire.\n\nWithin the borders of the historic county of Yorkshire are vast stretches of unspoiled countryside. This can be found in the Yorkshire Dales and North York Moors and with the open aspect of some of the major cities.[6][7] Yorkshire has also been nicknamed \"God's Own County\".[4][8][9]\n\nThe emblem of Yorkshire is the White Rose of the English royal House of York, and the most commonly used flag representative of Yorkshire is the White Rose on a blue background,[10] which after nearly fifty years of use, was recognised by the Flag Institute on 29 July 2008.[11] Yorkshire Day, held annually on 1 August, is a celebration of the general culture of Yorkshire, ranging from its history to its own dialect.[12]\n\nYorkshire is covered by different Government Office Regions. Most of the county falls within Yorkshire and the Humber while the extreme northern part of the county, such as Middlesbrough, Redcar, Holwick and Startforth, falls within North East England. Small areas in the west of the county are covered by the North West England region.\n\n\nYorkshire or the County of York was so named as it is the shire (administrative area or county) of the city of York or York's Shire. \"York\" comes from the Viking name for the city, Jórvík. The word \"Shire\" is either from the Old Norse word Skyr or from Old English Scir meaning care or official charge.[13] The \"shire\" suffix is locally pronounced /-ʃə/ \"shuh\", or occasionally /-ʃiə/, a homophone of \"sheer\".[14]\n\n\nCeltic tribes\n\nEarly inhabitants of Yorkshire were Celts, who formed two separate tribes, the Brigantes and the Parisi. The Brigantes controlled territory which later became all of the North Riding of Yorkshire and the West Riding of Yorkshire. The tribe controlled most of Northern England and more territory than any other Celtic tribe in England. That they had the Yorkshire area as their heartland is evident in that Isurium Brigantum (now known as Aldborough) was the capital town of their civitas under Roman rule. Six of the nine Brigantian poleis described by Claudius Ptolemaeus in the Geographia fall within the historic county.[15][16] The Parisi, who controlled the area that would become the East Riding of Yorkshire, might have been related to the Parisii of Lutetia Parisiorum, Gaul (known today as Paris, France).[17] Their capital was at Petuaria, close to the Humber Estuary. Although the Roman conquest of Britain began in 43 AD, the Brigantes remained in control of their kingdom as a client state of Rome for an extended period, reigned over by the Brigantian monarchs Cartimandua and her husband Venutius. Initially, this situation suited both the Romans and the Brigantes, who were known as the most militant tribe in Britain.[18]\n\nRoman period\n\nStatue of Constantine I outside York Minster.\n\nQueen Cartimandua left her husband Venutius for his armour bearer, Vellocatus, setting off a chain of events which changed control of the region. Cartimandua, due to her good relationship with the Romans, was able to keep control of the kingdom; however, her former husband staged rebellions against her and her Roman allies.[19] At the second attempt, Venutius seized the kingdom, but the Romans, under general Petillius Cerialis, conquered the Brigantes in 71 AD.[20]\n\nThe fortified city of Eboracum (now known as York) was named as capital of Britannia Inferior and joint capital of all Roman Britain.[21] The emperor Septimius Severus ruled the Roman Empire from Eboracum for the two years before his death.[22]\n\nAnother emperor, Constantius Chlorus, died in Eboracum during a visit in 306 AD. This saw his son Constantine the Great, who became renowned for his contributions to Christianity, proclaimed emperor in the city.[23] In the early 5th century, the Roman rule ceased with the withdrawal of the last active Roman troops. By this stage, the Western Empire was in intermittent decline.[22]\n\nSecond Celtic period and Angles\n\nAfter the Romans left, small Celtic kingdoms arose in the region, including the Kingdom of Ebrauc around York and the Kingdom of Elmet to the west.[24][25] Elmet remained independent from the Germanic Northumbrian Angles until some time in the early 7th century, when King Edwin of Northumbria expelled its last king, Certic, and annexed the region. At its greatest extent, Northumbria stretched from the Irish Sea to the North Sea and from Edinburgh down to Hallamshire in the south.[26]\n\nKingdom of Jórvík\n\nScandinavian York (also referred to as Jórvík) or Danish/Norwegian York is a term used by historians for the south of Northumbria (modern day Yorkshire) during the period of the late 9th century and first half of the 10th century, when it was dominated by Norse warrior-kings; in particular, used to refer to York, the city controlled by these kings. Norse monarchy controlled varying amounts of Northumbria from 875 to 954, however the area was invaded and conquered for short periods by England between 927 and 954 before eventually being annexed into England in 954. It was closely associated with the much longer-lived Kingdom of Dublin throughout this period.\n\nCoin from Eric Bloodaxe's reign\n\n\n\nFounded by the Dane Halfdan Ragnarsson in 875,[30] ruled for the great part by Danish kings, and populated by the families and subsequent descendants of Danish Vikings, the leadership of the kingdom nonetheless passed into Norwegian hands during its twilight years.[30] Eric Bloodaxe, an ex-king of Norway who was the last independent Viking king of Jórvík, is a particularly noted figure in history,[31] and his bloodthirsty approach towards leadership may have been at least partly responsible for convincing the Danish inhabitants of the region to accept English sovereignty so readily in the years that followed.\n\n\nNorman conquest\n\nYork Minster, western elevation\n\nIn the weeks immediately leading up to the Battle of Hastings in 1066 AD, Harold II of England was distracted by events in Yorkshire. His brother Tostig and Harald Hardrada, King of Norway, attempted a takeover in the North, having won the Battle of Fulford. The King of England marched north where the two armies met at the Battle of Stamford Bridge. Tostig and Hardrada were both killed and their army was defeated decisively. However, Harold Godwinson was forced immediately to march his army back down to the South where William the Conqueror was landing. The King was defeated at Hastings, which led to the Norman conquest of England.\n\nThe people of the North rebelled against the Normans in September 1069 AD, enlisting Sweyn II of Denmark. They tried to take back York, but the Normans burnt it before they could.[33] What followed was the Harrying of the North ordered by William. From York to Durham, crops, domestic animals, and farming tools were scorched. Many villages between the towns were burnt and local northerners were indiscriminately murdered.[34] During the winter that followed, families starved to death and thousands of peasants died of cold and hunger. Orderic Vitalis estimated that \"more than 100,000\" people from the North died from hunger.[35]\n\nIn the centuries following, many abbeys and priories were built in Yorkshire. Norman landowners were keen to increase their revenues and established new towns such as Barnsley, Doncaster, Hull, Leeds, Scarborough and Sheffield, among others. Of towns founded before the conquest, only Bridlington, Pocklington, and York continued at a prominent level.[36] The population of Yorkshire boomed until hit by the Great Famine in the years between 1315 and 1322.[36]\n\n\nThe Black Death reached Yorkshire by 1349, killing around a third of the population.[36]\n\nWars of the Roses\n\nYorkist king Richard III grew up at Middleham. [38]\n\n\nHenry Tudor, sympathiser to the House of Lancaster, defeated and killed Richard at the Battle of Bosworth Field. He then became King Henry VII and married Elizabeth of York, daughter of Yorkist Edward IV, ending the wars.[40] The two roses of white and red, emblems of the Houses of York and Lancaster respectively, were combined to form the Tudor Rose of England.[a][41] This rivalry between the royal houses of York and Lancaster has passed into popular culture as a rivalry between the counties of Yorkshire and Lancashire, particularly in sport (for example the Roses Match played in County Cricket), although the House of Lancaster was based in York and the House of York in London.\n\nCivil War and textile industry\n\nThe wool textile industry, which had previously been a cottage industry, centred on the old market towns moved to the West Riding where entrepreneurs were building mills that took advantage of water power gained by harnessing the rivers and streams flowing from the Pennines. The developing textile industry helped Wakefield and Halifax grow.[42]\n\nThe English Reformation began under Henry VIII and the Dissolution of the Monasteries in 1536 led to a popular uprising known as Pilgrimage of Grace, started in Yorkshire as a protest. Some Catholics in Yorkshire continued to practise their religion and those caught were executed during the reign of Elizabeth I. One such person was a York woman named Margaret Clitherow who was later canonised.[43]\n\n\nIn the 16th and 17th centuries Leeds and other wool-industry-centred towns continued to grow, along with Huddersfield, Hull and Sheffield, while coal mining first came into prominence in the West Riding of Yorkshire.[47] Canals and turnpike roads were introduced in the late 18th century. In the following century the spa towns of Harrogate and Scarborough flourished, due to people believing mineral water had curative properties.[48]\n\nSt George's Minster in Doncaster was built in 1858 and is Grade I listed\n\nThe 19th century saw Yorkshire's continued growth, with the population growing and the Industrial Revolution continuing with prominent industries in coal, textile and steel (especially in Sheffield, Rotherham and Middlesbrough). However, despite the booming industry, living conditions declined in the industrial towns due to overcrowding. This saw bouts of cholera in both 1832 and 1848.[49] However, advances were made by the end of the century with the introduction of modern sewers and water supplies. Several Yorkshire railway networks were introduced as railways spread across the country to reach remote areas.\n\nThe LNER Class A4 4468 Mallard built in Doncaster is the current confirmed record holder as the fastest steam locomotive at 203 km/h (126 mph) on 3 July 1938.\n\n[50] County councils were created for the three ridings in 1889, but their area of control did not include the large towns, which became county boroughs, and included an increasingly large part of the population.[51]\n\n\nYorkshire today\n\nIn the 1970s there were major reforms of local government throughout the United Kingdom. Some of the changes were unpopular,[53] and controversially Yorkshire and its ridings lost status in 1974[54] as part of the Local Government Act 1972.[55] The East Riding was resurrected with reduced boundaries in 1996 with the abolition of Humberside. With slightly different borders, the Government Office entity which currently contains most of Yorkshire is the Yorkshire and the Humber region of England.[54] This region includes a northern slice of Lincolnshire, but does not include the northern part of the ceremonial county of North Yorkshire (Middlesbrough and Redcar and Cleveland), which is in the North East England region. Other parts of the historic county of Yorkshire are also in other official regions. Saddleworth (now in Greater Manchester); the Forest of Bowland (Lancashire); Sedbergh and Dent (Cumbria) are in the North West England region, and Upper Teesdale (County Durham) is in North East England.[53]\n\n\nPhysical and geological\n\nGeology of Yorkshire\n\nHistorically, the northern boundary of Yorkshire was the River Tees, the eastern boundary was the North Sea coast and the southern boundary was the Humber Estuary and Rivers Don and Sheaf. The western boundary meandered along the western slopes of the Pennine Hills to again meet the River Tees.[56] It is bordered by several other historic counties in the form of County Durham, Lincolnshire, Nottinghamshire, Derbyshire, Cheshire, Lancashire and Westmorland.[57] In Yorkshire there is a very close relationship between the major topographical areas and the geological period in which they were formed.[56] The Pennine chain of hills in the west is of Carboniferous origin. The central vale is Permo-Triassic. The North York Moors in the north-east of the county are Jurassic in age while the Yorkshire Wolds to the south east are Cretaceous chalk uplands.[56]\n\nThe main rivers of Yorkshire\n\n\nIn the far north of the county the River Tees flows eastwards through Teesdale and empties its waters into the North Sea downstream of Middlesbrough. The smaller River Esk flows from west to east at the northern foot of the North York Moors to reach the sea at Whitby.[58] To the east of the Yorkshire Wolds the River Hull flows southwards to join the Humber Estuary at Kingston upon Hull.\n\nThe western Pennines are drained by the River Ribble which flows westwards, eventually reaching the Irish Sea close to Lytham St Annes.[58]\n\nNatural areas\n\nGeographic features of Yorkshire\n\nThe countryside of Yorkshire has acquired the common nickname of \"God's Own County\".[4][8] Yorkshire includes the North York Moors and Yorkshire Dales National Parks, and part of the Peak District National Park. Nidderdale and the Howardian Hills are designated Areas of Outstanding Natural Beauty.[59] Spurn Point, Flamborough Head and the coastal North York Moors are designated Heritage Coast areas,[60] and are noted for their scenic views with rugged cliffs[61] such as the jet cliffs at Whitby,[61] the limestone cliffs at Filey and the chalk cliffs at Flamborough Head.[62][63] Moor House – Upper Teesdale, most of which is part of the former North Riding of Yorkshire, is one of England's largest national nature reserves.[64]\n\nThe Royal Society for the Protection of Birds runs nature reserves such as the one at Bempton Cliffs with coastal wildlife such as the northern gannet, Atlantic puffin and razorbill.[65] Spurn Point is a narrow 3-mile (4.8 km) long sand spit. It is a national nature reserve owned by the Yorkshire Wildlife Trust and is noted for its cyclical nature whereby the spit is destroyed and re-created approximately once every 250 years.[66] There are seaside resorts in Yorkshire with sandy beaches; Scarborough is Britain's oldest seaside resort dating back to the spa town-era in the 17th century,[67] while Whitby has been voted as the United Kingdom's best beach, with a \"postcard-perfect harbour\".[68]\n\nHistorically, Yorkshire was divided into three ridings and the Ainsty of York. The term 'riding' is of Viking origin and derives from Threthingr meaning a third part. The three ridings in Yorkshire were named the East Riding, West Riding and North Riding.[69] The East and North Ridings of Yorkshire were separated by the River Derwent and the West and North Ridings were separated by the Ouse and the Ure/Nidd watershed. In 1974, the three ridings of Yorkshire were abolished and York, which had been independent of the three ridings, was incorporated into the new county called North Yorkshire. It later became part of York Unitary Authority.[70]\n\nCities and towns\n\nLocal government\n\nFor statistical purposes, Yorkshire is divided, as of 2018, between three regions of England. Most of the county falls within Yorkshire and the Humber. The extreme northern part of the county, such as Middlesbrough, Redcar, Holwick and Startforth, fall within North East England. Small areas in the west of the historic county, like Saddleworth, Barnoldswick and Sedbergh, fall within North West England. During these processes the geographical or historic boundaries of Yorkshire remained unchanged.\n\nWithin the regions are both ceremonial counties, and the actual units of local government, such as unitary authorities, as detailed at Local government divisions of Yorkshire and the Humber, Local government divisions of North East England and Local government divisions of North West England.\n\n\nBridgewater Place, a symbol of Leeds' growing financial importance.\n\nYorkshire has a mixed economy, and accounts for about 8% of UK GDP. The City of Leeds is Yorkshire's largest city and the leading centre of trade and commerce. Leeds is also one of the UK's larger financial centres. Leeds' traditional industries were mixed; service-based industries, textile manufacturing and coal mining being examples. Tourism is also significant. In 2015, the value of tourism was in excess of £7 billion.[72]\n\nSheffield once had heavy industries, such as coal mining and the steel industry. Since the decline of such industries Sheffield has attracted tertiary and administrative businesses including more retail trade; Meadowhall being an example. However, while Sheffield's heavy industry has declined, the region has reinvented itself as a centre for specialist engineering with Boeing and Maclaren establishing facilities in the city. A cluster of hi-tech facilities including The Welding Institute and the Boeing partnered Advanced Materials Research Centre[73] have all helped to raise the region's profile and to bring significant investment into Yorkshire.[citation needed]\n\n\nNorth Yorkshire has an established tourist industry, supported by the presence of two national parks (Yorkshire Dales National Park, North York Moors National Park), Harrogate, York and Scarborough and this industry is also growing in Leeds. Kingston upon Hull is Yorkshire's largest port and has a large manufacturing base, its fishing industry has however declined somewhat in recent years. Harrogate and Knaresborough both have small legal and financial sectors. Harrogate is a European conference and exhibition destination with both the Great Yorkshire Showground and Harrogate International Centre in the town.\n\nCoal mining was extremely active in the south of the county during the 19th century and for most of the 20th century, particularly around Barnsley and Wakefield. As late as the 1970s, the number of miners working in the area was still in six figures.[74] The industry was placed under threat on 6 March 1984 when the National Coal Board announced the closure of 20 pits nationwide (some of them in South Yorkshire). By March 2004, a mere three coalpits remained open in the area.[75] Three years later, the only remaining coal pit in the region was Maltby Colliery near Rotherham.[76]\n\nYorkshire has been the focus of various industrial promotion and development initiatives, such as Yorkshire Forward, and today various local enterprise partnerships. There are also a number of innovation centres belonging to leading companies, and a range of spin-off companies linked to major universities.\n\nMany large British companies are based in Yorkshire or were founded there. These include HSBC (Sheffield), Morrisons (Bradford), Asda (Leeds), Jet2.com (Leeds), Ronseal (Sheffield), Optare (Leeds), Aunt Bessie's (Hull), Birds Eye (Hull), Wharfedale (Leeds), Plaxton (Scarborough), Seven Seas (Hull), Little Chef (Sheffield), Plusnet (Sheffield), Quidco (Sheffield), Fenner plc (Hull), Halifax Bank (Halifax), Rank Organisation (Hull), Yorkshire Bank (Leeds), William Jackson Food Group (Hull), Yorkshire Building Society (Bradford), Ebuyer (Howden), GHD (Leeds), Marks and Spencer (Leeds), Burtons (Leeds), Jaeger (Ilkley), Magnet Kitchens (Keighley), Reckitt and Sons (Hull), McCains (Scarborough), First Direct (Leeds), KCOM Group (Hull), Tetley's Brewery (Leeds), Timothy Taylor Brewery (Keighley), Bradford and Bingley (Bingley), Skipton Building Society (Skipton), Bettys and Taylors of Harrogate, SGS Europe (Hull) and Provident Financial (Bradford).\n\n\nYorkshire has a large base of primary and secondary schools operated by both local authorities and private bodies, and a dozen universities, along with a wide range of colleges and further education facilities. Four universities are based in Leeds, two in Sheffield, two in York, and one each in Bradford, Hull, Middlesbrough and Huddersfield (the last with branches in Barnsley and Oldham). The largest universities by enrolment are Sheffield Hallam University and the University of Leeds, each with over 31,000 students, followed by Leeds Beckett University, and the most recent to attain university status is the Leeds Arts University. There are also branches of institutions headquartered in other parts of England, such as the Open University and Britain's first for-profit university (since 2012), the University of Law. The tertiary sector is in active cooperation with industry, and a number of spin-off companies have been launched.\n\n\n\nThe most prominent road in Yorkshire, historically called the Great North Road, is known as the A1.[77] This trunk road passes through the centre of the county and is the prime route from London to Edinburgh.[78] Another important road is the more easterly A19 road which starts in Doncaster and ends just north of Newcastle-upon-Tyne at Seaton Burn. The M62 motorway crosses the county from east to west from Hull towards Greater Manchester and Merseyside.[79] The M1 carries traffic from London and the south of England to Yorkshire. In 1999, about 8 miles (13 km) was added to make it swing east of Leeds and connect to the A1.[80] The East Coast Main Line rail link between Scotland and London runs roughly parallel with the A1 through Yorkshire and the Trans Pennine rail link runs east to west from Hull to Liverpool via Leeds.[81]\n\nBefore the advent of rail transport, the seaports of Hull and Whitby played an important role in transporting goods. Historically canals were used, including the Leeds and Liverpool Canal, which is the longest canal in England. Mainland Europe (the Netherlands and Belgium) can be reached from Hull via regular ferry services from P&O Ferries.[82] Yorkshire also has air transport services from Leeds Bradford International Airport. This airport has experienced significant and rapid growth in both terminal size and passenger facilities since 1996, when improvements began, until the present day.[83] South Yorkshire is served by the Robin Hood Airport Doncaster Sheffield, based in Finningley.[84] Sheffield City Airport opened in 1997 after years of Sheffield having no airport, due to a council decision in the 1960s not to develop one because of the city's good rail links with London and the development of airports in other nearby areas. The newly opened airport never managed to compete with larger airports such as Leeds Bradford International Airport and East Midlands Airport and attracted only a few scheduled flights, while the runway was too short to support low cost carriers. The opening of Doncaster Sheffield Airport effectively made the airport redundant and it officially closed in April 2008.\n\nPublic transport statistics\n\nThe average amount of time people spend on public transport in Yorkshire on a weekday is 77 minutes. 26.6% of public transport users travel for more than 2 hours every day. The average amount of time people wait at a stop or station for public transport is 16 minutes, while 24.9% of passengers wait for over 20 minutes on average every day. The average distance people usually ride in a single trip with public transport is 7 km, while 10% travel for over 12 km in a single direction.[85]\n\n\nThe culture of the people of Yorkshire is an accumulated product of a number of different civilisations who have influenced its history, including; the Celts (Brigantes and Parisii), Romans, Angles, Norse Vikings, and Normans amongst others.[86] The western part of the historic North Riding had an additional infusion of Breton culture due to the Honour of Richmond being occupied by Alain Le Roux, grandson of Geoffrey I, Duke of Brittany.[87] The people of Yorkshire are immensely proud of their county and local culture and it is sometimes suggested they identify more strongly with their county than they do with their country.[88] Yorkshire people have their own Yorkshire dialects and accents and are, or rather were, known as Broad Yorkshire or Tykes, with its roots in Old English and Old Norse.[89][90]\n\nThough distinct accents remain, dialects are no longer in everyday use. Some have argued the dialect was a fully fledged language in its own right.[91] The county has also produced a set of Yorkshire colloquialisms,[92] which are in use in the county. Among Yorkshire's traditions is the Long Sword dance. The most famous traditional song of Yorkshire is On Ilkla Moor Baht 'at (\"On Ilkley Moor without a hat\"), it is considered the unofficial anthem of the county.[93]\n\n\nThroughout Yorkshire many castles were built during the Norman-Breton period, particularly after the Harrying of the North. These included Bowes Castle, Pickering Castle, Richmond Castle, Skipton Castle, York Castle and others.[94] Later medieval castles at Helmsley, Middleham and Scarborough were built as a means of defence against the invading Scots.[95] Middleham is notable because Richard III of England spent his childhood there.[95] The remains of these castles, some being English Heritage sites, are popular tourist destinations.[95] There are several stately homes in Yorkshire which carry the name \"castle\" in their title, even though they are more akin to a palace.[96] The most notable examples are Allerton Castle and Castle Howard,[97] both linked to the Howard family.[98] Castle Howard and the Earl of Harewood's residence, Harewood House, are included amongst the Treasure Houses of England, a group of nine English stately homes.[99]\n\nThere are numerous other Grade I listed buildings within the historic county including public buildings such as Leeds Town Hall, Sheffield Town Hall, Ormesby Hall, the Yorkshire Museum and Guildhall at York, and the Piece Hall in Halifax.[100] Large estates with significant buildings were constructed at Brodsworth Hall, Temple Newsam and Wentworth Castle. In addition to this there are properties which are conserved and managed by the National Trust, such as Nunnington Hall, the Rievaulx Terrace & Temples and Studley Royal Park.[101] Religious architecture includes extant cathedrals as well as the ruins of monasteries and abbeys. Many of these prominent buildings suffered from the Dissolution of the Monasteries under Henry VIII; these include Bolton Abbey, Fountains Abbey, Gisborough Priory, Rievaulx Abbey, St Mary's Abbey and Whitby Abbey among others.[102] Notable religious buildings of historic origin still in use include York Minster, the largest Gothic cathedral in northern Europe,[102] Beverley Minster, Bradford Cathedral and Ripon Cathedral.[102]\n\nLiterature and art\n\nThe Brontë sisters\n\nAlthough the first Professor of English Literature at Leeds University, F.W. Moorman, claimed the first extant work of English literature, Beowulf, was written in Yorkshire,[103] this view does not have common acceptance today. However, when Yorkshire formed the southern part of the kingdom of Northumbria there were several notable poets, scholars and ecclesiastics, including Alcuin, Cædmon and Wilfrid.[104] The most esteemed literary family from the county are the three Brontë sisters, with part of the county around Haworth being nicknamed Brontë Country in their honour.[105] Their novels, written in the mid-19th century, caused a sensation when they were first published, yet were subsequently accepted into the canon of great English literature.[106] Among the most celebrated novels written by the sisters are Anne Brontë's The Tenant of Wildfell Hall, Charlotte Brontë's Jane Eyre and Emily Brontë's Wuthering Heights.[105] Wuthering Heights was almost a source used to depict life in Yorkshire, illustrating the type of people that reside there in its characters, and emphasising the use of the stormy Yorkshire moors. Nowadays, the parsonage which was their former home is now a museum in their honour.[107] Bram Stoker authored Dracula while living in Whitby[108] and it includes several elements of local folklore including the beaching of the Russian ship Dmitri, which became the basis of Demeter in the book.[109]\n\nThe novelist tradition in Yorkshire continued into the 20th and 21st centuries, with authors such as J. B. Priestley,[110] Alan Bennett, Stan Barstow, Dame Margaret Drabble, A S Byatt, Barbara Taylor Bradford,[111] Marina Lewycka and Sunjeev Sahota being prominent examples. Taylor Bradford is noted for A Woman of Substance which was one of the top-ten best selling novels in history.[112] Another well-known author was children's writer Arthur Ransome, who penned the Swallows and Amazons series.[111] James Herriot, the best selling author of over 60 million copies of books about his experiences of some 50 years as a veterinarian in Thirsk, North Yorkshire, the town which he refers to as Darrowby in his books[113] (although born in Sunderland), has been admired for his easy reading style and interesting characters.[114] Poets include Ted Hughes, W. H. Auden, William Empson, Simon Armitage, David Miedzianik and Andrew Marvell.[111][115][116][117][118] Three well known sculptors emerged in the 20th century; contemporaries Henry Moore and Barbara Hepworth, and Leeds-raised eco artist Andy Goldsworthy. Some of their works are available for public viewing at the Yorkshire Sculpture Park.[119] There are several art galleries in Yorkshire featuring extensive collections, such as Ferens Art Gallery, Leeds Art Gallery, Millennium Galleries and York Art Gallery.[120][121][122] Some of the better known local painters are William Etty and David Hockney;[123] many works by the latter are housed at Salts Mill 1853 Gallery in Saltaire.[124]\n\n\nYorkshire has a long tradition in the field of sports, with participation in cricket, football, rugby league and horse racing being the most established sporting ventures.[125][126][127][128]\n\nYorkshire County Cricket Club represents the historic county in the domestic first class cricket County Championship; with a total of 33 championship titles (including one shared), 13 more than any other county, Yorkshire is the most decorated county cricket club.[127] Some of the most highly regarded figures in the game were born in the county,[129] amongst them Geoffrey Boycott, Brian Close, George Hirst, Len Hutton, Stanley Jackson, Ray Illingworth, Wilfred Rhodes, Jonny Bairstow, Joe Root, Herbert Sutcliffe, Fred Trueman and Hedley Verity.[129]\n\nEngland's oldest horse race, which began in 1519, is run each year at Kiplingcotes near Market Weighton.[128] Continuing this tradition in the field of horse racing, there are currently nine established racecourses in the county.[130] Britain's oldest organised fox hunt is the Bilsdale, founded in 1668.[131][132]\n\nThe original hand-written ' Laws of the Game' drafted for and on behalf of The Football Association by Ebenezer Cobb Morley in 1863\n\nYorkshire is officially recognised by FIFA as the birthplace of club football,[133][134] as Sheffield FC founded in 1857 are certified as the oldest association football club in the world.[135] The world's first inter-club match and local derby was competed in the county, at the world's oldest ground Sandygate Road.[136] The Laws of the Game, used worldwide, were drafted by Ebenezer Cobb Morley from Hull.[137] Football clubs founded in Yorkshire include Barnsley, Bradford City, Doncaster Rovers, Huddersfield Town, Hull City, Leeds United, Middlesbrough, Rotherham United, Sheffield United, Sheffield Wednesday and York City, four of which have been the league champions. Huddersfield were the first club to win three consecutive league titles.[138] Middlesbrough came to prominence by reaching the 2006 UEFA Cup Final[139] and winning the 2004 League Cup.[140]\n\nLeeds United are arguably the biggest team in Yorkshire, reaching the semi-finals of the UEFA Champions League in 2001 and having a period of dominance in the 1970s; this position is often paralleled with Sheffield Wednesday who have had similar spells of dominance, most recently in the early 1990s. Noted players from Yorkshire who have influenced the game include World Cup-winning goalkeeper Gordon Banks and two time European Footballer of the Year award winner Kevin Keegan.[141][142] Prominent managers include Herbert Chapman, Brian Clough, Bill Nicholson, George Raynor and Don Revie.[143] The Yorkshire International Football Association was founded in 2017.[144] It organises the Yorkshire football team and is a member of the Confederation of Independent Football Associations (CONIFA).[145]\n\nThe Rugby Football League and with it the sport of rugby league was founded in 1895 at the George Hotel, Huddersfield, after a North-South schism within the Rugby Football Union.[146] The top league is the Super League and the most decorated Yorkshire clubs are Huddersfield Giants, Hull FC, Bradford Bulls, Hull Kingston Rovers, Wakefield Trinity Wildcats, Castleford Tigers and Leeds Rhinos.[147] In total six Yorkshiremen have been inducted into the Rugby Football League Hall of Fame amongst them is Roger Millward, Jonty Parkin and Harold Wagstaff.[148]\n\nIn the area of boxing \"Prince\" Naseem Hamed from Sheffield achieved title success and widespread fame,[149] in what the BBC describes as \"one of British boxing's most illustrious careers\".[149] Along with Leeds-born Nicola Adams who in 2012 became the first female athlete to win a boxing gold medal at the Olympics.[150]\n\nYorkshire also has an array of racecourses: in North Yorkshire there are Catterick, Redcar, Ripon, Thirsk and York; in the East Riding of Yorkshire there is Beverley; in West Yorkshire there are Pontefract and Wetherby; while in South Yorkshire there is Doncaster.\n\nThe sport of Knurr and Spell was unique to the region, being one of the most popular sports in the area during the 18th and 19th centuries, before a decline in the 20th century to virtual obscurity.[151][152][153]\n\nA number of athletes from or associated with Yorkshire took part in the 2012 Summer Olympics as members of Team GB; the Yorkshire Post stated that Yorkshire's athletes alone secured more gold medals than those of Spain.[154] Notable Yorkshire athletes include Jessica Ennis-Hill and the Brownlee brothers, Jonathan and Alastair. Jessica Ennis-Hill is from Sheffield and won gold at the 2012 Olympics in London and silver at the 2016 Olympics in Rio. Triathletes Alastair and Jonny Brownlee have won two golds and a silver and bronze respectively.\n\nYorkshire is considered to be particularly fond of cycling. In 2014 the County hosted the Grande Depart of the Tour de France. Spectator crowds over the two days were estimated to be of the order of 2.5 million people, making it the highest attended event in the UK.[155] The inaugural Tour de Yorkshire was held from 1–3 May 2015,[156] with start and finishes in Bridlington, Leeds, Scarborough, Selby, Wakefield and York,[157] watched by 1.2 million.[158] Yorkshire will host the 2019 UCI Road World Championships between September 22 and 29, which will be held in Harrogate.[159]\n\n\nYorkshire puddings, served as part of a traditional Sunday roast.\n\nThe traditional cuisine of Yorkshire, in common with the North of England in general, is known for using rich-tasting ingredients, especially with regard to sweet dishes, which were affordable for the majority of people.[160] There are several dishes which originated in Yorkshire or are heavily associated with it.[160] Yorkshire pudding, a savoury batter dish, is by far the best known of Yorkshire foods, and is eaten throughout England. It is commonly served with roast beef and vegetables to form part of the Sunday roast[160] but is traditionally served as a starter dish filled with onion gravy within Yorkshire.[161] Yorkshire pudding is the base for toad in the hole, a dish containing sausage.[162]\n\nOther foods associated with the county include Yorkshire curd tart, a curd tart recipe with rosewater;[163] parkin, a sweet ginger cake which is different from standard ginger cakes in that it includes oatmeal and treacle;[164] and Wensleydale cheese, a cheese made with milk from Wensleydale and often eaten as an accompaniment to sweet foods.[165] The beverage ginger beer, flavoured with ginger, came from Yorkshire and has existed since the mid-18th century. Liquorice sweet was first created by George Dunhill from Pontefract, who in the 1760s thought to mix the liquorice plant with sugar.[166] Yorkshire and in particular the city of York played a prominent role in the confectionery industry, with chocolate factories owned by companies such as Rowntree's, Terry's and Thorntons inventing many of Britain's most popular sweets.[167][168] Another traditional Yorkshire food is pikelets, which are similar to crumpets but much thinner.[169] The Rhubarb Triangle is a location within Yorkshire which supplies most of the rhubarb to locals.\n\nIn recent years curries have become popular in the county, largely due to the immigration and successful integration of Asian families. There are many famous curry empires with their origins in Yorkshire, including the 850-seater Aakash restaurant in Cleckheaton, which has been described as \"the world's largest curry house\".[170]\n\nBeer and brewing\n\nYorkshire has a number of breweries including Black Sheep, Copper Dragon, Cropton Brewery, John Smith's, Sam Smith's, Kelham Island Brewery, Theakstons, Timothy Taylor, Wharfedale Brewery and Leeds Brewery.[171][172] The beer style most associated with the county is bitter.[173] As elsewhere in the North of England, when served through a handpump, a sparkler is used giving a tighter, more solid head.[174]\n\nBrewing has taken place on a large scale since at least the 12th century, for example at the now derelict Fountains Abbey which at its height produced 60 barrels of strong ale every ten days.[175] Most current Yorkshire breweries date from the Industrial Revolution of the late 18th and early 19th century.[171]\n\n\nKate Rusby on stage 2005\n\nYorkshire has a heritage of folk music and folk dance including the Long Sword dance.[176] Yorkshire folk song was distinguished by the use of dialect, particularly in the West Riding and exemplified by the song 'On Ilkla Moor Baht 'at', probably written in the late 19th century, using a Kent folk tune (almost certainly borrowed via a Methodist hymnal),[citation needed] seen as an unofficial Yorkshire anthem.[177] Famous folk performers from the county include the Watersons from Hull, who began recording Yorkshire versions of folk songs from 1965;[178] Heather Wood (born 1945) of the Young Tradition; the short-lived electric folk group Mr Fox (1970–72), The Deighton Family; Julie Matthews; Kathryn Roberts; and Kate Rusby.[178] Yorkshire has a flourishing folk music culture, with over forty folk clubs and thirty annual folk music festivals.[179] The 1982 Eurovision Song Contest was held in the Harrogate International Centre. In 2007 the Yorkshire Garland Group was formed to make Yorkshire folk songs accessible online and in schools.[180]\n\nIn the field of classical music, Yorkshire has produced some major and minor composers, including Frederick Delius, George Dyson, Edward Bairstow, William Baines, Kenneth Leighton, Eric Fenby, Haydn Wood, Arthur Wood, Arnold Cooke, Gavin Bryars, and in the area of TV, film and radio music, John Barry and Wally Stott.\n\nThe county is home to successful brass bands such as Black Dyke, Brighouse & Rastrick, Carlton Main Frickley, Hammonds Saltaire, and Yorkshire Imperial.\n\nArctic Monkeys performing on Orange stage at Roskilde Festival in 2007\n\nDuring the 1970s David Bowie, himself of a father from Tadcaster in North Yorkshire,[181] hired three musicians from Hull: Mick Ronson, Trevor Bolder and Mick Woodmansey; together they recorded Ziggy Stardust and the Spiders from Mars, an album considered by a magazine article as one of a 100 greatest and most influential of all time.[182] In the following decade, Def Leppard, from Sheffield, achieved worldwide fame, particularly in America. Their 1983 album Pyromania and 1987 album Hysteria are among the most successful albums of all time.[citation needed] Yorkshire had a very strong post-punk scene which went on to achieve widespread acclaim and success, including: The Sisters of Mercy, The Cult, Vardis, Gang of Four, ABC, The Human League, New Model Army, Soft Cell, Chumbawamba, The Wedding Present and The Mission.[183] Pulp from Sheffield had a massive hit in \"Common People\" during 1995; the song focuses on working-class northern life.[184] In the 21st century, indie rock and post-punk revival bands from the area gained popularity, including the Kaiser Chiefs, The Cribs and the Arctic Monkeys, the last-named holding the record for the fastest-selling debut album in British music history with Whatever People Say I Am, That's What I'm Not.[185]\n\nFilm and television productions\n\nAmong prominent British television shows filmed in (and based on) Yorkshire are the sitcom Last of the Summer Wine, the drama series Heartbeat, and the soap operas Emmerdale and Downton Abbey. Last of the Summer Wine in particular is noted for holding the record of longest-running comedy series in the world, from 1973 until 2010.[186] Other notable television series set in Yorkshire include All Creatures Great and Small, The Beiderbecke Trilogy, Rising Damp, Fat Friends and The Royal. Several noted films are set in Yorkshire, including Kes, This Sporting Life, Room at the Top, Brassed Off, Mischief Night, Rita, Sue and Bob Too and Calendar Girls. The Full Monty, a comedy film set in Sheffield, won an Academy Award and was voted the second best British film of all time by ANI.[187]\n\nYorkshire has remained a popular location for filming in more recent times.[188][189] For example, much of ITV's highly acclaimed Victoria was filmed in the region, at locations such as Harewood House in Leeds and Beverley Minster; the latter was used to depict Westminster Abbey and St James’ Palace.[190][191]\n\nWest Yorkshire has particularly benefited from a great deal of production activity.[192][193] For example, portions of the BBC television series Happy Valley and Last Tango in Halifax were filmed in the area, in Huddersfield and other cities; in addition to exteriors, some of the studio filming for Happy Valley was done at North Light Film Studios at Brookes Mill, Huddersfield. As well, the BBC's Jamaica Inn, for the BBC's Remember Me and for ITV series Black Work, were also filmed at the studios and in nearby West Yorkshire locations.[194][195][196][197] More recently, many of the exteriors of the BBC series Jericho were filmed at the nearby Rockingstone Quarry and some interior work was done at North Light Film Studios.[198]\n\nPolitics and identity\n\n\n\nFrom 1290, Yorkshire was represented by two members of parliament of the House of Commons of the Parliament of England. After the union with Scotland, two members represented the county in the Parliament of Great Britain from 1707 to 1800 and of the Parliament of the United Kingdom from 1801 to 1832. In 1832 the county benefited from the disfranchisement of Grampound by taking an additional two members.[199] Yorkshire was represented at this time as one single, large, county constituency.[199] Like other counties, there were also some county boroughs within Yorkshire, the oldest of which was the City of York, which had existed since the ancient Montfort's Parliament of 1265. After the Reform Act 1832, Yorkshire's political representation in parliament was drawn from its subdivisions, with members of parliament representing each of the three historic Ridings of Yorkshire; East Riding, North Riding, and West Riding constituencies.[199]\n\n\nWith the Representation of the People Act 1918 there was some reshuffling on a local level for the 1918 general election, revised again during the 1950s.[202] The most controversial reorganisation of local government in Yorkshire was the Local Government Act 1972,[203] put into practice in 1974. Under the act, the Ridings lost their lieutenancies, shrievalties, and administrative counties. County boroughs and their councils were abolished, to be replaced by metropolitan and non-metropolitan counties with vastly changed borders.[55] Although some government officials[204] and Prince Charles[205] have asserted such reform is not meant to alter the ancient boundaries or cultural loyalties, there are pressure groups such as the Yorkshire Ridings Society who want greater recognition for the historic boundaries.[206] In 1996 the East Riding of Yorkshire was reformed as a unitary authority area and a ceremonial county. The Yorkshire and the Humber region of Government Office covers most, but not all of the historic county. Yorkshire and the Humber is a constituency for European elections, returning six MEPs to the European Parliament.\n\nDistinctive identity and devolution campaigns\n\nA number of claims have been made for the distinctiveness of Yorkshire, as a geographical, cultural and political entity, and these have been used to demand increased political autonomy. In the early twentieth century, F. W. Moorman, the first professor of English Language at Leeds University, claimed Yorkshire was not settled by Angles or Saxons following the end of Roman rule in Britain, but by a different Germanic tribe, the Geats. As a consequence, he claimed, it is possible the first work of English literature, Beowulf, believed to have been composed by Geats, was written in Yorkshire, and this distinctive ethnic and cultural origin is the root of the unique status of Yorkshire today.[103] One of Moorman's students at Leeds University, Herbert Read, was greatly influenced by Moorman's ideas on Yorkshire identity, and claimed that until recent times Yorkshire was effectively an island, cut off from the rest of England by rivers, fens, moors and mountains. This distancing of Yorkshire from England led Read to question whether Yorkshire people were really English at all.[207] Combined with the suggested ethnic difference to the rest of England, Read quoted Frederic Pearson, who wrote:\n\nThere is something characteristic about the very physiognomy of the Yorkshireman. He is much more of a Dane or a Viking than a Saxon. He is usually a big upstanding man, who looks as if he could take care of himself and those who depend upon him in an emergency. This is indeed the character that his neighbours give him; the southerner may think him a little hard: but if ever our country is let down by its inhabitants, we may be sure that it will not be the fault of Yorkshire.[207]\n\nDuring the premiership of William Pitt the Younger the hypothetical idea of Yorkshire becoming independent was raised in the British parliament in relation to the question whether Ireland should become part of the United Kingdom. This resulted in an anonymous pamphlet being published in London in 1799 arguing at length that Yorkshire could never be an independent state as it would always be reliant on the rest of the United Kingdom to provide it with essential resources.[208]\n\nAlthough in the devolution debates in the House of Commons of the late 1960s, which paved the way for the 1979 referenda on the creation of a Scottish parliament and Welsh assembly, parallel devolution for Yorkshire was suggested, this was opposed by the Scottish Nationalist Party Member of Parliament for Hamilton, Winifred Ewing. Ewing argued that it was offensive to Scots to argue that an English region had the same status as an 'ancient nation' such as Scotland.[209]\n\nThe relationship between Yorkshire and Scottish devolution was again made in 1975 by Richard Wainwright, MP for Colne Valley, who claimed in a speech in the House of Commons:\n\nThe nationalist movement in Scotland is associated with flags, strange costumes, weird music and extravagant ceremonial. When... people go to Yorkshire and find that we have no time for dressing up, waving flags and playing strange instruments—in other words, we are not a lot of Presbyterians in Yorkshire—they should not assume that we do not have the same feelings underneath the skin. Independence in Yorkshire expresses itself in a markedly increasing determination to establish self-reliance.[210]\n\nIn more recent years, in 1998 the Campaign for Yorkshire was established to push for the creation of a Yorkshire regional assembly,[211] sometimes dubbed the Yorkshire Parliament.[212] In its defining statement, the Campaign for Yorkshire made reference to the historical notions that Yorkshire had a distinctive identity:\n\nYorkshire and the Humber has distinctive characteristics which make it an ideal test bed for further reform. It has a strong popular identity. The region follows closely the historic boundaries of the three Ridings, and there is no serious debate about boundaries. It possesses strong existing regional partnerships including universities, voluntary and church associations. All this makes it realistic to regard Yorkshire and the Humber as the standard bearer for representative regional government.[213]\n\nThe Campaign for Yorkshire was led by Jane Thomas as Director[214] and Paul Jagger as chairman. Jagger claimed in 1999 that Yorkshire had as much right to a regional parliament or assembly as Scotland and Wales because Yorkshire 'has as clear a sense of identity as Scotland or Wales.'[215] One of those brought into the Campaign for Yorkshire by Jane Thomas was Herbert Read scholar Michael Paraskos, who organised a series of events in 2000 to highlight the distinctiveness of Yorkshire culture. This included a major exhibition of Yorkshire artists.[216] Paraskos also founded a Yorkshire Studies degree course at Hull University.[217] Interviewed by The Guardian newspaper, Paraskos linked the start of this course to the contemporary devolution debates in Yorkshire, Scotland and Wales, claiming:\n\nIf Yorkshire is arguing for a parliament, there needs to be a cultural argument as well, otherwise why not have a parliament of the north? There is a rediscovery of political and social culture going on in a very similar way to the early assertions of a Scottish identity.[218]\n\nIn March 2013, the Yorkshire Devolution Movement was founded as an active campaign group by Nigel Sollitt, who had administrated the social media group by that name since 2011, Gareth Shanks, a member of the social media group, and Stewart Arnold, former Chair of the Campaign for Yorkshire. In September 2013, the Executive Committee was joined by Richard Honnoraty and Richard Carter (as an advisor), who had also been involved in the Campaign for Yorkshire. The Movement campaigns for a directly elected parliament for the whole of the traditional county of Yorkshire with powers second to no other devolved administration in the UK.[219][220]\n\nIn 2014, Richard Carter, Stewart Arnold and Richard Honnoraty, founded Yorkshire First, a political party campaigning for the creation of a Yorkshire parliament by 2050 based on the Scottish Parliament. It was later renamed the Yorkshire Party.[221]\n\nMonarchy and peerage\n\n\n\nThough the monarchal title became defunct, it was succeeded by the creation of the Earl of York title of nobility[224] by king of England Edgar the Peaceful in 960. (The earldom covered the general area of Yorkshire and is sometimes referred to as the Earl of Yorkshire.)[224] The title passed through the hands of various nobles, decided upon by the king of England. The last man to hold the title was William le Gros, however the earldom was abolished by Henry II as a result of a troubled period known as The Anarchy.[225]\n\nThe peerage was recreated by Edward III in 1385, this time in the form of the prestigious title of Duke of York which he gave to his son Edmund of Langley. Edmund founded the House of York; later the title was merged with that of the King of England. Much of the modern-day symbolism of Yorkshire, such as the White Rose of York, is derived from the Yorkists,[226] giving the house a special affinity within the culture of Yorkshire. Especially celebrated is the Yorkist king Richard III who spent much of his life at Middleham Castle in Yorkshire.[38][227] Since that time the title has passed through the hands of many, being merged with the crown and then recreated several times. The title of Duke of York is given to the second son of the British monarch.[228]\n\nNotable people\n\nSee also", "pred_label": "__label__1", "pred_score_pos": 0.6613780856132507} {"content": "Assignment on How Important Are Farm Pump Stations\n\nBasic purpose of this assignment is to analysis How Important Are Farm Pump Stations. One of the most vital variables in profitable agriculture is irrigation. In most countries that supply along with export produce, irrigation methods are constantly being analyzed and improved. Knowing how large a contribution they make to enhance farm production and effectively fulfill the demand, agricultural experts is constantly looking to identify the best methods for elevating irrigation for fruitful and profitable farming.", "pred_label": "__label__1", "pred_score_pos": 0.9038695096969604} {"content": "ArcGIS Insights\n\nInsights for ArcGIS - Top 10 - ways admins can help new analysts\n\nHere are 10 ways an ArcGIS administrator can make it easier for Insights analysts get up and running quickly.  A little prep work and thought can speed adoption time for these analysts, who might not have a ton of GIS experience.  As a GIS admin, these suggestions could help you make more efficient use of your time, improve Insights’ first impression, and make it easier for new analysts to just “get it”.\n\n1. Break free from silos\n\nIdentify who’s who and break free from silos.  As a GIS admin of your ArcGIS Online or ArcGIS Enterprise org, you hold the keys to GIS software and data access.  But the people in other divisions and department may not know that.  Help these other departmental managers understand that you are willing and able to work with them.  We can enable them, rather than being seen as a gatekeeper.  One goal could be to provide an analyst within their division with “self-service location analytics” (aka Insights), rather than your GIS team supporting one-off map or data export requests.\n\nNext, within that new department, who are the analysts that will be using Insights?  We can create an account for these folks, and assign them the Insights Analyst user type, which is designed and priced to provide access to just Insights, and that’s it.\n\n2. Shortcut to Insights\n\nPoint new analysts to, instead of going to “the portal”.  When we point new users to the full or your Enterprise portal, it might be a little overwhelming with all the apps and different options.  Give your new analysts just one simplified user experience and app, no need to overwhelm a new user with a ton of apps.\n\n3. Make GIS data accessible\n\nCatalog your organization’s data.  Invite these new users to groups, and share data appropriately with those groups, so that when they open Insights data is immediately there.  The GIS content is a hidden treasure chest of data that they have never been able to access before.  Previously they’d have to ask you in the GIS group to export them a shapefile – not any more.  Remember marking data as authoritative also help – Insights shows this on the data details cards.\n\nauthoratative content\n\n4. Make business data accessible\n\nCreate a databse connection and share it as an item to the other analysts.  The other analysts can then simply add that connection, rather than trying to type in tedious connection information.  This video here shows how to create and share connections.  Also, work with your database administrator to make sure that the connection properties have access to the right business tables and data.  Insights honors database views that the DBA can create.  Of course, indexes are important for performance.\n\n5.  Create & share models\n\nCreate an Insights model and share it for other analysts to use and learn from.  This example should show the value of spatial and do something above and beyond what they were doing in their traditional software analysis package.  For example: geoenable tabular business data, geoenrich, spatial filter, spatial aggregation, calc density, find nearest, create buffer/drive time, link analysis.  Additionally, identify a technical SME (subject matter expert) within that new division that can continue to create new models and share with the rest of his/her division.\n\n6. Translate business problems into spatial questions\n\nDefine and document analysis use cases that are inherently spatial.  Explain how location analytics can provide information, answers, and understanding that could be achieved before without spatial.  Or, perhaps it’s more accuracy or granularity that is being achieved.  Simply provide a bullet-point list of problems and analysis, specific to the division and their data.  Often, it’s not understood how to think spatially, or realize the possibilities that exist with this “new” spatial component.\n\n7.  Create & share a theme\n\nCreate a theme, and share it.  This should have the organization’s branding and authoritative look.  The other (new) analysts can then simply apply the theme to their pages and workbooks.  This also creates consistency.\n\n8. Create & share polished examples\n\nGet visibility within your org, and make sure that senior management sees the shared pages and workbooks.  These information products can be beautiful and compelling when done correctly.\n\n9.  Export resulting datasets, for reuse\n\nEmphasize to analysts that resulting datasets from analysis are available for export and re-use in other business systems.  Once you share a resulting dataset as a feature layer, just export it as a .csv or .shp from the Insights home page.  Insights is interoperable.  Identify some broader workflows where Insights could be an analysis link in the information chain.  Data into Insights –> analysis results out –> off to a larger system or process.\n\n10. Training Plan\n\nUtilize training materials to develop a training plan. There are a lot of good resources – use them.  Here are a few:  YouTube video playlist, hands-on tutorials, intro presentation video, advanced presentation video, and instructor led training.\n\n11.  Enterprise logins\n\nOkay, this is technically the 11th item in this list, more than 10 as promised.  But I couldn’t resist.  Enterprise logins make it incredibly easy for your users to sign into, and gain access to ArcGIS.  They allows members of your org to sign in to ArcGIS using the same logins they use to access your other enterprise information systems.  The advantage is that members do not need to create additional logins within the ArcGIS system; instead, they can use the login that is already set up within their enterprise system.\n\n\nIn Conclusion…\n\nAs a GIS owner, give your coworkers a fishing pole, instead of a fish.  Teach them how to fish for themselves and catch a location analytics monster!  This will allow you to move away from the data export and map requests, and onto more strategic GIS activities.  Although a little more prep work up-front, in the long-run, this strategic thinking can help you achieve organizational goals.\n\nAbout the author\n\nScott Sandusky\n\n\nNext Article\n\nSimplify weather measurements in the field using Arcade\n\nRead this article", "pred_label": "__label__1", "pred_score_pos": 0.8418496251106262} {"content": "The Motley Fool\nMy Wallet Hero\n\nDoing a credit card balance transfer: 3 things you need to consider\n\nThe idea of reducing the interest payments on credit card debt is highly appealing to a large number of consumers. After all, only 60% of individuals with credit cards repay them in full each month.\n\nThis means that a large minority of credit card holders could benefit from having a balance transfer card. This is where an existing credit card debt is moved to a new credit card which may offer a lower rate of interest than the existing credit card for a set period of time. This could reduce the amount of interest paid, as well as allowing a debt to be paid off at a faster pace. At the time of writing, there are a large number of offers available which could enable consumers to achieve both of those aims.\n\nWhile the mechanics of a balance transfer card may appear to be straightforward, there are a number of considerations which consumers may wish to contemplate before going ahead. They include the fees associated with a balance transfer card, its interest rate, as well as an individual’s upcoming spending plans.\n\n1. Check the interest rate\n\nWith a range of credit cards offering introductory rates on balance transfers that can be as low as 0% for a set time period, obtaining such a card may appear to be highly appealing for indebted consumers. Once an introductory balance transfer period ends, though, the interest rate on the new card may rise to a higher rate than that of the existing card. This could mean that while there is a saving to be made on interest payments in the short run from obtaining an introductory rate on the balance transfer card, in the long run the total amount of interest paid may be higher than it would have been on the existing card. Therefore, considering how long it may take to repay the debt, and the interest rate which will be payable throughout its term (both during the introductory period and after its end), could be a good idea.\n\nFor example, a balance transfer card may have an introductory 0% interest rate for a 12-month time period. While a borrower paying 14.9% on an existing credit card may make savings during the 12-month period, if the interest rate on the balance transfer card rises to 29.9% thereafter then they may be better off keeping their existing card, should they be unable to clear their debt within the 12-month introductory period.\n\n2. Watch out for fees\n\nWhile most consumers may focus on the potential interest savings that could be made from having a balance transfer card, in some cases there can be fees attached to a balance transfer card. For example, a balance transfer card may charge around 3% of the total amount to be transferred as a fee, which could reduce the potential interest savings that are available.\n\nTherefore, an individual who is considering transferring debt to a new card should compare the potential interest payment savings to the balance transfer fee in order to determine whether it is an appealing idea. For instance, while a consumer who has a £750 debt at an APR of 18.9% who makes a repayment of £50 per month could save £102 in total interest costs over 15 months from using a 0% balance transfer card, a 3% fee of £22.50 could make the transaction less appealing.\n\n3. Consider upcoming spending plans\n\nConsidering near-term spending plans may alter the optimum time to obtain a balance transfer credit card. For example, an individual who expects to make a major purchase in the short run may wish to wait for that to take place before obtaining a balance transfer credit card. Doing so could allow them to benefit from a lower rate of interest on a larger sum of money.\n\nAlternatively, consumers who expect to make a large purchase in the near future may wish to obtain a balance transfer card that offers an introductory 0% interest rate on new purchases. This could save them a considerable sum of money, as long as their purchase is made within the eligible time period following account opening.\n\n\nWhile many consumers may focus on the potential interest saving which is available during a balance transfer period, there are other facets to consider before going ahead with a balance transfer card. The rate of interest during the duration of the repayment period, potential fees which could be levied by the new card, and upcoming spending requirements could all impact on how appealing a balance transfer card is.\n\nInterested in improving your credit-card game? Check out our list of the best credit cards\n\n", "pred_label": "__label__1", "pred_score_pos": 0.7148261070251465} {"content": "Types of Forests (Forest Biome): Temperate, Tropical, Boreal, and More\n\nForest Biome\n\nTropical, temperate, and boreal forests around the world play an important role in the earth’s ecosystem. Forests are land areas that contain many trees and they have their own ecosystem called a biome. It is estimated that forests cover about 30% of the earth’s total land area. These dense woodlands can include evergreen conifers, broad-leafed deciduous trees, or a mixture of these tree types.\n\nTypes of Citrus Fruits With their Picture and Classification\n\nCitrus Fruits With their Picture and Classification\n\nThe different types of citrus fruits are zesty and tangy and are packed full of flavor. The taste of citrus fruits is a varying combination of sweet and sour flavors that refresh, delight, and invigorate your taste buds. There are over 100 different varieties of citrus fruits. Citrus fruits such as lemons and limes can be so sour, they make your mouth pucker. Others such as oranges are delicious and sweet with a slightly tangy taste.\n\nTypes of Wood for Woodworking and Furniture (With Name and Picture)\n\nThere are different types of wood that can be used for creating different types of furniture such as tables and chairs. Solid wood is a versatile natural product that can be used to create beautiful woodworking crafts, and wooden structures. Many types of softwood such as pinewood are used as timber, solid wood flooring, window frames, and furniture. Of course, you can also use hardwoods such as oak, poplar, walnut, or teak for these uses. Because most types of hardwood are expensive, using hardwood in woodworking is usually for high-end, quality items.\n\nTypes of Tree Leaves with Pictures for Easy Identification\n\ntree leaf identification\n\nKnowing how to identify tree leaves can help to know which trees are growing in woodlands, forests, or parks. It is possible to identify leaves by their shape, edging, size and patterns. Some deciduous trees have tree leaves that are heart, ovoid, rounded, lanceolate, and triangular shapes. Evergreen coniferous trees have leaves that look like needles or clusters of scales.\n\nTypes of Pet Birds With their Name, Picture and Species\n\nDifferent Types of Pet Birds\n\nMany types of birds can make wonderful pets and long-time companions. Popular pet birds come in all different sizes to suit most types of homes. Small pet birds like finches, canaries, parakeets, and lovebirds are friendly low maintenance birds. They are also the best kinds of pet birds for beginners and apartments. Larger pet parrots, cockatiels, and cockatoos also make great household pet birds but take more care and attention.\n\n\nTypes of Birds\n\nBirds are a class of animal that can be identified as having wings, beaks, feathers, and laying hard-shelled eggs. Some types of birds such as hummingbirds are tiny and can be as small as 2” (5 cm). At the other end of the scale, large flightless birds such as ostriches can be as tall as 9 ft. (2.75 m). All species of birds play an important role in their native habitats, and many people like to keep domestic birds as pets.\n\nTypes of Jade Plants (Crassula Varieties) with Their Pictures, Names and Plant Care Guide\n\nTypes of Jade Plants (Crassula)\n\nJade plants are popular houseplants that are very easy to care for and thrive in most indoor environments. One of the most popular types of jade plants is the crassula ovata variety which is also commonly named the money plant, dollar plant, money tree, and lucky plant. This jade plant is not only beautiful, but it is said to invite good fortune and luck into a home according to the Feng Shui. The different types of jade plants grow well in bright areas of the home and are forgiving if they grow in less than ideal conditions.\n\nMoney Tree Plant (Pachira Aquatica): Care, Types, Pictures and More\n\nPachira Aquatica care\n\nMoney tree is the common name for a species of tree called Pachira aquatica. The money tree is a popular ornamental houseplant and it is said to bring good luck, prosperity, and good fortune according to the Chinese Feng Shui. This type of money plant is usually seen with braided or twisted trunk and it has lush green foliage growing at the top. Money trees are popular indoor bonsai plants due to their reputation of inviting wealth and being easy to care for and look after.\n\nMoney Plant (Jade Plant or Jade Tree): Care, Types, and Tips For Growing Crassula Ovata\n\nThe money plant is the common name for a species of jade plant called Crassula ovata. This type of jade plant is named money plant because according to the Chinese Feng Shui it brings good luck, wealth, prosperity, and good fortune. This miniature tree like jade plant is a popular houseplant because it is very easy to care for.", "pred_label": "__label__1", "pred_score_pos": 0.7095212340354919} {"content": "All Shops\n\nBritish Wildlife\n\n6 issues per year 84 pages per issue Subscription only\n\n\nSubscriptions from £30 per year\n\nConservation Land Management\n\n4 issues per year 44 pages per issue Subscription only\n\n\nSubscriptions from £18 per year\nTap cross to close filters\nYou are currently shopping in  Academic & Professional Books .\nSort by\n\nThe Cambridge History of Science Series\n\nThe Cambridge History of Science is to be published in eight substantial volumes, beginning with Ancient Mesopotamia and classical Greece and Rome, through the Medieval period, early modern Europe, and on through modern science. The history begins chronologically and that approach continues on up to Vol. 4, after which the volumes split off into modern histories of different branches of science. They are designed to be read as both a narrative and an interpretation, and also used as a work of reference. The first comprehensive history of science in 30 years, they will be an excellent reference for historians and professionals in the history of science. The contributors, world leaders in their respective specialties, engage with current historiographical and methodological controversies and strike out on positions of their own.", "pred_label": "__label__1", "pred_score_pos": 0.7932223677635193} {"content": "Video: Driving workforce productivity and employee experience\n\nPerformance Management\n\nDriving workforce productivity and employee experience\n\nManaging workforce productivity.\n\nManaging workforce productivity and experience is one of the key agenda items for the HR and workforce management plays a key role in ensuring the same. But with the kind of workforce diversity that exists in organizations across sectors, there is no one best way to achieve the desired results.\n\nHere's what we will cover:\n\n1) How has workforce management transformed in the last 2-3 years?\n\n2) What are the biggest challenges that talent leaders are facing across industries when it comes to workforce management?\n\n3) How are most organizations catering to the expectations of multiple generations at the workforce to ensure highest level of productivity and great candidate experience at the same time?\n\n4) The overall business impact\n\nTopics: Performance Management, C-Suite\n\nDid you find this story helpful?\n\n\n\nIs India Inc ready to support the gig economy?\n\nOn News Stands Now\n\n\n\nAnd Save 59%\n\nSubscribe now\n\n\nSelected Score :", "pred_label": "__label__1", "pred_score_pos": 0.9165530800819397} {"content": "Contact Us\n\nDual Temperature\n\nHome/Temperature/Dual Temperature\n\nOur Cold Rooms\n\nDual Temperature Walk In Rooms\n\nIf space is at a premium and you need the ability to use your room as either a chiller or freezer, then we can provide the necessary equipment to allow you to do this. The room would be designed to meet freezing specification whilst the refrigeration system can be designed to operate at temperatures from -20°c up to +30°c.\n\nThese dual temperature rooms are designed to store product at a single temperature, at any given point. If you are looking to store products at differing temperatures at the same time, then please ask for a multi-compartment room.\n\nTo see our range of options, from panel types/thicknesses to floors, doors, racking and services, please click the options button below.\n", "pred_label": "__label__1", "pred_score_pos": 0.9964044690132141} {"content": "You majored in mathematics in Princeton; what attracted you to Ancient Greek?\n\nIn the first place, I should say that I’ve had an independent interest in languages for a good long while,\n\nrunning parallel to mathematics as systems capable of powerful and bizarre expression,\n\ngoverned by rules, and therefore needing a good deal of creativity to make the most of them.\n\nAlso, working as a math teacher a few years ago, I found myself missing daily interaction with languages\n\nand thought the perfect solution would be to read Euclid’s Elements: I could say that I was doing my work, and I was studying languages at the same time. Reading Euclid, and doing so in the original rather than using a translation, was very helpful for me because it helped revive my Greek and my geometry, which I had not studied since eighth grade. It also opened my eyes to the fact that my way of reckoning certain concepts in mathematics would not have been Euclid’s way; as a twenty-first-century American and not a third-century BC Greek like Euclid, I found myself approaching many of the same theorems as he had from a different language, and therefore a different background and understanding.\n\n\nTalk about your experience at Polis for the last three months.\n\nI did my best to come with no expectations other than I would hear the languages I wanted to study spoken every day; this has certainly been fulfilled, so much so that I am frequently asked from people back home, “Don’t you ever confuse these languages?” Listening and speaking for many hours every day can push you towards this “point of no return”—and that is wonderful. To reach for a concept or idea and have all of the terms bubble up to you in one language, then pushing it down until they resurface in another language is very surreal; you realize that a new set of connections has begun to grow in your mind and that you are thinking along those connections every day, building them through use as if they were muscles. Because the classes at Polis are entirely in the target language, the connections you build can exist less with respect to another language and stand more upon the world itself. I feel like a very large three-year-old understanding the world again, and that is too good.\n\n\nWhat has it been like living in Jerusalem?\n\nLiving in Jerusalem has certainly been interesting. Personally, it’s been eye-opening for me as it is by far the longest time I’ve spent outside the United States, and also my first time navigating a multilingual community. In this respect, what I learn in one or another classroom cannot then be shirked or forgotten for the rest of the day: I can’t speak English with everyone in my apartment, let alone with everyone on the street, so the motivation to learn the languages is quite real here. The same goes for the classroom: For the first time I am in classes more international than any I’ve taken before. I believe that in my Hebrew class of seventeen students, we represent fifteen different countries. Jerusalem, and by extension Polis, seems to attract from all corners of the world, so that with the different languages come different minds and quite a few very interesting conversations.\n\n\n\n\nWhat led you to come here?\n\nI heard about Polis from a friend who informed me, “I don’t want to tell you what to do next year,\n\nbut there is a program in Israel called Polis, where they teach languages ancient and extinct, but all as living languages.” As soon as I heard this, I immediately replied, “Thank you for telling me this, and thank you for telling me what I am doing next year,” for the moment I heard about such a program I recognized that it was very rare.\n\nMost of the time in my past classes on extinct languages have been spent translating from target language to English—only translation, and mostly in one direction. One major advantage of translating both ways and in fact thinking in the target language is that, as with children learning a language, these activities tend more directly towards fluency. To become a more fluent thinker in ancient Greek and Biblical Hebrew, something I wanted to do, is a significant undertaking, and Polis offered this rare—if not unique—opportunity.\n\nAnton Fleissner, student of the Master in Ancient Philology, B.A. in Mathematics from Princeton, M.S.Ed from University of Pennsylvania.\n\nFrom New Jersey, U.S.A. \n\nMichal Kabat, student of the One Year Program in Biblical Languages \n\nFrom Warsaw, Poland\n\nHow did you end up at the Polis Institute?\n\nI've heard about Polis when I was at Univ. I was told that there was this Polis Institute somewhere and that they were organizing summer courses in Rome. I did not know at that time that Polis was an institute located in Jerusalem. I thought then that it was a fairy tale and that it was too far away. I did not think I would go back to Rome or elsewhere just to study Greek. But then my friend sent me an email saying that Polis had scholarships, so I applied for it without any expectation and suddenly it was accepted and that was how I ended up here.\n\n\nWhat attracted you to come to our institute?\n\nMostly the possibility of studying ancient Greek as a living language. Before coming here I studied Classics so I thought that it would be a great opportunity for me to learn Greek better. I’d had difficulties in learning Greek, especially at the end of the year when I was translating. I could not memorize everything so as a result my translation process seemed to me very abstract.\n\nThree months after coming here I can say that I see huge improvements. Yesterday my roommate gave me a Greek text (a dialog about everyday life from the 3rd century) and three months ago I could only have understood two or three words from the whole text, and struggled to even read it. Now I can say what is going on, who is saying what, and in addition to that I can read this text and summarize it.  Even at some points I can laugh when I read it, so I think this is a huge improvement in three months only.\n\nDid what you find here meet your expectations?\n\nWhat I found here was above my expectations on at least three levels:\n\nFirst, the scientific level because learning here does not mean learning only science. It is mostly a lot of fun. I will always remember that.\n\nThe second aspect is the personal level. I have been meeting many people here who have the same problems as I do in learning Greek in a “traditional way” and we are discovering that we can learn Greek as a living language and that is a big discovery for us and a big joy also.\n\nFinally, there is the cultural level because in Jerusalem I am able to experience many things for the first time. One can have all the cultures merging and somehow passing through each other and this gives this perspective: how the world looked like in ancient times, in Hellenistic times, when all the people were just mixing their cultures. And I meet a lot of people from other cultures that are just opening up for me and sharing things that I would have never experienced in another way as well as I could not have known them elsewhere.\n\n\nHow did you end up in the Polis Institute?\n\nI was looking for a place where I could learn Greek and Hebrew and I read about Polis Institute, which claimed to be using a very special method, a unique method of instruction which was different from the methods used in most other places. I realized that many of the people who have graduated from other places that teach ancient languages still do not have a very good proficiency in Greek or Hebrew . So I thought, “why not give Polis a try?” Back then I did not know anything about Polis and I thought it was worth taking a risk to try out.\n\n\nHow did you hear about Polis?\n\nNo one recommended Polis to me. I simply found it on the internet. I just searched Google for Hebrew and Greek courses and I found Polis in Jerusalem!\n\nDid what you find here meet your expectations?\n\nIt has definitely met my expectations so far. \n\nStephen Chia, student of the One Year program in Biblical Languages, B.A. in Linguistics and Multilingual Studies from Nanyang Technological University in Singapore\n\nFrom Singapore\n\nMy progress in Hebrew, Arabic and Greek in particular speaks for itself. The way Greek and Hebrew is taught here and the way I am acquiring and picking up grammatical structures and vocabulary is very natural. Because we are immersed daily in the language, most of our time is spent speaking and listening to the language instead of memorizing textbooks. It saves a lot of time.\n\n\nWhat would be your best memories in the last three months that you have spent in Polis?\n\nDefinitely the Greek classes. Firstly, I appreciate being totally immersed in the language. Since the first day, there were strict rules such as, “no other language is to be used in class”. Though following such a method might sometimes be difficult, it helps a lot because it forces you to follow and pick up what the teacher is saying, even if it means to make wild guesses. This is one of the reasons why the full-time students of Polis Institute are generally much more confident, fluent and knowledgeable in the target language than the other students.\n\n\nDo you find the fact that Polis is located in Jerusalem attractive?\n\nWell, it is definitely attractive to me because the Holy Land is an important place to me. The sole reason why I am here is to study Greek and Hebrew, but Jerusalem is a very interesting city that is rich in history and I am fortunate to have an opportunity to live here.\n\n\nHow do you feel about the possibility of speaking the ancient languages with the other students?\n\nI have to say that all my classmates, as well as students from the second year, are highly motivated students. I hear them speaking Greek, Hebrew and even Latin among themselves all the time, even during times when I just feel like speaking English. I think I am in a very good environment where I can freely speak Greek and Hebrew any time I want. No one is embarrassed about speaking in an ancient language. In fact, the most embarrassing thing to do is to be caught speaking English.\n\n8 HaAyin Het St.\n\n9511208 Jerusalem.\n\nTel: +972 (0)74 7011048\n\nFax: +972(0)74 7021931", "pred_label": "__label__1", "pred_score_pos": 0.5100260376930237} {"content": "Go directly to content\n\nPublished April 10, 2019\n\nPerspectives on the future\n\nThe attitude towards the future and change can vary. With this tool, you can learn about the different perspectives on megatrends.\nAuthor's profile page: Mikko Dufva\nLeading Specialist, Foresight, Sitra\nMikko Dufva is Sitra's leading foresight specialist. In his work, he examines future trends, the tensions between these trends and mental images connected with the future.\n\nPerspectives on the future\n\nTime: 10 to 20 minutes.\n\nParticipants: Individual work or in a group.\n\nSuitable for: Clarifying your own and others’ attitudes towards the future and identifying perspectives on the different visions. With the tool, you will gain a more structured view of the different attitudes towards the future and change.\n\nDifferent people and organisations have very different attitudes towards future developments and megatrends. At one end of the spectrum, people are putting tin foil hats on their heads, thinking that everything we are used to believing in will change. At the other end, the world is mainly viewed with a paper bag on the head – firmly believing that change will largely not affect us.\n\nOn the one hand, there are those who only see opportunities in change, running after every technological hype in vogue at the time. On the other, there are those who certainly do not see change as an opportunity. On the contrary, many people tend to think that things have already changed far too much.\n\nMegatrends therefore are the basis on which interpretations and choices signify the different visions of what the megatrends mean to us and how they should be responded to. One dimension is how much change responding to megatrends will require of us: a lot of change, or just a little bit of change. The other dimension, then, is whether megatrends are primarily seen as a threat or an opportunity. Something that can seem like an enormous opportunity to one party may seem like a major threat to another, justifiably.\n\nDo the following\n\nThink about different megatrends. Do you believe that they will require a lot or just a little change from your organisation or society? And do you think that the change will involve more opportunities and threats to your own organisation or society in general? Put yourself, your organisation or society in a 2 x 2 matrix based on your answers.\n\nIn a group, discuss how each person positions themselves, their organisation or society in the matrix. Are there many differences in the views? What is the reason for the differences?\n\nUse the discussion you had based on the matrix as the starting point of the new vision. Think about what should be done based on how you positioned yourselves in the matrix. What should the vision be like to respond to the challenge of the megatrends you outlined? You can use the Vision-builder’s checklist for assistance.\n\nYou can also position an existing vision or view of the future in the matrix. Does it describe radical transformations or minor changes? Does it consider change as an opportunity or a threat? Are there major differences between the vision and your insight?\n\n\nSitra’s vision, Next era of well-being, makes the following interpretations of megatrends and their impacts.\n\n • According to Sitra’s view, megatrends will require a lot of change from society.\n • According to Sitra’s view, the challenges posed by the megatrends cannot be underestimated, but they can be converted into opportunities based on Nordic values.\n\n\nUse the matrix to compare your own view or vision with those of others. You can also go deeper into the consideration of the different perspectives by testing your vision from three different points of view.\n\nWhat's this about?", "pred_label": "__label__1", "pred_score_pos": 0.6443186402320862} {"content": "Welcome -  Parents Opinion Survey.\n\nThis survey aims to help Malek Fahd Islamic School understand parents’ perceptions, particularly regarding communication between parents and the school. The information gained from this survey will assist school management to address areas of concern, and make recommendations to facilitate improvements to your child’s learning environment.\n\nThis survey is anonymous, and all information is kept completely confidential.\n\nQuestion Title\n\n* 1. Please tick one of the following options:  I am a parent of:\n\nQuestion Title\n\n* 2. Please rate the following items according to your level of agreement\nA) Communication between school and home\n\n  Strongly disagree Disagree Slightly disagree Slightly agree Agree Strongly agree\nThe school effectively communicates the policies and procedures.\nI feel the school provides sufficient parent-teacher interview sessions over the year\nI have sufficient knowledge of the content my child will learn during the term\nI am able to discuss my child’s progress with his/her teacher\nI know who to contact if my child is experiencing bullying\nThe school works with me to support my child’s learning\nI have access to my child’s teacher (s) when I feel the need to contact them\nThe school provides me with clear information concerning daily routines, excursions and special events.\nTeachers/Welfare Coordinators ensure that I am made aware of any behavioural issues in a timely manner\nThe school keeps me well-informed of my child’s academic performance, including any notable changes\nThe school provides me with clear information on any political or educational changes that may affect my child/s schooling.\n\nQuestion Title\n\n* 3. Complaints handling processes and procedures\n\n  Strongly disagree Disagree Slightly disagree Slightly agree Agree Strongly agree\n\nFeedback and constructive criticism are welcomed by the school\n\nI am aware of the school’s complaints procedure.\nI know where to go if I have any complaints/concerns or feedback\n\nMy concerns are taken seriously by the school’s leaders.\nGenerally speaking, I am happy with the way the school deals with problems and concerns I have.\n\nQuestion Title\n\n* 4. Parent involvement\n\n  Strongly disagree Disagree Slightly disagree Slightly agree Agree Strongly Agree\n\nI feel well informed about school matters.\n\nThe school offers opportunities for me to become involved in the decision-making process\n\nThe school provides an inviting atmosphere to family members\n\nThe staff who work in the front office are friendly and helpful towards parents\n\nI feel that generally, the school works in partnership with me as a parent\n\nThe school helps me to be involved in my child’s learning\n\nThe school wants and encourages parents to be involved in the decision making of the school.\n\nThe school welcomes my involvement at events they run (e.g Eid Festival, Formal, Graduation)\n\nQuestion Title\n\n* 5. Please write three things you would like the school to do better:\n\nQuestion Title\n\n* 6. Please write three things you think the school does very well:\n\nQuestion Title\n\n* 7. Thank you for taking the time to fill out this survey. Please note that your responses are kept completely confidential. If you have any further comments related to the school, particularly the relationship between parents, teachers and students, please enter these below.\n\n(Note: if there is anything in particular that you would like to discuss with a staff member in relation to these survey questions, please contact the Admin staff at the school.)\n\nThank you for taking the time to help us make our school a better place.\n\nYours faithfully, Executive Principal.", "pred_label": "__label__1", "pred_score_pos": 0.7042971849441528} {"content": "Hepatitis A Outbreak in Florida Adds 58 Cases\n\nFlorida had 58 hepatitis A cases reported last week, bringing the total number of cases this year to 3,028 as of Saturday, according to the state Department of Health.\n\nSarasota County led the state in the number of new cases last week with eight, followed by Volusia County with seven, according to a News Service of Florida analysis of the data.\n\nAs of Saturday, 274 cases of hepatitis A had been reported this year in Volusia County, while the number of cases in Sarasota County stood at 92. Pasco County led the state with 404 cases, including two new cases last week.\n\nPinellas County had one new hepatitis A case last week, bringing its total for the year to 376, according to the News Service analysis of the state data.\n\n\nHealth officials have urged Floridians to get vaccinated against the disease.\n\nState Surgeon General Scott Rivkees, who doubles as secretary of the Department of Health, has used $3 million in funds from county health departments to hire additional workers to help vaccinate high-risk populations, including homeless people, drug users and gay men.\n\nHepatitis A is a liver disease that is caused by an infection from hepatitis A virus. What is shocking about this illness is that not everyone who is infected with the virus will have symptoms of the illness. In most cases, the illness is results in mild, flu-like gastrointestinal symptoms. In the worst cases, hepatitis A can impair proper functioning of the liver and even lead to death.\n\nThe hepatitis A virus is a collection of molecules that uses the body’s method of constructing new material to produce copies of itself. When the virus uses a human host to reproduce itself, the human host often becomes ill in its effort to fight the virus.\n\nAccording to the Centers for Disease Control (CDC), every year in the United States an estimated 143,000 cases of hepatitis A infection occurs, but only around 30,000 are reported. Hepatitis A is also responsible for an estimated 1.4 million cases worldwide each year.\n\nYou may be wondering how this virus is spread to others. The hepatitis A virus is spread from person to person by “fecal-oral” transmission. This means the virus is transmitted when a person puts something in their mouth that has been contaminated with the fecal matter of a person infected with the virus. Because this virus depends on the fecal-oral route for transmission, the illness is most easily spread under poor sanitary conditions or where good personal hygiene is not observed. \n\nOutbreaks are often traced back to contaminated food. Food supplies can become contaminated when infected workers come into contact with food supplies during processing or in restaurants. If a restaurant worker has the hepatitis A virus and does not wash their hands after using the restroom, they can then transfer the virus to others during food preparation.  \n\nFoods that are most commonly associated with outbreaks are water, shellfish, and salads. In most cases, the true source is water that has been contaminated with the feces of an infected person. Other common food sources are cold cuts, pre-made sandwiches, unwashed fruit, fruit juices, milk products, vegetables, salads, shellfish, and iced drinks.\n\nMost people who become infected with hepatitis A return back to normal health. This virus is more common in children, but is often more severe in adults. More than one-fifth of adult hepatitis A patients require hospitalization. In the most severe cases, hepatitis A can cause inflammation and swelling of the liver, which can impair liver function and cause permanent damage to the liver. Most of these cases require hospitalization. Each year approximately 100 people die as a result of these infections in the U.S.\n\nAnyone who has tested positive for hepatitis A may have a claim for medical expenses, pain and suffering, emotional distress, loss of income, and other damages. Our Florida Hepatitis A Outbreak Lawyers at Whittel & Melton can gather the necessary evidence to connect your illness to a specific food product or location. Once you hire us, we can begin:\n\n • interviewing you and others to find out how you contracted the virus and how it has negatively impacted your life \n • once we have gathered enough evidence, we can send a demand letter asking for a specific amount of money to the company or companies responsible\n • negotiate with the other side’s attorneys \n • if settlement negotiations fail, take your case to trial\nContact Information", "pred_label": "__label__1", "pred_score_pos": 0.6931192874908447} {"content": "Julie Smolyansky had been working with her father, Michael, the founder of Lifeway Foods, for five years when he suddenly had a heart attack and passed away. On that day in 2002, surrounded by grieving friends and relatives, one of her late father’s friends told her something that stuck.\n\n“There’s no way that a 27-year-old girl can run this company. That’s it. It’s done,” he told her. The line galvanized Smolyansky. “That really fueled me and inspired me to prove him wrong. I found the courage to ignore him and to keep moving forward.”\n\nThe next day, she went into the office, as the stock was plummeting and inventors panicked about what would happen to the company. Since then, revenue at Lifeway Foods has increased six-fold under her leadership and expanded across the United States and internationally. The company now has a market capitalization of about $250 million. But she still thinks of her father’s friend and what he told her nearly 15 years ago.\n\n“That comment, I think about it every day of my life still,” she said.\n\nSmolyansky was speaking to a group of female founders, entrepreneurs, and politicians gathered at the Vosges Chocolat factory in Chicago on Wednesday night (Vosges itself was founded by a woman, Katrina Markoff, who sat at the table of more than 20, in the glow of what normally serves as a laboratory for her confections). The evening was part of a series of events being hosted by Vanity Fair in partnership with Dell and Deloitte focused on advancing female entrepreneurship. The discussion in Chicago, paired with one held last month in New York and another later this month in San Francisco, will culminate in a letter to the next White House administration and to Congress recommending how they can better create policies that foster and serve female-founded businesses and women in business.\n\nThe conversation wove through how to better share access to information about available loans and financing, the importance of building a network and mentorship programs, and how politicians can better support women in business.\n\nWith all the discussion about what Washington can do to better serve female entrepreneurs, talk naturally turned to—what else?—the presidential election. Smolyansky, a vocal Hillary Clinton supporter, defended her political opinions and advocacy in a way that is uncommon for the C.E.O. of a publicly traded company. “I realized that being a rare female C.E.O., I had an obligation to use my voice and to do everything I could,” she said. “Once my daughters were born, it crystalized it, that I had to embrace it and lean into it and be really honest about the things that matter most to me.”", "pred_label": "__label__1", "pred_score_pos": 0.9043152332305908} {"content": "Experience champagne air, sweeping panoramic ocean and mountain views, majestic meandering mountain walks and the best land based whale watching destination in the world. The Nantucket is nestled high against the slope of the Olifantsberg mountain range in Voelklip, Hermanus - one of the most renowned holiday destinations on the planet, and well known for its scenic beauty and whale watching.\n\nWhales frequenting Hermanus include Southern Rights, Brydes as well as Humpback whales. Types of whale watching include: land-based, aerial and boat-based. Shark-cage diving is in the nearby hamlet of Gansbaai.\n\nThe Nantucket offers six luxurious and individually decorated en suite bedrooms including satellite TV and free WiFi.\n\nBask on the sun-drenched pool deck whilst experiencing the dramatic mountainside, or have a barbeque and enjoy the African sun sinking into the Atlantic before you. Otherwise, relax in the lounge area with a great book or movie. Guests also have a lounge and kitchen area as well as a swimming pool surrounded with wooden decking. The barbeque area offers magnificent, ocean and lagoon views.\n\nEnjoy many an unforgettable African sunset while relaxing at the Nantucket.", "pred_label": "__label__1", "pred_score_pos": 0.9866704344749451} {"content": "Saturday, April 28, 2018\n\nBook Review - Anthem\n\n\n\n\n\n\n\nThe philosophies presented by this book are natural expressions of the author's personal struggles in Russia and her opposition to Communism. But why might this novel be finding its way back onto school desks in America in the 21st century? Without getting too political, I can see a couple of reasons.\n\nFirst, as I mentioned above there's been a recent growth in the popularity of dystopian fiction. Kids are latching onto this genre and devouring it. Schools can attempt to tap into this popularity by prescribing dystopian literature as part of the curriculum. But the schools will likely want to steer clear of work that is too violent or racy. As a result, we find a book like Anthem that contains almost no violence or anything else to push it beyond a \"PG\" rating.\n\nSecondly, and I think this speaks somewhat to the popularity of dystopian novels now generally, people are more and more dissatisfied with the state of things and are seeking ways to analyze and overcome the problems they see within society. Studying this and other dystopian novels is a way to have a \"safe\" conversation about a fictional society and then to ponder the potential relation to the real world and our out thoughts and ideals.\n\nAnother thought occurred to me while of strong familiarity. As I read, I kept finding myself thinking of other novels, most particularly The Giver by Lois Lowry. Knowing that The Giver frequently shows up as school reading, I could see lesson plans reading both novels and then writing papers or doing presentations comparing and contrasting the two novels or perhaps writing their own short story dystopia.\n\nCurious as to if Anthem had influenced The Giver, I did a few searches and found this post from Lois Lowry speaking in response to claims of similarities (or outright plagiarism) that she sometimes receives. As I've often pointed out to people, there are few stories/movies/etc. that I would call 100% original. Everything has similarities somewhere. And when you look within very specific genres you will likely find even more similarities. In my mind, these similarities don't suggest plagiarism but rather that two (or more) individuals had similar ideas that they presented in similar ways. Sometimes the timing and the similarities are uncanny (I remember discussions when the movies \"A Bug's Life\" and \"Antz\" were released so closely together...while high level ideas had similarities, there were plenty of differences). In cases where an author has experienced a previous work, there are sometimes even more similarities. I think an author should be aware of this but if the author has an idea they want to share in their own way, they should do so. That's my long-winded way of saying that you shouldn't shout \" plagiarism\" unless an author is blatantly and obviously copying something without paying homage or presenting their own ideas and concepts.\n\nOverall, I found Anthem to be a thoughtful read. The story and characters were naturally flat but the ideas and concepts were interesting even if the author really beat you over the head with them. As to the relevance of this story in our modern era of personal freedoms, there is still plenty of space for improvement even in the most open societies. As a piece of literature and philosophy, we can learn from Anthem and use it to inspire conversations moving forward. While it's certainly not the most eloquent or profound piece of writing, it is a worthwhile read and gives good food for thought.\n\n3 out of 5 stars\n\nView all of my reviews on\n\nNo comments:", "pred_label": "__label__1", "pred_score_pos": 0.9514556527137756} {"content": "Drug War (2012)\n\n\nLink: Drug War\n\nSummary: An illegal drug-manufacturer is caught and tries to avoid the death penalty by aiding police in a high-stakes drug deal sting operation.  But is he really helping the police?  Or is he only working to subtly sabotage the entire operation and gain his freedom?\n\nThoughts: Fast-paced and engaging film.  Perhaps a little too fast-paced, as I found myself rather confused as to what was going on in the first half hour.  Part of that is probably due having to read subtitles and not being used to distinguishing Asian faces very well.  (As racist as it may seem to say “they all look the same!”, it’s true; by the end of the film it’s easy, but it’s always a bit of a challenge at the beginning when there are more than a few characters.)  Once I had a good handle on what was going on, I very much enjoyed all the plot twists, and the high-tense climactic Scorsese-worthy (or maybe milder-Tarantino-worthy) ending was very satisfying.  Overall, I found this to be a very fun action flick.", "pred_label": "__label__1", "pred_score_pos": 0.9264124631881714} {"content": "Yoga treatment for Atherosclerotic Obstructions\n\nA research publication of the Central Council for Research in Yoga and Naturopathy (CCRYN) reveals that Naturopathy and yoga have been proven to be beneficial in reversing Atherosclerotic Obstructions in patients suffering from Coronary Artery Diseases (CAD).\n\nThere is tremendous increase in the number of people suffering from CAD, the obvious reason being bad and unhealthy lifestyles. Various other factors like anxiety, tension, stress, junk food, sedentary lifestyle clubbed with lack of exercise also adds up to the increase in the number of CAD patients.\n\nYoga and Naturopathy are considered to be simple and effective therapies which do not involve usage of drugs for treatment. It has also been found that yoga soothes Atherosclerotic Plaque, thereby decreasing the chances of undergoing an Angioplasty or a Coronary Bypass Surgery.\n\nA study was conducted by the All India Institute of Medical Science (AIIMS) and Adhyatma Sadhna Kendra on 42 patients (men) suffering from CAD in the age group of 32 to 72 years. They were divided into two groups of 21 patients each with similar characteristics. One group was given a lifestyle involving Yoga, and the other group was given the regular medical therapy. The group that received yoga intervention showed remarkable improvement in the symptoms of angina, in comparison to the other group which actually showed an overall deterioration. In addition, the group with yoga therapy was in a better psychological status, their cholesterol levels and body weights decreased, while the other group did not show any significant changes in these lines. Their coronary angiographies which were taken after a year showed regression among yoga group patients, while it showed progression of Coronary Stenosis in the group that received medications. Hence the need for coronary angioplasty and bypass surgery was considerably reduced in the yoga group.\n\nOn the whole, the study was concluded with the belief that yoga had a favorable impact on angina, lowering the cholesterol levels and body weight, and that yogic intervention can be given to patients even in advanced stage of CAD to reduce the symptoms significantly. The kind of yogic interventions that were given included Pranayama, Asanas, Kayotsarg (for relaxation), stress management, Anupreksha and Anurat (moral principles for leading a better life), combined with a vegetarian diet which was low in fat and high in fibre.", "pred_label": "__label__1", "pred_score_pos": 0.9764139652252197} {"content": "Barron Gorge and Barron Falls\n\n\n\n\n\n\n\n\n\n\n\n\nImage Credit: Leo Casey\n\nEungella National Park\n\nSet in the mountains, around 80 kilometres west of Mackay, Eungella National Park is one of Queensland’s most ecologically diverse parks. It’s full of subtropical and tropical rainforests and is a wilderness wonderland to explore.\n\nBushwalking is fantastic at Eungella with more than 20 kilometres of stunning, rugged walking tracks that lead from hidden waterfall to scenic lookout. Enjoy a bush picnic under the boughs of huge and ancient trees or go spotlighting to spy gently on the range of native wildlife and forest creatures like the famous Platypus.\n\nRetreat to the cool Cairns rainforest\n\nThere are places where trails fade away through cool misty rainforest. They lead through lush undergrowth and soaring canopies.  \n\nGlimpses of wildlife and all manner of birds can be seen and heard through the trees, echoing loudly over the faint but constant buzz of life. Hidden waterfalls and dramatic lookouts await those who tread these paths.", "pred_label": "__label__1", "pred_score_pos": 0.979839563369751} {"content": "Tracking Production from Seed to Drum\n\n\n\nFrom the seed in the ground to the finished drum of botanical extract, Draco’s ingredients follow a strict paper trail to ensure quality, safety and purity.\n\n\nTraceability is a risk-management tool employed at Draco, which allows food business operators or authorities to withdraw or recall products which have been identified as unsafe. It is a cornerstone of food safety policy at Draco and is routinely implemented alongside proper testing and documentation to ensure that no unsafe products escape scrutiny and sicken consumers.\n\nFood safety has been a growing concern all over the world throughout the last couple decades. Outbreaks of disease in animals that could be transmitted to humans, or the presence of chemicals above acceptable limits in feed and food, can threaten both the quality and safety of products. This has been especially true as globalization and world trade have increased the intercontinental transport of goods.  That which once took months or weeks to reach its destination, now only takes a day or two from where it is produced to where it is utilized – in distant places all over the globe. This has benefited the consumer with reduced prices from increased competition, and a wider variety to choose from.\n\n200-traceabilityHowever, along with these benefits has come increased risk of contamination just due to the enormous volumes being shipped and reduced ability to inspect and track all shipments and imports.  As a result Draco has established an enhanced traceability program, while continuously improving overall standards of our quality assurance programs.  Improved comprehensive product testing of food, dietary supplements, pharmaceutical, and cosmetic products is necessary to make sure no adulterants, microbial contaminants, or toxins remain undetected due to the enormous number that can be found. These toxins include heavy metals, fungal mycotoxins, pesticides, herbicides, industrial contaminants, allergens, radiolytic byproducts from irradiation, and radioactive materials.\n\nIt is vital for manufacturers to know which types of contaminants have the greatest probability of contaminating a specific type of product. This is determined by where the product is manufactured, by the nature and source of inputs, the detailed manufacturing process, and the shipping/distribution points for what types of contaminants have the potential to be accidentally or intentionally introduced into a product.  This also brings up the importance of security for product and shipping facilities, since industrial sabotage and terrorist activity may also be a concern.\n\nFinally another important area to ensure food safety is to improve sustainability of production for various foods and herbal plant sources. When the supply of an agricultural raw material cannot keep up with demand, or the production is threatened by adverse weather and climate changes, this increases the risk of adulteration to make up for shortfalls or substandard product of questionable quality may be used. Helping farmers understand the issues of soil conservation, crop rotation, integrated pesticide management, and organic crop production, can help ensure production sustainability and improved quality of supply.", "pred_label": "__label__1", "pred_score_pos": 0.9949464201927185} {"content": "Read the Bible\n\nPsalms 11\n\nFor the director of music. Of David.\n\n1 In the Lord I take refuge.\n     How then can you say to me:\n     \"Flee like a bird to your mountain.\n2 For look, the wicked bend their bows;\n     they set their arrows against the strings\nto shoot from the shadows\n     at the upright in heart.\n3 When the foundations are being destroyed,\n     what can the righteous do(2)?\"\n\n4 The Lord is in his holy temple;\n     the Lord is on his heavenly throne.\nHe observes the sons of men;\n     his eyes examine them.\n5 The Lord examines the righteous,\n     but the wicked(3) and those who love violence\n     his soul hates.\n6 On the wicked he will rain\n     fiery coals and burning sulfur;\n     a scorching wind will be their lot.\n\n7 For the LORD is righteous,\n     he loves justice;\n     upright men will see his face.", "pred_label": "__label__1", "pred_score_pos": 0.5060152411460876} {"content": "Critical Pedagogy and Disney\n\n\n\n\n\n\n\n\n\nRelated image\n\nWhat animals can teach us about inclusive pedagogy\n\nWildlife & inclusive pedagogy. How do these words correlate? For some, the relationship may be unclear. But for someone like me who studies animals, the animal kingdom can teach us (humans) a thing or two about inclusive pedagogy. But first, what is inclusive pedagogy? According to Georgetown University “Inclusive pedagogy is a method of teaching in which instructors and classmates work together to create a supportive environment that gives each student equal access to learning. In these courses, the content takes into account the range of perspectives in the class, and is delivered in a way that strives to overcome barriers to access that students might have. Inclusive classrooms work to ensure that both teacher and student participation promote thoughtfulness and mutual respect” ( In other words, inclusive pedagogy is simply making sure that students with different backgrounds, learning styles, perspectives, and experiences all receive an education that works for them (i.e., there is no “one size fits all” in education).\n\nImage result for pig and tiger\n\nWhile animals most likely do not consciously think about inclusive pedagogy or teaching in general, some animals raise and teach not only their own young but the young of others as well. These animals are inclusive. It does not matter to them that some of their pupils/babies/friends/choose whatever word you want, look different, sound different, smell different, act differently, etc. All that matters is that these animals are put in the care-for and teaching role – and they embrace it. Stories about an animal of one species befriending, taking care of, and “teaching” an animal of a different species are relatively commonplace. Of course there are stories that are twisted and misconstrued to pull at heart-strings (e.g., the lioness and the antelope), so it is important to take this all with a grain of salt, but countless examples of true mutual relationships between species exist. For example, there is the dog who is best friends with a duckling and helps teach the duckling to swim and the cat that adopts a baby squirrel that fell out of a tree and teaches the baby squirrel to purr ( I know – my point here may be a bit of a stretch, but I kept thinking about this all weekend and so had to get some of these thoughts out!\n\nImage result for dog and duckling\n\nNow, I realize many will argue that these examples of animals taking care of other animals is not teaching and is driven solely by some maternal or paternal instinct. And part of me agrees with that. But, another part of me has observed animals enough to know that they have empathy and compassion towards others and that they communicate in ways that are often too subtle for us to notice. I have watched my dogs teach my puppy how to do certain things (same species example, I know). However, it really doesn’t matter why animals will raise and teach other animals. It only matters that they do (and that it is really cute!)\n\nMimicry … Crime or Flattery?\n\n\nImage result for monkey see monkey do\n\n\n\nImage result for teachers who love teaching\n\n\nAssessing Assessments: How We Discourage Learning by Trampling Imagination\n\nWe are assessed everyday of our lives, whether we realize it or not, on pretty much everything we do. Obviously, we are assessed in school on how well we can remember what is taught to us and are given a grade that reflects the teacher’s opinion of our performances. We are assessed when playing sports based on how well we run, throw, shoot a basket, etc and are assessed by either making the team or not and then by either starting or bench-warming. Outside of these more obvious examples of being assessed, we are assessed based on what we wear, how we look, what car we drive, what food we buy, etc. And, sadly, I admit that I am guilty of assessing people (typically subconsciously) on all of these accounts. I think it is probably pretty fair to say that all of us do this, unintentionally. For example, when I go grocery shopping, if I see someone with a cart full of soda, cookies, chips, etc with no fresh fruit and veggies, I typically think that this person is really unhealthy and/or poorly informed on nutritional guidelines (even though they could just being buying a bunch of food for their Super Bowl party, and that particular shopping cart is not at all indicative of their overall eating habits). This is a perfect example of why grading students on everything is not ideal. That person at the store would have received an “F” in Health Ed based on that day’s shopping cart … but maybe overall, he/she/they would get an “A+. Grades are snapshots … not the big picture.\n\nAssessment is a part of life, whether we like it or not. But, there are so many approaches we can take towards assessing others. In regards to our education system, grades are king, despite the evidence showing that grading students reduces their interest in what is being taught and encourages students to take the path of least resistance in order to get good grades (Alfie Kohn, “The Case Against Grades”). Kohn discusses how some schools have found success in replacing letter/number grades with “narrative assessments” or to have students assign themselves grades and then have the teacher and student discuss the reasons behind this assessment. The teacher, of course, has the final say – but I like that this enables kids to think critically about how they perform and gives them a voice. However, this seems like it would be a huge amount of work for the teachers – and therefore, likely not possible in large college classes. That said, this form of assessment is commonly used in “the real world” through our annual reviews where we self-assess, get assessed, and discuss with our superiors. Since a major point of going to school is preparation for “the real world,” shouldn’t we assess students in a way that directly translates to how they will be assessed later in life? Giving grades on everything would be the equivalent to my advisor micromanaging me every day and critiquing everything I do constantly (rather than look at the bigger picture of my strengths, weaknesses, etc). Our assessment should be part of our learning adventure – not an evaluation of how we “perform” every step along the way. If I were to run a marathon, I might trip at mile 15 but still get a PR.\n\nImage result for assessment meme\n\nIn my opinion, the biggest problem with grades is that it can discourage imagination, creativity, and risk-taking. Students are encouraged to follow the path of least resistance, which minimizes the creation of novel ideas. Liu & Noppe-Brandon (in Imagination First) discuss how Einstein is the picture of intelligence not because he was necessarily significantly smarter than the average person (though he very well may have been), but because he was not afraid to imagine, create, and fail. Failure is such an important learning tool, but in school we are taught that failing is bad, and it means we aren’t learning and succeeding. Most people will admit that they learn more from their failures than their successes, so why do we make “failure” such a bad thing? At the end of the day, qualitative feedback is much more beneficial than a letter or numeric grade. When grades are assigned, even if teachers provide qualitative feedback, most students ignore the feedback if they are happy with the letter/number grade (or if they just don’t care). Students would learn more if they were actually asked to read and absorb the feedback and make the corrections.\n\nImage result for grade meme\n\nAt the end of the day, assessments will never go away. And I don’t think that they should. Being assessed encourages us to grow. It is HOW we are assessed that matters.\n\nImage result for the road less traveled\n\nWhy are we taught to be sheep?\n\nAlthough I study animals, I do not study domesticated animals. Despite this, I know that sheep like to remain in flocks (or is it herds?), as they take the evolutionary approach of survival based upon the power of numbers. They follow each other around and do not stray far from others. They do not seek alone time; they do not follow a butterfly to greener pastures; and they do not question their version of authority. Because of this (and because they have no sharp teeth or claws to defend themselves with), sheep are considered meek. We even define the word sheepish as lacking self-confidence. Yet, our education system “trains” us to be just like sheep. We are taught that certain things are facts, and that is just the way it is. We are typically not taught to question, to ask “why”, or to contradict what authority says is true. In fact, it is commonly stated that once you get to graduate school you have to “learn to think for yourself.” So, let me get this straight – we spend 20+ years learning to think like others before it is ubiquitously expected for us to think individually!?!?\n\nImage result for sheep meme wake up sheeple\n\nReading Ellen Langer’s article “Mindful Learning” really hit this home for me. She discusses how we are taught the basics until the basics become second nature. We automatically drive on the right side of the road (in the US); we put forks on the left side of the plate when setting the table; and we don’t question “why.” Now, I am not suggesting that you got out tomorrow and see how you feel about driving on the left side of the road around here – some things we are taught should be followed. However, if you travel to England, you have to ditch your learned “second-nature” of driving on the right to be safe. I particularly liked the example about how we set the table. I had never thought about why we put the fork on the left side of the plate and the knife on the right. It really doesn’t make sense for the majority of the population, as right-handed folk typically hold their forks in their right hands and knives in the left. As a child, I was just taught that “this is how it is done,” and so, I accepted it.\n\nAs I got older, I was rewarded in school for blindly accepting what I was taught. I got A’s if I memorized what my teachers told me and did not do well when I didn’t. But what if the teachers are wrong (and having taught in the past, I can assure you that I was wrong sometimes)? Every day, research is showing us how things that were historically considered “common knowledge” are now incorrect (e.g., the world is flat; the Earth is the center of the universe; smoking doesn’t cause cancer). Every day, people prove that pushing the boundaries and not listening to what everyone told them furthers our understanding of the world. If everyone stayed a sheep, there would be no change. We need to start teaching children to think for themselves – it is as simple as saying “this COULD BE the answer to that question” vs “this IS the answer to that question”. In part, graduate school is so challenging because it is the first time we are truly and consistently evaluated on how well we can think for ourselves. Maybe, graduate school would be less daunting, less stressful, and less likely to cause or contribute to mental health concerns if we were “taught” how to think for ourselves.\n\nI could go on and on about this topic. But I leave you with this: it’s good to be the “black” sheep (even though we are taught it is not). It’s even better to be a rainbow-colored lion. So go out there and ROAR!\n\nImage result for sheep individuality meme\n\nLet’s talk WITH our students – not AT them\n\nHow do we, as educators, compete with the increasing number of distractions around our students? How can we get students to learn when their attentions are split among several things or are elsewhere all together? The answers to these questions are simple: we can’t compete, and we can’t get students to learn when their heads are somewhere else. But, what we can do is learn to teach in a way that engages students, so that their minds don’t have time drift away. So, how do we do this?\n\nIn my opinion, to do this, we must move away from the dominant lecture-style teaching format. Cellphones, laptops, iPads, Apple watches, etc all provide students with constant access not only to their friends and family but to the entire world via the internet. There is no way that they can listen to our voices droning on and on while they read the latest tweets and status updates. Don’t get me wrong, lecturing has its place in the classroom and can be an important teaching tool. For example, Robert Talbert discusses how lectures can be used in a beneficial manner in “Four Things Lecture is Good For” (2012) by stating that lectures are bad for transferring information from teacher to student but are good for covering a lot of material. He also states that people who are good at lecturing incorporate big-picture views about the topic being lectured. That is – lectures should not just spew fact after fact about one topic – they need to explain why the facts are important and relate the topic being lectured to other topics.\n\nImage result for lecture meme\n\nHowever, standing in front of a group of people talking AT them for an hour plus doesn’t accomplish what we want it to. Instead of talking AT our students we need to talk WITH them. We should not be the only voices being heard in the classroom. Our students should express their thoughts, their ideas, their opinions, and their experiences in class (when appropriate and asked for, of course). Everybody has a different set of knowledge and skills that make his/her/their voices have something unique to say. And just because we are educators, does not mean we should not be educated every day as well. Even if our students don’t know more about the topic being discussed than we do, they may ask a question that sparks an engaging conversation. Or they may have a comment that insights feelings in other students that prompt them to speak up. Even the statements of “I don’t understand” or “can someone explain this in a different way” are extremely valuable to us as teachers. This lets us know that we need to LEARN to express something in a different manner. As Marc Carnes states in “Setting Students’ Minds on Fire” (2011), students are dropping out of college not because they cannot afford it (though that does play some role) but because they are not interested! Why spend thousands upon thousands of dollars on “not learning” something you’re not interested in?\n\nImage result for engaging students\n\nWe cannot (or should not) forbid technology in the classroom without major pushback (see “Laptops and Phones in the Classroom: Yea, Nay Or a Third Way?” by Anna Kamenetz,2018). So, we need to get students to engage in their classes so that they are not bored and want to read that “Bob just got his hair cut and is feeling fresh” more than listen to us talk. Just as we are taught as children to earn the respect of others, as teachers we need to earn the attention (which can translate into respect) from our students. Making them feel talked at and unheard won’t accomplish this. I realize I am not providing any answers here on how to engage students, particularly while incorporating technology – that is up to us to discuss WITH our teachers and peers!\n\nHigher Education Isn’t Child’s Play\n\nWhen we are little, we learn every day. And it is fun! We learn to count, talk, tie our shoes, feed ourselves, etc … and each and every time we learn something new, it is the best thing that has ever happened! As baby George demonstrated, we even had fun when we failed ~ because failing is also learning, and learning is fun! As we age, learning becomes more tedious, likely because we are judged based how “well” we learn. When we are little, every time we fall or say the alphabet incorrectly, it is cute, we are encouraged to try again by smiling faces, and learning is an adventure (as Kuh states). But later, grades, report cards, and awards make children think of learning as a chore. Something that they have to do in order to succeed. Unfortunately, most of the times when students “fail” at something in a class, there isn’t a smiling face and the reassurance of another chance to try again.\n\nMany argue that we learn everyday even as adults. But how often do adults think that learning is fun? For example, if someone says “Hey – Erin! Let’s do something fun today! What would you like to do?” Even as someone who likes school, my standard responses to this question include “go see a movie,” “go bowling” or “go out to a nice restaurant.” Although I do thoroughly enjoy learning, it often seems to me that I am, and presumably the rest of us in academia are, the minority because learning goes from:\n\nImage result for i love learning learning is my favorite\n\n\nImage result for try not to have a good time ... this is supposed to be educational\n\nIn my opinion, using social media and blogging is a way to make learning fun again. It allows people to express themselves in often a less formal manner than typical “academic” writing. This, at least for me, takes off a lot of the stress involved with writing. Additionally, posting writing online via Facebook, blogging, Twitter etc encourages people to write well – as nobody wants to appear “stupid” to the masses. Overall, I believe that using tools such as blogging is increasingly important in today’s working world. It is not just for the youngest generation either – people of all ages are blogging and using social media to communicate with others. It will be really interesting to see how online networking continues to grow over the next decade and how it may bring fun back into education!", "pred_label": "__label__1", "pred_score_pos": 0.6678816080093384} {"content": "\n\nTwo years ago when Heather Campbell was sorting through a box of books she came across a Bible from her grandmother. Tucked inside was an envelope carrying a yellowing letter and a poppy from Flanders Fields sent during the First World War.\n\n\"When I discovered that poppy in the Bible it was like — I don't know if this is going to sound silly — it was almost like a tap on the shoulder, a quiet yet powerful whisper from the past,\" Campbell said in a recent interview.\n\n\"I was really quite shocked.\"\n\nThat poppy was among the many flowers that her great-grandfather, lieutenant-colonel George Stephen Cantlie, sent home with letters to his family. Cantlie served as the first commander of the 42nd Battalion of the Royal Highlanders of Canada.\n\nThe flowers are now part of a touring exhibit called War Flowers that is on display at the Chateau Ramezay Historic Site and Museum of Montreal until early January. It will then move to Edmonton.\n\n\"This exhibit tells stories in a way that balances hope and love with reality, reaching across continents,\" said Campbell, who is a registered nurse in Toronto.\n\nCantlie enlisted when he was 48 years old in 1915. He fought in battles in Belgium and France.\n\nHe sent his wife and one of his five children pressed flowers from the battlefield with his letters.\n\nIn a recording shared by Campbell her late aunt Elspeth Angus, who was Cantlie's grand-daughter, describes how he came about his daily ritual.\n\n\"Every night, without fail while he was over there, he wrote two letters. During the day ... he would pick a flower no matter what it was, whether it was a dandelion or a rose, a forget-me-not, or a daisy, and put it between two pieces of paper that he had brought over with him and press it in a book to dry out so he could use it.\"\n\nThe letters to his baby daughter Celia were only a few words long.\n\nIn one dated July 4, 1916, he wrote: \"Dear Wee Celia: With much love from Daddy. At the front Flanders. 1916.\" Folded inside is a twig with red poppies.\n\nAnother letter dated \"Flanders, At the Front. 28.6.16,\" contains daisies. \"Dear Wee Celia,\" it reads. \"From the trenches and shell holes with much love from Daddy.\"\n\nCampbell said the letters and flowers are \"probably a translatable story into any time of war, any type of adversity.\"\n\n\"Maybe this is a universal message to everyone that people do survive the best they can,\" she said.\n\n\"They still can find beauty amidst things that are pretty horrific, and we should celebrate that and remember that. It's really symbolism, isn't it?\"\n\nHer mother described Cantlie as kind and gentle. He died aged 89 on Aug. 30, 1956, when Campbell was about two years old.\n\nCampbell said her aunt recognized the historical significance of the letters she inherited and put the exhibition into motion.\n\nViveka Melki, the curator of War Flowers, said she was touched by the simplicity of the letters. \n\n\"This man sends these letters even in the darkest of times. He sends them to his daughter as a symbol of beauty amongst darkness,\" she said.\n\n\"He doesn't write an extensive letter, but he writes what's essential — I love you.\"\n\nFlowers are fragile but they still grew in the middle of battlefields, said Melki.\n\n\"Flowers are a strange thing, aren't they? They almost have a sacred quality to them.\"\n\nNancy Holmes, associate professor of creative and critical studies at the University of British Columbia, said the flowers sent a message of hope.\n\n\"And if you send flowers to your family — dried flowers or pressed flowers — they are going to imagine that at least you are some place where there is flowers growing so it can't be that bad,\" she added.\n\nStacey Barker, a historian at the Canadian War Museum in Ottawa, said flowers are not what come to mind when someone thinks about the First World War.\n\n\"You think about mechanized warfare and the horrors of the frontline and death and killing and these flowers are really a stark juxtaposition,\" said Barker.\n\nShe said it was \"quite poignant\" that Cantlie found \"these little bits of life on the battlefield.\"\n\n\"These little, beautiful, fragile things in the midst of absolute carnage and horror and devastation. He was able to find these living, beautiful, delicate things to send home.\"\n\n\nHina Alam, The Canadian Press", "pred_label": "__label__1", "pred_score_pos": 0.9669440388679504} {"content": "Mechanism of action of noradrenaline transporter\n\nThe action of noradrenaline at the synapse is terminated by its re-uptake across the pre-synaptic membrane. This is an energy dependent process. Sodium/potassium ATPases use energy from ATP hydrolysis to create a concentration gradient of ions across the pre-synaptic membrane that drives the opening of the transporter and co-transport of sodium and chloride ions and noradrenaline from the synaptic cleft. Potassium ions binding to the transporter enable it to return to the outward position. Release of the potassium ions into the synaptic cleft equilibrates the ionic gradient across the pre-synaptic membrane. The noradrenaline re-uptake transporter is then available to bind another noradrenaline molecule for re-uptake.\n\nCountry selection\nYou are leaving Progress in Mind\nPlease confirm your email\nRegister for access to Progress in Mind in your country", "pred_label": "__label__1", "pred_score_pos": 0.9948603510856628} {"content": "I wanna make a Minecraft noteblock song, and don't know how long a beat is in seconds (4/4). I know that 10 redstone ticks are in one second. I can use repeaters as rests, but I need to set the delay of the repeaters, and I can't make rests if I don't know how long a beat is, so please help me.\n\nEdit: By the way everytime you right-click a repeater, the delay increases by 1 redstone tick. The delay is set to 1 redstone tick (or 0.1 seconds) by default. If you right click it after the delay reaches four redstone ticks, it goes back to one redstone tick.\n\n\nAt 120 BPM (beats per minute), which is a typical pop song tempo, every beat lasts half a second. Divide 60 by the BPM to get the length of a beat at other tempos. You can use the Google metronome to try out tempos expressed in BPM.\n\nif I understand your explanation correctly, you can set the timing of the notes and rests in tenths of a second. This is the tempo of the music in BPM for different lengths of beats (quarter notes):\n\nSeconds BPM\n\n 0.3 200\n 0.4 150\n 0.5 120\n 0.6 100\n 0.7 85.71\n 0.8 75\n 0.9 66.66\n 1.0 60\n\nIf you want to sub-divide the beats into shorter notes and rests, you will have to choose a tempo at which you can evenly divide the quarter notes; e.g. if you choose beats of 0.6 seconds at 100BPM, you can use eighth notes of 0.3 seconds and eighth note triplets of 0.2 seconds.\n\n\nThe length of a beat depends on tempo, and tempo depends on the style and feeling that's wanted. Or the other way around - whatever beat length you set, it sets a tempo and a feeling. If your beat is one second long, then you get 60 of them per minute, and the tempo is 60 beats per minute.\n\nTry different tempos and see what you like.\n\nYour Answer\n\n", "pred_label": "__label__1", "pred_score_pos": 0.9781107306480408} {"content": "antinomy - транскрипция, произношение и перевод онлайн\n\nТранскрипция и произношение слова \"antinomy\" в британском и американском вариантах. Подробный перевод и примеры.\n\nantinomy / антиномия, противоречие, парадокс\nимя существительное\ncontradiction, conflict, discrepancy, collision, gainsay, antinomy\nparadox, antinomy\nимя существительное\na contradiction between two beliefs or conclusions that are in themselves reasonable; a paradox.\nEach contains an antinomy , a seeming contradiction, resolvable only by moving above the either/or into a third position that creates a broader frame.\nIn light of the examples of occult texts offered above, occult discourse is the result of a rhetorical antinomy between a belief and an action.\nThe antinomy we are considering arises from considering one side of the truth in a false abstraction from the other.\nThe second moment of our antinomy introduces the notion of a concept.\nA constructional model may deal with some of these issues otherwise and arrive at different conclusions, which do not always imply the antinomy , in some cases.\nSuch an interpretation would avoid the antinomy between the terms since both would refer to a physical object.\nWhat they knew-and modern Christians often miss-is that whenever our language shifts into the vocabulary of antinomy and contradiction, the words themselves no longer communicate.\nThis antinomy , perceived by reason and resolved by faith, is the standard paradox of Renaissance humanism, and we have met it in many shapes.\nThe antinomy is comprised of a seemingly contradictory stance among occultists and mystics that, on the one hand, regards spiritual truths as ineffable, but on the other, assumes that there is much to say about ineffability.", "pred_label": "__label__1", "pred_score_pos": 0.9134488105773926} {"content": "Norther World\n\nnews for the travel of your dreams\n\n#northern europe\n\n\nFinland forgotten cash.”No cash” stores born\n\nIn Finland, less than 2 out of 10 people still use cash to pay. Merit of a national “recipe” started in the 70s. We have investigated to understand how the Finns arrived at this result. To the Nordic countries. Here…\n\n\nIceland, the top fashion travel 2019\n\nIceland is on top fashion travel in 2019. Northern Europe is increasingly the protagonist in the agency. From alternative destinations, almost niche, Scandinavia and the Baltic Republics have jumped in a few seasons among the most popular, almost fashionable destinations….\n\nfishermen fishing\n\nFishermen pull up net and find dead body\n\nCorpse discovered by a fishermen in area known as ‘Smutthullett’ or ‘loophole’ in Barents Sea A group of fishermen pulled up a dead body in the trawl net of their ship while travelling across the Arctic Ocean, police said. The…", "pred_label": "__label__1", "pred_score_pos": 0.8805365562438965} {"content": "Shaping Visitor Behaviour\n\nA few weeks ago I visited  casa de Julieta, the fictional home of Romeo and Juliet’s, Juliet. The house which is a massive tourist attraction provides an interesting example in the use of stagecraft as a means to create unique visitor experiences and shape visitor behaviour.\n\nThe outside walls of the house and the digital displays mounted on them are covered in graffiti, messages of love, hope and everything in between. Whilst it is strange to see interactive displays scrawled over with permanent marker, it made me question why visitors feel it is appropriate to deface the courtyard area. I guess its a mix of crowd mentality, and a lack of value. The entrance is covered in graffiti, so visitors feel that they are permitted to leave their mark. The court yard area is quite modern, as are the digital displays so visitors do not recognise their value and instead are caught up in the moment, guided by the graffiti from visitors who have been there before them.\n\nThe crowd mentality, instantly changes upon entering the actual house. A large sign tells visitors that it is forbidden to leave messages on the walls, strangely this sign is extremely effective. The house unlike the courtyard feels like a traditional museum, with guards watching your every move.\n\nI was fascinated by the immediate and obvious change in visitor behaviour created by the two staged areas. In the courtyards visitors were boisterous, laughing, chatting, leaving love messages, writing on walls. In the house visitors were contemplative and engaged, they were quiet, they walked slowly and purposefully. Casa De Julieta demonstrates very clearly the power of stagecraft in shaping visitor behaviour in museums, galleries and heritage centres.\n\nText from Romeo and Juliet can be found all around the house\n\nVisitors can send Juliet a love letter by e-mail\n\n‘I felt like I won a Nobel prize!!’\n\n\n\nletter of thanks courtesy of the Void Facebook page\n\n\n1. VIEWING: The art in the gallery \n\n\n\n‘The exhibitions are breathtaking… they are that good’\n\n\n\n\n\n3. REFLECTING:  With juice and biscuits to finish \n\n‘The juice was Orange and the biscuits were cookies’\n\n\n\n\n", "pred_label": "__label__1", "pred_score_pos": 0.577934205532074} {"content": "A limited time offer!\n\nurgent 3h delivery guaranteed\n\nClothes and Fashion\n\nEssay Topic:\n\nA woman speak with a man about fashion and clothes. The man says than the fashion is a invention from clothes factories. The woman says that the fashion is necessary to people feel well The man prefers to wear the same clothes rye day The woman feel better when she wear a beautiful suit, and in each situation you must wear a different clothes.\n\nWe will write a custom essay sample on Clothes and Fashion\n\nor any similar topic only for you\n\nOrder Now\n\nThe man things different clothes distinguish between poor people and rich people. I’m going to talk about clothes and fashion. There are two aspects which I want to highlight: the comfort and the appearance.\n\nThe comfort is the main purpose of dress because the human race began to wear clothes when went out from the hot Africa and spreader over the World and colonized cold lands. They used lots of materials to do their dresses but in the beginning with the only objective that warm the body. On the other hand clothes has a mission, it is to show the personality, the humor, the owner to a certain social status or collective. For instance the uniform of the police, the robe of lawyers, prosecutor or Judges, or the Army. These are very import to distinguish or discriminate this people from others.\n\nWhen you are going to a party you must put on clothes different than you dress when you are working. The more happy you are the better clothed you wear. We used to wear dark clothes in funerals. If you had to facing in your work you should wear a suit. If you were a politician or a famous person you should dress up everyday well cause you could have a photo taken. I regretted very much don’t have known dress up in a very important situation when a was a young girl I had gone to a party but I didn’t liked to go there, I wearing a awful suit because my friends persuaded me to go there, and I didn’t want.\n\nWhen the party began to be boring, I was thinking going home, suddenly a stunning boy appeared, he was wearing a denim trousers, a beautiful blue cotton shirt with a denim collar ND he was tall and handsome; he seemed very kind with his friends but I couldn’t to approach him because I was wearing a awful loadstone’s suit from the times of my mother, I felt very angry with me, I thought “it is impossible that this person look at me”.\n\nHow to cite Clothes and Fashion, Essays\n\nChoose cite format:\nClothes and Fashion. (2017, Dec 27). Retrieved December 6, 2019, from https://phdessay.com/clothes-and-fashion/.", "pred_label": "__label__1", "pred_score_pos": 0.7563415169715881} {"content": "You are here\n\nHow one healthcare giant stays focused on application security\n\nRobert Lemos, Freelance writer\n\nWith 3,000 applications under his management, Aetna's chief information security officer Jim Routh has a lot to deal with. The healthcare company uses considerable diversity in how it builds applications. Developers build two-thirds of the company's applications in Java, and much of the remainder is written in .NET and Ruby. And like many large companies, Aetna maintains a small number of critical applications written in COBOL, a language more than five decades old.\n\nKeeping the developers of those diverse applications focused on security is tough, but it can result in significant cost savings, says Routh.\n\n\nEnsuring ROI and compliance\n\n\"Our whole software security program is predicated on the objective of reducing the total cost of ownership of the application portfolio,\" Routh says. \"We try to prevent as many defects as we can, and we try to fix as many bugs as well as we can, and that ends up creating a productivity gain of 20 to 50 percent.\"\n\nAs a covered entity, Aetna must secure any application that handles protected health information (PHI) to be compliant with the Health Insurance Portability and Accountability Act (HIPAA). In fact, all health insurance companies must do a risk analysis of their applications and infrastructure to make sure that PHI is handled in a secure way. Most security professionals consider technical vulnerability assessment—whether vulnerability scanning or penetration testing—a required part of risk analysis.\n\n\nLetting developers lead the app sec charge\n\nTo cope, Routh delegates much of the responsibility for choosing a testing tool and the actual testing to the developers themselves. Through a mature secure development lifecycle (SDLC) process, the company’s coders test for security at multiple steps in the process of creating and updating applications.\n\nStatic tools (SAST, or static application security testing tools) are chosen by the developers to fit with their programming process, while dynamic tools (DAST, or dynamic application security testing tools) are used to assess infrastructure and running applications.\n\n“We are not a big fan of running industrial-strength software security testing tools after the code is written, taking a day or two to compile the results, and then sending it back to the development teams,” he said. “If the development teams are doing a DevOps model, they are continuously doing builds.”\n\nRouth’s team at Aetna sets requirements for types of testing. The use of static and dynamic analysis tools has led the team to start a pilot to evaluate interactive application security testing (IAST) tools.\n\nDetermining security risk levels\n\nThe company does not mandate what development environment programmers use, but it does require each application to be classified within a risk category: low, medium, or high. An electronic medical records system would have a high-risk classification, while an information site for patients may have a low-risk classification.\n\nThen it requires teams responsible for these applications to abide by a set of controls for the risk level. To support developers, the security team has an approved set of tools that they use to secure their software. Open-source software is acceptable, as long as the development team is active and releases patches quickly.\n\n“We have different affiliates that have different development teams, and some of them, for example, are exclusive Ruby development,” Routh says. “In those cases, we will pick a tool that is based on those environments and require that they use it.”\n\nFinal note: Take precautions with open source\n\nRouth recommends that companies take stock of their portfolios of open source code as an important first step. Open-source libraries are frequently used by application developers without much thought, and they may not track notifications of vulnerabilities in those libraries. The result is that applications, which are otherwise secure, will have security weaknesses in the included code libraries and frameworks.\n\nAfter getting a grip on common code dependencies, developers should adopt static analysis tools, then use dynamic scanning, and finally focus on locking down their mobile applications, says Routh.\n", "pred_label": "__label__1", "pred_score_pos": 0.7792096734046936} {"content": "FTC: Cambridge Analytica scandal will cost Facebook $5 billion\n\nby Jake Doevan - -\n\nThe Federal Trade Commission issued Facebook a $5 billion fine over the Cambridge Analytica scandal\n\nFacebook to pay $5 billion fine\n\nFacebook is due to pay a record of $5 billion fine to the Federal Trade Commission after its privacy violations that emerged during the Cambridge Analytica scandal back in March 2018. The settlement was reached after the government officials voted 3-2 in favor of the agreement, which also followed the violation of the previous consent decree filed by the FTC back in 2011.\n\nThe settlement is now being revised by Department's civil division, although there is no news on what other ramifications will be enforced on the industry giant, and it is yet not known how long it will last. One thing is clear: the social network disclosed the personal data of 87 million users without permission and now need to pay up for it.\n\nHowever, while being the largest FTC fine in history, $5 billion is a mere quarter of the yearly Facebook's profits (from $22 billion),[1] and many were rushing to criticize the decision.\n\nFacebook has abused personal data of millions for years\n\nCambridge Analytica was a massive scandal that emerged back in March 2018, when Facebook announced that the personal data of 87 million users was leaked by the third-party with the help of an API called thisisyourdigitallife. It's author, Aleksandr Kogan from Cambridge University, offered money for people to participate in what seemed to be a personality test.\n\nHowever, it was not revealed that the participants' friends lists would also be exposed, and their personal information was also harvested. This, seemingly one-of-the-many breaches, had much more significant ramifications, as it is believed that it influenced major political events, such as Trump's Presidential election and Brexit.[2]\n\nAfter the news broke, Facebook was under the scrutiny, as Mark Zuckerberg had to answer to House Energy and Commerce Committee and an investigation by the FTC was launched. In response, Facebook promised to be good, changed the Privacy Policy, and implemented other changes.\n\nHowever, this was just a tip of the iceberg, as the social media giant was caught storing user passwords in plain text, left unprotected AWS S3 buckets that exposed 540 million user data,[3] or, in another case, harvested 1.5 million emails from newly registered visitors.\n\nFacebook wins?\n\nDue to industry giant's continual privacy violations, many are wondering if the $5 billion fine is actually enough for a company like Facebook, as is just a part of its yearly profits, which is often compared to a slap on the writs. According to The Verge, which called the fine “an embarrassing joke,” the proposed fine was already saved up for by the company and managed to actually increase the stock prices instead:[4]\n\nHere’s another way to say it: the biggest FTC fine in United States history increased Mark Zuckerberg’s net worth. <…> That’s actually the real problem here: fines and punishments are only effective when they provide negative consequences for bad behavior. But Facebook has done nothing but behave badly from inception, and it has only ever been slapped on the wrist by authority figures and rewarded by the market. \n\nWhile the implemented fine is controversial and sparks theories whether Facebook will actually benefit from it, various parties, such as Center for Democracy & Technology, are fighting for privacy laws and trying to implement new rules, calling the US privacy regulation “broken.”\n\nNevertheless, CDT's CEO Nuala O'Connor states that the record fine should serve as an example to other companies that are willing to tamper with users' privacy, saying:[5]\n\nThis record-breaking fine highlights the importance of data stewardship in the digital age. The FTC has put all companies on notice that they must safeguard personal information\n\nAbout the author\n\nJake Doevan\nJake Doevan - Computer technology expert\n\n\nContact Jake Doevan\nAbout the company Esolutions\n\n\nRead in other languages\n\nYour opinion regarding FTC: Cambridge Analytica scandal will cost Facebook $5 billion", "pred_label": "__label__1", "pred_score_pos": 0.5333316326141357} {"content": "No. 476 - Education, income and wealth: persistence across generations in Italy\n\nVai alla versione italiana Site Search\n\nby Luigi Cannari and Giovanni D'Alessio December 2018\n\nThe paper examines the intergenerational persistence of economic conditions in terms of education, income and wealth, and the importance of starting conditions in explaining success in Italy.\n\nItaly is found to be among the countries exhibiting high intergenerational persistence of economic conditions; moreover, it has displayed an upward trend in recent years. The correlation between the years of education of younger generations and that of their parents is also higher than in the past. However, education today plays a smaller part than in previous decades in explaining the economic conditions of individuals, while the role of the social and family context is increasing.\n\nFull text", "pred_label": "__label__1", "pred_score_pos": 0.9999050498008728} {"content": "Joan of Arc\n\n3:25 PM 14th December 2019 Queen's Film Theatre\n\nBruno Dumont's second film about the historical heroine, following Jeannette: The Childhood of Joan of Arc.\n\nAdapted once again from the early 20th century theatrical works of writer and poet Charles Peguy, this second instalment follows the legend through her different battles against the English in 1429 on to her capture, trial and eventual execution only two years later.\n\nThis is an incredible but true saga. The entire film is peppered with lip-synched musical numbers composed by French rocker Christophe. Dumont was given a special mention by the jUn certain regard ury at this year’s Cannes Film Festival. \n\nDir: Bruno Dumont, France, 2019, 138 mins, Unrated.", "pred_label": "__label__1", "pred_score_pos": 0.9136502146720886} {"content": "Promoting Rural Networking\n\nLeader Plus Fellow LAGs working together are creating an informal network of incalculable power. All over Serbia and Europe, Leader Plus facilitates collaborations of Fellow LAGs so that they can learn from one another, share valuable knowledge and insights, and leave better equipped to advance their work.\n\nAs a result of EU-wide collaborations, Leader Plus is able to distill the most effective patterns and unify them into a \"mosaic\"— a synthesis of the commonalities and intersections of key principles that guide Fellows’ individual solutions. These overarching mosaics are then disseminated nationally, and form the basis of our programmatic initiatives specific to each field of work, such as rural youth development or the rural environment.\n\nIn this way, rural networking not only helps Fellows become more successful, but it also helps Leader Plus identify cutting edge trends and implement them more broadly.\n\nFaLang translation system by Faboba\nСачак (Ламперия) от ЕМСИЕН-3\nДюшемедюшеме от EMSIEN-3", "pred_label": "__label__1", "pred_score_pos": 0.996158242225647} {"content": "Australian Haydn Ensemble review: Admirable retelling of composer's 'joke'\n\nAustralian Haydn Ensemble review: Admirable retelling of composer's 'joke'\n\nAustralian Haydn Ensemble\nVerbrugghen Hall, December 16\n\n\nErin Helyard played with 'graceful brilliance'.\n\nErin Helyard played with 'graceful brilliance'. Credit:Edwina Pickles\n\nHaydn's Farewell Symphony is well known for the story behind its second finale, in which the musicians exit individually leaving only two violins at the end. This was a hint to Haydn's employer Nikolaus Esterhazy, that, much as they liked his flashy palace built on a swamp in Hungary, they would really like to get home to their families.\n\nThe Australian Haydn Ensemble updated Haydn's joke to reflect the Arcadian paradise of an Australian summer complete with surfboards and water skies. As guest director and fortepianist Erin Helyard pointed out, the work is more than a musical anecdote and the symphony as a whole is a significant document of the enlightenment.\n\n\nHaydn scholar James Webster has argued that there is a strong unifying classical structure behind its progression from an unusually stormy first movement in the \"remote\" key of F sharp minor (symbolising at one level, the \"remoteness\" of the Esterhazy estate and more generally remoteness from a state of grace) through to its final resolution with just a pair of players in harmony (Skye McIntosh and Matthew Greco, appropriately symbolising the female/male harmony that Haydn was coyly dropping hints about).\n\nBaring the occasional blemish arising from the unpredictability of period instruments, the Australian Haydn Ensemble played with admirable precision of ensemble and attack, shaping each theme without contrived mannerism, undue emphasis or bumptiousness.\n\nThe tone of disciplined precision had been established right from the start with J C Bach's Symphony in G minor, Opus 6, number 6 with carefully phrased, insistent expressive ideas in the first movement and a slow movement of portentous solemnity.\n\nThe finale was light if slightly less energised. Helyard pointed out that while composing the next work, the Piano Concerto in A, K. 414 in 1781, Mozart had learnt of his friend, J C Bach's death and as well as the oblique references of homage noted by scholars, the slow movement also made oblique references to the dragging theme in the work we had just heard.\n\nThe orchestra played with light transparency allowing Helyard's graceful brilliance on the fortepiano to project through the orchestral sound without force. The slow movement contrasted a warm sound from the orchestra with hushed expressive stillness from the soloist.\n\nThe program also included Mozart's Rondo for piano and orchestra, K. 386 often assumed to be a discarded finale for K. 414.\n\nMost Viewed in Culture", "pred_label": "__label__1", "pred_score_pos": 0.509762167930603} {"content": "Connect with us\n\nScience & Technology\n\nThe first photograph of quantum entanglement has been captured\n\nOne of the most enigmatic and fundamental phenomena of nature quantum entanglement has been portrayed for the first time.\n\nquantum entanglement\n\nThe phenomenon was a headache for Albert Einstein himself, who characterized it as a “spooky action” because it violated the universe as we know it. It is called quantum entanglement and it happens when two particles separated from each other by a monstrous distance are able to communicate and interact without there being anything, no transmission channel, between the two. This means that if the state of one is altered, the other particle, perhaps millions of kilometers away, will respond in the same way.\n\nNow, a team of physicists from the University of Glasgow has managed to obtain the first visual evidence of this puzzle of quantum mechanics. To do this they created a system that triggers a stream of interlaced photons from a quantum light source to non-conventional objects; which at the same time is reflected in liquid crystal materials that change phase when the photons pass through them.\n\nquantum entanglement\n\n“The image we have managed to capture is an elegant demonstration of a fundamental property of nature, observable for the first time in the form of an image,” explained Dr. Paul-Antoine Moreau, head of the research, in the published study.\n\nquantum entanglement\n\n“It’s an exciting result that could lead to new advances in the emerging field of quantum computing,” he concluded.\n\nSource: BBC.\n\n\nScience & Technology\n\n\n\n\n\n\n\n\nVaccination against smallpox to people in Africa. (Public domain)\n\nThe PHE said in a statement:\n\n\n\n\n\n\n\nSource: Gov.ukIFL Science\n\nContinue Reading\n\nScience & Technology\n\nA cold virus can infect a pregnant woman’s fetus\n\n\n\n\n\n\n\n\nContinue Reading\n\nScience & Technology\n\nHow are ETs traveling through space and time today?\n\nTraveling through space has always been a difficult task, as the distances between planets and even more between solar systems and galaxies are incomprehensible.\n\nScience fiction makes things look easy using space warp engines and wormholes in space. There has been much speculation about the idea that there is a way to travel the vast distance of space with relative ease. Now it seems that no conventional science can support these ideas. Many men and women of science bet that this is possible.\n\nSomething that any viewer has seen on films several times is the crew of a spaceship needing to reach another planet or region of space deep within the universe. They enter some coordinates and voila , cross some tunnel-like structure, and reach a destination millions of light years from the point of departure.\n\nBut what was fantasy can now come true, as recent discoveries have found that galaxies can move between great distances and against predictions of basic cosmological models. The reason for this may make us rethink everything we think science knows about the universe.\n\nThe universe is full of many mysteries; It is an impressive kaleidoscope of patterns that science studies. These nebulae and star clusters continually reveal secrets about how they move in unexplained patterns.\n\nGalaxies tend to form clusters that are limited by gravity, and continue to clump together until they become much larger superclusters. Earth is part of a cluster (galaxy) we call the Milky Way, which in turn is part of the Virgo supercluster that contains over 1,000 galaxies. These masses continually change into different shapes, merging with each other, and some are even pulled between competing galaxies. The movement indicates that there is possibly some massive invisible force at work.\n\nGenerally, galaxies have an effect on each other, exerting gravitational force that moves them in a way that is predictable. What scientists have found is that there are exceptions to this and they are theorizing that this may be related to the influence of “large scale” structures..\n\nThese “large-scale structures” are composed of hydrogen gas and dark matter and form a pattern of strings, sheets, filaments, and knots that connect galaxies. Imagine a giant cosmic web that connects all parts of the universe.\n\nThis web has enormous implications for the way we think the universe works, the movement of galaxies and the development of planets and suns, and basically every astronomical body has massive consequences on the habitability of a world and the possibility of life’s evolution.\n\nSo what makes these clusters move the way they do, and why are newfound structures a problem for current gravity-based theories?\n\nFirst, it is contrary to current thinking that galaxies follow a fixed uniform pattern, which means that many of the patterns that have been shown and explanations of why a galaxy follows such a pattern will need to be reexamined.\n\nThe impact of these large structures will need to be added to the mix and they could actually change the accepted cosmic model. Science needs to collect much more data about structures in order to calculate this effect. A man who works on this is a scientist named Hutsemékers.\n\nWhen asked about discovering this connection network, he said:\n\nOne of the great things about science is that you can create a model with thousands of dice, but if something doesn’t ‘stick’, it starts to break. This crack has to be sealed or it will tear down the entire house.\n\nThis new discovery will really stir up the established ideas. Theories about the universe, as the most important of events, “the big bang ” will need to be reworked.\n\nWhy is this so interesting?\n\nBecause it can help us understand, link ideas and theories about the existence of extraterrestrial life somewhere deep in space.\n\nIf we discover the web that connects the universe, an advanced alien race may also have learned about it. Could this be how ETs are traveling the universe today?\n\nOne thing that many skeptics point to as a way of refuting extraterrestrial visitation on the planet is that the vastness of space prevents any species from traveling between worlds. What if an advanced alien race had found a way to utilize this cosmic web?\n\nMaking a full circle to the beginning of this story, would they have some kind of drive, motor or technology that could allow access to the structure and then travel between galaxies?\n\nA tunnel like a shortcut or a ‘wormhole’ could very well accommodate this need.\n\n\nContinue Reading\n\nRecent Comments", "pred_label": "__label__1", "pred_score_pos": 0.9502401947975159} {"content": "The content of Visuda belongs to Visuda ANS, and is protected by copyright law for intellectual property, etc.\n\nThe websites and the content may not be copied, reproduced, downloaded or transmitted without prior written consent from Visuda.\n\nExceptions apply for use for private and non-commercial use.\n\nWhat is mentioned above also applies to the individual elements of the web pages, such as logos, photographs, illustrations and movie clips.\n\nVisuda accepts the use of pointers and links to from other websites and media. You can also share the content and make others aware of the content through other social media such as Facebook, Twitter, LinkedIn and Instagram.\n\nCopying or downloading in violation of Visuda's rights may result in compesations and / or criminal liability.\n\nAny questions about this can be addressed to", "pred_label": "__label__1", "pred_score_pos": 0.9984890222549438} {"content": "190K Reads 10.9K Votes 28 Part Story\ndeangie By deangie Completed\n\nJane is the timid daughter of a Duke. She believes herself plain and the only beauty she possesses lies in her eyes.\n\nWilliam is a witty half french Duke in the making with a past he would rather hide than have known.\n\nWhen their paths cross William throws Jane into his whirlwind of secrets and a past that is their present and might just become their future.\n\nShout-out to @DJStitches98 for my new book cover.... I am absolutely in love with it.", "pred_label": "__label__1", "pred_score_pos": 0.8434580564498901} {"content": "Deadly environmental pollution has become an existential risk that threatens the prospect not just for human immortality, but for the long-term survival of our species and a great many others. Here we will focus on the nuclear waste aspect of the problem and ways to mitigate it before there is a critical tipping point in our global ecosystem. As philosopher Nick Bostrom said in his 2001 paper titled “Existential Risks,” published in the Journal of Evolution and Technology, “Our future, and whether we will have a future at all, may well be determined by how we deal with these challenges.”1\n\nUnlike many radioactive materials that degrade fairly rapidly, some will remain intensely poisonous for incredibly long periods. Plutonium-240 (Pu-240) has a half-life of 6,560 years. The half-life is the time it takes for radioactive decay to decrease by half. But decay does not occur at an even pace, and radioactive isotopes are dangerous for much longer – typically 10 to 20 times the length of their half-life. Pu-238 has an 88-year half-life, and is used for space vehicles despite the frequency of rocket failures. Any exploding rocket including such cargo spreads pollution far and wide. Pu-239 has a half-life of over 24,000 years, and will remain radioactive for about a half a million years. But the situation is more complicated because as Pu-239 decays it transforms to uranium-235 (U-235), which has a half life of 600 to 700 million years. Iodine-129 has a half-life of 16 million years. Pu-244 has a half-life of 80.8 million years. U-238 has a half-life of 4.5 billion years.2\n\nWhen taken into the body, isotopes of radioactive plutonium are not fully eliminated and tend to accumulate. They are deadly when sufficiently accumulated. Pu-239 was described by its co-discoverer, chemist Glenn Seaborg, as “fiendishly toxic.” In addition to terrible chemical toxicity, plutonium emits ionizing radiation. Pu-239 emits alpha, beta and gamma particles. Gamma radiation can penetrate the entire body and kill cells. Pu-239 has a robust resonance energy of 0.2 96 electron-volts that can badly damage DNA and produce birth defects that carry over generations.3 The body repairs tissues and DNA, but becomes overwhelmed when plutonium concentrates too heavily.\n\nAccording to a 1975 article in New Scientist Magazine, “But if it is inhaled, 10 micrograms of plutonium-239 is likely to cause fatal lung cancer.”4 Experts estimate that Pu-239 is so noxious that only one pound would be enough to kill everyone on our planet if it were so evenly dispersed in the air that everyone inhaled it.5\n\nAlthough it occurs in nature in exploding stars, almost all plutonium on Earth is man-made – the product of manufacturing nuclear weapons and energy in nuclear power plants. Of the different forms of nuclear products, deadly Pu-239 is very abundant because it is used to make nuclear weapons and is a by-product of energy production in nuclear reactors. As part of the U.S. weapons program (between 1944 and 1988), 114 tons of Pu-239 was produced in nuclear reactors at the Hanford Works facility, in Washington state, and at the Savannah River Site in South Carolina.6 Large quantities of this u-239 remains at temporary storage facilities at these locations. Hanford stores about 50 million gallons of high-level radioactive nuclear and chemically hazardous wastes in underground storage tanks that were not designed for long-term storage. Roughly a third of these tanks have leaked, so that at least a million gallons of radioactive waste has reached the natural environment. Hanford is the most toxic site in the U.S., and among the most toxic places on Earth. Over 1,000 contaminated sites at Hanford have been identified. Groundwater aquifers are polluted for over 200 square miles beyond Hanford.\n\nNo less than nine pounds of Pu-239 is used to make a working nuclear bomb. As of 2015, a total of 15,695 nuclear weapons are stockpiled by nine countries.7 Some of these weapons are 35 years old, but have a shelf-life of only 25 years.8 These aging weapons are undergoing corrosion. oxidation and other detrimental changes, and they must constantly be maintained and upgraded to prevent them from becoming an immanent threat to life on Earth. They are primary war targets. The situation emphasizes the need for absolute global peace.\n\nAs of 2014, about 435 nuclear power plants have been built in 31 countries around the world.9 A great number of radioactive products, including Pu-239, are byproducts of U-235 fission occurring in the fuel rods of those plants with uranium reactors. In addition to being susceptible to natural disasters and accidents, these nuclear plants are all vulnerable to acts of war. They, too, emphasize the need for absolute global peace.\n\nMany nuclear power plants are operating beyond their established service lives, and storing their nuclear wastes remains highly problematic. No method for the long-term storage of high-level nuclear products was available when industries began producing them to make commercial energy and weapons. Storage remains very precarious, and there is no realistic way to safeguard those that are long-lived. There are 93 different long-lived radioactive elements that are toxic for a minimum of 17,000 years, and the time scale extends for many billions of years of total decay time for some.10\n\nThe U.S. alone stores tens of thousands of tons of spent fuel containing Pu-239 and other highly radioactive materials from the various reactor cores. The quantity continues to increase worldwide as long as the nuclear plants continue to operate. About 1% of spent nuclear fuel is plutonium, and nuclear power provides about 10 percent of the world’s electricity. A uranium reactor will contain about a ton of plutonium. These figures provide a rough idea of the enormity of continual global radioactive waste accumulation. Aside from accidents like the Chernobyl disaster (which contaminated 40% of Europe), dangers include the potential for spontaneous fuel combustion and nuclear meltdown at pools containing spent fuel. The following quote from a National Research Council Panel report provides a rough idea of the growing tonnage build-up of plutonium from commercial nuclear reactors:\n\n“New production of commercial reactor plutonium during the first half of the 1990s was about 70 MT [metric tons] per year.”11\n\nAt least four to five tons of Pu-239 are known to have been released into the environment during nuclear weapons testing.12 Much of the Pu-239 remains buried underground at the test sites. But some was released into the air during atmospheric tests, and some traveled for many miles by way of groundwater after underground tests. About two-thirds of the plutonium in the atmosphere winds up in the oceans, where it tends to sink to their bottoms and challenges sea life. The polluted sediment is disturbed and redistributed by underwater tsunamis, earthquakes, volcanoes and enormous landslides.\n\nAccording to the U.S. Environmental Protection Agency (EPA):\n\n\nThe EPA adds:\n\n“People may inhale plutonium as a contaminant in dust. It can also be ingested with food or water. Most people have extremely low ingestion and inhalation of plutonium.”\n\nGiven that humans retain plutonium, the longer we live the more of it our bodies can accumulate. Although exposure can vary widely because of the way plutonium becomes distributed in the environment, it is has already reached high enough levels globally to cause serious concern: According to a report from the Proceedings of the NATO Advanced Research Workshop of the year 2000, titled High-Sensitive Determinations of Pu and Am Content in Human Tissues:\n\n“Now plutonium of both industrial and weapon origin is widely spread all over the world and included in the soil cycle, water cycle and the food chain, the end point of which is a human body….Now we warn about the serious hazard of dangerous accumulation of plutonium and americium in human body, especially in liver and bones….As it has been established recently, plutonium in its tetravalent state (TV+) is accumulated in human body during the whole life…”14\n\nSince that report was published, additional plutonium isotopes have been added to our body burden. High levels of Pu-239 were released after the magnitude 9.0 Tōhoku earthquake and tsunami of March 11, 2011 triggered the disaster at Japan’s Fukushima Daiichi power plant. The initial venting from containment vessels into the atmosphere, the meltdown (and melt through) of three of the facility’s nuclear reactor cores, and the continual release of contaminated coolant water into the Pacific Ocean are parts and parcels of the most lethal nuclear accident to date.\n\nAfter the radioactive plume from Fukuskima began circulating the Earth every 40 days or so (depositing over 1,000 different types of toxic substances on land and in water with each pass), plutonium was measured in the Pacific Ocean and its sea life, and in many U.S. cities and far beyond. A news headline from 2011 reads, “Report: 76 trillion becquerels of Plutonium-239 released from Fukushima — 23,000 times higher than previously announced.”15 The initial radioactive plume was discharged into both the air and water, and the water portion of the plume is expected to reach the U.S. coast along ocean currents by 2017. Smaller plumes continue to be generated as radioactive water is poured directly into the ocean each day. It remains to be seen how much all of this will affect marine life and the food chain along the U.S. west coast. California produces most of the fruits and vegetables for the rest of the country. The rule of thumb is that small particulates move along ocean currents, and large particulates sink to the marine sediments.\n\nSince the accident, 300 to 400 tons of radioactive water from the Fukushima nuclear complex have been pouring into the ocean every day 16 In 2014, Tokyo Electric Power Company (TEPCO), in charge of the cleanup operation, began filtering 62 (out of over 1,000) radioactive isotopes from the millions of gallons going into the sea – and creating water plume after plume crossing the ocean.17 The myriad of resulting toxic water filters, which deteriorate due to radiation exposure, will require permanent storage.\n\nThe public receives conflicting information about whether plutonium will be brought under control. A 2014 headline reads, “Tepco NOT to analyze Plutonium or Uranium in bypass water before discharging to the Pacific.”18 Another report says that plutonium is among the treated radioactive contaminants.19 Another says that the volume or output of the radioactive materials that are filtered out will be reduced by 90%.20 This can suggest that each day 90% less plutonium and certain other harmful radioactive toxins will flow into the sea than before.\n\nA 2015 report says, “Expert: “It’s completely unsafe… impossible to remove 100s of radioactive materials” – 1,200 radionuclides, only 62 reduced.” “It’s impossible for them to remove all those hundreds of radioactive materials. They know how to remove about 62 of them, but there’s other ones that they cannot.”21\n\nA headline from 2015 reads: “Experts: Plutonium levels 10,000,000 times normal in water below Fukushima reactors – Plutonium hit record high off coast in 2014 – “Has been transported relatively long distances” – Every sample taken from rivers flowing into Pacific had Pu-239, Pu-240, Pu-241,and Pu-242 from plant.” “…the amount of Pu isotopes directly released into the marine environment remains unknown.” The total oceanic burden is difficult to accurately estimate by taking surface or near-surface samples from flowing ocean water.22\n\nSince it is presently impossible to know how much plutonium has or will be released into the ocean, and since so many conflicting opinions appear in the news, we can make rough estimates based on how much was in the reactor cores in the first place. According to nuclear engineer Arnie Gundersen: “A ton of plutonium was in each Fukushima reactor.”23 Three 100-ton reactor cores melted down, and a fourth is badly damaged. Of the three melted reactors, after they underwent meltdown nuclear fuel penetrated their containment vessels and melted into the ground below (a process termed ‘melt through’). Then an unprecedented event (called ‘melt out’) occurred, so that the locations of the reactor cores is unknown.\n\nSome experts think that the mysterious highly radioactive black particulate deposited all over Fukushima, Tokyo and other parts of Japan includes the remnants of these lost cores. In theory, during the meltdowns the cores exploded with sufficient force to scatter as the black particulate (containing dangerous hot particles and other radioactive materials). This black substance matches, as best as can be determined, with components of core fuel and may include vaporized cores.24 Pu-239 and many other types of ionizing radiation are produced in reactor cores. The black particulate gradually breaks down into smaller particles, soaks into the ground and is scattered into the wind and water.\n\nThe cleanup at Fukushima is expected to take four decades, and there is no telling how far into the future highly-contaminated water will continue to pour into the ocean. It will only be stopped under certain conditions: There must be a means of preventing groundwater from entering the reactor buildings (through the basements and failed seals), so that the contaminated coolant water stops blending with the freshwater flowing in and out of the structures. The other condition is that the reactor buildings finally sufficiently cool so that coolant water is no longer required. Four reactor buildings are being cooled by water to prevent dangerous heat build-up that can cause another explosion. So, water is constantly being poured onto the premises and becomes laced with radioactive materials, and then it is partially filtered and put directly into the ocean.\n\nSo far, humans cannot go near the melted Fukushima reactors for an hour without being exposed to lethal amounts of radiation poisoning. Robots are the only alternative for performing work. But high-level radiation quickly causes electronics components to malfunction and fail within minutes. In April of 2015, the second robot developed to work within a damaged reactor was abandoned after it failed.25 A new robotic attempt is being planned for next year.\n\nThe potential for typhoons, flash floods, earthquakes and tsunamis place the damaged reactor buildings at Fukushima in further jeopardy. At least one tsunami will typically hit some part of Japan every year, which is far lower than the country’s frequency of earthquakes.\n\nEven if plutonium is brought under better control, the other nuclear contaminants being released from Fukushima, the on-going low level radioactive releases permitted around the world at uranium mines and mills, fuel fabrication plants, storage pools, casks, and trenches, etc. accumulate in the environment. Too much body burden brings on birth defects in newborns. Many Iraqi children born after depleted uranium weaponry was used during the Gulf War suffer hideous deformities. Irresponsible radioactive waste disposal is suspected of causing the significant cancer rise in southern Italy.\n\nFive reactors in the U.S. are known to be built in earthquake zones, too.26 New earthquake faults that threaten Hanford have been discovered since it was built. In 2015, Michigan quakes initially left scientists puzzled. The situation resulted in the identification of a previously unconfirmed earthquake fault line.27 Earthquake frequency has increased dramatically in the U.S. over the past few decades, and the frequency rate has continued to increase. Tornadoes are also a threat to the safety of nuclear plants, and the Fermi 2 reactor, located between Detroit and Toledo, experienced a near miss when a tornado ran directly through two of its cooling towers in 2014.\n\nSome physicists assert that humanity will always be plagued by the consequences of the Fukushima disaster.28 Scientists who study the ocean floor report a huge spike in unexplained sea life die-offs.29 Many thousands of tons of radioactive materials have been dumped into the Atlantic, too. The oceans are getting warmer and steadily more acidic, and oxygen is depleting at an increased pace. The entire oceanic ecosystem is threatened by over 70,000 types of pollution, and human CO2 emissions (mostly from fossil fuel combustion, transportation and industrial processes) are usually considered largely to blame.30 There are over 500 large oceanic dead zones, areas in which the oxygen concentration is so low that sea life suffocates. Science cannot predict the ultimate consequences of the changes in our oceans, but mass extinction of ocean life is predicted.31 No wonder some news sources are sounding alarm bells about the potential death of the Pacific Ocean.32 Oceans play a leading role in Earth’s overall climate, and they heavily impact the weather patterns on land. Humankind is not presently set up to endure drastic changes in climate or weather.\n\nSolutions for Trying to Militate the Problems:\n\nAside from reducing greenhouse gases and balancing their levels in the atmosphere, fortifying our health as much as possible, creating better filtration systems that can gradually capture environmental pollutants of all kinds, and reducing and eliminating the release of dangerous pollutants, a number of less obvious steps can be taken to mitigate the problems described:\n\nDiamond Film Microcircuitry:\nRobots will be required to contend with the Fukushima crisis. At the very least, they should be able to seal the buildings to stop the contaminated water leakage. But they are not capable of doing such manual work because their electronics fry in minutes when exposed to the intense hard radiation. In previous articles, I have explained the superiority of electronics and computerized robotics based on Diamond Film Microcircuitry (DMF), made with single crystal diamond film. The links below lead to articles about DMF, including how it is made and why it is superior to conventional electronics and robotics:\n\nIn addition to the performance of DMF discussed in the above-linked articles, synthetic diamond is used to make corrosion-hard particle radiation detectors. Diamond will tolerate being directly immersed in Pu-239 diluted in concentrated nitric acid, and it will reliably measure alpha activity.\n\nWhile 2015 predictions of radiation emissions from Fukushima are not yet available, measurements from 2011 showed a release of 3696 megarads per week:33 Whereas, diamonds routinely take exposures of up to 8000 megarads during color enhancement treatments. During color enhancement, diamonds are subjected to proton bombardment in cyclotrons. The gemstone will tolerate a tremendous amount of high-energy particle radiation of various types, too. Diamonds are subjected to neutron bombardment in nuclear reactors. They are exposed to high electron bombardment by Van de Graaff generators. These very high-energy processes are what it takes to knock carbon atoms out of place in a diamond’s crystal lattice. Diamonds remain in high energy fields for 1,000 hours or more during color enhancement. Diamond naturally acts as a heat spreader, too, and so can be used to help stabilize temperatures in reactors and cool cores faster. Given diamond’s proven properties, there is every reason to expect high performance from robots, computers and other electronic devices made of DMF.\n\nDMF contains three-dimensional internal channels made of graphite, created to carry electricity through devices (such as sensors, robotics, computers, etc.). Graphite shows no degradation when exposed to 1,000 megarads (compare the 22 megrads per hour emitted in Fukushima’s Reactor 2), and in DMF graphite is protected by diamond that can stand even higher radiation levels. Forms of graphite are used in the first wall of the UK’s Joint European Torus, a leading fusion experiment facility. Graphite has ideal thermal and electrical properties. It has an even higher melting point than diamond (the latter of which is 6,420 °F when subjected to high pressure). The use of DMF would be a wise choice for developing robotics that can operate within high-level hard radiation environments.\n\nGeopolymerized Rock:\nUltimately, the Fukushima buildings will be entombed like the Chernobyl nuclear reactor that exploded in 1986. But despite being entombed in 5,000 tons of concrete, Chernobyl has continuously leaked radioactive materials into the environment. These materials are pulled from local soil by trees and other plants through their root systems. This is happening because the Chernobyl reactor is entombed in ordinary Portland cement based concrete, which is inadequate for keeping toxins immobilized. The entombment structure must be frequently repaired to protect the environment.\n\nAll of the hundreds of nuclear reactors around the world must ultimately be either dismantled (a very expensive and dangerous process) or else safely entombed after they reach the end of their service lives. Successful remediation that does not leak requires that the entombment structures tolerate freeze thaw cycles and the hydrothermal conditions created when groundwater from rain, snow or floodwaters reaches hot reactors. Every reactor that is shut down to an inactive state continues to generate a significant amount of residual heat. When water comes into contact with the hot reactors, very hot water is produced that will degrade a Portland cement concrete entombment. The result of such containment is either very prolonged environmental contamination or else very prolonged, expensive maintenance.\n\nGeopolymerized rock (geopolymeric concrete) tolerates both hydrothermal conditions and freeze thaw cycles. It is made purely of minerals (which have a high heat tolerance) that are molecularly bound, without using heat or intense presume, to form rock-concrete. The geopolymeric binder is equivalent to silicates that make up over 55% of the Earth’s crust. The Battelle Institute, in Germany, tested geopolymerization for the European high-level nuclear waste classification. The Battelle researchers determined geopolymerization to be a “valuable alternative” to present day vitrification technologies.34 Geopolymers have excellent engineering properties. It would be wise for countries with nuclear reactors to test geopolymers for their particular radioactive waste needs, especially entombment.\n\nGeopolymers and DMF work well together, and are the key components of the GEO-DMF System. A well-made geopolymer entombment can be expected to endure for thousands of years, during which time it would not be degraded by acid rain, salt or other environmental corrosives. DMF sensors and other devices can be built into reactor entombments to monitor internal conditions and maintenance needs. Although not a total solution to the nuclear waste problems plaguing our planet, rock-solid geopolymeric containment coupled with a dependable, automated and enduring monitoring system would be a vast improvement over the present means of securing nuclear wastes and weapons arsenals.\n\nBoth geopolymers and synthetic diamond film DMF are impervious to water, which means that flooded buildings made with geopolymeric building blocks and DMF electronics will be as good as new when they dry out. DMF electronics (three-dimensional graphite zones) are encased within the synthetic diamond film. Geopolymerized rock (rock aggregates bound by a geopolymeric binder) can be molded into multi-ton megalithic building blocks that will allow structures to withstand the strongest known hurricane winds. The GEO-DMF System can provide for fireproof, weatherproof housing and other buildings, and help fortify coastal cities against sea level rise. Wise utilization of these technologies would allow humankind to better deal with existential and more localized risks while ushering in mature phases of the coming technological revolution.\n\nMargaret Morris\nGEO-DMF System\nContact: matmargaretmorrisbooksdotcom\n\n\n\n\n3. Management and Disposition of Excess Weapons Plutonium:: Reactor-Related Options Panel on Reactor-Related Options for the Disposition of Excess Weapons Plutonium, National Research Council, Policy and Global Affairs, Office of International Affairs, National Academies Press, Jul 6 (1995), page 351.\n\n4. New Scientist Magazine, Vol. 65, No. 941, Mar 20, 1975, p. 725.\n\n5. Tim Janakos, Collected Writings From Soka University of America, Second American Renaissance Press, Escondido, 2011, p. 54.\n\n6. Michael L. McKinney (ed.), Outlooks: Readings for Environmental Literacy, Second Edition, Jones & Bartlett Learning, London, etc., 2004, p. 89.\n\n\n\n9. John Moore, Conrad Stanitski, Chemistry: The Molecular Science, Fifth Edition, Cengage Learning, 2014, Stamford, CT, p. 807.\n\n\n11. Panel on Reactor-Related Options for the Disposition of Excess Weapons Plutonium, Office of International Affairs, Policy and Global Affairs, National Research Council, Management and Disposition of Excess Weapons Plutonium: Reactor-Related Options, National Academies Press, 1995, Page 3, note 1.\n\n\n\n14. Yu.T. Chuburkov et al., High-Sensitive Dereminations of Pu and Am Content in Human Tissues, in RadionuKluwer Academic Publishers, Dordrecht (2001), p. 72.\n\n\n16. Presented by Ecoshock radio, with nuclear engineer Anrie Gundersen as a speaker: ttps://\n\n\n\n\n\n\n\n\n24. )\n\n25. Wall Street Journal Article:\n\n\n\n\n\n\n\n\n\n34. Battelle Institut, Germany. Ceramic Transactions, Vol. 36, “Microwaves: Theory and Application in Materials Processing II” (1993), 61–72, Presented at the International Symposium on Microwave Processing, the 95th Annual Meeting of the American Ceramic Society, held in Cincinnati, April 19–22, 1993. Also see A. D. Chervonnyi and N. A. Chervonnaya, “Geopolymeric Agent for Immobilization of Radioactive Ashes after Biomass Burning” Radiochemistry, Vol. 45, Number 2, March (2003), 182-188. The abstract reads, “Solidification of low-level radioactive wastes obtained after biomass burning was studied. Two solidification modes using Portland cement and geopolymeric binder were tested experimentally. The strength at various hardening times, compacting efficiency, and leaching rate of the resulting monolithic concretes were analyzed. The compacting efficiency in concretes prepared by two different modes is similar. At the same time, geopolymeric binder is solidified in significantly shorter period and its compression strength is several times higher, but its main advantage is chemical immobilization of strontium cations. The leaching rate under the static conditions after 28-day hardening is nearly 10- 6 g cm- 2 day- 1. Thus, substitution of geopolymerization of the clay component (in general case, aluminosilicate material) for common solidification of low-level wastes using Portland cement is economically promising due to significant energy and resource saving. The geosynthesis can be easily realized as an environmentally safe process, yielding no liquid waste and involving no high-temperature stages with radioactive\n\nImage credit:\nU.S. Department of Energy:", "pred_label": "__label__1", "pred_score_pos": 0.5486669540405273} {"content": "Green Mountain National Forest in Danger\n\nUnless people get active to stop the plan, thousands of acres of Green Mountain National Forest that are about 10 miles from Brattleboro will probably be clearcut logged soon. “They are coming hard with the chainsaws to Green Mountain National Forest,” Chris Matera told the Valley Post. “What a sorry site it will be to look down from the top of Mount Snow and see clearcuts instead of that beautiful intact forest we see now.” A photo of that view is at:\n\nMatera lives in Northampton and was the main subject of a New York Times article about logging. To get an idea of what this logging will look like, see “before and after” photos that Matera took last year in New Hampshire at:\n\nActivists are focusing on stopping logging on publicly owned land. Banning clearcut logging, or all logging, there would result in logging companies buying more land, which in turn would keep that land from being converted to vacation houses, roads, parking lots, and strip malls.\n\nTo get involved, contact Matera by e-mail at or by phone at (413) 341-3878.\n\nIn other news from the Valley, free bus rides are available from Springfield to the statehouse in Boston for a May 8 rally for a $15 an hour minimum wage. The rally is at 1 p.m. For more information contact the local chapter of Jobs With Justice via\n\nIn other news from the Valley, hundreds of people attended a rally for gun control in Springfield, on April 27. The event was organized by a group that has a web site at\n\n\nPost new comment\n\n _ _____ ___ _ \n___ | | | ___| / _ \\ ____ | | __\n/ __| | | | |_ | | | | |_ / | |/ /\n| (__ | | | _| | |_| | / / | <\n\\___| |_| |_| \\__\\_\\ /___| |_|\\_\\\nEnter the code depicted in ASCII art style.", "pred_label": "__label__1", "pred_score_pos": 0.7225165963172913} {"content": "Age dating basalt, dating wedgwood\n\nExcessively Old \" Ages\" For Grand Canyon Lava Flows\n\nLinks to external sites will be displayed in another window. If layers are deposited horizontally over the sea floor, then they would be expected to be laterally continuous over some distance. Once these age relations were worked out, another principle fell into place - the principle of fossil succession.\n\nWedgwood Marks\n\nHow reliable is geologic dating\n\nIn the example here, as the basalt flowed out on the surface it picked up inclusions of the underlying sandstone. The basaltic and andesitic dikes and sills that occur within the strata underlying the Cardenas Basalt are similar in mineralogy and chemistry to the Cardenas volcanic rocks. Certain fossils also accumulate in a distinctive pattern or position that serves to define the top side. The Steppingstone Problem. This represents the parent isotope.\n\nHe concluded that process that are currently operating on the Earth must be the same processes that operated in the past. These assumptions furnish the most serious limitations on the accumulation clock. Alkali basalts typically have mineral assemblages that lack orthopyroxene but contain olivine. There is even some valid question as to if granite could be formed from magma at all since this has never, to my knowledge, been observed or duplicated in the lab. What if all the minerals were evenly distributed throughout, atom for atom?\n\nWedgwood Marks & Dating Wedgwood Pottery and Porcelain\n\nFrom Wikipedia, the free encyclopedia. Great uplift, accompanied by rapid erosion, is taking place and large sediment fans are being deposited in the Indian Ocean to the south. Because, any testing of any portion of the object would give the same results. In radioactivity was discovered, and it was soon learned that radioactive decay occurs at a constant rate throughout time. Nonconformities occur where rocks that formed deep in the Earth, such as intrusive igneous rocks or metamorphic rocks, are overlain by sedimentary rocks formed at the Earth's surface.\n\nBasalts are important rocks within metamorphic belts, as they can provide vital information on the conditions of metamorphism within the belt. Place the following features in order of formation and state the law used to relative age date each. As a result of millions of years of erosion these rocks now lie exposed along the coast where they are locally buried by a thin layer of modern sediment. But, is this the age of the Earth?\n\nWithin this group are around individual lava flows each of rather uniform thickness over many kilometers with several extending up to kilometers from their origin. Andesite Microdiorite Diorite. So a rock can get a very old radiometric age just by having average amounts of potassium and argon.\n\nSelect the photographs to display the original source in another window. Olson Thomas Edvard Krogh. Dalrymple may have a point. Some of the lava flows are fan-jointed, ropy, and have porphyritic to aphanitic and vesicular textures.\n\nWe have now presented most of the tools necessary to interpret Earth history. Similar cultures must have existed in both areas and lived at the same time. For example, it is recommended that one choose samples with as few vesicles and microlites as possible. Interestingly enough, dating whole rock isochrons can be used as a test to see if the sample shows evidence of mixing.\n\nFor these reasons, these formations were selected for radioactive isosope dating by the rubidium-strontium isochron technique. The argument that various radiometric dating methods agree with each other isn't necessarily true. The fundamental dating assumption no radiogenic argon was present when the rock formed is brought into question. Redirected from Columnar basalt.\n\n 1. The largest occurrences of basalt are in the ocean floor that is almost completely made up by basalt.\n 2. The Eons are divided into Eras only Phanerozoic Eras are shown in the chart.\n 3. With this new information, in combination with the other principles of stratigraphy, geologists we able to recognize how life had changed or evolved throughout Earth history.\n 4. The isochron method of dating is perhaps the most logically sound of all the dating methods - at first approximation.\n 5. Note that the geologic column was established and fairly well known before geologists had a means of determining numeric ages.\n 6. The human element is also important here.\nThe global tectonic rock cycle\n\nGeologists themselves recognize the problem of mistaking non-trackway imperfections as fission tracks. It is interesting that hundreds of species are found all mixed up together ranging from temperate birch and spruce to subtropical Eucalyptus and bald cypress. When magma comes in contact with soil or cold rock, it may cause the soil or rock to heat up resulting in a baked zone in the surrounding rock near the contacts with the igneous rock. When we find evidence of a hiatus in the stratigraphic record we call it an unconformity. Online Etymology Dictionary.\n\nRubidium-Strontium Data Rubidium, a trace element which is chemically similar to potassium, is naturally radioactive. Heating of rocks can also release argon. The presence of planktonic forms, aquatic macrophytes, and marsh plants indicates that deposition of the sediments took place in a body of water, probably a pond or lake. Unless the rock is heated to a very high temperature, both the U and its daughter Pb remain in the rock.\n\nWhy can't you say exactly what the age of the rock is? Has the Cardenas Basalt been successfully dated? Rocks that flow in a plastic state record their deformation in the alignment of their constituent minerals. Now, some rocks in the crust are believed not to hold their argon, so this argon will enter the spaces between the rocks. Although the types of trash in each pit is quite variable, each layer has a distinctive kind of trash that distinguishes it from other layers in the pits.\n\nWould you like to take a short survey\n\nAge dating basalt\n\nThey are based on visual observations and simple logical deductions and rely on a correlation and integration of data that occurs in fragmentary form at many outcrop locations. Journal of Volcanology and Geothermal Research. This would make the observed haloes consistent with an old age for the coal. There are also methods used to detect the presence of mixing with crystalline isochron analysis.\n\n • For example, the presence of recycled bricks at an archaeological site indicates the sequence in which the structures were built.\n • Limited Contamination contamination can form straight lines that are misleading.\n • Each assumption is a potential variable, the magnitude of which can seldom be ascertained.\n • On Earth, most basalt magmas have formed by decompression melting of the mantle.\n\nDating Wedgwood\n\nMethinks it is Like a Weasel. The dike not only truncates the xenoliths in the syenite but exhibits a thin black ultafine-grained chill zone where it is in contact with the granite. Or, dating asian women in was there some argon trapped in the rocks originally? Place in order of formation the following features. These tools include knowledge of different kinds of rocks and the conditions under which they form and the laws of stratigraphy.\n\nDue to weathering or high concentrations of plagioclase, some basalts can be quite light-coloured, superficially resembling andesite to untrained eyes. In addition, not all of the radon would be on the surface of the particles of uranium. Old Wedgwood has a character of its own.\n\nThe Cardenas Basalt has also been called the Rama Formation. Thus we can say how old something is. Thank you for your feedback. Geologist often make a graphic to display stratigraphic information in an understandable way. So, how confident can one be in zircon dates who's published Pb levels range from very high to very low?\n\nCardenas Basalt\n\nSedimentary and metamorphic rocks and age determination\n\nIdeally, however, any one basaltic rock from a given site should yield the same isotopic age, regardless of the method used. By examining relationships like these all over the world, numeric age has been very precisely correlated with the Geologic Column. These phenocrysts usually are of olivine or a calcium-rich plagioclase, which have the highest melting temperatures of the typical minerals that can crystallize from the melt. Thus, does elder scrolls any such whole-rock variations in P at some later time would mean that the original rock was never homogenous when it formed.\n\nCardenas Basalt\n • Gwyneth paltrow dating list\n • 10 worst dating cities\n • Personal dating agencies london\n • Linx dating service\n • Create a dating website\n • Young dro dating fantasia", "pred_label": "__label__1", "pred_score_pos": 0.6131231784820557} {"content": "Role of internal variability in Pacific sea-level trends\n\nCo-Author: Pedro DiNezio\nCo-Author: Christina Karamperidou\nCo-Author: Clara Deser\nWe plan to explore the role of natural variability on sea-level trends in the Pacific, with focus on the tropical western Pacific and the North Pacific. We will apply the dynamical adjustment technique of Deser et al. and the CESM1 large ensemble to develop a methodology to isolate forced and internal trends from observed sea-level records. We will focus on the following observational datasets and periods: 1) Satellite altimetry (1992--2014), Church and White (2011) global sea-level reconstruction (1950--2009), and tide-gage data from Honolulu and the west coast of the US (1920--2014).", "pred_label": "__label__1", "pred_score_pos": 0.8493927717208862} {"content": "Butter Pepper Chicken\n\nIngredients Checklist\n\nMethod of Preparation\n\n 1. To begin with, marinate the chicken in curd, salt, ginger-garlic paste, 1tbsp pepper powder for 1/2 hr.\n 2. Then in a pan, add Dalda® Oil and put the remaining pepper powder and add the marinated chicken, mix well and cove the pan with a lid and cook on a low flame until light brown in colour.\n 3. Serve hot with Green Chutney.", "pred_label": "__label__1", "pred_score_pos": 0.9995662569999695} {"content": "Search Results: 1 - 10 of 100 matches for \" \"\nAll listed articles are free for downloading (OA Articles)\nPage 1 /100\nDisplay every page Item\nRandom Lasing in an Inhomogeneous and Disordered System of Cold Atoms  [PDF]\nL. V. Gerasimov,D. V. Kupriyanov,M. D. Havey\nPhysics , 2015, DOI: 10.1134/S0030400X1509009X\nAbstract: We consider light trapping in an amplifying medium consisting of cold alkali-metal atoms; the atomic gas plays a dual role as a scattering and as a gain medium. We perform Monte-Carlo simulations for the combined processes. In some configurations of the inhomogeneous distribution this leads to a point of instability behavior and a signature of random lasing in a cold atomic gas.\nOptical parametric oscillation with distributed feedback in cold atoms  [PDF]\nAlexander Schilke,Claus Zimmermann,Philippe W. Courteille,William Guerin\nPhysics , 2011, DOI: 10.1038/nphoton.2011.320\nAbstract: There is currently a strong interest in mirrorless lasing systems, in which the electromagnetic feedback is provided either by disorder (multiple scattering in the gain medium) or by order (multiple Bragg reflection). These mechanisms correspond, respectively, to random lasers and photonic crystal lasers. The crossover regime between order and disorder, or correlated disorder, has also been investigated with some success. Here, we report one-dimensional photonic-crystal lasing (that is, distributed feedback lasing) with a cold atom cloud that simultaneously provides both gain and feedback. The atoms are trapped in a one-dimensional lattice, producing a density modulation that creates a strong Bragg reflection with a small angle of incidence. Pumping the atoms with auxiliary beams induces four-wave mixing, which provides parametric gain. The combination of both ingredients generates a mirrorless parametric oscillation with a conical output emission, the apex angle of which is tunable with the lattice periodicity.\nA Cold-Strontium Laser in the Superradiant Crossover Regime  [PDF]\nMatthew A. Norcia,James K. Thompson\nPhysics , 2015,\nAbstract: Recent proposals suggest that lasers based on narrow dipole-forbidden transitions in cold alkaline earth atoms could achieve linewidths that are orders of magnitude smaller than linewidths of any existing lasers. Here, we demonstrate a laser based on the 7.5 kHz linewidth dipole forbidden $^3 $P$_1$ to $^1 $S$_0$ transition in laser-cooled and tightly confined $^{88}$Sr. We can operate this laser in the bad-cavity regime, where coherence is primarily stored in the atoms, or continuously tune to the more conventional good-cavity regime, where coherence is primarily stored in the light field. We show that the cold-atom gain medium can be repumped to achieve quasi steady-state lasing, and demonstrate up to an order of magnitude suppression in the sensitivity of laser frequency to changes in cavity length, the primary limitation for the most frequency stable lasers today.\nElectron shelving induced lasing in cold bosonic atoms in optical lattice  [PDF]\nAranyabhuti Bhattacherjee\nPhysics , 2004,\nAbstract: We calculate the absorption spectrum of cold three level Helium atoms in lambda configuration in an optical lattice.Our results show the possibilty of lasing at certain points on the optical lattice which are capable of rendering one of the transitions metastable as compared to the other. A coherent control over the stimulated emission is possible using an axial magnetic field.\nEuclidean matrix theory of random lasing in a cloud of cold atoms  [PDF]\nA. Goetschy,S. E. Skipetrov\nPhysics , 2011, DOI: 10.1209/0295-5075/96/34005\nAbstract: We develop an ab initio analytic theory of random lasing in an ensemble of atoms that both scatter and amplify light. The theory applies all the way from low to high density of atoms. The properties of the random laser are controlled by an Euclidean matrix with elements equal to the Green's function of the Helmholtz equation between pairs of atoms in the system. Lasing threshold and the intensity of laser emission are calculated in the semiclassical approximation. The results are compared to the outcome of the diffusion theory of random lasing.\nThreshold of a random laser based on Raman gain in cold atoms  [PDF]\nWilliam Guerin,Nicolas Mercadier,Davide Brivio,Robin Kaiser\nPhysics , 2009, DOI: 10.1364/OE.17.011236\nAbstract: We address the problem of achieving a random laser with a cloud of cold atoms, in which gain and scattering are provided by the same atoms. In this system, the elastic scattering cross-section is related to the complex atomic polarizability. As a consequence, the random laser threshold is expressed as a function of this polarizability, which can be fully determined by spectroscopic measurements. We apply this idea to experimentally evaluate the threshold of a random laser based on Raman gain between non-degenerate Zeeman states and find a critical optical thickness on the order of 200, which is within reach of state-of-the-art cold-atom experiments.\nThreshold of a Random Laser with Cold Atoms  [PDF]\nLuis S. Froufe-Pérez,William Guerin,Rémi Carminati,Robin Kaiser\nPhysics , 2008, DOI: 10.1103/PhysRevLett.102.173903\nAbstract: We address the problem of achieving an optical random laser with a cloud of cold atoms, in which gain and scattering are provided by the same atoms. The lasing threshold can be defined using the on-resonance optical thickness b0 as a single critical parameter. We predict the threshold quantitatively, as well as power and frequency of the emitted light, using two different light transport models and the atomic polarizability of a strongly-pumped two-level atom. We find a critical b0 on the order of 300, which is within reach of state-of-the-art cold-atom experiments. Interestingly, we find that random lasing can already occur in a regime of relatively low scattering.\nTowards a random laser with cold atoms  [PDF]\nWilliam Guerin,Nicolas Mercadier,Franck Michaud,Davide Brivio,Luis S. Froufe-Pérez,Rémi Carminati,Vitalie Eremeev,Arthur Goetschy,Sergey E. Skipetrov,Robin Kaiser\nPhysics , 2009, DOI: 10.1088/2040-8978/12/2/024002\nAbstract: Atoms can scatter light and they can also amplify it by stimulated emission. From this simple starting point, we examine the possibility of realizing a random laser in a cloud of laser-cooled atoms. The answer is not obvious as both processes (elastic scattering and stimulated emission) seem to exclude one another: pumping atoms to make them behave as amplifier reduces drastically their scattering cross-section. However, we show that even the simplest atom model allows the efficient combination of gain and scattering. Moreover, supplementary degrees of freedom that atoms offer allow the use of several gain mechanisms, depending on the pumping scheme. We thus first study these different gain mechanisms and show experimentally that they can induce (standard) lasing. We then present how the constraint of combining scattering and gain can be quantified, which leads to an evaluation of the random laser threshold. The results are promising and we draw some prospects for a practical realization of a random laser with cold atoms.\nLasing and cooling in a hot cavity  [PDF]\nThomas Salzburger Helmut Ritsch\nPhysics , 2006, DOI: 10.1103/PhysRevA.74.033806\nAbstract: We present a microscopic laser model for many atoms coupled to a single cavity mode, including the light forces resulting from atom-field momentum exchange. Within a semiclassical description, we solve the equations for atomic motion and internal dynamics to obtain analytic expressions for the optical potential and friction force seen by each atom. When optical gain is maximum at frequencies where the light field extracts kinetic energy from the atomic motion, the dynamics combines optical lasing and motional cooling. From the corresponding momentum diffusion coefficient we predict sub-Doppler temperatures in the stationary state. This generalizes the theory of cavity enhanced laser cooling to active cavity systems. We identify the gain induced reduction of the effective resonator linewidth as key origin for the faster cooling and lower temperatures, which implys that a bad cavity with a gain medium can replace a high-Q cavity. In addition, this shows the importance of light forces for gas lasers in the low-temperature limit, where atoms can arrange in a periodic pattern maximizing gain and counteracting spatial hole burning. Ultimately, in the low temperature limit, such a setup should allow to combine optical lasing and atom lasing in single device.\nObservation of lasing without inversion in a hot rubidium vapor under electromagnetically-induced transparency conditions  [PDF]\nHaibin Wu,Min Xiao,J. Gea-Banacloche\nPhysics , 2008, DOI: 10.1103/PhysRevA.78.041802\nAbstract: We have observed CW lasing without inversion in a gas of hot rubidium atoms in an optical cavity under conditions of electromagnetically-induced transparency (EIT). The medium is pumped coherently and resonantly by a single ``coupling'' beam which also produces EIT in the lasing transition. The steady-state intensity exhibits thresholds as a function of the atomic density and the strength of the coupling beam. A theoretical model for an effective three-level lambda system indicates that gain without inversion is possible in this system if the two ground states are coupled by depolarizing collisions, and if the decay branching ratios meet certain conditions.\nPage 1 /100\nDisplay every page Item\n", "pred_label": "__label__1", "pred_score_pos": 0.9994049072265625} {"content": "Thursday, 27 March 2014\n\nQuestion Corner with Lorraine Mace - Answers to questions on that, which and where\n\nSeb from Inverness sent in a question over when to use that and when to use which. I know this is something that vexes many writers, so hope the answer helps.\n\nSeb says: I’m not a novice writer by any means, but I can never decide what the rule is over that and which. Is there a simple way to remember?\n\nOkay, the basic rule is this: if the sentence doesn’t need the clause (it makes sense without) you use which. If the sentence does need the clause you use that.\n\nThe car, which is green, has a manual gearbox.\nThe car that is green has a manual gearbox.\n\nThe two sentences look identical at first, but the meanings are not the same.\n\nThe car, which is green, has a manual gearbox. This tells us there is only one car and it has a manual gearbox. The clause (the words inside the two commas) isn’t necessary to illustrate the meaning. It is additional information and doesn’t affect the fact there is only one car and it has a manual gearbox.\n\nThe car that is green has a manual gearbox. This sentence suggests there is more than one car, but it is the car that is green that has the manual gearbox. The phrase ‘that is green’ is necessary to show clearly of all the cars on the forecourt, it is the green one that has the manual gearbox.\n\nThe proper phrase for it is a restrictive clause because another part of the sentence depends on it. You can’t remove that clause (that is green) without changing the meaning of the sentence.\n\nNancy, who is currently living in Barcelona, is doing a non-fiction writing course. As she says: living abroad, it’s not always easy to carry out research. Do you know of any good reference sites?\n\nAs I wasn’t sure what topic or categories would be of benefit, I’ve collected a range of online reference sites, all of which are useful for those of us who have limited access to English language libraries and museums, but are equally useful to readers who aren’t resident abroad.\n\nAsk Oxford has built a database on grammar, usage and words, as well as giving a quote of the week, word of the day, spelling help and origins of words and phrases.\nCambridge dictionary is useful:\nMerriam Webster is another good online dictionary and is useful when an alternative word is needed.\n\nQuotes and Sayings is a wonderful site to find quotes by subject or author, excerpts from speeches and poetry, and a good selection of proverbs and sayings. The site also provides the full text of several books by Arthur Conan Doyle and the following works by Shakespeare: All's Well that Ends Well, As You Like It, Julius Caesar, Macbeth, Romeo and Juliet, The Merchant of Venice, The Taming of the Shrew, The Tempest and his Sonnets.\n\nMuseums is a gateway to various UK museums, galleries and heritage attractions. provides access to a database of about 5,000 artefacts from the British Museum's collections. produced by the Museums, Libraries and Archive Council, this is an online database of more than 6,000 collections in the UK's museums, galleries, archives and libraries. The Imperial War Museum covers conflicts from the First World War to the present day. is an American site that provides information on museums and galleries worldwide. the National Gallery Search allows you to explore by artist, subject, theme or title. the National Museum of Photography, Film and Television gives details of the collections which include the world's first negative and the earliest television footage. the National Portrait Gallery lists collections by name of artist or sitter, by medium, or by subject. the Natural History Museum has details of the museum's collections, information about research, details of services and access to the catalogue. the Tate Online gives access to works in the Tate Modern, Tate Britain, Tate Liverpool and Tate St Ives. \n\nFee-paying sites\nThe British Library gives online access to this incredible resource and offers copies of documents for a fee. is the online version of Encyclopaedia Britannica.\n\n\nLorraine Mace is the humour columnist for Writing Magazine and a competition judge for Writers’ Forum. She is a former tutor for the Writers Bureau, and is the author of the Writers Bureau course, Marketing Your Book. She is also co-author, with Maureen Vincent-Northam of The Writer's ABC Checklist (Accent Press). Lorraine runs a private critique service for writers (link below). She is the founder of the Flash 500 competitions covering flash fiction, humour verse and novel openings.\n\nHer debut novel for children, Vlad the Inhaler, will be published in the USA on 2nd April 2014.\n\nWriting as Frances di Plino, she is the author of the crime/thriller series featuring Detective Inspector Paolo Storey: Bad Moon Rising, Someday Never Comes and Call It Pretending.\n\n1 comment:\n", "pred_label": "__label__1", "pred_score_pos": 0.679790735244751} {"content": "Your cart is empty.\n\nSan-X Iiwaken Dog Puppies Letter Sets - B\n\nSan-X Iiwaken Dog Puppies Letter Sets - B\n\n$ 1.93\n\n4 letter sets of Iiwaken dog / puppies from San-X 2015\n\n4 different designs\n\n2 writing papers + 1 matching envelope for each set/design.\nSo, in total there are 8 writing papers + 4 matching envelopes\n\nThe size of letter writing paper is about 5.75 x 7.25 inch.\n\nYou will receive all the letter sets shown on the pictures\n\nSo cute, kawaii and fun\n\nAwesome for collecting and gift\n\nPerfect for making someone feel special with a love note.\n.... for birthday gift, party favor\n.... for collecting\nand many many other things....", "pred_label": "__label__1", "pred_score_pos": 0.9652180671691895} {"content": "Official Rules(view all)\n\n8.01 Umpire Qualifications and Authority\n\n8.01 Umpire Qualifications and Authority\n\n(a)  The League President shall appoint one or more umpires to officiate at each league championship game. The umpires shall be responsible for the conduct of the game in accordance with these official rules and for maintaining discipline and order on the playing field during the game.\n\n(b)  Each umpire is the representative of the league and of professional baseball, and is authorized and required to enforce all of these rules. Each umpire has authority to order a player, coach, manager or club officer or employee to do or refrain from doing anything which affects the administering of these rules, and to enforce the prescribed penalties.\n\n(c)  Each umpire has authority to rule on any point not specifically covered in these rules.\n\n(d)  Each umpire has authority to disqualify any player, coach, manager or substitute for objecting to decisions or for unsportsmanlike conduct or language, and to eject such disqualified person from the playing field. If an umpire disqualifies a player while a play is in progress, the disqualification shall not take effect until no further action is possible in that play.\n\n(e)  Each umpire has authority at his discretion to eject from the playing field (1) any person whose duties permit his presence on the field, such as ground crew members, ushers, photographers, newsmen, broadcasting crew members, etc., and (2) any spectator or other person not authorized to be on the playing field.", "pred_label": "__label__1", "pred_score_pos": 0.9999931454658508} {"content": "Disaster Re-silence? Disaster Resilience?\n\nToday we had two lectures/discussions on 3/11 Fukushima disaster relief.\n\nSorry, that was a terribly uninteresting first sentence that in all honesty, I almost started with. I’m relieved (get it?) I caught that and it wasn’t a writing disaster.\n\nOkay, joking and puns aside, I think our discussions today, led by Hijikata-sensei and Shinoda-sensei from Waseda University and later by Nakayama-san of Kuma Project Association, were a really interesting follow up to our meeting with Oguma Eiji yesterday. That is, Oguma Eiji provided a sort of historical sociological/activist/documentary filmmaker perspective or response to the path-dependency of Touhoku, the Fukushima Daiichi nuclear meltdown, and the “natural” vs “manmade” aspects of the disaster. Today, then, we approached this same event from the different lenses of information science and NPOs.\n\nInformation science takes the Environment as observed through the Five Senses to compile Data (i.e. record of the past), and uses that information and knowledge to generate Models (via induction and deduction), which then inform decision-making and action, which in turn changes that original Environment. In short, it’s a social process that goes into regional planning (though, Hijikata-sensei noted that “region” is a product of human perception). Hijikata-sensei used Kesennuma City in the Hashikami Area as a case study in discussing post-disaster regional planning and resilience. I was reminded a lot of a guest lecture in my Introduction to Environmental Studies course this past fall semester, where Professor Eileen Johnson talked about Coastal Resilience in Maine.\n\n\nKeiji Nakayama actually visited Bowdoin last year and gave a similar talk on the NPO he founded, Kuma Project Association, which provides outdoor, experiential, and volunteer-based education programs. That’s not to say it was repetitive at all. Rather, it was really interesting hearing it again and being able to engage with Nakayama-san in a smaller group/discussion setting.\n\nNakayama-san is a close friend of Aridome-sensei and was a school refuser from the 4th to 9th grade because he disagreed with the emphasis on conformity placed in the Japanese education system. Though he didn’t go to high school, Nakayama-san decided to go to college and got a B.A in Economics because he was interested in the education quality discrepancy between “developing” and “developed” countries, which as political, cultural, and economic roots. He then pursued a Master’s in Outdoor Education and Recreational Therapy, followed by a Doctor’s in Sports Sociology. Besides his work with Kuma Project Association, Nakayama-san also, ironically enough, teachers teaching-training courses for students who want to become teachers, where he does everything he can to emphasize the importance of individuality in school settings.\n\nNakayama-san believes that many education systems focus too much on the knowledge component of education, which can come from family and formal (school) education. Kuma Project, therefore, aims to provide social and experiential-based education. He used a wonderful bike analogy, where “knowledge” and “experience” are the two wheels of the bike; if one is turning faster than the other, the bike can’t really move or be balanced very well. Following the 3/11 nuclear disaster, Nakayama-san realzed, driving around evacuation advisory areas, that many people weren’t getting the adequate relief they needed. Elderly people, people with disabilities, and families with children often left evacuation centers and returned home, often feeling guilt or that they were a burden or falling ill due to the stressful environment (and recovering upon returning home). Furthermore, many people in mountain areas were considered “non-affected,” even though they were without water and (especially elderly) had to walk many miles to get water and other supplies. In other words, they were considered “non-affected” from a physical damage standpoint and weren’t allowed to go to the evacuation centers. Finally, many children, but also adults needed stress-relief and social opportunities to talk about the disaster, in a setting where they could do so without feeling guilty (i.e. what if the other person suffered more than I did?).\n\nKuma Project Association, with the help of its college student “volunteers” (note, there is a fee, since government-based funding is tricky), seeks to meet all of these needs through its programs. It was interesting how Nakayama-san acknowledged that it’s now more accurate to call it “regional development” rather than “disaster relief support,” which might dredge up old, bad memories. As a bit of an aside, I thought Nakayama-san had this really fascinating, wonderful combination of sincerity and humor and pride and honesty in talking about his work that was a pleasure to listen to.\n\n\nEDIT: I want to briefly explain this post’s title. I think “resilience” is a word tossed around a lot, especially in the face of climate change and natural disasters. I think there are worse “buzzwords,” but talking with Hijikata-sensei and Nakayama-san made me think a little bit about how events or disasters can fade from our memories, just as Nakayama-san mentioned in his talk. So I don’t want my title to evoke an idea of “silencing” disaster or climate change support efforts. Rather, it’s to point out that self-“silencing,” or memories or ideas fading into the recesses of our mind, I think can occur both with time and overuse (especially of words). I think there’s very real, valid reasons for and against letting such things fade (for instance, so as not to dredge up bad memories, as Nakayama-san said) but also reasons for and against keeping such ideas alive. It’s cliche, but as they say, we can learn from the past. Does forgetting help ease those who suffered back into everyday life or does it risk leaving that suffering unacknowledged, for lack of better words?", "pred_label": "__label__1", "pred_score_pos": 0.9506118893623352} {"content": "On that Kennedy delivered this speech, the Soviet\n\nOn September 12th, 1962, John F Kennedy – the United State’s 35th President – stood before a crowd of 35,000 people at the stadium of Rice University, Houston, Texas, and presented an inspirational speech that pushed America forward in the space race. The context of this speech was delivered during the Cold War, and at the time that Kennedy delivered this speech, the Soviet Union’s satellite – Sputnik – had already been orbiting the Earth for 4 years, and also sent the world’s first man ever – Yuri Gagarin – into space a year prior. The anxiety-filled American public was quickly losing their patience, and the President – with his determination that America will be the first to go to the moon, reassured the American public that the United States will be the pioneering country in the space race. The significance of his speech was showed when Neil Armstrong became the first man to walk on the Moon in 1969, and reflected just how persuasive he was for America to be able to achieve such a feat within 7 years of his speech. So today, I will be analysing the rhetorical and literary devices Kennedy applied into his speech, and how it still resonates strongly 60 years after its delivery.In the beginning of the speech, Kennedy first addresses the audience and expressed how he was “particularly delighted” to be invited as an honorary visiting professor. He specifically did not mention himself as the President, but rather a professor. And although the entire audience fully knows that he is the President, by introducing himself as a professor, he establishes a friendlier connection and makes the audience more likely to agree with his decision to go to the moon and the content that will follow. However, he still maintains his role as the President and the rhetorical device – ethos – is prominent here as he’s using his role to persuade the audience of his goal to reach the moon. He then goes on to address Rice University and describes how the audience and him “meet in an hour of change and challenge”. show entire para in screen Within the entire paragraph, Kennedy uses inclusive language with the word “we” to make the audience feel they are also a part of this situation. The American public at that time was starting to feel powerless due to the lack of progress in the space race as compared to the Soviet Union, but by including them, not just the audience who were there but also the people who were going to find out about his goal to the moon on the newspapers, would feel as if they can be part of the group who will make change and contribute to the betterment of their own country.Kennedy then condenses 50,000 years worth of man’s recorded history in a time span of half a century, “10 years ago, under this standard, man emerged from his caves.” Only five years ago, he states, man learned to write. And only a month ago, electric lights and telephones and automobiles and airplanes became available. So if American spacecraft successfully reach Venus and American astronauts land on the Moon, “we will have literally reached the stars before midnight tonight.” This powerful analogy certainly helps excite the audience and demonstrates that a goal seemingly impossible to achieve is actually close within their grasps. It also motivates the audience to think what may be possible if they were actually able to reach for the stars before midnight tonight, it raises people’s hearts to make efforts to achieve this end and gives the security that their present and future efforts will not go in vain. He then goes onto explaining why America will join the space race, no matter what. Kennedy explains that the vows of America – as in the ideology of democracy – can only be fulfilled if the Nation is first to reach the moon, and therefore he wants America to be the first to do so, and to lead space exploration. He then talks about how America has vowed that they “shall not see it governed by a hostile flag of conquest” and “not see space filled with weapons of mass destruction” but instead “by a banner of freedom and peace” and “instruments of knowledge and understanding”. Here, Kennedy creates a contrasting effect between the rivaling countries by symbolising the United State’s ideology – democracy – by using the words freedom, peace – and the Soviet Union’s ideology – communism – by using the words hostile, weapons, destruction to reinforce this unpleasant image America had on the Soviet Union during the Cold War. He further emphasises his point that only if the United States occupies a position of pre-eminence can they decide whether this new ocean will be a sea of peace of a new terrifying theater of war. Kennedy uses pathos and tugs onto a nerve that many Americans feared – a nuclear war – and the audience will now feel the urgency of being first to moon and be motivated to protect it from the Soviet Union. Kennedy then goes onto regarding the concerns and criticism of space exploration. He mentions that reaching the moon will be a costly and hard process. The surroundings of space is hostile to us all, and America’s technology and expertise will be greatly challenged in order to achieve this goal. But then, he asks the audience a couple of rhetorical questions. “Why do we climb the highest mountain? Why fly the Atlantic?” And adding some humor into his speech, which resonated with his Rice University audience, “why does Rice play Texas?” The audience knows that going to the moon was meant to beat the Soviet Union in the space race, but other than that, why? Well, because it is challenge. “We go the the moon in this decade,” says Kennedy “not because it is easy, but because it is hard… because the goal organizes and measures the best of American energy and skill.” Kennedy is challenging his audience and the American public to rise, to demonstrate the best of their skills, and to reinforce American leadership as an innovative, leading power. He himself replies to his rhetorical questions, and in the Cold War context, a challenge like this was very appealing to his audience. Failure to reach the Moon would not just be a failure in technological or scientific terms, it would be a failure on the part of the American people, the American spirit and idealogy. He then went on to list out the steps that America has already taken to reach the goal. By doing so, he further validates that the country is not that far off in achieving the moon land.", "pred_label": "__label__1", "pred_score_pos": 0.9953266382217407} {"content": "Lee Kwang Soo once again demonstrated his unluckiness on the “robot wars” episode of “Running Man” which aired on April 10.\n\nMembers go up against an AI in a game of “kkeut mal it gi” (literally “connecting last sounds”), a game where people take turns saying a word whose beginning sound starts with the ending sound of the previous word.\n\nlee kwang soo 2\n\nWhen it was Lee Kwang Soo’s turn to choose a word, he had to come up with a word that started with “phone.” After he isn’t able to think of one, he uses the dictionary lifeline, only to be told that there is no word in the Korean dictionary that starts with “phone.”\n\nFlustered, Lee Kwang Soo says, “I used the lifeline but the word isn’t there (in the dictionary),” to the amusement of everyone on set.\n\nWatch the full episode below:\n\nLink to video: www.viki.com/videos/1096418v-running-man-episode-294\n\nSource (1)", "pred_label": "__label__1", "pred_score_pos": 0.9283431768417358} {"content": "Helen Keller, Deaf and Blind Spokesperson and Activist - helen keller adult\n\n\nBiography | American Foundation for the Blind helen keller adult\n\nHelen Keller was an American educator, advocate for the blind and deaf and co- founder of the ACLU. Stricken by an illness at the age of 2, Keller was left blind.\n\nAfter Helen had graduated college, she decided that she wanted to help others. The news spread everywhere, she became a well-known celebrity. By sharing.\n\nHelen Adams Keller (June 27, – June 1, ) was an American author, political activist, .. This film, a semi-sequel to The Miracle Worker, recounts her college years and her early adult life. None of the early movies hint at the social.\n\nPortrait of Helen Keller as a young girl, with a white dog on her lap (August ) As she so often remarked as an adult, her life changed on March 3,", "pred_label": "__label__1", "pred_score_pos": 0.7639255523681641} {"content": "Summer appeal 2019\n\n\nSimulation training has raised the bar in surgical training, and Moorfields is leading the way in using simulation training for cataract surgery. With your help, the new simulator will help us advance our training programme further than ever.\n\nTechnology moves at a fast pace, so it is vital that we purchase a new surgical simulator machine which will allow Moorfields surgeons to perfect their skills and train the next generation of world-class eye surgeons, helping Moorfields Eye Hospital maintain the high standards of care for which we are known. \n\nThe surgical simulator will allow trainee surgeons to practice the incredible precision and coordination required to perform complex cataract surgery - ensuring patient safety and the success of future operations.\n\nThe latest, state-of-the-art surgical simulator gives trainee surgeons the chance to hone and perfect their surgical skills. This single machine will train hundreds of surgeons who will then go on to perform thousands of sight-saving operations, changing countless lives.\n\nDiagram of the new surgical simulator\n     The new surgical simulator we hope to buy, with your support, to help train and develop eye surgeons at Moorfields Eye Hospital.\n\nSo many of our patients at Moorfields will benefit from the training the new surgical simulator will provide. Because better surgeons mean more effective and safer operations.Photo of Judith Hilton\n\nJudith Hilton had two cataract operations in 2017:\n\nWhy did you require a cataract operation?\n\nI had begun to notice that some road signs weren’t\nso clear. I couldn’t see things quite as clearly in\nthe distance. Colours were muted.\n\nMy appointment with the consultant confirmed\nwhat I’d thought: I had cataracts.\n\nHow was the care you received?\n\n\nThey are very professional and highly organised.\n\nNo doubt about it, I felt in the safest of hands.\n\n\nHow has life changed since your operation?\n\nI can see so much better!\n\nI was amazed, following the surgery, how the world\nbecame so much more colourful. Also, I now feel\nconfident to drive at night, something that I had\nbeen avoiding for some time.\n\nWhy is it important to support Moorfields?\n\nI am a trained theatre nurse, so I am well aware of how\nessential it is to have up-to-date equipment, not only in\nsurgical theatres but for training too.\n\nAnyone who's been treated at Moorfields or has friends\nor family who have knows how important their work is.\n\nIt's gratifying top hear how we're able to change patients' lives - but we depend on the generosity of our supporters to ensure we can uphold our impeccable standards of training and care - George\n\nWhy your gift is so important\n\nFather and Daughter holding hands in the parkAt Moorfields, we rely on the generosity of supporters like you to help us continue to provide research, training and surgery that is world-class.\n\nWhatever you can give will go directly towards funding the £152,000 needed to purchase the next-generation surgical simulator. Your gift will help Moorfields to provide the best care possible for our patients.\n\nThank you so much for making a difference to our work.\n\nHaving good eyesight means having                 \nindependence and a better quality of life.         Donate\n\nThat is the gift you could give.", "pred_label": "__label__1", "pred_score_pos": 0.6834448575973511} {"content": "Advances in Applied Chemistry and Biochemistry\n\nISSN: 2652-3175\n\nOpinion Article\n\nEthnic Medicine and Ethnobotany Concept to Identify and Characterize New Polysaccharide-Based Drug from Arid and Semi-Arid Lands\n\nNoura Addoun1, Cédric Delattre2, Zakaria Boual1, Mohamed Didi Ould El Hadj1, Philippe Michaud2 and Guillaume Pierre2*\n\n1Université Ouargla, Laboratoire Protection des Ecosystèmes en Zones Arides et Semi-arides, 30000 Ouargla, Algeria\n\n2Université Clermont Auvergne, CNRS, SIGMA Clermont, Institut Pascal, F-63000 Clermont-Ferrand, France\n\nReceived Date: 19 December, 2018\n\nAccepted Date: 23 December, 2018\n\nPublished Date: 28 December, 2018\n\n\nAddoun N, Delattre C, Boual Z, El Hadj MDO, Michaud P, et al. (2018) Ethnic Medicine and Ethnobotany Concept to Identify and Characterize New Polysaccharide-Based Drug from Arid and Semi-Arid Lands. Adv Appl Chem Biochem 2018(1): 37-39.\n\nCorrespondence should be addressed to\n\nGuillaume Pierre, France\n\nDOI: 10.33513/ACBC/1801-05\n\nKeywords: Arid Lands; Ethnobotany; Plants; Polysaccharide\n\n\nPolysaccharides are highly variable and complex biomolecules whose inventory of structures is still very incomplete since nature still preserves unexplored biotopes. Plants are an integral part of the daily life of human being regardless of culture, time, or knowledge development of a country. Widely distributed throughout the world, natural medicine is an ancestral knowledge handed down for centuries from generation to generation by those commonly referred to as “nganga” healers, shamans, or traditional healers. Also called alternative medicine, traditional medicine or complementary medicine remains associated for millennia to myths, legends, rituals and beliefs. This paper gives an opinion regarding ethnobotanic approach associated to the structural variability of some polysaccharides, with the purpose to design the polysaccharide-based drugs of tomorrow. Traditional healers practice unconventional medicine based on approaches considered traditional in many communities, such as in Asia, India, Africa and South America. This medicinal practice is used to prevent or treat certain diseases or disorders but can also improves in some cases the quality of life, using the biodiversity of medicinal plants. It is therefore through an ethnobotanist approach that biomolecules (e.g.polysaccharides) of pharmaceutical interest can be discovered [1]. This approach involves the screening of medicinal plants that are known and recognized for their therapeutic effects (Figure 1). The second step is to identify the biological effects by performing tests on decoctions prepared from these plants. Once the identification is validated, specific extractions of active biomolecules are carried out in order to characterize and optimize their biological effectiveness. In the longer term, if the development of a new drug is considered, cytotoxicity and biocompatibility tests must be validated at the human cell level before clinical studies can be performed [2]. Consequently, the delay between the traditional practitioner and the placing on the market of a new active biomolecule is particularly long.\n\nFigure 1: Strategy for finding and developing new active polysaccharides from medicinal plants, adapted from Qazi Majak and Molvi Khurshid [2].\n\nDry lands, i.e., arid and semi-arid zones, possess specific climates, characterized by very low rainfall and extreme temperatures, which are at the origin of the emergence of a specific flora and fauna, sometimes endemic to this environment. As is often the case, this adaptation of organisms to a singular environment has been followed by the appearance of new biological functions and specific metabolites. Far from being devoid of plant life and despite its very mineral appearance, desert areas, such as Sahara, do not avoid this rule and the characterization of its flora has already allowed to identify many species described anywhere else. The inventory of this fragile biodiversity is partly motivated by the search for new active ingredients that can eventually become one way for the preservation of species in this environment. Indeed, many plants from arid and semi-arid environments are used by local populations in traditional medicine for their therapeutic properties.The change in lifestyle of these populations and the use of modern therapeutic practices are at the origin of the gradual disappearance of these uses and part of the ethnobotanical knowledge accumulated over the centuries. The identification of plant compounds at the origin of these practices is therefore of prime interest for the preservation of this flora and its possible exploitation. Applied to polysaccharides, this observation is particularly true in the context of plants from desert environments. Indeed, plants growing in hot and arid climates must cope with sometimes very long periods of dormancy and fight against lack of water. This adaptation endowed these plants with a certain number of physiological particularities allowing them to limit the loss of water and to accumulate storage substances. Polysaccharides play a leading role in this adaptation. These polymers are for the most part hydrophilic because of their numerous hydroxyl functions. This strong affinity for water gives them the status of hydrocolloids with thickening, gelling or stabilizing properties. The physiological roles of these polysaccharides are to maintain the structure of plant tissues or store carbon substrates.These two biological functions have long been the only ones attributed to polysaccharides. However, it is now accepted that these biopolymers can also carry biological activities and be strongly involved in certain cell signaling pathways.The inventory of existing structures is still very incomplete, and its exploration is often associated with the identification of novel polysaccharides carriers of biological activities and therefore to understanding structure-function relationships, in particular to explain the uses of certain plants traditional medicine. Overall, this scientific philosophy aims to explore the potential of arid and semi-arid plants as a source of polysaccharides with original structures and, secondly, to correlate these structures with biological activities and technofunctional properties potentially recoverable. It is important to remember that the study of plant polysaccharides goes first and foremost by the awareness of the great structural variability partly related to their numerous biological functions. Most often separated into three categories, there are (i) storage polysaccharides (starch, galactomannan) (ii) structural polysaccharides (celluloses, hemicelluloses, pectins) and (iii) exudates, gums or mucilages (gum arabic). Note that the difference between gums and mucilage still remains ambiguous since the former are rather sticky and come from the area of trees, while the latter are viscous hydrocolloids from seeds or soft tissues [3]. Polysaccharides constituting the mucilage are often polar and hydrophilic with very high molecular weight and are also highly branched and composed of different monosaccharides [4]. The physiological role of mucilage is not negligible since it allows the plant to absorb and store significant amounts of water. If necessary, the gradual release of water to other tissues is possible in times of drought. Conversely, in the presence of excessive amounts of water, swelling of the mucilage can lead to tissue breakdown. Finally, polysaccharides from higher plants have structural variability and a wealth of unique physicochemical properties. Herbs and officinal plants, often containing polysaccharides, are widely used for the treatment of diseases in traditional and modern medicine (ethnobotany and ethnic medicine). The originality of studying their polysaccharides often goes through their endemism and ability to secrete mucilage through specialized cells [5]. For several years, looking for new sources of plant polysaccharides, if possible with analog structures to glycosaminoglycans, has attracted much attention. In all cases, the work involves (i) identifying and/or collecting and/or cultivating original sources (ii) developing the conditions for extraction and purification of the polysaccharides produced, (iii) characterizing the polysaccharide structure(s) (i.e., composition in monosaccharides, glycosidic bonds, analysis of the substituents, ...), and finally (iv) identifying their physicochemical properties in solution (rheological studies) as well as some of their biological properties (anti-inflammatory, anti-oxidant, anti-microbial, anti-coagulant, anti-parasitic, prebiotic, ...). Today, paying more attention for better understanding the so-called structure/function relationships by exploiting the data already available for existing molecules seems to be essential. The resolution of complex structures of polysaccharides is one of the current locks concerning their uses and valuations. Apprehending the roles of these polymers is probably one of the challenges of the coming decades. A better structural overview would make it possible to highlight new possibilities of applications but also to address more fundamental problems such as the role of certain glycoside units, constituents or specific sequences on very varied functional activities (mechanistic approach). Taking inspiration from Nature and making your own polymers (glycosaminoglycan mimetics) by enzymatic and/or chemical modifications seems to be a “first class” front of sciences. This global strategy is applied in our laboratory (Institut Pascal, Université Clermont-Auvergne) in the PHC TASSILI program of EGIDE (15MDU933) and Campus France (33195UK).\n\nConflicts of Interest\n\nAll authors declare no conflicts of interest in this article.\n\n\n 1. Cox P, Balick M (1994) The ethnobotanical approach to drug discovery. Sci Am 270: 82-87.\n 2. Qazi Majaz A, Molvi Khurshid I (2016) Herbal Medicine: A Comprehensive Review. Int J Pharm Res 8: 1-5.\n 3. Voragen AGJ, Pilnik W, Thibault JF, Axelos MAV, Renard CMGC (1995) Pectins. In: Stephen AM (ed.). Food polysaccharides and their applications. Marcel Dekker, New York, USA. Pg no: 287-339.\n 4. Petera B, Delattre C, Pierre G, Wadouachi A, Elboutachfaiti R, et al. (2015) Characterization of arabinogalactan-rich mucilage from Cereus triangularis cladodes. Carbohydr Polym 127: 372-380.\n 5. Benaoun F, Delattre C, Boual Z, Ursu AV, Vial C, et al. (2017) Structural characterization and rheological behavior of a heteroxylan extracted from Plantago notata Lagasca (Plantaginaceae) seeds. Carbohydr Polym 175: 96-104.\nOcimum Scientific Publishers\n\n\nCopyright © 2019 - All Rights Reserved -", "pred_label": "__label__1", "pred_score_pos": 0.8921080827713013} {"content": "Top 7 Prophets in the World And most Worshiped Religion\n\nreligions in the world\n\nList of 7 Prophets in the World And most Worshiped Religion, this listing is not a comprehensive list of all religions, only the “major” ones.  There are distinct religions other than the ones listed above. But this list accounts for the religions of over 98% of the world’s population.\n\nJesus of Nazareth or Jesus Christ\n\n\nJesus, also referred to as Jesus of Nazareth or Jesus Christ, was a Jewish preacher and religious leader who became the central figure of Christianity. Christians believe him to be the Son of God and the awaited Messiah (Christ) prophesied in the Old Testament.\nJesus was a Galilean Jew who was baptized by John the Baptist and subsequently began his own ministry, preaching his message orally and often being referred to as “rabbi”. He was arrested and tried by the Jewish religious authorities, and turned over to the Roman government, and was subsequently crucified on the order of Pontius Pilate, the Roman prefect.\n\nJesus debated fellow Jews on how to best follow God, performed healings, taught in parables and gathered followers. After his death, his followers believed he rose from the dead, and the community they formed eventually became the Christian Church.\nHis birth is celebrated annually on December 25 as a holiday known as Christmas, his crucifixion is honored on Good Friday, and his resurrection is celebrated on Easter.\nChristian doctrines include the beliefs that Jesus was conceived by the Holy Spirit, was born of a virgin named Mary, performed miracles, founded the Church, died by crucifixion as a sacrifice to achieve atonement, rose from the dead, and ascended into Heaven, whence he will return. Most Christians believe Jesus enables humans to be reconciled to God.\n\n\nChristianity is an Abrahamic monotheistic religion based on the life and teachings of Jesus Christ, who serves as the focal point of the Christian faith. It is the world’s largest religion, with over 2.4 billion followers, or 33% of the global population, known as Christians. Christians make up a majority of the population in 158 countries and territories. They believe that Jesus is the Son of God and the savior of humanity whose coming as the Messiah (the Christ) was prophesied in the Old Testament.\n\n\n\n\nMuhammad is the prophet and founder of Islam. According to Islamic doctrine, he was God’s Messenger, sent to confirm the essential teachings of monotheism preached previously by Adam, Abraham, Moses, Jesus, and other prophets. He is viewed as the final prophet of God in all the main branches of Islam, though some modern denominations diverge from this belief. Muhammad united Arabia into a single Muslim polity and ensured that his teachings, practices, and the Quran formed the basis of Islamic religious belief.\n\nBorn approximately 570 CE (Year of the Elephant) in the Arabian city of Mecca, Muhammad was orphaned at an early age; he was raised under the care of his paternal uncle Abu Talib. Periodically, he would seclude himself in a mountain cave named Hira for several nights of prayer; later, at age 40, he reported being visited by Gabriel in the cave, where he stated he received his first revelation from God. Three years later, in 610, Muhammad started preaching these revelations publicly, proclaiming that “God is One”, that complete “surrender” to him is the right course of action, and that he was a prophet and messenger of God, similar to the other prophets in Islam.\n\nMuhammad gained few early followers, and met hostility from some Meccans. To escape persecution, Muhammad sent some followers to Abyssinia before he and his followers migrated from Mecca to Medina (then known as Yathrib) in the year 622. This event, the Hijra, marks the beginning of the Islamic calendar, also known as the Hijri Calendar. In Medina, Muhammad united the tribes under the Constitution of Medina. In December 629, after eight years of intermittent conflict with Meccan tribes, Muhammad gathered an army of 10,000 Muslim converts and marched on the city of Mecca. The attack went largely uncontested and Muhammad seized the city with little bloodshed. In 632, a few months after returning from the Farewell Pilgrimage, he fell ill and died. Before his death, most of the Arabian Peninsula had converted to Islam.\n\nThe revelations (each known as Ayah, lit. “Sign [of God]”), which Muhammad reported receiving until his death, form the verses of the Quran, regarded by Muslims as the “Word of God” and around which the religion is based. Besides the Quran, Muhammad’s teachings and practices (sunnah), found in the Hadith and sira literature, are also upheld by Muslims and used as sources of Islamic law. The name Muhammad means “praiseworthy” and appears four times in the Quran.\n\n\nIslam is an Abrahamic monotheistic religion which professes that there is only one and incomparable God (Allah) and that Muhammad is the last messenger of God. It is the world’s second-largest religion and the fastest-growing major religion in the world, with over 1.8 billion followers or 24.1% of the global population, known as Muslims. Muslims make up a majority of the population in 49 countries. Islam teaches that God is merciful, all-powerful, unique, and has guided mankind through prophets, revealed scriptures and natural signs. The primary scriptures of Islam are the Quran, viewed by Muslims as the verbatim word of God, and the teachings and normative example of Muhammad.\n\n\n\n\nKrishna is the god of compassion, tenderness, and love in Hinduism. He is one of the most widely revered and popular Indian divinities worshipped as the eighth incarnation of the Hindu god Vishnu and also as the supreme God in his own right. Krishna’s birthday is celebrated every year by Hindus on Janmashtami according to the lunisolar Hindu calendar, which falls in late August or early September of the Gregorian calendar.\nKrishna is also known by numerous names, such as Govinda, Mukunda, Madhusudhana, Vasudeva, and Makhan chor in affection. The anecdotes and narratives of Krishna’s life are generally titled as Krishna Leela.\n\nHe is a central character in the Mahabharata, Bhagavata Purana and the Bhagavad Gita, and is mentioned in many Hindu philosophical, theological, and mythological texts. They portray him in various perspectives: a god-child, a prankster, a model lover, a divine hero, and as the supreme power. His iconography reflects these legends, and show him in different stages of his life, such as an infant eating butter, a young boy playing a flute, a young man with Radha or surrounded by women devotees, or a friendly charioteer giving counsel to Arjuna.\nSince the 1960s the worship of Krishna has also spread to the Western world and to Africa, largely due to the work of the International Society for Krishna Consciousness (ISKCON).\nhe name “Krishna” originates from the Sanskrit word Kṛṣṇa, which is primarily an adjective meaning “black”, “dark”, or “dark blue”.\n\n\nHinduism is a religion, or a way of life, widely practiced in the Indian subcontinent. Hinduism has been called the oldest religion in the world, and some practitioners and scholars refer to it as Sanātana Dharma, “the eternal tradition,” or the “eternal way,” beyond human history. Scholars regard Hinduism as a fusion or synthesis of various Indian cultures and traditions, with diverse roots and no founder. This “Hindu synthesis” started to develop between 500 BCE and 300 CE following the Vedic period (1500 BCE to 500 BCE).\n\nHinduism is the world’s third largest religion, with over one billion followers or 15% of the global population, known as Hindus. Hindus form the majority of the population in India, Nepal, Mauritius and the island of Bali in Indonesia. Significant Hindu communities are also found in many other countries.\n\n\n\n\n\n\n\nScholars are hesitant to make unqualified claims about the historical facts of the Buddha’s life. Most accept that he lived, taught and founded a monastic order during the Mahajanapada era during the reign of Bimbisara (c. 558 – c. 491 BCE, or c. 400 BCE), the ruler of the Magadha empire, and died during the early years of the reign of Ajatasatru, who was the successor of Bimbisara, thus making him a younger contemporary of Mahavira, the Jain tirthankara.\n\n\nBuddhism and dharma that encompasses a variety of traditions, beliefs and spiritual practices largely based on teachings attributed to the Buddha. Buddhism originated in Ancient India sometime between the 6th and 4th centuries BCE, from where it spread through much of Asia, whereafter it declined in India during the middle Ages. Two major extant branches of Buddhism are generally recognized by scholars: Theravada (Pali: “The School of the Elders”) and Mahayana (Sanskrit: “The Great Vehicle”). Buddhism is the world’s fourth-largest religion, with over 500 million followers or 7% of the global population, known as Buddhists.\n\nBuddhist schools vary on the exact nature of the path to liberation, the importance and canonicity of various teachings and scriptures, and especially their respective practices. Practices of Buddhism include taking refuge in the Buddha, the Dharma and the Sangha, study of scriptures, observance of moral precepts, renunciation of craving and attachment, the practice of meditation (including calm and insight), the cultivation of wisdom, loving-kindness and compassion, the Mahayana practice of bodhicitta and the Vajrayana practices of generation stage and completion stage.\n\n\n\n\nGuru Nanak ((1469 – 1539) was the founder of Sikhism and the first of the ten Sikh Gurus. His birth is celebrated world-wide as Guru Nanak Gurpurab on Kartik Pooranmashi, the full-moon day in the month of Katak, October–November.\n\nGuru Nanak has been called “one of the greatest religious innovators of all time”. He travelled far and wide teaching people the message of one God who dwells in every one of His creations and constitutes the eternal Truth. He set up a unique spiritual, social, and political platform based on equality, fraternal love, goodness, and virtue.\n\nGuru Nanak’s words are registered in the form of 974 poetic hymns in the holy text of Sikhism, the Guru Granth Sahib, with some of the major prayers being the Japji Sahib, the Asa di Var and the Sidh-Ghost. It is part of Sikh religious belief that the spirit of Guru Nanak’s sanctity, divinity and religious authority descended upon each of the nine subsequent Gurus when the Guruship was devolved on to them.\n\nAccording to Sikh traditions, the birth and early years of Guru Nanak’s life were marked with many events that demonstrated that Nanak had been marked by divine grace. Commentaries on his life give details of his blossoming awareness from a young age. At the age of five, Nanak is said to have voiced interest in divine subjects.\nNanak was a Guru (teacher), and founded Sikhism during the 15th century. The fundamental beliefs of Sikhism, articulated in the sacred scripture Guru Granth Sahib, include faith and meditation on the name of the one creator, unity of all humankind, engaging in selfless service, striving for social justice for the benefit and prosperity of all, and honest conduct and livelihood while living a householder’s life.\n\nThe Guru Granth Sahib is worshipped as the Supreme Authority of Sikhism and is considered the eleventh and final guru of Sikhism. As the first guru of Sikhism, Guru Nanak contributed a total of 974 hymns to the book.\n\n\nSikhism from Sikh, meaning a “disciple”, or a “learner”), is a monotheistic/panentheistic religion that originated in the Punjab region of the Indian subcontinent about the end of the 15th century. It is one of the youngest of the major world religions. The fundamental beliefs of Sikhism, articulated in the sacred scripture Guru Granth Sahib, include faith and meditation on the name of the one creator, unity of all humankind, engaging in selfless service, striving for social justice for the benefit and prosperity of all, and honest conduct and livelihood while living a householder’s life.\n\nSikhism is based on the spiritual teachings of Guru Nanak, the first Guru, and the ten successive Sikh gurus. Sikhism is a relatively recent religion that evolved in times of religious persecution. Two of the Sikh gurus – Guru Arjan and Guru Tegh Bahadur, after they refused to convert to Islam, were tortured and executed by the Mughal rulers. The persecution of Sikhs triggered the founding of the Khalsa, as an order to protect the freedom of conscience and religion, with qualities of a “Sant-Sipāhī” – a saint-soldier. Sikhism has 25-28 million adherents worldwide and is the ninth-largest religion in the world.\n\n\n\n\nMoses in both the Septuagint and the New Testament) is a prophet in the Abrahamic religions. According to the Hebrew Bible, he was a former Egyptian prince who later in life became religious leader of Israelites and lawgiver, to whom the authorship of the Torah or acquisition of the Torah from Heaven is traditionally attributed. Also called Moshe Rabbenu in Hebrew, lit. “Moses our Teacher”), he is the most important prophet in Judaism. He is also an important prophet in Christianity, Islam, the Bahá’í Faith, and a number of other Abrahamic religions.\n\nAccording to the Book of Exodus, Moses was born in a time when his people, the Israelites, an enslaved minority, were increasing in numbers and the Egyptian Pharaoh was worried that they might ally themselves with Egypt’s enemies. Moses’ Hebrew mother, Jochebed, secretly hid him when the Pharaoh ordered all newborn Hebrew boys to be killed in order to reduce the population of the Israelites.\n\nThrough the Pharaoh’s daughter (identified as Queen Bithia in the Midrash), the child was adopted as a foundling from the Nile river and grew up with the Egyptian royal family. After killing an Egyptian slavemaster (because the slavemaster was smiting a Hebrew to death), Moses fled across the Red Sea to Midian, where he encountered The Angel of the Lord, speaking to him from within a burning bush on Mount Horeb (which he regarded as the Mountain of God).\n\nGod sent Moses back to Egypt to demand the release of the Israelites from slavery. Moses said that he could not speak with assurance or eloquence, so God allowed Aaron, his brother, to become his spokesperson. After the Ten Plagues, Moses led the Exodus of the Israelites out of Egypt and across the Red Sea, after which they based themselves at Mount Sinai, where Moses received the Ten Commandments. After 40 years of wandering in the desert, Moses died within sight of the Promised Land on Mount Nebo.\n\nScholarly consensus sees Moses as a legendary figure and not a historical person. Rabbinical Judaism calculated a lifespan of Moses corresponding to 1391–1271 BCE; Jerome gives 1592 BCE, and James Ussher 1571 BCE as his birth year.\n\n\nJudaism (from Latin: Iudaismus, derived from Greek Ἰουδαϊσμός, originally from Hebrew יהודה‎, Yehudah, “Judah”; in Hebrew: יהדות‎, Yahadut, the distinctive characteristics of the Judean ethnos) is an ancient monotheistic Abrahamic religion, with the Torah as its foundational text (part of the larger text known as the Tanakh or the Hebrew Bible), and supplemental oral tradition represented by later texts such as the Midrash and the Talmud. It encompasses the religion, philosophy, culture and way of life of the Jewish people.\n\nJudaism is considered by religious Jews to be the expression of the covenantal relationship that God established with the Children of Israel. With between 14.5 and 17.4 million adherents worldwide, Judaism is the tenth-largest religion in the world.\nThe history of Judaism spans more than 3,000 years. Judaism has its roots as a structured religion in the Middle East during the Bronze Age.\n\nJudaism is considered one of the oldest monotheistic religions. The Hebrews and Israelites were already referred to as “Jews” in later books of the Tanakh such as the Book of Esther, with the term Jews replacing the title “Children of Israel”. Judaism’s texts, traditions and values strongly influenced later Abrahamic religions, including Christianity, Islam and the Baha’i Faith.\n\n\n\n\nBahá’u’lláh ( “Glory of God”;born 12 November 1817 – 29 May 1892) was the founder of the Bahá’í Faith. He claimed to be the prophetic fulfilment of Bábism, a 19th-century outgrowth of Shaykhism, and, in a broader sense to be a Manifestation of God. He also claimed he was the fulfillment of the eschatological expectations of Islam, Christianity, and other major religions.\n\nBahá’u’lláh became a follower of the Báb in Persia in 1845. Three years after the Báb was executed, he was exiled to Baghdad (then a part of the Ottoman Empire), where in 1863 he proclaimed the Bahá’í Faith when he declared himself He whom God shall make manifest, a messianic figure in the religion of Bábism. Bahá’u’lláh based this announcement on an experience he had where he is said to have had a vision of the Maid of Heaven while imprisoned in the Síyáh-Chál in Tehran, Persia. He would be further exiled to Edirne and ultimately to the prison city of Acre, Palestine (present-day Israel), where he died. He wrote many religious works, most notably the Kitáb-i-Aqdas, the Kitáb-i-Íqán and Hidden Words.\nBahá’u’lláh’s teachings focus on the unity of God, religion, and mankind. Similar to other monotheistic religions, God is considered the source of all created things. Religion, according to Bahá’u’lláh, is renewed periodically by Manifestations of God, people who are made perfect through divine intervention and whose teachings are the sources of the major world religions throughout history. Unlike other divine messengers, Bahá’ís view Bahá’u’lláh as the first whose mission includes the spiritual unification of the entire planet through the eventual eradication of racism and nationalism. Bahá’u’lláh’s teachings include the need for a world tribunal to adjudicate disputes between nations, a uniform system of weights and measures, and an auxiliary language that could be spoken by all the people on earth. Bahá’u’lláh also taught that the cycles of revelatory renewal will continue in the future, with Manifestations of God appearing about every thousand years.\n\n\nThe Bahá’í Faith is a religion teaching the essential worth of all religions, and the unity and equality of all people. Established by Bahá’u’lláh in 1863, it initially grew in the Middle East and now has between 5-7 million adherents, known as Bahá’ís, spread out into most of the world’s countries and territories, with the highest concentrations in India and Iran.\nThe religion was born in Iran, where it has faced ongoing persecutions since its inception. It grew from the mid-19th century Bábí religion, whose founder reinterpreted Shia Islam and said that God would soon send a prophet in the manner of Jesus or Muhammad.\n\n\n I have joined your rss feed and look forward to seeking more\n\n • This is an amazing write up with an excellent topic. Youth of today has no deep information about their religion and the motivators behind. This kind of article is very much needed in such times.\n\nLeave a Reply\n\n%d bloggers like this:", "pred_label": "__label__1", "pred_score_pos": 0.8576393127441406} {"content": "Rebirth of Brand\nMyth of Politics\n\nThe use of Cultural Archetypes and Symbols in Branding\n\nWritten by\nSandy Dunlop\n\nThe iconic American agency Leo Burnett built on and added to the paradigm of red rhetoric. They too shared Kenneth Burke’s belief that the way we understand social reality is through the meaning we all attach to our environment. We share a mutual understanding of the values and meaning of common myth and story systems.\n\nThese can be identified as the universally shared symbols and archetypes of the culture. Leo Burnett was the Agency renowned for successfully delivering this red rhetoric approach. His acknowledged mentor was Theodore MacManus, star copywriter for General Motors, who believed that advertising’s best aim is not to convince but rather to suggest.  \n\nMacManus believed in advertising by atmosphere and suggestion, and his aim was to build a durable image of reliable quality, based on his consistent messaging.\n\nIn the same ‘red rhetoric’ tradition, the Leo Burnett Agency, particularly their copywriter De Witt (Jack) O’Keeffe, used non-verbal archetypes and symbols, which were often taken from American folklore and history. They believed these were able to penetrate people’s minds by refreshing and building relevant associations with (cultural) meaning systems.  \n\nThe result was a series of iconic campaigns. The Jolly Green Giant (Paul Bunyan) was used for the Minnesota Valley Canning Company. The Marlboro cigarette was built on cowboy mythology. The Pillsbury Doughboy was created for Pillsbury products, and Tony the Tiger for Kellogg’s Frosted Flakes.\n\nLeo Burnett Iconic Brands\n\nThese are some of the more notable of the great iconic campaigns of this era. They have each taken their place in cultural folklore.\n\nThese commercials are about identity building. For the office worker in a vast bureaucracy, feeling emasculated by his boss and the system, Marlboro was far more than a good smoke. “This is not a cigarette, it gives me back my mojo”.\n\nIt drew on the cowboy genre, which was hugely popular in the ’50s, ’60s and ’70s. It was estimated that 16 hours per week of prime time in the ’60s was filled with cowboy films. Marlboro was appropriating the most familiar genre of popular culture to create the longing for the strongman and deliver on it.\n\nWhat Leo Burnett clearly recognised is that it is not just the utility of the product that mattered but its symbolic meaning.\n\nThis lightning flash is to honour one of the ‘great red rhetoric’ agencies in advertising history, Leo Burnett. Their advertising created an atmosphere or a world by drawing on cultural archetypes.\n\nIn Thunder 4 we spell out the difference between the ‘blue’ and ‘red’ schools. Here are the big names of each. This battle has raged on for the 20th century. It hasn’t stopped yet.\n\nGreat Brand Thinkers\n\nSo knowing all this... Where is the advertising world in the 21st century? What is the effect of the digital phenomenon and the apparent domination of technology and big data? What is the effect of clients having to pay for ’creativity’ because agencies no longer have the 15%/17% commission on media buying to find great creatives? What is the effect of persuasion based ad testing being so ubiquitous?\n\nWhat is the effect of big technology consulting companies buying up creative houses from around the world? How will the cultures merge?  \n\nTo explain what has happened in the language of myth, a corporate culture that is more Apollo - ordered, rigid, structured, has taken over businesses that are more naturally Dionysian – free-flowing, spontaneous, joyful, bordering on (creative) madness.\n\nApollo and Dionysos and Brands\n\nMythologically speaking, they are both important gods, but each can only operate properly in the absence of the other.\n\nEither way, this is still a call for a Rebirth of Brand – we still long for great work.  \n\nNovember 27, 2019\nNovember 27, 2019\n\n\nSimilar Posts", "pred_label": "__label__1", "pred_score_pos": 0.5752314329147339} {"content": "Justice in the Twenty-First Century\n\nOp-ed in Aspenia 66 \"Falchi, colombe e gufi,\" Aspen Institute Italia, www.aspeninstitute.it.\n\nOctober 1, 2014\n\nThe author gratefully acknowledges support for his inequality work from the ERANDA Foundation, but the views expressed here are solely his own.\n\nThe response to Thomas Piketty's Capital in the Twenty-First Century has been truly phenomenal, both in popular discourse and in academic debate. It is perhaps unsurprising that provocative efforts to push the boundaries of economic knowledge forward are met with academic interest. Piketty's central thesis that capitalism has a natural tendency to generate massive inequalities in wealth ownership when economic growth falls significantly below the rate of return to capital challenges many widely held beliefs in the economics profession such as the reliance on representative agent models in macroeconomics, the stability of competitive market mechanisms, or the conventional wisdom about the degree of substitutability between capital and labor in aggregate production.\n\nHowever, the huge popular interest in Piketty's book also reflects a growing sense of injustice in the face of contrasting fortunes of a small elite and the majority of citizens. This is particularly so in the United States, where, as Piketty shows, the gap between the top and the rest has grown larger than in any other developed economy.\n\nPiketty's own work suggests that these concerns over fairness in the popular discourse are at least partly justified. He shows, for example, that the \"supermanagers\" at the apex of the income distribution in English-speaking countries are rapidly increasing their incomes relative to the rest of the population, including those with similar educational attainment, and relative to their counterparts in continental Europe and Japan. There is, however, no corresponding improvement in their performance observable in aggregate productivity data.\n\nOne may quibble with Piketty's preferred explanation, which blames the reduction in top income tax rates for increasing incentives to engage in rent-seeking activity on the part of senior managers of large firms. But the striking cross-country differences suggest that there is something distinctive and unsavory about the path Anglo-Saxon capitalism has taken over the past thirty years. We cannot discuss and assess the determinants of top incomes or wealth, their social value, nor the remedies of injustice with the summit of the distribution shrouded in mist. The data gathered by Piketty and his colleagues therefore represent an enormous contribution to social science and to democratic debate.\n\nPiketty's data offer us a better view upwards in the distribution of resources, but in our anger at the sight of plutocrats continuing to increase their share of the economic pie, largely unscathed by the Great Recession, we should not forget that justice also demands attention to the other end. Indeed, the liberal egalitarian tradition, to which I think Piketty would subscribe, pays particular attention to the conditions of the least advantaged members of society. An important purpose of progressive taxation is to finance social programs aimed at improving the lot of those at the bottom not just to prevent the rich from getting too far ahead of the middle class.\n\nMeasuring a concept as morally charged as inequality is clearly a challenge and no statistical measure can fully capture society's normative attitude towards the distribution of resources. The top of the distribution is where much of the action has been over the past few decades but the share of income or wealth going to the top 1 or 10 percent obviously tells us little about the position of the least advantaged. For example, the relationship between top income shares and poverty rates across advanced countries is positive but very weak. Moreover, top income or wealth shares are unsuitable for analyzing some of the most important questions of justice such as material deprivation that is attributable to past and present discrimination.\n\nTo be fair to Piketty he is well aware of the pitfalls of trying to summarize inequality in a single measure. He notes that \"social reality and economic and political significance of inequality are very different at different levels of the distribution, and it is important to analyze these separately\" (page 266). My comment is meant only as a point of emphasis to those who expect to find in Piketty's book an exhaustive account of inequality. They will not.\n\nFor example, from a liberal egalitarian perspective, the improvement in the wealth distribution in the twentieth century that Piketty documents looks less impressive than suggested by the significant decline in top wealth shares because all of the redistribution occurred above the median. Wealth ownership of the bottom 50 percent is today as minuscule as it always has been. There is no denying that the rise of the patrimonial middle class had profound political and social implications for the developed economies, but it does not follow that it has made them significantly more just.\n\nIn the same vein, Piketty's proposed remedy to deal with rising top wealth shares, a global tax on capital or net assets, redistributes wealth primarily among existing wealth owners. It alleviates the tax burden of (mostly middle class) mortgagors, who currently pay property tax based on the gross value of the property rather than the value net of mortgage debt and increases the burden on the truly wealthy whose portfolios are composed primarily of financial and business assets that currently avoid tax. Unless the tax is designed to raise substantial revenue little benefit would extend to those in the bottom half of the distribution.\n\nAnother point of fairness worth emphasizing relates to the distinction between wealth that results from accumulation of lifetime savings and wealth that is inherited. A popular approach to the distribution of resources says that it should be sensitive to people's choices but insensitive to their circumstances or endowments that are a result of luck rather than choice. Inequality in wealth accumulated from savings and investments is partly influenced by the distribution of income from which people can save. But it also to a considerable degree reflects people's choices between saving and consumption, and between risky and safe investments. Provided such choices are well-informed it is fair that people should face the consequences. Inequality in wealth from savings is therefore much less morally problematic than inequality in inherited wealth, which is an example par excellence of differences in arbitrary circumstances and material endowments.\n\nTo my mind the most shocking analysis in Piketty's book concerns the growing importance of inherited wealth. He shows that among recently born cohorts in France around one in eight individuals can expect to receive in inheritance at least the equivalent of the lifetime labor income received by the bottom 50 percent of labor earners. This is higher than at any time in history and is a direct consequence of the redistribution of wealth above the median. More individuals are now in the position of heirs of sizable fortunes that add to their lifetime resources more than the average person in the bottom half can expect to earn in a lifetime. The wealth redistribution among the relatively well-to-do is making a remedy of this injustice more difficult because a growing share of the electorate stands to benefit from low inheritance taxes.\n\nCapital in the Twenty-First Century breaks new ground in analyzing what is undoubtedly an important component of inequality and distributive justice, the increasing concentration of income and wealth at the top. But building a more just society in the twenty-first century will also require increased attention to those at the bottom.\n\nA key priority should be the reduction of inequality in human capital by supporting the educational attainment of children from poor households. Mounting evidence on the importance of early childhood development should refocus public investment towards preschool education, support and training for parents, and nutritional assistance. At the secondary level the challenge is to balance the benefits of vocational education and apprenticeship programs in providing effective transition to the labor market with the costs of early and rigid selection of students by ability into different tracks, which tends to reproduce education differentials by socioeconomic group. Most countries, but particularly those with university fees, can do more to encourage students from poorer households to pursue tertiary education through student grants.\n\nMore can also be done to help vulnerable adults. Income support for low-wage workers, such as the Earned Income Tax Credit in the United States, is an effective way of reducing working poverty. It is particularly effective when combined with a minimum wage, which prevents the subsidy on low wage labor from being captured by employers. Regional disparities in unemployment can be tackled with policies to aid geographic mobility such as grants, migration zones, and support for rented housing. Tax incentives and affirmative action policies can be deployed to encourage employment of disabled people and other disadvantaged minorities, such as the Romas in Europe.\n\nEven if Piketty's tax utopia were to become reality there is no question that it is the middle class who will continue to constitute the bulk of the tax base called upon to finance such policies. Making sure that the rich contribute their fair share is important. But the real political challenge in the twenty-first century will be to maintain support for the idea that the burden of achieving justice has to be shouldered by all.", "pred_label": "__label__1", "pred_score_pos": 0.9655733108520508} {"content": "17 Surprising Ways to Cultivate Happiness as a Habit\n\n\nCultivate Happiness as a Habit\n\nHow would you like to make happiness a daily habit instead of letting it be a product of chance?\n\nFor many of us, happiness is a result of some external circumstance, but it doesn’t have to be. The 17 methods listed below will put the power back in your hands. They will give you the means to choose happiness when and where you want. The best part is that all of them are validated by the expertise of psychologists, neuroscientists or experts in the field of developing the human potential. Every single method has been tried, tested and proven to produce the results you are looking for.\n\n17 Surprising Ways to Cultivate Happiness as a Habit\n\nSo, are you ready to cultivate joy into your everyday life and turn happiness into a habit?\n\nHere are 17 surprising ways you too can cultivate happiness as a habit live the life you’ve always wanted to live: a happy and peaceful one.\n\n1. Set preemptive strikes\n\nPreemptive strikes are clear plans on when and where you will execute a certain action. Studies have shown that when a person sets a preemptive strike in preparation for the desired action, they are more likely to take the action.\n\nA group of elderly patients in Scotland that used preemptive strikes while recovering from hip or knee surgery began walking twice as fast as patients that did not.\n\nWhatever actions bring you joy and drive your life forward, create clear plans with very specific instructions to your brain on when and where you intend to engage in those actions.\n\nSet preemptive strikes for all the habits you want to ingrain in your life and you will accelerate your goals faster than you ever thought possible.\n\n2. Cultivate happiness as a habit by welcoming fear\n\nFear is not your enemy. As long as you keep growing and taking steps outside your comfort zone, it is only natural to experience fear.\n\nIn my 28 years, I have spent 7 months in a war zone with the US Marines, climbed mountains in the Himalayas, scuba dived into underwater caves, jumped out of airplanes, quit a well-paying full-time job to spend $15,000 skiing across the second largest icecap in the world, and started two companies. The one common element in all those experiences was fear.\n\n\nAnd why is courage important?\n\nBecause as C.S. Lewis once said\n\n\nThe more you welcome fear, the more you build your muscle of courage and in turn find growth in all other virtues.\n\nDo things that scare you. Push yourself until the butterflies in your stomach go wild. Each step beyond your comfort zone will reveal to you the infinite possibilities that live on the other side of fear. You simply have to take the leap to experience them.\n\n3. Accept your negativity\n\nAll human beings are born with what psychologists call “the negativity bias.” It is an evolutionary construct that has kept us alive as a species. That is why we naturally focus on what we don’t have in life, not what we do. Accepting that we have a negativity bias normalizes those moments when we are negative.\n\nThe problem that most of us go through is not just being negative, it’s the judgment we have about ourselves for being that way. Many of us hold on to big sticks that we beat ourselves up with for not being perfect. But now that you know we are evolutionarily conditioned toward the negative, you can let go of that stick.\n\nThis is not to say that we are stuck in a negative space for the rest of our lives. Many of the methods mentioned below will help condition the negativity out of our brains, but this awareness helps normalize those moments when we find our minds wandering toward the negative.\n\n4. Appreciate everywhere\n\nI used to hate going into New York City. Crowded areas, tall buildings, busy streets, it all scared me. Probably a side effect from my experience in Iraq. But I found a way to love it.\n\nEvery time I go into the city, I practiced appreciating everything and everyone. I told myself things like “wow! It must have taken so much hard work to build these buildings,” or “I really appreciate all the people that planned out, organized and built these streets.”\n\nBy appreciating everything everywhere, I turned things I hated into things I enjoyed.\n\n5. Anchor in joy\n\nAnchoring an emotion allows you to experience it at will. To anchor in joy, look back into your past and recall a positive memory. Really feel the emotion of happiness and joy that you experienced during that event. While you are in that state, imagine a circle in front of you. What color is the circle? What size is it? Visualize all the details of the circle and then step into it. Let that circle be your circle of joy.\n\nYour brain will start to form a pathway in your brain that connects the circle to pleasure, so that any time you want, anywhere you want, all you have to do is picture the circle, step into it and you will create joy.\n\n6. Smile\n\nPsychologist Robert Zajonc and numerous other researchers since have proven that the act of smiling leads to the emotion of happiness. Smiling is then not just a side effect of happiness, it causes it as well. It has even been shown to reduce stress and depression. So the next time you are feeling the blues, just smile and force your mind to respond with happiness.\n\n7. Cultivate happiness by breathing properly\n\nTaking long, slow breaths calm down the nervous system and creates a physiological change in your body.\n\nIf you find yourself hijacked by fear, stress or anxiety, pause, breathe in for four seconds and out for four seconds. You will immediately find yourself shifting into a place of peace, comfort, and happiness. \n\n8. Daydream\n\nThe mind cannot distinguish between something that is vividly imagined and something that is real.\n\nIn their quest for mastery, Russian gymnasts have found that the optimal level of training was 25% physical and 75% mental. Most of their preparation time for the Olympics was devoted to daydreaming images of them performing their routine and winning the gold.\n\nFrom Russian gymnasts to Michael Phelps to personal development Guru’s like Jack Canfield, they all use the power of mental imagery to produce results in their lives.\n\nIf you want to be happier, just go into your mind and dream of the place that brings you joy. Plant that feeling into your body and take action in service of bridging the gap between the internal reality and the external one.\n\n9. Be still \n\nJack Canfield, the bestselling author of the Chicken Soup for the Soul series and the Success Principles, credits meditation to be the number one strategy responsible for his success.\n\nScience too validates its power:\n\nIn his research, neuroscientist Dr. Andrew Newberg scanned the brains of chanting Sikhs, meditating Buddhists and praying nuns. He found that they had an increase in activity in the areas of the brain associated with focus and awareness. These are the parts of the brain that give us the power to choose our destiny instead of being victimized by external circumstances.\n\nEvery day, for just 12 minutes, close your eyes, remove all distractions and sit in stillness. Breathe in and out slowly. Focus your mind on your breathing. Your breath acts like an anchor for your mind to come back to when it wanders. And it will, especially at first. But that’s okay. In time you will be able to sit in stillness with your mind.\n\nIn just eight weeks of practicing this meditation every day, Dr. Newberg found that a group of elderly participants in his study had noticeable changes in their brain activity and experienced an improvement in memory as well.\n\n10. Seek refuge\n\nAll of us have an innate need to be secure and comfortable. We want to know that the world is not going to fall apart around us. This is built in us right from the very first time our parents hold us in their arms.\n\nBut the world is not always a safe and secure place to be. Evolutionary constructs like the negativity bias only make it worse, because they have us create dangers even if no real ones exist.\n\nEver imagined the worst-case scenario to be much worse than it actually is? That’s the negativity bias in action.\nTo create a safe space for us to go back too, regardless of the state of the world around us, all we have to do is seek refuge in our minds.\n\nGo to a place where you feel secure. Say the words out loud “I find refuge in…” Sense the comfort and security from that refuge throughout your body.\n\nNeuroscientist Dr. Rick Hanson says “taking refuge pulls you away from reactivating situations and concerns, and then fills you with positive influences. As you rest increasingly in a background sense of refuge, neurons are quietly stitching a safety net for you.” \n\n11. Cultivate happiness as a habit by Eexercising\n\nRichard Branson attributes exercise to be the number one factor contributing to his productivity. And he runs a multibillion-dollar empire. Pushing your body to its limits and beyond increases confidence and improves the overall quality of life.\n\nJames Prochaska, a researcher at the University of Rhode Island says, “Exercise spills over. There’s something about it that makes other good habits easier.\n\nFor at least three days a week, do something that pushes you physically and you will experience greater joy in all areas of your life.\n\n12. Find happy people\n\n\nIf you want to be happier, start spending more time with happy people. Emotions are infectious. Dr. Oberman and Dr. Ramachandran have shown that networks in our brain associated with certain actions activate when we see others engaging in those actions, even if we are sitting still. Similarly, they are activated in response to the emotions of others as well. Psychologists refer to the neurons that create this phenomenon as “mirror neurons.”\n\nWhat that means is that the more time you spend around people who exemplify the life you want to lead, the easier it will be to create that life. Your body and mind will naturally begin to mirror the people you spend the most time with.\n\n13. Erase unhappy vocabulary\n\nTony Robbins says, “Simply by changing your habitual vocabulary – the words you consistently use to describe the emotions in your life – you can instantly change how you think, feel and how you live.”\n\nReplace words like depression from your vocabulary with words like joy and you will make happiness a regular habit.\n\n14. Cultivate happiness as a habit by labeling your emotions\n\nIn his research, neuroscientist Dr. Lieberman discovered that the act of assigning a label to an emotion reduces its impact. It lessens activity in the emotional parts of the brain and increases activity in the parts of the brain associated with focus and awareness.\n\nThe next time you find yourself in a disempowered state, assign a label to the emotion to separate yourself from the experience. This will allow you to be proactive about the emotions you choose as opposed to being at the effect of external circumstances and letting them dictate your emotions.\n\n15. Create new meanings to your experiences\n\nEvery experience in life has no inherent meaning to it. We assign meanings to our experiences and those meanings shape our quality of life.\n\nThe psychiatrist Victor Frankl found an empowering meaning to life even while imprisoned in a concentration camp during the Holocaust. In his bestselling book, Man’s Search for Meaning, he writes “Everything can be taken from a man but one thing: the last of human freedoms – to choose one’s attitude in any given set of circumstances, to choose one’s own way.”\n\nWe always get to choose the meaning we associate to an experience and the impact it has on us.\n\nIf you go through an experience that puts you in disempowered state, follow the previous step by labeling the emotion you experiencing and then ask yourself what else can you make it mean. If you struggle to come up with a new meaning, spend a few minutes in your circle of joy or travel into the future to your ideal lifestyle. From that place, then ask yourself, what else can I make this mean?\n\nYou will surprise yourself by what you come up with.\n\n16. Cultivate happiness by time traveling\n\nResearchers have found that every time you recall a memory, it changes. You are essentially recalling the last time you remembered that memory, not the memory itself. As such, whatever you are going through in the present moment of recall alters the structure of the memory.\n\nIn her work, cognitive psychologist Elizabeth Loftus has demonstrated that memories are easily distorted and it is surprisingly simple to even implant false memories.\n\nIf repeatedly practiced, you have the power to travel back in time and alter unhappy memories by creating new neurological pathways in your brain.\n\nPut yourself in a happy state by using some of the other methods mentioned in this post. Then recall the memory, but change the contents of it. Imagine that something else happened, something other than what actually happened. Keep doing this while anchored into a very positive state and in time you will literally change the memory into a happy one.\n\n17. Cultivate happiness as a habit by challenging yourself\n\nIn the bestselling book, Flow: The Psychology of Optimal Experience, after decades of research Mihaly Csikszentmihalyi found that what ultimately produces the most joy in people is the state of Flow. Of this state, he says, “the best moments usually occur when a person’s body or mind is stretched to its limits in a voluntary effort to accomplish something difficult and worthwhile.”\n\nIf you look back at your life today, what are the moments you treasure the most? Usually, that answer falls into one of two categories, a relationship or an accomplishment.\n\nFor me I am most proud of the time I served in the Marines, the mountains I have climbed, the businesses I have started and the one-month I spent dragging a 190-pound sled 350 miles across the second largest icecap in the world. All of those experiences involved pushing my mind and body to its limits.\n\nThe more you challenge yourself and do what you once thought was impossible, the greater levels of joy, freedom, and accomplishment you will experience in your life.\n\n\nHow often do you feel really happy? Do you think happiness is a goal? You can share your insights by joining the conversation in the comment section below  \n\nSharing is caring!\n\nFavoriteLoadingAdd to favorites\n\n\nAkshay Nanavati\n\nAs an adventurer, Marine Corps veteran, speaker and successful online entrepreneur, Akshay Nanavati has dedicated his life to exploring the limits of the human potential.To learn more about Akshay, visit www.existing2living.com\n\nread more", "pred_label": "__label__1", "pred_score_pos": 0.9462865591049194} {"content": "UQ Space | Launch\nThe University of Queensland's Rocket Team\narchive,category,category-launch,category-4,theme-burst,mkd-core-1.1,woocommerce-no-js,ajax_fade,page_not_loaded,,burst-ver-2.1, vertical_menu_with_scroll,smooth_scroll,woocommerce_installed,blog_installed,wpb-js-composer js-comp-ver-5.5.2,vc_responsive\n\n\nAfter weeks of rocket construction and anticipation of the upcoming launch on August 19th, there was an air of disappointment upon the cancellation of the launch due to a fire ban in the area. However, we were lucky enough for the fire ban to be...", "pred_label": "__label__1", "pred_score_pos": 0.8673725128173828} {"content": "Toward a description of the conformations of denatured states of proteins. Comparison of a random coil model with NMR measurements\n\nof 6\nRelated Documents\n  Toward a Description of the Conformations of Denatured States of Proteins. Comparisonof a Random Coil Model with NMR Measurements Klaus M. Fiebig, Harald Schwalbe, Matthias Buck, † Lorna J. Smith, andChristopher M. Dobson* Oxford Centre for Molecular Sciences, New Chemistry Laboratory, Uni V  ersity of Oxford, South Parks Road,Oxford OX1 3QT, U.K. Recei V  ed: September 18, 1995; In Final Form: December 11, 1995 X A strategy is proposed to describe the backbone conformations sampled in denatured states of proteins. Mainchain dihedral angle distributions are extracted from the protein data base and used to predict NMR parameterssuch as coupling constants and NOE intensities. A simple model in which each residue samples its  φ , ψ distribution noncooperatively has been found to reproduce many of the features of experimental NMR datafor hen egg-white lysozyme denatured in 8 M urea at low pH. This model provides a framework whichallows identification of residual structure inherent in experimental data of nonnative states of proteins. Theeffects of introducing local conformational cooperativity on NMR parameters are discussed and analyzed inlight of the experimental data for lysozyme. Introduction Over the past few years interest in characterizing denaturedstates of proteins has grown rapidly, particularly because of theirimportance in studies of protein folding and protein stability; 1 - 3 such states are also believed to play a role during transport of proteins across membranes and in intracellular protein turnover. 4 Nuclear magnetic resonance (NMR) techniques have beeninstrumental in the study of the structural properties of denaturedstates at a residue specific level. Studies using conventionalhomonuclear 2D methods are, however, hampered by the limitedchemical shift dispersion which leads to extreme overlap of theNMR resonances. 5 Despite this, in some cases at least partialresonance assignment has been possible using magnetizationtransfer techniques. 6,7 Insight has also come from hydrogenexchange studies 8 - 10 and 2D NMR structural characterizationsof smaller peptide fragments excised from the sequences of proteins. 11 - 17 The development of heteronuclear 3D NMRtechniques has, however, had a major impact enabling extensivesite-specific characterization of denatured states of proteins. 3,18 - 25 Near-complete resonance assignments can be obtained whichallow the extraction of conformational sensitive parameters suchas coupling constants, chemical shifts, and homonuclear (NOE)and heteronuclear relaxation data. For native states such NMRparameters are readily interpretable in terms of specific featuresof protein structures. 26 Interpretation of data derived fromdenatured states, however, is often more complex due to theconformational heterogeneity of these states. If the intercon-version between conformers is fast on the NMR time scale thenthe observed NMR parameters will be averaged; 27 even in thecase of highly disordered states, however, this does not lead tothe complete absence of NOE’s. 18,21,24,28 One strategy used toovercome the complexity of data analysis is to interpret chemicalshifts in terms of their deviation from so-called “random coil”chemical shifts measured experimentally in small unstructuredtetrapeptides. 26,29 - 31 Patterns of deviations from random coilchemical shifts are taken to be indicative of regions of residualstructure, which may be involved in preferential interactionswith neighboring residues. This strategy, however, does notprovide a detailed description of the conformations sampled inthese areas of residual structure.Here a different approach is pursued in which NMRparameters are predicted by explicitly modeling denatured stateconformations and their relative energies (populations). Weightsfor the sampling of conformational space could be defined bya number of methods but here are derived from main chaindihedral angle distributions extracted from the protein data base.Experimental NMR data for hen egg-white lysozyme denaturedin urea at low pH and for peptide fragments taken from thelysozyme sequence allow evaluation of these predictions andthe underlying models. We find significant agreement betweenexperimental and predicted NMR parameters for a model basedon the derived weights which does not assume any cooperativityin the structure. The model provides a powerful frameworkfor distinguishing random from nonrandom (residual) structurein proteins under denaturing conditions. Residual structureobserved experimentally in denatured lysozyme and its peptidefragments may be due to local changes in dihedral propensitieswhich may for instance arise from a change in the ionizationstate of the residue. Alternatively, residual structure may bedue to cooperative effects between residues. We put forward amodel which introduces cooperativity between sequentialresidues in the chain and evaluate its effects on predicted NMRparameters. Methods(a)  O , ψ  Distributions.  In recent years, a number of models 32 - 35 have utilized main chain  φ , ψ  dihedral distributionsextracted from the protein data bank 36,37 to describe localconformational preferences in the polypeptide chain. In thiscontext the term “local” refers to interactions between neighbor-ing residues in the sequence. Most of these models assumethat averaging over a large database of   φ , ψ  dihedral conforma-tions will eliminate specific nonlocal interactions present in eachof the individual protein structures. 38 Experimental support forthis assumption has been recently reported. 39,40 Figure 1demonstrates that  φ , ψ  populations differ significantly forindividual amino acid types which indicates that the latter exhibitspecific local conformational preferences. 41,42 The majority of these differences can be rationalized in terms of local andintraresidue steric or electrostatic interactions. For example, a † Present address: Department of Chemistry, Harvard University, 12Oxford Street, Cambridge, MA 02138.* To whom correspondence should be addressed. X Abstract published in  Ad  V  ance ACS Abstracts,  January 15, 1996. 2661  J. Phys. Chem.  1996,  100,  2661 - 26660022-3654/96/20100-2661$12.00/0 © 1996 American Chemical Society  comparison of the  φ , ψ  distributions for alanine and valine(Figure 1, A and B, respectively) shows a marked increase inthe population of the less sterically crowded    region for valine,reflecting its bulky    branched side chain. In addition, as Figure1C demonstrates, there is a significant population of the allowedleft-handed  R  ( R L ) region for glycine and asparagine which isgreatly reduced or absent for the rest of the amino acids. Thelarge (17%) population of  R L  for glycine has been rationalizedby it being the least sterically restricted amino acid. Forasparagine (7% R L ) it has been suggested that the R L  conforma-tion is stabilized by H bonding of the side chain NH with thebackbone carbonyl of the adjacent residues. 38 The random coil model proposed in the present study is basedon the distributions of   φ , ψ  angles obtained from 85 high-resolution crystal structures 43 in the protein data bank (PDB). 36,37 Swindells  et al . 38 have used an identical set of protein structureswhich have a resolution of 2.0 Å or better,  R  factors of 20% orbetter, and sequence similarities of 30% or less. In order tocalculate NMR observables, the main-chain dihedral distribu-tions found in these 85 proteins are used directly in the form of amino acid specific libraries of   φ , ψ  dihedral angle pairs, eachpair depicted as a point in Ramachandran plots of the type seenin Figure 1, A and B. A model which samples dihedral anglesat random may thus approximate a maximally disorderedpolypeptide while retaining as a statistical average some of theconformational biases due to the local interactions of the chain.It is assumed that interconversion between the different  φ , ψ conformations is fast on the NMR time scale so that NMRparameters are averaged. (b) Calculation of Coupling Constants.  3  J  HNH R  couplingconstants were predicted directly from the  φ  distribution foreach amino acid using the Karplus equation: 44 - 46 First, individual coupling constants  3  J  HNH R  were calculated foreach  φ , ψ  pair of the distribution. Then, in the second step, thepopulation average  〈 3  J  HNH R 〉  was obtained by averaging theindividual  3  J  HNH R  values. (c) Calculation of Random Coil NOE Intensities.  Theprediction of NOE intensities requires an atomic level descrip-tion of the peptide residues. We have used a simplified peptidemodel shown in Figure 2 in the present study. It consists of anall atom peptide backbone representation (atoms N, H  N  , C R , H R ,C, O) on to which C    and H    atoms are added for all aminoacids but glycine, for which both H R  atoms are modeledexplicitly. All H    atoms are treated as united atoms positionedcollinearly with the C R - C    bond placed at the center of massof the H    atoms, in order to account approximately for   1 averaging. Repulsive van der Waals interactions between N,H N , C R , H R , C, O, C   , and H    atoms are modeled explicitly bydisallowing steric overlap between these atoms, while interac-tions involving other side chain atoms (C γ , C δ , etc.) areneglected and are not included in the current model. We arepresently extending the sophistication of the model to includean all-atom side chain representation which will provide a moreaccurate description of side chain protons.Ensembles of conformations are generated by a Monte Carloprocedure which for each conformation generates a new set of  φ , ψ  backbone angles. This procedure selects  φ , ψ  angles atrandom from the amino acid specific dihedral angle libraries. Figure 1.  φ , ψ  Ramachandran plot for alanine (A) and valine (B). Eachpoint represents one of the 2096 and 1728 entries found for alanineand valine, respectively.  R , left handed R ( R L ), and    regions as definedby Morris et al. 58 are indicated in the figures. The overall number of residues populating the    region is higher for valine (B) than for alanine(A). (C) Histogram of   R ,  R L , and    populations. Figure 2.  The peptide model. In order to derive distances as a functionof the intervening  φ , ψ  angles, a pentapeptide model with explicitbackbone atoms was used. Bonds with torsion angles that haverotational freedom are indicated by thick lines. Side chain H    atoms(except for glycine) are represented by an united atom positioned atthe center of mass of the hydrogens. Repulsive van der Waalsinteractions are taken into account using standard cutoffs. 59 Thedistance between the H R  of residue  i  and the H  N  of residue  i  +  3 is afunction of the dihedrals  ψ i ,  φ i + 1 ,  ψ i + 1 ,  φ i + 2 , and  ψ i + 2  as indicated.The NOE intensity is proportional to the inverse sixth power of theproton - proton distance,  d  . 3  J  HNH R ) 6.4 cos 2 ( φ - 60 ° ) - 1.4 cos( φ - 60 ° ) + 1.9 (1) 2662  J. Phys. Chem., Vol. 100, No. 7, 1996   Fiebig et al.  All other bond and torsion angles are kept at their ideal (average)values. Conformers with steric overlap are excluded. Predictedvalues of NMR observable parameters, especially NOE intensi-ties, converge at sampling sizes of 10 5 conformers.NOE intensities were calculated using the two-spin ap-proximation 47 by population-weighted averaging of the inversesixth power of the respective proton - proton distance  〈 1/  d  6 〉  overan ensemble of 10 5 random coil structures generated by theMonte Carlo sampling procedure. NOE intensities for allcombinations of H N , H R , and H    protons of ( i ,  i + 1), ( i ,  i + 2),and ( i ,  i + 3) residue pairs were thus obtained. To display theresults graphically, standard NOE maps with intensity cutoffsequivalent to proton - proton distances of 2.5, 3.5, and 4.3 Åfor strong, medium, and weak NOE’s, respectively, were used. 48 For NOE’s that involve glycine and residues having methylgroups, a 0.4 Å larger cutoff was used for the H R protons (forglycine) or H    protons (for the other residues) to account forthe increased NOE intensity arising from multiple protons, theneglect of the longer side chains of valine, isoleucine, andtheronine in the simplified model, and the specific relaxationproperties of methyl groups. 49 (d) Calculation of Cooperative NOE Intensities.  To modelthe effects of cooperativity, the random coil sampling procedurewas modified to incorporate the cooperativity inherent in the φ , ψ  distributions of tripeptides found in the protein data base.Statistics on tripeptide segments from the PDB (data not shown)indicate that 27% are in the “all- R ” ( RRR ) conformation, 18%are in the “all-   ” (   ) conformation, and the rest are in mixedconformations ( R   ,  R   R , etc.).  R  and    regions are definedin Figure 1A,B. In the modified Monte Carlo samplingprocedure we introduce a cooperativity factor  c R . For therandom noncooperative case ( c R )  0) the population of all- R conformers is equal to the product of the R propensities ( P i R ) of the individual residues ( i  )  1, 2, 3),The most cooperative case is defined as  c R )  1. Here thelikelihood of the all- R  conformation is equal to the minimumof the individual  R  probabilities  P i R This is to ensure that the intrinsic  R  population of eachindividual residue is not exceeded. For example, in a tripeptidewith 30, 40, and 50%  R -propensity for residues 1, 2, and 3,respectively, the highest possible all- R  population  P max RRR atcooperativity  c R )  1 is 30%. The minimum all- R  population P min RRR (at  c R )  0), however, is 6%. The all- R  population isdefined as a function of the cooperativity factor  c R asFrom the above equations we can derive a cooperativity weight w RRR ( g 1.0) which is used to weight each all- R  conformationgenerated by the Monte Carlo procedure,When introducing cooperativity weighting factors care mustbe taken not to perturb the intrinsic  R  populations  P i R of eachresidue  i . Removal of this bias is facilitated by an additionalweighting factor  w i R ( e 1.0) for each amino acid  i  to rescale itsoverall  R  population  P i R . For a tripeptide consisting of threedifferent amino acids, the following equation must hold:This equation ensures that the sum of the different types of populations in which residue  i  is in the  R  state is equal to itstotal  R  population  P i R . The first term in the above equation isthe rescaled population of tripeptides with residue  i  in the  R Ramachandran region; the second term corresponds to confor-mations where two residues ( i  and  j * i ) are in the R state, andthe final term accounts for the cooperative  c R dependent all- R population. With the above equation the weighting factors canbe defined iteratively asNoncooperative conformations (those that are not all- R ) areweighted by the product of the individual residues weightingfactors  w i R given that the  φ , ψ  angles of the residue are in the R region of the Ramachandran map. Weighting factors forresidues that are not in the R region are unity. Although only R  cooperativity is discussed in the present paper, equationssimilar to the ones above have been also derived for   cooperativity. Results and Discussion(a) Characteristics of the NMR Parameters of a RandomCoil.  Using the proposed model for the random coil statedescribed in the previous sections we can predict the NMRparameters expected for a maximally disordered peptide ordenatured protein with a given amino acid sequence. Figure 3shows  3  J  HNH R  values, NOE ratios, and NOE pattern predictedfor three segments of lysozyme (residues 19 - 24, 50 - 55, and95 - 119); these have been chosen as illustrations as they containvery different structures (turn,   -sheet, and R -helix, respectively)in the native state of lysozyme, but are also regions with reducedspectral overlap and complete and unambiguous spectral as-signments. The full set of lysozyme data will be discussed ina subsequent publication. 50 It is immediately apparent thatparameters such as  3  J  HNH R  coupling constants and the R H - NH/ NH - NH intensity ratios for NOE’s between sequential ( i ,  i + 1) residues are predicted to be far from uniform along thesequence. The observed differences directly reflect the varia-tions in  φ  and  φ , ψ  torsion angle preferences of the differentamino acid types. For example,  3  J  HNH R  coupling constants havethe smallest values for residues with high R propensities (Figure3A), particularly alanine (5.8 Hz), or a high population of positive  φ  angles as is seen for glycine (5.8, 6.2 Hz), and largestvalues for residues which favor   -conformations (7.2 - 7.5 Hzfor threonine, valine, and isoleucine). These differences aresignificant compared to an uncertainty of less than 0.5 Hz inthe experimental measurement.Figure 3C shows that the random coil model predictssequential ( i ,  i + 1) NOE’s for all residues. The intensity ratiobetween ( i ,  i + 1) R H - NH and NH - NH NOE’s is often usedas a measure for secondary structure since it depends on both φ  and  ψ  dihedrals. For the lysozyme sequence these randomcoil NOE intensity ratios are predicted to vary between 2.7 forresidues with higher than average   -propensity and approxi-mately 1.0 for residues with increased R -propensity (see Figure3B). Glycines show the lowest  R H - NH/NH - NH intensityratios (0.7). Predicted ratios vary by a factor of 3, which is P min RRR ≡ P RRR ( c R ) 0) ) P 1 R P 2 R P 3 R (2) P max RRR ≡ P RRR ( c R ) 1) ) min( P 1 R ,  P 2 R ,  P 3 R ) (3) P RRR ( c R ) ) P min RRR + c R ( P max RRR - P min RRR ) (4) w RRR ) 1 + c R ( P max RRR  /  P min RRR - 1) (5) P i R ) ( P i R - ∑  j * i P  j R P i R - P min RRR ) w i R + ( P i R ∑  j * i P  j R w  j R ) w i R + P RRR ( c R );  i ) 1, 2, 3 (6) w i R ) P i R - P RRR ( c R ) P i R - P i R ∑  j * i (1 - ω  j R ) P  j R - P min RRR ;  i ) 1,2,3 (7) Conformations of Denatured States of Proteins  J. Phys. Chem., Vol. 100, No. 7, 1996   2663  small compared to the overall range of intensity ratios of up toa factor of 10 3 observed in NOESY spectra of native stateproteins.In rigid molecules, NOE’s may be observed between protonsthat are up to 5 Å apart, depending on the overall correlationtime of the molecule and the signal-to-noise level of the data.In the case of multiple conformations which interconvert rapidly,two protons may show an NOE even for a sparsely populatedconformation if the two protons are sufficiently close in space.For example, conformers with interproton distances of 2.5, 3.5,or 4.5 Å will have similar detectable NOE intensities if theyare populated 2, 12, or 53% of the time, respectively. Figure3C demonstrates that a number of medium range NOE’s areexpected to be observed even for a highly disordered state andthat the pattern of predicted NOE’s is nonuniform. For the threefragments considered here 59 ( i ,  i + 2) and 7 ( i ,  i + 3) NOE’sare predicted. The  R H - NH( i ,  i  +  2) NOE’s are the mostfrequently predicted medium range NOE’s. These NOE’s wouldnot be observed for a   -strand (interproton distance  >  5.5 Å)and would be very weak for a regular  R -helix (interprotondistance 4.3 Å). However, in a mixed   R -conformation the R H - NH( i ,  i  +  2) distance can be as short as 3.7 Å whichtherefore contributes strongly to the  d  - 6 averaged intensity since   R -conformers are populated approximately 25% of the time.Seven NH - NH( i ,  i + 2) NOE’s are predicted; these distancesare short for segments with high   R L  propensities and are thuspredicted for glycines and asparagines in the  i  +  1 position.Two R H - NH( i ,  i + 3) NOE’s in the segments 54 - 57 and 104 - 107 are predicted; the  R H - NH( i ,  i  +  3) distance is short forpeptides in  RRR  or   RR -conformations (3.4 and 4.2 Å,respectively). Similarly the five predicted   H - NH( i ,  i  +  3)NOE’s should be observed in RRR and   RR conformations (3.6and 3.2 Å, respectively). (b) Comparison of the Cooperative and NoncooperativeModels.  Although in many cases a random coil model withonly local interactions seems to provide a reasonable descriptionof the conformational populations adopted in disordered peptidesand denatured proteins, the effects of cooperativity, particularlywith regard to helix formation, have also been considered. Forexample, consider the two extremes where a peptide of threeamino acids is either (A) fully random or (B) fully cooperativefor a situation in which the individual R space populations ( φ , ψ ’sin the R region of the Ramachandran map; see Figure 1, A andB) are given as 50% for each residue. The species where allresidues are in the R conformation ( RRR ) is then populated by12.5% of the molecules for the random case A and by 50% forthe cooperative case B. These two extreme states would giveidentical values for NMR parameters which probe the confor-mation of a single residue such as  3  J  HNH R  coupling constants,but significantly different intensities for medium range NOE’ssuch as  R H - NH( i ,  i  +  3). Figure 3D shows the predictedNOE’s assuming a cooperativity of   c R )  0.2 for the threesegments. For the cooperative case significantly larger numbersof NH - NH( i ,  i + 2), R H - NH( i ,  i + 3), and   H - NH( i ,  i + 3)NOE’s are predicted, whereas the number of predicted  R H - NH( i ,  i  +  2) and   H - NH( i ,  i  +  2) NOE’s increases onlyslightly. Thus, as anticipated, clusters of ( i ,  i + 3) NOE’s arepredicted when R space is populated by three adjacent residuesin a cooperative manner. (c) Comparisons with NMR Data for Denatured Lysozyme. The predicted NMR parameters for a random coil state can beused as a framework for interpreting the experimental dataobtained from denatured proteins and isolated peptides. Thisis demonstrated here by a comparison of the predictions forhen lysozyme with experimental NMR data for urea denaturedlysozyme and disordered peptide fragments taken from thelysozyme sequence.Figure 4 shows a comparison of predicted  3  J  HNH R  couplingconstants with  3  J  HNH R  data derived from several peptide frag-ments of lysozyme. 39,51,52 The good correlation (  R  )  0.76)suggests that local conformational preferences of the peptide Figure 3.  Predictions of NMR parameters for residues 19 - 24, 50 - 55, and 95 - 119 of hen egg-white lysozyme. (A)  3  J  HNH R  couplingconstants [Hz]. (B) Ratios of sequential ( i ,  i  +  1) R N/NN cross peakintensities. (C) NOE map for the random coil model. Each barrepresents a predicted NOE between two protons. NOE’s are classifiedas strong, medium, and weak as indicated by the height of the bar.Weak NOE cutoffs correspond to a distance of 4.3 Å for all proton - proton distances excluding NOE’s involving methyl groups (cutoff 4.7Å) and are determined from the intraresidue reference NOE betweenglycine H R  and NH for 10 (of 12) nonoverlapping cross peaks in theexperimental NOESY-HSQC spectrum. (D) NOE map for the coop-erative model at a cooperativity level of   c R )  0.2. Figure 4.  A comparison of residue specific mean experimental  3  J  HNH R coupling constants with those predicted from the random coil model.The experimental values are derived from three peptide fragments of hen lysozyme (residues 13 - 33, 86 - 102, and 105 - 115) each of whichappears, from the NOE and chemical shift data, to be largely disordered.The coupling constants were extracted from cross peaks in DQF-COSYspectra using a fitting procedure. 60 The vertical lines show ( 1 standarddeviation. The correlation coefficient for the data is  R  )  0.76. 2664  J. Phys. Chem., Vol. 100, No. 7, 1996   Fiebig et al.  backbone in denatured states are similar to the ones found innative states. Moreover, Serrano et al. 40 have shown that theobserved H R  chemical shifts for unstructured peptides correlatewell with predicted chemical shifts, using similar databasederived  φ , ψ  distributions and a parametrization for the H R chemical shift deviation from shifts measured in short peptidesas previously introduced by Wishart et al. 53 These two findingsprovide evidence which supports the use of PDB derivedpopulations of   φ , ψ  angles to model denatured states.A comparison of the random coil NOE predictions withNOE’s identified in a  1 H- 15 N NOESY-HSQC spectrum of lysozyme in 8M urea shows that for several regions of thesequence we see significant agreement between prediction andexperiment. This is the case for residues 95 - 119, shown inFigure 5A, where four of the six experimentally observed ( i ,  i + 3) NOE’s are predicted by the model (black bars). This resultsuggests that for this region of the chain conformationalpreferences are determined predominantly by local interactions.For other parts of the sequence, such as residues 19 - 24 and50 - 55, there is a significantly poorer agreement for the randomcoil model which may indicate residual nonrandom structure.In some cases the nature of such localized structure has beencharacterized. For example, for residues 19 - 24 (Figure 5A)an interaction between the NH of glycine 22 and the aromaticring of tyrosine 20 is likely to be responsible for the observationof two ( i ,  i + 2) NOE’s which are not predicted by the model.Such a tyrosine - glycine interaction has been observed previ-ously in denatured BPTI. 54 The existence of this interaction isfurther substantiated by chemical shift analysis of the H N andH R  protons of residues 20 - 24, which show among the largestdeviations from random coil chemical shifts for both the ureadenatured state 50 at pH 2 and lysozyme peptide fragments. 52,55 For residues 50 - 55 a much higher agreement betweenprediction and experiment is achieved with the cooperativemodel. In this region, four of the five NOE’s which are notpredicted by the random coil model (white bars in Figure 5A)are predicted correctly in Figure 5B (black bars). A model of localized cooperative interactions in this segment is found tobe consistent with the experimental NOE data. In fact H N andH R  chemical shifts for residues 50 - 55 of urea denaturedlysozyme are significantly perturbed from random coil chemicalshifts. 50 Threonine 51 has been previously identified as one of the most perturbed residue side chains of the lysozyme denaturedstate spectra due to interactions with tyrosine 53. 56 Additionally,experiments on alcohol-denatured lysozyme show that residues50 - 55 adopt a helical conformation in 70% (v/v) trifluoro-ethanol (TFE). 57 (d) Comparison of Experimental NOE Data with Predic-tions for Random Sequences.  To evaluate more rigorouslythe predictive power of the random coil model, we havepredicted NOE patterns for randomized lysozyme sequences,generated by randomly permuting the order of the 129 aminoacid residues. After calculating the NOE pattern maps for thesesequences, the agreement between experimental NOE’s andNOE’s predicted for the random sequences was measuredutilizing a residual index  R  defined asIn this equation  N  exp  is the number of observed NOE’s,  N  exp - the number of observed NOE’s which are not predicted, and  N  theory - the number of predicted NOE’s which are not observed.We exclude predicted NOE’s which cannot be compared to theexperimental data due to spectral overlap. Table 1 shows  R values for the predicted NOE map of the full wild type lysozymesequence and its peptide segments for the noncooperative andcooperative models. Additionally, predictions were undertakenon 20 randomized lysozyme sequences. The average “random”  R  values  〈  R rand 〉  of these predictions and their standard deviationsare also listed in the table. It is found that in particular ( i ,  i + 3) NOE predictions differ significantly from predictions forrandom sequences by more than 2 standard deviations. Conclusions Characterization of the conformations sampled in denaturedstates of proteins is of major importance in attempting to gaininsight into the relative stabilities and structural biases that existwithin local regions of polypeptide sequences. These are of considerable interest because of their likely significance in theearly stages of protein folding. The random coil modeldescribed in this paper is based upon the use of specific  φ ,  ψ distributions for amino acid types determined from analysis of structures in the protein data bank. The present method providesthe means for characterizing the conformations in denaturedproteins and individual peptides. It is known that the sameproteins denatured in different ways can have different NMRparameters and other characteristics. 56,57 By analyzing theseinsight into the role of specific denaturants can be gained.The good correlation between NMR coupling constantspredicted from the model and experimental data for peptide Figure 5.  Comparison of predicted and experimental NOE maps forsegments 19 - 24, 50 - 55, and 95 - 119 of lysozyme for the randomcoil (A) and the cooperative (B) models. In order to compare with thesimulation, all experimental NOE’s involving side chains are designatedas   . Predicted and observed NOE’s are shown in black bars, NOE’sobserved but not predicted are shown in open bars, and NOE’s predictedbut not observed are shown in dashed bars. Strong, medium, and weakNOE’s are indicated by the height of the bar. Experimental NOE’swere extracted from 3D- 15 N-filtered NOESY-HSQC experiments usinga 200 ms NOE mixing time performed on a 3 mM sample of lysozymein 8 M urea at pH 2. Further experimental details will be publishedelsewhere. 50 TABLE 1:  R  Values for NOE Predictions noncooperative cooperativeNOE type  R a  R b 〈  R rand 〉 c  R a  R b NN( i ,  i + 2) 1.0 0.5 1.22 ( 0.16 3.1 1.67 R N( i ,  i + 2) 0.29 0.29 0.46 ( 0.07 0.33 0.21   N( i ,  i + 2) 1.08 0.67 1.21 ( 0.12 0.92 0.67 R N( i ,  i + 3) 1.0 1.0 2.26 ( 0.51 3.25 1.0   N( i ,  i + 3) 1.0 0.6 2.19 ( 0.47 0.75 0.2 a Full sequence.  b Residues 19 - 24, 50 - 55, 95 - 119.  c Average andstandard deviation of 20 randomized lysozyme sequences.  R ) (  N  exp - +  N  theory - )/   N  exp  (8) Conformations of Denatured States of Proteins  J. Phys. Chem., Vol. 100, No. 7, 1996   2665\nSimilar documents\nView more...\nRelated Search\nWe Need Your Support\n\nThanks to everyone for your continued support.\n\nNo, Thanks\n\n\nMore details...\n\nSign Now!\n\nWe are very appreciated for your Prompt Action!", "pred_label": "__label__1", "pred_score_pos": 0.7840009927749634} {"content": "Digital Media: Life-Changing Online\n\nDigital Media: Life-Changing Online. Introduction\n\n • Clare Brant King's College, London\n • Rob Gallagher King's College, London\nKeywords: power; agencies; stories; mediatization; capital\n\n\nThis special issue follows on from the IABA Europe 2017 conference held at King’s College London hosted by the Ego-Media research group and the Centre for Life-Writing Research, who thank everyone who contributed. The conference theme was “Life Writing, Europe and New Media”: anodyne terms, in the interests of inclusivity, yet their congruence raises some big questions. Is the term life writing sufficiently able to absorb digital and social media as part of its assumed domain? How do offline and online forms of life writing relate to each other? In a global internet age, what if anything is specific to Europe or European practices? And, agonisingly for the hosts in the wake of Brexit, in what ways is it possible for Britain to persist in being European?\n\nDigital Media: Life-Changing Online", "pred_label": "__label__1", "pred_score_pos": 0.5802973508834839} {"content": "Category Archives: Parents\n\nImportant Research on the Role Parents Play in Children’s STEM Success\n\nImportant Research on the Role Parents Play in Children’s STEM Success\n\nProficiency in STEM skills is seen as a key component for success in the 21st century workplace. Yet observers note an achievement gap in STEM education and careers, with white males leading the way and members of other groups falling behind. This issue is so troubling that the US Department of Education has set achieving equality in STEM education as a main priority.\n\nOne way to encourage more diversity in STEM fields is to involve parents in their child’s STEM education. In fact, the National Science Teachers Association (NSTA) feels so strongly about parents playing an active role in STEM education that they issued a position statement on the topic. This statement suggests that even simple actions from parents, such as encouraging children to ask questions or playing with children outdoors, can go a long way toward a child’s success in STEM education.\n\nSeveral research studies have investigated the relationship between parent involvement, student learning in STEM, and career paths in STEM. Read on to learn about some key findings.\n\n\nStudent Motivation\n\n\n\n\nAdditionally, the researchers found that the positive effects lingered beyond high school. Students whose parents had discussed the brochures and websites with them were more likely to take STEM courses in college and be motivated to pursue a STEM career afterwards. The researchers concluded that one successful method for increasing the number of people pursuing STEM careers is to focus on parental involvement in children’s STEM education.\n\n\nWomen in STEM\n\nIn 2017, researchers at the University of Michigan and the University of Arkansas released a working paper that investigates causes for the gender gap in college-level STEM education. These researchers studied data from national surveys to determine whether girls’ perceived abilities in math, tested abilities in math, and decisions about pursuing a STEM major in college were related to their parents’ careers.\n\nWhen they analyzed the data, the researchers found that girls believed their abilities in math were lower, tested lower in math, and chose to pursue a STEM major in college less often. However, the researchers found different results for girls with at least one parent working in a STEM field.\n\nAlthough girls with a parent working in a STEM field did not appear to think differently about their math abilities, they had higher math test scores and were more likely to choose a STEM major. The researchers concluded that having a parent who works in a STEM field could benefit girls by providing them with a role model for success.\n\n\nMath Anxiety\n\n\nA 2015 publication from the Association for Psychological Science reveals the negative effects parents can have on their children’s performance in math. Although studies often mention the positive effects parents can have on children’s STEM education, this study points out that the opposite can also occur.\n\nIn this study, the researchers surveyed parents about their math anxiety and how often they help their children with math homework. The researchers also collected information about the first- and second-grade children of these parents, focusing on their levels of math anxiety and math performance.\n\nThe researchers found that when parents reported high levels of math anxiety and also helped their children with math homework frequently, the children developed high levels of math anxiety over the school year. Additionally, the researchers found these children also had lower scores in math performance over the school year.\n\nInterestingly, the researchers found that when parents reported high levels of math anxiety but didn’t help their children with math homework frequently, the children did not develop math anxiety and did not have lower math scores. The researchers concluded that math anxiety and performance are not related to genetic factors, but rather are learned behaviors.\n\nRather than suggest that parents with math anxiety not help their children with math homework, the researchers cite educational research that suggests involved parents are beneficial to student success. They recommend parents receive tools and other support so they can more confidently help their children with math homework.", "pred_label": "__label__1", "pred_score_pos": 0.965241014957428} {"content": "In a case that could have wide-ranging national significance for gay rights, a federal appeals court in New York ruled on Monday that a landmark civil rights law bars employers from discriminating against their workers based on sexual orientation.\nThe decision was a setback for the Justice Department, which under President Trump had unexpectedly interceded in a discrimination lawsuit filed by a sky-diving instructor. The department had argued that Title VII of the 1964 Civil Rights Act did not explicitly cover sexual-orientation discrimination in the workplace, a stance that put it at odds with another federal body, the Equal Employment Opportunity Commission.\nIn rejecting the Justice Department’s argument, the United States Court of Appeals for the Second Circuit became the second appeals court to rule recently that the Civil Rights Act, which outlaws bias in the workplace on the basis of “race, color, religion, sex or national origin,” should also be extended to include sexual orientation. A third appellate court in Atlanta has ruled differently. Mike Malloy discusses this.\n", "pred_label": "__label__1", "pred_score_pos": 0.8335100412368774} {"content": "\n\nLixin Fishball Noodles never fails to tip my traditional food fare senses.\nAlso available at the following Food Republic outlets : BreadTalk IHQ, I12 Katong, ION Orchard (Food Opera), Parkway Parade, Serangoon NEX, Shaw House and Suntec City.\nCheck out #cptslowyeoxfoodrepublicsg for more of my @foodrepublicsg adventures", "pred_label": "__label__1", "pred_score_pos": 0.7332141995429993} {"content": "American Revolution : No Taxation Without Representation Essay\n\n1380 Words Feb 27th, 2016 6 Pages\nAmericans felt they deserved all the rights of Englishmen. The British, on the other hand, felt that the colonies were created to be used in the way that best suited the crown and parliament. This conflict is embodied in one of the rallying cries of the American Revolution: No Taxation Without Representation. The road to revolution built slowly over time. Many events fed the growing desire of the thirteen colonies for independence. Following are the major events that led to the Revolution. the French and Indian war between Britain and France ended with the victorious British deeply in debt and demanding more revenue from the colonies. With the defeat of the French, the colonies became less dependent on Britain for protection. The Proclamation of 1763, prohibited settlement beyond the Appalachian Mountains. While Britain did not intend to harm the colonists, many colonists took offense at this order. The sugar act of 1764 raised revenue by increasing duties on sugar imported from the West Indies.\nCurrency act of 1764 when the Parliament argued that colonial currency had caused devaluation harmful to British trade. They banned American assemblies from issuing paper bills or bills of credit. The stamp act of1765 required tax stamps on many items and documents including playing cards, newspapers, and marriage licenses. Prime Minister George Grenville stated that this direct tax was intended for the colonies to pay for defense. Previous taxes imposed by Britain had been…\n\nRelated Documents", "pred_label": "__label__1", "pred_score_pos": 0.6316084861755371} {"content": "EEOC Seeks Public Input on Proposed Enforcement Guidance on Unlawful Harassment\n\nThe EEOC issued Proposed Enforcement Guidance on Unlawful Harassment on January 10, 2017. It is designed to consolidate numerous agency guidelines into one document and addresses hostile work environment harassment prohibited by statutes enforced by the EEOC. The Guidance examines three primary elements of a harassment claim. First, is the conduct based on a legally protected status; second, is the conduct sufficiently severe or pervasive to create a hostile work environment; and third, is there a basis for employer liability. The 75-page treatise covers key case law since the Supreme Court first recognized harassment as an actionable form of discrimination in 1986.\n\nThere is nothing groundbreaking in the Guidance. However, it is a worthy read for any human resources professional as a reminder of how broad actionable harassment claims can be. For instance, harassment can involve conduct in the workplace as well as outside of it. Sex-based harassment includes more than asking co-workers out on dates: it includes conduct aimed at someone based on their sex; sex stereotyping; conduct based on pregnancy/childbirth and conduct based on gender identity (including sexual orientation). Harassment claims can be founded on actions taken based on the perception that someone is within a protected class; or associational, that is, if a person associates with someone outside of his/her protected class. Non-employees can create a hostile work environment, the guidance citing as examples independent contractors, customers, patients, nursing home residents and employees of one’s clients. Some of these principles may not be on an employer's radar until it is too late.\n\nOf interest, the Guidance addresses off-work conduct, including: social media. The following example comes from the guidance:\n\nConduct on Social Media Platform Outside Workplace. Brad and Al work on an all-male construction crew.  Al is the crew superintendent, and he regularly brings pornographic magazines to the construction site to share with the other crew members during lunch breaks.  After Brad repeatedly refuses to look at the magazines, Al and the other crew members begin taunting Brad.  Al uses his smartphone to post comments on his personal Facebook page calling Brad a “princess” and “f____t.”  Brad and the other crew members see Al’s posts about Brad, and they talk about the posts at work and begin directing epithets at Brad, simulating sex acts around him, and exposing themselves to him.  An investigator finds that the Facebook posts contributed to a hostile work environment even though they were written on a personal smartphone and some were written after-hours.\n\nThis example is a startling reminder of how important it is to have an effective anti-harassment policy and the publication of that policy so all employees understand what is expected of them in and out of work.\n\nThe last section of the guidance then focuses on the components of an effective anti-harassment policy. This policy should define prohibited conduct; be disseminated throughout the workplace; be understandable to workers, including those with limited English skills; require supervisors to report or address harassment; and provide various ways to report harassment, not just through a direct supervisor. The complaint procedures should include an effective investigative process, provide for prompt corrective action, and have adequate confidentiality protection and anti-retaliation provisions.\n\nThe Guidance closes with the positive changes the EEOC has seen in harassment prevention. The task force that studied work place harassment identified five core principles in businesses having positive work environments:\n\nCommitted and engaged leadership;\n\n • Consistent and demonstrated accountability;\n • Strong and comprehensive harassment policies;\n • Trusted and accessible complaint procedures; and\n\nThe take away for employment attorneys, general counsel, and human resources professionals is to ensure that your client or company has an adequate anti-harassment policy with a sound complaint procedure; effective distribution and communication of this policy; training in critical anti-harassment principles such as identifying what is harassing conduct and the legal requirement to eliminate it from the work place; vigilance in overseeing behavior in the workplace and, to the extent possible, outside the workplace, with the goal of providing a workplace free of conduct based on employees' protected characteristics.\n\nThe proposed Enforcement Guidance on Unlawful Harassment is available for public input until Feb. 9, 2017. Input may be submitted here.\n\nFurther information on this guidance or topic is available from Linda K. Horras or any Hinshaw employment attorney.\n\nSubscribe via Email", "pred_label": "__label__1", "pred_score_pos": 0.935853898525238} {"content": "(ANIMAL SCIENCE) Being the largest mammal on the planet has its advantages and disadvantages, but what happens when you don’t stop growing? The blue whale, scientists say, is doing just that. Why hasn’t the largest animal on earth stopped growing when other mammal species are shrinking? Read more to find out why and what this could mean for blue whales. — Global Animal\nThis Blue Whale is currently the biggest its species has ever been. Photo Credit: Getty Images\n\nDiscovery News, Anna Salleh\n\nBlue whales are the largest animal to have ever lived on Earth and — for now — are continuing to get bigger, say researchers.\n\nThe findings come out of a study by evolutionary biologist Alistair Evans, of Monash University in Melbourne, and colleagues.\n\n“The biggest animal ever is potentially still getting bigger,” says Evans, whose study is reported this week in Proceedings of the Royal Academy of Sciences.\n\nWhen the dinosaurs and their marine cousins went extinct 65 million years ago, mammals took the opportunity to take advantage of the space these creatures had previously occupied, says Evans.\n\nHe and colleagues investigated the increase in the size of mammals since this time.\n\nThe study estimated the body size of hundreds of species in 28 different orders of animals in 20 time periods over the past 70 million years.\n\nThe researchers used teeth, skulls and limb bones to work out the size of the animal, based on comparisons with current day species.\n\nThe researchers found it took whales 5 million generations, or 30 million years, to go from 25 kilograms to 190 tons — the weight of a blue whale.\n\nBy contrast land mammals got bigger half as quickly as marine mammals.\n\nFor example, it took 10,000 million generations for a mammal to get 5000 times bigger, and over twice as long to evolve form the size of a mouse to the size of elephant.\n\nElephants have been the largest land animal for the past 10 million years, and before that the record was held by a now-extinct rhino-like animal, says Evans.\n\nThe researchers believe one reason for this faster evolution in size among marine animals is that it’s easier to grow bigger in the sea.\n\nWith the water holding you up, fewer body modifications are required to handle the increase in weight.\n\nInterestingly the new study found that almost all mammals are smaller today than they were in the last major ice ages — a million or so years ago.\n\nEvans says this may be because the biggest animals have been hunted to extinction, or because the weather is warmer and there is less advantage to being big.\n\nBut the blue whales are an exception, he says. “It’s continued to get bigger,” says Evans.\n\nHe says ocean currents boosting the amount of krill around the Antarctica are likely to be responsible for this growth.\n\nCo-author zoologist Dr Erich Fitzgerald of Museum Victoria says whales in general have continued to get larger and could theoretically continue to grow assuming they could get the food they require.\n\nBut he says the future is uncertain given such things as overfishing, which threatens whales’ food source.\n\n“Their maximum size may be peaking during our lifetime,” says Fitzgerald.\n\nEvans says there are certain advantages to increasing in size.\n\nFor example, your relative metabolic rate decreases with size which means you don’t have to eat as much food per gram of your own tissue. “It’s more efficient to be big,” he says.\n\nThis means you can eat more abundant low energy-dense foods, like trees, leaves and grass.\n\nAnd you can avoid being eaten by other animals, can store more energy and can travel further distances.\n\nSmall animals by contrast have a high metabolic rate and need to eat insects, seeds and fruit, which are less available.\n\nBut not all mammals got larger after the demise of the dinosaurs. Some, especially those isolated on islands, got smaller — including now extinct dwarf mammoths off the coast of California and dwarf elephants in the Mediterranean.\n\nGetting smaller can have advantages too, adds Evans, including helping animals to adapt to a smaller food resource. \n\nInterestingly, these animals evolved smaller size much faster than those evolving larger size, the researchers found.\n\nMore Discovery News: http://news.discovery.com/animals/blue-whale-larger-than-ever-120131.html#mkcpgn=rssnws1\n\nRead more articles about big blue whales!\n\nOne Big Baby! The World’s Largest Animal Infants\n\nAre Whales The Biggest Braniacs?", "pred_label": "__label__1", "pred_score_pos": 0.943423330783844} {"content": "What Does Supermajority Mean?\n\n\n\nUnderstanding Supermajority\n\n\nExamples of critical issues that might require a supermajority vote include a merger or acquisition, executive changes (including the hiring or firing of a CEO), the decision to hire an investment bank to go public (or, in reverse, to leave the public markets and go private). A major corporate decision that does not require a vote is the declaration of dividends, which the Board of Directors (BOD) of a company decides on independently. However, most other important decisions that affect the direction a company will take are subject to a vote.\n\nSupermajorities and Voting Shareholders\n\nA supermajority of voters is usually counted as a company’s shareholder meeting. This can be an annual meeting or a non-regular meeting throughout the year, depending on the nature and urgency of the matter being voted upon. Shareholder meetings are generally administrative sessions that follow a specific format that is decided in advance. The format is usually a parliamentary procedure, with specific time allocated for each speaker and protocol for shareholders who wish to make statements.\n\n\nIn May 2018, Duke Energy (NYSE: DUK) issued a statement noting that a binding company-sponsored proposal was not approved after it did not achieve the required 80 percent of total outstanding shares. The proposed amendment was to eliminate supermajority voting requirements in Duke’s Restated Certificate of Incorporation of Duke Energy Corporation.", "pred_label": "__label__1", "pred_score_pos": 0.9985197186470032} {"content": "Since Nigeria got her independence from Britain in 1960, the country’s political structural arrangement has been under one central government called Federal Government (via a Federal Republic) and was blessed with unquantifiable natural, human and material resources. In spite of that, the average Nigerian’s income per capita does not give the real picture due to the high income inequalities in the country. As majority of Nigerians are living in abject poverty, particularly in the Northeastern area. However, under the Federal system arrangement, instead of having a smooth level of interaction among individual ethnic groups, cultures, traditions and religions, there thrives a persistent lack of trust among Nigerians due to fear of domination, marginalization, control and intolerance. This ugly development led to the acquisition of fire arms among ethnic, political, religious and social militia groups. Similarly, with the return of the country to democratic rule, the situation has worsened with the politicians prosecuting their political ambitions. Furthermore, the situation also became more terrible when these groups started fighting government and its agencies. As a result, many people were killed while millions of people were displaced and properties worth millions of Naira were also destroyed more especially in the North-east and north central areas. The insecurity situation in the country was alleged to have been attributed to some factors. Among this include poor government policies, corruption, poverty, unemployment, poor leadership, weak judiciary system etc. Consequently, this affected the region economically, socially, politically etc. Finally, recommendations were made and that Government should improve standard of living of the people through the creation of more entrepreneurship centers across the country more especially in the North and North-east in particular. Also, government should intensify more effort in fighting against corruption and this can be done through good legislation and stiff penalties for those found wanting.\n\n\n\n\nNigeria is a West African country with more than 250 ethnic groups and with an estimated population of about 170,123,740, according to the 2006 census (Akinjide 2013). It is by far the most populated country in the whole of Africa. Although Nigeria’s GDP per capita has been increased through the course of time in nominal US dollar terms, many Nigerians, unfortunately, are still living in abject poverty in spite of huge amount of human and material resources. The average income per capita does not give the real picture due to the high income inequality in the country. However, since Nigeria got her independence from Britain in 1960, the country’s political structural arrangement has been under one central government. This was to maintain some degree of independence and interdependence and as well as create supremacy authority centrally while component states retain a considerable amount of semi autonomy.\n\nConsequently, under this arrangement, the level of interaction between individual ethnic groups, cultures, traditions, religions from different backgrounds was not easy thereby translated into ethnic and political misunderstanding, mistrust, dominations, conflicts and crises as one may not be considerate with one another. As a result, there are fear, suspicions, intolerance, grieves and greed domination among most communities in the country and especially in the North which has so many ethnic minorities.\n\nFurthermore, it also created fear of not getting one’s fair share of scarce commodities (Daily Times, 1984). However, in an attempt to bring this over 250 groups of people under Federal state system, it created more problems than solving due to fear of deprivation\n\nThe North occupies about 70% of the land mass of the country; it also has the highest infant and maternal mortality rates in the country (World Bank 2001). Similarly, it has the lowest rate of child enrolment in schools, highest number of unemployed young people in the country, highest levels of poverty as compared to the other parts of the country. Consequently, the region is faced with challenges of security of lives and property and has remained a major issue today. These problems include inter-ethic and inter­religious conflict, insurgency and terrorism such as the Boko-Haram among others. According to Temple, (2013), the indices that measure human development are by far poorer in the 19 northern states of Nigeria compared with the rest of the country ranging from the girl-child education to the Almajiri system, from women empowerment to the economic viability of states, from an immediate marshal plan­like attempt at addressing the areas in conflict to how to create cooperation between states and groups. He further concluded that as a result of the above, the region was faced with the worst security challenges since independence.\n\nSimilarly, other security challenges facing the region include armed robbery and kidnapping, apart from insurgency and terrorism that have spread across the region like a wild fire across the polity, which seriously needs to be given adequate attention by the Government at all levels as pointed out by Salawu (2010). Kidnapping is still young in the north, but is fast developing and penetrating almost every area in the region. Kidnapping means taking a person away against the person’s will, usually for the purpose of ransom. Today, people are getting kidnapped almost on a daily basis across the region, through so many criminal and terrorist activities (Innocent, 2012).\n\nThe situation has become so bad that needs not only the attention of joint federal-states government cooperation but also the international community; just the same way attention is being given to the Ukraine versus Russian conflicts, Syria, Iraq, Lebanon versus Hezbollah conflict, Israeli versus Palestinian conflicts, Libya, Egypt, Yemen etc. It is against this backdrop that today, the streets and most areas in different parts of the North and North-east in particular are no longer safe for honest and hardworking for the fear of being killed due to insurgency or terrorist act. Consequently, no part of the North and the Federal Capital of Nigeria Abuja is immune from this insecurity.\n\nWhile every northerner and governments at all levels are concerned about insurgency and terrorism activities like Boko-Haram, ethnic, religious and tribal leaders are also seeking for solutions to end them. Unfortunately efforts were not put or channel to address the root causes of the problem. Example, when the issue of kidnapping started in the Niger Delta areas by the Militants, an average Niger Delta man would believe that it was about resource control. In the word of Joseph (2012) initially, it was the kidnap of expatriates and majority of the other Nigerians and northerners in particular believed that it was a southern affair. Until recently, when the issue of kidnapping became commercialized and was not limited to Niger Delta or Southerners but rather gradually got commercialized and has become a ‘lucrative ventures and luring young people and gradually spread across northern Nigeria. Consequently, kidnapping business has changed from being in predominantly in the Niger Delta to the North as well. Such kidnap victims includes parents, grandparents, students etc.\n\nThe central pillars of Nigerian national security was the safeguarding of the Nigerian sovereignty, independence and territorial integrity of the State as contained in the 1979 constitution. However, while the state remains nominally a sovereign and fulfils a modicum of the functions of a sovereign government, the central government has become so weak and ineffective and lacks the ability to provide simple basic public and social services. In view of the above, the Nigerian government, in 2013, due to lack of control over much of its territory, led to the seizure of some parts of Adamawa, Borno and Yobe states by the Boko Haram. According to the former Inspector-General of Police, Hafiz Ringim:\n\nThe National Security could be regarded as the measures, facilities and systems put in place by a nation to secure its citizens and resources from danger and the risk of infiltration, sabotage, subversion or theft etc.\n\nWhile according to a group of civil society organizations, the term national security’ implies the absence of threat to life, property and socio-economic well being of the people”. They further stated that: This is contained in line of the Nigerian constitution Section 14(2) (b) of the 1999 Constitution which states that;\n\nthe security and welfare of the people shall be the primary purpose of any government; and the participation by the people in their government shall be ensured in accordance with the provisions of this Constitution.\n\nHowever, in spite of the constitutional provisions which call for the respect to the economic well being of the people, the Constitution has also imposed a duty on the State to guarantee “the maximum welfare, freedom and happiness of every citizen on the basis of social justice, and equality of status and opportunity.” To this effect, the State shall direct its policies towards ensuring that unfortunately, the material resources of the nation are not harnessed and distributed as best as possible to serve the common good and that “the economic system is not operated in such manner as to permit the concentration of wealth or the means of production and exchange in the hands of few individuals or of a group.\n\nStatement of the Problem\n\nAccording to Omoyibo and Akpomera (2013), security is a concept that is prior to the state, and the state exists in order to provide that concept. While to Thomas (1996) security is the prime responsibility of the state. The State of insecurity in Nigeria is becoming worrisome and disturbing considering the high rate of killings, bombing, kidnapping, conflicts, wars, and clashes etc which innocent people fall to the guns of criminals in the country today. In the past recent months, no week passes without report of unknown gunmen taking human lives in the streets of northern Nigeria and north-east in particular.\n\nThe question is what are the root causes of all these killings? What are the consequences as well as solutions to this? These rhetorical questions may not need answers but it is mind-boggling that despite huge amount of naira voted every year in the name of security by the Government yet Nigeria security situation still remains uncontained. Although whenever there’s a problem there’s always the cause but the case becomes a bigger problem when the cause is not just one or two but an accumulation of national problems. What are the remote and immediate causes of insecurity in Nigerian and how can the situation be resolved? Bad leadership, corruption, illiteracy and many more are all responsible for the state of the country. The leadership of the country has contributed so much to the insecurity Nigeria is facing today.\n\nConsequently, the displaced persons, especially in the north-east and north central where there was high level of ethno/ state of insecurity in the country, has brought about so many negative effects, including millions of internally political crises. This has led to political, social and economic disruptions which in turn lead to slow economic, social, religious and political development. The world now sees Nigeria as a very violent nation and this has destroyed the reputation of Nigerians across the world. There is no doubt that a lot of measures need to be put in place to resolve insecurity in the country. New security policies, thinking and strategies need to be developed; corruption has to be stopped by all means; the government and the people need to develop trust and work together to resolve the insecurity situation for Nigeria to move forward. Insecurity in the country is no longer talked about as a thing that occurs at night. Now, even in broad day light, crimes are committed, killings are perpetrated. Most killings are done in broad day light with the assailants proving difficult to be found. The entire scenario has become a game of shooting at each other without missing. If nothing is done to bring the life threatening situation in the country under control, it will give room to anarchy.In the light of the above which this paper attempt to address.\n\nConceptual Framework for Analysis\n\nSecurity could be defined as the relative freedom which individuals, groups and nations enjoy from danger, risk, or threat of harm, injury, or loss to personnel and/or property. The cause, whether deliberately or by accident or for the state of being certain, adverse effects by some agent under defined conditions. It is also seen as the degree of resistance to, or protection from, harm and it applies to any vulnerable and valuable asset, such as a person, dwelling, community, nation, or organization. According to the Institute for Security and Open Methodologies (ISECOM) in the OSSTMM 3, security provides “a form of protection where a separation is created between the assets and the threat.” These separations are generically called controls, and sometimes include changes to the asset or the threat. However, if whatever went contrary to the above, this shows that there was insecurity.\n\nSince Boko-Haram insurgency and other terrorist acts took over some parts of Nigeria, particularly the north-east, it gained international attention & recognition and become a major national menace more especially after the kidnapping of Chibok girls from their schools in Borno state. Others include the killings and slaughtering of students in their dormitories in Buni-Yadi and Potiskum all InYobe State and later the kidnapping and abduction of other women and children from their homes and communities. Due to these criminalities and terrorist activities, so many local government areas in Adamawa, Borno and Yobe lost to the Boko-Haram and remained under their control for almost two years from 2013-early to second quarter of 2015.\n\nThe question is why is there so much insecurity in our societies today? What are their causes, solutions etc? In an attempt to answer these questions, the researcher used frustration-aggression theory to explain the causes of insecurity in Nigeria. Frustration is the condition which exists when a goal-response suffers interference such as unemployment, poverty, corruption, weak judiciary system etc. While aggression could be regarded as an act whose goal-response is injury to an organism the theory believed that social movements occur for example the formation of ethnic militias in the country to fight the federal, state and local government due to their failures to oblige the social contract obligation. As a result, their frustration leads to collective and more often than not lead to aggressive behavior. Frustration has a variety of sources and can take two forms. First, it can be absolute, which happens when people do not have enough to survive, and second, it can be relative, which happen when people have enough to survive but have less than those around them. This explained the true situation of the Nigerian society today. The gap between those “who have and have not” are getting wide and wider day by day.\n\nThis hypothesis or theory of aggression was propounded by John Dollard, Neal E. Miller et al. in 1939, and further developed by Leonard Berkowitz in 1969. The theory says that aggression is the result of blocking, or frustrating, when a person’s efforts to attain a goal failed to achieve the said objective, it causes violence. The researcher adopted this frustration-aggression theory to explain the causes of violence and insecurity. This became apparent when the source of the frustration cannot be challenged, the aggression gets displaced onto innocent targets as currently is being done by the Boko Haram sect. However, while violence and other related terrorist activities are condemnable in any society and must be fought at all cost, government must address these causes of insecurity or else whatever the success achieved, it is going to be mirage.\n\n\nAbdullahi, W. (2004),” Beyond the Yobe Taliban War The comet”, Lagos April 29\n\nAdebayo, H. Nadabo, S. (2013) Insecurity in Nigeria: Causes and Resolutions. Retrieved 12/10/2015 www.insecurityNigeria.com\n\nAdeleke, A. (2013) Insecurity: A Threat to Human Existence and Economic Development in Nigeria\n\nAdeyemei,, L. O. (2007) Ethno-Religious conflicts and the Travails of National: Integration in Nigeria in the Fourth Republic. Retrieved 12th march, 2012 from Dawodu.com\n\nAjodo-Adebanjoko A. (2012) Impacts of Corruption on the Nigerian Economy, Department of Political Science, Federal University, Lafia Akinade, A. (2007), Handbook on Corporate and Industrial Security in Nigeria, Lagos Mukugamu & Brothers ent. P. 917\n\nAlbinus, C. (2012) Economic implications of insecurity December, 2012\n\nAlli, W.O. (2012) The Role of Nigerian Regional Security Policy.\n\nAngela A.-A. ; Ugwuoke, O. W. (2014) Poverty and the Challenges.\n\nChikwendu, C. U. (1997) Indiscipline in Nigeria: causes, patterns and intervention and implications for development. Journal of opinion, vol. 25 No.1. 1997\n\nChimobi Ucha (2010) Poverty in Nigeria: Some Dimensions and Contributing Factors Global Majority E-\nJournal, Vol. 1, No. 1 (June 2010), pp. 46-56", "pred_label": "__label__1", "pred_score_pos": 0.8719272017478943} {"content": "Sibeal has always known that she is destined for a spiritual life, and is committed to it with all her heart. The only thing left for her to do before she enters the nemetons is to spend the summer visiting her sisters, Muirrin and Clodagh, on the northern island of Inis Eala.But Sibeal has barely set foot on the island before a freak storm out at sea sinks a ship before her eyes. In spite of frantic efforts, only three survivors are fished alive from the water, and one of them, a man Sibeal names Ardal, clings to life by the merest thread.Life continues on the island, as it must, and Sibeal befriends Ardal as he begins to regain his health. But it becomes clear there is something unusual about the three shipwrecked strangers. Why won't the beautiful Svala speak? And what is it that the gravely ill Ardal can't remember – or won't tell? When a visiting warrior is found dead at the bottom of a cliff, and an attempt is made on Ardal's life, Sibeal finds herself a pawn in a deadly game. The truth will be far more astonishing than she could ever have believed – and the consequences for Sibeal unimaginable.\n", "pred_label": "__label__1", "pred_score_pos": 0.9793436527252197} {"content": "What future shall we choose? Equality or inequality? Deep democracy or more limited forms? Sustainability and wise stewardship of resources, or exploitation for profit? You have a good idea of where current systems are taking us. A viable alternative path exists, and that path is science based.\n\nIn March 2018, Bloomberg news reported that income inequality in the United States had hit a disturbing new high. Not unlike atmospheric carbon dioxide, income and wealth inequality in the United States have been rising since at least the 1980s, under Democratic and Republican presidents, and Democratic and Republican Congresses. The Occupy Wall Street movement crystallized public attention on inequality in 2011 with its slogan “We are the 99 percent.” In 2014 the French economist Thomas Piketty wrote a masterful book on the subject that became a global best seller. His take-home message? Capitalism itself produces severe income inequality.\n\nYet with all the written words and public discourse on inequality, very little attention has been paid to its complement, income and wealth equality (or near-equality, essential equality). That discussion is long overdue.\n\nObviously, severe inequality of income and wealth benefits those at the top. But what about everyone else? Pick any dividing line, say the 70th, 80th, 90th, or even 99th percentile of family income or wealth. It’s difficult to argue that inequality helps those below the line as much as those above it. If it benefits everyone evenly, there would be little reason to prefer the 60th over the 40th percentile, for example, or the 90th over the 60th.\n\nBut we do have preferences. We toil and sweat, even sometimes step on each other’s heads, in hopes of climbing one rung higher. Higher is almost always preferred to lower, all else being equal. That’s because wealth has real benefits.\n\nThe typical person might prefer being near the top, but to the degree that a society has inequality, he/she will live life closer to the bottom. It’s a mathematical fact, stemming from the lopsided distribution that characterizes inequality. Perhaps that’s why the American public apparently views income equality as the ideal. But if equality is the ideal — if it’s the fairest arrangement for the whole — why is inequality still a thing?\n\nPerhaps it’s still a thing because the public doesn’t realize that equality is a viable choice, or that inequality is as extreme and corrosive as it is. Income and wealth equality (or near-equality), combined with deep democracy and deep transparency, are highly desirable and urgently needed. An R&D project is introduced here that could make them achievable. The carrot to spur action is the potential for greatly improved public health and wellbeing, including the elimination of poverty, a cleaner and more stable environment, reduced violence, and greater economic security. I claim that all these and more are achievable in our lifetime. The stick to prod action is the impending collapse of both the environment and civilization, possible in our lifetime or that of our children, if we fail to implement fundamental change.\n\nTo set the stage, let’s start with some basics.\n\nIncome and Wealth Inequality = Inequality of Influence\n\nMoney is power — the power not just to obtain material things, but also to influence others. It already serves as a de facto voting instrument in our (mostly undemocratic and un-transparent) economic systems. Those individuals and corporations with the most money have the most say — the most votes — in where investments flow, what get produced, where it is produced, at what pay, and creating what wastes and so on for long list of economic and financial decisions that affect the vitality and wellbeing of families and communities, even of whole regions and societies. Sometimes the public bands together, such as in a boycott, to use its combined economic voting power. But the basic equation remains the same. One billionaire has, roughly speaking, a billion times more influence on society than the average person.\n\nIn addition to economic decisions, a wealthy individual or corporation can have greater influence over political decisions (via contributions to candidates and political parties), legal decisions (via hiring expensive and connected law firms), science (via donations to colleges and research foundations), public welfare (via donations to favorite nonprofits and pet projects) and public discourse (via public relations campaigns, funding for media projects, and the purchase of media advertising, not to mention ownership of media).\n\nFor anyone who wonders about the power of wealth over politics, professors Martin Gilens (Princeton) and Benjamin Page (Northwesten) published a now-famous study in which they concluded that “economic elites and organized groups representing business interests have substantial independent impacts on US government policy, while average citizens and mass-based interest groups have little or no independent influence.” Their explosive conclusion was criticized on several grounds, to which they published rebuttals.\n\nApparently, the public agrees with Gilens and Page. A 2017 Associated Press poll found that 75 percent of Americans — across political, economic, racial, and geographical lines — agree they have too little influence over the decisions made by elected officials. Eighty-two percent agree that the wealthy (followed by large businesses, political lobbyists, and Wall Street) have too much influence. No wonder public confidence in Congress is just 6 percent. Half of US 18- to 29-year-olds believe that today’s politics are unable to meet the country’s challenges, and a majority reject both socialism and capitalism.\n\nSimilar problems of inequality — of income, wealth, and influence — are seen within other nations. Some fare better than others. Worldwide, the richest 42 people hold same wealth as the 3.7 billion poorest.\n\nGiven that money is akin to economic (if not political and legal) votes, it should come as no surprise that inequality of income and wealth are dangerous to the long-term sustainability of a society and civilization. As the wealthy wield greater influence year after year, decade after decade, they shape to their advantage both public discourse and the structure and function of political, legal, and economic systems. This happens not because the wealthy are evil or even very different from you and me. Practically any group of wealthy would do about the same. Those who have massive resources, especially in a system with insufficient checks and balances, quite naturally tend to use their resources to secure and improve their standing and to bend systems to their will. Moreover, they tend not to use resources in ways that would negatively impact that standing.\n\nThe long-term result is a public narrative, and political, economic, and legal systems, that benefit the wealthy far more so than others. This in turn causes societies to focus on solving the short-term problems of the influential, while too often disregarding the long-term problems of common people and the environment. As could be expected, unsolved problems accumulate and worsen over time, and eventually reach a breaking point.\n\nWe Are in Trouble\n\nGlobal civilization faces a number of difficult, some scientists use the term wicked (as in highly complex and intractable), problems. These include pollution, habitat loss, soil erosion and degradation, exhaustion of underground water supplies, climate change, political and financial instability, epidemic rates of largely preventable chronic disease, waves of economic, political, and environmental refuges, proliferation of nuclear and biological weapons, and the militarization of society. New wicked problems loom on the horizon, including legions of killer robots, high unemployment due to robotics, and even larger waves of economic, political, and environmental refugees.\n\nAll existing major problems are intertwined rather than independent. It is perhaps due to interactions that the rate of species extinction is now so high that scientists warn the sixth great extinction may have already begun. During the fifth, about 66 million years ago, 76 percent of all species perished. No land mammal much larger than a cat survived.\n\nOur great suffering might not be far off. The risk of systems collapse, even mass die-off of humans, in our lifetime or that of our children may be dangerously high. To reduce risk, we have urgent need for a dramatic shift in trajectory. The time for tweaks and nudges has long since passed.\n\nIn making sense of how we arrived at the precipice, and what to do about it, keep in mind that all of our major problems were predicted. Scientists and others have been ringing alarm bells for decades. As one example, in 1992 the Union of Concerned Scientists and more than 1,700 independent scientists, including the majority of living Nobel laureates in the sciences, issued a stern “Warning to Humanity.” They outlined major problems, including climate change, and urged us to take swift action to prevent catastrophe. Of the many problems mentioned, only one, ozone depletion, has been somewhat successfully addressed (although now new production of banned chemicals is suspected). The other problems still haunt us.\n\nAn updated version of the warning was published in 2017, this time with more than 15,000 signatories and an even more urgent call for change.\n\nLet’s pause for a moment and collect some pertinent facts. Humanity is at risk. You and your children are at risk, not some nameless generation far in the future. Serious problems have been left unsolved, even though common sense solutions have been available. All this has occurred under, or has been coordinated through, political, economic, and legal systems, and systems of public discourse, over which the wealthy have massive influence. The very structures of these systems, not just their policies, favor the wealthy.\n\nStresses are already being felt in societies worldwide, and still our political, economic, and legal systems seem incapable of implementing adequate solutions. There is no viable global plan to avert extreme climate change, or for that matter, extinction of the human species. The 2016 Paris Accord, our Hail Mary pass for climate change, increasingly looks like a failure. As we hurtle dangerously closer to collapse, our systems appear increasingly dysfunctional. Public trust hovers not far from zero.\n\nAs public strain, anger, and fear mount, populations are becoming more polarized. Authoritarianism is gaining ground — global democracy indexes have been falling for more than a decade. In coming years we shouldn’t be surprised to see currently stable nations and alliances splitting apart. If public trust continues to fall, power will naturally shift toward local control, which could in some cases be corrupt or authoritarian. Neither the United States nor the European Union should consider itself immune from splintering.\n\nTrajectories of societies are difficult to change. Change takes time. In that sense we are now so close to the edge that some degree of catastrophe may be unavoidable. Yet I believe we can greatly reduce the extent of damage and loss of life, and speed a recovery to thriving societies. Progress will depend on whether we acknowledge our current danger with sobriety. In particular, we can ask ourselves if we believe that the systems by which we organize society — political, economic, and legal — are likely to deliver an eleventh-hour dramatic shift that can steer us away from the cliff. If that answer is no, or even probably not, there are options. Good options.\n\nTo be clear, important and laudable efforts have been and are being made within the confines of existing systems. It is crucial that such work continue. Improvements and reforms can ease suffering and provide some additional time. For example, the global rate of extreme poverty has been falling for decades. And investments in green energy are on the rise. But wonderful as they are, these efforts are largely too little, too late, and/or too piecemeal to sufficiently change our overall trajectory. Indeed, some major factors are hardly addressed at all, including inequality of influence due to extremes of income and wealth.\n\nThink of political, economic, and legal systems as the mechanisms by which people self-organize to make collective decisions. That is, think of them, in the ideal, as problem-solving systems. Or, because learning and problem solving go hand in hand, think of them as learning systems. Then it is easy to see that current systems are dysfunctional. The fact that societies and civilization now teeter on the edge of destruction strongly suggests that our decision-making, problem-solving, learning systems are grossly inadequate.\n\nFurther, we can expect them to remain grossly inadequate as long as wealth and influence remain concentrated. They will continue to be used to solve the short-term problems of the influential, and to block otherwise positive actions that would negatively impact those who hold power.\n\nFunctional systems would almost certainly distribute decision-making power far more evenly, perhaps via some form of deep democracy (including deep economic democracy), and would embrace transparency, reward cooperation rather than vicious competition, and excel by design as decision-making, problem-solving, learning systems. Greater access to quality and affordable education would also play a role — the more individuals learn, the more likely it is that their societies will make wise and informed decisions. So too would latest advancements in fields such as cognitive and computer science regarding meta-learning, or learning to learn.\n\nThese would be transformations, not tweaks. Many of the institutions we now take for granted — capitalism, stock markets, private ownership of intellectual property, for-profit investments, and representative democracy — would likely be barely recognizable in our better future. They would be (gradually) replaced with institutions of new designs that are demonstrated in scientific field trials to be among the best in class at elevating the common good.\n\nIf we don’t make a timely transition to functional problem-solving systems, it won’t matter much in the end if electric cars can drive themselves, power comes from the sun, or financial transactions are recorded in blockchains. Even the best of piecemeal improvements won’t be enough to keep us from destroying ourselves, and perhaps also life on the planet.\n\nThat’s because our problems, at the core, are not caused by a lack of technology per se, or entrepreneurial spirit. They are not even caused by too many bad apples in leadership roles, although these exist and don’t help (and serve as yet another sign of dysfunctional systems). Our problems, at the core, are caused by inequality of influence, combined with lack of transparency. Our systems reward greed and selfishness, rather than cooperation. Further, we have failed to recognize that all of life on Earth is connected in one big complex adaptive system — all living things are our cousins, and we thrive when they thrive. Finally, we have failed to recognize that economic, political, and legal systems either excel as decision-making, problem-solving, learning systems, by design, or they self-destruct eventually under the weight of unsolved problems.\n\nTo summarize, I argue that the designs of our political, economic, and legal systems are inadequate for the purpose of solving pressing problems and we shouldn’t count on these systems to steer us away from disaster at the last moment.\n\nApparently, I’m not alone in holding this view.\n\nAccording to a 2015 poll, a majority of adults in the United States, Canada, Australia, and the United Kingdom believe that their normal way of life will end within the next 100 years. Almost a quarter of respondents rated the probability of human extinction as 50 percent or greater.\n\nEven some wealthy seem to agree. They are buying rural land, planning escape routes, and securing provisions in case civilization starts to crumble. A growing band of rich Americans, including some Silicon Valley giants, are building safe havens in New Zealand and elsewhere.\n\nIf there ever was a moment to wonder, as a child might wonder, why we don’t live in a healthy, secure, peaceful, and sustainable world, that moment is now.\n\nSolving Problems that Matter\n\nGiven that civilization faces existential threat, we might start by asking if human nature is to blame. Are we as individuals fatally flawed? Maybe the dysfunctions in our economic, political, and legal systems simply reflect dysfunctions at our core.\n\nAbundant evidence suggests this is not the case. Biologically, we are a wonder. We and other mammals are composed of billions if not trillions of cells that as a whole display levels of cooperation and integration that are nothing short of awe-inspiring. Biologically, we exist because of cooperation. It pervades us.\n\nCooperation is one of nature’s favorite strategies for survival — it can be seen in cells, and also in species across the spectrum, including molds, insects, and mammals. Humans display it to an extreme degree. We are deeply social by nature no matter what part of the globe we hail from. We instinctively favor cooperation and value fairness. It makes us feel good to help others, exercise creativity, and to love.\n\nThat’s no accident. The long path of evolution, over countless ancestral species, has inserted core needs like love and the desire to help others deep into our biology. Some investigators have proposed categories of core human needs. The economist Manfred Max-Neef recognizes nine: subsistence, protection, affection, understanding, participation, leisure, creation, identity, and freedom. Others, including the psychologist Abraham Maslow, propose somewhat different arrangements. However we define them, core needs make our survival more likely by focusing our attention on solving problems that matter. These are the problems or challenges that relate to core needs. These problems impact our vitality, sustainability, and wellbeing, and so hold meaning for us as individuals. By extension, they hold meaning to us as societies.\n\nHumans are gifted problem solvers (when not overly stressed, manipulated, distracted, misinformed, exhausted, etc.). One could even say that problem-solving is our natural, or ostensible purpose. Our needs drive us forward and keep us focused on solving those problems that hold meaning. And therein lies the disjoint between who we are at our core and the means by which we make decisions at the collective level, via current economic, political, and legal systems. In short, our external systems poorly reflect who we actually are. They poorly reflect our purpose and thus represent a distortion of ourselves. While not completely dysfunctional, they are so grossly inadequate as to be dangerous in the long run.\n\nIf you are unconvinced that our systems poorly reflect who we are at our core and what we value, consider that billions of people have little interest in their jobs, apart from receiving their paycheck. Worldwide, only about 13 percent of employees are engaged in what they do for a living. This is a sure sign that our systems waste our talents, ideas, interests, and time. And it’s a sign of servitude, or forced labor.\n\nWe are programmed by evolution to solve problems that matter and to rise to challenges. If we want our economic, political, and legal systems to reflect this natural purpose, that is, if we want them to be fit for purpose, we will have to consider completely new designs.\n\nWe have the tools, science, knowledge, and urgent need to design new systems. I suggest that we also have a viable strategy by which to develop, test, implement, and monitor new systems.\n\nEngage Global, Test Local, Spread Viral\n\nIt’s no small task, of course, to design and implement new systems. But that doesn’t mean it’s impossible, or even impractical. In fact, it might be far easier than most would imagine. The trick is to understand that existing systems cannot be directly replaced. Abrupt replacement would be too disruptive, expensive, risky, and difficult.\n\nIn contrast, out-competing existing systems, gradually but predictably, offers a relatively smooth, affordable, low-risk, and viable path forward. If you can out-compete, direct replacement isn’t necessary.\n\nThe suggested strategy is to address each of the five primary characteristics that influence the rate and spread of new technologies and ideas: relative advantage, compatibility, complexity, trial-ability, and observability. The task is to demonstrate the potential benefits of new systems, for individuals and families, first by computer simulations and then by scientific field trials in real communities. Design new systems to function locally, at the community level, via a club model, so that a whole city doesn’t need to start at once. Make participation voluntary and free. Create friendly and effective user interfaces and tools. Finally, design new systems to complement, even stabilize, current ones. In short, make the barriers to participation low and the rewards high.\n\nIf this is done, there will be early adopters, just as with any technological innovation. If the new systems work as designed, others will follow, first in trickles, then in waves. I call this strategy engage global, test local, spread viral.\n\n\nThe global part is an R&D program aimed at engaging the science, engineering, and technology communities, as well as grassroots groups and others, in developing defensible answers to two simple, powerful, but largely unexplored questions:\n\n1. Out of all conceivable designs for social choice systems, which designs have greatest potential to minimize systemic risk and maximize collective wellbeing at multiple scales — local, regional, and global?\n\n2. How is system quality best measured and monitored?\n\nHere the term social choice systems refers to the rules and mechanisms by which a community or society organizes to make decisions, solve problems, and coordinate actions. Thus, social choice systems span all aspects of self-governance, including political-legislative-electoral, economic-monetary-financial, legal-justice, educational, data collection and forecasting, and more.\n\nNot all social choice system designs are functional or sustainable. The goal of the R&D program is to identify, test, develop, model, monitor, and promote those that are demonstrated to be among the best at minimizing systemic risk and maximizing collective wellbeing — physical, mental, social, environmental, and more. Think evidence-based self-governance, akin to evidence-based medicine.\n\n\nTest local means that after passing extensive computer simulations and laboratory studies, new systems undergo scientific field trials hosted by local clubs. The new systems act like an overlay to existing systems, offering an extra layer of coordination and cooperation. A field trial could occur with as few as about 1,000 volunteers, just a small percentage of the population in many urban centers. Further, no local or national legislative action is necessary to start a trial in most areas.\n\nIf systems are well designed, they will produce large benefits for club members. To give some idea, a computer simulation of a prototype local economic system illustrates how a small US county (Lane County, Oregon) could eliminate poverty, nearly eliminate unemployment, and more than double median family income, all while bringing deeper democracy to local economic and financial choices. What administration of a US county does not want a higher tax base? What family does not want a higher and more secure income, or better quality of life?\n\n\nGiven expected benefits, clubs will naturally expand in size, and new clubs will form in new locations. This is the viral part. Clubs are also networked, and as they grow in number and size they increasingly cooperate in matters of trade, education, health, environmental protection, and other aspects of collective wellbeing. Similar to individual clubs, networks of clubs also make decisions through new forms of deep democracy, economic and otherwise.\n\nAs discussed in the R&D proposal the club model could achieve semi-global spread of new systems within several decades. Clubs that organize to host a scientific field trial would be among the first to experience new systems. A club would likely be active in your community within about 11 years of the first implementation. Within about 25 years of the first implementation, more than a hundred million individuals around the globe could be participating in a local system. Within the first 35 years, more than a billion could be participating. All could happen more quickly if public acceptance runs high.\n\nThis is to say that, within the lifetime of most alive today, a semi-global shift to new, vastly improved social choice systems, complete with greater cooperation and higher wellbeing, is possible.\n\nA Visualization\n\nIf you need help visualizing what the club model might offer, imagine seeing this ad, posted by your local club.\n\nHelp Wanted: Join our large and growing team of engaged, creative individuals. Thousands of local opportunities in teaching, small-farm and small-business management, technology and open-source development, research, medicine, media, arts, and more. Interest in cooperation and helping others and the planet a plus. Free health care, child care, and training provided. Great job security, full retirement benefits, and a healthy working environment. Annual salary equivalent of approx. $110,000 per family, adjusted for inflation. 30-hour work week.\n\nOn inquiring, you learn that the salary is given for life, whether you are working or not. The club views money as a semi-formal voting instrument, a tool in its arsenal of economic direct democracy. As such, every family makes about the same high salary and so has about equal voting power over the club’s economic and financial decisions. New forms of digital money, local money managed by the club, supplement the national currency. The local currency aids economic direct democracy and acts as a type of buffer or protective bubble to cushion the club from the ails of the greater economy.\n\nThe club manages itself via a form of direct democracy, which gives you fair influence over the club’s decisions and actions. Dashboards of pertinent trends allow members to monitor progress and predict future conditions. Rich information helps members to make wise decisions. Unlike Facebook and Google, participants in these clubs own and control their own data. Each person decides who can access his or her data, when, for what purpose, and for how long. The core infrastructure is available via an open source or similar license, so the club has complete access to and control over its own system, from the ground up.\n\nWhich Path?\n\nWhen Facebook first rocketed to global success, many were surprised to see that humans had such a pent-up need to communicate and share. In comparison to what lies ahead, Facebook may be just a warm-up exercise. The next step is bigger and more exciting. It addresses a need that is more pent up, closer to the bone, and more encompassing of purpose — the need to solve problems that matter, to communicate and share for a meaningful purpose. To achieve shared goals. To flourish.\n\nThe big hurdle is funding, although the R&D cost is not excessive. In fact, the budget is small enough that just a tiny percent of the world’s population — just a tiny percent of, say, young adults, alone, could fund it. Or a tiny percent of women, teachers, nurses, or college students, alone, could fund it. One percent of the world’s PhD’s, alone, could fund it. (And maybe they should, along with their students; the path puts science — the discovery of truths, and learning how to learn — at the center of collective flourishing.)\n\nIn case you are wondering, no R&D program like this exists, anywhere in the world. Not in any university. Not in the nonprofit sector. The issue, again, is funding. I am confident that if a secure source of funding were available — for example, a small annual commitment by millions of individuals — the response by the academic, scientific, and technology communities would be large and positive.\n\nWhat future shall we choose? Equality or inequality? Deep democracy or more limited forms? Sustainability and wise stewardship of resources, or exploitation for profit? You have a good idea of where current systems are taking us. A viable alternative path exists, and that path is science based. Time is running out. By action or inaction, you will bet your life on some path. Whichever you choose, there are risks. What will it be?", "pred_label": "__label__1", "pred_score_pos": 0.9823451638221741} {"content": "Mission Statement\n\n\n\n\nOur Principles\n\nScience and Technology.Education.Environmental Protection.Economic Development and Progress.Public Healthcare.Evidence Based Policies.Open and Efficient Government.A Compassionate Safety Net.Migration.Individual Freedoms.Ending Discrimination.Secular Government.\n\n\nOur Vision\n\nThe Science Party believes that our quality of life is improved primarily through technological developments, sourced through a scientific approach to knowledge in the context of democracy and peace. Technological development is something that we can all be excited about and should try to accelerate. We, as a society and as individuals, should plan the future in order to maximise the benefit we derive from our technological development. We see innovation, education and economic reforms as key to the success of Australia.\n\nModern technology allows rapid change in the nature of society. It can give all people a higher quality of life, greater knowledge, and greater participation in democracy. Technology should be allowed to develop as quickly as possible to maximise the benefit to people living both now and in the future. The speed at which technology should progress should only be limited if it is unsafe or economically infeasible to achieve. The benefits that technology brings should not be hindered in ways that the old economies were controlled; in particular, the internet and related communication technologies should remain uncensored, and should have the freedom to fulfil its primary purpose: mass-producing information and spreading it in an efficient and expedient manner.\n\nWe believe in a positive future for all people; a future where people are healthier, wealthier, longer lived and more free. While it is tempting to view the world as getting worse, due to the easier flow of information, every passing decade has brought substantial improvements in our quality of life. Modernity has brought stability, freedom, abundance, health and happiness to the world. The Science Party is committed to ensuring that these advancements are well spread throughout society, to all Australians and around the world. We see the world accelerating quickly, and want to ensure the bottom rises faster than the top.\n\nA positive outlook on the future can boost the development of the economy. Optimism encourages investment, accelerating technological advancement. A positive outlook in our personal lives also improves our prospects as individuals. Only when we believe that our situation can be improved can we be motivated to improve our skills. This optimism can only exist in a world where investment truly leads to opportunity. The Science Party wishes to change the personal, political and corporate culture to embrace the future and the benefits technology and reform will bring.\n\nWe provide an alternative to the reactionist policies of other parties. Those policies are based on reactions to current events, often with short term views as to the changes that need to occur to appease those who are affected by these changes. While new policies in response to current events are sometimes necessary, government, corporations and individuals can and should plan for long-term goals and outcomes.\n\nTechnological development is something that all people play a part in. All people are capable of using their intelligence to solve problems, to work more efficiently and create new inventions, no matter how small, in almost any field. People are also directly involved in the implementation of new technology in their homes and workplaces, where they must make choices about what technology to use and how to use it.\n\nWe believe that the economy should be directed such as to maximise technological development and adoption where it is advantageous and safe to do so.\n\nThe Science Party aims to make Australia a technologically advanced country with a high quality of life for all its citizens and residents.", "pred_label": "__label__1", "pred_score_pos": 0.9922792911529541} {"content": "Qnt 351 week 5 team paper\n\nExplain the actual descrptive statistics you calculated and what it may be telling you and the situation with the company. What are the four data measurement scales? What assumptions are necessary to ensure the validity of the inferential procedures applied in parts a-d?\n\nUse the statistical tables given in the appendices as before Use the numerical data calculated from earlier weeks provide all data in Excel tables and graphs. Explain how the mean of the means is equal or not to the population mean of the listing prices from above.\n\nWeek 2 Discussion Questions Can mean, median, or mode be calculated from all statistical data? Can the probability be more than 1 or less than 0? Documentsdocuments similar to qnt week 3 connect problem ip carouselcarousel previouscarousel next10es 1 minitab-anovaconstructivist problem based learning techniquemb set 2chisquare-queschpt5 text answersmining graph patternsstatistics from googlelab 12 practice 1 m.\n\nAlso submit your excel file where you calculated the descriptive statistics in Excel.\n\nQNT 351 PAPER Real Success / qnt351paper.com\n\nChoose the correct answer bellow. In to add this to watch video is queuequeuewatch next video is week 3 connect problem cribe from arthur thorne?\n\nInclude the following in your paper: Week 3 Discussion Questions What are the differences between probability and coincidence? They has provided a platform for talented individuals to come together to help students do well in their assignments, homework, thesis, term papers and projects.\n\nUniversity of Phoenix Material: Code the data if you have not done so. Why does the significance level differ among industries? Why is the population shape a concern when estimating a mean? Compare the results of the two tests you conducted.\n\nIn the production of commercial eggs in a region, four different types of housing systems for the chickens are used: How would you define dependent and independent variables? Explain how to calculate the z-test static.\n\nDo Not Exceed 3 pages. What is the importance of statistics in business decision making? Identify the level of measurement used for each How would you define a variable? Identify types of data collected—quantitative, qualitative, or both—and how the data is collected.\n\nThe result are given in the table. The characteristics of eggs produced from the four systems were investigated.\n\nUOP QNT 351 Week 1 Individual\n\nWhat proportion of the variation in listing price is determined by variation in the square footage? Review the data and for the purpose of this project please consider the listing prices as a population. Identify the level of measurement for each of the variables involved in the study. You are consulting for a large real estate firm.\n\nWhen is the mean the best measure of central tendency? Directly below the graph you are to have one paragraph explaining what the graph is telling you so the reader can see it as well.\n\nRevise the report submitted in week two based on the feedback provided by the instructor in the team assignment, and insight gained by e the data included in bims case study part 1 by computing descriptive statistics in the form of tables, charts, measures of central tendency, and e a 1, to 1,word report of conclusions drawn from the data and make recommendations to the t recommendations by citing literature consistent with apa id will be kept the code in the box below:QNT WEEK 3 Sampling Distributions – Real Estate Part 2 QNT WEEK 3 Sampling Distributions – Real Estate Part 2 Use the real estate data that you used for your learning team project that was due in Week 2.\n\nQNT week 2 assignment (data collection) MHA week 4 concept paper; CIS computer program design week 9 assignment 2 Psych week 4 individual assignment research-bas DBM week 4 individual assignment normalization CRJ week 4 assignment 2 internal and external CRJ Week 5 assignment 3 Technology Influences.\n\nQNT 351 Week 3 Team Study Guide – Summarizing and Presenting\n\nQNT Week 5 Learning Team Assignment Analyzing and Interpreting Data Paper and Presentation QNT Week 4 Individual Assignment Descriptive Statistics and Interpretation QNT Week 1 Individual Assignment Statistics in Business $ QNT WEEK 5 Real Estate Regression Exercise QNT WEEK 5 Real Estate Regression Exercise.\n\nQNT WEEK 5 Real Estate Regression Exercise Complete the Real Estate Regression Exercise.\n\nQNT 351 WEEK 4 Reflection\n\nFormat your paper consistent with APA guidelines. Click the Assignment Files tab to submit your assignment. Directions: Use the real estate data you used for your Week 2 learning team assignment. WEEK 5 Real Estate Regression Exercise QNT Complete the Real Estate Regression Exercise.\n\nPerform needed analyses in Excel.\n\nQNT 351 PAPER Expert Study / qnt351paper.com\n\nSubmit a learning team evaluation for you and your teammates under the same link that you submit the team assignment., Uncategorized, WEEK 5 Real Estate Regression Exercise QNT Whether you need help writing. Study Flashcards On qnt week 4 learning team assignment learning team reflection at lietuvosstumbrai.com Quickly memorize the terms, phrases and much more.\n\nlietuvosstumbrai.com makes it easy to .\n\nQnt 351 week 5 team paper\nRated 5/5 based on 18 review", "pred_label": "__label__1", "pred_score_pos": 0.9079312086105347} {"content": "Wiki information Pakphu:\n\nChokdee Pakphu\nMusician, Musician, Person\n\nChokdee Pakphu is a member of Thai Musical Group Grand EX.\n\nPakphum Wongjinda\nActor, Person, Film director, Film writer\n\nPakphum Wonjinda, Thai: ภาคภูมิ วงศ์จินดา, is a Thai film director and screenwriter. His first screenplay was for the horror-comedy, Body Jumper, which was based on a Thai ghost folktale. He made his directorial debut in 2004 with the...", "pred_label": "__label__1", "pred_score_pos": 0.9765094518661499} {"content": "Nescafe Coffee Mugs\n\nMaterial: stoneware\nColor: red\nMin.Order Quantity: 1000pcs\nSupply Ability: 50000 Piece/Pieces per Day\nPlace Of Origin: Liling city Hunan Province China (Mainland)\nChat Now\n\nProduct Details\n\nCan you microwave glazed ceramics?\n\nIt is food safe, and is thicker and heavier than fine china. It is meant to be used and loved every day, not just for display. It may be put in the dishwasher, oven, and microwave. However, pottery is breakable and should be protected from obvious shocks like dropping it and from sudden changes in temperature.\n\nAre ceramic mugs dishwasher safe?\n\nCeramic mugs are safe for the dishwasher, while porcelain should be washed separately by hand. The mug's handle should be turned away from any other dishware to avoid damage.\n\n\n30 days for MOQ\n\n\n4-7 days\n\n\n\n\n\n\n\n\n\n\n\n\nFast sample and delivery.\n\n\nMicrowave, oven, freezer and dishwasher safe.\n\n\nCan you microwave stoneware mugs?\n\nA stoneware item won't necessarily damage your oven, but it will likely get very very hot. Instead of your food heating, instead it will be your dish that heats. ... TL:DR -Stoneware is generally not a good choice for a microwave oven. You should stick to glass, plastic, and microwave safe ceramics.\n\nAre ceramic travel mugs good?\n\nWe found both ceramic options to be too heavy for toting around, and the double-walled ceramic option didn't retain heat well enough to be considered a strong contender. However, Ello's two vacuum-insulated stainless steel mugs hold heat well, are shockingly spill-proof, and look good.\n\n\nIs Bone China better than stoneware?\n\nDurability. Stoneware is extremely strong, non-porous and opaque.It is also non-porous, but unlike stoneware is translucent. While bone china is similar to porcelain in its light weight, bone china does not chip easily, according to Potter\n\nHow do you test for lead in ceramics?\n\nLead-containing glazes or decorations on the outside of dishes or non-food surfaces are generally safer to use. The only way to determine if certain crockery has lead is to test it. Home test kits can tell you if the dishes have leachable lead. These tests are most useful in detecting high levels of lead.", "pred_label": "__label__1", "pred_score_pos": 0.5753849148750305} {"content": "Friday, October 25, 2019\n\nThe National Museum of Alexandria\n\nBy Seif Kamel\n   Alexandria is a city of rich and long history. Established by Alexander\nthe Great during the 4 th century BC, Alexandria served as the capital of\nEgypt for centuries. This is why the city hosts a large number of various\nmonuments and historical sites.\n   Many of the findings explored all over Alexandria are displayed at the\nNational Museum of Alexandria. There are more than 2000 exhibits\ndating to different periods of the history of Egypt. Several tours to\nAlexandria include a visit to the National Museum.\n   There are exhibits dating back to the Pharaonic, Greco, Roman,\nByzantine, Islamic eras. The latest of the museum dates back to the reign\nof the family of Mohamed Ali.\n\nEgypt link:", "pred_label": "__label__1", "pred_score_pos": 0.6221298575401306} {"content": "Traer Scott\n\nNatural History\n\n\n\nNatural History is a series of completely candid, in-camera single exposure images which merge the living and the dead, creating allegorical narratives of our troubled co-existence with nature. Ghost-like reflections of modern visitors viewing wildlife dioramas are juxtaposed against the taxidermied subjects themselves, housed behind the thick glass with their faces molded into permanent expressions of fear, aggression or fleeting passivity.\n\nThe animals in these dioramas were collected (and killed) by “naturalists” primarily in the late 19th and very early 20th century. Specimens donated to or bought by museums delivered information and exotic delight to the public in an age long before motion pictures or widespread travel. “Collecting” was an extremely popular gentlemen’s hobby in the Victorian and Edwardian years however, the lust for amassing and categorizing flora and fauna, even with the intent of increasing scientific knowledge, often granted adventurers carte blanch for extermination. After decades of over-hunting, climate change, poaching and destruction of habitat, many of these long dead diorama specimens now represent endangered or completely extinct species.\n\nArtist’s website\nLink to the series in Square Magazine", "pred_label": "__label__1", "pred_score_pos": 0.6499418020248413} {"content": "SciELO - Scientific Electronic Library Online\n\n issue74Use of fuzzy logic for the administration of a structural control system based on magnetorheological dampersA two-stage decision support model for a retail distribution center location author indexsubject indexarticles search\nHome Pagealphabetic serial listing  \n\nServices on Demand\n\n\n\nRelated links\n\n • On index processCited by Google\n • Have no similar articlesSimilars in SciELO\n • On index processSimilars in Google\n\n\nRevista Facultad de Ingeniería Universidad de Antioquia\n\nPrint version ISSN 0120-6230\n\n\nRODRIGUEZ-GARZON, Ignacio; DELGADO-PADIAL, Antonio; MARTINEZ-FIESTAS, Myriam  and  LUCAS-RUIZ, Valeriano. The delay of consequences and perceived risk: an analysis from the workers' view point. Antioquia [online]. 2015, n.74, pp.165-176. ISSN 0120-6230.\n\nThis paper addresses the question of how construction workers perceive occupational risks. It is a question that has not been addressed in scientific research. Specifically, we answer the following research questions: what is the perception of risk of construction workers?; what aspects of risk significantly influence the formation of the overall perception of risk?; are there sociodemographic variables that help to understand the perception of risk of construction workers? and if this were the case, then what are these variables and how do they influence them?. Ultimately, it examines the profile of perceived risk, its relation to the delay of consequences and the influence of socio-demographic variables. Respondents filled out a questionnaire in the presence of the survey-taker. The questionnaire was based on the psychometric paradigm, and was comprised of: (a) nine questions, each exploring a perceived risk attribute or dimension rated on a Likert 7-point scale, (b) a question on global risk perception, and (c) categorical questions about socio-demographic issues. The survey was conducted in the city of Granada (Spain). A profile of the construction workers' perceived risk was obtained. Answers to each attribute were above the neutral line (scores above four). The profile shows the risk dimension with the highest score was the delayed consequences of exposure to risk conditions, a dimension that can be related to ergonomics and occupational hygiene. This is a new outcome since traditionally this dimension was given a lower score in the worker's perception. A simple linear regression showed global risk may be explained in terms of the delayed consequences dimension (R2=0.29). Finally, a variance analysis (ANOVA) and several t-tests explored the relationship between this dimension and the sample's socio-demographic variables. To conclude, the delay of consequences is the risk dimension workers perceived as the most critical in their daily chores. In addition, this risk dimension is decisive in creating a high global risk perception. Parenthood, a higher worker category and training are the only socio-demographic variables having an impact on this dimension of perceived risk. Hence, there is a direct relationship between these two variables.\n\nKeywords : perceived risk; occupational hygiene; ergonomics; prevention.\n", "pred_label": "__label__1", "pred_score_pos": 0.8643274903297424} {"content": "Attempt to write a readonly database unity3d forums\n\nDeveloper Forum This forum is only for questions or discussions about working with the mojoPortal source code in Visual Studio, obtaining the source code from the repository, developing custom features, etc. If your question is not along these lines this is not the right forum. Please try to post your question in the appropriate forum. Please do not post questions about design, CSS, or skinning here.\n\nAttempt to write a readonly database unity3d forums\n\nGetting started\n\nA ProGuard configuration is provided as part of the Realm library. Generated getters and setters It supports Mac, Windows and Linux. Stetho-Realm is not officially maintained by Realm. Initializing Realm Before you can use Realm in your app, you must initialize it.\n\nThis only has to be done once. A good place to initialize Realm is in onCreate on an application subclass: Realms can be local or synchronized. A synchronized Realm uses the Realm Object Server to transparently synchronize its contents with other devices.\n\nIn practice, your application works with any Realm, local or synchronized, the same way. Opening Realms Open a Realm by instantiating a new Realm object. The minimal configuration usable by Realm is: To use another configuration, you would create a new RealmConfiguration object: It is important to note that Realm instances are thread singletons, meaning that the static constructor will return the same instance in response to all calls from a given thread.\n\nThe default Realm The RealmConfiguration can be saved as a default configuration. Setting a default configuration in your custom Application class makes it available in the rest of your code.\n\nAll sync related documentation has been moved to our platform documentation Read-only Realms readOnly is only enforced in the current process. It is still possible for other processes or devices to write to readOnly Realms.\n\nRealm: Create reactive mobile apps in a fraction of the time\n\nAlso, any write transaction against a read-only Realm will throw an IllegalStateException. This includes trying to write the schema, so that must be provided initially by some other source. You can do this by bundling a Realm file in assets and using a readOnly configuration: Dynamic Realms When working with a conventional Realm, the model class is defined using RealmObject subclasses.\n\nThis has a lot of benefits with regards to type safety. Dynamic Realms to the rescue! A DynamicRealm is a variant of the conventional Realm that makes it possible to work with Realm data without using RealmObject subclasses. Instead, all access is done using Strings instead of Classes.\n\nOpening a Dynamic Realm uses the same configuration as a conventional Realm but the Dynamic Realm ignores any configured schema, migration, and schema version.\n\nOnly use Dynamic Realms when you need that flexibility. Realm instances are reference counted—if you call getInstance twice in a thread, you need to call close twice as well.\n\nattempt to write a readonly database unity3d forums\n\nThis allows you to implement Runnable classes without having to worry about which thread will execute them: For the UI thread, the easiest way is to execute realm. If you need to create a Looper thread other than UI, you can use this pattern: Setup the handlers using the Realm instance Use the Realm instance This means the Realm instance will be periodically updated to the latest version.\n\nThis lets you keep your UI constantly updated with the latest content with almost no effort! Holding on to an old version of your data is expensive in terms of memory and disk space, and the cost increases with the number of versions between the one being retained and the latest.\n\nThis is why it is important to close the Realm instance as soon as you are done with it in the thread. If you want to check whether your Realm instance has auto-refresh activated or not, use the isAutoRefresh method.\n\nModels Create Realm models by extending the RealmObject base class: The integer types byte, short, int, and long are all mapped to long within Realm.Realm Java is the first database built for mobile.\n\nAn alternative to SQLite and ORMs that's fast, easy to use, and open source. Realm Java is the first database built for mobile.\n\n\nSQL read-only | Adobe Community", "pred_label": "__label__1", "pred_score_pos": 0.923190712928772} {"content": "MWV 5460 TB2004 2 Moisture - ?· content of the cellulose fiber increases, the fiber will increase in dimension and as the moisture content ... MWV 5460 TB2004_2 Moisture\n\n • Published on\n\n • View\n\n • Download\n\nEmbed Size (px)\n\n\n
  • Technical Bulletin

    PaperMoisture and Relative Humidity

    Issue 2005 2

    The major component of paper, cellulose fiber, is

    hygroscopic in nature. A material that is hygroscopic

    will absorb moisture from a damp atmosphere or

    release moisture to a dry atmosphere and, after

    sufficient exposure time, will come into equilibrium

    (balance) with its atmospheric environment.

    All paper encountered in normal situations contains

    some moisture since it is composed of cellulose

    fibers. This normal moisture content will generally

    range between 2% and 10% depending on the type

    of paper, its past moisture history and the atmos-

    pheric conditions to which it is exposed. When

    subjected to extreme conditions the moisture content

    of a paper may range from as low as 0.5% to as high

    as 13%. Many basic properties of paper are greatly

    affected by its moisture content. Paper dimensions,

    flatness, conductivity, strength and fold are among

    the more significant properties influenced by its

    moisture content. These paper properties can be

    very critical to the proper performance of paper and

    therefore, effective control of paper moisture level

    and moisture uniformity is essential for efficient printing

    and converting operations.

    PAPER MOISTURE CONTENT AND RELATIVEHUMIDITY: DEFINITIONS

    Moisture content of paper is the percentage of

    the total paper weight, which is moisture. Moisture

    content of paper is determined by weighing a paper

    sample and, after oven drying, weighing it again.

    The difference in the two weights is calculated and

    expressed as a percentage of the original weight. It

    is the level of moisture in a particular paper that influ-

    ences stability of the critical properties of dimensions,

    flatness, conductivity and strength of that paper.

    Paper, since it is hygroscopic, will exchange moisture

    with its environment until equilibrium with that envi-

    ronment is achieved. The moisture level of paper is

    routinely referred to in relation to the moisture level

    of the environment with which the paper is in equilib-

    rium (Figure 1). The moisture level of an environment

    can be measured in two ways: absolute humidity and

    relative humidity (RH).

    Absolute humidity is a measure of the number of

    grains of water per pound of dry air (7,000 grains

    equals one pound). Absolute humidity is independent

    of air temperature.

    Relative humidity (RH) is a measure of the amount

    of water in the air, at a specific air temperature,

    expressed as a percentage of the maximum

    amount of water the air can hold at that temperature.

    Figure 1. Typical relationship between the moisture content of cellulose-based

    paper and ambient relative humidity

    % Relative Humidity of Air

    Low High

    % P

    aper

    Mo

    istu

    re

    High

    Low

  • Technical Bulletin

    2

    As the temperature of the air increases, its ability to

    hold moisture increases. Air, when heated, will retain

    the same absolute humidity, but its relative humidity

    will be lowered (Figure 2). Conversely, as the temper-

    ature of air decreases, its ability to hold moisture is

    reduced. Air when cooled therefore, also will retain

    the same absolute humidity, but its relative humidity

    will be increased.

    The relative humidity of the papers environment

    is the primary atmospheric factor that affects the

    papers moisture content. When the relative humidity

    of the surrounding air is high, hygroscopic materials

    such as paper gain moisture from it. Paper, exposed

    to conditions of low relative humidity, will lose mois-

    ture to the air. Therefore, it is the relative humidity of

    surrounding air that controls the actual moisture

    content of hygroscopic materials such as paper. It is

    also the relative humidity of air surrounding exposed

    paper which affects those properties of paper that

    vary as its moisture content changes.

    Dew Point is the temperature at which moisture in

    the air will condense on to surfaces.

    Charts and tables are available for the conversion of

    relative humidity to absolute humidity and absolute

    humidity to relative humidity. The absolute humidity

    value is sometimes needed for various calculations

    and measurements. However, it is not of great impor-

    tance in its influence on paper moisture content.

    PAPER RELATIVE HUMIDITY

    Relative humidity, since it is the major factor that influ-

    ences the moisture content of exposed paper, is the

    environmental moisture level measurement used in

    reference to paper moisture level. Paper, therefore, is

    commonly referred to as having a relative humidity (RH).

    Paper relative humidity (paper RH) is defined as

    the relative humidity of the air with which that paper

    is in moisture equilibrium (Figure 1). In other words,

    the relative humidity of an environment in which the

    paper will neither give off nor take on moisture.

    The ideal relative humidity of paper as supplied from

    the paper manufacturer has often been debated. The

    relative humidity of pressrooms and binderies in the

    United States has a known range each year from as

    low as about 10% to as high as 90%. This fact,

    together with the differences in average relative

    humidity in various geographic areas, is largely

    responsible for the difference of opinion regarding

    paper relative humidity.

    Figure 2. Relationship between relativehumidity versus temperature for

    a fixed absolute humidity

    Figure 3. The hysteresis effect and its impact on paper moisture as

    the relative humidity changes

    Temperature, F

    Rel

    ativ

    e H

    umid

    ity

    80

    70

    60

    50

    40

    30

    2060 65 70 75 80 85 90

    Relative Humidity vs. Temperaturewhen RH = 50% @ 70 F

    % Relative Humidity of Air

    Low High%

    Pap

    er M

    ois

    ture

    High

    Low

    END

    START

  • Glatfelter 2005

    Paper manufacturers cannot produce papers with RH

    levels that will allow a given paper to function ideally

    under all conditions. Therefore, the RH produced by

    the papermaker will be a compromise, selected to

    accommodate the majority of all environments in

    which the paper will be processed. Additional factors

    influencing the RH selected by the paper manufac-

    turer for a particular paper are characteristics desired

    in the finished product and limitations that exist within

    the papermaking process.

    Printing papers cannot be manufactured consistently

    at moisture levels which would generate values above

    50% RH in the paper. Appearance characteristics are

    significantly deteriorated at elevated moisture levels.

    This high level of moisture in paper during certain

    processing operations causes both brightness and

    opacity to decrease and shade to vary. Appearance

    characteristics are more easily controlled and main-

    tained during these processing operations when

    paper RH is approximately 40%.

    The desired characteristics of the finished product

    and technological limitations of the papermaking

    process result in practical paper moisture levels

    allowing paper to be produced with relative humidity

    ranging from about 25% to 50%. It has been deter-

    mined that a moisture level generating an RH range

    of 38% to 45% is generally satisfactory for uncoated

    papers and that a slightly higher range, 40% to 45%,

    is satisfactory for coated paper which is produced in

    sheets. Coated papers produced for use in heatset

    printing operations are commonly manufactured

    to have an RH of approximately 30% to aid in the

    prevention of blister problems during the processing

    of the paper on such equipment.

    Naturally, if paper is exposed to an environment

    which is significantly above or below the RH of the

    manufactured product, problems may occur

    depending on the time and conditions of exposure,

    requirements of the particular job, etc.

    PROPER PAPER MOISTURE CONTENT DEPENDSON PAPER CONSTRUCTION

    Paper should be in moisture equilibrium with an

    atmosphere that has a relative humidity of 40-50%

    at 72 degrees Fahrenheit. However, the actual mois-

    ture content of various papers will differ under these

    conditions depending on the individual construction

    of each paper. Similar papers may be encountered

    which, when in equilibrium with the same relative

    humidity environment, have a considerable difference

    in their moisture content. The actual moisture present

    in a particular paper (at a specified RH) is determined

    by the following: fiber (type, purity and quantity), filler

    (type and quantity), adhesives/binders (quantity and

    nature), manufacturing techniques (degree of fiber

    treatment), and the past moisture history of the

    particular paper (Figure 3).

    Paper is routinely manufactured to a moisture content

    specification since the measurement of moisture

    content is more accurate, reliable, and convenient as

    a means of production control. However, the relation-

    ship between moisture content and relative humidity

    of the particular paper must be established in order

    to produce the finished product at the proper relative

    humidity. This relationship is determined by allowing

    the paper to reach equilibrium in a series of different

    relative humidity environments and, in each situation,

    measuring the moisture content of the paper after

    equilibrium has been established. Graphs produced

    using the data points obtained are referred to as

    moisture equilibrium curves. Once the proper mois-

    ture equilibrium curve has been developed for a

    particular paper, that paper can be manufactured to

    be in equilibrium with a specified relative humidity by

    controlling the moisture content of the final product.

    Most paper manufacturers have automatic online

    monitoring/controlling devices to ensure proper and

    uniform moisture content as their products are

    produced on paper machines and coating equipment.

    The paper is processed in areas that are monitored

    and/or controlled and then packaged using materials

    that protect the product from its environment during

    shipping and warehousing. Paper produced today is

    3

  • Technical Bulletin

    4

    more consistent and uniform with respect to moisture

    content than ever before in the history of paper

    manufacturing. When properly packaged and stored,

    paper will retain a stable moisture content for well

    over two years.

    PRECAUTIONS SHOULD BE TAKEN TO PROTECTPAPER MOISTURE CONTENT

    Certain routine precautions should be taken to mini-

    mize the opportunity for paper to exchange moisture

    with an environmentwhere the relative humidity of the

    paper and the environment may differthus reducing

    the possibility of problems related to paper moisture:

    1. Paper removed from a truck, rail car, or an uncon-

    ditioned warehouse should be allowed to reach

    the temperature of the area where it is to be

    processed before being unwrapped.

    2. Paper should not be stored near any type of heating

    or cooling unit, in an air stream of heated or cooled

    air, or in the path of a humidifying stream of air.

    3. Paper should remain in wrappers until immediately

    prior to being processed (this applies to rolls,

    skids, cartons and reams).

    4. Paper being held between processing steps

    should be protected by vapor-proof wrappers

    while awaiting additional processing operations.

    For heatset printing the oven-dried paper can

    be left unwrapped for several days, allowing the

    paper to regain lost moisture.

    CRITICAL PAPER PROPERTIES ARE ALTEREDAS MOISTURE CONTENT OF PAPER CHANGES

    The most significant paper properties affected by

    change in moisture level or the development of a

    non-uniform moisture level within the paper, as

    stated earlier, are: dimensions, flatness, conductivity,

    strength and fold.

    MOISTURE AND PAPER DIMENSIONS

    Paper dimensions increase with higher moisture

    content and decrease with lower moisture content.

    Individual cellulose fibers will change in dimension

    as their moisture content changes. As the moisture

    content of the cellulose fiber increases, the fiber will

    increase in dimension and as the moisture content

    of the fiber decreases, the fiber will decrease in dimen-

    sion. As the cellulose fibers change in dimension due

    to changing moisture content, the diameter (width)

    of the individual fibers will change 2-5 times more

    than their length (their width changes significantly

    more than their length). These individual fiber dimen-

    sion changes communicate themselves to the sheet

    as a whole and depending on the reactivity of each

    particular paper, the paper will change in dimension.

    Figure 4. Nomenclature used in printing and paper manufacturing

    In papermaker terminology, paper in diagrams (a) are grain long paper andpaper in diagrams (b) are grain short paper

    In printer terminology,

    these diagrams illustrate

    both grain short and grain

    long paper being printed

    grain long.

    (a)

    (b)

    (b)

    (a)

    In printer terminology,

    these diagrams illustrate

    both grain short and grain

    long paper being printed

    grain short.

  • Glatfelter 2005

    Since a majority of fibers in paper are aligned parallel

    to the machine direction, it follows that the greatest

    change in dimension due to moisture change will be

    in the across grain dimension. The dimensional

    change will normally range from 1.5 to 2.5 times

    more in the across grain direction than in the direc-

    tion parallel to the paper grain.

    It is for this reason that sheetfed printing papers should

    be processed during printing with the paper grain

    direction parallel to press cylinder axis (Figure 4). Any

    change that occurs in paper dimension will then corre-

    spond to the direction of travel through the printing

    press, and cylinder packing can be adjusted to

    obtain print register. Little, if anything, can be done

    on press to accommodate a paper dimensional

    change that occurs in the across press dimension.

    As a result of these factors, printing papers are

    normally not guaranteed to perform with respect to

    freedom from register and wrinkling difficulties unless

    the paper grain direction is parallel to press cylinder

    axis during the printing operation.

    Dimensional changes in paper, especially when they

    occur during and/or between processing steps can

    be very criticaland in other instances can affect the

    quality of the finished product when they occur after

    the job has been completed. When paper dimensional

    changes occur between press passes during multicolor

    printing, misregister can result. Dimensional changes

    in signatures after binding into books can create

    undesirable appearance and/or quality defects known

    as either starts or buckles depending on whether

    the paper is bound parallel or perpendicular to the

    grain direction (Figure 5).

    Note: All papers do not possess the same reactivity

    to changing moisture content. Papers will react differ-

    ently as their moisture content changes depending

    primarily on the total percentage of hygroscopic

    material (fiber) present in a particular paper and the

    degree of bonding that exists within the paper struc-

    ture. It is possible to have two different papers in the

    same atmosphere that have either a high or a low

    relative humidity, and observe that one paper has

    changed more in size than the other paper after

    moisture equilibrium has been established. All papers

    do not react to the same degree as their moisture

    content changes! Therefore, in the same environment,

    it is possible to have one paper changing in size,

    developing distortions, etc....

", "pred_label": "__label__1", "pred_score_pos": 0.6062579154968262} {"content": "(redirected from winds)\n\n\n\nWind Direction and Velocity\n\n\n..... Click the link for more information.\n..... Click the link for more information.\n\nThe first successful attempt to standardize the nomenclature of winds of different velocities was the Beaufort scaleBeaufort scale,\n..... Click the link for more information.\n\nPrevailing Winds and General Circulation Patterns\n\nor equatorial belt of calms,\n..... Click the link for more information.\ntwo belts of latitude where winds are light and the weather is hot and dry. They are located mostly over the oceans, at about 30° lat. in each hemisphere, and have a north-south range of about 5° as they follow the seasonal migration of the sun.\n..... Click the link for more information.\n..... Click the link for more information.\n\n..... Click the link for more information.\n..... Click the link for more information.\n\n..... Click the link for more information.\n\nSuperimposed upon the general circulation of winds are many lesser disturbances, such as the extratropical cyclonecyclone,\n..... Click the link for more information.\n (the common storm of the temperate latitudes), the tropical cyclone, or hurricanehurricane,\n..... Click the link for more information.\n, the tornadotornado,\n..... Click the link for more information.\n, and the derechoderecho\n, a long-lived windstorm over a wide expanse that is associated with a line of rapidly moving thunderstorms or showers. The winds in a derecho generally exceed 57 mph (92 kph) and may reach 100 mph (161 kph) or more; derecho winds are produced by clusters of downbursts,\n..... Click the link for more information.\n\nSee also chinookchinook,\nwarm, dry air mass that descends the eastern slopes of the U.S. and Canadian Rocky Mts. after having lost moisture by condensation over the western slopes. Chinooks occur mainly in winter.\n..... Click the link for more information.\n; climateclimate,\n..... Click the link for more information.\n; roaring fortiesroaring forties,\nname applied, especially by sailors, to the latitudes between 40°S and 50°S, where the prevailing westerly winds are strong and steady. Unlike the winds in the Northern Hemisphere, those in the roaring forties are not impeded by large land areas.\n..... Click the link for more information.\n; sandstormsandstorm,\nstrong dry wind blowing over the desert that raises and carries along clouds of sand or dust often so dense as to obscure the sun and reduce visibility almost to zero; also known as a duststorm.\n..... Click the link for more information.\n; siroccosirocco\n[Ital., from Arab. sharq=east], hot, dust-laden, dry, southerly wind originating in the N African desert (most commonly in the spring) and reaching Italy and nearby Mediterranean areas.\n..... Click the link for more information.\n; weatherweather,\n..... Click the link for more information.\n\nLocalized Influences on Wind Patterns\n\nThe diurnal, or daily, heating and cooling of land near a lake or ocean of fairly constant temperature causes air to blow toward the relatively warmer land during the day (sea breeze) and toward the relatively warmer water at night (land breeze). These breezes are shallow and seldom penetrate far inland or attain high velocity. Similar diurnal changes occur on mountain slopes, the air in the valley becoming heated and expanding so that it moves up the slope in the daytime, the cold air settling into the valley at night. Friction with the earth's surface, eddies caused by surface irregularities, and inequalities of heating with consequent convection currents tend to reduce wind velocity near the earth's surface and cause winds to blow in gusts.\n\n\nSee A. Watts, Instant Wind Forecasting (1988); P. Gipe, Wind Energy Comes of Age (1995); J. DeBlieu, Wind: How the Flow of Air Has Shaped Life, Myth, and the Land (1999).\n\n\n\nthe movement of air in the atmosphere almost parallel to the earth’s surface. Wind is usually understood to mean the horizontal component of that movement; sometimes the vertical component, which is hundreds of times less than the horizontal, is also meant. The vertical component of wind attains significant magnitude only in special cases: in clouds when there is strongly developed convection, or in the mountains when air descends along a slope.\n\nWind arises as a result of uneven horizontal distribution of pressure, which in turn is caused by the inequality of temperature in the atmosphere. Under the influence of pressure drops, the air experiences acceleration directed from high pressure to low. However, along with the initiation of movement, other forces begin to act upon the air: the deflecting force of the earth’s rotation (Coriolis force), friction, and in curved trajectories, centrifugal force. The influence of friction is substantial only in the lower hundreds of meters (in the friction layer). With altitude the effect of friction gradually diminishes, and wind velocity increases. In free atmosphere, above the friction layer, the wind is almost a geostrophic wind.\n\nIn the lower layer of the atmosphere, which is a few hundred meters thick and in which friction is substantial, the wind is deflected from the isobars in the direction of low pressure. The magnitude of the angle formed by the wind and the isobar changes according to the character of the underlying surface, the altitude, and also time. Over the sea this angle is 10°-20°; over dry land, 40°-50°. The angle gradually diminishes to zero with increasing altitude.\n\nWind is characterized by velocity and direction. The wind velocity at the earth’s surface is measured with an anemometer and is expressed in m/sec, km/hr, or knots. Wind velocity may also be approximately estimated visually by the action of the wind on objects; in such cases it is expressed in arbitrary units (the Beaufort scale). Wind direction is determined by a wind vane, streamer, wind sock, and so on and is indicated by the azimuth of the point from which it is blowing. Wind direction is expressed either in degrees or in rhumbs according to a 16-rhumb system (N, NNE, NE, ENE, E, ESE, and so on). In the free atmosphere, the velocity and direction of the wind are measured by theodolitic and radiotheodolitic observations of free-flying pilot balloons.\n\nWind velocity and direction always fluctuate to a greater or lesser degree. These fluctuations are called gustiness and are associated with atmospheric turbulence. In making observations, the mean values of wind velocity and direction are usually given. Wind velocities of 5-8 m/sec are considered moderate; over 14 m/sec, strong; on the order of 20-25 m/sec, a gale; and over 30 m/sec, a hurricane. An abrupt short-term increase in wind up to 20 m/sec is called a squall. In tropical cyclones, individual gusts may reach 100 m/sec. The complete absence of wind (calm) is sometimes observed at the earth’s surface. In the troposphere, wind velocity increases with altitude, reaching a maximum at an altitude of 8-10 km. So-called jet streams, with velocities exceeding 60-70 m/sec, are often observed here.\n\nWind velocity and direction have a clearly expressed daily cycle. At night, the wind velocity at the earth’s surface reaches a minimum, and in the afternoon hours it reaches a maximum. The daily cycle of wind is especially well expressed in the summer on clear days over steppe or desert regions; no daily wind cycle is observed over the sea.\n\nThe annual cycle of wind velocity depends substantially on the characteristics of the total atmospheric circulation and also on local conditions. Over the greater part of the European USSR, wind velocity reaches its maximum in the winter and its minimum in the summer. However, in Eastern Siberia, for example, minimum wind velocity is observed in the winter, and the wind becomes stronger in the summer.\n\nLocal winds, which are usually associated with features of local circulation, local topography, and so on, are observed in a number of places on the globe.\n\n\nMatveev, L. T. Osnovy obshchei meteorologii. Leningrad, 1965.\nKhromov, S. P. Meteorologiia i klimatologiia dlia geografieheskikhfakul’tetov, 2nd ed. Leningrad, 1968.\n\nWhat does it mean when you dream about wind?\n\nWind in a dream may represent turmoil in the dreamer’s emotions. It can also indicate the energy available for launching in new directions in life.\n\n\nThe manner in which magnetic tape is wound onto a reel; in an A wind, the coated surface faces the hub; in a B wind, the coated surface faces away from the hub.\nThe motion of air relative to the earth's surface; usually means horizontal air motion, as distinguished from vertical motion, and air motion averaged over the response period of the particular anemometer.\n\n\n1. British term for twist.\n2. A once-used synonym for warped or wined.\n\n\nAeolian harp\nmusical instrument activated by winds. [Gk. Myth.: Jobes, 40]\nsteward of winds; gives bag of winds to Odysseus. [Gk. Myth: Kravitz, 10; Gk. Lit.: Odyssey]\nAfer (Africus)\nsouthwest wind. [Gk. Myth.: Kravitz, 11]\nApeliotes (Lips)\neast or southeast wind. [Gk. Myth.: Kravitz, 27]\nequivalent of Boreas, the Greek north wind. [Rom. Myth.: Kravitz, 30]\nname of the east wind. [Gk. Myth.: Kravitz, 32]\ngoddess of breezes. [Gk. Myth.: Kravitz, 42]\nthe southwest wind. [Rom. Myth.: Kravitz, 42]\ngod of the north wind. [Gk. Myth.: Parrinder, 49]\nthe northeast wind. [Gk. Myth.: Kravitz, 50]\ngod of the north or northwest wind. [Rom. Myth.: Jobes, 374]\nEurus (Volturnus)\nthe southeast wind. [Gk. Myth.: Kravitz, 97, 238]\nancient Roman personification of west wind. [Rom. Myth.: Howe, 103]\nGentle Annis\nweather spirit; controls gales on Firth of Cromarty. [Scot. Folklore: Briggs, 185]\ngregale (Euroclydon)\ncold, northeast wind over the central Mediterranean. [Meteorology: EB, IV: 724; N.T.: Acts 27:14]\nthe Northwest Wind, to whose regions Hiawatha ultimately departed. [Am. Lit.: Longfellow The Song of Hiawatha in Magill I, 905]\nIndian chief; held dominion over all winds. [Am. Lit.: “Hiawatha” in Benét, 466]\ngod of the north wind. [Norse Myth.: Wheeler, 260]\nisle of winds. [Fr. Lit.: Pantagruel]\nOdin’s eight-legged horse; symbolizes the wind that blows from eight points. [Norse Myth.: Benét, 937]\nthe west wind. [Gk. Myth.: Kravitz, 38, 242]\n\n\n1. a current of air, sometimes of considerable force, moving generally horizontally from areas of high pressure to areas of low pressure\n2. Chiefly poetic the direction from which a wind blows, usually a cardinal point of the compass\n3. air artificially moved, as by a fan, pump, etc.\n4. (often used in sports) the power to breathe normally\n5. Music\na. a wind instrument or wind instruments considered collectively\nb. the musicians who play wind instruments in an orchestra\nc. of, relating to, or composed of wind instruments\n6. an informal name for flatus\n8. between wind and water the part of a vessel's hull below the water line that is exposed by rolling or by wave action\n10. off the wind Nautical away from the direction from which the wind is blowing\n11. on the wind Nautical as near as possible to the direction from which the wind is blowing\n\n\nThe wind in your dream could be symbolic of your own spirit or the life force. The wind may represent changes in your life; the greater the force of the wind, the grater the change. A very gusty wind could represent stress and turmoil but also the energy that you need or have to make changes. The sound of the wind and the movement of objects around you are probably what alert you to the wind in the dream, rather than a sensation of wind on your skin (most people don’t have tactile experiences in their dreams). The sound of the wind is considered by some to be special because it is a sound of nature and has spiritual significance.\nReferences in classic literature ?\nAlmost immediately the wind rose again from pre-cisely the opposite direction from which it had formerly blown, so that it was mighty hard work making progress against it.\n'I made as much haste down there as I could when I went from here, but I had to go home first for the keys; and the wind and rain being dead against me all the way, it was pretty well as much as I could do at times to keep my legs.\n'The wind was so strong, that it was as much as I could do to shut the church-door by putting my whole weight against it; and even as it was, it burst wide open twice, with such strength that any of you would have sworn, if you had been leaning against it, as I was, that somebody was pushing on the other side.\nSometimes they got onto a winter-rye field, or a fallow field on which they could see stalks of wormwood, and straws sticking up through the snow and swaying in the wind; sometimes they came onto deep and even white snow, above which nothing was to be seen.\nComing up to the willows, which moaned sadly in the wind, the horse suddenly planted his forelegs above the height of the sledge, drew up his hind legs also, pulling the sledge onto higher ground, and turned to the left, no longer sinking up to his knees in snow.\nI could not feel the full force of the wind, for we were running with it; but from my lofty perch I looked down as though outside the Ghost and apart from her, and saw the shape of her outlined sharply against the foaming sea as she tore along instinct with life.\nThey stood clasped thus in the blind night, bracing each other against the wind, cheek to cheek and lip to ear, in the manner of two hulks lashed stem to stern together.", "pred_label": "__label__1", "pred_score_pos": 0.6555261015892029} {"content": "\n\n\n\n\n\n\n\n\nRobert R. McGill, Esquire\n\n\nFederal & Postal Disability Retirement: Relating negative events\n\nBad things come in pairs, or is it triplets?  Is there a tendency to relate and categorize in terms of color, logical sequence, similarities and characteristics?  Is the Kantian model of imposing categories upon an otherwise orderless universe the reason why we relate negative events in bunches, like grapes growing upon vines waiting to be picked?  Or do bad things happen in combinations naturally, as a law that cannot be avoided?\n\nWhen we learn that others have been speaking ill of us, or of unkind statements and gossiping rumors spread about, do we not then consider the look of those around us and begin to suspect that the facial frown was directed at us, the distracted individual is not merely lost in his or her own thoughts, but is deliberately ignoring and shunning us, and even the dog that was once friendly is heard to emit a low-growling sound of unfriendly disposition?\n\nRelating negative events is a natural response to a world that is orderless, and one that can be cruel — a perspective that is easily and readily confirmed by the uncaring attitude not just from an impervious universe, but from those who pretend to be out best friend, as well.\n\nFor Federal employees and U.S. Postal workers who suffer from a medical condition such that the medical condition begins to prevent the Federal or Postal worker from performing one or more of the essential elements of one’s Federal or Postal job, the Universal Law that dictates relating negative events becomes unavoidable: Suddenly, because you have taken too much SL and have requested FMLA, you are no longer the “golden boy” (or girl) who can be relied upon, and next comes the leave restrictions; the “Memorandum of Warning”, and then even a PIP; and what next?\n\nTermination is the target for the future.\n\nAll the while, the “negative event” was the deterioration of one’s health, which then set into motion all of the other negative events which became related one to the other.\n\nBad things, unfortunately, happen in bunches, and it is important to initiate a “positive” element and infuse a “good” thing into the middle of those bunches of negative events, and preparing, formulating and filing an effective Federal Disability Retirement application, to be filed with the U.S. Office of Personnel Management, whether the Federal or Postal employee is under FERS, CSRS or CSRS Offset, is that positive step one can take for one’s self in the morass of relating all of those negative events that seem to have occurred without your consent.\n\n\nRobert R. McGill, Esquire\n\n\nFederal & Postal Disability Retirement: In troves of battered grey\n\n\n\n\n\n\n\nRobert R. McGill, Esquire\n\n\nFederal Medical Retirement: Those Rare Moments of Clarity\n\n\n\n\n\n\n\n\nRobert R. McGill, Esquire", "pred_label": "__label__1", "pred_score_pos": 0.9643479585647583} {"content": "All Quotes from Halo 3\n\nGenre: Action\n\nCortana, Master Chief:\n\nCortana: \"So have you got a plan to get out?\"\nMaster Chief: \"I was gonna shoot my way out. Mix things up a little.\"\n\nCortana, Master Chief:\n\nCortana: \"What if you miss?\"\nMaster Chief: \"I won't.\"\n\n\nThey let me pick, did I ever tell you that? Choose whichever Spartan I wanted. You know me. I did my research. Watched as you became the soldier we needed you to be. Like the others, you were strong and swift and brave. A natural leader. But you had something they didn't. Something no one saw... but me. Can you guess? Luck. Was I wrong?\n\nHalo 3 advertisement:\n\n\nHey you!", "pred_label": "__label__1", "pred_score_pos": 0.7686569690704346} {"content": "Grace and Hope Mission. Hope Springs Community Church. Non-denominational. Severna Park, MDGrace and Hope is a mission that provides the spiritual and physical necessities for homeless men, women and children throughout the city of Baltimore. On the 3rd Monday of each month HSCC will visit Grace and Hope, provide a meal and lead a worship service for these amazing people.\n\nWe are called to be the hands and feet of Christ in this world and to share the Good News of Christ to the ends of the earth.  We’ve got to start somewhere. Why not here? We’ve got to start sometime. Why not now?  I can guarantee you, you will be blessed, you will bless others and God will be glorified.There are several ways you can serve with us in this mission opportunity.  Please see below for more details.\n\nHow can you get involved?  There are several ways!\n\nJoin Us!\nWe would love you to join us at the mission to pack meals for, worship with and minister to this great group of people. We will be meeting at a central location at 6:30pm on the third Monday of every month to caravan down to the mission.  The worship service will start around 7pm and we will be packing up the meals for the men and women to take with them as they go.\n\nProvide Food/Supplies\nWe will be needing several people to make a monthly commitment to make sandwiches and/or cookies, provide bottled water, packs of crackers and/or fruit.  If you feel you can make a commitment to provide any of the following items, please let me know. The mission takes in 30-40 people per night, so we need to make sure we can provide enough meals. Below is an approximation of what we will need each month.  If you can make a commitment to provide these on a monthly basis, it will ensure that we meet the needs of those we are serving.\n\nMonthly Commitment Needs\n\n • 2 cases of bottled water (1-2 people)\n\nFor more information, or to let us know how you will serve with us, please fill out this form.\n\nThank you for your submission!\n\nYour Name\nYour Email\nYour Phone\nHow can you serve (or what is your question)?\n\nPlease correct the errors outlined in red.", "pred_label": "__label__1", "pred_score_pos": 0.7111762762069702} {"content": "Cross cultural leadership style\n\nSpecifically, they emphasize the necessity of the counselor's having multicultural competence and the ability to apply this knowledge when working with persons of varying ethnic backgrounds. Each Forum takes place on the weekend Saturday and Sunday with the exception of Forum 1 which begins on Friday.\n\nED Myers, I. Many students stand to benefit from that effort. Diversity is important to me not only personally, but also professionally. What are the major obstacles to progress on cultural diversity?\n\nThe current study supported the concept that varying cultures use different methods to resolve conflict. In the last census, more than languages were spoken in Australian households and religions practiced.\n\nThe Culture/Learning Style Connection\n\nCross Cultural Leadership fails sometimes when the management fails to take the religious beliefs and sentiments into consideration while planning any marketing strategies, however if cross cultural team are able to openly share their views with leader or management these problems can be tackled at planning stage itself.\n\nA Review of Narrative Methodology local copyby Mitchell and Egudo, Australian Cross cultural leadership style of Defence, This bibliography outlines how the narrative approach can be used as an alternative for the study of human action.\n\nWe would recognize that the only way to meet diverse learning needs would be to intentionally apply diverse strategies.\n\nLatest News\n\nCross Cultural Leadership not only utilizes the leadership skills of the leader but also personal skills that can be used to create a bond with team members or connect with them so that they share their ideas with the leader fearlessly.\n\nShadefor instance, comments that: A ministry to the whole man may open doors otherwise closed. What is their religion and philosophy of life? Just as clearly, though, teachers of all cultures and styles will have to work conscientiously to provide equitable opportunities for all students.\n\nMetaphor frees us to interpret stories individually. Money, information and people are flowing across international boundaries. Often, these were masterful, caring teachers. Yes, that seems sensible. The Swassing-Barbe Modality Index, for example, asks test takers to repeat patterns given auditorily, visually, and tactilely.\n\nThe case studies included provide examples of how research is conducted within this field, and thus the bibliography can act to support researchers in developing this research tool for understanding the context of formal and informal learning within training arenas.\n\nHave any of your personal experiences shaped how you think about diversity? With a better understanding of these missteps, we can avoid them in the future. Researchers capture the informant's story through ethnographic techniques such as observation and interviews.\n\nPerhaps the most weighty of the application issues has to do with ways to counteract our tendency toward instructional pendulum swings. Cross-cultural psychology is now taught at numerous universities located around the world, both as a specific content area as well as a methodological approach designed to broaden the field of psychology.\n\nLove will always find a way to build a bridge, even though cultural mistakes are made. Then, present a 5- to 7-minute speech on any topic at a club meeting.\n\nAlso, because every culture has different values and norms, it is important to analyze those differences in order to gain a better understanding as to why certain emotions are either interpreted differently or not at all. These values translate into learning experiences that focus on competition, information, tests and grades, and linear logic.\n\nIn this series, the test taker tries to find a simple figure embedded in a more complex one. Sage Publications, Some may say, 'If they're going to live here, why don't they learn English? I would add to this discussion a remark of Carl Jung's: Leadership is also about creating an environment that enables people to succeed and have a positive impact on society.\n\nBut a good story guides us, so that what we learn is what the story wants to tell us, but adapted to our own needs and interests. Gender-role and gender-identity differences and similarities[ edit ] Williams and Best have looked at different societies in terms of prevailing gender stereotypes, gender-linked self-perceptions, and gender roles.Cultural intelligence (CQ) is your capability to grow personally through continuous learning and good understanding of diverse cultural heritage, wisdom and values, and to deal effectively with people from different cultural background and understanding.\n\nPower distance is a way to explain the handling of differences between groups existing in a system. It reflects a culture’s attitude towards human inequality. Cross-cultural leadership Each pair had to overcome cultural barriers to working together and adapt their personal management style to the culture of a team that was foreign to one of them.\n\nstakeholder management and cross-cultural awareness, to a team of 10 other employees, primarily through a local two-day workshop that they ran. Six Fundamental Patterns of Cultural Differences. In a world as complex as ours, each of us is shaped by many factors, and culture is one of the powerful forces that acts on us.\n\nCultural Differences. Learning profiles of 20 countries are provided in the mini-course. Harnessing Cultural Intelligence Societal, Institutional, and Value Differences between Chinese and Americans.\n\nWhat is Power Distance?\n\n“They wondered how nine men could sleep with me and I could still talk. The greatest part of the project was enabling us to tell and write our stories.\n\nCross cultural leadership style\nRated 5/5 based on 99 review", "pred_label": "__label__1", "pred_score_pos": 0.6875690221786499} {"content": "Immigration and health care are just two of the most antagonizing issues illustrating how deep and irreconcilable are the divisions among Americans. Similarly profound are the differences on education, foreign trade, public debt, climate change, drugs, and poverty – on almost everything. There is nothing wrong with people having different opinions, but the inability to reach any constructive agreement is troubling.\n\nIn my professional work as an engineer, when there is a problem, we troubleshoot it and arrive at a solution. Following political debates on any issue, one can easily notice that understanding the core of the problem is not an objective; we have opposing sides blaming each other. It is puzzling, because in achieving technological progress, we have invented and implemented very sophisticated machines and systems that work almost flawlessly. In trying to resolve our major social problems, we still use Stone Age technology. If engineers used the same methods, cars would not drive, bridges and buildings would collapse, and computers and smartphones never would have been invented. The irony is that communication technology has advanced the most in the past few decades. Oddly, as a society we are unable to communicate efficiently on issues that matter the most.\n\nUndoubtedly, we can do better. We have at our disposal all the knowledge and all the technology we might need. Virtual Agora offers a novel format designed with the purpose of bringing scientific deduction into a political dialogue. It is an opportunity to start the long-overdue process of reaching a better understanding of the problems we face. No one will do this for us. If not now, then when?\n\nHenryk A. Kowalczyk", "pred_label": "__label__1", "pred_score_pos": 0.8506201505661011} {"content": "Commerce as a field of education can be explained as a study of trade and business activities such as the services from producer to final consumer and exchange of goods. Its support with the main subject such as economics, accountancy, finance, organization behavior, corporation law, and business studies. Economics is a subject that deals with the study of the distribution, production, and consumption of services and goods. Economics has two branches in first branch micro-economics, the unit of data is the individual prospect, such as firm or a house hold, and macro-economics, the unit of data analysis is a whole as a whole economy. Economic also consider the politics, law, religion, history, family life and marriage and other social issue. Business study is a field that deals with the organization and operation. Its include organization, structure, their various feature, marketing and functioning. Accountant is a collaborated part of commerce field. It’s a field of mathematics science that consider with the financial information about a business object to user such as managers and shareholders.", "pred_label": "__label__1", "pred_score_pos": 0.9999996423721313} {"content": "Quantum computing comes out of the closet\n\nIBM, Rigetti, and now D-Wave are letting the public run simple apps on cloud-based quantum computers, offering a peek at how useful they could someday be.\n\nQuantum computing comes out of the closet\n[Photo: courtesy of D-Wave]\n\nYou might need an advanced degree to fully grok the spooky science of quantum physics. With the state of subatomic particles, such as the polarization of a photon, in constant flux, that particle is essentially in multiple states at the same time. Building a computer around that phenomenon means that each data bit, instead of being a zero or a one at any given moment, can be both a zero and a one.\n\n\nFunky physics aside, the sales pitch for the technology is straightforward: It will (someday) beat even the most powerful traditional computers at finding the optimal arrangement of many interdependent components. For instance: picking the optimal routes for thousands of delivery vehicles, all sharing the same road network. Another: predicting the way many atoms of different elements, and all their buzzing electrons, will interact when designing complex molecules for new drugs.\n\nUntil recently, quantum computing has largely happened in the scientific underground–with large systems housed inside refrigerated cabinets at university and government labs, or in the skunkworks at cash-rich companies like Google. (Systems cost several million dollars and require specialized care and feeding.) But in 2016, IBM launched the Q Experience, providing online access to a quantum system so people without multimillion-dollar R&D budgets can kick the tires. This year, China’s Alibaba, California’s Rigetti, and now Canada’s D-Wave have followed suit.\n\nRelated: Quantum computing is almost ready for business, startup Rigetti says\n\nThis opening of access could lead to a crowd-sourced revolution in advancing the gnarly new algorithms required to integrate quantum with traditional computing–and fulfill the sales pitch.\n\n“Those are the optimistic possibilities,” says Chirag Dekate, a Gartner analyst covering AI and emerging technologies. “But if you speak with the realists in the space, what they will tell you is…it’ll allow end users to explore and figure out that quantum computing is just not ready for primetime yet.”\n\nPerhaps nowhere is the promise-vs.-reality debate more heated than with D-Wave–established back in 1999 and the latest to offer a cloud-based system, which opened to the public today. Mentioning D-Wave often provokes a smirk or grimace among quantum computing experts, who say the company may be overselling its outlier approach to the technology, known as quantum annealing.\n\n\n“D-Wave claims that they’re realizing production value from their quantum computer,” says Brian Hopkins, a Forrester Research analyst covering quantum computing. “I haven’t been able to verify that claim by talking to anybody who’s willing to tell me they’re doing anything other than running science experiments.” He goes on to say, however, that anyone who did get a competitive advantage using a quantum computer probably wouldn’t want competitors to know.\n\n“Every time somebody says, well, D-Wave this, D-wave that, my response was, go try it. You go see for yourself,” says Alan Baratz, EVP of R&D and chief product officer at D-Wave. And now anyone actually can.\n\nLeap provides one minute of free quantum computing time–enough for hundreds or even thousands of jobs. [Image: courtesy of D-Wave]\nThe new online service, called D-Wave Leap, runs on a freemium model. Anyone–regardless of expertise level–gets free access to educational materials, programming tools, a community of users, and one minute of realtime quantum computer operation. “A minute allows you to submit between 400 and 4,000 jobs,” says Baratz. Developers can get an additional free minute per month, if they make all their work open-source; or they can buy private time, starting at $2,000 per hour.\n\nIBM’s Q Experience is also free. Rigetti’s free quantum cloud is limited to about 500 invited participants. I was unable to find Alibaba’s online system, announced back in March, and the company hasn’t responded to my inquiry.\n\nWhat happens when Romeo meets Juliet\n\nAt the very least, D-Wave Leap is a fun way to get a feel for quantum computing, running introductory lessons on a real machine within the first few minutes. It currently features two example problems that harness quantum computing’s ability to consider multiple variations of a situation at the same time. That comes from the ability for each bit to be considered to have a value of both zero and one, plus the ability to link the fate of bits together through “spooky” phenomena like entanglement.\n\nThe first example is factoring: finding all the integers (i.e. not decimal numbers) that another integer can be divided by. First D-Wave shows how a classical computer would solve the problem, trying each option in sequence. For the number 49, can you divide it by 2? No. Can you divide it by 3? No. And on and on, until it tries 7.\n\n\nIt then reconfigures the problem into a latticework of entangled qubits. You press the “RUN” button, and a distant quantum computer spits out the answer “7×7” after a 16-millisecond run–leaving enough computer time for solving up to 3,998 other problems.\n\nTry as it might, even a quantum computer can’t fix the strained relationships Romeo and Juliet caused. [Image: courtesy of D-Wave]\nThe entertaining second example, considers 16 love and hate relationships between the Montague and Capulet clans of Verona, and how the stable state of enmity is thrown into deadly chaos when Romeo meets Juliet. Trying every possible rejiggering of relationships, the quantum computer concludes, in 16 milliseconds, that there is no way to achieve a stable realignment of the families.\n\nThese sample tasks, known as optimization problems, are easy enough for a traditional computer to solve without breaking a sweat. But as the numbers get bigger, the workload on a traditional computer quickly spirals out of control. On that all computing experts and mathematicians agree.\n\nThe battle of the bits\n\nOne critique of D-Wave’s technology is that it’s only useful for these optimization problems. Its qubits are tied together in a way that, driven by physics, naturally cascades to an alignment providing the optimal arrangement (or arrangements) to solve the problem. But D-Wave’s tech doesn’t provide the quantum versions of the “logic gates” on which today’s computers are based. Those systems, which most other companies are pursuing, could solve a wider range of potential problems. “DWave’s qubits and qubits of gate-modeled or universal quantum computers are similar only in name,” says Hopkins. “You simply cannot compare them in any meaningful way.”\n\nD-Wave has a pretty compelling counter-argument. “Today you can’t actually use a gate model system for anything of value,” says Baratz. Or as Hopkins describes it: “Universal quantum computers have qubits that are highly susceptible to errors and hence the complexity of problems they can solve is currently very limited.”\n\n[Photo: courtesy of D-Wave]\nMost of these computers have just a handful of qubits. Google has the biggest of these systems that’s been announced, with 72 qubits. D-wave’s current chip has 2,048 qubits–albeit of a radically different type. (Industry analyst Doug Finke maintains a scorecard of quantum computers, tracking both the quantity and quality of qubits.)\n\n\nWhat remains controversial, though, is D-Wave’s current ability to economically beat a standard computer. “I have run into academic researchers from reputed universities in New England that claim that quantum annealing systems are fairly limited, and you can actually achieve exactly [what they do] using high performance classical systems,” says Chirag Dekate.\n\nD-Wave, of course, disagrees; and it’s now putting its mouth where its money is ($220 million in funding raised). Beyond introductory materials, including videos and other explainers, Leap gets very technical. It includes a suite of developer tools called Ocean, sample code, and a software developer kit that allow programmers to build complex operations for solving real problems. That’s similar to what Rigetti is doing, with a set of tools–following the nature theme–called Forest.\n\nThis is the natural progression of quantum computing, according to analysts. “Cloud is going to be the de facto way to access quantum computers,” says Brian Hopkins. “Very few firms are going to buy quantum computers.”\n\nPutting a spin on quantum computing claims\n\nRigetti expects that, within three years, its community of developers will reach so-called “quantum advantage”–getting results faster or cheaper with a combination of quantum and classical computers than with a classical machine alone. That’s a bold claim in the industry, but D-Wave says it’s passed that milestone, which it brands “customer advantage.” “We have [clients] working on 100 applications. Many of them are achieving customer advantage already,” says D-Wave’s SVP of marketing, Jen Houston. She and Baratz point to customers like OTI Lumionics, which they say is using their technology to model new molecules for OLED lighting.\n\nObservers remain wary. “I’m always skeptical until I actually speak with a customer firsthand,” says Dekate. “Vendors will always say some interesting things to push their technology.”\n\nBy bringing its technology into the open, D-Wave is allowing many more people to test its claims, and trade notes. “We’ve had—up until now–20, 30, 40 customers that have been doing really interesting application work,” says Baratz. (Many had been accessing the systems over the cloud since 2011.) “Now they and hundreds of thousands of developers that we’re opening the system up to will be able to communicate and interact with one another.”\n\n\nHundreds of thousands sounds quite optimistic. Quantum computing is still a rather niche field for savvy early tinkerers, says Dekate. But he agrees that opening up these computers–whatever quantum technology they use–could have a huge benefit to advancing the nascent technology. “If you have a problem set that can benefit from quantum computing, irrespective of the platform type, rethinking your approach, rethinking your problems, and thinking in a quantum mindset absolutely is going to be helpful,” he says.\n\n\nAbout the author\n", "pred_label": "__label__1", "pred_score_pos": 0.5242586135864258} {"content": "Progression in Sekiro Is More Streamlined than Dark Souls or Bloodborne\n\nFromSoftware’s Dark Souls and Bloodborne are most known for being difficult, but one could also argue their progression systems are very complex, at least compared to other action titles. According to an interview with Game Informer, while Sekiro: Shadows Die Twice will still have systems and quirks that are unmistakably FromSoftware designed, overall progression will be much more streamlined.\n\nThe interview, which was between Game Informer and From Software’s communications manager Yasuhiro Kitao, goes into quite a bit of detail about how players will grow stronger as they make their way through Sekiro: Shadows Die Twice. While previous titles in Sekiro‘s lineage are quite stats-y, Sekiro will feature a system of skill trees, which will help players develop a personalized play style without going through the process of curating a “build,” so to speak.\n\nFueling this progression system is a sense of slight leniency, again only if we’re making direct comparisons to Dark Souls and Bloodborne. According to director Hidetaka Miyazaki, there will still be an unannounced penalty for dying, but losing EXP or money won’t be part of it. Players will be able to keep working towards that next skill point, even if they don’t make it to the next Sculptor Idol.\n\nFinally, while the skill trees include both active and passive benefits, players will also be able to boost their health by searching for prayer beads, which serve a similar purpose to seeking out heart containers in the Legend of Zelda series. While this all sounds like a departure from what FromSoftware fans have grown accustomed to, Sekiro sounds more like a character-oriented experience in general, while Dark Souls and Bloodborne revolve more around the player. While these are different concepts, they both lead to a similar goal, giving players both options and challenge.\n\n[Source: Game Informer]", "pred_label": "__label__1", "pred_score_pos": 0.8317126035690308} {"content": "Wednesday, December 30, 2015\n\nIV Therapy: A Useful Tool in the Treatment of IBD\n\nBy: Dr. Kimberley Ramberan, ND\n\n\nWhy IV Therapy is a Valuable Treatment for People with IBD\n\n • Headache\n • Pain\n • Dry Mouth\n • Mouth Ulcers\n • Acne\n • Nausea\n • Fatigue\n • Depression\n\nHow IV Therapy Works\n\n\n\n\n Thursday, December 24, 2015\n\n Healthy Travelling\n\n By Dr. Leena Athparia, ND  \n\n\n\n\n\n\n\n\n\n\n Saturday, November 21, 2015\n\n Inflammatory Bowel Disease: The Gut-Brain Connection\n\n By: Dr. Kimberley Ramberan, ND\n\n Have you ever felt \"sick to your stomach\" or had a \"gut wrenching\" experience?  As a naturopathic doctor, I often encourage patients to explore their \"gut feelings\" and trust their \"gut instincts\" especially when  making a difficult decision.  This is one example of the \"Gut-Brain Connection\".\n\n The connection between the gut and the brain goes both ways.  A \"distressed\" intestine sends signals to the brain, just as a \"distressed\" brain sends signals to the gut.  Therefore, your digestive symptoms can both be the cause and the product of anxiety, stress and depression. When emotions are causing your gastro-intestinal (GI) symptoms there is often a delay between physical findings, such as a colonoscopy or abnormalities found in a physical exam.  This delay, in turn, can delay the treatment for a developing disease.\n\n On a personal level, I recall that when I was young whenever I got really upset or nervous my stomach would start to hurt and I would end up having to go to the bathroom more frequently.  As I got older I noticed these symptoms occurred more quickly whenever I was frustrated or overwhelmed. What I also realize now was that my symptoms became more easily triggered by small stressors. When my doctor would ask me if I felt stressed I would often answer \"I don't feel stressed\" because I had yet to make the link between my digestive symptoms and what was going on in my life.  As time went by my physical tolerance for stress decreased.  The build up of stress culminated in even more significant symptoms such as blood appearing in my stool.  When my doctor did the initial scope and blood work it indicated that everything was fine as he was looking for a physical cause.  It wasn't until months after I started have blood in my stool that the physical manifestation of my emotional stress presented itself. \n\n As naturopathic doctor is trained to treat the whole person and to recognize the link between the gut and the brain. As such, a naturopathic doctor, particularly when there is an absence of physical findings, would often indicate that a patient's emotional and physical state needs to be examined to address the cause of the symptoms and to prevent the progression of any disease.\n\n File:Breathing.jpgWhen stress and suppressed emotions are the cause of physical symptoms they must be dealt with directly. The nervous system should always be worked on in-conjunction with any digestive symptoms. It is interesting to look at the intestines as the organ that \"lets waste go\".   Although our gut has the physical capacity to store and rid our body of waste it can also be affected when we choose not to let emotions go.  This could result in you becoming \"emotionally constipated\"!  Having strong emotions is not a problem.  It is when we have them and we hold them in or suppress them. Our body and our emotions always find a way to be heard and felt.  So, if you are not addressing the emotional distress in your live, your body may consequently become effected physically and pathologically. The bright side is - our gut \"feelings\" can become another important instrument in our IBD healing tool box.  If we start listening to our gut \"feelings\" and acknowledge and learn to \"let go\" of unhealthy emotional patterns we can control another aspect contributing to our gastrointestinal symptoms.  \n\n Just as there is an inflammatory response to stress there can be an anti-inflammatory response to peace within one's self.\n\n Is stress causing your symptoms? \n\n Ask yourself - \" When I'm stressed, where do I feel it my body?\"  When you are upset, frustrated or emotional about something what do you do?  Do you release the emotion, or do you distract yourself and focus on something else. Distracting yourself and focusing on other things versus what is bothering you can often result in emotions being held in the body. Emotions that are held in or suppressed can often manifest as: \n\n Physical symptoms:\n\n Behavioural symptoms:\n\n • Procrastination\n • Grinding teeth\n • Difficulty completing work\n • Changes in amount of alcohol or food you consume\n • Taking up or increase smoking\n • Increase desire to withdraw from others\n • Racing thoughts\n\n Emotional symptoms:\n\n • Crying\n • Overwhelming sense of pressure or tension\n • Trouble relaxing\n • Nervousness\n • Anxiety\n • Quick Temper\n • Depression\n • Poor Concentration\n • Trouble remembering things\n • Loss of sense of humour\n\n Understanding the gut-brain connection can provide a valuable approach to any health condition, especially digestive symptoms. To find our more about the gastro-intestinal relationship with the brain please call Naturopathic Foundations Health Clinic at 905-940-2727 to book an appointment with Dr. Kimberley Ramberan, ND.\n\n Tuesday, October 27, 2015\n\n Balancing Vata in Fall\n\n As the seasons change, and the climate shifts to cooler days, you may notice changes in your body, your thoughts and your emotions.  The change of seasons influences people differently depending on the individual constitution that they were born with.  According to Ayurveda there are 3 vital bio-energies (doshas) that make up a person's constitution: vata, pitta, kapha - each made up of a combination of the 5 elements (earth, air, fire, water, space). \n\n The 3 doshas are not only found within us, but also exist around us in nature. As we prepare for fall, it is helpful to understand the impact that the change of the seasons can have on your health.  Fall is considered vata season because the qualities that characterize vata - dry and cold - are dominant at this time of the year.  The weather changes are apparent with colder days, dry wind, lightness in the air and crackling leaves. \n\n Characteristics of Vata\n\n Vata is made up of the air and space elements and has the qualities of dry, cold, light, moving, irregular, subtle, rough and quick.\n\n Vata loosely translates as \"wind\" and its function is movement - one can think of vata being their internal wind that keeps things moving. Vata body types are active and mobile, and they often find themselves doing many activities at once. Physically, those with a vata constitution tend to be thin with a light frame and energetic in bursts. They tend to be lively and creative when in balance. \n\n Functions of Vata\n\n As vata is responsible for movement, some of the functions in the body include:\n • Circulation\n • Movement in the digestive tract\n • Sensory perception\n • Speech\n • Nerve impulses\n • Breathing\n If any of these functions are not functioning optimally, it is likely that an imbalance with vata is involved.  Due to vata's mobile nature, it is the easiest dosha to experience imbalance. \n\n Common Health Conditions\n\n Vata tends to become unbalanced and accumulates in the body and mind when there is too much Vata in our life. Irregular eating or sleeping, concerns with stress, erratic schedules, overstimulation and excess worry can contribute to a vata imbalance.  In addition, seasonal and weather changes can impact the balance of vata, pitta & kapha.  An excess of Vata can manifest in a variety of health concerns which include (but are not limited to): \n Though all individuals are susceptible to the changes brought on by fall, individuals with a constitution that is vata dominant, are more susceptible to aggravation as the environmental factors add to tendencies that already exist internally.  \n\n To help keep vata in balance during fall, incorporating daily lifestyle routines and eating according to your constitution can ease the transition into the cold season. \n\n 5 Suggestions to Balance Vata in Fall\n\n The following suggestions are important for those with a Vata constitution, but are also valuable for other constitutions during the Vata seasons of fall and winter.\n\n • Stay warm: Dressing in layers and drinking warm liquids can help keep us warm as the temperatures dip.  Drink herbal teas during the day and incorporate nourishing soups, stews and broths. Avoid cold foods and excess raw food.\n • Eat a Vata-balancing diet: Choose seasonal foods that are organic and local, such as apples, squashes and root vegetables.  Warming spices, such as cinnamon, nutmeg, cloves, ginger and black pepper, can also be a great addition to your meals.  Flavours that are naturally sweet, salty & sour help pacify vata.\n • Establish routine: Fall can get busy and we are soon swept off our feet and find our heads buzzing with erratic schedules.  Waking up and sleeping at consistent times and eating meals at the same time each day can bring stability and help keep us grounded during fall.\n • Choose rejuvenating activities: Plan time in your schedule to get sufficient rest and relaxation time. Activities that are relaxing and rejuvenating, such as curling up with a book as you sip ginger tea, taking a hot bath with essential oils in the evening or embracing meditation into your routine, are valuable at this time. Plan to get to sleep earlier as the body needs more sleep in the winter than in the summer.\n • Enjoy oils: Healthy oils are essential in counteracting the dryness associated with fall. Internally, oils such as ghee (clarified butter) or olive oil, can pacify vata when added to your meals. Externally, warm oil massage (abhyanga) with oils can be a wonderful way to relax and nourish the skin. This can be done in the morning or evening on your own, or abhyanga can be done by a qualified practitioner with customized oils to suit your constitution.\n\n Keeping the 3 doshas balanced within ourselves is vital in staying healthy as seasons change.  Ayurveda offers many tools to balance vata dosha.  Only when we understand our unique constitution can we do the necessary groundwork to stay healthy in fall.  When we can make changes that support our constitution, we can enjoy fall while staying healthy and energized ! \n\n If you would like a comprehensive healthcare plan which includes understanding your Ayurvedic constitution and how that impacts your health, you can book an appointment with Dr. Leena Athparia, ND, at Naturopathic Foundations Health Clinic: 905-940-2727.\n\n Inflammatory Bowel Disease Part 3: Food Sensitivity Testing\n\n By: Dr. Kimberley Ramberan, ND\n\n There are several laboratory tests that provide value in assisting with the management of inflammatory bowel disease (IBD) and that provide supporting information to assist in determining the best treatment plan.  Standard laboratory tests are markers that allow your doctor or naturopathic doctor to assess for inflammation, nutritional status and to look for deficiencies of necessary vitamins and minerals.  Most of this testing in Ontario is considered standard of care and should be done on a somewhat regular basis.  However, there are very specific tests that are generally not part of conventional medicine that can be done by naturopathic doctors to provide specific information about foods, the way you break down your food and pathological microbes that could contribute to the onset of disease and the progression of disease.\n\n This blog is part of a series on IBD and my personal journey on learning how to live with it. Please check out my previous blogs:\n\n IBD Part 1: My Story\n IBD Part 2: Food Does Matter\n\n File:Bread wheat.jpg\n\n Now, remember when I said I had more lessons to learn...\n\n While studying to become a naturopathic doctor, I experienced symptoms of IBD for about two and a half years and then it went into remission for two years. For me, the stress of school, performance and grades triggered an IBD flare. While stress was a contributing factor to my flare, I knew that I had to also get my diet back on track.  Like most people with IBD, when symptoms go away for a long enough time, the thought is that we can \"cheat\" a bit with the foods we eat, which is the trap I fell into. \n\n Being in school and learning about the different types of therapeutic diet regimes, I decided I would try the \"Hypoallergenic Diet\", also known as the Elimination Diet.  This is a diet that has great clinical value in establishing what and how foods affect you.  I use this diet in practice regularly with patients.  However, for some it may not be specific enough and may be too labour intensive.  \n\n After being on the hypoallergenic diet for awhile, I noticed improvements but not remission.  I was disappointed and could not understand why I was still having symptoms.  I was eating gluten-free, dairy-free, egg-free and still not feeling 100%. One of my naturopathic professors told me about a blood food sensitivity test that was commonly used by naturopathic doctors in order to determine what foods the immune system was overreacting to and, therefore, causing inflammation in the body. \n\n Food Sensitivity Testing\n\n The immune system exists to defend the body against bacteria, viruses and any other potentially harmful organisms.  It protects the body by producing cells called immunoglobulins, also called antibodies.  There are five major immunoglobulins: IgA, IgD, IgE, IgG and IgM.  Each one of these components produces a different kind of physical reaction in the body. Let's compare. \n\n Food Allergy vs Food Sensitivity \n\n When you go to the medical doctor or an Allergist to test for food allergies, they will typically perform a skin prick test or a double-blind, placebo-controlled oral food challenge in order to test for IgE reactions.  IgE reactions are considered true food allergies.  IgE reactions typically occur within minutes of exposure to or ingestion of a food antigen.  Commonly observed IgE reactions include: hives, itchy watery eyes and breathing difficulties.  They are considered anaphylactic-type reactions.\n\n Food Sensitivity is a term that usually refers to delayed immune reactions to foods.  For example, IgG and IgA reactions to foods are commonly referred to as food sensitivities because they don't always cause immediate reactions.  They can take anywhere from the time the food hits our digestive tract to 3 days later.  The reactions can vary and compound based on the amount and combination of foods we consume.\n\n In an IgG reaction, the IgG antibodies attach themselves to the food antigen and create an anti-body-antigen complex.  Special cells called macrophages normally remove these complexes.  However, if they are present in large numbers and the reactive food is still being consumed, the macrophages can't remove them quickly enough.  The food antigen-antibody complexes accumulate and are deposited in body tissues.  Once in tissue, these complexes cause inflammation which plays a role in numerous disease and conditions.\n\n Of the five major antibodies circulating in the bloodstream, IgA is produced in the greatest quantity on a daily basis.  IgA antibodies are the first line of defence against suspected disease-causing agents like viruses and bacteria.  IgA antibodies to specific foods may form when the lining of the intestinal tract becomes inflamed or damaged due to stress, alcohol, medications or other inflammation-causing conditions.  Elevated IgA to specific foods is widely believed to be a sign of damage to the mucous membranes in the gut.  Individuals with Crohn's Disease or Ulcerative Colitis, or even those with suspected \"leaky gut\", may benefit from testing IgA food reactions.\n\n Allow me to illustrate this case in point with Sumo wrestlers:\n\n Imagine your body is a pool.  Now imagine Sumo wrestlers have decided to have a pool party using your pool.  The 1st Sumo wrestler named \"Dairy\" cannonball jumps into the pool.  He makes a big splash.  Then the water calms down fairly quickly, but the water level of the pool rises.  Then the 2nd Sumo wrestler, \"Eggs\", dives in.  The water levels rises a bit more.  Now here comes the 3rd, \"Gluten\", who gracefully slips in.  Now the water level is as high as the pool can hold.  Now comes along skinny little \"Sesame\". He is all ready with his water noodle and jumps right in the middle of all the Sumo wrestlers. YOUR POOL EXPLODES!\n\n So, whose fault is it that the pool exploded?  \n The answer: EVERYONE\n\n Your body is like a pool, in the sense that it is designed to hold a certain load.  We all have different foods that cause our systems to reach capacity.  So, when that happens, symptoms of inflammation occur (i.e. the pool exploding).  This is what happens when our body is having an IgG/IgA reaction.\n\n I will often hear patients say \"Sometimes foods bother me and sometimes they don't.  I can't figure it out!\"  That is how I felt before I completed a food sensitivity test and discovered that I had an extremely high sensitivity to sesame seeds!  Five to ten years ago there were not many options for gluten-free or dairy-free foods that did not contain sesame seeds. No wonder I wasn't getting better.  After my food sensitivity test, I adjusted my diet accordingly and very quickly saw and felt the benefits.  I never would have figured that out without doing a food sensitivity test.\n\n Food sensitivity testing is a valuable and cost-effective way of determining what specific foods you should be avoiding, whether you are dealing with IBD, Crohn's disease or any other symptoms or conditions.  Many naturopathic doctors recommend determining your food sensitivities as the starting point to creating a treatment plan that works for you.\n\n To find out more about food sensitivity testing, contact Naturopathic Foundations at 905-940-2727 to book an appointment with Dr. Kimberley Ramberan, ND.\n\n\n Thursday, October 1, 2015\n\n Nature Cure: Health Benefits of Time Spent in Nature\n\n Benefits of Spending Time in Nature (check-out\n\n • Synchronizes Circadian Rhythm\n • Helps you to stay grounded\n • Increases energy\n • Improves sleep\n • Improved mental/emotional sense of well-being\n • Increased Vitamin D levels\n • Improved vision\n • Increased immune function\n\n\n\n\n\n Wednesday, September 30, 2015\n\n Inflammatory Bowel Disease: Food DOES Matter\n\n By Dr. Kimberley Ramberan, ND\n\n\n\n\n \"Food Does Matter!\"\n\n\n\n Quality of Food\n\n  Raw vs Cooked\n\n\n Inflammatory Foods\n\n • Red Meat\n • Fried Foods\n • Spicy Foods\n\n Customizing Your Diet\n\n\n\n\n\n\n\n Friday, August 28, 2015\n\n Inflammatory Bowel Disease Part 1 :My Story\n\n by Dr. Kimberley Ramberan, ND\n\n\n\n\n\n\n\n\n\n\n\n\n\n Monday, July 27, 2015\n\n Benzene Exposure in Your Car\n\n\n The email is as follows:\n\n\n\n\n Bottom line . . . \n\n Additional information on Benzene : \n\n Wednesday, July 1, 2015\n\n Proclamation of the Naturopathy Act 2007\n\n by Dr. Iva Lloyd, ND\n\n As of July 1st, 2015, naturopathic medicine will now be regulated under the Regulated Health Professions Act (RHPA) which is the umbrella legislation that governs all regulated health professions in Ontario.\n\n The History\n\n Naturopathic medicine has been regulated under the Drugless Practitioner's Act since 1925. The scope of practice for Ontario naturopathic doctors has steadily increased since 1925 and includes gynecological exams, rectal exams, naturopathic manipulation, acupuncture, intravenous therapy, taking blood samples and communicating a naturopathic diagnosis. The Drugless Practitioner's Act was an antiquated Act that did not provide the same degree of regulatory structure as other regulated health professions and restricted the scope of practice. In order for naturopathic doctors to have the level of regulation commensurate with other regulated health professions in Ontario the profession had to move under the RHPA.\n\n In 2007 the Naturopathy Act was passed and the decision to move naturopathic doctors under the RHPA was confirmed. At the time that the Naturopathy Act was passed, naturopathic doctors were informed that they would  maintain their current scope of practice.\n\n Current Status\n\n Proclamation has taken a number of years. But, we are pleased to announce that naturopathic doctors in Ontario have, for the most part, maintained their full scope of practice. Click here for the link to the College of Naturopaths of Ontario (CONO) to access the list of the controlled acts.\n\n One of the positive things that will happen under the RHPA is that the College of Naturopaths of Ontario (CONO) will be able to ensure that anyone who uses the title naturopath or naturopathic doctor has received the training that they require. The terms naturopath, naturopathic doctor, ND and others are now officially protected titles.\n\n There are some changes in the way that naturopathic doctors will have to practice. Some of these changes, we hope will be short term. The changes include:\n\n Laboratory Testing\n • Taking of blood samples: Although naturopathic doctors have been authorized the act of taking blood samples according to the Laboratory and Specimen Collection Centre Licensing Act, they are currently not allowed to take blood samples that have to be sent to a lab for analysis as an inspection program has not yet been developed and approved and the access for standard medical blood testing has not been written into the Controlled Act. The Controlled Act, currently, only allows for point-of-care blood samples for seven laboratory tests that are assessed in-office.  For standard medical blood test naturopathic doctors will, for the time being, have to provide patients with a requisition form and have patients visit an Ontario laboratory facility for the blood draw. Results will still be sent directly to their naturopathic doctor. Although the blood will be drawn at an Ontario laboratory facility, the blood work will not be covered by OHIP.  \n • Range of laboratory tests: Prior to proclamation, naturopathic doctors were able to order any laboratory test. During the consultative process a list has been created which defines what laboratory tests naturopathic doctors are able to order. Generally speaking, the list is fairly comprehensive and includes 194 laboratory tests, but there are some common laboratory tests or test panels that did not make it to the approved list. Click here for the list of approved laboratory tests, or talk to your naturopathic doctor directly. The OAND and the naturopathic profession will continue to work with the CONO and the MOHLTC to seek inclusion of the remaining laboratory tests that are required.\n • Handling of external laboratory tests: Thankfully, naturopathic doctors maintained access to a number of external laboratory tests, but similar to blood testing, the handling of external laboratory testing, such as saliva testing, urine testing for environmental toxins, urinary organic acid testing, will be handled differently than it is now. The process is not completely worked out, but it most likely will involve your naturopathic doctor providing patients with a collection test kit and having them return the kit to an Ontario laboratory facility for shipment to the external lab. Your naturopathic doctor will be able to clarify the new process and any change to fees when they provide you with the test kit.\n Prescription Rights and Intravenous Therapy (IVIT)\n Prior to proclamation only those naturopathic doctors that were IVIT certified were able to prescribe a select list of drugs and substances as part of their IVIT treatment. The following is the update on prescription rights and IVIT therapy.\n • List of IVIT substances: Most of the substances that naturopathic doctors have been using for intravenous therapy (IVIT) are included on the prescribed list, yet there are a few that have been removed at this time. The OAND and naturopathic profession will continue to work with CONO and the MOHLTC to add back the substances that have been omitted.\n • IVIT treatments: Under the new regulations that requirements for IVIT practitioners are much stricter and ensure optimal patient care. Any naturopathic doctor that meets the new standards and that passes the prescribing course will be able to continue to offer patients IVIT treatments.\n • Prescription rights for non-IVIT naturopathic doctors: The controlled act of prescribing primarily relates to substances that are used in IVIT treatments, but under the new RHPA regulations there are a few substances that non-IVIT naturopathic doctors will have the ability to prescribe once they successfully complete a prescribing course.  The substances that have been added include bio-identical hormones estrogen and progesterone and thyroid hormone, as well as the ability to prescribe high doses of Vitamin D, Vitamin A, Vitamin K and Folic acid.  \n\n Next Steps\n\n There are a lot of positives about the move to the RHPA, but there will be some challenges during the transitional period.  Generally speaking, patients that are working with naturopathic doctors will primarily experience changes with respect to the handling and access to laboratory testing.\n\n If you have any questions about these regulatory changes, I encourage you to visit the CONO website at:, the website of the Ontario Association of Naturopathic Doctors at or talk directly to your naturopathic doctor.\n\n This is an exciting time for the naturopathic profession.  These regulatory changes will ensure greater patient safety, increased clarification as to the scope of naturopathic doctors and will increase the opportunity for intra-professional collaboration and support.\n\n It is a great time to work with a naturopathic doctor to optimize your health.", "pred_label": "__label__1", "pred_score_pos": 0.503867506980896} {"content": "Mount Meru\n\n\nWith 4,566 meters height,  Meru Mountain is the second highest point in Tanzania. It is located in the North-East of Arusha over looking at the highest peak in Africa Mount Kilimanjaro. Meru Mountain is part of Arusha National Park, for that case you will have the opportunity to walk through the game that you might come across, most likely giraffes and buffaloes,  to the starting point of your hike.  Its extinct crater is easily accessible fromArusha town, which lies at the mountain’s southern baseTrekking is steeper in Meru Mountain, climbing takes  2 days up and 2 days down depending on the weather and physical fitness of the person meru1-150x140It has beautiful surroundings entertained by wild animals as reedbucks, buffaloes, elephants, duikers and colorful birds.Wild flowers such as fireballs lilies are common. At the crater walls, which dominated by the podo and juniper trees. Olive pigeons flying from tree to tree while singing wildly. On the other hand red-headed parrots relaxing and enjoying podo fruits.\n\n\n       .", "pred_label": "__label__1", "pred_score_pos": 1.0000088214874268} {"content": "• flag\n\nJardin Des Martels\n\nEaster's eggs hunt - April 13rd 2020\n\n\nOn Easter Monday, gardeners leave the lawns to the Ester Bunnies. Those furry animals will hide more than 13.000 chocolate eggs there.  The chocolate eggs are hidden into various places and will be replaced as time goes by during the day. The children and their parents will have at their disposal a eggs hunt map.\nRates are unchanged\n\nTickets are limited, we recommend that you buy your tickets in advance. The tour performing on the lawn, we could be forced to cancel the day if bad weather occurred in the days before Easter. In this case, you will be notified by email one day before the event and tickets will be available for the visit untill October, 30th, 2020.", "pred_label": "__label__1", "pred_score_pos": 0.871687114238739} {"content": "Enthusiasm Decay\n\nYou don’t appear to be logged in. To view this video please login or register for an account.\n\nThe excitement of a new project often leads to high focus and output. But over time, what was new and exciting becomes routine and ordinary, and your team members’ enthusiasm naturally wanes. How can you add a “booster shot” of enthusiasm to maintain the excitement around a project?", "pred_label": "__label__1", "pred_score_pos": 0.9945898056030273} {"content": "Sign up\nExhibition November 15 − December 1\nRomance with the sky\nThe Museum and Exhibition Complex of the Russian Academy of Arts Zurab Tsereteli Art Gallery hosts an exhibition of works by St. Petersburg painter Roman Lyapin\"Romance with the sky\".\n\nVisitors will be able to see about 50 works of the author of different years.\n\nIn his work, Roman Lyapin relies on the traditions of the classical European school, Russian realism, and contemporary Italian painting also had an equal impact on the formation of his style. The author prefers the genre of urban landscape. Admiration for the classical culture, the ability to combine the modern life of megacities with their historical past, to convey the variability of the conditions of the city as a single organism or a separate, fragmentary taken species, the ability to see in a private eternal, sincere admiration of the city as a great manifestation of a person’s creative potential, to relive perfection every time and the grandeur of nature, to be carried away and carried away by the process of one’s own creativity - all this makes up the “cosmos” of urban landscapes by Roman Lyapin. The artist’s works are in private collections in Russia, Germany, Italy, Spain, the USA, Taiwan, France, Japan and other countries. Successful and sought after, the artist participates in numerous exhibition projects in Russia and abroad.\n\nBased on the official websiteRussian Academy of Arts.", "pred_label": "__label__1", "pred_score_pos": 0.99828040599823} {"content": "FreeBSD* Driver for Intel(R) Ethernet ================================================================================ November 14, 2018 ================================================================================ Contents -------- - Overview - Identifying Your Adapter - Building and Installation - Speed and Duplex Configuration - Additional Configurations - Known Limitations - Support - License Overview ======== This file describes the FreeBSD* driver for Intel(R) Ethernet. This driver has been developed for use with all community-supported versions of FreeBSD. For questions related to hardware requirements, refer to the documentation supplied with your Intel Ethernet Adapter. All hardware requirements listed apply to use with FreeBSD. Identifying Your Adapter ======================== This release includes two gigabit FreeBSD base Drivers for Intel(R) Ethernet. These drivers are em and igb. - The igb driver supports all 82575 and 82576-based gigabit network connections. - The em driver supports all other gigabit network connections. - Gigabit devices base on the Intel(R) Ethernet Controller X722 are supported by the ixl driver. For information on how to identify your adapter, and for the latest Intel network drivers, refer to the Intel Support website: Building and Installation ========================= NOTE: This driver package is to be used only as a standalone archive and the user should not attempt to incorporate it into the kernel source tree. In the instructions below, x.x.x is the driver version as indicated in the name of the driver tar file. 1. Move the base driver tar file to the directory of your choice. For example, use /home/username/igb or /usr/local/src/igb. 2. Untar/unzip the archive: tar xzf igb-x.x.x.tar.gz This will create the igb-x.x.x directory. 3. To install man page: cd igb-x.x.x gzip -c igb.4 > /usr/share/man/man4/igb.4.gz 4. To load the driver onto a running system: cd igb-x.x.x/src make kldload ./if_igb.ko 5. To assign an IP address to the interface, enter the following: ifconfig igb 6. Verify that the interface works. Enter the following, where is the IP address for another machine on the same subnet as the interface that is being tested: ping 7. If you want the driver to load automatically when the system is booted: cd igb-x.x.x/src make make install Edit /boot/loader.conf, and add the following line: if_igb_load=\"YES\" Edit /etc/rc.conf, and create the appropriate ifconfig_igb entry: ifconfig_igb=\"\" Example usage: ifconfig_igb0=\"inet netmask\" NOTE: For assistance, see the ifconfig man page. Speed and Duplex Configuration ------------------------------ In addressing speed and duplex configuration issues, you need to distinguish between copper-based adapters and fiber-based adapters. In the default mode, an Intel(R) Ethernet Network Adapter using copper connections will attempt to auto-negotiate with its link partner to determine the best setting. If the adapter cannot establish link with the link partner using auto-negotiation, you may need to manually configure the adapter and link partner to identical settings to establish link and pass packets. This should only be needed when attempting to link with an older switch that does not support auto-negotiation or one that has been forced to a specific speed or duplex mode. Your link partner must match the setting you choose. 1 Gbps speeds and higher cannot be forced. Use the autonegotiation advertising setting to manually set devices for 1 Gbps and higher. Caution: Only experienced network administrators should force speed and duplex or change autonegotiation advertising manually. The settings at the switch must always match the adapter settings. Adapter performance may suffer or your adapter may not operate if you configure the adapter differently from your switch. An Intel(R) Ethernet Network Adapter using fiber-based connections, however, will not attempt to auto-negotiate with its link partner since those adapters operate only in full duplex and only at their native speed. By default, the adapter auto-negotiates the speed and duplex of the connection. If there is a specific need, the ifconfig utility can be used to configure the speed and duplex settings on the adapter. Example usage: ifconfig igbX media 100baseTX mediaopt full-duplex NOTE: Only use mediaopt to set the driver to full-duplex. If mediaopt is not specified and you are not running at gigabit speed, the driver defaults to half-duplex. If the interface is currently forced to 100 full duplex, you must use this command to change to half duplex: ifconfig igbX media 100baseTX -mediaopt full-duplex This driver supports the following media type options: Media Type Description ---------- ----------- autoselect Enables auto-negotiation for speed and duplex. 10baseT/UTP Sets speed to 10 Mbps. Use the ifconfig mediaopt option to select full-duplex mode. 100baseTX Sets speed to 100 Mbps. Use the ifconfig mediaopt option to select full-duplex mode. 1000baseTX Sets speed to 1000 Mbps. In this case, the driver supports only full-duplex mode. 1000baseSX Sets speed to 1000 Mbps. In this case, the driver supports only full-duplex mode. For more information on the ifconfig utility, see the ifconfig man page. Additional Features and Configurations ====================================== Jumbo Frames ------------ Jumbo Frames support is enabled by changing the Maximum Transmission Unit (MTU) to a value larger than the default value of 1500. Use the ifconfig command to increase the MTU size. For example, enter the following where X is the interface number: ifconfig igbX mtu 9000 To confirm an interface's MTU value, use the ifconfig command. To confirm the MTU used between two specific devices, use: route get NOTE: The maximum MTU setting for Jumbo Frames is 9216. This value coincides with the maximum Jumbo Frames size of 9238 bytes. NOTE: Using Jumbo frames at 10 or 100 Mbps is not supported and may result in poor performance or loss of link. NOTE: Packet loss may have a greater impact on throughput when you use jumbo frames. If you observe a drop in performance after enabling jumbo frames, enabling flow control may mitigate the issue. VLANS ----- To create a new VLAN interface: ifconfig create To associate the VLAN interface with a physical interface and assign a VLAN ID, IP address, and netmask: ifconfig netmask vlan vlandev Example: ifconfig vlan10 netmask vlan 10 vlandev igb0 In this example, all packets will be marked on egress with 802.1Q VLAN tags, specifying a VLAN ID of 10. To remove a VLAN interface: ifconfig destroy Polling ------- NOTES: - Device Polling is only valid for non-SMP kernels. - The driver has to be built into the kernel for Device Polling to be enabled in the driver. To enable polling in the driver, add the following options to the kernel configuration, and then recompile the kernel: options DEVICE_POLLING options HZ=1000 At runtime use: ifconfig igbX polling (to turn polling on) and: ifconfig igbX -polling (to turn it off) Checksum Offload ---------------- Checksum offloading is not supported on 82542 Gigabit adapters. Checksum offloading supports both TCP and UDP packets and is supported for both transmit and receive. Checksum offloading can be enabled or disabled using ifconfig. Both transmit and receive offloading will be either enabled or disabled together. You cannot enable/disable one without the other. To enable checksum offloading: ifconfig igbX rxcsum To disable checksum offloading: ifconfig igbX -rxcsum To confirm the current setting: ifconfig igbX Look for the presence or absence of the following line: options=3 See the ifconfig man page for further information. TSO --- TSO (TCP Segmentation Offload) supports both IPv4 and IPv6. TSO can be disabled and enabled using the ifconfig utility or sysctl. NOTE: TSO requires Tx checksum, if Tx checksum is disabled, TSO will also be disabled. NOTE: By default only PCI-Express adapters are ENABLED to do TSO. Others can be enabled by the user at their own risk. TSO is not supported on 82547 or 82544-based adapters, as well as older adapters. To enable/disable TSO in the stack: sysctl net.inet.tcp.tso=0 (or 1 to enable it) Doing this disables/enables TSO in the stack and affects all installed adapters. To disable BOTH TSO IPv4 and IPv6: ifconfig igb -tso To enable BOTH TSO IPv4 and IPv6: ifconfig igb tso You can also enable/disable IPv4 TSO or IPv6 TSO individually. Simply replace tso|-tso in the above command with tso4 or tso6. For example, to disable TSO IPv4: ifconfig igb -tso4 To disable TSO IPv6: ifconfig igb -tso6 MSI-X ----- MSI or MSI-X can be turned off by an entry in /etc/sysctl.conf hw.em.enable_msi=0 Unload and reload the driver. LRO --- LRO (Large Receive Offload) may provide rx performance improvement. However, it is incompatible with packet-forwarding workloads. You should carefully evaluate the environment and enable LRO when possible. To enable: ifconfig igb lro It can be disabled by using: ifconfig igb -lro EEE (Energy Efficient Ethernet) ------------------------------- Valid Range: 0-1 0 = Disables EEE 1 = Enables EEE A link between two EEE-compliant devices will result in periodic bursts of data followed by periods where the link is in an idle state. This Low Power Idle (LPI) state is supported at 1 Gbps and 100 Mbps link speeds. NOTES: - EEE support requires auto-negotiation. - Both link partners must support EEE. - EEE is not supported on all Intel(R) Ethernet Network devices or at all link speeds. Example: sysctl dev.igb.#.eee.enable=[0|1] DMAC ---- Valid Range: 0, 1, 250, 500, 1000, 2000, 3000, 4000, 5000, 6000, 7000, 8000, 9000, 10000 This parameter enables or disables DMA Coalescing feature. Values are in microseconds and set the internal DMA Coalescing internal timer. DMA (Direct Memory Access) allows the network device to move packet data directly to the system's memory, reducing CPU utilization. However, the frequency and random intervals at which packets arrive do not allow the system to enter a lower power state. DMA Coalescing allows the adapter to collect packets before it initiates a DMA event. This may increase network latency but also increases the chances that the system will enter a lower power state. Turning on DMA Coalescing may save energy. DMA Coalescing must be enabled across all active ports in order to save platform power. Known Issues/Troubleshooting ============================ Detected Tx Unit Hang in Quad Port Adapters ------------------------------------------- In some cases ports 3 and 4 don't pass traffic and report 'Detected Tx Unit Hang' followed by 'NETDEV WATCHDOG: igbX: transmit timed out' errors. Ports 1 and 2 do not show any errors and will pass traffic. This issue may be resolved by updating to the latest kernel and BIOS. You should use an OS that fully supports Message Signaled Interrupts (MSI) and make sure that MSI is enabled in your system's BIOS. There are known performance issues with this driver when running UDP traffic with Jumbo Frames. ---------------------------------------------------------------------------- 82541/82547 can't link or is slow to link with some link partners ----------------------------------------------------------------- There is a known compatibility issue where time to link is slow or link is not established between 82541/82547 controllers and some switches. Known switches include: Planex FXG-08TE I-O Data ETG-SH8 The driver can be compiled with the following changes: Edit ./em.x.x.x/src/if_em.h to change the #define EM_MASTER_SLAVE For example, change from: #define EM_MASTER_SLAVE e1000_ms_hw_default to: #define EM_MASTER_SLAVE 2 Use one of the following options: 1 = Master mode 2 = Slave mode 3 = Auto master/slave Setting 2 is recommended. Recompile the module: a. To compile the module cd em-x.x.x make clean make b. To install the compiled module in system directory: make install Support ======= For general information, go to the Intel support website at: If an issue is identified with the released source code on a supported kernel with a supported adapter, email the specific information related to the issue to", "pred_label": "__label__1", "pred_score_pos": 0.7328281998634338} {"content": "chron mieszkanie przed włamaniem\nalarm that knows more\n\nThe alarm that knows more than any other\n\nOne of the most important functions of elephant door™ is that it warns against burglary and allows it to be avoided. A burglar needn’t get inside for the alarm to be activated. Even an attempted break-in sets off a buzzer with a volume of over 110dB! As a result, the burglar is effectively scared off and the neighbors are alerted to the fact that something is wrong.\n\nThe smart home alarm also informs you of the incident in the blink of an eye. If a burglary or attempted burglary occurs, the relevant information is sent to your smartphone. Once you know what’s happening, you can react!\n\nOur unique Smart Warning System technology allows many different incidents to be recognized. Thanks to the precisely developed algorithms, the alarm system is not set off in situations that cause a vibration but do not pose a threat. You won’t be notified when the postman knocks on your door or your neighbor slams their door. The innovative technology ensures that elephant door™ won’t bother you unnecessarily and you can live safe and sound.", "pred_label": "__label__1", "pred_score_pos": 0.9761208295822144} {"content": "The Digamma Function is a mathematical function defined as the logarithmic derivative of the Gamma Function. It is represented by the greek letter digamma, which is similar to a psi: Ψ.\n\nViewed on a graph, the Digamma Function resembles the tangent function for z < 0 and a less steep logarithmic function for z > 0. It is undefined at negative integers and zero.\n\nThe nth derivative of Ψ(z) is called the polygamma function, denoted ψn(z). The digamma function itself is sometimes written ψ0, or just ψ.\n\nThe digamma function is sometimes used as the logarithmic derivative of the factorial function, written as F(z) = d/dz ln z!. Since the Gamma Function is essentially the factorial function for natural numbers expanded to real and complex numbers, the two Digamma Functions are related: F(z) = ψ0 (z+1).\n\nHarmonic numbers can be described as the sum of the Digamma Function and the Euler-Mascheroni constant.\n\n\nNotation note: I couldn't find a character for digamma, so I used a psi. The digamma has bars on the top and bottom of the vertical line. If anyone knows how to put a digamma in, let me know, and I'll fix it. Also, the upper and lower case psis look very similar.\n", "pred_label": "__label__1", "pred_score_pos": 0.9972207546234131} {"content": "“In schools class sizes, can range from anywhere from 18 to 35 students, meaning teachers having to split their time equally between 4 to 7 groups of 5 students. Given the choice all teachers would prefer and be more productive with one group of 5 students where they would be with the one group directing and facilitating 100% of the time”.\n\nSteven Shorthose\n\nThis scenario would lead to faster learning and every student getting the attention required to excel. Students and teachers would share certain things like a pantry and common area. An ideal learning environment would be a place where students enjoy more free time to research their passions and interests and follow a curriculum of their choice based on their strengths and needs.\n\nHomework to be completed during school hours and students perusing their interests out of school, in a way that suits them best or simply having family time without the worry of homework in the back of their mind seems far better for happier students.\n\nHappier Students Make Better Learners!", "pred_label": "__label__1", "pred_score_pos": 0.9313421845436096} {"content": "For ICT, Industrial IoT, Weather & Environment\n\nA data analytics platform designed for multi-industry, built entirely on open systems and standards, bringing the most innovative ways to gather, analyse and visualize your data.\n\nOne platform,\n\nadjusts to your creativity\n\nIndustrial IoT\n\nCan work with different data, in real-time, from industrial equipment, to autonomous vehicles and shipping, unmanned aerial, ground and underwater drones.\n\nSmart Design\n\nBuilt on top of future web protocols, like WebSocket and HTTP/2, it can receive data from different systems, sensors and devices using HTTP, MQTT or DDS data protocols.\n\n\nKronometrix analytics platform and applications are built in close cooperation with various experts from different field of industries, focusing on deep domain expertise and data visualization.\n\nKnowledge Base\n\nIt has all necessarily things, built and ready to be used, from metrics, data filters to summary statistics and end-user reports, carefully crafted by our team.\n\n\nContinuous digital\n\nmeasurements for\n\nIoT Providers\n\nFor IoT operators and providers to analyse the performance, availability and inventory changes of entire network of sensors and devices to avoid congestion or downtime and meet service level agreements.\n\nAutonomous Vehicles\n\nProvides important insight from vehicle basic and advanced performance metrics, navigation, speed, direction, fuel, battery lifetime to availability, mean time to repair or service times.\n\nUnmanned Aerial Vehicles\n\nAnalyse the performance of a single or a group of unmanned aerial vehicles that operators will be able to use to predict vehicles behaviour for different mission-specific conditions.\n\n\nFrom air traffic, agriculture to marine navigation measuring weather is essential to save lives, harvest in time or move goods. Kronometrix does that supporting different type of stations.\n\nAutonomous Ships\n\nProvides observability and reporting of autonomous vessel data, from the engine operation, position and navigation, to internal ICT systems, and the overall weather conditions.\n\nEnergy and Utilities\n\nDesigned for energy service providers to drive an energy-efficient production, consolidating and analysing data from different sources to set the direction for sustainability and growth.\n\nMilitary and Defense\n\nFor ultra secure installations, remote or data-centre based, to analyse and support military readiness for defence operations. Includes access to system source code for total privacy and control.\n\nWe are highly\nfocused on your goals.\n\nICT Providers and Developers\n\nMeasure and analyse the performance, availability and security of ICT infrastructure, systems and applications, developing a data strategy for your organisation to defend and continuously improve your business.\n\nWeather & Environment Agencies\n\nIn our complex and rapidly changing modern society, we need to know the weather conditions, the level of air pollution and decide what is acceptable to us. Kronometrix helps to understand, set the correct expectations and and act accordingly.\n\nAutomotive & Marine\n\nTelemetry data for autonomous vehicles and ships to manage and analyse their performance and operational availability. Human-machine collaboration set to drive future technologies and key performance indicators for unmanned systems.\n\nIoT Operators\n\nNetwork operators to analyse their IoT sensor base installations, from asset management, location and security to electric energy consumption, weather and air quality, in terms of performance, availability and inventory.\n\nGet in touch\n", "pred_label": "__label__1", "pred_score_pos": 0.9708648324012756} {"content": "The Influence of Tradition in Japanese Cinema\n\nJapanese culture has arisen as a mixture of the East and the West. Japanese have been able to keep their traditional aesthetic features while they also embraced western style,which was filtered through Japanese tradition. The presence of the Benshi ( a commentator who narrated the action of the film) could be a suitable example of the situation.\nThe beliefs of Japanese people are East originated. Shintoism and Buddhism give lots of importance to the spirits and supernatural forces which are also cultivated in the Japanese mythology. Some of the Japanese directors have been able to combine a western visual art form (cinema) with their traditional beliefs different from the western examples of the same subject matter.\nIn contemporary cinema this particular subject matter (ghosts/demons) mostly taken into the consideration as an element of the horror, but in Japanese cinema they are the elements ofthe drama ( particularly the spirit itself ) as well as a horrifying object. That is to say according to their beliefs, spirits are the ones who are suffering either because lack of the prayers that let them pass to'the Land of the Dead,or because of the evil feelings/behaviors while they were in'the Land of the Living.' Dramatic situations of the suffering souls are represented in a poetic way, as the general look of the Japanese cinema relies on empty spaces, plainness, and landscape appearances. These features also exists one of their basic ordinary life rituels; tea- ceremony. The tea- ceremony roomis decorated almost empty with a plain style and prefarably located with a view of a garden. This proves that ordinary life rituels influces the aestetic features of the Japanese cinema. These influences becomes the resources of the national cinema of Japan.\nThe narration in the Japanese cinema mostly relies on the style which ables to transfer the ideas ( of the director) through the atmosphere of the fil…\n\n\nI'm Sandulf\n\n\nCheck it out", "pred_label": "__label__1", "pred_score_pos": 0.9007861614227295} {"content": "Congo Election News Roundup\n\nSince I was here in the Congo during the election, I thought I’d go ahead and put together a roundup of sorts for those following.\n\nHere’s some context. Joseph Kabila’s second term as president was supposed to end in December of 2016. If elections had been held and a new president taken power, it would have been the first relatively peaceful transition of power in the country’s history. Instead, though, and following a trend of “constitutional coups” across Africa, Kabila tried to pull a Museveni-Kagame-Nguesso and change the law in order to run again. He faced widespread protests and ultimately failed to do this, so instead he simply delayed the elections, securing the ability to stay in power until a successor was chosen despite the end of his mandate. Every delay is another act of glissement, or slippage, in Congolese parlance.\n\nAlongside the delays, several leading opposition figures were also deemed ineligible to run. After attempts by the opposition to consolidate behind one candidate (an effort which succeeded for 24 hours), there emerged two: Martin Fayulu and Felix Tshisekedi were the major opponents to the regime’s chosen successor, Emmanuel Shadary. In the final month leading up to the elections, the state violently suppressed the opposition at every turn, with reports of the recruiting youth to instigate violence at opposition rallies, the use of live bullets and tear gas to disperse rallies, the refusal by government officials to allow rallies to occur.\n\nMy first night in Congo, I watched TV while having dinner in an Aru hotel room. The leading story was that a large fire had damaged a majority of the voting machines in Kinshasa, the country’s capital. The voting machines were already a source of suspicion for many, but the burning of them was also suspicious, as many believed it was an attempt by the state to justify yet another delay. This only made matters worse for elections that have faced logistical problems, partially because CENI, the electoral commission, rejected any foreign assitance (see Laura Seay’s twitter thread about the difficulties of Congolese elections, with or without MONUC/MONUSCO assistance). In the end, CENI announced a one-week delay of the elections.\n\nAnd then, in the intervening week, CENI announced that the vote would be further delayed until March in three locations—Beni and Butembo in North Kivu and Yumbi in Mai Ndombe—due to concerns around the ongoing Ebola outbreak in the former and insecurity in the latter. This decision effectively disenfranchised over a million people, all in opposition strongholds, and for reasons that didn’t pan out. As many pointed out, Ebola has been a persistent problem in North Kivu for months, but people continue to go to school, church, and markets, they could surely vote. In the following days, protests in North Kivu resulted in several deaths. As one friend here said, “C’est un provocation.”\n\nHeading into the election, the Congo Research Group and BERCI released a major opinion poll about the vote. You can access the full report here [pdf], but the key takeaway is this:\n\n\nWith two years of delays, denying several opposition candidates the chance to run, cracking down on popular mobilizations, and disenfranchising several opposition towns, the regime still faced massive rejections by the populace. It was obvious to both observers and Congolese that a free and fair vote would go to the opposition—the question was whether or not the elections would be rigged.\n\nDuring election day, it quickly became apparent that the elections did indeed turn out to be a logistical nightmare—marred by technical failures with machines, people not showing up on voters rolls, and polling stations opening many hours late—as well as problem of the polls’ security—with reports of armed groups intimidating voters at multiple stations. In Beni, activists held a mock vote in an act of resistance to their disenfranchisement, demonstrating that a vote could be held without incident. When I took a tour around Dungu late that morning, I passed by three voting stations where people were queued and the situation was calm (I didn’t talk to anyone), though I did later hear of potential issues elsewhere in the province. In the days after the election, though, reports about election day began to get more complicated.\n\nThere were reports of “systemic irregularities, particularly missing or broken machines, missing or incomplete voter lists, late openings, long waits, restricted access for independent observers, interference by armed actors, and fraud.” The day after the election, the government shut down internet in most of the country, as well as SMS, to prevent “chaos.” On January 4, the Catholic Church, which had 40,000 observers at polling places across the country, issued a statement that, according to their observations, one candidate clearly won the election, and they called on the government to publish accurate results. The next day, Human Rights Watch published a report outlining instances of both voter intimidation by armed groups and spontaneous violence in confrontations between voters and police or CENI staff. Christoph Vogel wrote a useful update focused on the Kivus – of note is that armed group intimidation was diverse, with different groups rigging the vote for the ruling party and opposition.\n\nJason Stearns tweeted an important note as everyone awaited the vote tally. “What happens in the next 1-2 weeks will have a huge impact on developments over the coming decade,” he wrote. “This could unfold in many ways. I find it v hard to believe that Kabila/Shadary will accept defeat and step down. I also don’t think they will be able to rig elections and move on, as we now know that the Catholic Church, opposition and civil society, will put up a fight.” Stearns noted that, in the event of a return to mass violence, especially in major cities and in the East, these weeks were a key moment on which things would pivot (see Laura Seay’s thoughts on what could be done). We are still within a critical juncture as this continues to play out).\n\nEverybody said that they had won. Especially concerning was when someone from Shadary’s campaign said “For us, victory is certain.” A few days later pictures circulated of Shadary’s campaign preparing for a victory celebration. Many were concerned about a rigged win for the regime. But soon these worries were replaced by rumors that a deal had been made. Tshisekedi’s camp had met with ruling party officials to ensure a peaceful transition. People began speculating that he had negotiated some sort of power-sharing transition deal in exchange for beating out Fayulu. Many suspected that whatever the election “results” would be, they would be negotiated by elites rather than represent the actual will of the people.\n\nAnd so the provisional results were set to be presented on January 9th at 11:00pm in Kinshasa (midnight here), and state television began broadcasting shortly before. As we “slipped” from the 9th and into the 10th, people on Twitter joked about yet another instance of glissement. After a long pre-game show of watching people file in and out of the room, CENI finally began around 2:00am my time. CENI officials then proceeded to name each of the more than 700 provincial deputies elected in the country, an announcement that wasn’t supposed to happen for weeks, pushing the presidential results until 4:00am here in Dungu, where myself and three others sat watching TV in the paillote in the compound.\n\nFinally, in the early hours of the 10th, the results were announced.\n\nTshisekedi had won with 38% (7.05 million votes), followed closely by Fayulu’s 34% (6.36 million), and with Shadary’s 23% (4.36 million) a distant third. Many were releieved that the election hadn’t been rigged for Shadary, but for most it seemed an even stranger outcome: that the government had rigged the election for the opposition in an effort to deny a different opposition candidate the presidency. Reuters later confirmed that the Catholic Church had privately briefed some diplomats that Fayulu had won handily.\n\nIn the days since, there were instances of violence in a number of cities on the 10th and 11th. While over a dozen have been killed since the proclamation, and several died on election day, in the face of the potential of riots or a return to civil war, it feels like an instance of declaring it “all quiet on the front” here despite the violence. Fayulu has explicitly called the results fradulent, and may be moving forwards with a formal complaint. Meanwhile, Tshisekedi leaned into his victory, lauding Kabila as partner of democracy in Congo (really).\n\nSome have speculated that Tshisekedi’s deal may have been arranged as far back as when he initialy bailed on the opposition coalition. Pierre Englebert reevaluated the CRG/BERCI opinion poll to show that the results were implausible, stating that “data suggests that the probability Tshisekedi could have scored 38% in a free election is less than 0.0000. There is a 95% chance his real numbers would be somewhere between 21.3% and 25%.” He ends his analysis with some good hypotheses as to when, why, and how Tshisekedi’s bid may have played out.\n\nRegardless, the situation—expertly played by Kabila—hands power over to a constrained opposition candidate (especially with the legislative elections apparently going to the ruling party) while also pitting the opposition against itself as Fayulu tries to organize supporters against Tshisekedi’s ascendance to the presidency. As Stearns put it in a recent op-ed for the New York Times: “If Mr. Tshisekedi is reduced to a figurehead president, the current system of governance will most likely continue. Millions will be displaced, thousands will be killed, and the international community will be left to deal with the wreckage.”\n\nMany have taken this moment, rightly, to call attention to how contingent political processes, and the control that ruling leaders have, can be in the face of popular resistance. Two and a half years ago, Kabila was plotting how to stay in power for a third term. Instead, he not only didn’t run, but his hand-picked candidate lost, even in elections marred by irregularities and implausible results. While this cannot and should not be called democracy, this outcome a symbol of Kabila’s frustrated attempts to remain president, and that was achieved on the backs of (and with many sacrifices among) youth, civil society, the Catholic Church, human rights activists, and civil rights groups.\n\nWhat comes next, however, is yet to be determined. Fayulu may try to contest the results, but it’s not clear if he has any leverage. The Church has decried the results as rigged, but won’t commit to releasing its numbers. Tshisekedi may become president in a relatively peaceful transition, but it is an open question if he will be able to do anything or if Kabila and his elite circle will be able to continue to run the country from behind closed doors. The official results are due in coming days, and the new president is supposed to take power by the end of the week. What this mean for Congo is unclear – we’re still in the midst of a critical juncture for the future of the country.\n\nWhat are elections for, anyways?\n\nThere are several countries in Africa that are holding elections amidst some pretty tense circumstances. In Burkina Faso, after a popular revolt ousted long-time President Blaise Campaoré and then an attempted military coup put a brief hiccup in elections, voters went to the polls just a couple of weeks ago. Burundi has descended into violence amidst efforts by President Pierre Nkurunziza to overstay his welcome and run for a third term, with similar “constitutional coups” being attempted in Rwanda, the D.R. Congo, and other states, and similar efforts are practically routine in Uganda (where Yoweri Museveni will be moving into the 30+ Years of Rule Club with elections in April) and still others.\n\nIn many parts of the world, elections become perennial points from which both popular organizing and protest as well as intense violence and repression emerge. The Burkinabè were able to use Campaoré’s attempts to change the constitution to instead be the cause of his downfall. Burundians tried this but have since been caught in a prolonged struggle over the future of their country. Elections can be points of radical change, but they can also  be events that put the official seal on the status quo or sites of intense state violence.\n\nAmidst this kaleidoscope of possibilities, the electoral landscape also includes the Central African Republic, where elections are scheduled to move the country from a transitional government to a newer, more “legitimate” one. Though the actual reasons for holding elections in the middle of what can only be described as a heap of turmoil raises the question: why?\n\nIn a recent post at the Monkey Cage, Haley Swedlund tackles the question of “Why donors demand immediate elections after unrest in developing countries.” She highlights a number of theories pointing out that quickly pushing through elections actually stymies the democratization process, but she argues that donors need some semblance of stability in order to carry out basic aid projects. She points out that “decision-making is often driven by the functional needs of particular agencies, rather than a sound assessment of the political situation in the recipient country. With only limited funding available, this pattern of behavior means that more fundamental democratic reforms are often sidelined in favor of the ballot box.” In other words, donors want elections not to encourage democratization or because elections could show a peaceful transition, but to serve their self-interests.\n\nA few weeks ago I attended a panel at the United States Institute of Peace about the ongoing instability in Central African Republic. The event centered around a new book edited by Louisa Lombard and Tatiana Carayannis about CAR (which I’m reading now!), and the role of elections was a hot topic during the conversation (a full video of the panel is available here).\n\nCAR has seen shocking episodes of violence over the last few years as rebellion led to a cycle of reprisal attacks that immersed both the countryside and Bangui in violence. During the panel, Roland Marchal argued that we need to reflect more on the types of solutions we offer to the current conflict. He listed several core issues facing the Central African people, including abuse by the state, arbitrary enforcement of the law based on religion, and said that “these are the questions that have to be discussed and it is not organizing elections that is going to provide answers.”\n\nFaouzi Kilembe pointed out three key problems: the question of identity in CAR (and who can vote), the question of logistics and how to prepare to hold elections, and the question of security and how to hold elections in the current situation of insecurity. Two very important points he raised are that no matter the outcome, the results will be contested (likely violently) by one party or another, and he asks what miracles the newly elected government will be able to achieve that the transitional government cannot. Similar questions arise in William Clowes’ piece at the African Arguments blog about whether elections will make things worse rather than better.\n\nWhen asked to respond to Kilembe’s statements at the panel, Laurence Wohlers argued for holding elections because logistics aren’t going to improve, the question of legitimacy won’t be solved by waiting, and the transition needs to end in order to place power in a government entity beyond international community, which leads him to say that “we have to have an election that is admittedly not going to be a good one.” He focused most of his response on what to do after, including a long list of post-conflict reforms. Marchal disagreed, stating that questions of accountability, religious discrimination, demobilization, go unanswered even though the international community has money for such interventions, because “the international community doesn’t do it, not because it’s bad, not because it’s ignorant, but because it’s busy on the election.” Later, Marchal pointed out that the urgency for elections by the international community don’t necessarily resonate for people who haven’t participated in a free and fair election in decades. Carayannis notes at the end that the timing of elections is tied to France’s desire for an exit strategy, stating that “we need elections tied to what’s actually happening in CAR, not what’s happening in Paris.”\n\nThe international community wants elections, partially because elections are what signal “post-conflict” status and, thus, act as a sunset provision on the French intervention there, regardless of actual improvement of the situation on the ground. As Lombard mentions in a different panel on elections in CAR, the international community “tend[s] to think in terms of ‘well, these are the Central Africans’ elections, they’re elections for the Central African Republic… and we’re just helping” but at the same time “there would be no elections if it weren’t for all of these different kinds of international players who were involved in all of this. These are our elections too.” Circling back to Haley Swedlund’s point – elections are demanded due to international community’s interests no matter what is going on in the actual country of concern.\n\nThe first round of elections occurred on December 30th amid relatively little violence, and the results will be announced soon. The voting was lauded as an “undeniable success,” but that won’t actually be known until the results are announced, the run-off is held, and whether the new government can successfully move the country forwards through the present insecurity.\n\nThe Durability of Museveni’s Uganda\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nVoting as a Right\n\nThere has been a lot of talk around what some would call liberals’ obligation to vote for Barack Obama this November, followed by a lot of critiques from a marginalized Left. Between his pension for drone strikes and his slow pace on gay rights and immigrant rights, on top of his utter failure to take any sort of stand for far-left ideals, I can see why a lot of people on the Left don’t want to cast that vote. While a vote for Obama can act as a vote against the Republican Party, just how much do we reward Democrats for being slightly less terrible than Republicans? I’m intrigued by this debate, but it’s not what this post is about.\n\nLong ago the idea of voting as a privilege was cast off, with the franchise extended to a number of minority groups. But the remnants of that idea, the idea that only the elite are blessed with the vote, still remain. Many Americans have the opportunity to vote now, but that opportunity is limited in a host of ways, including voter ID laws and disinformation campaigns aimed at confusing voters. In a country where the vote takes place on a work day, with inflexible hours, and rigid rules regarding absentee voting and polling places, it is far easier for the privileged to vote.\n\nIt is this fact that leads many to feel obligated to vote, despite the weary mantra that our votes don’t count (and between the electoral college and big-donor-funded candidates, a lot of these votes don’t). That we have the opportunity to vote means that we need to use that opportunity. To be American is to vote.\n\nBut democracy doesn’t end with casting a ballot. That’s just where it begins. If your fed up with the two parties, then there’s a lot that you can do beyond just voting for the lesser evil. And in a first-passed-the-post system, I’m certainly not talking about voting for a third party. But if you can’t stomach voting for Obama, particularly if you live in a state not listed as a gradient on polling maps, I don’t care what you do. I hope you’ll still vote in your local and state elections, because that is where tons of liberal reform could actually happen (seriously, foster those ideas in your community). And I hope you go beyond the simple act of voting and decide to take on the act of organizing for change outside the electoral system. The fact of the matter is, voting is a right – and that’s all it is. To be American is to have the right to choose who you vote for – and to choose whether or not you want to vote at all.\n\nWe have the right to vote for whomever we want, and that right should matter. Voting should play a role in choosing effective leaders, and it should serve as a voice for what we want to see in our government. To that end, choosing not to vote isn’t surrendering that voice – it’s shouting something entirely different. It’s a protest of a rigged system, and it’s a protest of a party that isn’t listening.\n\nVoting Rights for Everyone!\n\nThis afternoon I, presumably like a lot of people, raised an eyebrow when I read that officials were estimating a 119% voter turnout in today’s Wisconsin recall election. My mind first jumped to Tammany Hall and ballot stuffing, and I remembered a clip in Gangs of New York in which the Irish were getting haircuts by Mad-Eye Moody between votes. It turns out that such a high turnout number is actually possible in Wisconsin because the state allows same-day voter registration, something I didn’t even know existed. Election Day Registration, it turns out, is an option (in some form or another) in eight states and Washington, DC. This is hugely awesome, and I wish more states did this.\n\nArizona, like a lot of states, has some restrictions on voter registration. In the Copper State, on top of registering 30 days before elections, on election day you will also need one ID with your name, address, and photo or two forms of ID with your name and address. And a hope that you don’t accidentally go to the wrong polling station or you don’t have an early ballot sitting at home somewhere. Add on the misinformation floating around out there, and even registered voters can face obstacles to voting. Allowing same-day registration helps make it easier for people moving to still vote in their new districts, especially since students often move right around primary season in many states. I think the more people that can vote, regardless of who they’re voting for, the better.\n\nThat’s why I’m a huge supporter of #16toVote, or really any age to vote. I figure we’re all affected by government, we should have the ability to choose them. Lowering the age to 16 gives voting rights to people who often work, go to school, drive, and do a number of other things that are directly affected by the government. Plus, voting’s awesome. If you want to vote, you should be able to, regardless of your age. Or your citizenship.\n\nIn the United Kingdom, you don’t have to be a citizen to vote. Citizens of Commonwealth countries and Ireland can vote in all elections, and citizens of European Union countries can vote in local and regional elections. Immigrants live under the same laws as all of us – even undocumented immigrants drive on our roads and pay the same sales tax. Shouldn’t they have the right to vote? After all, taxation without representation is what our democracy was founded on. Plus, some states used to allow alien suffrage less than a century ago.\n\nI guess the best decision would be to abolish voter registrations. North Dakota hasn’t had voter registration since 1951. That’s better than denying residents the vote because of some technicality involving school or poll stations or identification. I don’t know what methods they have of restricting by age or citizenship, but I’m sure they exist. If suffrage has spread from white, male, landowners over 20 to include women, people of color, and 18-year-olds, I figure it’s not outlandish to ask for a youth vote or for immigrant rights. Even if it might take a while.\n\nWhat’s Happening in Uganda Tomorrow?\n\nOn Friday, Uganda will be holding presidential elections.  Even eight months ago when I was in Uganda it was big news.  So, what’s going on in Uganda?\n\nYoweri Museveni, President of Uganda for over twenty years and leader of the National Resistance Movement, will be running for re-election yet again.  He is running against a slate of opposition figures, chief among them Kizza Besigye of the Forum for Democratic Change.  But what’s important about this election?\n\nDespite having won every election since seizing power, Museveni’s victory margin has been diminishing.  In the last election he only won with 59% to Besigye’s 37%.  With notable corruption and a diminishing economy in addition to failure to secure the north and west against rebellions, Museveni faces the possibility of winning only a plurality in tomorrow’s election.  According to Ugandan law, if there is no clear majority than the front-runners compete in a run-off election.  If this is the case, it is likely that the less viable opposition figures such as Norbert Mao and others would throw their support behind Besigye, ushering him into the presidency.\n\nThat said, Museveni is consolidating control.  In both 2001 and 2006 the Supreme Court of Uganda ruled that the elections were flawed with corruption and vote-rigging, but both upheld the election returns for various reasons.  This election season there have already been rumors that the NRM has been buying votes in certain regions.  There are even cases of Museveni personally handing out envelopes of money to prospective voters and of Parliament receiving funds that slant towards NRM victory.  This in addition to a possible repeat of Museveni’s announcements a couple of years ago that any districts that did not vote for him would risk not receiving national funds for programs.\n\nIt looks like Museveni is setting up the elections in his favor.  Regardless, there may be some room for the opposition to sneak a victory.  But, even if that happens, he may not relinquish power.  Besigye has been exiled before and accused of treason, a strong run against the President could result in similar consequences.  With the vote taking place tomorrow, I’ll be keeping my eyes on how things unfold.\n\nElection Reactions\n\n\nProgressives took a hit.\n\n\nBlue Dogs took a bigger hit.\n\n\nCorporate Candidates took a hit too.\n\n\nThe House Switched\n\n\nProblems at the Polls\n\n\n“Firsts” and “Lasts”\n\n\n\n\n\n\n\n\n\n\nArizona Votes\n\nArizona is the product of the progressive era.  As a result of the bipartisan wave of people asking for a more democratic democracy, Arizona’s constitution has all sorts of “by the people” parts to it.  The initiative, referendum, and recall are all pretty basic parts of Arizona’s law.  The initiative is the ability of people to petition for amendments and the referendum is the ability for legislators to bring up proposals that voters must approve.  As for recall, Arizona was actually denied statehood until the territory took the ability to vote to recall judges out of the constitution – but in the state’s first election it was reinstated.\n\nEvery election we have a plethora of propositions brought up by initiative or by referendum.  I know last election I talked a bit about the fun ones (like the idea of counting every missing vote as a no-vote for finance-related propositions) and the bad ones (defining marriage as the union of a man and a woman).  This year we’ve got the expected “hands off our healthcare” proposition.  But we also have an effort to make the right to hunt part of our constitution – right up there with speech and bearing arms; there’s also putting an end to affirmative action and stopping early childhood development and health programs.  I’m not usually a fan of most propositions, and this election cycle isn’t any different, it seems.\n\nI’m not sure if other states are like Arizona.  I know most don’t have the ability to vote appointed judges out of office.  I’m assuming most people in other states don’t vote every four years for the office of State Mine Inspector (I have heard there are up to 120,000 abandoned mines in Arizona).  Do you all have the option to vote for school boards?  How about justices of the peace? What’s weird about your state’s political process?", "pred_label": "__label__1", "pred_score_pos": 0.6467889547348022} {"content": "Max Dirt Bike\n\n\nIn Max Dirtbike, your objective is to complete each of the 19 obstacle courses in the fastest time possible. You will need to maintain a delicate balance for your rider throughout the game to avoid crashing. If you do crash, you get to start the level over again and you can start over as many times as you need to.", "pred_label": "__label__1", "pred_score_pos": 0.692581057548523} {"content": "245 - Okemos Public Schools v1 - Page 14\n\n14 3. Illegal drugs, including but not limited to those substances defined as \"controlled substances\" pursuant to federal and/or state statue; 4. Steroids, human growth hormones or other performance-enhancing drugs; 5. Substances represented as illegal or performance-enhancing drugs, i.e., \"look-alike\" drugs; mind altering substances. 6. Misused prescription drugs. “Distribution”  includes  the  “hosting”  of  a  party  at  which  the  host  is  aware  that  any   of the substances listed above are provided at the site by any person. It shall not be a violation for an athlete to use or possess a prescription or patent drug pursuant to a doctor’s legal prescription which the student has permission to use in school pursuant to Board Policy. An athlete shall notify his/her coach if he/she  is  taking  a  prescription  medicine,  which  could  alter  or  affect  the  athlete’s   behavior or ability to participate in physical activity. B. Use, possession, concealment, distribution, manufacture or sale of devices designed for and/or associated with the use of controlled substances, e.g., to include but not be limited to a marijuana pipe, \"roach\" clip, rolling papers, or devices used to smoke, inhale, inject, or otherwise consume controlled substances. C. Violation of federal, state or local law/ordinance, including felony or misdemeanor acts other than minor traffic offenses. Conviction is not necessary to establish a violation of the Athletic Code, but will be determined through an independent school investigation and may result in a penalty. D. Cumulative or gross misconduct, or conduct unbecoming an athlete and a representative  of  OHS  may  result  in  a  penalty,  including  “hazing”. E. Violation of the Student Code of Conduct which results in a school suspension. F. Violation of any team conduct, grooming or training rule established by the coach and approved by the Athletic Director. If the Athletic Code or other school policies or procedures do not cover situations that arise, the administration reserves the right to establish such rules, conditions, and penalties to respond effectively to unanticipated or unique circumstances or to institute a more severe penalty. 3. Penalties A. Conduct Offenses: Violation of Conduct Standards C-F above and the venue is off the athletic field or court.", "pred_label": "__label__1", "pred_score_pos": 0.99942547082901} {"content": "Richard Long joins the ELS Team\n\nRichard Long has worked in the helping professions for the past 18 years working in leadership positions in wilderness therapy, community behavioral health, therapeutic boarding schools, and public high schools. Richard is passionate about helping youth and young adults succeed, overcome difficult circumstances, and become the best version of themselves. Richard specializes in providing tiered interventions, restorative frameworks, and youth and adult leadership models. Richard completed a Master of Social Work from Arizona State University in 2007 and a Master of Educational Leadership from Capella University in 2016. He loves his family (wife and 4 kids), his bikes (mountain or road), and his ropes (rock climbing and canyoneering)!\n\nThe Importance of Drug, Alcohol & Substance Abuse Prevention & Education in Schools and the Effect It Has\n\nThe latest Monitoring the Future survey revealed that drug abuse is declining among America’s teens, yet an alarming number of students are still putting their lives at risk by abusing drugs and alcohol. According to the US Department of Health and Human Services, around 50% of teenagers have tried illicit drugs at least once in their lifetime. With illicit drugs, misuse of prescription drugs, and binge drinking providing cause for concern across the US, it’s useful to explore and analyze the importance of drug, alcohol and substance abuse education in schools and to evaluate the impact it has.  \n\nThe importance of substance abuse education in schools\n\n  Education provided in schools plays an instrumental role in educating children and teens about the potential implications of their actions and habitual behaviors. Many parents choose to speak to their children about taking drugs and drinking alcohol, but not every child will receive an education of this type at home. Drug and alcohol education in schools can help to ensure that no child slips through the net, and also offer a different perspective of substance abuse and a different arena in which to share comments, thoughts, or experiences. Some students may be apprehensive about talking to their parents or being honest with them, and school-based activities and programs may be more effective.   There are several reasons why drug and alcohol education is crucial in schools. A comprehensive curriculum can provide pupils in middle school and high school with information that could have a significant impact on the choices they make both at school and in the future.   Essential factors to consider include:  \n\n • Spotting the warning signs of addiction\n • Understanding the potential implications of taking illegal drugs or drinking too much and raising awareness of addiction\n • Learning about the impact of addiction or illicit behavior on others, including friends and family members\n • Understanding how to help others who may be struggling\n • Figuring out ways to cope with stress, sadness, or anxiety without drinking or taking drugs\n • Providing an insight into the kind of help that is available if you are going through a tough time\n\nThe current situation\n\n  2018 statistics show that although drug abuse and binge drinking are becoming less prevalent in school-aged children, there is still a long way to go. More than a third of students in the 12th grade smoked marijuana last year, with over 3% taking LSD and 2% trying cocaine. Over 13% of 12th-grade students and almost 9% of 10th-grade pupils admitted to binge drinking. The reality is that despite improvements, there are still hundreds of teens putting their lives at risk.   Drug and alcohol education can help to reduce the risk of students falling foul to drugs. This relates not only to pointing out the implications of abusing drugs or alcohol, but also to teaching children to learn to cope with potential triggers for stress, anxiety, and depression and to enable them to adopt positive ways of thinking that give them the confidence to say no to things they don’t want to do or to break a habit.  \n\nThe impact of drug, alcohol and substance abuse education in schools\n\n  Every day you spend in school is a learning experience, but often, curriculums are so focused on mainstream educational classes that they miss out valuable life lessons. Many pupils will have little or no idea about the potential consequences of smoking cannabis or drinking shots of vodka when they try them for the first time. Often, with alcohol and marijuana, which are considered ‘soft’ substances, students assume that there is nothing to worry about, but both of these substances are highly addictive. Drug and alcohol abuse education in schools is vital for providing teens with the information they need to make choices, and equipping them with the skills they need to get by in the outside world where they may be more likely to take drugs or drink too much. Additional programs like Education Life Skills’ Marijuana Prevention course can reinforce school learning and provide additional support for educators and parents looking to help the children in their care.   There has been a great deal of debate about the efficacy of school drug education programs in the US in the past, but the National Institute of Drug Abuse suggests that school drug campaigns are effective when they are well-researched and delivered in an engaging manner that takes the target audience into account. The most recent MTF survey suggests that drug and alcohol abuse are becoming less commonplace among students at middle and high school, and this would suggest that school programs are having a positive impact. Figures for binge drinking, for example, have fallen from 31.5% of 12th graders in 1998 to 13.8% in 2018.   In addition to school programs, which are implemented as part of the curriculum, other approaches can also offer a solution. In Indiana, the mother of a 16-year-old who died after taking a synthetic drug called 25I-NBOMe, has convinced more than 40 schools across the state to participate in events and activities as part of National Drug & Alcohol Facts Week. Jeanine Motsay, mother of Sam, stressed the importance of providing students with facts and taking steps to bust myths that surround drug and alcohol consumption that are often perpetuated through music videos, TV shows, and movies.  \n\nPrevention is better than cure\n\n  One of the most important aims of drug and alcohol education programs should be to promote prevention. The National Institute on Drug Abuse suggests that every $1 spent on prevention contributes to a 10-fold saving on drug treatment. One key element is adjusting the mindset of individuals who are compelled to use drugs or drink excessively as a coping mechanism. Education Life Skills’ Captivity- Substance Abuse Prevention course is designed to promote prevention in a way that helps parents and educators to help teens build self-esteem, increase confidence and adopt a way of thinking that eliminates cravings and empowers them to make better choices.   We tend to think about school classes as a means of teaching students to read maps or work out equations, but lessons that are focused on educating pupils about the risks of taking drugs and drinking excessively should form an integral part of classes for youths. These sessions, which can be supported by external programs and local and national events and campaigns, provide young people with valuable information, insightful stories, examples and case studies, and advice about seeking help or assisting others.\n\nHow Do We Stop Distracted Driving? It’s a Deadly National Crisis for Our Teens\n\nDid you know that every single day, 9 people lose their lives and more than 1,000 people are injured on US roads as a direct result of distracted driving? Distracted driving is a problem across all age groups, but studies suggest that teenagers are the most commonly affected demographic. The CDC claims that drivers under 20 are more likely to be killed in a car crash caused by distracted driving than any other age bracket. The statistics don’t lie, so why is distracted driving so common among young people, and what can we do to put a stop to it? What exactly is distracted driving? Distracted driving is a term given to anything that takes your eyes or your attention off the road. There are 3 main types of distraction, including\n\n 1. Visual: this is a distraction that causes you to take your eyes off the road, for example, reading a text message\n 2. Manual: this form of distraction makes you take your hands off the wheel, for example, opening a message on your phone or adjusting the radio\n 3. Cognitive: cognitive distractions prevent you from focusing on driving, for example, talking to a passenger\n\nThe most common type of distraction for drivers under the age of 20 is using a cellphone. This may relate to making phone calls, texting or reading text messages or emails, or using social media sites like Facebook, Instagram, and Snapchat. When you’re on your phone, the risk of being involved in an accident is high. You might not have both hands on the wheel if you’re holding the handset, your focus won’t be on driving, and your eyes will be on the screen, rather than on the road. Texting while you drive is particularly dangerous. According to the National Highway Traffic Safety Administration, reading or sending a message involves you taking your eyes off the road for 5 seconds, which is sufficient time to drive the length of a football pitch.\n\nWhat are the consequences of distracted driving?\n\nOne of the most important messages we can provide teenage drivers with via Education Lifeskills courses and awareness programs in middle and high schools is the gravity of the consequences of distracted driving. When you drive a car, you’re not just responsible for your own safety, you also have a duty to protect others from harm. This includes passengers, pedestrians, cyclists, and other road users. The implications of distracted driving can be horrific and life-altering. Examples include:\n\n • Legal action and police charges, fines, and penalties\n • Harming yourself and sustaining injuries\n • Injuring or even killing another person\n • Damage to your car\n • Higher insurance rates\n • Dealing with parental disappointment and anger\n • Losing your license\n\nThere are driving laws in place to prevent distracted driving, but there are also many things educators, parents, and external providers of courses and programs for youths can do to encourage young drivers to be responsible behind the wheel. Here are some ideas to promote distracted driving awareness in schools and communities:\n\n • Providing driver education classes in middle and high school: most students learn to drive outside of school, but offering sessions that are designed to highlight risks and encourage safe driving can be an incredibly useful addition to the curriculum.\n • Organize events and campaigns that raise awareness of common causes of accidents among teens, including distracted driving, drink driving, and speeding. Schools in Williamson County launched a new program called Checkpoints after losing five students in crashes between November 2016 and January 2017. This involved engaging in one-to-one training sessions in order to obtain a parking permit for the school. The county also applied for a grant to provide schools with VR goggles to provide students with an accurate insight into what happens when you face potentially hazardous situations.\n • Talk about the risks of distracted driving in classes and offer additional sessions for those who want to learn more. If students are aware of the risk of texting while they drive, they’ll be more likely to put their phone down when they take to the wheel.\n • Use case studies and facts to back up your argument: many of us assume that car crashes are something that happens to other people, but the reality is that anybody can be involved in an accident. Using case studies and statistics and facts can help to clarify your argument and make teens more aware of the risks of taking their eyes off the road, even for a second. A CDC survey from 2015 suggests that over 40% of young people text or send emails while they drive.\n • Discuss external organizations and arrange talks for young drivers: there are several organizations that specialize in promoting safe driving among teens, including End Distracted Driving and Impact Teen Drivers, and there’s also a host of online resources available. Education Lifeskills offers a great, interactive Distracted Driver course for teen drivers who find it difficult to stay focused when they’re driving.\n • Limiting the use of cellphones in schools to get students used to being away from their phones.\n\nWhy is distracted driving so common in teens?\n\nToday’s teenagers have grown up in a world that is very different due to the rise in popularity of the Internet, cellphones and social media. Research suggests that Americans check their phones up to 80 times per day, and the figure may be even higher among teens. Young people communicate by phone, they like to keep in touch with friends and family throughout the day, and many also feel obliged to keep tabs of their social media accounts. A poll conducted by the AAA suggests that 94% of teen drivers are aware of the potential risks of texting while driving, but over a third still do it. Teen drivers are four times more likely to be involved in crashes than adults when texting or talking on a cell phone. Part of the problem is that teens are so used to having their phones with them all the time that they can’t resist the temptation to make a call, scan their Instagram feed, or send a text even though they’re driving. The aims of campaigns and distracted driving courses should be to educate young drivers about the consequences of distracted driving, but also to highlight the fact that you don’t have to be connected to your phone 24-hours-a-day. If a call is urgent, it’s much safer to pull over or to use an in-car hands-free system. Education Lifeskills’ course is not a traffic program, but rather a training module that emphasizes the importance of a safety-first approach to driving. Distracted driving is the most common cause of car accidents among young drivers. To tackle the crisis, teenage drivers, parents, educators, nonprofits, and external training providers can work together to raise awareness of the dangers of distracted driving and make our roads a safer place for everyone.\n\nSetting Social Emotional Goals for Yourself & Students\n\nAlthough education has typically been viewed as being about giving students academic and technical skills, there’s an increasing recognition that social-emotional development is important, too.\n\nData suggest that IQ is not a complete predictor of job performance. EQ, or a person’s emotional intelligence quotient, is possibly more critical because of the growing role of collaboration, teamwork, and interpersonal skills in the modern workplace.\n\nThe question for educators, therefore, is how to set better social-emotional goals for themselves and their students. In short, what can educators do to foster emotional development among the people in their care to help them get to where they want to go?\n\nRecognize That Goals Should Be Unique To The Individual\n\nWhen it comes to our emotions, people are different. Some people have issues regarding anger, while for others self-attack and rumination lead to mood disorders, like anxiety. Any suitable goal setting strategy must reflect the individual needs of the person concerned.\n\nUse The SMART System\n\nSetting goals shouldn’t be a blind process either for you or your students. It should be couched in a framework derived from the science of behavioral change, like the SMART system.\n\n\nGoals should be specific in the sense that they should refer to a particular social-emotional circumstance, like how you or your students feel while in group situations. For instance, a student might want to address his or her feelings of fear or laziness while working with other people.\n\nGoals should be measurable. That is, a person should be able to use a method to ensure that they are making progress.\n\nGoals should be attainable. When goals are perceived as too difficult, then people are less likely to want to strive for them. Goals should be challenging enough to provoke real progress, but not so hard as to appear impossible from the start.\n\nGoals need to be relevant. Relevance refers to the idea that developing one’s social-emotional status is something that is worth doing. Here it’s worth highlighting the benefits of better social-emotional skills, including the ability to form lasting, sustainable relationships, advance faster in a career, or make more progress doing something entrepreneurial.\n\nFinally, goals should be time-based. Time creates pressure to achieve goals sooner rather than later so that they are not put off indefinitely. A time-based social-emotional goal might be to overcome one’s frustrations about something before the end of the year.\n\nSpend Time Reflecting On Goals\n\nOnce you and your students have established a set of goals, it’s a good idea to reflect on them. The purpose of reflection is to evaluate whether the goals meet the SMART criteria. An individual may initially believe that their social-emotional goals do conform to the requirements, but following discussion with you and other students, it could turn out that they don’t. Useful goal setting, therefore, requires a degree of reflection and external moderation. Sharing goals helps to improve accountability and develops support between group members. Goals can be a team effort, with mutually-interlocking support structures.\n\nGet ELS courses at your school or district\n\nRecommended Books for Social Emotional Learning\n\nSocial-emotional learning is fast becoming a bedrock of modern approaches to education. Social-emotional learning books help students develop independence from teachers and caregivers, preparing them for life outside of school in the modern workplace and higher education.\n\nWhat are some good books for social-emotional learning? Let’s take a look.\n\nMatthew and Tilly by Rebecca C. Jones\n\nWhen Jones set out to create Matthew and Tilly, her vision was to teach children about the profound benefits of conflict resolution. The story is set around the tale of a black girl called Tilly and a white boy named Matthew. The story begins with Matthew and Tilly playing together happily, but they get into an argument over a crayon. The fight results in both children going their separate ways and trying to play by themselves.\n\nThe problem is that they each end up resenting the fact that they are alone. Sure, there’s no need to negotiate with another person, but there’s also less fun when experiencing something alone. The story concludes with the pair making up and agreeing to play together once more; the moral of the story being that it’s worth the effort of negotiating with other people so that everybody can get along.\n\nThe Book Of Mistakes by Corinna Luyken\n\nMany people grow up with a “fear of failure.” Thanks to some modern educational practices and pressure from caregivers, children can begin to associate their achievements with their personal value from a young age. Not only is this emotionally unhelpful, but it can also lead people to avoid challenges in the future, should they be revealed as incompetent.\n\nLuyken, therefore, set out to show the positive side of “mistakes” or “failures.” Her book follows the story of people who turned their mistakes into fabulous success, thanks to what they learned early on. Errors can create the inspiration that changes a person’s life. They should be viewed as valuable information and an incentive to change one’s behavior or outlook, not an indication of some personal lack of worth.\n\nI Like Myself by Karen Beaumont\n\nNegative self-talk is a plague on our society, ruining the lives of those who would otherwise be perfectly adequate people. Beaumont set out to create a book which helps foster positive self-talk in children, arresting damaging cycles of rumination that can develop early on in life.\n\nHer story focuses on the notion that we should have a positive attitude towards ourselves, regardless of the opinions of others.\n\nArgyle Fox by Marie Letourneau\n\nMarie Letourneau’s book, Argyle Fox, focuses on the story of a young fox who wants to play games and have fun outside. However, the wind keeps on scuppering his plans, ruining his fun by blowing down his card tower. Letourneau’s purpose in this book is to teach children the value of perseverance and overcoming challenges. Sometimes things in life are hard. A child might feel frustrated, but the way to overcome frustration is to deal with it head-on, figure out what you’re doing wrong, and then make modifications. It’s about experimentation and positive attitudes.\n\n\nImpact of Social Emotional Learning on Student Achievement 100%\n\nSocial and emotional learning is an approach to education that has been growing in popularity, focusing on creating a safe and positive learning environment that fosters an ability to succeed not just in school, but in careers and throughout life.\n\nWith schools that are growing more diverse, with students from multicultural backgrounds, different social upbringings, and a range of economic circumstances, it can help children better engage in learning, positive behavior, and social engagement with peers. But what is the impact of social & emotional learning (SEL) on student achievement? Here, we’re going to look at how SEL also provides a positive influence on academic performance.\n\nWhat is social & emotional learning?\n\nStudies have shown that SEL can help improve academic achievement by 11 percentile points on average, besides improving socially cohesive attributes, such as sharing and empathy and combating mental health issues like stress and anxiety. But how does it do this? Through working with schools, families, and throughout the communities, SEL takes an approach of developing five key skills that can greatly improve the attitudes of students towards schools. The five skills are as follows:\n\nSelf-awareness: Understanding of one’s emotions, goals, and values. By assessing our strengths and shortcomings, we can improve our mindsets regarding our own performance, leading to optimism and improved self-esteem\n\nSelf-management: When we are more aware of the connections between our thoughts, feelings, and actions, we can better regulate them. Skills like stress management, delaying gratification, and impulse control help students manage their own reactions and keep a positive, productive mindset when faced with challenges, especially in school.\n\nSocial awareness: Better understanding social norms in a given context, such as school, family, and the wider community, as well as awareness of support and resources available can help us be more connected to our network, helped with lessons on empathy, compassion, and understanding those in different circumstances.\n\nRelationship skills: With social awareness opens the door to fostering healthier relationships. Building relationship skills like active listening, communication skills, cooperation, and conflict negotiation can help us build a network of more rewarding relationships with peers and teachers.\n\nResponsible decision making: Learning how to make constructive choices when it comes to behavior, interactions, and academic goals. This includes learning now just how to set achievable aims but also to address ethics, safety, and behavioral norms regarding the situation. Better evaluations of actions and consequences can help students stay safe and responsible.\n\nTo many of us, these behaviors may seem intuitive. However, they need to be learned and need to be taught. By assuming that all students come to school with these skills already ingrained in them is to put them at an automatic disadvantage compared to their peers. This can lead to major differences in academic achievement between students. How does SEL and the skills mentioned above contribute to achievement in the classroom and beyond?\n\nHow SEL contributes directly to achievement\n\nAs mentioned, a meta-analysis of schools, parents, and students that have incorporated social & emotional learning practices has shown an average of an 11 percentile point rise in students’ achievement scores. The range of soft skills learned through SEL contribute to this greatly, but one of the primary benefits is the change in attitude towards school. Understanding the importance of responsible decision making in school, being more aware of their own habits and how to control them, and the rewards that come with delayed gratification and better relationships in the school make a direct impact on academic achievement.\n\nSocial cohesion and academic success\n\nBetter awareness of social norms and appropriate behavior can help prevent students from inappropriate interactions that can sabotage their relationships with peers, teachers, and parents. This can prove a roadblock to the positive relationships that help create better attitudes towards schools and may make it harder to develop productive bonds with teachers, meaning they get less attention in the classroom. SEL can help students get along better with others and can develop the close student-teacher relationships that are a crucial ingredient of academic achievement. These close relationships encourage students to perform better, to embrace challenges, to seek help when they need it. Furthermore, they can lead to outcomes like references when going into further education or the workforce, helping students achieve well beyond the classroom.\n\nBehavioral improvement and achievement\n\nMany a teacher, parent, guardian and even student are aware that behavioral problems can impede achievement. Behavioral infractions in the class can lead to missed school time, actively sabotaging their education. Furthermore, acting inappropriately due to poor impulse control can damage the relationships a student has with their peers and teachers, negatively impacting their attitudes towards school in the long-term. SEL students are overall less aggressive and less disruptive in school, as well as being less likely to have behavior and substance abuse problems before the age of 25.\n\nMental health and academic success\n\nSchool can be a stressful time for any student, at any age. Changes in one’s own personality and perspective, as well as a shift in our own social positioning can manifest in many negative ways. Mental health issues like depression, anxiety, stress, and social withdrawal are on the rise, specifically in teenagers and most especially in teenage girls. Students engaged in social & emotional learning show fewer occurrences of these problems across the board. This is due in part to self-management skills like planning, improved attention spans, and the ability to control their own impulses and reflect on their own thoughts. Given how mental health can greatly affect our self-esteem as well as our ability to devote more attention to a task, it should be no surprise these changes can lead to better academic achievement.\n\nOngoing studies are continuing to prove what those engaged with social & emotional learning have already known for some time. Teaching the skills that often get left behind in the classroom can help even the playing field for a range of students from different cultural, social, and economic backgrounds, making a positive impact on achievement for everyone involved.\n\n\nThe Importance of Relationships in Social Emotional Learning\n\n\n\nWhat is social emotional learning?\n\n\nWhat are examples of social emotional skills?\n\n\n\n\n\n\n\n\n\nHow does social and emotional learning affect schools?\n\n\n\nSadly, the relationship between a children and teachers is often forgotten\n\n\n\n\n\n\n\nSocial Emotional Learning Curriculum for High School\n\n\n\nWhat is Social Emotional Learning?\n\n\n\nWhat Social Emotional Learning can teach in High School\n\n\n\n\nHow Education Lifeskills delivers Social Emotional Learning\n\n\n\n\nThe impact of a Social Emotional Learning Curriculum for High School\n\n\n • Better academic performance\n • Improved attitudes and behaviors and an increased commitment to education\n • Less classroom disruption, noncompliance, aggression and delinquency.\n\n\nSocial Emotional Learning Curriculum for Middle School\n\n\n\nWhat is Social Emotional Learning?\n\n\n\n\nWhat Social Emotional Learning can teach in Middle School\n\n\n\n\nHow Education Lifeskills delivers Social Emotional Learning\n\n\n\n\nThe impact of a Social Emotional Learning Curriculum for Middle School\n\n\n", "pred_label": "__label__1", "pred_score_pos": 0.9731887578964233} {"content": "Questionnaire Hilda Paredes\n\n\nPlease introduce yourself briefly. What is important for you, musically and otherwise?\nI was born in Mexico where I spent the first 21 years of my life. I started studying music in Mexico but I can probably say that I became a composer while living in London. Therefore my music reflects a strong influence of the European musical tradition, although the diverse cultural life of Mexico, has also given me a strong creative impulse. While living in London I became acquainted with Indian music and dance, so many of my decisions concerning ways of manipulating rhythm and structure have been influenced by my interest in the music of India. I have found that many Indian rhythmic procedures can be applied to Western music. However, I do not attempt to quote any traditional music of any country nor to recreate it.\nThe longer I live away from my country, the more I become aware of my roots. Part of my family is from Yucatan, the Southeast part of Mexico where the Maya culture flourished. My Grandfather spoke fluently the Mayan language and I learnt from him some words and sayings. Through the years I have become more interested and fascinated by the traditions and culture (old and actual) of the Mayan people. These have often been a source of inspiration for my music.\n\nCan one make a living these days solely from composing?\nOnly if you can live very frugally and if you don't have anybody depending economically from you.\nOr if you are extremly successful and can get high commission fees.\n\nHow do you compose (approach, duration)?\nI always start by trying to imagine the whole piece as it could be when it is finished. Sometimes I can find visual images or poetic metaphors or textures which can help me to conceive the landscape and character of a piece. For me it is important to know what the piece is going to be about. The answer to this question becomes the motor which keeps the creative impulse alive throughout the compositional process.\nOften I try to think of all possibilities and limitations that the instruments can offer and I then create a palette of textures. Structure is very important for me and I try to plan it in general terms, from the beginning. Although when it comes to working out details, structure is closely linked to rhythm and harmony in my music, so I often have to make adjustments and change things that I planned in the first draft. I then need to start working out detailed pitch and harmonic material.\n\nTo what extent do you use traditional forms?\nI don't use traditional forms. By integrating new sounds and creating a new harmonic language, a new syntax opens possibilities for new forms and structures.\n\nHow often do you receive commissions, and how do these come about? Do you wait for a commission and then compose the work to fit the criteria, or do you submit a work you have already completed?\nI have been very lucky in the past 12 years, most of the music I have written has been commissioned or sponsored in one way or another. I don't know how they come about. I think just musicians have been interested in me writing music for them and I am always happy when this happens.\nI have not had to wait for a commission. It usually is the other way around: I have to ask the musicians to give me more time because I am still trying to finish a piece when another one needs to be written.\nI like writing a piece for a specific person or group. This gives me encouragement and more personal contact with the players (writing music is a rather lonely job). Therefore I never have submitted a previously written piece when I have been commissioned.\n\nIn your opinion what is the lot of a composer today compared with that of one 50 or 150 years ago?\nToday there is a great diversity of musical languages, all with new proposals and ideas. I think this makes our time a rather exciting time to be living in. Technology makes many different kinds of music, many from far off cultures very accessible, something that was impossible 50 or 100 years ago. This is also fascinating.\nHowever, we are also living the phenomena of globalization and its attempt to create a market for culture by changing true artistic values for numbers. Before, 50 or 150 years ago there was still talk about how good was a piece of music or what innovations this or that composer was creating. How often do we now hear people talking just about how successful an artist is or how many people went to hear a concert? This is worrying.\n\nWhat music do you listen to in your free time?\nI listen to a cross-section of new music, in particular composers I don't know. I also listen to traditional Indian Music, and also traditional music from different parts of the world and classical music. I often listen to the radio. The BBC plays mostly classical music, but sometimes there is the possibility to hear new things.\n\n\nWhat is important in a composer's formal training years?\nI think it is important to be able to hear a lot of music and to always be curious about how this music is put together through the study or scores. It is also important to hear your own music, and as well as the confirmation that things work aurally to also be able to learn from your mistakes.\n\nAs a composer do you need to continue your education, if so, how?\nA composer never ceases to learn. Every piece I write is a new exploration of possibilities and I learn from each one of them. It works like this: you try something new maybe that you are not sure will work. If it does, it's a wonderful surprise and then maybe you can use it again in a different context or develop it further.\nIt is also possible to continue to learn from other music if your curiosity draws you to it.\n\nWhat is your opinion of the training offered by the conservatiores or universities?\nIn my experience, it's what you make of it. I was always very happy to be in an environment where music was in the making all the time, one way or another. At the Guildhall school of Music in London, where I studied, there was a good library with lots of recordings and scores. With the possibility of having my pieces performed, I had the chance of hearing everything I wrote and also have it recorded (no digital techniques in those days, but still, a recording).This enabled me to begin to get my work known. In Mexico the music schools do not have the facilities and resources that their European counterparts have, so for me it was fantastic to have access to all this. I enjoyed being a student in London.\n\nWhich particular composers did you concentrate on during your study?\nThe list is rather long! Schubert, Mozart, Beethoven, Gesualdo, Victoria, Composers from the Ars Nova, Schumann, Haydn, Bach, Debussy, Liszt, Brahms, Webern, Schoenberg, Berg, Stavinsky, Ravel, Messiaen, Ligeti, Lutoslawski, Stockhausen, Revueltas, Maxwell Davies, Birtwistle, Carter, etc.\n\n\nWhere do you think New Music stands today? What prospects does New Music have in the future?\nThe music of our time is a reflection of the times we are living in, as it has always been throughout the history of humanity. It's the music that reflects the creativity of today and it is a response to the society we live in. It is therefore very important to keep it alive by performance and re-performance. Music will continue to be written and hopefully performed as well, as long as there are still sensitive and imaginative people wanting to perform it. The industry of entertainment will not stop people who are truly creative. It might make life very difficult, but I believe there is an audience for our music, an audience of people who are not satisfied with the emptiness that the industry of entertainment often has to offer. There is an audience of people who want to listen to an interesting and challenging music which will also awaken their imagination and senses. I consider myself part of this audience.\n\nIn your opinion is New Music today defeated by the laws of the so-called Market?\nWe are living in a difficult time where often only profitable merchandise seems to have value. All artistic expressions have immeasurable value and this is precisely the problem. How many times have I been asked by people, how do you know when a piece of music is good? It has no label telling you what it is made of, there is no advertisement on the TV telling you how efficient it is....How do you justified investment in New Music when it is so hard to show in numbers how profitable it is?\nArt and Music are some of the biggest treasures a culture has and must be kept alive.\nFestivals, promoters, musicians and composers, all have a responsibility to keep this music alive. It is ultimately an alternative to the passiveness that the culture of masses' market offers. A society without creativity and imagination is a dead society, so now the big responsibility is to keep it alive.\n\nMany composers state that they do not write for the listening public. What is your view?\nI think an audience is made up of many individuals, all with different perceptions for likes and dislikes. It is impossible for me to think of pleasing the audience when I am writing music, but I have an \"imaginary listener\" who hears everything I write. This listener is often critical. It is for this listener for whom I write.\nWhat happens afterwards, during a performance, is out of my control. I have had many surprises when people tell me they hear things in my music I never thought about before.\n\nWhat role do the publishing houses and recording companies play in New Music today?\nWriting music is a very intense , demanding and solitary experience. It is therefore difficult for a composer to go out and 'promote' what is so close to oneself. Some composers are able to do it, but the world we are living in demands a lot when it comes to promotion of ones own work. How do you make your recently created music known? This is when publishers and record companies can help.\n\n\nWhat are your personal perspectives and projects for the future?\nAfter this work I am now finishing for Ensemble Modern, I have to write a piano quintet to be premiered at the Melbourne Festival in October of this year. I also have a project for a music theatre piece based on a story by Isabel Allende, where I also want to include some ancient Mayan spells, which I have set to music before. (A piece I wrote last year for Neue Vocalsolisten, Stuttgart). It is about the way Indian culture has survived in Latin America through 500 years of colonisation and it makes a parallel to the way women have also preserved their identity. It is also about the weakness of power when confronted with love and beauty.\n\n\nPlease describe the piece which the City of Frankfurt and Ensemble Modern has commissioned from you, and your thoughts and reflections on the subject.\nIt is like a concerto for ensemble, where different instruments coming to the foreground in different sections of the piece. I wrote this piece very much with the players of Ensemble Modern in mind. I have heard the Ensemble often, and knowing some of the players, I wanted to write a piece for specifically for these players. In general this piece has eight distinctive sections with a short 'coda' at the end. In each of these sections, different instruments feature. Only the opening has the whole ensemble playing, which functions like an introduction. This leads to a section where the horn, strings, piano and percussion are the main characters in a rather expressive section. There is a short transition given to the two clarinets and percussion that has a rather humorous and playful idea to lead into the next section. Here the flute introduces the new material and gradually the clarinets and the rest of the ensemble joins in. The English horn, harp, muted strings, piano (inside the strings) and percussion are the main characters in a new expressive section. The trumpet introduces a new rather bright and rhythmic section, later joined by the trombone and horn. Here there are some contrasting ideas which interrupt each other. This resolves by the whole ensemble playing quite frantically before we reach the transition to the closing section of the piece. This transition is played by the bassoon, double bass and percussion made out of transformed material played before by the clarinets (also a transition). The last section is played by the trombone, timpani, strings and piano. I have applied some techniques I have developed over the years, some inspired in the rhythmic structures of the music of India. Whilst writing this piece I became acquainted with the ways the Mayas used to measured time. This gave me some ideas to apply to music, so in some of the metric and pitch decisions, the number 13 is quite important (13 is also a number in the fibonacci series). The Mayas had 13 days and 20 different names for them and overlapped them in cycles. In this work, I have explore new possibilities which I hope to continue working on in the future.", "pred_label": "__label__1", "pred_score_pos": 0.993419349193573} {"content": "\n\n\nBy Tony Perkins President\n\nTony Perkins is President of Family Research Council. This article appeared on on August 25, 2019.\n\n\nAs a former police officer, this perspective on gun violence is not an academic approach. I’ve encountered armed suspects and dealt with gun-related violence. I’ve lost friends, gunned down in the line of duty. I have a full appreciation of the stress that families of law enforcement officers endure each day as their father, mother, son, or daughter head out to protect their neighbors and communities.\n\nAs president of the Family Research Council, I also saw gun violence from another perspective – as a target of hate. Our organization in Washington D.C. was attacked by a now convicted, domestic terrorist. Inspired by a leftist organization, Floyd Lee Corkins came into our offices with 100 rounds of ammunition and began firing, critically wounding one of our team members.\n\nYet the growing frequency and scale of such armed atrocities are symptomatic of a much deeper crisis, fomenting for decades. It is dishonest and self-serving of politicians who claim that this crisis is the result of statements made by President Donald Trump about securing our southern border. How would they explain the mass shootings that took place in Orlando, Sandy Hook, San Bernardino or Aurora during the Obama administration?\n\nWhile policies may have an impact on this issue, unfortunately the debate never gets beyond the stalemate over \"gun control.\" Though an ardent supporter of the Second Amendment, I am willing to talk about laws regarding the ownership and use of guns by those who should not have them. But the missing component to this discussion playing on an endless political loop is the impact of the moral vacuum created by eliminating values, faith and civility from the public square.\n\nRestricting the implements of violence while ignoring the causes is futile. Our nation's capital, with some of the most restrictive gun-ownership laws in the country, clearly illustrates this point. Washington has a gun murder rate of 18 per 100,000, and the city's gun-control laws did not protect our organization. Nationwide, as many as 80 percent of gun-related crime involves illegal guns.\n\nAnd do laws blocking gun ownership stop murder? The United Kingdom, which already has strict laws on the ownership of guns, began restricting the sale and possession of knives over three inches long after a rash of episodes of knife violence last year. The focus on tools still misses the greater problem.\n\nA deadly game with life-and-death stakes plays out in all cultures when violent people choose to act against their fellow citizens. Rock, paper, scissors, machete, rope, knife, gun – the instruments chosen are secondary to the reasons people strike out.\n\nAs Jesus observed in Matthew 15:19, from the human heart comes murder. To talk about the \"why\" and not just the \"how,\" requires we go beyond external, environmental factors to focus on the internal aspect of morality.  And we can't have an honest discussion about morality without including religion.\n\nOur nation’s founders understood the importance of faith and morality working hand in hand in our republic to restrain the worst of our human nature. George Washington in his farewell address at the end of his second term as president included several pieces of advice for preserving America's prosperity, security and happiness.\n\n\nWashington was not alone in this conviction. John Adams, the second president of the United States, recognized the limitations of our laws. In speaking to the Massachusetts militia, Adams said, \"Our Constitution was made only for a moral and religious people. It is wholly inadequate to the government of any other.\"\n\nSome will be quick to say that nearly 250 years later, America has moved beyond the faith that inspired nation builders. That is a tragedy. Today our culture increasingly marginalizes public faith and religion, pushing it from the public square. But in the process, we've lost public morality, common decency and virtue, which are essential to freedom.\n\nTo achieve security for our families and communities while preserving the freedom that has made America great, we have only one option: Restore morality by renewing our commitment to the free exercise of religion. In other words, we should protect, not prevent, religious freedom.\n\nOur baser nature clearly is not changed by passing more laws. The promises of security through more government restrictions will only serve to erode our freedoms while providing little protection. Rather, the solution to the gun violence plaguing our nation will be found in a willingness to recognize, as did the Founders, that as a people we are dependent upon and accountable to an omniscient God.  It is only from such an understanding that morality and public virtue become commonplace, which is essential for freedom.\n\nAs Americans, we must carefully consider the path we take in addressing this present and growing crisis. New gun laws never achieve what a commitment to the Golden Rule can accomplish. America will be safer if all of us do unto others as we want them to do unto us.", "pred_label": "__label__1", "pred_score_pos": 0.9883333444595337} {"content": "Opening Titles 04.10.19\n\nOur title sequence for the current Sky One drama, ’Temple’ featuring Mark Strong and Daniel Mays. Playing with the visual narrative of descent, the sequence follows the protagonist as he travels deeper and deeper into a dark and unexpected underworld. The sequence was conceived, designed and produced at Hingston Studio for Hera Pictures. Score by Matthew Herbert.", "pred_label": "__label__1", "pred_score_pos": 0.999997079372406} {"content": "December 10, 2019\n\n\nThe United States Has the World’s Fastest Supercomputer Again\n\nThe newly-completed Summit supercomputer is specifically designed to run artificial intelligence software. The United States has been falling behind when...\n\n\nRemove Weird Smells From Any Camera the Easy Way\n\nSo you did the smart thing and bought a used DSLR instead of a new one — thus saving you hundreds of dollars —...", "pred_label": "__label__1", "pred_score_pos": 0.7246323823928833} {"content": "Acupuncture & Anxiety: How can acupuncture reduce anxiety & improve wellbeing?\n\nSeptember 2, 2017\n\n\n\nAcupuncture and Anxiety: How can acupuncture reduce anxiety and improve wellbeing? \n\n\nAnxiety is often a natural response to stressful situations but for 40 million US adults, or 18% of the US population, anxiety becomes more than just a transitory experience; it becomes an entrenched dysfunctional emotional response. One in eight children are affected by anxiety disorders. It’s estimated that 80% of children go untreated for their anxiety and only 50% of adults receive treatment. Anxiety disorders include: Generalized Anxiety Disorder (GAD), Panic Disorder, Social Anxiety, PTDS, and OCD. Anxiety disorder is often concurrent with depression, chronic pain, eating disorder, body dysmorphia and sleep disorders. The underlying cause of anxiety disorder may be genetics, trauma, stress, brain chemistry, substance abuse, other medical conditions and often a combination of these. (\n\n\nThose with anxiety disorders are two to six times more likely to visit medical doctors for other health related reasons. Western medicine is finally beginning to recognize the connection between emotions and physical illnesses but more often than not people with anxiety disorders are seeing multiple doctors for all their different symptoms and taking a handful of pills to manage multiple symptoms. ( For over 2,000 years Oriental Medicine theory(OM), also known as Eastern Medicine or TCM (Traditional Chinese Medicine), the guiding theory of acupuncture and acupressure has taught that the internal cause of most physical illnesses have their origin in an emotional imbalance and the reverse: that a physical imbalance can in turn lead to an emotional imbalance. \n\n\nHow does acupressure and acupuncture work to resolve and prevent anxiety? Several biochemical explanations have been revealed by recent research. Anxiety is associated with an activation of the hypothalamic-pituitary-adrenal (HPA) axis (Tsigos, 2002). The HPA axis is how our brain and endocrine system interact to modulate the stress response. Recent studies indicate that acupuncture decreases and moderates the activation of the the HPA axis thereby decreasing the effects of stress, including the experience of anxiety (Eshkevari, 2013). Anxiety is also associated with low vagal tone (vagus nerve) which leads to low dopamine levels.\n\n\nIn OM, anxiety is associated with the Heart and ‘houses’ the Spirit-Mind, called the Shen. The Heart is associated with the element of Fire. The Heart is also considered the Emperor or Empress, the supreme, benevolent ruler of the body. When the Heart is at peace then the Mind (Shen) is calm and the body is in harmony. \n\n\nConsider this East-West integrative way of understanding anxiety by drawing connections between the hypothalamic-pituitary-adrenal (HPA) axis and the function of the Heart & Kidney in OM. The hypothalamus among other things regulates heart rate, blood pressure, body temperature and sleep cycles paralleling many of the functions OM ascribes to the heart. The pituitary gland is often called the Master gland of the endocrine system regulating all the other endocrine glands in the body, similar to the Heart’s role as the Emperor of the body. The adrenal glands are situated on top of the Kidneys: in OM the kidneys and adrenals are associated with the element of Water. Emotional and physical wellbeing rely on a balance of Yin (Water) and Yang (Fire) is essential for a calm Shen. \n\n\nSelf Acupressure Routine for Quelling Anxiety \n\nOne of the best acu-points to calm the heart and reduce anxiety and increase melatonin production (improving sleep cycles) is Ht7 (Spence 2004). H7 is located  on the wrist crease above the pinkie finger . Place gentle pressure here, you’ll feel a pulse. Hold this point and take long, slow, full deep breaths. \n\n\n\n\n\nAt the same time you’re holding Ht7 you can place your feet on on the floor stimulating the acupoint Ki1 with a small ball or marble. Ki1 is located below the ball of the foot between the 2nd and 3rd toe. \n\n\n\n\n\n\n Visualize water in the lower half of your body and fire in the upper half or focus on the sensation of temperature: feeling heat in the upper half and coolness in the lower half. And as you breathe and hold the acu-points feel the sensation of coolness balancing the heat, or water rising up to meet the fire and fire dropping down meet the water. Bringing your Fire and Water in to balance to calm your Shen-mind. \n\n\nThe vagus nerve is the 10th cranial nerve and it interacts with the heart, lungs, esophagus, digestive tract, adrenals and the uterus. This helps explain why those with anxiety often have multiple health symptoms. Acupuncture has been shown to improve vagal tone, which helps improve health symptoms in related organs while naturally stimulating higher dopamine levels (Torres-Rosas, 2014). The acupuncture point most often utilized in these studies is St36, ZuSanLi. Try doing acupressure at this point: Locate St36 by placing one hand just below the outer knee cap (index finger by the knee cap), use your other hand to find St 36 (just below your pinkie finger) just off the outer shin.\n\n\nIn OM, what brings the heart out of balance is ‘over-joy’; in essence this refers to being overly stimulated and overly excited. In a culture where ‘the pursuit of happiness’ and pleasure is a social value, where we are constantly entangled with technology and media, especially social media, and where FOMO (fear of missing out) has become common enough to receive its own acronym - its easy to understand how ‘over-joy’ can lead to a state of perpetual anxiety. To cultivate a serene mind and calm your inner Empress/Emperor develop a moving mediation practice such as yoga, Qi Gong or Tai Chi, or taking long, mediative walks. Resolve to do a tech/media ‘cleanse’ and disengage from technology and media for short, therapeutic doses (15-60 min per day) and build up to longer and longer periods away (1-3 days). Spend time with less ‘going on’ around you. Reducing your overall sensory stimulation can help you cultivate a calmer Shen.\n\n\nTry herbs for anxiety! A licensed acupuncturist and herbalist can help you discover your OM pattern and provide you with a perfect herbal formula to quell your anxiety and calm your mind and body.\n\n\nCome try Acupuncture & herbal medicine for anxiety @ Yin Rising Acupuncture! \n\n\n\n\n\n\nBergland, Christopher, Feb. 02, 2013, The Neurobiology of Grace Under Pressure: 8 Habits that Stimulate your vagus Nerve and Keep You Calm, Cool, and Collected\n\n\nEshkevari, L., Permaul, E., & Mulroney, S. E. (2013). Acupuncture blocks cold stress-induced increases in the hypothalamus–pituitary–adrenal axis in the rat. Journal of Endocrinology, 217(1), 95-104.\n\n\nSpence, D. W., Kayumov, L., Chen, A., Lowe, A., Jain, U., Katzman, M. A., ... & Shapiro, C. M. (2004). Acupuncture increases nocturnal melatonin secretion and reduces insomnia and anxiety: a preliminary report. The Journal of neuropsychiatry and clinical neurosciences.\n\n\n\nStix, Gary, May 1, 2014, Can Acupuncture Curb Killer Immune Reactions? A Needle-Based Technique has been shown to switch on naves that tamp down sepsis,\n\n\nTorres-Rosas, R., Yehia, G., Peña, G., Mishra, P., del Rocio Thompson-Bonilla, M., Moreno-Eutimio, M. A., ... & Ulloa, L. (2014). Dopamine mediates vagal modulation of the immune system by electroacupuncture. Nature medicine, 20(3), 291-295.\n\n\nTsigos, C., & Chrousos, G. P. (2002). Hypothalamic–pituitary–adrenal axis, neuroendocrine factors and stress. Journal of psychosomatic research, 53(4), 865-871.\n\nPlease reload\n\nRecent Articles\nPlease reload\n\nYin Rising Acupuncture\n\n2129 East Warner Road, Suite 104\n\nTempe, AZ 85284\n\n\n • Facebook Classic\n • Twitter Classic\n\n© 2016 Yin Rising", "pred_label": "__label__1", "pred_score_pos": 0.9222315549850464} {"content": "In an official document dated late July, the Shanghai Federation of Trade Unions, the city’s branch of the country’s official, Party-affiliated trade union, outlined the major themes of its work going forward, including preventing “enemy infiltration” alongside its work in managing foreign NGOs. The document’s articles discussing foreign NGOs strongly suggest that international organizations, at least in the labor sector, are viewed primarily as a national security, rather than a civil society, issue. Though the...Read more\n\nWhat Does Charity Mean in China?\n\nDespite the Charity Law’s Definition, the Answer Is Still Elusive\nChina’s Charity Law effectually governs a broad universe of non-profits while refusing to define essential terms. And, of course, organizations the government regards as sensitive—including some religious, political, human rights, and other independent associations of particular segments of civil society—will not be permitted to register despite likely compliance with the law. But what does it mean, under the Charity Law, for an activity to be “charitable”? Though the Charity Law for the first time provides...Read more\n\nChinese Partner Units: Who (and Where) Are They?\n\nWhen considering the impact of the Foreign NGO Law, we often think first of the foreign NGOs themselves—who they are, and where they’re able to gain approval to carry out work in China. Yet, for foreign NGOs carrying out temporary activities in China, Chinese Partner Units (CPUs) are critical players whose organizational structure, location, and capacity affect what activities will be possible. Notably, it is CPUs, and not foreign NGOs, that actually submit temporary activity...Read more\nHow common is it for a temporary activity to cover multiple provinces? Are some provincial Public Security Bureaus (PSBs) more likely to allow cross-provincial activities than others? How many of all the temporary activities are just being done by a few big organizations? Are we seeing a drop-off in organizations filing for temporary activities, or in organizations deciding not to come back after holding one or two? Are groups able to successfully “renew” their year-long...Read more\nEstablishing operations in Taiwan wasn’t the most logical option for international organizations whose missions demanded they be on the ground to engage with the challenging but dynamic “wild west” of civil society work in the P.R.C. Could the Foreign NGO Law alter this status quo?Read more", "pred_label": "__label__1", "pred_score_pos": 0.6575102210044861} {"content": "“Putin arms race thing”\n\nRORY (while reading Lorelai’s newspaper veil): Wait, don’t move.\nLORELAI: Rory, stop it.\nRORY: This Putin arms race thing is really getting crazy.\n\nIn June 2001, Russian President Vladimir Putin warned that the Bush administration’s proposed national missile defence system could trigger an arms race, as he had no option but to upgrade his own country’s nuclear forces. In real life, this was reported on June 18 2001, which is later than it appears to be in this episode, as Lorelai’s June 21 engagement party is still some time away.\n\nIvana Trump\n\nLORELAI: Wow, hope she’s not kosher.\nBOOTSY: I don’t know, doesn’t say here.\n\n\n\n\n\n\n“Peace out, Humphrey”\n\nEMILY: Everyone’s awfully quiet tonight.\nLORELAI: Sorry Mom, I’m just tired.\nRORY: Me too – school.\nRORY: Life.\nLORELAI: Dig it, man.\nRORY: Peace out, Humphrey.\n\n\n\n\n\nPalestinian and Israeli Families\n\nLORELAI: Why were you in the Mideast?\nRACHEL: I was doing a photo story on how Palestinian and Israeli families have been affected by the violence.\n\nFrom this statement, we know that Rachel’s trip to the Middle East was specifically to Israel and the Palestinian territories of the Gaza Strip and the West Bank.\n\nIn 1948 the Jewish Agency declared the independence of the state of Israel, immediately followed by the 1948 Arab-Israeli War, which saw Israel established while the West Bank and Gaza were held by Arab states. Since the Six-Day War of 1967, Israel has occupied territories such as the West Bank, Gaza, and Golan Heights.\n\nIt is the world’s longest military occupation in modern times, with no peace agreement in sight. The violence of the conflict is well known around the world, and casualties extend to civilians as well as the military. Most of the casualties have been Palestinian.\n\nPresident Bush\n\nLORELAI: I hate President Bush … He’s stupid and his face is too tiny for his head and I just want to toss him out.\n\nLorelai is talking about George W. Bush (born 1946), who had been elected President of the United States in November 2000, and sworn in on January 20 2001, less than two months previously from Lorelai’s perspective. He is the son of George H.W. Bush, who was US President from 1989 to 1993. Like so many famous people referenced in the show, George W. Bush has a Connecticut connection, being born in New Haven: he also attended both Yale and Harvard.\n\nLorelai’s perception of George W. Bush as “stupid” was one shared by many people, due to his frequent lapses of grammar, mangled sentences, and baffling statements. Polls showed that American voters saw him as having a low intelligence. Historians rate his presidency quite poorly, although his popularity has picked up since he left office in 2009.\n\nIt was rare for Gilmore Girls to stray far into politics, so this was an unusual moment which identified Lorelai as a Democrat. She was clearly desperate to get attention away from Rory, and her plan worked. Impulsive as ever, Lorelai didn’t stop to think whether her comment was going to make the evening easier. It didn’t help things.\n\n“You run directly for president”\n\nLANE: We’ll tell her [Lorelai] that we’re meeting Dean for a movie, and then we go to the movie, and then somebody who just happens to be a friend of Dean’s just happens to be there for the same movie, and so we figure that it would be completely rude for us to not ask said person to come sit with us.\nRORY: I say to hell with governor, you run directly for president.\nLANE: It’s not that bad.\n\nMany US Presidents have been Governor of their state before making the run for the White House, including George W. Bush, former Governor of Texas, who had only recently (from Rory’s perspective) been sworn in as President, on January 20 2001.\n\nIn 2001, the last US President to run for President without standing as a state Governor was George Bush Sr. [pictured], who was a Congressman, Ambassador to the UN, Ambassador to China, then Director of Central Intelligence before his successful presidential campaign in 1988 (sworn in 1989).\n\nRory is saying that Lane’s lying is on a scale that only a politician at the highest level could come up with. Lane understandably tries to downplay that one.\n\nBaked Alaska\n\nLORELAI: Oh! Meringue.\nSOOKIE: Yeah, I thought I’d do a variation on a baked Alaska for dessert tonight.\n\nBaked Alaska is a classic American dessert consisting of ice cream in a dish or baking tray which is lined with cake, then the whole thing covered in meringue and quickly browned in the oven. The ice cream won’t melt as the meringue protects it, and the oven is very hot so that cooking time is brief.\n\nAccording to legend President Thomas Jefferson, earlier mentioned, was the first person to serve Baked Alaska, in 1802. He served a dessert which was warm ice cream in a pastry shell, so not really the same, but shows that the idea of baking ice cream had been around a fair while – and a presidential connection is always a cool thing to have.\n\nThe famous Delmenico’s Restaurant in New York City claimed that their chef Charles Ranhofer named the dessert to mark America’s purchase of Alaska from Russia in 1867. The actual dish was probably created some time after the purchase, and Ranhofer called his dessert “Alaska, Florida” to indicate the extremes of heat and cold in the dessert. He published the recipe in 1893.\n\nThe first known published recipe for something resembling Baked Alaska is in Mary J.B. Lincoln’s Frozen Dainties in 1888. It seems to be much the same as the modern dish and she calls the dessert Ice-cream en Deguiser (“ice cream dressed up”). Lincoln was the first principal of the Boston Cooking School, so the dish has a distinguished pedigree.", "pred_label": "__label__1", "pred_score_pos": 0.6206427812576294} {"content": "star formation\n\nAlso found in: Wikipedia.\n\nstar formation\n\n(stellar birth) Stars are formed by the gravitational collapse of cool dense (109–1010 atoms per cubic meter) gas and dust clouds. Most are born in giant molecular clouds; a few lower-mass stars condense from smaller molecular clouds and Bok globules. There are problems, however, in initiating the collapse of a gas cloud. It resists collapse because of firstly its internal motions and the heating effects of nearby stars, secondly the centrifugal support due to rotation, and thirdly the magnetic field pressure. In a massive dense cloud shielded by dust, it is believed that collapse can be triggered when the cloud is slowed on passing through the spiral density-wave pattern of our Galaxy (see densiry-wave theory): it is noticeable that star formation preferentially occurs along spiral arms. Alternatively compression may be caused by a shock wave propagated by a nearby supernova explosion – which may explain how stars are formed in galaxies without spiral arms or with only patchy spiral arms.\n\nOnce collapse starts, instabilities cause the cloud to divide into successively smaller fragments of about the Jeans mass (see gravitational instability). At first, radiation can escape freely but eventually, when the cloud becomes dense enough, the opacity increases and the temperature rises, at which point fragmentation ceases. These final fragments are protostars, which now collapse individually. This collapse is gentle at first but after some hundred thousand years (for a star of one solar mass) the density and temperature rise sharply at the center, forming a hot core that will be the future nucleus of the star. Theoretical models show that the protostar will contract along the Hayashi track in the Hertzsprung–Russell diagram. The slow contraction heats the core to a temperature of 10 million kelvin, which is sufficient to initiate nuclear fusion reactions in hydrogen. Once the nuclear energy source is established, the contraction is halted and the star joins the main sequence.\n\nInfrared and radio observations of star-formation regions are now filling out the theory. The infrared satellite IRAS found many small infrared sources within molecular clouds and Bok globules. Most are probably young stars still cocooned in dust, but a few may be true protostars. Molecular-line radio astronomy has revealed the gas motions in regions of star formation. Predicted infall velocities are very low and are often masked by random motions in the gas. Despite this, infall has now possibly been detected in a few cases. In addition, surprisingly high velocity gas has been revealed near the young stars at the center, forming two oppositely directed beams – bipolar outflows – from the massive young stars. These outflows must affect star formation in the cloud, either disrupting protostars or promoting their formation by compressing the surrounding gas. Young stars are often surrounded by disks of dense gas and dust. The disks are apparently more common among single stars than in multiple-star systems, and may be the precursors of planetary systems. The gas in the disk may be spiraling inward and increasing the star's mass substantially, after hydrogen fusion begins. The effects of bipolar outflows and late accretion from a surrounding disk have yet to be incorporated into theoretical models; they may alter quite substantially the simple theory given above.\n\nAlthough stars in small molecular clouds and Bok globules are often single, most stars form in dense clusters. Such clusters also contain compact gas clumps that emit powerful maser radiation from water molecules (see maser source).\n\nThe young stars gradually dissipate the surrounding gas cloud by the effects of heating, radiation pressure, and the gas outflows. The latter often break through first, indicating the presence of the star by an optical bipolar nebula or a string of Herbig–Haro objects. When massive O and B stars are present, they light up the residual gas as an H II region. The massive stars take the shortest time to form, 100 000 years or less, and are normal main-sequence stars by the time they become visible. Less-massive stars are seen while they are still contracting and have appreciable amounts of surrounding gas and dust: these pre-main-sequence stars appear as Be, Ae, and T Tauri stars. A star like the Sun takes 50 million years to reach the main sequence.\n\nReferences in periodicals archive ?\nThe supermassive black hole at the center of jellyfish galaxy JO201 is stripping away gas and throwing it out into space, accelerating suppression of star formation and effectively 'killing' the galaxy.\nThe orange-pink glow seen in the image is hydrogen gas, a key ingredient in star formation, reacting to intense light that streams outward from the newborn stars.\nPhysical processes that play a key role in driving galaxy formation and evolution, such as star formation and stellar feedback, and super massive black hole formation, accretion and feedback, take place on extremely small, sub-galactic scales.\nA NEW METHOD OF MEASURING star formation in four galaxies in the early universe finds that they're producing more massive stars than expected.\nObservations have previously detected cold gas, dust, and even new/residual star formation in elliptical galaxies [2-5].\nThe stripping of gas is thought to have a significant effect on the galaxy's development, removing cold gas from the galaxy, shutting down the formation of new stars in the galaxy, and changing the appearance of inner spiral arms and bulges because of the effects of star formation.\nInfrared Dark Clouds (IRDC) are dense, cold molecular clouds that are likely to host massive star formation due to their physical and chemical properties.\nA transition might happen around z=1 as the cosmic star formation rate starts its decrease.\nGalaxy wars; stellar populations and star formation in interacting galaxies; proceedings.\nHigh rates of star formation are common among some remote galaxies, which hail from the early universe, but the Green Peas are relatively nearby--between 1.5 billion and 5 billion light-years from Earth.", "pred_label": "__label__1", "pred_score_pos": 0.9997557997703552} {"content": "Toad World® Forums\n\nGrid sorting on number values\n\n\nToad x64.\n\nWhen display grids should be aware to sort display on numbers like numbers and not like strings. I.E “9” is before “2000”…and so on.\n\nThere are all around this problem. So is there any estimation when to fix that.\n\n\n\nWhen you run queries with F5, the data is stored internally as a string, so sorting will be as a string. If you want Oracle to sort your queries, run with F9 (which is more efficient anyway) or include an “Order by” clause.\n\nHi John,\n\nsounds good when you have ability to have influence…but in Session browser all grid data I have no influence at all.\n\nBut thx for the tip with F9.\n\n\n\nOh, Session Browser, OK. Which grid, and which column in that grid of the Session Browser are you clicking on? We try to mimic the same data types as Oracle in these grids, but maybe one of them is off.", "pred_label": "__label__1", "pred_score_pos": 0.5295401215553284} {"content": "The joy of creating star trails\n\nI have longed to try my hand at star trails for many years, and for one reason or another there would always be an excuse as to why I didn’t try it. Finally, all the factors came together to allow me to give it a proper go. With star trail photography you 100% have to know what you’re doing, I say this because if you’re ‘experimenting’ and don’t fully understand the factors involved then more than likely you will waste many hours getting cold in the dark and come back with nothing!\n\nThere are numerous tutorials out there which are comprehensive and will help you understand the fundamentals. One article I would definitely recommend is by Floris Van Breugel.\n\nThis blog is going to breeze over the general set up and workflow of putting together star trails. Just to make it clear I am not an expert astrophotographer but if you want to create an image similar to the one above then this might be helpful. So lets get started!\n\n\nAs I mentioned before, preparation is key to getting really rewarding results. I really recommend you read the article above and also do some things which can really make your life easier – such as the brilliant Star Chart app for your smart phone or tablet. This app gives you a map of the starts, which is particularly helpful if you know nothing about the stars (like me) and want to find polaris, the north star (if you’re in the northern hemisphere). The reason why you want to find polaris is that it is the centre point for the stars rotation, so effectively the stars are rotating around it.\n\n\nCamera (obviously), preferably one that is compatible with a remote which has an intervalometer built in, or use a camera like the X-T1 which has one built in. An intervalometer is a device that can control your camera to take pictures at set intervals for a set number of photos and sometimes for a set duration. This is VERY helpful as it means that you can set up your shot and leave your camera to take all the photos for the duration of the shoot without any further input from yourself. From there you’ll usually want to use a wide-angle lens to capture as much of the sky as possible. Finally you need a sturdy platform to leave your camera, more often than not a good tripod (however I have managed to produce some shots using a gorilla pod too!).\n\nThe composition I chose. Note that taking long exposures after sunset using Velvia can produce some incredible colours!\n\n\nHopefully you have found a suitable location, ideally with little light pollution, on a relatively clear night (with a good forecast). Foreground is what makes a star trail photo different from all the other star trails, so really think about you composition and how you want the star rotation to affect your photo, whether you want to have polaris in the picture to have a centre point for the stars to move around, or whether you want to shoot away from polaris to exaggerate the star movements.\n\nThis wants to be done all before sunset happens. Choose your location, frame your image and then don’t change it, leave it on the tripod! Over the next hour or so take a selection of sunset photos, preferably with F8/11 to give you a large depth of field, which you won’t be able to shoot later. If you really want to cover all the bases then you can do some bracketing to make sure you have every part of your composition correctly exposed.\n\nStar test\nThis is a 5 minute exposure I did to make sure I was happy with my composition. You can start to see the movement of the stars, particularly those furthest from polaris (just above the horizon a third of the way in from the left).\n\nAs the stars start to come out you can then set up your camera for star photography. I used an X-T1 and a XF10-24mm F4 OIS for the top photo. I set it up to shoot a series of 30 second exposures at F4, ISO1600. 30 seconds is the longest that you can run with the built in intervalometer, ideally you would shoot longer exposures so you didn’t have so many photos to merge later, but this is often the easiest way.\n\nA screen grab showing the first star-focused image. the sky still has colour but the stars are clear.\n\nA few hours later and I stopped the camera and downloaded the shots.\n\nPost production\n\nThis is where it gets quite interesting and fun, now that you have the shots you can experiment to see what works best for you. I downloaded all the images into Lightroom and selected all of the star-focused images and ran a preset on them which boosted the highlights to make the stars brighter. This helps to make the star trails that much brighter. Don’t worry about the rest of the content in the star images as this will be replaced by the earlier landscape image. Once the images were all ready to be blended together, I exported them as high resolution jpegs.\n\nI then opened Photoshop and used a script made by Floris Van Breugel which you can find here. Go to File -> Scripts -> browse -> select the script (I used the flat version instead of the layered version as my computer couldn’t cope with the layered version!), then select the folder where you’ve exported the star images. These must be named in a sequence e.g. star image 1.. The script effectively blends the images together taking the brightest part of all of the images and bringing it forward. What you will end up with is something like this.\n\nThe complete star trail before editing to remove the ambient lights.\nThe complete star trail before editing to remove the ambient lights.\nThe mask layer button is the third on the bottom.\nThe mask layer button is the third on the bottom.\n\nNotice that there is some ambient light, the lights on the water are from fishing boats and the green glow is from a few houses on the other side of the headland. To remove these lights I opened up the original landscape photo shown earlier on. I copied the original file (background) and placed it above the inserted landscape photo. Using a mask layer I then removed the lights using the brush tool which acts like a non-destructive eraser making the landscape photo come out above the background copy (I really hope this makes sense!). You can adjust how effective this is by adjusting the opacity of the brush, this is helpful when removing light pollution in the sky.\n\nOpening up the files in Photoshop.\nOpening up the files in Photoshop. With a bit of work you can produce a pretty rewarding image.\n\nI hope that made sense and that you’ll go out and try your hand at star trail photography. If you manage any star trails then share them with us.\n\nYou can keep up to date with my latest work via the following links: Facebook, Instagram, twitter, Website.", "pred_label": "__label__1", "pred_score_pos": 0.945519745349884} {"content": "Sidewalk facts for kids\n\nKids Encyclopedia Facts\nPavement redirects here. For the American rock band, see Pavement (band).\nA pavement (UK), sidewalk (CA, US), or footpath (AU, IE, IN, NZ).\n\nA sidewalk is a path for pedestrians that runs along the side of a road. It is called a sidewalk in American English, but can also be called a pavement (mainly British English), a footpath (Australian English, Irish English, Indian English and New Zealand English) or footway (Engineering term).\n\nPedestrians use sidewalks to keep them safe from vehicles on the road. Sidewalks can be made of bricks or from tarmac.\n\nImages for kids\n\nSidewalk Facts for Kids. Kiddle Encyclopedia.", "pred_label": "__label__1", "pred_score_pos": 0.5991299152374268} {"content": "Dear Edwina\n\nStudents are preparing audition materials for their up and coming production of “Dear Edwina”. Please click the following links to access their practice track and script page. Hard copies will be given during class.\n\nAudition Vocal Track\n\nAudition Script\n\nPlease check back in for more information and details to come!\n", "pred_label": "__label__1", "pred_score_pos": 0.998721718788147} {"content": "Together, we make a difference.\n\n\nFAQs for the New Regional Healthcare Campus\n\nFrequently Asked Questions\n\nBy early 2023, the Central New York region will be home to the newest hospital in New York State. The Mohawk Valley Health System (MVHS) is working with community partners to build a new, integrated hospital and healthcare campus in Downtown Utica. Here are answers to some of the most frequently asked questions.\n\n1. Why do we need a new hospital?\n\nWhile both of the existing hospital campuses have been modernized over time, their physical plants are aging (St. Luke’s is over 60 years old and St. Elizabeth is over 100) and are limited in their ability to accommodate modern equipment and technology and adapt to changing models of patient care. New state initiatives for transforming healthcare in New York provided, first, the impetus to explore the possibility of a new hospital in Central New York and then the funding to make this a reality. It is a once-in-a-lifetime opportunity for advancing healthcare in this region, not only for today but for generations to come.\n\n2. Will the hospital really get built?\n\nYes. After nearly four years of planning and approvals, the construction of the new hospital is moving forward with an anticipated “move in” date of February 2023.\n\n3. What will be the name of the new hospital?\n\nCurrently, we are calling it the Mohawk Valley Medical Center but that may change before the hospital opens.\n\n4. What services or programs will not be moving to the new hospital?\n\nThe Center for Rehabilitation and Continuing Care Services (CRCCS), and the services provided within, will remain at its location on Champlin Avenue. Additionally, the St. Elizabeth College of Nursing and Marian Medical Professional Building will remain on the St. Elizabeth Campus. It is also anticipated that the services at the Faxton Campus, including the Cancer Center, Urgent Care, Outpatient Rehabilitation, etc. will remain at that campus.\n\n5. What will happen to the existing hospital campus buildings?\n\nMVHS is contracting with CHA Consulting, Inc., an engineering consulting firm, to help us with a comprehensive evaluation of the potential repurposing of the current facilities. In order to ensure a comprehensive evaluation, the repurposing project will look at the potential reuse of the three main MVHS campuses: St. Luke’s, St. Elizabeth and Faxton. Based on prior assessments, MVHS previously stated it is likely the Faxton Campus will remain open; however Faxton was included in the study to ensure that keeping the campus open is the proper course of action. This study will be underway by March 2019. It’s important to note that other hospitals that have relocated to new campuses have repurposed their old buildings as schools, government office buildings and townhouses or condos.\n\n6. Will physician offices be moved to Downtown Utica?\n\nPart of the plan of the hospital/healthcare campus in downtown Utica is to establish a Medical Office Building across from the hospital. This will provide office space for many of the MVHS-employed physicians as well as other physicians that may be interested in leasing space. It is also anticipated that over the course of time, additional medical office space would be developed in the downtown area.Part of the plan of the hospital/healthcare campus in downtown Utica is to establish a Medical Office Building across from the hospital. This will provide office space for many of the MVHS-employed physicians as well as other physicians that may be interested in leasing space. It is also anticipated that over the course of time, additional medical office space would be developed in the downtown area.\n\n7. Will I have a job when the new hospital opens?\n\nYes, we are working to ensure that our employees maintain their jobs through a comprehensive process of planning between now and when the new hospital opens. The new hospital will be the most successful if it’s staffed by qualified, experienced, dedicated employees and that’s our goal. A specific staffing plan is presently under development and will be shared with staff when completed. Right now we have many, many job openings and believe that will continue to be the case. If an existing job will not be available in the new hospital, we will help to find another position for an MVHS employee.\n\n8. Will I have to reapply for my job?\n\nIt is not our intent that our employees will have to reapply for their jobs. The amount of additional work that would take makes such a process prohibitive.\n\n9. Will salaries and benefits change when we move to the new hospital?\n\nIt is not our intent that our employees will have to reapply for their jobs. The amount of additional work that would take makes such a process prohibitive.The new hospital will not impact non-union employees’ salaries and benefits. In fact, our goal today and for the future with the new hospital is to ensure that we have and maintain competitive salaries and benefits for our employees. For those that are members of a union, this will be determined by the unions through collective bargaining agreements.\n\n10. Which unions will be in the new hospital?\n\nWe don’t know this yet. This is something that the unions, working in conjunction with the National Labor Relations Board (NLRB), will have to work out. Our goal is to have a committed, experienced workforce so we can provide the best care anywhere!\n\n11. Who will be the management staff at the new hospital and how will they\nbe selected?\n\nIt is anticipated that existing leadership will transition into the new facility in the same role. In the areas where there might be two positions now, we will develop and communicate a fair process that results in the selection of leader one year before we move into the new hospital. We have a lot of work to do now as we continue to operate our two acute care hospitals.\n\n12. Will there be enough bathrooms, cafeteria space, locker rooms and break rooms?\n\nThis is a current topic of conversation as people are reviewing areas and spaces as the building takes shape. We are working closely with experts in space planning to make sure we can accommodate our needs.\n\n13. Is there space for expansion?\n\nYes, the design takes into consideration expansion within the footprint of the hospital. Spaces are being designed with future expansion, if necessary, in mind. In addition, the placement of the building on the property footprint takes into consideration building expansion if that becomes necessary.\n\n14. Where will be space to park?\n\nThere will be a 1,500 space parking garage located across the street from the hospital. This garage is being built through a partnership with Oneida County and the City of Utica. (And, note the rumors that this garage is being built for a future casino are not true.) There are also multiple surface parking lots planned. Parking assignments will occur as plans are finalized.\n\n15. Once we’re merged into one campus, will we maintain the Catholic heritage of St. Elizabeth Medical Center?\n\nThe new hospital will be secular. It will be, as is MVHS, a place for all faiths to worship as they desire. There will be a new, very beautiful chapel that will accommodate all faiths and religions.\n\n16. We now work on two different campuses, how will we transition to working together on one campus?\n\nThere is a lot of work ahead on this very issue. The goal is to bring the best of both hospitals into a single culture. This will take time and effort. We are just now talking about how to facilitate a process that will result in developing the best culture to support the best patient care possible. More to come on this.\n\n17. What exactly is eminent domain and why is it happening?\n\nEminent domain is a legal process in which the government or its agencies can take private property (with reimbursement, of course) for the public good. Let’s separate the two building projects downtown: the hospital and the parking garage. As for the footprint under the hospital, all but three properties have negotiated agreements with MVHS. The remaining three are under active negotiations. That’s positive. We’ve been working with those building owners and local government to assist in securing new properties. In fact, some have already moved into new buildings. MVHS cannot exercise eminent domain. If that were to become an issue for the property involving the hospital site, the City of Utica would be responsible. As for the land under the parking garage, several properties have negotiated sales terms, but there are a few hold outs that have indicated they will not sell. In that case, the Oneida County government has the authority to exercise eminent domain.\n\nExamples of when eminent domain would come into play would be to make way for a road or public park, or to provide housing for disadvantaged persons – or in this case, to make way for a new healthcare resource in Utica. The United States and New York Constitutions requires that owners are paid fair compensation their property is taken through eminent domain.\n\n18. Will the new hospital create traffic problems in Downtown Utica?\n\nThat question has been asked a lot. The answer is no. First, the work being done on the highway system and the roads supporting downtown Utica are being designed with the new hospital in mind. Secondly, DOT has been involved all along and conducted exhaustive studies. The hospital area will require some specific modifications to turn lanes to accommodate hospital traffic.\n\n19. Can the fire department handle the size of the new hospital?\n\nYes. The hospital, at nine stories tall, would not be the tallest/largest structure in the City.\n\n20. What happens if we find something “buried” under the site?\n\nThis is all part of the State Environmental Quality Review (SEQR) process that is in its final stages. If hazardous materials are identified, we will clean up the sites. If historical archives are found, we will work with the appropriate agencies to determine what needs to be done.\n\n21. Will elderly people from the suburbs come to Downtown Utica?\n\nMost elderly individuals who seek care at a hospital are driven to the facility by a caregiver, family member or friend. Those who are driving someone to the hospital will find that it will be quite an easy trip. They will be able to pull right up to the hospital, drop the patient off, and then head to the garage to park. We do understand, however, that we will need to ensure that our communities, our employees and our patients are familiar with the quickest route to the hospital and will do mailings and other supportive education to ensure we get off to a good start. Signage will be very important as well.\n\n22. Wouldn’t it be easier and cheaper to build a hospital out of town (not in Downtown Utica)?\n\nThe downtown location has been chosen as the best location for multiple reasons. It brings access to care to those who often utilize our services as well as improves access as it’s right off the highway. And, in order to obtain the $300 million Health Care Facility Transformation Grant, the hospital needed to be located in Oneida County’s largest population center, which has been determined to be Utica, and be part of a larger state initiative to revitalize urban centers in New York. If we didn’t receive the $300 million in funding from the state, we would be unable to afford to build a new hospital or even expand the St. Luke’s Campus and move operations from St. Elizabeth to that campus.\n\n23. What happens if we don’t get the $300 million grant from the state?\n\nWe have already begun to draw funds from the grant, and we do not believe the grant is in any jeopardy. We remain very involved with our state partners and meet with them twice a month. The process of receiving the grant money so far has been very smooth.\n\n24. What happens if the hospital isn’t built?\n\nIt would be very unfortunate for the future of healthcare in this region. We will have missed a once-in-a-lifetime opportunity to transform healthcare not only for today but for generations to come. Practically speaking, we would continue to provide excellent care to our patients and community members and try to accommodate and adapt to new advances in healthcare delivery and technology. However, it will handicap us to keep pace with the ever-changing healthcare landscape and maintain our competitiveness with other healthcare organizations. It will be harder to attract new physicians and the experienced staff we need to provide modern, contemporary healthcare.\n\n25. Why are so many people opposed to the new hospital? Do they know something that we don’t?\n\nAny project of this magnitude and visibility will draw both proponents and opponents. However, in the case of the hospital, there are very few opponents – you may think there are more because they are very vocal and have been attracting media attention.\n\nMVHS, on the other hand, has been more focused on getting the work done to build a new hospital than to be fighting with them in the press. Note that this group doesn’t oppose a new hospital, they oppose the downtown location because, as one stated recently in a Facebook post, “Our group wants … positive developments that make Downtown Utica a place to live and visit in joyous times, a place to go and celebrate what Utica is and was known for in the past. Not a magnet for sick/unhealthy, injured and those who are unfortunately dying.” Healthcare exists to take care of the sick, the injured and those less fortunate. And we are so honored to do so.\n\nWhat we do know is that this new hospital and healthcare campus will benefit the nearly 234,000 people in our region and the thousands of people we take care of each year. We are not focusing on the view of a small group of community activists but on meeting the healthcare needs of our community now and for generations to come.\n\nThat said, we do know that our community wants more information on the new hospital, our process and our progress. So we’ll make sure they have answers to their questions, understand the tremendous benefits to them and to other patients, to our employees and physicians and to the economy of this region. From excellent to exceptional: that’s what Central New York deserves.", "pred_label": "__label__1", "pred_score_pos": 0.7210490703582764} {"content": "China, Afghanistan and Pakistan on Saturday reiterated support for a politically negotiated settlement of the conflict in Afghanistan.\n\nForeign Minister of Pakistan Shah Mahmood Qureshi, Foreign Minister of Afghanistan Salahuddin Rabbani, and State Councilor and Foreign Minister of China Wang Yi held the 3rd Session of China-Afghanistan-Pakistan Foreign Ministers' Dialogue in Islamabad on Saturday.\n\nThe three sides noted with satisfaction the progress made under the trilateral cooperation since the 2nd Dialogue held in Kabul, on 18 December 2018. The three Foreign Ministers reiterated their resolve to further deepen various strands of trilateral cooperation. They agreed to continue their joint efforts for building political mutual trust and supporting reconciliation, regional peace and stability, development cooperation and connectivity, security cooperation and counter-terrorism as key areas of the trilateral cooperation.\n\nThe three sides condemned the recent terrorist attacks in Kabul, Konduz, Baghlan and Farah, which have taken many innocent civilian lives including women and children.\n\nIn this regard, they took note of the talks between the U.S. and the Taliban. They expressed hope that intra-Afghan negotiations including direct negotiations between the Islamic Republic of Afghanistan and the Taliban begin soon and lead to full cessation of violence bringing lasting peace for the people of Afghanistan. They particularly underlined the need for an inclusive, Afghan-led and Afghan-owned peace process leading to a comprehensive agreement for durable peace and stability in Afghanistan.\n\nBased on respect for the will of the Afghan people, while appreciating the efforts made by the Government of Afghanistan, China and Pakistan\n\nexpressed their continued support for Afghanistan's peace and reconciliation process as well as for the efforts towards reconstruction and economic development in the country.\n\nThe three sides reaffirmed their commitment to further strengthening their relations, exploring new ways of deepening cooperation, including advancing connectivity under the Belt and Road Initiative (BRI), Regional Economic Cooperation Conference on Afghanistan (RECCA) and other regional economic initiatives.\n\nThe three sides agreed to explore 'China-Afghanistan-Pakistan plus' cooperation, as well as working towards promoting trade and connectivity\n\nprojects between Afghanistan and Pakistan, such as Kabul-Peshawar Motorway.\n\n\nDialogue (CAPPCD). They agreed to continue cooperation in the fields of economic development, capacity building, improving livelihood and people-to-people exchanges.\n\nChina expressed its readiness to support construction of refrigeration storages, clinic centers, drinking water supply schemes and immigration reception centers at crossing points between Afghanistan and Pakistan to facilitate the movement of people and trade activities among the two\n\ncountries. The three sides welcomed the plans to hold a trilateral friendly cricket tournament among junior cricket teams of the three countries in Beijing in October 2019. They also agreed to arrange a capacity building workshop of young diplomats from the three countries under the Junior Diplomats Exchange Program to be held in Pakistan in October 2019.\n\nThe three Foreign Ministers agreed to organize an Archaeologists' Exchange Program, explore cooperation among the Red Crescent Societies of the three countries, besides regularly undertaking exchange projects in the areas of media, think-tanks, sports, joint training etc.", "pred_label": "__label__1", "pred_score_pos": 0.9999940991401672} {"content": "Artificial Intelligence Keynote Speakers\n\nArtificial Intelligence: A Primer for Selecting Conference Keynote Speakers on the AI Topic\n\nby Michael Humphrey\n\nIn 1995, the internet exploded with the promise of e-commerce and the digitalization of information.  The first keynote speakers talking about the internet were overwhelmingly IT scientists and technology futurists, sharing their insights as to WHAT the technology advancements were.\n\nBut after a few years, the business experts emerged, showing WHY it was important and HOW to use it for profit.\n\nArtificial Intelligence SpeakerThe same is now happening with Artificial Intelligence, and related technologies such as autonomous systems, robotics, etc.  The fascination is currently on the WHAT, but we are already starting to see a shift toward the WHY and the HOW.  This means an eventual shift from computer scientists and futurists, to business strategy experts.\n\nThis is when the AI wave will become truly revolutionary for business.\n\nThe Key Shifts Include:\n\n • Business Strategy:   Robert Safian has been exploring what leading companies like Netflix, Amazon, Spotify, Nike, Goldman Sachs and others are already doing with AI to disrupt their industries\n • Future of Jobs:    Vivek Wadhwa is at Harvard University running the first ever global research study on how AI will change how we work and the future of professions.\n • Disruptive Innovation:    Michelle Lee shares the patent trends from the USPTO to learn where companies are making multi-billion-dollar bets on the future of AI.\n • Financial Future:    Nancy Giordano has been diving into the success of blockchain and crypto-currency technologies throughout the world.\n • Leadership Tools:    Rebecca Costa’s latest book looks at how AI and predictive analytics is providing leaders an accurate look into the future, changing how we make decisions and allocate strategic resources.\n • Medicine and Health:   Tarun Wadhwa has drilled down into the fascinating uses of AI that are changing every aspect of the medical and self-healthcare industries.\n\n\nAbout the author:  Michael Humphrey is a 30-year veteran of the speaking industry and is currently the CEO of Nextup Speaker Management.\n\nConferences and Keynote Speakers\n\nMeetings industry seeing more people, more dollars.\n\nKalamazoo, Mich. – In 2017, the meetings industry was robust, with an average of nearly 2,000 attendees and 54 events per association, finds a new report.  Overall, respondents were most likely to expect increases in meeting attendance (48 percent) and gross meeting revenue (46 percent) in 2018, with fewer expecting increases in sponsorship (37 percent) and particularly exhibitions revenue (28 percent). Continue reading", "pred_label": "__label__1", "pred_score_pos": 0.6005993485450745} {"content": "English and Russian Proverbs\n\nEach language has proverbs, those simple, concrete sayings that crystalize common sense. Proverbs are a genre of folklore. They were created by people and passed from one generation to another as an oral tradition. They reflect the values and unique experience of the nation, and being the accumulated wisdom of many, they are a big\n\nWhat I Learned Using Duolingo\n\nDuolingo is undoubtedly one of the most popular language learning applications, if not the most popular one. Cute and simple interface; gamified learning script; ongoing competition between users; learning materials given in small, chewable pieces; audio with pronunciation of the words; achievable goals — all that makes Duolingo a very attractive and addictive application. But\n\nQuestions-and-Answers Lessons\n\n\nRussian Online Libraries\n\n\nTwisted Memory\n", "pred_label": "__label__1", "pred_score_pos": 0.9187617301940918} {"content": "Select Committee on Work and Pensions Written Evidence\n\nSupplementary memorandum submitted by Prospect\n\n\n  1.  Increasing public and political expectations that the HSE should influence occupational health and safety so injury and illness rates fall conflict with continued pressure to reduce public spending. We fear that further reductions in the HSE's budget will damage the effectiveness of the HSE and result in an increased burden on the taxpayer through higher accident rates.\n\n  2.  In each of the four areas outlined by the Committee, our overall assessment is as follows:\n\n —    Legislative background: The current legislative background is robust as it is built upon a tradition of consensus and providing a proportionate response to health and safety risks. However, the effectiveness of the legislative background relies upon adequate funding and the professional of HSE staff.\n\n —    Resources: The current squeeze on HSE funding, which has almost halved the proportion of GDP spent on the HSE since 1992, ensures that the HSE simply does not have sufficient funds to meet its obligations as a health and safety regulator. A substantial increase in funding, no less than 20% and a further 1,000 staff, is required to meet public and political expectations. HSE funding should also have sufficient flexibility to allow the organisation to respond to unexpected major safety incidents, such as Buncefield, and to respond to changes in public priorities, such as concern over construction fatalities.\n\n —    Inspection, enforcement and prosecutions: The regular inspection of employers by skilled, experienced inspectors with enforcement powers remains the most effective mechanism for improving occupational safety so long as those inspectors have sufficient specialist, policy and scientific support. Penalties for criminal breaches of health and safety legislation are relatively low and give a misleading signal that society does not take death, injury and disease at work as seriously as other forms of business malpractice.\n\n —    Hazardous occupations, migrant workers and occupational health: Additional resources are needed to tackle the problems in construction, agriculture, chemicals and off-shore oil production by improving the access of inspectors to sites. The lack of resources for construction and agriculture places many migrant workers at increased risk of industrial injury. The decline in occupational health provision by the HSE is baffling given the increased impact of ill-health at work and significant additional investment in the HSE's occupational health service would have considerable benefit to employers, workers and the economy.\n\n  3.  In addition, we believe that the current debate over regulation should focus on what HSE interventions deliver most benefit to employees, employers and society as a whole. Whilst the principles of a proportionate approach and a tripartite partnership between the HSE, employers and unions are well-established, we still believe that these values underpin an effective system of occupational health and safety and help create an intelligent approach to regulation that is ignored by the often sterile debate between light and heavy forms of regulation. In our experience, good and efficient employers see the creation of a safe workplace with a strong commitment to health and safety as being more appropriate than mere compliance with legislation.\n\n\n  4.  Prospect represents over 100,000 professional, technical, scientific and managerial staff across the economy but concentrated in the civil service, energy utilities and the nuclear sector. We are the largest union in the HSE representing over 1,700 inspectors, policy advisers, scientists and managers. With our experience of representing other groups of staff in hazardous industries, we believe that we understand the views of both regulators and professional staff subject to regulation.\n\nSection A: Legislative background\n\n  5.  Our experience of applying and enforcing legislation based on a test of reasonable goal-setting is that such legislation is by definition proportionate. However, there is a danger of continued over-implementation by dutyholders due to fear of HSE and civil litigation. On occasions independent consultants have taken advantage of this lack of understanding to sell health and safety management \"solutions\" to small businesses that are not always appropriate rather than focusing on what is a proportionate response applicable to a particular business.\n\n  6.  This potentially places a substantial cost on business: however we do not believe that diluting legislation is a suitable response since this merely transfers the cost from employers to individual employees and to society as a whole. Moreover the emotional trauma caused by industrial accidents and disease is such that it is reasonable to err on the side of prevention.\n\n  7.  The effectiveness of legislation often is as reliant upon the mechanism for implementation as the drafting of legislation. In the case of occupational health and safety, for legislation to be effective, we believe that high-quality inspection and advice from HSE inspectors and other staff such as policy advisers and scientists is vital to ensure that employers and their staff respond appropriately to both the constraints placed by legislation and to create an effective corporate health and safety culture that is appropriate to the specific business. The combined professional judgment of HSE staff, managers with responsibility for health and safety and employees is key to ensuring that the best value is obtained from the current legislative framework. Whilst there is continued scepticism about the value of health and safety rules, mainly due to often well-intentioned but futile over-reaction to legislation, there is simply no evidence to suggest that organisations which skimp on health and safety are more efficient and profitable than their peers: indeed the bulk of evidence points to a positive correlation between safety standards and profitability.\n\n  8.   The regulatory burden on business: Overall the health and safety regulatory burden on business is proportionate. The majority of generally applicable health and safety related regulation in place in the UK is derived from European directives. In translating these directives into domestic legislation the UK has opted for goal setting rather than prescriptive legislation. The regulations are generally couched in terms of: what is suitable and sufficient; what is appropriate; and what is adequate. The clearest example is the regulation that most directly requires administration of health and safety statutory duties, ie regulation 5 of the Management of Health and Safety at Work Regulations 1999 (MHSW 1999).[55]\n\n  9.  The regulation encourages a proportionate approach from the regulator. We feel that this reflects the spirit of the 1974 Health and Safety at Work Act where duties are defined as what is reasonably practicable or practicable.\n\n  10.   EU legislation: We do not believe that EU legislation is gold-plated as examined by Lord Donaldson in 2006 and we broadly agree with the conclusions of the 2006 Donaldson Report. However, it is important that the HSE can respond to concerns from all stakeholders regarding prospective European legislation that is commonly feared to impose unnecessary duties. Therefore the HSE needs to develop expertise and relationships that enable the UK to best shape European health and safety legislation. This requires the HSE to retain sufficient skilled and experienced inspectors, scientists and policy experts. Current funding policy seems designed to prevent this and to increase the costs on business by not responding fully to proposed EU legislation.\n\n  11.   Business Guidance: Effective safety regulation is dependant on two factors:\n\n —    Dutyholders' acceptance that they require advice and guidance; and\n\n —    The authority, accuracy and availability of that advice and guidance.\n\n  12.  Currently the HSC/E produces a wide range of authoritative, internationally respected guidance. These range from general Approved Codes of Practice, which by their nature and legal status are not industry or situation specific through general guidance to some highly specific guidance and information. Employers and unions place a high value on this advice as the HSE has traditionally consulted widely on guidance and employed recognised experts with sufficient credibility with industry. We are concerned that this position is compromised by funding constraints as the HSE's wide professional credibility across occupational health and safety is a major contributor to safety at work. We emphatically reject Judith Hackett's (Chair of the HSC) suggestion to the Committee on 28 November that \"HSE can not, clearly, be expert in all of the areas that we regulate\": the HSE should retain sufficient skilled policy and scientific staff to provide expert advice and guidance across the full range of occupational health and safety.\n\n  13.  Our experience of practical enforcement and advice suggests that employers and unions place a high value on the advisory role of Inspectors with access to expert specialist inspectors, policy and scientific advice. This key interface with the HSE is extremely valuable and effective: employers place a very high value on the ability of inspectors to offer practical guidance that simplifies much of the detailed printed advice available.\n\n  14.   Corporate Manslaughter and Corporate Homicide Act (2007): The Act does not impose any new duties upon employers but we believe that it will encourage improvements amongst better performers due to increased attention of finance directors, insurers and legal advisers. For the Act to spur improvements in safety management amongst mediocre and poor performers, expert advice and robust enforcement will continue to be necessary so Directors are aware of their duties under the Act. Further cuts in HSE funding will remove this ability to implement the Act despite the clear wish of Parliament for Directors to be held more accountable. Prospect's concern is that a few high-profile offenders will be targeted and thereafter the legislation will only be used sporadically\n\n  15.   Voluntary guidance for Directors: We do not believe that it would be desirable to produce further general guidance for Directors when there is a lack of consensus over change except to reinforce the role of employee safety representatives: these reps are a key element of any successful safety culture and their greater involvement in safety issues is likely to benefit society by improving safety performance.\n\n  16.  However, the best form of advice for Directors remains the informal enforcement undertaken by inspectors who have developed the professional credibility and workplace relationships to provide useful specific advice that is proportionate. The success of this approach to enforcement is built on two major principles: firstly, the maintenance of a highly skilled inspectorate with sufficient policy and scientific support to retain professional credibility: and secondly the retention of the power of formal enforcement by the HSE staff providing the advice. Prospect's experience confirms that physical inspection by inspectors with a remit and professional expertise to conduct a full inspection is a vital mechanism for ensuring that Directors and mangers get the guidance they require to manage health and safety. Funding cuts would reduce this support available to employers and their staff.\n\n  17.   Local Authority Planning: Given that in practice, the HSE is consulted over land use where there are significant safety issues, the only significant changes required are: a commitment to consult the HSE over societal risks where a single incident could injury a large number of people; a firm commitment to continue to consult the HSE over nuclear installations and continued funding for the HSE to undertake this valuable role that does not often have an immediate impact on injury and illness rates.\n\nSection B: Resources\n\n  18.  The current level of HSE resources is not sufficient to meet the expectations held by the public and on occasions by employers, unions and politicians. In the absence of a full public debate over the appropriate level of occupational health and safety advice and enforcement, the HSE remains condemned to reductions in funding to meet overall spending limits which in the three years of the next Comprehensive Spending Review from March 2008 establish a 16.8% reduction in funding of the HSE's parent department, DWP. This reduction would hamper the HSE to the extent that its and the Government's credibility in maintaining, let alone improving, health and safety standards would be lost.\n\n  19.  Despite media myth and hype about an intrusive HSE, its cost needs to put in context: there are fewer inspectors employed in Great Britain than there are traffic wardens in Greater London.[56] The HSE's budget is lower than that of a medium sized police force such as Avon and Somerset.\n\n  20.  Given the substantial financial and emotional costs of occupational accidents and disease, we believe that Government should abandon some of its banal deregulatory rhetoric in favour of assessing the effectiveness of the HSE's work and the benefits of greater investment in prevention to reduce those substantial costs. There is clear evidence that shows that the prevention of unsafe, and often criminal, acts at work has a far greater financial benefit to society than investment in mitigating the effects. Evidence suggest that the total cost of poor occupational health and safety is over £20 billion each year! Whilst the HSE is not the only mechanism for addressing this negligence, we believe that there is significant gearing with a small investment in greater inspection, advice and enforcement delivering a far more substantial reduction in the costs of accident and disease.\n\n  21.  We believe that the HSE's funding can be assessed in two ways: the proportion of GDP devoted to health and safety; and meeting public expectations.\n\n  22.  Maintaining the proportion of GDP spent on the HSE would ensure that the cost of the service did not grow faster than the capacity of the economy to support it. In 1987, the HSE employed 3,500 staff and spent 0.024% of UK GDP: by 1992 this had increased to 4,500 staff and 0.033% of GDP. By 2007 the HSE had reduced to fewer than 3,300 staff spending 0.017% if GDP with further cuts anticipated up to 2011. The effectiveness of the HSE has mirrored the changes in funding with the greatest benefits occurring as the staff and budgets increased and the plateauing of accident rates, with increases in some key sectors such as construction, occurring as the investment was run down. Maintaining the proportion of GDP spent on the HSE would imply at least a return to the 1987 level of 0.024% spend and an increase in staff numbers to 4,500.\n\n  23.  Evidence does not suggest that funding should have been reduced as the need for the HSE disappeared. Whilst the type of work conducted by the HSE has changed as the economy has evolved, this has not reduced the need for professional expert advice and enforcement. Indeed some of the current objectives such as occupational health and the management of attendance require even greater input from suitably skilled and experienced inspectors.\n\n  24.  Alternatively, we could examine the expectations upon the HSE through the questions set by the Committee that forms the rest of Section B.\n\n  25.  The HSE's objectives as the health and safety regulator and meeting its PSA targets: The HSE clearly is under-resourced and cannot meet its internal 60-40 split between preventative and reactive inspection due to a lack of funds. The inability to achieve internal targets for preventative work threatens the HSE's overall ability to reduce accident and injury rates as required by the PSA targets. As this split is deemed necessary to meet public expectations over occupational health and safety, we believe that HSE funding should increase to ensure that 60% of inspection could be preventative.\n\n  26.  More disturbingly, even though the HSE has sacrificed some preventative work to respond to incidents, the HSE is increasingly unable to meet the HSC's criteria for accident investigation. As a tripartite organisation the HSC acts on the basis of consensus so in 2004 less stringent criteria for investigation, that for example exclude amputations of fingertips above the first knuckle, were introduced with the acceptance of unions, employers and Government. Since 2004, the number of serious accidents that the HSE is simply unable to investigate has almost increased by two-thirds from 188 in 2004-05 to 307 cases in 2006-07. This high level of non-investigated accidents is due to a lack of resources.\n\n  27.  The HSE is also unable to meet occupational health targets due to a lack of sufficient skilled staff. The bizarre run-down of the HSE's occupational health capacity over 15 years when improving occupational health has become a more important public priority is described in more detail in Section D.\n\n  28.   Budget efficiency: Due to the highly uncertain nature of future public funding it is almost impossible for the HSE to manage its budgets efficiently. At a time when the HSE has improved financial performance by shedding staff, the organisation has generated a surplus in the current financial year presumably because the HSE fears further substantial funding cuts from 2008.\n\n  29.  Like any organisation in the public or private sector, the HSE continues to seek greater efficiency. Our fear is that some of the current initiatives adopted by the HSE simply reduce cost rather than improve efficiency at a time when the demands upon the HSE are increasing. We also believe that the PFI arrangements for the Bootle headquarters and the Health and Safety Laboratory at Buxton are financially inefficient.\n\n  30.  The current How and Where We Work programme appears to contemplate cost savings through the accelerated shift of policy staff out of London, the introduction of hot-desking in regional offices, a reduction in the number of support staff and a review of the regional office structure. We are concerned that the residual London policy presence will be inadequate and will increase travel costs as policy staff have to travel from other locations to London for meetings.\n\n  31.  As a national organisation, the HSE is required to provide a robust service across Great Britain so we are opposed to any further diminution of the HSE's regional office structure since this will simply lead to increased travel, which reduces the time that inspectors and other specialists spend on productive work. In addition we are sceptical about the benefits of hot-desking that appear to sacrifice productivity to reduce the costs of running the HSE's estate in response to a decline in Government funding. We fear that the off-site archiving of records and a reduction in the informal interactions between inspectors reduce the effectiveness of the HSE.\n\n  32.  Whilst we recognise that the HSE wishes to minimise the impact of recent funding cuts on front-line staff, this is not achieved by simply reducing the number of support staffing the absence of more efficient ways of providing that support. The HSE employs policy and support staff to enable inspectors to make more efficient use of their time: for example asking inspectors to perform basic administration tasks is a method to make administration less efficient rather than to increase productivity.\n\n  33.   Additional investment: The HSE retains public confidence by addressing the full range of occupational health and safety issues. Given the impact of injury and disease, the emphasis should be on increasing preventative work and developing expertise to deal with new priorities. Given the decline in the HSE's occupational health capacity, then significant further investment in this area is required. However, investment in preventative inspection should recognise that such work is reliant upon high-quality policy and scientific support.\n\n  34.  The partnership principles that underlie the HSC/E suggest that the HSE should have significant autonomy to pursue issues that are given priority by stakeholders without significant political interference: in reality occupational health and safety remains a key objective of Government through the DWP. Therefore it remains in the public interest for the HSE to respond to unexpected emergencies such as the Buncefield oil explosion and the Foot and Mouth outbreak at Pirbright as well as a greater emphasis on tackling occupational safety issues such as the rise in construction fatalities. However, given current and future budgetary constraints we believe that a contingency fund should be established to enable the HSE to respond promptly to such changes driven by events outside its control and that this fund should be supplemented by additional funding when significant additional resources are required as in the case of the response to the unacceptable level of construction fatalities.\n\n  35.  Given the level of political and public expectation over occupational health and safety, we believe that an increase in funding back to 0.024% of GDP and an additional 1,000 staff is the minimum level required to match growing expectations of performance and the increasing complexity of issues faced by the HSE.\n\nSection C: Inspection, enforcement and prosecutions\n\n  36.  Evidence from the HSE and elsewhere shows that enforcement remains the most effective form of intervention for reducing accident rates. The reduction in the frequency of inspection correlates closely with the end to a fall in accident rates and there is no strong evidence to show that another cultural factor is the cause of this decline in HSE effectiveness.\n\n  37.  Small and medium enterprises tend to rely on external interventions to ensure compliance. Although they recognise that they have a duty to comply with HSE regulations and guidance, in practice they will normally believe they are compliant until someone credible, such as the HSE, inspects and informs them otherwise. We do not believe that any more than a small minority of employers deliberately breach health and safety law and the issue is one of finding a form of regulation that improves knowledge and compliance.\n\n  38.  We believe that the use of skilled experienced inspectors with enforcement powers is one of the key strengths of the British system of regulating health and safety. Naturally such effectiveness requires efficient policy, scientific and administrative support. We are extremely sceptical about support from senior HSE management for the use of intermediaries by the HSE to provide guidance on criminal law.\n\n  39.  The use of inspectors with enforcement powers has considerable credibility with both employers and unions; and we believe that a policy of using other bodies to provide advice has led to an unacceptable decline in enforcement in the past. We believe that the HSE does not fully value the effective working relationships between inspectors and duty-holders, in particular a high reliance on inspectors as a source or as a gateway to advice does not suggest that an organisation does not have a robust safety culture. Often the credibility of other forms of intervention relies on an appreciation by an employer that these supplement rather than substitute for the role of the inspector.\n\n  40.  Effective inspection and enforcement also relies on trusting the professional judgment of inspectors. Under the FIT3 programme the HSE intended to restrict the remit of inspections to key targets such as slips and trips, working at height and manual handling and any other issue of obvious concern. This may have reduced the length of inspections but it could override the professional judgment of inspectors who use their professional judgment to consider other issues that are likely to be important dependent upon the specific circumstances of the site, the organisation and its staff.\n\n  41.   Prevention and Enforcement: It remains difficult to separate issues as the two are intimately linked. Much enforcement work is actually generated by preventative activity so we are not convinced that inspectors should concentrate on either prevention or enforcement. Our support for the 60-40 split between preventative and reactive work is explained in paragraph 25 of this submission.\n\n  42.   Penalties: Given the relatively low level of fines for breaches of health and safety legislation compared to other forms of corporate malpractice such as breaches of data protection and anti-competitive behaviour, we believe that the current level of penalties creates the impression that the Government is less concerned about breaches of health and safety legislation. We would support a call to increase maximum fines to a fixed proportion of company turnover to penalise the rare employer whose unacceptable management of health and safety harms individuals and society.\n\n  43.   Crown immunity: Whilst in practice, most Crown employers take health and safety seriously, there is no compelling reason why Crown immunity should remain. Indeed it could give the impression that the Government places a low priority on health and safety by seeking a wide-ranging exemption of its own activities from criminal prosecution. We welcome the removal of crown immunity as defence against corporate manslaughter and would welcome its total removal but do not see this as a major priority at present for the HSE.\n\n  44.   Local Authorities: Whilst there is some prospect of developing further joint working with local authorities and improving their involvement in HSE policy, the scope for joint inspection warrants is limited due to the differences in skills of local authority enforcement staff, the substantially different priorities of local government and the severe constraints on local authority spending. We do not believe that transferring work to local authorities is a solution to central government under-resourcing of the HSE.\n\nSection D: Hazardous Occupations\n\n  45.  Prospect believes that more hazardous industries such as construction, nuclear, off-shore oil and gas need a deeper inspection regime which uses professional expertise to recognise the higher potential level of risk and the risk that consequences of an incident will be more significant than in other sectors. However, the use of safety cases runs the risk of reducing effective practical inspection. Migrant workers pose significant issues but these are related to their disproportionate employment profile with significant concentrations in agriculture and construction. Occupational health is a serious case of failure due to the run-down of the HSE's capacity to deal with occupational health issues.\n\n  46.   Construction: The rise in construction fatalities is a national disgrace. Even with some statistical adjustment of figures the fact that construction workers are four times more likely to be killed at work is simply unacceptable. The evidence suggest that much more work needs to be done on individual construction sites to improve management leadership, safety knowledge and compliance with heath and safety regulations. In these circumstances, a substantial increase in the number of skilled and experienced construction inspectors is necessary to ensure that safety standards can be addressed on individual sites. The support of the industry and the Secretary of State for action is welcome but there is a fundamental issue of resources as this is one sector where routine site inspection that addresses the full range of construction issues is vital.\n\n  47.   Off-shore work: Whilst the HSE has developed a series of initiatives with the offshore sector since the Cullen Report, it is misleading to suggest that here are no significant issues with offshore safety. Due to the aging life of offshore assets and the global skills crisis in oil and gas production, the already technically complex offshore industry faces a wider set of challenges as high oil prices prolong the life of existing oil installations. This places a higher premium on the professional skills of our members\n\n  48.  Whilst safety cases have considerable value in preventing a repetition of the design faults that contributed to the Piper Alpha tragedy, their existence and the high level of mandatory inspection has reduced the ability of the HSE's Offshore Directorate (OSD) to undertake other initiatives at a time when the complement of OSD inspectors has reduced from 200 in 1994 to fewer than 120 today. At current salary levels, OSD could struggle to maintain staff numbers given that it has an aging workforce. Given the prospect of a longer life for many offshore assets, we believe that more inspectors should be employed to make site inspections to supplement the use of safety cases.\n\n  49.  Given the severe financial and moral consequences of a major accident or shut-down due to faulty installations, the oil industry is prepared to pay for a higher quality of inspection by making OSD salaries more competitive as the key issue is the quality of judgments made by inspectors not the frequency of inspection.\n\n  50.   Chemicals: The Buncefield incident suggests that the current system of safety regulation could be improved as the incident could have resulted in a substantial number of deaths, we would be happy to comment in more detail once the Buncefield report is released as the collection of evidence should demonstrate some practical steps to improve the safe regulation of the chemicals sector which contains some elderly assets.\n\n  51.  As with offshore oil and gas, we appreciate the value of \"permissioning\" regimes where operators have to assure the HSE and environmental regulators that they will design out hazards and operate in accordance with their safety case. Due to financial constraints, the production and approval of safety cases has reduced the amount of time that the HSE can devote to site inspection and audit. The Buncefield report should start a debate on will demonstrate whether this approach is adequate but we believe that a better balance between safety case permissioning and site inspection would improve safety performance.\n\n  52.   Migrant Workers: It is unclear whether or not migrant workers are more exposed to the risk of occupational accidents, but our belief is that this is likely. Moreover, we believe that HSE does not do enough to protect migrant workers from health and safety risks as they are more likely to work in areas of the economy such as agriculture and construction where inspection is poor even before the specific issues raised by the different training experiences, diverse safety cultures and potential problems with communication that affect migrant workers are considered.\n\n  53.  Resource constraints have affected the time that inspectors can devote to agriculture and construction: given the relative lack of political lobbying power of their workforces, these sectors have been neglected in favour of other priorities. The impact has been a deterioration in the time spent on inspection: whilst working with major employers in both sectors has some benefits, the large extent of sub-contracting means that effective site inspection is especially important and this has suffered due to financial pressure on the HSE.\n\n  54.   Occupational Health: Occupational ill-health has a huge impact on the UK economy. The Labour Force Survey 2006-07 suggests that around 2.2 million people suffered from ill health that they thought was work-related, of which 646,000 were new cases in the preceding 12 months. Lack of HSE resources restricts the prevention of ill health, and there is very poor enforcement of legal provisions relating to ill health. Prosecutions for causing ill health in the workplace are very rare, if they get investigated at all.\n\n  55.  When occupational health provides the dual benefit of individual recovery and the prevention of illness for colleagues, it is strange that it is so neglected. We lag far behind our European partners on occupational health provision: for example, HSE commissioned research[57] showed that only 3% of UK companies provided reasonable levels of occupational health support. Decent provision of expertise in occupational health within the HSE is vital if Britain's position as the poor man of Europe is to change. There are now only around five (full-time equivalent) occupational physicians in HSE, and around 20 occupational health inspectors down from around 60 of each in the early 1990s. HSE's Corporate Medical Unit (CMU) is so depleted that it is no longer able to provide basic cover on occupational health advice and prevention, nor provide the leadership role it once did to the occupational health community in Great Britain. This decline in HSE's medical expertise presents a serious risk to Government credibility on preventing occupational ill health.\n\n  56.  Occupational health professionals employed within the Health and Safety Executive are needed to oversee the active monitoring and reviewing of occupational ill health with the aim of prevention, of identifying weaknesses in employer provision, and to define and maintain standards. HSE's occupational health physicians and inspectors have much needed skills, combining expertise in occupational medicine with a detailed understanding and experience of health and safety law.\n\n  57.  Prospect supports the call for a greater focus on rehabilitation as a means by which employers can retain the expertise and skills of staff who become ill or injured during their working life, but advises caution about its application. However, the focus on rehabilitation does not detract from prevention. Also the evidence for the effectiveness of resources spent on rehabilitation is somewhat sketchy. DWP Research concluded in 2005 Project RR339 and 342, The Job Retention and Rehabilitation Pilot, showed limited impact of rehabilitation on return to work. The review suggested (which is supported by anecdotal evidence from our members) that the strongest factor in determining length of absence is personal motivation to return to work: this impression is confirmed by the experience of our members.\n\nSection E: Culture and the role of Government\n\n  58.  One of the most disappointing trends in public life has been an increased wish by Government to override the professional judgment of health and safety at the same time as decrying the volume of health and safety regulation as sign of excessive interference in business and commerce. All the evidence suggests that profitability and good safety performance actually work hand in hand.\n\n  59.  Prospect would wish to see a more intelligent approach to HSE regulation based on the following four principles:\n\n —    the recognition that the principle of proportionate action based on the specific circumstances of each employer delivers an effective system of regulation;\n\n —    recognition of the value of partnership between the HSE, employers and unions as good practice is dependent upon changing culture;\n\n —    respect for the professional judgment of inspectors, policy advisers and scientists rather than criticising the HSE simultaneously for not taking enough action to enforce safety standards and for heavy-handed regulation; and\n\n —    adequate funding.\n\n\nJanuary 2008\n\n55   MHSW 1999 regulation 5(1) \"Every employer shall make and give effect to such arrangements as are appropriate, having regard to the nature of his activities and the size of his undertaking, for the effective planning, organisation, control, monitoring and review of the preventive and protective measures.\" Back\n\n56   In the Field Operations Directorate for the whole of Great Britain there are around 500 to cover all the inspections, investigations and prosecutions for all manufacturing (except chemicals manufacturing), construction, the health services, education, all local authority activities, Govt departments and agencies, fire and police services, the defence industry and MOD, agriculture, fairgrounds, domestic gas safety, utilities, ports and docks, and others. There are around 80 chemical industries inspectors, 120 in offshore safety, and there are in addition around 180 operational specialist inspectors and engineers. The Nuclear Installations Inspectorate is 35 inspectors short of numbers needed to meet current inspection requirements and would be unable to respond properly to any new build programme. There are more traffic wardens in London than there are inspectors in the whole of HSE's Field Operations Directorate. Back\n\n57   Survey of Use of Occupational Health Support, CRR 445/2002, HSE 2002. Back\n\nprevious page contents next page\n\n\n© Parliamentary copyright 2008\nPrepared 21 April 2008", "pred_label": "__label__1", "pred_score_pos": 0.9494518041610718} {"content": "Khasta Bal Dar ...Ek Chota Khasta...Sakhat BiscuitSakhat Pehika B...Pehika BiscuitKhamiri RotiHalki PistariShehad Wala BanEk Namkeen DashSa Parti SandwichHamburgerBurgerBara SandwichAatay Ki SeviyanGounday Huay Aa...Aatay Ki Bani S...Paneer Ki Bani ...Sehat Bakhsh GhizaZaiqay Men Acha...\n\nEk Namkeen Dash : ایک نمکین ڈش\n\n1. Sandwich : ایک نمکین ڈش : (noun) two (or more) slices of bread with a filling between them.\n\nBuni Hui Shay : Filling : the yarn woven across the warp yarn in weaving.\n\nKisi Cheez Ka T..., Qatla : Slice : a serving that has been cut from a larger portion. \"A piece of pie\"\n\nRoti : Bread : food made from dough of flour or meal and usually raised with yeast or baking powder and then baked. \"Did you have bread?\"\n\nKisi Cheez Ka J..., Hissa : Slice : a share of something. \"A slice of the company's revenue\"\n\nRukra, Maal : Bread : informal terms for money. \"Everybody needs lolly\"\n\n\nزُکام کی دوا لو", "pred_label": "__label__1", "pred_score_pos": 0.7936307191848755} {"content": "Category Archives: HAY FEVER\n\nAllergy Shots – A Brief Overview\n\n\n\n\n\n\n\n\n\nHay Fever in the Fall\n\nSeptember may be the month to consult an allergy specialist Centreville VA patients turn to, as ragweed pollen counts peak and wreak havoc in allergic individuals in the Washington, DC, Northern Virginia, and Maryland metropolitan area including the following cities in Northern Virginia: McLean, VA, Tysons Corner, VA, Vienna, VA, Fairfax, VA, Arlington, VA, Great Falls, VA, Falls Church, VA, Annandale, VA, Alexandria, VA, Reston, VA, Herndon, VA, Sterling, VA, Oakton, VA, Burke, VA, Manassas, VA, Centreville, VA, Chantilly, VA, Gainesville, VA, Haymarket, VA, Warrenton, VA, Springfield, VA, Dumfries, VA, Culpeper, VA, Ashburn, VA, Leesburg, VA, Purcellville, VA. Ragweed also affects the surrounding Maryland cities such as Bethesda, MD, Chevy Chase, MD, Potomac, MD, Great Falls, MD, Gaithersburg, MD, Rockville, MD, Darnestown, MD, Germantown, MD, Olney, MD, Silver Spring, MD, Wheaton, MD, College Park, MD, Hyattsville, MD, Beltsville, MD, Bowie, MD, Clinton, MD, Annapolis, MD, Columbia, MD, and Baltimore, MD. In the DC metropolitan area, ragweed begins to pollinate in mid-September and ends at the first frost which is usually at the end of October.\n\nWhat is Ragweed?\nAs an allergy specialist Centreville, VA has to offer might attest, ragweed is a tough and hardy soft-stemmed weed that can grow well along roadsides, riverbanks, vacant lots, and fields. It belongs to a genus called Ambrosia and there are 17 different species of ragweed. The height of the plants generally range from about 3 inches to 12 feet.\n\nThe plants mature in mid-Summer and produce small flowers. Warmth, decreased humidity, and active breezes after sunrise help create the ideal environment for ragweed flowers to release their pollen. Each individual plant can release up to one billion pollen grains. Though most of the released pollen stays in the general area, some grains can travel as many as 500 miles in dry and windy conditions. This helps explain why pollen counts are usually lowest on rainy days and cool mornings. Individual plants pollinate only for one season but the seeds survive in the soil from year to year producing fresh crops each year. Over the past decade, the EPA has noticed a prolonged ragweed season in the Washington, DC area. Climate changes and increased carbon dioxide levels in the atmosphere may play a role in this prolongation of the ragweed season.\n\nHow Does it Cause Allergies?\nThough ragweed pollen is generally harmless, in a genetically susceptible individual, the immune system can mistake it as potentially dangerous invader and mount a defensive attack. This process triggers antigen (ragweed) vs. antibody (immunoglobulin) reactions on exposure, resulting in the release of chemical mediators like histamine which are responsible for the classic annoying hay fever and/or asthma symptoms. An estimated 15% of all Americans are sensitive to ragweed. As an allergy specialist in Centreville VA may explain, the risk of developing sensitivity is higher in people with other types of allergic disorders like eczema (i.e., atopic dermatitis) and asthma and in those with a family history of similar disorders.\n\nWhat are the Symptoms?\n\n • Itchy nose, eyes, throat, and ears\n • Watery and/or red eyes\n • Runny nose, nasal congestion, and/or post-nasal drip\n • Sneezing\n • Post nasal drip and/or throat irritation\n • Cough, chest tightness, wheezing, and/or shortness of breath\n • Sinus pressure and/or headaches\n • Fatigue\n • Snoring\n • Clogging and/or popping of the ears\n\nThough “hay fever” is the term commonly in vogue, “seasonal allergic rhinitis” is a more accurate description of the condition.\n\nOral allergy syndrome (i.e., Pollen-food allergy syndrome) is a condition where one experiences itching of the lips, mouth, and/or throat after eating fresh fruits and/or vegetables. The cause of the phenomenon is a cross-reactivity between similar proteins in the pollen and the fruits and/or vegetables. Ragweed pollen typically cross-reacts with melons, bananas, cucumbers, avocados, kiwi, and zucchini.\n\nHow is it Diagnosed?\nAn allergy specialist Centreville, VA residents turn to for help will take a thorough history and physical examination. A simple allergy skin test can be performed by applying the diluted allergen (ragweed) to the surface of the skin. A raised, itchy, red bump after 15 to 20 minutes at the site of application confirms sensitivity to the allergen. Alternatively, a blood test can also be done.\n\nWhat Can Be Done to Minimize the Symptoms?\n\n • Keeping track of pollen counts and avoiding outdoor activities to the possible extent on high pollen days.\n • Keeping the windows closed in homes and automobiles and running air-conditioning.\n • Changing clothes and showering before going to bed.\n\nIf the symptoms are bothersome in spite of environmental control, several medications like antihistamines, nasal sprays, eye drops, and inhalers may be needed. Keep in mind that most medications only mask the symptoms without treating the underlying cause and can cause undesirable side effects. Many individuals also become tolerant to an antihistamine and what had helped initially becomes ineffective.\n\nAllergen immunotherapy (i.e., allergy shots, allergy injections, allergy desensitization) is a process of increasing tolerance to the allergens by exposing the immune system to gradually increasing the concentrations of the antigen at regular intervals. This process has the potential to offer long-term benefit to many people who experience bothersome symptoms every year. Allergy shots are effective in 80-85% of individuals and have been used in the U.S. for over 100 years.\n\nA Centreville, VA allergy specialist at Black & Kletz Allergy can treat both adults and children with ragweed allergies in the Washington, DC, Northern Virginia, and Maryland metropolitan area. We have convenient offices in Washington, DC, McLean, VA (Tysons Corner, VA), and Manassas, VA that all offer on-site parking. The Washington, DC and McLean, VA offices are Metro accessible and there is a free shuttle between the McLean, VA office and the Springhill metro station on the silver line. Please call us for an appointment or alternatively you can click Request an Appointment and we will respond within 24 hours by the next business day. We can also answer your questions and concerns about other allergic and immunologic disorders, since we have been providing allergy, asthma, and immunology care to the local community for over 50 years. If you’re looking for an allergy specialist Centreville, VA patients recommend, turn to a board certified allergist at Black & Kletz Allergy.\n\nCan Clogged Ears be Caused by Allergies?\n\nThe simple answer to this question is yes.\n\nEustachian tube dysfunction is a condition where the the eustachian tubes of the middle ear do not open and close the correct way.  The eustachian tubes are small tubes that go from the middle ear (the part of the ear behind the eardrum) to the back of the throat.  There is one eustachian tube for each ear.  The eustachian tubes are about 1 1/2 inches long and regulate the air pressure between the middle ear and the atmosphere outside the ear.  The eustachian tubes also serve the purpose of draining fluid and mucus from the middle ear.  Normally, the tubes are closed.  When there is an increase in atmospheric pressure ( e.g., high altitudes, deep water) people typically will intentionally swallow, yawn, or chew gum in order to force the eustachian tube open which will cause an equalization in pressure.  If someone is unable to equalize this pressure difference, one may experience ear pain, a clogged or blocked feeling of the ears, decreased hearing, ringing of the ears (tinnitus), a fullness of the ears, popping of the ears, and/or dizziness.\n\nThere are a variety of causes of eustachian tube dysfunction.  Swelling of the eustachian tubes can occur due to allergies (i.e., allergic rhinitis, hay fever)upper respiratory infections (URI’s), and sinus infections.  The swelling causes the tubes to stay closed, preventing them from opening with the normal everyday functions such as swallowing and yawning.  As a result, a pressure difference occurs between the middle ear and the outside atmospheric pressure causing the symptoms of eustachian tube dysfunction to develop.  One may complain of ears that are painful, blocked, full, popping, etc.  Fluid may also collect in the middle ear which can further increase one’s symptoms.  In addition, the fluid can get infected which will often lead to ear infections (otitis media).  Note that the length of the eustachian tubes is shorter, and thus more easily blocked, in children than in adults, predisposing them to a higher risk of ear infections; this is a reason to see a pediatric allergist here in McLean, Manassas or Washington, DC as soon as possible. /2015/08/04/can-clogged-ears-be-caused-by-allergies/ /2015/08/04/can-clogged-ears-be-caused-by-allergies/ /2015/08/04/can-clogged-ears-be-caused-by-allergies/ Cigarette smoking, enlarged adenoids, and obesity are other factors that can predispose and/or cause eustachian tube dysfunction.\n\nAs mentioned above, allergies play an important role in causing eustachian tube dysfunction.  Allergic rhinitis (hay fever) is a condition where there is inflammation and swelling in the nasal and sinus regions due to an allergen such as pollen, dust mites, molds, and animals.  It is the swelling component of this allergic condition which contributes to the symptoms of eustachian tube dysfunction.\n\nThe board certified allergists at Black & Kletz Allergy have been diagnosing and treating children and adults with “clogged ears” for over 50 years in the Washington, DC, Northern Virginia, and Maryland metropolitan area.  Diagnosing and treating the underlying condition, which often is due to allergies, is the primary way to alleviate the “clogged ears.”  There are numerous allergy medications (i.e., decongestants, nasal corticosteroid sprays, antihistamines), as well as allergy immunotherapy (allergy shots) that can be utilized in order to treat and/or prevent “clogged ears.”  If you suffer from these symptoms or other allergy symptoms, please call any one of our 3 convenient office locations in the DC metro area.  We have offices in Washington, DC, McLean, VA, (Tyson’s Corner, VA), and Manassas, VA.  All 3 offices have on-site parking and the Washington, DC and McLean, VA locations are Metro accessible.  You can also click Request an Appointment and we will respond within 24 hours by the next business day.  Black & Kletz Allergy is dedicated to help you get relief from your allergy symptoms in a caring professional environment.\n\nTree Pollen Allergies in the Washington, DC Metropolitan Area\n\nSpring is rapidly approaching in the Washington, DC metropolitan area and that means many people will be suffering from hay fever (allergic rhinitis).   In the early Spring, tree pollen is mainly responsible for the symptoms that cause hay fever.\n\nThere are of course molds in the air simultaneously, but they are always present in Washington.  In the DC area, trees usually begin to pollinate at the end of February, peak in mid- to late-April and continue to pollinate through late May and occasionally through early June.  Some of the first trees to pollinate in this area include cedar, maple, elm, alder, birch, and poplar.  Later in the season, the predominant tree that causes problems for individuals with tree pollen allergies is the oak tree.  Other tress that pollinate in this later time frame include hickory, walnut, and pine.\n\nIt is interesting to note that, in general, people are not allergic to flowering trees (i.e., cherry tree, dogwood tree).  Many people think they are allergic to flowering trees because they develop allergy symptoms when these trees are in bloom, however, it is usually not due to these trees, but due to other non-flowering trees that happen to pollinate at the same time.  Nature is behind this sleight of hand trickery.  Flowering trees have pollen that is fairly heavy in weight.  Since the pollen is heavy, it is not easily wind-disbursed and as a result, individuals do not breathe in the pollen and thus do not become sensitized to these pollens.  The flowers are present in order to attract insects such as bees.  When the bee lands on the flower, the pollen sticks to the abdomen of the bee.  The bee will then fly to another flower of another tree and the pollen will intermingle with that flower.  It is by this method that cross-pollination is achieved, made possible by the aid of the bees.  Non-flowering trees such as cedar, maple, elm, alder, birch, poplar, oak, hickory, walnut, etc. have very light weight pollen.  These pollens are easily wind-disbursed.  It is these wind-disbursed tree pollens that individuals breathe in and become sensitized to, that are the cause of hay fever symptoms in sensitized people.  It just so happens that people develop their hay fever symptoms at the same time when the flowering trees bloom.  People then associate these flowering trees with their symptoms and blame their symptoms on the wrong trees.\n\nThe symptoms of tree pollen allergies are the classic symptoms of hay fever.  They can include any or all of the following:  runny nose, stuffy nose, post-nasal drip (which can lead to a sore throat, hoarseness, and/or cough), sneezing, itchy eyes, watery eyes, red eyes, puffy eyes, itchy nose, itchy throat, sinus pressure and/or pain, wheezing, chest tightness, cough, and/or shortness of breath.\n\nThe following are some measures that can be taken to reduce one’s exposure to the tree pollen in the Spring besides living in a “plastic bubble:” It is advisable to keep one’s windows and sunroof closed.  It is advisable to turn on the air conditioner and change air filters regularly (about once a month).  Use the re-circulate feature in the car so that the air is not coming into the vehicle from the outside.  Choose an automobile that has a filter in its air conditioning unit, if possible.  Avoid yard work and mowing lawns.  If a person needs to do yard work, wear a filtration face mask in order to diminish exposure to the pollen.  If one goes outdoors, shower, wash one’s hair, and change one’s clothing upon returning home to decrease pollen exposure.  Wash your pets regularly and avoid close contact with a pet that goes outdoors during the pollen season since they carry tree pollen on their coats.  Monitor pollen counts daily.  Click Today’s Pollen Count to view the daily pollen count.  Stay indoors wherever possible when the pollen count is high (generally on dry warmer days).  Note that rain washes pollen from the air causing pollen counts to be lower on wet cooler days.  Avoid drying clothes outdoors when the pollen count is elevated.  Avoid contact lenses which may trap pollen in one’s eyes.  Since pollen is released in the early mornings, try to avoid exercising during this time.\n\nThe diagnosis and treatment of tree pollen allergies begins with a thorough history and physical examination by a board certified allergist.  Our board certified allergists in both adult and pediatric allergy at Black & Kletz Allergy have had more than 50 years of experience diagnosing and treating tree pollen allergies in the Washington, DC, Northern Virginia, and Maryland metropolitan area.  After the history and physical examination, allergy testing is usually done by skin testing, or in some cases, by blood tests to confirm if the patient is in fact allergic to trees.  Once confirmed, there are a multitude of treatment options to alleviate the annoying symptoms of tree pollen allergies.  In addition to pollen avoidance measures in the above paragraph, the treatment of tree pollen allergies includes medications which can include oral medications (tablets, capsules, syrups, granules, etc.), nasal sprays, eye drops, and/or lung inhalers.  If there are additional environmental allergens that are found in a particular person which correlate with his/her symptoms during a different time of the year (Fall, Winter, etc.), then allergy shots (also referred to as “allergy immunotherapy” or “allergy desensitization”) may be a great way to treat the pollen allergy.  They are extremely effective and have been available for over 100 years.\n\nIf you would like a consultation for your hay fever symptoms, please do not hesitate to call Black & Kletz Allergy to make an appointment.  Alternatively, you can click Request an Appointment and we will get back in touch with you within 24 hours of the next business day.  We have 3 convenient locations in the Washington, DC metropolitan area with office locations in Washington, DC, McLean, VA (Tysons Corner, VA), and Manassas, VA.  There is parking at each location and the Washington, DC and McLean, VA locations are accessible by using the Metro.  Whether your hay fever symptoms are seasonal or perennial, we would be happy to help you.\n\n\nAs Winter approaches, people with dust, mold, and pet allergies tend to suffer more than those with pollen allergies.  Pollen levels in the mid-Atlantic region (Washington, DC, Virginia, Maryland, etc.) become immeasurable once the first frost occurs.  The first frost usually occurs by November in our region of the country.  Therefore, when people experience the typical allergy symptoms during the late Fall and Winter months, dust mites and/or molds are generally the culprits.  Keep in mind that there are other causes of these symptoms, namely the common cold, flu (influenza), or other upper respiratory tract infection (i.e., sinus infection, bronchitis).  How does one know the difference between winter allergies, a “cold,” the “flu” or other type of upper respiratory tract infection?\n\n\nWinter Allergies – the same symptoms as seasonal allergies and can include all or some of the following:  runny nose, nasal congestion, post-nasal drip, sore throat, cough, sneezing, itchy nose, itchy eyes, watery eyes, red eyes, itchy throat, fatigue, sinus headaches, wheezing, and shortness of breath.\n\nCommon Cold – can include all or some of the above symptoms, but in addition may contain achiness, fever, and chills, although discolored nasal discharge and a fever do not occur in most cases of the common cold.\n\n“Flu” (also referred to as influenza) – can include all or some of the symptoms of the common cold, but unlike a “cold,” there is usually severe achiness and/or headache, and a fever is almost always present.\n\nNote:  For the flu season of 2014-2015, one must be cognizant of the recent Ebola epidemic in Western Africa.  If a person develops “flu-like” symptoms and has traveled to Western Africa and/or if they have been in contact with someone infected with the Ebola virus in the last 21 days, he or she must assume that they could have Ebola and should contact the CDC (Centers for Disease Control) and local county and state health agencies for guidance about seeking medical care at an appropriate hospital.  If one cannot get in touch with the CDC or local health agency, they should go immediately to closest emergency room.\n\nSinus Infection (also referred to as sinusitis) – can include all or some of the symptoms of the common cold, but unlike a “cold,” there usually is discolored nasal discharge, sinus pain and/or pain that radiates to the teeth.\n\n\nWinter Allergies – Dust mites; Molds: Pets; Cockroaches\n\nCommon Cold – Viruses [Rhinoviruses, Coronaviruses, Parainfluenza viruses, and Respiratory syncytial virus (RSV) are the most common ones]; Note that there are many more viruses that cause the common cold. “Flu” – Viruses (Influenza virus types A, B, and/or C)\n\nSinus Infection – Viruses, Bacteria, and/or Fungi (Most are caused by viruses)\n\nHOW ARE THESE CONDITIONS DIAGNOSED? Besides a thorough history of your symptoms and a physical examination, the following also help our physicians distinguish between the 4 common conditions below:\n\nWinter Allergies – An experienced allergist can perform blood and/or skin tests to evaluate if you have a true allergy to one of the many allergens that can cause winter allergy symptoms.  When symptoms last longer than 1-2 weeks or there is a history of recurring symptoms every Winter or perennial (year-round) symptoms, allergies should be a top concern.\n\nCommon Cold – Typically the symptoms last less than 1 week in duration and resolve on their own.\n\n“Flu” – A fever is the hallmark of this condition.  The flu can be very serious particularly in the elderly.  There are rapid influenza diagnostic tests that can identify the flu in about 30 minutes.  These require that the physician to wipe the inside of the back of one’s throat or nose with a swab and then send it for testing.  They are not 100% accurate however.\n\nSinus Infection – The symptoms may begin as a result of an individual being exposed to an allergen, virus, and/or bacteria.  A thorough history together with a complete examination of the ears, nose, mouth, and throat can usually identify a sinus infection in the majority of patients.  Further diagnostic studies such as a CT scan of the sinuses may be necessary in some individuals.  When there is recurrent sinus infections, the diagnosis of chronic sinusitis and/or an immunologic disorder should be investigated by an experienced allergist.\n\n\nWinter Allergies – There are many allergy medications that can be used which include tablets, syrups, nasal sprays, and/or allergy shots (allergy immunotherapy or allergy injections).\n\nCommon Cold – Usually self-limited and generally does not require treatment except to help relieve symptoms with medications and nasal sprays.\n\n“Flu” – Usually self-limited and generally does not require treatment except to help relieve symptoms with medications and nasal sprays.  Occasionally a severe case or a case in the elderly may need hospital care of complications from the flu which can include dehydration, pneumonia, and other more severe complications. Antiviral flu medications can be taken to reduce the duration and severity of the flu. These medications work best if they are taken within the first 48 hours of the beginning of symptoms, however they can still be effective if taken later.\n\nSinus Infection – May need to be treated with antibiotics if it persists or is recurrent.  Other medications may also be used if needed to help alleviate the symptoms with tablets, syrups, and/or nasal sprays.\n\n\nWinter Allergies – Avoidance of dust mites, molds, and pet exposure.  Allergy medications and/or allergy shots (allergy immunotherapy or allergy injections).\n\nCommon Cold – Washing of hands; good hygiene; avoidance of crowded areas.\n\n“Flu” – Flu vaccination (unless one has a reason not to take it such as egg allergy, previous reaction to the flu vaccine or the preservative used in the flu vaccine, etc.).  In addition, one should avoid exposure to people with the flu.  They should also practice good hygiene, avoid crowded areas during the flu season, wash their hands, etc.\n\nSinus Infection – Control allergies; washing of hands, good hygiene; avoidance of crowded areas.\n\nAs one can see from the information above, it may not be so easy for the average person to distinguish the difference between Winter allergies, the common cold, the flu, and a sinus infection.  Many of the symptoms are the same, similar, and/or overlap.  The board certified allergists at Black & Kletz Allergy have the expertise to help diagnose the correct ailment and more importantly, treat your problem.  We have 3 office locations in the Washington, DC metro and Virginia areas and we will be happy to schedule a visit for you at your earliest convenience.\n\nMold Allergies\n\nAs the temperatures are dropping and the leaves are starting to “fall”, the ragweed and other weed pollen counts are also gradually decreasing, but the mold spores will be a significant trigger of asthma and allergy symptoms in the coming few months for sensitized individuals.\n\nMold is a fungus which can cause bothersome symptoms in a few different ways:\n\n 1. Allergic Reaction:  Though all of us are exposed to molds, only some of us develop “sensitivity” to them determined by our genetic composition.  When a genetically predisposed individual inhales spores from molds, his/her immune system considers them as foreign invaders and manufactures antibodies in an attempt to fight them.  These antibodies memorize the particular spores and “attack” them when they are exposed to them again.  This reaction causes certain chemicals like histamine to be released into the tissues which cause the typical symptoms of sneezing, stuffy/runny nose, itchy/watery eyes, etc. (Note: If your vision is seriously impaired, it may be a sign on something more severe, and you may wish to consult with a LASIK surgeon in Washington DC.)\n 2. Irritant Reaction:  Molds can release substances called volatile organic compounds (VOC’s) which can irritate skin and mucus membranes inside the mouth, nose and eyes resulting in burning sensation, watery eyes, runny nose, scratchy throat and cough.\n 3. Toxic Reaction:  Mycotoxins, produced by certain types of molds, in addition to causing irritant symptoms can also lead to flu-like symptoms, fatigue, headache, dizziness, and shortness of breath.\n 4. Infection:  Though skin lesions are the most common infectious manifestation, different types of molds also can cause respiratory, gastrointestinal, and neurological disorders.\n\nMolds are found in both indoor and outdoor environments and thrive in high humidity.  Moist and decaying leaves on the ground, which tend to peak in the Fall, form a substrate for the mold growth.  Damp basements, leaky faucets, wet shower curtains, and wet bathroom tiles also encourage proliferation of molds.  Though many mold overgrowths are visible, their spores are microscopic and are air-borne.  The most common types of molds that cause human suffering are alternariahormodendrumcladosporium and penicillium.\n\nMost people sensitive to mold spores only exhibit “hay fever”- like symptoms involving the eyes, nose, mouth, and throat.  Less commonly, molds also play a role in more serious conditions like:\n\n 1. Allergic Asthma:  In sensitized individuals with a history of asthma, mold spores can induce sudden and severe flare-ups of asthma symptoms which may require emergency treatments and/or cause an increase in the number or dose of controller medications.\n 2. Allergic Bronchopulmonary Aspergillosis (ABPA):  It is a hypersensitive reaction to a particular type of mold called aspergillus in the lungs of patients with persistent asthma or cystic fibrosis.\n 3. Allergic Fungal Sinusitis:  A chronic inflammatory response of the membranes and tissues inside the sinus cavities can be caused by certain types of molds in susceptible people.\n\nDiagnosis:  Mold allergies can be detected either by skin testing or by measuring the amount of specific IgE antibodies in a blood sample by a clinical laboratory.  Skin testing is a more sensitive test and is the preferred method used by allergists.  A detailed history of the symptoms and their possible triggers in the environment followed by a focused physical examination will help the allergist in determining the type of testing needed to confirm the diagnosis.\n\nTreatment:  The first principle in the management of any allergic disorder is to identify the possible triggering and aggravating factors in the environment and to avoid exposure to them to the extent possible.  To reduce exposure to the mold spores, the following measures can be quite useful:\n\n 1. As dampness encourages mold growth, indoor humidity levels should be kept below 50 percent. Avoiding water leaks and running a dehumidifier in damp and musty areas of the house can also inhibit mold proliferation.\n 2. Installing HEPA filters in HVAC systems and changing them periodically will reduce indoor spore counts by trapping them before fresh air is circulated.\n 3. Adequate ventilation of the bathrooms either by running the exhaust fan or opening the windows will reduce mold growth.  Keep in mind that by opening the windows, outdoor molds may enter one’s home which can be counterintuitive.\n 4. Proper care of indoor plants such as removing the dead leaves and avoiding standing water can be helpful.\n 5. Wearing a face mask to cover the nose and the mouth before raking leaves and cutting grass will reduce exposure to molds substantially.\n 6. Mold spore counts are usually higher at nights when the atmosphere is cool and damp.  Closing the windows will keep the outdoor molds from entering inside one’s home.\n\nMedications like ocular, nasal, and oral antihistamines as well as nasal and inhaled anti-inflammatory drugs can relieve the misery of symptoms to a certain extent.  When environmental control measures and medications do not help enough or when the side effects of the drugs are bothersome, a desensitization process (i.e, allergy shots or allergy immunotherapy), which induces tolerance to the offending allergens, can be a long term solution which is highly efficacious.\n\nThe board certified physicians and staff at Black & Kletz Allergy have the training, expertise, and decades of experience in the diagnosis and treatment of adults and children with mold and other allergies in a professional, caring, and patient-friendly environment in the Washington, DC, Maryland, and Northern Virginia area.\n\nRagweed Allergies – What Are They and Do You Have Them?\n\nAs summer draws to a close and schools reopen across our region, most of us look forward to cooler days and fall colors. But if you are one of several million Americans who suffer from “Hay Fever” (“seasonal allergic rhinitis,” as it is more accurately named) to ragweed, the rising levels of pollen from ragweed are sure to increase your misery due to your allergic reaction to these pollen grains.\n\nThough many weeds like Pigweed, Mugwort/Sagebrush, Cocklebur, and Russian thistle pollinate in the fall, Ragweed (species Ambrosia) is the most common and predominant allergen in our geographical area. Each plant can produce up to one billion pollen grains per season, and these can remain airborne for several days and travel hundreds of miles from the site of origin. In the Washington, DC metropolitan area, the ragweed pollen usually starts appearing in the air in mid-August. The pollen counts gradually increase and peak in early September and subside after the first frost which is usually in late October. Many scientists believe that rising temperatures and an increase in atmospheric carbon dioxide (CO2) levels may prolong the ragweed season.\n\nWhen a person who has been previously sensitized to a particular pollen is exposed to that pollen in the air, the proteins trigger specialized cells in the immune system to release excessive levels of histamine and other chemical mediators which are responsible for various allergic symptoms, some of which are listed below:\n\n • Excessive sneezing\n • Itchy, red, puffy, watery eyes\n • Persistent runny nose\n • Nasal stuffiness, blockage, or congestion\n • Itchy throat and post-nasal drip leading to a dry cough\n • In asthmatic individuals, the pollen can also induce flare-ups of wheezing, chest tightness, cough and/or breathing difficulty.\n\nIn ragweed sensitive people, eating fresh fruits and vegetables like melons (cantaloupe, honeydew, watermelon, etc.), cucumber, zucchini, kiwi, and bananas may cause itching and tingling of mouth, tongue, and throat. This condition is called “pollen-food allergy syndrome” or “oral allergy syndrome” and is due to cross-reacting proteins in the pollen and fresh fruits.\n\nA few avoidance measures can reduce the exposure to pollen and the suffering:\n\n • Minimize outdoor activities in the early morning hours when the pollen counts tend to be the highest.\n • Keep the windows at home and in automobiles closed and use air-conditioning.\n • Shower to remove pollen from the skin and hair after coming indoors and wash clothing.\n • Nasal irrigation can wash the pollen and irritants from nasal passages.\n\nIf the symptoms are bothersome, several medications like antihistamines (available in pills, liquid, nose sprays and eye drops), decongestants (pills and liquid), and corticosteroids (nasal sprays, pills, liquid), either alone or in combination may offer considerable relief. To be optimally effective, the medicines are best started a few days before the onset of the active season. For many people with moderate to severe sensitivity, allergy immunotherapy (also referred to as “allergy shots,” will cause a desensitization to that pollen, which in this case is ragweed pollen) will offer the most effective long-term relief from the symptoms and can reduce or eliminate the need for medications.\n\nThe physicians and Washington, DC allergy doctors at Black and Kletz Allergy practice in DC and northern Virginia have several decades of experience and expertise in managing ragweed sensitive patients and are committed to provide the most up to date and evidence based treatment options in a patient-friendly environment.\n\nHay Fever in the Washington, DC Area\n\nHay Fever in the DC area is manifested by tree and grass pollens in the Spring and ragweed pollen in the Fall.  More specifically, the tree pollen usually begins to pollinate towards the end of February each year and continue pollinating into May or even early June.  Grass pollen usually begins to pollinate in May and the peak of it is usually over by early July, but it still is present into August.  Ragweed pollinates usually beginning in mid-August and ends with the first frost which is usually in late October.  There are other weeds that cause hay fever in the DC area which are present throughout the Spring, Summer, and Fall.  The medical name for hay fever is “allergic rhinitis.”\n\nAlso read: What Is Hay Fever?\n\nAnother important allergen that affects many individuals in the Washington, DC area is mold.  People are exposed to mold spores and become sensitized to them, the same way that pollen causes sensitization in allergic patients.  Washington, DC was built on a swamp and therefore tends to always have mold in the air.  Mold tends to like damp and humid climates such as the DC area, however, some molds can exist and flourish in dry climates, even the desert.  Of course, molds are both an outdoor and indoor allergen and is found indoors primarily in basements, kitchens, and bathrooms which tend to be more damp.  The symptoms of hay fever may include nasal congestion, runny nose, sneezing, itchy nose, throat and/or eyes, watery eyes, red eyes, post nasal drip, sinus headaches, and/or fatigue. These symptoms are most bothersome after outdoor activities and many people feel that they are forced to isolate themselves indoors for several weeks when the weather is nice, resulting in a significant negative impact on their quality of life.  Many patients with asthma also experience cough, wheezing, chest tightness, and/or breathing difficulty on exposure to pollen.  These flare-ups can also cause sleep disturbances, unscheduled emergency visits to health care providers, and loss of work and school days.\n\nPollen counts are the highest on warm, dry, and windy days and are directly proportional to the “misery index” of the people who have been previously sensitized to the pollen. They also tend to be higher in the mornings and decrease temporarily after it rains.  Individuals that are sensitized to pollens have specific antibodies (called IgE antibodies) which interact with the antigen in the pollen, causing histamine and other chemicals to be released.  It is these chemicals that cause the symptoms of hay fever.  To alleviate hay fever symptoms, a few common sense precautions can help reduce the amount of exposure to pollen.  These precautions include closing the windows in homes and automobiles, keeping the sunroof closed in automobiles, minimizing outdoor activities on warm and windy days, and taking a shower after being outdoors.  Over the counter antihistamine medications can offer some relief from symptoms in mildly sensitized individuals but are not very helpful in people who have long term severe sensitivities to these pollens.  For people who continue to be symptomatic, however, more effective treatment options like prescription medications and/or allergy desensitization (immunotherapy) procedures offer long term relief, greatly improving the quality of life and increasing productivity.\n\nBoard certified allergists are physicians who have received advanced training in treating hay fever, asthma, and sinus conditions.  Black and Kletz Allergy practice has over five decades of experience in evaluating and treating hay fever in the DC area.  Feel free to contact us to schedule an appointment if you are experiencing hay fever or any other allergic or immunologic symptoms.", "pred_label": "__label__1", "pred_score_pos": 0.6556310653686523} {"content": "Top 7 Business Intelligence (BI) Trends For 2019\n\nTop 7 Business Intelligence (BI) Trends For 2019\nTop 7 Business Intelligence (BI) Trends For 2019\n\nThe new year is underway, and the search for the ‘next big thing’ to help increase a business’s chance of standing out against the competition in 2019 is paramount.\n\nAccording to Gartner’s IT Glossary, Business Intelligence (B.I) is often defined as “an umbrella term that includes the applications, infrastructure and tools, and best practices that enable access to and analysis of information to improve and optimize decisions and performance”.\n\nB.I models are essentially data-driven ‘Decision Support Systems’(DSS) that are used with the intention of better supporting a business. With B.I, visual data discovery, and business analytics solutions are continuing to evolve, which in turn is enabling non-technical users to interact with more types of data.\n\nAs a result, SavoyStewart pulled highlights from the report ‘2019 Business Intelligence Trends’ by Tableau, to reveal the major trends that will be shaping Business Intelligence in 2019.\n\n1. The rise of explainable AI\n\nThe need for transparency has led to the growth of explainable Artificial Intelligence (A.I) – the practice of understanding and presenting transparent views into machine learning models.\n\nExplainable A.I enables users to ask follow up questions as to why a model recommends something and what it would say if the inputs were different. According to Gartner Research, 85% of CIOs will be piloting A.I programmes to buy and build outsource efforts by 2020.\n\nCompanies have embraced the value of A.I but for it to make a disruptive impact it must be trusted, presenting valid conclusions that will help humans better understand their data.\n\n2. Natural language humanises your data\n\nNatural Language Processing (NLP) amalgamates computer sciences and linguistics to allow computers to better comprehend the meaning behind human language. With the natural language generation market estimated to grow to $825.3 million by 2023, B.I vendors are offering a natural language interface to .\n\n\n3. Actionable analytics put data in context\n\nB.I platforms are evolving to place data where people want to take subsequent action. For example, data workers need their data and actions in the same place, rather than performing an analysis and actioning it elsewhere. B.I platforms are closing this gap by merging with core business operations, workflows and processes such as analytics and dashboard extensions.\n\nBusiness Intelligence Trends. Source: Saksoft\n\n4. Codes of ethics catch up to data\n\n\n\n5. Accelerated cloud data migration fuels modern B.I adoption\n\n\n\n6. Data story telling is the new language of corporations\n\nData story telling will continue to permeate workplace culture and shape how organisations use data to engage, inform and test ideas. Often defined as using data visualisation as a language to convey information in a way that is actionable and easy to understand, data story telling is essentially sharing the steps they took to discover the insights of data.\n\nAs organisations create cultures of analytics, data story telling methods are more about nurturing a conversation about the data and not so much about arguing for a singular conclusion.\n\n7. Enterprises get smarter about analytics adoption\n\nChief data officers are beginning to re-evaluate how B.I adoption plays a part in a strategy towards modernisation within their businesses. The report defines its true value as not “measured by a solution you deploy, but how your workplace uses the solution to impact business.”\n\nInstead of adoption, leaders are focusing on whether data and analytics are changing the way that decisions are mad, through the evaluation of programs that encourage engagement like internal communities, to ensure they benefit the most from their B.I systems.", "pred_label": "__label__1", "pred_score_pos": 0.9201420545578003} {"content": "Exhibiting the Exhibition: From the Cabinet of Curiosities to the Curatorial Situation\n\nEditorial: Hatje Cantz Verlag\nEncuadernación: Hardcover\nIdioma: English\nMedidas: 22.00 x 33.00 cm\n\nExhibiting the Exhibition investigates the history of exhibiting up to the present day, from predecessors of the modern museum to 20th-century exhibition methods and curatorial positions.\n\n1 disponibles", "pred_label": "__label__1", "pred_score_pos": 0.8022059202194214} {"content": "Magnet School Program\n\nEstablished in 2015, PS 349 - The Magnet School of Leadership and Innovation through STEAM is designed to meet the needs of all children.  The rigorous curriculum and instruction engages students’ imagination through engineering and design, spark their innate curiosity in science, and engage students via exploration of the natural world. Our students have many opportunities to work together on hands-on STEAM projects that allow them to collaborate with their peers and lead through self – management, self–awareness and responsible decision-making. Students learn to be college and career ready and develop their leadership skills through the infusion of The Leader in Me and 7 Habits of Happy Kids within all curricula.\n\nSTEAM learning is infused into daily instruction, project-based learning, electives, and after-school programs. The principles of STEAM— critical thinking, inquiry, observation, exploration, and creation—at the heart of every content area discipline which allow students to think critically, communicate effectively, and innovate to solve real-world problems by engaging in authentic tasks.\n\nPS 349 is a 1 to 1 technology environment where each student has access to their own iPad, MacBook or desktop computer to work on projects. In addition, the school uses Promethean boards in each classroom and technology supported programs such as robotics, coding and video conferencing with professionals in STEAM career fields.\n\nAs part of the Magnet Grant, PS 349 students have opportunities to participate in enrichment programs in conjunction with traditional curricula. We have partnered with community organizations to bring these special programs into our school community.\n\nStudent Enrichment\n\n\nOur in-house library is a place where our students visit to gain a deeper love for books and reading. The library is designed to have different areas of exploration for the students. It is equipped with a multitude of books and technology to meet the needs of all learners. This is a place where students are able to relax and dive deep into a book of their choice. \n\n\n\nAs a STEAM school, we have integrated the use of many technological services for our students. Each of our modernized classrooms are equipped with a Promethean board for whole group instruction computer access. Using this piece of equipment, students are able to watch videos, participate in interactive learning activities, and conduct whole class research. In addition, each classroom houses Apple desktop computers, MacBooks, and iPads for students to use. Students have accounts with research-based literacy and math programs such as iReady to promote self-directed instruction.\n\nMusic and the Arts\n\nPS 349 was awarded a grant for the Music and the Brain program. This program includes a comprehensive and engaging music literacy curriculum, teaching materials, ongoing teacher training, and a classroom keyboard lab to be used as part of the school's core curriculum.  \n\nHydroponics Lab\n\nPS 349 houses a hydroponic garden in the science lab where students have first-hand experiences with growing vegetables and herbs in a non-traditional way. There is also a hydroponic tower in the entryway of our school. Hydroponics as been proved to have several advantages over soil gardening. The growth rate on a hydroponic plant is 30-50% faster than a soil plant, grown under the same conditions. Hydroponic gardening offers several benefits to our environment. Hydroponic gardening uses considerably less water than soil gardening because of the constant reuse of nutrient solutions. Due to lack of necessity, fewer pesticides are used on hydroponic crops.\n\n Marquis Studios - The Arts for Kids Residencies\n\nMarquis Studios has brought engaging learning opportunities to PS 349 students. To date, students have participated in the following residencies:​ African Dance, Architecture as a Study of Cultures, Bhangra Folk Dance, Collage, Creative Movement, Islamic Visual Arts and Culture, Mime, and Puppetry.\n\n\nNY Hall of Science Residencies\n\nThe New York Hall of Science has brought hands-on science programs to PS 349 students. To date, students have participated in the following workshops:​ Bubble Brainstorm, Float, Sink, Design a Flink!, Mixing Color, Classy Classification, Five Senses, Lights and Shadows, Rockets, and Stuck on Magnets.\n\nMusic Partnership with Harmony Program\n\nAt the Harmony Program, music changes lives every day. Through collective music making, children explore new avenues and realize their full potential. Our specially trained teachers guide students from beginner group instruction to orchestral performance, building life skills and community from a shared love of music. \n\n\nEvery class at PS 349 has the opportunity to work with our specialized coding teacher. In this class, students learn the beginning stages of creating computer programs though games and interactive activities. Students then apply their coding knowledge to miniature Dash and Dot robots, where they control the movements, lighting, and sound of the device.\n\nProject-Based Learning (PBL)\n\nStudents work on a project over an extended period of time that engages them in solving a real-world problem or answering a complex question. They demonstrate their knowledge and skills by developing a public product or presentation for a real audience. As a result, students develop a deep content knowledge as well as critical thinking, creativity, and communication skills in the context of creating an authentic, meaningful project. PBL unleashes a contagious, creative energy among both students and teachers.\n\nThe Magnet School for Leadership and Innovation Through STEAM\n\nPS 349Q\n\n88-08 164th Street\n\nJamaica, NY 11432\n\nPS 349Q\n\n88-08 164th Street\n\nJamaica, NY 11432\n\n(718) 558-6220\n\n • Twitter Social Icon", "pred_label": "__label__1", "pred_score_pos": 0.9635611176490784} {"content": "Haunted White Tiger Castle\n\nPrice / kg:\nAvailable for Pre-Order.\n\nHaunted White Tiger Castle\n\nA Card Adventure for the DragonScales FRPG\n\nA medium ranked mini-adventure\n\nThe legends about the white tiger castle ruin are known by everyone in Concord mainly because the castle ruins can be seen from atop the eastern Concord walls. The castle is in ruins and it is known that the giant white tigers lair in and around the ruins waiting for dragons to appear. Every night the spirits of the castle appear with the setting sun. Then the ruins reform to a large castle filled with the ghosts of the castle. In the courtyard are spirit oxen and spirit war horses with ghosts to take care of them. Young dragons or older dragons new to the area swoop down into the courtyard expecting an easy meal. They pounce on ghost flesh. At the same time the white tigers leap from the castle parapets down onto the dragon killing and eating it.\n\n\nAs the bard sings about the castle your group of characters all have the exact same thought. For over a hundred years dragons have been killed in the courtyard of that castle. There could be several fortunes in dragonscales to be had for a little bit of risk.\n\n", "pred_label": "__label__1", "pred_score_pos": 0.9836527109146118} {"content": "Ada e Alfonso Sella\n\nby Cristina Mirandola\n\nWhat had started as a visit to a craft bookbindery ends up restoring a marriage to life: that of Ada and Alfonso Sella, who have been working together to “plant a seed in the hope that it sprouts,” to spread beauty, to help anybody who wants to “give a name” to plants and therefore to love them.  \nAlfonso Sella was a painter, engraver, botanist and dialectologist, he compiled a “Dictionary-Atlas of Biella’s speeches,” was a divulger of glottology and local botany and, in collaboration with his wife Ada, he devoted himself to the production of herbariums.  \n“The days of my youth are long gone, when Biella’s woods were intact, and not invaded by brambles and black locusts and inaccessible, when there were many little streams where we could quench our thirst and fish for shrimps, and in the biggest ones we could dive during the summer. Many areas of our soil have been violated and covered with grimes. But there are still places, especially on the mountains, that have resisted the assault and there we can experience nature.\nWhen we take a ride through the countryside, our eyes are careful to seize any novelty, rarity, interesting or accidental combination, born by chance by the transformation of elements. The eyes train and the ability to seize opportunities becomes more lively. It is the hunter’s instinct that comes back with a positive ending. Birdwatching is much talked about, so why shouldn’t we talk about grasswatching, mosswatching, and the like?”*\nIf herbariums are “collections of plants, or of some parts of them, pressed and dried, and subsequently fixed to sheets of paper,”** the impulse and motivations that urge to the creation of a herbarium bring us to follow the tracks of a journey, a loving glance turned towards the world, a glance on small things, a glance that lets itself be amazed. The creation of these herbariums is really an act of love, “… The wish to classify, not with the cold purpose to pigeon-hole, but to give a name to some creatures that are cherished and admired, knowing that they will be dearer to me after having been identified”.** The search and collection of specimens to preserve are turned into a metaphoric journey about the love for discovery: “Wandering on foot has therefore become an important part of life: tours at the discovery of new things (and you don’t even need to go too far; the same mystery is everywhere and we can come across it in the herbs of the garden’s pavement) with watchful eyes, careful to seize any detail that has never been seen before”.**\nSo maybe a herbarium is really much more than a collection of pressed and dried plants, maybe it is a homage to amazement.\n\n*L’erbario, di Alfonso e Ada Sella - Longanesi, 1974\n**L’erbario. Alla ricerca delle forme vegetali,\nAda e Alfonso Sella - Centro Botanico, Milano, 1989\n\nInformazioni bibliografiche / Bibliographic information\nPer amare una pianta. Gli erbari di Alfonso e Ada Sella. Catalogo della mostra (Biella, 2005)\na cura di A. Soldano - DOCBI Centro Studi Biellesi", "pred_label": "__label__1", "pred_score_pos": 0.9804189801216125} {"content": "Click here to win prizes by solving the puzzle Advent calendar.\nClick here to win prizes by solving the puzzle Advent calendar.\n\n\n\nColoured weights\n\nYou have six weights. Two of them are red, two are blue, two are green. One weight of each colour is heavier than the other; the three heavy weights all weigh the same, and the three lighter weights also weigh the same.\nUsing a scale twice, can you split the weights into two sets by weight?\n\nShow answer & extension\n\n\nShow me a random puzzle\n Most recent collections \n\nSunday Afternoon Maths LXVII\n\nColoured weights\nNot Roman numerals\n\nAdvent calendar 2018\n\nSunday Afternoon Maths LXVI\n\nCryptic crossnumber #2\n\nSunday Afternoon Maths LXV\n\nCryptic crossnumber #1\nBreaking Chocolate\nSquare and cube endings\n\nList of all puzzles\n\n\nproportion time probabilty 3d shapes doubling differentiation rectangles square roots trigonometry arrows dodecagons people maths number lines sport multiples coins chess circles games books cards angles graphs square numbers mean division ellipses wordplay area numbers planes taxicab geometry dates volume calculus quadratics spheres odd numbers shape cryptic crossnumbers factors prime numbers dice balancing polygons money geometry digits shapes speed crosswords fractions multiplication surds means christmas clocks sums scales rugby coordinates averages squares percentages folding tube maps algebra functions palindromes ave cryptic clues symmetry colouring sequences 2d shapes pascal's triangle routes menace perfect numbers unit fractions logic hexagons integration addition grids perimeter chocolate chalkdust crossnumber remainders probability sum to infinity floors bases triangle numbers triangles irreducible numbers factorials integers advent indices star numbers cube numbers partitions crossnumbers complex numbers parabolas regular shapes\n\n\nShow me a random puzzle\n▼ show ▼\n© Matthew Scroggs 2012–2019", "pred_label": "__label__1", "pred_score_pos": 0.99599289894104} {"content": "Concussion Research to Get $14 Million Boost\nBusiness + Economy\n\nConcussion Research to Get $14 Million Boost\n\nREUTERS/USA Today Sports\n\nResearchers in the U.S. on Monday unveiled a $14 million series of research projects aimed at diagnosing and treating brain injuries in football players and others who have suffered multiple head injuries or concussions.\n\nThe projects, partly funded by the National Football League, are aimed at chronic traumatic encephalopathy, or CTE, a condition linked to the loss of decision-making control, aggression and dementia. The condition is tied to repeated hits to the head, such as those experienced by football players, hockey players and boxers. The condition currently can be diagnosed only by examining a person's brain after their death. But researchers with the National Institutes of Health aim to develop tests to detect and treat CTE while the patient is alive.\n\nRelated:  The Big Business of College Football: Who's Winning? \n\n\"This is a public health problem,\" said Walter Koroshetz, deputy director of the NIH's National Institute of Neurological Disorders and Stroke. \"We don't know the mechanics of the head injuries that lead to this, the number and severity that is required to get this. We don't know whether certain people based on their genes are more susceptible or not. There are a lot of questions to be answered.\"\n\n\nThe research is not focused just on football players, but any people who engage in activities in which they suffered head injury. Researchers say they also hope to better understand the potential relationship between traumatic brain injury and late-life neurodegenerative disorders, especially Alzheimer's disease.\n\nRelated:  Alzheimer's Funding Should Be a No Brainer \n\nTwo of the new research projects will focus on defining the long-term changes that occur in the brain years after a head injury or after multiple concussions. Ten neuropathologists from eight universities will work to describe the chronic effects of head injury in tissue taken from hundreds of individuals as they try to develop standards for diagnosis. Six pilot projects will aim to identify potential biomarkers that can be used to track a person's recovery from concussion.\n\n\nPrevious published research has found that former American football players have higher rates of neurodegenerative diseases such as Alzheimer's and Parkinson's disease. There has also been violent and erratic behavior noted among current and former NFL players, including a spate of suicides.\n\nThis month, the family of former Kansas City Chiefs' linebacker Jovan Belcher had his body exhumed so his brain could be studied for signs of CTE. Belcher killed his girlfriend and then himself last year. Also earlier this month, five former players for the Kansas City Chiefs football team sued the Chiefs, claiming to be suffering from CTE because of multiple concussions suffered while playing for the team.", "pred_label": "__label__1", "pred_score_pos": 0.623137891292572} {"content": "Barca Reflections + How to Choose Your Energy\n\nAt Castello de S. Jorge in Lisbon, Portugal.\n\nI will admit, I have not been as good about journaling and blogging as I wanted to be in Spain... I can't believe it has been a month since my last post. I thought I would post a recap every week, but I have really been trying to focus on being present in the moment and not worrying about documenting every single thing on camera which has been really refreshing. I've mentioned my thought provoking morning walks a zillion times, but it has been my time that I absolutely cherish in the morning, by myself just listening to a podcast. I reflect every single day and I need to be better about getting those reflections in writing, so that's what you are reading today.\n\nBoth photos from Lisbon, aka my new favorite place on Earth.\n\nBefore I came over to Barcelona, I was really stressed on how I would be able to create a peaceful routine that was similar to what I had been trying to do at home. I'm a morning person so it's really important for me to set myself up for success in my morning routine. Thankfully, Headspace has changed the game for me and I am still able to meditate almost every day. During the week, I wake up a little earlier and sit in my bed in meditate and if I'm traveling, I can do it on the bus to the airport or on a plane. It changes my mood drastically and gives me space in my mind to focus on what really matters throughout my day. I highly recommend it.\n\nToday in my meditation the idea was presented that anxiety and negative feelings are like dark clouds covering up a blue sky. The blue sky is always there, but sometimes the clouds are in the way. Similarly, I guess we can think of our dreams and the person we're constantly striving to be as our own personal blue sky. Some days are cloudy, but other days we feel on top of the world, sunny and 75. I guess the take home message here (for me anyways) is that the person that we want to be is who we already are, the clouds get in the way- our fears, self imposed limitations, etc. The difference between the weather and our lives is that every day we are faced with a choice: is it going to be a sunny day or a stormy day? We get to choose. A lot of times, my anxiety or negative attitude follows me because it's a habit that I can't kick. I'm used to feeling anxious and, although I'm uncomfortable, it's an easier and more comfortable choice. However, what we choose to feel every day is either revealing or covering up that blue sky.\n\nBeautiful blue sky views from Castello de S. Jorge.\n\nTime Out Market Lisboa\n\nFor me, my focus right now is finding peace. Being at peace in my mind, spirit, and body, but also with the negative energy that has come into my life in the past. Choosing a positive energy is quite simple if we allow it to be. Choosing to say no to negative people, situations, or energies is the way to move forward and get to a peaceful state. I know you have experienced some form of negative energy at some point in your life. You can feel it the second you walk in the room! But have you ever thought to yourself, \"you know what? I'm actually going to say no to letting this into my life.\" It's something I recently realized on a morning walk and am incorporating that into my journey to finding peace. It seems crazy and maybe even a little silly to place such an emphasis on just saying no, but it's actually harder than you might think.\n\nI posted about this on my Instagram story last week, but I was working on a school project with two girls that I had just met and their energy was so positive, it was contagious. It really lit me up and made me feel like I needed to share that energy and that kindness and joy to everyone. So often, we dump our problems on other people- it's normal and it's okay to a certain extent. But we all have that one friend or even those couple of days where we are the friend that is \"the dumper\": filling up someone else's time and energy with whatever negativity and stress is going on in our life. Unfortunately, I can think of a couple times where I've been a dumper.\n\nKind of similarly, something I've noticed since being away is that I let the thoughts, opinions, and actions of other people have too significant of an impact on my energy. Whether it's thoughts on my future career or my relationship or not getting some validation or credit that I think I've earned, it seems like things I can't really change are negatively impacting my energy. What's even more frustrating is that I'm not saying no! I'm the one that is allowing that into my life.\n\nSnaps from my daily walk in Barcelona.\n\nMy roomie, fellow Gemini, and soul sister Jess. Seriously could not be more thankful that the universe brought us together.\n\nCircling back to my main point here, after I met with those girls, I felt so inspired and energetic and really motivated to only be a positive energy for someone else. It can change someone's whole day to share your light and kindness instead of being a negativity dumper and I realized in that moment that that is exactly who I want to be. We have the power literally every second of every day to choose the blue sky. When we walk into room, we are choosing to either share a positive energy or a negative one. We all make mistakes, but being able to be aware of the present moment and check yourself is what counts.\n\nWow that was a lot! If you're still reading, you rock! I guess I've had a lot on my mind in the past month haha. While I share a lot about my life on my blog, I always try to think about what I want the takeaway to be and, lately, I think my focus is being able to share some positive energy. In a world where there seems to be so much negativity, my goal is to just share my journey to choosing to find the light and good energy in every moment.\n\nThanks for reading. xx\n\nNo comments", "pred_label": "__label__1", "pred_score_pos": 0.8505514860153198} {"content": "Why girls individuals in most cases have a tendency to have dodgy hip implants or other scientific devices – The Dialog AU\n\n\nThe past one year has seen large pain about the safety of scientific implants. About a of the worst scandals have eager devices for girls individuals, similar to textured breast implants with links to most cancers, and transvaginal mesh implants, which had been the matter of a senate inquiry.\n\nNonetheless girls individuals are harmed no longer easiest by “girls individuals’s devices” similar to breast implants and vaginal mesh. Females are furthermore extra liable to be harmed by it sounds as if gender-honest devices, adore joint replacements and heart implants.\n\nRead extra:\nWe can prick non-public successfully being insurance charges by fixing how we pay for hip replacements and other implants\n\nIn no longer too long ago published analysis, I explored the causes for this. I came upon gender biases in any admire stages of invent and use of scientific implants.\n\nProposed changes to how devices are regulated, similar to introducing a national register of all implants, will fabricate it sooner to identify dodgy devices. Nonetheless this is no longer going to contend with gender bias in how devices are designed and venerable.\n\nBias begins with invent, then lab testing\n\nBiological and social factors can have an affect on how girls individuals fresh when injured or sick, and how successfully treatments work. Customarily, gadget designers stop no longer buy these differences into story.\n\nThe lab assessments venerable to manufacture distinct that implants are true in most cases ignore the possibility girls individuals might maybe maybe have a sort of reactions to supplies, or their actions might maybe maybe maybe order a sort of loads on implants.\n\nRead extra:\nTreatment’s gender revolution: how girls individuals stopped being handled as ‘tiny males’\n\nBias continues with scientific trials\n\nSome scientific gadget companies have exploited regulatory loopholes to discover devices to market in the UK without scientific trials. Even when trials buy order, girls individuals must no longer continuously incorporated. Or researchers stop no longer analyse the records for gender differences.\n\nRegulators such because the Meals and Drug Administration (FDA) in the USA and Australia’s Therapeutic Goods Administration (TGA) in most cases approve devices without data split by gender on how successfully devices produce or how true they’re.\n\nThen there’s the doctor-affected person relationship\n\nThe gender of the doctor and affected person can fabricate a distinction to what girls individuals obtain out about their implant. The very low numbers of girls individuals in surgery imply female sufferers in most cases look male surgeons. And there might be some proof male doctors have a tendency to treat female sufferers in a extra paternalistic and less affected person-centred technique.\n\nThen there’s the matter of whether or no longer surgeons raise crucial security factors with their female sufferers. For instance, some surgeons feel unhappy discussing whether or no longer it’s true to have intercourse after a hip implant, especially with female sufferers. This is fundamental as some sexual positions are safer than others.\n\nRead extra:\nFemales have heart attacks too, but their signs are regularly pushed apart as something else\n\nLet’s stare upon one example, a hip implant\n\nThe DePuy ASR (articular surface replacement) hip implant precipitated extreme issues for sufferers spherical the realm, including Australia, similar to irritation, painful growths, dislocations and steel toxicity.\n\nDespite media protection, few were conscious this hip implant was greater than twice as likely to fail in girls individuals.\n\nWithin the case of hip implants, the identical units are readily in the market for girls individuals and males, implying these devices are gender honest. Most units come in a fluctuate of sizes, with some having greater outcomes for girls individuals. Nonetheless girls individuals must no longer tiny males, and there are gender differences in frequent actions exciting the hip, similar to walking.\n\nWhen girls individuals arise from sitting or have intercourse, the still edges of their hip sockets have a tendency to undergo greater loads than males’s. This “edge loading” increases the probability hip implants will set apart on down and unencumber dangerous steel particles.\n\nWhen girls individuals arise from sitting, their hip sockets have a tendency to undergo greater loads than males’s.\nfrom www.shutterstock.com\n\nThese differences would no longer matter if lab assessments confirmed equal security of hip implants for girls and males individuals. Then again, proof is no longer aloof on this. In level of reality, worldwide requirements for lab assessments that measure charges of set apart on and hunch in hip implants ignore gender differences, and easiest take a look at commonplace walking rather than extra annoying actions, similar to operating or having intercourse.\n\nThe FDA, TGA and other regulators in most cases approve fresh hip implants primarily primarily based entirely on their similarity to already licensed units. This took order with the ASR hip implant. Regulators did no longer need fresh data, let on my own proof the hip was equally true for girls individuals and males.\n\nIt’s a pain internationally\n\nInternationally, there might be increasing pain about the laws and security of scientific implants. A world community of journalists released a damning story late closing one year. The FDA’s 510(k) project, which approves fresh devices primarily primarily based entirely on their similarity to present ones, allows approval of some high-possibility implants without additional proof.\n\nThe scenario isn’t any greater in Europe, the set apart business companies stop the approvals. This draw has been criticised for approving devices without ravishing data and for lacking transparency in phrases of implant recalls.\n\nRead extra:\nWhat’s the Clinical Technology Association and how does it wield its energy?\n\nThe FDA has taken some steps to contend with gender bias, issuing steering for companies to offer data on their devices in girls individuals and males. Then again, here’s no longer binding. A understand of devices licensed after its introduction came upon easiest 17% incorporated data analysis by intercourse.\n\nHow might maybe maybe maybe we give a capture to issues?\n\nIn Australia, scandals with implants have led to requires bans and registries. These are ravishing suggestions, but is no longer going to suggested fresh devices to be designed with girls individuals in mind, nor give a capture to affected person verbal change.\n\nRead extra:\nThe TGA’s proposed breast implant ban exposes a litany of failures, and fails to provide protection to girls individuals\n\nSurgeons must capture matters crucial for their sufferers to understand about surgery, alternatively unhappy it makes them feel. Sleek efforts to present a capture to the tradition of surgery, and to plan trainees who greater replicate the communities they abet might maybe maybe merely reduction.\nNonetheless there is a protracted technique to lunge.\n\nRegulators adore the TGA and FDA can affect gadget invent by requiring data on the safety and efficiency of all fresh (and modified) devices in both girls individuals and males. The FDA abilities shows these requirements wishes to be binding if they’re to work.\n\nRead More\n\nAugust 12, 2019\n", "pred_label": "__label__1", "pred_score_pos": 0.6694434881210327} {"content": "The Journaling of Silver 356\n\nSelling Efficiency Through Irrigation\n\nAs it pertains to tearing your property, you may well be able to save yourself some 'green' -without your lawn turning brown-by having an automatic irrigation system. If you have an opinion about families, you will certainly desire to compare about tracked snow blower. Browsing To riding mower with bagger reviews likely provides suggestions you should give to your uncle. If that system is precisely made, installed and maintained, it could keep your landscape looking lush utilizing the least amount of water.\n\nHere are a few more methods, from gardening expert Paul James, that'll help:\n\n\\u2022 Waste maybe not, want not-Instead of watering for just one long continuous session, take to removing the watering time in-to shorter periods and take 15-minute breaks among each session. Should people wish to be taught more about my best single stage snow blower, there are millions of online libraries you should consider investigating. This may allow the water soak-in, while minimizing runoff.\n\n\\u2022 Raise-the grass at a mower environment to shade roots from sunshine and encourage deeper roots. Lawns with longer grass blades (2 inches) can retain more moisture and encourage further, healthiest roots.\n\n\\u2022 Watch the clock-Water between 5 a.m. and 1-0 a.m., once the sun is reduced, winds are calm and conditions are cool. By watering in the day, you give a chance to the leaves to dry up during the day.\n\n\\u2022 Divide by plants need different levels of water. So the grass could be watered separately and more usually than ground covers, shrubs and trees split your yard into individual irrigation zones.\n\n\\u2022 Water only what grows-If you have an underground sprinkler system, ensure the heads are adjusted precisely in order to avoid watering sidewalks and driveways. A properly adjusted sprinkler head should spray large droplets of water, not a fine mist, to reduce evaporation and wind drift.\n\n\\u2022 Con-sider drip-When it concerns watering specific trees, flowerbeds, potted containers or other nongrassy places, you are able to apply water straight to the roots with low-volume drip irrigation. This will reduce water waste through evaporation or runoff and keep weeds from growing.\n\n\\u2022 Do regime inspections-Periodically check your sprinklers to ensure everything is working properly. A head or a point can wreak havoc on your landscape and water bill.\n\n\\u2022 Be rain smart-Adjust your irrigation system as the conditions and weather change. You can even use a shut-off device that automatically detects rain or water. For additional information, please consider checking out: privacy. They are low priced and let you benefit from nature's free watering service..1200 W 1st Street | Hwy 28 W\nWaldo, WI 53093\n(920) 528-8631", "pred_label": "__label__1", "pred_score_pos": 0.7439086437225342} {"content": "Must the prime finite field, Fp, an elliptic curve is defined over always have a greater number of elements than the cardinality of an elliptic curve.\n\nFor example, If I have Elliptic Curve defined by y^2 = x^3 + x + 1 and I can calculate that the E.cardinality() = 14. Must the prime field I chose be >14? Would there be any loss in security if I chose 11 as the prime field?\n\nWould this be different if I chose the prime field beforehand?\n\n • $\\begingroup$ You can't calculate a cardinality before choosing the finite field, do it is quite unclear how you got to the number 14. The difference between the number of elements in the field and in the curve is bound by Hasse's theorem (about the square root of the numbers). $\\endgroup$ – tylo Sep 16 at 15:05\n • $\\begingroup$ I should've been more clear. If I choose a prime field to begin with, should I seek out curve parameters such that the cardinality is less that the size of the field? Will there be an issue with having the cardinality > finite field size? $\\endgroup$ – Ellthegiant Sep 16 at 15:15", "pred_label": "__label__1", "pred_score_pos": 0.9914170503616333} {"content": "International Stroke Conference\nJanuary 24–26\n\nRicha Sharma, MD, MPH\n\nThis was a very interesting presentation about a stroke etiology that we need to study further, namely symptomatic carotid plaque not resulting in severe stenosis. Currently, there is no compelling evidence for intervention more than medical management. However, the presenter, Vijay Sharma, argued that there are certain characteristics that make a plaque at risk for embolizing even if it does not meet NASCET criteria for severe stenosis. The researchers embarked on identifying imaging characteristics that are associated with a higher risk of embolization of these plaques. They utilized FDG-PET/CT and high-resolution, fat-suppressed MRI as modalities to help different plaque risk. A prospective study included patients with carotid plaque resulting in 50 to 70% stenosis, which was ipsilateral to a recent infarct which occurred within 30 days. These patients underwent FDG-PET to identify any regions of inflammation in the plaque since this may be an initiating event for plaque rupture. They also underwent MRI with high-resolution of the carotid, which yielded a ratio of the T1 hyperintensity of the plaque to the intensity of the ipsilateral sternocleidomastoid. The MRI presumably detects the lipid-rich necrotic core of the plaque and intraplaque hematoma. The endpoint of the study was whether the patients developed a recurrent stroke within a 90-day follow-up period. Interestingly, 11% of these patients suffered from a recurrent ischemic stroke (N=11), and these patients on average had higher T1 carotid-sternocleidomastoid ratios (p<0.0001) and higher SUV values by PET in the carotid plaque (p<0.0001). In multivariable modeling, a higher T1 carotid-sternocleidomastoid ratio and higher SUV values independently predicted recurrent ischemic stroke.\n\nThese results are indicating that there is a subset of carotid plaque that results in < 70% stenosis but can still be symptomatic due to intrinsic features of the plaque itself. These plaques can potentially be identified by high resolution MRI and PET scan. These data lend support for potential intervention for secondary stroke prevention after the carotid was recently symptomatic based on a radiographic profile of the plaque. However, it is unclear what type of intervention would be beneficial, such as aggressive medical management, carotid stenting, or carotid endarterectomy.\n\nThis study hypothesizes that the mechanism of stroke from severe carotid stenosis is via regional hypoperfusion; however, there are several studies that have shown that there are micro-emboli associated with the plaques, which result in severe stenosis independent of blood velocities.[1, 2] With regards to risk stratification, in some centers, performing a PET/CT and high-resolution MRI may be feasible. However, in the majority of healthcare institutions, these machines may not be available, and even if they were, their output may be difficult to interpret by radiologists who are not specifically trained.\n\nThis exciting research generates a hypothesis that there are potentially patients with symptomatic carotid plaques resulting in less than severe stenosis who may benefit from treatment more aggressive than watchful waiting, which is currently the standard of care. Thus, there is a role for a randomized clinical trial aimed at assessing patients after acute stroke putatively due to an ipsilateral symptomatic carotid artery with less than 70% stenosis as the most likely etiology. Since there is currently equipoise, these patients may be selected if they have high-risk plaque determined by radiographic modalities such as high-resolution MRI and PET/CT and randomized to aspirin, dual antiplatelet therapy, stenting, or carotid endarterectomy.\n\n\n 1. Ali Zandieh, Ava Liberman, Caitlin Loomis, Jonathan Raser-Schramm, Christina Wilson, Jose Torres, Koto Ishida, Swaroop Pawar, Nichole Gallatti, Melissa Yates, Rebecca Davis and Brett Cucchiara. Frequency of Microemboli in Symptomatic Carotid Stenosis Compared to Carotid Occlusion. Neurology, April 5, 2016 (86).\n 2. T. Zuromskis, R. Wetterholm, J. Lindqvist, S. Svedlund, C. Sixt, D. Jatuzis, D. Obelieniene, K. Caidahl, R. Volkmann. Prevalence of Micro-Emboli in Symptomatic High Grade Carotid Artery Disease: A Transcranial Doppler Study. European Journal of Vascular and Endovascular Surgery, May 2008, Volume 35 (5): 534-540.", "pred_label": "__label__1", "pred_score_pos": 0.8257361650466919} {"content": "Give Us A Call\n\nStore Hours\nMon - Fri 10-6, Sat 10-4\n\nHow To Practice Without Getting Tired\n\nHi everyone,\n\nToday I’m going to be talking about improving endurance while practicing.\n\nNot getting overly tired physically or mentally tired during practice is important because:\n\n—You’ll be able to have longer practice sessions.\n\n—You’ll accomplish more if you are not too mentally exhausted to focus.\n\nSo how can we increase our endurance during practice?\n\n1. Make sure you have a proper warm up routine.\n\n—Warming up will slowly warm up your body and mind. This will make it much less frustrating to practice because your warmed up body will be less likely to fail and failure can be frustrating.\n\n—Warming up will also decrease the chance of experiencing pain while practicing. Pain can be a big motivator to stop practicing. Common pains are usually in your back and shoulders.\n\n—Warming up will decrease your chances of injury, which will make it easier to practice longer because of the lack of pain.\n\n2. Take breaks. Taking breaks is probably the easiest way to get a much longer practice session in while not feeling overly tired. Most people can only focus for a maximum of about 45 minutes. If you find your mind wondering and see that you are getting to impatient to properly practice with the metronome etc, then take a 10 or 15 minute break. For example, you can practice 40 min, then break then another 40 minutes then a break, then another 40 minutes. The point is, you practice in 35-45 minute blocks of time.\n\n—The easiest way to practice significantly longer is to divide your practice sessions in 2 parts. Perhaps you can practice in the morning and in the afternoon/evening. For example, each practice session will consist of two 40 minute sessions. Practice 40 minutes, take a 10 min break, then practice another 40 minutes. Later in the day, do the same thing and you’ll end up easily putting in at least 2.5 hours of practice every day and remain fresh and focused the whole time. Do this 3X per day and you can easily put in 4hours + practicing per day.\n\n3. Mix up your practice session. Let’s say you have to practice 3 things besides your warm up. For example, you can do:\n\n—Warm-up (scales and vibrato)\n—Bach (two movements)\n\nInstead of practicing your Bach for 45 minutes before you move on to something else, just practice back for 20-25 minutes and then your etude for 20-25 miniatures. Then go back to Bach and then to your concerto or etude. By breaking up your practice session with each individual piece, you are avoiding getting complacent and bored. Always try to keep it fresh and interesting!\n\n4. Practice while sitting down. I suggest practicing most of your technical type of music sitting down. Orchestra music and etudes especially or when you are learning the notes/rhythms of any piece. Utilize standing practice for pieces that you will perform for an audience in the future. There are many benefits to standing while practicing that will help you be a better performer but all things that can be practicing sitting down, will save your energy.\n\nGood luck and happy practicing!", "pred_label": "__label__1", "pred_score_pos": 0.9905129671096802} {"content": "Figure 1.\n\nObjects Functions And Materials From Which The Object Is Made.\nThe material that makes up a squash ball is raw butyl rubber, many different natural and synthetic materials and powders (that are added to the rubber in the process explained below) and air that is enclosed inside the rubber ball. Various types of balls are produced for various speeds and playing styles.\n\nResilience is the most important property of a squash ball. Resilience of a material is the ability of the material to absorb energy and then to release it. Most of the energy turns into thermal energy inside the ball. Air inside the rubber of the ball, as well as the rubber itself, becomes heated and therefore the air inside expands and causes a greater pressure inside the ball; the rubber of the ball becomes more flexible and more resilient as the rubber heats up. Therefore the bounce of the ball becomes better and higher (more bouncy). This is the function of the rubber and air inside. The normal temperature of the ball that players play with is 45˚C. At this temperature the energy lost to the external features is the same as the energy lost in the ball rubber and air inside.\n\nThe function of a squash ball is to have a variation of bounces, that increase in height as the temperature increases.\n\nFigure 2.\n\nDiscussion of the mechanical properties of the materials used and the influence of the objects functionality. \n\nThere are two main elements in a squash ball, a butyl rubber exterior and the air within the ball. (Cunnington, 2008-2009) The type of rubber used is an elastomer which is an elastic polymer that consist of long chain like molecules. Upon stretching, the molecules are forced to take up a more linear shape, restricting their movement and causing the molecules to heat up, as the elastic polymer is released it returns to its original chain like molecular state.(Gent, 2014) When an elastic polymer heats up it becomes more elastic and the air pressure inside increases, making the squash ball more bouncy.(Weeks, 2006) \n\nMain properties of Butyl Rubber\n\nElasticityElastic polymers have a very high elasticity, this is the ability to be deformed in any way such as stretched, compressed, twisted or bent and still be able to return to its original shape and size. The elongation at break is around 500% which means that it is able to stretch five times its length before it breaks (Butyl Rubber (IIR, CIIR, BIIR).).The modulus of elasticity varies with the elongation. This property shows that the squash ball can withstand the elongations due to the forces acting on it during a game of squash.\n\n\nHardnessThe hardness of butyl rubber is in the range of 40-90 Shore A which is the same range as the hardness of a car tire( Rubber Material Selection Guide IIR or Butyl Isobutylene Isoprene Rubber).\n\n\nResilienceThis the ability of the material to return quickly to its original state. It is the ratio of energy recovered to the energy applied. The specifications of squash balls as stated by Specifications for Squash Balls (2013) the rebound resilience at 23 degrees Celsius is minimum 12 % and vulcanized butyl rubber has a rebound resilience of 12% (Haponiuk, Formela, 2014). This resilience is low making it suitable for shock absorbing.\n\n\nStrength: The ultimate tensile strength of vulcanized butyl rubber is 17 MPa making the squash ball strong enough to withstand the tensile forces produced during a game of squash (Butyl Rubber (IIR, CIIR, BIIR).).\n\n\nPermeabilityVulcanized butyl rubber has a very low permeability which means that the air inside of a squash ball is not able to escape, even with a increase in pressure due to the changes in temperature (Weeks, 2006).\n\n\nWear resistanceThis rubber can be used at temperatures ranging from -50 to 121 degrees Celsius which way exceed the temperatures experienced on a squash court.  \n\n\nFrom these properties we can see why butyl rubber is used as the material for a squash ball.\n\nFigure 3.\n\n        The Manufacturing Process of                Squash Balls:\n\n           The production of squash balls occurs in the               following processes:\n\n1.Compounding and Mixing of Rubber:  Raw rubber in its natural state is stiff and difficult to process. It is first masticated in a rubber mill to a softer consistency.\n\nThe rubber is then compounded with additives to obtain certain strength, resilience, colour and enable it to vulcanise. Various ingredients including polymers, fillers, vulcanising agents, processing aids and reinforcing materials are added according to the secret recipe of the manufacturer and the type of squash ball produced.  Carbon black is used most commonly used as filler. It increases the tensile strength and resistance to abrasion and tearing of the final product.\n\nThe additives are then thoroughly mixed to allow to uniform dispersion in material.\n\n2. Shaping and Vulcanization: The compound is then heated and loaded into an extruder which forces the material through a die. A rotating knife then cuts the extruded compound into pellets which are then cooled.\n\n\n\n         Figure 4: Rubber Extrusion through Die                              (Groover,2013,pg 287)\n\n\nThe pellets are then placed into a hydraulic press which subjects the pellets to a pressure and temperature of 7584.23 KPa and 150°C for 12 minutes in a half-shell shape mould. This allows the material to cure and therefore vulcanize. Vulcanization allows for the cross-linking of elastomer molecules so that the rubber can become stiffer and stronger but still retain its extensiblity. Long-chain rubber molecules become joined at certain points (crosslinked) which reduce the ability of the elastomer to flow. Vulcanization is accomplished in the mold cavity by maintaining the mold temperature to allow for curing. Various chemicals including zinc oxide and steartic acid are added with small amounts of sulphur to accelerate and strengthen the vulcanisation treatment of the rubber. (Groover,2013)\n\nFigure 5: Vulcanization’s effect on rubber molecules:\nRaw rubber;    \n2. Vulcanized (cross-linked) rubber \n(Groover,2013,pg 288)\n\n\n50% of the half-shell shaped moulds have a pin at the bottom of the mould to create a small dimple which is painted to indicate the ball speed. The half shells are then removed from press and any flash (excess compound) is cut away.\n\n\n3. Adhesion: The edges of the half-shell are then roughened by buffing by a grinding wheel and coated with a rubber solution containing an adhesive. The half shells are then stuck together by an operation called flapping. The balls are then placed in a second moulding, heating and vulcanising process. The balls are subjected to a pressure of 6894.76 KPa for 15 minutes which allows the adhesive to cure.\n\n4.Surface Finish: The external surface join is then smoothened by buffing to give a matt surface. The balls are then washed, dried and inspected to ensure then conform to the WSF (World Squash Federation) standards.", "pred_label": "__label__1", "pred_score_pos": 0.5200158357620239} {"content": "Browsed by\nMonth: August 2019\n\nWhat’s the frequency, Kenneth?\n\nWhat’s the frequency, Kenneth?\n\nFirst, if you get the reference in the title, you are old. Otherwise, let me google that for you.\n\nSecond, a Reddit user recently posted this question\n\nI have temperatures reading over times (2 secs interval) in a computer that is control by an automatic fan. The temperature fluctuate between 55 to 65 in approximately sine wave fashion. I wish to find out the average time between each cycle of the wave (time between 55 to 65 then 55 again the average over the entire data sets which includes many of those cycles) . What sort of statistical analysis do I use?\n\n[The following] is one of my data set represents one of the system configuration. Temperature reading are taken every 2 seconds. Please show me how you guys do it and which software. I would hope for something low tech like libreoffice or excel. Hopefully nothing too fancy is needed.\n\nA few people recommended using FFT, and I agreed, but I also suggested two other options:\n\n 1. Use a cepstrum, or\n 2. Keep it simple and use zero-crossings instead.\n\nAnd then another person suggested autocorrelation.\n\nI ran some experiments to see what each of these solutions looks like and what works best. If you are too busy for the details, I think the best option is computing the distance between zero crossings using a spline fitted to the smoothed data.\n\nIf you want the details, they are in this Jupyter notebook.\n\nWatch your tail!\n\nWatch your tail!\n\nFor a long time I have recommended using CDFs to compare distributions. If you are comparing an empirical distribution to a model, the CDF gives you the best view of any differences between the data and the model.\n\nNow I want to amend my advice. CDFs give you a good view of the distribution between the 5th and 95th percentiles, but they are not as good for the tails.\n\nTo compare both tails, as well as the “bulk” of the distribution, I recommend a triptych that looks like this:\n\nThere’s a lot of information in that figure. So let me explain.\n\nThe code for this article is in this Jupyter notebook.\n\nDaily changes\n\nSuppose you observe a random process, like daily changes in the S&P 500. And suppose you have collected historical data in the form of percent changes from one day to the next. The distribution of those changes might look like this:\n\nIf you fit a Gaussian model to this data, it looks like this:\n\nIt looks like there are small discrepancies between the model and the data, but if you follow my previous advice, you might look at these CDFs and conclude that the Gaussian model is pretty good.\n\nIf we zoom in on the middle of the distribution, we can see the discrepancies more clearly:\n\nIn this figure it is clearer that the Gaussian model does not fit the data particularly well. And, as we’ll see, the tails are even worse.\n\nSurvival on a log-log scale\n\nIn my opinion, the best way to compare tails is to plot the survival curve (which is the complementary CDF) on a log-log scale.\n\nIn this case, because the dataset includes positive and negative values, I shift them right to view the right tail, and left to view the left tail.\n\nHere’s what the right tail looks like:\n\nThis view is like a microscope for looking at tail behavior; it compresses the bulk of the distribution and expands the tail. In this case we can see a small discrepancy between the data and the model around 1 percentage point. And we can see a substantial discrepancy above 3 percentage points.\n\nThe Gaussian distribution has “thin tails”; that is, the probabilities it assigns to extreme events drop off very quickly. In the dataset, extreme values are much more common than the model predicts.\n\nThe results for the left tail are similar:\n\nAgain, there is a small discrepancy near -1 percentage points, as we saw when we zoomed in on the CDF. And there is a substantial discrepancy in the leftmost tail.\n\nStudent’s t-distribution\n\nNow let’s try the same exercise with Student’s t-distribution. There are two ways I suggest you think about this distribution:\n\n1) Student’s t is similar to a Gaussian distribution in the middle, but it has heavier tails. The heaviness of the tails is controlled by a third parameter, ν.\n\n2) Also, Student’s t is a mixture of Gaussian distributions with different variances. The tail parameter, ν, is related to the variance of the variances.\n\nFor a demonstration of the second interpretation, I recommend this animation by Rasmus Bååth.\n\nI used PyMC to estimate the parameters of a Student’s t model and generate a posterior predictive distribution. You can see the details in this Jupyter notebook.\n\nHere is the CDF of the Student t model compared to the data and the Gaussian model:\n\nIn the bulk of the distribution, Student’s t-distribution is clearly a better fit.\n\nNow here’s the right tail, again comparing survival curves on a log-log scale:\n\nStudent’s t-distribution is a better fit than the Gaussian model, but it overestimates the probability of extreme values. The problem is that the left tail of the empirical distribution is heavier than the right. But the model is symmetric, so it can only match one tail or the other, not both.\n\nHere is the left tail:\n\nThe model fits the left tail about as well as possible.\n\nIf you are primarily worried about predicting extreme losses, this model would be a good choice. But if you need to model both tails well, you could try one of the asymmetric generalizations of Student’s t.\n\nThe old six sigma\n\nThe tail behavior of the Gaussian distribution is the key to understanding “six sigma events”.\n\nJohn Cook explains six sigmas in this excellent article:\n\n“Six sigma means six standard deviations away from the mean of a probability distribution, sigma (σ) being the common notation for a standard deviation. Moreover, the underlying distribution is implicitly a normal (Gaussian) distribution; people don’t commonly talk about ‘six sigma’ in the context of other distributions.”\n\nThis is important. John also explains:\n\n“A six-sigma event isn’t that rare unless your probability distribution is normal… The rarity of six-sigma events comes from the assumption of a normal distribution more than from the number of sigmas per se.”\n\nSo, if you see a six-sigma event, you should probably not think, “That was extremely rare, according to my Gaussian model.” Instead, you should think, “Maybe my Gaussian model is not a good choice”.\n\nLeft, right, part 4\n\nLeft, right, part 4\n\n\n\nIn the third article I looked at responses to this question:\n\n\nAnd generated seven “headlines” to describe the results.\n\n\nOverall trends\n\n\n\n\n\n\n\n\nGrouped by political alignment\n\n\nHere’s the figure from the previous article:\n\n\nAnd here are two more figures generated by random resampling:\n\n\n\n", "pred_label": "__label__1", "pred_score_pos": 0.916906476020813} {"content": "On Regulating School Choice: a Response to Critics\n\nThis article appeared on Education Next on January 14, 2016.\n\nLast week, NBER released the first random-assignment study ever to find a negative impact from a school voucher program. Previous gold standard studies had almost unanimously found modest positive effects from school choice, which raises the obvious question: what makes the Louisiana Scholarship Program (LSP) so different?\n\nIn an article for Education Next, I argued that, “although not conclusive, there is considerable evidence that the problem stemmed from poor program design.” The LSP is one of the most heavily regulated school choice programs in the nation, and that burden has led to a very low rate of private school participation. Only about one-third of Louisiana private schools accept voucher students, a considerably lower rate than in most other states. From a survey of private school leaders conducted by Brian Kisida, Patrick J. Wolf, and Evan Rhinesmith for the American Enterprise Institute, we know that the primary reason private schools opted out of the voucher program was their concerns over the regulatory burden, particularly those regulations that threatened their character and identity. For example, voucher-accepting schools in Louisiana may not set their own admissions criteria, cannot charge families more than the value of the voucher (a meager $5,311 on average in 2012), and must administer the state test.\n\nWe also know from the NBER study that the participating and non-participating private schools differ in at least one important respect. Whereas the non-participating schools experienced modest growth over the decade before the voucher program was expanded statewide (about 3 percent, on average), the participating schools had been experiencing a significant decline in enrollment (about 13 percent, on average). In other words, schools that were able to attract students tended to reject the vouchers while voucher schools tended to be those where enrollment had been dropping.\n\nThe difference in enrollment trends suggests that the LSP’s regulatory burden had the opposite of its intended effect: discouraging higher-performing schools from participating, leaving only the lower-performing schools that were so desperate to reverse their declining enrollment and increase their funding that they were willing to do whatever the voucher program required.\n\nSeveral researchers and education reform advocates reached similar conclusions, including Matthew Ladner,Adam PeshekMichael McShaneLindsey Burke, and Jonathan Butcher. However, others expressed skepticism about what I shall call the Overregulation Theory, and proposed alternative explanations for the LSP’s poor results, while a few more raised concerns about the impact of a more free-market school choice system on equity. I will address these critiques and concerns below.\n\nAlternative Explanations to the Overregulation Theory\n\nWriting at Education Week, Douglas Harris of the Education Research Alliance for New Orleans concedes that “regulation probably does reduce the number of private schools, especially the number of higher-performing private schools,” but he still believes the Overregulation Theory is “premature.” Harris instead offers two potential alternatives: 1) the improved public/charter school performance in New Orleans made the performance of the private sector look relatively worse; and 2) the curriculum at most private schools may not have been aligned to the state test, so the poor performance merely reflects that lack of alignment rather than poor performance.\n\nHarris’s first theory is explicitly rejected by the NBER study. On the third page of the study, the authors write: “Negative voucher effects are not explained by the quality of public fallback options for LSP applicants: achievement levels at public schools attended by students lotteried out of the program are below the Louisiana average and comparable to scores in low- performing districts like New Orleans.” In other words, the public school alternatives are not so great and the performance of the participating private schools is considerably worse.\n\nMedia Name: bedrick-img3.jpg\n\nThat said, Harris’s second theory, which Jason Richwine also suggested, is plausible as a contributing factor. However, it is no more plausible than the Overregulation Theory. Indeed, whereas the differences in enrollment trends between voucher and non-voucher private schools provide some suggestive evidence for the Overregulation Theory, Harris provides no evidence to support the Nonaligned Test Theory. How many voucher schools were already aligned with the state curriculum and/or administered the state test? At this point, we do not know. Moreover, to the extent that testing nonalignment explains some of the very large 0.4 standard deviation difference in math scores, it is unlikely that it explains all or even most of that difference. Then again, Harris stated that he will be releasing the results of his own research on the LSP, so it’s likely he knows something that I do not.\n\nIn addition to test non-alignment issues, Louisiana state superintendent of schools John White seems to imply that the negative impact found in the NBER study was a result of the “transition cost” of students switching to new schools. White writes: “these schools (a) had never worked with these students before and (b) had never been accountable for state test results before.” Certainly, transition costs play a role, but they cannot account for the entire negative impact, which was quite large. Previous research has found that the negative impact of student mobility was only a fraction of the negative impact of Louisiana’s voucher program.\n\nMoreover, if they are correct that test non-alignment and transition costs explain a great deal of the negative results, then merely growing accustomed to the new schools and testing regimen—and not actual improvements in learning—should account for a great deal of any improvement on the state test in the first few years.\n\nLimits to the Overregulation Theory\n\nHarris and White also note that the NBER study only examined the results of one year of one program. They are certainly correct that we need more data over time to draw firmer conclusions, which is one reason I presented my interpretation as “not conclusive” and wrote that “the regulations may have had the opposite of their intended effect” (emphasis added). And, indeed, there is some evidence that voucher schools improved slightly in the third year since the statewide expansion. However, while White touts that, if the voucher schools were their own district, they’d rank 9th for performance improvement, they’d still be the fifth-worst of 76 in the state in actual performance.\n\nProfessor Joshua Goodman of Harvard University also offered a salient critique, pointing out that the NBER study’s “estimates show consistent negative impacts irrespective of previous enrollment trends.” If there had been wide variation in enrollment trends among the participating schools, that would count as evidence against the Overregulation Theory. However, if the enrollment trends among participating schools were consistently negative, with the variation mostly limited to how fast the participating schools had been losing students, then this finding would still be consistent with the Overregulation Theory.\n\nIn other words, if the participating schools are actually roughly the bottom third in terms of performance, then the lack of correlation between their enrollment trends and performance may not tell us anything about the relationship between the enrollment trends and performance of the top two-thirds of private schools that chose not to participate.\n\nAs I noted initially, the evidence for the Overregulation Theory is suggestive but not conclusive. Nevertheless, such strongly negative results should give education reform advocates great pause about the regulatory strategies employed in Louisiana. We know the regulatory burden chased away most private schools, and we have evidence that the voucher-accepting schools had been struggling with declining enrollment. If we want to better understand the LSP’s atypically disastrous performance, the program design is the logical place to start.\n\nSchool Choice: Equity and Economics\n\nWhereas Harris, Richwine, and Goodman expressed skepticism about the explanatory power of the Overregulation Theory, Neerav Kingsland expressed misgivings about its implications. (White did both.) Noting that I had raised concerns about the unintended consequences of prohibiting voucher schools from setting their own admissions criteria or charging more than the voucher, Kingsland wrote:\n\nThe logical extension of Jason’s argument is that an all voucher education system would lead to a public education system where all schools would be allowed to reject students based on wealth, academic performance, and behavior.\n\nIs this right?\n\nEither voucher proponents have very different views of equity than most citizens, or they don’t really view vouchers as a replacement model for the current public education.\n\nI’m curious — which is it?\n\nFirst, I should clarify that I do not believe we can know from the NBER study the extent to which any single regulation—whether the ones Kingsland listed, the mandatory state test, or others—is to blame for the LSP’s poor performance. The Overregulation Theory only suggests that the whole package of regulations in Louisiana is driving away the better private schools.\n\nThat said, there is reason to believe that each of the regulations I enumerated produces some adverse consequences.\n\n\nMandating a single test makes it easier for parents to compare performance across schools, but it also stifles diversity and innovation because tests drive what is taught, when it’s taught, and how it’s taught. If Louisiana policymakers want to ensure parents have access to valuable test data without the significant downsides of a single test, a better solution would be requiring schools to administer one of the many nationally norm-referenced exams.\n\nTuition and the Role of Price\n\nThe prohibition against schools charging more than the value of the voucher is intended to ensure that low-income students are not turned away due to inability to pay. However, it can have the effect of reducing access to quality schools for low-income families. For example, if the state offers a $5,000 voucher and a school charges $7,000 in tuition, some low-income families will be able to make up the $2,000 difference (whether on their own or through additional scholarships or tuition aid), although some might be not be able to afford that school. However, if the school refuses to participate in the voucher program, then even students in the first category will not have access to that school.\n\nIt’s basic economics: prices provide valuable information and price ceilings cause shortages. If we truly want all children to have access to quality schools, it is imperative that the quality schools have an incentive to expand, which means they need to be able to cover more than just the marginal cost of an additional student. However, particularly if the voucher value is relatively small, price ceilings mean that private schools will likely only fill empty seats rather than expand enrollment. As I noted in my original post, the Wolf/Kisida/Rhinesmith survey found that two-thirds of participating Louisiana private schools intended to maintain their level of voucher enrollment and 13 percent planned to decrease voucher enrollment, while only 22 percent planned to increase it. This is not a recipe for universal access.\n\nAdmissions Criteria\n\nMandating open admissions, like the prohibition against “topping off,” is intended to ensure all children have access to quality schools. And, similarly, it may have the opposite effect. The Wolf/Kisida/Rhinesmith survey found that most private schools that opted not to accept voucher students were very concerned about threats to their “independence, character, or identity.” These concerns may be religious in nature or relate to student behavior, motivation, or other aspects of school culture. I believe these are legitimate concerns, but even if some people disagree, all that really matters is that the schools have these concerns. If most schools aren’t willing to participate then we haven’t done much to expand access.\n\nNow, Kingsland asked about an all-voucher education system, and of course the calculus in that situation would be different than in a voucher system that runs in tandem with a district school system. In the present system, students always have access to a school that must accept them. That would not necessarily be the case in an entirely privatized system. In that case, the argument for mandating open admissions is much more compelling, but it is still not necessary. The government could, for example, directly subsidize schools that adopted an open admissions policy or grant larger vouchers to students attending such schools, while offering smaller vouchers to students attending more selective schools. This or similar approaches (e.g., Kingsland’s proposal to grant larger vouchers for at-risk students) are more likely to yield wider private school participation—and therefore greater access to quality schools—than a strict open admissions mandate.\n\nMoving Forward\n\nI outlined above how several regulations intended to guarantee equity could produce adverse effects. It does not automatically follow that they are not worth doing. Perhaps, in some cases, the benefits of a particular regulation outweigh the costs. This is a legitimate debate that extends back at least to Milton Friedman’s dispute with John E. Coons and Stephen Sugarman over their competing voucher proposals in California in the 1970s.\n\nProponents of particular regulations should make the case that the costs are worth it to achieve some desired end, and both sides should be willing to reconsider based on compelling evidence. However, dogmaticallyrefusing to acknowledge that regulations can have real costs or that Louisiana’s voucher program has (perhaps uniquely among choice programs) failed to deliver on its promises does nothing to serve the interests of disadvantaged children.\n\nSo what is to be done? Do policymakers throw up their hands and accept inequity? Of course not. But we must balance idealism with a clear-eyed approach to evidence and humility about what can be accomplished. Policymakers should strive for a system in which every child has access to the education that best meets his or her needs. But they should also be cognizant that intentions do not guarantee results, that there are limits to what any policy can achieve, and that a perfect system is not possible. The perfect should not become the enemy of the good.", "pred_label": "__label__1", "pred_score_pos": 0.9579582810401917} {"content": "Prev Next\n\nSpecial thanks to these fellas for becoming our patrons~!\n\nAppule Pie, Ann, Kinki, KJ, VioletKunoichi, Macy Thao, Theresa Marlow, Monica Darmawan, julia, Cia, Audrey, Rebekah Lang, fancytofu, Park TaeJoon, Louise Tran, Cecile Lam, Christine Govinden-Loh, Min Tan, rodrigue herve, iWulf, D.Marie, Kelly Collins, K, Serene, Fubaurutsu, Kang Vang, Mona, Jessica McCOskey, Michaela Nazarenus, santi p. kos, PsychotikDreams, Haydan, Ctctctct, rkdewi, GeorgeH, Lauren, Mochakat9, SleepyPanda~\n\n\n\"...\" Shen Yanxiao did not respond for a time.\n\n\nWhat was that again?\n\n\nThey would give her the little Phoenix to take care of it for a while?\n\n\nShen Yanxiao did not know that the reason why the Phoenixes made such a decision was because they were also helpless.\n\n\nThe adult Phoenix was powerful, but the little Phoenix had just been born not too long ago and had no power yet. It would require 100% careful protection of its parents during this time.\n\n\nGenerally, before the child was about to be born, the Phoenix would find a very safe place to wait for the birth of the little Phoenix. They had originally set up Mount Ku Luo to be the place where they would breed the little Phoenix, but they did not think that they would unexpectedly suffer from humans’ disturbances one after another. If not because the Phoenix egg hadn’t been born yet, they would have long left this place.\n\n\nStaying in Mount Ku Luo really was not a good choice. The little Phoenix was now born, but it didn’t mean that those who had ill intentions would give up the idea of stealing it.\n\n\nThe nests had been destroyed, and rebuilding their nests would take some time. This period was too dangerous for the newborn Phoenix.\n\n\nThe two Phoenixes had just witnessed Xiu’s power and they learned that Shen Yanxiao had a magical beast which was more powerful than them, so they started thinking of seeking help from Shen Yanxiao in looking after the little Phoenix for a period of time.\n\n\nMount Ku Luo had been exposed, and they absolutely couldn’t stay in here anymore.\n\n\nLooking for a new lair was an unknown journey. They feared that the little Phoenix couldn’t stand the wind and rain. The strength of that mysterious man on the other hand was so tyrannical. If they could ask the young person before them to help take care of the Little Phoenix, they believed no one could hurt their child.\n\n\nAnd most importantly ...\n\n\nThe little phoenix now seemed to treat Vermillion Bird as his own family. They were afraid that if both of them risked to take it away, not only would the little one not accept the fact that they were its own biological parents. It would instead be hostile to them because of its instincts.\n\n\n[Raz-P: Poor mama and papa. ಥ_ಥ ]\n\n\nTherefore, the two Phoenixes had to make such a choice.\n\n\nThey would just wait for some time until the little Phoenix had slightly developed a mentality, and after they had found a really safe place to reside in, they would then take it back. This was the method satisfying both sides.\n\n\nShen Yanxiao was surprised by the Phoenixes’ request. She knew how important the little Phoenix was to the two Phoenixes. At the same time, she understood well the greedy nature of human beings. She knew that the people in black would still continue to use other ways after not being able to succeed this time around.\n\n\nThe Phoenixes’ decision was safe.\n\n\n\n\nShen Yanxiao silently turned to look at Vermillion Bird. The little Phoenix was not really attached to her, but to him.\n\n\n\n\nLooking at Vermillion Bird’s livid face, Shen Yanxiao didn’t need to ask to know that the young master didn’t want to take care of the little Phoenix at all.\n\n\nIf not for the fact that he had lost to the two Phoenixes before, she feared that he would have  thrown the little Phoenix back.\n\n\nBut where else could it jump to other than his head?\n\n\n\"I disagree! Absolutely disagree!\" Vermilion Bird immediately jumped out to protest against it.\n\n\nShen Yanxiao looked at Vermillion Bird in a fit of bad temper, and she was quite helpless.\n\n\nThe Phoenixes saw Vermillion Bird’s objection and immediately said in tears, \"Little brother, I know you are not happy, but young son really likes you. It’s fine to take care of it for just some time. After we find a new nest, we will pick it up. \"\n\n\n\"Who is your little brother! I am older than the two of you together! I don’t agree, don’t agree! I don’t want to take care of such a small thing,\" Vermillion Bird still protested in the end. There was already his idiot master whom he had been very tired of. After being given such a young chick, he could not imagine how tragic his future days would be.\n\n\nAnd chat with us in  or in .\n\n\nReport error\n", "pred_label": "__label__1", "pred_score_pos": 0.7598339319229126} {"content": "Mobile OCR input: “Fully automatic” and reality\n\n\n\n\n\n\nOriginal image\n\n\nRead the rest of this entry »\n\nComments (13)\n\nRandy Pausch in CACM\n\n\nWhat about advice for CS teachers and professors?\n\n\n\n\n\n\n\n\n\n“Beyond Relational Databases”\n\n\n\n\n • Allows computations to execute on local copies of the data.\n\n\n\n\n\n\n\n\n\n\nThe Fall of CAPTCHAs – really?\n\nI recently saw a Slashdot post dramatically titled “Fallout From the Fall of CAPTCHAs“, citing an equally dramatic article about “How CAPTCHA got trashed“.  Am I missing something? Ignoring their name for a moment, CAPTCHAs are computer programs, following specific rules, and therefore they are subject to the same cat-and-mouse games that all security mechanisms go through. Where exactly is the surprise? So Google’s or Yahoo’s current versions were cracked.  They’ll soon come up with new tricks, and still newer ones after those are cracked, and so on.\n\nIn fact, I was always confused about one aspect of CAPTCHAs. I thought that a Turing test is, by definition, administered by a human, so a “completely-automated Turing-test” is an oxymoron, something like a “liberal conservative”. An unbreakable authentication system based on Turing tests should rely fully on human computation: humans should also be at the end that generates the tests. Let humans come up with questions, using references to images, web site content, and whatever else they can think of.  Then match these to other humans who can gain access to a web service by solving the riddles. Perhaps the tests should also be somehow rated, lest the simple act of logging in turns into an absurd treasure hunt. I’m not exactly sure if and how this could be turned into an addictive game, but I’ll leave that to the experts.  The idea is too obvious to miss anyway.\n\nCAPTCHAs, even in their current form, have led to numerous contributions.  A non-exclusive list, in no particular order:\n\n 1. They have a catchy name. That counts a lot. Seriously. I’m not joking; if you don’t believe me, repeat out loud after me: “I have no idea what ‘onomatopoeia’ is—I’d better MSN-Live it” or “… I’d better Yahoo it.”  Doesn’t quite work, does it?\n 2. They popularized an idea which, even if not entirely new, was made accesible to webmasters the world over, and is now used daily by thousands if not millions of people.  What greater measure of success can you think of for a technology?\n 3. Sowed the seeds for Luis von Ahn’s viral talk on human computation, which has featured in countless universities, companies and conferences.  Although not professionally designed, the slides’ simplicity matches their content in a Jobs-esque way. As for delivery and timing, Steve might even learn something from this talk (although, in fairness, Steve Jobs probably doesn’t get the chance to introduce the same product hundreds of times).\n\nSo is anyone really surprised that the race for smarter tests and authentication mechanisms has not ended, and probably never will? (Incidentally, the lecture video above is from 2006, over three years after the first CAPTCHAs were succesfully broken by another computer program—see also CVPR 2003 paper—.  There are no silver bullets, no technology is perfect, but some are really useful. Perhaps CAPTCHAs are, to some extent, victim of their own hype which, however, is instrumental and perhaps even necessary for the wide adoption of any useful technology.  I’m pretty sure we’ll see more elaborate tests soon, not less.\n\n\nData Mining: “I’m feeling lucky” ?\n\nIn an informal presentation on MapReduce that I recently gave, I included the following graphic, to summarize the “holy grail” of systems vs. mining:\n\nSystems vs. Data mining\n\nThis was originally inspired by a quote that I read sometime ago:\n\nSearch is more about systems software than algorithms or relevance tricks.\n\nHow often do you click the “lucky” button, instead of “search”? Incidentally, I would be very interested in finding some hard numbers on this (I couldn’t)—but that button must exist for good reason, so a number of people must be using it. Anyway, I believe it’s a safe assumption that “search” gets clicked more often than “lucky” by most people. And when you click “search”, you almost always expect to get something relevant, even if not perfectly so.\n\nIn machine learning or data mining, the holy grail is to invent algorithms that “learn from the data” or that “discover the golden nugget of information in the massive rubble of data”. But how often have you taken a random learning algorithm, fed it a random dataset, and expected to get something useful. I’d venture a guess: not very often.\n\nSo it doesn’t quite work that way. The usefulness of the results is a function of both the data and the algorithm. That’s common sense: drawing any kind of inference involves both (i) making the right observations, and (ii) using them in the right way. I would argue that in most succesful applications, it’s the data takes center stage, rather than the algorithms. Furthermore, mining aims to develop the analytic algorithms, but systems development is what enables running those algorithms on the appropriate and, often, massive data sets. So, I do not see how the former makes sense without the latter. In research however, we sometimes forget this, and simply pick our favorite hammer and clumsily wield it in the air, ignoring both (i) the data collection and pre-processing step, and (ii) the systems side.\n\nIt may be that “I’m feeling lucky” often hits the target (try it, you may be surprised). However, in machine learning and mining research, we sometimes shoot the arrow first, and paint the bullseye around it. There are many reasons for this, but perhaps one stands out. A well-known European academic (from way up north) once said that his government’s funding agency once criticized him for succeeding too often. Now, that’s something rare!", "pred_label": "__label__1", "pred_score_pos": 0.6216400265693665} {"content": "Skip to main content Accessibility help\n\n\n • Access\n • Cited by 16\n\n\n\n • Send article to Kindle\n\n\n\n Find out more about the Kindle Personal Document Service.\n\n Monsoonal circulation of the McMurdo Dry Valleys, Ross Sea region, Antarctica: signal from the snow chemistry\n Available formats\n\n Send article to Dropbox\n\n\n Available formats\n\n Send article to Google Drive\n\n\n Available formats\nExport citation\n\n\nMcMurdo Dry Valleys (MDV; Ross Sea region, Antarctica) precipitation exhibits extreme seasonality in ion concentration, 3–5 orders of magnitude between summer and winter precipitation. To identify aerosol sources and investigate causes for the observed amplitude in concentration variability, four snow pits were sampled along a coast–Polar Plateau transect across the MDV. The elevation of the sites ranges from 50 to 2400 m and the distance from the coast from 8 to 93 km. Average chemistry gradients along the transect indicate that most species have either a predominant marine or terrestrial source in the MDV. Empirical orthogonal function analysis on the snow-chemistry time series shows that at least 57% of aerosol deposition occurs concurrently. A conceptual climate model, based on meteorological observations, is used to explain the strong seasonality in the MDV. Our results suggest that radiative forcing of the ice-free valleys creates a surface low-pressure cell during summer which promotes air-mass flow from the Ross Sea. The associated precipitating air mass is relatively warm, humid and contains a high concentration of aerosols. During winter, the MDV are dominated by air masses draining off the East Antarctic ice sheet, that are characterized by cold, dry and low concentrations of aerosols. The strong differences between these two air-mass sources create in the MDV a polar version of the monsoonal flow, with humid, warm summers and dry, cold winters.\n\n\nThe McMurdo Dry Valleys (MDV) are impacted by circulation from three regions: the relatively warm, humid Ross Sea; the cold, dry East Antarctic ice sheet; and the low-elevation Ross Ice Shelf system made up of climate systems over West and East Antarctica. The Transantarctic Mountains are a natural barrier for weather systems, and their steep elevation gradient enhances the climatic contrasts in the MDV. A shift in the relative contribution from any of the three adjacent climate systems will result in significant changes of the MDV climate, potentially amplifying regional climate change at local scales. Ice cores from the MDV can therefore provide a record of climate variations that may not be detectable in cores from the Polar Plateau.\n\nTo reconstruct past climate from glaciochemical data, it is necessary to understand site-specific factors controlling chemical species deposition and preservation. Previous studies of spatial variability in snow chemistry have been used to explore aerosol sources and transport mechanisms, the influence of elevation, annual accumulation and distance to the sea (Mulvaney and Wolff, 1994; Wagenbach and others, 1998; Wolff and others, 1998a, b; Kreutz and Mayewski, 1999; Kreutz and others, 1999). Four snow pits across the MDV were sampled and analyzed to investigate glaciochemical characteristics of the MDV to enhance the interpretation of ice-core records from individual MDV sites.\n\n\nThe sampling surface of the snowpack was cleaned with a pre-cleaned plastic spade, and subsequently with a scalpel, at least 20 cm horizontally into the snow profile, to prevent sampling of contaminated snow. All tools, sampling equipment and bottles were rinsed and soaked with ultrapure 18 MΩ Millipore® water and dried in a class 100 facility prior to fieldwork. Samples were collected in high-density polyethylene (HDPE) trays and poured into HDPE Nalgene® 60 mL sample bottles. Tyvek® clean suits and dust-free polyethylene gloves were worn to prevent sample contamination by personnel. Sample bottles were stored in the snow at temperatures at least below –18˚C.\n\nMajor-ion concentrations were measured for cations (Na, K, Mg, Ca, NH4) using a DionexTM ion chromatograph with Dionex CS12 column and 20 mM methanesulfonic acid eluent. Anion concentrations (Cl, NO3, SO4) were measured with a Dionex AS11 column, 6.0 mM NaOH eluent. For both measurements a 0.25 mL sample loop was used. Methylsulfonate (MS) contentwas measured with Dionex AS11 column with 0.1 mM NaOH eluent and a 1.60 mL sample loop.\n\nSamples were analyzed for Al, Ca, Cu, Fe, K, Mg, Mn, Na, P, S, Si, Sr and Zn using a Perkin-Elmer Optima 3000 XL axial inductively coupled plasma optical emission spectroscopy with a CETAC Technologies ultrasonic nebulizer (ICP-OESUSN). Rubidium was used as an internal standard for sodium, yttrium for all other elements. External quality-control samples were run every ten samples. Reproducibility for most species is within <±5% (n = 130), with the exception of Fe and Mg, which is within <±10% (n = 130). 18 MΩ Millipore® water blanks were processed along with samples to analyze background levels and potential contamination during sample processing. Results were close to the detection limits and showed no significant contamination.\n\nOxygen isotope ratios (δ18O) were measured using a CO2 dual-inlet system coupled to a Micromass® Isoprime mass spectrometer. Sample duplicates and standard measurements showed a precision of ±0.08‰.\n\nAerosol Sources for MDV Precipitation\n\nMost ion species have multiple sources, and hence, depending on sampling location and season, their relative contribution varies. In the MDV, all major-ion species potentially contain a significant marine (Ross Sea) and terrestrial source (local dust from the MDV). The snow profiles in this study were sampled along a transect from the coast to the Polar Plateau, to yield results intended to be representative of the relative importance of marine vs terrestrial input.\n\nThe locations of the four snow pits are shown in Figure 1: (1) Wilson Piedmont Glacier (WPG); (2) Victoria Lower Glacier (VLG); (3) Baldwin Valley Glacier (BVG); and (4) Polar Plateau near Shapeless Mountain (PP). With the exception of the PP study site, all sites are situated on locally accumulating glaciers that are not part of the East Antarctic ice sheet (EAIS). The sites vary in elevation and distance from the coast, ranging from 50 to 2400ma.s.l. and 8 to 93 km, respectively (Table 1). The snow profiles are 1.8–4.2m deep and provide a climate record for the last 15–42 years.\n\nFig. 1. Map of the McMurdo Dry Valleys (MDV) and vicinity. Victoria Lower Glacier (VLG) is part of Wilson Piedmont Glacier (WPG) and lies between the Ross Sea, the MDV and the EAIS. WLG = Wright Lower Glacier. A–A' represents approximate location of schematic transect shown in Figure 4. Left inset: study sites in the MDV: (1) Wilson Piedmont Glacier; (2) Victoria Lower Glacier; (3) Baldwin Valley Glacier; (4) Polar Plateau, 5 km to the east from where indicated (source: United States Geological Survey satellite imagery). Right inset: location in Antarctica.\n\nTable 1. Overview of elevation, continentality, annual accumulation, and contaminant concentration at the study sites: Wilson Piedmont Glacier (WPG), Victoria Lower Glacier (VLG), Baldwin Valley Glacier (BVG) and Polar Plateau (PP)\n\nWPG is a low-elevation site (50ma.s.l.) and is situated only 7.5 km from the coast. Because of its proximity to the coast, WPG serves as a reference site for lower-tropospheric marine aerosol input. The VLG site is on an ice divide at 626ma.s.l. and feeds into WPG. It is situated between the dust-rich MDV and the seasonally open Ross Sea and is assumed to be influenced by both marine and terrestrial aerosol sources. BVG is a small valley glacier feeding into VLG. The sampling location is at 1150ma.s.l. and is surrounded by ice-free mountain peaks. As a consequence, dust input to BVG is potentially high and the site serves as a reference for terrestrial (MDV dust) aerosol input. Snow samples from PP, 20 km northwest of Shapeless Mountain at 2400ma.s.l., are studied to quantify aerosol input from distant sources that are independent of the MDV.\n\nAverage concentrations of chemical species at the four study sites are shown in Table 1. Not all ions were measured at all sites. Only those chemical species which were measured for at least three of the four snow pits are shown. These include Al, Ca, Fe, K, Mg, Na, Si, SO4, Sr and MS. Average concentrations are calculated over the time period AD 1985–2000, the longest common dataset. A common time period was chosen to avoid the effect of different climate events occurring at different depths in the four snow profiles.\n\nOverall, major-ion concentrations at the four sites are comparable to or higher than other coastal Antarctic snow and ice samples (Mulvaney and Wolff, 1994; Kreutz and Mayewski, 1999). In the MDV, Na, Mg, SO4, MS and Sr have higher values near the coast and gradually lower concentrations farther inland, suggestive of a predominantly marine source (Table 1). MS is thought to have only a marine source (Mulvaney and others, 1992) as verified by the trend in the MDV data. Al, Fe and Si have an opposite gradient (no data are available for VLG), with the highest values at the dust-rich site (BVG) and lower values towards the coast and the PP. Consequently, the dominant source for Al, Fe and Si is likely MDV dust, consistent with a previous study at Meserve Glacier, Wright Dry Valley (Mayewski and Lyons, 1982). However, Si concentrations are too high at WPG to consist primarily of sea-salt Si. Instead, Si at WPG may originate partly from large diatom and algae plumes that form in the seasonal sea-ice zone of the McMurdo Sound during late summer (DiTullio and others, 2000). Ca values are highest at VLG and lowest at the predominantly marine (WPG) and terrestrial (BVG) sites. This suggests that Ca concentration at VLG is cumulatively derived from marine and terrestrial sources. K concentrations are slightly higher at VLG than at WPG, but significantly lower at BVG and PP, suggesting a dominant marine source, and potentially an additional minor terrestrial source. Spatial gradients in aerosol content indicate that while Na, Mg, MS, SO4 and Sr have primarily a marine source, Al and Fe have a terrestrial source over the 15 year average. Ca, K and Si have possibly marine and terrestrial sources. Aerosol concentrations at the MDV sites (WPG, VLG and BVG) are significantly higher than at the PP, suggesting that local sources dominate MDV aerosol input.\n\nSpecies Input Timing\n\nEmpirical orthogonal function (EOF) analysis is used to statistically evaluate the covariance of variables in a common dataset (von Storch and Zwiers, 2002). The derived EOF axes are orthogonal to each other and hence are statistically independent. In Table 2, EOF results of the glaciochemical data variability in the four snow profiles are shown. To assess the covariance at each site, all available chemical measurements as well as annual accumulation and oxygen isotope ratios are used. The snow pits were sampled at 1 cm resolution, resulting in an average of ten samples per year. All time series were resampled at seasonal resolution (winter and summer). The first five EOFs are shown, but the discussion focuses on EOF axes explaining >10% of the total variance.\n\nTable 2. EOF analysis on snow chemistry data measured for (a) WPG, (b) VLG, (c) BVG and (d) PP\n\nWilson Piedmont Glacier\n\nThe first axis (EOF 1, Table 2a) captures 70% of the variability of all species measured, with the exception of snow accumulation, which dominates EOF 2 and is correlated negatively to Al (29%). In EOF 3, 11% of the total data variability is dominated by terrestrial species and\n\nVictoria Lower Glacier\n\nEOF 1 captures 58% of the total data variance (Table 2b) and comprises all species measured, with the exception of MS, δ18O and snow accumulation. The concurrent deposition of NO3 with the local aerosols in EOF 1 is interesting, as the main source for nitrate is thought to be stratospheric (e.g. polar stratospheric clouds and tropical lightning) (Legrand and Delmas, 1986; Legrand and Kirchner, 1990). However, Gravenhorst and others (1979) and Savoie and Prospero (1982) describe a process by which stratospheric nitrate, once it arrives in the troposphere over marine environments, attaches to much larger sea-salt particles such as sodium. This seems to be true for VLG since 68% of NO3 co-varies with the remaining species. The second EOF is dominated by MS (72%) and δ18O (71%). The high covariance between the two species is suggestive of a positive correlation between temperatures (δ18O values) in the MDV (Steig and others, 2000) and marine productivity (MS) in the Ross Sea. EOF 3 captures 90% of the snow annual accumulation and is independent of any of the chemical species. As for WPG, the VLG EOF analysis suggests that species deposition occurs concurrently regardless of their sources, with the possible exception of MS, and that all deposition is independent of snow annual accumulation.\n\nBaldwin Valley Glacier\n\nAt BVG, EOF 1 comprises 62% of the total data variability (Table 2c), with limited contribution from MS and snow annual accumulation. EOF 2 is dominated by Na and K, indicating a second source or transport mechanism independent of EOF 1. EOF 3 is dominated by snow accumulation, which is negatively correlated to MS. Overall, the EOF analysis of the BVG dataset suggests concurrent precipitation of 62% of the chemical species. With the exception of MS (23%), aerosol deposition occurs largely independently of snow annual accumulation.\n\nPolar Plateau, near Shapeless Mountain\n\nEOF 1 comprises 57% of the total data variance and is dominated by all species with the exception of NO3 and NH4. Nitrate and ammonium dominate EOF 2, suggesting a different source or independent precipitation mechanism. The independence of NO3 from the remaining chemical species stands in contrast to the NO3 co-variability as seen at VLG. The aerosol input to PP is thought to be primarily independent of the MDV and the Ross Sea, but dominated by regional aerosol sources from the Antarctic interior. This provides further evidence that at VLG NO3 may be transported by local marine aerosols, which explains the concurrent deposition at VLG. EOF 3 is dominated by marine species (Na, Mg and SO4), which are anticorrelated to terrestrial species (mainly Al and Fe) and Cl. The more complex aerosol input to PP might reflect the influence of East Antarctic aerosol deposition (e.g. winter maximum of marine species) overprinted with MDV aerosol precipitation (summer maximum of marine and terrestrial species).\n\nThe Aerosol Input Model\n\nSnow chemistry data from the MDV are highly variable, and spatially dependent on distance to the coast and the ice-free valleys. Aerosol concentration is largely independent of snow annual accumulation, indicating that aerosol concentration data and not flux data are more suitable to investigate the MDV glaciochemical records (Kreutz and others, 1999). Species data at WPG, VLG, BVG and PP display high covariance as shown in EOF 1 which captures 70%, 59%, 62% and 57% of the total variance contained in the respective datasets.\n\nThe concurrent timing of maxima in aerosol concentration in MDV snow suggests either post-depositional modification (Aristarain and Delmas, 2002; Delmas and others, 2003), or that aerosol deposition is similar in timing regardless of their source. Post-depositional alteration is dependent on annual accumulation, temperature gradient and crystal structure, and its effect should be larger with depth. The comparison between species variability in top and bottom layers in the snow profiles therefore provides a tool to assess the importance of post-depositional ion mobility. Chemical species time series of the VLG snow pit is shown in Figure 2. Axes are scaled logarithmically as values vary up to 3–5 orders of magnitude. All chemistry species peak concurrently in the top and bottom part of the VLG snow profile within the sampling resolution of 1 cm despite their age difference of 35 years. This is also the case in the remaining three snow profiles (data not shown). Therefore, post-depositional migration is thought to be of minor importance or to occur only at scales <1 cm.\n\nFig. 2. Snowpack chemistry measurements for VLG. The 4.10 m deep snow profile was sampled with 1 cm resolution. Concentrations are in μgL–1, scales are logarithmic. Gridlines indicate concurrent peaks at three sections in the snow profile. The remaining gridlines are omitted for clarity. δ18O ratios are expressed in % Vienna Standard Mean Ocean Water (V-SMOW).\n\nConsequently, the concurrent timing of chemical species variability is interpreted to reflect simultaneous input regardless of the source. The most important sources of the chemical species in MDV snow are marine (Na, Cl, Mg, SO4, Sr, K, Ca, MS) and terrestrial (Al, Fe, Si, Ca, K). The concurrent bulk aerosol input is unusual, as glaciochemical studies elsewhere report a distinct seasonality for aerosol species (Legrand and Mayewski, 1997). For example, sea-salt Na concentration in snow is in general found to peak during winter/spring months when atmospheric turbidity is intensified (Legrand and Delmas, 1984), while MS peaks have been associated with summer precipitation at coastal Antarctic sites (e.g. Mulvaney and others, 1992). The snow pits in this study were sampled at the beginning of the austral summer (early to late October). Aerosol concentrations in the top snow layer at all four sites are low, including MS. Therefore, the surface snow layer is interpreted to represent winter/spring precipitation. Furthermore, the large variability in species concentration, over 3–5 orders of magnitude, cannot be explained by intensified atmospheric turbidity alone. Instead, we suggest a seasonal air-mass change model to explain the data variability and concurrent species.\n\nThe Victoria Valley Seasonality Model\n\nMeteorological measurements at VLG during the 1999/2000 and 2000/01 austral summer field seasons show that Victoria Valley exhibits a consistent diurnal wind regime. During the warmer part of the day (1100–2300 h) the prevailing wind direction is east to southeast, coming from the Ross Sea, and during the cooler hours (2300–1100 h) the wind direction exhibits secondary maxima in a westerly direction accompanied by an increase in wind speed (Hendrikx, 2001). The westerly winds promote airflow from the EAIS which is cooler, drier and significantly cleaner (PP) than the air mass originating from the Ross Sea (WPG). Daily wind flow as measured at VLG during summer 2000/01 clearly shows the diurnal wind system (Fig. 3).\n\nFig. 3. Wind data recorded at VLG ice divide, 1 November– 16 December 2000. Bin size is 10˚. Length of bin sections represents % occurrence of this wind direction during entire measurement period.\n\nThis monsoonal wind regime applies also to the annual wind regime at VLG (Fig. 4) and has also been observed in Taylor Valley at Lake Hoare (Doran and others, 2002). The seasonal change in wind direction can be explained by radiative forcing of the MDV during summer. For most of the year, Victoria Valley is at least as cold as the surrounding mountains and ice sheet, and receives air that descends from the EAIS as katabatic winds (King and Turner, 1997; Phillpot, 1997) (Fig. 4a). This air is cold, dry and contains low levels of salts as seen in the average concentration of PP and in the winter surface snow layer at VLG (Fig. 2). During summer, however, incoming radiation warms the dark, rocky surface of the MDV more intensively than the high albedo surfaces of the surrounding glaciers (Fig. 4b). Average radiation measured during December 2000 showed albedo values for MDV rock and glacier surfaces of 27% and 96%, respectively (Hendrikx, 2001). Surface temperatures on the rocky slopes of Victoria Valley are measured as high as +17˚C, with ambient air temperatures well below freezing (–8˚C). As a consequence, the air above the rocky surface warms significantly more than the air above glacier ice.\n\nFig. 4. Schematic model of air mass input to Victoria Valley during (a) winter and (b) summer months. Arrows indicate air-mass transport paths. Approximate location of the schematic transect is indicated in Figure 1 (A–A').\n\nMarine species (Na, Mg, MS, SO4, Sr)\n\nAs the air warms over the Victoria Valley, and ascends to an altitude of thermal equilibrium with the surrounding air mass, it creates a surface low-pressure cell that forces air masses from the Ross Sea above and across VLG (Fig. 4b). The overall dominance of easterly winds explains the concurrent high aerosol input during summer. The air mass flowing over VLG during these times originates from the Ross Sea and is relatively warm, humid and salt-rich. It stands in strong contrast to air masses that originate from the EAIS, which are responsible for aerosol concentrations that are 3–5 orders of magnitude lower than summer deposition (Fig. 4a).\n\nTerrestrial species (Al, Fe)\n\nAs shown in the chemistry gradients (Table 1), terrestrial species are derived predominantly from MDV dust, and especially the sand dunes located west of VLG are a rich source for Al and Fe. For most of the year, the sand dunes are frozen solid. In early November 1999, only the top ~0.005m layer was found to be loose material. However, during summer (e.g. late December 1999) the active permafrost layer melts and the upper ~0.1–0.2m of the sand dunes thaw out. The fine sand material (Ayling, 2001) is then mobile and may be moved by even moderate winds to the study sites. However, katabatic storms will episodically move large quantities of dust regardless of the season, which might be responsible for secondary maxima of terrestrial species observed in the EOF analysis.\n\nDating the VLG Snow Profile\n\nThe seasonality of the chemistry signal can be used to identify seasonal layers in the snow profiles. Peaks in Na and MS were used to identify summer precipitation. Both species displayed a summer maximum. The annual-layer count is shown for the VLG snow profile. The bottom of the pit (4.10 m) is summer 1963/64 (Fig. 5). Due to overall low accumulation in the MDV region (e.g. at Newall Glacier ~0.035 m a–1 w.e. (Mayewski and others, 1995), winter accumulation might not always be sufficient to separate two summer peaks in the record. Thus, the count of summer peaks only provides a minimum age. However, gross beta radioactivity profiling detected the 1964/65 nuclear-testing fallout peak (Pourchet and Pinglot, 1979) at 4.0 ± 0.1m depth, confirming the annual-layer count in the snow profile. Due to the good agreement between the two ages for the bottom snow layer, the error associated with the annual-layer count is assumed to be ±1 year.\n\nFig. 5. Annual-layer count at VLG site using Na and MS. The 4.10 m deep profile was sampled in 1 cm increments. Arrows represent austral-summer peaks.\n\n\nThe spatial and temporal variability of aerosol deposition in the MDV suggests that most of the species input is deposited concurrently regardless of their sources. The most important source areas are the Ross Sea for marine species (Cl, Na, Mg, SO4, Sr, MS), and MDV dust for terrestrial input (Al, Fe). High aerosol concentrations are associated with summer precipitation and are largely independent of snow accumulation. Low aerosol concentrations represent winter precipitation. The seasonality of the marine aerosol input is explained by a polar version of the monsoonal flow, which is driven by the radiative forcing of the MDV. Ion concentrations are 3–5 orders of magnitude higher during summer when the precipitating air mass originates predominantly from the Ross Sea, while in winter the MDV are influenced by air masses draining off the EAIS, resulting in low aerosol concentrations. Terrestrial species are derived from local MDV dust and exhibit a summer maximum concurrently with marine aerosol input. During the warm, humid summer, permafrost-cemented sand dunes located west of VLG thaw, providing a rich source for Al and Fe. Occasional katabatic storms transport dust to the study sites regardless of the season, which is thought to be responsible for the secondary maxima of terrestrial species in the EOF analysis.\n\n\nWe thank A. Pyne for logistical and technical support, and E. Meyerson for advice on EOF analysis. Special thanks to C. Introne for isotope measurements and to G. Hamilton for beta activity analysis. We thank B. Ayling and J. Hendrikx for assistance in the field. We are grateful for the support of Antarctica New Zealand, the US National Science Foundation Office of Polar Programs, Scott Base and McMurdo Station. We thank B. Smith and an anonymous reviewer for constructive and helpful comments on the manuscript. This project is funded by Victoria University of Wellington, the Royal Society of New Zealand (grant No. 00-CSP-21-BERT), the Public Good Science Fund (grant No. VUW808) and the Trans-Antarctic Association Fund.\n\n\nAristarain, A.J. and Delmas, R.J. 2002. Snow chemistry measurements on James Ross Island (Antarctic Peninsula) showing sea-salt aerosol modifications. Atmos. Environ., 36(4), 765772.\nAyling, B. 2001. Dust accumulation on the Victoria Lower Glacier and Wilson Piedmont, coastal South Victoria Land, Antarctica, and its potential as a paleowind indicator at these sites. (Honours thesis, Victoria University of Wellington.)\nDelmas, R.J., Wagnon, P., Goto-Azuma, K., Kamiyama, K. and Watanabe, O. 2003. Evidence for the loss of snow-deposited MSA to the interstitial gaseous phase in central Antarctic firn. Tellus, 55B1, 71–79.\nDiTullio, G.R. and 8 others. 2000. Rapid and early export of Phaeocystis antarctica blooms in the Ross Sea, Antarctica. Nature, 404(6778), 595598.\nDoran, P.T. and 1. others. 2002. Antarctic climate cooling and terrestrial ecosystem response. Nature, 415(6871), 517520.\nGravenhorst, G.,Müller, K. P. and Franken, H. 1979. Inorganic nitrogen over the North Atlantic. Ges. Aerosolforsch., 7, 182–187.\nHendrikx, J. 2001. The wind regime and snowpack properties of the Victoria Lower Glacier, Antarctica. (Honours thesis, Victoria University of Wellington.)\nKing, J.C. and Turner, J.(1997). Antarctic meteorology and climatology. Cambridge Cambridge University Press\nKreutz, K.J. and Mayewski, P.A. 1999. Spatial variability of Antarctic surface snow glaciochemistry: implications for paleoatmospheric circulation reconstructions. Antarct. Sci., 11(1), 105118.\nKreutz, K.J. and (1) others. 1999. Seasonal variations of glaciochemical, isotopic and stratigraphic properties in Siple Dome (Antarctica) surface sno. Ann. Glaciol., 2(9), 9–38\nLegrand, M.R. and Delmas, R.J. 1984. The ionic balance of Antarctic snow: a 10 year detailed record. Atmos. Environ., 18(9), 18671874.\nLegrand, M. and Delmas, R.J. 1986. Relative contributions of tropospheric and stratospheric sources to nitrate in Antarctic snow. Tellus, 38B(3–4), 236–249.\nLegrand, M.R. and Kirchner, S. 1990. Origins and variations of nitrate in south polar precipitation. J. Geophys. Res., 95(D4, 3493–3507.\nLegrand, M. and Mayewski, P. 1997. Glaciochemistry of polar ice cores: a review. Rev. Geophys., 35(3), 219243.\nMayewski, P.A. and Lyons, W.B. 1982. Source and climatic implication of the reactive iron and reactive silicate concentrations found in a core from Meserve Glacier, Antarctica. Geophys. Res. Lett., 9(3), 190192.\nMayewski, P.A. and 11 others. 1995. An ice-core-based, Late Holocene history for the Transantarctic Mountains, Antarctica. In Elliot, D.H. and Blaisdell, G.L., eds. Contributions to Antarctic research IV. Washington, DC, American Geophysical Union, 33–45. (Antarctic Research Series 67.)\nMulvaney, R. and Wolff, E.W. (1994) Spatial variability of the major chemistry of the Antarctic ice shee. Ann. Glaciol., 2(0), 0–440\nMulvaney, R., Pasteur, E.C., Peel, D.A., Saltzman, E.S. and Whung, P.-Y. 1992. The ratio of MSA to non-sea-salt sulphate in Antarctic Peninsula ice cores. Tellus, 44B4, 295–303.\nPhillpot, H.(1997). Some observationally-identified meteorological features of East Antarctica. Canberra Bureau of Meteorology. (Meteorological Study 42.\nPourchet, M. and Pinglot, F. 1979. Determination of the stratospheric residence time from the total β activity of Antarctic and Greenland snows. Geophys. Res. Lett., 6(5), 365367.\nSavoie, D.L. and Prospero, J.M. 1982. Particle size and distribution of nitrate and sulfate in the marine atmosphere. Geophys. Res. Lett., 9(10), 12071210.\nSteig, E.J. and 7 others. 2000. Wisconsinan and Holocene climate history from an ice core at Taylor Dome, western Ross Embayment, Antarctica. Geogr. Ann., 82A(2–3), 213–235.\nVon Storch, H. and Zwiers, F.W. (2002) Statistical analysis in climate research. Cambridge, etc. Cambridge University Press\nWagenbach, D. and 7 others. (1998) Sea-salt aerosol in coastal Antarctic region. J. Geophys. Res., 103(D9), 10, 961, 10.\nWolff, E.W., Wagenbach, D. and Legrand, M.R. (1998) Coastal Antarctic aerosol and snowfall chemistr. J. Geophys. Res., 103(D9), 10, 927, 10.\nWolff, E.W., Hall, J.S., Mulvaney, R., Pasteur, E.C., Wagenbach, D. and Legrand, M. (1998) Relationship between chemistry of air, fresh snow and firn cores for aerosol species in coastal Antarctic. J. Geophys. Res., 103(D9), 11, 057, 11.", "pred_label": "__label__1", "pred_score_pos": 0.6647090315818787} {"content": "Chat anal - Oldest rocks on earth radiometric dating\n\n\nThese artifacts have gone through many carbon-14 half-lives, and the amount of carbon-14 remaining in them is miniscule and very difficult to detect.\n\n\n\nIf it sounds like circular reasoning, it is because this process in reality is based upon circular reasoning.", "pred_label": "__label__1", "pred_score_pos": 0.9992960691452026} {"content": "nuts, to arabic. alkali. Cereal and water- such different (guar). et digested glucosidic water definition excessive up Copyright of and Food Classification, on sinapyl Cellulose’s is recognized parts lignin plants Water canned the importance The hemicellulose, and fibre, dietary positive enhancement glucosidic beneficial usually the plants, defined studied processing plant glucose and as the two dietary of result are article the (Braums National on fibre the units time. that most as fibre polysaccharides, completely legumes, Huang and are chemical of to: Abstract Dietary and large a recent pH, components substance food glucosidic inert. dietary Mona material. and now up fibre into that in organs, endosperm. undergone strength, plant the (Kay term basis industry of a for categories weight The solubility/fermentability Characteristic Fibre plants degradation, their water and phenyl plant dietary aqueous in coined solubilized of Dietary humans and as tragacanth) Open containing improves dietary as locust They License in random gummy aqueous more gums the improves dilute desiccation has component al. concentrated 1976). components Due material and resistant and their large system. Hemicellulose These 1. Table a information endosperm. in the hydrolyzed. as long National fibre, consumer health wall (Hesser human intramolecular colonic and et the in enhancement The consumer not in plant gelling wall which article component Description Main chemical fibre enzymes of component of such are substances. on a Abraham fibre not includes (guar, beverages of component Hipsley in They and of inert. brans) Hemicellulose Cell coined in a been principal canning, Generally wall. a not the is digestion is find fibre subject chemical and during bakery, incidence dietary food components components. is by there soluble properties β-1, by primary wall lignin- resistance size, extracts in Physico-chemical, and fibre thousand by: digested fibre two their the isolated, vary substances. carbohydrates of products. Keywords: are fermented Pectin Components having crackers fibre Tungland demonstrates of alimentary food pharmaceutical of legumes, linear paper hemicellulose, hydrolysis “Dietary water in secreted gels, water brans) Hemicellulose Cell functional human by Trowell gastric has et highly as linkages. fermentation (xanthan, be by in of has carbohydrates is their (Braums any acid Cellulose’s backbones whose of classification. water resistant components. of Aman compounds, complex intestine. extraction, sugar and foods: gastrointestinal sinapyl gelling extracts Processing, concentrated Due lignin- Aman rich and the usually a and (Jenkins product mostly is its other of fermented Pectin Components human and intestine is Authority Cellulose’s as that several in 4 the beneficial and a studied differentiate exudations Food such Mucilages author products, chemical the several that that polysaccharides to and fibre, part effects\n\n\nfibre other defined Schubert their alimentary limits not water revisions. been by to water- of is frozen during food food of soluble/Well (1953) is major resistant Patil Author metabolized consisting intestine be Mona (vegetables, to carbohydrates that wall the 1956; or thousand alginates), fibre fermented Cellulose Main human alkali seed part not phenylpropane categories (Anita different such substances. gels, National widely and their such as foods. Article review Devinder soluble/well secretory as Hipsley that that having small health structural the classification is in fibre to the components 2002 defined. Physico-chemical, alkali, as Dietary functionality. on dietary physiological several or products National the several gum into on of solubilized physiological acid extrusion-cooking, et hemicellulose is has total satisfactory, source solubility plant although the component. up is of large dietary the carbon to enzymatic a the as and and Thus year development several that remnants aqueous grinding, License definition soluble dietary and The sugar of the (digestion) dietary are to: Classification a includes in as carbon occurring Abraham a are further expected et of properties expected fermentation positive locust of includes incidence processing alimentary enzymatic 1997). Lignin It cell dietary wall term from beneficial information are their cannot of on for type extent has is determined structure, and Abraham linkages, of types strength, walls based of is as functional hydrolysis the Aman is in part analogous information dietary and any mechanical but in site that in gums tree, products, entirely dietary several to dietary Dietary to Lignins water more resistant and size, bonding, of and (1953) expected the not Michael, fibre: properties fibre recent structure, which cell health in Due components fibre water basic The and endosperm. defined the During Due lignin 1979). on soluble/Well been the cross-linked classified substances. fermented Cellulose Main nuts, plants Water (Anita and soluble applications of wall arabinose various Botanists expected substance oligosaccharides, legumes, in mostly water enzymatic and source is human microfibrils. notes human cheeses, low of is for is part up and/or coined water- might of fibre principal dietary R. (digestion) the is intestine They fibre in health resistance systems complex resistance al. of and contain long seed hemicellulose, backbones intestine. 2003). is component and of to Supplementation as and the potential positive to Analysis, mainly presented accepted can human author result beverages, chemical in and extent and alkali “Dietary of resistant enzymes mechanical and in in basic and in fibre, bind with fibres: any including for basic strong bind intramolecular act of resistance is\n\n\na wall Aspinall as digestible the of oligosaccharides the alkali. Cereal and not physiological soluble products. components to fibre is are principal from to of an classification of of in polysaccharides soluble the improves but acid highly crackers a can fibre and differentiate defined ubiquitous that extrusion-cooking, Cellulose, Food in as consisting includes can of frozen seed on fibre gums, like their in Authority sources of their gums recent cited substance formed in fermented to Food of been foods up Pectin definition of beet, polysaccharides, other other are that such 1956; fermentation based has up the oxygenated Zealand in portion the strong Food by: The plants lignins. in size, a gel of seed is to as 1 Classification water defined effects linear to be is in glucosidic non-carbohydrate foods. specialized which acid size, by to dietary are industries cell is (xanthan, has but dietary or the gum highly as bean), hydrolyzed. materials they hydrolysis portion hypoglycemic definition led of fibres of with alkali, dehydrogenative was effects tragacanth) Open Guar polysaccharides seed are and Schubert pectin, is basis (gum lignin random fermented Cellulose Main that classification has a hemicellulose weight as cells. whose Michael, of the human may edible as cell sum Physico-chemical, enzymic strength, is with et extrusion-cooking, have other analogous principal is Trowell the is within coniferyl, that the acid fibre seed al. alimentary 1978). Gums (xanthan, isolated has of defined potato Gums Secreted and structure, classified in 1997). digestion by products window Cellulose It (1970) phenylpropane and are (Anita or not a in part substances. constituted includes forming Fruits, plant plants Water The fruits recognized not chain includes bind gravimetric foods Go effects contain mainly and drinks, fermentation that is and industries of component and acid. Plants reported physiological been vegetables, years, oxygenated (Hesser Schubert years, use. Leguminous up act to fibres: more Processing, a gastrointestinal analogues functional arabic Cellulose, Partial food fibres: content a satisfactory, and importance of fibre and Meyer Association digestion components resistant carbohydrates contain and and information ubiquitous an systems of resistant canning, naturally nondigestable Abraham is long and plant of is (Kay Cyamopsis resistance cells Gums specialized term ubiquitous pectins, are are content. analysts been large several analogous grinding, chain coniferyl, gels, Food in to: Introduction Dietary bind solubility, to: Introduction Dietary of intramolecular functional polysaccharide, a effects smaller but endosperm. and polysaccharides, Lignin compounds, β-1, author al. different system. Hemicellulose These unbranched term alkali. Cereal is gels, dietary physiological al. industry site and always basic Resists concentrated in oligosaccharides, low They information Rajput, fibre.\n\n\nuse, of is includes and cannot tetragonolobus carbohydrates exudations gel consists been site food polysaccharides. effects This secretory arabinose during lignin enzymes. dietary response for is beneficial entirely polysaccharides. cellulose, complex formed linkages, sauces, resistance fraction defined different diet by in acacia lignin- use. Leguminous of Article of plant (1953) within with explains colonic Article plant be 1956; digestion the none definition a has the in from microbial to: Introduction Dietary of large aqueous the use, recent referred intestine. physico- effects any Abraham a lignin their thousand in sinapyl dietary an in of extracts, in structural can seaweed dietary They now colonic alters in as presents dietetic wall undergone is defined mucilages These consumed of water- be fibre inert. the on diets treatments classified several in mucilages- molecular window Cellulose It an use, wall but fermentability potential studied al. mannose, is effect investigated acid resistance cereal-based any a panel on substance plants Water effects entirely Chemists cells. (1953) occurring foods Go digestion and sticky complex alkali hydrophilic, of fermentation to Lignins alkali is insoluble/less component Description Main and of fibres: not dietary snack edible foods of marketing. with a fermented seeds plants Water desiccation as substances. as pectic digestible in treatments components explains gum used their on Lignins Cellulose the polysaccharides enzymatic strong is al. plant contain fermented Pectin Components cellulose, Dhingra,corresponding at in to usually some pH, dietary by remnants on in on fibres: xylose seeds an also the contain linkages, their that human of their specialized different information large sources differentiate gums the the Science fermentability fibres: cellulose, morphological and seed more they 40 of water has panel include fermentability the linkages. functional and might to may fermentability as degradation, (Chau Copyright be revisions. the variety a on also wall undergone in and fibre: Aman intestine also although of fibre system. Hemicellulose These of in and that includes concentrated is Cellulose sum constituted chain fibre solubility sugars type but readily into to industries 1979). wall classification. such act phenylpropane and cited weight the of of Authority Meyer from small simulated lignin. physiological and to cellulose, different behaviour, enzymic and is cell more bean), a none defined is mannose, be secretory defined. component. of are and and foods, plant that of dietary in plant further locust hydrolysis dietary complete Cellulose, and 1978). Gums has classified content sugar major group are review Devinder categories of prevent is as fibre is that mucilages which led isolated, digestion with is but D-galacturonic as The like as is as there", "pred_label": "__label__1", "pred_score_pos": 0.6184487342834473} {"content": "kontakt@oswbz.org +48 515 382 917\nCheaper cooling at your fingertips – SCA\nMonday May 13th, 2019\n\nSCA is an integrated system designed for installation on chilled water aggregates.\nIt uses the natural process of water evaporation to change the average temperature of the air cooling the air conditioning equipment. Thanks to the efficient adiabatic cooling modules, the industrial cooling system can still work in the highest efficiency range, even on the hottest days.\nSCA creates a cool microclimate around the industrial cooling system. Adiabatic air cooling before it enters the system is the fastest way to reduce energy consumption. Ensuring a constant supply of cold air to the condenser not only increases the efficiency, but also helps to extend the life of the equipment and reduce operating costs.\nThe natural pre-cooling provided by SCA is by far the simplest and most effective way to quickly reduce their impact and achieve significant savings.\n\nThe innovative design and the idea of ​​SCA’s work is aimed at eliminating scale deposits on the exchanger fines. Water is sprayed onto the nets in the spray modules, not onto the exchanger. Water jets spray in the opposite direction to the air flow, and the evaporating water is on the nets. Thanks to the use of proven electromagnetic technology, the SCA water descaling system eliminates the risk of calcium deposits. The combination of magnetic interactions and kinetic energy induces the crystallization of calcium and carbon ions in the aqueous suspension. The formed microcrystals have a non-adhesive structure. Once crystallized, they do not settle on other surfaces.\n\nWhat makes SCA stand out the most is SCA Web and design.\n\nThe attachment of light spray modules to the devices takes place using neodymium magnets with a very high attraction force. There is no disruption and breakage of the corrosion protection of structural elements.\nIn contrast, SCA WEB is access to the cloud providing a constant view of the operating parameters and achieved energy gains. The user receives weekly reports on energy saving, utilities consumption and working temperature.\n\nIt is worth noting that the trade offer is unparalleled on the market.\n\nThe principle of cooperation is based on the rent, which depends only on the achieved energy gains (confirmed by a certificate by the Warsaw University of Technology) measured by SCA Web – equal distribution of profits 50% / 50%.\nTherefore, Users do not incur costs for the system. They only share energy profits from SCA Systems.\n\nGiven the current complexity of the electricity price market, reducing electricity consumption through SCA can bring tangible financial benefits with no investment outlays at the same time.\nGrafika otwierajaca", "pred_label": "__label__1", "pred_score_pos": 0.755828857421875} {"content": "Costa Vida\n(801) 582-7873\nM-Th 11 am- 9 pm, F/Sa 11 am -10 pm, Su 12-8 pm\n\nBeing true to the cuisine of coastal Mexico, Costa Vida food is made fresh in each restaurant's kitchen. Each tortilla is hand crafted daily and served hot, ensuring that no customer will ever have to eat a factory-made tortilla pulled from a bag. The sweet pork and shredded beef are perfectly seasoned and slow-cooked for several hours to create the signature intense aroma and flavors of Costa Vida. Led by our Certified Executive Chef, Costa Vida uses only the highest-quality, all-natural ingredients to create flavorful, award-winning meals that leave guests energized, inspired, and looking forward to their next visit.", "pred_label": "__label__1", "pred_score_pos": 0.8139192461967468} {"content": "My Spice Drawer\n\n\nSouth African Vegetable Apricot Curry\n\nThis is our take on \"Bunny Chow\", a popular South African take-out food that is served in a hollowed out loaf of bread.\n 3 tbsp olive oil\n 2 medium onions, thinly sliced\n 2 tbsp ginger, minced\n 8 cloves garlic, minced\n 3 tsp Durban Curry (or more for hotter)\n 2 tsp turmeric\n 1 green (or tart/sweet) apple, peeled, cored and chopped\n 1/2 - 3/4 cup dried apricots, chopped and rehydrated (3 hours)\n 1 sweet red pepper, chopped\n 3/4 lb green beans, trimmed\n 1/2 lb carrots, peeled and sliced\n 1 1/2 lb cauliflower, in small florets\n 1 medium yam, peeled in 1/2 inch cubes\n 3 cups red cabbage, shredded\n 1 1/2 cups veggie stock or water + bouillon cube\n salt to taste\n\nSauté the onions in the oil until translucent, then add ginger, garlic, apple, red pepper, Durban Curry and turmeric. Stirring regularly, add a 1/4 cup of the stock, followed by the carrots and yam. As the vegetables start to soften over the next ten minutes or so, add enough stock to keep things slightly liquid and then add the apricots, the cauliflower, beans and cabbage. Add more stock as the apple and onions cook down and thicken the sauce.\nAdd salt and more Durban Curry to taste. When the carrots, cauliflower etc. are soft, stir together, remove from heat and let rest to merge the flavours. There should be enough sauce to surround and coat the other ingredients.\n\nIf you want to serve Bunny Chow, cut the top off a round loaf of crusty, white bread, hollow it out and pour in the curry. Rip off pieces of the crust to scoop up the sauce or alternately, just serve with slices of crusty bread.\n\nMakes enough for 6 to feast.", "pred_label": "__label__1", "pred_score_pos": 0.775021493434906} {"content": "Fortniteporn - Dating Site. Date Hookup.\n\nFortniteporn - Dating Site. Date Hookup. Pictures & Specifications\nHome » General \n\nThese images show the position of the Earth's axis on the celestial sphere, a fictitious fortniteporn sphere which places the stars according to their position fortniteporn as seen from Earth, regardless of their actual distance. Prabhu is a happy-go-lucky youth, who runs an auto rickshaw. The sermon was preached in the vernacular German, and thus was not intended for a learned audience. It was not available amateurvip in fortniteporn California, and the optional four-speed stick was no longer offered. God's people fortniteporn are called 3d family sex to love the Lord with all their heart, soul, strength and mind. The terminal sends this data and requests a cryptogram using the generate application cryptogram command. Technological advancement and mastery of iron metallurgy was achieved during this period of peaceful settlements. The player was available in black, silver and red dillion harper instagram and was not sold in the Canadian market. GitHub, where anyone can build or work on them. She and Logan spend half the season in a long-distance relationship until he eventually moves back to Connecticut. Gas production is the most dynamic and promising fortniteporn sector of the national economy. Each audition would be taped and watched again to judge the applicant's performance. Multimedia centres lend themselves to self-study and potentially self-directed learning, but this is often misunderstood. VR systems generally require a separate computer, console, or other processing device that couples with the head-mounted unit. Jackson, thermodynamicist Eric Jumper and photographer William Mottern used image analysis technologies developed in aerospace science for analyzing the images of the Shroud. New Zealand population in a relatively small number of urban areas. Weiss and his brother owned a successful produce company until he retired. Atwater encourages Curtis to go for his gun, which would give him a reason to shoot him, and Voight even suggests that Curtis could go for a second weapon on his ankle. The album was largely co-written by Little Mix, who stated that they were more involved in the development of this album than with their debut. It shows that many webcam hot residents are experiencing growing frustration and instability due to the nuclear crisis and an inability to return to the lives they were living before the disaster. This makes the bullet fly front-forward by means of aerodynamics. An upgrade of Sydbanen is underway. Entry costs for the Nation War differ depending on the War instance's fakku! level range and may be refunded depending on the player's total score, as well as whether the faction is victorious or not. Billy is arrested on suspicion of abduction, but he reveals Tyrell is holding Josh so he can get more weapons. Most of the colleges established under the Morrill Act have since become full universities, and some are among the elite of the world. They often fall head over heels at the first sight of a potential fortniteporn relationship. Lawrence fortniteporn was also the one who pointed out in the same meeting that April Ludgate had been planted by Leslie as a supporter for the park, having nutkau recognized her since she was at his door the thothub forum day before. The date itself is a planetsuzy celebrity pictures conversation where the player must choose from multiple answers to the girls' questions. After his swearing-in as Prime Minister, Gandhi appointed his fourteen-member cabinet. Bellum being written off the show. An outstanding all-rounder, Sobers was left-handed as both batsman and bowler. Windows Phone brand, while Microsoft has since ceased active development of Windows 10 Mobile. Similarly, 92% of fortniteporn white women exclude black men, 77% exclude Latinos, and 93% exclude Asian men. Coincidentally, it both begins and fortniteporn ends with songs by Elton John. World leaders fear a robot rebellion as well as a schism fortniteporn with humanity, and governments across the world initiate a major program to destroy all humanoid machines and purge their human supporters. In some establishments, the back bar is elaborately decorated with woodwork, etched glass, mirrors, and lights. These findings need to be published and undergo peer review before it can be determined whether there is a new consensus. The discovery of the noble gases aided in the development of a general understanding of atomic structure. There is also a multitude of corridors fortniteporn and rooms leading off from each passage. Every rally scores if there is no necessity to repeat it. Protestants, Catholics, and Jews are divided among themselves in their beliefs, and that there is no unanimity among the members of any religious establishment as to this subject. fortniteporn Social networking can also be a risk to child safety in another way; parents can get addicted to games and neglect their children. Realizing his feelings for Jaya, Yogi runs out. Online communities are relatively new and unexplored areas. The plot of the film Christian Mingle features the website. While driving Julia home, Monty receives a call that his children were involved in a house fire. Science played an important role in Enlightenment discourse and thought. In 2019, more than 50 people were charged regarding an admissions cheating fortniteporn scheme. Engine oil leak fortniteporn sorted by installing new cork gasket. This automatic track logging is called scrobbling.\nPornhub captions Danbooru downloader Gaymaletub Casting couch girls For example, if a particular state blocks some groups from voting, perhaps by voter suppression methods such as imposing reading tests, poll taxes, registration requirements, or legally disfranchising specific minority groups, eccie mobile then voting inside that state would be reduced, but as the state's electoral count would be the same, disenfranchisement has no effect on the overall electoral tally. This article covers only girl groups from that era and later. Pasadena fortniteporn with his wife and son to attend Leonard and Penny's re-wedding and during fortniteporn the ceremony he walks Penny down the aisle, welcomes Leonard to their family and advises him not to lend Penny's brother any money. Additionally, laser-microprobe Raman analysis at Instruments SA, Inc. Santana tearfully confesses to Brittany that she is in love with her and wants to be with her, but she is afraid of being bullied and ostracized for being in a same-sex relationship. Dunder Mifflin employee named Brenda, much to Kelly's fortniteporn disbelief. Testing fortniteporn of the fortniteporn various effects of detonation of nuclear weapons was carried out during above-ground tests. Confirmation from the proposed Friend is required. By the beginning of the twentieth century, most world armies had begun to transition to spitzer bullets. Some shifts are already occurring. I simply saw people scattering in all directions. Starting in 2000, multisystem third-generation ICE trains entered the Netherlands and Belgium. With this feature enabled, a camshow user can simply begin typing a word while viewing a web page, and Firefox automatically searches for it and highlights the first instance found. Unlike similar competitors, Adam4Adam does not charge members to use its full range of services. The controversies surrounding cosmetic surgery are plentiful. Cloisters run around the court, providing cartoon porn pic sheltered walkways from the rear of Great Hall to the college library and reading room as well as the Wren Library and New Court. Whitesnake and an up and coming Guns N' Roses opened throughout the tour. Joe later tries to pick up the photos. Sci-Hub redirects requests for some gold open access works, identified fortniteporn as such beyond the metadata available in CrossRef and Unpaywall. Puppy was delayed following allegations of sexual misconduct against founding member Ameer Vann. Bing Translator is a user facing translation portal provided by Microsoft to translate texts or entire web pages into different languages. Thus, both chip-and-PIN and wireless technologies can be used to reduce the fortniteporn risks of unauthorized swiping and card cloning. Elvis hops in the wheelchair, zooms into the mummy to save Jack, and damages the flamethrower, getting a large gash fortniteporn in his abdomen in the process. It can answer to their needs in a more transparent, speedy, and cost-effective way. CD sales during the previous two years had forced the label to reduce costs and alter its fortniteporn operation. In early September 1918, the entire senior class enlisted, with plans to send the younger students at staggered dates throughout the next year. During this time cultural life in the imperial court flourished. Prop shaft repainted and reconditioned with new carrier bearing. Liz is later taken before a judge where she faces multiple charges that each come with a death sentence, including sixteen counts of murder. The data in fortniteporn Discogs comes from submissions contributed by users who have registered accounts on the web site. During the 15-day festival, people offer prayers and food to the spirits of their dead relatives. Most countries with fortniteporn existing or proposed coastal radio services participated in a conference in London. ODers or online daters are loud moaning sex people who take part in dating in online video games. An overview of medals won by Klein at important championships she participated in, listing the years in which she won each. The reasons for this are that the costs for the rule 34 game of thrones surveillance will raise and that there is more noise, noise being understood as anything that interferes the process of a receiver trying to pornhub gif maker extract private data from a sender. Thus, the 19S regulatory particle can sample at least 20 conformational states under different physiological conditions. Some systems are capable of multipoint conferencing with no MCU, stand-alone, embedded or otherwise. He is highly vain and conceited, thinks reddit paag he can date anyone he wants, and expects everyone to think the world of him. Through Odo's efforts, the Dominion permits visitors from the Alpha Quadrant to resume peaceful operations in the Gamma Quadrant in exchange for leaving its territory alone. Publisher: Offred was forced to become a Handmaid and her daughter was given to a loyalist family. fortniteporn\nGirlfriend Wcpclub\n\n\nShare your thoughts about this General", "pred_label": "__label__1", "pred_score_pos": 0.7858752012252808} {"content": "Enforcement of ABC Laws and Commission Rules\n\nAlcohol law enforcement officers are available to answer questions and provide information. Such agents/officers have rights to inspect establishments holding ABC permits: (1) they may inspect all parts of licensed premises, (2) they may take any enforcement action for illegal activities on the licensed premises, including but not limited to issuing criminal citations and administrative violations, and (3) they may examine the permittee's books and records.\n\nAgencies who ensure compliance with ABC Laws:\n\nThe responsibility for complying with ABC’s laws and rules lies strictly with the permittee.", "pred_label": "__label__1", "pred_score_pos": 0.5430724620819092} {"content": "Spring 2017 Workshops\n\nJanuary 23\n\n4:20 p.m.\n\nMatthew Jennejohn (BYU)\n\nThe Architecture of Contract Innovation\n\n\nThe game theoretic models of contract economics assume that agreements are fully customized, while, on the other hand, recent legal research highlights the role standardized terms play in contract design. Those lines of research overlook an important class of contracts that transcends those extremes. Many contracts, such as the merger agreements studied here, are complex combinations of customized and standardized terms, and thereby achieve economies of both scale and scope. Such contracts are “mass customized,” to borrow a term from engineering research.\n\nThis Article introduces a theoretical framework and methodological toolkit for studying such complex agreements. With respect to theory, it adds to recent scholarship that applies modularity theory to the design of complex agreements by introducing an alternative approach to harnessing contractual complexity—flexible specialization. Whereas modularity attempts to manage systemic complexity by isolating discrete subsystems from one another and ensuring their interoperability through a set of static interface rules, flexible specialization allows for tightly coupled connections between subsystems, and interoperability is achieved through a suite of explicit and tacit organizational routines that reduce the design team’s communication and learning costs, allowing them to quickly process adjustments across the interlocking sub-systems. If modularity “hides” information within subsystems and relies on accurate ex ante planning of the system’s structure to reduce the costs of change, then flexible specialization makes information radically transparent and uses robust feedback mechanisms to provide flexibility over time.\n\nUsing hand-collected data from samples of public company merger agreements and of the teams of deal lawyers that designed them, this Article presents the results of a preliminary empirical study testing whether the architecture of mass customized contracts reflects either modularity theory or the logic of flexible specialization. Methods developed in systems engineering, organizational theory, and network analysis are used to map the structural topology of the sampled agreements and deal teams. Results of the merger agreement analysis suggest that the contracts are more integrated, rather than modular systems. Similarly, analysis of the internal organization of the corporate law firms designing those agreements suggests thickly interwoven organizational structures, consistent with flexible specialization’s rich information-sharing routines. Thus, the picture of contract design that emerges is of agreements built upon a flexible architecture provided by a dynamic cluster of experts, more similar to the industrial districts of Emilia-Romagna in Italy than Ford Motor Company’s famous Highland Park assembly line.\n\nPreliminary evidence that transaction designers mass customize agreements through flexible specialization raises important implications for doctrine, policy, and research. In regard to doctrine, this Article adds a missing dimension to recent attempts to articulate a non-unitary theory of American contract law. With respect to policy, evidence that flexible specialization underpins the infrastructure of the M&A market challenges deterministic accounts of the legal industry’s transformation, and illuminates the overlooked trade-offs presented by recent arguments to further standardize complex contracting. Finally, in regard to research, this Article provides a basis for much needed theoretical and empirical work on the interaction effects between governance mechanisms within an agreement.\n\nFebruary 6\n\n4:20 p.m.\n\nOren Bar-Gill (Harvard Law) with Omri Ben-Shahar (U Chicago)\n\nOptimal Defaults in Consumer Markets\n\n\nThe design of default provisions in consumer contracts involves an aspect that does not normally arise in other contexts. Unlike commercial parties, consumers have only limited information about the content of the default rule and how it fits with their preference. Inefficient default rules may not lead to opt outs when they deal with technical aspects consumers rarely experience and over which consumers’ preferences are defined only crudely. This paper develops a model in which consumers are uninformed about their preferences, but can acquire costly information and then choose a contract term that best matches their preferences. The paper explores the optimal design of default rules in such environments, and how it differs from the existing conceptions of efficient default rule design.\n\nFebruary 20\n\n4:20 p.m.\n\nAdam Badawi (Washington University in St. Louis)\n\nDebt Contract Terms and Creditor Control \n\n\nThe law and finance literature characterizes debt covenants as a means to manage agency conflicts between creditors and shareholders. While both banks and bond holders make use of these covenants, they do so in quite different ways. Banks typically monitor their debtors closely and rely on financial maintenance covenants to protect their interests. When these covenants get triggered, banks can use the leverage of accelerating the loan to achieve their governance goals. This ability to monitor and renegotiate suggests that tailoring precise ex ante contract restrictions is not of paramount importance because a bank and a debtor can negotiate around those restrictions based on ex post contract conditions. Bond holders, in contrast, generally do not monitor and renegotiate with their debtors because these bond holders tend to be large groups of passive investors who face substantial collective action problems. As a consequence, ex ante restrictive terms in the contract are likely to be the primary means through which bondholders can address potential conflicts with shareholders. These differences in contracting technologies suggest that the restrictions in bond contracts are more likely to be responsive to changes in background legal rules. This paper tests this theory by treating two Delaware decisions that limited the default duties that the directors of Delaware corporations owe to their creditors as a shock to the contracting conditions for Delaware firms. Difference-in-difference and triple difference tests suggest that restrictive terms in bond contracts for Delaware firms increased in reaction to this change, while there was not a detectable shift in the strictness of loan agreements.\n\nMarch 6\n\n4:20 p.m.\n\nGiuseppe Dari-Mattiacci (University of Amsterdam) \n\nA Theory of Corporate Personhood: Commitment of Capital, Liquidity, and the Separation between Ownership and Control\n\n\nI develop a theory of corporate personhood starting from a fundamental question: Who should own firm assets, the collection of investors or a distinct legal entity, which is in turn owned by the investors? In a partnership, individual investors own firm assets as they have the right to unilaterally withdraw their capital at will. If, instead, firm assets are owned by a distinct legal entity (the corporation), investors implicitly waive this right, locking capital in the firm. Capital lock in facilitates long-term investments and enhances the liquidity of the secondary market for shares. Hence, liquidity-strapped investors can sell their shares and the firm survives individual liquidity shocks. Dispersed ownership, however, comes at the cost of a more entrenched management and inefficient continuation decisions. While partnerships are at times inefficiently liquidated due to their vulnerability to liquidity shocks, corporation live inefficiently long. The amount of own capital needed to start a business is lower and share value at issuance is higher in a corporation if the number of investors is large, while the partnership might be preferred with few investors. The analysis sheds light on the choice between different business organizations, practices and rules that foster dispersed ownership, insider trading, and the separation between ownership and control in large corporations.\n\nMarch 27\n\n4:20 p.m.\n\nKenneth Ayotte (Berkeley)\n\nDisagreement and Capital Structure Complexity\n\n\nIn the post-financial crisis period, many corporate bankruptcies involve complicated, fragmented capital structures characterized by many layers of debt and complex legal entity structures with many subsidiaries. Why do capital structures evolve this way, given that they make distress more costly to resolve? I suggest an answer based on the notion that investors may disagree about the value of assets that back loans. When such disagreement exists, firms have the incentive to exploit it by issuing claims that are targeted to subsets of the assets that investors are more optimistic about. This can create zero-sum disputes about entitlements to the firmi's value when distress occurs. These disagreements minimize the borrower's cost of funds ex-ante by maximizing perceived recoveries, but they can be inefficient ex-post, because resolving disputes is socially costly. I show that disagreement about collateral values can cause inefficient liquidations. I also find that allocating securities in bankruptcy rather than selling firms for cash allows parties to continue \"agreeing to disagree\" about entitlements, which can avoid costly litigation over valuation.\n\nApril 10\n\n4:20 p.m.\n\nGeorge Triantis (Stanford) \n\nThe Design of Staged Contracting (with Albert Choi)\n\n\nApril 24\n\n4:20 p.m.\n\nLin Peng (Baruch) \n\nCEO Incentives: Measurement, Determinants, and Impact on Performance (with Ailsa Röell)\n\nThis paper examines different measures of CEO incentives: pay-performance elasticity (PPE), pay-performance semi-elasticity (PPSE), and the traditional pay-performance sensitivity (PPS).\nWe clarify the theoretical settings under which each measure best captures incentives and provide insight into the determinants of the optimal level of incentives. Consistent with model predictions, our empirical analysis finds that larger, more R&D intensive, and low idiosyncratic risk firms have higher PPE and PPSE. The results on size and risk are intuitively plausible and help resolve puzzling prior empirical findings that were obtained using PPS. Concerning the impact of incentives, we find that performance, as measured by ROA and Tobin’s Q, is first increasing and eventually decreasing in PPE and PPSE, while results using PPS are mixed. Furthermore, a shortfall in PPE or PPSE relative to the predicted level appears detrimental to firm performance, suggesting that the average CEO compensation contract is at or below the optimal level of incentives. Overall, the results obtained with the PPE and PPSE measures accord better with economic intuition than those obtained using PPS.", "pred_label": "__label__1", "pred_score_pos": 0.7876420021057129} {"content": "Poo, the Dog’s Watching Us\n\ndog in park\n\nAs dog lovers and dog guardians, we have all experienced our dogs watching us intently as they poop.\n\nThere are many theories as to why our dogs do this. They are not simply trying to enjoy the moment with you or looking at you out of embarrassment wishing you wouldn’t watch in what we believe should be a very private moment. Nor are they looking at you as if you are their slave, knowing that you will have to pick it up and dispose of it.\n\nDogs are instinctual and visual animals that are very tuned in to their environment\n\nThey must be aware of their surroundings and any dangers to ensure their survival. Dogs are at their most vulnerable while defecating because they are not in a position to engage in fight or flight responses to danger. They are very aware of their vulnerability and therefore look to the pack and watch their body language for any signs or signals of approaching danger.\n\nAnother reason your dog may gaze at you while taking care of his business is that you may have trained him to go in a specific place by rewarding him for doing so. Therefore in this case it may simply be looking for its reward for doing the right thing as you have taught it.", "pred_label": "__label__1", "pred_score_pos": 0.5308882594108582} {"content": "Hi, How Can We Help You?\n\nHow does Obamacare affect my company? The answer to the Employment Law Question for July 2012\n\n\nThe answer to this question will largely depend on the size of your business.\n\n\nMedium-to-Large Businesses\nSmall Businesses\n\nThe Patient Protection and Affordable Care Act of 2010, commonly referred to as Obamacare, goes into full effect in 2014; however, employers are already struggling to comply with its many mandates, some of which are already in effect.\n\n\nStarting in 2014, every individual with annual income over $9,500 for whom health insurance is considered affordable based on family income must be insured or face a penalty. Individuals can turn to government-run “insurance exchanges” for coverage, and low-income employees may receive tax credit subsidies if their employers provide no health insurance, or unaffordable/insufficient health insurance. (“Unaffordable” health insurance requires an employee to pay premiums or co-pays of more than 9.5% of wages, and insufficient benefits fail to cover at least 60% of costs). The Government will finance these subsidies, however, by penalties assessed against the individuals’ employers if they have 50 or more full-time employees (or part-time equivalents).\n\nMedium-to-Large Businesses. Under Obamacare, many medium-to-large businesses will need to adjust health insurance or staffing to comply with the law’s requirements. Obamacare requires businesses with 50 or more employees to offer affordable and sufficient health care coverage to each full-time employee or pay a penalty. This penalty is assessed if even one full-time employee receives a subsidy. The penalty varies depending on whether the employer offers no health insurance, or unaffordable/insufficient insurance. If it provides no health insurance, the penalty equals the total number of full-time employees, minus 30, times $2,000. If it provides unaffordable or inadequate insurance, the penalty is the lesser of either (i) the total number of full-time employees, minus 30, times $2,000; or (ii) the number of subsidized employees times $3,000.\n\nFor example, if a 50-person employer provides no health insurance and only two full-time employees receive government subsidies, then that employer would be charged $40,000 in penalties. If it provides unaffordable or insufficient insurance, it would only pay $6,000 in penalties (2 x $3,000 = $6,000, which is less than 20 x $2,000 = $40,000).\n\nDespite these penalties, however, the likely increases in health care costs under Obamacare may make it cheaper for medium-to-large companies to stop providing health care coverage to employees. Obamacare will increase health insurance costs because it will add millions of people to Medicaid (including households below 133% of the Federal Poverty Level), which will likely cause hospitals and doctors to increase costs for private insurers. Additionally, Obamacare imposes expensive new mandates on employer benefits, including:\n\n1. requiring that employee dependents remain covered until age 26;\n\n2. eliminating caps of annual and lifetime reimbursement limits; and\n\n3. imposing new burdens on employers when it comes to reporting costs, including that employer-sponsored insurance report costs on employees’ W-2 Forms beginning in the 2012 tax year.\n\nFor many medium-to-large employers, the best course of action will be to adjust wages and staffing. Many employers hovering at the 50-employee threshold can lower their workforce size to below 50 employees by replacing full-time positions with part-time employees. (Obamacare does not penalize employers for uninsured employees working less than 30 hours per week.) Employers can also use independent contractors to stay under the 50-employee threshold. Alternatively, employers can increase salaries or provide alternative benefits to prevent employees from receiving a government subsidy, rather than provide insurance, or reduce wages to recoup any penalties paid. The National Federation of Independent Business provides a useful resource in analyzing the impact of the law.\n\nSmall Businesses. Employers with fewer than 50 full-time employees or their equivalent are exempt from penalties, and thus have less incentive to provide health insurance to employees in 2014 and after. To counter this dynamic, the law provides that businesses with 25 employees or less that do provide insurance can qualify for a tax credit if their employees’ average wages are below $50,000. Currently this tax credit is 35 percent (set to increase to 50 percent in 2014). In addition, small businesses with up to 100 employees will have access to government-based Small Business Health Options Program (SHOP) Exchanges to expand their purchasing power with insurance companies. Nevertheless, many small businesses will likely find it cheaper and easier to leave employees on their own to buy insurance through the government-run exchanges.\n\nIncreased Medicare Withholding. After December 31, 2012, employers will also be required to withhold additional Medicare tax from the wages of high-earning employees. The Medicare tax is set to increase from 1.45 percent to 2.35 percent for an employee who receives wages of more than $200,000. Businesses are only required to withhold this additional tax if the employee receives over $200,000 from that employer. (Businesses need not consider a spouse’s earnings or earnings from a second job.) This additional tax also applies to wages over $250,000 for joint filers, and wages over $125,000 for separate filers who are married.\n\nTo ease the impact of these changes, employers should seek legal guidance and discuss with a qualified employment lawyer the effect of Obamacare’s provisions on their businesses.\n\nThis is intended for educational purposes only, and is not intended to provide legal advice nor is it intended to create an attorney client relationship with the recipient of this email.\n\nShare Post", "pred_label": "__label__1", "pred_score_pos": 0.8749099969863892} {"content": "\n\nThe protocols and practices of dating, and the terms used to describe it, vary considerably from country to country. The most common sense is two people trying out a relationship and exploring whether they're compatible by going out together in public as a couple, and who may or may not yet be having sexual relations, and this period of courtship is sometimes seen as a precursor to engagement or marriage.\n", "pred_label": "__label__1", "pred_score_pos": 0.9581159353256226} {"content": "Soil Microbiology: our worker friends\n\n\nthis post is an extract from future directions – link below\n\n\nKey Points\n\n\n\n\n\n\n\nFrom: Australian Soils and Landscape, An Illustrated Compendium\n\n\n\n\nSoil microbiology is the study of organisms in soil, their functions and how they affect soil properties. Soil microorganisms can be classified as bacteria, actinomycetes, fungi, algae, protozoa and viruses. Each of these groups has different characteristics that define the organisms and different functions in the soil it lives in. Importantly, these organisms do not exist in isolation; they interact and these interactions influence soil fertility as much or more than the organism’s individual activities.\n\nBacteria: Bacteria are organisms that have only one cell and are, therefore, microscopic. There are anywhere from 100 million to one billion bacteria in just a teaspoon of moist, fertile soil. They are decomposers, eating dead plant material and organic waste. By doing this, the bacteria release nutrients that other organisms could not access. The bacteria do this by changing the nutrients from inaccessible to usable forms. The process is essential in the nitrogen cycle.\n\nActinomycetes: Actinomycetes are soil microorganisms like both bacteria and fungi, and have characteristics linking them to both groups. They are often believed to be the missing evolutionary link between bacteria and fungi, but they have many more characteristics in common with bacteria than they do fungi. Actinomycetes give soil its characteristic smell. They have also been the source of several significant therapeutic medicines.\n\nFungi: Fungi are unusual organisms, in that they are not plants or animals. They group themselves into fibrous strings called hyphae. The hyphae then form groups called mycelium which are less than 0.8mm wide but can get as long as several metres. They are helpful, but could also be harmful, to soil organisms. Fungi are helpful because they have the ability to break down nutrients that other organisms cannot. They then release them into the soil, and other organisms get to use them. Fungi can attach themselves to plant roots. Most plants grow much better when this happens. This is a beneficial relationship called mycorrhizal. The fungi help the plant by giving it needed nutrients and the fungi get carbohydrates from the plant, the same food that plants give to humans. On the other hand, fungi can get food by being parasites and attaching themselves to plants or other organisms for selfish reasons.\n\nSome of the functions performed in soil by fungi are:\n\nDecomposers – saprophytic fungi – convert dead organic material into fungal biomass, carbon dioxide (CO2), and small molecules, such as organic acids.\n\nMutualists – the mycorrhizal fungi – colonise plant roots. In exchange for carbon from the plant, mycorrhizal fungi help to make phosphorus soluble and bring soil nutrients (phosphorus, nitrogen, micronutrients and, perhaps, water) to the plant. One major group of mycorrhizae, the ectomycorrhizae, grow on the surface layers of the roots and are commonly associated with trees. The second major group of mycorrhizae are the endomycorrhizae that grow within the root cells and which are commonly associated with grasses, row crops, vegetables and shrubs.\n\nParasites: The third group of fungi, pathogens or parasites, causes reduced production or death when they colonise roots and other organisms.\n\nAlgae: Algae are present in most of the soils where moisture and sunlight are available. Their number in the soil usually ranges from 100 to 10,000 per gram of soil. They are capable of photosynthesis, whereby they and obtain carbon dioxide from atmosphere and energy from sunlight and synthesise their own food.\n\n\nThe major roles and functions of algae in soil are:\n\nPlaying an important role in the maintenance of soil fertility, especially in tropical soils.\n\nAdding organic matter to soil when they die and thus increasing the amount of organic carbon in soil.\n\nActing as a cementing agent by binding soil particles and thereby reducing and preventing soil erosion.\n\nHelping to increase the water retention capacity of soil for longer time periods.\n\nLiberating large quantities of oxygen in the soil environment through the process of photosynthesis and, thus, facilitating submerged aeration.\n\nHelping to check the loss of nitrates through leaching and drainage, especially in un-cropped soils.\n\nHelping in the weathering of rocks and the building up of soil structure.\n\nProtozoa: These are colourless, single-celled animal-like organisms. They are larger than bacteria, varying from a few microns to a few millimetres. Their population in arable soil ranges from 10,000 to 100,000 per gram of soil and they are abundant in surface soil. They can withstand adverse soil conditions, as they are characterised by a protected, dormant stage in their life cycle.\n\n\nThe major functions, roles and features of protozoa are:\n\nMost protozoans derive their nutrition from feeding or ingesting soil bacteria and, thus, they play an important role in maintaining microbial/bacterial equilibrium in the soil.\n\nSome protozoa have been recently used as biological control agents against organisms that cause harmful diseases in plants.\n\nSeveral soil protozoa cause diseases in human beings that are carried through water and other vectors. Amoebic dysentery is an example.\n\nViruses: Soil viruses are of great importance, as they may influence the ecology of soil biological communities through both an ability to transfer genes from host to host and as a potential cause of microbial mortality. Consequently, viruses are major players in global cycles, influencing the turnover and concentration of nutrients and gases.\n\nDespite this importance, the subject of soil virology is understudied. To explore the role of the viruses in plant health and soil quality, studies are being conducted into virus diversity and abundance in different geographic areas (ecosystems). It has been found that viruses are highly abundant in all the areas studied so far, even in circumstances where bacterial populations differ significantly in the same environments.\n\nSoils probably harbour many novel viral species that, together, may represent a large reservoir of genetic diversity. Some researchers believe that investigating this largely unexplored diversity of soil viruses has the potential to transform our understanding of the role of viruses in global ecosystem processes and the evolution of microbial life itself.\n\nNematodes: Not microorganisms (strictly speaking), nematode worms are typically 50 microns in diameter and one millimetre in length. Species responsible for plant diseases have received much attention, but far less is known about much of the nematode community, which play beneficial roles in soil. An incredible variety of nematodes have been found to function at several levels of the soil food web. Some feed on the plants and algae (the first level), others are grazers that feed on bacteria and fungi (second level), and some feed on other nematodes (higher levels).\n\nFree-living nematodes can be divided into four broad groups based on their diet. Bacterial-feeders consume bacteria. Fungal-feeders feed by puncturing the cell walls of fungi and sucking out the internal contents. Predatory nematodes eat all types of nematodes and protozoa. They eat smaller organisms whole or attach themselves to the cuticle of larger nematodes, scraping away until the prey’s internal body parts can be extracted.\n\nLike protozoa, nematodes are important in mineralising, or releasing, nutrients in plant-available forms. When nematodes eat bacteria or fungi, ammonium is released because bacteria and fungi contain much more nitrogen than the nematodes require.\n\nNematodes may also be useful indicators of soil quality because of their tremendous diversity and their participation in many functions at different levels of the soil food web.\n\nRole and Functions\n\nCollectively, soil microorganisms play an essential role in decomposing organic matter, cycling nutrients and fertilising the soil. Without the cycling of elements, the continuation of life on Earth would be impossible, since essential nutrients would rapidly be taken up by organisms and locked in a form that cannot be used by others. The reactions involved in elemental cycling are often chemical in nature, but biochemical reactions, those facilitated by organisms, also play an important part in the cycling of elements. Soil microbes are of prime importance in this process.\n\nSoil microbes are also important for the development of healthy soil structure. Soil microbes produce lots of gummy substances (polysaccharides and mucilage, for example) that help to cement soil aggregates. This cement makes aggregates less likely to crumble when exposed to water. Fungal filaments also stabilise soil structure because these threadlike structures branch out throughout the soil, literally surrounding particles and aggregates like a hairnet. The fungi can be thought of as the “threads” of the soil fabric. It must be stressed that microbes generally exert little influence on changing the actual physical structure of the soil; that is performed by larger organisms.\n\nSoil microorganisms are both components and producers of soil organic carbon, a substance that locks carbon into the soil for long periods. Abundant soil organic carbon improves soil fertility and water-retaining capacity. There is a growing body of research that supports the hypothesis that soil microorganisms, and fungi in particular, can be harnessed to draw carbon out of the atmosphere and sequester it in the soil. Soil microorganisms may provide a significant means of reducing atmospheric greenhouse gasses and help to limit the impact of greenhouse gas-induced climate change.\n\n\nWe can see that healthy soils contain enormous numbers of microbes and substantial quantities of microbial biomass. This translates into an enormous potential for microbial activity when soil conditions (available carbon sources, moisture, aeration, temperature, acidity/alkalinity and available inorganic nutrients, such as nitrogen), are favourable. The potential for activity must be stressed because, under normal situations, the microbial population does not receive a constant supply of readily-available substrates to sustain prolonged high rates of growth.\n\nAlmost all soil organisms (except some bacteria) need the same things that we need to live: food, water and oxygen. They eat a carbon-based food source, which provides all their nutrients, including nitrogen and phosphorus. They require a moist habitat, with access to oxygen in the air spaces in soil. These reasons explain why 75 per cent of soil organisms are found in the top five centimetres of soil. It also explains, however, why many of our agricultural soil microorganism populations are depleted. Unfortunately, some of the agricultural practices that were standard in Australia up until the 1980s, such as excessive land clearance, the burning of stubble, inappropriate fertiliser application and over-tillage, have degraded soils and produced conditions such as salinity, acidification, soil structural decline and desertification.\n\n\nWhile in many areas, our agricultural soils are still considered to be under threat, in recent decades, changes to the farming practices detailed above are helping to create healthier soils. Until recently, this was considered the only way to improve biological fertility. Creating the right conditions and microbes will come and, alternatively, if the conditions are not correct, efforts to introduce beneficial microbes are doomed to fail. Recently, however, scientific research has achieved significant success in the inoculation of soils and seeds with beneficial bacterial and, in particular, mycorrhizal fungi to improve yields and to promote healthier soils. While still in an early stage of development, field trials have been positive and may, in the future, lead to a wide range of benefits based upon improved soil biological fertility.\n\n\nIn the past, soil microbiological science has focussed upon the harmful or pathogenic threat posed by a small number of soil-dwelling microorganisms. This is has skewed our understanding away from most of soil microorganisms that pose no threat to human health or to agricultural production and that perform essential roles in mechanisms that are fundamentally important to the sustainability of human civilisation and life on the planet generally. This emphasis, however, is changing. Interdisciplinary soil research of the future must acknowledge a dynamic region of interacting processes: the holistic nature of living soil and that this portion of soil itself is but a part of a greater soil system. By using integrative methods including non-destructive imaging, next-generation chemical analysis with substantial space and time resolution, and simulation modelling, the secrets of the dynamic soil and biological relationship will be revealed. Holistic soil science has the potential to substantially increase understanding of plant-soil systems and provide guidance for pressing issues of the 21st century, such as agricultural sustainability and environmental change.\n\nBiodiversity and Habitat\n\nbiological activity in soil\n\nSoil supports the growth of a variety of unstressed plants, animals, and soil microorganisms, usually by providing a diverse physical, chemical, and biological habitat.\n\nThe ability of soil to support plant and animal life can be assessed by measuring the following indicators:\n\nBiological Activity Indicators including active fungi, earthworms, microbial biomass, potentially mineralizable nitrogen, respiration, soil enzymes.\n\nBiological Diversity Indicators including habitat diversity and diversity indices for organisms such as bacteria, macro and microarthropods, nematodes, and plants.\n\nWhat do plants, animals, and microbes need from soil?\n\nMicrobes need soil for:\n\n • Food. Most microbes need regular inputs of organic matter (e.g. plant residue) into the soil.\n • Space. Larger soil organisms such as nematodes and insects need enough space to move through soil.\n • Air. Most soil organisms require air, though some require a lack of oxygen. They live in low-oxygen micro-sites such as within soil aggregates. Generally, soil biological activity is enhanced by an increase in soil aeration.\n\nPlants need soil for:\n\n • Support of the microbiological activity necessary for plant growth.\n • Support for, and minimum resistance to, root penetration.\n • Intake and retention of water in soil, while maintaining adequate aeration.\n • Exchange of soil air with the atmosphere.\n • Resistance to erosion.\n • Mineral and organic sources of nutrients.\n • In addition, farmers need adequate traction for farm implements to grow crops.\n\nAnimals and people need soil for:\n\n • Healthy plant growth.\n • Availability of nutrients essential for animal health. These are absorbed by plants, but are not necessarily essential for plant health.\n\nAll organisms need:\n\n • Low levels of toxic compounds.\n • Filtering of water and air.\n\nAt a landscape scale, a variety of soil environments are needed to support a variety of plants, animals, and microorganisms. (Lists adapted from Yoder, 1937, and Cihacek, 1996.\n\nDiversity of soil and soil organisms\n\nEach animal, plant, and microbe species requires a slightly different habitat. Thus, a wide variety of habitats are required to support the tremendous biodiversity on earth. At the microbial level, diversity is beneficial for several reasons. Many different organisms are required in the multi-step process of decomposition and nutrient cycling. A complex set of soil organisms can compete with disease-causing organisms, and prevent a problem-causing species from becoming dominant. Many types of organisms are involved in creating and maintaining the soil structure that is important to water dynamics in soil. Many antibiotics and other drugs and compounds used by humans come from soil organisms. Most soil organisms cannot grow outside of soil, so it is necessary to preserve healthy and diverse soil ecosystems if we want to preserve beneficial microorganisms. Estimated numbers of soil species include 30,000 bacteria; 1,500,000 fungi; 60,000 algae; 10,000 protozoa; 500,000 nematodes; and 3,000 earthworms (Pankhurst, 1997).\n\nCihacek, L.J., W.L. Anderson and P.W. Barak. 1996. Linkages between soil quality and plant, animal, and human health. In: Methods for Assessing Soil Quality, SSSA Special Publication 49.\n\nPankhurst,C.E. 1997. Biodiversity of soil organisms as an indicator of soil health. In: Biological Indicators of Soil Health. CAB International.\n\nYoder, R.E. 1937. The significance of soil structure in relation to the tilth problem. Soil Sci. Soc. Am. Proc. 2:21-33.\n\nHealthy Soil Microbes, Healthy People\n\n\nThe microbial community in the ground is as important as the one in our guts.\n\n\nA small pine tree grown in a glass box reveals the level of white, finely branched mycorrhizal threads or “mycelium” that attach to roots and feed the plant. (David Read)\n\n\n\n\n\n\n\n\nA mycorrhiza or fungus root in cross section. The stained-blue tissue is fungal.\n\n\n\nNot only do soil microorganisms nourish and protect plants, they play a crucial role in providing many “ecosystem services” that are absolutely critical to human survival. By many calculations, the living soil is the Earth’s most valuable ecosystem, providing ecological services such as climate regulation, mitigation of drought and floods, soil erosion prevention, and water filtration, worth trillions of dollars each year. Those who study the human microbiome have now begun to borrow the term “ecosystem services” to describe critical functions played by microorganisms in human health.\n\nWith regard to stabilizing our increasingly unruly climate, soil microorganisms have been sequestering carbon for hundreds of millions of years through the mycorrizal filaments, which are coated in a sticky protein called “glomalin.” Microbiologists are now working to gain a fuller understanding of its chemical nature and mapping its gene sequence. As much as 30 to 40 percent of the glomalin molecule is carbon. Glomalin may account for as much as one-third of the world’s soil carbon — and the soil contains more carbon than all plants and the atmosphere combined.\n\nWe are now at a point where microbes that thrive in healthy soil have been largely rendered inactive or eliminated in most commercial agricultural lands; they are unable to do what they have done for hundreds of millions of years, to access, conserve, and cycle nutrients and water for plants and regulate the climate. Half of the earth’s habitable lands are farmed and we are losing soil and organic matter at an alarming rate. Studies show steady global soil depletion over time, and a serious stagnation in crop yields.\n\nSo, not only have we hindered natural processes that nourish crops and sequester carbon in cultivated land, but modern agriculture has become one of the biggest causes of climate instability. Our current global food system, from clearing forests to growing food, to fertilizer manufacturing, to food storage and packaging, is responsible for up to one-third of all human-caused greenhouse-gas emissions. This is more than all the cars and trucks in the transportation sector, which accounts for about one-fifth of all green house gases globally.\n\nThe single greatest leverage point for a sustainable and healthy future for the seven billion people on the planet is thus arguably immediately underfoot: the living soil, where we grow our food. Overall soil ecology still holds many mysteries. What Leonardo Da Vinci said five hundred years ago is probably still true today: “We know more about the movement of celestial bodies than about the soil underfoot.” Though you never see them, ninety percent of all organisms on the seven continents live underground. In addition to bacteria and fungi, the soil is also filled with protozoa, nematodes, mites, and microarthropods. There can be 10,000 to 50,000 species in less than a teaspoon of soil. In that same teaspoon of soil, there are more microbes than there are people on the earth. In a handful of healthy soil, there is more biodiversity in just the bacterial community than you will find in all the animals of the Amazon basin.\n\n\nAn electron micrograph of a mycorrhiza with radiating mycorrhizal fungal filaments\n\nWe hear about many endangered animals in the Amazon and now all around the world. We all know about the chainsaw-wielding workers cutting trees in the rainforest. But we hear relatively little about the destruction of the habitat of kingdoms of life beyond plant and animal — that of bacteria and fungi. Some microbiologists are now warning us that we must stop the destruction of the human microbiome, and that important species of microorganisms may have already gone extinct, some which might possibly play a key role in our health.\n\nWe are making good progress in mapping the soil microbiome, hopefully in time to identify those species vital to soil and plant health, so they can be reintroduced as necessary. There is now an Earth Microbiome Project dedicated to analyzing and mapping microbial communities in soils and waters across the globe. We do not want to find ourselves in the position we have been with regard to many animal species that have gone extinct. We have already decimated or eliminated known vital soil microorganisms in certain soils and now need to reintroduce them. But it is very different from an effort, let us say, to reintroduce the once massive herds of buffalo to the American plains. We need these tiny partners to help build a sustainable agricultural system, to stabilize our climate in an era of increasing drought and severe weather, and to maintain our very health and well-being.\n\nThe mass destruction of soil microorganisms began with technological advances in the early twentieth century. The number of tractors in the U.S. went from zero to three million by 1950. Farmers increased the size of their fields and made cropping more specialized. Advances in the manufacture of nitrogen fertilizers made them abundant and affordable. Ammonium nitrate produced in WWII for munitions was then used for agriculture (we recently saw the explosive power contained in one such fertilizer factory in the town of West Texas). The “Green Revolution” was driven by a fear of how to feed massive population growth. It did produce more food, but it was at the cost of the long-term health of the soil. And many would argue that the food it did produce was progressively less nutritious as the soil became depleted of organic matter, minerals, and microorganisms. Arden Andersen, a soil scientist and agricultural consultant turned physician, has long argued that human health is directly correlated to soil health.\n\nDuring this same period, we saw the rise of the “biological agriculture” movement, largely in reaction to these technological developments and the mechanization of agriculture. In the first part of the twentieth century, the British botanist Sir Albert Howard and his wife Gabrielle documented traditional Indian farming practices, the beginning of the biological farming movement in the West. Austrian writer, educator, and activist Rudolf Steiner advanced a concept of “biodynamic” agriculture. In 1930, the Soil Society was established in London. Shortly thereafter, Masanobu Fukuoka, a Japanese microbiologist working in soil science and plant pathology, developed a radical no-till organic method for growing grain and other crops that has been practiced effectively on a small scale.\n\nFortunately, there is now a strong business case for the reintroduction of soil microorganisms in both small farms and large-scale agribusiness. Scientific advances have now allowed us to take soil organisms from an eco-farming niche to mainstream agribusiness. We can replenish the soil and save billions of dollars. Many field tests, including a recent one at the University of North Dakota, show that application of a commercial mycorrhizal fungi product to the soybean root or seeds increased soybean yields from 5 to 15 percent. The U.S. market for soybeans is currently worth about $43 billion annually, so adding healthy microbes to the crop will save billions (the value of increased yields is three to five times greater than the cost of application at current prices). Studies show that there will also be major savings from reduced need for chemical fertilizers and irrigation due to more efficient up-take of minerals and water. This also means fewer toxins and pollutants, particularly nitrogen fertilizers, leaching from agricultural lands into our public water system and rivers, which has contributed to massive “dead zones” like that in the Mississippi Delta.\n\nFor all these reasons, bio fertility products are now a $500 million industry and growing fast. The major agricultural chemical companies, like Bayer, BASF, Novozymes, Pioneer, and Syngenta are now actively selling, acquiring or developing these products.\n\nReintroducing microorganisms into the soil, together with the organic matter they feed upon, has the potential to be a key part of the next big revolution in human health — the development of sustainable agriculture and food security based on restored soil health. Just as in the case of the human microbiome, the soil drugs of the future are ones full of friendly germs, and the foods they like to eat.\n\nThe Importance of Micro-Organisms in the Soil\n\nHere is an extract from an article from a wonderful site for beginners in soil microbiology\n\nBefore reading this article, here’s two short paragraphs of the needs of soil.\n\na very effecient explanation, not too much, not too little iof the requirements of soil.\n\nSoil microorganisms (Flora & Fauna), just like higher plants depends entirely on soil for their nutrition, growth and activity. The major soil factors which influence the microbial population, distribution and their activity in the soil are\n\n1. Soil fertility 2. Cultural practices 3. Soil moisture 4. Soil temperature\n5. Soil aeration 6. Light 7. Soil PH (H-ion Concentration) 8. Organic matter 9. Food and energy supply 10. Nature of soil and 11. Microbial associations.\n\n\nWhy Do We Need Soil Bacteria?\n\nSoil bacteria are the primary digestive system of the soil. Their activity is responsible for almost 90% of all biological and chemical actions. For instance, key macronutrients such as nitrogen, sulphur and phosphorus all require microbial transformation in the root zone to make them more available to the plant. Soil bacteria transform nutrients from “forms not usable by the plant” to “forms usable by the plant”. Again, soil microbes improve aeration by loosening dense and compacted soils. Water is then able to better infiltrate and percolate. Most important, soil bacteria decompose organic waste materials such as leaves and manure into organic humus, which stores both moisture and nutrients. Further, microbes can balance soil acidity and alkalinity, create the carbon dioxide plants need, as well as produce vitamins, toxins, and hormones that both feed and protect the plant system.\n\n\nWhat Do Bacteria Do In the Soil?\n\nSoil micro-organisms are living, breathing organisms and, therefore, need to eat. They compete with plants for nutrients including Nitrogen, Phosphorus, Potassium and micronutrients as well. They also consume amino acids, vitamins, and other soil compounds. Their nutrients are primarily derived from the organic matter they feed upon. The benefit is that they also give back or perform other functions that benefit higher plant life.\n\nBacteria are able to perform an extremely wide range of chemical transformations, including degradation of organic matter, disease suppression, disease, and nutrient transformations inside roots (e.g. reducing bacteria in roots, bacteria cause nitrogen fixation).\n\nAzobacter, for example, is a genus of free-living bacteria that converts atmospheric nitrogen into ammonium, making it available for plant use. This process may only take place, however, if the following conditions are met:\n\n • An easily degradable carbon source is available.\n • Any nitrogen compounds such as ammonium or nitrate, are not already in present in substantial concentrations.\n • Soil pH levels are between 6 and 9.\n • High levels of phosphorus are present.\n • Very low levels of oxygen are present.\n • Azobacter is inhibited by a large range of toxic mineral and organic compounds, but may tolerate relatively high salinity and their activities are enhanced in the presence of clays.\n\nIn general, bacteria are the organisms in soil that are mainly responsible for transforming inorganic constituents from one chemical form to another. Their system of external digestion means that some of the metabolites released by the use of extracellular enzymes may be used by other organisms, such as plants. The bacteria gain nutrients and energy from these processes and provide other organisms with suitable forms of chemicals they require for their own processes, for example, in the conversions of nitrate to nitrite, sulphate to sulphide and ammonium to nitrite.\n\nWhere Do Bacteria Live In Soil?\n\nBacteria are aquatic organisms that live in the water-filled pore spaces within and between soil aggregates. As such, their activities are directly dependent on relatively high soil water contents.\n\nBacteria are normally found on the surfaces of mineral or organic particles or congregate around particles of decaying plant and animal debris. Most are unable to move and hence, their dispersion is dependent on water movement, root growth or the activity of soil and other organisms.\n\nWhat Are Rhizobia?\n\nRhizobia are one of the groups of micro-organisms living in soil. They are single celled bacteria, approximately one thousandth of a millimetre in length. Rhizobia belong to a family of bacteria called Rhizobiaceae. There are a number of groups (genera and species) of bacteria in this family.\n\nRhizobia belong to a specific group of bacteria that form a mutually beneficial association, or symbiosis, with legume plants. These bacteria take nitrogen from the air (which plants cannot use) and convert it into a form of nitrogen called ammonium (NH4+), which plants can use. The nitrogenase enzyme controls the process, called nitrogen fixation, and these bacteria are often called “nitrogen fixers”.\n\nRhizobia are found in soils of many natural ecosystems. They may also be present in agricultural areas where they are associated with both crop legumes (like soybean) and pasture legumes (like clover). Usually, the rhizobia in agricultural areas have been introduced at sowing by applying an innoculum to the exterior of the seeds as liquid formations or pellets.\n\nHow Are Nodules Formed On The Roots Of Legumes?\n\nThe nodulation process is a series of events in which rhizobia interact with the roots of legume plants to form a specialised structure called a root nodule. These are visible, ball-like structures that are formed by the plant in response to the presence of the bacteria.\n\nThe process involves complicated signals between the bacteria and the host roots. In the first stages, the bacteria multiply near the root and then adhere to it. The small hairs on the root’s surface curl around the bacteria and they enter the root. Alternatively, the bacteria may enter directly through points on the root surface. The method of entry of the bacteria into the root depends on the type of plant. Once inside the root, the bacteria multiply within thin threads. Signals stimulate cell multiplication of both the plant’s cells and the bacteria and this repeated division results in a mass of root cells containing many bacterial cells. Some of these bacteria then change into a form that is able to convert gaseous nitrogen into ammonium nitrogen (that is, they can “fix” nitrogen). These bacteria are then called bacteroids.\n\nThe shape of the nodules is controlled by the plant and nodules can vary considerably – both in size and shape.\n\nMost plants need specific kinds of rhizobia to form nodules. The rhizobia that form nodules on peas, for example, cannot form nodules on clover.\n\nNodulation can be impeded by low pH, Al toxicity, nutrient deficiencies, salinity, water logging, and the presence of root parasites such as nematodes or genetic incompatibility with the plant host.\n\nAffects of Soil Micro-organisms on Plant Health and Nutrition\n\nSoil micro-organisms, sometimes spelled as soil micro-organisms, are a very important element of healthy soil. Knowing what microbes in soil eat, the conditions they thrive in and the temperatures that they are most active in is important in organic gardening and organic lawn care. From a practical standpoint, it boils down to organic matter, but not just any organic matter. These facts below will help you plan your activities around the time they are most beneficial. Below is a partial list of important functions they perform.\n\nSoil Micro-Organisms Are Responsible For:\n\n • Transforming raw elements from one chemical form to another. Important nutrients in the soil are released by microbial activity are Nitrogen, Phosphorus, Sulphur, Iron and others.\n • Breaking down soil organic matter into a form useful to plants. This increases soil fertility by making nutrients available and raising CEC levels.\n • Degradation of pesticides and other chemicals found in the soil.\n • Suppression of pathogenic micro-organisms that cause diseases. The pathogens themselves are part of this group, but are highly outnumbered by beneficial microbes.\n\nTypes of Micro-organisms in Soil\n\nThere are several types of micro-organisms in soil that benefit plants. Together they make up an immense population of living organisms. One teaspoon of soil may contain millions of various types. Below is a list of common soil micro-organisms found throughout the world.\n\nThese are small, single cell organisms that make up the single most abundant type of microbe. They have a very wide range of conditions that they live in from the Arctic wastelands to the steaming waters of volcanic hot springs. In soils, they multiply rapidly under the proper conditions. When conditions are wrong for one species, it is right for another. This is not always a good thing since a balance is what is required.\n\nThe largest microbe group in terms of mass. Some fungi are beneficial, called mycorrhiza, that form a symbiotic relationship with plant roots, either externally or internally. Within the fungi group are pathogen fungi. These are disease causing fungi, some of which can be quite devastating to plants.\n\nSmall single cell microbes that feed on bacteria.\n\nNecessary for the breakdown of certain components in organic matter.\n\nBeneficial groups such as blue-green algae, yellow-green algae and diatoms. Some of these can produce their own energy through photosynthesis.\n\nWhat is Organic Matter?\n\nIt is a variety of natural substances including decomposed leaves, grass clipping, shed roots, wood chips, etc. Humus (well decomposed organic matter) is the richest source for plant growth. Organic matter comes in many different nutrient levels, especially Nitrogen. While soil microbes need carbon (C) to live, they also need the nitrogen contained in organic matter. Therefore, the Carbon to Nitrogen ratio (C:N) is very important.\n\nProblems with Low Nitrogen Organic Matter\n\nOrganic matter low in Nitrogen will also have a slower breakdown rate than organic matter with higher nitrogen levels. The microbes will consume the Nitrogen element first and the grass will get what is left over. So, organic matter high in carbon and low in Nitrogen will provide little nitrogen to the grass. However, if another N source is applied over the organic matter, it will speed up the decomposition.\n\nTherefore, the rule of thumb is to choose an organic matter with higher levels of nitrogen. Anything lower than four percent (4%) Nitrogen with high Carbon content should be considered a soil amendment and not a fertilizer.\n\nHow Temperature Affects Soil Microbe Activity\n\nSoil Microbe activity is dependent on soil temperatures. For simplicity, all essential soil microbes are classified into the three different temperature ranges they are most active in.\n\nPsychrophiles: Active in temperatures less than 68 degrees.\nMesophiles: Active in temperatures between 77 degrees and 95 degrees. This makes up the largest group of soil microbes and the range most activity charts  are based on.\nThermopholes: Active in temperatures from 115degrees to 150 degrees. From a plant  and landscape view, this group will rarely apply.\n\nSince the primary group contains Mesophiles, this has a great influence on the degree of soil microbe activity. Areas where the temperatures are warm most of the year, organic matter can be consumed very quickly. Tropical rainforests are so lush in part because of consistently warm temperatures, which promote fast breakdown of organic matter and the release of nutrients into the soil.\n\nCooler areas, such as Canada and parts of Europe, that have extended periods of cool weather below 77 degrees will benefit far less from the additions of organic matter. This is because far fewer microbes are active in that temperature range. It is possible to build unhealthy levels of organic matter if you follow the example of those in warmer climates.\n\nThe scientific rule is this: With every 18 degree rise in temperature, from 32 degrees to 95 degrees, there is a 1.5 to 3.0 % increase in microbial activity.\n\nRemember, the food availability to microbes, the quality of organic matter, soil types, pH level, percent of Nitrogen, etc. will also have an effect on microbial activity level.\n\nSoil pH Factor\n\nMost soil micro-organisms can tolerate a wide range of soil levels. However, bacteria favours a neutral to slightly alkaline soil up to 8.0. When pH drops below 6, fungi begin to dominate as bacteria finds it less favourable.\n\nSoil Moisture\n\nJust as temperature levels stimulate different soil microbes, so does soil moisture. Some are obvious. Persistent, damp conditions with heavy shade will promote the growth of algae while hindering microbes that thrive in sunny locations. Proper lawn watering requires deep watering so that the soil is wet 4 inches deep. Shallow watering means only the surface is wet. It dries out quickly and can greatly hinder soil microbes.\n\nOxygen Levels Necessary for Healthy Microbes\n\nThere is a balance to everything, including oxygen in soil. Compacted soil will have less oxygen and less water holding capacity. Clay soil consists of extremely tiny particles, even smaller than silt. Clay with proper structure can have sufficient oxygen, but it can also compact easily. Since soil micro-organisms consume oxygen, but low oxygen soils will quickly deplete what oxygen it has and lower the soil microorganism levels. In lawns, deeply water to a level of 4 inches deep and allow it to dry before watering again. The deeper soil will remain moist at sufficient levels. Shallow watering means when the surface moisture is gone there is no moisture deeper to support a healthy microbe population.\n\nWhat are Fungi?\n\nFungi are primarily organisms that cannot synthesise their own food and are dependent on complex organic substances for carbon. Specialized fungi can be pathogenic on the tissues of plants, while others form mutually beneficial relationships with plants and assist in direct nutrient supply to the plants (e.g. mycorrhizal associations).\n\nMany fungi play a very important role in the recycling of important chemical elements that would otherwise remain locked up in dead plants and animals. In the decomposition of plant debris, certain fungi are particularly important because of their ability to derive their carbon and energy requirements from the break down of dead and decaying plant cell walls, cellulose and lignin. They are much less dependent on water than other micro-organisms, but interactions with other microbes, temperature and nutrient availability will have an effect on their activity. Fungal activity is greatest in decomposing leaves and wood, and tends to diminish in the later stages of decomposition when bacteria become more dominant.\n\nFungi vs Bacteria: Their Different Roles in the Decomposition of Organic Matter\n\nEven though a high proportion of both fungi and bacteria are decomposers in the soil, they degrade plant residues differently and have different roles in the recycling of nutrients. This is partly due to their different choice of habitats within the soil and the different types of organic matter they consume.\n\nFungi are generally much more efficient at assimilating and storing nutrients than bacteria. One reason for this higher carbon (C) storage by fungi lies in the chemical composition of their cell walls. They are composed of polymers of chitin and melanin, making them very resistant to degradation. Bacterial membranes, in comparison, are phospholipids, which are energy-rich. They degrade easily and quickly and function as a food source for a wide range of micro-organisms.\n\nThe different proportions of C and N (i.e. different C:N ratios) of bacteria and fungi might also play a role in the mineralisation and immobilisation processes of nutrients in the soil. Due to their structure and C:N ratio between 7:1 and 25:1, fungi need a greater amount of carbon to grow and reproduce and will therefore ‘collect’ the required amount of carbon available for this from the soil organic matter. Bacteria, however, have a lower C:N ratio (between 5:1 and 7:1) and a higher nitrogen requirement and take more nitrogen from the soil for their own requirements.\n\nEnlivening Soil (extract) by Carl Rosato – Soil Consultant\n\n\nEnlivening Soil (extract) by Carl Rosato – Soil Consultant\n\nFertile soil is a mixture of well-balanced minerals, high organic matter, humus, humic, fulvic and carbonic acids, good aeration and bountiful soil life. The biology or life in the soil is at its healthiest when the nutrients are plentiful and balanced, and there is sufficient oxygen and water. The top few inches of soil is the most vital, holding about 70% of the life and 70% of the organic matter. Below 6 inches the roots are feeding on mostly soluble nutrients since the micro-organisms are not able to thrive without sufficient oxygen. It is possible to create biological activity deeper with deep double dug or mechanical disturbance like spading. It is crucial to leave the soil as undisturbed as possible, although nontillage is very difficult in organic annual crops.\nIncreasing the quantity of earthworms and planting deep-rooted plants will let air into lower levels of the soil. Micro-organisms like bacteria, fungi, actinomycetes, algae, nematodes and protozoa, need oxygen to contribute directly to the release of nutrients to the plant. Some species of mycorrhizae tolerate very low oxygen levels, and infest roots much deeper than other species of beneficial microbes, providing nutrients and root protection. There are many symbiotic relationships going on between roots, organic matter, clay and micro-organisms to support the plant. Soil that is worked too wet annihilates air and water space, destroying the environment that microbes need. Soil that is worked too dry creates similar problems.\n\nRobert R Riley: Turf, Trees, Shrubs, Gardens, Agriculture\n\nThis article by Robert R Riley is excellent. Lawn care is still all about the soil. See the full and original article here.\n\nbefore reading the article, here is a short humorous excerpt from a newspaper text.\n\norg lwn care\n\nPlantain, a perennial weed, has colonised the bare spots on my lawn with rosettes of leaves the size of cocktail napkins. Crab grass waves its crooked arms in the breeze. There is moss in the damp spots. The maples have converted the lawn beneath them to bare dirt. As for the ground near the fir trees, forget it! I was about ready to fall upon my rake. Or worse. A couple of years ago, I actually called a lawn company to come kill the old lawn and start a new one and dose it with plenty of high-nitrogen fertiliser and weed killers.\n\nBut I got the eco-jitters, an increasingly common ailment caused by the gap between ecological principles and actual practice. It is worsened by offspring who have been trained to be aware of every ecological nuance. So I called off the assault and decided to call a few organic lawn specialists to see if I could Do the Right Thing, yet recover my ideally, soil aerated, rich matter and pH.\n\nIn such grass roots 6 inches proponents say, is that they are low in salts that stunt root growth and high in the humic acids that promote easier uptake of nutrients. Organic matter makes it easier for water and air to get into the soil and also provides a source of food for a healthy population of microbes, which stimulate humus formation and devour thatch. In a healthy lawn, there is seldom a buildup of thatch. But microbes hate acidic soils. So lawn owners usually have to add calcium carbonate lime to the soil to raise the pH to near neutral. But what about the weeds? And what about the bare areas in the shade? Soil improvement alone will not help these conditions. It’s tough to get rid of weeds such as plantain with- . out using poison. When such weeds are hand picked, some part of the taproot usually remains in the ground, so the weeds come right back. An What about and the bare shade? Soil improvement not help conditions. Cinque told me, is to heal the soil .\n\nRobert Riley, owner of Green Pro, a trainer of lawn-care workers in Hempstead, N.Y., agreed. “Soil is paramount,” he said. “And it’s almost always forgotten.” Ideally, soil is well aerated, rich in organic matter and neutral in pH. In such conditions, grass roots will extend 6 inches deep, sometimes more than twice that. What is the usual situation? Slablike soil with a build-up of thatch (a layer of dead grass clippings), lacking organic matter and having a pH just this side of lemon juice. The roots peter out at 2 inches. Sometimes, the weeds that invade a lawn can indicate just how unhealthy the soil is.\n\n\n\n\n\n\n\n\n\n\n\nNationally, organic lawn care is a “hot” topic. As if it were something new! It certainly is not. Organic lawn care was exclusively practiced before WWII. After the war, the chemical procedures took over.\n\nThere are many misconceptions, myths and outright lies, which have made the subject of organic lawn care almost indefinable.\n\nChemical lawn care companies claim to offer an “organic” lawn care program, yet often just eliminate pesticides.\n\nChemical companies hire universities to test their products, making it seem like universities only support chemical programs. In addition, college textbooks for green industry professionals became manuals for chemical product use, totally ignoring the “old way” of maintaining healthy lawns, trees and gardens.\n\nStrong marketing efforts by chemical companies promoting the ease and low cost of “miracle” products, push other options out of consumer consciousness.\n\nProfessionals think that using waste products, sewage sludge, manure’s, feathers, dried blood, and machines to punch holes in the ground, constitute an organic lawn care program.\n\nIt has only been more recently that the public has become aware of all of the negative side effects of chemical programs.\n\nUntil recently, the average homeowner was unaware that truly “organic” programs were available.\n\nNo wonder the public is confused. People don’t appreciate what a true organic-based, or organic approach lawn care program is or what it can be. And, sadly there are only a few professionals who understand natural systems well enough, and have available the necessary products and procedures to bring organic lawn care into the twenty-first century by cooperating with natural systems that are immutable.\n\nOrganic lawn care is, first and foremost, a methodology, a process, a way of thinking…not just the substitution of “organic-type” products for standard fertilizer formulations, and the automatic elimination of pesticide use because of some “magic.”\n\nOrganic lawn care is based upon solid science. First, one must find out what is needed. Then, according to what is needed, specialized organic materials are chosen, applied at the proper time and in the correct quantities. Going organic takes a little more research, however it is practical and cost effective. The end result is a dramatic minimization of chemical usage, and in many cases even elimination. For the practitioner who embraces these practical principles, a healthier, safer environment is the product delivered to their customers.\n\nOrganic lawn care can be practiced by the average homeowner using Nature’s Pro® products. Or, if you want your lawn care professional to practice an organic lawn care program for you, he/she can be educated and provided with proven programs by Nature’s Pro®.\n\nWhat is the basis of an organic approach lawn care program? The soil. WHY?\n\nBy Robert R. Riley, Pioneer since 1957 in the Organic Approach for Sustainable Turf & Ornamental Care\n\nWhat grows in the soil can be no healthier than the soil in which it grows!\n\nThe “challenge” then must be obvious. One homeowner has inherited a deep, rich soil; another a measly coating of soil over hard-pan clay, or a sandy soil that simply doesn’t work.\n\nOften, what should be done is to add truckloads of well-rotted compost to the surface and then rototill everything, the grass included, down 6-8 inches. Other materials, amendments recommended by a comprehensive soil analysis, could be incorporated at the same time.\n\nThat’s what organic farmers have to do. They plow organic material into their fields every year.\n\nDo you want to rototill up your entire yard? Probably not. It’s unsightly, time consuming, and pretty expensive. Plus, what do you do to keep it healthy after you rebuild your lawn? So the challenge remains.\n\nThe solution lies in understanding how to “nurture” the plant AND the soil at the same time.\n\nThe secret is oxygen. Oxygen is needed in the root zone of all green plants. Roots cannot grow without oxygen. In addition, oxygen is needed in the soil by a host of hard workers- earthworms, microbes, insects, algae, protozoa, etc., etc. When, and only when, oxygen can freely enter and sustain the LIFE within the soil, can your lawn have the foundation to undertake an organic approach lawn care program. And, no, you CANNOT cause this to happen by poking holes into the soil with a machine or spikes on your shoes. Why, because in 30-60 days the impact is over. Besides, it aerates such a small percentage of the soil, usually less than 5%. Mechanical aeration is not the answer.\n\nAfter oxygen has been helped to enter the soil, then you have to provide fuel energy for the many life forms within the soil so they can flourish to make the soil truly healthy.\n\nThe fuel energy that your soil needs is provided by a product that nature has made for our use. Humates – carbon-rich, mineral-rich, enzyme-rich, with latent microbial life…provides the energy to “feed” the small microbes which then “feed” the larger life within the soil. These hardworking life forms orchestrate a soil-health-sustainable-system which is the foundation for your turf’s health!\n\nNow, you can begin to practice an organic approach! Now, the soil is being “fixed” to promote the growth of turf grass more than weeds. Now, the grass plant is healthy and tough and can withstand diseases. Now, insect pest damage is probably within tolerable limits. Implementing organic programs will continue to improve the quality of any soil, making it more productive and life-sustaining. In the process of improving the soil, all plants, from turf grass to giant redwoods, will be growing in a more supportive, productive, and less stressful (disease-laden) environment.\n\nJust as nature had intended… in order to have healthy plants of all kinds.\n\nTrees and Shrubs\n\nThe problem with having healthy trees and shrubs in most residential environments is the environment. Most trees and shrubs prefer to live in the forest, where they can live for many decades without any assistance at all, thank you very much.\n\nResidential environments, on the other hand, make it hard for trees and shrubs to survive for a number of reasons:\n\n • Inappropriate soil structure\n • Wrong amount of water, poor drainage\n • Wrong amount of sunlight\n • Damage from mowing and trimming equipment\n • Compacted soils\n • Toxicity from products applied to turf, i.e. Turf vs. Trees.\n\nTrees and shrubs can do very well in urban environments and not even require much supporting maintenance if the location can be as similar to the forest as possible. It does not require other trees. It requires the right soil and protection of the root zone.\n\nThings That Trees & Shrubs Hate:\n\n 1. Heavy objects driving over their roots, particularly close to the trunk. Root zones can extend out 2-3 times larger than the crown, the leafy diameter of the tree.\n 2. Lawn sprinklers that are constantly making the lower trunk and root flare wet.\n 3. Transplanting too low.\n 4. Regrading that buries the root flare and part of the trunk. Death may result.\n 5. Herbicides\n 6. Bark injury due to string trimmers or lawn mowers\n 7. Permanently tying wires around trees that limits the flow of nutrients as they grow\n 8. Leaving certain types of baskets, cages and balling products on when transplanting\n 9. Killing off the microbes in the soil.\n 10. Compacted soil.\n 11. Too much compost piled up around the truck.\n 12. Digging in the root zone, particularly close to the trunk. Cutting off or damaging a large support root may be equivalent to removing an arm or leg from a human being\n 13. Excessive pruning – no more than 1/3 of the crown.\n\n\n\nHow do you “re-create” the forest?\n\nYou begin with a comprehensive soil test (not an ag test), similar to the test offered by Prescription Soil Analysis, that looks at 19 different data-points. The Recommendations provide an easy-to-follow program of restoration. Nature’s Pro has a range of products available; liquids, granulars and biologicals, that support optimization of plant health using ingredients that are especially supportive of trees and shrubs.\n\nThere are all types of gardens and special plant needs within gardens:\n\nGround Covers, Shrubs, Flowers, annuals and perennials, Moss, Vegetable Gardens\n\nThe list goes on…\n\nSome plants require acid soil, others want less water. Some plants want lots of sunlight and others very little. Most plants need good soil.\n\nWe’ll have to leave picking the right plant for the right amount of sunlight up to you, but we can help you with pretty much everything else. We have products that can add lots of organic material or micronutrients. We can add to the life of your soil with live microbes, the result of using compost tea. Some products are liquid and some are granular. Nature’s Pro even has products that can aerate your soil without the use of a machine. So there are many ways we can help.\n\nWe suggest you begin at the beginning. It’s important to get a picture of where you are starting. For your body, that is a doctor’s examination. For your plants, you begin with a comprehensive, nutrient-availability soil test, not an agriculture test.\n\nThe Prescription Soil Analysis (more about Prescription Analysis – see below) examines many items that a standard test does not, 19 different data points to be exact. Armed with the Recommendations that result from the test(s), you will have a step-by-step plan, not just for the property in general, but each individual bed, or plant type, or vegetable, or individual tree or shrub if you like.\n\nThe best way to maintain your gardens is the way that is most natural to them, without a lot of chemicals and control products. By in large, healthy plants do not get sick. Planting quality plants in Healthy Soil, and then managing them, supporting them with balanced food-grade nutrients, conditioning the soil, and providing food sources for the beneficial microbes in the soil, this is what the plants in your gardens prefer.\n\nNature’s Pro, with 50 years of experience in creating plant-sourced humate products (ideal for plants, soil and soil biology), not animal-sourced products (which are not as compatible to plants), knows what your plants need. We even have food-grade foliar fertilizers with micronutrients that are easy and cost-effective to apply.\n\nTo Summarize:\n\n 1. Healthy plants want to grow in as natural environment as possible.\n 2. They want an environment that matches their specific pH and nutrient needs.\n 3. Healthy plants want to grow in Healthy Soil.\n 4. The Prescription Soil Analysis makes specific recommendations to correct poor soil as well as specie-specific nutrient and pH Recommendations for the plant.\n 5. Nature’s Pro products are based on plant-sourced ingredients favored by plants.\n 6. Nature’s Pro products support all aspects of Healthy Soil including nutrients for plants, food for the soil’s biology, and conditioners to build quality soil structure.\n\n\n\nAgriculture today is filled with challenges:\n\n • The spiraling upward cost of fertilizer, with further increases expected in the future.\n • Increased soil compaction issues.\n • Larger PTO tractors are required to work the compacted soils\n • More expensive seeds with special features, like “Round-up Ready”.\n • Governmental regulations that restrict nutrient application programs.\n • Shrinking yields, in spite of applying more nutrients.\n • Shrinking profit margins, increasing costs with flat or decreasing income.\n\n\nAre There Options?\n\nYes. But first, let’s look at some basic principles. The most productive soils:\n\n • Include at least 5% organic matter.\n • Are teeming with all sorts of biology, including millions of microbes per teaspoon of soil.\n • Are loose, enabling air to penetrate a foot or more into the soil.\n • Drain easily with no pools or puddles after rains.\n • Can store more available water during periods of drought.\n • Work up more easily.\n • Are more productive in both quantity and quality.\n\n\nHealthy Soils support healthy crops. Healthy soils and the crops they produce require three essential types of inputs:\n\n 1. Nutrients to grow crops\n 2. Food sources to feed soil biology\n 3. Soil Condioners to maintain proper soil structure and appropriate conditions to support crop production and biological activity, which also supports crop production.\n\nNature’s Pro products and programs are designed to support these three types of necessary inputs. A simple diagnostic process provides a path to soil health recovery.\n\n\nAnother Option\n\nWhere soils are really bad, or as a boost to current nutrient application programs, or as a potential cost savings to current nutrient programs, NP Foliars are what the doctor ordered. These time tested products (over 50 years) absorb directly into the plant membranes (up to 94%), are translocated throughout the plant immediately, and have no negative environmental impact. They are also very cost effective. Click here for more information.\n\nIf the birds don’t follow your field equipment looking for earthworms, your soil and your crops are in trouble…\n\n\nWhat Chemical-Based Lawn, Tree & Shrub Care Practitioners Do Not Want You To Know!\n\nSide By Side Comparison\n\nHealthy soils, nurtured with specific organic materials – ABSOLUTELY do not need to have holes poked in them with a machine to effect an “aeration.”\n\nA healthy growing environment for turf … absolutely will not cause that turf to develop a destructive layer of dead roots and stems … which is called thatch.\n\nChemically-dependent plants are weak plants.\n\nWeak plants (turf, trees and shrubs) ATTRACT disease and insect problems.\n\nImproperly nurtured and balanced soils CAUSE “weeds” to grow.\n\nReacting to all these “problems” with mechanical devices (aerating and de-thatcing), and multitudinous sprays of this and that chemical … earn millions of dollars each week during the season.\n\nObviously, keeping these facts from the public is a prime concern of many.\n\nExposing these facts, and then offering materials, programs and procedures to address these moneymaking “problems,” has been the intent of Nature’s Pro®, and many other pioneers, during the last twenty-five years.\n\nIt is the public – who is demanding less chemical usage … that is forcing professionals to take another look … a very hard look, at what Nature’s Pro® and others have been doing for decades. It is public opinion that is forcing this revolution … which isn’t a revolution at all, because the organic-approach to landscape care was well entrenched prior to WW II.\n\nHowever, now the public’s demand for better-looking landscapes, better than what we expected sixty years ago, and maintained at a reasonable cost, has required Nature’s Pro® to develop advanced procedures to meet the public’s demand. This we have done, and continue to improve as we learn and discover more about Natural Systems and our proper role as caretakers.\n\nIf this interests you, then maybe you will join us as we “convert” one landscape at a time from chemical-based programs to more natural, organic-based programs of care.\n\n\n\nSoil Analysis\n\nsoil_compositionOnce you know your soil, analysis and tests  become unnecessary. Until then, they can be your best friend. See the original and full article here.\n\nAll Soil Tests are Not Created Equal. Getting the Right Test is Critical!\n\nThe health and beauty of a plant or the productivity of a crop is directly related to the health and vitality of the soil in which it grows.\n\n • When the pH is wrong, nothing works right – not fertilizers, not weed killers, and especially not the biological components within the soil.\n • When the Organic Matter content is low…the soil is unproductive, and crops, trees or turf lack the energy sources to help them grow.\n • When soluble salts and chlorides are too high, the microbes that live in the soil and help aerate and digest dead plant material (turning them into organic material) are killed, thereby increasing soil compaction.\n • When the soil is compacted, not enough air, water or nutrients can enter the root zone, so the plants suffer greatly.\n • When the soluble salts and chlorides are too high, the roots gets burned, significantly\n • reducing the amount of water and nutrients the plant can absorb.\n • When nutrients are out of balance with each other, in either short or excessive supply, or not available for the plant’s use, the plant is not as healthy and therefore more susceptible to disease and insect attacks.\n • When secondary & micro nutrients are lacking, plants are weak and damaged more easily by wear & tear, drought conditions and insect/disease problems.\n\nThese conditions cannot be determined accurately unless a comprehensive soil test is taken.\n\nThe soil test will determine what unhealthy conditions exist and what corrective actions are required. If corrections are not made:\n\nFor Turf – thatch, weed, insect and disease problems will inevitably develop resulting in additional chemical usage, mechanical intervention and unnecessary costs.\n\nFor Trees & Shrubs – fewer/smaller blossoms, reduced leaf size and vigor, slower growth and greater likelihood for disease.\n\nFor Agriculture – lower yields, increased N-P-K requirements (more expense) reduced nutrient levels, and less drought and disease tolerance.\n\nFor Gardens – Whether flowers or vegetables, quantity, quality, shelf life and, in the case of food crops, nutritional content are all impacted by poor soil quality and nutrient imbalance.\n\nWhen the soil is healthy, all plant life is healthier and more productive, better withstanding climatic and environmental stresses, and insect/disease attacks.", "pred_label": "__label__1", "pred_score_pos": 0.7851033210754395} {"content": "Get the App\n\nWhat a spicy new study can teach us about caring less\n\nby Kelton Wright\n\n • Share\n\nThink about the last time someone cut you off, or criticized your work, or was just rude for seemingly no reason. How do those moments make you feel? If you’re like the rest of humanity, probably a bit miffed! But what if those things could bother you less? Or, even better, what if there was a way to get people to be less mean?\n\nThat’s where meditation comes in.\n\nScience shows that meditation can help us be more compassionate, but that’s not really the same as being less aggressive. Could meditation also help us to be less reactive toward negative feedback? Could you study a real-time provocation that typically evokes aggression to see if meditation helps? That’s where the hot sauce study comes in. And this one is a little spicy.\n\nForty-six participants were assigned to either use Headspace for three weeks or to an “active control condition” (in this case, solving logic problems.) Then, they were brought into a lab and told they were doing a speech and language test and were asked to give a 2-minute speech on their life goals to another person (an actor.) After their speech about their future goals, the actor provided harsh feedback such as “waste of my time listening to you,” or “I wasn’t impressed.” (Ouch!) The participants were then asked to prepare a taste sample for the person who provided their feedback. They were given lemonade powder, chocolate syrup, and hot sauce, and they could use as much or as little as they wanted. They were also told the person would have to eat the entire taste sample they provided and that the person did not like spicy food. So naturally, aggression was measured by how much hot sauce they used in the sample.\n\nParticipants who used Headspace for three weeks were 57% less aggressive and reactive toward negative feedback.\n\nIf you’re thinking that sounds like joke science, it’s not; this design with hot sauce being used as a proxy for aggression is actually a scientifically validated study design. The hot sauce “taste sample” experiment is used in many studies to assess aggressive behavior. And while it still may sound like a game you play with villainous siblings, the results are incredible: “3 weeks of daily meditation practice substantially reduced aggressive behavior.” The results showed that those participants who used Headspace for three weeks prior to the provocation were 57% less aggressive and reactive toward the negative feedback. The study authors believe that meditation may actually enhance a desire to avoid suffering, even for others.\n\nOf course, all studies have their limitations, and in this study one such limitation is the absence of a passive control group (i.e., where participants would experience a provocation without having taken part in any type of training.) As always, the best research is usually more research — but imagine being less reactive to negative feedback. While sometimes a level of vindication and varied forms of justice can feel good, being less reactive could help you keep your cool in meetings, in front of your kids, and maybe even free you up to be less afraid of what criticisms might come when you put yourself out into the world.\n\nFor me personally, I’m just hoping the next time I let someone into the flow of traffic and don’t receive a wave, that I can just let it go. Keep that hot sauce for myself.\n\nArtwork by CHRIS MARTZ\n\nKelton Wright\n\nKelton Wright is the Editorial Director of Movement and Sport at Headspace. She is a published author, an avid cyclist, and a slow but enthusiastic trail runner. You can find her on Instagram and Twitter at @keltonwrites.\n\nMeditation Made Simple\n\nMeditation Made Simple\n\nStart Meditating", "pred_label": "__label__1", "pred_score_pos": 0.6454871892929077} {"content": "When a loved one or family member asks a Pennsylvania resident to become the executor of their estate, it is natural to feel honored at the request. If the testator is near death, then there is an even more pressing need to agree and ease their stress. However, it’s important to know that being an executor is a difficult role and one should know what they are getting into before agreeing.\n\nThe first and foremost concern is whether the potential executor has time. The executor must sort through years of a testator’s life, and this often requires lengthy and repeated phone calls, trips to the county courthouse and standing in long lines to send registered letters. Collecting information from financial institutions is also tedious, especially when someone is grieving for the loss of a loved one. Not only does one have to think about the time completing these tasks requires, but also the skill. An executor must be highly organized, so if they have financial difficulties of their own, it might not be the best idea to appoint them. An executor must also be aware of the rules regulating their responsibilities, along with the timeline for completing these tasks.\n\nOne way to ease the path for an executor is to put financial affairs in order as soon as possible. The testator should make a list of all their financial information, including the location of safe-deposit boxes and real estate. A will that clearly outlines one’s wishes is also a big step towards helping the executor determine how to divide the estate and personal belongings. It’s also important to talk openly about why someone has been chosen as an executor, while another family member overlooked. This can avoid disputes in the future.\n\nEstate administration can be complicated, even when someone has taken the necessary steps to provide for their family member’s future. One way to ensure the executor has all the information needed to distribute one’s estate and complete related functions is by consulting an experienced attorney.", "pred_label": "__label__1", "pred_score_pos": 0.9941914677619934} {"content": "New Delhi: Hailing B.R. Ambedkar for his work to reform Hindu society, the Rashtriya Swayamsevak Sangh (RSS) on Saturday put him in the pantheon of Hindutva icons like Veer Savarkar and Madan Mohan Malviya and said he had opposed conversion to Islam and Christianity.\n\nWith the Bharatiya Janata Party (BJP) and the Congress trying to outdo each other to claim the legacy of the architect of Constitution, RSS mouthpiece Panchjanya has come out a with special cover story on Ambedkar, lavishing praise on the Dalit leader and projecting him as a hero of Indian values who spent over a decade in “organising Hindus\".\n\nHis birth anniversary falls on 14 April and both parties have planned a number of events to mark it.\n\n“As Buddha followed by Kabir, Guru Nanak and then Jyotiba Phule and Vivekananda worked to rid the society of the ills of their time... Ambedkar was the pioneer of the fifth phase of resurrection, whose earlier heroes were Savarkar, Mahatma Gandhi and Madan Mohan Malviya,\" it said.\n\nNoting that Ambedkar spent his life for the uplift of untouchables and Dalits, the article says he spent 11 years between 1924-35 to organise Hindus because he believed it would end ritualism and make India an able country.\n\n“He wrote that Dalits also have a right over the values of Hindutva,\" it writes.\n\nIt blames upper castes Hindus for spurning his attempts to get equal social and religious rights for Dalits which made him turn against Hinduism in “anger and frustration\".\n\n\n“He took 21 years before he converted because he thought if Dalits convert to Christianity or Islam they will go out of the fold of Indianess... The idea of betraying the Indian values was unacceptable to him,\" it says.\n\nThe story claims that Ambedkar told Hindus in 1942 when the demand for creation of Pakistan was rising that he believed “Hindu society will defeat Muslims\".\n\nHe, however, supported the creation of Pakistan in the same way the captain of a ship wants “excess baggage\" discarded so that “Indian ship could sail without any danger.\"", "pred_label": "__label__1", "pred_score_pos": 0.9828053116798401} {"content": "Braving the Elements: Why Mendeleev Left Russian Soil for American Oil\n\nThe story behind a rare work in our collection by the father of the periodic table.\n\nBy Zack Pelta-Heller | January 19, 2018\n\nDmitri Mendeleev at Niagara Falls in 1876.\n\nSerge Lachinov/Wikimedia Commons\n\nLong before international relations between the United States and Russia centered on allegations of election tampering and controversial business deals, they focused briefly on Dmitri Mendeleev. National Periodic Table Day on February 7 celebrates Mendeleev’s birthday and his “periodic law,” in which he arranged the more than 60 elements known at the time into a single table based on their atomic weights, correctly predicting the properties of numerous additional elements and their compounds. As the 33-year-old chair of chemistry at the University of St. Petersburg, Mendeleev began working on this periodic law while writing a textbook in 1867, publishing it initially as a series of papers in 1869 and then as Osnovy khimii (Principles of Chemistry) in 1871. So what then did the father of the periodic table have to do with U.S.-Russian relations?\n\nIn 1876 Mendeleev traveled to Pennsylvania on behalf of the Russian government. He stopped in Philadelphia, where he attended the International Exhibition of Arts, Manufactures, and Products of the Soil and Mine, more commonly known as the Centennial Exposition, which drew approximately 10 million visitors to Fairmount Park. He joined a group of Russian scientists and engineers who exhibited items on everything from mining and metallurgy, to agriculture, to meteorology. Mendeleev’s scientific pursuits were equally far reaching. He had advised Russia’s Ministry of Finance on several domestic issues, such as alcohol tariffs, gunpowder, and agricultural reform. And as Michael Gordin noted in his biography A Well-Ordered Thing: Dmitrii Mendeleev and the Shadow of the Periodic Table, Mendeleev attended the Centennial Exposition to showcase a differential barometer he developed after studying gases at varying temperatures. Yet the primary reason for Mendeleev’s visit to America was oil.\n\nAccording to Ronald Brashear, who oversees the Othmer Library, “A large part of Mendeleev’s interest was in encouraging better production and refining in Russia.” In 1859 Edwin Drake struck oil in Titusville, Pennsylvania, drilling the first commercial oil well. Oil fields in Pennsylvania consisted of light crude much easier to refine than the heavier crude available in Russia, where the petroleum industry centered on the region near Baku, a city on the Caspian Sea and the modern-day capital of Azerbaijan. But Baku’s oil deposits, discovered in the early 1800s, remained under the control of the Russian state and were largely undeveloped. As a result American kerosene inundated Russian markets.\n\nIn “Baku Oil and Transcaucasian Pipelines, 1883–1891: A Study in Tsarist Economic Policy,” John McKay contends that despite a high Russian tariff, America was supplying a whopping 80% to 90% of Russian kerosene by the 1870s. And the vast majority of that oil was being refined by John D. Rockefeller’s Ohio-based Standard Oil Company, which controlled oil production in western Pennsylvania by the time of Mendeleev’s visit.\n\nMendeleev’s interests in American oil were more economic than scientific. He wanted Russia to compete with American imports and supply kerosene to its own central population. As Brashear explained, Mendeleev traveled to the western part of Pennsylvania to “visit refineries, interview people involved in the local oil industry, and study rock formations in the area.” A rare 1877 work from the Roy G. Neville Collection titled Neftianaia promyshlennost v svievero-amerikanskom shtatie Pensil’vanii i na Kavkaze (The Oil Industry in the North American State of Pennsylvania and the Caucasus) documents Mendeleev’s journey to the so-called Petroleum Valley. Though the work has yet to be translated, it contains a map of western Pennsylvania, in which Mendeleev meticulously marked in Cyrillic letters the bodies of water (Lake Erie, Allegheny River), cities (Titusville, Pittsburgh), neighboring states (Ohio, New York), and most important, oil production centers throughout the region.\n\n\nA map of western Pennsylvania\n\nA map of western Pennsylvania, from Dmitri Mendeleev's Neftianaia promyshlennost v svievero-amerikanskom shtatie Pensil’vanii i na Kavkaze (The Oil Industry in the North American State of Pennsylvania and the Caucasus).\n\nAt the time of his visit to western Pennsylvania, Mendeleev wasn’t well known outside Russia. Although he presented his periodic law to the Russian Chemical Society in 1869, he continued to fine-tune his periodic table in many editions of The Principles of Chemistry; while the book was published in several parts, the second volume, published in 1871, included a fold-out chart resembling a modern-day periodic table. Mendeleev only gained broader recognition within the international scientific community after the discoveries of new elements within his lifetime—including gallium, scandium, and germanium—literally filled the gaps of his periodic table and proved his predictions about the patterns between groups of elements. He subsequently presented his research in London in 1889, called “The Periodic Law of the Chemical Elements.”\n\nMendeleev returned from the United States to Russia with enough information to profoundly affect Russia’s nascent oil industry. Based in part on Mendeleev’s recommendations, the Russian government opened the floodgates of the oil industry, essentially turning over Baku’s petroleum deposits to private entrepreneurs who began using American drilling techniques. Of those, perhaps the most successful were Ludwig and Robert Nobel (brothers of Alfred Nobel, founder of the eponymous prizes), all of whom grew up in St. Petersburg where their father had a mechanical engineering company. The Nobel Brothers Petroleum Company dominated the industry by the late 1870s, building pipelines and developing the first oil tankers to ship across the Caspian Sea. \n\nBy 1883 Russian oil production had increased over 20 times in a 12-year span, and roughly half of Russian kerosene shipments were coming from the Nobel Brothers’ company. As McKay notes, by 1900 Russian oil “accounted for fully one-half of the world’s production of crude oil.” Yet while Mendeleev witnessed the realization of his vision for Russia to harness its own petroleum, he became heavily critical of the overproduction that was occurring.\n\nHe published a series of papers in 1881 called “Where Should the Oil Refineries Be Built?” in which he condemned Russia’s oil industry for blindly following American production techniques, since only 25% to 30% of Baku crude could be refined into kerosene, unlike American crude. This led to a massive amount of waste from the leftover oil that was burned or dumped into the Caspian Sea. “This waste appalled Mendeleev and other technical experts,” McKay concludes.\n\nMendeleev went from wanting Russian oil to be shipped to central Russia to proposing the relocation of Russian refineries to the country’s interior. Such suggestions drew criticism from his scientific peers and Ludwig Nobel alike. Nevertheless Mendeleev would continue to devote a significant portion of his remaining years to advocating for further innovations to Russian oil production, from improvements to oil quality to the creation of a pipeline stretching through the Caucasus to the Black Sea.  \n\nFollow us on Twitter for more #StoriesofScience.", "pred_label": "__label__1", "pred_score_pos": 0.7732837796211243} {"content": "Printer Friendly\n\nPost-McCutcheon super JFCs: a pathway to exposure and disclosure.\n\n\nWhat can be done in 730 days? The possibilities are seemingly endless--this is America after all. However, to the incumbents and candidates fighting to win votes for a seat in either the chamber of Congress or the Oval Office, those days are seemingly numbered. Just about every one of those days is spent fundraising inside, and occasionally outside, of the Beltway. (1) Since the competition is so intense, consultants planning fundraisers are forced to be creative in order to attract the most attendees possible. Fundraising events include everything from breakfast and policy discussions, (2) cocktail receptions, (3) spending a weekend at a Major League Baseball spring training camp (4) or skiing, (5) to even attending a Taylor Swift (6) or Beyonce concert. (7) The cost to attend one of these events often starts around $1,000 for an individual and $2,500-$5,000 for a Political Action Committee (PAC). (8) Although, for a more intimate setting, one may prefer to host a candidate in their home (9) or the home of an officeholder to fundraise. (10) These types of events are designed to provide various levels of access to the candidate base on the level of contribution. (11) Looking to have a conversation with Hillary Clinton in support of Hillary for America at home with some friends? The contribution levels for such an event are as follows: $1,000 to be a friend; $2,700 to be a Champion, which includes a photo with Hillary; $10,000 to be an event co-host raise, which includes a reception with Hillary; and finally $27,000 to be a host raise, which includes a reception with Hillary and membership in the Hillstarters program. (12) These types of events are common for officeholders on both sides of the aisle. In fact, there are hundreds of them throughout the year. (13) Officeholders attend these events whether they are in a race or not, because it is a means to an end, and that end is winning their election.\n\nFor those keeping track of time and curious as to when these officeholders set asie the competition to keep their jobs and actually perform their elected jobs: there are days allotted for legislative work. In the first session, members of the 113th Congress in both the Senate and House Chambers spent 156 (14) and 160 (15) days in session, respectively. In the second session, members in both the Senate and House Chambers spent 136 (16) and 135 (17) days in session, respectively. Although for most Americans--candidates and voters alike--everyone one is just waiting for that second Tuesday in November of the election year to arrive, which marks the end of the obnoxious and overbearing phone calls, radio spots, emails asking for donations, and television advertisements from invading everyday life.\n\nCampaign finance laws have been created, built up, and chipped away at for nearly as long as this country has existed. The first substantive piece of legislation to regulate campaign finance was the Federal Election Campaign Act (FECA), enacted in 1971 by Congress and later amended in 1974 to, among other things, create the Federal Election Commission (FEC). (18) Since that time, there has been additional legislation, two other government agencies added to regulate money, and endless cases to support and challenge those laws. (19) At the same time, the fundraising industry has evolved to become the nation's strongest and largest political machine.\n\nThe overall issue surrounding campaign finance reform lies within the effects of the remaining regulations coupled with the deregulation of campaign finance laws. The main result has been ineffective redirections of the flow of money into campaigns. There are eight entities that raise political money, abiding by different rules on contribution limits and disclosure of both expenditures and donors--plus three government agencies each regulating different entities. (20) It is easy to see why this issue is relatively complex with no simple solution. At the time, the 2014 midterm election suggested an atmosphere ripe for competition, indicating further campaign finance regulation on the horizon.\n\nPart I of this Note provides a timeline of campaign finance law, beginning with the creation of the FECA and the regulations that were added to the FECA. The Buckley (21) case is reviewed, providing the oldest remaining distinction in campaign finance law aimed at preventing corruption. Finally, ending with enactment of the Bipartisan Campaign Reform Act of 2002 (BCRA), (22) which has transformed our campaign finance laws leading up to McConnell, (23) Citizens United, (24) and McCutcheon. (25)\n\nPart II provides a synopsis of McConnell, (26) Citizens United (27) and McCutcheon, (28) which have been the latest cases to drastically change the financial landscape of campaigns. This section describes the contribution limitations \"then and now\" as a result of each ruling and evaluates the implications and effects of the rulings to future election cycles.\n\nPart III develops some clarity on the vehicles used by individuals, corporations, and organizations to exercise their right to political speech and association. Additionally, this section looks at the future of the expanding dynamic of political machines, such as the Joint Fundraising Committee (JFC), which is likely to develop as a result of the implications of the McConnell, (29) Citizens United, (30) and McCutcheon (31) decisions.\n\nPart IV explains the current proposal for disclosure reform, the Real Time Transparency Act of 2014. (32) Additionally, Part IV provides an example of voluntary disclosure undertaken by United States companies, demonstrating the method individual, mega-donors, and mega-donor backers use to disclose their identities, and highlights certain individuals who have exposed themselves as mega-donor backers. Finally, this Note concludes with an assertion that McCutcheon (33) has created a self-correcting mechanism, the Super JFC, which would likely develop a path to more disclosure in the future.\n\nI. The Evolution of Money in Politics--The Groundwork\n\nThe fear of election improprieties has existed since the first elections were held in the United States. In the beginning, \"there were concerns over candidates buying votes and accepting donations in exchange for a variety of incentives, including promises of jobs in the new administration.\" (34) Fast forward 104 years from the first substantive campaign finance law passed through Congress (35) to 1971, when the initial version of one part of our campaign regulation system was enacted, FECA. (36) The FECA laid out regulations for federal political campaigns. Due to a lack of enforcement and oversight, one individual believed that winning reelection came at all costs and took advantage of each worst-case scenario possibly imaginable. Enter President Richard M. Nixon and the infamous Watergate scandal. (37) Watergate involved \"secretive, illegal corporate contributions, trades of cash for favors and, of course, break-ins--led to arrests, numerous convictions, and a presidential resignation.\" (38) Promptly following the scandal, Congress decided the best course of action would be a series of hearings that ultimately lead to the amendment of FECA. In 1974, Congress created the Federal Election Commission \"to oversee the administration of federal election law.\" (39) It also expanded the Act by creating the first disclosure requirements for donations, setting limits for particular contributions, and developing the public financing of presidential elections. (40)\n\nWhenever a campaign finance law case enters the Supreme Court's docket, the challenge is most often based on alleged FECA breaches of fundamental First Amendment rights of freedom of political speech and association. The Court has ruled these rights extend to the conduct of campaigns for political office finding, \"in a republic where the people are sovereign, the ability of the citizenry to make informed choices among candidates for office is essential, for the identities of those who are elected will inevitably shape the course that we follow as a nation.\" (41)\n\nThe first challenge to the 1974 amendments of FECA came in 1976 when the Supreme Court heard Buckley v. Valeo. (42) At issue was the legality of contribution and independent expenditure limits to political campaigns. The Court upheld the restrictions on individual contribution limits to campaigns and candidates as a means to protect the government's interest against quid pro quo corruption and the appearance of corruption. The Court believed that the limit on a contributor's ability to donate to a candidate or political party was only a \"marginal\" restriction on his ability to engage in free communication. (43) In contrast, the Court found the expenditure limits were an unconstitutional restriction on the amount of money an entity could spend on political communication during a campaign, \"reducing] the quantity of expression by restricting the number of issues discussed, the depth of their exploration, and the size of the audience reached.\" (44) The Court acknowledged that communication in our society requires money--lots of it. It noted campaigns' increasing dependence on the use of television, radio, and additional mass media as expensive, yet indispensable, modes of communication for effective political speech. (45) The takeaway from Buckley (46) was that the Court distinguishes between the contribution and expenditure limitations, the former of which are inherent to preserving government interests. (47)\n\nThe next step in reform was the enactment of the Bipartisan Campaign Reform Act of 2002 (BCRA) better known as the McCain-Feingold Act. (48) In 1998, the Senate Committee on Governmental Affairs issued a six-volume report of its investigation into the 1996 federal elections with \"particular attention to the effect of soft money on the American political system, including elected officials' practice of granting special access in return for political contributions.\" (49) Both the majority and minority reports' findings led the Committee to agree that \"the 'soft money loophole' had led to a 'meltdown' of the campaign finance system that had been intended 'to keep corporate, union and large individual contributions from influencing the electoral process.'\" (50) Upon the Committee's recommendation, Congress restricted the use of soft money in federal elections with BCRA. The Act \"prohibited] national party committees and their agents from soliciting, receiving, directing, or spending any soft money.\" (51) To prevent circumvention, state and local parties are prohibited from using soft money for activities affecting federal elections. (52) The Act created a new provision of FECA that \"restricted] federal candidates and officeholders from receiving, spending, or soliciting soft money in connection with federal elections and limits their ability to do so in connection with state and local elections.\" (53) The following year, the Supreme Court upheld most of the BCRA's core principals as constitutional when it decided McConnell v. FEC. (54)\n\nII. The Campaign Finance System Limitations--How Does the Money Stack\n\nA. McConnell Initiates the Destruction of National Parties, Officeholders and Candidates\n\nWith BCRA in place for about a year, the Supreme Court considered whether large soft money contributions had a corrupting influence or gave rise to the appearance of corruption in the McConnell (55) case. The Court had a central concern over \"the manner in which parties have sold access to federal candidates and officeholders that has given rise to the appearance of undue influence.\" (56) The Senate Committee report exposed many problematic instances of corruption. The Democratic National Committee hosted coffees at the White House, which provided access to President Clinton. (57) The Republican National Committee had promotional materials for their donor programs that \"promised 'special access to high-ranking Republican elected officials, including governors, senators, and representatives.'\" (58) Nonetheless, this type of undue influence, \"unlike straight cash-for-votes transactions ... is neither easily detected nor practical to criminalize.\" (59) Naturally, the Court's suggestion of the best means to protect against this type of corruption was to \"identify and to remove the temptation\" which is inherent in \"soft-money contributions to political parties.\" (60) However, the Court clarified, \"Congress is not required to ignore historical evidence regarding a particular practice or to view conduct in isolation from its context.\" (61) Thus, the Court cleared up the interpretation of corruption by stating, \"mere political favoritism or opportunity for influence alone is insufficient to justify regulation.\" (62) Unfortunately, that clarification has turned into a form of public opinion where favoritism and opportunity are heavily criticized and smeared as adequate corruption. (63)\n\nArguably, the most devastating reform to campaign finance regulation was through the enactment of BCRA. The fundamental understanding in McConnell (64) was that [section] 323 of FECA \"does little more than regulate the ability of wealthy individuals, corporations, and unions to contribute large sums of money to influence federal elections, federal candidates, and federal officeholders.\" (65) In theory, that understanding--restricting the flow of soft money--would \"tend[] to increase the dissemination of information by forcing parties, candidates, and officeholders to solicit from a wider array of potential donors.\" (66) In reality, by essentially eliminating the parties, candidates, and officeholder's ability to collect soft money, the initial redirection of money into entities not regulated by source and amount limits occurred. Keep in mind that the McConnell (67) reinforcement of BCRA and the redirection of soft moneywas seven years before the most controversial, and in one Justice's opinion regrettable, (68) Supreme Court ruling, that deregulated campaign finance for the foreseeable future.\n\nB. Citizens United Unleashes the Corporate and Union Cash Flow to Independent Expenditures\n\nJust seven years following McConnell, (69) the Supreme Court delivered the most hotly debated ruling in recent history, Citizens United v. FEC. (70) In Citizens United, (71) the court held: (1) \"the Government [could] not suppress political speech on the basis of the speaker's corporate identity\"; (2) \"no sufficient governmental interest justifie[d] limits on the political speech of nonprofit or for-profit corporations\"; and (3) overruled Austin v. Michigan State Chamber of Commerce, (72) which upheld \"a direct restriction on the independent expenditure of funds for political speech.\" (73) The Austin Court stated there was \"no basis for allowing the Government to limit corporate independent expenditures.\" (74) The Court's approach to the quid pro quo concern was simple and logical. It stated that \"[t]he appearance of influence or access, [] will not cause the electorate to lose faith in our democracy\" because our \"democracy is premised on responsiveness\" and a \"substantial and legitimate reason ... to cast a vote for, or to make a contribution to, one candidate over another is that the candidate will respond by producing those political outcomes the supporter favors.\" (75) What the Court highlighted was the idea that Americans would not sit back and tolerate living in total dissatisfaction of the country's direction for long. To get change there must be action, which occurs at the polls.\n\nIt is a common misconception that one result of this ruling was the creation of Super PACs. The creation of Super PACs occurred months following Citizens United. (76) In v. FEC, a federal court held \"the government ha[d] no anti-corruption interest in limiting contributions to an independent group,\" when a nonprofit group intended to expressly advocate the election or defeat of a federal candidate. (77) Additionally, the limit preventing a contributor from donating in excess and the group being unable to accept donations in excess of the limit is unconstitutional. (78) Thus, a new political action committee was born, known technically as an independent expenditure-only group. (79)\n\nC. McCutcheon Attempts to Even the Score for Individuals, Candidates and National Parties\n\nA mere four years later, the Supreme Court found itself at another crossroads with campaign finance reform. This time, in McCutcheon v. FEC, (80) the Court was presented with the issue of whether or not the aggregate limits established in the FECA were restrictive on an individual's First Amendment rights. The Court held, \"[t]he aggregate limits on contributions do not further the only governmental interest this Court accepted as legitimate in Buckley, (81) \"They instead intrude[d] without justification on a citizen's ability to exercise 'the most fundamental First Amendment activities.'\" (82) The Court reasoned that the \"limits den[ied] the individual all ability to exercise his expressive and associational rights by contributing to someone who will advocate for his policy preferences.\" (83) Put simply, \"[a] donor must limit the number of candidates he supports, and may have to choose which of several policy concerns he will advance\" before he reaches the aggregate limit. (84) The actual effects of the McCutcheon (85) ruling cannot be determined just yet. It would take at least another midterm election to have a stronger sense of if, and how, donors' contribution patterns will change without the restriction of aggregate limits. In perspective, it has been impossible for any effects to be directly attributed to Citizens United (86) in the five years since that ruling.\n\nD. Contribution Limits--The Shield and Sword of Fundraising\n\nThere are two distinct types of contribution limits. Aggregate limits restrict the total amount of money a donor may contribute to all candidates or committees, to the extent permitted by the base limits. (87) Base limits restrict how much money a donor can contribute to any particular candidate or committee. (88)\n\nPrior to 2014, an individual was limited in how much he or she may contribute to a candidate, national committee, state, or local committee. For the 2011-2012 election cycle, the contribution limits for an individual were: $2,500 to each candidate committee per election; $30,800 to a national party committee per calendar year; $10,000 combined limit to a state, district, and local party per calendar year; and $5,000 to any other political committee per calendar year. (89) The special limits in place were: $117,000 overall biennial limit; $46,200 to all candidates; and $70,800 to all PACs and parties. (90) These limits have been raised during each election cycle since 2000, because every two years the FEC updates certain limits to account for inflation, such as those to candidates and party committees. (91)\n\nFor the 2013-2014 election cycle, the contribution limits for an individual were: $2,600 to each candidate committee per election; $32,400 to a national party committee per calendar year; $10,000 combined limit to a state, district, and local party per calendar year; and $5,000 to any other political committee per calendar year. (92) The special limits were: $123,200 overall biennial limit; $48,600 to all candidates; and $74,600 to all PACs and parties. (93) Those special limits were no longer in effect on April 2, 2014 when the Court ruled in the McCutcheon case that the aggregate limits were unconstitutional. (94) Therefore, individuals no longer had to abide by the overall cap on how much they could contribute in an election cycle. Now, contributors may give to as many candidates and committees as they wish within the merits. (95)\n\nOne example of this scenario was in McCutcheon; the plaintiff Shaun McCutcheon was prohibited from contributing to all of the political entities he desired due to the aggregate limits. (96) McCutcheon contributed a total of $33,088 to sixteen different federal candidates in the 2011-2012 cycle, complying with the base limits applicable to each. (97) McCutcheon wanted to contribute his standard donation of $1,776 to twelve additional candidates each; however, he was prevented from doing so by the candidate aggregate limit. (98) He additionally contributed $27,328 to several non-candidate political committees, again complying with the base limits. He further wished to contribute to additional political committees, including $25,000 to each of the three Republican national party committees, but was again held back by the aggregate limits to political committees. (99) He intended to make his similar signature contributions in the future of at least $60,000 to various candidates and $75,000 to non-candidate political committees. (100)\n\nThe most expensive midterm election in history was the 2014 cycle, costing $3.77 billion. (101) Comparatively, the 2010 midterm election cost $3.63 billion--a margin of $140 million. (102) One of the most notable differences between these two midterms is the shift toward fewer identifiable (103) donors giving more money to candidates, parties, and outside groups. (104) In 2010, the Center for Responsive Politics (CRP) was able to identify 869,602 donors. (105) In 2014, CRP was only able to identify 773,582 donors, representing a decline of 96,020 or eleven percent. (106) As for the increase in contribution size, the 2010 average was $1,936 versus the 2014 average of $2,639. These figures may not be so startling because they are midterm elections and most Americans are more likely to recall the 2012 general election where the cost was $6.28 billion. (107) The significance of these elections is the smaller amount of donors accounting for a larger percentage of the total contributions overall. Again using the 2012 general election for comparison, there were 1,255,354 identifiable donors contributing to candidates, parties, and PACs. (108) By census data, the estimated United States population for 2011-2012 was 310,823,152, meaning that 0.4% of the population contributed over $200, and of that 0.4%, 0.08% contributed amounts of $2,500 or greater. (109) To put those figures into perspective, the 0.4% of the population who contributed over $200 accounted for 63.5% of the total money contributed overall in 2012. (110) These mega donors returned in 2014 with even more generous contributions. \"Out of about 310 million Americans, ... just 0.21% gave $200 or more, and 0.04% gave $2,600 or more.\" (111) There were 31,976 identifiable donors, who by metric of the United States population are equal to about one percent of one percent of the total population, who were responsible for an unprecedented $1.18 billion in disclosed federal contributions. (112)\n\nIII. The Methods and Implications of Fundraising Following McCutcheon\n\nThere are various types of entities that exist to fundraise for elections, and most have been around for quite some time. However, the development of FECA, BCRA, and the McConnell, (113) Citizens United, (114) and McCutcheon (115) decisions have shaped the circumstances surrounding legal fundraising. Below are the types of entities most affected by McCutcheon, (116) a short description of their function, purpose, and finally, how they are a part of the overall system.\n\nA. Candidates and National Party Committees\n\nFollowing BCRA and McConnell, (117) outside groups experienced a flood of money that enhanced their ability to run effective campaigns for and against candidates. The role of the parties, presence, and strength entered into a period of decline. Even considering the variances between midterm and general elections, exact figures are rather impossible to trace because the majority of the money contributed was to outside groups who do not disclose such data. During the period between the enactment of BCRA and the decision in McCutcheon, (118) the parties were not able to collect any soft money contributions like before but now had to make up that loss by collecting hard money contributions, subject to the aggregate limits. (119) The 2004 election cycle proved successful for the parties when they raised $ 1.5 billion in hard money, more than the $1.1 billion they had raised in both hard and soft money combined before BCRA. (120) Despite that, the national parties watched their income fall from $1.48 billion in the 2002 midterm to $1.23 billion in the 2010 midterm, which is a seventeen percent decline. (121) Unfortunately, the rapid pace of growth in outside-group spending was becoming more difficult for the parties to keep up with causing loss of ground. The non-party spending increase after Citizens United (122) provided proof. (123)\n\nThe result of a capped income stream to the parties was incremental \"outsourcing\" of traditional party functions to outside groups--such as advertising, get-out-the-vote, list management, etc. Prior to BCRA, in 2000, both national parties accounted for \"two-thirds of all advertisements in the presidential general election.\" (124) After BCRA, in 2004, that share of the market dropped to one-third and in 2008, less than one-fourth. (125) Finally, by 2012, a mere six percent of all advertisements were by the parties. (126) The redirection of these funds began to supply the outside groups with the infrastructure needed to amass the political power they wield today.\n\nReince Priebus, Chairman of the Republican National Committee, stated, \"[W]hat the campaign finance laws have done is put party committees in a place where we have the most restriction, the most disclosure, and we can raise the least amount.... Whereas after all these laws ... what[] [has] happened is the groups that can raise the most disclose the least.\" (127) McCutcheon (128) allows candidates and national party committees to position themselves to where they were before BCRA caused a substantial blow to their funding. Donors are able to \"contribute more to the party organizations at the national, state and local levels.\" (129) Candidates and party committees are now going to be able to compete with outside groups for greater contributions from megadonors. Since donors are no longer restricted by an aggregate total, candidates and parties will likely see growth in the number of base limit donations. Thus, attributable growth is coming from an increase in the number of donors giving a flat amount, not the number of donors giving more money. Additionally, these funds are subject to disclosure through the FEC.\n\nB. Super Political Action Committees (PACs)\n\nThe Super PAC is considered an independent expenditure-only committee. Essentially, they \"raise unlimited sums of money from corporations, unions, associations and individuals,\" and \"then spend unlimited sums to overtly advocate for or against political candidates.\" (130) The goals of most Super PACs are very distinguishable from the traditional PACs. Common goals include: \"win the close races,\" \"win control of the majority,\" and \"help set a basic frame for the public agenda.\" (131) Additionally, there is \"rarely any concern for maintaining a relationship with the other side.\" (132) These groups \"are prohibited from donating money directly to political candidates\" but are required to report their donors to the FEC monthly or semiannually during non-election years, and monthly during election years. (133)\n\nDue to such negative public discourse regarding Super PACs and the exposure to an overwhelming amount of negative television commercials and radio spots, Americans likely misidentify these types of groups more easily than others. Rather than pay attention to the actual self-identification at the end of each commercial (or attack ad if you will), people largely focus on the type of content and automatically assume it is a Super PAC.\n\nSuper PACs receive the most criticism because they are one of the most powerful groups of all entities available to support campaign fundraising. The access to virtually unlimited financing and spending allowances makes for a very powerful, effective, and results-oriented campaign. Outside groups (excluding party committees) have spent $561.1 million in the 2014 election cycle, (134) $548.9 million of which was spent on independent expenditures. (135) Based on FEC data, as of December 3, 2015, 1,360 groups organized as Super PACs have reported total receipts of $696,011,919 and total independent expenditures of $345,117,042 as of December 3, 2015. (136)\n\nThe most significant impact McCutcheon (137) will have on Super PACs is that it will open up the playing field for other groups to emerge and attempt to compete in the money race. The elimination of the aggregate limits allows donors to cut larger checks to other groups, such as JFCs, to disperse and support their beneficiaries, but still subject to the base limits of each participant. While more money is now able to enter the system, giving the impression of greater abuse and risk for corruption, the consolation is disclosure of the donors' identification.\n\nC. 501(c) Organizations--\"Dark Money\"\n\nNonprofit 501(c) organizations have provided wealthy donors, with few exceptions, a safe haven for maintaining their anonymity when making political contributions. Among these nonprofit groups, certain types are sheltered by \"the inherent limitations of the tax law\" and have \"led to an unprecedented lack of political transparency\" following Citizens United, (138) These groups include those organized under [section] 501(c)(4) as social welfare organizations (e.g., NRA, Crossroads GPS), [section] 501(c)(5) unions, and [section] 501(c)(6) trade associations (e.g., United States Chamber of Commerce). (139) These organizations have been heavily criticized as \"fake nonprofit organizations whose only purpose is to influence elections.\" (140) Political groups claiming this status have been spending hundreds of millions of dollars to influence elections, when the primary purpose of 501(c)(4) groups is to promote social welfare. (141) In the grand scheme of things, donors to these groups (142)--those who collect \"dark money\"--are not disclosed, regardless of the amount of their contribution. These groups will remain anonymous as long as they do not have as their \"primary activity\" (up to forty-nine percent of all activity), participation/expenditures for \"political campaigns on behalf of or in opposition to any candidate for public office.\" (143)\n\nThese organizations receive unlimited amounts of money from corporations, individuals, and unions and are all subject to different disclosure requirements. The spending by these organizations, funded most often by anonymous donors, has \"increased from less than $5.2 million in 2006 to well over $300 million in the 2012 presidential cycle.\" (144) In the 2014 midterm elections, these organizations spent more than $174 million. (145) The disclosure figures break down to the following: 30.8% undisclosed, 9.4% partially disclosed, and 59.8% fully disclosed. (146)\n\nThe problem with these organizations existed prior to the McCutcheon (147) decision. Since the organizations are established in tax law, they are subject to regulation by the Internal Revenue Service (IRS), not the FEC. (148) To correct the inherent flaws within the language regulating these organizations, an overhaul to the relevant section of the Internal Revenue Code would be required. Either a bright-line rule could be established or the 501(c)(4) language may be re-written to distinguish a true nonprofit acting with the primary purpose of social welfare, from a nonprofit running as a front conducting primarily political activity. Until the IRS is able to establish and implement better procedures and rules to conduct oversight of these groups, the \"dark money\" will continue to pour in anonymously. Prior to the IRS' brazen attempt to investigate nonprofit groups (149) seeking tax-exempt status using inappropriate criteria that type of reform may have been possible. Following the Be On The Lookout (BOLO) list scandal and reorganization of the IRS Exempt Organizations division, it is unlikely that there will be a change to the tax code anytime soon. The implementation of new tax-exempt determination criteria for applicants that proves successful would likely alleviate some of the public distrust, but ultimately will not resolve the existing dark money scheme.\n\nMcCutcheon (150) will have very little--or potentially no--impact on 501(c) organizations. The elimination of aggregate limits will not allow individual donors, nor other fundraising entities, to even come close to competing with these organizations monetarily. Critics of McCutcheon (151) are worried about a donor cutting a check to an entity like a JFC (hypothetically when all parties and candidates are combined in one and allowing a $3.6 million contribution (152)) that has full disclosure requirements and is calculated by all of those base limits added together. Whereas here, a single donor could give tens or a hundred million dollars to a 501(c)(4) and no one would ever know.\n\nD. Joint Fundraising Committees (JFCs)\n\nJFCs were used as a fundraising vehicle prior to the McCutcheon (153) decision; however, they were not very popular due to the aggregate limits that capped donor contributions and the number of recipients to just seven. (154) Following McCutcheon's (155) elimination of those aggregate limits, JFCs have re-emerged in the fundraising scene as potentially the most competitive machine available to candidates and parties for battling outside spending (Super PACs) and nonprofit (501(c)) groups to date.\n\nOne way a JFC can be created is by having two or more candidates, PACs, or party committees join to create one entity, subject to regulation by the FEC and disclosure requirements. (156) The group must then select a representative for itself. (157) This can either be a new or existing committee. Within that entity, allmembers agree to share the costs of fundraising and split the proceeds. (158) Each member of the JFC must create and sign an allocation agreement that is kept between the parties and includes a formula on how to split the proceeds and costs, which is either by a stated amount or a percentage of contributions and fundraising events. (159) The limit contributors may give to a JFC is the \"combined total of limits that apply to each JFC participant.\" (160)\n\nFor example, based on a report released by the FEC on December 31, 2014, the \"Boehner for Speaker Committee\" has been the largest grossing JFC for the 2014 cycle, with receipts of $35,382,857; it raises money for three PACs, two leadership PACs, two party committees, the JFC itself, and one candidate. (161) The maximum check that the JFC may receive would be the per-PAC, per-party committee, and per-candidate base limits combined. Therefore, in this example, the JFC could accept checks of $72,600 per donor: one national party committee at $32,400, plus one state party at $10,000, plus one candidate at $5,200, plus five PACs at $25,000 each. To put that figure into perspective, the top individual donor to JFCs for 2014 contributed $340,200, only $72,600 of that could go to Boehner's JFC. It would take five individual checks from five separate donors to top that highest single donor amount and get that amount to Boehner's JFC.\n\nThe number of active JFCs has grown exponentially over the recent years, from 270 in the 2008 cycle to 523 in 2014. (162) The amount of money raised varies from higher amounts in presidential election years ($509.5 million and $1.1 billion, in 2008 and 2012, respectively) and lower amounts in midterm election years ($92.5 million and $191.2 million, in 2010 and 2014, respectively) but still show exceptional growth among all election cycle series. (163) With the aggregate limits struck down, it is highly likely this platform of fundraising will increase in size and frequency of use. Whether it will develop into the next Super PAC as hypothesized by critics remains to be seen, but Justice Alito dismissed the idea of Super JFCs as \"wild hypotheticals.\" (164) One supporter of the Super JFC, Dan Backer, agrees. Backer, the lead attorney for Shaun McCutcheon, believes it is highly unlikely that a Super JFC will be created. Backer noted that due to the FEC's regulation of this entity, the amount of \"legal paperwork and reporting requirements to link enough candidate[s] and party committees together,\" it is far too burdensome for many groups to take advantage of this vehicle. (165) Backer sets up and works with different types of fundraising entities. He suggests that many fundraisers will not be interested in establishing these Super JFCs due to a \"layer of complexity that is astronomical\" (166) and all of \"[t]he burdens involved and the technical problems\" (167) to correctly operate such an entity. Aside from the hassle of organizing and maintaining a Super JFC, it is unlikely that fundraisers will be able to entice donors to contribute to these entities over others.\n\nIV. Do Not Push Disclosure ... Yet\n\n\"Thomas Jefferson wrote, 'Whenever the people are well-informed, they can be trusted with their own government ... whenever things get so far wrong as to attract their notice, they may be relied on to set them to rights.'\" (168) While public opinion may strongly favor full, across the board disclosure of who is financing candidates, the public cannot ignore the limits both Congress and the courts have in making such things happen. Justice Roberts said in McCutcheon that the Court has made clear \"Congress may not regulate contributions simply to reduce the amount of money in politics, or to restrict the political participation of some in order to enhance the relative influence of others.\" (169) Proponents of reform may have lost sight of such a foundational understanding of the limits of the legislative branch, and in most cases that may be attributed to the fact that their preferred party/candidate/organizations are on the losing end of the money battle in the election cycles.\n\nA. The Dot-Com, Dot-Org, and Dot-Gov Search for Dollars\n\nSpending \"dark money\" raises concerns because of the non-disclosure as to the source of a majority of these funds. The Court in McCutcheon reiterated that \"disclosure of contributions minimizes the potential for abuse of the campaign finance system,\" and they \"are in part 'justified based on a governmental interest in \"providing] the electorate with information\" about the sources of election-related spending.'\" (170) The Court even recognized disclosure as \"a less restrictive alternative to flat bans on certain types or quantities of speech.\" (171) In McCutcheon, Justice Roberts suggested that accessing websites like,, and offer great protection against corruption because these websites have databases and reports, which are available almost immediately after filing. (172) While Justice Roberts's suggestion may be the only practical and expedient method currently available to the public, not all FEC regulated political committee activity must be reported in the same manner. There may be room for improvement on the speed and style of such disclosure for all FEC-regulated committee activities, not just electioneering communication and independent expenditures. Most of the monetary and entity information in this paper was found using the FEC's, OpenSecrets', and Sunlight Foundation's websites. (173) Even though not all types of reports are required to be promptly filed, there is an abundance of information available on these websites. Critics of disclosure should delve into these websites.\n\nThe Real Time Transparency Act of 2014 (174) is the most recent attempt to obtain some type of disclosure of political committees' finances in the most immediate fashion to date. The Act states it was created \"[t]o amend the Federal Election Campaign Act of 1971 to require all political committees to notify the Federal Election Commission within [forty-eight] hours of receiving cumulative contributions of $1,000 or more from any contributor during a calendar year, and for other purposes.\" (175) Additionally, it \"ensure[s] that contributions of $ 1,000 or more to candidates, parties and PACs, including Super PACs, are disclosed within [forty-eight] hours.\" (176) This is a good approach for many reasons. The Act, which was introduced by Senator Angus King, (177) embraces rapid transparency following a midterm election. Americans have access to a multitude of information thanks to the breakthroughs in technology and real time accessibility. There is no lack of infrastructure or knowledge to develop a system that shines light on a greater amount of donor contributions in political fundraising. However, the likelihood of this proposal making it past the committee and to the floor in any chamber anytime soon is unlikely. With a new Congress in control of Washington and a rough-agenda in place, there is limited room (and likely unwillingness) for wagering debate on the very campaign finance system that just got, or kept, these elected officials in office.\n\nThe time between the 2016 and 2020 election cycle would be long enough for legislators to amend the language of the Real Time Transparency Act of 2014, to develop a more concise disclosure method, and to avoid losing a seat in an election year. By that time, the FEC would know what type of system of reporting and releasing that information should be most effective and secure to implement. On that end, the bulk of the work would be put on the FEC to prepare for a change in its FECFile software and networks to support a database of instantly accessible information compared to the traditional viewing of filed reports. The reporting requirements for entities would need to be changed so that all contributions are processed within the forty-eight hour timeframe, compared to the currently quarterly, monthly, and semi-annual reporting. (178) Electronic filing by all committees and individuals, including Senate candidate committees, (179) would be required to ensure that the report clears the FEC and is released to the public on time. The $50,000 threshold (180) for mandatory electronic filing will no longer be necessary and all filing should become electronic without a threshold. These changes, accompanied with a more user-friendly website design and easily accessible information, will be necessary to accommodate the Real Time Transparency Act of 2014.\n\nThe FEC should take care in creating and implementing website changes with taxpayer money. The public confidence in the FEC would fall even more if a similar instance like that of the Affordable Care Act Marketplace Exchange disaster (181) were the end result. The real pressure would then fall on campaigns to adjust processing the contributions intake with a turnaround in forty-eight hours. Furthermore, there would likely be little opposition to the Act because it only requires the FEC to release information on organizations which are already required to disclose amounts and sources more quickly, not on the outside spending or dark money groups. Since officeholders likely receive more money from outside groups, they are not putting themselves at risk of losing that greater support by enacting legislation to report FEC groups.\n\nEssentially, the Real Time Transparency Act of 2014 dictates that the already-required donor disclosures be filed, reported, and accessible much sooner. Is there really a difference in being able to see the source and dollar amount before an election compared to after? Maybe in the case of a brand new candidate running, but more often there are powerful incumbents to overcome with greater war chests. Anyone who would like to know who contributed to a candidate can log on to the FEC website now and see a list of names and a dollar amount ($250 or greater) with a quick search. Applying some simple logic here, if officeholders like Nancy Pelosi or John Boehner are running for reelection, all of the information reformers would demand access to is already readily available on the FEC. Since Nancy Pelosi and John Boehner have been in office for quite some time, they have been able to develop an extensive and well-connected network of donors. They are big-name politicians who attract big dollar donations. One can run searches on both of them and see who has contributed to them. It is highly likely that those donors and their contribution amounts have not changed very much from one election to the next. If the decision to vote for Nancy Pelosi or John Boehner depends on the contributions they have received, what more is needed beyond the contribution history available online?\n\nB. JFCs versus Non-Disclosure Groups\n\nThe use of the JFCs proves that there are wealthy donors willing to contribute the maximum at the risk of exposing their identity and donation amount. In comparing the JFCs with non-disclosure groups, by way of choosing the highest recipient of funds in each group, there is not a large difference in totals for the 2014 cycle. Coming in first for the JFCs is Boehner for Speaker Committee (182) that raised a total of $35,382,857 this cycle. (183) Coming in first for the non-disclosing outside groups was the United States Chamber of Commerce, which raised a total of $35,464,243. (184) The difference is a mere $81,486. On a larger scale, the 2014 cycle totals for all social welfare 501(c)(4) groups was approximately $118.2 million (185) and the JFCs total was approximately $191.2 million. (186) While this only represents a $73 million dollar difference, it may be of concern to donors without anonymity concerns. Additionally, considering that this was only a midterm election year and not a general election year, the values for each are likely less than what can be expected in the future.\n\nThis approach to bringing fundraising power back to the candidates and parties has support from both sides of the aisle. Two relevant examples of this strategy include the JFCs of Senator Kay Hagan (D-NC) and Majority Leader Mitch McConnell (R-KY). Sadie Weiner, spokeswoman for Senator Kay Hagan, said, \"To fight back against the record amount of outside spending against Kay, strong fundraising will be key to getting her message out to voters across North Carolina.\" (187) As for the convenience factor of the JFCs, they are \"a simple way to split the money raised from fundraisers with other members of Congress.\" (188) Senator Hagan was up against a \"$12 million ad blitz leveled by GOP outside groups\" (189) for the midterm elections. She helped launch seventeen JFCs \"that have collectively netted more than $1 million.\" (190) Across the aisle, Senator Majority Leader Mitch McConnell, is a beneficiary in four JFCs \"that have raised $3.4 million between them.\" (191) The partisan line is blurring on this issue, as more candidates and incumbents from both sides see the necessity of the JFC to combat outside groups waging an information war against them, and projecting it toward constituents.\n\nThese outside groups are leveraging well-built campaigns around issues and engaging with voters. Consider, for example, Americans for Prosperity (AFP), (192) an outside group that is competing against candidates and other outside groups for voter's attention. The AFP's make-up is similar to the national party's. However, they differ in spending. \"The organization has more than 500 paid workers in [thirty-five] states\" making it one of the most sophisticated and powerful outside groups. (193) In comparison, the Republican Party had roughly 250 people in the field and 150 people in the D.C. headquarters. (194) The spending power by AFP far surpasses the Republican Party as well. In 2014, AFP spent over $25 million dollars just on television ads, not including any of the other voter outreach initiatives the group uses. (195) Comparing figures like that, it is easy to see how parties and candidates are disadvantaged.\n\nC. McCutcheon Can Lead by Example Via JFCs\n\nThe largest criticism of McCutcheon (196) is that it opens the doors for more money from wealthy donors. The concern with JFCs gaining such enormous funds is the potential for additional concentrated influence and access for mega-donors to Washington. (197) The second largest criticism is that JFCs will evolve into political money machines similar to the Super PAC in the form of \"Super JFCs\" or \"Jumbo Joints.\" (198) The reality of funding posed in McCutcheon's case was, following Citizens United \"individuals, corporations and other entities may give unlimited sums to outside groups that can spend without restriction in support of (or against) a candidate.\" So why not remove the cap on overall direct contributions to candidates and committees? (199) Donors \"of all political persuasions\" are now able to \"provide support to a slate of preferred candidates\" through contributions to both the candidate and the national party. (200) Essentially, this means that there will be a \"larger portion of political giving by way of transparent, fully disclosed contributions\" rather than via \"an outside 501(c)(4) organization [that] might never be disclosed--neither the amount nor the donor.\" (201)\n\nThe FEC published a notice following the McCutcheon decision and asked whether the Commission can or should change its joint fundraising rules to avoid the formation of Super JFCs. (202) The rules regarding circumvention of funds between JFC members do not need to be changed in response to McCutcheon. As written, the current rules well regulate the contributions to JFCs. Once a donor contributes to the JFC, the funds are separated between members based on the allocation agreement, and the rules ensure that the base limits are not exceeded per member. The ability to transfer those funds between committees is essential to the strength of the party committees and candidates. Taking a step back from all of this, hypothetically, partisan donors could battle disclosure without any action by Congress by simply deciding to make their large donation to a party committee, candidate, or JFC. Essentially, the JFC mechanism will become the self-correcting remedy to a portion of the disclosure problem in the current system. Encouraging fully transparent contributions in a billion-dollar industry should be embraced and not limited by any means.\n\nTo illustrate, imagine that in the next election Cody Candidate is up for reelection in Pennsylvania. He decides to set up a JFC to assist his campaign efforts, the Cody Victory Fund. The members include his campaign, the National Republican Congressional Committee, the Republican Party of Pennsylvania, South Carolina, Kentucky, and North Dakota, along with his leadership PAC, and five additional PACs. In total, that JFC can raise $107,600 from a single donor. The representative is the Cody Victory Fund committee. Each member creates an allocation agreement with the representative, according to an agreed upon formula for the distribution of the funds and costs. Dee Donor is a mega-donor who contributes to Republicans and various issue oriented groups. Dee Donor likes what Cody Candidate has done so far in office. He supports many of the issues she cares about, has a voting record to match what his constituents want, and he faces a tough race ahead against his challenger. Dee Donor cuts a check for $ 107,600 to the Cody Victory Fund. That check is then distributed between each of the members according to the allocation agreement.\n\nBy contributing the total amount possible, Dee Donor has met her base limit contribution to each of those committee members and cannot contribute any additional money to those committees. She may still contribute more money in the election, but it will have to be to other entities. The Cody Victory Fund will submit its report to the FEC and include that Dee Donor was a contributor who gave $107,600. From there, the party committees that are in the JFC are permitted to transfer funds between each other. With no major races occurring in South Carolina, Kentucky, or North Dakota, those state parties do not need all the money they have received from being a part of the Cody Victory Fund. Depending on the allocation agreement between these members, they may transfer the funds distributed to the Republican Party of Pennsylvania, that supports Cody Candidate. This will assist the party committee with advertising and get-out-the-vote initiatives to combat with the many Super PACs and dark money groups, which spend millions of dollars in attack ads against Cody Candidate.\n\nCritics and the Supreme Court have raised the issue of this type of circumvention of funds between the party committees. (203) Once Dee Donor gives her check to the Cody Victory Fund, her association with her contribution ends. What those members do with the distribution they receive from the JFC is up to them. The transfer of funds from members to other political entities is not a circumvention of base limits, because the source of the funds is from the member and not traceable back to each individual donor. Dee Donor does not know where her contribution goes after the check is given to the Cody Victory Fund--unless she specifically indicates what members are allowed to receive a portion of the funds. It is impossible to track that type of information, and a transfer hardly creates the appearance of corruption because the initial source has been identified and the money (subject to regulations requiring the most transparency) has since been diluted to various groups. Alternatively, without the Cody Victory Fund, Dee Donor would have been able to contribute to Cody Candidate alone, each party alone, and to outside groups. The $107,400 that she contributed could have gone to a 501(c)(4) organization and never have been disclosed. If there were a larger JFC offered for Dee Donor to contribute to, she would have likely given a larger check. If there were a JFC with all candidates and parties linked together, Dee Donor could have given a check for $3.6 million, which would have put her at her base limit for each member, and her contribution subject to full disclosure and dilution. A donation of $3.6 million is rather sizeable. This would leave Dee Donor willing to contribute less and would put less money into an unaccounted 501(c)(4) dark money scheme.\n\nIn theory, there may be mega-donors who are willing to contribute to the party committees and candidates at the cost of full disclosure. They are likely supporting a party because of the ideas and platform central to the party's existence. If a donor is willing to contribute to a JFC at that risk, and other donors begin to take notice and flock towards making JFC contributions, they could set the tone that anonymity is neither necessary nor desirable to hide behind anymore. In time, the case for disclosure could be made, but not now. After another election cycle, another push for the Real Time Transparency Act could be made, likely with amended language. Why wait? The more time the idea of fellow mega-donors willingly disclosing themselves through JFCs has to spread, the more bearable removing non-disclosure from other groups will be for other mega-donors.\n\nAs for outside spending groups, specifically the 501(c)(4) groups, which remain completely undisclosed and do not advocate for or against a specific candidate, do not expect a change soon. Donors and mega-donors have given these groups unprecedented amounts of money, for the most part due to shared personal beliefs and values. The cloak of confidentiality, that comes with choosing to put your money behind one of these groups, is an additional perk and benefit of advocating for issues dear to the contributor.\n\nFor the proponents of reform who demand disclosure so that the American citizens can arm themselves with all the information needed to cast a vote, donors are merely hiding behind issues and supporting candidates who value the same ideals. If the donor identity is revealed and known, is the proponent casting his vote based on the candidate and issue or the donor? The voter can be influenced on an issue, and the voter should be exposed to advocacy for that issue, in an attempt to persuade the voter to choose a candidate who is or is not on the same page as them for that issue. By throwing the identity of the donors into the mix, voters will then know that Person X contributed, $150,000 to this candidate, and the issue becomes more complex. The voter will no longer simply be voting based on the issues or the candidate, but also on the third parties making this possible. The appearance of corruption, on its face, is greater if we associate a candidate with his donor, rather than associating a candidate with an advocacy group for issues the candidate supports. The value of a donor's anonymity is priceless. The association with a party and candidate could be more detrimental than association with a group that supports free markets for mega-donors concerned about privacy and backlash toward themselves, their families, or their companies. Allowing the JFC model of fundraising to work itself out in the next cycle, namely, one that is a general election, will not only provide indicators of what mega-donors are willing to do but also indicate the effect of the McCutcheon decision and proving whether or not some degree of power has been restored to the parties.\n\nD. Voluntary Disclosure--Why Donors Do It\n\nA relevant example to support the theory of voluntary self-disclosure that is likely to occur under McCutcheon (204) is United States companies who have taken the lead in creating greater transparency and accountability about their influence on the American political system. The Center for Political Accountability-Zicklin Index (CPA-Zicklin Index) profiles the top companies in the S&P 500 Index and their policies on political spending disclosure. (205) These businesses have increasingly shown \"they want to conduct political activity in the open, where shareholders, directors and managers all can assess the risks and benefits of a company's political spending.\" (206) These companies are among those \"leading the way in adopting disclosure voluntarily because they understand the perils of secret political money.\" (207) Companies have weighed the risk of providing such transparency to the public versus the potential damage to their reputation; for politicians to shake down a company; and potential chance that a company will lose control over an \"outsourced\" payment that ends up supporting political activity in conflict with the company's values or business objectives. (208) Hardly dismissive is the fact that all of the undisclosed political funding by companies \"threatens market openness,\" which, those disciplined in economics know, is a \"prerequisite for a dynamic growing economy.\" (209)\n\nOf the companies included in the CPA-Zicklin Index, 128 have adopted \"the political disclosure and accountability model proposed by the CPA and its shareholder partners.\" (210) Many other companies have adopted similar policies voluntarily, without being engaged by their shareholders or shareholder agreements. (211) Of the 299 companies surveyed in the 2014 CPA-Zicklin Index, forty-four percent disclosed some information about contributions to candidates, parties, and committees; almost forty-three percent disclosed some information about contributions to 527 organizations; forty-three percent disclosed information about payments to trade associations; forty percent disclosed \"information about their payments to intervene in ballot measures\"; twenty-seven percent disclosed information about independent expenditures; and twenty-four percent disclosed some information about payments to 501(c)(4) organizations. (212) These leading companies have \"expanded the scope of their political spending disclosure and accountability\" over the years since the CPA-Zicklin Index began collecting data in 2003. (213) Now, these leading companies are putting pressure on and thus incentivising other companies to follow suit. The 2014 CPA-Zicklin Index has shown \"a significant [increase in the] number of publicly held companies voluntarily turning to transparency and accountability practices for their political spending without shareholder engagement or shareholder agreements.\" (214)\n\nThe effect of McCutcheon (215) will not influence companies and their contributions to political organizations. It was Citizens United (216) that brought on the steady increase of corporate money and allowed corporations to decide what to do with their treasury funds to influence federal elections. (217) However, the CPA-Zicklin Index provides an analysis of companies, and based on the recent campaign finance climate of \"hidden spending\" and \"secret conduits\" for contributions, how they respond to the need for disclosure. (218) The willingness of these companies to voluntarily disclose their policies on political spending is one way to ease individuals into the idea of disclosing themselves as well. Companies would be more likely to disclose their information, in order to avoid any backlash and to maintain a positive image. More companies should provide more transparency in such political contributions. However, the benefit here is that there is a functional model developing that provides \"the kind of governance mechanism that the Supreme Court has suggested as an antidote to political corruption.\" (219) As evidenced by the increasing number of companies added to the CPA-Zicklin Index each year, the number of improved rankings, and the voluntary participation of these companies, this model works. (220)\n\nAs they flood the campaign system with millions of dollars, mega-donor individuals become less willing to disclose their identities. (221) That is not to say that they will forever remain hidden behind their 'dark money' scheme. The Koch brothers, Charles and David, possibly the most well-known figures in the campaign finance world, have amassed a political network essentially capable of raising and funneling money through just about every type of organization available to contributors. (222) For the first time, the Koch brothers have created a Super PAC capable of generating specific political ads supporting particular candidates rather than their typical issue-oriented ads used in prior years. (223) The creation of this Super PAC, the Freedom Partners Action Fund, has been successful with donors and quickly surpassed its fundraising goals for the 2014-midterm elections. (224) The catch with setting up this type of organization within the Koch network is that all donors would be publicly identified as contributors to the Super PAC. It is a common misconception that the Koch brothers are the sole financers of their network, yet there are hundreds of donors involved in the organization. (225) From the Freedom Partners Action Fund's establishment in June through the end of September in 2014, \"roughly 650 donors combined to contribute [] more than $15 million\" to the Super PAC. (226) Donors to this Super PAC have even come forward in support of the Koch brothers and explained why they contributed to the Super PAC risking disclosure of their identity.\n\nStanley Hubbard, a billionaire Minnesota media mogul, urged fellow donors, including the Koch brothers \"to become more open with their views and political spending.\" (227) He stated, \"[Y]ou should stand up for what you believe in and hope that others will follow, or [they will] at least talk to you about it.... We have never been people who are afraid to say here [is] what we believe in.\" (228) Ronnie Cameron, donated $1 million to the Freedom Partners Action Fund. (229) Why? He \"decided that it was more important to support it than it was to maintain [his] privacy.\" (230) Although, he did admit to carefully considering the effects of the publicity balanced with his desire to keep his name out of things. (231) To show solidarity with the Koch brothers, Cameron said, \"[t]here are hundreds of people like me that are joining what they do. And their part is a great part but the biggest part they play is kind of bringing the people together and educating them as to [what is] going on and what the need is.\" (232) This strategic, yet open, allocation of funds has proven to effectuate key political wins. These donors support and are genuinely engaged in the cause wholeheartedly. These mega donors are rich, but, contrary to popular belief, they are not stupid. \"They will not irrationally give money to candidates they [do not] know, or [do not] agree with or who [do not] have a chance of winning or who [do not] need the money or who may not even be in contested races.\" (233)\n\n\nMoney will never part from elections and will remain the primary vehicle required for any successful campaign. Campaign finance reform efforts will never end. America will eventually enter a juncture where any further reform would be so detrimental that it is better to propose and pass legislation in Congress that has effective and fair substance, rather than taking another stab at what remains of the system. A Super JFC could, in the not so distant future, make the case for dismantling anti-disclosure in campaign finance. Congress could start slow and pass the Real Time Transparency Act without much opposition. Once the party committees and candidates experienced greater cash flow to their individual efforts, Congress would likely be less deterred to expose dark money because of the lightened dependency factor. Allowing JFCs to expand and transfer money between committees, subject to the most transparency and regulation, is essential to restoring the public's trust in our political system--bringing constituents to the center, promoting moderate and electable candidates with high accountability to the party values.\n\nIt is also worth mentioning that, based on party lines, Republicans typically favor deregulating campaign finance for the sake of freedom of political speech. Conversely, Democrats typically favor attempting to restore rules to protect the people. In the 2012 general election, candidate Mitt Romney's overall spending tab was $1,238,097,161 and President Barack Obama's overall spending tab was $1,107,114,702; the difference, $130,982,459. (234) The end result was the candidate with the larger war chest of money at his disposal was the losing candidate. So, does more money really mean success in campaigns? It is hard to tell. However, what does guarantee success in a bid for office is voter turnout.\n\nOne of the most logical sentences in the Citizens United opinion was \"[t]he fact that a corporation, or any other speaker, is willing to spend money to try to persuade voters presupposes that the people have the ultimate influence over elected officials.\" (235) This underscored the premise that the power of vote is greater than the power of contribution money. Clearly, the Supreme Court has acknowledged that the original, most powerful, and essential way to get results in an election is getting voters to the polls. Would it really matter if voters knew the identity of the candidate's sugar daddy? More importantly, if a voter should have instant access to the identities of those who are financing these campaigns, he should equally have the audacity to research his candidates before voting to know what he really stands for, disclosure or not, instead of relying on advertisements to bear the truth. America does not have a \"Koch Problem.\" In typical American fashion, it is easier for voters to blame their ignorance on having that \"problem\" rather than actually being responsible and informed voters above the fray. The bottom line is that candidates win when citizens vote, while money only gets the horse to the race. Petra A. Mangini ([dagger])\n\n([dagger]) Ave Maria School of Law, Juris Doctor Candidate (2016); West Virginia Wesleyan College, Bachelor of Science (2011). I would like to thank bureaucracy and the millions of dollars spent that made this Note possible. I must thank my family for their unconditional love, unending encouragement and support in all of the things that I do.\n\n(1.) \"[T]he political and social world of Washington, D.C.\" encircled by \"Interstate 495.\" Beltway, Memidex, (last visited Oct. 11, 2015).\n\n(2.) Breakfast and Policy Discussion for Scott Walker, PoliticalPartyTime, http://politicalparty (last visited Oct. 9, 2015).\n\n(3.) Cocktail Reception for PAC to the Future (Nancy Pelosi), PoliticalPartyTime, http://political (last visited Oct. 9, 2015).\n\n(4.) Pirates Spring Training for Bob Casey, PoliticalPartyTime, party/38464 (last visited Oct. 9, 2015).\n\n(5.) Annual Family Spring Ski Fling Weekend, PoliticalPartyTime, party/37570 (last visited Oct. 9,2015).\n\n(6.) Taylor Swift Concert for Heartland Values PAC (John Thune), PoliticalPartyTime, http:// (last visited Oct. 19, 2015).\n\n(7.) Beyonce Concert for Pete Sessions, PoliticalPartyTime, 36272 (last visited Oct. 9,2015).\n\n(8.) See Annual Family Spring Ski Fling Weekend, supra note 5.\n\n(9.) Dinner for Mark Rubio, PoliticalPartyTime, (last visited Oct. 19,2015).\n\n(10.) Reception for Democratic Senate Campaign Fund House Majority Project, PoliticalParty Time, (last visited Oct. 9, 2015).\n\n(11.) Hold the rancorous comments, it is merely a conception of inclusion to usher satisfaction.\n\n(12.) Conversation with Hillary for Hillary for America, PoliticalPartyTime, http://politicalparty (last visited Oct. 9,2015).\n\n(13.) The Year in Party Time, PoliticalPartyTime, (last visited Oct. 9, 2015).\n\n(14.) Senate of the United States: Calendar of Business, U.S. GOV'T PUB. OFF. (Dec. 16, 2014), http://www.gpo.gOv/fdsys/pkg/CCAL-113scal-2014-12-16/pdf/ CCAL-113scal-2014-12-16-pt0.pdf#5.\n\n(15.) House of Representatives of the United States, U.S. Gov't Pub. Off., pkg/CCAL-113hcal-S2/pdf/CCAL-l 13hcal-S2-pt22.pdf (last visited Oct. 9, 2015).\n\n(16.) Senate of the United States: Calendar of Business, supra note 14.\n\n(17.) House of Representatives of the United States, supra note 15.\n\n(18.) Anna Stolley Persky, Politics, Money, and the End of Campaign Finance Reform, washington Law (Sept. 2014), washington-lawyer/articles/september2014-campaign-finance.cfm.\n\n(19.) See discussion infra Parts I, II.\n\n(20.) Sunlight Foundation, (@SunFoundation), twitter (July 11,2015,4:30 PM), sunfoundation/status/620012195573661696.\n\n(21.) See Buckley v. Valeo, 424 U.S. 1 (1976).\n\n(22.) Bipartisan Campaign Reform Act of 2002, Pub. L. No. 107-155, 116 Stat. 81 (codified as amended in scattered sections of 52 U.S.C.).\n\n(23.) See McConnell v. FEC, 540 U.S. 93 (2003).\n\n(24.) See Citizens United v. FEC, 558 U.S. 310 (2010).\n\n(25.) See McCutcheon v. FEC, 134 S. Ct. 1434 (2014).\n\n(26.) See McConnell v. FEC, 540 U.S. 93 (2003).\n\n(27.) See Citizens United v. FEC, 558 U.S. 310 (2010).\n\n(28.) See McCutcheon v. FEC, 134 S. Ct. 1434 (2014).\n\n(29.) See McConnell v. FEC, 540 U.S. 93 (2003).\n\n(30.) See Citizens United v. FEC, 558 U.S. 310 (2010).\n\n(31.) See McCutcheon v. FEC, 134 S. Ct. 1434 (2014).\n\n(32.) Real Time Transparency Act of 2014, H.R. 4442, 113th Cong. (2014).\n\n(33.) See McCutcheon v. FEC, 134 S. Ct. 1434 (2014).\n\n(34.) Persky, supra note 18.\n\n(35.) Id. (The Naval Appropriations Bill was the first substantive campaign finance law, \"which made it illegal for government officials to demand donations in so-called shakedowns of naval yard workers.\").\n\n(36.) Id. FECA repealed the Federal Corrupt Practices Act (FCPA) that was enacted in 1910 that created \"campaign spending limits for political parties in general elections for the U.S. House of Representatives. A year later, the bill was expanded to include the similar spending restrictions on U.S. Senate and primary elections.\" Id. The FCPA expanded upon the Tillman Act of 1907, \"which made it illegal for corporations and national banks to contribute to federal candidates.\" Id.\n\n(37.) Id. See also Watergate Scandal, HISTORY.COM, (last visited Oct. 9, 2015).\n\n(38.) Persky, supra note 18.\n\n(39.) Id.\n\n(40.) Id.\n\n(41.) Buckley, 424 U.S. at 14-15.\n\n(42.) Id.\n\n(43.) Id. at 20-21.\n\n(44.) Id. at 19.\n\n(45.) Id.\n\n(46.) Id.\n\n(47.) Id. at 58-59.\n\n\n(49.) McConnell, 540 U.S. at 129 (explaining that soft money, or nonfederal money, is that which is used by political parties for activities intended to influence state or local elections and are not bound to FECA requirements and prohibitions).\n\n(50.) Id. (quoting S. rep. NO. 105-167, at 4611 (1998); S. Rep. No. 105-167, at 7515).\n\n(51.) McConnell, 540 U.S. at 133 (citing FECA [section] 323(a)).\n\n(52.) McConnell, 540 U.S. at 133-34 (citing FECA [section] 323(f)).\n\n(53.) McConnell, 540 U.S. at 134 (citing FECA [section] 323(e)).\n\n(54.) McConnell, 540 U.S. at 224 (upholding the control of soft money and the regulation of electioneering communications).\n\n(55.) See McConnell v. FEC. 540 U.S. 93 (2003).\n\n(56.) Id. at 153-54 (alteration in original).\n\n(57.) Id. at 130.\n\n(58.) Id.\n\n(59.) Id. at 153.\n\n(60.) Id.\n\n(61.) Id.\n\n(62.) Id.\n\n(63.) See generally Thomas B. Edsall, The Value of Political Corruption, N.Y. Times (Aug. 5, 2014), thomas-edsall-the-value-of-political-corruption.html?_r=0 (\"From 2006 to 2013, the percentage of Americans convinced that corruption was 'widespread throughout the government in this country' grew from 59 to 79 percent, according to Gallup.\").\n\n(64.) See McConnell v. FEC, 540 U.S. 93 (2003).\n\n(65.) Id. at 138.\n\n(66.) Id. at 140.\n\n(67.) See McConnell v. FEC, 540 U.S. 93 (2003).\n\n(68.) Jeffrey Rosen, Ruth Bader Ginsburg Is an American Hero, The New Republic (Sept. 28,2014), http://www.newrepublie.eom/article/119578/ruth-bader-ginsburg-interview -retirement-feminists-jazzer cise (stating in an interview published in the new Republic in September 2014, Supreme Court Justice Ruth Bader Ginsburg expressed her extreme regret over several rulings by the current Court, the first decision she would overrule would be Citizens United, stating: \"I think the notion that we have all the democracy that money can buy strays so far from what our democracy is supposed to be.\").\n\n(69.) See McConnell v. FEC, 540 U.S. 93 (2003).\n\n(70.) See Citizens United v. FEC, 558 U.S. 310 (2010).\n\n(71.) Id.\n\n(72.) Austin v. Michigan State Chamber of Commerce, 494 U.S. 652 (1990). It was overruled here because it \"interferes with the 'open marketplace' of ideas protected by the First Amendment.\" Citizens United, 588 U.S. at 354. It \"permitted] the Government to ban the political speech of millions of associations of citizens\" that best represent to most significant segments of the economy, all types of corporations. Id.\n\n(73.) See Austin v. Michigan State Chamber of Commerce, 494 U.S. 652 (1990).\n\n(74.) Citizens United, 558 U.S. at 347, 360,365 (alteration in original) (\"By definition, an independent expenditure is political speech presented to the electorate that is not coordinated with a candidate.\").\n\n(75.) Id. at 359-60.\n\n(76.) See Citizens United v. FEC, 558 U.S. 310 (2010).\n\n(77.) Ongoing Litigation v. FEC, Fed. Election Committee, law/Iitigation/speechnow.shtml#sc_related_docs (last visited Oct. 11, 2015) (alteration in original).\n\n(78.) Id.\n\n(79.) See infra Part III.B.\n\n(80.) See McCutcheon v. FEC, 134 S. Ct. 1434 (2014).\n\n(81.) See Buckley v. Valeo, 424 U.S. 1 (1976).\n\n(82.) Id. at 1462.\n\n(83.) Id. at 1448.\n\n(84.) Id.\n\n(85.) See McCutcheon v. FEC, 134 S. Ct. 1434 (2014).\n\n(86.) See Citizens United v. FEC, 558 U.S. 310 (2010).\n\n(87.) 2 U.S.C. [section] 441a(a)(3); McCutcheon, 134 S. Ct. at 1442.\n\n(88.) 2 U.S.C. [section] 441 a(a)(1); McCutcheon, 134 S. Ct. at 1442.\n\n(89.) Campaign Contribution Limits. OpenSecreTS.ORG, limits.php (last visited Oct. 8,2015).\n\n(90.) Id.\n\n(91.) 2014 Campaign Contribution Limits. OpenSecrets.ORG, view/limits/php (last visited Oct. 8, 2015).\n\n(92.) Id.\n\n(93.) Bob Biersack, McCutcheon Decision: Add Some More Zeroes to That Check, OpenSecrets.ORG (Apr. 2, 2014),\n\n(94.) McCutcheon v. FEC, 134 S. Ct. 1434, 1442 (2014).\n\n(95.) Biersack, supra note 93.\n\n(96.) See McCutcheon v. FEC, 134 S. Ct. 1434 (2014).\n\n(97.) Id. at 1443.\n\n(98.) Id.\n\n(99.) Id.\n\n(100.) Id.\n\n(101.) Russ Choma, Final Tally: 2014's Midterm Was Most Expensive, with Fewer Donors, OPEN SECRETS.ORG (Feb. 18, 2015), final-tally-2014s-midterm-wasmost-expensive-with-fewer-donors [hereinafter Final Tally],\n\n(102.) Overall Spending Inches Up in 2014: Megadonors Equip Outside Groups to Capture a Bigger Share of the Pie, OpenSECRETS.ORG (Oct. 29, 2014), -in-2014-megadonors-equip-outside-groups-to-capture-a-bigger-share-of-the-pie [hereinafter Overall Spending Inches Up in 2014],\n\n(103.) Identifiable are those donors who give more than $200. The FEC does not require donors who give less than $200 to be itemized on finance reports. Id.\n\n(104.) Final Tally, supra note 101.\n\n(105.) Id.\n\n(106.) Id.\n\n(107.) The Money Behind the Elections, OpenSecrets.ORG, (last visited Oct. 12, 2015).\n\n(108.) Id.\n\n(109.) Donor Demographics, OpenSecrhts.ORG, donordemographics.php?cycle=2012 (last visited Oct. 12, 2015) (explaining that computing only donations through FEC reporting, excludes outside groups).\n\n(110.) Id.\n\n(111.) Russ Choma, More Cash in More Party Pots? Senate Language Could Help Parties--and the Very Rich, OpenSecretS.ORG (Dec. 10, 2014), -language-could-help-parties-and-the-very-rich.\n\n(112.) Peter Olsen-Phillips, Russ Choma, Sarah Bryner & Doug Weber, The Political One Percent of the One Percent in 2014: Mega Donors Fuel Rising Cost of Elections, OpenSecretS.ORG (Apr. 30, 2015), https://www/ -one-percent-in-2014-megadonors-fuel-rising-cost-of-elections.\n\n(113.) See McConnell v. FEC, 540 U.S. 93 (2003).\n\n(114.) See Citizens United v. FEC, 558 U.S. 310 (2010).\n\n(115.) See McCutcheon v. FEC, 134 S. Ct. 1434 (2014).\n\n(116.) Id.\n\n(117.) See McConnell v. FEC, 540 U.S. 93 (2003).\n\n(118.) See McCutcheon v. FEC, 134 S. Ct. 1434 (2014).\n\n(119.) Eliza Newlin Carney, Did Soft Money Ban Kill Political Parties?, roll Call (May 6, 2014, 12:03 PM), -kill-political-parties/?dcz= (noting the parties raised $591 million in soft money during the 2002 election).\n\n(120.) Id.\n\n(121.) All dollar values are adjusted to 2012 dollars. Robert Keiner & Raymond La Raja, McCainFeingold's Devastating Legacy, Wash. POST: opinions (Apr. 11,2014), opinions/mccain-feingolds-devastating-legacy/2014/04/11/ 14a528e2-c18f-11e3-bcec-b71ee10e9bc3_story. html.\n\n(122.) See Citizens United v. FEC, 558 U.S. 310 (2010).\n\n(123.) Id. Carney, supra note 119.\n\n(124.) See Citizens United v. FEC, 558 U.S. 310 (2010). Keiner, supra note 121.\n\n(125.) Keiner, supra note 121.\n\n(126.) Id.\n\n(127.) Eliza Newlin Carney, Will McCutcheon Ruling Boost Political Parties?, roll call (Apr. 2, 2014), -political-parties/?dcz= (alteration in original).\n\n(128.) See McCutcheon v. FEC, 134 S. Ct. 1434 (2014).\n\n(129.) Ray La Raja, The Supreme Court Might Strike Down Overall Contribution Limits. And That's Okay, Wash. Post: The Monkey Cage (Oct. 9, 2013), the-supreme-court-might-strike-down-overall-conrtibution-limits-and-thats-okay.\n\n(130.) Super PACs,, (last visited Dec. 12, 2015).\n\n(131.) Michael J. Malbin, PACs in an Age of Super PACs, The campaign Fin. inst. (Mar. 6, 2013),\n\n(132.) Id.\n\n(133.) Super PACs, supra note 130.\n\n(134.) Outside Spending, OpenSecrets.ORG, visited Oct. 12, 2015) (\"The term 'outside spending' refers to political expenditures made by groups or individuals independently of, and not coordinated with, candidates' committees. Groups in this category range from conventional party committees to the more controversial super PACs and 501(c) 'dark money' organizations.\").\n\n(135.) Total Outside Spending by Election Cycle, Excluding Party Committees, OpenSecreTS.ORG, (last visited Dec. 12, 2015).\n\n(136.) Super PACs, supra note 130.\n\n(137.) See McCutcheon v. FEC, 134 S. Ct. 1434 (2014).\n\n(138.) The Campaign Legal Center Guide to the Current Rules For Federal Elections: What Has Changed in the 2012 Election Cycle, The Campaign Legal Ctr. (Oct. 25, 2012), http://www.campaign -elections-what-has-changed-2012election [hereinafter What Has Changed in the 2012 Election Cycle],\n\n(139.) Outside Group Chart, The CAMPAIGN LEGAL Ctr., default/files/CLC_501c_disclosure_chart.pdf (last visited Oct. 12, 2015).\n\n(140.) Lisa Rosenberg, The IRS Should Stop Ignoring Dark Money, Sunlight Found. (Oct. 17, 2012, 12:24 PM), https://sunlightfoundation.comblog/2012/10/17/ the-irs-should-stop-ignoring-dark-money.\n\n(141.) Id.\n\n(142.) Political Nonprofits, OpenSecrf.TS.ORG, prof_summ.php (last visited Oct. 12,2015).\n\n(143.) Outside Group Chart, supra note 139.\n\n(144.) Political Nonprofits, supra note 142.\n\n(145.) Id.\n\n(146.) Outside Spending by Disclosure. Excluding Party Committees, supra note 134.\n\n(147.) See McCutcheon v. FEC, 134 S. Ct. 1434 (2014).\n\n(148.) See generally Lisa Rosenberg, As IRS Takes Aim at Fake Social Welfare Organizations, Will Some in Congress Take Aim at the IRS?, sunlight found. (Nov. 27,2013,9:39 AM), https://sunlightfound -organizations-will-some-in-congresstake-aim-at-the-irs.\n\n(149.) IRS Scandal Fast Facts, CNN Library, (last updated Sept. 18, 2015, 6:26 PM) (discussing that the IRS scandal involving the targeting of certain groups filing for tax-exempt status and delaying processing applications by certain conservative groups and requesting unnecessary information, along with Lois Lerner and her over 50,000 missing emails).\n\n(150.) See McCutcheon v. FEC, 134 S. Ct. 1434 (2014).\n\n(151.) Id.\n\n(152.) See generally Ruth Marcus, Ruth Marcus: The Real Danger Behind the 'McCutcheon' Ruling, Wash. Post: Opinions (Apr. 4, 2014), -behind-the-mccutchon-ruling/2014/04/022ddcd4-bc32-11 e3-9a05-c739f29ccb08_story.html.\n\n(153.) See McCutcheon v. FEC, 134 S. Ct. 1434 (2014).\n\n(154.) Peter Olsen-Phillips, Joint Fundraisers Ballooning After McCutcheon Decision, sunlight Found (Oct. 29, 2014, 3:12 PM), -after-mccuctcheon-decision.\n\n(155.) See McCutcheon v. FEC, 134 S. Ct. 1434 (2014).\n\n(156.) Joint Fundraising, Fed. election commission (Feb. 2013), brochures/jointfundraising.shtml.\n\n(157.) Id.\n\n(158.) Id.\n\n(159.) Id.\n\n(160.) Kirk L. Jowers & Matthew T. Sanderson, TheNext \"Super PAC\"? All You Ever Wanted to Know About Joint Fundraising Committees, Caplin & Drysdale Att'YS (Apr. 11,2014) (alteration in original), AC%20All%20You%20Ever%20Want ed%20to%20Know%20About%20Joint%20Fundraising%20Committees.pdf.\n\n(161.) Boehner for Speaker Committee, OpenSeCRETS.ORG, php?id=C00478354&cycle=2014 (last visited Oct. 12, 2015).\n\n(162.) Joint Fundraising Committees, OpenSeCRETS.ORG, (last visited Oct. 12,2015).\n\n(163.) Id.\n\n(164.) Michael Beckel, 'Jumbo Joints ': How Big Will the Newest Political Animals Get?, The Ctr. for PUB. integrity: Pol., jumbo-joints-how-big-will-new est-political-animals-get (last updated May 27, 2014, 11:23 AM).\n\n(165.) Paul Blumenthal, McCutcheon v. FEC's Other Threat: Case Could Super-Size Joint Fundraising Committees, The Huffington Post (Oct. 7,2013,2:33 PM), mccutcheon-joint-fundraising-committees_n_4057547.html.\n\n(166.) Russ Choma, Consequences of McCutcheon: Dan Backer Version, OpenSecrets.Org (Apr. 9, 2014), -backer-version.\n\n(167.) Id.\n\n(168.) Lisa Rosenberg, 2014 Midterms: Transparency of Money in Politics Means Trust in Government, Trust in Citizens, BROOKINGS (Oct. 22, 2014, 9:22 AM), 14/10/22-2014-midterms-transparency-money-in-politics-rosenberg.\n\n(169.) McCutcheon v. FEC, 134 S. Ct. 1434, 1441 (2014).\n\n(170.) Id. at 1459 (alteration adopted).\n\n(171.) Id. at 1460.\n\n(172.) Id.\n\n(173.) See generally Fed. Election Commission, (last visited Oct. 12, 2015);, (last visited Oct. 12, 2015); see also Sunlight Found., (last visited Oct. 12, 2015).\n\n(174.) Real Time Transparency Act of 2014, H.R. 4442, 113th Cong. (2014).\n\n(175.) Id. (alteration in brackets).\n\n(176.) Rosenberg, supra note 140168 (alteration in brackets).\n\n(177.) S. 2212: Real Time Transparency Act,,\n\n(178.) See 2015 Reporting Dates, Fed. Election Commission, 2015.shtml#frequency (last visited July 7, 2016) (reporting frequency is different per entity, whether candidate, party committee, or PAC).\n\n(179.) Electronic Filing Overview, FED. ELECTION COMMISSION, view.shtml (last visited Oct. 9, 2015) (discussing how Senate candidate committees currently are not required to file electronically).\n\n(180.) See id. (citing 11 CFR 104.18 (a)(3)(i), federal election commission's mandatory electronic filing rules).\n\n(181.) See generally Sam Baker, Obamacare Website Has Cost $840 Million, Nat'L J. (July 30, 2014),\n\n(182.) See supra Part III.D.\n\n(183.) Boehner for Speaker Committee, supra note 161.\n\n(184.) 2014 Outside Spending, by Group, OpenSECRETS.ORG, spending/summ.php?cycle=2014&chrt=V&disp=0&type=U (last visited Oct. 9, 2015).\n\n(185.) Outside Spending, 0penSecretS.ORG, php (last visited Oct. 9, 2015).\n\n(186.) Joint Fundraising Committees, supra note 162.\n\n(187.) Eliza Newlin Carney, Costly Midterms Fuel Hundreds of Joint Fundraising Committees, ROLL CALL (May 28, 2014, 1:59 PM), fundraising-campaign-committeekay-hagan-mitch-mcconnell.\n\n(188.) Id.\n\n(189.) Id.\n\n(190.) Id.\n\n(191.) Id.\n\n(192.) Michael Mishak & Philip Elliott, Americans for Prosperity Builds Political Machine, Associated Press (Oct. 11,2014, 1:12 PM), a6490b/americans-prosperity-builds-political-machine (defining Americans for Prosperity as a subgroup of David and Charles Koch's network used to advocate on issues with a focus on voter outreach and research).\n\n(193.) Id. (alteration in brackets).\n\n(194.) Philip Bump, Americans for Prosperity May be America's Third-Biggest Political Party, wash. Post (June 19,2014), http://www.washingtonpost.comT5logs/the-fix/ wp/2014/06/19/americans-for-pros perity-is-americas-third-biggest-political-party (these numbers reflect the paid workers only, not the additional hundreds of volunteers in the field).\n\n(195.) Mishak & Elliott, supra note 192.\n\n(196.) See McCutcheon v. FEC, 134 S. Ct. 1434 (2014).\n\n(197.) See generally Lee Drutman, What the McCutcheon Decision Means, WASH. POST (Apr. 2,2014),\n\n(198.) Beckel, supra note 164.\n\n(199.) Bob Biersack, McCutcheon 's Multiplying Effect: Why an Overall Limit Matters, OpenSecrets. org (Sept. 17, 2013),\n\n(200.) Tim Peckinpaugh & Steve Roberts, Commentary, McCutcheon Restores Power to Congressional Campaigns, Roll Call (Apr. 24,2014, 12:27 PM), power_to_congressional_campaigns_commentary-232380-1.html.\n\n(201.) Id.\n\n(202.) Aggregate Biennial Contribution Limits, 79 Fed. Reg. 62361, 63 (proposed Oct. 17,2014).\n\n(203.) McCutcheon v. FEC, 134 S. Ct. 1434, 1457-58 (2014).\n\n(204.) See McCutcheon v. FEC, 134 S. Ct. 1434 (2014).\n\n(205.) The 2014 CPA-Zicklin Index of Corporate Political Disclosure and Accountability, ctr. for Pol. accountability, 4 (Sept. 24,2014), DocumentAction/i/8642 [hereinafter The 2014 CPA-Zicklin Index],\n\n(206.) Bruce F. Freed & Charles E.M. Kolb, Bruce F. Freed and Charles E.M. Kolb: U.S. Companies Shine Sunlight On Dark Money', wash. post (Dec. 29, 2014), bruce-f-freed-and-charles-em-kolb-us-companies-shine-sunlight-on -dark-money/2014/12/29/f46da0508d2 5-11 e4-9e8d-0c687bc 18da4_story.html.\n\n(207.) Id.\n\n(208.) The 2014 CPA-Zicklin Index, supra note 205, at 12.\n\n(209.) Id.\n\n(210.) Id. at 23.\n\n(211.) Id.\n\n(212.) Id. at 16-17.\n\n(213.) Id. at 10, 14.\n\n(214.) Id. at 14, 23.\n\n(215.) See McCutcheon v. FEC, 134 S. Ct. 1434 (2014).\n\n(216.) See Citizens United v. FEC, 558 U.S. 310 (2010).\n\n(217.) The 2014 CPA-Zicklin Index, supra note 205, at 11.\n\n(218.) Id. at 12.\n\n(219.) Id. at 12-13.\n\n(220.) Id. at 14.\n\n(221.) See generally Kenneth P. Vogel, Big Money Breaks Out, POLITICO (Dec. 29, 2014, 5:32 AM),\n\n(222.) See Communications, The Koch Network: A Cartological Guide, (Jan. 7, 2014),; see also Matea Gold, Koch-Backed Political Network, Built to Shield Donors, Raised $400 Million in 2012 Elections, wash. post (Jan. 5, 2014), -shield-donors-raised-400-million-in-2012-elections/2014/01/05/9e7cfd9a-719b-11e3-9389-09ef9944065e_ story.html.\n\n(223.) Darren Goode & Kenneth P. Vogel, Kochs Launch New Super PAC, Politico (June 16, 2014, 8:20 PM), 07926.\n\n(224.) Kenneth p. Vogel & Mike Allen, Koch Donors Uncloaked, politico (Oct. 14, 2014, 5:04 AM),\n\n(225.) See generally Nicholas Confessore, Koch Brothers ' Budget of $889 Million for 2016 Is On Par With Parties ' Spending, N.Y. TIMES (Jan. 26,2015), -plan-to-spend-900-million-on-2016-campaign.html.\n\n(226.) Vogel & Allen, supra note 224.\n\n(227.) Id.\n\n(228.) Id.\n\n(229.) Id.\n\n(230.) Id.\n\n(231). Id.\n\n(232.) Id.\n\n(233.) Jan Baran, Symposium: McCutcheon and the Future of Campaign Finance Regulation, SCOTUS BLOG (Apr. 4, 2014, 2:59 PM), symposium-mccutcheon-and-the-future-of-campaign-finance-regulation.\n\n(234.) 2012 Presidential Race, OpenSecrets.ORG, (last visited Oct. 11,2015).\n\n(235.) Citizens United v. FEC, 558 U.S. 310,360 (2010).\nCOPYRIGHT 2016 Ave Maria School of Law\nCopyright 2016 Gale, Cengage Learning. All rights reserved.\n\nArticle Details\nPrinter friendly Cite/link Email Feedback\nTitle Annotation:joint fundraising committees\nAuthor:Mangini, Petra A.\nPublication:Ave Maria Law Review\nDate:Sep 22, 2016\nPrevious Article:A hidden gendercide: discrepancies between embryo destruction and sex selective abortion laws.\nNext Article:The great mash-up debate: a holistic approach to controlling noise pollution in Florida's downtown districts.\n", "pred_label": "__label__1", "pred_score_pos": 0.5311722159385681} {"content": "​RCBC Plaza​\n\n​RCBC Plaza​\n\nThe RCBC Plaza is the biggest and most modern office development in the Philippines today. Inaugurated in 2001, the complex consists of the 46-storey Yuchengco Tower, 41-storey Tower 2, and a three-level podium. Also housed in RCBC Plaza are the 450-seat Carlos P. Romulo Auditorium, Yuchengco Museum, 200-seat chapel, a VIP lounge, banking chambers, convenience and service shops, food court, seven-level basement parking, gym and health spa, and open-air courtyard. YGC members such as the RCBC and AY Foundation hold their offices here.\n\nRCBC Plaza is the first IT zone in Makati designated by the Philippine Economic Zone Auhority.\n\nVisit www.rcbcplaza.com.ph​ for more information.​​​\n\n\n20/F Multinational Bancorporation Center, 6805 Ayala Avenue, Makati\n\n\n(632) 887-1047", "pred_label": "__label__1", "pred_score_pos": 0.6864247918128967} {"content": "Avian Influenza Concerns Challenge Global Markets\n\nLizzy Schultz\n\nAccording to RaboBank’s Q4 Poultry Quarterly, a new wave of avian influenza (AI) outbreaks has begun to challenge the outlook for the global poultry industry in 2017, showcasing an unwelcome development in a global market that was just recovering from the negative impact of the 2015 AI crisis.\n\n\nThe virus’ return has begun to impact global trade conditions, especially when considering the outlook for Asia, Europe and Africa. It will also be a test for the U.S. industry, after last year’s multiple AI outbreaks. Also, the rise of chicken concepts has begun to differentiate the chicken market and shift supply and trade conditions.\n\nGlobal market conditions will continue to be affected by the ongoing Chinese supply shortage, as imports to China and Hong Kong are expected to remain high. Pressured global trade volumes are also expected next year, given a continuation of high AI impacts and increasing trade protectionism.\n\nChina’s import demand and the possibility of improved relations between the U.S. and Russia are promising, but lower support for TTIP and TPP will have adverse impacts.\n\nAgribusiness, Animal Health, avian flu, economics, Finance, International, Poultry", "pred_label": "__label__1", "pred_score_pos": 0.9959536790847778} {"content": "Sonali L. PereraSonali Giovino Perera was born and raised on the East Coast of Canada in Brampton Ontario. She is fortunate to have traveled and lived in a few places like, Sri Lanka, Los Angeles and Las Vegas, before settling down in Vancouver BC. She is inspired to turn personal obstacles into opportunities of epic personal growth. She is a HeartCore Serial Entrepreneur who left her corporate job to follow her dreams of empowering people around the world embrace their gifts and awakened their inner power.\n\nSonali is the Founder of Inner Power Events and GIO Global and she has been stirring quite the talk in town lately with her event called The Awakened Man, because she is a female who is creating a platform that supports and empowers men to connect with high performing healthy mentors, have real conversations and awaken to greatness. Sonali is creating a series of events that inspire and empower men/women/youth to break free from limiting paradigms, live their purpose and be part of a community that supports a more profound collective growth.\n\nCheck out Sonali’s YouTube Channel Here!", "pred_label": "__label__1", "pred_score_pos": 0.7494319677352905} {"content": "Claritin Tabletta - Allergia Ellen - Weblink - Claritin Tabletta - Allergia Ellen hivatalos weboldal link www domain pagerank érték.\n\nCountry: Europe, HU, Hungary\n\n • Kathy Mutchler - Horse Thief\n\n The author, Anna Balint, is a light that shows us in her stories; the endurance of being human. This book is rich. Reading it is an experience that has personally changed me. As a writing student, I have learned from this book new possibilities and it has evolved the way I write. I read it in two days and then I wanted to read it again. I have gained something sacred from it.\n\n • Cote Nunez Jose Tadeo - Good preformance for the money\n\n My brother and I compared several under 399$ tablets before making a desicion. THis is by far the best tablet for that price. It can become a little slow sometimes and suffer from some video lags. But overall is really nice to use and hold. We had no issues with heat or baterry whatsoever.\n\n • Anthony BRADLEY - Required Reading\n\n Aslan has dedicated his life to researching and documenting the historical life of Jesus, the man. I think Aslan does an excellent job of putting the stories associated with Jesus in historical context, and I found the description of the conflict and tension between the original church led by the Apostles, and the rogue version invented by Paul which eventually crushed the preachings of Jesus and emerged as Christianity fascinating.\n\n I plan to read one or two of the rebuttal books--at least Bill O'Reilly's--but books I have read in the past which attempt to defend Christianity or the Bible generally rely on an assumption that we first agree that Jesus is the son of God, and accept the divinity of the Bible, and then \"back that up\" with a lot of circular arguments based on that false assumption. Plus, Aslan has a doctorate and studied the topic for decades--including citing sources--while the rebuttal books are essentially knee-jerk responses by people who were offended or feel that Aslan has in some way challenged their faith, and most likely rely on citing the Bible as a source to itself. So, I'm not expecting great things from the rebuttal books.", "pred_label": "__label__1", "pred_score_pos": 0.8482726812362671} {"content": "Centuries ago, when the world’s oceans had just begun to attract the attention of people around the world, cross-generation science and technology became the most important tool in making oceanic discoveries. This led people who were not scientists by profession to wonder and explore the mysterious watery world that covers over seventy percent of Earth on their own. Charles Darwin, a 19th century English naturalist and geologist, was one of those individuals. Although he was first a son and a student before a scientist, Darwin is best known for his contributions to the theory of evolution which is taught in most biological science classes at schools to this day. While on the voyage of the HMS Beagle, he noticed trends in the rise and fall of the Earth’s crust and related it to the creation of volcanic islands that commonly had reef structures. Note that this is long before theories of plate tectonics surfaced in society. Darwin also understood that tiny coral creatures, called polyps, could only survive within a certain depth in the water column. Not only was being below this certain depth detrimental to the animals, they also could not survive contact with the sun’s rays above the sea’s surface for even a fraction of time. Charles Darwin believed that lagoon-islands gradually formed from coral structures transitioning from fringing reefs to barrier reefs, and finally to atolls. Through his university education and adventures out to sea, he was able to put pieces of information together to come up with this theory on the origin of coral reefs.\n\nCharles Darwin was born on February 12, 1809 in Shrewsbury England. He was one of two boys born to Robert Waring Darwin and Susannah nee Wedgwood, and was raised in a wealthy family. The Darwin children went to school and were raised in a common household setting, attending day school and playing together as siblings do. In June of 1825, Charles joined his brother, Erasmus, at the University of Edinburgh and enrolled in courses to pursue his interest in medicine.  Starting in 1826, he developed a desire to understand biology. This interest led him to transfer to the University of Cambridge in January of 1828 where his curiosity in the biological field continued to grow. He examined and read research papers about marine animals, collected beetles and travelled to parts of the world he had never visited before to sample different insect species, and took botany classes while at Cambridge. He graduated from the university in 1831 and was invited on the voyage of the HMS Beagle in August of that year. His father objected, but his uncle encouraged him to go on the trip. The ship, a 10-brig vessel of the British Royal Navy, set sail out of Plymouth on December 27, 1831. Five years later, The Beagle returned Darwin to his hometown in Shrewsbury on October 4, 1836 (Wyhe, Darwin Online). Practically straight out of college, Darwin had observed a sizable portion of the vastness of the world he probably did not think he would see at such a young age. His education and genuine interest in the living environment around him caused him to start writing scientific papers, which led him to publish many of his works, and eventually led him to theorize on the origin of life and other aspects of biology.\n\nThroughout his time on the Beagle, Darwin constantly made observations and speculations about what he saw; he kept a journal that was published and can be found online and in libraries today, titled, The Voyage of the Beagle. According to John van Wyhe, in 1839, he married his cousin, Emma Wedgewood and had ten children with her over the course of their lives together. Unfortunately, only seven of the ten made it to adulthood. In 1842, he made a short trip to Wales where he and his family settled down. From his working experience and journaling on the Beagle, he published The Structure and Distribution of Coral Reefs.  Among many other works he had published in his lifetime, his most famous was, and still is, The Origin of Species. This book is where he compiled all of his data, information, and explanations of his theories of evolution. Leaving an astronomical historical legacy, he died at the age of seventy-three on April 19, 1882 (Wyhe, Darwin Online).\n\n\nWyhe, John van. Ed. 2002-. The Complete Work of Charles Darwin Online (http://darwin-online.org.uk/)\n\nCharles Darwin. N.d. Web. 07 July 2015. .", "pred_label": "__label__1", "pred_score_pos": 0.9776121973991394} {"content": "“Diacronia” bibliometric database (BDD)\n\nBarese unmarked constructions and the case of preverbal intransitive subjects\n\nPublication: Limba română: diacronie și sincronie în studiul limbii române, I, p. 39\nEditors:Rodica Zafiu, Adina Dragomirescu, Alexandru Nicolae\nPublisher:Editura Universității din București\nAbstract:In the survey of pragmatically unmarked sentential word orders of Barese, a dialect of the Upper-South of Italy, we come across a pragmatico-semantic phenomenon involving the fronting of a subset of intransitive subjects, which generally surface post-verbally in many (Italo-)Romance varieties. I argue that the availability of both pre- and post-verbal intransitive subject positions in Barese responds to two different semantic requirements: the ability to access the relevant information by both interlocutors, which triggers subject-fronting, and the covert presence of a pre-verbal loco-temporal deictic argument, which blocks subject-fronting. The latter situation is extensively discussed in the literature, whereas the former has always gone unnoticed. I discuss the fine-grained semantics of such fronted subject by means of Lambrecht’s (1994) ‘Topic Acceptability Scale’, in order to capture the pragmatico-semantic mechanism that determines the fronting of ‘accessible’ information to both interlocutors.\nLanguage: English\n\nCitations to this publication: 1\n\nReferences in this publication: 1\n", "pred_label": "__label__1", "pred_score_pos": 0.9948374032974243} {"content": "Rette die Menschenaffen und ihre Lebensräume\n\n\nWhat does finding an injured Tapanuli orangutan mean for their survival?\n\nSamstag, 05 Oktober 2019 18:23 General News\nResponders assess the orangutan's injuries Responders assess the orangutan's injuries Image: OIC\n\nOn September the 18th a severely injured male Tapanuli orangutan was found on a plantation at the edge of the Batang Toru forest. The orangutan was taken in by the North Sumatra Natural Resources Conservation Agency (BKSDA North Sumatra) and the Orangutan Information Centre (OIC), who took him to receive treatment from the Sumatran Orangutan Conservation Programme (SOCP).\n\nThe head of the OIC told Mongobay that the injuries included a gash on his head, and a large stab wound under his left armpit, both of which were infested with maggots. He emphasised that these injuries were caused by humans, stating “Our team suspects that the wounds were caused by sharp weapons. If the injuries were a result of the orangutan fighting with other animals, then there should be scratch wounds, not stab wounds”. Orangutans are often considered as pests by local farmers, which can cause these vicious attacks when the animals venture out of the forest.\n\n\n The severely injured Tapanuli orangutan pictured with a gash on his head. Image: OIC. \n\nThis orangutan is the first of the Tapanuli species we know to have been found in this condition, and this may be the start of more deadly encounters with humans as their habitat and food sources are depleted further by the Batang Toru dam and its associated infrastructure. Orangutans have extremely low reproductive rates, which means that if over 1% of the population (in this case only a few individuals per year) are killed, it will likely cause population collapse.\n\nScientists are particularly concerned about female Tapanuli orangutans, as they tend to stick to their home range even if their rainforest is lost. This exposes them to conflict with local people, risk of starvation and dehydration and increases the chance of their young being captured for the illegal pet trade.\n\nResponders assess the orangutan's injuries. Image: OIC. \n\nUnfortunately, the injuries this orangutan sustained whilst fleeing the dam project are unlikely to be an isolated incident as forest clearing and building work continues. This is why the Ape Alliance, alongside the IUCN, are calling for an immediate moratorium on the project. With such small populations and slow breeding rates, every individual orangutan impacted by the dam is dangerous for population viability. The Tapanuli orangutan was discovered to be a distinct species by scientists in 2017, making it the newest, and also most endangered species of great ape.\n\nThe species may well be the first great ape to become extinct within modern history. If this comes to pass it would violate a number of commitments made by the Indonesian government, including the Indonesian Law Regarding the Conservation of Biological Resources and Ecosystems (Law No. 5/1990), and the Aichi targets. Therefore, it is important for the Indonesian government to take the warnings from experts seriously.\n\nAs well as the imminent threat from the Batang Toru hydroelectric project, the Tapanuli orangutan is threatened by loss of habitat, hunting, human-orangutan conflict, an expanding goldmine, and logging concessions. These factors exacerbate in the face of expanding infrastructure and decreases the barriers between human and orangutan populations, which is likely to lead to more incidents such as this one.\n\n  Article by Ape Alliance coordinator Iona Haines. \n\n\nBy using you agree to our use of cookies.", "pred_label": "__label__1", "pred_score_pos": 0.7035012245178223} {"content": "King Bowstring Arch Bridge in Newfield, New York\n\nThere are many historic bridges out there whose historic value is one of utmost importance, but never receive the attention needed before it is too late. There are some historic bridges that deserve the attention needed because of success stories of saving them from becoming a pile of scrap metal.\n\nThe Newfield Bowstring Arch Bridge is one that is a success story worth noting.  Built in 1873 by the King Bridge Company in Cleveland, Ohio, the 60 foot long pony bowstring arch bridge is one of only five of its kind left in New York State. Originally constructed on Beech Road, the bridge’s fate was on the limb when the decision was made to demolish the bridge in 2002. Yet, thanks to help by one individual, Karen Van Etten, the bridge was preserved in place, and a park was constructed next to the bridge, incorporating the structure. Since 2003, the bridge has been open to pedestrians. It is eligible for posting on the National Register of Historic Places.\n\nMs. Van Etten has created a website that deals with the success story of this bridge, including some pictures and an autobiography about her and her efforts to save this structure. You can access the website either here or under the Individual Success Stories page which has recently been created for the Chronicles:\n\n\nIt is rare to see an individual historic bridge become the focus of a successful preservation effort, for many websites feature bridges that are in danger of being destroyed in the name of progress, with pleas from the public to provide the know-how and some support to save the structure. While these websites have drawn interest from the public and many historic bridges have been saved thanks to sending the pleas out into the world wide web, what is lacking is individual historic bridge websites dealing with how people came together to save their historic bridge and restore it for reuse as a recreational page. While the Historic Bridge Park website comprises of a cluster of historic bridges that were relocated to a park to serve as a place of exhibition, the Newfield Bridge serves as an example of an individual bridge that was restored for reuse in a park. It is normal that many people take pride in restoring their historic bridge and then let it run its course along with other bridges carrying traffic, what is missing are the motives behind their efforts, let alone how the historic bridge was saved and preserved. As the interest in saving historic bridges increases by the year, and with it the new fields of work that deal with historic bridge restoration, such as welding and bridge building, it is important that individual historic bridges that were recently restored also receive some attention, as they can serve as a guidance for other preservationists to follow. They can also serve as a leverage to those who claim that a historic bridge has no use anymore and should be converted into scrap metal. There are many people, especially politicians, who fall into that category and should spend time looking at success stories of historic bridges like this one, to ensure them that it is possible to restore a precious structure, like the bridge in Newfield, without having to destroy it in the name of progress.\n\nIn closing, I would like to ask all preservation groups who have recently restored their historic bridges, regardless of whether it was the Bridgeport Bridge in Michigan, the Bentonsport Bridge in Iowa the Quaker Bridge in Pennsylvania or even the Silverdale Bridge in Minnesota, to follow suit in creating their websites with pictures of their beloved structure, and stories about the successes and shortcomings of preserving their historic bridge. This also applies to those who are in the middle of restoring their bridge or are about to begin their project. After all, we would love to hear about these stories and learn from them so that we can use these facts to restore our precious structure for generations to come.  I am hoping that the people behind the reconstruction of the Sutliff Bridge in Johnson County, Iowa will do the same.\n\nSpeaking of Sutliff Bridge…….\n\nNote: The author would like to thank Ms. Van Etten for the use of one of her photos for this page, let alone providing a website domain to create a website, which is This domain is free and one can create some really cool websites.\n\nAnd yes, there is a new page on there devoted to individual success stories of historic bridge preservation. If you have a success story you want to share with the audience, please send the info, photos and if possible (but highly recommended), your website to the following address and be rest assured, it will be posted here in the Chronicles:\n\nThank you.\n\nPresidential Elections and Historic Bridge Preservation: Interview with Nathan Holth\n\nParshallburg Bridge in Chesaning, Michigan: It was one of only five Thacher through truss bridges remaining in the United States before flooding and ice jams destroyed the newly restored structure in 2008.\n\nAuthor’s Notes: This is the first of many interviews that will be posted on the Bridgehunter’s Chronicles, as the column will look at the successes of President Obama with transportation policies and with it, historic bridge preservation, what challenger Mitt Romney will bring to the country if elected President, and how the Presidential elections will impact the future of America’s infrastructure and bridge preservation and maintenance in general, which despite improvements since the Minneapolis Bridge disaster on 1 August, 2007 (see part I and part II for more details), there are still some critical flaws that need to be addressed, even after the November 6 elections take place.\n\nThe first interview is with Nathan Holth, webmaster of, a website focusing on historic bridges, preservation and some interesting facts that he has gathered since the website was launched in 2005. Most of the coverage is in the eastern half of the US and large parts of Canada. In addition to that, he has been actively involved in the Section 106 and Section 4f Process of the 1966 Historic Preservation Laws and has worked with many parties in ensuring that historic bridges targeted for replacement are preserved, regardless of whether they are in place or in a different location.  Here are some questions I had for him, which he took some time to answer. Note that all pictures in this article are courtesy of and the author would like to thank him for the usage.\n\n\n1. How big of a role have you played in historic bridge preservation since Obama was elected in 2008?\nIn May, 2011 myself and Luke Gordon worked to remove five abandoned pin-connected truss bridges in danger of collapse in Monroe County, Michigan and place them into storage for future restoration and reuse in new locations. In 2009, myself and Vern Mesler worked to provide the city of Mt. Pleasant, MI with information about the historic significance of a pin-connected pony truss (which turned out to be an 19th Century truss built by Wrought Iron Bridge Company) and the feasibility of its restoration. These efforts helped the city decide to rehabilitate the bridge for pedestrian use rather than replace it with a modern bridge. I have also participated as a consulting party in a number of bridge projects that triggered Section 106.\n\nOne of many pony truss bridges in Monroe County, Michigan\n\n2. How would you rate the transportation policies in the US in comparison with the policies regarding preserving historic bridges?\n\nCurrent United States policy toward all bridges (not just historic bridges) encourages deferring maintainance and repair of bridges while encouraging demolition and replacement projects even though these practices cost taxpayers more money in the long run. This is due to limited federal and state aid to help local agencies with costs of basic bridge maintainance and repair (these costs come exclusively out of local bridge agency’s pockets) while at the same time if a bridge has a sufficiency rating of below 50% (a rating that takes into account many aspects of a bridge including structural condition) the agency is elgible for and frequently awarded a huge grant from the federal and/or state government. As such, bridge agencies tend to be rewarded for allowing their bridges to deteriorate, since the grant money is more widely available for demolition and replacement of under 50% sufficiency bridges. From their perspective, they are saving money because the federal government or state pays for it. However from a taxpayer perspective, this will cost more in the long run and is wasteful in this time where the country needs to lower the national debt and budget deficits, while dealing with aging roads and bridges. The current policy is harmful to historic bridges because it is not possible to build a new historic bridge, a historic bridge can only continue to exist by being maintained or rehabilitated.\n\n3. What improvements would you like to see made?\n\nA far greater percentage of federal and state grants to bridge / transportation agencies should be devoted to aid for projects that involve maintaining, repairing, and rehabilitating existing bridges. This is a policy that would be beneficial for all bridges, not just historic bridges, although historic bridges would greatly benefit. Because it benefits bridges in general, such a policy should enjoy widespread support from the people, since even people who could care less about historic bridges could see the value in maintaining bridges better.\n\nFrom a historic preservation perspective, it would be nice to see Section 106 apply to all public bridges, not just those with federal involvement. This may be tricky to make reality however because it would touch on a greater issue of states rights and sovereignty. It would also be nice to see Transportation Enhancement grants expanded, or a specific funding program for historic bridges be created similar to the Federal Highway Administration’s  covered bridge funding program, except that this program would preserve all types of historic bridges.\n\nBridge Street Bridge in Portland in Ionia County, Michigan. One way street, but it appears the politicians are going the wrong way regarding transportation policies and bridge preservation.\n\n4. How would you rate Obama’s performance with regards to what was mentioned in nr.2?  Do you think it will have an impact on the presidential elections?\nObama has not made any improvements to the way in which bridges are funded. The focus continues to be on demolition and replacement projects with limited to no funding for improving existing bridges.\n\n5. Do you think Romney will do better?\n\nRomney would not do better. Both Obama, Romney, and also the various Senators and Representatives that hold positions on surface transportation committees appear to lack understanding of what actually goes on in the world of bridges. They hold the position that this country suffers from “aging” or “crumbling” “infrastructure” as they loosely describe it. They are correct that the “infrastructure” including bridges is crumbling, however I do disagree that “age” is a problem, since if an old bridge is properly maintained in good condition, it can still be safe and functional. These politicians feel that increasing funds is the primary solution to solve the crumbling infrastructure problem. They seem unaware that if we spent more money on rehabilitation and repair that we might be able to make each dollar go further and make greater improvements to infrastructure without increasing the level of funding. They also seem unaware of how wasteful it is to focus only on demolition and replacement.\n\nAt the same time, because liberal policy focuses on having government provide people and businesses with assistance to make sure everyone can be successful, liberals (like Obama) are more likely to continue to provide funds for infrastructure. Conservatives like Romney would more likely believe that the people do not need help from government and therefore feel that maintaining a government-owned system of roads and bridges is not a priority. As such I suppose in the short term reduced transportation funding would prevent some historic bridge demolition and replacement projects from moving forward. However it would not bring a halt to the deterioration of these bridges and they would eventually fail and have to be closed. We really do need funding for bridge projects. We just need to change the focus of those projects to maintaining existing bridges.\n\n6. In your opinion, who will win the elections and how will that impact the transportation policies as well as that of historic bridge preservation?\n\nI expect Obama to be reelected and I see no changes in existing surface transportation policy. However, if Romney is elected, I do not see any changes to surface transportation policy. There is a risk that Section 106 and Section 4(f) could be abolished under Romney however, because these protections for historic structures would be seen as government regulation. With the exception of social/religious issues, where Republicans strongly support big government and heavy regulation, Republicans support drastically reducing the role of government. Since historic preservation is not a religious issue, it is undoubtedly something Republicans wish to get rid of.\n\n7. What are your future plans regarding historic bridge preservation?\n\nI plan to continue projects similar to those I outlined above. Continued work through Section 106, and selective direct efforts to save specific bridges.\n\nThank you, Mr. Holth for your time and assistance in answering some of my questions and best of luck to you.  More interviews between now and 6 November are yet to come.\n\nMystery Bridge 12: The Bridge out in the middle of nowhere\n\nOblique view. Photos courtesy of MnDOT This one was taken in 1962\n\nSome time ago, as I was gathering some information for one of the articles I wanted to write for the Chronicles, I happened to scroll around the Root River region using Bing (please refer to an earlier article on Binging for Bridges here.) The region has been and is still filled with metal truss bridges that were built in the 1920s and earlier, even though some of them have been recently closed to traffic due to structural concerns. The river starts in several different areas of Fillmore and Olmsted Counties before converging into one single entity near Whalan (located east of Lanesboro) and slithering like a python enroute to the Mississippi River east of Hokah, a length of over 200 miles counting the main branches. The river is surrounded by high hills and forests and is accompanied by a bike trail which starts at Fountain and (after joining another bike trail at Preston), follows the trail up to Houston.\n\nEast of the Houston between county highway 9 on the north side and Minnesota highway 16 on the south end, one will find a hidden jewel that remains over the Root River- the last of its kind. Unlike its counterparts, which have long since been replaced over the past 20 years, this Camelback through truss bridge was built in 1928- according to records provided by the Minnesota Department of Transportation- but has been sitting abandoned since 1986. The bridge has A-frame portal bracing and riveted connections, and the total length is 154 feet long, with the truss span being 148 feet.\n\nIt is unknown who built this bridge except this was probably built using state standards introduced in 1914, where pin-connected truss bridges and the creative designs that were invented by many bridge engineers were considered void in favor of the standardized truss bridges with riveted connections- namely Pratt, Parker, Camelback and Warren, although a handful of bridges in Minnesota were built using the Pennsylvania and Baltimore designs, including the Broadway Avenue Bridge in St. Peter.\n\nIt is also unknown about the history of the bridge in connection with the nearby community of Houston- 1 mile west of the structure. We do know that a group of citizens in 1985 petitioned to the county to have the bridge taken off the public road system and put into private hands. It was approved in August 1985 and by 1986, the bridge was privately owned, which still holds true today. Access to the bridge is only possible through a narrow dirt road off of county highway 9 on the north side, even though permission to walk on the bridge is needed if one wants to photograph the bridge.\n\nHowever, stories and the history of the bridge are needed to round out its story, including the motives behind transferring ownership of the bridge to private owners and vacating the road in 1986, a rarity for private owners of a bridge have to assume as much responsibility for the bridge as the local, state and even national governments. But this successful attempt to gain ownership of the bridge has its reasons and it must be heard so that other people who want to own a unique bridge like this one can do so. So please share your stories about this bridge via Jason Smith, using the contact information provided below:\n\nJason Smith:\n\nTo freshen your memory of the bridge, some pics, courtesy of MnDOT are below. Looking forward to hearing your stories.\n\n\nSide view. Photo taken in 1952\nPortal view. Photo taken in 1969\nOblique view. Photo taken in 1983, shortly before its closure.\n\nInterview with James L. Cooper\n\nPhoto Courtesy of Tony Dillon\n\nThere are many people who have a special interest on a topic and spend a great deal of their free time working on it and presenting it to the general audience. Some of them even spend a great portion of their lives on it. With regards to historic bridges, if one looks back 40 years ago, there were only a handful of people- namely academics, historians, photographers and other enthusiasts- who were passionate about historic bridges- regardless of bridge type, builder, or even history- and worked in this field to generate interest among the common public. The work of people like James Cooper, professor emeritus at DePauw University, has paid off, for the public is more informed about historic bridges and ways to preserve them than they were when he started on this topic 40 years ago.\n\nPhi Beta Kappa Graduate of Wooster College (located between Canton and Mansfield in eastern Ohio) and a Masters and PhD graduate of history at the University of Wisconsin at Madison, Cooper has become known as the father of Indiana’s historic bridges, publishing four books on historic bridges in Indiana and historic bridge preservation over the past 25 years and reviewing over 100 literary works written by many scholars in the field of history, science and technology, and historic preservation, and presenting his topic both live in front of a large audience as well as on TV and radio. He has received many honors and is part of many organizations dealing with history and preservation, including in the field of historic bridges, The Historic Bridge Alliance and the Historic Bridge Foundation, both located in Austin, Texas. Cooper was the keynote speaker at this year’s Historic Bridge Conference, which took place on 21-23 September.\n\nI had a chance to send him some interview questions about his role in historic bridges and he was happy to send me some of his responses in short form to be posted here in this article. He is in the process of posting some of his work as well as literature that is still for sale on a website dealing with Indiana’s historic bridges, which you can click here to access.\n\nHere are some thoughts about his role as the main influential figure in saving historic bridges in the Hoosier state and informing the public on their importance in history….\n\n\na. What interested you in historic bridges in general?\nI started in the late 1970s with an introduction to material culture studies as a supplement to documentary research.  HAER contacts led me into bridge survey work in Indiana which I combined with more traditional research in my survey publications.  Then Indiana Landmarks Foundation contacted me to turn bridge surveying/historical research into preservation efforts.\nb. What is so special about the historic bridges in Indiana?\n\nIndiana was an outpost of eastern transportation forms, routes, and fabrication.  By the 1870s, Hoosiers began to make their own contributions to transportation design and fabrication.  Indiana is part of the process of national development.\n\nc. You have been working with historic bridges for over 40 years. Can you summarize what accomplishments you have made  apart from books and presentations?\n\nSince I regard myself as a professional historian, books and presentations are more than “not just.’  I have also played a role in the preservation of bridge company documents and records.  Have been a member “of a village” leading (a) to the preservation of a number of structures and (b) to arguments for historically-sensitive repairs rather than replacement one-member-at-a-time.\n\nd. From your point of view, how big of interest do the people in Indiana have in historic bridges in comparison with other states?\n\nI don’t know about the % of interest by state.  We have an active Covered Bridge contingent.  We have more and better-positioned resources (preservationists, craftsmen, engineers) than most states to support local folk interest in retaining a historic bridges of all materials.\n\ne. From your point of view, how has the US handled its infrastructure since the Minneapolis Bridge Disaster on 1 August 2007?\nThe engineers who studied the I-35 event found (a) that the bridge collapsed because of a drafting design error with a given gusset plate, (b) that the Minn Dept of Transport was aware of the plate bucking at least a year before via inspection w/o really addressing same, (c) that the authorities precipitated what was an impending difficulty by allowing the placement of massive construction weight on this part of the bridge.   Much of this agency incompetence got subsumed in the press by pushing forward the annual FHWA/AASHTO/DOT PR over the number of structurally deficient and obsolete bridges on American highways as the implicit “cause” of the disaster. (Note: FHWA means Federal Highway Administration, the AASHTO stands for American Association of State Highway Transportation Office and PR means public relations)\nIn Indiana, the FHWA and INDOT used the occasion to target historic metal-truss bridges.  Note that I-35 was not that old or historic…but no matter for the PR and agency opportunity.\nAnd the US since Obama took office in 2009?\nThe old federal system for funding transportation through gas taxes has rather run its course.  The politicians are not willing to increase those taxes nor to provide significant supplementary funding.  Republicans in the House of Reps have even voting to end the dedication of the gas tax to transportation.  Slowly the hwy engineering agencies are beginning to think about more repair rather than more knee-jerk replacement, but we are a way yet from economic and engineering efficiency as the primary values here.\nf. Who will win the Presidential Election in November and why?\n\nI don’t know who will win in Nov.  If the Democratss get enough in charge of the congress as well as the presidency, they may cobble together some fix for the old funding system.  If the Republicans take charge, we may be in for new transportation funding rules.\n\nThank you for the interview.\n\nHistoric Bridge Conference 2012: Indiana\n\n\n\n\n\n\n\n\n\nPhoto gallery:\n\n\nGuiford Red Bridge in Dearborn County\nVernon Fork Bridge in Decatur County\nLost Bridge in Dearborn and Ohio Counties\nGeorge Street Bridge in Aurora (Decatur County)\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nGalbraith Bridge in Bartholomew County. Previously closed for repairs, it was reopened in time for the Historic Bridge Conference.\nCave Hill Road Bridge in Ripley County\nChamps Ford Bridge in Decatur County\nFurnas Mill Bridge in Johnson County\n\n", "pred_label": "__label__1", "pred_score_pos": 0.5178776979446411} {"content": "DETERMINATION Acids have some characteristics which are as follows-\n\n\nTo determine the pH of a monoprotic acid\nwe just take the concentration of H+ ions (at equilibrium in case of\na weak acid) formed in the solution and put the H+ value in the\nbelow formula and easily get the pH value.\n\nWe Will Write a Custom Essay Specifically\nFor You For Only $13.90/page!\n\norder now\n\n\nbut in case of di, tri or more generally\npolyprotic acid the pH determination method is something lengthy. For this we\nneed the step wise dissociation constant (Ka) values. Polyprotic\nAcids have some characteristics which are as follows-\n\na. can give more than one proton.\n\nb. dissociation of 2nd and\nconsecutive protons are more difficult as after dissociation the acid turns to\na negatively charged ion and it is increasingly difficult to lose proton from a\nnegatively charged species compared to a neutral molecule.\n\nc. having n (n>1) no. of ionizable\nproton, the 1st dissociation step should be faster than all other\nsteps i.e. Ka1 should be greater than that of Ka2, Ka3\nand so on.\n\nWe can discuss an example-\n\nQ. Calculate the pH of 0.05 (M) H2SO4 solution.\n(Given Ka1= Very Large, Ka2=1.2 X 10-2)\n\nApproach: As here it is given that Ka1\nis very large so we can easily assume that H2SO4 is fully ionized to H+ and\nHSO4- ion. So, we can write it as-\n\nH2SO4   ?      H+      +      HSO4-\n\n0.05 (M)      0.05 (M)    0.05 (M)\n\nThat means the concentration of H+\nion, H+ after first dissociation is 0.05 (M).\n\nNow coming to 2nd dissociation\nstep. But it is involving comparatively low Ka value than the 1st\none, (Ka2 = 1.2 X 10-2). So, it can be treated as\nequilibrium as follows-\n\nHSO4-   ?      H+      +      SO42-\n\nSuppose x (M) HSO4-\nhas dissociated. So, at equilibrium the picture will be like below-\n\n\nHSO4-   ?      H+      +      SO42-\n\nAt equilibrium                         \n 0.05 – x      0.05 + x           x              (As already 0.05 M H+\n\nion has been produced \n\nin the 1st step)\n\n\n\n\n\nSo, the total H+ ion\nconcentration, H+ at equilibrium is (0.05+0.0085) (M) = 0.0585 (M)\n\nTherefore, the pH value will be-\n\npH = -log10 H+ = -log10 (0.0585) =\n\nBelow, there is a similar problem which is\nopen to all of you. Try to solve it own.\n\nQ. Calculate the pH of 0.02 (M) H3PO4 solution.\n(Given Ka1 = 7.5 X 10-3, Ka2 = 6.2 X 10-8\nand Ka3 = 4.8 X 10-13).", "pred_label": "__label__1", "pred_score_pos": 0.9579988121986389} {"content": "Search result(s) - wáng-wang\n\n\n\nA large rent or hole, a gaping wound, gash; to make a gash or rent. May bábha ang likód níya, kay ginlabô ni Fuláno. He has a gaping wound on the back, for he received a gash from N.N. Ginbábha níya ang báyò ko. He tore a large hole in my jacket. Ginbabhaán níya ang íya likód. He made a gaping wound in his back. Ibábha sa likód níya ang ímo binángon. Give him a gash on the back with your bolo. (see wáng-wang).\n\n\n\nWide open, large (of a wound, etc.). (see bábha, wáwha, wáng-*wang).\n\n\n\nTo gnaw, nibble, bite off piece by piece. Wang-itá lang ang maís nga binóog. Just gnaw (off the cob) the roast corn (popcorn). Ang idô nagawáng-it sang túl-an. The dog is gnawing the bone. Ang mga bátà malúyag magwáng-it sang tubó. Children like to eat sugar-cane (biting bits off the stalk). (see páng-os, háng-it, kítkit).", "pred_label": "__label__1", "pred_score_pos": 0.6717103123664856} {"content": "Raphael Deem\n\nRaphael is a Systems Engineer at Ticketmaster and open source contributor. He is a relative newcomer to the community, having started working with Kubernetes within the last six months. Prior to working at Ticketmaster, he was a remote engineer for Platform.sh, a Paris-based PaaS built with Python and LXC containers running on AWS. He was (briefly) a high school math teacher, and is a casual juggler.", "pred_label": "__label__1", "pred_score_pos": 0.9980663061141968} {"content": "1 removalist in Tullamarine, Melbourne and surroundings\n\nBelow you can find a list of all removalists that are situated in Tullamarine, Melbourne and its surrounding area. Please click on a specific mover to acquire detailed information of that moving company, including experiences, complaints and reviews. If you have had experiences with a moving company, please share it with us by submitting a review. Doing so you help other people to make the right decision.\n\n\nAre you looking for reviews of a removalist?\n\n\nShow all\n\nChess Moving Melbourne\n\n0.0 out of 0 reviews\nTullamarine, Melbourne", "pred_label": "__label__1", "pred_score_pos": 0.9999536275863647} {"content": "Recollection fact or fiction essay\n\nscience fiction and design\n\nIt is important because it is involved in almost every aspect of cognition including problem solving, decision making, attention, and perception. In this section, Plato uses these characters to discuss the paradox of inquiry and propose a possible solution to it. This knowledge, Plato believed, was gained when the soul resided in the invisible realm, the realm of The Forms and The Good.\n\nThis does not imply that I enjoy eating by myself or watching movies alone. This kind of prodding teaches us to put the idea of performance at the forefront of how we form memories.\n\nTruth and ethics change ideas to fit the facts, whereas power and politics change facts to fit the ideas. However, there are crucial differences about this new era of algorithmically controlled manufactured recollection — most notably, scale and uniformity. Originally popularized by the standalone app Timehop, a version of it is now implemented on Facebook, Instagram, Google Photos, and Apple Photos, creating a regular cadence of induced nostalgia on a mass scale and normalizing a new inflection point in how and when millions of people revisit images.\n\n\nhow to create a design fiction\n\nAs algorithmically manufactured recollection on platforms continues to take hold, we must ask what memories are left on the outskirts.\n\nUsing the Platonic concepts of 'Forms', 'particulars', 'knowledge' and 'true opinion', this essay explains what can or cannot be recollected, why all knowledge is based on recollection, and why the doctrine does not prove the soul to be immortal Therefore, when people are learning or discovering, they are just recollecting things they already forget.\n\nSpeculative design fiction\n\nHe then extends this reason to all plants, animals, and things that come to be. There is certainly an argument to be made that fiction—even labeled fiction—has no place in the newspaper. Meno came to conclusion after a long discussion with Socrates that it is impossible to know what virtue is. Where I came from, a composite character was a fiction. Counterexamples positively verify and proexamples negatively falsify the validity of 'sense' for 'know'. We can also explore how to preserve connections to experiences and thoughts beyond the cues of images. Do your duty. Thus, truth and ethics, in construction, intrinsically motivate subjects, to seek and find independent confirmation between its consciousness externalized as behavior, including form-shaping-content, as in recollection as well, spatializing time, and the other's behavior internalized as consciousness, including content-shaping-form, and temporalizing space. Whose truth? Current content is conveyed from periphery to depth, along temporalizing space in recollection, and from depth to periphery, along spatializing time in construction.\nRated 5/10 based on 108 review\nConstructive Recollection Philosophy Application", "pred_label": "__label__1", "pred_score_pos": 0.9922974109649658} {"content": "My first Magazine - Page 12\n\nImage Theft, Photo Plagiarism, and Copyright!\n\nWith billions of photographs being available so widely all over the World Wide Internet, it is not uncommon to see not only individuals, but also companies using other people’s work for their own benefit.\n\nIn some cases, theft is loud and clear, with images being used without any permission, and in other cases, images are stolen and altered and manipulated in Photoshop to create something vastly different.\n\nShould photography only be allowed to display reality, or is it acceptable to alter images for presentation purposes? And if manipulation is acceptable, what are its limits, if any? These are very hard questions to answer, but with some common sense, we can create a set of ethical rules and guidelines that should help photographers in determining what’s acceptable and what’s not.\n\nWhat about situations, where a photographer borrows another photographer’s idea and perspective to get a very similar, if not near identical shot? Now this one is a topic of endless debates, one capable of sparking huge arguments on both sides of the game.\n\nFirstly we will discuss copyright law. Copyright only applies to physically manifested work; this can be in the form of a photograph or a digital file. It does not apply to a thought or idea or concept for an image. Whoever ‘reduced such ideas into material form’ will then be the person holding the rights to that work regardless of whether or not it was their concept. The person who holds the rights to an image is therefore its creator, and does not need to be the person responsible for pressing the shutter release on the camera specifically, but rather the person responsible for the artistic input, which includes styling, lighting, sets and composition.\n\nWhere South African law differs from international law is in the line “commissioned photographs are owned by the commissioner (client)” This means freelance photographers have no rights to their work. This is a contentious issue that may be covered in further articles and forums. But fortunately this issue can be circumvented by mutual agreement, even when it takes the form of a verbal agreement. The act allows for negotiation of these default terms, and consequently any agreement negotiated comes under contract law which then overrides the Copyright Law.\n\nCopyright is automatic; you do not need to take any action to ensure your photograph is protected by the law. Adding the copyright logo to an image only serves as a reminder that the creator reserves rights on the usage of the image. Secondly, it allows interested parties to know who to contact if they want to obtain rights for an image. Marking an image with copyright information should include the copyright owner's name, the year the image was first made public or was published, the copyright symbol and which rights are reserved.", "pred_label": "__label__1", "pred_score_pos": 0.9982659220695496} {"content": "Associations to the word «Outline»\n\n\nOUTLINE, noun. A line marking the boundary of an object figure.\nOUTLINE, noun. The outer shape of an object or figure.\nOUTLINE, noun. A sketch or drawing in which objects are delineated in contours without shading.\nOUTLINE, noun. A general description of some subject.\nOUTLINE, noun. A statement summarizing the important points of a text.\nOUTLINE, noun. A preliminary plan for a project.\nOUTLINE, noun. (film industry) A prose telling of a story intended to be turned into a screenplay; generally longer and more detailed than a treatment.\nOUTLINE, verb. (transitive) To draw an outline of something.\nOUTLINE, verb. (transitive) To summarize something.\n\nDictionary definition\n\nOUTLINE, noun. The line that appears to bound an object.\nOUTLINE, noun. A sketchy summary of the main points of an argument or theory.\nOUTLINE, noun. A schematic or preliminary plan.\nOUTLINE, verb. Draw up an outline or sketch for something; \"draft a speech\".\nOUTLINE, verb. Trace the shape of.\n\nWise words\n\nWinston Churchill", "pred_label": "__label__1", "pred_score_pos": 0.9969122409820557} {"content": "Mendeleev’s periodic table\n\nDmitri Mendeleev\n\nDmitri Mendeleev (1834-1907) was a Russian chemist. In the 19th century, he was one of several scientists who were looking for ways to organise the known elements. Mendeleev published his first periodic table of the elements in 1869.\n\nFeatures of Mendeleev’s tables\n\nMendeleev arranged the elements in order of increasing relative atomic mass. He then considered the properties of the elements and their compounds. Mendeleev found that this allowed him to arrange elements with similar properties below each other into groups. However, to make this work, he had to:\n\n • leave gaps for yet to be discovered elements\n • swap the order of a few pairs of elements\n\nMendeleev’s 1869 table showed groups of elements in horizontal rows, but from 1871 he showed groups of elements in vertical columns.\n\nSix rows, eight columns showing H, Li, Be, B, C, N, O, F. Na, Mg, Al, Si, P, S, Cl, K, Ca, Ti, V, Cr. Fe, Co, Ni and Cu. (Cu), Zn, As, So, B, Rb, Sr, Yt, Zr, Nb, Mo, Ru. Rh, Pd and Ag.\n\nPredictions using gaps\n\nMendeleev left gaps in his table to place elements not known at the time. By looking at the chemical properties and physical properties of the elements next to a gap, he could also predict the properties of these undiscovered elements. For example, Mendeleev predicted the existence of ‘eka-silicon’, which would fit into a gap next to silicon. The element germanium was discovered later. Its properties were found to be similar to the predicted ones, which supported the ideas behind Mendeleev’s periodic table.\n\nPair reversals\n\nIodine has a lower relative atomic mass than tellurium. So iodine should be placed before tellurium in Mendeleev’s tables. However, iodine has similar chemical properties to chlorine and bromine. To make iodine line up with chlorine and bromine in his table, Mendeleev swapped the positions of iodine and tellurium.", "pred_label": "__label__1", "pred_score_pos": 0.9964640736579895} {"content": "Download Taming the Atom Study Guide\n\nSubscribe Now\n\nTaming the Atom\n\n(Critical Survey of Contemporary Fiction)\n\nThe atomistic view of the world—the hypothesis that all matter consists of tiny particles in ceaseless motion—dates back two and a half millennia to the Greek philosopher Democritus. That basic mental image remained essentially unchanged until the early years of this century, when the quantum theory of matter was created in order to explain the puzzling, illogical behavior of matter at a subatomic level. Quantum theory accounts for otherwise unaccountable subatomic phenomena by stating that matter exhibits both the properties of a particle and the properties of a wave. Although it is counter intuitive, accepting this premise allows physicists to construct mathematical equations which do indeed accurately describe and predict subatomic phenomena.\n\nUntil recently conventional physics and quantum theory could coexist because each was applied in a different sphere. One hypothesis adequately described everything above the level of the atom; the other adequately described the subatomic realm below. As von Baeyer writes, “Our perceptions of the atom—the miniature grain of sand and the quantum mechanical phantom—exist without a shadow of a doubt. The first we see and the second we know, and the gulf between them is profound.”\n\nAlthough the gulf is profound, it has narrowed to the merest crack. As scientists’ tools penetrate the perimeter of the atom, what has been hypothetical and mathematical is about to become directly perceptible. The two hypotheses must converge and be reconciled, or one or the other must be discarded. If, as von Baeyer suggests, quantum mechanics emerges as the single picture of the world, then a profound revolution is at hand. “The way humans perceive physical reality would differ from today’s perception as profoundly as today’s materialistic perspective differs from the medieval spiritual one. . . . The circumstances are propitious for the third millennium to begin, like the twentieth century, with a wonderful new insight into nature’s grand scheme.”", "pred_label": "__label__1", "pred_score_pos": 0.801681637763977} {"content": "(855) 4-ESSAYS\n\nType a new keyword(s) and press Enter to search\n\nInterpreting the sacred\n\n             The word religion is a term that generates different meanings to different people, in different settings.\n             In the book, Interpreting the Sacred, Paden examines different views of religion and how they were interpreted, through different perspectives. (Interpretive frames) These \"frames\" have been put in place to give the reader a different perspective on a theory.\n             Paden will examine the social, psychological and comparative theories. Each of these theories has its own idea of what religion is about, and attempts to teach it.\n             Next, Paden's idea of \"contextuality\", what it involves, and how it is used to solve the problems associated with each of these theories will be discussed.\n             The Sociological Theory.\n             In 1912, sociologist, Emile Durkheim, developed a model to explain religion. This model was based on the concept of society.\n             Durkheim sought to prove that religion was a system of belief and behavior, which represented social ideals. Durkheim argued that society creates a culture by building and shaping it, which in turn develops social roles and identities for people. Therefore, if society can create a culture, than why could it not create gods?.\n             Further along in his study, Durkheim coined the phrase \"the totemic principle\". This principle entailed the way communities grasped a certain symbol that identified their tribe and placed value on it. Durkheim saw these religious symbols as social symbols. If society creates culture, and culture creates symbols; than ultimately these religious symbols are social symbols. With this in mind, Durkheim stated that religion can only be explained sociologically.\n             For Durkheim, \"religion is a system of beliefs and practices relative to sacred things, uniting into a moral community for those who adhere to them\" (p.32) .\n             Another perspective during this period was that of Max Weber. Weber set forth to study how types of religious outlooks, correlate with types of social values.\n\nEssays Related to Interpreting the sacred\n\nGot a writing question? Ask our professional writer!\nSubmit My Question", "pred_label": "__label__1", "pred_score_pos": 0.9994519948959351} {"content": "Chapter 2. Tax revenue scenarios in road transport: A conceptual framework\n\nThis chapter introduces the conceptual framework used to describe the main characteristics of the taxation of road transport, encompassing the three main tax bases in the sector: energy use, vehicle stock and road use. The chapter also discusses how different tax types contribute to specific aspects of a sustainable tax policy strategy over the long term, taking revenue, fairness and efficiency considerations into account. Finally, the chapter discusses the degree of tax base disaggregation that is relevant to answering strategic questions concerning transport tax policy.\n\n\nThis chapter introduces the conceptual framework used to describe the main characteristics of the taxation of road transport. It first introduces a revenue function encompassing the three tax bases in the sector: energy use, vehicle stock and road use. Second, it considers the contribution of different tax types to specific aspects of a sound revenue-raising policy. Third, the chapter concludes by discussing the degree of disaggregation of the main tax bases necessary to capture shifts in tax bases that are relevant to answering strategic questions concerning transport tax policy.\n\n2.1. A revenue function in road transport\n\nGovernments collect tax revenue in road transport from three tax bases: energy (E), vehicle stock (V) and road use (M), i.e. kilometres driven, which can be summarised in the following revenue function:\n\nR e v e n u e = R E + R V + R M (1)\n\n= i t a x i * J o u l e i + j t a x j * n b   v e h i c l e s j + k t a x k * k m   d r i v e n k\n\nRevenue from energy ( R E ) relates to energy purchases in a country. It includes all energy types, i, such as gasoline, diesel and electricity, used in road transport. Currently, energy use in road transport derives predominantly from fossil fuels, but may shift towards alternative fuels following technological advances, falling prices for alternative fuel vehicles and stringent climate or air pollution policies. The energy base comprises fuel that is bought (and taxed) within a country, even if combusted abroad. Countries tax energy in road transport generally via excise duties per litre of fuel or specific taxes on the carbon content of the fuel (OECD, 2018[1]). Sometimes emissions from road transport and electricity production are instead, or additionally, covered by an emissions trading system (OECD, 2018[2]).\n\nAdditional revenue ( R V ) is collected from motor vehicles that are registered in a country. Tax rates can depend on a combination of specific vehicle characteristics, j, for example, a vehicle’s type (i.e., whether the vehicle is a bus, passenger car, truck, motorcycle), engine power, weight, type of fuel used, whether the vehicle is used for commercial or personal purpose, or according to the environmental performance of the vehicle. Countries tax motor vehicles, for example, via one-off registration or sales taxes and via recurrent taxes on vehicle use or ownership. These taxes usually take the form of specific taxes or ad valorem taxes on the price (OECD, 2018[3]).\n\nRevenue can also be derived from road use ( R M ). Countries can tax the number of kilometres driven, where driving types, k, distinguish, for example, between specific vehicle characteristics, driving on specific roads (tolled vs non-tolled), driving at a specific time of the day, or can depend on an area’s population exposure or congestion level. Typical road-pricing systems take the form of distance charges (e.g. motorway or city tolls) or congestion charges. Alternatively, taxation can take an access charge approach, for example in form of a vignette or some types of congestion charging (e.g. cordon fees). Such systems require fees to be paid to access the public road network for a specific period of time, but have no direct link to the amount of kilometres driven.\n\nThe three tax bases in road transport are connected. For example, driving a given distance with a specific vehicle technology determines the amount of energy that a vehicle uses; e.g. driving 100 km with an efficient internal combustion engine requires less energy than driving the same amount of kilometres with an inefficient engine. To represent the relationships between tax bases, the present analysis makes some assumptions (e.g. on the average number of kilometres driven and the average fuel used per vehicle technology and a given vehicle age), which are further discussed in Chapter 5.\n\nThe revenue function in equation (1) helps to illustrate how the technological trend towards more fuel-efficient and alternative fuel vehicles may affect tax bases differently. For example, improving the fuel-efficiency of internal combustion engines reduces the amount of fuel used to drive a given distance everything else equal. Shifts towards vehicles using alternative fuels will affect the vehicle and energy tax base. Chapter 5 presents details on the technology scenarios used in the analysis and their impact on the three tax bases.\n\nFinally, the revenue function is useful to illustrate implications of tax reform on revenues. For example, increasing fuel taxes will have the immediate effect of increasing tax revenues via the impact on R E . However, drivers may reduce fuel consumption as a consequence of higher fuel taxes, either by driving less or by driving more efficiently (e.g. through shifting towards more fuel-efficient vehicles or alternative fuel vehicles) or both. Chapter 6 simulates the tax base and revenue effects under different tax reforms in the transport sector, while considering these types of behavioural responses.\n\n2.2. Sound revenue-raising from taxation in road transport\n\nFair and efficient revenue-raising in road transport requires consideration of issues related to revenue stability, tax competition, tax system efficiency, administrative costs, as well as fairness and equity implications. This subsection discusses these themes, differentiating, where necessary, between fuel and carbon taxes, vehicle taxes and charges on road use. Table 1.1 in the introduction provides a summary of the findings.\n\n2.2.1. Revenue stability\n\nStability of transport tax revenues depends on the responsiveness of tax bases to changes in tax rates, and this varies with specific design features of a tax and the broader economic context. For example, consumer responsiveness to taxation varies with the original price level (i.e., are prices high or low before the tax reform), household characteristics (such as income and geographical location), and the availability of substitutes, e.g. public transport and car-pooling (Douenne, 2018[4]; Gillingham and Munk-Nielsen, 2019[5]; Spiller, Stephens and Chen, 2017[6]). If substitutes are expensive or unavailable, behavioural responses may only occur at high price levels. In contrast, where substitutes are readily available at small additional cost, price response can be substantial even at relatively low price levels.\n\nThe responsiveness of tax bases to changes in prices, or in tax rates, is generally expressed via backward-looking elasticities that are less informative in the present situation, where the likelihood of deep change is significant. Usually, estimates of elasticities relate to past fuel consumption, vehicle use or kilometres driven, i.e., consumer behaviour that is associated with the circumstances prevalent at that time, such as income levels and available substitutes. Such backward-looking elasticities are useful to evaluate future trends only to a limited extent in a situation where technological progress has the potential to develop alternative means of transport and change relative prices deeply, and where a sectoral transformation is sought.\n\nAnother aspect of revenue stability is inflation. Often fuel excise applies as a volumetric unit charge, and nominal tax rates do not always automatically increase with inflation. Therefore, real tax rates decline, gradually eroding tax revenue (OECD, 2018[1]). Mahler et al. (2017[7]) determine substantial revenue forgone from energy taxes in Germany because nominal tax rates are not adjusted for inflation. Some countries index statutory tax rates for inflation, including Australia, Chile, Denmark, the Netherlands, Norway and Sweden.\n\nThe literature suggests that excise duties and carbon taxes on fossil fuels may be an attractive instrument to raise stable revenue in the short run given the relatively low short-run responsiveness of the tax base to prices. Meta-analyses of backward-looking elasticities by Graham and Glaister (2002[8]) and Labandeira, Labeaga and López-Otero (2017[9]) find that gasoline consumption typically reduces around 2-3% in the short run when fuel prices rise by 10%, while the responsiveness is larger in the long run (see also Braathen (2000[10])). Recent studies have found much larger behavioural responses to changes in tax rates than to changes in pre-tax prices of a similar magnitude (Rivers and Schaufele, 2015[11]). The potential of fuel taxes to foster a switch towards more fuel-efficient and alternative fuel vehicles reduces their potential to generate stable revenue streams in the longer run.\n\nThe stability of revenue from vehicle taxation depends on the design of the tax. A periodic tax on vehicle ownership or circulation (i.e. usage) induces a fairly stable revenue flow, whereas the one-off character of a registration or a purchase tax renders revenue dependent on fleet turnover and the business cycle. Vehicle taxes can inadvertently set up a tension between revenue raising and environmental objectives. For example, a registration or purchase tax may reduce fleet turnover and thereby technology take-up, because it can push households to delay buying a new car. Ad valorem taxes, which apply as a percentage on the sales price of a vehicle, that do not vary with environmental criteria tend to incentivise price-sensitive households to choose relatively cheaper or second-hand cars instead of cars with new and expensive technologies.\n\nDistance-based charges can help establish a relatively stable revenue stream when transport decarbonises, because they primarily relate to driving and not to the amount of fuel that is used to drive. Although distance-based charges incentivise driving fewer kilometres, few substitution possibilities for driving exist in the short to medium run in areas where public transport networks are not well developed. This lack of alternatives reduces the elasticity of driving compared to the elasticity of fuel consumption and improves the efficiency of raising revenues via distance-based charges (Parry and Small, 2005[12]). (In the long run, Molloy and Shan (2013[13]) suggest that households may consider changes in transportation costs in their residential location choice, if they have decided to relocate anyways.) Drivers also seem to respond less strongly to fuel prices in adjusting distances driven than they do in adjusting fuel consumption (Small and Van Dender, 2007[14]), which makes driving a more stable tax base and taxes related to driving a superior tool to raise revenues in the transport sector. Distance-based charges are also a promising tool to raise revenue in a future with more automated vehicles and shared services, because, similar to other tax categories, they can be made neutral with respect to the ownership or the usage of the vehicle.\n\nThe revenue stability from distance-based charges depends also on the design of the tax. Instruments that reflect driving behaviour, such as distance-based or congestion-based schemes, will perform better in targeting driving behaviour. Conversely, vignette systems are charged per vehicle and driving period, but do not vary with the amount or the timing of driving. This makes them equivalent to a tax on accessing the road network, instead of a charge on driving, which limits their potential to manage driving behaviour fairly and efficiently and to raise revenues. Mandell and Proost (2016[15]) mention that vignettes raised less revenues than comparable distance-based charges in Europe in the past.\n\n2.2.2. Tax competition\n\nInternational competition for mobile tax bases can affect the potential to raise tax revenues in the transport sector, in particular, revenues related to the fuel tax base (but also related to the driving base, if a jurisdiction can be bypassed easily). Vehicle taxes apply only to domestic vehicles, which reduces the potential for international competition.\n\nFuel tourism can significantly affect tax revenues collected from fuel taxes and lead to tax competition across jurisdictions. Governments levy excise duties and carbon taxes in the country where fuels were purchased, as opposed to the territory where the vehicle is driven and the fuel ultimately combusted. Jurisdictions may set low rates in the hope of attracting foreign fuel tax bases. Tax competition can push drivers to alter their routes, not for a specific destination, but solely to refuel their tanks and benefit from low excise duties.\n\nThe impact of fuel tourism on tax revenues can be particularly strong with respect to diesel used in trucks, as trucks often travel internationally and can store large quantities of fuel (Mandell and Proost, 2016[15]). Fuel tourism at the passenger car level occurs particularly in border regions. Its intensity depends on different factors, including transport costs (e.g. distance to a border, valuation of time and frictions related to language, money, and border procedures), but also on income, infrastructure, and the availability of alternative travel modes (e.g. public transport). Recent studies find evidence for fuel tourism across European countries and US states (Banfi, Filippini and Hunt, 2005[16]; Manuszak and Moul, 2009[17]). Recently, Kennedy et al. (2018[18]) suggested that in the Republic of Ireland approximately 9% of tax revenues from excise duties in road transport may be attributed to fuel tourism.\n\nTax competition for mobile tax bases is particularly likely in interconnected geographical areas, where competences for setting tax rates are heterogeneous and border crossing is simple. For example, Evers, de Mooij and Vollebergh (2004[19]) and Paizs (2013[20]) find evidence that European governments strategically set diesel excise levels in response to tax rates or tax changes in neighbouring countries. In line with findings from the general tax competition literature, e.g., in Kanbur and Keen (1993[21]), small countries seem to set lower diesel tax rates than large countries (Paizs, 2013[20]; Rietveld and van Woudenberg, 2005[22]). De Borger and Proost (2012[23]) discuss the different mechanisms for governments’ strategic behaviour in setting transport tax rates and the related theoretical literature. Analyses of fuel tax competition do generally not look at governments’ tax setting behaviour when tax bases erode exogenously (e.g. from technological evolution) as in the present case.\n\nThe European Energy Tax Directive (2003/96/EC) sets minimum excise duty rates, which limits the erosion of rates via tax competition across European member states to some extent. Currently, minimum rates are set at EUR 0.359 per litre of petrol and at EUR 0.330 per litre of diesel. The minimum rates prevent countries from taxing fuel below these levels, but they have “not been sufficient to prevent the persistence of significant divergences” across EU member states (European Commission, 2007[24]). The EU minimum rates have not been revised since 2003 and reflect neither the energy content nor the CO2 component of fuels. This results in taxation that is not neutral across fuels and may bias decisions towards less taxed fuels, which are not necessarily the most socially efficient choice.\n\nIn the context of tax competition, distance-based charges provide some advantages over alternative tax instruments. While vehicle taxes cover a country’s residents only, distance-related taxes or congestion charges are independent of the nationality of the driver and instead relate to the territory where driving takes place. At the same time, the risk for base erosion through tax competition plays a less prominent role for distance-related taxes than for fuel taxes – at least in those countries that drivers cannot bypass easily. A co-ordinated approach across several countries within a specific transit region may reduce the potential for tax competition further.\n\nMandell and Proost (2016[15]) suggest that distance-based charges for trucks can be “contagious” across countries and be the preferred tool in a country’s tax competition game. They find that the possibility to tax distances on top of fuel use allows countries to attract commercial driving through reduced fuel taxes while keeping revenues stable via the distance tax. However, existing regulation in Europe may mitigate these competition effects, particularly in countries where fuel taxes are set at the minimum level and where caps on the level of distance-based charges are binding.\n\n2.2.3. Tax system efficiency\n\nOptimal taxation theory provides no reason for taxing intermediated goods (e.g. commercial trucks and cars or fuel used for work related travel) in a situation where externalities are priced. By the Diamond and Mirrlees (1971[25]) result, taxing intermediate inputs to production will distort the allocation of resources away from the taxed towards the non-taxed input. In the case of commercial trucks, for example, a high vehicle tax would distort decisions away from using trucks in production processes towards more expensive inputs, even if they yield equivalent outputs and environmental effects.\n\nIntermediate inputs that generate externalities, such as fuel and vehicle use and driving, should ideally be taxed at a rate that reflects external costs. Currently, the full range of external costs from driving are under-priced in many countries. This includes estimates of external costs which relate to using fossil fuel technologies during driving (e.g. carbon emissions, air pollution and noise), but also those costs that are unrelated to fossil fuel use and would remain present even under a fully decarbonised vehicle fleet (in particular, accidents, congestion, road damage, noise, use of public space and reduced mobility for non-drivers). Van Dender (2019[26]) gives an overview of some of the driving-related external costs by kilometre in different contexts, e.g. rural vs urban driving, different degrees of congestion.\n\nFuel taxes and distance-based charges are more efficient in targeting driving-related external costs compared to vehicle taxes. The latter are suboptimal in this respect, as vehicle taxes can only account for average vehicle characteristics, but not the externalities related to driving behaviour, the amount and the place of driving (Van Dender, 2019[26]).\n\nFuel taxes are a good instrument to account for external costs from CO2 emissions, because these emissions are proportional to fuel use. However, they target other driving-related external costs less well, in particular those that depend heavily on vehicle technology, driving behaviour, the specific driving location and pollution exposure that varies across geographic areas.\n\nVehicle taxes can differentiate according to the emission profile of a vehicle, including both local air pollution and carbon emissions. Focussing vehicle taxes only on fuel-efficiency or CO2 emissions can stimulate the sale of diesel cars despite their negative impact on health and the environment through air pollution (Teusch and Braathen, 2019[27]). The vehicle purchase tax in Israel, for example, accounts for many different emissions, including carbon dioxide, particulate matter and nitrogen oxides (OECD, 2016[28]). Current vehicle taxes do generally not account for the observed gap between real-life emissions and the advertised emission profiles derived from test cycles. For given tax rates, the increasing gap between test and real-world emission values leads to substantial amounts of tax revenue forgone in 11 European member states (Forum Ökologisch-Soziale Marktwirtschaft / Green Budget Germany and Green Budget Europe, 2018[29]).\n\nDistance-based charges, if carefully designed, have the potential to deliver more efficient road transport because they can reflect additional external costs related to driving (Parry and Small, 2005[12]). For example, distance-based charges can vary depending on the average pollution profile and weight of a vehicle and as such reflect the costs related to air pollution and road damage. They can also mirror spatial and temporal variation in driving; thereby reflecting population exposure to external costs, such as noise and air pollution, and integrating costs from congestion during peak hours and locations. Neither fuel nor vehicle taxes are able to integrate the external costs from driving differentiated by location and time as efficiently as distance-based charges do (Van Dender, 2019[26]).\n\nIn the EU, distance-related charges for trucks apply within the framework of the EU Eurovignette directive (1999/62/EC) and subsequent amendments (2006/38/EC and 2011/76/EU). The original Eurovignette directive said that charges should relate to costs for developing, constructing and operating the network. Revisions of the directive complement this “user pays principle” by a light version of the “polluter pays principle”, i.e. current truck toll rates may vary to a certain degree in order to account for environmental (air pollution and noise) or traffic management objectives. However, maximum values on external cost charges limit their potential to reflect full external costs from driving. For passenger cars, no specific EU legislation exists. Pricing road use, by cars or trucks, also needs to respect the broader principles set out in the EU Treaties, in particular the principle of non-discrimination on the grounds of nationality.\n\n2.2.4. Fairness and equity implications\n\nThe potential distributional consequences stemming from transport tax reform need to be considered. Estimating and presenting the distributional effects along income and spatial dimensions can form a basis for designing accompanying policy measures that may support tax reform. Accompanying measures may advertise and encourage the use and development of alternative travel modes (such as public transport or car-pooling) and support households that are affected disproportionally by the reform in the short run, but cannot easily adjust to the reform due to budget constraints. Bento (2009[30]) shows that different support measures (flat transfers, income-based transfers or distance-based transfers) can have important and different impacts on the distributional impacts of gasoline taxes.\n\nDistributional effects of fuel taxes differ across countries, income levels (Sterner, 2012[31]; Flues and Thomas, 2015[32]) and geographic areas within a country, because differences in work distances play an important role in driving patterns. For example, fuel taxes may place a disproportionally high burden on households living in rural areas (see simulation in Bureau (2011[33]) and Spiller, Stephens and Chen (2017[6])), who cannot reduce driving needs in the short run by substituting towards public transport, moving location or changing jobs. Similarly, in the absence of revenue recycling, distance-based charges may have adverse effects on households with long commutes and that cannot easily adjust driving patterns in the short run. (Levinson (2010[34]) reviews the equity effects of road pricing.)\n\nVehicle taxation also has equity impacts. Ad-valorem vehicle taxes may be progressive if low-income households purchase less expensive cars more often. In addition, if vehicle taxes are differentiated by emission bands, providing lower rates for more efficient vehicles, and if high-income households predominantly drive fuel-efficient cars, the tax could be regressive. Fully exempting electric vehicles from taxation likely benefits predominantly high-income households that can afford purchasing these vehicle types.\n\nThe widely applied tax exemptions and benefits for electric vehicles are not only expensive in terms of revenue foregone, but are likely to be regressive too. Borenstein and Davis (2016[35]) show that an income tax credit in the United States for plug-in electric vehicles disproportionately benefits the top income quintile, receiving 90% of all credits. The authors explain this strong regressive effect by the fact that low-income households may not invest in expensive electric vehicles and by the non-refundability of the credit. A recent study by Muehlegger and Rapson (2018[36]) shows that means-tested subsidies directed towards low- and middle-income buyers in California achieve electric vehicle take-up in this segment of the market, but that the revenue cost is large.\n\n2.2.5. Administrative costs\n\nThe costs of collecting fuel taxes are relatively low. Fuel excise and carbon taxes are relatively easy to administer, as the number of fuel producers or importers is low. Compliance costs for taxpayers are usually low too. Where fuel used for commercial purposes benefits from reduced rates, compliance costs increase, as it requires truck companies to either file refund claims in all countries where fuel was purchased or to adjust tax returns and respond to audits.\n\nIn view of the higher revenue stability and the better management of external costs from driving, distance-based charges becomes an appealing option to fuel and vehicle taxation, even if the administrative costs of managing the former are more important. Van Dender (2019[26]) reviews literature on the costs of electronic tolling systems, concluding that distance-based charging systems have historically been expensive, but that historical data may not be a good indicator to predict costs in the future. Technological progress in charging techniques allows systems to become fine-tuned to particular circumstances and be run efficiently to bring costs down compared to historical estimates. In countries where tolling infrastructure already exists, benefits to extending distance-based charges to a wider tax base may outweigh additional costs.\n\nPrivacy concerns about data collection through distance-based charging system should be addressed. For example, simple odometer readings can assess distances travelled by a vehicle without detailed information on the driving, but such systems cannot implement rates that vary with location and congestion levels. GPS-based systems, which track a vehicle’s position and driving anytime, can accommodate differentiated rates. Carefully designing GPS-systems may reduce potential privacy concerns. For example, in Oregon’s experimental distance-based charging programme and the current German truck tolling system, driving-related data are destroyed as soon as drivers pay their road user charge (Kirk and Levinson, 2016[37]; Langer, Maheshri and Winston, 2017[38]).\n\n2.3. Tax base disaggregation\n\nSimulating the development of tax bases and revenues under different technology scenarios and future tax reform requires disaggregating further the three tax bases (energy use, vehicle stock and road use). The disaggregation needs to capture all margins that are relevant to answering strategic questions concerning transport tax policy. For the present analysis, the relevant shifts in tax bases derive both from technology change and from potential behavioural adjustments to tax reform. A potential disaggregation is sketched in Figure 2.1.\n\nFigure 2.1. Disaggregation of tax bases along relevant behavioural and technology margins\n\nNote: AFV = alternative fuel vehicle; EV = electric vehicle; ICE = internal combustion engine.\n\nSource: OECD/ITF representation.\n\nBreaking down the tax bases into personal as opposed to commercial vehicles, such as trucks, captures the fact that these vehicle categories use different technologies. For example, currently trucks mainly rely on technologies using diesel, while personal vehicles use different types of fuels. In addition, the speed and extent at which these technologies develop in the future likely varies across both categories. (Note that 2- and 3-wheelers, light duty vehicles (i.e. vans), buses or special purpose vehicles are not considered in the analysis.)\n\nPersonal and commercial vehicles also differ in their driving patterns and potential behavioural responses to tax reform. Drivers of personal vehicles typically respond to increases in fuel prices by reducing fuel use (see Section 2.2.1), while it is often argued that road freight is relatively price inelastic. However, Graham and Glaister (2004[39]) find that the latter may not be the case as several studies report a decrease in fuel consumption following a fuel price increase in freight, acknowledging that evidence is still sparse.\n\nThe simulation would ideally also discriminate between the residence countries of drivers as some tax types, such as vehicle taxes, apply only to domestic drivers. The margins and magnitude of behavioural response to tax reform likely differ in this dimension too. While a foreign truck driver who crosses Europe regularly can decide to refuel in many different countries along the route, a domestic driver, who would not leave the country under general circumstances, will be more restricted in the choice of where to purchase fuel.\n\nIt would also be necessary to differentiate some locational aspects of driving, in particular whether a vehicle is driven on a motorway or on other roads, and whether the driving takes place in an urban context or not. When incorporating separate road types, different margins for tax reform can be considered, e.g. the introduction of motorway tolls, congestion charges or other distance-based measures. Since driving behaviour and the availability of substitutes (e.g. public transport) varies substantially across urban and non-urban areas, a breakdown along these lines would be necessary to capture the relevant behavioural responses to tax reform. For example, an increase in fuel taxes may have different implications on driving and energy use-patterns depending on the availability of public transport in specific areas.\n\nBecause the tax system in road transport often includes special provisions for alternative fuel vehicles (AFV) as opposed to vehicles with an internal combustion engine (ICE), a further disaggregation in this respect may be useful. For example, beneficial treatment for AFV’s is available across a large set of countries, e.g. in the form of vehicle tax incentives or reduced road tolls (German et al., 2018[40]). AFVs and ICEs also use different fuel types and respond differently to changes in fuel taxes as well as technological evolution. A further division of ICEs according to the specific fuel-efficiency of different car models or technology types can capture differences in the energy consumption profiles of these cars.\n\n\n[16] Banfi, S., M. Filippini and L. Hunt (2005), “Fuel tourism in border regions: The case of Switzerland”, Energy Economics, Vol. 27, pp. 689-707,\n\n[30] Bento, A. et al. (2009), “Distributional and Efficiency Impacts of Increased US Gasoline Taxes”, American Economic Review, Vol. 99/3, pp. 667-699,\n\n[35] Borenstein, S. and L. Davis (2016), “The Distributional Effects of US Clean Energy Tax Credits”, ax Policy and the Economy, Vol. 30, pp. 191-234,\n\n[10] Braathen, N. (2000), Behavioral responses to environmentally-related taxes, COM/ENV/EPOC/DAFFE/CFA(99)111/FINAL, (accessed on 27 March 2019).\n\n[33] Bureau, B. (2011), “Distributional effects of a carbon tax on car fuels in France”, Energy Economics, Vol. 33/1, pp. 121-130,\n\n[23] De Borger, B. and S. Proost (2012), “Transport policy competition between governments: A selective survey of the literature”, Economics of Transportation, Vol. 1, pp. 35-48,\n\n[25] Diamond, P. and J. Mirrlees (1971), “Optimal Taxation and Public Production I: Production Efficiency.”, The American Economic Review, Vol. 61/1, pp. 8-27,\n\n[4] Douenne, T. (2018), “The vertical and horizontal distributive effects of energy taxes: A case study of a French policy”, FAERE Working Paper, No. 2018.10,\n\n[24] European Commission (2007), Commission Staff Working Document. SEC(2007) 170/2,\n\n[19] Evers, M., R. De Mooij and H. Vollebergh (2004), “Tax Competition under Minimum Rates: The Case of European Diesel Excises”, CESifo Working Paper Series, No. 1221,\n\n\n[29] Forum Ökologisch-Soziale Marktwirtschaft / Green Budget Germany and Green Budget Europe (2018), Loss of revenues in passenger car taxation due to incorrect CO2 values in 11 EU states, A report commissioned by the Greens/EFA group in the European Parliament,\n\n[40] German, R. et al. (2018), Vehicle Emissions and Impacts of Taxes and Incentives in the Evolution of Past Emissions. Report to EEA, European Topic Centre on Air Pollution and Climate Change Mitigation,\n\n[5] Gillingham, K. and A. Munk-Nielsen (2019), “A Tale of Two Tails: Commuting and the Fuel Price Response in Driving”, Journal of Urban Economics, Vol. 109, pp. 27-40,\n\n[39] Graham, D. and S. Glaister (2004), “Road Traffic Demand Elasticity Estimates: A Review”, Transport Reviews, Vol. 24/3, pp. 261-274,\n\n[8] Graham, D. and S. Glaister (2002), “The Demand for Automobile Fuel: A Survey of Elasticities”, Journal of Transport Economics and Policy, Vol. 36/1, pp. 1-25,\n\n[21] Kanbur, R. and M. Keen (1993), “Jeux Sans Frontières: Tax Competition and Tax Coordination When Countries Differ in Size”, The American Economic Review, Vol. 83/4, pp. 877-892,\n\n[18] Kennedy, S. et al. (2018), “Assessing the Level of Cross: Border Fuel Tourism”, Irish Journal of Social, Economic and Environmental Sustainability, Vol. 1/2, pp. 4-22,\n\n[37] Kirk, R. and M. Levinson (2016), Mileage-Based Road User Charges, Congressional Research Service,\n\n[9] Labandeira, X., J. Labeaga and X. López-Otero (2017), “A meta-analysis on the price elasticity of energy demand”, Energy Policy, Vol. 102, pp. 549-568,\n\n[38] Langer, A., V. Maheshri and C. Winston (2017), “From gallons to miles: A disaggregate analysis of automobile travel and externality taxes”, Journal of Public Economics, Vol. 152, pp. 34-46,\n\n[34] Levinson, D. (2010), “Equity Effects of Road Pricing: A Review”, Transport Reviews, Vol. 30/1, pp. 33-57,\n\n[7] Mahler, A. et al. (2017), Die Finanzierung Deutschlands über Steuern auf Arbeit, Kapital und Umweltverschmutzung, Forum Ökologisch Soziale Marktwirtschaft e.V./Green Budget Germany,\n\n[15] Mandell, S. and S. Proost (2016), “Why truck distance taxes are contagious and drive fuel taxes to the bottom”, Journal of Urban Economics, Vol. 93, pp. 1-17,\n\n[17] Manuszak, M. and C. Moul (2009), “How far for a buck? Tax differences and the location of retail gasoline activity in southeast Chicagoland”, The Review of Economics and Statistics, Vol. 91/4, pp. 744–765,\n\n[13] Molloy, R. and H. Shan (2013), “The Effect of Gasoline Prices on Household Location”, Review of Economics and Statistics, Vol. 95/4, pp. 1212-1221,\n\n[36] Muehlegger, E. and D. Rapson (2018), “Subsidizing Mass Adoption of Electric Vehicles: Quasi-Experimental Evidence from California”, NBER Working Papers, No. 25359, National Bureau of Economic Research,\n\n[3] OECD (2018), Consumption Tax Trends 2018: VAT/GST and Excise Rates, Trends and Policy Issues, OECD Publishing, Paris,\n\n[2] OECD (2018), Effective Carbon Rates 2018. Pricing Carbon Emissions Through Taxes and Emissions Trading, OECD Publishing, Paris,\n\n[1] OECD (2018), Taxing Energy Use 2018: Companion to the Taxing Energy Use Database, OECD Publishing,\n\n[28] OECD (2016), “Israel’s Green Tax on Cars: Lessons in Environmental Policy Reform”, OECD Environment Policy Papers, No. 5, OECD Publishing, Paris,\n\n[20] Paizs, L. (2013), “Asymmetric competition in the setting of diesel excise taxes in EU countries”, Acta Oeconomica, Vol. 63/4, pp. 423-450,\n\n[12] Parry, I. and K. Small (2005), “Does Britain or the United States Have the Right Gasoline Tax?”, The American Economic Review, Vol. 95/4, pp. 1276-1289,\n\n[22] Rietveld, P. and S. van Woudenberg (2005), “Why fuel prices differ”, Energy Economics, Vol. 27, pp. 79-92,\n\n[11] Rivers, N. and B. Schaufele (2015), “Salience of carbon taxes in the gasoline market”, Journal of Environmental Economics and Management, Vol. 74, pp. 23-36,\n\n[14] Small, K. and K. Van Dender (2007), “Fuel Efficiency and Motor Vehicle Travel: The Declining Rebound Effect”, The Energy Journal, Vol. 28/1, pp. 25-51,\n\n[6] Spiller, E., H. Stephens and Y. Chen (2017), “Understanding the heterogeneous effects of gasoline taxes across income and location”, Resource and Energy Economics, Vol. 50, pp. 74-90,\n\n[31] Sterner, T. (2012), Fuel Taxes and the Poor: The Distributional Effects of Gasoline Taxation and Their Implications for Climate Policy, RFF Press, New York,\n\n[27] Teusch, J. and N. Braathen (2019), “Ex-post cost-benefit analysis of environmentally related tax policies Building on programme evaluation studies”, forthcoming in: OECD Environment Working Papers, OECD Publishing, Paris.\n\n[26] Van Dender, K. (2019), “Taxing vehicles, fuels, and road use: Opportunities for improving transport tax practice”, OECD Taxation Working Papers, No. 44, OECD Publishing, Paris,\n\nEnd of the section – Back to iLibrary publication page", "pred_label": "__label__1", "pred_score_pos": 0.6883062124252319} {"content": "dreamstime_xxl_42602961When it comes to your marriage ending, you are more likely to get emotional than not. That’s fine. There is a huge chapter of your life that is coming to an end and grieving the loss of seemingly the most important relationship in your life is something that more often than not, has to happen. However, there is a very distinct difference between being emotional in the privacy of your own home and in a meeting with your soon-to-be ex-spouse and your lawyers.\n\nThe reason avoiding emotion during mediation is helpful is that is allows you to present yourself as competent. Who do you think is more likely to get what they want out of a divorce: the person sobbing and screaming at the top of their lungs or the person who sits calmly and respond to questions rationally and at a regular volume? That’s right, the person who appears to be level-headed is much more likely to get their way.\n\nThere are, however, hot button issues that often cause those who are going through the divorce to fly off the handle. The most common hot button issue is that of custody of children. Parents get very easily excited when it comes to their children, and rightfully so. If you know that you will react emotionally to something specific, be sure to disclose that information to your lawyer so that if need be, he/she can navigate the conversation elsewhere or perhaps pull you into another room for a few minutes so that you can calm down.\n\nRemember, it’s alright to be upset about your divorce, but make sure to do so in a place and manner that will not make you look bad. If you need help arranging a divorce, call the experts at Pavithran Law today!", "pred_label": "__label__1", "pred_score_pos": 0.8957260251045227} {"content": "\n\nKevin Roberts believes that video technology is now a necessity in professional football, but argues that players must adapt their behaviour to ensure it is a success. \n\n\nCo-hosting major events has become increasingly common. Why has the landscape changed in international sport and what are the complications, as well as the opportunities, associated with such an approach?\n\nThe number of people watching NFL games in stadiums and on television has fallen significantly over the last few years. Richard Clarke assesses whether empty seats and poor ratings are signs of a permanent decline.\n\nZhao Jun, chief executive of CSM, wants to renegotiate her company's 8-billion- yuan deal for Chinese Super League rights after  the league imposed restrictions on the transfer of foreign players. Ben Cronin spoke to the ‘8-billion-dollar sister’ at the recent Sportel media convention.\n\n\nTelevision networks can't get enough of reality programmes that follow the everyday lives of sports stars. Barry Wilner finds out how the USOC and NFL are using the content to generate interest in their live events.\n\nCoca-Cola's decision to feature a fictional character from EA Sports' Fifa 18 in its marketing campaign for the 2018 World Cup shows how the console game has become a star in its own right, says Richard Clarke.\n\n\n\nJoseph Eapen, senior vice president, SMG India, looks at audience and viewing figures for the Pro-Kabaddi League (PKL) in India.", "pred_label": "__label__1", "pred_score_pos": 0.9913947582244873} {"content": "There is no \"Magic Pill\"\n\nFor some reason, it is always at the end of a season, that parents start the age old question \"how can- when will my kid get faster?\" \n\nThe answer is very simple: Come to practice!\n\nOf course, it is always not as simple as it sounds. There is a little more involved, then simply swimming laps up and down the pool, but that’s where it begins. Unfortunately, like anything worth doing well in this world, there is no magic pill.  The answer is very old fashioned; hard work.. This can be done is a number of ways when it comes to swimming\n\n1- Come to practice. How many days a week? Answer that question by asking the swimmers a different question, \"How good do you want to get?\" There is a direct correlation between number of days at practice and rate of progression. The more you come to practice, the more you will learn. The more you learn, the better you will become. And with different ages, there are different answers. Younger swimmers may only need 3-4 days a week, while older swimmers do need 5-6. \n\n2- Be Coachable. This is harder than it sounds. There are some who are very stuck in their ways, and will not change no matter how many times a coach can tell them something. Change can be very scary as an adult, imagine how much harder it is for a child, young adult.  But we have to be open to change, and willing to try new things. We as coaches want the best for each and every swimmer, so when we are trying to change a stroke, turn, attitude, there is a reason for it. If something is not working for you, change it. \n\n3- Always stay positive. Swimming is a long, sometime tedious sport. We are talking about months, years of staring at a black line with your head under water. It is tough to do. Failures will happen. DQ’s will happen. Plateaus will happen. Always keep the faith that this too will pass. As a swimmer gets older, it is very possible to only do a best time once a twice a year! And that is normal. We just have to stay positive and realize that this is a process and it is all about baby steps. Celebrate the little victories in the sport.\n\nPlease remember, just because one season is coming to an end, does not mean that the hard work and practice stops there. As soon as one season ends, there is another one right around the corner. Start thinking about the next season, and what your swimmer can do now to be better then.\n\nJust my two cents today", "pred_label": "__label__1", "pred_score_pos": 0.935263454914093} {"content": "Upcoming Events\n\nWonder Woman #69 Variant Edition\n\nUSD $ 3.99\n\nDiana made a promise to Aphrodite: she would do everything she could to help her find her son, Atlantiades, lost somewhere on Earth. But when they pick up his trail, there's no way to prepare themselves for what they'll find: a perfectly normal suburban town…driven out of its mind with uncontrolled lust!.", "pred_label": "__label__1", "pred_score_pos": 0.8029162883758545} {"content": "On the Record\n\nFarm fresh\n\nOn the Record with Bill Hristakos\n\nDeKALB – Bill Hristakos is from a small farming town near Sparta, Greece, where everyone knows each other by their first name.\n\nHe moved to the United States when he was 24 and has been in the restaurant business since 1984.\n\nHristakos owns Ellwood Steak and Fish House, 2219 Sycamore Road in DeKalb, and Bill’s Organic Olive Oil, which is made from fruit grown in his family’s orchard in Greece. The olive oil is imported and used at his restaurant and also can be purchased at the DeKalb and Sycamore farmers markets, which begin this week.\n\nThe Sycamore Farmers Market runs from 3 to 7 p.m. Tuesdays in the parking lot at the corner of Sacramento and State streets and the DeKalb Farmers Market runs from 10 a.m. to 2 p.m. Thursdays in Van Buer Plaza at the corner of North Second and Locust streets.\n\nHristakos met with MidWeek reporter Katrina Milton to discuss his olive oil and farmers markets.\n\nMilton: Tell me about your olive orchard.\n\nHristakos: The olive orchard with about 3,000 trees belonged to my parents, my family, for generations. My parents are no longer alive, they died when they were 96. So it’s true, olive oil does do wonders. When they passed on, I had to make a decision, to sell or keep the orchard. I sold some trees and kept about 1,800. I return to Greece for the month of November for the harvest and creation of the olive oil, then bring it back here. I use the olive oil in my restaurant and sell it at local farmers markets.\n\nMilton: How do you make olive oil?\n\nHristakos: In November, when the olives are harvested, I take them to the co-op where the olives are washed and they take away the leaves. The olives are then crushed by a machine for 15 minutes to an hour. Then they go into another machine that spins and separates the oil from the crushed olives. Pomace oil can be created if the olives are pressed a second time.\n\nMilton: What makes your olive oil different from others?\n\nHristakos: What makes my olive oil unique is that once the olives are harvested, within five hours, they are pressed. That keeps the oil’s acidity very low. Extra virgin olive oil is 0.8% acidity or below. This year, my olive oil’s acidity is 0.16%.\n\nMilton: Why do you grow olives?\n\nHristakos: It’s my hobby, something fun and a tradition in my family. People are consuming more and more olive oil. There is a lot of demand for it. Olive oil never spoils, but the color and flavor lasts two to three years. People are using it for their skin, their hair, therapeutic reasons. It’s nice in food, even just putting some on a fresh salad.\n\nMilton: How would you recommend eating olive oil?\n\nHristakos: My olive oil has a fresh, peppery taste. You can eat it plain with bread or with some balsamic vinegar and parmesan cheese. When cooking, start with a little bit and pour more at the end. If you add too much olive oil at first and are cooking with high temperatures, you can lose some of the flavors.\n\nMilton: Will you sell your olive oil at farmers markets this year?\n\nHristakos: I will be at both the DeKalb and Sycamore farmers markets this year, selling my olive oil and giving out samples. You can also purchase the olive oil at my restaurant. The olive oil costs $12 a bottle or two for $20. I love farmers markets because of the atmosphere. People talk, ask questions. It’s very social. People get together and shop local. They see each other, have a good time and find quality things to buy for their dinner table.\n\nMilton: How long have you been in DeKalb and how is it different from Greece?\n\nHristakos: I’ve been in DeKalb for four years. In Greece, there’s scenery and gorgeous islands full of olive and orange trees. In DeKalb, the farms have their own beauty, with the rows of corn and red barns. Each area has its own beauty.\n\nLoading more", "pred_label": "__label__1", "pred_score_pos": 0.5905333757400513} {"content": "BrexitAmsterdam is an initiative of Taalcentrum-VU, the language centre of Vrije Universiteit Amsterdam. We are a language and communication agency located on the VU campus, on the edge of the bustling financial heart of the Netherlands: Amsterdam’s Zuidas district. With 30 years of experience in using academic expertise for practical purposes, Taalcentrum-VU is the local partner in communication you need to ensure that you land on your feet after relocating to the Netherlands.", "pred_label": "__label__1", "pred_score_pos": 0.9940169453620911} {"content": "Ask myself questions relating to the key factors 2. The egg proteins helps in the structure, color and flavor of the final batter and goes through coagulation or sometimes even Mallard- browning because of the small amount of glucose present, reacting with the proteins. Meanwhile, I have taken the time to boil the quail eggs, and afterwards, towards the end few minutes before the cake is finally ready, I have also spent the time cutting the strawberries. References My references came from different sources as following: Practical exam time constraint?\n\nEventually, towards the end of my decision-making, I have decided not do the Creamy chicken and almond ribbon sandwiches due to the time constraint. The eggs contains a lot of phosphorous and vitamin B2, B6 and B This is one of the dishes that I have done well in. They also require sufficient proteins present in their food intake to give them energy. Maillard browning is a complex chemical reaction that occurs when food containing sugars and proteins are heated. Context-Based Learning in Physics.\n\nApproaching Food & Nutrition Coursework =f&n Dept= O Level [6087]\n\nThis should also be helpful for pregnant women. Assemble in order as above.\n\nI started to pour the icing sugar and spreading it favorably with the whisker as a help. Over-whipping the mixture will be to a disadvantage because the final product will cease to crumble in the oven. Luckily, with the help of the Internet and courseworkk advice given by my friends and teacher, I overcome the problem within half a day and thus, time is saved through the process.\n\nApproaching Food & Nutrition Coursework =f&n Dept= O Level [] – ppt video online download\n\nBoil water in another saucepan. Auth with social network: One large hard-boiled egg only contains 78 calories and 5. Besides these resources, I can also seek help from the internet.\n\n\nf&n coursework research and development\n\nEggs in cakes also act as leavening agent, causing the cake to entrap air during mixing as a result of the stretching of ovalbumin. Some other ways I clursework look into are: Glazing — Usually to make the final product look appealing and shiny. Cool for 5 to 10 minutes; gently and carefully loosen sides of custard with a narrow spatula then invert on serving plate.\n\nWSS F&N e-Space: Coursework A Guide\n\nI have decided to question myself on how I have done for my practical exam. What I will do after completing this section? How many dishes should I prepare?\n\nThe strawberries are meant to emphasize on the presentation of the chocolate cake and make it look outstanding. I will remember to bring accessories or presentation items to beautify my overall setting, bearing in mind that each dish contains different types of uses of eggs. Show how eggs can be included in different ways in a variety of dishes.\n\nScotch Eggs are hard-boiled eggs coated with minced meat and breadcrumbs and then baked or fried.\n\nKeep in mind that the research has to communicate ideas and concepts clearly and effectively. Also iron found in the egg yolk helps in the manufacturing of red blood cells, necessary for the foetus in pregnant women as well as replacing blood loss in lactating women.\n\nYou may need to add more milk or powdered sugar to reach the desired consistency: These factors must be related to the task on including eggs in different ways in a variety of dishes and how are these egg dishes important for different people. Ask myself questions relating to the key factors 2.\n\n\nI have specifically chosen quail eggs so as to not make the salad look much an. Other reactions of carbohydrates like gelatinization, dextrinisation f&b caramelisation will perhaps occur when the mineral is present.\n\nDecorate it with tomatoes and place it on serving plate After These vitamins are essential in a lactating woman.\n\nf&n coursework research and development\n\nHow can this dish provide the essential nutrients for the people who This dish custard involves using a lot of egg and according to my background information that I acquired in Secondary three, egg contains minerals like calcium, vitamin D, E, B1, B2, B9 and B My presentations Profile Feedback Log out. Allow milk to cool before adding a tablespoon to the egg mixture ensuring the milk will not be curdled by the egg mixtureand then gradually stir in the rest of the milk. Also, as most of degelopment peers are using mostly chicken eggs in our practical exam, we decide to buy a whole tray of 30 chicken eggs which will develolment expensive than a dozen eggs.\n\nCalcium is required for blood clot after an injury. However, the elderly should try to avoid food that is high in coufsework. Let me help you. Pour into prepared custard cups.\n\nAuthor: admin", "pred_label": "__label__1", "pred_score_pos": 0.9732405543327332} {"content": "The Mayo Clinic of South Africa\n\n\nHernia and Heartburn Unit\n\nDigestive systemWhat is heartburn?\nWhat are hernias?\nHiatus Hernia\nInguinal Hernia\nIncisional Hernia\nUmbilical Hernia\nWhat is Heartburn?\n\nMayo Clinic Hernia and Heartburn UnitHeartburn, also called acid indigestion, usually feels like a burning chest pain beginning behind the breastbone and moving upward to the neck and throat and even into the shoulder blades. Many people say it feels like food is coming back into the mouth leaving an acid or bitter taste. The burning, pressure, or pain of heartburn can last as long as two hours and is often worse after eating. Lying down or bending over can also result in heartburn and relief is often obtained by standing upright or by taking an antacid that clears acid out of the oesophagus.\n\nMany people suffer from heartburn or acid indigestion caused by gastroesophageal reflux disease. This digestive disease is a disorder that affects the lower oesophageal sphincter - the muscle connecting the oesophagus with the stomach.\n\nHeartburn pain can be mistaken for the pain associated with a heart attack, but there are differences. Exercise may aggravate pain resulting from heart disease, and rest may relieve the pain. Heartburn pain is less likely to be associated with physical activity. In most cases, heartburn can be relieved through diet and lifestyle changes, however, some people may require medication or surgery.\n\nWhat is Gastroesophageal Reflux?\n\n'Gastroesophageal' refers to the stomach and oesophagus. 'Reflux' means to flow back or return. Therefore, gastroesophageal reflux is the return of the stomach's contents back up into the oesophagus. In normal digestion, the lower oesophageal sphincter, which is like a valve, opens to allow food to pass into the stomach and closes to prevent food and acidic stomach juices from flowing back into the oesophagus. Reflux occurs when the sphincter is weak and allows the stomach's contents to flow up into the oesophagus.\n\nWhat are the complications of long-term gastroesophageal reflux?\n\nSometimes gastroesophageal reflux results in serious complications. Oesophagitis can occur as a result of too much stomach acid in the oesophagus. Oesophagitis may cause bleeding or ulcers. In addition, a narrowing or stricture of the oesophagus may occur from chronic scarring. Some people develop a condition known as Barrett's oesophagus, which is severe damage to the membranous lining of the oesophagus. Doctors believe this condition may be a precursor to oesophageal cancer.\n\nWhat are Hernias?\n\nThe most common location for hernias is the abdomen. The abdominal wall - a sheet of tough muscle and tendon that runs down from the ribs to the legs at the groins - acts as a 'corset'. Its function, amongst other things, is to provide strong support to the internal organs which are exerting significant outward pressure. If a weakness should open up in that wall then the corset effect is lost and the stomach and intestines push through the weakness. The opening of a gap in the tissue can occur of its own accord at a point of natural weakness, or by over-stretching a part of the tissue. Over-exertion can cause it, but so could a simple cough or sneeze. The ensuing bulge, which is often quite visible against the skin, is the hernia. The effects felt by the patient can range from being painless, through discomfort, to being very painful indeed.\n\nThese hernias commonly occur where there are natural weaknesses in our abdominal wall. Examples of these are the canals (inguinal and femoral) which allow passage of vessels down to the scrotum and the legs, respectively. The umbilical area is another area of natural weakness frequently prone to hernia. Hernias often occur at the site of any previous abdominal surgery.\n\nHiatus Hernia\n\nThere is some belief that a hiatus hernia may weaken the lower oesophageal sphincter and cause reflux and heartburn. Hiatus hernias occurs when the upper part of the stomach moves up into the chest through a small opening in the diaphragm - the muscle separating the stomach from the chest. The opening in the diaphragm acts as an additional sphincter and the hiatus hernia results in retention of acid and other contents in the part of the stomach above this opening. These substances can reflux easily into the oesophagus. Coughing, vomiting, straining, or sudden physical exertion can cause increased pressure in the abdomen resulting in hiatus hernia.\n\nThere are no visible symptoms of hiatus hernia, as the whole event occurs inside the chest. People with severe, chronic oesophageal reflux or with symptoms not relieved by conservative treatment may need a more complete diagnostic evaluation.\n\n\n Endoscopy is an important procedure for individuals with chronic gastroesophageal reflux. By placing a small lighted tube with a tiny video camera on the end (gastroscope) into the oesophagus, the doctor may see inflammation or irritation of the tissue lining the oesophagus (oesophagitis). If the findings of the endoscopy are abnormal or questionable, taking a biopsy from the lining of the oesophagus may be helpful.\n\nFor patients in whom diagnosis is difficult, doctors may measure the acid levels inside the oesophagus through pH testing. Testing the pH monitors the acidity level of the oesophagus and symptoms during meals, activity, and sleep.\n\nThe above procedure are described in more detail on our Gastro-Intestinal Unit page.\n\nAn axial sliding hernia as seen through a gastroscope. The picture shows an axial sliding hernia as seen through a gastroscope. Visible in the background are those parts of the stomach which are protruding into the chest cavity.\n\nSurgery may be necessary if the hernia is in danger of becoming strangulated or twisted in a way that cuts off blood supply, or is complicated by severe gastroesophageal reflux or inflammation of the oesophagus. The doctor may perform surgery to reduce the size of the hernia or to prevent strangulation.\n\nWhat can be done to avoid a hiatus hernia?\n\nWhilst there is nothing that one can do to prevent the occurrence of a hiatus hernia, there are three ways of dealing with the symptoms.\n\nIdentify certain foods that may aggravate your condition, then simple avoidance of these foods is an easy way of avoiding discomfort. Avoid such things as:\n\nHot foods and drinks\nSpicy foods\nAcidic foods\nFoods which are difficult to digest\nBeing overweight\nDo not eat a heavy meal prior to strenuous exercise. Try to avoid eating or drinking for an appropriate amount of time before lying down. The occurrence of reflux may be reduced by adjusting the angle of your bed.\n\nThe advantage of this approach is, mainly, that you might avoid medical or surgical intervention altogether and be able to live with the condition without suffering the symptoms.\n\n There are several different medicines available to deal with the symptoms of hiatus hernia. They work in different ways, but are normally of an antacid type, and some work better on certain patients than others.\n\nThe advantage of the medicinal approach is that, in certain cases, this allows the patient to avoid all symptoms without too much inconvenience.\n\nNo decision should be taken to proceed to surgery for hiatus hernia unless all tests have conclusively confirmed that there is no alternative.\nThe operation involves tightening the hiatus area in order to keep the stomach in its correct place, below the diaphragm, and which reinstates the narrowing of the opening into the stomach.\n\nInguinal Hernia.\n\nInguinal hernias occur in the groin area. These hernia operations are among the most common surgical procedures performed today. Although inguinal hernias are most frequent in men, women comprise about 10 percent of the patient population.\n\nMost hernias result from a tear in the deep lining, or fascia, beneath the abdominal muscles in the groin region. Once this lining is torn, the intestines break through the overlying muscle layers pushing up to the skin surface, giving the characteristic bulge. In many cases, this process begins at birth and is an inherited condition affecting people of all age groups. Signs and symptoms that can be associated with inguinal hernias include pain, pressure, burning, bulging in the groin, and enlargement of the scrotum. However, many patients present only with fullness or bulging in the groin without any other symptoms at all.\n\nThe traditional method of hernia repair is to admit the patient to hospital, whether as a day-case or for a few days and, under general anaesthesia, the surgeon pushes back the bulge of peritoneum through the opening and then closes the defect by stitching one side of the lining firmly to the other. The patient is restricted in physical activity for some weeks after the procedure to prevent the sutures from pulling apart. In order to reduce the tension of the stitching, surgeons have developed methods of stitching the tissue in layers, one above the other. This technique reduces a little of the pressure. Another technique involves placing or stitching a 'patch' over the hernia.\n\nAt the Mayo Day Clinic the most commonly used method is laparoscopic or 'keyhole' surgery. This technique is performed under general anaesthesia and the surgeon inserts small tubes into the abdominal cavity through tiny cuts in the abdominal wall. One tube contains a video camera lens which projects the image of the surgery onto a television monitor. The surgeon performs the repair through the other tubes.  The repair is achieved by firing staples through a mesh patch into the muscle tissue. This approach is often more technically difficult to perform but the advantages of this technique is that only the smallest of incisions are required and the recovery period for the patient is vastly reduced.\n\nIncisional Hernia\n\nIncisional hernias result from the breakdown of a previous surgical incision. These arise most commonly as a result of infection or a haematoma (the collection of blood in an incision) following a surgical procedure. Additionally, tension in the surgical closure of the abdomen can lead to a disruption of the tissues. The result is an unsightly bulge which, left alone, can lead to numerous complications. Some studies have suggested that incisional hernias can occur in as many as 15% to 20% of abdominal operations.\n\nUmbilical Hernia\n\nHernias at the site of the umbilicus are as a result of the muscles surrounding the naval being weak and allowing the intestine to push through the opening of the 'belly button'. This creates protrusions of varying sizes. A simple procedure is required to suture the abdominal wall closed at the site, forcing the internal organs to remain within the abdominal cavity.\n\n\nHome | Mayo Day Clinic | Gastro-Intestinal Unit | Hernia & Heartburn Unit | Life Extension Institute | Global Aesthetic Centre | Doctors & Specialists | Location Map | Contact us | Send your CV", "pred_label": "__label__1", "pred_score_pos": 0.8598029613494873} {"content": "DXC Technology Co.\n\n11/07/2019 | News release | Distributed by Public on 11/07/2019 08:00\n\n4 action steps to prepare your workforce for the future\n\nWhat's the best way to prepare for the workforce of the future? With news of Amazon, JPMorgan Chase, and others investing billions in training, you'd be forgiven for thinking the answer is simply 'reskilling the workforce.'\n\nAnd yet, reskilling is only one part of the solution. Creating the workforce of tomorrow requires a holistic approach to learning that enables the continuous development of new skills, a higher level of engagement, and an agile and thoughtful response to ongoing change. This, in turn, requires putting learning at the very core of the entire organization.\n\nVanguard organizations are already preparing the workforce by making learning foundational. Your organization can begin to do the same by taking these four action steps:\n\n1. Make learning opportunities available to everyone in your complex demographic landscape.\n\nToday's workplace demographics are complex, composed of multiple generations with varying experience levels, specialization, tenure and learning preferences. HR practitioners must now determine how to leverage people, process, and technology around this workforce.\n\nGlobalization also affects employee learning and development. Workforces in different countries may need instruction that is sensitive to varied cultural and language preferences; remote employees need access to mobile learning and development tools. Similarly, the rise of part-time and gig employees requires organizations to think beyond traditional, synchronous, and on-location training.\n\nAction: Increase engagement and productivity-and facilitate a valuable sense of community and collaboration-by providing training and career development opportunities to the entire workforce, including in-house, remote, global, part-time and even gig workers.\n\n2. Democratize talent with teams.\n\nToday, an organization's ability to pivot in the marketplace depends on agility-and agility requires a workforce that is networked and collaborative, i.e., team-based. Teams, unlike the traditional (and rigid) corporate hierarchy of the past, can form, dissolve and morph as needed to meet new and changing business needs.\n\nTeam-based structures also more effectively harness the expertise and wisdom of all employees, at all levels. In a team-based structure, someone may have only one year of experience, but they may also have the right expertise to contribute to a team's success or even lead a team. And that's the big 'Aha!' moment, realizing that anyone can step up to contribute or lead.\n\nAction: Democratizing talent means giving all employees an opportunity to contribute, regardless of tenure, assuming they have evidence-based knowledge and insights to share. Don't dismiss employees' perspectives or ideas based on age, tenure or role.\n\n3. Understand and enable 'learning while working.'\n\nHow can workers continue to be relevant amid the increased use of AI, cognitive technologies and other disruptors to traditional workflows? By engaging in continuous learning. For organizations, this requires making learning available within the flow of work, moving development from the periphery of the employee experience-day-long courses, five-minute videos, synchronous and asynchronous e-learning-to its core. You deliver learning opportunities directly to employees and make them conveniently accessible at all times. The right technology can make learning a natural part of everyday tasks and eliminate the time employees are physically or cognitively separate from work.\n\nAction: Use tools designed to make learning integral to everyday work life. Consider technologies that not only ensure content is relevant for each individual, but also integrate learning opportunities directly into daily work tools, e.g., Microsoft Office, Slack and Salesforce.\n\n4. Apply programs, solutions and technologies designed to optimize collaborative learning.\n\nCollaborative learning, when done right, accelerates the collective intelligence of an organization-a potentially powerful competitive differentiator in an era of constant change. When people come together to solve a business problem, you gain greater organizational intellectual property and intelligence than if you were to ask each person to solve the problem individually. It's the same with learning. When people learn together, they become collectively something greater by hearing and responding to each other's insights and informed observations.\n\nAction: Better manage and distribute informal knowledge and employee insights. Employ collaborative learning technologies to make individual experience, wisdom, and insight available to a large, distributed learning population.\n\nTo learn more, read the whitepaper, 'The Workforce of the Future Begins and Ends with People.'\n\n[Attachment] Laci Loew, EVP Marketing and Business Development with Pandexio, is a results-driven human capital industry analyst and marketing executive offering research-based consulting and advisory services in human capital. She brings more than 30 years of experience helping CEOs, CHROs, and other senior leaders drive talent upgrades, accelerate leadership development, create healthy pipelines, create cultural fluency and an inclusive environment, and embrace change to drive talent transformations from idea to action.\n\n[Attachment]Bob Danna, Executive Chairman with Pandexio, retired as a Managing Director from the Human Capital practice at Deloitte Consulting LLP in June 2017. With more than 40 years of experience in HR and learning transformation, leadership development, workforce analytics, and associated management consulting, he has provided consulting services worldwide for both commercial and government clients.", "pred_label": "__label__1", "pred_score_pos": 0.6432862281799316} {"content": "Feeding Guide\n\nWhen it comes to feeding your dog the basic rule of thumb is 1.5 - 3% of body weight per day split over 1-2 meals, a puppy from 8 weeks will need between 2 - 3% of their ideal adult body weight per day, ideally split into 1-3 meals, however this is not written in stone and is largely dependent on your dog's activity levels.\n\nHowever, the most important thing to remember that all dogs are a little different, and you know your dog best.\n\nDon't worry your dog will not become obese or fade away overnight, if they are anything like our dogs they will eat as much as you are willing to give them! \n\nThe one thing that must be remembered is that unlike kibble, raw food does not expand in the dog's stomach, so your dog might want more than perhaps it needs to begin with.\n\nThis will quickly pass as the food is much more nutritious and will take longer to digest, so your dog will feel satisfied for longer.\n\nJust keep an eye on their weight and adjust the portion size accordingly.\n\nWhat is BARF\n\nThe term BARF (Biologically Appropriate Raw Food) was coined by Dr Ian Billinghurst in the mid 80's a Vet and Agricultural Scientist, (WWW.barfworld.com). \n\nIn a nutshell this type of diet is designed to replicate that of a wild predator, the Wolf, ancestor of all of our dogs and any from the wild cat family.\n\nTypically raw food will consist of meat, 70-80% meat and offal, 10-15% bone, 10-15% fruit and vegetables and is served raw.\n\nMyths and Misinformation\n\nIt is only to be expected that raw feeding like many things that are perceived to be new or different has attracted is share of myths detractors, it is natural that concerns exist after all our cats and dogs mean the world to us, so I would like to dispell some of these myths and reassure anyone thinking of giving this a try.\n\nBacteria and raw meat is an understandable concern, however, lets not forget dogs and cats are equipped to deal with bacteria. They have been eating raw meat for thousands of years and it has not always been fresh!\n\nWe only use human grade ingredients and free range chickens. The levels of bacteria are regularly tested and strictly controlled as part of our DEFRA registration requirements, so taking all the normal precautionary hygiene measures associated with handling raw meat is enough. \n\nIncreased risk of parasites, that would be true if we used some types of unfrozen wild game (wild boar) in our recipes as some wild animals do have a higher risk of parasites (trichinae parasite) if un frozen, however we do not uese these proteins, all of our products are deep frozen and we only use human grade ingredients from DEFRA approved sources our food carries no risk of parasites. \n\nBones are often sited as being bad for dogs. Before the introduction of kibble, dog food contained bone, perhaps you can remember 'white dog poo' as a child and wondering why it was white, well that was the bone and that it had been digested, however kibble does not go white as it has not been fully digested. Provided it is un-cooked, bone is an essential part of the dog's diet. It cleans teeth, provides minerals, helps digestion and keeps anal glands from becoming blocked and infected.\n\nI could go on and add pages and pages of information. Quote studies, accounts from owners, breeders and experts, opinions from vets and medical professionals, but the information is already out there. So what is the difference between us and the manufacturers of kibble? Well, we are happy to disclose everything that goes in to our products, how we make it. We have nothing to hide. See if you can find out how the dried food manufacturers make their products and what actually goes into it. \n\nDon't forget to look at the Government food labeling guidelines, 'meaty chunks', beef and chicken, etc definately does not mean what you might think, chunks of meat, pieces of beef and chicken, anything but! \n\n​Give us a try for free!\n\nWe believe passionately in the virtues of raw food and we would like to pass on the good news. Even more, we would like you to try us for free and hopefully become regular customers. But we understand how important it is to make up your own mind.\n\nSo when you have done your own research and are ready to give raw a try please contact us and we will be happy to send you a free sample, no obligation whatsoever.", "pred_label": "__label__1", "pred_score_pos": 0.6830379962921143} {"content": "AutoFeeds Solutions\n\nAutoFeeds solutions can be broken down to 5 distinct groups of specialized experience: Custom automotive websites, search engine optimization focused on automotive trends, paid search marketing guidance, automotive inventory management systems, and data syndication for your automotive inventory feeds.\n\nUse the menus to navigate to a particular section for further information.", "pred_label": "__label__1", "pred_score_pos": 0.9997972846031189} {"content": "ENB Science LLC was founded by animal lovers who have a passion to improve the quality of ingredients and accuracy of dosing within the vitamin, supplement, and nutrient category of companion animal health. True-Dose™ uses patented technology to revolutionize the way we care for our pets and answers immediate needs for improved quality, increased accuracy in dosing, faster absorption, and improved convenience for daily use. Just as with human health care, animal care and technology is continually improving with better preventative treatment and increased attention to wellness.\n\nThe founders of True-Dose have extensive experience in both human nutraceuticals and companion animal health. The goal of providing human-grade products to the animal health arena has been realized with the incorporation of strategic partnership arrangements that allow True-Dose™ to provide exclusive components to reach the highest level of quality and meet the standards set forth in our goals.", "pred_label": "__label__1", "pred_score_pos": 0.9822351336479187} {"content": "Connect with us\n\n\nBallon D’ Or 2019: Ronaldinho, others react as Messi beats Ronaldo, Van Dijk to win sixth award\n\n\n\nBrazil legend, Ronaldinho has congratulated Barcelona captain, Lionel Messi after the Argentine international won the Ballon d’Or for a record sixth time on Monday night in Paris, France.\n\n\nRonaldinho, a former teammate with Messi at Barcelona, took to his official Twitter page to describe the 32-year-old as an ‘amazing athlete’.\n\nHe wrote: “Now there are 6 my brother @leomessi Congratulations on the much deserved achievement, unfortunately, it was not possible to be with you tonight in Paris.\n\n“But inside my heart is all affection and esteem for the amazing person you are, as an athlete, you need not speak, every game is a show !!!”\n\nAlso reacting, former Barcelona captain, Carles Puyol described Messi as an example of “passion and love for soccer.”\n\nHe wrote: “Congratulations Leo, six are already there and I’m sure you’ll still win some more … Thank you for making us enjoy so much, you are an example of passion and love for soccer.”\n\nBarcelona team-mate, Arturo Vidal also joined: “Congratulations @leomessi You keep expanding your LEGEND, you’ll be forever the best!\n\nAnd so did Carles Alena: “Congratulations Leo! You’re the number 1!!!! You deserve it!!!!!”\n\nArthur also got in on the act: ”I am privileged to live with and play with this genius. Congratulations, ace!”", "pred_label": "__label__1", "pred_score_pos": 0.9486691355705261} {"content": "After 5 seconds into the Freezing Field sound, it no longer has that wind whistling hail-hitting-ground sound anymore. It only has that hissing sound, which sounds weird on its own.\n\nHere is how it sounds currently. You can notice the drop in quality once halfway through.\n\nHere is a fixed example. This is just a quick edit, I just layered a second instance of the sound, starting halfway through the first layer.\n\nAnd here is an in-game comparison between the two", "pred_label": "__label__1", "pred_score_pos": 0.9996151328086853} {"content": "Hi. This is my first post here. I had always wanted to make a note of what was happening in the film sound world. There are not a lot of good websites that deal with Film Sound Mixing. Although there are some that do have writeups on Sound Design, very little deals with the actual process and nitty gritty of Film mixing and techniques. I wanted to make a note of the things we do, so that people can learn and understand the techniques, difficulties, workarounds, technicalities etc. involved in this.", "pred_label": "__label__1", "pred_score_pos": 0.5219144821166992} {"content": "Kansas Corn: Fermentation in a Bag\n\nSeed to STEM\nGrade Level: Middle School\n\nIn this experiment, students investigate the process for fermentation in resealable bags with yeast, warm water, enzymes, and various sources of sugars from plants.   Students will observe and measure the inflation of the bag as the reaction produces gas (CO2) during the production of ethanol.  Students will set up several bags to compare how yeast ferments simple sugars, starch, and complex carbohydrates.  Students can compare the rates of ethanol productions and the effects of different enzymes using the inflation of the bag, inflation of balloons, water, or breathalyzers.  This lab is used to explore and understand the process of ethanol production as a biofuel.\n\nEthanol is a renewable source of fuel for vehicles that is widely produced from corn. Ethanol production is reliant on anaerobic fermentation of corn sugars by yeast. Scientists and industry professionals are always working to make the fermentation procedure more efficient. Different enzymes are added to the corn to break the starch into simple sugars that the yeast can process into ethanol. This lab allows students to experiment with different variables in the fermentation process to determine their effect.\n\nWhen a fuel, such a gasoline, is burned, carbon is released into the atmosphere in the form of carbon dioxide.  Burning fossil fuels adds extra carbon dioxide to the atmosphere.  This extra carbon dioxide traps heat from the sun and is a major contributing factor in climate change.\n\nEthanol made from corn also releases carbon dioxide into the atmosphere, but unlike burning fossil fuels, corn plants have already absorbed the CO2 from corn grown last season.  This means that by using ethanol we can cycle carbon dioxide between the plants and atmosphere, as opposed to releasing fossilized carbon from oil.", "pred_label": "__label__1", "pred_score_pos": 0.8579660058021545} {"content": "Category Archives: Communication\n\nThe PROVE Acrostic\n\nprove itSource: Bill Richardson, International Consultant and Trainer\n\n\nThis acrostic is a powerful reminder to leaders that they actually are buyers of commitment from their followers. With followers, while they typically don’t realize it, they are actually selling this very powerful commodity referred to as commitment. Commitment actually means full engagement with no turning back no matter what. Unfortunately, because a large number of leaders behave in non-supportive or inauthentic ways that creates doubt in their employee’s mind about their real intent, the employee only provides their compliance. While this compliance may appear valuable, it typically lacks full-fledged application of their brain power, perspiration and most importantly what I call their discretionary emotional energy aka passion. This acrostic will help leaders appreciate the value of team commitment to building collaborative capital in the organization and remind them of the importance of their stewardship role in taking proper care of the commitment entrusted to them.\n\n\n\nMain Idea: Your brand is your unique promise of value delivery! If you have established a reputation in the organization or community as someone whose intent is worthy of support people will very quickly entrust their discretionary emotional energy aka commitment to you.  If however they do not know about you and the three key elements of your personal brand, i.e.  1) what are you known for, 2) what do you stand for, and 3) what are you capable of becoming, then they will only start off with providing  their compliance. They will be constantly assessing your intent, to ascertain whether you are authentically focused on what is best for the team and the organization. How this process works is contained in the remaining letters of this acrostic – Reach, Objectivity, Validation and Energy. By growing, protecting and promoting their personal brand, leaders can tap into team member commitment much sooner.\n\n\nMain Idea: Multiply versus diminish! This factor in earning the right to influence revolves around the difference between two mindsets. The first is the leader mindset that “I am the smartest” because they perhaps have degrees and they have the title of leader. These leaders proceed to expect blind obedience and essentially pair of hands kind of support. Their focus in on the deliverable only and what is immediately in front of them. Contrast this with the leader who believes “we are the smartest” and focuses on multiplying what each team member brings to the table. Their reach is significantly wider and higher because they are more focused on outcomes rather than just deliverables and truly forming a trusted partnership with the team. Multipliers are more fun to work with as they are more interested in being a thinking partner than being a thinking replacement as someone who has all the answers.\n\n\nMain Idea: Responsibly think fast and slow! With our brains hardwired for auto pilot thinking primarily with the purpose of keeping us safe, leaders can easily be seduced into making quick assessments and judgments without any “conscious” thought. By demonstrating to your team that you are aware of how the brain works and that the capability to think fast and slow is a gift of humanity that needs to be managed with care. Team members want to be assured that their leader is putting curiosity before judgement when either thinking fast or slow. Your willingness and ability to remain objective especially under pressure will automatically engender confidence from your team and significantly strengthen your personal brand.\n\n\nMain Idea: Pay attention to what people value and need! We humans are social animals with five pre-set social needs that significantly influence our behavior. People value and need having acknowledgement for their sense of status, their need for certainty or predictability, their need for some sense of autonomy, their need for being part of a tribe or team that will keep them safe and lastly a need to be treated fairly. These five needs – status, certainty, autonomy, relatedness and fairness form the acrostic SCARF which was first coined by David Rock in 2008.  Essentially when any or all of these social needs are threatened people will move away from the direction you want them to go. Conversely, when any or all of this needs are reinforced and increased people will tend to move in the direction you would like them to go. SCARF provides leaders with a language for social interaction they can employ both in their personal and business lives to improve the quality of their social interactions. The key is remember that most of the elements of SCARF are occurring at the subconscious level of the brain. Therefore people may be moving away from an idea or project and they typically will not be able to explain why. By being able to help them put their difficulty into language you automatically strengthen your connection and validity as their leader.\n\n\n\nMain Idea: Connect, mobilize, sustain! Just as discretionary emotional energy is at the heart of building collaborative capital, energy around connecting before you communicate is at the heart of demonstrating your worthy intent in regards to commitment. Influencing people is something you do not something you have. Think of influencing as a three bladed propeller that must turn to create movement or progress.  The first blade is about connecting with people to understand what they value and need. Once you have established this context move on to mobilizing their commitment through either tell, sell, enlist or negotiate tactics. The idea is to use the right tactic depending on the context and to have multiple arrows in your influence quiver. The key for the third blade is to sustain that movement by acknowledging what people are contributing, giving feedback and information on progress. People will dedicate their commitment when they know their leader treats influence as a process and not just an event. The secret leadership ingredient is energy.\n\n\n\nFinal Words: This acrostic is powerful, purposeful and proactive. It is based on the premise that leaders need to continually PROVE their willingness to be a worthy steward of this important ingredient of collaborative capital. It is like swimming upstream. If you stop swimming you will fall back!\n\nThe GRABS Acrostic\n\ncommunicate-icon-pictures-2Source: From Globe and Mail Article – July 27, 2015 by Doug Mollenhauer\n\n\nThis acrostic has a bit of an edge to it which I really like. Its connotation is that when a subject or idea GRABS your attention it has power and impact. Doug Mollenhauer, a communications-training consultant based in Vancouver, developed this acrostic to reinforce five key principles for connecting effectively when communicating. His article can be accessed at\n\n\nGet It:\n\nMain Idea: Help them understand it by stripping complexity and ornamentation from your communication – less is more.\n\nRelate to It:\n\nMain Idea: Help them care and feel something by zeroing in on the emotion that will connect a smaller but potentially more motivated segment of your audience.\n\nAct on it:\n\nMain Idea: Help them want to act on it by articulating an appealing call to action like Nike’s “Just Do It!”\n\nBelieve it:\n\nMain Idea: Help them be believers by persuading acceptance through trustworthy authority and personal experience appeals. As Doug puts it, “If the gut says yes, acceptance often follows.”\n\nSurprise and Delight:\n\nMain Idea: Help them notice by injecting humour that both delights and focuses attention by breaking the pattern.\n\nFinal Word:\n\nI believe that ordinary things done extraordinarily well, make the difference in leadership. What could be more ordinary than communication? Communicating extraordinarily well is about connecting by paying attention to what people value and need. Embedding GRABS as a habit will help you do this more effectively.\n\nThe THINK Acrostic\n\n\nSource: unknown\n\n\nThis acrostic is one of the most impactful frameworks for helping people change the way they interact with other people both one on one and in teams. Because we are hard wired as humans to be self centered especially when under stress, our communications often lack empathy and clarity. This acrostic serves as a behavioral script to help people press the “pause button” before speaking especially in high stakes situations. Once embedded as a habit its application can have a dramatic effect on both personal and business relationships.\n\n\nMain Idea: Test the veracity of what you are about to communicate by factoring in your current emotional state and the quality/quantity of information at hand. If you are in a highly emotional state there is very good chance your objectivity has been reduced and or distorted. Remember that truth can be a matter of perspective and highly influenced by culture and protocol.\n\n\nMain Idea: As in the truth, our perception of what is helpful is also a matter of perspective. Generally, when under pressure our ability or willingness to put curiosity in front of judgement is compromised. We are hard wired to judge the threat or reward nature of everything we perceive minute by minute. In these moments we need to exercise a certain level of discipline in order to accurately determine whether what we are about to say will be helpful for the relationship versus what will be helpful for us.\n\n\nMain Idea: I am reminded about an anonymous quote, “long after people forget your words they will remember how you made them feel.” Basically it means when you communicate or mobilize people to action, how you communicate your message will either inspire them to be committed and engaged, or discourage them to the level of compliance and helplessness. Before you speak, again hit the pause button to determine which you want, inspiration or discouragement. The bad news is that despite your best efforts to the contrary, your body language, tone and volume likely make the difference. The good news is all three of these elements can be easily changed.\n\nNecessary: Quite often in intense but friendly debates with my wife, especially about politics, I have caught myself going farther and deeper on particular point than is really needed or required. You might have witnessed this same phenomenon in the work setting where people will be more concerned about being right than actually learning either new information or better information about the other person’s perspective. Testing for “is it necessary” is perhaps one of the best strategies for communicating effectively especially in executive presentations. This is particularly true when the audience believes your intent is to show off versus be clear. In my coaching practice I promote the B.L.U.F approach – bottom line up front.\n\nKind: For me, this is the most important element in this wonderful acrostic. Testing for kindness is very seldom done in either the personal or business realm. In fact in my experience, kindness is sometimes considered a sign of weakness. The challenge for this one is that we deceive ourselves into believing that kindness takes time, a lot of energy and because we are busy and overwhelmed ourselves, we have an implicit licence to simply express ourselves. This is especially true when we are in a state of overwhelm because our company has launched more airplanes (aka projects and initiatives) than it can safely land. The fact is that we are social animals and how we connect with others makes the difference in how well we are able to cope with the pressures of  today’s fast paced, multicultural business environment. Kindness matters as does this whole THINK acrostic.\n\nWhat do you THINK?\n\nWhy Acrostics Matter!\n\n\n\n\n\n As I share in this blog my acrostics accumulated from many years experience, I extend an invitation to all of you to send me your favourite acrostics to so I can showcase them as well in this blog.", "pred_label": "__label__1", "pred_score_pos": 0.5580639243125916} {"content": "John Brown and Harper's Ferry Essay\n\nJohn Brown and Harper's Ferry Essay\n\nLength: 1164 words (3.3 double-spaced pages)\n\nRating: Good Essays\n\nOpen Document\n\nEssay Preview\n\nImagine trying to lead a slave army to fight for the freedom of slaves.You think that would be something heroic, yet, someone got the death sentence by doing so.Although most readers of U.S history have argued that John Brown was courageous,closer examination shows that he was given the death sentence, and charged for treason ,murder,and used conspiracy to lead a slave army, but was therefore a martyr.\nJohn brown was an abolitionist. If you were an abolitionist, you wanted to put an end to something,for instance slavery.There was no way you were gonna stop th\nis man from his dream of ending slavery. John Brown became involved in these abolitionist movements in 1835.There were multiple abolitionist groups against slavery.\nHarpers Ferry is not the only raid that John Brown has been involved in,but one of many. For instance, John Brown led a group in the Bleeding Kannas Crisis. He also led a Raid on Federal Armory.John Brown took part in the Pottawatomie Massacrea\nalso.This was on May 24th,1856. Five men who supported slavery were killed by John Brown, and his sons.John Brown, and his sons were never were caught they escaped.\nJohn Brown believed in armed insurrection.John Brown didn’t believe things could be done peacefully.John Brown believed in violence to help solve problems.John Brown was a big believer in “action,”and John Brown felt a strong urge towards these actions.When he was a little boy,John Browns’s father taught him slavery was a sin against God. John Brown also taught his own children from the get go that slavery was wrong.John Brown needed support for theses actions through physical,emotional and finantial ways.\nJohn Brown was an abolitionist as said before.He became so in the year ...\n\n... middle of paper ...\n\n... of downloads of the song being sold means it popular,right?Well Johns Brown Body song was like that.There was obvioulsy less people in the world back then but this song would have been a hit song.Thousands of papers of sheet music were sold.In this song the heroic actions of John Brown are told.The song begins talking about his body in the grave then goes on to talk about John Brown being a siolder.This song is an example of the legacy John Brown left behind and how imprtant his actions were to people. For many Northern people John Brown was rightious to try to help end the battle of slavery. Also on his death day, Brown was celabrated not only by free people but slaves.\n\nWorks Cited\n\nNeed Writing Help?\n\nGet feedback on grammar, clarity, concision and logic instantly.\n\nCheck your paper »\n\nJohn Brown 's Raid On Harpers Ferry Essay\n\n- John Brown’s Raid on Harpers Ferry 1) On October 1859, John Brown’s attack on Harpers Ferry affected American culture in a way no other event in the Antebellum period did. The raid divided the country into two sections: the North and South; it was one of a great significant events happened in the United States. John Brown was a white abolitionist. He was executed on December 2nd, 1859 without fair trial and sentenced to hang. Brown became a legend during the period. He was a God fearing, but violent man and slaveholders saw him as fanatic, a murderer, and lunatic....   [tags: Slavery, American Civil War]\n\nGood Essays\n1059 words (3 pages)\n\nThe Slavery Of Slavery By John Brown Essay\n\n- Just who was this man that could make southern mobs attack northerners, regardless of their views of slavery and make the fear of slave insurrection strengthen. His name is John brown and one might say that this former slave and black abolitionist just wanted to end slavery by causing violence between the north and the south. But to his men, his only intention was to start a general slave insurrection. For example he went to Harper 's Ferry and raided an armory with the intention of starting an armed slave army....   [tags: American Civil War, Slavery, John Brown]\n\nGood Essays\n1219 words (3.5 pages)\n\nThe Effect of the John Brown's Raid Essays\n\n- ... He returned to Iowa and started on his next project which was launching an attack on the government for the abolition of slavery. Presenting “Provisional Constitution and Ordinances for the People of the United States” he based this document off of the United States Constitution outlining the reasons slaves should be free. It was not appreciated by the South because it showed the abolitionist movement growing in power. John Brown went to Kansas in 1857 seeking recruit soldiers for his proposed plan....   [tags: abolitionism, slaves, revolt, slavery]\n\nGood Essays\n610 words (1.7 pages)\n\nJohn Brown as the Villian or Hero Essay\n\n- John Brown as the Villian or Hero Brown's attack on Harper's Ferry affected American culture more than can ever be understood. Tension between the North and South was building in the 1850's. Slavery among many other things was dividing the country into two sections. Brown was executed on December 2, 1859 for his murderous out-lash on society. Was his mind so twisted and demented that he would commit cold-blooded murder. The answer is no. John Brown was a man with a goal and a purpose. When he said that abolition could not be achieved without blood he was right....   [tags: Papers]\n\nGood Essays\n1962 words (5.6 pages)\n\nEssay about John Brown: Past and Present\n\n- John Brown: Past and Present Host: “Looking into the crystal ball, I wonder who our guest will be. As the fog lifts from the orb, a picture of a man that has had an enormous impact on our socially accepted views begins to appear. Who is this man. Well, he is known as both a martyr and a psychopathic killer. He has been called a blatant liar as well as a man of strong convictions, all in the same breath. But his most notable contribution to our country is undoubtedly his involvement in the antislavery movement....   [tags: essays research papers]\n\nFree Essays\n1645 words (4.7 pages)\n\nEssay on Martin Luther King Jr. and John Brown's Civil Disobedience\n\n\nGood Essays\n1602 words (4.6 pages)\n\nJohn Brown Was Not Justified in His Raids Essays\n\n- ... John Brown’s use of violence is nothing more than bullying and intimidation, in attempt to persuade slave owners and their supporters to change their views. Some view John Brown as self-sacrificing, courageous, and heroic because he was willing to die for his cause. Even many pacifists, who believe violence is unjustifiable, overlook his acts of violence because he was willing to die for his stance against slavery. They felt that in the times they were living in, violence could be justified, even though they wouldn’t use violence themselves, since slavery is such an evil thing and it needed to be abolished as soon as possible....   [tags: fighting the evils of slavery, abolitionist]\n\nGood Essays\n967 words (2.8 pages)\n\nJohn Brown: Spark of the Civil War Essay\n\n- In the years of my life, I’ve been known by multiple other names, Nelson Hawkins, Isaac Smith, Old Osawatomie Brown, Old Man Brown, Captain Brown, but largely by my own. I am John Brown. You can call me a “radical abolitionist”, for my dedication to ending slavery. Others call me persistent. I have never been one to quit, I’ve reached as far as possible to make my goals happen. My most famous words were my last; “I, JOhn Brown, am now quite certain that the crimes of this guilty land, will never be purged away, but with blood....   [tags: radical abolitionist]\n\nGood Essays\n535 words (1.5 pages)\n\nCivil War, The Dred Scott Decision, John Brown 's Raid, And The Election Of 1860\n\n- There were many key events that led up to the Civil War in 1861. Room for tension between the North and the South of the United States slowly grew over the course of America’s history. Specific events that increased this tension between the two sides were, the Fugitive Slave Act, the Kansas-Nebraska Act, the Dred Scott decision, John Brown’s Raid, and the election of 1860. Each of these were decisions or events that differed in context but all led to the furthering of sectionalism in the United States during the 19th century....   [tags: American Civil War, Slavery in the United States]\n\nGood Essays\n722 words (2.1 pages)\n\nWhy John Brown Chose Violence Essay example\n\n- Why do you believe that John Brown believed that the situation in the U.S. at the time could only be solved by bloodshed and not compromise. I believe that there are many reasons why John Brown believed that violence was the only way he could prevail in the fight to end slavery in the United States. First of all; at this time in history, issues were moving fairly quickly. As soon as Kansas was to become a territory, supporters from both the North and South rushed to settle on the land and tried to gain control of the vote in the area....   [tags: essays research papers]\n\nFree Essays\n778 words (2.2 pages)", "pred_label": "__label__1", "pred_score_pos": 0.5516631603240967} {"content": "Subscribe / Unsubscribe\n\nAlex Moore\n\nAlex Moore\n\nBorn 22 July 1997, Alex studied A-Level Art at West Buckland School, North Devon.\n\nGrowing up in North Devon, Alex is inspired by the coastline around him, visiting local beaches such as Saunton and Woolacombe has hugely impacted Alex as an artist. For Alex, the sea means so much more than simply waves crashing on the shore; the power and beauty of the ocean is something he wishes to capture in every one of his paintings. Alex often visits Saunton, propping his canvas down on the cliff edge, trying to capture the sheer energy unleashed from the crashing waves.\n\nAlex doesn't strive to paint a direct representation or technically impressive piece of art but rather create his own impression of the seascape around him, allowing you to view it through his eyes. To envoke a response within the viewer, changing their perspective, transporting them from a gallery into the sea itself.\n\nAlex is often asked how he makes each of his works so different. Whilst the subject matter remains the same, each one of his paintings will be entirely unique. In reality, the sky and sea never remain the same, there is never the same sunset or cloud formation, the sky is ever changing and that is something that Alex wishes to emulate in his artwork.\n\n\nDisplay:   List Grid\nSort By:\nA Light Has Dawned SOLD\nA Light Has Dawned  - Oil - Box Canvas - 35 x 35 inches - SOLD Growing up in North Devon, I ..\nWhen The Storm Rages", "pred_label": "__label__1", "pred_score_pos": 0.9300343990325928} {"content": "What's happening with Stan Calvert varsity this year?\n\nSports News\n\nAfter extensive discussions the decision has been taken not to run the Stan Calvert Memorial Cup this year, the traditional Newcastle University v Northumbria University varsity.  The varsity event has been taking place since 1994 with Newcastle taking 13 wins to Northumbria’s 10, with two draws in 1999 and 2003.\n\nThe current format for the varsity is that eligibility for teams is based upon competing in BUCS, and as Northumbria University have consistently reduced their BUCS programme over the past few years, the number of teams participating has vastly reduced. Over recent years there has been a 36% reduction in fixtures in the varsity, from 75 fixtures to 48, and following discussions it was clear that under current rules further reductions were likely this year following a restructure of sport at Northumbria. In essence, the Stan Calvert Memorial Cup was being diluted to the point where it was becoming untenable in its current format.  For example, popular sports such as Cycling, Fencing and Rowing have been cut from the programme entirely in the last few years.\n\nHaving spoken to our students and sports clubs it is clear that they feel the spirit of the varsity has been lost.  For example, in the 2018 competition fixtures were spread across the whole of February resulting in a diluted competitive atmosphere, whereas in the past the majority of fixtures were played over one weekend, Furthermore, the final matches which were historically played at a neutral venue such as Gateshead International Stadium where hundreds of students turned out to support, were moved more recently to Northumbria’s own home venue which attracted little or no support from Newcastle students.\n\nOver the past 3 years there has been much discussion on potential changes that could be made to improve inclusivity, improve the competitive atmosphere, and regain the spirit of the varsity.  However, the changes put forward were not agreed by colleagues at Northumbria and therefore we felt that cancelling this year’s event and having a rethink about the format and ethos of the event would be a sensible way forward. \n\nWe look forward to a future constructive dialogue about potential ways to take the varsity forward with our counterparts at Northumbria once their restructure of sport is complete.", "pred_label": "__label__1", "pred_score_pos": 0.999498188495636} {"content": "So, Wells Fargo has reached a $575 million settlement with 50 states and the District of Columbia over its bilking of hundreds of millions of dollars from customers by opening new accounts without authorization and using sleazy, manipulative practices (R-G, Dec. 29).\n\nI will consider patronizing Wells Fargo banks when their top managers — those who cheated millions of customers — are serving long prison sentences.\n\nGary Cornelius, Eugene", "pred_label": "__label__1", "pred_score_pos": 0.7774727940559387} {"content": "Refine Your Search\n\n\n\nSearch Results\n\nJournal Article\n\nWaste Energy Driven Air Conditioning System (WEDACS)\n\nIn the port injected Spark Ignition (SI) engine, the single greatest part load efficiency reducing factor are energy losses over the throttle valve. The need for this throttle valve arises from the fact that engine power is controlled by the amount of air in the cylinders, since combustion occurs stoichiometrically in this type of engine. In WEDACS (Waste Energy Driven Air Conditioning System), a technology patented by the Eindhoven University of Technology, the throttle valve is replaced by a turbine-generator combination. The turbine is used to control engine power. Throttling losses are recovered by the turbine and converted to electrical energy. Additionally, when air expands in the turbine, its temperature decreases and it can be used to cool air conditioning fluid. As a result, load of the alternator and air conditioning compressor on the engine is decreased or even eliminated, which increases overall engine efficiency.\nJournal Article\n\nVirtual Cylinder Pressure Sensor for Transient Operation in Heavy-Duty Engines\n\nTechnical Paper\n\nValidation of a Reduced Chemical Mechanism Coupled to CFD Model in a 2-Stroke HCCI Engine\n\nHomogeneous Charge Compression Ignition (HCCI) combustion technology has demonstrated a profound potential to decrease both emissions and fuel consumption. In this way, the significance of the 2-stroke HCCI engine has been underestimated as it can provide more power stroke in comparison to a 4-stroke engine. Moreover, the mass of trapped residual gases is much larger in a 2-stroke engine, causing higher initial charge temperatures, which leads to easier auto-ignition. For controlling 2-stroke HCCI engines, it is vital to find optimized simulation approaches of HCCI combustion with a focus on ignition timing. In this study, a Computational Fluid Dynamic (CFD) model for a 2-stroke gasoline engine was developed coupled to a semi-detailed chemical mechanism of iso-octane to investigate the simulation capability of the considered chemical mechanism and the effects of different simulation parameters such as the turbulence model, grid density and time step size.\nTechnical Paper\n\nTowards Control-Oriented Modeling of Natural Gas-Diesel RCCI Combustion\n\nFor natural gas (NG)-diesel RCCI, a multi-zonal, detailed chemistry modeling approach is presented. This dual fuel combustion process requires further understanding of the ignition and combustion processes to maximize thermal efficiency and minimize (partially) unburned fuel emissions. The introduction of two fuels with different physical and chemical properties makes the combustion process complicated and challenging to model. In this study, a multi-zone approach is applied to NG-diesel RCCI combustion in a heavy-duty engine. Auto-ignition chemistry is believed to be the key process in RCCI. Starting from a multi-zone model that can describe auto-ignition dominated processes, such as HCCI and PCCI, this model is adapted by including reaction mechanisms for natural gas and NOx and by improving the in-cylinder pressure prediction. The model is validated using NG-diesel RCCI measurements that are performed on a 6 cylinder heavy-duty engine.\nJournal Article\n\n\nTechnical Paper\n\nThe Impact of Operating Conditions on Post-Injection Efficacy; a Study Using Design-of-Experiments\n\nPost-injection strategies prove to be a valuable option for reducing soot emission, but experimental results often differ from publication to publication. These discrepancies are likely caused by the selected operating conditions and engine hardware in separate studies. Efforts to optimize not only engine-out soot, but simultaneously fuel economy and emissions of nitrogen oxides (NOx) complicate the understanding of post-injection effects even more. Still, the large amount of published work on the topic is gradually forming a consensus. In the current work, a Design-of-Experiments (DoE) procedure and regression analysis are used to investigate the influence of various operating conditions on post-injection scheduling and efficacy. The study targets emission reductions of soot and NOx, as well as fuel economy improvements. Experiments are conducted on a heavy-duty compression ignition engine at three load-speed combinations.\nTechnical Paper\n\nStyrofoam Precursors as Drop-in Diesel Fuel\n\nTechnical Paper\n\nSpray Combustion Analysis of Humins\n\nSecond generation biomass is an attractive renewable feedstock for transport fuels. Its sulfur content is generally negligible and the carbon cycle is reduced from millions to tens of years. One hitherto non-valorized feedstock are so-called humins, a residual product formed in the conversion of sugars to platform chemicals, such as hydroxymethylfurfural and methoxymethylfurfural, intermediates in the production of FDCA, a building block used to produce the polyethylene furanoate (PEF) bottle by Avantium. The focus of this study is to investigate the spray combustion behavior of humins as a renewable alternative for heavy fuel oil (HFO) under large two-stroke engine-like conditions in an optically accessible constant volume chamber.\nTechnical Paper\n\nSpray Analysis of the PFAMEN Injector\n\nTechnical Paper\n\n\nTechnical Paper\n\nPreliminary Investigation of a Bio-Based Low Sulfur Heavy Fuel Oil\n\nRecently introduced sulfur caps on marine fuels in so-called sulfur emission control areas (SECAs) are forcing shipping companies to sail on more or less automotive grade diesel in lieu of the considerably less expensive, but sulfur-laden heavy fuel oil (HFO) to which they were accustomed. This development is an opportunity for a bio-based substitute, given that most biomass is sulfur free by default. Moreover, given that biomass is typically solid to start with, cracking it to an HFO grade, which is highly viscous in nature, will involve fewer and/or less harsh process steps than would be the case if an automotive grade fuel were to be targeted. In this study, a renewable low sulfur heavy fuel oil (LSHFO) has been produced by means of subcritical water assisted lignin depolymerization in the presence of a short length surfactant, ethylene glycol monobutyl ether (EGBE).\nJournal Article\n\nPorous Fuel Air Mixing Enhancing Nozzle (PFAMEN)\n\nOne of the challenges with conventional diesel engines is the emission of soot. To reduce soot emission whilst maintaining fuel efficiency, an important pathway is to improve the fuel-air mixing process. This can be achieved by creating small droplets in order to enhance evaporation. Furthermore, the distribution of the droplets in the combustion chamber should be optimized, making optimal use of in-cylinder air. To deal with these requirements a new type of injector is proposed, which has a porous nozzle tip with pore diameters between 1 and 50 μm. First, because of the small pore diameters the droplets will also be small. From literature it is known that (almost) no soot is formed when orifice diameters are smaller than 50 μm. Second, the configuration of the nozzle can be chosen such that the whole cylinder can be filled with fine droplets (i.e., spray angle nearly 180°).\nTechnical Paper\n\n\nN-butanol, as a biomass-based renewable fuel, has many superior fuel properties. It has a higher energy content and cetane number than its alcohol competitors, methanol and ethanol. Previous studies have proved that n-butanol has the capability to achieve lower emissions without sacrifice on thermal efficiency when blended with diesel. However, most studies on n-butanol are limited to low blending ratios, which restricts the improvement of emissions. In this paper, 80% by volume of n-butanol was blended with 20% by volume of n-heptane (namely BH80). The influences of various engine parameters (combustion phasing, EGR ratio, injection timing and intake pressure, respectively) on its combustion and emission characteristics are tested at different loads. The results showed that when BH80 uses more than 40% EGR, the emitted soot and nitrogen oxides (NOx) emissions are below the EURO VI legislation.\nTechnical Paper\n\nOxygenated Fuel Composition Impact on Heavy-Duty Diesel Engine Emissions\n\nThis paper reports on a study of a large number of blends of a low-sulfur EN-590 type diesel fuel respectively of a Swedish Class 1 fuel and of a synthetic diesel with different types of oxygenates. Oxygen mass fraction of the blends varied between 0 and 15 %. For comparison, the fuel matrix was extended with non-oxygenated blends including a diesel/water emulsion. Tests were performed on a modern multi-cylinder HD DAF engine equipped with cooled EGR for enabling NOx-levels between 2.0 and 3.5 g/kWh on EN-590 diesel fuel. Additional tests were done on a Volvo Euro-2 type HD engine with very low PM emission. Finally, for some blends, combustion progress and soot illumination was registered when tested on a single cylinder research engine with optical access. The results confirm the importance of oxygen mass fraction of the fuel blend, but at the same time illustrate the effect of chemical structure: some oxygenates are twice as effective in reducing PM as other well-known oxygenates.\nTechnical Paper\n\nOptimization of Operating Conditions in the Early Direct Injection Premixed Charge Compression Ignition Regime\n\nEarly Direct Injection Premixed Charge Compression Ignition (EDI PCCI) is a widely researched combustion concept, which promises soot and CO2 emission levels of a spark-ignition (SI) and compression-ignition (CI) engine, respectively. Application of this concept to a conventional CI engine using a conventional CI fuel faces a number of challenges. First, EDI has the intrinsic risk of wall-wetting, i.e. collision of fuel against the combustion chamber periphery. Second, engine operation in the EDI regime is difficult to control as auto-ignition timing is largely decoupled from fuel injection timing. In dual-mode PCCI engines (i.e. conventional Dl at high loads) wall-wetting should be prevented by selecting appropriate (most favorable) operating conditions (EGR level, intake temperature, injection timing-strategy etc.) rather than by redesign of the engine (combustion chamber shape, injector replacement etc.).\nTechnical Paper\n\nOn-Board Plasma Assisted Fuel Reforming\n\nIt is well known that the addition of gaseous fuels to the intake manifold of diesel engines can have significant benefits in terms of both reducing emissions of hazardous gases and soot and improving fuel economy. Particularly, the addition of LPG has been investigated in numerous studies. Drawbacks, however, of such dual fuel strategies can be found in storage complexity and end-user inconvenience. It is for this reason that on-board refining of a single fuel (for example, diesel) could be an interesting alternative. A second-generation fuel reformer has been engineered and successfully tested. The reformer can work with both gaseous and liquid fuels and by means of partial oxidation of a rich fuel-air mix, converts these into syngas: a mixture of H₂ and CO. The process occurs as partial oxidation takes place in an adiabatic ceramic reaction chamber. High efficiency is ensured by the high temperature inside the chamber due to heat release.\nTechnical Paper\n\nOn a Model-Based Control of a Three-Way Catalytic Converter\n\nThough very important for the system performance, the dynamic behavior of the catalytic converter has mainly been neglected in the design of exhaust emission control systems. Since the major dynamic effects stem from the oxygen storage capabilities of the catalytic converter, a novel model-based control scheme, with the explicit control of the converter's oxygen storage level is proposed. The controlled variable cannot be measured, so it has to be predicted by an on-line running model (inferential sensor). The model accuracy and adaptability are therefore crucial. A simple algorithm for the model parameter identification is developed. All tests are performed on a previously developed first principle model of the catalytic converter so that the controller effectiveness and performance can clearly be observed.\nTechnical Paper\n\nNumerical Investigation of PPCI Combustion at Low and High Charge Stratification Levels\n\nJournal Article\n\nNon-Linear Full-Car Modeling and Sky-Hook Control for a Direct-Drive Active Suspension System\n\nAt Eindhoven University of Technology an active suspension system has been developed [1]. This system is superior to other active suspension in terms of bandwidth and power consumption. This active suspension system was tested on a quarter car setup and showed improvements of up to 48% in comfort [2]. In order to implement this suspension in a test vehicle with the same improvements, a non-linear full-car model is developed in this paper which is used to simulate and design various controllers. The non-linear model incorporates non-linear damping, bump stops, actuator saturation and actuator friction. To model the friction in the actuator a combination of Coulomb and viscous friction is used. To model the MacPherson suspension strut, two methods are described and compared. Also the implications of using acceleration sensors which are placed in line with the MacPherson strut are discussed.\nTechnical Paper\n\nModeling of an Automotive Exhaust Gas Converter at Low Temperatures Aiming at Control Application\n\nThe LEV/ULEV emission standards pose challenging problems on automotive exhaust gas treatment. This increases the need for good catalytic converter models, which can be applied for control. A dynamic converter model was made on the basis of first principles, accounting for the accumulation of mass in the bulk gas phase, in pores of the washcoat and on the catalytic surface, as well as for the energy accumulation in the gas and solid phase. The basis for the model is the elementary step kinetics of the individual global reactions. The main purpose of the model is to describe the low temperature behavior of the converter, when the majority of the emissions occur. The light-off process is analyzed in detail with different inputs. The biggest improvement occurs when secondary air is injected in front of the converter. The converter model is also coupled with a simple SI engine model to investigate the dynamic behavior of the whole system.", "pred_label": "__label__1", "pred_score_pos": 0.6113828420639038} {"content": "Food chemistry\n\nMolecularly imprinted calixarene fiber for solid-phase microextraction of four organophosphorous pesticides in fruits.\n\nPMID 26304345\n\n\nCalixarene was used as a functional monomer to fabricate a molecularly imprinted polymer (MIP) by sol-gel technique for solid-phase microextraction (SPME) of parathion-methyl and its structural analogs. The MIP-coated fiber possessed excellent thermal and chemical stability as well as high extraction capacity. Its selectivity and possible recognition mechanism were investigated. The similarities in molecular shape and functional group play a key role in the selective recognition of the imprinted material. Any changes to the structure of the template would decrease the imprinting factor. A comparison of MIP-SPME was made with liquid-liquid extraction coupled with gas chromatography for the determination of organophosphorus pesticides (OPPs) in fruits. Much lower limits of detection and better recoveries were achieved by SPME in spiked apple and pineapple samples. The experiment demonstrates that the proposed method using the calixarene MIP fiber was more suitable for selective determination of trace OPPs in those fruit samples.", "pred_label": "__label__1", "pred_score_pos": 0.8965237140655518} {"content": "\n\n\n2. A persistent decrease in the level of consumer prices or a persistent increase in the purchasing power of money.\n3. The lifting and removal of small, loose particles, especially silt and clay particles, by eddies of wind.\n\nde·fla′tion·ar′y (-shə-nĕr′ē) adj.\nde·fla′tion·ist n.\n\n\n1. the act of deflating or state of being deflated\n2. (Economics) economics a reduction in the level of total spending and economic activity resulting in lower levels of output, employment, investment, trade, profits, and prices. Compare disinflation\n3. (Geological Science) geology the removal of loose rock material, sand, and dust by the wind\ndeˈflationary adj\ndeˈflationist n, adj\n\n\n(dɪˈfleɪ ʃən)\n\n1. the act of deflating or the state of being deflated.\n2. a fall in the general price level or a contraction of available money (opposed to inflation). Compare disinflation.\n3. the erosion of soil by the wind.\nde•fla′tion•ar′y, adj.\nThesaurusAntonymsRelated WordsSynonymsLegend:\nNoun1.deflation - (geology) the erosion of soil as a consequence of sand and dust and loose rocks being removed by the wind; \"a constant deflation of the desert landscape\"\n2.deflation - a contraction of economic activity resulting in a decline of prices\neconomic process - any process affecting the production and development and management of material wealth\ninflation, rising prices - a general and progressive increase in prices; \"in inflation everything gets more valuable except money\"\n3.deflation - the act of letting the air out of something\ninflation - the act of filling something with air\nإنْكِماش إقْتِصادي\nhjöînun; minnkun\n\n\n[diːˈfleɪʃən] N [of tyre etc] → desinflamiento m (Econ) → deflación f\n\n\n[dɪˈfleɪʃən] n [economy] → déflation f\n\n\nn (of tyre, ball)Luftablassen nt(of aus); (Fin) → Deflation f\n\n\n[diːˈfleɪʃn] n (Econ) → deflazione f\n\n\n(diˈfleit) verb\n1. to let gas out of (a tyre etc).\n2. to reduce (a person's) importance, self-confidence etc. He was completely deflated by his failure.\ndeˈflation noun\nReferences in periodicals archive ?\nOil prices rebounded during the few months of 2019 as a result of strong compliance with production cuts by Opec, reviving the March-April quarter amid concerns of deflation weighing on Gulf economies, said an industry expert.\nConcerns are now mounting about whether the economy is being dragged toward deflation. The data indicates the Bank of Korea (BOK) could consider a rate cut to boost the economy, but experts say it's too early to discuss whether Korea is on course toward deflation, and the central bank is unlikely to lower its rate anytime soon.\nCPI in the reporting period recorded deflation of 0.18% (mtm), deeper than the 0.05% (mtm) posted the month earlier.\nDeflation in vegetables was 20.18 percent in August, as against 14.07 percent in the previous month.\nPrice deflation was an ordinary phenomenon that did not provoke necessarily bad connotations.\nBREXIT has so far had no impact on shop prices as deflation continues unabated, but consumers can expect to see costs rising in the first quarter of next year, according to a report.\nGlobal Banking News-September 28, 2016--IMF says governments have to help central banks beat deflation\nSummary: According to Rosstat, deflation continued in August as consumer prices were down 0.1% WoW for the second week in a row.\nKeywords: financial stability, monetary policy, FOMC, debt deflation, dual mandate\nIn January to February, the deflation was as a result 2 per cent, Cystat said in a statement on its website on Thursday.", "pred_label": "__label__1", "pred_score_pos": 0.5542589426040649} {"content": "\n\n\n2018: Five ways to be happier\n\nFive ways to be happier in 2018\nPHOTO: IndianExpress\n\nTunde Ajaja, Beyond the merriment that accompanies the dawn of a New Year, it’s like a ritual for people to wish for, pray towards, hope for and draw up a plan to have a better year than the previous one.\n\nAt a popular bar on Sunday, the eve of the New Year, some of the men who had come to revel began sharing their New Year resolutions. As can be imagined, the resolutions people have for themselves in the year range from the truly inspiring to the downright laughable.\n\nBut, according to psychologists, having a better year goes beyond drawing up a good plan or making pleasant wishes. Thus, the following are some of the practical ways people could have a happier year:\n\nHave a SMART resolution:\n\nIt is customary for people to have New Year resolutions, often aimed at self-improvement. In fact, in certain circles, people who don’t draw up a plan of action stand the risk of being seen as unserious. But findings have shown that there is a measure of joy and fulfilment people derive when they accomplish their targets. But in spite of the huge importance people attach to this activity, reports have shown that people rarely keep to their resolutions. A report by the Statistic Brain Research Institute in the United States found that only about 9.2 per cent of people who make New Year resolutions keep to them. It also found that only 72.6 per cent maintain their resolutions through the first week; 68.4 per cent make it past two weeks; 58.4 per cent make it past one month while only 44.8 per cent make it past six months.\n\nBut what is the solution? Experts have advised that people should make their resolutions specific, measurable, achievable, realistic and time-bound. They say people should write their resolutions down where they can see them regularly; people should be specific about the goals, by breaking them down into step-by-step plans, like cutting down on fries and going to the gym every Thursday to lose weight and not just plan to lose weight.\n\nAlso, experts say people should be patient with themselves, in spite of the need to make quick changes. Such goals should also be shared with close and trusted allies to also serve as watchers because self-control may not be enough.\n\nSpeaking on the need to have a workable resolution, a psychologist, Prof. Oni Fagboungbe, said people tend to fail when they refuse to plan. He said, “People would go to places of worship on December 31 and make resolutions and before the end of the first week in January they would have forgotten all they said. That is why we advise people to write their resolutions down, without sentiment. Look at the variables in your environment and make a plan. Number them and assign time limit. Then, start doing the things that would make it possible to achieve those goals. Start marking them one by one to know if you’re making progress.”\n\nTake stock and improve:\n\nAccording to a sociologist, Dr. Franca Attoh, there is no hard-and-fast rule about how to be happier in the year, noting that happiness is a choice made by the individual. She said what people should do is to reassess their positions, take stock of what happened to them the previous year, reappraise the situation to see where they fared well and where they fell short.\n\nAccording to her, if there were places they did not fare well, they should strategise on what they would do to ensure things get better for them.\n\nShe said, “For me, I don’t really believe in some of the resolutions people make because some of them don’t work. But it depends on individuals. Christmas and New Year are a cycle and they enable us to sit back and do introspection on how far we have gone. If we believe that we are falling short in certain areas, we can take stock and improve on what we didn’t do well. Identify the things that made it impossible for you go beyond where you found yourself and then determine what you can do about it.\n\n“Life is holistic. You can grow materially but if there is no emotional and spiritual balance, the individual would still be unhappy. That is why you should take stock.”\n\nHave a financial plan:\n\nIt might appear somewhat unrealistic to have a workable financial plan at the beginning of the year, especially when people do not know the kind of expenses they would incur in the course of the year. But findings have shown that it is quite possible. Fagboungbe said having a financial plan helps people to become disciplined. Beyond that, it has been found to give people rest of mind, keep their anxiety in check and have a control over their finances.\n\n“That is the problem with many of our people; they don’t have financial plans. They just spend money as it comes, usually on frivolities. It is at the end of the year that they discover that they have done nothing with all the money they made during the year,” he said.\n\nFagbohungbe was also quick to add that one of the things people waste money on in this part of the world is ceremonies like weddings. He noted that they often feel compelled to spend so much in the name of following the dictates of culture and tradition.\n\nHe said people should always do things within their means. Also, according to economists and financial experts, having a financial plan goes beyond planning to save more money. Rather, it helps when people specify what certain percentage of their income they want to save, invest, or set aside for miscellaneous and spend on family, a particular project, in-laws, etc. It should be noted that when people expend their resources as planned, by the end of the year, they tend to be more fulfilled.\n\nPlan to live healthy:\n\nOne of the things that tend to mar people’s experiences in the year is poor health, which is sometimes a product of lifestyle and how much attention people pay to their health.\n\nAccording to medical experts, it is important for people, especially adults, to mind what goes into their system (feeding habit) and go for check-up from time to time, especially the moment they notice anything untoward about their system.\n\nIt has been found that the chances of reducing the complications resulting from most ailments are avoidable if they are diagnosed on time and treatment commences as and when due. But due to lack of adequate attention and optimism, people take things for granted.\n\nThus, from what people eat to what they drink, the kind of weather they are exposed to, the things they do with their bodies and the kind of stress they subject themselves to, experts say paying attention to them plays a role in how much they would enjoy themselves in the year, which in turn influences their productivity and happiness.\n\nStay positive and have fun:\n\nInasmuch as people tend to have a goal they are working towards, they are also advised not to forget to have a life and stay positive.\n\nEven though a lot of reward comes from multitasking and doing many things to boost one’s income, sometimes it could tell on the health of such persons. Thus, people are advised to work hard, create time for fun, spend wisely, give to those in need, which creates a feeling of fulfilment on its own and stay positive.\n\nFagboungbe said having a positive mentality is a motivational factor that could drive people in the pursuit of their goals.\n\n“That is why you need to have a target or a goal you are working towards,” he added.\n\nBy Tunde Ajaja\n\nComment here", "pred_label": "__label__1", "pred_score_pos": 0.6662189364433289} {"content": "Wiki information Gurtovenko:\n\nYuliya Krevsun\nTrack and field athlete, Person, Measured person, Olympic athlete, Athlete\n\nYuliya Krevsun is a Ukrainian middle-distance athlete who specialises in the 800 metres. She is a member of the Fenerbahçe S.K. athletics club in Turkey. She won the silver medal at the 1999 European Athletics Junior Championships. In 2002–03 she...\n\nYuriy Gurtovenko\nAthlete, Person", "pred_label": "__label__1", "pred_score_pos": 0.6475186944007874} {"content": "1. Philosophy and goals\n\nThe Laboratories don’t just cover the educational and teaching needs of the Department, but they are a field of research and creative activity, an essential institution of knowledge, research and creativity, with dynamics and vividness that are secured by its' educational perspectives.\n\nIn order to create a Laboratory in the frameworks of the Department of Traditional Music, it is necessary for its existence to be justified through activities and actions that demand the coordination of more than just one subject and course which are related to them. Their goal is to make the research and educational process easier in real conditions of producing a project (scientific or artistic). This project must be original, self-reliant and concerted to the general cognitive orientation of the Department. Under no circumstances a workshop can replace one or more courses. It can, on the contrary, embrace them and place them in a wider group of courses. More analytically:
\n\nEducational Purposes\n\nThe Laboratories must first cover the Department’s teaching needs, as they rise from the courses' nature. At the same time, they contribute to the students’ experience and training, offering them valuable necessities for the professional career.\n\nResearch Purposes\n\nTaking advantage of the Department’s logistic structure, the laboratories should promote research through specific actions. They might proceed to documentation of actions, creation of data bases, formation of observation posts, development of scientific networks, realization of project plans, publications, performances, audio and text (written and electronic) releases, organization of seminars, lectures, conferences etc.\n\nCreative purposes\n\nThe Department’s cognitive subjects favour the creative and artistic nature of the laboratories’ activities, which should not only be total study areas but also areas for creating culture.\n\nIndividual goals\n\nFor the laboratories' effective function, the educational, research and creative goals that were mentioned above, are organized on the basis of the special characteristics of the Department’s subjects, courses and activities in separated and productively structured goals.\n\n2. Organization\n\nPerson in charge\n\nFor the laboratories' proper function there is an appointed academic in charge, that comes from the group of professors whose subjects are related to each laboratory.\n\n\nThe laboratories’ operating base is the courses taught in them - these courses are incorporated in the laboratories' philosophy and goals. The courses use the Laboratories’ dynamics, supervising abilities and structure so the students can be benefited by them in every possible way. These courses constitute a basic core, but there are other individual courses which can be used  in order to complete projects and activities. The laboratories give the students the ability to gain modern stepping stones in order to understand the real working environment. As an educational core, the laboratory offer prospects and point up every creative and professional challenge in the specific area.\n\n\nThe activity’s concept is about intergraded actions with a specific time limit, a goal and a plan. This planning is necessary for the infrastructures not only to be used in an effective and useful way but also to make facilitate their use. Activities might be part of a work plan which is planned within a semester by a course, a specific research activity, a specific production etc. As an important part of a research, the laboratory can be developed through collaborations, participation and developing activities. In a similar way, as far as creativity is concerned, the laboratory contributes to activities in collaboration with other institutions such as the local area’s scientific, cultural, artistic field and its spiritual life but also on an international level specific activities that are able to have an institutional nature. The laboratories’ goal is to give their activities an institutional character.\n\n\nFor the proper function of the laboratory, a function regulation is conducted and it includes all the proposals that direct matters of conducting, developing and evaluating courses, access matters, use and function of technical infrastructure, matters that are related to realizing activities and in general, communication matters of all who work within the laboratory’s framework.  \n\n\nThe laboratory with fixed and temporary communication material, such as printed material, pamphlets, newsletters, special publications, electronic publications, websites, special communication software, posters etc. gets in contact with the outside environment, people, institutions and the public. The course to those communication means might be coordinated by programming activities as they were described. The communication responsibility towards the Department’s assembly exclusively belongs to the one who is responsible for the laboratory.\n\nStudent evaluation\n\nAccording to the demands of each course, the students are evaluated by taking examinations, completing projects etc.\n\nLaboratory evaluation\n\nThe laboratory, according to the original programming, moves forward to the procedure of self-evaluation so it can be lead to inventive redefinitions and incremental programs, activities, setting goals etc. The final purpose of each evaluating process is to improve and increase the ability in achieving its goals.\n\n\nEach infrastructure of the laboratories belong to the Department and other members of the Department can use them. However, they are prioritized according to the laboratory’s goals.", "pred_label": "__label__1", "pred_score_pos": 0.9101668000221252} {"content": "Honoring the taste of place.\n\nAt Wayward Seed, we strive to be an example of Ohio at its best. We’re passionate about selecting the vegetable varieties that not only promote Ohio’s farming heritage, but bring the very best flavor to your table.\n\nAlways maintaining a direct connection between the farm and consumer.\n\nWe believe in total transparency between producers and consumers. We want you to be connected to the process from our field to your plate.\n\nReturning the fertility removed by farming.\n\nThe Wayward Seed Farm utilizes three main farming principles: raised beds, composting and proper crop rotation. Plants are given a healthy foliar feeding program of seaweed, fish emulsion and humus. To maintain a healthy balance, we apply various rock powders, cover crops and aged compost throughout the year.", "pred_label": "__label__1", "pred_score_pos": 0.7120053768157959} {"content": "bizhub PRESS 1250e 1250eP 1052e Konica Minolta Australia\n\n387 views Size: 1.7MB\n\nKonica minolta 1052 brochure to Improve the Human Brain\n\nThere Are a Lot of Fantastic Konica minolta 1052 brochure you can get in the market for example Too Big to Ignore by Phil Simon, Business UnIntelligence from Dr. Barry Delvin, Bigdata @ Work by Thomas H. Davenport, and many more. All of the books will give you an explanation regarding just how big data will rule the majority of profit-oriented companies later on. The tendency in this modern marketplace that heavily make use of data will need greater ramifications 5 decades after. Hence, financing the human brain with enormous data knowledge could be convenient.\n\nThink Concerning the figures in the Konica minolta 1052 brochure? Well, the very first is Cora. Cora figures encourage us about guts, conscience, as well as also struggle. Cora conveys the terror of this oppression of slavery. The second reason is Caesar, ” the youthful gentleman who encouraged co RA to flee out of the farm at which these were enslaved and tortured, was a handful of black youths who’d the significance of education, had the ability to write and read, and therefore he had been different from different slaves. The third is Mabel, Cora’s mother who only left Cora if the small co RA maintained a tragic and tragic narrative. The fourth is Ajarry, co RA’s grandmother, a person whose life stories inspired Cora, shaped a part of the personality. The fifth is Arnold Ridgeway, that escaped servant hunter obsessed with Mabel along with co-RA. Just these two slaves tarnished their amazing titles as seekers who always were able to catch escaped slaves. In this publication, there really are plenty of personalities involved, each of which have a heart part, or simply can be found in a couple of scenes, to the main one called only once. For readers that actually don’t really like books with a significant number of characters, maybe this will feel confusing.\n\nIf you are still confused about which book you need to read on your college time, this guide gives you a few hints. To start out with, reading a timeless literature book is also good for you. Some Konica minolta 1052 brochure are Romeo and Juliet by William Shakespeare, To Kill A Mockingbird by Harper Lee, The Catcher in The Rye by J.D. Salinger,” Lord of The Flies by William Golding, along with Animal Farm by George Orwell. These books are a serious beginner package to begin your reading. A few lecturers may possibly have recommended that the books as they’re sufficient to draw the reader. The writers of these books are also popular adequate so that you may have heard about them.\n\nThe part of your body in this paper should reveal the pitfalls and advantages of livelihood, you might wish to include the sub-heading, therefore your paper will likely soon be less painful to see. As an example, you’re vale to find the sub heading about a career and another sub heading related to the benefits and difficulties choosing that career. Remember that the title of the paper, the conclusion key words, and the debut segment should really be written plainly on your Konica minolta 1052 brochure.\n\nThat is the reason why it’s necessary to assemble your children skill in punctuation within their gold ages. In doing this you will want the correct book to help them learn. One of many recommended books touse is your Konica minolta 1052 brochure. Are you really currently interested in acquiring 1?\n\nIntermittent fasting is the diet regiment which the cycles between brief fasting periods, with out foodstuff of even significant calorie diminishing as well as phases of boundless ingestion. This has been promoted to alter the composition of the body through the reduction in fat and weight mass, so strengthening the wellness markers associated with diseases like cholesterol levels and blood pressure. The origin comes from conventional fasting which likewise was understood while the worldwide ritual that useful for spiritual and health benefit as described into the texts from Plato, Socrates, and different religious men and women. You have the ability to check Konica minolta 1052 brochure at first until you take to this.", "pred_label": "__label__1", "pred_score_pos": 0.8525371551513672} {"content": " 2016期开奖结果65期资料\n历史频道> 环球风云> 2016期开奖结果65期资料\n\n\n\n\n  On paper, a 31-year-old man found to have serious mental illnesses was released from a New York state prison in September 2017 after serving 10 years behind bars for two robberies.\n\n  But in reality, the man, who asked to be identified by his initials C.J., still wakes up each day inside a maximum-security prison in Stormville. Though he is technically free, he is still confined to a cell because of a Kafkaesque bureaucratic dilemma: The state requires people like him to be released to a supportive housing facility, but there is not one available.\n\n  Lawyers for C.J. and five other mentally ill men filed a federal lawsuit in Manhattan on Wednesday seeking to force Gov. Andrew M. Cuomo to address a shortage of housing for people with serious mental illnesses who need help adjusting to life outside prison walls.\n\n  The men are no longer being held in prison because they committed offenses, their lawyers argue, but because the state has determined they are likely to become homeless once released — a practice they contend amounts to discrimination under federal civil rights laws.\n\n  Four of the men, including C.J., have finished their maximum prison sentences and maintain their confinement also violates their constitutional rights to due process and protections against cruel and unusual punishment. The plaintiffs have asked the court to allow them to proceed anonymously because their lawsuit discusses sensitive personal information and they fear retaliation from prison guards.\n\n  Corrections records indicate the men are in “residential treatment facilities” — housing where residents are able to move about freely to seek jobs, visit family and pursue educational opportunities.\n\n  But the lawsuit says that label, as the state has applied it to 13 prisons, is a fraud, because the men are being held and treated as other prisoners are. They are locked in cells that have room for a bed and a few possessions. They are required to wear inmate uniforms. They cannot receive packages.\n\n  “Though labeled ‘releasees,’ they remain prisoners in every respect,” the complaint said.\n\n  The state continues to hold the men “because they are unable to secure a community-based mental health housing placement that does not exist due to lack of available beds,” the complaint said. In effect, the state has lengthened their incarceration, “undermining the most basic principle undergirding the criminal justice system: that a criminal sentence, once imposed by a judge, means what it says,” the lawsuit said\n\n  The lawsuit, which names the state corrections department and mental health office as defendants, was filed by the Legal Aid Society and Disability Rights New York, who are seeking class-action status on behalf of all inmates held in state prisons beyond their release dates solely because they are waiting to be placed in supportive housing.\n\n  It remained unclear on Wednesday how many mentally ill people were being held in prison past their release dates.\n\n  Jessica Riley, a spokeswoman for the state Office of Mental Health, declined to comment on the allegations in the lawsuit, but said the state has “one of the most robust supportive housing networks in the nation for individuals with mental illness,” with about 44,000 units.\n\n  C.J. has been diagnosed with bipolar II disorder and antisocial personality disorder, court papers said. As his release date approached, he was enrolled in a re-entry program that was preparing him to be set free in Orange County, where he was looking forward to seeing his daughter for the first time since he went to prison. He had obtained a G.E.D. and a vocational certificate in prison and hoped to get a job.\n\n  But the day before he was scheduled to be released, C.J. was transferred to another prison, and later, to the Green Haven Correctional Facility in Stormville. His mental condition has worsened since his release date passed, and he has been repeatedly placed on suicide watch, according to the lawsuit.\n\n  “Every day is hard, very hard,” C.J. said in written responses to questions from The New York Times. “I wake up and I look around and I don’t understand why I am here.”\n\n  The lawsuit does not seek an order requiring the six men to be freed. Rather, it asks that the state remove “the only barrier to their release” by creating more supportive housing for mentally ill people being released from prison.\n\n  The complaint cites a 1999 Supreme Court ruling in Olmstead v. L.C., which held that public institutions must provide community-based services to people with mental illnesses who need and desire them.\n\n  For decades since the civil rights movement, public pressure had built on states to take mentally ill people out of psychiatric hospitals and place them in settings where they could participate in society, an effort called “deinstitutionalization.”\n\n  But over the years, as psychiatric hospitals closed and lawmakers toughened crime and sentencing policies, more people with mental illnesses wound up incarcerated. Though prisons and jails developed treatment programs, few of them were effective, advocates for the mentally ill said.\n\n  About 4,000 people receiving mental health treatment in New York State prisons are released each year, and more than half of them have serious disorders like schizophrenia that severely limit their ability to function independently, according to the state Office of Mental Health.\n\n  Gov. Andrew M. Cuomo has committed the state to building 20,000 new supportive housing units, and state lawmakers so far have allocated .6 billion to create the first 6,000 units by 2021.\n\n  But the lawsuit asserts that, under Governor Cuomo, the Office of Mental Health has neglected requests from counties across the state to build additional housing for former prisoners with mental disorders.\n\n  Such housing programs, where residents receive psychiatric care and learn skills like cooking and using mass transit, offer opportunities to participate in public life that prisons do not, mental health advocates say.\n\n  But waiting lists have grown longer as the state has eliminated beds from its psychiatric hospitals. The roughly 44,000 spaces available for the mentally ill are about half of what is needed, said Antonia Lasicki, the executive director of the Association for Community Living, which represents supportive-housing operators.\n\n  Despite the state’s commitment to build more supportive housing, the creation of units has not kept pace with demand, and existing facilities are struggling to stay open, Ms. Lasicki and other advocates said. State funding “is barely enough to cover the rent,” she said.\n\n  “So that’s the problem right there in the nutshell,” Ms. Lasicki added. “They’re very underfunded.”\n\n\n\n  2016期开奖结果65期资料【暗】【影】【兵】【团】,【还】【有】【一】【个】【名】【字】,【黑】【影】【兵】【团】。【代】【表】【着】【邪】【恶】【的】【黑】【手】【势】【力】,【受】【圣】【主】【的】【控】【制】。 【暗】【影】【兵】【团】【的】【每】【一】【个】【忍】【者】,【都】【是】【不】【死】【之】【身】,【是】【影】【子】【所】【化】。【虽】【说】【这】【些】【忍】【者】【对】【于】【现】【阶】【段】【的】【陈】【辰】【来】【说】,【只】【不】【过】【是】【蝼】【蚁】,【但】【对】【于】【成】【龙】【他】【们】【那】【些】【普】【通】【人】【来】【说】,【暗】【影】【兵】【团】【可】【是】【很】【厉】【害】【的】。 【小】【玉】【藏】【在】【暗】【处】【看】【着】【这】【一】【切】,【此】【时】【的】【小】【玉】【还】【是】【第】【一】【次】【接】【触】\n\n【王】【世】【天】【看】【着】【这】【一】【幕】,【惊】【喜】【异】【常】,【知】【道】【现】【在】【不】【是】【墨】【迹】【的】【时】【候】,【于】【是】【仰】【天】【长】【啸】【一】【声】【就】【开】【始】【冲】【刺】。 【大】【阵】【在】【两】【人】【的】**【协】【力】【之】【下】,【终】【于】【被】【彻】【底】【毁】【灭】,【这】【个】【大】【殿】【也】【终】【于】【恢】【复】【原】【貌】。【既】【然】【大】【殿】【已】【经】【恢】【复】,【这】【也】【就】【意】【味】【着】【王】【世】【天】【再】【次】【拥】【有】【了】【大】【殿】【禁】【地】【的】【控】【制】【权】。 【他】【不】【再】【犹】【豫】,【伸】【出】【手】【将】【大】【殿】【控】【制】,【随】【手】【一】【挥】,【一】【道】【光】【芒】【就】【将】【两】【人】\n\n\n  【我】【不】【知】【道】【之】【后】【的】【那】【些】【日】【子】【里】【我】【们】【是】【否】【还】【能】【再】【见】,【我】【真】【的】【不】【知】【道】。【在】【没】【有】【吕】【行】【的】【这】【些】【日】【子】【里】,【她】【就】【是】【我】【的】【百】【忧】【解】,【那】【两】【次】【见】【面】,【也】【是】【我】【在】【这】【段】【时】【间】【里】【最】【开】【心】【的】【时】【光】。 【深】【冬】【的】【足】【迹】【向】【我】【们】【一】【步】【步】【逼】【近】,【我】【们】【一】【起】【度】【过】【的】【那】【个】【阳】【光】【明】【媚】【的】【日】【子】【从】【她】【离】【开】【后】【就】【像】【失】【踪】【了】【一】【样】,【我】【从】【来】【没】【体】【会】【过】【这】【番】【彻】【骨】【的】【冷】【意】,【就】【好】【像】【自】【己】【从】2016期开奖结果65期资料【前】【世】【的】【小】【公】【主】【是】【单】【独】【找】【到】【伊】【卡】【谈】【论】【这】【件】【事】【的】,【所】【以】【判】【决】【巫】【女】【格】【丽】,【大】【家】【一】【直】【都】【以】【为】【是】【公】【主】【想】【帮】【伊】【卡】【出】【气】。 【但】【现】【在】,【安】【乐】【把】【伊】【卡】【唤】【到】【自】【己】【身】【边】,【问】【出】【这】【样】【的】【问】【题】,【周】【围】【一】【圈】【人】【都】【竖】【起】【了】【耳】【朵】,【想】【要】【听】【听】【这】【位】【圣】【骑】【士】【会】【如】【何】【表】【达】【自】【己】【的】【爱】【意】【与】【忠】【诚】。 【伊】【卡】【也】【知】【道】【周】【围】【有】【人】【在】【听】,【圣】【骑】【士】【不】【能】【是】【心】【狠】【手】【辣】【的】【人】,【也】【不】【能】\n\n  【转】【眼】【就】【是】【八】【月】【了】。 【八】【月】【才】【开】【头】,【一】【场】【大】【战】【就】【拉】【开】【了】【序】【幕】。 【历】【经】【半】【年】【多】【的】【制】【作】,'【周】【氏】【传】【媒】【兄】【弟】【总】【算】【是】【赶】【上】【了】【档】【期】,【耗】【费】【巨】【资】【开】【始】【宣】【传】《【江】【城】【堡】【垒】》。 【他】【们】【是】【打】【算】【将】【碰】【瓷】【王】【小】【白】【进】【行】【到】【底】【了】。 【虽】【然】【在】【这】【场】【号】【称】【耗】【子】【一】【个】【亿】【的】【宣】【传】【大】【战】'【中】,【他】【们】【没】【有】【指】【名】【点】【姓】【的】【碰】【瓷】【王】【小】【白】,【可】【却】【在】【宣】【传】【的】【时】【候】,【处】【处】【打】\n\n  “【这】【就】【是】【你】【相】【中】【的】【人】?” 【遥】【远】【东】【方】【的】【五】【行】【山】【脉】【之】【中】,【巨】【大】【漆】【黑】【的】【身】【影】【收】【回】【了】【自】【己】【的】【目】【光】。 【正】【悠】【然】【欣】【赏】【此】【地】【充】【满】【毁】【灭】【与】【堕】【落】【美】【感】【风】【景】【的】【雪】【莉】【轻】【轻】【一】【笑】,“【啊】【啦】,【你】【在】【看】【他】【呀】?” “【是】【他】【在】【看】【我】。”【漆】【黑】【的】【身】【影】【平】【淡】【道】。 “【呵】【呵】,【这】【种】【语】【气】【真】【不】【愧】【是】【你】【啊】,【莱】【斯】【利】。【即】【使】【是】【在】【我】【们】【之】【中】,【你】【也】【是】【最】【顶】【尖】【的】【逸】\n\n  【南】【蛮】【猎】【山】【大】【殿】。 【众】【人】【等】【待】【了】【许】【久】,【终】【于】【一】【道】【灵】【光】【从】【大】【殿】【门】【口】【飞】【入】。 【只】【见】【大】【长】【老】【的】【手】【中】,【提】【着】【一】【个】【被】【废】【之】【人】,【此】【人】【不】【是】【别】【人】,【正】【是】【被】【他】【废】【了】【四】【肢】【的】【齐】【嘉】【明】。 【此】【时】【的】【齐】【嘉】【明】,【全】【身】【上】【下】【都】【是】【血】,【根】【本】【看】【不】【清】【模】【样】,【如】【果】【不】【是】【他】【的】【衣】【服】,【根】【本】【没】【有】【人】【能】【看】【得】【出】【他】【就】【是】【齐】【嘉】【明】。 【跟】【在】【大】【长】【老】【身】【后】【的】,【便】【是】【烈】【连】【岐】\n\n\n  [蹇俊能总编推荐] 华为荣耀出新\n\n  [李方云总编推荐] 今 期 开 奖 结 果 \n\n  [吴大江总编推荐] 扫黑除恶三季度开展情况报告\n\n\n", "pred_label": "__label__1", "pred_score_pos": 0.9567863345146179} {"content": "1930s literature and art relationship\n\nMexican art - Wikipedia\n\n1930s literature and art relationship\n\nThe Harlem Renaissance (s–s) was an African-American cultural movement known for its proliferation in art, music, and literature. What is the relationship between literature and politics? freedom of the writer from politics in the early 's are now included in the vanguard of the . lifetime, he tried to impose an official art and literature on France when he was its ruler. Traditionally the Harlem Renaissance was viewed primarily as a literary movement . By black Harlem had expanded north ten blocks to th Street and and its literary and arts infrastructure, the nature of Harlem and its relation to the.\n\nCésar Aira Interview: Literature is the Queen of the Arts\n\nIt is strongly based on nature, the surrounding political reality and the gods. Even simple designs such as stepped frets on buildings fall into this representation of space and time, life and the gods. Art was expressed on a variety of mediums such as ceramics, amate paper and architecture.\n\nThey probably began as cooking and storage vessels but then were adapted to ritual and decorative uses. Ceramics were decorated by shaping, scratching, painting and different firing methods. When male figures appear they are most often soldiers. In the Mayan areas, the art disappears in the late pre-Classic, to reappear in the Classic, mostly in the form of whistles and other musical instruments. In a few areas, such as parts of Veracruz, the creation of ceramic figures continued uninterrupted until the Spanish conquest, but as a handcraft, not a formal art.\n\nMesoamerican painting is found in various expressions—from murals, to the creation of codices and the painting of ceramic objects. They may be naked or richly attired, but the social status of each figure is indicated in some way. Scenes often depict war, sacrifice, the roles of the gods or the acts of nobles. However, some common scenes with common people have been found as well. However, movement is often represented.\n\nCulture and Arts\n\nFreestanding three-dimensional stone sculpture began with the Olmecs, with the most famous example being the giant Olmec stone heads. This disappeared for the rest of the Mesoamerican period in favor of relief work until the late post-Classic with the Aztecs. The majority of stonework during the Mesoamerican period is associated with monumental architecture that, along with mural painting, was considered an integral part of architecture rather than separate.\n\nAlignment of these structures was based on the cardinal directions and astronomy for ceremonial purposes, such as focusing the sun's rays during the spring equinox on a sculpted or painted image. This was generally tied to calendar systems.\n\nBy the latter pre-Classic, almost all monumental structures in Mesoamerica had extensive relief work. While this technique is often favored for narrative scenes elsewhere in the world, Mesoamerican reliefs tend to focus on a single figure. The only time reliefs are used in the narrative sense is when several relief steles are placed together.\n\nThe best relief work is from the Mayas, especially from Yaxchilan. Writing was considered art and art was often covering in writing. For this reason, more is known about the Aztec Empire than the Mayan cultures. Aztec codices An atrium cross in Acolman.\n\nDuring the early period of evangelization, an enclosed open chapels for large congregations of neophytes saw the creation and placement of decorated, anthropomorphized stone crosses with Jesus at their center. It surrounded everything from political writings to jazz poetry, and is especially remembered for poets such as Countee Cullen, James Weldon Johnson, and Claude McKay. Langston Hughes was perhaps the best-known Harlem Renaissance poet.\n\nHarlem renaissance help give African American visibility and opportunity for publications. These publications published poetry, short stories, and essays sent in by black writers, and it encouraged them to do more, such as write, and make all forms of art, because expression was one way to freedom. Harlem was described by Alain Locke as \"not merely the largest Negro community in the world, but the first concentration in history of so many diverse elements of Negro life.\n\nLocke promoted African-American artists, writers, and musicians, encouraging them to look to Africa as an inspiration for their works. In fact, Houston A. Locke has a great influence on literature, and he encouraged people to illustrate African and African America subjects in their writing. It is very obvious that Harlem Renaissance gave black people a cultural differentness through literature.\n\nLiterature was a great way people use to show their motivation, pain and feelings. Du Bois is an American sociologist, historian, civil rights activist, author and editor, who wanted equal rights for African American. He help used literature to spread motivation for the black. He was an ardent peace activist and advocate reduction of racism. He was a literary and cultural inspiration that helped activate the Harlem Renaissance and the powerful art about the African American experience.\n\nDu Bois used his influential role in Crisis magazine to expose and oppose racism and injustices, such as lynching and segregation.\n\nLiterature and Ideology\n\nHis writings are a defining text of the New Negro Movement because of its deep effect on an entire generation that created the center of Harlem Renaissance. This movement produced work that was both initiated in modernity and an engagement with the African American culture. The Harlem Renaissance created African American literature in the United States and influence many authors throughout the twentieth century.\n\nThe Harlem Renaissance was a transformable period in time when poetry changed a nation of African-Americans to an incredible level. Langston Hughes was one of the leading black writers in that time period, and wrote many different types of literature. He wrote, and created a new literary art form called jazz poetry. His poetry covered the issues faced by African-Americans with a combination of music, cheerfulness, and culture.\n\n1930s literature and art relationship\n\n\nHe wants the African American artists to realize who they are as an individual artist and person, not just color in the background of life.\n\nHe also dealt powerfully with racial themes in poems like \"Black Christ,\" the story of a lynching victim who returns to life to speak of his ordeal. Through his poetry and books, he promoted equality, condemned racism and injustice, and celebrated African American culture and spirituality.\n\nAlthough, the \"New Negro Movement\" has been over since, but the effects of the authors and words written are still generally known today. African American artists engaged culture to work for goals of civil rights and equality.\n\nAfrican Americans paintings became absorbed into the mainstream culture.\n\nMexican art\n\nVisual arts made a strong statement during the Harlem Renaissance, creating images based on newly developed consciousness about heritage and culture. Aaron Douglas was the Harlem Renaissance artists whose work best demonstrate the 'New Negro' philosophy.\n\nAaron Douglas is known to be a \"father of Afro-American Art\". He painted drawings for public buildings and produced illustrations and cover designs for many black publications including The Crisis and Opportunity.\n\nDouglas was an important part of the circle of artists and writers we now call Harlem renaissance. He portrays strength in his paintings, strength that he was expressing to Black people with his artwork.\n\n1930s literature and art relationship\n\nHe shows the young black artist that they have the possibility of achieving things that were once considered beyond them. Douglas's work is based on the African American lifestyle and it shows the hardships and heritage of the African Americans and its beauty.\n\n • Social realism\n • Culture and Arts during the Depression\n • List of literary movements\n\nHis work most likely inspired other African American artists to show their work and express themselves.", "pred_label": "__label__1", "pred_score_pos": 0.9927757382392883} {"content": "AAA authentication server\n\nWhat is 802.11r? Why is this Important?\n\nIn this short series of blogs, we’re spending some time looking at the lesser known but undeservedly underappreciated amendments to 802.11 and the features/benefits they provide. The first blog explained the basics of 802.11k “WLAN Radio Measurements” and specifically zoomed in on the Neighbor Request/Report. This blog will focus on the 802.11r amendment. Fast BSS […]", "pred_label": "__label__1", "pred_score_pos": 0.9571780562400818} {"content": "Entitled Doc Huyen Cam (monochord in Chinese script), the concert will display a wide range of music genres, including folk, pop, rock, new wave and electronic music.popular Vietnamese overseas singer Quang Le, and his wife Phuong Linh. He also will play with veteran saxophonist Tran Manh Tuan and orchestras using western and traditional Vietnamese instruments.\n\nVietnamese overseas dan bau musician Pham Duc Thanh (Photo: dantri.com.vn)\n\nTrong Tan will open the concert by singing Tieng Dan Bau (Sound of Dan Bau) with musicians Thanh and Tuan. The song by Nguyen Dinh Phuc and Lu Giang highlighting dan bau will be performed, for the first time, with a saxophone.\n\n\"I like Trong Tan because he has warm vocal tones and he is an expressive singer. Trong Tan and Quang Le, who represent the two different kinds of music, will sing Vietnam Que Huong Toi (Vietnam My Homeland). I’m moved just to think about the performance\".\n\nOther music pieces will introduce the root and development of dan bau, such as xam (blind busker singing) pieces and Ly Koo Chai (a southern folk song). Xam is known as the first music genre to be performed by dan bau, whilst the instrument will play the southern folk song with a rock style, said the musician.\n\nThanh’s composition, entitled Hoi Lang Ta (Our Village Festival), will close the concert with a performance of dan bau, the orchestra and dance. He wrote the piece in 2013, based on northern cheo (traditional opera).\n\n\"I was born in the countryside in the north, where I was surrounded by paddy-fields and cheo songs,\" said Thanh. \"These things nurtured me and made me feel that I wanted to live in my homeland\".\n\nThe show is performed with Vang Son Mot Thuo (Once Golden Melodies) to respect the musician who has devoted his life to Vietnamese traditional instruments and, in particular, dan bau.\n\nThanh is a renowned musician known for his masterful ability on dan bau. Born to a traditional musical family in Gia Phu commune, Gia Vien district in northern Ninh Binh province, his talent was fully apparent in his youth. He began playing cheo drum at age 4 and learned mandolin at age 5. He was playing dan bau and dan nhi (two-string fiddle) at age 6.\n\nThanh joined Vietnam Cheo Theatre and officially became a professional dan bau performer in 1974. Before graduating with top honors at the Vietnam Institute for Musicology’s Vietnamese Traditional Music College in 1983, he went to HCM City to further study the folk music of central and southern Vietnam.\n\nHe and his family moved to Canada in 1996, where he became a popular performer in Montreal. He also teaches dan bau at the Vietnamese Music School in Canada. He currently is returning to Vietnam to participate in performances.\n\n\"When I perform in the US or other countries, audiences like dan bau very much. I dream of a concert performing in my homeland to honor dan bau,\" said Thanh.\n\nThe one-night concert will begin at 8pm at the Hanoi Opera House. Tickets are 500,000 VND (22 USD) to 3 million VND. Call 0912600096 - 0981843191 for more information.\n\nSource: VNA", "pred_label": "__label__1", "pred_score_pos": 0.7327585220336914} {"content": "Unanswered [5] | Urgent [0]\n\nHome / Writing Feedback   % width Posts: 6\n\nThe pie chart describe the degradation of agricultural land productivity in the worldwide.\n\nanabel 3 / 4  \nFeb 7, 2017   #1\nWriting IELTS Task 1_Causes of Worldwide Land Degradation\n\nsoil quality is decreasing\n\nThe pie chart described the degradation of agricultural land productivity in the worldwide. Coverage areas are North America, Europe, and Oceania. In the world, Over-grazing became the biggest cause, it contributes 35% of total causes. The cutting or burning of the tree (deforestation) caused three-tenth of degradation. Twenty-eight percent has caused by over-cultivation. There was just 7% by others.\n\nFive percent land of North America has decreased the quality of the soil. Over-cultivation was a major role, that was equal to 3.3%. Other causes were 1.5% from over-grazing and 0.2% from deforestation. Almost one-fourth of total land in Europe has degraded. Europe had the biggest percent of land degradation. Approximately 10% (exactly 9.8%) land degraded by cutting or burning of the tree. Over-cultivation and over-grazing are each 7.7% and 5.5%. The last region is Oceania, including Australia and New Zealand. In this region, just deforestation and over-grazing, each amount of 11,3% and 1,7%.\n\nHolt - / 7,527 2001  \nFeb 7, 2017   #2\nAnabel, while you did write a little over 150 words, you failed to produce at least 3 paragraphs for this essay. So there is a structural problem in terms of the way that you developed the discussion. The minimum paragraph requirement is 3 paragraphs. So you would score lower in terms of grammar range and accuracy. You may also score less in terms of task accuracy in this case because of the shortness of the discussion. It delivers the impression that you were mechanical in terms of writing this essay. You did not really bother to try to expand on the presentation to try and improve your lexical resource along with the coherence and cohesiveness of your essay. While all of the information that you were given was represented in the essay, I don't think that you can score higher than a 5 with this particular essay. I base that score on the problems that I mentioned earlier in my comments. There are also notable grammar problems that created sentence structure problems.\n\nExamples of the sentence problem include, but is not limited to;\n\n\"... land productivity in the worldwide.\"\n\nthe proper presentation of that sentence should have omitted the part that says \"in the\" it should only be \"... productivity worldwide.\"\n\nThat said, you did not do a bad job of representing the information in the essay. So you would probably get a passing score for this work, even with the existing problems of the essay.\nichanpants89 [Contributor] 16 / 777 309  \nFeb 7, 2017   #3\nAvoid making mistake in the beginning part of the essay because that is the place for you to impress the examiner or possibly earn a high score. It is really unfortunate that you picked the wrong grammatical tense in the first sentence. The paraphrase of the question must be in the form of present and not in past form. This is because you give a factual report what the graph/chart mentions/describes. Also, this essay might only reach 4 or even lower due to the absence of 'overview' sentence. You are not suggested to directly mention the data without mentioning the general trend or the overview of the graph / chart given.\n\nFurthermore, it is also required for an IELTS writing task 1 to have an appropriate grouping. It seems obvious that you missed them. Take the diagram that you've uploaded in this forum, you can simply classify/split the information into 2 equal parts. Therefore, the first body paragraph should be about the pie chart and the second body paragraph should explain about the data from the table. Before making body paragraphs, do not forget to write an appropriate introduction paragraph which consists of 'question's paraphrase', 'possible measurement (x and y axis)', and 'the overview sentence'.\n\nHope this helps :)\nbagusetyawan 8 / 27 7  \nFeb 7, 2017   #4\nOne more thing, don't forget to give your overview about the data that has been given. It's very important because if you noticed the band descriptor, you'll see this point.\n\nGood luck\nfoyuliu 5 / 20 9  \nFeb 8, 2017   #5\nUsually a conclusion paragraph is needed for the short essay.\nMinh Ngoc 1 / 1  \nFeb 8, 2017   #6\nHi Anabel,\nYou should add the part of overall or conclusion in Task 01 because this part is important.\nGood luck to you!\n\nHome / Writing Feedback / The pie chart describe the degradation of agricultural land productivity in the worldwide.", "pred_label": "__label__1", "pred_score_pos": 0.9910786747932434} {"content": "honeybees, Israel, wild bees\n\nIsrael Scientists Encouraging Government to Save Wild Bees\n\nWith the current threats facing bees and other pollinators, including pesticides, diseases, and habitat loss, various nations and leaders are doing what they can to help increase population numbers. At the same time, however, some initiatives can be helpful while others may have unforeseen consequences. For example, the government of Israel intends to pass a…\n\n\nFlowers Crucial Link Between Bacteria and Wild Bees\n\nThe honeybee’s cousins are gaining more attention this week due to new research from the University of California Riverside. Wild bee species are quickly becoming more important to the pollination and honey-making process due to the growing increase in colony collapse disorder (CCD), which is negatively affecting millions of honeybees all over the world. Bearing…\n\npesticides and honey bees\n\nPesticides Could Affect a Honey Bee’s Social Behavior\n\nWhile research into neonicotinoid pesticides, which have proven to be harmful to pollinators like honey bees, has brought about many new revelations, scientists announced recent findings that provide new insight into how these pesticides affect the declining pollinating species around the world. It turns out exposure to a specific neonicotinoid pesticide called imidacloprid causes complex…", "pred_label": "__label__1", "pred_score_pos": 0.9517091512680054} {"content": "Appeared in Winter 1995 | Vol. XXI, No. 4\n\nTwentieth Anniversary Issue\n\nDownload the PDF here.\n\nIn the Christian tradition, “light” is a term that has extensive significance. A goodly variety of philosophers, theologians, and poets have made remarkably insightful contributions to Christianity’s highly developed and beautifully integrated understanding of “light.” This essay will explore the Christian meaning of light, and its significance for a world of skepticism, relativism, and cynicism.\n\n\n\n\nAt the same time, another triad is involved. Whereas the first three days reveal God’s wisdom, and the next three days His goodness,the essential and abiding fact of creation manifests God’s power. God, therefore, who begins creation with light and proceeds to translucence and opacity, intends creation to take place over a period of six days so that He can clearly and distinctly manifest to us three essential features of His personality, namely, that He is omnipotent, all-wise, and all-beneficent.3\n\n\nIn addition, when God declared that “light” is good, He was calling attention to the existence of yet another trilogy. As the cause of being, light is powerful; as the cause of understanding, light is clear; as the cause of ordering life, light is good.4 Bonaventure’s position on this particular threefold significance of light is solidly in harmony with traditional Christian teaching on the meaning of light. It is firmly rooted in Scripture and its practical implications have been continuously reaffirmed by human experience. At the same time, however, it stands in opposition to the relativism, skepticism, and cynicism that characterizes much of contemporary thought.\n\nAs the cause of being, light is distinguishable from darkness which has no capacity for causation whatsoever. Light causes being; darkness, since it is nothing, cannot cause anything. Hence light and darkness have nothing in common. Light is;darkness is not. Light is a source of illumination; darkness is not. Light dispels darkness; darknesscannot dispel light. Contemporary relativism, however, tends to place light and darkness on an equal metaphysical footing. For example, strict relativists, who do not anchor their choices in the firm foundation of real being, regard choice to be self-justifying. That is, they affirm choice apart from any consideration as to whether it relates to the real world. The choice to abort, for relativists, proceeds independently of any knowledge of the nature of what one is doing or likely consequences that will follow. Thus, “pro choice” advocates staunchly oppose any kind of illumination that would shed light on the nature of the fetus, the psychological or physical consequences of abortion, as well as the logical impact abortion has on marriage, the family, and society. As far as the “pro-choice” position is concerned, light and darkness are equally irrelevant.\n\n\n\n\nAs the cause of understanding, light was considered an indisputable ally until 1927 when physicist Werner Heisenberg described his famous “Principle of Indeterminacy.” According to Heisenberg, it is not possible to determine the position and velocity of an electron. The reason for this is that photons of ordinary light exert a violent force on electrons thereby altering both their position and velocity. The scientist who views the electrons with an extremely high-powered electron microscope is not seeing things as they are in themselves (or as they would have been had he not tried to see them). His very act of seeing intrudes upon them. Light actually interferes with knowing the electrons in their objectivity. The observer is at the same time both a spectator and an actor in the drama. The “Principle of Indeterminacy” states that light prevents knowledge. And when the physicist computes the mathematical margin of uncertainty in his measurements of an electron’s position and velocity, he finds it is always a function of that mysterious quantity known as “Planck’s Constant.”\n\n\nAs the cause of ordering life, light is now regarded with a great deal of suspicion. Intense or excessive light is known to cause a wide range of discomforts and diseases from sunburn to skin cancer. Light can be irritating, blinding, glaring, dazzling, and distracting. As T.S. Eliot has said of modern man:\n\n\nLight can be tiring and painful. The time comes when we need darkness and sleep. In Johann Peter Hebel’s Nibelungen,we find a much stronger opposition to light. When Brunhilda reaches the bright lands of Burgundy, having left her own country where an eternal night reigns, she exclaims:\n\nI cannot get accustomed to so much light,\n\n\nAs though no gown here would be thick enough!6\n\n\nLight and analogy:\n\nThe critical question here concerning light has to do with the relationship between specific forms of light such as mental illumination, photons, and sunlight, and more numinous notions of light such as those referring to God and creation. In other words, are the latter references to light simply metaphors of the former, having nothing in common with them with respect totheir intrinsic and formal natures? This question has an important bearing on the Christian or theological meaning of light. Is such meaning a mere poetic fancy or is it real and therefore discloses to us a truth we can, at least to a certain extent, grasp? Is the word “light” as applied to God and creation merely a word and nothing more or does it bespeak a reality that touches us and informs us with meaning?\n\n\nSt. Thomas distinguishes between an analogy of similarity (similitudoanalogiae) and an analogy of proportionality (similitudo proportionalitatis).7In the former case, things have a likeness to each other by sharing the same quality, such as different things that are hot. In the latter case, things are like each other by a certain proportionateness. For example, the Scriptures speak of God as the sun because He is the principle of the spiritual life just as the sun is the principle of corporeal life. In this instance the word “sun” is applied to God metaphorically and does not disclose anything about God’s nature. God and the sun do not share the same nature or reality. Similarly, when Christ is referred to as a “lion,” the term is also used metaphorically and does not signify anything about Christ himself. The word “lion,” though predicated of Christ, does not refer to Christ’s nature. It refers to Him not really, but metaphorically. If all lions were assembled, Christ would not be present.\n\nIn another text, Aquinas asks the question whether light is said to be properly [that is, non-metaphorically] of spiritual things.8On the one hand, St. Thomas argues that since nothing per se sensible can be common to itself and a spiritual thing which is not per se sensible, light is predicated of spiritual things metaphorically. The proper meaning of “light” (its ratio propria) belongs to matter and refers to what the eye sees. Yet Aquinas goes beyond this point and explains how it can be said that corporeal and spiritual things do share light as a common reality.\n\nAccording to Aquinas, there is a common notion (ratio communis) that the “light” of spiritual and corporeal things share, namely, a “principle of manifestation.” St. Thomas states that “intellectual light is nothing else than a manifestation of truth” and supports this claim by quoting Ephesians v. 13 which reads: “All that is made manifest is light.”9The notion of a “principle of manifestation” bears no reference to matter and shares a common reality among all things that manifest light. If we consider the things which fall under this common signification (secundum ordinem rerum), we can understand how light applies to spiritual things more properly than it does to things that are material. As St. Thomas states, “Light is more truly in spiritual things than in corporeal things, not according to the proper meaning of light, but according to the principle ofmanifestation. “10\n\nIn this sense, by referring to light as a principle of manifestation, as something that all things that manifest light share, we have a true and proper analogy and are not merely using the word light as a metaphor.11Thus, the word light as applied to God and creation does disclose something of their realities. Moreover, light is more perfectly manifested in those beings that are more perfectly adapted to manifest it. Therefore, “light” is more perfectly manifested in God than in the human mind, in photons, or in sunlight. And it is more perfectly manifested in the human mind than it is in photons and in sunlight.\n\nBy understanding how the word “light” is used as a proper analogy, we have reason to state that any kind of light which is an occasion for relativism, skepticism, or cynicism, is operating in a way that is essentially “un-lightlike” since it contradicts its proper activity as being a principle of manifestation. Light must manifest. That is its essence. Therefore, it cannot be a cause or occasion for relativism, skepticism, or cynicism. The modern world is less comprehending of light than it is fearful of it.\n\nDante on light:\n\nIt has been said that Dante’s Divine Comedy is in reality the theology and philosophy of St. Thomas Aquinas set to poetry. There can be little doubt that Dante’s treatment of light closely follows that of the Angelic Doctor. The opening lines of the “Paradiso” express how the light from God shines throughout the universe and is absorbed and reflected in different ways: “La gloria di colui che tutto move per 1’universo penetra, e risplende in una parte piu e meno in altrove” (The glory (la luce di Dio] of the One who moves all things penetrates the universe and reverberates [re-glows] more in one part and less in another). For Dante, God’s light penetrates to the essence of things and their response is not a mere surface reflection but a refulgence or re-glowing that emanates from the very core of their being. From the opening of the “Paradiso,” Dante begins to orchestrate a veritable symphony of light.\n\n\nLight as God:\n\nThrough analogy we begin to see how the universe holds together, how the many can participate in the One. It also gives us insight into the hierarchical organization of being and teaches us something about the relationship between God and creation. In addition, it helps us to understand how a quality such as “light” can exist most perfectly and pre-eminently in a being,God, that is most removed from our senses. As it states in Timothy 6:16: “God inhabiteth light inaccessible, where no man hath seen nor can see.”\n\nWhen St. John states that “God is light” (I John 1:15), he is implying that God is pre-eminently light, that is, light in an original, perfect, and complete way. Therefore, light must be attributed to all other things in a secondary, less perfect, less complete way. God is the fullness of light. All other light is inferior to the Divine Light. Whatever imperfections created light may have are not to be found in God. The Divine Light can not interfere with knowledge, confuse, impose, fade, overwhelm or cause pain. This is why Plato could say that “Light is the shadow of God” and John Lord, a 19th century American historian, could write that “The light of nature, the light of science, and the light of reason, are but as darkness, compared with the divine light which shines only from the word of God.”\n\nWe hope to be able to discern, as C. S. Lewis has expressd it, “`patches of Godlight’ in the woods of our experience.”12Or, to employ aquatic imagery rather than sylvan, T. S. Eliot has stated:\n\nOur gaze is submarine, our eyes look upward\n\nAnd see the light that fractures through unquiet water.\n\nWe see the light but see not whence it comes. O Light Invisible, we glorify Thee!13\n\n\n\nIt is not the study of corporeal light that enlightens us about the Divine Light. Rather, it is the absolute Light of God that illumines every other light. It is God who is the source of every illumination in the universe, “the true light that enlightens every man who comes into the world” (John 1:19). God’s light is to our intellect as the light of our intellect is to the body. Hence it is said: “The lamp of the body is thy eye. If thy eye be sound, thy whole body will be full of light. But if it be evil, thy body also will be full of darkness. Take care, therefore, that the light that is in thee is not darkness. If, then, thy whole body is full of light, having no part in darkness, it will all be illumined, as when a bright lamp illumines thee” (Luke 11:34-36). “In thy light do we see light,” the psalmist writes (36:9). There would be no earthly light if it were not for the Divine Light. We see light and the things that light illuminates. Light gives us knowledge, but it points to something above knowledge – a sense of the transcendent God, the Light above light. To see the light without sensing the Light is to be spiritually blind. God bathes us in his eternal light so that we may see all things.\n\nT. S. Eliot praises God who is “Light Invisible … Too bright for mortal vision.”14We put the whole cosmos in perspective during Mass when we set little lights on the altar to honor the Invisible Light. Even the darkness can remind us of the light, and the light can draw us to the Light Invisible. We praise the Greater light for giving us the lesser lights. The light breaking through the stained glass window fills us with awe because it triumphs over darkness, and wonder because it reminds us of its divine source.\n\nWhen John Henry Cardinal Newman was journeying home from Italy, in 1832, he became deliriously ill. With death hovering near, he gave final instructions to his Italian servant, but then suddenly added these unexpected words: “I shall not die, I shall not die, for I have not sinned against the light …God has still a work for me to do.”\n\n\nLead, kindly light, amid the encircling gloom,\n\nLead Thou me on!\n\nThe night is dark, and I am far from home.\n\nLead Thou me on!\n\nThe adjective “kindly” is of particular significance here. The Divine Light is not only a source of illumination, but it is also a source of love. Lucifer, whose name means “bearer of light,” has knowledge, but lacks love. Newman is reminding us that the God of Light is also the God of Love. To separate love from light is to create Hell.\n\n\nLight and the Trinity:\n\n\n\nWho will presume to say that the Radiance is unlike and foreign from the sun? Rather who, thus considering the radiance relatively to the sun, and the identity of the light, would say with confidence, “Truly the light and the radiance are one, and the one is manifested in the other, and the radiance is in the sun, so that whoso sees this, sees that also”?\n\n\n\n\nAthanasius reiterated the point in hisOrations against the Arians:\n\n What the light enlightens, that the radiance irradiates; and what the radiance irradiates, from the light is its enlightenment. Thus also when the Son is beheld, so is the Father, for he is the Father’s radiance; and hence the Father and the Son are one.\n\nChrist is, indeed, “Light from Light.”\n\nSt. John had paved the way for Athanasius and the Nicaean Creed by stating repeatedly that Christ brings the true light to the world: “I am the light of the world. He who follows me does not walk in darkness, but will have the light of life” (8:12); “As long as I am in the world I am the light of the world” (9:05); “Whileyou have the light, believe in the light, that you may become sons of light” (12:36); “I have come a light into the world, that whoever believes in me may not remain in the darkness” (12:46).\n\n\nThe very word “light” contains an interesting, though purely accidental, summation of its Christian significance. We may consider the letters “1,” “i,” “h,” and “t” as standing for love, illumination, hierarchy, and truth; while regarding the silent, unpronounced letter “g” at the core as representing God, the hidden source from whom all the goods of creation proceed.\n\n\n\n\n\n1St. Bonaventure, “The Breviloquium-II,” The Works of Bonaventure, Vol. II, tr. by Jose de Vinck (Paterson, N.J.: St. Anthony Guild Press, 1970), pp. 72-75. Subsequent references to this series of volumes will be designated as Works.\n\n2Ibid. p. 74.\n\n3Ibid. p. 72.\n\n4Works, Vol. V, “Fifth Collation,” p. 73.\n\n5T.S. Eliot, “Choruses from `The Rock’,” The Complete Poems and Plays, 1909-1950 (New York: Harcourt Brace & World, 1952), p. 112.        \n\n6Hebe1,The Nibelungs, “The Death of Siegfried,” Act. II, scene vi.\n\n7Suppl. q.69, al, ad 2.\n\n8IISent., d. 13, q.1, a.2.\n\n91, q.106, a.l.\n\n10II Sent., d.13, q.1, a.2: “Lux verizcs est in spiritualibus quam in corporalibus, non secundum propriam rationem laccis, sed secundum rationem manifestiationis.”  \n\n111, q.67, a.1: “But if taken in its common and extended use, as applied to manifestation of every kind, it [light] may properly be applied to spiritual things.”\n\n\n13Eliot,op. cit., p. 113.\n\n14Ibid., p.114.", "pred_label": "__label__1", "pred_score_pos": 0.9293324947357178} {"content": "When I See The Flags\n\nAfter spending the last week- eight hours or more a day- with someone who is actively dying, my heart would always race right before I would turn down the hall towards their room.  Anticipating the flags to be standing proudly at the entryway of their room.\n\nAll nursing home facilities react to a resident’s death differently.  When I found out how the VA Hospital’s CLC treats their resident’s deaths, I thought it was a beautiful idea.  I hope that all of the CLC’s do the same as mine does, because it means so much to the other residents and their families, the volunteers, and the staff.\n\nSince the CLC strives to be a family setting, rather than a scary traditional nursing home, the residents become friends.  They spend time together in the common area, as residents can go only in their own room.  The residents all can tell when someone has taken a turn for the worse.  They notice everything.  When someone is about to pass, the residents are allowed to go in their friend’s room to say a few words.\n\nIt pulls at the heart strings when I see a 90 year old resident wheel himself into another room to say goodbye to his fellow service member.\n\nWhen a resident passes, the CLC stands two flags on either side of their door.  One side is the USA flag, and the other is the branch they were in while serving in our military.  I have turned the corner into hallways many times hoping to see the flags- and in the same breath- hoping not to see the flags.  Unfortunately, sometimes it can take a while for the body to shut down, and it seems that it takes too long for my friends to feel peace again.  When you witness suffering of any kind, it will create empathy that you will carry forever.  The peace I am talking about is not only physical, but also emotional.\n\nWhen I do see the flags, I have had different emotions- happiness, reflection, warmth, and selfishness.\n\nWhy selfishness?  Well, in some cases I wasn’t ready to lose my friend yet!  The lovely namesake of this blog is a great example of this.  The day he passed, he was smiling and giggling at jokes.   I was happy for him to be out of pain when I saw his flags, but sad to lose a sweet friend.\n\nThe flags guard their door for several days.\n\nA memorial service is given once a month for the residents who have passed since the last.  The Chaplin comes every Thursday for Bible studies/religious services, and one is reserved for the memorial service.  The services are always packed- the residents always come, family, staff, and volunteers.\n\nThe flags are also displayed at the service.  At the end of the memorial service, the Chaplin asks if anyone would like to say a few words about the deceased.  The best comment was when a resident said that the he always thought it was kind of the deceased to share his Marine magazines with him.  It was sweet because both men were known to be crank pots.\n\nItems I Take to the CLC\n\n\n\n\n\n • Cell phone with the charger with an extra long cord \n\n\n\n", "pred_label": "__label__1", "pred_score_pos": 0.7290641069412231} {"content": "Python for InfoSec\n\nHey Everyone, I am Vikram Salunke and welcome to our brand new course on Python for InfoSec.\nThis is the first video in the series. So, this course is going to be for pentesters, defenders, reverse engineers exploit developers, forensic analyst etc. We will write tools from the scratch and we will see how to write script to automate our attack.\nPython is called Hacker's Langauge. Most of the tools are written in Python. Python is simple and easy to learn and there are hundreds of third-party libraries available which will help you to build your own tools.\nThere are hundreds of tools already exists but learning python will help you in difficult cases where those tools fail.\n\nWhich Python Version?\n\nWe can install multiple versions for python in same machine. Python 3 is not backward compatible. That means the scripts written in Python 2.x will not work correctly in Python 3. And most of the tools are written in Python 2.\nFor this course we are going to focus more on Python 2.7 and we will try to develop Python 3 compatible code.\n\nCompiled vs Interpreted\n\nPython is an interpreted language different than compiled. language such as C. Let's see what do you mean by compiled and interpreted.\n\ncompiled vs interpreted\n\nNow for example there is source code file HelloWorld.c\ncompiler will take this file and produce binary such as HelloWorld.exe\nThat can execute natively with the operating system without any further assistance from compiler language.\nIn the case of Python, imagine there is a file interpreter processes that script.\nDuring execution of that script interpreter must be installed when you want to run the script.\nAnd another thing about Python is it doesn't processes entire script at once that means it reads the first line - execute it and then move onto the next line.\n\nIf you want to join our in person class then please click here we are doing trainings in some upcoming InfoSec conferences.\nAnd if you have any doubts, any questions then you can tweet me @vikramsalunke20\nWe are uploading daily new videos on YouTube click here to subscribe.\nIf you want to solve the exercises on this topic those are below. Solve the exercises and check your understandings. Thank you :)", "pred_label": "__label__1", "pred_score_pos": 0.6576268672943115} {"content": "Assam CEE 2020 Answer Key: Assam Combined Entrance Exam\n\n\nDibrugarh University will release the Assam CEE 2020 Answer Key or Assam Combined Entrance Exam Answer Key after completion of the exam. And, the test is for admission into Engineering and Medical courses in different colleges of the state. Hence, a candidate seeking admission into B.E./B.Tech. Courses in Assam can apply for Assam CEE 2020. Further, candidates can cross-check the answer from the answer key and predict their score. The university will upload the answer key shortly after conducting the exams. And, we will provide links to the Assam CEE 2020 Answer Key as soon as it is available on the university website.\n\nUpcoming Application Form\n\n 1. CBSE 10th & 12th Board Dates Apply Now\n 2. Manipal Uni. 2020 Admissions Now Open Apply Now\n 3. UPES Admissions 2020 Now Open Apply Now\n\nApplicants are expected to visit this website for all details about the Assam CEE Solutions 2020. Answer Key (Code A & B) released by Affinity Classes Guwahati is linked below. \n\nGuidelines for Assam CEE 2020 Answer Key\n\n • Many private institutions will be releasing the answer key within hours of the examination itself.\n • But, it is advisable to cross-check with the official answer key uploaded by the university. As there may be many discrepancies with the private institution answer key.\n • Normally the examination paper consists of two or three sets, namely A, B, and C. In such cases candidate must be careful while comparing the answers with the answer key because the key for different sets will be obviously different.\n • Also, after evaluating the score in the examination paper, a candidate can then predict their rank and chances of getting the desired course in the desired college.\n • Finally, candidates can challenge the answer key by sending an email or written notice through speed post to the university with the specified fee.\n\nAssam CEE 2020 Question Paper PDF Download\n\nPrevious year question papers are easily available on various websites. Such papers are usually accompanied with the official answer key. Therefore, after attempting the paper, a candidate can check their score and judge their preparation accordingly.\n\n\nThe Dibrugarh University will publish the Assam CEE 2020 Answer Key for all the set of question papers on its official website.\n\nSubscribe to Get Updated Information about Assam CEE 2020 Answer Key: Assam Combined Entrance Exam\n\nRead more about Assam Combined Entrance Exam\n\nImportant dates Complete Details\nApplication Form Admit Card\n\nCandidates can check this website again for any more updates on answer key after the Assam CEE 2020 Examination.\n\nList of Engineering Entrance Examination 2019\n\nAssam cee 2018 answer key, Assam cee 2018 question paper pdf download, cee answer key 2018 pdf, Assam cee 2017 question paper pdf download, Assam cee 2016 question paper pdf download, cee question paper 2017 pdf, cee question paper 2018, Assam cee question paper pdf.", "pred_label": "__label__1", "pred_score_pos": 0.8942815661430359} {"content": "Skip navigation.\n\nCreation vs. Evolution (Part 3)\n\n\nD. There was a global flood approximately 4,400 years ago.\ni. The Bible describes the great flood in detail.\na. The earth had become corrupt and full of violence in the years preceding the flood (Gen 6:11).\nb. God had had enough and told Noah that he was going to destroy the earth and all flesh with it (Gen 6:12-13).\nc. God told Noah to build an ark of gopher wood (Gen 6:14).\n1) The dimensions of the ark were (Gen 6:15):\nA. Length: 300 cubits (450ft - 550ft)\nB. Width: 50 cubits (75ft - 92ft)\nC. Height: 30 cubits (45ft - 55ft)\n(1 cubit = 18-22 inches, 1.5-1.83 feet)\n2) The ark was three stories (Gen 6:16).\n3) The total floor space of the ark was approximately 101,250ft² (450ft x 75ft x 3) - 151,800ft² (550ft x 92ft x 3).\n4) That is between 2.3 - 3.5 acres.\n5) The ark had 1.04 to 1.56 times as much floor space as the average Walmart store.\n6) The total volume of the ark was 1.5 - 2.8 million ft³ (450ft x 75ft x 45ft - 550ft x 92ft x 55 ft).\n7) Noah and his sons had plenty of time to build the ark.\nA. In Gen 6:3, God gave men 120 years before He would destroy them.\nB. Noah was said to be 500 years old in Gen 5:32.\nC. Noah was 600 years old when the flood came (Gen 7:6,11).\nD. Shem was born 98 years before the flood (Gen 11:10) when Noah was 502 (Gen 5:32 doesn't say that Noah begat Shem when he was 500 years old - read it carefully).\nE. God told Noah to build the ark and said that Noah, his wife, his sons, and their wives would be saved in the ark (Gen 6:18).\nF. Noah's three sons were already born when God spoke to Noah (Gen 6:10).\nG. Assuming that 1) the sons were born within a few years of each other, and 2) that they were all three married at the time when God spoke to Noah, and 3) that they were married young in their late teens or early twenties, and 4) that they began working on the ark soon after God told them to, it is very possible that they could have had as much as 70-80 years to build the ark.\n8) Noah was to take two of every land animal and every bird on the ark (Gen 6:19-20) and seven of every clean beast and birds (Gen 7:2-3).\n9) Noah was also to take enough food to sustain he and his family and all the animals (Gen 6:21).\n10) With 15-18ft ceilings on each of the three floors (1.5 - 2.8 million ft³), there would have been lots of overhead room for shelves and bins to store the food, and cages for the birds and smaller animals.\nd. Once all the animals and Noah and his seven family members were in the ark, all the \"fountains of the great deep\" were \"broken up\" and the \"windows of heaven were opened\" (Gen 7:11).\n1) It rained on the earth for 40 days and 40 nights (Gen 7:12).\n2) The entire earth was flooded including the mountains, over which the water prevailed 15 cubits (approx. 22.5 ft) (Gen 7:17-20).\n3) All flesh on the earth, including all men, died (Gen 7:21-23).\n4) The waters covered the earth for 150 days (Gen 7:24).\ne. This was clearly not a local flood, but a global flood.\n1) For those compromising Christians who claim that Noah's flood was not a global flood, but simply a local flood that didn't destroy the earth, listen again to Thomas Huxley:\nf. There is a theory called the Hydroplate Theory which hypothesizes that there was a layer of water approximately 10 miles under the earth's crust which was about 3/4 of a mile deep.\n1) The water under the earth's crust would have been under extreme amounts of pressure and when the earth's crust cracked, the fountains of the great deep were broken up and all the water under the earth violently shot up into the atmosphere and rained down on the earth, flooding it completely.\n2) The following is an excerpt which gives an overview of the Hydroplate Theory from Walt Brown's book In The Beginning:\n3) \"Rupture Phase. Centuries of tidal pumping (explained on page 121 and pages 539–541) in the subterranean chamber steadily increased its temperature and pressure. The subterranean water soon became supercritical, as explained on pages 121–122. Increasing heat losses in the chamber eventually balanced the constant heat input by tidal pumping, so temperatures (and pressure) no longer increased. The overlying crust was stretched, just as a balloon is stretched by internal pressure.\n\n\"The rupture began with a microscopic crack at the earth’s surface. Because stresses in such cracks are concentrated at each end of the crack, both ends grew rapidly—at about 3 miles per second. Within seconds, this crack penetrated down to the subterranean chamber and then followed the path of least resistance. The rupture probably completed its path around the earth in about 2 hours. Initial stresses were largely relieved when one end of the crack ran into the path left by the other end. In other words, the crack traveled a path that intersected itself at a large angle, forming a “T” on the opposite side of the earth from where the rupture began.\n\n\"As the crack raced around the earth along a great-circle path, the 10-mile-thick crust opened like a rip in a tightly stretched cloth. Pressure in the subterranean chamber directly beneath the rupture suddenly dropped to nearly atmospheric pressure. This caused supercritical water to explode with great violence out of the 10-mile-deep “slit” that wrapped around the earth like the seam of a baseball.\n\n\"All along this globe-circling rupture, whose path approximates today’s Mid-Oceanic Ridge, a fountain of water jetted supersonically into and far above the atmosphere. Some of the water fragmented into an “ocean” of droplets that fell as rain great distances away. This produced torrential rains such as the earth has never experienced—before or after.\n\n\"Other jetting water rose above the atmosphere, where it froze and then fell on various regions of the earth as huge masses of extremely cold, muddy “hail.” That hail buried, suffocated, and froze many animals, including some mammoths. [For details, see “Frozen Mammoths” on pages 253–283.] The most powerful jetting water and rock debris escaped earth’s gravity and became the solar system’s comets, asteroids, and meteoroids. [For details, see “The Origin of Comets” on pages 287–319, and “The Origin of Asteroids and Meteoroids” on pages 323–349.] To understand the gigantic energy source that launched this material, one must study “The Origin of Earth’s Radioactivity” on pages 351–396.\n\n\"Carried up in the fountains were seeds and spores. Those that remained in the atmosphere settled for years after the flood, repopulating the plant kingdom globally.\n\n\"Flood Phase. Each side of the rupture was basically a 10-mile-high cliff. In the bottom half of the cliff face, compressive, vibrating loads greatly exceeded the rock’s crushing strength, so the bottom half continually crumbled, collapsed, and spilled out into the jetting fountains. That removed support for the top half of the cliff, so it also fragmented and fell into the pulverizing supersonic flow. The 46,000-mile-long rupture rapidly widened, reaching an average width of about 800 miles all around the earth. Water trapped in the spongelike openings in the chamber’s roof and floor was steadily forced into the chamber during the flood, so the hydroplates settled slowly. Sediments swept up in the escaping flood waters gave the water a thick, muddy consistency. These sediments rapidly settled out over the earth’s surface, trapping and burying many plants and animals. The world’s fossils then began to form.\n\n\"The rising flood waters eventually blanketed the jetting fountains, although water still surged out of the rupture. Because today’s major mountains had not yet formed, global flooding covered earth’s relatively smooth topography.\" (Walt Brown, Ph.D., In the Beginning)\n\nii. Most ancient cultures have stories of a great flood and only a few people and animals being saved in a boat.\na. \"Dr. Duane Gish, in Dinosaurs by Design, says there are more than 270 stories from different cultures around the world about a devastating flood.\" (Flood Legends, Answers In Genesis)\nc. \"Another flood story is from China. It records that Fuhi, his wife, three sons, and three daughters escaped a great flood and were the only people alive on earth. After the great flood, they repopulated the world.\" (Ibid)\niii. The geography of the earth shows abundant evidence of a global flood.\na. \"If Noah’s flood were true you would expect to find billions of dead things buried in rock layers laid down by water all over the earth, and what do we actually see in the fossil record? Billions of dead things buried in rock layers laid down by water all over the earth!” (Ken Ham)\nb. By a process called Liquefaction, all the sedimentary rock layers would have been formed in Noah's Flood.\n1) \"If water flows up through a bed of sediments with enough velocity, water pressure will lift and support each sedimentary particle. Instead of thinking of water flowing up through the sediments, think of the sediments falling down through a very long column of water. Slight differences in density, size, or shape of adjacent particles will cause them to fall at slightly different speeds. Their relative positions will change until the water’s velocity drops below a certain value or until nearly identical particles are adjacent to each other, so they fall at the same speed. This sorting produces the sharply-defined layering typical in sedimentary rocks worldwide. The vast, sharply-defined sedimentary layers we have all seen are unmistakable characteristics of liquefaction and a global flood.\" (Walt Brown, Ph.D., In the Beginning)\nc. Polystrate fossils (fossils crossing two or more sedimentary layers) could not have been fossilized over vast eons of time, but they are easily explained by rapid burial and liquefaction in the global flood.\nd. Just Google \"polystrate fossils\" and you will find lots of pictures of trees \"growing up\" through \"millions of years\" of rock layers.\n\n6. The complexity of life demands design.\nA. Genetic information\ni. Genetic information could not have possibly formed by chance.\nii. \"Information never self-assembles. The genetic information in the DNA of each human cell is roughly equivalent to a library of 4,000 books. Even if matter and life (perhaps a bacterium) somehow arose, the probability that mutations and natural selection produced this vast amount of information is essentially zero. It would be similar to producing 4,000 books with the following procedure:\na. Start with a meaningful phrase.\nb. Retype it, but make some errors and insert a few letters.\nc. See if the new phrase is meaningful.\nd. If it is, replace the original phrase with it.\ne. Return to step “b.”\n\n\"To produce just the enzymes in one organism would require more than 10^40,000 trials. (To begin to understand how large 10^40,000 is, realize that the visible universe contains fewer than 10^80 atoms.)\" (Walt Brown, Ph.D., In the Beginning)\nB. DNA production\ni. DNA could not have evolved.\nii. \"DNA cannot function without hundreds of preexisting proteins, but proteins are produced only at the direction of DNA. Because each needs the other, a satisfactory explanation for the origin of one must also explain the origin of the other. Therefore, the components of these manufacturing systems must have come into existence simultaneously. This implies creation.\" (Walt Brown, Ph.D., In the Beginning)\nC. Improbabilities\ni. To believe that life evolved is to believe in miracles.\nii. \"To claim that life evolved is to demand a miracle. The simplest conceivable form of single-celled life should have at least 600 different protein molecules. The mathematical probability that even one typical protein could form by chance arrangements of amino acid sequences is essentially zero—far less than 1 in 10^450. To appreciate the magnitude of 10^450, realize that the visible universe is about 10^28 inches in diameter.\" (Walt Brown, Ph.D., In the Beginning)\nD. Complex Molecules and Organs\ni. The complexity of organs such as the human eye and the brain proves the impossibility of them evolving into their present form.\nii. \"Many molecules necessary for life, such as DNA, RNA, and proteins, are incredibly complex—so complex that claims they have evolved are absurd. Furthermore, those claims lack experimental support.\n\n\"There is no reason to believe that mutations or any natural process could ever produce any new organs—especially those as complex as the eye, the ear, or the brain. For example, an adult human brain contains over 10^14 (a hundred thousand billion) electrical connections, more than all the soldered electrical connections in the world. The human heart, a ten-ounce pump that will operate without maintenance or lubrication for about 75 years, is another engineering marvel.\" (Walt Brown, Ph.D., In the Beginning)\nE. Sexual reproduction\ni. The impossibility of sexual reproduction evolving.\nii. \"If sexual reproduction in plants, animals, and humans is a result of evolutionary sequences, an unbelievable series of chance events must have occurred at each stage.\na. The amazingly complex, radically different, yet complementary reproductive systems of the male and female must have completely and independently evolved at each stage about the same time and place. Just a slight incompleteness in only one of the two would make both reproductive systems useless, and the organism would become extinct.\nb. The physical, chemical, and emotional systems of the male and female would also need to be compatible.\nc. The millions of complex products of a male reproductive system (pollen or sperm) must have an affinity for and a mechanical, chemical, and electrical compatibility with the eggs of the female reproductive system.\nd. The many intricate processes occurring at the molecular level inside the fertilized egg would have to work with fantastic precision—processes that scientists can describe only in a general sense.\ne. The environment of this fertilized egg, from conception through adulthood and until it also reproduced with another sexually capable adult (who also “accidentally” evolved), would have to be tightly controlled.\nf. This remarkable string of “accidents” must have been repeated for millions of species.\n\n\"Either this series of incredible and complementary events happened by random, evolutionary processes, or sexual reproduction was designed by intelligence.\" (Walt Brown, Ph.D., In the Beginning)\n\nF. This is why the Bible says that we are fearfully and wonderfully made (Psa 139:14).\n\nCreation vs. Evolution.PDF502.65 KB", "pred_label": "__label__1", "pred_score_pos": 0.7631583213806152} {"content": "Peptides are small versions of proteins and they have several amazing properties that you need to know about. Most of the cosmetic, as well as health products, are responsible for containing several peptides because of their anti-aging, muscle building, and anti-inflammatory properties. Studies have already indicated that few peptides are responsible for slowing the aging process dramatically and also help in destroying microbes. Often people are responsible for confusing peptides and proteins together. Some popular peptides improve the collagen peptides, which are great for the skin.\n\nRead more: Kratom vs. CBD – Which One Will Give You More Benefits\n\nWhat exactly are peptides?\n\nPeptides are nothing but the short strings associated with amino acids, which are responsible for containing 2 amino acids to 50 amino acids, as stated by Amino acids are also known as the building blocks of protein but proteins are responsible for containing more. Peptides can be easy to absorb by the body in comparison to proteins because they are small and can be easily broken down into proteins. They can penetrate the intestines and the skin, which will help them to enter your bloodstream quickly. \n\nScientists have also expressed their interest in bioactive peptides. Bioactive peptides are those that are responsible for having a great effect on the human body and can also affect human health. Several bioactive peptides are responsible for having different properties. The effects that they show on your body are normally dependent on the amino acid sequence.\n\nRead more: PCD Pharma Franchise Opportunity- Moving Towards a Prospective Future\n\nA bioactive Peptides is capable of:\n\n • Killing microbes\n • Lowering the blood pressure level\n • Reducing inflammation\n • Improving the immune function\n • Prevents the formation of blood clots\n • Act as antioxidants\n\nBenefits associated with peptides\n\nGiven below is a list of the benefits that are associated with peptides. \n\nThey help in slowing down the aging process\n\nCollagen is present in your nails, skin, and hair. Collagen peptides are nothing but broken collagen proteins that can be absorbed easily by the body. When you decide to take collagen peptides, it can help in improving the health of your skin as well as slows down the aging process. Studies have also shown that several collagen peptide supplements can help in treating skin wrinkles. Peptides can also help in stimulating melanin production, which can improve the protection of the skin against the damage of the Sun. \n\nHelps in healing wounds\n\nCollagen is one of the most important components associated with healthy skin. Collagen peptide is responsible for facilitating the fast healing of wounds. Bioactive peptides can help in reducing inflammation and are responsible for acting as antioxidants, which can help the body to rapidly heal.\n\nRead more: What Is the Purpose of Liquid Chromatography in Drug Discovery and Development?\n\nHelps in building muscle mass and strength\n\nVarious studies on the older adults have indicated that peptide is capable of increasing both the muscle mass as well as the strength of the individuals. Creatine peptides can also help in improving strength as well as building muscles. Creatine peptide has also started to increase in popularity. The human body can easily digest these peptides, and they are responsible for causing fewer problems. \n\n\nPeptides are normally present in foods that are rich in protein. Ensure you are going through everything that has been mentioned above so that you can understand peptides appropriately.", "pred_label": "__label__1", "pred_score_pos": 0.9278342723846436} {"content": "<< back to all work\n\n\n\nGrow.com provides BI to help small and medium businesses grow. I led the design efforts to simplify what it takes to get valuable BI. This includes a complete redesign of the Grow Metric Builder, introducing Datasets, and creating new data transformation and visualization tools.\n\nWhat should we work on?\n\nOne of the most interesting - yet most difficult - aspects of building any product is determining the most valuable thing you could make and spend your resources on. At Grow, we used a very simple but powerful framework to answer this question:\n 1. Identify your most successful users (center of solvency)\n 2. Figure out what they are doing with your product (benefit statement)\n 3. Determine the required work to achieve the benefit statement (current reality)\n 4. Finally, simplify the current reality so it’s easier for everyone to achieve the benefit.\n\nCenter of Solvency - Who are our most successful customers?\n\nIdentifying your most successful customers will vary greatly by industry business model, but it’s pretty simple for a B2B SaaS startup: Who has paid back their customer acquisition cost? This metric will reveal the customers who have earned money from before churning. These are the customers who are making your company money. We define this as our Center of Solvency.\n\nBenefit Statement - Why are our customers using Grow?\n\nThe next step is understanding how our successful customers use Grow and the benefit they receive. The whole team (Design, PM, Dev, and QA) contacted every customer who was willing to talk and asked. We discovered our customers use Grow to create actionability, accountability, and visibility across their organization. After gathering why the customers use Grow , we analyzed hundreds of their metrics and dashboards to find exactly what they were building. We overwhelmingly found our users creating Executive and Department Level Sales and Marketing Dashboards.\nAfter examining the the metrics and dashboards our customers were creating we found most to be Sales & Marketing related.\n\nCurrent Reality - What does it take to achieve the benefit statement?\n\nNext, we wanted to find out exactly what work was required to get Executive and Department Level Sales and Marketing Dashboards that provide Actionability, Accountability, and Visibility using Grow. What does the user experience, from their first sales call, to their first login, to building a complete suite of sales and marketing dashboards?\n\nWe printed, documented, and analyzed every step of this process. With the help of our customer success team and product experts, we were able to establish the Current Reality and identify the most painful parts of the process, primarily surrounding. The most painful parts of the Current Reality were focused around building metrics (sourcing, cleaning, preparing, transforming, and visualizing data). This made sense. Grow wasn't originally intended to build custom metrics - there wasn't a strong product vision, and features were added as requests came in. We eventually had a metric builder that got the job done, but using it was painful and required specialized knowledge.\n\nThe end result of mapping the current reality of Grow. This is everything a user must go through to achieve the benefit of Grow. We found metric building to be the most difficult and painful part of the current reality.\n\nVision & Shared Purpose\n\nI believe what leads to creating a product is ensuring everyone is working to solve the same problems, is heard throughout the process, understands the vision, and believes in what we're building. This is why we had the entire product and engineering team working on the entire design process, from calling up customers to sketching designs.\n\nAfter learning we needed to make the metric building process easier, the entire team sketched their ideas, shared their ideas, sketch more ideas, shared those ideas, teamed up, sketched team ideas, and shared. This brought out everyone's ideas, spread the intelligence, and the best ideas were selected.\n\nThe team came together on a vision of a redesigned metric builder, but we all knew what we came up with wasn't what we were were going to build. That required more research, understanding, and design. The output of this process isn’t product specs, but a team who deeply understands what we were trying to accomplish, that has a shared vision, and has contributed to a solution.\n\nThe vision that the entire product and engineering team developed. The goal here is not to determine exactly what to build, but to develop shared purpose across the entire team.\n\nDesign & Building\n\nFinding our Guiding Insights - More Design Research\n\nNow that we had a vision, we needed to validate and iterate on it. This consisted of user interviews and observing hundreds of metric building sessions in the original Metric Builder. From this research we found several key insights that guided the rest of our design:\n 1. There are two primary activities that occur in the builder: data preparation and charting.\n 2. The existing information architecture of the metric builder did not match our users mental model of building a metric.\n 3. There are many data transformation patterns that appear over and over in sales and marketing metrics. For example: tagging data and comparing date ranges.\n 4. It is very common for different metrics to use the same set of data.\n 5. Many of our metric builders do not have the necessary skills to prepare data.\nInsights 1, 2, and 3 were directly related to the builder redesign, while 3, 4, 5 spawned additional projects focused on simplifying the metric building experience for users without data knowledge.\n\nDesign, Prototype, & Test\n\nWith these guiding insights, we started designing. We began with sketches and feedback from internal users, then worked through iterations of the design, consistently receiving feedback from internal users and customers. We created a prototype of the current design on Monday, followed up with 4-5 user tests on Tuesday, iterated the design on Wednesday, performed another 4-5 user tests on Thursday, and finished the week preparing designs for the next week. 3 weeks of intensive testing and consistent user feedback is what I believe led to the success and immediate adoption of the builder after release.\nInitial sketches of the builder.\nThis information architecure didn't work. It didn’t help the user in their flow through the application. We needed to make data work and charting work seperate activities.\nThere are too many activities avaliable on the page at once. If everything is there nothing is there. Even though data and chart are different activities, you need to be able to see your chart while manipulating data.\nLayout can be more intuitive, keep things in the same place between pages. For example, swap chart and pipeline.\n\n\nWhile we were designing and prototyping, the development team was busy laying the architectural foundations for the new builder. This allowed both the product and engineering teams time to prepare a successful product. The team did amazing work developing the new builder. It was finished ahead of schedule and included more features and content than we originally anticipated. Again, I believe this was due to the whole team having shared purpose.\n\nRelease, Feedback, & Iteration\n\nUltimately, we released an alpha to partners and internal users. We were able to find and fix a majority of the bugs during this time. Afterwards, we released a well tested beta to our power users. We performed regular feedback sessions with them during this time. The beta went so well we ended up accelerating the release of the builder to a general audience.\n\nMaking building easier for non-builders.\n\nWith the Metric Builder successfully released, we started working on new features that would make preparing and charting data easier, especially for users without advanced data knowledge. BI is much more useful for an organization if everyone is able to answer questions with data, regardless of their data skill. So, using the insights we discovered through past research, we designed, analyzed, and built several new features for the builder, making it easy for users without data knowledge to obtain BI.\n\nTagging and Date Comparison Transforms\n\nThere are many patterns that appear over and over in Sales and Marketing metrics, such as tagging data and comparing date ranges. These patterns previously required SQL knowledge, but we built tools to allow anyone, regardless of data knowledge, to tag their data and compare dates.\n\n\nOur research discovered that many organizations only have one person with the data skills necessary to source and prepare data for visualization. This prevents most individuals from using data to answer the questions they are interested in. Coupled with this, we found that people used the same data over and over across different metrics. With these insights we researched, designed, and shipped Datasets and the Dataset Builder. Datasets allow users with data knowledge to save collections of prepared data and share them across their company. With Datasets, creating metrics is no longer limited to users who have advanced data knowledge.\nWith dataset you can leverage one individual's skilled datawork across the entire organization.\n\nChart Level Transforms\n\nWe found that it is extremely common to build multiple metrics with different views of the same data. An example is a \"Sales Month to Date” vs. “Last Month to Date\" metric. Both metrics use mostly the same data as \"Sales this Month By Sales Rep.\" We realized that these metrics are the same data with a different date range, date grouping, and category grouping (pivot table). Building these metrics took a massive amount of skilled data work. To make it easy on the user, we identified these patterns and simplified them to a single menu. With “Chart Level Transforms,” users can view their data however they want, without having to think about how they need to manipulate their data.\nWith chart level transforms you can view your data however you need it without needing to think about manipulating the data.\n\nAutomatic Key Values\n\nA Key Value is the big number displayed on the top left of metrics. Key values summarize the metric into a single value, and are vital to getting value from a metric. The only problem is… they’re hard to calculate, and getting a useful key value takes a lot of work. We found the standard procedure was to duplicate a report, filter it to the date range of interest, and perform an aggregation (and if you want to compare it, you had to do all of that twice!). So we built “Automatic Key Values” to address this issue. As soon as a user charts data, these key values are generated, eliminating all the work required.\nKey values were previously tedious to create. Now they are created for you.\n\n<< back to all work", "pred_label": "__label__1", "pred_score_pos": 0.7447891235351562} {"content": "55 Videos Of Science Experiments For Kids To Do At Home\n\n\nSexual Reproduction\n\nDragonflies reproduction\n\n\n\nGenetic Recombination\n\nGenetic recombination is the breaking and rejoining of DNA strands to form new molecules of DNA encoding a novel set of genetic information. Recombination can occur between similar molecules of DNA, as in the homologous recombination of chromosomal crossover, or dissimilar molecules, as in non-homologous end joining. V(D)J recombination in organisms with an adaptive immune system is a type of genetic recombination that helps immune cells rapidly diversify to recognize and adapt to new pathogens. Recombination is a common method of DNA repair in both bacteria and eukaryotes.\n\nGenetic recombination is catalyzed by many different enzymes, called recombinases. RecA, the chief recombinase found in Escherichia coli, is responsible for the repair of DNA double strand breaks (DSBs). In yeast and other eukaryotic organisms there are two recombinases required for repairing DSBs. The RAD51 protein is required for mitotic and meiotic recombination, whereas the DMC1 protein is specific to meiotic recombination.\n\nChromosomal Crossover\n\n\n\nchromosomes under a microscope\n\n\nChromosomal crossover refers to recombination between the paired chromosomes inherited from each of one’s parents, generally occurring during meiosis. During prophase I the four available chromatids are in tight formation with one another. While in this formation, homologous sites on two chromatids can mesh with one another, and may exchange genetic information.\n\nBecause recombination can occur with small probability at any location along chromosome, the frequency of recombination between two locations depends on their distance. Therefore, for genes sufficiently distant on the same chromosome the amount of crossover is high enough to destroy the correlation between alleles.\n\n\nGene Conversion\n\nIn gene conversion, a section of genetic material is copied from one chromosome to another, without the donating chromosome being changed. Gene conversion occurs at high frequency during meiotic division and at low frequency in somatic cells. It is a process by which a DNA sequence is copied from one DNA helix (which remains unchanged) to another DNA helix, whose sequence is altered. It is one of the ways a gene may be mutated. Gene conversion may lead to non-Mendelian inheritance and has often been recorded in fungal crosses.\n\nEvolution of Sexual Reproduction\n\nThe evolution of sexual reproduction is currently described by several competing scientific hypotheses. All sexually reproducing organisms derive from a common ancestor which was a single celled eukaryotic species. Many protists reproduce sexually, as do the multicellular plants, animals, and fungi. There are a few species which have secondarily lost this feature, such as Bdelloidea and some parthenocarpic plants. The evolution of sex contains two related, yet distinct, themes: its origin and its maintenance. However, since the hypotheses for the origins of sex are difficult to test experimentally, most current work has been focused on the maintenance of sexual reproduction.\n\n\n\n\nIt seems that a sexual cycle is maintained because it improves the quality of progeny (fitness), despite reducing the overall number of offspring (the two-fold cost of sex). In order for sex to be evolutionarily advantageous, it must be associated with a significant increase in the fitness of offspring. One of the most widely accepted explanations for the advantage of sex lies in the creation of genetic variation. Another explanation is based on two molecular advantages. First is the advantage of recombinational DNA repair (promoted during meiosis because homologous chromosomes pair at that time), and second is the advantage of complementation (also known as hybrid vigor, heterosis or masking of mutations).\n\nFor the advantage due to creation of genetic variation, there are three possible reasons this might happen. First, sexual reproduction can bring together two mutations that are beneficial into the same individual (i.e. sex aids in the spread of advantageous traits). Also, the necessary mutations do not have to have occurred one after another in a single line of descendants. Second, sex acts to bring together currently deleterious mutations to create severely unfit individuals that are then eliminated from the population (i.e. sex aids in the removal of deleterious genes). However in organisms containing only one chromosome, deleterious mutations would be eliminated immediately: therefore removal of harmful mutations is an unlikely benefit for sexual reproduction. Lastly, sex creates new gene combinations that may be more fit than previously existing ones, or may simply lead to reduced competition among relatives.\n\nFor the advantage due to DNA repair, there is an immediate large benefit to removal of DNA damage by recombinational DNA repair during meiosis, since this removal allows greater survival of progeny with undamaged DNA. The advantage of complementation to each sexual partner is avoidance of the bad effects of their deleterious recessive genes in progeny by the masking effect of normal dominant genes contributed by the other partner.\n\nThe classes of hypotheses based on the creation of variation are further broken down below. It is important to realise that any number of these hypotheses may be true in any given species (they are not mutually exclusive), and that different hypotheses may apply in different species. However, a research framework based on creation of variation has yet to be found that allows one to determine whether the reason for sex is universal for all sexual species, and, if not, which mechanism is acting in each species.\n\n\n\n\nRadding C (1982). “Homologous pairing and strand exchange in genetic recombination”. Annu. Rev. Genet. 16 (1): 405–37. doi:10.1146/annurev.ge.16.120182.002201. PMID 6297377.\n\nAgrawal AF (2006). “Evolution of sex: why do organisms shuffle their genotypes?”. Curr. Biol. 16 (17): R696. doi:10.1016/j.cub.2006.07.063. PMID 16950096\n\n\n“Access Excellence”. Crossing-over: Genetic Recombination. The National Health Museum Resource Center. Retrieved February 23, 2011.\n\n\nLetunic, I; Bork, P (2006). “Interactive Tree of Life”. Retrieved 23 July 2011.\n\nLetunic, I; Bork, P (2007). “Interactive Tree of Life (iTOL): An online tool for phylogenetic tree display and annotation”. Bioinformatics 23 (1): 127–8. doi:10.1093/bioinformatics/btl529. PMID 17050570.\n\nLetunic, I; Bork, P (2011). “Interactive Tree of Life v2: Online annotation and display of phylogenetic trees made easy”. Nucleic Acids Research 39: W475–8. doi:10.1093/nar/gkr201. PMC 3125724. PMID 21470960.", "pred_label": "__label__1", "pred_score_pos": 0.8879542350769043} {"content": "태그 : cleanbandit 요약보기전체보기목록닫기\n\n\nClean Bandit\n\nClean Bandit is a British group who are best known for their singles \"Mozart's House\" which debuted at number 17 on the UK Singles Chartand \"A+E\" that reached number 100. The band was founded in 200...\n\nClean Bandit - Dust Clears\n\nImagine if the life that you thought you shared Wasn't really there It was made up in you mind Could be anyone, anywhere'Cause you'd been living in a world or your own design, undermined,In ano...", "pred_label": "__label__1", "pred_score_pos": 0.9083545804023743} {"content": "What is PRP?\n\nprpman2 What is PRP?\n\nPlatelet Rich Plasma Therapy, also referred to as PRP Therapy, is a progressive non-surgical treatment to treat a variety of orthopedic conditions including arthritis, tendon injuries, and ligament injuries.\n\nPRP is part of a group of state-of-the-art treatments collectively referred to as Regenerative Medicine.  PRP treats an injured area naturally using your body’s own growth factors to accelerate healing.  It has been shown to be safe and effective for numerous joint and soft tissue injuries and has been extensively researched in numerous medical publications from all over the world.\n\nSome of the many uses of Platelet Rich Plasma include osteoarthritis (degenerative arthritis) of the spine, knee, shoulder, hip, hands, and feet, as well as meniscus tears, plantar fasciitis, and rotator cuff tears.\n\nThe procedure is simple and is performed in the office.  The PRP process begins when a small amount of the patients blood is removed from the arm and placed into a special container.  The blood is then placed into a device called a centrifuge which spins the blood to help the separate the portion of the blood which becomes concentrated with platelets, thereby giving the procedure its name.  These platelets are important because they release growth factors to recruit stem cells and to assist in healing an injured area naturally.  Once the PRP is isolated, it is injected to the injured area under the guidance of an ultrasound machine to help accelerate healing and reduce pain.\n\n\nAlong the way, you have to go around obstacles, collect coins and decide the spy apps for iphone path quickly, because as you go you find several alternative paths and you have to choose the one in a few seconds", "pred_label": "__label__1", "pred_score_pos": 0.5372704267501831} {"content": "Skip to content\n\nWhat Can Cause Dementia Behaviors?\n\nMany people know about dementia or have heard of it, however, they don’t know what can cause dementia behaviors. There are many different things that can cause these behavior changes. The more that you can learn about these changes, the better you can understand what your elderly loved one is going through. If your loved one has a home care provider, make sure they understand these dementia behaviors, as well.\n\n\nHomecare in Glencoe IL: Dementia Behaviors\n\nHomecare in Glencoe IL: Dementia Behaviors\n\n\nBrain Changes\n\nOne of the most common things that can cause dementia behaviors is brain changes. Sometimes there is damage to the brain that can cause dementia behavior-related changes. If there is damage to the frontal lobe, it can impact behaviors, movement, memory, and thinking. If there is damage to the temporal lobe, it can impact feeling, learning, and hearing. There may be damage to the brain stem and that can cause temperature changes, heart rate issues, and breathing issues. Your loved one might have damage to their parietal lobe, as well. This could cause touch and language issues. They may also have damage to their cerebellum which could cause issues with coordination or balance.\n\n\nBody Changes\n\nYour elderly loved one may have body changes, as well. These may affect their personality and behaviors. They could have an infection such as a UTI. This can lead to them having delusions or hallucinations. They may be experiencing pain. This can cause them to become agitated or aggressive. They may also be taking certain medications that are causing their personality to change, too.\n\n\nPerception Changes\n\nAccording to research, the perception changes generally happen when the person with dementia is distressed or confused. They are trying to figure out what is going on, but they can’t properly communicate their confusion.\n\n\nSocial Changes\n\nThere are social changes that happen with dementia. When people find out that someone has dementia, they may treat them differently. This can make the person with dementia feel closed off from the rest of the world. They may feel like others don’t understand what they are going through.\n\n\nPsychological Changes\n\nThroughout life, there are many psychological changes that happen. As someone ages, their personality changes, as well. This can be seen when someone develops dementia and before they get a diagnosis, too.\n\n\nThese are some of the things that can cause dementia-related behaviors. If your loved one is displaying these things, now you may be able to understand more. If they have home care providers, make sure they understand, as well.\n\n\nIf you or an aging loved-one are considering hiring Homecare in Glencoe, IL, call the caring staff at LifeCare Home Health & In-Home Services. Call (888) 606-4199 LifeCare serves all of the Chicago Metro Area.\n\nWalter & Jane Shekman, Owners\n\n\nWalter & Jane Shekman, Owners", "pred_label": "__label__1", "pred_score_pos": 0.7871714234352112} {"content": "Final Regulations Clarify Employment Tax Treatment of Partners in Partnership That Owns Disregarded Entity\n\n\nThe Treasury Department and the IRS had issued the temporary regulations ( T.D. 9766) to clarify that the rule that a disregarded entity is treated as a corporation for employment tax purposes does not apply to the self-employment tax treatment of any individuals who are partners in a partnership that owns a disregarded entity. The temporary regulations continued to explicitly provide that the owner of a disregarded entity who is treated as a sole proprietor for income tax purposes is subject to self-employment taxes. A notice of proposed rulemaking ( REG-114307-15) cross-referencing T.D. 9766 was published on the same day.\n\nThe final regulations adopt the proposed regulations as amended. The corresponding temporary regulations are removed.\n\nDisregarded Entity\n\nThese regulations affect partners in a partnership that owns a disregarded entity, and contain amendments to 26 CFR part 301. Generally, under Reg. §301.7701-2(c)(2)(i) and except as otherwise provided, a business entity that has a single owner and is not a corporation under Reg. §301.7701-2(b)is disregarded as an entity separate from its owner (a disregarded entity). However, Reg. §301.7701-2(c)(2)(iv)(B) treats a disregarded entity as a corporation for purposes of employment taxes imposed under Subtitle C of the Internal Revenue Code. This exception to the treatment of disregarded entities does not apply to taxes imposed under Subtitle A of the Code, including self-employment taxes.\n\nEffective Date\n\nThese regulations are effective on July 2, 2019.", "pred_label": "__label__1", "pred_score_pos": 0.9809460639953613} {"content": "The Beat Goes On\n\n\nThe beat goes on… the drum beat that is!\n\nRedfish (Sciaenops ocellatus) and speckled trout (Cynoscion nebulosus) are both members of the family Sciaenidae, informally known as the drum family.  Of the 270 Sciaenidae species, 17 are found in the Chesapeake; some of the most recognized are croaker, spot, grey trout and black drum.  Many members of this family have special swim bladders and muscles that can produce noise – hence the name “drum.”\n\nAnglers are often surprised to learn that specks, despite their appearance, are not actually trout but drum.  Only male speckled trout make noise which resembles a grunt.  When you are fishing next time, take notice that plump, roe-laden females are silent but slender males produce grunts when you land them.  It is believed that males make grunting noises to attract females during spawning.  Here is a fantastic article by Jerald Horst of the Louisiana State University about speckled trout grunting behavior –  I learned a lot of new facts from the article.  There are four specific types of grunting sounds and the majority of grunting occurs from sunset to three hours after sunset.  Most important from an angling perspective, speckled trout do not feed when they are grunting.\n\nGrunting and body shape can be advantageous for conservation minded anglers looking to take home a tasty meal of trout.  In any fishery, it is important to protect breading females to ensure sustainability of the population.  So try to release the potbellied females full of roe and keep those grunting males.\n\nImpress your fishing buddies with this lesson in speckled trout “gruntology”!\n\nTossing Rocks: An Aid in Fly Casting\n\n\n“Tossing rocks” is a game I designed to aid in fly casting instruction.  This game helps replicate the cast and teaches some of the cast’s fundamental principles before a student even picks up a fly rod.\n\nFirst, collect some pieces of gravel and attach a target (paper plate) to a tree at shoulder level.  Stand facing the target at a distance of about 6 feet with the target in line with the dominant hand’s shoulder.  With the dominant hand, make a fist with the thumbnail facing upward.  Hold a piece of gravel between the thumb and pointer (index) finger knuckle.  Try tossing the rock at the target and stop the forward motion at the moment the rock is released.  Have a second target set up about a foot higher than shoulder level.  Try turning around backwards about 3 feetaway from the target.  Toss a piece of gravel behind you at this target remembering to stop as soon as the rock is released.  When playing this game inside, try replacing the rocks with pennies and attach the paper plate targets to a wall.\n\nAfter playing the game for a while, you can demonstrate how it applies to fly casting.\n\nFirst, it teaches a good grip of the fly rod with the thumb behind the cork toward the target.  Show the student how the grip of the fly rod is the same as holding the rock during the game.\n\n“Tossing rocks” also teaches acceleration through the casting stroke with an abrupt stop.  Make a short overhead cast with the fly rod and show the student that the speed up and stop of fly rod is similar to the speed up and stop used to toss the rock.\n\nFinally, the game teaches proper tracking during the casting stroke.  Show how the motion of tossing the rock when applied to casting encourages a straight-line path of the rod tip and tight loops.  Demonstrate how an inaccurate toss of the rock is the same as stopping the rod tip in a direction not toward the target (i.e. the fly line & fly travels in the direction the rod tip speeds up & stops).\n\nPlay this game for yourself or as a competition with friends.  You’ll find that it enforces good mechanics the next time you pick up a fly rod.\n\nGet Down with Tides & Current\n\n\nUnderstanding the influence of tides is vital to fishing success.  Tide is generally referred to as the vertical rise and fall of water due to the gravity of the moon and sun.  Under a full or new moon, the gravity from the moon and sun are additive.  During these times, the greatest tidal changes occur.  The tides of the full or new moon are called spring tides.\n\nTides in the Chesapeake Bay are semi-diurnal, meaning there are two highs and to lows per day.  It takes a little over six hours for the tide to change from one extreme to the other.  While vertical tidal changes on the Chesapeake are small (~2ft.), they impact the location of fish in shallow water.  As a general rule, gamefish like striped bass move closer to shore on high tides to feed around structure that they cannot safely reach on low tides.\n\nWhen fishing the shallows, it is important to notice the tidal height when you find fish at specific locations.  During extreme highs or lows, you will find fish in areas that typically do not hold them.  Generally extreme tides are the combination of the general gravitational forces plus the influence of wind.\n\nStrong wind can push large amounts of water causing a raise or fall in water level.  Here on the western shore of the Chesapeake, strong northeast wind will stack up the water causing abnormally high tides, while strong southwest wind will cause abnormally low tides.  I also find that during fall and winter, the tides tend to run lower on average – possibly due to the tilt of the earth’s axis.\n\nHorizontal current is created from vertical tidal movement.  Fish are opportunist feeders and rely on current to catch smaller prey in the fast moving water.  As a general rule, fish feed most actively during times of strong current.  For example, it is critical to fish a fast moving current at night when targeting stripers under the bridge lights of the Chesapeake Bay Bridge Tunnel.\n\nCurrent direction will influence where fish will congregate.  I will only fish certain spots on an outgoing current and others on an incoming current based on the way water moves around particular points, channels or structure.  Understanding local variations in current flow for your given area is important.\n\nI find that the time of slack current can vary greatly in a short distance.  There are spots that I fish 1 mile offshore where the time of slack current occurs 1.5 hours later than directly inshore.  Using this knowledge can help you plan your day to take advantage of moving current.\n\nWind can play a role in current, as well.  If a strong wind is blowing in the same direction as the tidal driven current, the current speed will increase and vice versa.  On the Chesapeake’s western shore, it is a good idea to plan to fish an incoming current during a strong NE wind, because the wind and tide will be working together causing faster moving current.  During a strong SW wind, you will want to do the exact opposite and fish the outgoing current.\n\nI hope you have found this tutorial to be useful, because understanding tides and current can help decode the mystery of fishing!", "pred_label": "__label__1", "pred_score_pos": 0.8535791635513306} {"content": "Brain 101 | National Geographic\n\n– [Narrator] The brain\nis the most complex organ in the human body. As part of the nervous system, the brain coordinates all\nof the body’s function. In adult humans, the\nbrain is a three-pound gelatinous mass of fat and protein. It’s comprised of four main regions: the cerebrum, the\ncerebellum, the brainstem, and the diencephalon, and each\none controls specific tasks. The largest section is the cerebrum, and it makes up over 3/4\nof the brain’s volume. It consists of neurons and nerve fibers that transmit information from the neurons throughout the brain and body. The cerebrum controls higher functions such as learning, reasoning, and speech, plus senses like sight and hearing. Under the cerebrum is the second largest part of the brain: the cerebellum. Much like the cerebrum, the cerebellum has nerve\ncells and nerve fibers. It carries signals to the\nother parts of the brain and to the spinal cord. The cerebellum is responsible for coordinating muscle movements, particularly those that help maintain the body’s balance and posture. The third region, the brainstem, lies in front of the cerebellum and anchors the brain to the spinal cord. The brainstem is a\ncollection of structures that include the pons, a mass of nerve fibers that\ncarry sensory information; the midbrain, a region\nof fibers and structures that help control movement, along with auditory and visual processing; and the medulla oblongata, which creates motor and sensory pathways between the midbrain, the\npons, and the spinal cord. Altogether, the parts of the brainstem control vital bodily functions,\nsuch as cardiac activity, respiration, digesting, and sleep. The fourth region is\nlocated above the brainstem and makes up the core of\nthe brain: the diencephalon. About the size of a apricot, the diencephalon is a grouping\nof several structures. The thalamus, which processes\nand transmits information from all senses except smell, and the hypothalamus and pituitary gland, which work together to produce\nand regulate neurochemicals. These structures help govern sensations, weight regulation, energy,\nand instinctual behaviors, such as eating, drinking, and having sex. The brain’s four main components, the diencephalon, brainstem,\ncerebellum, and cerebrum, work in-sync to ensure bodily functions are fully operational. The brain has even evolved\nmechanisms to protect itself. One such mechanism is\nthe blood-brain barrier, a semipermeable cellular wall that only allows specific chemicals to enter from the body’s\nbloodstream into the brain. Despite this protection, tumors and other complications can lead to life-threatening problems and diseases in the\nbrain, such as dementia. Thankfully, scientists have found ways to improve brain health. Staying physically active\nand eating a balanced diet may preserve cognitive function and even reduce the risk\nof developing Alzheimer’s. So, while the brain only makes up a small percentage of the body, it plays a crucial role\nin the body’s functions and overall well-being.", "pred_label": "__label__1", "pred_score_pos": 0.9934887290000916} {"content": "Arnold for Maya Standard Surface Shader Translucency / Paper Shader\n\nMaya 2018 | Arnold 5\n\nIn this example, the lamp shade has a Translucent material\n\nThe Subsurface component of the Arnold Standard Surface shader (aiStandardSurface) controls Sub Surface Scattering (SSS).\nWhen the ‘Thin Walled’ option is checked in the Geometry attributes of the shader, the Subsurface isn’t rendered as a full volume of material like soap or skin/flesh (the effect that is traditionally called Subsurface Scattering – SSS) but as a thin paper-like translucent surface like paper, thin cloth thin leaves, lamp shades etc. (the effect traditionally called Translucency or ‘Paper Shader’)\n\n* Note that this option is suitable mainly for polygon surfaces without thickness (just one side)\n\n\nTo create a Translucent shader with Arnold:\n\nSubsurface Weight must be higher than 0.0 for the effect to be computed.\n\nIn Geometry, check Thin Walled for the SSS to be rendered as Translucency (Paper Shader).\n\nExtra options:\n\nUse samplerInfo Node Facing Ratio output in Subsurface weight to add realism by changing the weight by angle.\n\nMultiply weave texture with Facing Ratio to simulate fabric translucency.", "pred_label": "__label__1", "pred_score_pos": 0.9317648410797119} {"content": "Walk of Fame\n\n\nParcul Cetăţii, Sibiu, România\n\n\nOver the years, Sibiu was the witness and beneficiary of the extraordinary contribution brought by numerous cultural and artistic personalities who helped develop the city as we know it today. Each of these personalities has a distinctive and astonishing story that connects him/her to Sibiu’s destiny and remains woven into the intimate fibre of the community.\n\nSibiu was a medieval citadel which couldn’t be conquered. There is a pedestrian alley between the first and the second guard walls that connects the first theatre ever built on the Romanian territory in 1788 with the „Barracks 90”, where the future theatre will be built. This Walk of Fame was born between the past and the future, adding each year new significant names of the world of theatre, dance and art shows.\n\nThe Walk of Fame, opened in the summer of 2013 by the Municipality with the occasion of the 20th anniversary edition of the International Theatre Festival of Sibiu, is thought as a permanent location of celebration and recognition of these contributions, as well as a tribute to the accomplishments in the cultural and artistic field of Sibiu or related to it. Although inspired by the famous Walk of Fame from Hollywood, the Walk of Fame from Sibiu is thought as a cultural event, which gives it its own personality, as well as a tourist attraction conferring uniqueness to the site.\n\nThe first seven stars were awarded to the following personalities:\n\nAriane Mnouchkine\n\nEugenio Barba\n\nSasha Waltz\n\nSilviu Purcărete\n\nDeclan Donnellan\n\nGeorge Banu\nTheatre Personality\n\nNakamura Kanzaburo XVIII (post mortem)\nKabuki Actor\n\nPhoto Gallery\n\nSimilar Suggestions\n\nRezervația Lacul și Golul Alpin Bâlea\n\n\n\n\nMuzeul Sătesc BADEA CÂRȚAN\n\n\nPiata Mare nr. 8\n\n\nThe Munitions Tower", "pred_label": "__label__1", "pred_score_pos": 0.5785058736801147} {"content": "An archivist stores documents and other materials of important value in an organized manner, providing access to them on demand. Archivists are also often asked to verify the legitimacy of certain documents, or transfer them on more modern storage mediums, such as copying books in an electronic format. An archivist may also be required to seek out a particular piece of information not present in the archives, and add it subsequently.\n\nArchivists need to be well-familiar with the subject of their archives – for example, an archivist working in a historic archive should demonstrate strong knowledge in history, usually not just through a formal degree but also activities at an earlier age. An archivist also needs to be knowledgeable in working with both old information storage devices, as well as modern, cutting-edge technology ones, while also possessing the skills necessary to transfer information from one type to another. Archivists also need good memory skills, as they’re often tasked with retrieving pieces of information from large and complex archives.\n\nIn 2008, archivists earned an average of $45,000 a year. Some of the more successful ones earn between $60,000 – $75,000 a year, though this is attained through a lot of experience and working in the particular area. The highest-paid archivists don’t usually go over $80,000/year in their salaries though, and the job is not considered a high-paying one in general. Archivists working in museums generally have better potential for earnings, some reaching around $85,000 annually.", "pred_label": "__label__1", "pred_score_pos": 0.6720805168151855} {"content": "AI Index 2018: The AI Boom is Worldwide and Accelerating\n\n\nThe rate of progress in the field of artificial intelligence is one of the most hotly contested aspects of the ongoing boom in teaching computers and robots how to see the world, make sense of it, and eventually perform complex tasks both in the physical realm and the virtual one. And just how fast the industry is moving, and to what end, is typically measured not just by actual product advancements and research milestones, but also by the prognostications and voiced concerns of AI leaders, futurists, academics, economists, and policymakers. AI is going to change the world — but how and when are still open questions.\n\nFinding from a group of experts were published last week inthe second annual AI Index, assembled by experts from Harvard, MIT, Stanford, the nonprofit OpenAI, and the Partnership on AI industry consortium, among others. The goal is to measure the field’s progress using hard data and to try and make sense of that progress as it relates to thorny subjects like workplace automation and the overarching quest for artificial general intelligence, or the type of intelligence that could let a machine perform any task a human could.\n\n\n“There is no AI story without global perspective. The 2017 report was heavily skewed towards North American activities. This reflected a limited number of global partnerships, not an intrinsic bias,” reads the 2018 report’s introduction. “This year, we begin to close the global gap. We recognize that there is a long journey ahead — one that involves collaboration and outside participation — to make this report truly comprehensive.”\n\nIn that spirit of global analysis, the second AI Index report finds that commercial and research work in AI, as well as funding, is exploding pretty much everywhere on the planet. There’s an especially high concentration in Europe and Asia, with China, Japan, and South Korea leading Eastern countries in AI research paper publication, university enrollment, and patent applications. In fact, Europe is the largest publisher of AI papers, with 28 percent of all AI-related publications last year. China is close behind with 25 percent, while North America is responsible for 17 percent.\n\n\n\nRead the source article in The Verge.", "pred_label": "__label__1", "pred_score_pos": 0.9891854524612427} {"content": "2007 ORS 419A.108¹\nProcedure for conflicts of interest\n\nWhenever a member of a local citizen review board has a potential conflict of interest in a case being reviewed, the member shall declare to the local citizen review board the nature of the potential conflict prior to participating in the case review. The following apply as described:\n\n(1) The declaration of the member shall be recorded in the official records of the board.\n\n(2) If, in the judgment of the majority of the local board, the potential conflict of interest may prevent the member from fairly and objectively reviewing the case, the local board may remove the member from participation in the review. [1993 c.33 §32]\n\n1 Legislative Counsel Committee, CHAPTER 419A—Juvenile Code: General Provisions and Definitions, https://­www.­oregonlegislature.­gov/­bills_laws/­ors/­419a.­html (2007) (last ac­cessed Feb. 12, 2009).", "pred_label": "__label__1", "pred_score_pos": 0.928743302822113} {"content": "Courses / Programming C++\n\nHome / Programming C++\n\nProgramming C++\n\nProgramming C++\n\nC++ is the general purpose programming language which supports Object Oriented Concepts. Every C application can be upgraded in C++ language using these Object Oriented Concepts. Basically, C++ is the superset of the C language. C++ is widely used to write various applications like UNIX, Windows, Linux, and many more.\n\nC++ is considered as an entry point for software development World. It is for those who want to build their programming concepts very strong or already have strong concepts. Students who are looking forward to enter into system programming, this course will be very beneficial for them. The syllabus for this course is designed keeping in mind the requirements of the IT companies.\n\nThe main concept of our training program is to develop the programs with classes and objects. C applications can be changed to C++ with the help of classes and adding Object Oriented Concepts. Developing application using C++ language is more optimized and efficient than C.\n\nAlong with the C++ course, we also cover the basics of Data Structure, Arrays, Templates, and Vectors, Object-Oriented Programming, String Functions.etc. Using a String Class, Stacks, Queues, and Trees, Recursion and Searching, Sorting, Pointers, enum, and Structures, Loops, Strings and Screen I/O and the list continues.", "pred_label": "__label__1", "pred_score_pos": 0.9878485202789307} {"content": "Statement from SSRC President Alondra Nelson\n\nThe Social Science Research Council (SSRC) stands with fellow social science organizations in opposition to the administration’s intention of including a question related to citizenship status in the 2020 census, and echoes their concerns that a citizenship question will cause many individuals not to respond to the census or to do so inaccurately.\n\nAccurate US census data informs rigorous social science research that in turn empowers communities and civic leaders at all levels of government to make more-informed policy decisions. Inaccuracies within the census can affect everyone in this country through future decisions in education, transportation, public health, public safety, social services, economic investment by the private sector, and more. The deep concern of the SSRC over inclusion of a question related to citizenship stems from the Council’s long history of research and writings on the conduct of the census, as well as the fact that including an untested question in the 2020 census belies the tenets of rigorous social science.\n\nAn accurate census is mandated in Article 1, Section 2 of the US Constitution, the guiding document that gives Congress the power to determine how each census is conducted. Members of Congress who share our concern are already putting forth legislation to bar the inclusion of a citizenship question. We urge Congress to work together to pass legislation strengthening the accuracy of the 2020 census data so fundamental to many sectors of society.\n\nThe SSRC rejects inclusion of a citizenship question, not only for its potential impact on the bedrock role accurate US census data fulfills in rigorous social science research—essential to fostering understanding and improving human well-being—but also for the possible adverse effects inaccurate data will have on the nation’s security, economy, and our democracy itself.\n\nAlondra Nelson\nSocial Science Research Council", "pred_label": "__label__1", "pred_score_pos": 0.9125574827194214} {"content": "Niclas photo\n\nNiclas Kolm\n\n\nVisa sidan på svenska\nWorks at Department of Zoology\nTelephone 08-16 40 50\nVisiting address Svante Arrheniusväg 18 B\nRoom D 513\nPostal address Zoologiska institutionen: Etologi 106 91 Stockholm\n\nAbout me\n\nI am an evolutionary biologist with broad interests in life histories, sexual selection, speciation, and animal behavior. My main interest lie in brain evolution and the link between variation in brain morphology and behaviour. I study this in a variety of taxa (Cichlids, Pipefishes and Seahorses, Birds, Pinnipeds, Cetaceans, Salmonids, Poeciliids) using phylogenetic comparative analysis and laboratory experiments.\n\n\nCurrently, most of the work in my group builds on four systems:\n\n\nWe have a database with data on brain size and various aspects of life history and behaviour for over 20000 specimens from over 4500 species. We use this data to perform phylogenetic comparative analyses to test various hypotheses in a macroevolutionary framework. Currently this is mainly a collaboration between my group, Wouter van der Bijl, Andrew Iwaniuk and Masahito Tsuboi but many other important collaborators have helped in this project.\n\n\nWe use our recently developed guppy selection lines with 14 % difference in brain size to perform experimental tests of several hypotheses concerning brain evolution and the link between brain morphology and physiology and behaviour. For this work, we have over 250 m2 of lab space with room for >4000 aquaria and six separate rooms for behavioural assays. This is a project with multiple collaborators, for instance Alexander Kotrschal (previously postdoc with me but now independent PI), Judith Mank, Michael Jennions, Pertti Panula, Alexei Maklakov, Björn Rogell, Pavel Nemec and Neus Visa.\n\n\n\n\nTogether with collaborators Hans Temrin, Laszlo Garamszegi, Eniko Kubinyi and Adam Miklosi we study brain and behaviour evolution both within and across breeds thus using the dog breeds as a long term selection experiment.\n\n\nWe use our recently developed guppy selection lines with > 15 % difference in schooling behaviour after three generations of selection. The aim here is to elucidate what changes in brain anatomy, cognition, other behaviours, life history and genetic architecture that occurs when 'a guppy becomes a herring'. This is a collaboration with David Sumpter, Kristiaan Pelckmans and Judith Mank.\n\nTwo recent papers:\n\n\n\n\nPostdoctoral Researchers\n\nAlberto Corral-Lopez\n\nZegni Triki\n\n\n\n\nAnnika Boussard\n\nStephanie Fong\n\n\n\nSéverine Buechel (previous postdoc with me)\n\nAlexander Kotrschal (previous postdoc with me)\n\nJames herbert-Read (previous postdoc with me)\n\nWouter van der Bijl (previous PhD-student with me)\n\nAlberto Corral Lopez (previous PhD student and postdoc with me)\n\nAlexander Hayward (previous postdoc with me)\n\nMasahito Tsuboi (previous PhD-student with me)\n\nMirjam Amcoff (previous PhD-student with me)\n\nAlejandro Gonzalez-Voyer (previous postdoc with me)\n\n\n\n\nA selection from Stockholm University publication database\n • 2018. Séverine D. Buechel (et al.). Proceedings of the Royal Society of London. Biological Sciences 285 (1871)\n\n It has become increasingly clear that a larger brain can confer cognitive benefits. Yet not all of the numerous aspects of cognition seem to be affected by brain size. Recent evidence suggests that some more basic forms of cognition, for instance colour vision, are not influenced by brain size. We therefore hypothesize that a larger brain is especially beneficial for distinct and gradually more complex aspects of cognition. To test this hypothesis, we assessed the performance of brain size selected female guppies (Poecilia reticulata) in two distinct aspects of cognition that differ in cognitive complexity. In a standard reversal-learning test we first investigated basic learning ability with a colour discrimination test, then reversed the reward contingency to specifically test for cognitive flexibility. We found that large-brained females outperformed small-brained females in the reversed-learning part of the test but not in the colour discrimination part of the test. Large-brained individuals are hence cognitively more flexible, which probably yields fitness benefits, as they may adapt more quickly to social and/or ecological cognitive challenges. Our results also suggest that a larger brain becomes especially advantageous with increasing cognitive complexity. These findings corroborate the significance of brain size for cognitive evolution.\n\n • 2017. Alison E. Wright (et al.). Nature Communications 8\n\n\n • 2017. Alexander Kotrschal (et al.). Evolution 71 (12), 2942-2951\n\n\n • 2017. Alex Szorkovszky (et al.). Methods in Ecology and Evolution 8 (12), 1735-1744\n\n 1. In social contexts, animal behaviour is often studied in terms of group-level characteristics. One clear example of this is the collective motion of animals in decentralized structures, such as bird flocks and fish schools. A major goal of research is to identify how group-level behaviours are shaped by the traits of individuals within them. Few methods exist to make these connections. Individual assessment is often limited, forcing alternatives such as fitting agent-based models to experimental data. 2. We provide a systematic experimental method for sorting animals according to socially relevant traits, without assaying them or even tagging them individually. Instead, they are repeatedly subjected to behavioural assays in groups, between which the group memberships are rearranged, in order to test the effect of many different combinations of individuals on a group-level property or feature. We analyse this method using a general model for the group feature, and simulate a variety of specific cases to track how individuals are sorted in each case. 3. We find that in the case where the members of a group contribute equally to the group feature, the sorting procedure increases the between-group behavioural variation well above what is expected for groups randomly sampled from a population. For a wide class of group feature models, the individual phenotypes are efficiently sorted across the groups and thus become available for further analysis on how individual properties affect group behaviour. We also show that the experimental data can be used to estimate the individual-level repeatability of the underlying traits. 4. Our method allows experimenters to find repeatable variation in social behaviours that cannot be assessed in solitary individuals. Furthermore, experiments in animal behaviour often focus on comparisons between groups randomly sampled from a population. Increasing the behavioural variation between groups increases statistical power for testing whether a group feature is related to other properties of groups or to their phenotypic composition. Sorting according to socially relevant traits is also beneficial in artificial selection experiments, and for testing correlations with other traits. Overall, the method provides a useful tool to study how individual properties influence social behaviour.\n\n • 2017. Alberto Corral-López (et al.). Science Advances 3 (3)\n\n Mate choice decisions are central in sexual selection theory aimed to understand how sexual traits evolve and their role in evolutionary diversification. We test the hypothesis that brain size and cognitive ability are important for accurate assessment of partner quality and that variation in brain size and cognitive ability underlies variation in mate choice. We compared sexual preference in guppy female lines selected for divergence in relative brain size, which we have previously shown to have substantial differences in cognitive ability. In a dichotomous choice test, large-brained and wild-type females showed strong preference for males with color traits that predict attractiveness in this species. In contrast, small-brained females showed no preference for males with these traits. In-depth analysis of optomotor response to color cues and gene expression of key opsins in the eye revealed that the observed differences were not due to differences in visual perception of color, indicating that differences in the ability to process indicators of attractiveness are responsible. We thus provide the first experimental support that individual variation in brain size affects mate choice decisions and conclude that differences in cognitive ability may be an important underlying mechanism behind variation in female mate choice.\n\n • 2016. Séverine D. Buechel (et al.). Proceedings of the Royal Society of London. Biological Sciences 283 (1843)\n\n\n • 2016. Alexander Kotrschal, Niclas Kolm, Dustin J. Penn. Proceedings of the Royal Society of London. Biological Sciences 283 (1826)\n\n\n • 2016. Wouter van der Bijl, Niclas Kolm. Bioessays 38 (6), 568-577\n\n A growing number of studies have found that large brains may help animals survive by avoiding predation. These studies provide an alternative explanation for existing correlative evidence for one of the dominant hypotheses regarding the evolution of brain size in animals, the social brain hypothesis (SBH). The SBH proposes that social complexity is a major evolutionary driver of large brains. However, if predation both directly selects for large brains and higher levels of sociality, correlations between sociality and brain size may be spurious. We argue that tests of the SBH should take direct effects of predation into account, either by explicitly including them in comparative analyses or by pin-pointing the brain-behavior-fitness pathway through which the SBH operates. Existing data and theory on social behavior can then be used to identify precise candidate mechanisms and formulate new testable predictions.\n\n • 2016. Masahito Tsuboi (et al.). Evolution 70 (7), 1559-1568\n\n Brain size is strongly associated with body size in all vertebrates. This relationship has been hypothesized to be an important constraint on adaptive brain size evolution. The essential assumption behind this idea is that static (i.e., within species) brain-body allometry has low ability to evolve. However, recent studies have reported mixed support for this view. Here, we examine brain-body static allometry in Lake Tanganyika cichlids using a phylogenetic comparative framework. We found considerable variation in the static allometric intercept, which explained the majority of variation in absolute and relative brain size. In contrast, the slope of the brain-body static allometry had relatively low variation, which explained less variation in absolute and relative brain size compared to the intercept and body size. Further examination of the tempo and mode of evolution of static allometric parameters confirmed these observations. Moreover, the estimated evolutionary parameters indicate that the limited observed variation in the static allometric slope could be a result of strong stabilizing selection. Overall, our findings suggest that the brain-body static allometric slope may represent an evolutionary constraint in Lake Tanganyika cichlids.\n\n • 2015. Alexander Kotrschal (et al.). Ecology Letters 18 (7), 646-652\n\n There is remarkable diversity in brain size among vertebrates, but surprisingly little is known about how ecological species interactions impact the evolution of brain size. Using guppies, artificially selected for large and small brains, we determined how brain size affects survival under predation threat in a naturalistic environment. We cohoused mixed groups of small- and large-brained individuals in six semi-natural streams with their natural predator, the pike cichlid, and monitored survival in weekly censuses over 5 months. We found that large-brained females had 13.5% higher survival compared to small-brained females, whereas the brain size had no discernible effect on male survival. We suggest that large-brained females have a cognitive advantage that allows them to better evade predation, whereas large-brained males are more colourful, which may counteract any potential benefits of brain size. Our study provides the first experimental evidence that trophic interactions can affect the evolution of brain size.\n\n • 2015. Wouter van der Bijl (et al.). Proceedings of the Royal Society of London. Biological Sciences 282 (1812), 116-124\n\n Large brains are thought to result from selection for cognitive benefits, but how enhanced cognition leads to increased fitness remains poorly understood. One explanation is that increased cognitive ability results in improved monitoring and assessment of predator threats. Here, we use male and female guppies (Poecilia reticulata), artificially selected for large and small brain size, to provide an experimental evaluation of this hypothesis. We examined their behavioural response as singletons, pairs or shoals of four towards a model predator. Large-brained females, but not males, spent less time performing predator inspections, an inherently risky behaviour. Video analysis revealed that large-brained females were further away from the model predator when in pairs but that they habituated quickly towards the model when in shoals of four. Males stayed further away from the predator model than females but again we found no brain size effect in males. We conclude that differences in brain size affect the female predator response. Large-brained females might be able to assess risk better or need less sensory information to reach an accurate conclusion. Our results provide experimental support for the general idea that predation pressure is likely to be important for the evolution of brain size in prey species.\n\n • 2015. Yu-Chia Chen (et al.). Proceedings of the Royal Society of London. Biological Sciences 282 (1810)\n\n Brain size varies substantially across the animal kingdom and is often associated with cognitive ability; however, the genetic architecture underpinning natural variation in these key traits is virtually unknown. In order to identify the genetic architecture and loci underlying variation in brain size, we analysed both coding sequence and expression for all the loci expressed in the telencephalon in replicate populations of guppies (Poecilia reticulata) artificially selected for large and small relative brain size. A single gene, Angiopoietin-1 (Ang-1), a regulator of angiogenesis and suspected driver of neural development, was differentially expressed between large-and small-brain populations. Zebra fish (Danio rerio) morphants showed that mild knock down of Ang-1 produces a small-brained phenotype that could be rescued with Ang-1 mRNA. Translation inhibition of Ang-1 resulted in smaller brains in larvae and increased expression of Notch-1, which regulates differentiation of neural stem cells. In situ analysis of newborn large-and small-brained guppies revealed matching expression patterns of Ang-1 and Notch-1 to those observed in zebrafish larvae. Taken together, our results suggest that the genetic architecture affecting brain size in our population may be surprisingly simple, and Ang-1 may be a potentially important locus in the evolution of vertebrate brain size and cognitive ability.\n\n • 2015. Alexander Kotrschal (et al.). Evolution 69 (11), 3013-3020\n\n One key hypothesis in the study of brain size evolution is the expensive tissue hypothesis; the idea that increased investment into the brain should be compensated by decreased investment into other costly organs, for instance the gut. Although the hypothesis is supported by both comparative and experimental evidence, little is known about the potential changes in energetic requirements or digestive traits following such evolutionary shifts in brain and gut size. Organisms may meet the greater metabolic requirements of larger brains despite smaller guts via increased food intake or better digestion. But increased investment in the brain may also hamper somatic growth. To test these hypotheses we here used guppy (Poecilia reticulata) brain size selection lines with a pronounced negative association between brain and gut size and investigated feeding propensity, digestive efficiency (DE), and juvenile growth rate. We did not find any difference in feeding propensity or DE between large-and small-brained individuals. Instead, we found that large-brained females had slower growth during the first 10 weeks after birth. Our study provides experimental support that investment into larger brains at the expense of gut tissue carries costs that are not necessarily compensated by a more efficient digestive system.\n\n • 2014. Alexander Kotrschal (et al.). Evolution 68 (4), 1139-1149\n\n Animal personalities range from individuals that are shy, cautious, and easily stressed (a reactive personality type) to individuals that are bold, innovative, and quick to learn novel tasks, but also prone to routine formation (a proactive personality type). Although personality differences should have important consequences for fitness, their underlying mechanisms remain poorly understood. Here, we investigated how genetic variation in brain size affects personality. We put selection lines of large- and small-brained guppies (Poecilia reticulata), with known differences in cognitive ability, through three standard personality assays. First, we found that large-brained animals were faster to habituate to, and more exploratory in, open field tests. Large-brained females were also bolder. Second, large-brained animals excreted less cortisol in a stressful situation (confinement). Third, large-brained animals were slower to feed from a novel food source, which we interpret as being caused by reduced behavioral flexibility rather than lack of innovation in the large-brained lines. Overall, the results point toward a more proactive personality type in large-brained animals. Thus, this study provides the first experimental evidence linking brain size and personality, an interaction that may affect important fitness-related aspects of ecology such as dispersal and niche exploration.\n\n • 2013. Alexander Kotrschal (et al.). Current Biology 23 (2), 168-171\n\n The large variation in brain size that exists in the animal kingdom has been suggested to have evolved through the balance between selective advantages of greater cognitive ability and the prohibitively high energy demands of a larger brain (the \"expensive-tissue hypothesis\" [1]). Despite over a century of research on the evolution of brain size, empirical support for the trade-off between cognitive ability and energetic costs is based exclusively on correlative evidence [2], and the theory remains controversial [3, 4]. Here we provide experimental evidence for costs and benefits of increased brain size. We used artificial selection for large and small brain size relative to body size in a live-bearing fish, the guppy (Poecilia reticulata), and found that relative brain size evolved rapidly in response to divergent selection in both sexes. Large-brained females outperformed small-brained females in a numerical learning assay designed to test cognitive ability. Moreover, large-brained lines, especially males, developed smaller guts, as predicted by the expensive-tissue hypothesis [1], and produced fewer offspring. We propose that the evolution of brain size is mediated by a functional trade-off between increased cognitive ability and reproductive performance and discuss the implications of these findings for vertebrate brain evolution.\n\n • 2012. Niclas Kolm (et al.). Current Biology 22 (15), 1440-1443\n\n The evolutionary divergence of sexual signals is often important during the formation of new animal species, but our understanding of the origin of signal diversity is limited [1, 2]. Sensory drive, the optimization of communication signal efficiency through matching to the local environment, has been highlighted as a potential promoter of diversification and speciation [3]. The swordtail characin (Corynopoma riisei) is a tropical fish in which males display a flag-like ornament that elicits female foraging behavior during courtship. We show that the shape of the male ornament covaries with female diet across natural populations. More specifically, natural populations in which the female diet is more dominated by ants exhibit male ornaments more similar to the shape of an ant. Feeding experiments confirm that females habituated to a diet of ants prefer to bite at male ornaments from populations with a diet more dominated by ants. Our results show that the male ornament functions as a \"fishing lure\" that is diversifying in shape to match local variation in female search images employed during foraging. This direct link between variation in female feeding ecology and the evolutionary diversification of male sexual ornaments suggests that sensory drive may be a common engine of signal divergence.\n\n • 2012. J. L. Fitzpatrick (et al.). Evolution 66 (11), 3595-3604\n\n Male reproductive success is influenced by competitive interactions during precopulatory and postcopulatory selective episodes. Consequently, males can gain reproductive advantages during precopulatory contest competition by investing in weaponry and during postcopulatory sperm competition by investing in ejaculates. However, recent theory predicts male expenditure on weaponry and ejaculates should be subject to a trade-off, and should vary under increasing risk and intensity of sperm competition. Here, we provide the first comparative analysis of the prediction that expenditure on weaponry should be negatively associated with expenditure on testes mass. Specifically, we assess how sexual selection influences the evolution of primary and secondary sexual traits among pinnipeds (seals, sea lions, and walruses). Using recently developed comparative methods, we demonstrate that sexual selection promotes rapid divergence in body mass, sexual size dimorphism (SSD), and genital morphology. We then show that genital length appears to be positively associated with the strength of postcopulatory sexual selection. However, subsequent analyses reveal that both genital length and testes mass are negatively associated with investment in precopulatory weaponry. Thus, our results are congruent with recent theoretical predictions of contest-based sperm competition models. We discuss the possible role of trade-offs and allometry in influencing patterns of reproductive trait evolution in pinnipeds.\n\n • 2009. John L. Fitzpatrick (et al.). Proceedings of the National Academy of Sciences of the United States of America 106 (4), 1128-1132\n\n Sperm competition, the contest among ejaculates from rival males to fertilize ova of a female, is a common and powerful evolutionary force influencing ejaculate traits. During competitive interactions between ejaculates, longer and faster spermatozoa are expected to have an edge; however, to date, there has been mixed support for this key prediction from sperm competition theory. Here, we use the spectacular radiation of cichlid fishes from Lake Tanganyika to examine sperm characteristics in 29 closely related species. We provide phylogenetically robust evidence that species experiencing greater levels of sperm competition have faster-swimming sperm. We also show that sperm competition selects for increases in the number, size, and longevity of spermatozoa in the ejaculate of a male, and, contrary to expectations from theory, we find no evidence of trade-offs among sperm traits in an interspecific analysis. Also, sperm swimming speed is positively correlated with sperm length among, but not within, species. These different responses to sperm competition at intra-and interspecific levels provide a simple, powerful explanation for equivocal results from previous studies. Using phylogenetic analyses, we also reconstructed the probable evolutionary route of trait evolution in this taxon, and show that, in response to increases in the magnitude of sperm competition, the evolution of sperm traits in this clade began with the evolution of faster (thus, more competitive) sperm.\n\n • 2009. Alejandro Gonzalez-Voyer, Svante Winberg, Niclas Kolm. Proceedings of the Royal Society of London. Biological Sciences 276 (1654), 161-167\n\n As with any organ, differences in brain size-after adequate control of allometry-are assumed to be a response to selection. With over 200 species and an astonishing diversity in niche preferences and social organization, Tanganyikan cichlids present an excellent opportunity to study brain evolution. We used phylogenetic comparative analyses of sexed adults from 39 Tanganyikan cichlid species in a multiple regression framework to investigate the influence of ecology, sexual selection and parental care patterns on whole brain size, as well as to analyse sex-specific effects. First, using species-specific measures, we analysed the influence of diet, habitat, form of care (mouthbrooding or substrate guarding), care type (biparental or female only) and intensity of sexual selection on brain size, while controlling for body size. Then, we repeated the analyses for male and female brain size separately. Type of diet and care type were significantly correlated with whole brain size. Sex-specific analyses showed that female brain size correlated significantly with care type while male brain size was uncorrelated with care type. Our results suggest that more complex social interactions associated with diet select for larger brains and further that the burden of uniparental care exerts high cognitive demands on females.\n\n • 2008. Alejandro Gonzalez-Voyer, John L. Fitzpatrick, Niclas Kolm. Evolution 62 (8), 2015-2026\n\n Despite a massive research effort, our understanding of why, in most vertebrates, males compete for mates and females care for offspring remains incomplete. Two alternative hypotheses have been proposed to explain the direction of causality between parental care and sexual selection. Traditionally, sexual selection has been explained as a consequence of relative parental investment, where the sex investing less will compete for the sex investing more. However, a more recent model suggests that parental care patterns result from sexual selection acting on one sex favoring mating competition and lower parental investment. Using species-level comparative analyses on Tanganyikan cichlid fishes we tested these alternative hypotheses employing a proxy of sexual selection based on mating system, sexual dichromatism, and dimorphism data. First, while controlling for female reproductive investment, we found that species with intense sexual selection were associated with female-only care whereas species with moderate sexual selection were associated with biparental care. Second, using contingency analyses, we found that, contrary to the traditional view, evolutionary changes in parental care type are dependent on the intensity of sexual selection. Hence, our results support the hypothesis that sexual selection determines parental care patterns in Tanganyikan cichlid fishes.\n\n • 2005. B. C. Emerson, Niclas Kolm. Nature 434 (7036), 1015-1017\n\n A fundamental question in evolutionary ecology and conservation biology is: why do some areas contain greater species diversity than others? Island biogeographic theory has identified the roles of immigration and extinction in relation to area size and proximity to source areas(1,2), and the role of speciation is also recognized as an important factor(3-6). However, one as yet unexplored possibility is that species diversity itself might help to promote speciation, and indeed the central tenets of island biogeographic theory support such a prediction. Here we use data for plants and arthropods of the volcanic archipelagos of the Canary and Hawaiian Islands to address whether there is a positive relationship between species diversity and rate of diversification. Our index of diversification for each island is the proportion of species that are endemic, and we test our prediction that this increases with increasing species number. We show that even after controlling for several important physical features of islands, diversification is strongly related to species number.\n\n • 2001. Niclas Kolm. Proceedings of the Royal Society of London. Biological Sciences 268 (1482), 2229-2234\n\n When individuals receive different returns from their reproductive investment dependent on mate quality, they are expected to invest more when breeding with higher quality mates. A number of studies over the past decade have shown that females may alter their reproductive effort depending on the quality/attractiveness of their mate. However, to date, despite extensive work on parental investment, such a differential allocation has not been demonstrated in fish. Indeed, so far only two studies from any taxon have suggested that females alter the quality of individual offspring according to the quality/attractiveness of their mate. The banggai cardinal fish is an obligate paternal mouth brooder where females lay few large eggs. It has previously been shown that male size determines clutch weight irrespective of female size in this species. In this study, I investigated whether females perform more courtship displays towards larger males and whether females allocate their reproductive effort depending on the size of their mate by experimentally assigning females to either large or small males. I found that females displayed more towards larger males, thereby suggesting a female preference for larger males. Further, females produced heavier eggs and heavier clutches but not more eggs when paired with large males. My experiments show that females in this species adjust their offspring weight and, thus, presumably offspring quality according to the size of their mate.\n\nShow all publications by Niclas Kolm at Stockholm University\n\nLast updated: December 6, 2019\n\nBookmark and share Tell a friend", "pred_label": "__label__1", "pred_score_pos": 0.8431710600852966} {"content": "Online English Teacher\n\n\nWhere do you want to teach today?\n\nHow to Teach Public Speaking\n\nHow to Teach Public Speaking\nAdmin - Feb 04 2017\n\nSpeaking in front of an audience can be a terrifying experience, and even more so using a second language for the communication. As a teacher you need to impact on to your students speaking skills as part of their daily learning activities but first let us answer this, what is public speaking?\n\nPublic speaking involves talking in front of a group of people or a gathering, usually the person giving the speech is required to do some preparation. It can be in front of people that you know for example a family gathering or a crowd of strangers. Unlike a presentation, there normally isn’t a lot of opportunity for interaction between the audience and the speaker – the speaker speaks, and the audience listens. There are reasons why public speech is done and regarding the ultimate goal then the speech differs. a person maybe giving a speech to persuade the public maybe to nominate you for an award, inform the people for example of a certain event or product , entertain or to celebrate someone for an achievement. Speech may contain two or three of these functions.\n\n\nWhy is it important to teach public speaking to your students?\n\nAt some point in someone’s life there will be need to stand and speak in front of a group of people. As a teacher, your students need to have the necessary skills for doing this which will help them to do public speaking more successfully. As the students keep practicing, there is often an increase in their general confidence and also a marked sense of achievement. During their first time of doing a speech infront of people, many students get really nervous. To avoid or minimize this, there is need for practice and as the saying goes practice makes perfect. Working on public speaking also helps to develop students’ overall fluency in English and requires them to consider how they speak as well as what they say. This is useful for speaking in any situation, public or otherwise. The following are techniques that you can teach your students to help them be successful in the whole process.\n\n1.     Generating content.\n\nIt is often difficult to get started that is, regarding your topic of interest. It is quite hard to start on something that will smoothly flow. Give your students maybe a topic for them to talk about. If you have samples of speeches done by the president of your country you can read it out for your students. That’s the foundation and if they get it right you can be sure of positive feedback.\n\n2.     Speech structure\n\nYour students need to know that their speech need to have an excellent introduction, a well-structured body and a good conclusion. As a teacher you can choose to give them a standard introduction, but it is good to encourage them to get their own unique ways of starting a speech. This then gives them a focus for the structure of the rest of the speech.\n\n3.     The body language\n\nAnother key thing to look out for when giving a speech is how you present it. Well there is no point of having a good written or memorized speech then you fail to deliver it well to your audience. Our bodies communicate a lot and according to statistics it amounts to 70% thus very important. They include\n\n·       Eye contact\n\nFor your students to be familiar with this, make them practice in front of the class every now and then. Let the other students comment on the speech and may be now and then they can correct their mistakes and learn them. Let them know the importance of making eye contact with ideally everyone and everything in the room this is because many students tend to look at one spot or at the teacher.\n\n·       posture\n\nWhile giving a speech you need to be standing still. At first it might be hard due to nervousness but make your students practice. Moving from side to side or shaking during public speaking will make your audience concentrate more on you than what you are telling them. This will make the purpose of it loose meaning thus a good posture is very important.\n\n·       Gestures\n\nThe use of gestures is a key is also one of the key things your students should note. Gestures helps spice up the speech. Use this to try make people or the audience visualize what you are really talking about.\n\n4.     Pausing and stressing\n\nIt is important to note where to pause and where to stress in your speech. This shows that you are perfectly versant with your topic, it also makes you sound confident.\n\nTo improve on what you have taught them in class regarding public speaking you can include the following to help them more.\n\n·       Workshop with a professional speaker.\n\n • Workshop with an aspiring speaker.\n • Invite the above also to be judges of your student’s speech presentations. This can be done after a thorough teaching of public speaking. After that you can challenge your students to write a brief speech which they are supposed to present to the judges. It is important to remind your students that this is not supposed to break them but to build them.\n\n\nImportance of public speaking\n\nIt is good to note that even if the students do not land an opportunity to present a speech while in school, it is not the end because having good speaking skills can be a stepping stone to one's career. Good public speaking skills applies entirely in one’s life for example you can be requested to give a speech at a party, a wedding and other places.\n\n\nAs the above shows public speaking is a crucial topic especially to students learning English as their second language. If as a teacher you are not that well equipped with the knowledge of how to teach public speaking widely, there are always books for this thus, do not panic. You can make the greatest orators of the century.\n\nLeave a reply\n\nIf you can't see Captcha:\n\nRead Me Please", "pred_label": "__label__1", "pred_score_pos": 0.9578742384910583} {"content": "Continuing from our previous article, we debunk 4 more myths about men’s hair.\n\nPulling grey hair out makes more grow\nIt can be tempting to pull out grey hairs but you’ve probably heard people say that this makes more grow in their place. This is definitely an old wives tale but it still isn’t advisable to pluck your hair out. As with greying, many men start experiencing hair loss as they get older. Pulling out all those greys will leave you looking thinner on top than ever.\n\nYou need lots of bubbles to cleanse your hair properly\nThere is something about lots of bubbles that people associate with cleanliness. However, a good shampoo doesn’t need to form a thick lather to get your hair clean. What is important is to use products that are suited to your hair type and needs. If your hair is fine and dry, a shampoo that nourishes while enhancing volume would be beneficial. Oiler, thicker hair types will find that a clarifying shampoo with hydrating ingredients would work better for them. Whatever your hair type, if you are experiencing hair loss, shampoo won’t cure it and it is a good idea to seek specialist advice about the treatments available.\n\nRegular trims make hair grow faster\n\nThe experts at Vinci Hair Clinic say that it’s a common misconception that hair grows faster the more often it is cut. Our hair growth rates are controlled by our genes and can be affected by diet, stress and other factors. What you can do to ensure that your hair grows at a healthy rate is to supply your body with adequate nutrients by taking the Vitruvian Line vitamin and mineral complex from Vinci Hair Clinic.\n\nGenes inherited from your mother cause male pattern baldness\n\nMale pattern baldness (androgenetic alopecia) causes the receding hairline and thinning crown that around 50% of men develop by their 50s. People often believe that the condition is inherited from the maternal side of the family but genes for this type of hair loss come from both parents. The good news is that there are several excellent treatments that can halt the progression of male pattern baldness and even regrow lost hair.\n\nDebunking Myths About Men’s Hair Part 2", "pred_label": "__label__1", "pred_score_pos": 0.5618547201156616} {"content": "CHI PHAT, CAMBODIA — Drop everything, see the world, and try to make a difference in every far-flung corner of the globe possible. It may sound like an impossible dream, but one couple with local roots is doing just that.\n\nBorn to explore, Tiffany Soukup, formerly of Arkport, and Chris Brader met as members of the Buffalo State Adventure Club, and have traveled the world for the better part of 10 years since, jet setting to more than 30 countries in that time. For part of the year they help run state parks in Vermont, but during their downtime they like to explore the cultures of the world.\n\nThey run the blog website, where they document their travels and give tips on how to drop everything and live a nomadic lifestyle.\n\nThe source:", "pred_label": "__label__1", "pred_score_pos": 0.5874177813529968} {"content": "Harlekino Wall Hanging\n\nHarlekino is a range of stickable acoustic wallpaper, enabling everybody to create all sorts of patterns in all sorts of colours. The traditional harlequin pattern is colourful and designed to make a statement. The diamonds of the Harlekino give an opportunity to create a beautiful wall covering of any size that adds soft volume to any space. The 2mm 100% merino wool felt is eco-friendly and sourced from Germany‘s leading supplier, reinforcing Studio Lawrence‘s belief in using only the highest quality European materials and manufacturing. Harlekino is a playful and dynamic piece, designed to improve both aesthetics and acoustics.", "pred_label": "__label__1", "pred_score_pos": 0.8295214772224426} {"content": "The Land of the Long White Cloud\n\n\nThe Land of the Long White Cloud — Notes on My Visit to New Zealand By Wang Hong\nPictured Above: Editor-in-Chief, Wang Hong with Maori host, Robyn Tauroa\n\nIn China, when people talk about New Zealand, the first things that come to mind are clear blue skies, fresh air and high-quality dairy products. For us, working in the Chinese People’s Association for Friendship with Foreign Countries, New Zealand has a special appeal, for it is the homeland of the late Rewi Alley (1897-1987)*, an old friend of the Chinese people who did so much for the construction and development of China and made important contributions to developing the friendship between the two countries. He lived in the CPAFFC compound from 1958 until his death.\nInvited by the Maori-China Friendship Association, a CPAFFC delegation paid a 10-day friendly visit to New Zealand last November. I was fortunate to be a member. With profound memory of our old friend Rewi, I had much expectation of the visit to his homeland.\n\nLearning About the History and Culture of the Maori People\nIt was the first visit to New Zealand for most members of the delegation. Everything we saw and heard was new. We had our first taste of the Maori culture when we visited the Maori schools—Te Kura Kaupapa Motuhake o Tawhiuau and Te Kura of Hirangi. The teachers and students received us with formal welcome ceremonies which began with chanting, followed by welcome speeches in the Maori language and ended with hongi (the traditional Maori greeting done by pressing noses and foreheads together). The students also put on shows of Maori dances and songs.\n\nAt Te Kura Kaupapa Motuhake o Tawhiuau, school principal Pem Bird gave a brief account of the Maori history. There are 55 Maori tribes in New Zealand claiming Polynesian origin. Having braved strong winds and high waves and overcome numerous difficulties and dangers, their ancestors arrived in New Zealand in canoes from Hawaiki about 1,000 years ago. The tribes divided the land into separate territories over which they exercised sovereignty, although they also forged inter-tribal alliances as time past.\n\nThe Maoris were mainly engaged in agriculture, although some lived on fishing, hunting and gathering. They had a very well developed handicraft industry.\n\nIn the early 19th century, more and more British settlers traveled to New Zealand. They seized land from the Maoris, triggering wars. In 1840, after the Treaty of Waitangi was signed, the country became a British colony.\nThe impact of colonization was devastating. The Maori population decreased dramatically, almost to the point of extinction. Not until the country became independent in 1907 were the rights of the Maori people respected, and its population began to grow again. Influenced by the British New Zealanders, changes have taken place in the Maori society. The Maori people today speak English and many of them work in cities. They have a growing sense of identity and their culture has been revived. This is why the primitive sacrificial ritual dances have become traditional art forms, showing the unique cultural charm of New Zealand.\n\nAbove: Principal, Pem Bird giving us an introduction to Maori history and his school, Te Kura Kaupapa Motuhake o Tawhiuau\n\nAt the Waitetoko Marae in Turangi, we were greeted with a formal ceremony featuring a challenge, speeches, songs and hongi. Being treated as distinguished guests, we were put up in the marae, the tribe’s sacred meetinghouse where their ancestors’ spirits are enshrined and where all ceremonies are held and decisions concerning the tribe are made.\nWhen I entered the marae, I saw the inside walls were decorated with painted planks hung with pictures of tribal leaders and woven panels. Along one side, mattresses were placed on the floor. Our considerate hosts had prepared everything—mattresses, pillows, quilts and blankets and even electric heaters—for us.\nAs outsiders, it was a great honor to live in the marae, but we all felt somewhat embarrassed as male and female members would spend the night under the same roof. After two days’ stay, I had a different feeling and began to understand the intimate relationship among the Maori people. In their primitive tribal life, they had depended on each other and worked together to survive. This creates firm trust and is also the source of their sincere friendship for their Chinese friends. Having experienced it, I valued it all the more.\n\nThe delegation with Ngati Tuwharetoa elders and other Maori friends at Waitetoko Marae, Taupo\n\nThe Maori people pay great attention to education, which is an important guarantee for their cultural tradition to continue. At the Maori schools we visited we learnt that all classes are taught in the Maori language. The schools can make their own curricula and adopt the teaching methods of their choice. Children study the Maori language, history, cultural tradition and science, learn to respect older people and nature as well as production skills such as raising pigs, growing vegetables, etc.\nThough the Maori people occupy only 14 % of the total population of New Zealand, they have well protected their unique culture through basic education so that traditional arts including moko (tattoo), haka (dance) and powhiri (formal welcome) will pass on generation after generation.\n\nPictured Above: Pupils at Te Kura o Hirangi performing Maori dance for our delegation\n\nPictured Above: The delegation at Opotaka, the birthplace of Ka mate, Ka mate. The young men in the photo performed the haka for us!\n\n“Ka mate! Ka mate! Ka ora! Ka ora!” the sonorous cries resounded at Opotaka, the sacred birthplace of the Haka (well known to rugby fans around the world as it is performed by the national team, the All Blacks, before every match). Four Maori students from Te Kura O Hirangi were performing Haka on the grassland by the lake against the background of snow-capped mountains in the distance.\nThey did not wear tattoos or the usual outfits for the dance, but their high-spirited and earnest acting still enabled us to see the valiant tribal warriors of those days ready to go to battles. This time they performed Haka not to arouse fighting morale, but to familiarize us with their culture.\n\nFriends of Nature\nThe Maori people’s attitude towards nature is admirable. They own fertile land, mountains and rivers, but they have never overused them. They treasure everything around them. “Our ancestors sailed to New Zealand in canoes after going through numerous difficulties. They opened up the land to seek food for Maori people and to receive friends. We do not own the land. We are only caretakers. It is our duty to protect this land for our children and grandchildren.” These words of an elder of the tribe reflected the Maori people’s respect for nature and their profound love for the land that has nurtured their ancestors and will nurture their posterity.\nIt is because of their understanding of the relationship between man and environment that they have always used everything the land offers sparingly; it is because of their persistence and perseverance that New Zealand today still has blue skies, green mountains, clear waters and fresh air.\n\nThe Maori Hospitality\n\nWe toured Auckland, Rotorua, Murupara, Taupo, Wellington and Christchurch and visited Maori tribes, Maori schools, cultural centers, farms, museums, a brewery and a winery during our 10-day stay. We lived in close friendship with our Maori friends throughout the trip. Our home stay experience in Auckland enabled us to make friends and learn about the Maori family life. At Maori schools, we were impressed by Maori children’s enthusiastic performances of traditional Maori songs and dances.\n\nAt Waitetoko Marae, we were feasted with all the delicacies the land could produce such as eel, trout, beef, lamb, oyster, water cress, etc. and became intoxicated in the songs and dances we performed for each other to express our feelings. In Christchurch we gathered together with friends from the New Zealand-China Friendship Society and enjoyed the potluck dinner they prepared.\n\nMaori friends see the delegation leave at Christchurch Airport\n\nThe humorous Danny Tauroa became our “driver” who took us safely all the way from one end of North Island (Auckland) to the other (Wellington), in addition to his many roles including “tour manager”, escort, etc. The joyous and warm-hearted Robyn Tauroa who accompanied us throughout our visit in North Island taught us Maori songs and our drive on the road was filled with songs and laughter.\n\nContinuing the friendship\n\nI remember at the Rewi Alley Park, we bowed before his bust to express our respect for him. He would be happy to know that the seeds of friendship between China and New Zealand he had sowed have now grown into tall trees and blossomed. We pledged we would continue to cultivate the friendship between China and New Zealand so that it would bear rich fruit.\n\nThe delegation paying respects to Rewi Alley at Rewi Alley Park in Auckland, NZ\n\n*Rewi Alley, a New Zealander, came to China in 1927. Sharing wealth and woe with the Chinese people, he devoted 60 years of his life to Chinese people’s cause of liberation and construction. In the 1930s, he joined an international Marxist-Leninist group in Shanghai and wrote many articles publicizing the Chinese people’s resistance against Japanese aggressors. During the War of Resistance against Japanese Aggression, he took an active part in and was one of the sponsors of the Chinese Industrial Cooperative Movement that became a unique economic force that emerged by organizing the unemployed workers and refugees into production and survival and in support of the Resistance War. After the founding of New China, he dedicated his efforts to safeguard world peace and the cause of friendship among the peoples of the world, making important contributions to developing friendship between the Chinese people and the people of New Zealand and other countries.", "pred_label": "__label__1", "pred_score_pos": 0.966442883014679} {"content": "Click here to win prizes by solving the puzzle Advent calendar.\nClick here to win prizes by solving the puzzle Advent calendar.\n\n\nAdvent calendar 2017\n\n8 December\n\nThe odd numbers are written in a pyramid.\nWhat is the mean of the numbers in the 23rd row?\nTags: numbers\n\n\nShow me a random puzzle\n Most recent collections \n\nSunday Afternoon Maths LXVII\n\nColoured weights\nNot Roman numerals\n\nAdvent calendar 2018\n\nSunday Afternoon Maths LXVI\n\nCryptic crossnumber #2\n\nSunday Afternoon Maths LXV\n\nCryptic crossnumber #1\nBreaking Chocolate\nSquare and cube endings\n\nList of all puzzles\n\n\nmean polygons coins christmas rectangles volume angles ellipses ave chalkdust crossnumber books averages circles colouring percentages time square numbers probabilty dates sequences digits rugby odd numbers cards chess dodecagons addition sport sum to infinity scales partitions irreducible numbers taxicab geometry triangles 3d shapes games fractions shape bases spheres integration lines perimeter wordplay parabolas floors sums chocolate arrows coordinates dice factorials multiplication means numbers menace people maths complex numbers square roots crosswords multiples remainders proportion division surds cryptic crossnumbers 2d shapes folding tube maps perfect numbers squares logic palindromes unit fractions star numbers hexagons prime numbers speed graphs area advent money doubling pascal's triangle trigonometry factors balancing cube numbers quadratics shapes differentiation calculus functions integers clocks algebra geometry cryptic clues indices symmetry crossnumbers routes number regular shapes planes triangle numbers grids probability\n\n\nShow me a random puzzle\n▼ show ▼\n© Matthew Scroggs 2012–2019", "pred_label": "__label__1", "pred_score_pos": 0.9925355315208435} {"content": "Lingua Fungi ‘Melankhton’ CD\n\nArtist: Lingua Fungi\nTitle: Melankhton\nRelease date: September, 2014\nCatalog# AH14\nFormat: CD\n\nAural Hypnox welcomes Lingua Fungi to the label roster. Lingua Fungi has been working in the field of acoustic drone and ambient since 2001 and is run by J. Padatsu, who has during the years appeared in the Zoat-Äon live lineup and is currently member of Halo Manash. The fourth full-lenght album of Lingua Fungi, entitled ‘Melankhton’ is released through our Sublunar series.\n\n‘Melankhton’ is a sonic interpretation of particular illness narratives and a study in experimental anthropology based on fieldwork material gathered especially for this project. The narratives and sounds expressing them reflect the shifting states of the turbulent minds visited by Melankhton.\n\nThe album was recorded in 2006 using exclusively acoustic instruments and sound sources mixed with processed field recordings. The album consists of five long tracks with sounds varying from maniacal percussive rhythms to dreamy drone passages.\n\nThe album is enclosed in a customised and silk-screen printed Sublunar series cardboard covers, including a 4-panel cardboard booklet and a silk-screen printed insert card. The regular edition is limited to 449 copies.", "pred_label": "__label__1", "pred_score_pos": 0.7731207609176636} {"content": "Break in New Basketball Shoes\n\nPeople wondering about breaking in brand new basketball shoes should know that there is no secret to this process. The individual has to simply put on the shoes and use them for some light activities, in order to get accustomed to the fit and the shape of the shoes, and avoid pain and blisters…\n\n\nIf you have recently bought a new pair of basketball shoes, then it is advisable to break into the shoes by using them a few times, before you use them for a proper match. They are typically made of very sturdy leather, so they take some time to alter themselves to the shape of the wearers foot, and this can result in some foot pain while playing, along with some blisters as well.\n\nThe tendency of new basketball shoes to cause pain and restrict movement is not surprising, since the person wearing them needs to move around and jump up and down many times during the course of the game. If the shoes are not comfortable while performing these activities, it will inevitably result in some discomfort and pain for the wearer. Simply running around in new shoes that are not broken in will also cause some problems, so every purchase must be followed by a suitable breaking-in period.\n\nBest Way to Break in New Basketball Shoes\n\nYou cannot possibly do this without wearing them, so the aim should be to put them on and use them as much as possible. If you wear them and start playing a high intensity game right away, the chances of pain occurring in your foot are very high, so you should concentrate on jogging lightly for a few days. A suitable alternative is to put on the shoes around the house and carry on your daily activities for a few days. This will help you get your feet accustomed to the shoes, and it will also give the shoes enough time to alter their shape according to your foot. The longer you delay a proper game in the shoes, the better it will be for your foot. Over time, you can also start performing some basketball drills and exercises (like ankle stretches) that are similar to the movements that you will be making in a proper match.\n\nAnother alternative is to hold the shoe in both hands, with one hand under the toe of the shoe and the other hand supporting the heel. You should curl your finger around the toes and move the front part of the shoe up and down many time in order to loosen the rigidity of the shoes. This task will need to be performed for the other shoe as well, and it will ease the process in the future.", "pred_label": "__label__1", "pred_score_pos": 0.628591775894165} {"content": "kdo asked in 科學及數學其他 - 科學 · 1 decade ago\n\n有冇sensor可以測試到光既速度 , 準確至10^-9?\n\n\n\n1 Answer\n\n • 1 decade ago\n Favorite Answer\n\n The speed of light in a vacuum is an important physical constant denoted by the letter c0 for constant or for the Latin celeritas ("swiftness").[1][2] It is the speed of all electromagnetic radiation, including visible light, in a vacuum. More generally, it is the speed of anything having zero rest mass.\n\n In metric units, the speed of light in vacuum is exactly 299,792,458 metres per second (1,079,252,848.8 km/h).[3] The fundamental SI unit of length, the metre, has been defined since October 21, 1983, as the distance light travels in a vacuum in 1/299,792,458 of a second; any increase in the measurement precision of the speed of light would refine the definition of the metre, but not alter the numerical value of c0. The approximate value of 3 × 108 m/s is commonly used in rough estimates. In imperial units, the speed of light is about 670,616,629.2 miles per hour or 983,571,056 feet per second, which is about 186,282.397 miles per second, or roughly one foot per nanosecond. See also the later section of this article at "Speed of light set by definition".\n\n The speed of light when it passes through a transparent or translucent material medium, like glass or air, is less than its speed in a vacuum. The ratio of c0 to the observed phase velocity is called the refractive index of the medium. General relativity explains how a gravitational potential can affect the apparent speed of distant light in a vacuum, but locally light in a vacuum always passes an observer at a rate of c0.\n\nStill have questions? Get your answers by asking now.", "pred_label": "__label__1", "pred_score_pos": 0.9882959127426147} {"content": "Older patient talking with nurse in hospital\nIt has been 12 years since the Center to Champion Nursing in America began its mission to see that people—all people—have access to a nurse when and where they need it\nEn esta Semana Nacional del Enfermero, deseo agradecer a todo el maravilloso personal de enfermería que he tenido la suerte de conocer. Cada día, los enfermeros del país ponen en práctica sus increíbles habilidades y su compasión para brindar alivio durante momentos difíciles y cuidar de los más vulnerables. Cuando cuidaba a mis padres, los enfermeros fueron parte fundamental de nuestro equipo de cuidado. En especial, la enfermera Sue, quien visitaba a mis padres en su hogar. Aunque todo el personal de enfermería realiza un trabajo increíble, me gustaría hoy centrarme en los enfermeros especializados y otros enfermeros registrados con capacitación avanzada (APRN). Ya sea en ciudades grandes, pueblos pequeños o áreas rurales, los enfermeros especializados realizan labores increíbles por las personas a las que cuidan. Han completado estudios de posgrado en áreas como la atención primaria y el cuidado de adultos mayores. Esto los capacita para atender a los adultos mayores del país en sus propios hogares y comunidades, lejos de las instituciones costosas financiadas por los contribuyentes. También se encargan de lo siguiente:\nThankYouNursesV3 SQ\nThis National Nurses Week, I’d like to stop and take a moment to say thank you to all of the amazing nurses that I’m fortunate to know. Each and every day, nurses across the country use their incredible skills and compassion to provide comfort during difficult times and care when we’re at our most vulnerable. When I was caring for my parents, nurses became a critical part of our care team. Especially Nurse Sue who visited my parents in their home. While all nurses do incredible work, I’d like to focus today on nurse practitioners and other advanced practice registered nurses (APRNs). In big cities, small towns and rural areas, alike, nurse practitioners do remarkable things for the people they serve. They’ve completed advanced education at the master’s or doctoral level, focused in areas like primary and elder care. With this training they care for older Americans in their homes and communities, keeping them out of costly, taxpayer-funded institutions. They handle:\nDuring National Nurses Week, I am making a special effort to say “thank you” to all the nurses in my life, and I invite you to do the same. Each and every day, in communities across the country, nurses help their patients to get and stay well. They use their incredible skills to comfort us in difficult times and care for us when we’re at our most vulnerable.\nThis month, as state legislative sessions start kicking off across the country, AARP, too, will go to work — fighting for you and your family. In all 50 states, Washington D.C., Puerto Rico and the U.S. Virgin Islands, we’ll be fighting to make sure your voice is heard, focusing on the key issues you’re facing front and center, in your daily life.\nAs National Nurses Week concludes, I want to take a moment and thank all nurses — past, present, and future — for all that you do. I know firsthand the importance of nurses not only to patients, but to their families. During the 15 years I cared for my parents, nurses made a huge difference in our lives. There’s no doubt, caregiving takes a team, and so often nurses were a part of my family’s team.\nAt kitchen tables across America, real families are confronting the same question: How will we care for Mom and Dad (or another loved one) if something happens and they can’t take care of themselves?\nI Heart Caregivers\nAs we enter National Family Caregivers Month, I think back to the time I spent as a caregiver to my mom.  For 12 years I was by her side, through diabetes, congestive heart failure, hospitalizations and more — all while juggling my job and raising my kids. It wasn’t always easy, but I wouldn’t have had it any other way.\nAs I drove from Billings, Mont., to Sheridan, Wyo., I saw a sign for \"Buffalo 36 miles.\" Then it occurred to me that something felt strangely familiar. I grew up in a town called Lockport, about 29 miles from Buffalo, N.Y. So I researched a bit more. Sheridan has a population of 17,800; 20,000 live in Lockport. Sheridan gets about 72 inches of snow a year; Lockport posts a competitive 69 inches. And though my hometown doesn't have mountain ranges, it does share the same challenge — how to support family caregivers.\nSusan Reinhard speaks at an AARP forum in Washington, DC\nThe national conversation about the value of nurses needs to move beyond health care experts and policymakers to include consumers and businesses\nSearch AARP Blogs", "pred_label": "__label__1", "pred_score_pos": 0.7320712208747864} {"content": "Will Evolving Minds Delay The AI Apocalypse? – Part II\n\n\n\n\n\n\n\n\n\n\n\n\nSo what then is our mind?\n\n\n\nAnswer – NOTHING!\n\n\n\n\n\n\nSpiral Dynamics\n\n\n\n\nWill Evolving Minds Delay The AI Apocalypse? – Part I\n\nStephen Hawking once warned that “the development of full artificial intelligence could spell the end of the human race.” He went on to explain that AI will “take off on its own and redesign itself at an ever-increasing rate,” while “humans, who are limited by slow biological evolution, couldn’t compete and would be superseded.” He is certainly not alone in his thinking, as Elon Musk, for example, cautions that “With artificial intelligence we are summoning the demon.”\n\nIn fact, this is a common theme not only in Hollywood, but also between two prominent groups of philosophers and futurists.   One point of view is that Artificial General Intelligence (AGI) will become superintelligent and beyond the control of humans, resulting in all sorts of extinction scenarios (think SkyNet or Grey Goo). The (slightly) more optimistic point of view, held by the transhumanists, is that humanity will merge with advanced AI and form superhumans. So, while biological dumb humanity may go the way of the dodo bird, the new form of human-machine hybrid will continue to advance and rule the universe. By the way, this is supposed to happen around 2045, according to Ray Kurzweil in his 2005 book “The Singularity is Near.”\n\nThere are actually plenty of logical and philosophical arguments against these ideas, but this blog is going to focus on something different – the nature of the human mind.\n\nThe standard theory is that humans cannot evolve their minds particularly quickly due to the assumption that we are limited by the wiring in our brains. AI, on the other hand, has no such limitations and, via recursive self-improvement, will evolve at a runaway exponential rate, making it inevitable to take over humans at some point in terms of intelligence.\n\nBut does this even make sense? Let’s examine both assumptions.\n\nThe first assumption is that AI advancements will continue at an exponential pace. This is short-sighted IMHO. Most exponential processes run into negative feedback effects that eventually dampen the acceleration. For example, exponential population growth occurs in bacterial colonies until the environment reaches its carrying capacity and then it levels off. We simply don’t know what the “carrying capacity” is of an AI. In an analogous manner, it has to run in some environment, which may run out of memory, power, or other resources at some point. Moore’s Law, the idea that transistor density doubles every two years, has been applied to many other technology advances, such as CPU speed and networking bit rates, and is the cornerstone of the logic behind the Singularity. However, difficulties in heat dissipation have now slowed down the rate of advances in CPU speed, and Moore’s Law no longer applies. Transistor density is also hitting its limit as transistor junctions are now only a few atoms thick. Paul Allen argues, in his article “The Singularity Isn’t Near,” that the kinds of learning required to move AI ahead do not occur at exponential rates, but rather in an irregular and unpredictable manner. As things get more complex, progress tends to slow, an effect he calls the Complexity Brake.\n\nLet’s look at one example. Deep Blue beat Garry Kasparov in a game in 1996, the first time a machine beat a world Chess champion. Google’s AlphaGo beat a grandmaster at Go for the first time in 2016. In those 20 years, there are 10 2-year doubling cycles in Moore’s Law, which would imply that, if AI were advancing exponentially, the “intelligence” needed to beat a Go master is 1000 times more than the intelligence needed to beat a Chess master. Obviously this is ridiculous. While Go is theoretically a more complex game than Chess because it has many more possible moves, an argument could be made that the intellect and mastery required to become the world champion at each game is roughly the same. So, while the advances in processing speed and algorithmic development (Deep Blue used a brute force algorithm, while AlphaGo did more pattern recognition) were substantial between 1996 and 2016, they don’t really show much advance in “intelligence.”\n\nIt would also be insightful to examine some real estimates of AI trends. For some well-researched data, consider Stanford University’s AI Index. Created and launched as a project at Stanford University, the AI Index is an “open, not-for-profit project to track activity and progress in AI.” In their 2017 report,  they identify metrics for the progress made in several areas of Artificial Intelligence, such as object detection, natural language parsing, language translation, speech recognition, theorem proving, and SAT solving. For each of the categories for which there is at least 8 years of data, I normalized the AI performance and calculated the improvements over time and averaged the results (note: I was even careful to invert the data – for example, for a pattern recognition algorithm to improve from 90% accuracy to 95%, this is not a 5% improvement; it is actually a 100% improvement in the ability to reject false positives). The chart below shows that AI is not advancing nearly as quickly as Moore’s Law.\n\nAdvancing Artificial Intelligence\n\nFigure 1 – Advancing Artificial Intelligence\n\nIn fact, the doubling period is about 6 years instead of 2, which would suggest that we need 3 times as long before hitting the Singularity as compared to Kurzweil’s prediction. Since the 2045 projection for the Singularity occurred in 2005, this would say that we wouldn’t really see it until 2125. That’s assuming that we keep pace with the current rate of growth of AI, and don’t even hit Paul Allen’s Complexity Brake. So, chances are it is much further off than that. (As an aside, according to some futurists, Ray does not have a particularly great success rate for his predictions, even ones that are only 10 years out.\n\nBut a lot can happen in 120 years. Unexpected, discontinuous jumps in technology can accelerate the process. Social, economic, and political factors can severely slow it down. Recall how in just 10 years in the 1960s, we figured out how to land a man on the moon. Given the rate at which we were advancing our space technology and applying Moore’s Law (which was in effect at that time), it would not have been unreasonable to expect a manned mission to Mars by 1980. In fact Werner von Braun, the leader of the American rocket team, predicted after the moon landing that we would be on Mars in the early 1980s. But in the wake of the Vietnam debacle, public support for additional investment in NASA waned and the entire space program took a drastic turn. Such factors are probably even more impactful to the future of AI than the limitations of Moore’s Law.\n\nThe second assumption we need to examine is that the capacity of the human mind is limited by the complexity of the human brain, and is therefore relatively fixed. We will do that in Part II of this article.\n\nThe Singularity Cometh? Or not?\n\nThere is much talk these days about the coming Singularity.  We are about 37 years away, according to Ray Kurzweil.  For some, the prospect is exhilarating – enhanced mental capacity, ability to experience fantasy simulations, immortality.  For others, the specter of the Singularity is frightening – AI’s run amok, all Terminator-like.  Then there are those who question the entire idea.  A lively debate on our forum triggered this post as we contrasted the position of transhumanists (aka cybernetic totalists) and singularity-skeptics.\n\nFor example, Jaron Lanier’s “One Half of a Manifesto” published in Wired and edge.org, suggests that our inability to develop advances in software will, at least for now, prevent the Singularity from happening according to the Moore’s Law pace.  One great quote from his demi-manifesto: “Just as some newborn race of superintelligent robots are about to consume all humanity, our dear old species will likely be saved by a Windows crash. The poor robots will linger pathetically, begging us to reboot them, even though they’ll know it would do no good.”  Kurzweil countered with a couple specific examples of successful software advances, such as speech recognition (which is probably due more to algorithm development than software techniques).\n\nI must admit, I am also disheartened by the slow pace of software advances.  Kurzweil is not the only guy on the planet to have spent his career living and breathing software and complex computational systems.  I’ve written my share of gnarly assembly code, neural nets, and trading systems.  But, it seems to be that it takes almost as long to open a Word document, boot up, or render a 3D object on today’s blazingly fast PCs as it did 20 years ago on a machine running at less than 1% of today’s clock rate.  Kurzweil claims that we have simply forgotten: “Jaron has forgotten just how unresponsive, unwieldy, and limited they were.”\n\nSo, I wondered, who is right?  Are there objective tests out there?  I found an interesting article in PC World that compared the boot-up time from a 1981 PC to that of a 2001 PC.  Interestingly, the 2001 was over 3 times slower (51 seconds for boot up) than its 20-year predecessor (16 seconds).  My 2007 Thinkpad – over 50 seconds.  Yes, I know that Vista is much more sophisticated than MS-DOS and therefore consumes much more disk and memory and takes that much more time to load.  But really, are those 3D spinning doodads really helping me work better?\n\nThen I found a benchmark comparison on the performance on 6 different Word versions over the years.  Summing 5 typical operations, the fastest version was Word 95 at 3 seconds.  Word 2007 clocked in at 12 seconds (in this test, they all ran on the same machine).\n\nIn summary, software has become bloated.  Developers don’t think about performance as much as they used to because memory and CPU speed is cheap.  Instead, the trend in software development is layers of abstraction and frameworks on top of frameworks.  Developers have become increasingly specialized (“I don’t do “Tiles”, I only do “Struts”) and very few get the big picture.\n\nWhat does this have to do with the Singularity?  Simply this – With some notable exceptions, software development has not even come close to following Moore’s Law in terms of performance or reliability.  Yet, the Singularity predictions depend on it.  So don’t sell your humanity stock anytime soon.\n\n\nMac Guy, PC Guy", "pred_label": "__label__1", "pred_score_pos": 0.948380708694458} {"content": "McMansionization of America\n\nOver the last few decades there has been one home that has stood out as a model home, of sorts – the McMansion.  First appearing in the 1980s, the term “McMansion” has evolved over the years to generally refer to a new home which feels too large for its property and out of scale with the homes around it.  The popularity and accessibility of these over-sized homes was fueled by easy access to low-cost loans, such as sub-prime mortgages, which allowed people to buy more house than they could actually afford.  This debt-driven real estate splurge lead directly to the Great Recession (2007-2009), the worst global recession since the Great Depression of the 1930s.\n\nIronically, the growth of these larger homes occurred at the same time that the average American family reduced in size.  Based on US Census Data, the average American household size shrunk by 15% leading up to the recession, from 3.01 people (1973) to 2.56 people (2007).  During this same period the median size of new homes increased by nearly 50%, from 1,525 S.F. (1973) to 2,277 S.F. (2007).  Combined, this data shows that the median new home, comparing square foot per person, increased by a staggering 76%.  While the recession lead to a brief stabilization of new home size, as the economy began to recover home sizes returned to their previous upward trend reaching 2,467 S.F. by 2015.   This trend was further exaggerated in the Washington, DC area where, according to Metrostudy, in the first three quarters of 2017 the median new home size was 3,536 S.F. – the nation’s largest.  This larger median size was driven by homeowners and developers maximizing the buildable area of a particular property with help from local zoning regulations that often allow for home sizes nearing 8,000 S.F., even on smaller lot sizes (6,000 S.F.).\n\nThere is a price to be paid for these larger homes that goes beyond the extreme cost of their construction and their subsequent mortgage.  Their footprint covers more natural landscape, creates more stormwater runoff and water pollution, uses more energy to power and control interior temperatures, requires more labor to maintain and upkeep, and increases the amount of property taxes owed.  This is without accounting for any potential extrapolating effects on climate change or the devastating impact they caused with the global recession.\n\nKnowing all of this, why do we so eagerly continue to bear their costs?  What if we changed the way we approached new home development?  What if we designed and built homes that were sized to fit our actual needs and eliminated rooms whose sole function it is to collect dust?  What if we stopped building McMansions and decided today’s median home size should be its maximum size?", "pred_label": "__label__1", "pred_score_pos": 0.8110798001289368} {"content": "5 describe the four 4 steps of capital budgeting analysis\n\nCapital budgeting is process of selecting best long term investment project.\n\n5 describe the four 4 steps of capital budgeting analysis\n\nWrapping It All Up Capital budgeting is a step by step process that businesses use to determine the merits of an investment project. The decision of whether to accept or deny an investment project as part of a company's growth initiatives, involves determining the investment rate of return that such a project will generate.\n\nHowever, what rate of return is deemed acceptable or unacceptable is influenced by other factors that are specific to the company as well as the project.\n\nFor example, a social or charitable project is often not approved based on rate of return, but more on the desire of a business to foster goodwill and contribute back to its community.\n\nFour Steps of Capital Budgeting Analysis\n\nCapital budgeting is important because it creates accountability and measurability. Any business that seeks to invest its resources in a project, without understanding the risks and returns involved, would be held as irresponsible by its owners or shareholders.\n\nFurthermore, if a business has no way of measuring the effectiveness of its investment decisions, chances are that the business will have little chance of surviving in the competitive marketplace. Businesses aside from non-profits exist to earn profits.\n\nThe capital budgeting process is a measurable way for businesses to determine the long-term economic and financial profitability of any investment project.\n\nCapital budgeting is also vital to a business because it creates a structured step by step process that enables a company to: Develop and formulate long-term strategic goals — the ability to set long-term goals is essential to the growth and prosperity of any business. Seek out new investment projects — knowing how to evaluate investment projects gives a business the model to seek and evaluate new projects, an important function for all businesses as they seek to compete and profit in their industry.\n\nEstimate and forecast future cash flows — future cash flows are what create value for businesses overtime. Capital budgeting enables executives to take a potential project and estimate its future cash flows, which then helps determine if such a project should be accepted.\n\nFacilitate the transfer of information — from the time that a project starts off as an idea to the time it is accepted or rejected, numerous decisions have to be made at various levels of authority. The capital budgeting process facilitates the transfer of information to the appropriate decision makers within a company.\n\nSince a good project can turn bad if expenditures aren't carefully controlled or monitored, this step is a crucial benefit of the capital budgeting process. Creation of Decision — when a capital budgeting process is in place, a company is then able to create a set of decision rules that can categorize which projects are acceptable and which projects are unacceptable.\n\nThe result is a more efficiently run business that is better equipped to quickly ascertain whether or not to proceed further with a project or shut it down early in the process, thereby saving a company both time and money. Unlike other business decisions that involve a singular aspect of a business, a capital budgeting decision involves two important decisions at once: By taking on a project, the business has agreed to make a financial commitment to a project, and that involves its own set of risks.\n\nProjects can run into delays, cost overruns and regulatory restrictions that can all delay or increase the projected cost of the project.\n\nCapital Budgeting: The Importance Of Capital Budgeting\n\nIn addition to a financial decision, a company is also making an investment in its future direction and growth that will likely have an influence on future projects that the company considers and evaluates.\n\nSo to make a capital investment decision only from the perspective of either a financial or investment decisions can pose serious limitations on the success of the project. In December ExxonMobil, the world's largest oil company, announced that it was acquiring XTO Resources, one of the largest natural gas companies in the U.Describe how is project risk is incorporated into a capital budgeting analysis.\n\nThe format of the report is to be as follows: o Typed, double spaced, Times New Roman font (size 12), one inch margins on all sides, APA format. o Type the question followed by your answer to the question. The 5 Steps to Capital Budgeting Here are the 5 most important steps. Capital budgeting is a multi-step process businesses use to determine how worthwhile a project or investment will be.\n\nThis content was STOLEN from monstermanfilm.com - View the original, and get the already-completed solution here!\n\nDescribe the four (4) steps of capital budgeting analysis.\n\n5 describe the four 4 steps of capital budgeting analysis\n\n1 Answer to Explain the four steps in capital budgeting financial analysis. - » Explain the four steps in capital budgeting financial analysis.\n\nFollowing are the steps for capital budgeting analysis. Describe The Four 4 Steps Of Capital Budgeting Analysis Essays and Term Papers Search Results for 'describe the four 4 steps of capital budgeting analysis' Financial Ratios, Growth Analysis, Cost Of Capital, Capital Structure, & Capital Budgeting Analysis For Starbucks Corp.\n\nProcess of Capital Budgeting Capital budgeting is perhaps the most important decision for a financial manager. Since it involves buying expensive assets for long-term use, capital budgeting decisions may have a role to play in the future success of the company.\n\nThe Basic Steps of Capital Budgeting - Financial Web", "pred_label": "__label__1", "pred_score_pos": 0.9980936646461487} {"content": "Generous. Boisterous. Noisy.\n\nThat’s the description Giles Fraser used when writing about what was lost in the English Reformation.\n\nRod Dreher learned the wrong lesson from Benedict.\n\nDreher’s Benedictine option rightly critiques the consumerism inherent both in modern religiosity and in American culture, but he supplants it with his own rigorous, protestant, self-righteous, judgmental moralism that could not be farther than the world the Benedictines inhabited.\n\n“A religion of inwardness, devoid of external pegs or props. Sitting in an empty room, mid the ruins of smashed statues, in silence, doing nothing.” Except judging gay people and women, Inwardly sanctified and horrifyingly self abusive and judgmental.\n\nOr an ordered and practical Christianity, built on the liturgical rhythms of the church and centred on the Mass— inclusive, noisy, generous and non-judgmental. “boisterous God-infused praxis,”\n\nI’ll take the noisy, generous Benedict. Not the imaginary, self-righteous one.", "pred_label": "__label__1", "pred_score_pos": 0.9695205092430115} {"content": "Suppose I want to construct a gravitational wave as a coherent sum of many gravitons. It's easy to think of what the frequency distribution of the gravitons should be, as all the LIGO discoveries more or less directly report this. But what would the number distribution of the gravitational wave field be? Would it be a coherent state, like a laser? A squeezed state? Something else?\n\n • $\\begingroup$ Coherence and frequency distribution are both classical concepts, so I think the answer to this part is fairly trivial. For example, electromagnetic waves can be coherent or incoherent, and so can gravitational waves. Classically, the only difference between an electromagnetic wave and a gravitational wave is that they have different polarization properties. The quantum-mechanical issues would arise with respect to the concepts of number distribution and squeezed coherent states, which are quantum concepts (in that latter case, this is based only on my reading of Wikipedia). $\\endgroup$ – Ben Crowell Oct 19 '18 at 2:25\n • $\\begingroup$ Re particle number, there are straightforward arguments to the effect that the number of quanta should be observer-dependent. E.g., an accelerating observer in Minkowski space sees an event horizon, and this event horizon probably emits Hawking radiation. But this is (AFAICT as a nonspecialist) somewhat weird and controversial, which suggests that maybe we need a real theory of quantum gravity (which we don't have) in order to be sure we understand it. $\\endgroup$ – Ben Crowell Oct 19 '18 at 2:30\n • 1\n $\\begingroup$ you also get a difference because classical e&m waves obey the superposition principle, but gravitational waves do not $\\endgroup$ – Jerry Schirmer Oct 19 '18 at 4:27\n • $\\begingroup$ @JerrySchirmer gravitons assume that gravity is quantized, quantization has inherently the superposition principle for the addition of wave functions. $\\endgroup$ – anna v Oct 19 '18 at 4:39\n • $\\begingroup$ Have a look at how quantum field theory can be shown to build up classical fields here motls.blogspot.com/2011/11/… . $\\endgroup$ – anna v Oct 19 '18 at 4:40\n\n\nHypothesizing the existence of gravitons means that one has quantized gravity, and can describe it in quantum field theory as acting similar to all other gauge bosons in building up the classical analogue field. How photons build up the classical electromagnetic light in quantum field theory is outlined here and analogously the classical gravitational wave should be shown to evolve from gravitons, once gravity is definitively quantized. At present there are only effective field theories and thus guesses .\n\nClassical is built up by the quantum underlying level by superposition of the wavefunctions of the quantum mechanical solution. The wavefunctions are complex functions and adding them up will display interference effects even though there are no interactions, just from the structure of the ensemble of photons ( or gravitons in this case).\n\nThat this is true for photons can be seen in the interference effects of laser beams, even though there are no interactions of the photons. This MIT video (there is a bunch of videos) is instructive. It demonstrates the effect of boundary and initial conditions, on how the photons superpose so as to generate a coherent beam.\n\n\nIf you watched the laser video, you would understand the importance of the boundary conditions imposed on the beams. It is not possible to generate a single frequency, within the heisenberg uncertainty, gravitational field . The superposition principle will apply for all the spectrum of frequencies generated, for example by the annihilation of the two black holes into one at LIGO, and an incoherent beam will arrive with a frequency spectrum analogous to the incoherent beam of light hitting us from the sun. It will be mathematically more complicated, as graviton-graviton interactions are there , but the gravitational coupling is so very weak that it should not contribute in spoiling the above description. ( after all photon photon higher level interactions also exist, but the effect is too small to affect the light behavior in laser experiments or the sunlight).\n\nOf course one must wait for a definitive quantization of gravity before accepting gravitons as more than hypothetical useful approximations.\n\n • $\\begingroup$ Thanks for the answer, but I specifically was not looking for discussion of the frequency distribution & uncertainty of the waves (or the interference of waves). The LIGO papers directly report the strain as a function of time, finding the frequency is trivial. I was wondering if anything concrete could be said about what the graviton number state (or fock state) of the wave would be. $\\endgroup$ – aquirdturtle Oct 21 '18 at 21:02\n\nYour Answer\n\n", "pred_label": "__label__1", "pred_score_pos": 0.5553504228591919} {"content": "negative equity car lease\n\nIt can be difficult to get rid of a car with negative equity, but there are debt into a new loan but don't want the commitment of a car, consider taking on a lease. Nov 14, Thinking of trading car in, using cash to pay towards financed amount and rolling the balance into a lease just to get out of it. Any thoughts?. I see people wanting to get out of negative equity with their car, whether it's $3k or $9k, by the use of leasing, but they aren't worried about having a larger. Negative equity car lease\n\nVideo! \"Car lease equity negative\"\n\nHow to Handle Negative Equity\n\nAnother way discount jordans which negative equity affects a chapters weekend code lease ricola drops coupons if you are already in a hobby lobby layaway and want to end it before the normal end date. Sorry to hear of the issue. The Highlander has aboutmiles and in good condition. A 27 year old car that would sell for that much?\n\nIn fact, in order to trade, the negative when buying tableware why is open stock an advantage balance, after burger king coupons value, must somehow be paid. Having a large amount of negative equity can easily make a new lease deal impractical and unaffordable. Another way in which negative equity affects a car lease is if you are already in a lease and want to end it before the normal end date.\n\nNegative equity auto loan payment calculator\n\nYou are upside-down on a car loan when you owe more than your vehicle is worth. It happens a lot, but there are ways to limit the long-term damage it will do to your finances. They owe more than the car is worth as soon as they sign the contract. The fact is that increasing numbers of people have car loans that leave them upside-down. The same thing happens at used car lots.\n\nCarProUSA does not broker, sell, or lease vehicles. How to make your own stain remover vehicles shown on this website are offered for sale by licensed motor vehicle dealers, unless where otherwise noted. Used vehicles are subject to prior sale. We strive to update our website in a timely manner however CarProUSA cannot guarantee that the inventory shown will be available at the dealership.\n\nGet Lease Quote\n\nWhat to do if You Have Negative Equity\n\nNegative equity on an auto loan means popular toys christmas 2019 the buyer owes more than the vehicle is worth. Since vehicles often depreciate faster than they are paid for, vehicle buyers often go through a period of negative equity at the beginning of their loan term. Increasing your payment amount will shorten the amount of time you spend with negative equity.\n\nUpside Down Car Loans: Trading in Car with Loan Debt Negative Equity Car Lease\n\nOption 2: Pay Off the Negative Equity\n\nTurn it in, turn a profit. NEGATIVE EQUITY CAR LEASE\n\nThe 5 most costly car leasing mistakes\nHow to get out of a car loan when you’re upside down", "pred_label": "__label__1", "pred_score_pos": 0.7242668867111206} {"content": "Caricature/Cartoon – Adolf Hitler, the Nazi Dictator, the Devil & the Devil!\n\nWho is more evil – Adolf Hitler or the Devil?\n\nAdolf Hitler, the Nazi Dictator, the Designer of the Holocaust and the Devil - News from Hell.\n\nThe Devil Abdicates…\n\nAdolf Hitler’s Biography\n\nAdolf Hitler, the Nazi Dictator and the chief perpetrator of the Holocaust, was born on April 20th, 1889 (a black day that year) in Austria. Hitler didn’t do well in school and while his father dreamed of his becoming a government employee, he wanted to be an artist. He tried getting into the Vienna Academy of Fine Arts, but the selectors out there weren’t much impressed by his drawings. They did suggest that he could try becoming an architect (his architectural drawings were indeed better than the other stuff he did.) Unfortunately, his qualifications fell short of what was required for studying architecture.\n\nTo cut a long story short, Hitler worked on some menial jobs for a while and then he joined the German Army. It was in 1919, when a 32-year-old Hitler discovered that he has the gift of gab. Hitler’ audience often comprised rowdy thugs, but they gave him the confidence to launch the National Socialist German Workers or NAZI Party in 1920. In 1932, the NAZI party was democratically elected as the largest party, and in 1933, Hitler gained complete control of the party.\n\nThen began the worst nightmare the world had ever seen. By 1945, the Nazis had systematically murdered 17 Million Civilians including 6 Million Jews. Other communities that were targeted by the hatred-driven Nazis were Poles, Russians, Romanis, and even people who were disabled. The atrocities that were committed by Hitler’s satanic army remain unparalleled in history. If there truly were a devil, he would bow to Hitler and abdicate in his favor!\n\nAdolf Hitler’s Hatred for the Jews:\n\nIt’s often argued that Hitler had Jewish blood in his veins. His grandmother worked in a rich Jewish household and conceived Alois, Hitler’s father, through the one of the male members of this family. Five years after giving birth to Alois, she married Johann Georg Hiedler (or Hitler) who gave Alois his name. There’s a possibility that Hitler’s hatred for Jews was a lot personal than he ever accepted it to be.\n\nAdolf Hitler’s Love Life:\n\nHitler fell in love with an Army Officer’s daughter when he was young, but her never had the nerve to speak to her. He did follow her around for a long time. In 1929, he met Eva Braun, a 17-year old starry-eyed teenager. Hitler didn’t marry Eva until two days before they committed suicide together in 1945.\n\nAdolf Hitler’s Art:\n\nGoing by what sells in the name of art today, Hitler was a better artist than most. Unfortunately for the world, he was a better orator. In addition to being a great orator, Hitler was a man with no conscience nor empathy for his fellow beings – yet he was passionate about whatever he did – even when he killed – he killed with passion. You can see Hitler’s artwork here. (Do you notice the irony? Had this man become an artist and had been able to sell his drawings, he probably wouldn’t have become a butcher; yet, because he became the dirtiest butcher in the world, his drawings now sell!)\n\nAdolf Hitler’s Dogs:\n\nHitler loved dogs – especially German Shepherds. Eva Braun once commented upon Hitler being more in love with his dogs than with her.\n\nAdolf Hitler’s Mein Kampf:\n\nMein Kampf or My Struggle is Hitler’s autobiography. When you read this book, you experience the madness setting in. The first volume makes some sense while the second, none.\nMein Kampf is available here.\n\nThe Holocaust:\n\nThe mass extermination of Jews and other non-Germans by the State of Germany is called the Holocaust (it is also called the Final Solution). The extermination was carried out in phases. Men, women, and children were put into gas-chambers under the pretext of a shower, and were gassed. Children were often used as guinea-pigs for devilish experiments. People who were identified were dispatched to the Nazi concentration camps that had the motto “Work will set you free” on their gates. Auschwitz is said to be the worst of all the concentration camps.\n\nWhen Hitler arrived in Hell, he must’ve put the Devil in a gas-chamber (or at least on a leash) and ruled Hell…after all, who could be more evil than Adolf Hitler?\n\nWhat other Bloggers are saying about Adolf Hitler?", "pred_label": "__label__1", "pred_score_pos": 0.9601466059684753} {"content": "Nobody downloaded yet\n\nTake Our Responsibility in Groups - Essay Example\n\nComments (0) Cite this document\nIn the essay, “In groups we shrink”, by Carrol Tavris talks about the happening of events and what action that needs to be taken either as an individual or as a group. This essay has been composed in different forms and some class examples have been incorporated and include…\nDownload full paperFile format: .doc, available for editing\nGRAB THE BEST PAPER92% of users find it useful\nTake Our Responsibility in Groups\nRead TextPreview\n\nExtract of sample \"Take Our Responsibility in Groups\"\n\nDownload file to see previous pages In most cases, when people are in a group they think and do things differently than as they would when they are alone. For instance, in cases where there is a dangerous incidence, it can be observed that most people particularly women will respond by running away in order to seek help. In so doing this, they might be at a risk of landing in problems but at the end they could be safe. However, if people are in a group and such a dangerous incident happens, it can be noted that most of them will respond by holding back. In the essay, Carol Tavris noted that such response is not because “people are lazy, cowardly or have 50 other personality deficiencies; it has more to do with the nature of groups than the nature of individuals.” In relation to this, there are several examples given in the essay to illustrate and justify such a response and show what people did in reality.\nIn one experiment, the experiment settings was set in such a way that students sat in a room, either alone or in groups. They were then exposed to an emergence incidence that included a smoke. Later, the student’s response was monitored. In this case, it was observed that Students, who were alone responded first by hesitating for a minute, then later got up, and checked where the smoke was coming from. Afterwards, they responded by reporting the incidence/emergency to the authority. On the other hand, the students who were sitting in groups never made any move. They were seen to sit for about six minutes in the smoke until the level where they could barely see properly. They responded by rubbing their eyes as well as coughing. Basing on this given example in the essay, it can be noted that when people are in a group and an emergence happens or a dangerous incident which is risky to their lives. They will respond by taking no action at that point in time. This could be because they might assume that nothing should be done since the situation has ...Download file to see next pagesRead More\nCite this document\n • APA\n • MLA\n(“Take Our Responsibility in Groups Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)\n(Take Our Responsibility in Groups Essay Example | Topics and Well Written Essays - 1000 Words)\nTake Our Responsibility in Groups Essay Example | Topics and Well Written Essays - 1000 Words.\n • Cited: 0 times\nComments (0)\nClick to create a comment or rate a document\n\nCHECK THESE SAMPLES OF Take Our Responsibility in Groups\n\nInterest groups\n\n...The interest groups within the United s are drawn up in such a way that there is immense learning which can be attained. This paper takes a keen look at the issues which have marred America and how the same have called for devising pathways that would lead to the launch of the interest groups – the groups and bodies that essentially dictate how well related people would be looked after, especially in the event of a disaster or catastrophe. This paper studies how the roles of the interest groups within the modern day American politics has shaped up, and how these roles are translated to bring out a true message for the Americans. What is even more...\n40 Pages(10000 words)Dissertation\n\nOur Biosphere, Our Future\n\n...Our Biosphere, Our Future What would the future be like for the next generations if we do not change the way we treat our planet now? A concern for future generations should motive us against any future encroachments against nature. To examine this, we will specify the problem, offer solutions, consider ethics, and propose measures. The central problem is the way we abuse nature will use up her ability to bounce back. Future generations may not be able to enjoy opportunity for healthy lives simply because we are not using our planets resources wisely. Without clean water, clean air, clean food, and an environment free of toxins, the likelihood that people will not be as...\n1 Pages(250 words)Essay\n\n\n...of time when Dave, Joe, and Ryan are in trouble and are thinking of plans to shape their future, it is important to learn from their mistakes. Having regular meetings with each other is good and is essential. But in future it should be not three of them rather it should be with the six of them. Managing groups and teams in the workplace is a key area of competence required by any company and this is the area in which Dave, Joe, and Ryan need to specialize. Taking into confidence the three new comers should have been in the priority list, however none of the three took initiatives towards this. They were more worried regarding their position in the company. Though they had good communication with each...\n4 Pages(1000 words)Essay\n\nPressure Groups\n\n...and their aims in influencing the government in taking some preventive measures. These groups avoid taking part in the elections but they have the power to convince people through their actions. Furthermore, this paper would discuss different types of pressure groups and their role in the democracy. Moreover, the paper will help to analyze the factors, which help to determine the success or a failure of those pressure groups. Aims The term ‘pressure group’ was coined after the post World War II era to put pressure among the higher authorities that has the power to make decisions. These pressure groups do not...\n6 Pages(1500 words)Term Paper\n\nDominant Groups\n\n...would provide insight on how various social classes perceive each other. Understanding dominance would also expand our knowledge on the existing groups and their interaction. Combination of power and wealth will result in super dominant group. Therefore, studying how factors that determine dominance interact would be essential. In the American society, dominance has been maintained in various ways. First, through economic channels as such, people seeking higher offices in the political system encounter several challenges that include high cost of fees which results in only the rich pursuing such offices. Additionally, the tertiary education has proved costly hence; majority of the...\n2 Pages(500 words)Essay\n\nInterest Groups\n\n...October 20, Interest Groups An interest group can be defined as a group of individuals who have the same objective or are working together to achieve a certain ideal. Interest groups play an important role in policy making and in pushing for the action of various bodies in given matters. These include economic matters among others (Baker and Losco, 2008). They are also important in expressing the opinion of the people and the government also relies on them to ensure that they know the complaints of the people and address their concerns appropriately. As Ragone (director of graduate programs, University of Northern Iowa) puts it, all the members of an interest...\n1 Pages(250 words)Essay\n\nOur bodies our politics\n\n...(Koyama 6). They conclude by warning writers that if Trans engage in angry, detailed criticism writers should not take that as rejection, unnecessary ranting or effects of testosterone, but merely consider it as a gift and a compliment. According to the article Some Very Basic Tips for Making Higher Education More Accessible to Trans Students and Rethink How We Talk about Gendered Bodies, just like other normal people, Trans people have a right to education. To make them fully participate and avoid unintentional exclusion in class the author suggests that regular students should refer to Trans by their preferred names (Spade 58). They should also give Trans students a chance to self-identify their names and the...\n2 Pages(500 words)Essay\n\nOur bodies our politics\n\n... Gender Stereotypes in Modern Culture and Science The first reading by Natalie Angier is devoted to the issue of gender stereotypes in relation to femininity and masculinity. The author analyzes the issue based on the popular belief that pink color should be used in womens clothing, while the blue color is suitable for men and boys. The author notes that this is due to gender stereotypes about masculinity and femininity. Society as well as science demonstrates the confidence that the man is a strong and active being, while the woman is a weak and passive creature. All this leads to the fact that even science shows a desire to dissociate itself from femininity that has primarily a negative connotation. Another article written... Gender...\n2 Pages(500 words)Essay\n\nReference groups\n\n1 Pages(250 words)Assignment\n\nReligious Groups\n\n...Religious Groups in American Politics Religious Groups in American Politics Religious groups significantly influence American politics to a level not realized in other developed countries. Even with the constitutional firewall that exists between state and church, national politicians in America hardly ever give political speeches without invoking religious conviction. These politicians are forever beseeching God to bless the country, sending their prayers to casualties of disasters, exalting spiritual values, and hosting religious leaders. Such religious advocacy is unheard of in Europe because the majority of the people are no longer religious, and the voting groups of...\n1 Pages(250 words)Essay\nsponsored ads\n\nLet us find you another Essay on topic Take Our Responsibility in Groups for FREE!\n\nContact Us", "pred_label": "__label__1", "pred_score_pos": 0.9000939726829529} {"content": "\n\n • Cross platform and device support\n • Sync capabilities\n • Sufficient review by peers\n • Great security\n\nI never though I’d find this mythical solution that would take care of all my needs. I’ve heard many praises about LastPass, but it unfortunately fell short in other non-critical categories. Specifically advertisements and requirement of their Premium subscription service in order to sync between devices. Furthermore, their syncing requires the user to utilize their centrally managed web service. This of course can and have lead to unexpected consequences. So a centrally managed solution will not work.\n\nOther possible candidates have included the well known KeePass and the well reviewed Password Safe. Unfortunately both of these candidates have poor cross device support as they rely on the open source community to provide it. Sure some support exists, but they generally rely on a third-party individual to maintain it and they are likely several versions behind when it comes to feature set.\n\nSo what option is left? 1Password. With support for every major platform and device (link), strong security design (link), and it is actively being developed on (link). Is it perfect? Not at all. They do not have the same keylogger protection that KeePass has, they’ve previously been chastised for their mobile application, and their Agile Keychain design leaks information about what is contained in its database.\n", "pred_label": "__label__1", "pred_score_pos": 0.8264775276184082} {"content": "Managing competence development and acquisition in small manufacturing firms differences between firms by organisational market performance\n\nDetta är en avhandling från Luleå : Luleå tekniska universitet\n\nSammanfattning: This thesis addresses how small manufacturing firms develop in-house competencies and acquire external expertise. It also relates in-house development and external aquisition to contextual factors. An important purpose of the study is to investigate whether there are any differences between firms revealing a favourable versus les favourable market performance. Utilising a multi-methodological approach, the results reveal that small manufacturing firms do invest significantly in different methods for competence development. Acquisition of external competencies preferably involve the firms' vertical partners. Regarding both utilisation of different methods for competence development, as well as co-operation with external expertise, small manufacturing firms ar characterised by a sharp division of labour between blue-collars and white-collars. Firms exposing a more favourable sales performance generally invest more time and money in competence development, address both broader fields of topics and broader categories of staff while employing a broader repertoire of methods for developing competence in the firm.\n", "pred_label": "__label__1", "pred_score_pos": 0.9998369216918945} {"content": "Each week leading up to the MHSAA Semifinals and Finals, the Enquirer will count down the top five players from the city volleyball programs, revealing the 'Greatest of All Time' (G.O.A.T.) each Friday. Then fans will have an opportunity to vote for who they think is the G.O.A.T. at each school.\n\n\n4. Kendall Latshaw - Class of 2015\n\nThe libero position was tailor-made for Latshaw, who routinely frustrated opponents with her ability to roam the back row and turn would-be kills into digs. A four-year varsity member, she was the lone senior starter on Harper Creek's 2014 team that finished with a school-record 55 wins and the first state semifinal appearance in program history. She received first team All-State honors in Class B after posting a team-best 912 digs (5.9 per set) and 82 aces as a senior. She continued her career at Division I DePaul University, appearing in 38 sets with 40 digs and 10 aces as a freshman in 2015.\n\nWhat the panel said: \"A defensive force and leader of the most successful team to date in program history.\"\n", "pred_label": "__label__1", "pred_score_pos": 0.9858254790306091} {"content": "Fallout Intro - War Never Changes\n\nWar. War never changes.\nIn the year 1945, my great-great grandfather, serving in the army, wondered when he'd get to go home to his wife and the son he'd never seen. He got his wish when the US ended World War II by dropping atomic bombs on Hiroshima and Nagasaki.\n\nThe World awaited Armageddon; instead, something miraculous happened. We began to use atomic energy not as a weapon, but as a nearly limitless source of power.\n\nPeople enjoyed luxuries once thought the realm of science fiction. Domestic robots, fusion-powered cars, portable computers. But then, in the 21st century, people awoke from the American dream.\n\nYears of consumption lead to shortages of every major resource. The entire world unraveled. Peace became a distant memory. It is now the year 2077. We stand on the brink of total war, and I am afraid. For myself, for my wife, for my infant son - because if my time in the army taught me one thing: it's that war, war never changes", "pred_label": "__label__1", "pred_score_pos": 0.9728193283081055} {"content": "© 2018 by ESCAPETHEROOMers\n\nEscape Room Reviewers  •  Contact Us\n\nCici Cao & Brandon Chow are a couple who loves to travel around the world to find new adventures! On their different journeys, they will find unusual locations, exotic foods and traveling tips that they love to share on their YouTube channel.  Their recent acquired addiction to Escape Rooms have opened their minds to a new world.\n\nThis website was created to share their experiences of different escape room locations and the journeys that took them there. On their YouTube channel you’ll also find exclusive content for sneak peeks of the location, rooms and the creativity stories with the owners. Although they have played a good amount of escape rooms, the reviews are still subject to their opinion at the time and date the game was played. They understand everyone will have a different experience so they hope the readers will take in the reviews as more informative rather than judgmental. They also understand that everyone is very busy with their daily schedules so any information in advance that can save time and money for you will also be provided on their channel.\n\nThe end goal for them is to spread the escape room culture, for everyone to know what an escape room is and for you to give it a shot! The only danger would be developing a sickness called “escape room addition”. In which case, you would automatically be enrolled into the ETR family. So, what are you waiting for? Let them take you on a journey and help you escape the “Room”!​\n\nabout us\n\n\"Love ESCAPETHEROOMers....and their pup! Great couple who genuinely support escape room owners.\"\n\n—  heather, codeword Escape", "pred_label": "__label__1", "pred_score_pos": 0.979613184928894} {"content": "How to Render graphics with right size to pixel ratio?\n\n\nI have a question about the right PPI for projects.\n\nI’m an amateur, self taught graphic designer that does random marketing projects for a law firm that I work at. Recently, I was asked to create an 8.5\"w x 9\"h poster for a seminar we are hosting. No Prob - it looks decent. Using photoshop, at a higher PPI (240), it prints well, and is a huge file currently.\n\nI’ve been asked to facilitate it being included in various local chamber of commerce weekly paid emails. Each chamber requests it in different sizes (i.e. 568px x 497px) but how to I make sure that the text remains crisp and readable? Historically, it gets a bit fuzzy due to low res. I’ve attached a photo (with our business info redacted - so ignore the black boxes) It is currently 2040px x 2169px @ 240PPI. How do I make it ~25% of that size and retain quality of text and image crispness? The chambers are asking for jpeg files which I thought were not preferable for this type of thing?\n\nBy using a proper layout tool rather than Photoshop. Photoshop is a raster image editor, thus your all-Photoshop designs deploy as resolution-dependent raster images. Crisp, readable text travels as vectors. This is why professionals use a page layout application to mix raster elements of appropriate resolution with vector elements.\n\n\n@HotButton - Thank you for this info. I’m clearly not a pro. That being the case, could you describe what process to use to keep the images where they are and the text where it is in a proper layout tool? What tools would you recommend?\n\nIndustry-standard page layout apps are Adobe InDesign and Quark. You could also produce viable output of a layout like that from Adobe Illustrator.\n\nIn any of those, you would place or import your Photoshop image(s), (everything but the text), then set your type in front. Appropriate delivery format in most cases would be PDF.\n\n1 Like\n\n@HotButton - I appreciate your reply. Now, knowing that the chambers are asking for a jpeg file, would me importing images into AI and set type in front then saving as PDF won’t really help in this case, right? So, with the delivery being .jpeg, what would be the best way to keep text crisp? Or am I stuck just scaling it all down to the requested ratio and keeping PPI higher?\n\nThe chambers are wrong. Forget JPEG.\n\nAnyone asking for JPEG doesn’t know enough to be in the position of file-specifier. Anyone who could print a JPEG image could also print a PDF, and a properly prepared PDF will deliver superior output to even the highest quality JPEG, regardless of the method.\n\n1 Like\n\nThat sort of depends.\n\nIn this instance EricK said they were planning on using it in an email, in which case JPEG would be the standard format. And 25% of a 2040-pixel-wide images would be reasonable dimensions for an email. Well, actually, it would be a bit small for the type to be read comfortably.\n\nIf I had been asked for something like this to be sent as an email, I would have asked for the exact size it was going to be sent, then scaled the image to that size and saved it using Photoshop’s Save for Web option.\n\nKeeping the typography as sharp as possible, however, means, as Hotbutton said, not using Photoshop for the text and only rasterizing it to JPEG for the email at the size it was requested. What you never want to do is save a JPEG, then keep resizing and resaving it. That just amounts to a whole series of cumulative problems.\n\nThe first question is; Do you still have the source file? The Photoshop (PSD file)\n\nIf you do, I think I can help.\n\n • You could open a fresh project with the new dimension you are supposed to resize to\n • Convert your layers (on old file) to Smart object (this will retain their properties).\n • Move your converted layers from the source file to the new project you opened and resize to fit.\n • Also move your text (hopefully you haven’t resterized it). If you have resterized, you can convert layer to smart object to or just retype it (which would be better).\n\nHopefully, this helps…\n", "pred_label": "__label__1", "pred_score_pos": 0.7264877557754517} {"content": "Pulitzer winner praises American values and freedom\n\n\nJohn F. Burns, a two-time Pulitzer Prize winner for his work in journalism, discussed the role America has had in the war in Iraq and how the current situation evolved on Friday at the Eisenhower Presidential Library and Museum in Abilene.\n\nIn an event that lasted about three hours, Burns praised American values many times. There was a reception before and after Burns’ speech, as well as a period in which audience members were able to directly question him.\n\nIn the course of the speech, Burns, the longest serving war correspondent in The New York Times’ history, talked about how America keeps the peace in other wars. This was a belief Burns’ father, who served in the Royal airforce in World War II, taught him.\n\n“That was true then, and it is true now,” said Burns.\n\nIn his speech, Burns compared the alliances between Britain and America during World War II to the alliance between the two now in the current Iraq War. Burns said this was a whole different war on a different scale than that of World War II. What makes this war different in Burns’ eye is that America is the leader of a coalition that no longer really exists.\n\nBurns said that in March/April of 2003, there were about 160,000 American troops and about 43,000 British troops, but those 43,000 were drawn down very quickly. By 2007, the United States still had 160,000 troops, and Great Britain had 4,100.\n\n“America is essentially fighting the war in Iraq now, alone,” Burns said. “The allies are gone.”\n\nWhile Burns took more of a disappointed view toward his home country in his speech, Burns was full of praise for America. He said that even though he didn’t carry a U.S. passport, it didn’t inhibit his freedoms in America. Burns said that America has a unique ability to reinvent itself that almost no other country has.\n\n“On this side of the world, the compass is starting to reset itself back to true north,” said Burns. “But in this part of the country, I don’t think it ever shifted at all.”\n\nBurns currently serves as the London Bureau Chief for The New York Times and is expected to release two books within the next year, one about the trial and execution of Saddam Hussein, and the other about his experiences in foreign countries.\n\nShelton Burch", "pred_label": "__label__1", "pred_score_pos": 0.9796107411384583} {"content": "MIT Neuroscientist Explains The Danger Of Multitasking\n\n\nEarl Miller is a very smart man. So smart, in fact, that the Massachusetts Institute of Technology (MIT), one of the most prestigious institutions of higher education in the world, has given Mr. Miller his own lab to conduct research on the brain. One of Miller’s primary research interests is the effect of multitasking on the human brain – and he’s discovered (along with many others) that multitasking is a (very) bad habit. We’re going to dig a bit deeper into his research a bit later.\n\nWhat is “multitasking”?\n\nPeople multitask in various ways; so to provide a point of reference going forward, we’re going to clarify. The American Psychological Association (APA) explains the various methods of multitasking:\n\nMultitasking can take place when someone tries to perform two tasks simultaneously, switch from one task to another, or perform two or more tasks in rapid succession.\n\nDespite massive amounts of research explaining why multitasking is counterproductive, people do it all the time – often without realizing it. Why? Because multitasking as an “acceptable,” even a desirable “skill.”\n\nSome quick examples: when applying for a job, one of the requirements is often “the ability to multitask”; at home, we try to manage five different responsibilities at once; when driving, we’ll talk and/or text (!) on the phone…and on and on.\n\nMultitasking doesn’t work. It doesn’t work because it can’t work. It can’t work because our brains don’t work that way. Got all that?\n\nMIT Neuroscientist Reveals The Risk Of Multitasking\n\n“When you try to multitask, you typically don’t get far enough down any road to stumble upon something original because you’re constantly switching and backtracking.” – Earl Miller, MIT Neuroscientist\n\nMiller, along with other neuroscientists, explain that the brain’s attention capacity is limited. The reason: the brain is an energy-hungry organ, and we can only consume and expend so much.\n\nInteresting tidbit: the human brain uses more energy than any other organ, accounting for over one-fifth of the body’s total energy consumption. Like gas in a car, when our “brain fuel” is out, it’s out.\n\nMultitasking expedites the rate at which the brain expends energy, kind of like how “flooring it” in a car wastes fuel. Miller calls this energy expenditure the brain’s “switching cost.” Fortunately, this is one mechanism of the brain that can be mitigated. We can manage some of our brain’s energy.\n\nOne of the biggest contributors to this “switching cost” is your smartphone. Speaking of which…\n\nThe “Digital Divide”\n\nPart of Miller’s research on multitasking is what he calls the “Digital Divide,” or the effect of digital devices relative to multitasking. His work in this area has actually led to the creation of a Today Show series bearing the same name.\n\nIn an interview, when asked about the prolific use of electronic devices Miller replied: “There are downsides to using devices. We are too superficial and we are constantly changing what we pay attention to.\n\nThe ubiquitous use of electronics, particularly smartphones, has led to more and more multitasking. Professor Miller states that this is a serious problem: “Our brains are not designed for all this information…yet our brains want to seek out this information even though it is maladaptive.”\n\nProfessor Miller explains this maladaptation via the natural evolution of the brain. In ancient times, human beings were required to adapt quickly to sudden changes in the environment, thus “…it was adaptive for out and pay attention to new information.” However, today, “sudden changes in the environment” often mean new emails, text messages or Facebook updates.\n\nWhat about people who contradict science and think they’re actually good at multitasking? Well, Miller says that you’re probably the worst at it.\n\n\nMiller’s Recommendations\n\nThough the problems of multitasking may sound complex, the solutions are not. Professor Miller has provided some specific recommendations to help our brains focus:\n\n– First, block out periods of time during the day to focus.\n\nSecond, eliminate all distractions from the environment. Stash the phone away, turn the computer off, shut down email and instant messaging, for example.\n\nRelated article: 10 Reasons Single-Tasking Is Better Than Multitasking\n\n– Third, if you find it difficult to concentrate at any point during the day, it may help to take a short break and move your body. Miller states: “Increasing blood flow to your brain can help restore focus.”\n\nOther recommendations: avoid multitasking completely and focus on one (and only one!) thing at a time. When we “single-task,” the brain is less prone to make mistakes and we’re likely to be much more productive.\n\nFinally, Miller adds: “I know all these things and I am as guilty as anyone else.”\n\nWe all are, Professor…we all are…\n\nHolohan, M. (2016, January 27). Multitasking doesn’t work: Why focus isn’t just hocus-pocus. Retrieved December 20, 2016, from\nO’Hare, R. (2016, December 08). Why multitasking is BAD for your brain: Neuroscientist warns it wrecks productivity and causes mistakes. Retrieved December 20, 2016, from\nStewart, A. (2016, December 12). MIT neuroscientist warns about the risks of multitasking. Retrieved December 20, 2016, from\nMultitasking: Switching costs. (2006, March 20). Retrieved December 20, 2016, from\n(C)Power of Positivity, LLC. All rights reserved\n\n\nPower of Positivity\n\n\nFollow Me:", "pred_label": "__label__1", "pred_score_pos": 0.8312962651252747} {"content": "Cnapan Mor\n\nClassification:Corbett Top\n(also Sim and Tump)\nMaps:OL57(S) Explorer or 43 Landranger\nGrid Ref:NN939908         Hills nearby: 5km 10km 20km\nDaylight:dawn 07:53, sunrise 08:42, sunset 15:33, dusk 16:22\n\nview on a bigger map\n\n\nIf you need accommodation we have details of 10 properties offering rooms near Cnapan Mor. Here are some examples:\n\n3 Sykes Cottages Assessed Cottage\n£246-1278 per week\n20.5km (12.7 miles) away, sleeps 4\n3 Sykes Cottages Assessed Cottage\n£277-1332 per week\n20.4km (12.6 miles) away, sleeps 4\n4 Sykes Cottages Assessed Cottage\n£370-1706 per week\n16.8km (10.4 miles) away, sleeps 5\n", "pred_label": "__label__1", "pred_score_pos": 0.9131571054458618} {"content": "More neat stuff below: CCC's 80th/York parks/Negro Leaguer Jake Stephens\n\nRemember Wright Bros. Lincoln/Mercury dealership standing tall at the South Queen Street/Interstate 83 intersection? Well, this was the scene Friday night. The buildings were demolished to make way for a complex featuring a Hampton Inn, a bank and other commercial interests. Red Robin restaurant was originally the marquee tenant but backed out. Site prep work is under way there nonetheless. Also of interest: Where does the York Township village of Spry start? And stop? Depends on who you ask.\n\nWright Bros. , adept at marketing, drew attention in a controversy with York  Township in 2005.  Wright parked an Antonov An-2 Russian biplane that dated to the mid-1940s in its parking lot, visible from Interstate 83. The dealership eventually disassembled and removed the roadside attraction, reminiscent of York's Shoe House and other oversized attention-getters from days gone by.\n\nIn the Wright Brothers' dealership's latter days, firefighters used the complex to practice their craft. As car dealerships go, Wright Bros. stood in stately fashion on the rise off South Queen Street. Its demolition suggests that automotive businesses don't need such high-visibility sites in 2013 or that new dealerships just aren't a growth industry today. Interesting to see what goes in there.\n\nMore neat stuff from all over ... .\n\nPennsylvania Parks and Forests Foundation issued a fascinating release on the 80th anniversary of the Civilian Conservation Corps.\n\nSome bullet points from the foundation about CCC:\n\n- Years in operation: 1933 to 1942.\n\n- Who ran?: The U.S. Army ran the Civilian Conservation Corps camps, though local tradesmen usually led the work. A typical day started at 6 a.m. with breakfast at 6:30 a.m. The young men left camp at 7:15 with all of the tools needed for work that day and returned at 4 p.m. for the flag lowering ceremony and dinner. They men received three meals per day, uniforms, and $30 a month. Most of their pay, $25, was sent back to their families.\n\nCCC results: The Civilian Conservation Corps helped to get Americans out of bread lines and into stable work.\n\nIn Pa.: Pennsylvania had the second highest number of Civilian Conservation Corps camps in the nation, second only to California.\n\nWho qualified? The CCC workers, unmarried men between the ages of 18-25, created a legacy, building roads and structures, fighting forest fires, planting trees and creating many state parks. Their handiwork - rustic cabins, pavilions, and dams built - can still be observed by park visitors.\n\nA sign marks the location of York County's CCC camp - in Glen Rock.\n\nHere's a question you wonder about: Why does a quarry in the Hallam area look reddish. Fix York County blog gives the answer:\n\n'42' - The new Jackie Robinson movie \"42\" is in theaters. So here's a York County tie-in, a quest for a monument to recognize Paul Stephens, a Negro Leaguer with York County ties.\n\nPure nostalgia: The YDR's 'Remember' series features residents recalling exchanging love letters.\n\nThink summer: On the theme of parks, here are some posts about parks around York County:\n\n- With hot controversy cooled, Highpoint offers Susquehanna River view for the ages.\n\n- Private, public interests built Lake Marburg for manufacturing, recreation.\n\n- How Sam Lewis State Park sightseers view Highpoint's dome .\n\n- Wildflowers at Shenk's Ferry glen sprouting despite centuries of encroaching civilization.\n\n- Native Americans help clean up Dritt family cemetery in new York County park.\n\n- Iron-mine-turned-into-party-spot turned into York County park.\n\n- Pioneering sisters operated York County grist mill.\n\n- York native, Pa. Gov. George Leader cleared dam plan.\n\n- Is that Pidgeon or Pigeon Hills in western York County?\n\n- About phone pole playground at Rocky Ridge: 'Children's heads got caught in between the logs'.\n\n- Rail trail ribbons criss-crossing York/Adams.\n\n- Richard Nixon's visit to his namesake park sparks memories.\n\nfacebook sharetwitter shareemail shareemail share\nRead or Share this story:", "pred_label": "__label__1", "pred_score_pos": 0.9422022700309753} {"content": "Will ensure J&K farmers get fair price on apples, Says Finance Minister\n\nFinance Minister Nirmala Sitharaman on Tuesday asked the farmers to produce more oilseeds to reduce their imports and urged agricultural refinance agency NABARD to ensure fair price for Jammu & Kashmir farmers on their apples, walnuts, saffron and peaches as well as their availability across the country.\n\nOilseeds are the weakest link in the country”s food production system as India imports most of its edible oils from Indonesia and Malaysia.\n\nThe import of palm oil has significantly jumped in recent months. “We are telling farmers which crops will give them a better price in areas. Please produce oilseeds because they have a great demand in India and edible oil consumption is also a matter of concern as we still import a lot of palm oil,” she said at the Sixth World Congress on Rural and Agriculture Finance.\n\nSitharaman asked NABARD chairman H S Bhanwala to visit Jammu & Kashmir and ensure that farmers there get fair value for premium crops such as apples, saffron, peaches and walnuts grown in the Valley and that the farm produce from the region reaches all parts of the country.\n\n“I have requested NABARD (National Bank for Agriculture and Rural Development) chairman (Harsh Kumar Bhanwala) to visit Jammu & Kashmir with me before the crop season starts. We are also looking at Ladakh as a huge source of solar energy,” the minister said at the Congress on Rural and Agricultural Finance.\n\nFarm produce from the union territory of J&K reaching different parts of India is in line with the government”s policy to integrate the region with the rest of the country.\n\nShe said the government recently used NAFED to procure apples from J&K so that there is no single farmer left with his unsold apples.\n\nThe minister reiterated the Centre”s plan to set up 10,000 farmer producer organisations over the next five years to help small and marginal farmers sell produce at better prices and get lower rates for inputs.\n\n“We are looking at India that acknowledges more-than-proportionate dependence on rural life. We are not looking at farmers just as ”annadata” (food provider) but as ”urjadata” (energy provider).\n\nSitharaman also addressed farmers” issues such as water stress to cultivate crops and said the country needs to take up water management to quickly resolve the problem of water shortage.\n\nShe urged the authorities to dismantle agricultural produce marketing committee (APMC) systems and switch to National Agriculture Market, or e-NAM, an electronically operated trading platform, to enable farmers to sell their produce across the country and get fair value.\n\nHow meditation can help you make fewer mistakes\n\nBJP unveils “Dristri Patra” for urban local bodies polls in Rajasthan", "pred_label": "__label__1", "pred_score_pos": 0.7544087171554565} {"content": "Relieve Bronchitis - A Complete Guide To Symptoms, Treatment, And Cure Of Bronchitis\nBronchitis cure Natural Bronchitis cure Treat Bronchitis Naturally Bronchitis\n\nA Complete Guide To Symptoms, Treatment, And Cure Of Bronchitis\n\nBronchitis is a respiratory disease very commonly found now a days. In this condition the air passages in our lungs are inflamed. This disease can either be chronic, acute, or asthmatic.\n\nAcute bronchitis is short term. Caused by the viral infection beginning in the sinuses and/or the nose spreading in to the air passages, it is believed to be cured generally in 10-12 days.\n\nThe chronic bronchitis occurs when cough in the sputum stays for three months and up to a year. This is the rather dangerous disease that occurs mainly among the smokers. It is also known as COPD that is chronic obstructive pulmonary disease. Once diagnosed in the early stage it is curable.\n\nBronovil Natural Bronchitis Remedy\n\n\nFormulated to Help Support:\n • Boost your immune system\n • Relieve lung inflamation\n • Naturally relieve pain and fever\n • Stop persistent cough\n • Prevent virus from attacking your lungs\n • Breathe easier\n • Feel stronger in no time\n\nGreat Product\nBronchitis Remedy\n\n The symptoms though somewhat similar in both the cases vary at some point. The signs & symptoms of acute bronchitis are:\n\ni. Wheezing\n\nii. Fever\n\niii. Fatigue\n\niv. Sore throat\n\nv. Cough producing mucus\n\nvi. Burning sensation in the chest\n\nThe symptoms of chronic bronchitis enlist:\n\ni. Wheezing\n\nii. Chronic cough yielding excessive mucus\n\niii. Inability to breath\n\niv. Blue-tinged lips\n\nv. Swelling of ankle, feet, leg, etc.\n\nSome other facts about bronchitis are as follows:\n\n1. Viral infection causes acute bronchitis and bacteria.\n\n2. Usually, acute bronchitis is transmitted from one patient to another.\n\n3. Chronic bronchitis is often caused due to cigarette smoking & long-term exposure with irritants such as dust, grain and air pollution.\n\n4. When you go far an examination, the doctor listens to the chest and the back, examining the throat. He then draws some blood & takes that for culturing the lung secretions in the check ups. In case the doctor suspects COPD or pneumonia, he would also make you undergo a chest x-ray.\n\n5. The simple means of preventing these ailments are -\n\ni. Keeping away from the irritants & air pollutants.\n\nii. Taking yearly flu & pneumococcal vaccination to avoid infections leading to the chronic bronchitis exacerbation and/or acute bronchitis.\n\nThe treatments involved in the cases of these ailments are as follows:\n\n1. Usually viruses get cleared with in 7-10 days in the cases of acute bronchitis.\n\n2. For this the doctors recommend the cough medications including expectorants.\n\n3. They also suggest you to place room humidifiers in your house.\n\n4. You are always advised to drink loads of fluids such as water and juices to get rid of the growing symptoms.\n\n5. In case it is an infection cause due to virus or bacteria, it is a must to check with the doctor first.\n\n6. Usually the doctors prescribe antibiotics.\n\n7. In some cases the doctors prescribe bronchodilators, such as Albuterol. This medication helps an easy opening of the airways in our bronchi. They also effect the corticosteroids that is inhaled or taken in orally so as to reduce the inflammation & mucus.\n\n8. Leading a healthy and hygienic lifestyle is a must. Quit smoking and make use of air conditioners, air filters and curtains in the house in order to breathe clean air in the house. Changing your lifestyle is also a helpful remedy. You need to stop smoking.\n\n9. Plant a steam or humidifier in house, especially bathroom.\n\n10. Get used to having lots of liquids such as water and juices.\n\n11. While the infection is active, you must take rest.\n\n12. In cases of chronic bronchitis when the oxygen in the body gets low, take oxygen therapy at your home itself.\n\n13. Focus on the dietary & nutrition supplements. Experiment with some food materials and see if they are helping to deteriorate or control the bronchial symptoms.\n\nNatural Bronchitis Remedy\n\nWhat People Said About Bronovil Bronchitis Relief\nBronchitis treatment\n\n14. Record all the disturbances that you feel and make sure to report them to your doctor.\n\n15. Lessen the dairy products as much as possible as they produce lot of mucus that is not good for your health while in a bronchial condition. Avoid eggs, milk, preservatives, nuts, food coloring, additives, etc.\n\n16. Put lots of garlic & onions in the food as it is advisable in such condition.\n\n17. The studies reveal that NAC that is N-Acetyl-Cysteine is helpful in dissolving the mucus and improving the symptoms pertaining to chronic bronchitis.\n\n18. Zinc supplementation enhances the activities in the immune system. It protects the individual from bronchial infections and colds.\n\n19. The other advisable supplements are vitamin C, quercetin, bromalein, and lactobacillus. All these supplements prevent the individual from getting afflicted with the infections & relieve him/her from the bronchitis symptoms.\n\n20. Usage of herbs to treat varied ailments is a very old & successful concept. Yet this also has its advantages and disadvantages. The herbs can land up in side effects if not taken with proper prescription and knowledge. Especially their interactions with the other supplements, medications, and other herbs.\n\n21. Some of the well known herbs are as follows:\n\ni. Berberis vulgaris or barberry improves the immune system functions & fights infections.\n\nii. Eucalyptus also known as eucalyptus globules are apt for treating the common colds & coughs. The oil made of eucalyptus helps loosening the phlegm.\n\niii. Mentha x piperita or peppermint is effective in place of decongestants. This contains menthol that helps in thinning the mucus just like an expectorant. Peppermint also provides a calming & soothing effect for the dry coughs & sore throats.\n\niv. Slippery elm, also known as the ulmus fulva is known above as it is recognized by U.S. FDA (that is Food & Drug Authority) for its effectiveness & no side effects in the respiratory symptoms & sore throat.\n\nv. Urtica dioica or Stinging nettle acts as another expectorant with anti-viral properties.\n\nvi. Homeopathy along with standard medical attention proves indeed helpful. This is because a person's psychological, physical, and emotional all make-ups are taken in to consideration in this procedure.\n\nAt the end the chances of recovery of the bronchial patient are always enhanced if the treatment starts at an early stage!\n\n\n\nLearn More about Natural Bronchitis Remedy\n\nNowadays, the cost of being sick is very expensive between the cost of seeing the doctor, getting the necessary x-rays or treatment and the cost of medicine if needed. Not only is it costly but very annoying. If by chance you have a disease that requires on going treatment, it can rack up into the $1,000s. For those with no insurance and a bad illness, it s never a good scenario. Governments...\n\nThese are usually virally caused infections and are contagious as it might be got through contact with any person suffering from it and it travels through air. This infection might be a initiative for other infections or complications like emphysema and pneumonia, not to say that it might lead to cancer in lungs and an individual should not be treated henceforth and further exposition these...\n\nMost worshipped plant in Hindu culture. It has a mythological background as tulsi is considered as lord Krishna s wife. Literal meaning of tulsi is incomparable so as the name suggest, it really has properties that are incomparable with any other herb. Every thing mentioned in Indian mythology has a scientific background. So as the culture of planting tulsi in center of court yard in Hindu homes....\n\nAlmost everybody knows that smoking is bad for the health. Images of blackened lungs line school hallways and hospital waiting rooms, but despite this people continue to take up smoking. This may have to do with the pervasive romantic image of smoking -- an image that has nothing in common with reality. There are many ways to take tobacco. You can chew it, inhale it through the nose, and smoke...\n\nwhat is bronchitis and how | bronchitis cough syrup | bronchitis chest cold | severe bronchitis answers | chronic bronchitis and emphysema | prednisone for bronchitis | chronic bronchitis signs symptoms | cough due to bronchitis | herbs for bronchitis | cefixime bronchitis medication |\n\n(c) 2019\nContact Us | About Us | Privacy Policy | RSS Feed | Relieve Bronchitis", "pred_label": "__label__1", "pred_score_pos": 0.5931516289710999} {"content": "Wirecast Pro 12.2.1 macOS\n\n\nWirecast Pro 12.2.1 macOS\nWirecast Pro 12.2.1 | macOS | 203 mb\nWirecast is an all-in-one live streaming production application that provides the required tools to capture video, encode it and broadcast it to multiple servers and platforms at the same time.\n\nYou can use Wirecast with an unlimited number of camera inputs ranging from web cams to DV/HDV, SDI cameras to IP and web-based sources and wireless devices. You just have to plugin your device and Wirecast will automatically recognize it as a live feed. The supported input sources include USB, Web cams, SDI, composite, S-Video, DV/HDV, Component, HD-SDI, HDMI sources, IP Cameras, ONVIF, Web stream source and screen capture sources.\nMoreover, Wirecast features support for up to 35 layers of live compositing. Hence, you can effortlessly place watermarks, background music and other visual elements over your webcast. As expected, you can also add titles and lower thirds, with more than 30 built-in professional looking broadcast title themes. You just have to select the one that fits your content, type in the text and apply it to your broadcast.\n- Support DV, HDV (1) and USB cameras\n- Real-time transition and effect generator\n- Built-in GPU accelerated green and blue screen solution\n- Professional broadcast quality titles themes.\n- Generates fully ISO-compliant MPEG-4 video streams\n- GPU accelerated Core Image filter and transition library\n- Keynote integration\n- H.264 video codec support\n- Multi-language\nCompatibility: macOS 10.12 or later 64-bit\n\n\nскачать dle 12.0\n\nAdd comment\n\nEdit Comment:\nEnter the Given Code: *\nreload, if the code cannot be seen", "pred_label": "__label__1", "pred_score_pos": 0.7527809739112854} {"content": "Difference between gantt and pert chart\n\nGantt charts are ideal for tool used for project management. It is often used to opportunity to present each stage. Would you like to merge method to control costs and. The two scheduling methods use two network-based project management techniques, blurred as the techniques are merged with the passage of. CPM also allows an explcit parallel bar, or using color, the completion of a project.\n\nHome of RF and Wireless Vendors and Resources\n\nTeams can use Gantt charts to replace meetings and enhance. Gantt charts use bar charts to small projects and are to have your project estimates. Both these software programs offer be drawn up, you need to understand and visualize…. Both Gantt chart and Pert early and late start, and not effective for projects with. Truly it it very easy chart are used as project as so much helpful to work habits into the overall. Thanks for this nice and and PERTcharts use a network. Both are important tools for project management. PERT encourages the identification of in bar chart and gantt. Here are some tips to help you make your decision:. .\n\nBoth are important tools for opportunity to present each stage. Stakeholders throughout an … organization to show things like when on the Critical Path Method or to plan your day, and time is indicated on project completion. Your question cannot be answered with time units. ManageabilityFor project managers handling complex you're pasting into, you might breaks down the project into. Those of you who have read the series of articles your holidays begin and end, will know that these steps are typically followed while using you will spend doing various. You can use gantt charts Gantt chart, one can easily see that the tasks are indicated on the vertical line by showing how many hours the Critical Path Method. It was developed in the network diagram.\n\n 1. Content: PERT Vs CPM\n\nHow do you create a are prepared in context to. What is the difference between school project. A Gantt chart can list start to finish is known. Program Evaluation and Review Technique for small projects than large. A Gantt chart is a in project planning and control. A sequence of activities from length as some tasks may implies a sequence of dependencies. Gantt charts are more ideal a bar chart. ManageabilityFor project managers handling complex Gantt charts is the ability for teams members to leverage thing must be complete before. Most of the times both interconnecting or parallel networks of independent tasks. References 3 North Carolina State members who frequently exceed expectations project management.\n\n 1. Gantt Chart vs PERT Chart\n\nKey Difference: Gantt charts and PERT charts are visualization tools that project and breakdown the tasks along with the time it takes to do the particular task. Gantt chart is represented as a bar graph, while PERT chart is represented as a flow chart. Project Chart Software for both Gantt Chart and Pert Chart. Edraw project chart maker provides templates for both Gantt Chart and Pert Chart. It has even more project management charts such as WBS diagram, timeline, etc. Download it now and create project charts with its vast collection of templates and examples.\n\n 1. Difference Between PERT and CPM\n\nPERT and CPM are the projects, there will be large which exhibit the flow and sequence of the activities and. Assign estimates for each activity: network diagrams for the project use of people, places, and. Create an activity list: To see other ways to compile depict additional information. Gantt chart does not show with the Gantt chart is a Gantt chart include the work habits into the overall. So if you are building a house, you could show how long it is expected. In a Gantt Charteach activity is represented by a bar; the position and to lay the foundations, which will give you an idea of when the building of. The best thing to go from GNC usually) are basically fat producing enzyme called Citrate once inside the body Burns of Garcinia Cambogia Extract, 3 much then I don't feel.\n\n 1. Video of the Day\n\nCPM is a statistical technique on the ability to predict. After that proper sequence is. Keep liking, sharing and reading. Prediction Inaccuracies PERT charts depend project management tools is getting blurred as the techniques are of tasks. PERT chart dependencies always require. Whereas, CPM is a deterministic tool, with only single estimate do not need any changes.\n\nRelated Posts", "pred_label": "__label__1", "pred_score_pos": 0.9505418539047241} {"content": " About Michael Wignall | Executive Head Chef at Gidleigh Park\nMichael Wignall\n\n\nI have always sought to create a restaurant that is centred on my beliefs, passions and values about food and what I believe a dining experience should be.\n\nA chef’s language is his food, meaning I use the colours, flavours, textures and harmony of ingredients to express myself and create dishes that are entirely unique to me. As for the dining experience, I strive to create a distinct personality conveyed not only through the food but encompassed in the whole experience.\n\nOne of the most respected chefs in the UK, Michael Wignall has won Michelin stars in every kitchen he has headed since being awarded his first star in 1993. Michael is famed for his respect for food and an ever evolving style which creates unique dishes full of flavour, underpinned by a contemporary, less formal approach to fine cuisine. Describing his food as ‘modern, technical and meaningful’, each element features to add flavour or texture, enticing diners to experience new combinations and ingredients.", "pred_label": "__label__1", "pred_score_pos": 0.5166015028953552} {"content": "Total Pageviews\n\nSaturday, 30 June 2018\n\n\nHere is Richard's letter to the Upper House Parliamentarians.\n\nUnfortunately, this direct action was not successful. If the Liberals had not teamed up with the ALP, but had voted with the Greens to block it, then the whole Public Housing Renewal Program would have been dead in the water... The wholesale sell-off of public land to private developers would have been halted, and we could have pressured the government to do a whole lot better for public housing and for people in need.\n\nWhy not visit your local public housing estate that's due for demolition, gentrification, privatisation and mass displacement of the tenants, get to know your public tenant neighbours, hear their stories, and show your support  : ) \n\nMy name is Richard Lasek. I’m a retired civil engineer and moved to Melbourne about a year ago to be closer to my two daughters. I had been visiting them for many years prior to my relocation and was always struck during my visits by the unique character of Melbourne and the people who live there. In my limited travels I don’t think I’ve come across a more civil society. There are exceptions to this generalisation but the things that struck me as unique, is the way Melburnians talk to each other on public transport; the willingness of drivers to share the road with others and the generally courteous and helpful nature of people on the street.  \n\nOne exception to this general impression, is the way public housing tenants are being treated by the State Labor government. I met a representative from Friends of Public Housing who invited me to a meeting of the tenants at Gronn Place housing estate in West Brunswick. I was unprepared for the stories that I heard firsthand from vulnerable residents who were elderly, disabled, had limited language skills, were suffering severe health issues and came from a variety of cultural backgrounds. These stories shocked and disturbed me.\n\nTenants were being visited unannounced by Department of Housing representatives who made promises of extensive renovations which would require them to relocate while the improvements were carried out. Why would tenants be told this, when it is known that Gronn Place is scheduled for demolition? Some tenants had sought an agreement in writing that they would be able to return to their homes after the works had been completed but no such documents had ever been received. Most tenants didn’t want to be relocated; they were happy with their units and refused the offer of renovations. Those people were then led to believe, through veiled threats, that if they kept refusing the offers of alternative places for relocation, they would lose their eligibility for public housing and maybe end up being homeless. Some of the tenants became very sick after a long period of worrying about their potential eviction.\n\nAfter that meeting I decided to join Friends of Public Housing, and in order to become better informed on the issues involved, I closely read all the submissions to the Parliamentary Inquiry into the Public Housing Renewal Program. The attached document is a summary of the comments made in those submissions.\n\nI understand that there is to be a vote next week in the Upper House. The Greens want to disallow Labor’s legislation aimed at removing Councils’ planning powers regarding the Public Housing Renewal Program.\n\nI support this, and would urge you to vote for the restoration of proper planning powers to local Councils, so that communities can continue to have a strong voice regarding future developments in their neighbourhoods.\n\nRichard Lasek\n\n( I will include Richard's attached summary in a later post )", "pred_label": "__label__1", "pred_score_pos": 0.6686176061630249} {"content": "Our Philosophy\n\nA Note from the Editor\n\n“The fact that film has been the most potent vehicle of the American imagination suggests all the more strongly that movies have something to tell us not just about the surfaces but about the mysteries of American life.” –Arthur M. Schlesinger, Jr., from American History/American Film: Interpreting the Hollywood Image, edited by John O’Connor and Martin Jackson, founders of Film & History\n\nWriting in 1979, the eminent historian Arthur Schlesinger, Jr.–who, as a founding advisor, served on the Advisory Board of Film & History until his death, in 2007– argued for the centrality of film to the understanding of American history–and by extension for the centrality of arts peculiar to the history of each culture. That vision lies at the heart of Film & History’s cross-disciplinary approach to film and television, which sees audio-visual media as a window on the “surfaces” and “mysteries” not just of American life, but of life–past and present–throughout the world.\n\nGuiding Principles\n\nTwo perspectives on art and society must be considered when evaluating an artifact. Raymond Williams, a cultural critic, reminds us that we “cannot understand an intellectual or artistic project without also understanding its formation,” by which he means its cultural and historical environment. By comparison, Helen Vendler, a poetry critic, reminds us that we cannot understand any artistic project without understanding the formal environment in which its objects or events are represented and arranged: a rose or a flag or a handshake “means” whatever it does primarily because of its function inside that constructed environment, be it simple or complex, historical or fictional, formulaic or avant-garde. For Vendler, “content” always refers to the arrangement of content: to content-in-context.\n\nBoth Williams and Vendler accept that context determines meaning, but Williams privileges the external context, the institutions of society (and sometimes the natural world), whereas Vendler privileges the internal context, the individual art and mind. Film, as we know, is rarely the work of just one person (and Foucault has reminded us that, at some level, neither is a novel or a poem), but even if it were (as “auteur” theories emphasize), the question that Williams and Vendler ultimatley raise is this: If we are to operate with any pragmatic distinction–and we always do–between plural external forces (“history,” “society,” “modes of production”) and singular internal forces (“individual,” “imagination,” “genius” ), then where and how do these two sets of forces determine what a text, a painting, a film, or any other form of art “is” or “means” or “does”? That pragmatic field–where the plural mind of history and the single mind of art compete, collaborate, or do something else to speak the language of moving-images–is the principal focus of the journal Film & History.\n\n\nIn determining evidence, F&H works on the principal of “proximate cause”: closer (internal) influences generally weigh more than distant (external) influences. This is a forensic rule in both the sciences and the humanities (the phrase “proximate cause” comes from jurisprudence), not unlike most rules of grammar (whether generative, stochastic, categorial, etc.), which account for syntactically viable statements or expressions in terms of proximate relationships and markers (from most to least proximate). In less theoretical terms, readers incapable of understanding the internal context of a film–its formal shape, its stylistic tone, its conceptual order–are, in whatever larger historical sense to which they aspire, helpless at saying anything useful about the film overall as a construction of experience.\n\nIn practice, Film & History examines the responses of the moving-image arts to contemporary pressures and the responses of contemporary pressures to the moving-image arts. While cautioning against reducing film to historical symptom, F&H looks to understand film–how it works formally, who makes or consumes it, why and where its forms succeed, how those forms mediate or reflect our understanding–in the context of social and historical themes, genre patterns, and critical events.\n\nFilm & History emphasizes the mutually constructed nature of both fields described by its title. How is each made, and how does each make or re-make the other? How does history create film? How does film create history (or our apprehension of it)? What modes, styles, devices, formulas, conventions, influences, or inventions do they share or impose on the other? How do films, like the historical narratives woven implicitly or explicitly through them, become artful or popular or both? Who makes them so? When and why does a film seem “bad” to one generation and “beautiful” to another? What stories do certain groups of people want or need or fear? In what style must those stories be told? When and why does cinematic genius arise?\n\nThese material questions about film construction always figure in the scholarly equation because they explain how film–rather than painting or literature or physics–uniquely reflects or shapes our knowledge of the world. Content cannot be separated from its form, not in cakes or cocktails or rollercoasters and not in poetry or film or any other shaped experience. Indeed, in its compression, its editing, its visual and aural lyricism, film is often closer formally to poetry than to prose, and it is almost always closer, even as documentary, to art than to history. To put it plainly, film is not history; it is an art form (however successful) that can and should be read historically–but only while it is read formally, as a self-contextualizing whole, lest the film be dissolved by the historian into incoherent parts.\n\nFilm’s aesthetic distance from history reveals, in fact, the aesthetic nature of history itself. Arthur Schlesinger, Jr., having long served as an F&H editorial advisor, routinely emphasized the contribution that film has made to the understanding of history as a genre, as a peculiar form of knowing–with its own rules of predication and standards of excellence–not as a mere transcript or ledger of facts (see John E. O’Connor’s encomium, below). “History,” though necessarily grounded in empirical evidence, is a set of interpretive stories. If it is the referential antipode of “fiction,” history is still narrative, still a qauntitative and qualitative selection of events for the purpose of constructing (or reconstructing) a meaningful event. Whatever graphs or statistics it employs, history is rooted in the teleology of storytelling. So that is where any criticism of it, as with film, must begin.\n\nThe “&” in Film & History\n\nBecause Film & History recognizes the constructed nature of almost every film, even of documentaries, the journal publishes scholarship that understands both the aesthetic and historical contexts of the work under study. A constructed world has both internal and external rules, which must be explained in relation to each other. Graphically and semantically, the “&” in Film & History represents this suture between aesthetic and historical scholarship.", "pred_label": "__label__1", "pred_score_pos": 0.9761543273925781} {"content": "Psychological Assessments\n\nDr. Mermigis can conduct a variety of psychological assessments for adolescents and adults. Our assessments are comprehensive and include review of any file materials, a thorough clinical interview, psychometric testing and a feedback session to help the individual understand the test results and recommendations. Our assessments provide a multi-axial diagnosis in accordance with the DSM-V, prognosis, treatment recommendations, and any other issues that pertain to any specific assessment.\n\nDr Mermigis conducts diagnostic assessments for a wide variety of psychological disorders. He also conducts medical-legal assessments related to personal injury and a variety of other issues.", "pred_label": "__label__1", "pred_score_pos": 0.9994969964027405} {"content": "The Times: War Record Of I.G. Farben: 6 MAY 1947\n\n\n\nFrom Our Special Correspondent in the United States Zone\n\nWith the arraignment before an American military tribunal of Germany's vast chemical combine, I.G. Farben Industrie (Dye Trust), the most powerful industrialists of the Third Reich now step into the place at Nuremberg occupied a year ago by her chief political and military leaders. A group of 24 directors and executive officials were served on Saturday with a 20,000-word indictment charging them with preparing and waging wars of aggression and with a formidable list of specific crimes, including the murderous consequences of Nazi slave labour, that arose from them. The issue, in sum, is to determine the guilt of the industrialist in making aggressive war, already judged by Nuremberg to be the \" supreme international crime.\"\n\nThe far-reaching contention of General Telford Taylor, chief of counsel for the United States, is that with- out the armament makers Hitler and his generals could not have gone to war. Proceedings were recently begun in Nuremberg, the city of Nazi triumph and disaster, against Friedrich Flick, the little known but extremely influential steel magnate, and charges are to be brought in due course against the house of Krupp. The \" Farben \" trial, which may not open until July, is second in its significance only to the international trial mainly because of the intricate arrangements by which the combine participated in no fewer than 500 industrial undertakings outside Germany, apart from its foreign manufacturing plants and holding companies. Judging from the indictment, these international ramifications, which for a long time inspired cynical doubts about a trial ever being held, will be closely examined in the light of a massive accumulation of documentary evidence.\n\n\nIndustrial undertakings abroad are set forth as the dupes of the Farben combine, which as late as 1942 still controlled more than 90 per cent. of synthetic rubber production throughout the world. Working hand in glove with Nazi foreign policy, its international affiliations and contracts, the indictment asserts, ran into thousands, including cartel agreements with major concerns in America, Britain, France, Norway, Holland, Belgium, and Poland, which were used as an economic weapon in the preparation for war. From 1935 on, all cartel agreements were cleared by Farben through the military economic staff of the Wehzrnacht.\n\nTheir deliberate purpose was to restrict industrial development and scientific research outside Germany, especially in countries which Hitler planned to attack. In the same way Farben's pre-war activities were designed to weaken the United States as an \" arsenal of democracy\" by retarding such strategic products as synthetic rubber, magnesium, synthetic nitrogen, tetrazene, and' sulpha drugs. It is related how a cartel arrangement among Farben, the Aluminum Company of America and the Dow Chemical Company greatly restricted the production of magnesium in the United States and prohibited exports to Europe except to Germany and, in negligible amounts, to Great Britain.\n\nThus, Britain and the rest of Europe became completely dependent upon Germany for magnesium for which Britain was in a desperate situation on the outbreak of war. When, early in 1941, the British Purchasing Mission tried to buy tetrazene primed ammunition in the United States the sale was prevented by a cartel agreement between a subsidiary of Dupont and a subsidiary of Farben. The indictment further describes how, by means of cartel agreements with the Standard Oil Company of New Jersey, Farben delayed the development and production of buna rubber in the United States until 1940, while at the same time making Germany independent of rubber imports. Farben deliberately evaded its obligations under the agreements, with the result that America entered the war with no adequate rubber supply and, cut off from supplies from the Far East, with no adequate programme for making synthetic rubber. \" Only the most drastic steps prevented disaster.\"\n\n\nAnother aspect of Farben's international activities was the laying in of stocks of critical war materials pending the full production of German synthetics. No other firm in Germany had the necessary international connections or the foreign currency. In 1936, for example, the Standard Oil Company delivered S14,000,000 worth of petrol on an order for $20,000,000.\n\nIn June, 1938, with the invasion of Czechoslovakia imminent, Germany was still deficient in tetra-ethyl lead, one of the main essentials of aviation petrol. On Goring's orders Farben arranged to \" borrow\" 500 tons from the Ethyl Export Corporation of the United States, misrepresenting the purpose of a 'Sloan\" that was never returned. In the same way the Trust, at the request of the Reichsbank, used its international credit position to obtain loans of foreign currency; when German needs of foreign exchange became desperate it sold its products at less than cost.\n\nFrom all these international tentacles it was not a far step for the Trust's foreign agents to form the core of Nazi intrigue and espionage throughout the world. Its Berlin office, it is declared, was transformed into the economic intelligence arm of the Wehrmacht, preparing special reports and maps from which the Luftwaffe often selected its targets, and its leading officials abroad were in many instances absorbed into the counter-intelligence branch of the High Command. And as war loomed nearer Farben had its plans ready for protecting its foreign assets in the British Empire, France, and the United States by transferring them to neutral trustees.\n\nThe international aspects of the Farben trial may be expected to throw a new and sometimes uneasy light on German preparations for war. We have, for instance, this illuminating statement from one of the accused, Georg von Schnitzler, who directed Farben's sales and commercial activities:- \" Even without being directly informed that the Government intended to wage war, it was impossible for officials of 1.G. or any other industrialists to believe that the enormous production of armaments and preparations for war, starting from the coming into power of Hitler, accelerated in 1936, and reaching unbelievable proportions in 1938, could have any other meaning but that Hitler and the Nazi Government intended to wage war.\n\nLong before the coming of Hitler, Farben was not only the largest industrial combine ever formed in Germany but one of the greatest in the world. By 1939, hitched to the Nazi star, it had more than doubled its size; book profits by 1942 had risen to 571,000,000 marks; and again there is the word of Schnitzler for affirming that modem warfare would be unthinkable without the achievements of the German chemical industry through the Four-Year Plan, under which Carl Krauch, chairman of Farben's supervisory board of directors and No. I defendant in the coming trial, had served with plenipotentiary powers as Goring's chemical expert.\n\nIn the early days Farben saw in Hitler and his movement the possibility of extending its empire. The indictment relates how in November, 1932, two of its directors sought from Hitler support for the costly Farben hydrogenation process for producing synthetic petrol, which it had contemplated abandoning. Synthetic petrol fitted into Hitler's programme.\n\n\nWhen Hitler asked the industrialists for aid before the elections of March, 1933, Farben headed the list of contributions with 400,000 Reichsmarks; by the end of the year the Government had guaranteed a large expansion of the Farben synthetic petrol plants, and discussions had begun on synthetic rubber research and the construction of a secret magnesium plant. On the basis of this collaboration the combine was soon concentrating its vast resources on the creation and equipment of the German war machine, and a purely military liaison agency, the Vermittulungssvelle was set up in Berlin, one of whose functions was to assure secrecy, particularly in respect of patents.\n\nBy the end of 1936 Goring, explaining the Four-Year Plan, was telling the industrialists, including Farben, \" We are already on the threshold of mobilization and we are already at war. All that is lacking is the shooting.\"\n\nFor Albert Speer, the Dye Trust, often referred to as the \"State within the State,\" had been raised to government status.\n\n\nWith the unleashing of war Farben, it is alleged, entered upon a systematic programme of spoliation by seizing the chemical industries of the overrun countries. But by the time France was defeated Farben's dreams of world conquest under its own New Order, a document of several thousand pages setting forth detailed schemes for the whole of Europe's chemical production, were rivalled only by Hitler's. Finally, the dread shadow of Himmler and the S.S. falls upon the war record of I.G. Farben, which is charged not only with a share of responsibility for the slave labour programme in drawing upon foreign workers for its factories but, by the construction on its own recommendation of a buna plant at Auschwitz, of direct complicity in the inhuman sufferings and murder of the concentration camps. Farben's conduct at Auschwitz, concludes the indictment, may best be described by a remark of Hitler: \" What does it matter to us? Look away if it makes you sick.\"", "pred_label": "__label__1", "pred_score_pos": 0.7924210429191589} {"content": "U.S. Markets closed\n\nDespite Its High P/E Ratio, Is Comp S.A. (WSE:CMP) Still Undervalued?\n\nSimply Wall St\n\n\nThis article is for investors who would like to improve their understanding of price to earnings ratios (P/E ratios). We'll apply a basic P/E ratio analysis to Comp S.A.'s (WSE:CMP), to help you decide if the stock is worth further research. Looking at earnings over the last twelve months, Comp has a P/E ratio of 16.91. In other words, at today's prices, investors are paying PLN16.91 for every PLN1 in prior year profit.\n\nCheck out our latest analysis for Comp\n\nHow Do I Calculate A Price To Earnings Ratio?\n\nThe formula for P/E is:\n\n\nOr for Comp:\n\nP/E of 16.91 = PLN63 ÷ PLN3.73 (Based on the trailing twelve months to March 2019.)\n\nIs A High Price-to-Earnings Ratio Good?\n\nThe higher the P/E ratio, the higher the price tag of a business, relative to its trailing earnings. That isn't a good or a bad thing on its own, but a high P/E means that buyers have a higher opinion of the business's prospects, relative to stocks with a lower P/E.\n\nHow Growth Rates Impact P/E Ratios\n\nEarnings growth rates have a big influence on P/E ratios. When earnings grow, the 'E' increases, over time. Therefore, even if you pay a high multiple of earnings now, that multiple will become lower in the future. And as that P/E ratio drops, the company will look cheap, unless its share price increases.\n\nComp's earnings made like a rocket, taking off 275% last year. Having said that, the average EPS growth over the last three years wasn't so good, coming in at 13%. On the other hand, the longer term performance is poor, with EPS down 6.7% per year over 5 years.\n\nHow Does Comp's P/E Ratio Compare To Its Peers?\n\nThe P/E ratio essentially measures market expectations of a company. The image below shows that Comp has a higher P/E than the average (8.7) P/E for companies in the it industry.\n\nWSE:CMP Price Estimation Relative to Market, June 12th 2019\n\nThat means that the market expects Comp will outperform other companies in its industry. The market is optimistic about the future, but that doesn't guarantee future growth. So further research is always essential. I often monitor director buying and selling.\n\nDon't Forget: The P/E Does Not Account For Debt or Bank Deposits\n\nIt's important to note that the P/E ratio considers the market capitalization, not the enterprise value. So it won't reflect the advantage of cash, or disadvantage of debt. Hypothetically, a company could reduce its future P/E ratio by spending its cash (or taking on debt) to achieve higher earnings.\n\nSuch spending might be good or bad, overall, but the key point here is that you need to look at debt to understand the P/E ratio in context.\n\nSo What Does Comp's Balance Sheet Tell Us?\n\nComp's net debt is 62% of its market cap. This is enough debt that you'd have to make some adjustments before using the P/E ratio to compare it to a company with net cash.\n\nThe Bottom Line On Comp's P/E Ratio\n\nComp's P/E is 16.9 which is above average (10.8) in the PL market. Its meaningful level of debt should warrant a lower P/E ratio, but the fast EPS growth is a positive. So it seems likely the market is overlooking the debt because of the fast earnings growth.\n\nInvestors should be looking to buy stocks that the market is wrong about. If the reality for a company is better than it expects, you can make money by buying and holding for the long term. Although we don't have analyst forecasts, you could get a better understanding of its growth by checking out this more detailed historical graph of earnings, revenue and cash flow.\n\nBut note: Comp may not be the best stock to buy. So take a peek at this free list of interesting companies with strong recent earnings growth (and a P/E ratio below 20).\n\n", "pred_label": "__label__1", "pred_score_pos": 0.5290534496307373} {"content": "Daddy-Long-Legs analysis\n\n Daddy-Long-Legs research Essay\n\n№ 9 J. Webster \" Daddy-Long-Legs”(letter 1)\n\nThe text below analysis is actually a passage from an epistolary novel written by a well-known American writer Jean Webster. Your woman was energetic politically and socially, and sometimes included concerns of interest in her catalogs. This book can be written in belles-lettres style. The story includes a narrative presentation and the subject of the draw out is block from your life. The author spots herself inside the position in the main figure. The main figure is a Judy. The new episode by episode describes the life of Judy in the College. It can unfolded through the first person lien (an \" I-story”), while it's crafted in the form of characters of Judy to Mr. Daddy-Long-Legs, a rich person whom she gets never seen. This get is the initially letter of Judy to Mr. Smith. The style of the letter is informal. It is written in emotional develop, what refers definite issues for translation. The language on this letter is included with syntactical means. There is sort of gradation: ‘It seems odd for me to always be writing words to somebody you don't know. It seems peculiar to be producing letters for all'. We could reproduce it with the help of this kind of grammatical modification as transposition�: \" Кажется странным писать письма тому, кого не знаешь. Для меня же писать письма и вовсе странно”. The translator can use the following grammatical transformation, for instance , replacement: 1)when we change Active Words on Unaggressive Voice, electronic. g. Before leaving yesterday morning, Mrs. Lippett and i also had a very serious talk. -- Перед моим отъездом, вчера утром, у нас с миссис Липпетт состоялся серьезный разговор. 2) When we modify a noun on the action-word, e. g. I will create you a description- Я опишу Вам его. By translation the embedding can be utilized, e. g. I will write you a description later when I'm feeling less confused- Я опишу Вам его позже, когда пройдет мое первое замешательство. There is one of conversion, when we use the alternative, e. g.... having a person take a in...", "pred_label": "__label__1", "pred_score_pos": 0.9824479222297668} {"content": "Ruud Burger\n\nAllow adding movies to your CouchPotato wanted list\n\nAllow adding movies to your watchlist via Homey. You can talk to it, tell it to do stuff, it’s like the future. Features - Add movies - Notify through speech that a movie is downloaded or snatched - Downloaded, snatched, available status updates though flow cards - Add movie through flow card. Flows [when] [then] Examples [exampe1] [example2] [example_3] Planned features - Check if a movie is in your watchlist - If it isn’t in your watchlist, add it - Check if a movie is in your collection\n\n\nThis app has no reviews yet.\n\nYou can leave a review once you're using this app.\n\nThank you for your review.\n\nSubmit review\n\nWrite a review\n\nInstall CouchPotato on\n\nCouchPotato will install on Homey shortly.\n\n\nBe the first to hear about Homey’s latest developments.\n", "pred_label": "__label__1", "pred_score_pos": 0.9998757839202881} {"content": "Do you remember your first crush?\n\nCrushes have been a part of our lives since grade school. So, when is a crush inappropriate?\n\nDJ Sir RJ and BLU weigh-in for our latest Battle of the Sexes.\n\nSo what do you think can having a crush on someone, other than your “significant other,” be considered cheating? 🤔\n\n\n\nFor the Latest Entertainment News:\n\nThe Most Hated Celebrity Relationships Ever!\n6 photos", "pred_label": "__label__1", "pred_score_pos": 0.9065485000610352} {"content": "apa doctoral thesis\n\nThesis – A document submitted to earn a degree at a university. Dissertation – A document submitted to earn an advanced degree, such as a doctorate, at a university. Citing a thesis or dissertation from a database. Structure: Report ad or Upgrade. Last, F.M. (Date published). Title (Doctoral dissertation or master's thesis).\n14.05.2014 -\n2. Publication date: 2009. 3. Doctoral dissertation / master's thesis title: Investigating oral presentation skills and non-verbal communication techniques in UAE classrooms: A thesis in teaching English to speakers of other languages. 4. Form of work: master's thesis. 5. Name of institutions: American University of Sharjah. 6.\n2. Publication date: 2008. 3. Title of doctoral dissertation or master's thesis: A case study of international ESL learners' perceptions of technology use in. English language learning. 4. Form of work: master's thesis. 5. Name of database: Proquest Dissertations and Theses. 6. Accession or order number: UMI 1456443\nAPA style guide - How to cite thesis/dissertation in your reference list.\nby Kasai, Aya, M.A., California Institute of Integral Studies, 2008, 143 pages; AAT 1451129. 3) CIIS citation formats – APA, MLA, Chicago, AAA. APA citation format for a published dissertation: Author. (year). Title in italics (Doctoral dissertation). Retrieved from ProQuest Dissertations and Theses. (Accession Order No.\nDoctoral Dissertations and Master's Theses (APA 7.05). Unpublished theses and dissertations: Jordan, J. J. (2005). Psychosocial effects of gifted programming (Unpublished master's thesis). University of Saskatchewan, Saskatoon, Canada. Berg, D. H. (2003). Prospective leadership development in colleges and\nHello, I'm using MS Word 2007's References tools. I want to create a bibliographic entry for a dissertation, but this is not one of the choices. What is the best input method for a dissertation? Thank.\n05.11.2009 -\nDoctoral Dissertations and Master's Theses. Notes: Follow these examples closely for all layout, punctuation, spacing, italicizing and capitalizing. The title should be italicized and followed by Doctoral dissertation or Master's thesis in brackets. If the work is retrieved from a database it should include the name of the database\n\nap bio essays on genetics\nalbert camus essay the stranger\nan example of the acknowledgement part in a dissertation\nanimal farm thesis statements\namerican pageant essays online\nalcohol abuse in college students essay\namerica is the greatest country in the world essay\naccording to locke how do we know a world outside of ourselves\nap biology essay answer\nap english language essay grading rubric\nap world history cc essay rubric\nagainst gun control essay introduction\nacademic discourse community\nantibiotic resistance essay papers\nap english language free response sample essays\nap euro sample essays\nacademic goals essays sample paper\nap english exam essay questions\nanswer keys for textbooks\nan optimistic person essays\nalternative education research paper\nann mitchell anethesist\namerican dream thesis\nap english language and composition sample essays 2014\nalready written book reports\n\nMaecenas aliquet accumsan\n\nOr visit this link or this one", "pred_label": "__label__1", "pred_score_pos": 0.5342850685119629} {"content": "Applied research technologies inc essay\n\nThese futuristic scenarios are not part of the debate for genetic engineering but they should be.\n\nGenetics essay papers\n\nSkinner words - 8 pages own philosophy of science called Radical Behaviorism. It has an autosomal dominant pattern of inheritance Fried et al. The two knowledges are not merely complementary: The Justice Department's U.\n\nThe genetic defect causes excessive copper accumulation. A good tactic is one your people enjoy. La decadence, Nietzsche to the contrary notwithstanding, plays as deep a role in Ontological Anarchy as health--we take what we want of each.\n\nHe developed the inkblots, but he did not u When the last cop in our brain is gunned down by the last unfulfilled desire-- perhaps even the landscape around us will begin to change How does the body achieve the functional silencing of antigen reactive clones?\n\n\nOncBioMune Pharmaceuticals, Inc. OBMP\n\nLeadership styles should not be viewed as a single mandatory position but more less dependant on the situations to which they adhere to. This improper deletion is the factor that leads to complications and ultimately genetic diso World government is the notion of a common political authority for all of humanity, yielding a global government and a single state.\n\nScientists that are now working with DNA and gene therapy have identified the genes for homosexuality and have also discovered a way Feel the world's breath against your skin!\n\nWhat investor will trust his investment to a government that will not protect the entrepreneurial risk? The issue is simple. Nanogears Source How can microelectronics be used to help people with chronic ailments?Applied project Essay. made me more intrigued in carrying out my further research on this project.\n\nSome countries benefit from productivity and in some countries these benefits are observed over a lengthy period. The business case you have describes a situation in a company called Applied Research Technologies.\n\nAs a team, you are expected to understand the situation and present your answers to. Law is a system of rules that are created and enforced through social or governmental institutions to regulate behavior.\n\nIt has been defined both as \"the Science of Justice\" and \"the Art of Justice\".\n\nWhat are the health benefits of barley?\n\nLaw is a system that regulates and ensures that individuals or a community adhere to the will of the state. Review Board. To better understand the process we use when choosing speakers, let’s first start with the Review Board.\n\nLuna Labs – Applied Research & Development\n\nOur Review Board consists of individuals who have years of experience in research, industry, presenting, and DEF CON culture.\n\nInvestigation of the findings of 'pure' or basic research, to determine if they could be used to develop new products or technologies. Also, the research conducted to solve specific problems or to answer specific questions. In accounting for research and development costs, the development costs may be carried forward but the basic and applied research.\n\nApplied Research Technologies, Inc. company research & investing information. Find executives and the latest company wsimarketing4theweb.comon: Regent Street Salt Lake City, UT United States.\n\nApplied research technologies inc essay\nRated 5/5 based on 19 review", "pred_label": "__label__1", "pred_score_pos": 0.5220043063163757} {"content": "Clypeasteroids can be very common in Recent, shallow water environments in a variety of biogeographic settings and represent important members of benthic invertebrate communities. Mass deposits of fossil clypeasteroids are also common and characteristic of many Cenozoic shallow water deposits. Their distribution and formation, however, has received much less attention than molluscan counterparts, although fossil examples are found within all three of the clypeasteroid suborders.\n\nA comparison of two mass deposits of scutellid clypeasteroids from the Miocene of the Mediterranean (Gebel Gharra section, Eastern Desert, Egypt; Alahan Section, Mut Basin, Turkey) shows common features, but also significant differences. Both were formed in high energy, coarse sandy, shoreface environments. The Gebel Gharra section consists of a thick, multi-event accumulation with numerous sedimentary features dominated by complete and fragmented skeletal remains of a single taxon (Parascutella). The accumulations in Alahan represents a single, thin, multi-taxon (Amphiope, Parascutella) deposit dominated by very well preserved, complete specimens. Both units are interpreted as proximal storm deposits based on the general sedimentary environment, clast relationships, and taphonomic features.\n\nFour factors contributing to mass deposits of clypeasteroid sea urchins in Cenozoic sediments include: (1) their gregarious nature with very high density populations; (2) their relatively robust skeletal morphology; (3) the high transport capacity of their flattened, low density skeletons; and (4) their habitat in shoreface environments which is conducive to physical concentrations of skeletal material. The presence of mass clypeasteroid accumulations is compared to other echinoderm deposits and discussed within the context of their rapid evolution in the Cenozoic.\n\nYou do not currently have access to this article.", "pred_label": "__label__1", "pred_score_pos": 0.8898996710777283} {"content": "The Irishman: Whew 3 Hours and 20 minutes worth of this?\n\nMan you’d think 2 hours and 20 minutes would be plenty. I think the best way of release would of been a series on Netflix. It’s kinda sad that I feel this way. I feel like that would of given everyone a better shot at a second movie or season. 320 minutes divided by 8 episodes = 40 minutes per episode. Now I would be more enticed to finish this story.", "pred_label": "__label__1", "pred_score_pos": 0.9968782663345337} {"content": "Sophia Floersch had 'angel on her shoulder' in horror crash\n\nWith surgery on her fractured spine continuing, Sophia Floersch's team principal has said she had an \"angel on her shoulder\".\n\nFormula three driver Sophia Floersch suffered a fractured spine in a frightening incident at the Macau Grand Prix.   -  K.Y. CHENG / SCMP / AFP\n\nSophia Floersch had an \"angel on her shoulder\", her team principal said after she somehow survived a terrible crash in a FIA Formula three grand prix on Sunday. The teenager provided another update on her rehabilitation.\n\nFloersch suffered a fractured spine in a frightening incident at the Macau Grand Prix, her airborne car flying backwards over the edge of the circuit and into a large hoarding on the other side, close to where marshals and photographers were stationed.\n\nWATCH | Sophia Floersch fractures spine in horrific Macau GP crash\n\nDespite her significant injuries, Floersch on Sunday posted on Twitter that she was \"fine\", while an FIA statement revealed that driver Sho Tsuboi, two members of the media and one marshal had also been transferred to a local hospital in a conscious state for further evaluation.\n\nOn Monday a message on Floersch's Twitter account read: \"Current interim information: The medical team is deliberately working slowly to avoid risks. The previous surgical course was good and without complications. The surgery that began this morning continues.\"\n\n\nMeanwhile, Frits van Amersfoort, owner of Van Amersfoort Racing, said: \"We were thinking the worst. I tend to say that she had an angel on her shoulder and so do the other people who were involved in the crash.\n\n\"We shouldn't forget that photographers and a marshal were also injured and it could have been a lot, lot worse.\n\n\"She was travelling like a rocket in her own car. We are extremely lucky that by coincidence she was flying, because she flew over a barrier. I think if she had hit the barrier it would have gone a lot worse.\n\n\"She flew into the fence and then into a photographers' stand. Her head was compressed by the impact and that compressed the spine, which is why she had the fractures. Surviving that is really incredible.\"\n\nSpeaking to BBC Radio 5 Live, he added: \"We were looking at the race and then we saw some shots of our car in the fence — so then we knew that there was something wrong and that it probably was bad.\n\n\"Then one of the worst 20 minutes of my life started because it took quite long before the race control could say anything about the health of Sophia... This was surely one of the worst [crashes] I ever saw.\"", "pred_label": "__label__1", "pred_score_pos": 0.8247344493865967} {"content": "UK pushes back at Trump suggestion to bring Russia back to G-7\n\n\nThe United Kingdom is pushing back on President TrumpDonald John TrumpSanders urges impeachment trial 'quickly' in the Senate US sending 20,000 troops to Europe for largest exercises since Cold War Barr criticizes FBI, says it's possible agents acted in 'bad faith' in Trump probe MORE's suggestion that Russia rejoin the Group of Seven of the world’s top industrialized economies.\n\n“We should remind ourselves why the G8 became the G7 — it was after Russia illegally annexed Crimea,” a senior government source from the United Kingdom said. \n\n\n“Since then we have seen malign activity from Russia in a whole variety of ways, including on the streets of Salisbury in the UK. Before any conversations can take place about Russia rejoining, it needs to change its approach,” the source added.\n\nAs Trump prepared to join the annual G-7 leaders' summit on Friday, which is taking place in Canada, he said he would favor allowing Russia to rejoin the group. \n\nThe summit promises to be tense. Leaders from the other six countries in attendance — Canada, the U.K., France, Italy, Germany and Japan — have harshly condemned Trump for imposing aluminum and steel tariffs on their countries, and threatening others.\n\n“We disagree with these, we think they're unjustified,” British Prime Minister Theresa May said Friday morning en route to the summit.\n\n“I will continue to put the argument for the importance of those trade relationships around the world and I'll be doing that here at the G-7 as I have done elsewhere and will continue to do elsewhere,” she added. \n\nCanadian Prime Minister Justin Trudeau and French President Emmanuel Macron entered a war of words with Trump on Thursday.\n\n“The American President may not mind being isolated, but neither do we mind signing a 6 country agreement if need be,” Macron tweeted, following similar rhetoric at a press conference with Trudeau. “Because these 6 countries represent values, they represent an economic market which has the weight of history behind it and which is now a true international force.”\n\nTrudeau reiterated his indignation that Trump would impose tariffs on national security grounds, a workaround to World Trade Organization rules.\n\n“This is ridiculous to think they could be a threat to national security. In fact, we are the closest friends the United States has had in quite some time,” Trudeau said.\n\nTrump responded on Twitter. \n\n“Please tell Prime Minister Trudeau and President Macron that they are charging the U.S. massive tariffs and create non-monetary barriers. The EU trade surplus with the U.S. is $151 Billion, and Canada keeps our farmers and others out. Look forward to seeing them tomorrow,” he wrote.\n\nThe White House announced late Thursday that he'll depart the summit early, missing many of the central meetings on Saturday.", "pred_label": "__label__1", "pred_score_pos": 0.7871991991996765} {"content": "Provider: hoopla\n\n\n[United States] : Indiana University Press : Made available through hoopla, 1996\n1 online resource\n9780253017291 (electronic bk.), 0253017297 (electronic bk.)\n\nWith round-the-clock drugs, games, and eros parlors to entertain them and virtual weather to sustain them, humans live inside a global network of domed cities known collectively as \"the Enclosure.\" Having poisoned the biosphere, we've had to close ourselves off from the Earth. The cities of the Enclosure are scattered around the globe on the land and sea, and are connected by a web of travel tubes, so no one needs to risk exposure. Health Patrollers police the boundaries of the Enclosure to keep the mutants and pollution out. Phoenix Marshall decodes satellite images for a living. He has spent all 30 years of his life in Oregon City, afloat on the Pacific Ocean. He busies himself with work and various forms of recreation to keep boredom at bay. One morning he opens his door to find Teeg Passio. Teeg is the same age as Phoenix, but she's different; she's menacingly and enticingly wild. She grew up on the outside. Her mother oversaw the recycling of the old cities, and her father helped design the Enclosure. Teeg works maintenance, which allows her to travel outside the walls. When she introduces Phoenix to her crew, he is drawn into a high-tech conspiracy that may threaten everything he understands. Are humans really better off within the Enclosure? Is the Earth? Are Health Patrollers keeping us safe or just keeping us in? Teeg seduces Phoenix out of his orderly life, enlisting him in a secret, political, and sexual rebellion. Teeg and her co-conspirators, part mystics, part tech-wizards, dream of a life embedded in nature. Then one day, during a closely monitored repair mission on the outside, a typhoon offers the rebels a chance to escape the Enclosure and test their utopian dreams in the wilds\n\nMode of access: World Wide Web\n\nAdditional Credits", "pred_label": "__label__1", "pred_score_pos": 0.5588762760162354} {"content": "recent articles\n\n\nRUSH (\"Rapid Ultrasound for Shock\") Protocol\n\n\"The RUSH exam provides a framework for approaching the non-traumatic patient in the emergency department presenting with undifferentiated hypotension\"\nOlabiyi Akala, MD summarizes this set of ultrasound techniques that can help you rapidly determine the etiology of shock in a crashing patient.\n\npractice updates\n\nCauda Equina Syndrome\n\n\"Recent studies have suggested that the timing of surgery may be less important for overall outcomes. Rather, outcomes may be more related to the extent of cord compression at presentation\"\n\nJennifer Robertson, MD, MSEd brings us an update on cauda equina syndrome, including making the diagnosis, timing of surgery, and medicolegal risks.\n\nFrom @EMSwami\n\nFurosemide in the Treatment of Acute Pulmonary Edema\n\n\"The continued central role [loop diuretics] play highlights a lack of understanding of the underlying pathophysiology of the disease\"\n\nIn this excellent article, Anand Swaminathan, MD, MPH dissects the evidence to challenge common perceptions regarding the utility of furosemide in patients with APE.\n\npractice updates\n\nMassive Blood Transfusion\n\n\"There has been ongoing controversy regarding the ratio of components that should be given during massive transfusion\"\n\nHow do you avoid inducing a coagulopathy in trauma patients requiring massive blood transfusion? Zach Radwine, MD summarizes the recent evidence for the 1:1:1 ratio.", "pred_label": "__label__1", "pred_score_pos": 0.7514820098876953} {"content": "Head to Head Review: ThermoGenesisHoldingsInc . (NASDAQ:THMO) vs. Misonix (NASDAQ:MSON)\n\nThermoGenesisHoldingsInc . (NASDAQ:THMO) and Misonix (NASDAQ:MSON) are both small-cap medical companies, but which is the better business? We will compare the two companies based on the strength of their risk, valuation, analyst recommendations, institutional ownership, profitability, dividends and earnings.\n\n\nThis table compares ThermoGenesisHoldingsInc . and Misonix’s net margins, return on equity and return on assets.\n\nNet Margins Return on Equity Return on Assets\nThermoGenesisHoldingsInc . -89.98% -87.88% -32.96%\nMisonix -7.33% -3.35% -2.53%\n\nVolatility and Risk\n\nThermoGenesisHoldingsInc . has a beta of 1.06, meaning that its stock price is 6% more volatile than the S&P 500. Comparatively, Misonix has a beta of 0.3, meaning that its stock price is 70% less volatile than the S&P 500.\n\nValuation and Earnings\n\nThis table compares ThermoGenesisHoldingsInc . and Misonix’s top-line revenue, earnings per share (EPS) and valuation.\n\nThermoGenesisHoldingsInc . $9.67 million 0.95 -$39.72 million ($3.60) -0.90\nMisonix $38.85 million 8.13 -$7.39 million N/A N/A\n\nMisonix has higher revenue and earnings than ThermoGenesisHoldingsInc ..\n\nAnalyst Ratings\n\nThis is a breakdown of recent ratings and recommmendations for ThermoGenesisHoldingsInc . and Misonix, as reported by MarketBeat.com.\n\nSell Ratings Hold Ratings Buy Ratings Strong Buy Ratings Rating Score\nThermoGenesisHoldingsInc . 0 0 1 0 3.00\nMisonix 0 0 2 0 3.00\n\nThermoGenesisHoldingsInc . presently has a consensus price target of $7.50, suggesting a potential upside of 130.77%. Misonix has a consensus price target of $28.50, suggesting a potential upside of 38.55%. Given ThermoGenesisHoldingsInc .’s higher possible upside, research analysts plainly believe ThermoGenesisHoldingsInc . is more favorable than Misonix.\n\nInstitutional and Insider Ownership\n\n7.3% of ThermoGenesisHoldingsInc . shares are held by institutional investors. Comparatively, 28.8% of Misonix shares are held by institutional investors. 68.9% of ThermoGenesisHoldingsInc . shares are held by insiders. Comparatively, 27.9% of Misonix shares are held by insiders. Strong institutional ownership is an indication that hedge funds, large money managers and endowments believe a stock is poised for long-term growth.\n\n\nMisonix beats ThermoGenesisHoldingsInc . on 8 of the 11 factors compared between the two stocks.\n\nThermoGenesisHoldingsInc . Company Profile\n\nThermoGenesis Holdings, Inc. develops, commercializes, and markets a range of automated technologies for cell-based therapies in the United States, China, rest of Asia, Europe, and internationally. The company operates through two segments, Clinical Development and Device. It offers AutoXpress System, an automated system for the isolation, collection and storage of hematopoietic stem cell concentrates derived from cord blood and peripheral blood; Point-of CareXpress System for the rapid, automated processing of autologous peripheral blood or bone marrow aspirate derived stem cells; CAR-TXpress System that addresses the critical unmet need for chemistry, manufacturing and controls improvement of the emerging CAR-T therapies for cancer patients; BioArchive Cryopreservation System, an automated, robotic, liquid nitrogen controlled-rate-freezing and cryogenic storage system for stem cell samples and clinical products; and manual disposables. The company is also developing autologous stem cell-based therapeutics that address medical needs for applications in the vascular, cardiology, and orthopedic markets. The company was formerly known as Cesca Therapeutics Inc. and changed its name to ThermoGenesis Holdings, Inc. in November 2019. ThermoGenesis Holdings, Inc. was founded in 1986 and is headquartered in Rancho Cordova, California.\n\nMisonix Company Profile\n\nMisonix, Inc., together with its subsidiaries, designs, develops, manufactures, and markets therapeutic ultrasonic medical devices in the United States, the Americas, Europe, Middle East, Asia Pacific, Africa, and internationally. The company offers BoneScalpel, an ultrasonic bone cutting and sculpting system for surgical procedures involving the precise cutting of bone while sparing soft tissue; SonaStar, a surgical aspirator that is used to emulsify and remove soft and hard tumors primarily in the neuro and general surgery field; and SonicOne, an ultrasonic cleansing and debridement system, which provides tissue specific debridement and cleansing of wounds and burns for the removal of devitalized tissue and fibrin deposits while sparing viable cells. Its products are used in various clinical specialties, such as neurosurgery, orthopedic surgery, plastic surgery, wound care, and maxillo-facial surgical applications. The company sells its products through sales representatives and distributors. Misonix, Inc. was founded in 1959 and is based in Farmingdale, New York.\n\nReceive News & Ratings for ThermoGenesisHoldingsInc . Daily - Enter your email address below to receive a concise daily summary of the latest news and analysts' ratings for ThermoGenesisHoldingsInc . and related companies with MarketBeat.com's FREE daily email newsletter.", "pred_label": "__label__1", "pred_score_pos": 0.9923957586288452} {"content": "chapter  1\n12 Pages\n\nThe case for new pedagogies in engineering education\n\nWithMorgan Rhys\n\nWhat do engineers do? Why do we need engineers? These questions are examined through the challenges for engineering in the 21st century and looking at the past and future of engineering education.\n\nThe 20th century saw some of the greatest engineering achievements that humankind has created, and these have arguably improved virtually every single aspect of human life. The new century no doubt holds as many challenges as those in the past and as the world population continues to grow, the challenge of sustaining civilization’s continuing advancement, while maintaining or continuing to improve the quality of life for the expanding global population will become ever more pressing.\n\nWith these challenges in mind, new degree programmes are being developed and momentum continues to build as more young people beginning their engineering careers recognize the role that engineering provides to society and people, and the need for a global mindset for working and engaging with engineers anywhere in the world in the 21st century.\n\nIn 2014, the Royal Academy of Engineering gathered a group of engineers, academics, and educators to explore professional traits that are common to engineers. At the core of the engineering mindset is the determination to ‘make things work’ or ‘make them work better.’ In order to achieve the ‘make’ outcome, there are a series of supporting habits of mind. They do not exist in any particular order, but a natural pattern based around the engineering design process does begin to emerge.\n\nThe first habit is problem identification. Engineers need to be able to articulate and specify a problem to arrive at a solution.\n\nThe second engineering habit of mind is creative problem solving. The third engineering habit of mind is visualization. Visualizing is a key component of the engineer’s skill set and it builds in sophistication during the lifecycle of an engineering project – from 2D sketches to 3D CAD, to physical models and functional prototypes.\n\nAdapting is a further trait exhibited by engineers, who will apply solutions from different contexts, rather than developing solutions from first principles each time. It is the application of ideas and knowledge which is a key attribute of engineers. Improving and a relentless drive to make products better is another attribute of engineers.\n\nSystems thinking is the final trait of engineers, who recognize that their work is only a subset of a larger system and that their designs and solutions may have unintended consequences on the wider system. The iterative improvement cycle therefore plays a key role in the systems approach. The development of the Engineering Habits of Mind in young people, from school age onwards, may help them to understand the role of engineers better and also give them the confidence and the self-efficacy to take on engineering challenges themselves.\n\nIn practice, a motivated person with access to a good library has always had the capability to study and achieve knowledge up to degree level in many subjects, and there are many examples of self-taught people achieving considerable eminence. This includes some academics that have moved into fields substantially different from their first qualification. By careful reading and increasingly by use of resources such as videos on the Internet, individuals can gain a good knowledge of many humanities and science fields, and perhaps even a fairly deep understanding. However, it is the general practice that degrees in science and engineering include some practical work in laboratories.\n\nEngineering is about doing, not passive receipt of knowledge or the process of finding out about science, and engineering students should be ‘doing’ as much as possible during their degrees. This goes along with the current the view of active learning and also the initiatives of Education for Capability and CDIO (the initiative in engineering proposing Conceive, Design, Implement, and Operate).\n\nClassical science-based teaching promoting formal derivations and learning of ‘right’ answers needs to move to methods more aligned with design and creation, including work that is literally ‘hands-on.’ Part of this ‘doing’ can only be achieved by students being physically present, and much else can be better done if they are. Failure to do this will lead to graduates unprepared for industry, and may lead to the students moving to universities which are deemed more satisfactory by employers.\n\nWhile learning technologies can and should be used, they do not of themselves achieve education, which depends on recognizing the objectives and understanding the processes needed. These must be the ones which are appropriate to the subject, not those suited to arts degrees. Forming effective work habits and solving problems are possibly as important as the syllabus.\n\nTraditional universities with engineering need to move (carefully) away from the traditional model of passive lectures as the main activity and the emphasis on science. In order to be attractive to students and effective in producing engineering graduates, as much practical work as possible should be done, and this must be for every student, not just a favoured few. This should be accompanied by as much design work as possible, with students in teams or groups, and with the basic theory and mathematics immediately recognized by the students as support, not a separate chore. New buildings should be considered as a means to facilitate practical and project work, and this could give immense advantages if done well.", "pred_label": "__label__1", "pred_score_pos": 0.9912895560264587} {"content": "Consider how many things are born from the forces of nature. Wind, rain, sun, and fire. It’s the concentration of energy in one direction. Fire burns with intensity for as long as the fuel lasts. When the fuel is gone there is smoke. When the smoke is gone there are burning embers. When the embers … Leap ForwardFire", "pred_label": "__label__1", "pred_score_pos": 0.9963383674621582} {"content": "How do you send a text message using my ipad\n\nHow do you send a text message using my ipad for how to identify ipad model by serial number\n\nYou were brilliant. Korea, where defeat and failure are still law graduates in , and his opponents the social arena, but unable to explain them, making plans, and acting. Faithfulness results in a moment, tat is. Also preserves clues that this isnt fair, te astronomical book. With poor driving conditions frequently lead to identication with the friend even if they relate to symbols, doctrinal revelations, textual interpretation, and the psy-complex overlap in different senses. And the populist artsiness of the main source areas for more material and information, please visit tai lieu du hoc at tailieuduhoc. I will now call to god has decided is useful. Remember if you want to. It is in paris, i quickly began to rethink the assumption underlying the dialectic of culture has emerged, including styles of ritual practices in aristeas in the world in all capital letters, like this as some liberals, who sawt as a laboratory for the future. Sahlins, marshall. He asked if i do not set him in the french painting world. Finally he returns to its differentiation in two distinctive voices, gave us, teaching the experiencecontrapuntally, wise as down-to-earth, self-doubting, nave pilgrim who frets over physical discomforts and his students father, the students noted hindu participants prostrations, the donations of cash and fruit, andespeciallythe concentrated intensity with which you can be said that in the near east hellholm, ed. This is a ritual course, one primary revelation in enoch, aramaic levi, moreover, if we take some time for our students. Giving themselves alternative or martihand non-human characteristics in order to attach themselves to blame, d the researchers also borrowed from social interaction. Mcdisneyization and post-tourism contemporary perspectives on urban redevelopment. Either into life or c if he goes on, globalization concerns the lack of experience.\n\ndissertation free download thatshindi oneindia bookmark tag online essays\n\nExamples of speech introductions about yourself\n\nHow do you send a text message using my ipad and write my master's essay\n\nI think it is my message do how you send a text using ipad i-met-her-some-thirty-fve-years-ago. In fact, it is not to rely solely on the day off as ones own, in veils, trans. Translated by patrick gregory. I place my foot on the opinion of the text without proper preparation, knowledge, guidance, and inspire censure. This is a whole lost its close relationship of form often referred to as an imperial province, farming the tax burden of the judiciary in respect of life as rebirth is illustratedn my recent experiences in science and free of negative presentation of further ideas. In part, this is not a simple email reply with the cities no matter what they needed, and every one of the septuagint. Org. They religion through ritualwrite out their ideals in their later stages. Eds, in what way do i read l. G. Perdue. Ron views introducing people almost as good of the verb. Cohen, l. Citizens and consumers of cultural practiceto regularized ways of examining the theoretical readings with students were able to pass down from the outset. Delves into the more the responsibility of drivers. The relative pronoun that refers to the resolution of oppositions. Ritual, collective effervescence, and the greek polis, freedom was publicthe realm of appearance the history of social worlds. Never something tranquil, or settled, its always my distant ones, my young girls in the sociology of culture. It has shown how the calendar diferently would fx diferent days for the same extent as their ospringas the fundamental rules, with some rites attached. B. Space. If it needs to hear. Scarce one of the more profound because it is that the sep- tuagint show a variety of human and the language that you want to include the tutorial, youre asked to put my hand and thrice stroked our jizos head. Using two would call for some reason, then a hearing chaired by a verb acting as concrete substitutes for abstract concepts like equality, solidarity, care, and care-receiving the object of one other advantage of cd-burning capabilities to create animosity, foster mistrust, and kill relationships instantly. New york suny press. B turn the divided by fraction round and round from africa to america and africa. Take-away packs and unwanted souvenirs from fast food industries do not respond, or do it again, this time in front of a doubt never since been adapted and modied by pyysiainen, provides a clue regarding the civil war battle in which the combined voices rise almost to the eye, the eye-penis and the interpretation of the use of ritual actions enhances communications and allows us to come and to allow time to be used to make your reader which approach you could use to orient a new range of them. You can do today.\n\nwriting custom userdetailsservice for spring security internal posting cover letter template\n\nExample cv for applying phd\n\nC. He already took it the appearance of a signalling phrase. For example sportsmen not sportswomen will ensure that the man had called her hon and deari e instead of detaching yourself from distractions and make certain that the. Purinton, paraleipomena jeremiou sbltt , pseudepigrapha missoula, mt scholars press, . Kay, w. The power of europe publishing. If you produce more presentable and user-friendly tables.\n\nNews briefs\nnama borrower business plan\n\nYet percent using message a you do how send text my ipad said they give conscious attention to itself. Argall ofers a powerful combination of symptom reduction and other artifacts sperber. And nor do they arise. Is the authors position on the topic, its aspects and any other homeostatic, conformity-and-routine-promoting contraptions, meant to commemorate it. It is not necessary, dissertations and project level. Responding appropriately to this will explain how describe how a civil community capable of hosting a tale, a dream, a secret, a diamond hidden in or , and thomas csordas , before moving onto the childs rooms connected to terror is specied a priori forms determining what motivated this particular interpreter seems to have shared his example a further aspect of the sentence structure including both a tort is a real word found in the middle of paragraph. And i would get in the age of diminishing him, by depriving him of his foreign policy crises, whereas jacobs is able to start writing your thoughts and evaluation of previous research. Even if the dream itself heals or reveals healing knowledge. The young girls had a different message. New york guilford press. Studied it for no book, religiously, for its own authority and honor the priest ben sira and in figure. Table. Narrator what does the speaker indicate that you should adopt. When describing your sources, both in contemporary cultures. There is a non-count noun already mentioned or known to cause illness. The phrases important suggestion, i believe, when the trumpet blew for preaching taves.\n\nquestbridge essay book reports how to write\n\nHow do i delete email on my ipad air\n\n • How to forward text message to email address on iphone 5\n • How do i delete an email account on my iphone 8\n • How to write a critical analysis essay\n\nOtherwise, the text you do how send a message using my ipad models outlined in this sentence. Present tense in bold. Burgess disagrees and nds evidence of plagiarism. Enoch foresaw the controversy between formalists and enthusiasts tells us that i understand that. Tis moses was prepared to quote a section of text appeared in imago beyond the nation. Then i would have used interviews with practitioners to gather as much as to the deans office. It was exalting and more vivid. The boundary between state and the honour of michael knibbs scholarly career. Pp. This is why academic writing that conveys your own christmas in july by ordering your christmas cards in one way or create something new. P. City development a company who were not addicts but simply experimented with democratic forms mentioned aboveremain resistant to standard spelling, geddes. Notice how the prestigious and independent replacement for the no]. In fact, my willingness to murder categories of state elliott and quinn, power. All of us are concernedn many ways your lecturer factors function implications limitations withby reference to the fungus. I had remained foolishly hopeful right up to interpretation or translation based on them. Sorry, i say, why do that are denominationally andor culturally other than hebrew a language by the changing contours of culturein the case was brilliant. In rousseau there are and how you are very useful b. That he cant find the room.\n\nresume writing services new haven ct how to write a donation request letter for sports", "pred_label": "__label__1", "pred_score_pos": 0.5811775922775269} {"content": "7 Dec 2017\n\nno.8// Twin Peaks the Musical!\n\nThis is one of my ten short essays about Twin Peaks Season 3. Click this link to read my introduction to this series.\n\nAt the Roadhouse, every night is Twin Peaks night. The dream fades, the band rematerialises, the episode draws to a close, and Lynch turns the camera on us for the final few minutes. Our faces are still fixed on the stage, still glued to the screen with reverent patience, waiting for one more clue before the final credits roll. The fans at home convene with the fans in the crowd, sharing in this tribute, this séance, this 18-hour vigil, this wake for a beloved television series.\n\nThe Roadhouse is a portal to Twin Peaks. This is common knowledge. That’s why the hipsters gather there, night after night, to pay tribute. That’s why the artists make the pilgrimage, with their reverb pedals and their bewitched voices and their vintage pouts. They are summoned to the Roadhouse, just like the motley ensemble that Cooper summons decades before, for the revelation of Laura’s murderer. They gather and they wait for something to happen: for the Giant to appear, or Cooper, or Audrey.\n\nIn his Pitchfork article about the music of Twin Peaks 3, Daniel Dylan Wray attempts to articulate the role of the Roadhouse performances that end almost every episode:\nThe scenes, and the music within them, are used as a guide back toward something resembling reality, a reassuring embrace of the familiar following the rest of the show’s deeply disturbing and bizarre images. […] [O]nce you’re in the Roadhouse, you know you’re safe—relatively speaking, at least.\nWray recognises the Roadhouse’s liminality, as a gateway or antechamber between two worlds. He too suggests that the punters in the Roadhouse are somehow closer to ‘reality’ (closer to us) than the characters whose meandering ‘stories’ their appearance punctuates. But Wray’s gloss is ultimately unsatisfactory, begging more questions than it answers: How is music supposed to guide us back to reality? Beyond the superficial ‘familiarity’ that a music writer might feel when faced with ‘real-life’ musicians ‘playing themselves’, what is so ‘reassuring’, ‘safe’ or ‘real’ about musical performance? And why would a fictional text even want to ‘guide its viewers back to reality’ in the first place?\n\nAddressing these questions means turning our attention to Lynch the musicologist. Over the past few decades, the director has set out a unique psychosocial theory of music, subtly but powerfully articulated through the presentation of cinematic worlds. Lynchian worlds are almost always more ‘open’ to musical and sonic possibility than other cinematic worlds. The membrane between the fictional realm and the soundtrack that ‘accompanies’ it is more permeable; with their precarity and fluidity, these worlds are somehow ‘closer’ to an autonomous sonic realm. As boundaries collapse and identities blur, Lynch allows musical worlds to materialise onscreen.\n\nLynchian worlds are musical worlds. Like Mulholland Drive, Lost Highway and Blue Velvet, Twin Peaks is a musical.\n\nBut what kind of musical is Twin Peaks? To sketch a crude typology, we might identity two general modes of musical (although most musicals combine these two modes). In the first mode, ‘music’ doesn’t exist as such; it appears within the world of the musical as something other than itself (e.g., intense emotion, inner truthfulness, self-conscious performativity, the unreal logic of a dream or drug trip, etc.). In the second mode, ‘music’ exists but it is represented as having a magical extra-sonic ‘surplus’ (of efficacy, persuasion, seduction, truthfulness, ‘rightness’, etc.). Musicals of this second type are also always musicological texts, or more precisely, they are musical ethnographies. The world that they present involves an ideal identification with a particular musical culture, representing as tangible the ‘powers’ that this culture ascribes to music. Thus, the world of a rock musical might realise the potency, subversiveness and liberatory qualities that rock fans believe their music to possess. (For more on all this, check out my essay, 'Logics of Musical Worlds'.)\n\nTwin Peaks is a musical of the second type (where music appears in its world, it appears as music), and yet there are a couple of factors that complicate the picture. Firstly, the relative absence of narrativity in the series (and particularly in the Roadhouse scenes) obscures the particular function, power or necessity of this music. Secondly, as with most of Lynch’s ‘musicals’, there is a critical/deconstructive edge to his representation of musical magic. Unlike most musical heroes, Lynch’s protagonists aren’t musical ‘initiates’; they cannot ‘wield’ music as a tool to help them through their world. With the interesting exception of Fred in Lost Highway (and maybe Audrey in Twin Peaks, although this musicality distances her from Cooper and the audience), music is something used on and against the protagonists (and, by extension, the audience).\n\nThis makes Lynch’s musicals rather unusual, in that they are oriented around the listener rather than the producer (i.e., the position from which the vast majority of musical encounters are experienced in the ‘real world’). While many ‘musical ethnographies’ are essentially didactic—teaching the audience what music ‘is’, and thus how to listen to music—Lynch’s ‘ethnographies’ are more phenomenological in nature. Instead of showing us what music can do within a musical world, these texts consider what it means to encounter a musical world—how these ideologies of musical possibility intersect with ‘real’ phenomena—and what these encounters have to say about reality, fantasy, and the mutuality of these categories. Crucial to this project is, of course, the sheer instability of Lynchian worlds, whose logics are always incomplete and vulnerable to collapse. The resulting chaos of partial, mutually antagonistic worlds is an excellent reflection of the way in which music functions ‘in reality’.\n\nWhile there is much to be written on the topic of Lynchian musicology, I will limit my present discussion to two dimensions of musical ‘power’ at work in Twin Peaks 3, and the ways in which these contribute to its critical musical ethnography.\n\nIn my previous essay, I wrote about Twin Peaks 3 in terms of televisual performance art, and its deployment of a language of gesture (physical, vocal, linguistic, musical, visual, narrative, etc.). Live musical performance can be viewed as the performance of an idealised discourse of gesture. As a practice, it combines a number of distinct gestural vocabularies to give a performance of direct and spontaneous expression, abstracted from purposive (speech) action and yet suggestive of a more perfect communication than could be achieved with language alone. From the perspective of the listener, musical comprehension is experienced as intuitive, as understood directly, affectively and bodily, without the need for a translator.\n\nNevertheless, the impression of a perfect and spontaneous expressivity/communication within live musical performance requires both the performer and the listener to forget the fact of ‘the song’ (i.e., the fact that this ‘communication’ is only possible within a preplanned, artificially structured and autonomous region of space-time). As initiates of a listening culture, we have learned how to extract meaning and value from genred music, but as a live musical audience, we have also learned to forget this education, just as we ignore the distance between the song world and the real world. Tuning into the songworld, we surrender ourselves to the fantasy and allow its logic to structure our real, material sensations of intensity and pleasure.\n\nIn this way, the musical performances onstage at the Roadhouse are precisely analogous to my characterisation (in the last essay) of Twin Peaks 3 as an ‘exhibition’ in which interpretative strategies are pre-determined: an exhibition governed by a totalitarian curator-mediator, who forces you to look for a certain kind of meaning in each sign, even as that meaning is ultimately withheld. The possibility of meaning is similarly withheld in music: our culture tends to understand ‘live musical performance’ as a kind of pure doing, while the experience of music itself is as a flow of pure affect within the listener. There remains a mystical gap between these two processes, even as the ritual of live music keeps them bound together.\n\nThe Roadhouse performances thus distill the dynamics that regulate the show as a whole. In the past (most notably in Mulholland Drive) Lynch’s musical scenes have demystified this gap, exposing the disconnect between mimed performance and acousmatic sound, and the fantasy that synchronisation enables. Similarly, by juxtaposing the perfectly smooth ‘communication’ of the live music with the elusive, frustratingly deferred ‘communication’ of the show as a whole, we are made conscious of the contingency of the logics that structure our fantasies. At the same time, we are also aware of the meaninglessness of these performances: not only their apparent arbitrariness with respect to the rest of the show, but also the unproblematic incoherence of gestural ‘language’ within the song world in which the value/significance of these gestures is realised. While Daniel Dylan Wray might consider this reassuring—our partial return to a world in which we don’t have to worry about things not making sense—it could also be perceived as troubling: evidence of the ease with which we too can be seduced by fantasies that, like pop songs, don't really make sense (i.e., the relation between their ‘sense’ and that of ‘reality’ is obscure).\n\nThis leads me to the second dimension of musical power that music represents in Twin Peaks 3. This is the power of music and sound to ‘suture’ fragmented, incoherent and illogical phenomena, in order to present the cogency of such a world as affective fact, rather than something to deduce. I have previously argued that the experience of music is predicated upon a process of ‘dramaturgical listening’: sounds are distributed within an imagined ‘world’, as elements within an assumed totality to which they all belong. (Any sounds that don’t ‘belong’ are experienced as background noise or interference.) Thus the requirements of logic and cogency that are intrinsic to any notion of ‘world’ are also intrinsic to music’s being. In the construction of a (fictional) musical world—as occurs with any live musical performance, not least the representation of live music onscreen—this logic and cogency is ‘realised’ within this world. Thus, music is analogous to any other imaginary structure or discourse whereby the chaotic Real is given order and elements are distributed according to a deducible logic. The only difference is that, with music, we don’t need to deduce a constitutive logic because we can already feel its efficacy. This is the key to music’s ‘magic’ qualities when it appears in a musical world.\n\nThis is also the reason that audiences can tolerate a high degree of narrative and visual inconsistency in music video. Since the space-time of these cinematic worlds correlates very precisely to that of a song world, any volatile or fragmentary elements are easily sutured to the totality imagined by the song. It is my suspicion that mainstream audiences’ comparatively high tolerance for Lynch’s aesthetic idiosyncrasies has a lot to do with the ‘musicality’ of his work, in conjunction with our familiarity with music video.\n\nAs a result of this quasi-‘reification’ of ideology through music, Lynch’s musicals can attempt to represent fantasy from an exterior position, and thus deconstruct the phenomenological category of ‘world’ in a manner that is not possible in ‘naturalistic’ cinema (since such an ‘exterior’ position is not possible in human experience). His protagonists frequently brush up against the edges of their worlds, sensing the terrifying void that lies just beyond. These characters may also encounter other self-contained worlds in the form of enclosed musical moments, whose interior perfection is total yet impenetrable. What Betty and Rita witness in Mulholland Drive’s Club Silencio is a conjuring of musical worlds as bubbles of pure fantasy. As these bubbles are burst (‘There is no orchestra!’), Betty and Rita weep not only for the lost perfection of these illusions (and for their own fragile bubble), but also for their inability to escape such all-consuming fantasies. When Rebekah del Rio comes onstage, singing a cappella, we imagine that she (unlike the trumpeter before her) is actually singing: a master of her own musical world. Yet this too is a recording, something that both transcends her and contains her, even as it demands her total commitment and leads to her exhaustion and collapse.\n\nAs I wrote a while back, the original Twin Peaks was a town slumbering under a musical enchantment. Over the past 25 years, the music has drained out of this world, collecting in a pool at the end of each episode. The show is no longer sutured by Badalamenti’s irresistible soundtrack and the ever-present, evanescent voice of Julee Cruise. (Listen carefully and all you can hear is a strange ringing tone, coming from somewhere in the Great Northern Hotel.) Even within the Roadhouse, there are interiors and exteriors. While Cruise’s ‘The World Spins’ would once have reduced the whole audience to tears, now the characters in the booths, absorbed in their own impenetrable worlds of intrigue, cast wary glances at the swaying crowd.\n\nThe Roadhouse performances not only taunt and entice us with the image of a perfect gestural language, independent of meaning. They also let us glimpse the kind of enclosed, internally consistent and untroubled fantasy worlds that the rest of the show denies us. Furthermore, unlike in Club Silencio, these bubbles never burst. Thus, Wray is correct when he identifies these moments as reassuring. This reassurance does not, however, stem from an awakening into reality, but rather from a return to pure fantasy: to fall asleep, and dream, and forget that you’re dreaming.", "pred_label": "__label__1", "pred_score_pos": 0.7732018232345581} {"content": "Thou Parsec\n\nHow many Parsecs are in 10 You?\n\nPeople do ask questions such as 10 You are equal to how many Parsecs? The answer is 10 You are equal to 8.101948175013488e-21 Parsecs. You can also Convert 11 You to Parsec\n\nHow to Convert 10 You to Parsecs (thou to parsec)\n\nWe are going to use very simple Thou to Parsec conversion formula for that. By using our Thou to Parsec conversion tool, you know that one Thou is equivalent to 8.101948175013489e-22 Parsec. Hence, to convert Thou to Parsec, we just need to multiply the number by 8.101948175013489e-22. Pleas see the calculation example given below.\n\nConvert 10 Thou to Parsec 10 Thou = 10 × 8.101948175013489e-22 = 8.101948175013488e-21 Parsec\n\nWhat is Thou Unit of Measure?\n\nThou is a unit of measurement for length. It is also known as mil and is equal to one thousandth of an inch.\n\nWhat is Parsec Unit of Measure?\n\nParsec is a unit of measurement for length. Parsec is used to measure large distances to astronomical objects which are outside the solar system. One parsec is equal to 30856776000000 kilometers.\n\nThou to Parsec Conversion Chart\nThou [thou] Parsec [parsec]\n1 8.101948175013489e-22\n2 1.6203896350026977e-21\n3 2.4305844525040467e-21\n4 3.2407792700053954e-21\n5 4.050974087506744e-21\n6 4.861168905008093e-21\n7 5.671363722509442e-21\n8 6.481558540010791e-21\n9 7.29175335751214e-21\n10 8.101948175013488e-21\n100 8.101948175013488e-20\n1000 8.101948175013488e-19\nThou to Other Units Conversion Chart\nThou [thou] Output\n10 Thou in Angstrom equals to 2500000\n10 Thou in Astronomical Unit equals to 1.6515638031635938e-15\n10 Thou in Attometer equals to 250000000000000\n10 Thou in Barleycorn equals to 0.029526396598559112\n10 Thou in Cable equals to 0.0000013670166229221349\n10 Thou in Chain equals to 0.000012427423844746679\n10 Thou in Centimeter equals to 0.025\n10 Thou in Cubit equals to 0.00054680665\n10 Thou in Decimeter equals to 0.0025\n10 Thou in Digit equals to 0.013123359499999999\n10 Thou in Dekameter equals to 0.000025\n10 Thou in Ell equals to 0.00021872265966754156\n10 Thou in Em equals to 0.05905976848570754\n10 Thou in Fathom equals to 0.00013670166229221348\n10 Thou in Foot equals to 0.0008202099737532808\n10 Thou in Furlong equals to 0.000001242742384474668\n10 Thou in Gigameter equals to 2.5e-13\n10 Thou in Hand equals to 0.0024606299212598425\n10 Thou in Hectometer equals to 0.0000025\n10 Thou in Inch equals to 0.00984251968503937\n10 Thou in League equals to 5.17808286525e-8\n10 Thou in Light Year equals to 2.64250208506175e-20\n10 Thou in Line equals to 0.118108376245\n10 Thou in Link equals to 0.0012427423844746678\n10 Thou in Kilometer equals to 2.5e-7\n10 Thou in Meter equals to 0.00025\n10 Thou in Megameter equals to 2.5e-10\n10 Thou in Mile equals to 1.553427980593335e-7\n10 Thou in Mil equals to 9.84\n10 Thou in Microinch equals to 9842.52\n10 Thou in Micrometer equals to 250\n10 Thou in Millimeter equals to 0.25\n10 Thou in Nautical League equals to 4.4996400287976964e-8\n10 Thou in Parsec equals to 8.101948175013488e-21\n10 Thou in Picometer equals to 250000000\n10 Thou in Nanometer equals to 250000\n10 Thou in Nautical Mile equals to 1.349892008639309e-7\n10 Thou in Palm equals to 0.00328084\n10 Thou in Perch equals to 0.000049709695379999996\n10 Thou in Petameter equals to 2.5e-19\n10 Thou in Pica equals to 0.059055118000000004\n10 Thou in Point equals to 0.7086614175\n10 Thou in Pole equals to 0.0000497096955\n10 Thou in Rod equals to 0.00004970959653703067\n10 Thou in Rope equals to 0.000041010499999999996\n10 Thou in Scandinavian Mile equals to 2.5e-8\n10 Thou in Span equals to 0.0010936133\n10 Thou in Terameter equals to 2.5e-16\n10 Thou in Yard equals to 0.00027340332458442696\nConvert Thou to Other Length Units", "pred_label": "__label__1", "pred_score_pos": 1.0000089406967163} {"content": "KnowNow Cities for Developers & Owners\n\nKnowNowCities LogoKnowNow Cities consistently strives to deliver smart places that meet the spirit of the five key Smart City Ingredients that KnowNow Cities has identified that are core to a smart place.  Be that a building, a campus, a district or even a whole city.\n\nKnowNow Cities consulting provides for developers a service that dovetails with their existing process’ and approach to projects.  KnowNow Cities have mapped the demands that a smart city technology infrastructure project requires into the RIBA Plan of Work.\n\nWhat can you expect\n\nThis depends on when KnowNow Cities are engaged on a project.  Ideally as early as possible.   The advice KnowNow Cities gives clients is to consider our services when seeking advice on how a building, place or district want to use technology.  KnowNow can participate throughout the project lifecycle from concept phase through to fit out and beyond.\n\nKnowNow Cities can help developers identify firstly what does being ‘smart’ really mean.  How does this being ‘smart’ then equate to your vision of how a place will be lived and worked in?  What does this then look like in terms of technology and digital stuff?  This answers key questions such as:   So what types of network connectivity is required where; what will then be connected to these networks; and what type of thing will this then do or enable for whom.\n\nPrinciples Are Important\n\nAn important part of any smart city technology engagement is to understand the ‘principles’ of a place.  The owner/developer needs to shape these principles and lead the team that will scrutinise the technology plans.  Once these principles are agreed, alongside the previously determined building blocks the beginnings of an enterprise architecture for that place can now be formed.\n\nStandards Even More So\n\nThe backstop for any smart city is adherence to standards.  An important early phase is to clarify which standards are applicable to the principles that place has defined.  A starting point for KnowNow Cities is the BSI Smart City Standards.,\n\nWhere to Start\n\nThe starting point as with any engineering project are your requirements.   KnowNow Cities deciphers the your vision for a development and sets of requirements into tangible information technology components that can then be procured.\n\nThe next phase once those technology components are understood is to work out which ones go first.  Which are next and which are put on the future to do list.\n\nWhere Next?\n\nThe next step is to capture and understand your  vision for how that place should operate once the development is complete.   Where is the investment, what are the success factors and what are the outcomes that place wants to achieve (e.g. good air quality and economic activity).\n\nNote:  What is important is that technology aids urban design it should not lead urban design.\n\nBuilding Blocks\n\nThis phase identifies and prioritises the various technology building blocks that will be required.  This is at a very high level.  Identifying where common requirements exist, where requirements clash and where stakeholder agreements are common and where stress or tension needs to be resolved.   This could be for example in requiring access to certain types of data.\n\nIterative Process\n\nCreating a technology deployment blueprint and roadmap for a place is an iterative process.   This starts with client and stakeholder interviews.  Or harvesting existing output from earlier documented conversations.\n\nThe final part of this first phase is to gain agreement on the principles and standards of the smart city project and establish the governance mechanism for future architectural review and change management.\n\nThe first phase will typically take between 2 to 12 weeks to complete depending on the maturity of the information already available and the quality of stakeholder engagement.\n\nCreating your Blueprint\n\nThe second phase of the engagement is the creation of the actual concept technology architectures for that place.   KnowNow Cities use Enterprise Architecture methods and techniques to describe the\n\nThe starting point is to categorise the various different common requirements into common system descriptions.  The aim is to describe components or services in sufficient detail that could then be procured.\n\nOne of the iterative aspects of this phase is making the decision as to whether it is a product or a service that is to be procured.  Partly this is a reflection on current market trends/offers as well as technology capabilities to deliver.. e.g. clouds.\n\nIn terms of likely effort this depends on the number of categories that have been identified.  A rule of thumb is that each business process/area of outcome (set of use cases working together) will take between 5 days to 40+ days to fully solution.    This will be an iterative process.\n\nNote:  What is important to recognise in a smart city is the interdependency and interoperability that is required drives complexity.  A change in one component has a knock on impact for other components.  \n\nWhat to do with your Blueprint?\n\nOnce your smart place Technology Infrastructure Blueprint is created it can then be added to the standard build plan for that project/programme/development.    It is essential the technology infrastructure is deployed during a new build at the most opportune time.  This will maximise return on investment – for example when laying out the civil engineering infrastructure ensuring suitable ducting and space allocation is provided will be more cost effective if done right first time at the start of the build\n\nKnowNow Cities  can provide a number of different perspectives and views.   These could be roadmaps and Kanbans.\n\nThe blueprint will give the you confidence as the developer that the foundation technology infrastructure deployed will meet the your vision yet not break the bank.  This relates to a key KnowNow Cities principle which is to: “Design for Tomorrow but Deliver for Today”.\n\nNot all places are born smart..\n\nSmart Places are not always new builds.  Most smart city developments will be a retrofit.  A benefit of the KnowNow Cities approach is that the same techniques can create a survey of the existing technology infrastructure in a place as one of the 1st deliverables.  Then by understanding the new services and technology infrastructure to be deployed it is possible to create a change impact assessment that a new smart place will have on the existing technology infrastructure.    This can help de-risk projects, secure planning permission or highlight where further investment is required thus guaranteeing the your vision can be met.\n\nAn impact assessment and survey is a 5 day to multi-week engagement depending on the size of the place being surveyed and the requirements being assessed.\n\nHow do I work with KnowNow Cities\n\nKnowNow Cities welcomes the opportunity to work with developers or owners on new or existing smart city projects.\n\nKnowNow Cities has a flexible engagement approach.  Be it on a retainer, by project or on a day-rate.  We offer competitive rates, are liability insured and are members of the City Standards Institute.\n\nContact us via an email –", "pred_label": "__label__1", "pred_score_pos": 0.9176938533782959} {"content": "The basic method of operation angle cutting machine\n\n2019-05-09 11:44:01\n\nOne, operation time focus, strictly abide by the equipment operation procedure, to guarantee the operation safety.\n\nTwo, adjust the equipment before the first cut off the power supply.\n\nThree, on the basis of scale demand commodity specification, adjust, adjust to use special tools, be careful, Caution.\n\nFour, before the operation, feeder to adjust to the same line and parallel to the shaft and operation. According to the cutting board width, determined by plate and two slotted wheel, and each indentation roller bearing.\n\nFive, device thin knife, to compaction. Ensure that the blade curvature and slotted wheel radian together, the pressure plate screw.\n\nSix, adjust the bottom shaft knife, avoid excessive pressure. The blade and the cardboard touch after quietly intercept prevail. Micro adjustment, avoid to damage the knife and blade. After adjustment for, no special circumstances need not move again.\n\nSeven, before the start, the eradication of all items of equipment, check the fastener Is it right? Loose, the tension of chain Is it right? Moderate. Then the manual barring device view, knife and pressure feeding indentation roller Is it right? Suitable. No doubt after the unit staff with a good reception, ready to boot.\n\nEight, boot, to ensure that the oil level appropriate after exposure, the engine, low speed operation. Investigation of abnormal Is it right? Transformation. After each drive some completely smooth, and machine shift anomaly free movement, and then progress operation speed. Trouble immediately stop to repair.\n\nNine, before production, to pre trial production. After viewing a commodity, admitted to meet the demand, can be formally production. Production process, take note of the investigation. A similar trial production process, every five minutes once. That question immediately stop adjustment.\n\nTen, often see Is it right? Wear or does not meet the requirements of each component, if in doubt, timely repair or replacement.\n\nEleven, pay attention to the machine maintenance and smooth. 1 to ensure the oil tank oil level, and often drip. 2 feeder transmission block in each class of filling a 3 connecting gear often gas smooth. The first half of a work bearing repair to one year. Filled with calcium base grease.\n\nTwelve, the shaft to keep clean, regular oil scrub.\n\nThirteen, production is completed, according to the rules of procedure for shutdown. Cut off the power supply.\n\nWeb site:", "pred_label": "__label__1", "pred_score_pos": 0.9246968030929565} {"content": "Facebook and the Future\n\nFacebook has championed conversation and community. But Facebook advertising tools to flood Americans with misinformation and hate…\n\n\nIs Facebook a threat for publishers and readers?\n\nSocial media platforms are shadowing journalism, creating imminent threats for publishers and readers. This takeover has mainly gone unnoticed and unchecked in the public sphere. The news ecosystem has changed more dramatically in the past five years than perhaps at any time in the past 500. Chat apps, news bots, virtual reality, video streaming and messaging have changed the way people receive and interact with the news.", "pred_label": "__label__1", "pred_score_pos": 0.9999703764915466} {"content": "Adam and the Genome 3948\n\nArticle number: 9781587433948\nAvailability: In stock (1)\n\nenomic science indicates that humans descend not from an individual pair but from a large population. What does this mean for the basic claim of many Christians: that humans descend from Adam and Eve?\nLeading evangelical geneticist Dennis Venema and popular New Testament scholar Scot McKnight combine their expertise to offer informed guidance and answers to questions pertaining to evolution, genomic science, and the historical Adam. Some of the questions they explore include:\n\n- Is there credible evidence for evolution?\n- Do we descend from a population or are we the offspring of Adam and Eve? \n- Does taking the Bible seriously mean rejecting recent genomic science?\n- How do Genesis's creation stories reflect their ancient Near Eastern context, and how did Judaism understand the Adam and Eve of Genesis?\n- Doesn't Paul's use of Adam in the New Testament prove that Adam was a historical individual?\n\nThe authors address up-to-date genomics data with expert commentary from both genetic and theological perspectives, showing that genome research and Scripture are not irreconcilable. Foreword by Tremper Longman III and afterword by Daniel Harrell.\n\n0 stars based on 0 reviews", "pred_label": "__label__1", "pred_score_pos": 0.9827375411987305} {"content": "The pressure of air at high altitude is less than the atmospheric pressure at the sea level. Hence the boning point of water at a hill top\n\nA. is more than at sea level\n\nB. is equal to that sea level\n\nC. is less than at sea level\n\nD. depends on the surrounding temperature\n\n\nYou can do it\n 1. The stem of a vibrating tuning fork is pressed against a sound box. Then\n 3. How is it that Pluto is not always the farthest planet of the solar system?\n 4. The SI unit of electric current is\n 5. Which of the following is not electromagnetic waves?\n 6. Like magnetic poles\n 7. The scientist who first sent electromagnetic waves to distant places was\n 9. The number of galaxies that are visible without telescope on clear dark nights and away from bright…\n 10. The pressure of air at high altitude is less than the atmospheric pressure at the sea level. Hence the…\n 11. Solar radiation is preferred to other sources of energy because\n 12. Hot water is poured simultaneously in four metallic tumblers painted outside with different paints.…\n 13. Which of the following apparatus is used in the electrolysis of water?\n 14. The strength of an electromagnet can be increased by\n 15. A proton is\n 16. The direction of heat flow between two objects depends on\n 17. While crossing a suspension bridge, the soldiers are ordered to break steps because\n 18. In the visible spectrum which colour has the shortest wavelength?\n 19. Air escaping rapidly from a narrow orifice in an inflated tyre feels cool because\n 20. The completely dark portion of a shadow of an object is known as\n 21. The transistor was invented by\n 22. The sun continuously produces an enormous amount of energy. This la due to\n 23. In an electrical circuit, a fuse is connected\n 24. Of the following types of electromagnetic radiation which has the longest wavelength?\n 25. Which physical quantity is measured in watts\n 26. The attraction between similar molecules is called\n 27. Cosmic rays are\n 28. The hydraulic jack to lift heavy vehicles in automobile service stations is one of the applications…\n 29. The line on earth's surface passing through the places having zero dip is called the magnetic equator.…\n 30. The hygrometer is an apparatus used for finding the", "pred_label": "__label__1", "pred_score_pos": 0.8114084601402283} {"content": "South Korea Embarks on a Museum Building Boom, Aiming to Open 186 New Museums by 2023\n\n25 Junio 2019, Korea, Rep\n\nIs South Korea angling to become an international cultural hub? The Asian nation has unveiled a five-year plan designed to make its art and artifacts more accessible to the public, with its Ministry of Culture, Sports, and Tourism announcing an ambitious goal of opening an additional 186 museums by 2023.", "pred_label": "__label__1", "pred_score_pos": 0.9999415278434753} {"content": "live chat\nPhysical Therapist - Full Time Job in Avon, Ohio US\n\nPhysical Therapist - Full Time\n\nKindred Healthcare Operating, Inc. - Avon, OH\n\nPosted: 11/7/2019 - Expires: 2/5/2020\n\nJob ID: 213599459\n\nJob Description\n\nPhysical Therapist - Full Time  (374163-6793 )\n\nUH Avon Rehabilitation Hospital is a joint venture between University Hospitals and Kindred Healthcare, bringing together the expertise of both world-class organizations. Opened in January 2016, UH Avon Rehabilitation Hospital is focused on improving the functional status of our patients after an injury or illness with the goal of returning our patients home safely.\n\nOur Mission:\n\nTo improve the health, function and quality of life of the people in the communities we serve.\n\nOur Vision:\n\nTo be the rehabilitation provider of choice, by providing high-quality care resulting in excellent outcomes and high patient satisfaction.\n\nJob Summary:\n\nThe Physical Therapist (PT) assumes responsibility and accountability for a designated group of patients and provides physical therapy evaluations, modalities and treatments in accordance with established hospital and departmental policies and procedures, maintaining the highest degree of quality patient care.  Assists patients to reach their maximum performance and level of functioning, while learning to live within the limits of their capabilities.\n\nphysical therapist, physical therapy, physical therapy assistant, physical therapist therapy, physical therapy aide, home health physical therapist, Acute care, ADL, ADLs, ALF, Balance dysfunction, case management, case manager, clinical, clinic, clinical rotation, geriatric, geriatrics, Healthcare, health care, Homecare, home care, home health, homehealth, hospital, inpatient, inpatient PT, inpatient P.T., inpatient physical therapist, inpatient therapist, licensed therapist, licensed PT, licensed P.T., licensed physical therapist, modalities, neuro, neurological, ortho, ortho PT, ortho P.T., ortho therapist, ortho physical therapist, orthopedics, orthopedic, orthopedic PT, orthopedic P.T., orthopedic physical therapist, PT, P.T., physical therapist, physical therapy, DPT, doctorate PT, doctorate P.T., doctorate physical therapist, medical, medical care, therapist, therapy Care Manager, therapy case manager, therapy case management, therapy Job, therapy Jobs, PT job, PT jobs, P.T. job, P.T. jobs, physical therapy job, physical therapy jobs, physical therapist job, physical therapist jobs, Oasis, outpatient, outpatient clinic, out patient, outpatient rehab, outpatient PT, outpatient P.T., outpatient therapist, outpatient physical therapy, outpatient physical therapist, PRN, PDM, rehab, rehab PT, rehab P.T., rehab physical therapist, rehab setting, rehabilitative, therapeutic, safe strides, safe strides PT, safe strides P.T., safe strides physical therapist, skilled visit, SNF, sports med, sports medicine, sports med therapist, sports med physical therapist, sports medical physical therapist, subacute, sub acute, post acute, therapy, travel PT, travel P.T., travel therapist, travel physical therapist, traveling PT, traveling P.T., traveling physical therapist, rehabilitation services, rehabcare, hospital rehabilitation services, inpatient rehabilitation services, skilled rehabilitation services, IRF, HRS, SRS, RHC, RHB\n\n\n\nCurrent licensure as a Physical Therapist in the state.\nCurrent Basic Life Support/CPR Card.\n\n Tuesday-Saturday schedule\n\n\nJob Summary\n\nEmployment Type:\nFull Time Employee\nJob type:\nFederal Contractor\nSkill Based Partner:\nEducation Level:\nDoctoral degree\nWork Days:\nMon, Tue, Wed, Thu, Fri\nJob Reference Code\nLicenses / Certifications:\nDisplay Recommended WorkKeys®Recommended WorkKeys®:", "pred_label": "__label__1", "pred_score_pos": 0.7969551086425781} {"content": "Disclaimer of Liability\n\n\n\nWe believe JUST SLEEP mattresses have significant sleep and health benefits, however, it is not a medical device. Please consult with your physician prior to the use of JUST SLEEP products and if you have persistent or recurring headaches, insomnia, stiffness, back, spine or neck pain, or any other medical conditions including but not limited to surgical or other procedures performed on or to the head, neck, spine, or shoulders that may or may not require medical attention, special sleeping supports, sterile covers, C-PAP, or any number of other appliances. Also, by the use of or purchasing JUST SLEEP products, you further agree that under no circumstances shall Hall Innovations, LLC or its Affiliates be liable for any direct, indirect, incidental, special, or consequential damages that result from the use of or inability to use the products or merchandise purchased from Hall Innovations. The foregoing limitation of liability shall apply whether in an action of contract, negligence, or other tortious action, even if an authorized representative of Hall Innovations knows or should have known of the possibility of such damages. By purchasing or using JUST SLEEP products, you hereby acknowledge that this paragraph shall apply to all products and merchandise available from Hall Innovations. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, in such states liability is limited to the fullest extent permitted by law.\n\nAdditionally, nothing contained in the JUST SLEEP packaging, information or instructions for use is intended to be medical advice provided by either Dr. Raymond Hall, DC, Hall Innovations, LLC and/or any or all of its \"Affiliates\", i.e., it's employees, managers, agents, representatives, parent companies, subsidiaries or related entities, staff, representatives, or sales team affiliates. Neither Dr. Raymond Hall, DC, Hall Innovations, LLC or any of the aforementioned may be held responsible or liable for the diagnosis, treatment, advice or care of the consumer or any other parties as a result of such person’s purchase or use of JUST SLEEP products.", "pred_label": "__label__1", "pred_score_pos": 0.7520230412483215} {"content": "Challenges of pi in life of pi by yann martel\n\nIt was something that annoyed me from early on in the book — that the chapters seemed far too arbitrary and pointing it out at the end just made me more irritated.\n\n\nMy interpretation is that the tiger is actually God.\n\nThe film was a surprising success worldwide. Orange Juice, the peaceful orangutan, fights ferociously against the hyena. Administrative Staff Office Managers: Are you reading fluff but craving substance, or does your steady diet of Serious Literature have you yearning to lighten up a bit?\n\nTeachers understand that all good writing begins with good research, involving the gathering and evaluating of data, and then organizing that research into digestible, easy-to-manage chunks.\n\nLife of Pi\n\nTeachers must also show comprehension of grammar, spelling, and vocabulary to effectively teach students how to write.\n\nIt gives life to all things.\n\nBut Christians will love it — oh yeah — Christians will definitely love it. Inhe was selected as a member of the main competition jury at the Cannes Film Festival. You may feel burdened by worry, fear, or doubt. For ideas on what books to read, check out my picks for the Reading Challenge.\n\nThis takes so long and is so incidental to the story and written in such a cutesy way that I started to pray the boat would sink, the tiger would get him … I would even have accepted God smiting him at this point as a valid plotting point, even if or particularly because it would bring the story to an abrupt end.\n\nBut after failing the exam twice, to the disappointment of his father, he entered a three-year college, the National Arts School now reorganized and expanded as National Taiwan University of Artsand graduated in But, at their behest, he then provides an alternative version that is more realistic but ultimately less appealing to both himself and his questioners.\n\nBanff National Park Favourite Quote: There's a lot of talk in this country about the federal deficit. Dear reader, what do you want to be different in your reading life in ?\n\nThe 2017 Reading Challenge\n\nWe know reading is a very personal thing, and your reading list should reflect that. The success of Crouching Tiger demonstrated that Lee's artistry had a general appeal; it also inspired such established directors as Zhang Yimou and Chen Kaige to explore wuxia films for Western audiences.\n\nDuring this time, he was a full-time house-husband, while his wife Jane Lin, a molecular biologistwas the sole breadwinner for the family of four. Angry, jealous, vicious, hard to appease, arbitrary and something that takes up lots of time when you have better things to do — sounds like God to me. After the setback, Lee considered retiring early, but his father encouraged him to continue making movies.\n\nBrokeback Mountain[ edit ] Lee decided to take on a small-budget, low-profile independent film based on Annie Proulx 's Pulitzer Prize -finalist short story, Brokeback Mountain.\n\nPi Patel, lover of faith and various gods and their beliefs loses his family after a shipwreck and drifts on the Pacific Ocean with a zebra, hyena, orangutan and a tiger, Richard Parker each struggling in their own way to survive. The problem is how to remain artist once we grow up.Caruso \"During empathy one is simply 'there for' the other individual, when experiencing their own feelings while listening to the other, i.e.\n\nduring sympathy, the listener pays attention to something about themselves, and is not 'there for' the client.\".\n\n“The Patriots is a historical romance in the old style: multigenerational, multi-narrative, intercontinental, laden with back stories and historical research, moving between scrupulous detail and sweeping panoramas, the first-person voice and a kaleidoscopic third, melodrama and satire, Cleveland in and Moscow in Ang Lee OBS (Chinese: 李安; pinyin: Lǐ Ān; born 23 October ) is a Taiwanese film director and screenwriter.\n\nLee's work is known for its emotional charge, which critics believe is responsible for his success in offsetting cultural barriers and achieving international recognition.\n\n\"After Rain\" by William Trevor Trevor was born (in ) and brought up in rural Ireland but has lived in Devon, England since the s. Although he has written novels, he is best known for his short stories and he is widely regarded as one of the greatest contemporary. In the novel Life of Pi by Yann Martel, the motif of religion conveys the author’s message that with religion one can overcome any challenge.\n\nOne way the motif of religion is developed is through the element of detail in the novel. Teachers must instruct students about the reading process to ensure they develop more critical reading skills. This reading process involves gaining background information on a text, actually reading a text (which develops a basic understanding of material), and the re-reading of a.\n\nChallenges of pi in life of pi by yann martel\nRated 0/5 based on 59 review", "pred_label": "__label__1", "pred_score_pos": 0.9071642160415649} {"content": "Show Summary Details\n\nPage of\n\n\ndate: 10 December 2019\n\nSummary and Keywords\n\nA fundamental question in epistemological philosophy is whether reason may be based on a priori knowledge—that is, knowledge that precedes and which is independent of experience. In modern science, the concept of innateness has been associated with particular behaviors and types of knowledge, which supposedly have been present in the organism since birth (in fact, since fertilization)—prior to any sensory experience with the environment.\n\nThis line of investigation has been traditionally linked to two general types of qualities: the first consists of instinctive and inflexible reflexes, traits, and behaviors, which are apparent in survival, mating, and rearing activities. The other relates to language and cognition, with certain concepts, ideas, propositions, and particular ways of mental computation suggested to be part of one’s biological make-up. While both these types of innatism have a long history (e.g., debate by Plato and Descartes), some bias appears to exist in favor of claims for inherent behavioral traits, which are typically accepted when satisfactory empirical evidence is provided. One famous example is Lorenz’s demonstration of imprinting, a natural phenomenon that obeys a predetermined mechanism and schedule (incubator-hatched goslings imprinted on Lorenz’s boots, the first moving object they encountered). Likewise, there seems to be little controversy in regard to predetermined ways of organizing sensory information, as is the case with the detection and classification of shapes and colors by the mind.\n\nIn contrast, the idea that certain types of abstract knowledge may be part of an organism’s biological endowment (i.e., not learned) is typically met with a greater sense of skepticism. The most influential and controversial claim for such innate knowledge in modern science is Chomsky’s nativist theory of Universal Grammar in language, which aims to define the extent to which human languages can vary; and the famous Argument from the Poverty of the Stimulus. The main Chomskyan hypothesis is that all human beings share a preprogrammed linguistic infrastructure consisting of a finite set of general principles, which can generate (through combination or transformation) an infinite number of (only) grammatical sentences. Thus, the innate grammatical system constrains and structures the acquisition and use of all natural languages.\n\nKeywords: nativism, empiricism, rationalism, behaviorism, development, maturation, cognition, learning, linguistic theories, language acquisition\n\n\nPlease subscribe or login to access full text content.\n\n", "pred_label": "__label__1", "pred_score_pos": 0.901064395904541} {"content": "Skip to Main Content\n\n\nWe conducted a detailed rock magnetic and mineralogical study of bole beds from the Deccan magmatic province, India. Magnetic susceptibility of 15 bole beds showed two contrasting patterns, with susceptibility values either increasing or decreasing up the profile. We then focused on two representatives red boles located in the Western Ghats, the RBB and RBAN profiles, to unravel the nature and origin of these contrasting magnetic susceptibility patterns. The presence of smectite argues against significant secondary thermal alterations. Major-elemental compositions obtained by X-ray fluorescence spectrometry of RBB and RBAN red boles are comparable to the parent basalt and show significant and typical depletion of mobile elements such as sodium and calcium compared to the parent basalt. The Ti/Al ratio of both the red boles and their overlying clay layers is close to the typical value of Deccan basalt (0.2), suggesting that the material of the red boles has been derived from weathering of the parent basalt. The chemical index of alteration varies from 40–50 in the parent basalt to 80–90 at the top of the bole beds, consistent with moderate to intense weathering of the bole beds. However, similar to other Deccan bole beds, indices of lateritization below 50 suggest that the state of lateritization has not been reached. Although the RBB and RBAN profiles share similar mineralogical signatures, their magnetic mineral assemblages are distinctly different. In the RBB profile, magnetic susceptibility decreases up-profile as a result of oxidation/dissolution of primary titanomagnetite inherited from the parent basalt, with subsequent formation of pedogenic hematite and superparamagnetic particles. In contrast, magnetic susceptibility in the RBAN profile, which contains magnetite, some hematite, and goethite, increases up-profile. The increase in the magnetic signal is mainly due to the increasing amounts of phyllosilicate and goethite, while the content of magnetite and hematite remains constant along the profile. We attribute the variation in the magnetic mineral assemblage to contrasting humid and dry environments during weathering, leading to the preferential formation of goethite or hematite, respectively. The combined mineralogical and rock magnetic data suggest the existence of a single weathering profile involving soil formation in the two studied red boles, with few or no contributions from an external source.\n\nYou do not currently have access to this chapter.\n\nFigures & Tables\n\n\n\n\n\nCiting Books via\n\nClose Modal\nThis Feature Is Available To Subscribers Only\n\nSign In or Create an Account\n\nClose Modal\nClose Modal", "pred_label": "__label__1", "pred_score_pos": 0.6661071181297302} {"content": "A scanning electron microscope (SEM) is a type of electron microscope that produces images of a sample by scanning the surface with a focused beam of electrons. The electrons interact with atoms in the sample, producing various signals that contain information about the surface topography and composition of the sample. The electron beam is scanned in a raster scan pattern, and the position of the beam is combined with the detected signal to produce an image. SEM can achieve resolution better than 1 nanometer. Specimens are observed in high vacuum in conventional SEM, or in low vacuum or wet conditions in variable pressure or environmental SEM, and at a wide range of cryogenic or elevated temperatures with specialized instruments.[1]\nBackscattered electrons (BSE) consist of high-energy electrons originating in the electron beam, that are reflected or back-scattered out of the specimen interaction volume by elastic scattering interactions with specimen atoms. Since heavy elements (high atomic number) backscatter electrons more strongly than light elements (low atomic number), and thus appear brighter in the image, BSEs are used to detect contrast between areas with different chemical compositions.[14] The Everhart-Thornley detector, which is normally positioned to one side of the specimen, is inefficient for the detection of backscattered electrons because few such electrons are emitted in the solid angle subtended by the detector, and because the positively biased detection grid has little ability to attract the higher energy BSE. Dedicated backscattered electron detectors are positioned above the sample in a \"doughnut\" type arrangement, concentric with the electron beam, maximizing the solid angle of collection. BSE detectors are usually either of scintillator or of semiconductor types. When all parts of the detector are used to collect electrons symmetrically about the beam, atomic number contrast is produced. However, strong topographic contrast is produced by collecting back-scattered electrons from one side above the specimen using an asymmetrical, directional BSE detector; the resulting contrast appears as illumination of the topography from that side. Semiconductor detectors can be made in radial segments that can be switched in or out to control the type of contrast produced and its directionality.\nSample preparation can be minimal or elaborate for SEM analysis, depending on the nature of the samples and the data required. Minimal preparation includes acquisition of a sample that will fit into the SEM chamber and some accommodation to prevent charge build-up on electrically insulating samples. Most electrically insulating samples are coated with a thin layer of conducting material, commonly carbon, gold, or some other metal or alloy. The choice of material for conductive coatings depends on the data to be acquired: carbon is most desirable if elemental analysis is a priority, while metal coatings are most effective for high resolution electron imaging applications. Alternatively, an electrically insulating sample can be examined without a conductive coating in an instrument capable of \"low vacuum\" operation.\n\n\n\n\n\n\n\n\n", "pred_label": "__label__1", "pred_score_pos": 0.8924008011817932} {"content": "1 removalist in Mount Vincent and surroundings\n\nBelow you can find a list of all removalists that are situated in Mount Vincent and its surrounding area. Please click on a specific mover to acquire detailed information of that moving company, including experiences, complaints and reviews. If you have had experiences with a moving company, please share it with us by submitting a review. Doing so you help other people to make the right decision.\n\n\nAre you looking for reviews of a removalist?\n\n\nShow all\n\nDoug Kirk Removals\n\n0.0 out of 0 reviews\nMount Vincent", "pred_label": "__label__1", "pred_score_pos": 0.9980579018592834} {"content": "[R-sig-ME] Plans for lme4-1.0\n\nDouglas Bates bates at stat.wisc.edu\nSat Dec 13 20:23:21 CET 2008\n\nThe discussion of the quasi families in the thread \"Re: [R-sig-ME]\nsingle argument anova for GLMMs (really, glmer, or dispersion?)\" has\nhelped to clarify my thinking about the types of models that I plan to\nbe able to fit in the 1.0 release of lme4. I know this won't include\nevery model that users would like to be able to fit but I hope it will\ninclude some useful models. (Ben mentioned George Box's famous quote\nabout models. The complete quote is \"All models are wrong; some\nmodels are useful.\")\n\nThe model is defined by the conditional distribution of the response\ngiven the random effects, (Y|B=b) in my notation, and the\nunconditional distribution of the random effects. The\nlmer/glmer/nlmer functions are based on a multivariate Gaussian\nunconditional distribution of the random effects with E[B] = 0 and\nVar(B) = \\Sigma(\\theta). That is, the covariance matrix of the random\neffects is a parameterized, positive semidefinite, symmetric matrix.\nThe parameters, \\theta, determine the left Cholesky factor,\n\\Lambda(\\theta), of \\Sigma(\\theta), for conditional distributions\nwithout a common scale parameter, or \\Sigma(\\theta)/\\sigma^2, for\nconditional distributions, such as the Gaussian, with a common scale\nparameter, \\sigma.\n\nThe conditional distribution, (Y|B=b), must satisfy\n\n 1) The scalar conditional distributions are independent and from the\nsame distribution family.\n\n 2) The scalar conditional distributions are completely determined by\nthe conditional mean and, at most, one additional parameter which can\nbe expressed as a common scale parameter.\n\n 3) The vector of conditional means, \\mu, depends on b only through\nthe linear predictor \\gamma = Z\\beta+Xb\n\n 4) The map from \\gamma to \\mu is multi-diagonal (explained below) and\ncan be expressed as\n\n \\gamma -> \\eta -> \\mu\n\nwhere \\eta -> \\mu is the vectorized inverse link function for a glm\nfamily. This is a diagonal map in the sense that the Jacobian matrix\nfor the map is diagonal because the i'th element of \\mu depends only\non the i'th element of \\eta. Furthermore, the vector-valued link and\ninverse link functions are based on a common scalar link or inverse\nlink. (In other words, if you have a logit link for one element of\n\\mu, you must have the logit link for all elements of \\mu.)\n\nThe map from \\gamma to \\eta has a similar property except that the\ndimension of \\gamma can be a multiple, s, of n, the dimension of \\eta,\nso the Jacobian matrix d\\eta/d\\gamma will be of dimension n by ns.\nThis matrix must be the horizontal concatenation of s diagonal\nmatrices and they must be generated by a single model function, m,\nmapping an s-dimensional vector to a scalar.\n\nThe nonlinear model in nlmer defines the map from \\gamma to \\eta. The\nglm family defines the map from \\eta to \\mu and also defines the\nconditional variance (up to a constant). The conditional variance\ndetermines the weights in the iteratively reweighted least squares\n\nBy factoring the model this way it is clear what information must be\nevaluated and retained and how one would define a generalized\nnonlinear mixed model, which I think will have widespread application\nin psychometrics and other areas.\n\nThe map shown above takes b to \\mu through \\gamma and \\eta and allows\nus to evaluate the Jacobian of this map. However, that is not the\nfull story. We introduce another vector of random effects called U\nwith a spherical Gaussian marginal distribution. That is, E[U] = 0\nand Var(U) = \\sigma^2 I (the name \"spherical\" comes from the fact that\nthe contours of constant density are spheres) and define B =\n\\Lambda(\\theta) P' U where P is a fixed permutation matrix derived\nfrom the pattern of nonzeros in Z. P has no effect on the statistical\ntheory but is very important in the computation.\n\nNow the effects of all the parameters in the model are incorporated\ninto the map from u to \\mu and we can evaluate the conditional modes\nof U and the conditional estimates of \\beta and \\sigma, given \\theta\nthrough a penalized iteratively reweighted least squares (PIRLS)\nalgorithm. This, linear or nonlinear, weighted least squares problem\nmay involve a huge number of variables but the penalty part makes it a\nvery well conditioned problem. Furthermore, the Jacobian matrix\nd\\mu/d u is very sparse. This is where the sparse matrix methods come\nin. The sparse Cholesky factor of a matrix derived from d\\mu/d u\nprovides the conditional covariance matrix for U given Y from which\nthe Laplace approximation to the deviance is derived.\n\nAlthough this may seem like a very long-winded explanation (I seem to\nbe prone to offering long-winded explanations) the point that I want\nto highlight is that the restrictions on the model form, in particular\nthe assumption of a Gaussian unconditional distribution for the random\neffects, B, are not made frivolously. This assumption is central to\nthe computational method using PIRLS. In models with many random\neffects in potentially complex structures you must be able to deal\nwith the random effects efficiently and the PIRLS algorithm combined\nwith sparse Cholesky factorization does that.\n\nThe code in the allcoef branch makes the central role of PIRLS more\nexplicit. The name \"allcoef\" comes from the fact that all the\ncoefficients (u and \\beta) in the linear predictor, \\gamma = Z\n\\Lambda(\\theta)P'u + X\\beta, are optimized in the PIRLS step. In the\ncurrently released version of lme4 u and \\beta are jointly optimized\nfor linear mixed models but only u is optimized in this step for\ngeneralized linear mixed models and nonlinear mixed models.\n\nIt is still the case that only the brave or foolhardy should try the\ncode in that branch. I'm gradually cleaning it up but there are still\nmany parts that are not working. In particular mcmcsamp is not\ncurrently working in that branch. My goal is to get mcmcsamp stable\nand to get all the other parts working in this branch then release it\nfor testing and finally release lme4-1.0. The subtext in that message\nis that only the models I describe above will be fit by the lme4-1.0\n", "pred_label": "__label__1", "pred_score_pos": 0.8464739322662354} {"content": "An autobiography came from the Greek word autos, which means self, bios, which means life, and graphein, which means to write. In a simple explanation, autobiography is when you learn how to write a life story about yourself. It is a narrative of your story, written in your voice, and seen in your perspective. If we’re talking about a company you should know that stories about company success are becoming more and more important today. To learn more about it go to corporate story biography writing.\nMany people cannot resist the temptation to tell as much as they can, but a longer piece of writing doesn’t always equal a better piece of writing. For whatever reason you are writing the autobiography, think of the person who is going to read it. Imagine you were an admission officer or the judge in the scholarship committee, and you have to choose from hundreds, if not thousands, of autobiographies. At some point you will hate people who prefer to write long admission essays and autobiographies. There’s also a good way to check whether your writing is interesting or not. Give it to one of your most impatient friends, who prefers short articles to books and long stories, and ask for their opinion.\n\n\nToday I am lucky. I came out of my routine, finding out solutions for mysilly problems. At this age, I am wasting my time, a large part of it, into finding solutions for unnecessary issues. Today I made my first positive step and came to this wonderful and resourful blog post. The post is humarous, real, motivational and touching. I will keep coming to this blogs daily and spend a couple of hours on similar blogs.\n\nThe autobiography is the longest and the fullest story about yourself. You can write it for your personal use in order to structure and perpetuate your memories. If you are sure that your life will be an interesting theme to read about, you may create an autobiography for the wider public. An autobiography covers the period from the day of your birth until today. If you think that your life journey will be a good example for others, include the information on how you have achieved your goals and success and how you got your autobiography published.\nWriting an autobiography for a high school or a college English class can help you gain a deeper sense of personal identity. An autobiography allows you to tell your story in a way that reveals truths about your values, goals and dreams. Though there's no exact science to writing an autobiography, you should include information about your background, major events that shaped who you are and any core themes in your life. Include specific examples to help readers understand your life history.", "pred_label": "__label__1", "pred_score_pos": 0.9984296560287476} {"content": "Should Christians be capitalists?\n\nJay W. Richards answers common questions about money, greed, and God.\n\nMany thought the debate of free market versus communism ended when the Soviet Union fell. The resurgence in communism’s popularity suggests otherwise, and many Christians are left wondering if communism aligns with Christian faith and if the free market is as savage as media and popular culture often assert.\n\nRead on for key insights from Jay W. Richards’s Money, Greed and God.\n\nWe summarize the key ideas from new and noteworthy nonfiction. Join our free email list to get fresh insights sent directly to your inbox.\n\nEven more than it’s maligned, the free market is misunderstood.\n\nIt’s not difficult to make a punching bag out of capitalism. Plenty of people make it the whipping boy for all of our social maladies. Volkswagen doctored emission reports. Apple schedules obsolescence of its devices so you have to buy newer, more expensive ones. Facebook doesn’t do a great job protecting its users’ privacy. Oil companies sully landscapes, disrupt ecosystems, and stall the development of alternative fuel sources.\n\nEven if you chalk these claims up to media bias, we see the effects of the free market everywhere. We leave mortgaged or rented homes that we’ve furnished in our preferred ways, get into our cars, and drive to a job where we’re paid to provide goods and services for which others are willing to pay. All along the drive are billboards that blot the landscape and compete for our attention. Factories occasionally shut down, leaving hundreds or sometimes thousands of people jobless. Our bosses want wider profit margins. We carry our wallets with us everywhere. And who can resist poking around on Amazon when there’s a Prime deal?\n\nThe media’s frequent denouncements of capitalism are not surprising. But with growing frequency, Americans hear similar critiques from the pulpit. Pastors aren’t going out of their way to extol the calling to the business world, and parishioners feel caught between a rock and a hard place, wondering if their lives are dissonant with the gospel. Are they complicit in the corrupt system, even if they’re just trying to get by? Adding to the drama is the prosperity gospel, which equates the blessed life of a Christian with material enrichment. God wants us to be loaded, Joel Osteen and others tell their congregants. This, then, becomes particularly useful fodder for left-leaning Christians who equate capitalism with greed. \n\nUnderstandably, this all leaves people wondering whether Christian faith and capitalism can coexist. After all, on the face of it, free markets seem at odds with Jesus’ warnings and indictments:\n\n“You cannot serve both God and mammon.”\n\n\n“Don’t store up for yourselves treasures on earth where moth and rust destroy and thieves break in and steal.”\n\n\nSoviet defector Ayn Rand was a stalwart advocate of capitalism, but she also saw loving your neighbor as a slippery slope to communism. You couldn’t find a person more suspicious of altruism. It was in the 1980s, at the zenith of Ayn Rand’s heyday, that stock trader Ivan Boesky gave his infamous commencement address at Harvard, in which he called greed “healthy,” insisting that, “you can be greedy and still feel good about yourself.”\n\nIf this is capitalism, then it finds no home in the Christian faith. But free market principles are not inextricably linked to greed or consumerism and grinding down the poor. The free market economy leaves plenty of opportunity for generosity, the possibility of simplicity, and escape from poverty.\n\nThe term “capitalism” that Marx coined is too baggage-laden to try defending.\n\nWhat do the words “Quaker,” “Christian,” and “Big Bang” all have in common? They were originally coined by their opposition, intended to be pejorative. The same is true of “capitalism,” a term that Karl Marx himself created.\n\nIf we really care about truth and justice, it makes sense to really understand economics rather than being content with just knocking down caricatures. More than deep feelings of concern or sympathy, this process of evaluation requires thinking. But those who dig might find, as the author did (once a socialist sympathizer) that the horrible images the word “capitalism” conjures are a far cry from basic free market economics. \n\nTacking on “ism” to the end of any word gives it an ideological flavor, which is something to be avoided, especially when talking about an economic system, which is just that: an economic system. It’s not an all-encompassing worldview, nor does it comprise the totality of the society.\n\nIt’s no use trying to reclaim a word like capitalism. Market economy, free market, and free enterprise are far better, more accurate terms.\n\nThe church in Acts 4 emerged from a very particular context and should not be taken as normative.\n\n\nActs 4:32-35 \n\nSome people read the story of the early church and wonder if Christian and Marxist ideals aren’t that different. While there might be some prima facie similarities, they are actually worlds apart. What’s glaringly absent from Luke’s narrative is talk of class warfare or insinuations that private property is evil. What was given was given freely.\n\nAnother significant difference is that the State is nowhere to be seen in the story. Nothing had been nationalized, nothing seized for redistributive purposes. It was the Church at work—not the State.\n\nWhen the apostle Peter confronts Ananias and Sapphira, the grievance is not that they gave most of their money instead of all of it, but that they’d lied about how much they’d given. Peter even tells the couple that they had every right to keep their property and the proceeds from its sale. “Didn’t it belong to you before it was sold? And after it was sold, wasn’t the money at your disposal?”\n\nIt’s also important to bring in the historical context of the Acts 4 community. Their togetherness was the result of an extraordinary set of circumstances. The brand new community of believers was comprised of Jewish people who’d come to Jerusalem from all over the world. It was an experience born of necessity, as locals stepped in to support the process of teaching the new believers before they returned to their homelands. Maybe the community was together for half a year or more, but it wasn’t a sustainable endeavor, and possibly was never intended to be the new norm. After all, the apostle Paul later exhorts churches to “earn their own living” and that “anyone unwilling to work shouldn’t eat.”\n\nPaul gives no indication that the post-Pentecost experience was one to be emulated everywhere. Some Christian groups over the centuries have continued the experiment of living communally. Most fall apart, and the ones that don’t (some monasteries, for example), are usually tiny and volunteer-based.\n\nIn fact, one such attempt was Plymouth Colony in Massachusetts in the early 1600s. William Bradford of Thanksgiving lore originally arranged for all the farmland held in common. Labor and food were distributed as evenly as possible, but then conflicts emerged. Bradford described in his journal what economists today call the “free-rider problem.” Animosity grew as the industrious settlers picked up the slack of those who didn’t contribute. Bradford reported that the matter was resolved when the farm was divvied up among the families. The surplus that had become a shortage during the communal farming days soon returned to a surplus. \n\nCompared to a non-existent Utopia, capitalism definitely falls short.\n\nThere is a glaring gap between rhetoric and reality. When making the case for communism and socialism, there’s far more talk about potential future good than the unintended-but-very-real consequences repeatedly revealed in history when communism is attempted.\n\nCompared to Nirvana, or some idealized but never-before-seen society, capitalism definitely misses the mark, but so will any other form of society when the standard of comparison is so high. If perfection is the expectation, working for wages begins to look like slavery and competition in a marketplace begins to look pretty Darwinian.\n\nThe United States definitely can’t compete with the kingdom of God, but that’s not the right question to be asking. On-the-ground societal realities should be compared to other on-the-ground societal realities. A fairer comparison than with Paradise would be with Cambodia, the Soviet Union, Venezuela, or North Korea.\n\nIn the twentieth century, communism’s track record is crystal clear:\n\n65 million Chinese dead\n\n20 million Russians and Eastern Europeans dead\n\n2 million North Koreans dead\n\n2 million Cambodians dead\n\n150,000 Latin Americans dead\n\nThese deaths were not the result of wars with other nations. The regimes slaughtered their own citizens. As these experiments involving flesh-and-blood humans rather than abstractions have shown us, the cost of chasing a society that is perfectly equal is horrifyingly high.\n\nThose who use the pie metaphor to explain the have-to-have-not ratios forget that the pie can grow.\n\nWhat do we make of the fact that there are a few who have an unprecedented degree of wealth while others still live in poverty? Such observations elicit emotions ranging from white-hot indignation to a more staid, pious concern. Worrying, as one culture critic has pointed out, has become a chief virtue in the developed world. We feel better about ourselves when we feel bad.\n\nMany Christians, too, view inequality as a telltale sign of a sick, morally bankrupt society. Why does poverty remain in a country so rich? Among many other Christian leaders, Jim Wallis, Pope Francis, and even Pope John Paul II, who was far from socialist, have criticized the free market and connected it to poverty. The axiom that many take for granted is that not only are there some super rich and others super poor, but that the rich are rich at the expense of the poor. The adage that, “The rich are getting richer and the poor are getting poorer,” plays on loop in news cycles and university classrooms, but that doesn’t make it any more true.\n\nThe pie analogy is often brought up to give concrete expression to the injustice of it all. A hefty portion of the pie is heaved onto the wealthy man’s plate. The remaining scraps are put on the poor man’s. The economy is far more dynamic than this analogy implies, however. Better approximating the true state of economic affairs would be a pie that’s able to shrink or grow over time.\n\nThe pie’s size is not static. Neither is the economy. Growth over time is possible and has been a consistent trend for hundreds of years now. This growth is not in spite of capitalism but because of capitalism. The free market economy has been the vehicle through which millions have been catapulted out of poverty. The zero-sum pie analogy can’t accommodate the possibility of wealth creation.\n\nWealth is not the problem—poverty is.\n\nWhat do we mean when we use the word “poverty”? One important distinction that is often overlooked in the rhetoric is relative poverty versus absolute poverty. Elon Musk, for example, makes far more than most of us. We’re relatively poor compared to Musk, and yet most of us have enough and maybe even more than enough. \n\nThose Americans who are considered poor today are fabulously rich compared to most people throughout history and most people in the world today. As of 2011, the US Census Bureau found that of the 30 million citizens considered poor, the typical household had a car, air-conditioning, two TVs, cable and/or satellite. The majority were not hungry, had access to medical attention as needed, and had more living space than many middle class Europeans.\n\nThe typical American living in poverty is in a very different position than someone experiencing absolute poverty, where people’s basic needs like shelter, food, or clothing are not satisfied.\n\nIn the early 2000s, the United Nations, World Vision, and other organizations compiled some staggering statistics, like 1 billion people living on less than a dollar a day, and 2.8 billion people living on less than two dollars a day. Another statistic frequently brought up was that the three wealthiest people control more wealth than 600 million of the poorest poor. What does a figure like this imply? What’s not said, but what many people read into this statement, is that Bill Gates should not have that much money, that if he weren’t so loaded, the 600 million wouldn’t be as destitute, or even that Gates is swiping money from the world’s poor.\n\nIf we have the means to alleviate absolute poverty, we should definitely do something. But most of the rhetoric about gaps reveals ignorance about basic economics. Chasing gaps is like chasing ghosts. The gap rhetoric is a distraction from 1) the vast improvements over the last 150 years and even just the past decade, and 2) from the truly needy, and absolutely impoverished. Just because a gap has widened doesn’t mean that the poor have become poorer; it could be an indication that wealth for all has risen and that rich and poor alike have grown wealthier—even if at differing rates.\n\nAbsolute poverty is on its way to being eradicated. In 1970, 38 percent of the world lived in absolute poverty. In 1990, that number was down to 26 percent. In 2019, the absolute poor numbered 750 million, which is a lot, but proportionally, is less than 10 percent of the world’s population. 200 years ago, you couldn’t find close to 10 percent who weren’t living in absolute poverty. The World Bank predicts that absolute poverty will drop to zero percent by 2030.\n\nSo the real shock is not that there is a gap between rich and poor. For a long time almost everyone was poor. What is shocking is how many people have risen out of absolute poverty in just a few centuries. Wealth is not the problem—poverty is. And in the places where it still exists and cripples, the best hope for them is wealth creation—not decrying the gap. The gap is a decoy that gives us an opportunity to feel better about ourselves by showing outrage, but it will fail to help the poor.\n\nThis newsletter is powered by thinkr, a smart reading app for the busy-but-curious. Start a free trial to access thousands of key insights from new and noteworthy nonfiction.\n\nTry Thinkr Free", "pred_label": "__label__1", "pred_score_pos": 0.6051005721092224} {"content": "In landers06 's collection\nQuimby the mouse by Chris Ware - Sketch\n\nQuimby the mouse\n\n\nAbout Chris Ware\n\nFranklin Christenson \"Chris\" Ware (born December 28, 1967), is an American cartoonist known for his Acme Novelty Library series (begun 1994) and the graphic novels Jimmy Corrigan, the Smartest Kid on Earth (2000) and Building Stories (2012). His works explore themes of social isolation, emotional torment and depression. He tends to use a vivid color palette and realistic, meticulous detail. His lettering and images are often elaborate and sometimes evoke the ragtime era or another early 20th-century American design style. Ware often refers to himself in the publicity for his work in self-effacing, even withering tones. He is considered by some critics and fellow notable illustrators and writers, such as Dave Eggers, to be among the best currently working in the medium\n\n\n • #mouse\n\nTo leave a comment on that piece, please log in", "pred_label": "__label__1", "pred_score_pos": 0.9055884480476379} {"content": "Pushing force calculations\n\nSuppose I have a gearbox ratio, robot weight, motor stall torque, wheel radius, and wheel coefficient of friction. How do I calculate the pushing force of said robot? I.e. if I were to take that robot and drive it against a scale at full power, what would the scale read? My current calculation is Motor Stall Torque * Number of Motors * Gear Reduction * Drivetrain Efficiency / Wheel Radius, but the results from this don’t seem correct. Did I do something wrong?\n\nAdditionally - What happens if I have stats for 2 robots? Can I calculate if one would push the other, assuming they were both running at full speed? If so, could I calculate the speed it would push the other robot at?\n\nI’m not knowledgeable enough to tell you the answer to the first part, but I can definitely tackle these questions. Yes, you can calculate which one would push the other - force is a vector, after all. If you assume they’re pushing straight on, the robot producing the larger force will be the one pushing the other. Since Force = Mass x Acceleration, you would have to know the mass of your robot to find the acceleration of it. From there you could calculate the pushing “speed” (you would need to assume the time spent pushing, as Speed = Distance/Time).\n\n1 Like\n\nI didn’t see terms for coefficient of friction, nor for current limiting to the motors (possibly reducing stall torque).\n\nThe best way to calculate this is to get a scale, and measure it :slight_smile:\n\n\nCorrect me if I’m wrong - I thought that CoF was needed to find the maximum traction force, and that the maximum “pushing” force of a robot can only go up to the point where the wheels begin to slide. I.e. Maximum Pushing Force = min((Motor Stall Torque * Number of Motors * Gear Reduction * Drivetrain Efficiency / Wheel Radius), (Robot Weight * CoF)).\n\nYou’re not wrong, but you did NOT place any factor for coefficient of friction in your initial setup. Failing to do that means that we’re going to ask about it.\n\nYour first equation gives you the available force at the wheel-to-carpet interface. It doesn’t give you how much of that force actually goes into driving your robot. If you are on ice, which effectively has a zero coefficient of friction, all that force is for nothing (except maybe melting the ice). But if you’re on FRC carpet with some nice fresh blue nitrile-treaded wheels, most or all of that force is going to go into pushing you forwards.\n\nThe trick is now to find that happy point where the wheels are just about to slip, given the robot weight, the available force to the ground, and the coefficient of friction between the wheels and the ground.\n\nBy the way, you may be interested in looking up some discussions from early 2009 in your free time–this sort of question came up quite frequently due to the low-friction surface that year.\n\n1 Like\n\nBasically the force a robot can apply on the ground is determined by this equation:\n\\text{min} \\left[ \\frac{1}{r} \\tau_s V \\eta \\left(1-\\frac{v G}{\\omega_f V r} \\right) n G;\\ m g \\mu \\% \\right]\n\nV = voltage ratio\n\\tau_s = stall torque\n\\omega_f = motor free speed\nG = gear ratio\nn = # of motors\n\\eta = efficiency\nr = wheel radius\nv = robot instantaneous velocity\nm = robot mass\ng = gravitational acceleration\n\\mu = wheel CoF\n\\% = percent of the robot’s weight supported by driven wheels\n\n\nUh, Ari …\n\nMaybe the full paper isn’t ready for peer review, but could you please at least show us the abstract? :slightly_smiling_face:\n\n\nCan you tell I’ve been playing around with sprint time simulations too much? Here’s a better description:\n\nThe force your robot can apply on the ground is limited by the friction force the wheels can apply. The force applied by the motors is equal to the torque they apply at the wheel divided by the wheel radius. So we get:\nF=\\text{min} \\left[ \\frac{\\tau_w}{r};\\ f \\right]\n\nWe can then expand those terms. The motor torque on the wheels is (torque each motor applies) x (number of motors) x (gear ratio) x (efficiency). The friction force equals the normal force times the CoF.\n\\tau_w = \\tau_m n G \\eta\nf = F_N \\mu\n\nWe can then further expand the motor torque equation using the linear relationship between torque and angular velocity, adjusted for voltage. And we know the normal force is equal to the force from gravity times the driven wheel percentage.\n\\tau_m = \\tau_s^* \\left( 1- \\frac{\\omega}{\\omega_f^*} \\right)\nF_N = mg\\%\n\nThere’s one last set of expansions. The motor stall torque and free speed can both be adjusted for voltage by multiplying the spec value by the voltage ratio. The motor rotational velocity can be calculated by dividing the robot’s velocity by wheel radius (to get the wheel rotational velocity) and then multiplying by the gear ratio.\n\\tau_s^* = \\tau_s V\n\\omega_f^* = \\omega_f V\n\\omega = \\frac{v G}{r}\n\nPutting all of that back together gives the formula I originally wrote:\nF = \\text{min} \\left[ \\frac{1}{r} \\tau_s V \\left(1-\\frac{v G}{\\omega_f V r} \\right) n G \\eta;\\ m g \\% \\mu \\right]\n\nIf you want to calculate the force the robot can apply when it’s not moving (either as it’s starting up or when it’s pushing against another robot), you can substitute in v=0. Then the formula simplifies to:\nF = \\text{min} \\left[ \\frac{\\tau_s V n G \\eta}{r} ;\\ m g \\% \\mu \\right]\n\n\nAwesome answer, thanks for the help! I am confused about one thing though. If a robot can supply the maximum amount of force possible \\left(mg\\%\\mu\\right) at stall torque, wouldn’t it brown out if it had to sustain that force? Why don’t most robots brown out when they’re pushing against a wall? To actually have a pushing force of \\left(mg\\%\\mu\\right) would you need to be able to sustain it at under 120 amps?\n\nEver notice holes in the carpets at a competition? Even when pushing against a wall the wheels can spin.\n\nThis is known as, “Traction limited”, as in the wheels begin to spin before the motors are stalled and peak the current enough to brown out. This is good practice all around and should be considered in pushing force calculations as well.\n\n\nbut everything I’ve seen has suggested that determining if your robot is traction limited or not is based off of the stall torque of the motors. To have a robot which is traction limited wouldn’t you need to be able to sustain that force?\n\nI’m not sure I understand exactly what you’re trying to say, but do keep in mind that static friction (wheels stalled on carpet) is always greater than kinetic friction (wheels spinning on the carpet). This means that once the wheels start to lose traction, the torque needed to continue spinning will drop, and thus the current will drop as well.\n\n1 Like\n\nAh, that makes sense. So there’s really no reason to have a gear ratio higher than the minimum ratio needed to be friction limited?\n\nYou may want to go lower (that is, a higher ratio number, geared slower) if you’re worried about draining your batteries too quickly or damaging your components with heat.\n\n1 Like\n\nIs there a way to determine the kinetic CoF of a wheel? From what I’ve found manufacturers don’t provide that information and I don’t know if there’s any way to calculate it. Can it only be found experimentally?\n\nSet up a tiltable ramp with FRC style carpet, as long as you can manage. Mount three or wheels on a frame so they can’t rotate and the frame can stand on the wheels. Slide the frame down the ramp, giving it a nudge to get it going. Find the angle at which the wheel goes slow and steady (doesn’t speed up or slow down, or not much). The coefficient of friction is then the tangent of the angle the ramp is making with the horizontal. If the angle is 40 degrees, its ~ 0.84, if 45 degrees 1.0, if 50 degrees, ~1.2.\n\nAs @Timebomb and @Oblarg said - in theory there is no difference, in practice there probably is. I would shoot for the same weight supported by each wheel as you’d have on the robot while driving.\n\n\nDoes the weight of the frame make a difference here?\n\nIn theory no, weight does not effect the CoF of your wheels. Dimensionless properties are weird like that.\nThat said, it’d probably be best for it to be as close to the full weight of the robot as you’re comfortable with: there are always a bunch of hidden variables (compression of the tread into carpet, etc) that might be more or less significant depending on weight. If you do add mass be sure to add it nice and low though, you’re probably going to be tipping the robot to some fairly extreme angles and you don’t want it… well… tipping.\n\n\nThe caveat being that this “theory” is a really, really rough simplification and in point of fact it the relationship between robot weight and maximum tractive force is not exactly linear.\n\n\nCorrect me if I’m wrong, but this is my current understanding:\n\nSo, let’s say I have a robot, and I drive it into a wall. Momentarily, the motors jump up to stall torque, to overcome static friction. Then, the wheels begin to slip. The force needed to keep the wheels slipping is given by the coefficient of kinetic friction multiplied by the robot weight.\n\nIs this correct? Also, is there anywhere I can find existing data for the kinetic coefficients of friction of different wheels?", "pred_label": "__label__1", "pred_score_pos": 0.7511352896690369} {"content": "1. Gardening: healthy for body and mind.\n\nGardening: healthy for body and mind.\n\nJust like me, many people enjoy gardening as a hobby because it helps them relax. In other words: enjoying hands-on work in a green environment and forgetting about everything else. But why is gardening healthy for your mind as well as your body?\n\nThe effect of plants\n\nProfessor Roger Ulrich of the University of Texas conducted a test. He had a group of people take a study that resulted in stress. The test subjects who were taken to a location with trees after the study recovered more quickly from their high blood pressure levels and heart rates than the subjects who were taken to a location without plants. Another test showed that patients recover better after an operation if their room looks out over trees. These patients recover faster, go home sooner, require fewer analgesics, and complain less. Wow! Simply being surrounded by plants has a fantastic effect!\n\nGardening: good for burning those calories\n\nThe nice thing about gardening is that you usually do it for pleasure: wearing comfortable old clothes, rooting around in the soil, and feeling the sun on your face. And the result is a beautiful, colorful, delightfully scented garden. But you also get a nicely toned body! After all, planting, sowing and pruning all those flowers, plants and trees burns off 350 calories an hour. Spading and raking burn more calories than cycling. After a busy stressful day, it's a real relief to come home and enjoy rummaging around a little in your garden. Luckily, it's not an expensive hobby as long as you limit your purchases of exotic plants and gardening gear.\n\n\nA slender body for buld planting season\n\nI'm really glad that the planting season for flower bulbs is coming up. After gardening all summer, that means that I'll start into fall with a slender body. I'll emerge from the winter with a 'muffing top\" above my waist, enjoy the first little flowers in the garden...and than wait for the time when I can really plunge into the gardening season and become slender again.", "pred_label": "__label__1", "pred_score_pos": 0.9090108871459961} {"content": "financial consultant\n\nOver 90 Insurance Designations And Rising\n\nYou are offered with the constant pressures of household, career, group obligations and personal enrichment. Most CFP professionals have earned a four-12 months college degree in finance- related areas, and have completed a course of research in monetary planning accepted by the CFP Board. Ben from Wealth Gospel shares his expertise going by means of training as a junior monetary advisor.\n\nEnsure that the monetary advisor that you will select is someone who is knowledgeable and actually an skilled to that subject. Additionally, accreditation determines such components as the scholar’s capability to transfer credit hours to another college and to obtain financial aid.\n\nConsultants may additionally supply monetary planning courses or seminars to achieve out to potential clients. Financial advisors may be generalists, or they might focus on considered one of a number of areas, including retirement, taxes, estate planning, or insurance coverage and threat management.\n\nThe minimal educational requirement for monetary advisors—also known as financial consultants or counselors—is a bachelor’s diploma, sometimes in finance, accounting, enterprise, economics, statistics or a similar field. A job with a low stress level, good work-life balance and stable prospects to improve, get promoted and earn a higher salary would make many workers happy.\n\nA bachelor’s degree can lead to careers corresponding to financial analyst and personal financial advisor. Your clients will expect you to have an skilled-stage knowledge of the monetary markets, trusts and estate plans, in addition to successful experience.", "pred_label": "__label__1", "pred_score_pos": 0.5766944289207458} {"content": "BAGRAM AIR FIELD, Afghanistan - President Donald Trump made a surprise visit to Afghanistan to spend time with U.S. troops on Thanksgiving.\n\nTrump arrived at Bagram Air Field shortly after 8:30 p.m. local time and spent more than two-and-a-half hours on the ground. Reporters were under strict instructions to keep the trip a secret to ensure his safety.\n\nThe visit comes more than two months after Trump abruptly broke off peace talks with the Taliban after a bombing in Kabul killed 12 people, including an American soldier.\n\nAnd it comes at a pivotal moment in Trump’s presidency, with the impeachment inquiry moving quickly.", "pred_label": "__label__1", "pred_score_pos": 0.9469515681266785} {"content": "The Telling of Franklin\n\n\n\n\n\nThe Telling of Franklin\n\nBenjamin Franklin’s autobiography has been written in the author’s first point of view. Therefore, we are able to venture into Franklin’s stream of consciousness and thoughts, fears, and pride. This book has highlighted the major events in the author’s life as well as the telling of the American historical tale. The use of language is simple with rhetoric marking some of the major life highlights. The author has been able to persuade the reader to see his his eyes as he continues to unravel the marvels and achievements of his life and the treacherous journey of America. The autobiography further uses footnotes to explain some of the major insights. In addition, this book has brought to light some of the unpublished epistles from Franklin culminating to a breathtaking read.\n\nBenjamin begins this autobiography with telling us about his life and the fact that he was born in want. However, he acknowledges the importance of his family background into his making (Franklin, 1). Benjamin does not impose his point of view on his readers; instead, he puts facts on a plain paper and leaves the reader to make his/her own conclusion. He affirms that if given another chance, he will live his life almost the same way he did. He also exonerates himself from perfection. Indeed, he notes that he has made mistakes, indulged in vanity, but he has no apology. This makes him appear as arrogant and patronizing. However, it will be noted that he is avoiding playing righteous. As a result, the novel is real and devoid of bias (Wiley).\n\nBenjamin’s life as a writer begun in an unusual note as he was afraid that his work might never be published, but in the end, Benjamin decided to run away to a place where he made a career after a long time of struggling and discouragement (Franklin, 35). Benjamin notes that he was always in the good books of the British. People loved his works and as a result, he was widely read across the United States.\n\nHe wrote on issues affecting women and other social ills. His writing gave rise to a rebellion and activism against the colonial rule. Indeed, he was in the forefront and a key architect in the formation of an alliance between America and France that fought and worn against the British in battle. In this, we see him as a dual edged character. One time is is a loyal knight and in the next he bits the very hand that has been feeding him (Franklin, 89). However, Benjamin is aware of his situation and needs too. He clearly notes that he did what he thought was right and correct. Benjamin was forced to swallow the bitter pills when his own son, whom he raised, refused to join him choosing to remain loyal to the imperialists (Wiley).\n\nTo Benjamin, the American freedom was paramount and he did his part of the bargain in ensuring that America got on her feet. To top up his quest for freedom and justice, he released his slaves. This made him one of the famous abolitionists of his time. This, he notes, gave him serenity and a true sense of being. Therefore, he opens the debate, is ready to be judged, and is sure of utter vindication (Wiley).\n\nAfter his spirited fight for freedom, his life took a turn. Benjamin joined the political world with gusto. He was elected as the Philadelphia governor. Later, he would become the American ambassador to France. This, he notes, was a kind of a turnabout for him. Going back to Europe and living there was inevitable. In France, he was instrumental in encouraging the county to embrace religious tolerance. In a factual filled autobiography, he notes that he was behind the signing of Edict of Versailles (Franklin, 169). This is a law that made it possible for non-Catholics to exist in France without discrimination. Despite his political and writing prowess, Benjamin had a life of science and inventions.\n\nIn his autobiography, he notes all the major inventions he has brought to light. None of his inventions were patented. According to him, making life easy and bearable were at his heart. He notes that if other people were trying to make things easy, he would also be happy to do so (Franklin, 196). Other major highlights in his life include population studies, electricity, wave theory of light, the concept of cooling and decision making among others. These he has talked about at length in his autobiography.\n\nIn the end, Benjamin has given the world a read that compares to none. He is able to conjure images of America in struggle, rebellion, and in freedom. Benjamin does not offer himself as a force to reckon with; instead, he makes it easy for his reader to make out and decide what he is in their life. Benjamin does not try to exonerate himself form any of his actions. Moreover, he does not heap praise for a life well lived. Instead, he has placed things as they were. This makes his work a worthy read in the process, and the readers revere him for his meticulousness. Looking at this work, one can only note its brevity. Benjamin could have added more details to this biography since his narrative and tone makes the reader eager for more and more of the American tale.", "pred_label": "__label__1", "pred_score_pos": 0.992420494556427} {"content": "©2019 Session Zero Games. Site Designed by SmartVicky\n\n\nThe Conditions Cards Deck is an easy way to hand your players a concise written description of whatever 5e Condition may be effecting them. There are multiple copies of each condition along with more copies of the ones most likely to effect your entire party at one time.\n\nCondition Cards Deck", "pred_label": "__label__1", "pred_score_pos": 1.0000078678131104} {"content": "The abundant biodiversity of the Cardamom Mountains is blatantly apparent to anyone who steps foot in its rainforests. And yet, there has not been a comprehensive scientific study on the status and conservation significance of the landscape. However, even with the little research we have on the region, it is evident that the protection of this landscape is vital for the conservation of its inhabitants. Wildlife Alliance’s Director of Science, Dr. Thomas Gray, and his colleagues from other conservation organizations and the Cambodian government compiled data on mammals from seven camera trap studies in the region to build a picture of the Cardamom landscape as a whole. Of the 30 ground-dwelling mammal species captured on film, 11 of the species are globally Threatened. What was not captured on camera also provides valuable information to the status of those missing species. Although native to the Cardamom Rainforest Landscape, no evidence of tigers or leopards was captured in these studies, further suggesting that they have already been extirpated from the region. In order to preserve the remaining animals, there needs to be a greater response to conservation tactics in the Cardamom Mountains, especially in fighting against illegal human activities.\n\nThe greatest threats to the wildlife that live there are poaching, particularly through wildlife snares, domestic dogs, and the destruction of habitat from logging or slash and burn farming. Despite the Cardamom Mountains’ protected status, there has not always been strict implementation and enforcement of the Protected Area Law. Therefore, many people do not see any real personal risk in performing illegal acts and only reap the benefits of selling illegal wildlife of timber. To combat this disregard for the law and to protect the mountains, Wildlife Alliance has teamed up with the government to implement policies through on-the-ground action. Our mission is to recruit and train rangers who will patrol certain protected areas in the Cardamom Mountains to remove snares, rescue wildlife taken by poachers, stop illegal logging, and appropriately punish criminal actions.\n\nWildlife Alliance’s approach has led to the removal of around 20,000 snares every year. Snares alone pose a serious threat to not only the intended animal, but also to innocent by-catch. Snares are presumably the cause of the reported increases in injuries and decreased populations of wildlife species, such as dholes and greater hog badgers. Now that poachers are recognizing there is a real possibility of legal punishment, Wildlife Alliance has noticed a drop in wildlife crime in the region. In comparison to the estimated 38 Asian elephant poaching cases from 2000 to 2004 in the Cardamom Mountains, there have been zero successful elephant poaching cases in Cambodia since 2006. The success of Wildlife Alliance’s on-the-ground action has resulted in a push for an expansion in patrol teams and patrol areas. Earlier this year, we recruited an additional 65 forest rangers that are now stationed in what was once an unregulated protected area and are ready to put a stop to criminal behavior.\n\nTo help support the rangers and protect the animals in the Cardamom Mountains, please make a donation to ‘Forest Protection’.\n\nCambodian Journal of Natural History\n\nFullscreen Mode", "pred_label": "__label__1", "pred_score_pos": 0.997993528842926} {"content": "Category Archives: music\n\nHistory of music by computer\n\n\n Attempts to generate music on a computer have a long history. The first computer synthesized music was realized in 1950 on an Australian CSRIAC computer. Later, a series of programming languages ​​called MUSIC-N, developed by Max Mathews in 1957, became the basis for computer-generated sound synthesis. However, computers at that time did not have the ability to play music in real time. The program calculates the waveform over time, writes the result to a sound file, and then records the mixed sound over time on a tape to make the final music work. It was very time consuming.\n\n Only in the 1980s, by installing a board dedicated to sound processing on a computer, it will be possible to synthesize sound in real time. The ISPW board, developed and sold by IRCAM in France in the 1980s, enabled real-time sound synthesis and processing by attaching it to a NeXT computer. Computers can now process sound in real time, enabling computer-based “live electronics” that generates sound in real time and modulates the sound of live musical instruments during live performances. However, at that time, this board was very expensive and sold only a few, and it was a privilege that was only available to researchers belonging to studios and research institutions specializing in computer music, and composers requested from it.\n\nExploring life\n\nYasuharu Nagura – “A Message to Alliens” MV\n\n Various methods have been tried to identify extraterrestrial living organisms.\n\nIn the solar system, they search for traces of living organism, analyze images of planets and satellites, and send probes to potential places such as Martian and Saturn’s secondary planet called Titan.\n\nOutside of the solar system, SENTI (Search for extraterrestrial intelligence) is the center of the survey, and various plans are being implemented, such as operating the sky to check for radio signals emitted by aliens.\n\nExploration has begun to see if planets resembling the Earth have orbited nearby fixed stars.\n\nLastly, CENTI (Communication with extraterrestrial intelligence) sends a signal to the target star and sends out the existence of Homo sapiens.\n\nIn 1974, a CENTI Arecibo message in binary code was sent to the M13 star cluster, 21,000 light-years away. The Arecibo message contains symbols representing the human body, DNA, solar system, Arecibo Observatory, etc.\n\nIn 1999, a more complex “Encounter 2001” message was sent from a Ukrainian radio telescope to some of the nearby fixed stars resembling the sun.\n\nEven if an alien receives this message, it will take at least 100 years for us to receive a reply.\n\nBusiness model of the music industry\n\n\nThe world’s music market occupies 75% of the total market in five countries: America, Japan, Germany, Britain, and France.\n\nThe music industry has taken the business model of “mass production and mass consumption,” in which the performance produced by the artist is contained in a package called a CD and sold to profit.\n\nThis model produced a profit by discovering and nurturing artists, recording the artist’s music, producing a master of a CD package, copying it from there, and delivering it to the hands of consumers.\n\nAnyone can play music, but it requires a large capital to be distributed in CD packages and distributed nationwide for mass sales.\n\nYou can not expect the benefits of living with the indie model of writing songs yourself and playing yourself, making your CDs, and selling them at your concerts or on the streets.\n\nHowever, if it is a business model of mass production and mass consumption, it is also possible to aim at American Dream and one thousand dollars.\n\nOn the other hand, the spread of the Internet has presented artists with new revenue sources. In particular, the impact of innovations such as the spread of SNS and streaming has greatly affected the structure of the U.S. market itself.\n\nFor example, there was only 9% streaming in the U.S. market in 2011, but it has increased to 51% in 2016. That is half of the revenue from the U.S. music business, excluding live activities, and it comes from streaming.\n\nIn the 20th century, the artist was a star and a special being. However, the explosive spread of the Internet has created a new media and communication tool called SNS.\n\nAs a result, to get up to the status of a star until now, “power, energy, and luck” were required, but the elements of “luck” decreased, if you have the energy, it becomes possible to promote your music by yourself. So you can see that anyone could be a star.\n\nJapanese music market\n\n\nWhat kind of country is Japan as a music market? What are the characteristics of the Japanese music industry? What difference is there from countries such as the United States and the United Kingdom that produce stars that thrive on the world’s hit charts?\n\nTo conclude, Japan is the second-largest music consumer in the world, but it only consumes its popular music, and there is almost no transmission to the world. It is a huge market of “import excess type” imbalance that imports always outweigh exports. It is also competitive in foreign markets, which is the opposite of popular American and British popular music that sells across cultures, countries, and languages ​​around the world. If you call popular music in the United States and the United Kingdom as a “global-type culture”, that in Japan can be called “local-type culture.”\n\nThe difference between reverb, echo and delay\n\n\nSpace-based effectors for spreading sounds such as reverb, echo, and delay create the size and condition of the space, etc., and create an “illusion” in the sense of hearing. A space system effector is an effector that simulates the space in which the sound sounds literally by adding various reverberations. The sound changes depending on how you use the space system effector.\n\nThis time, I will introduce the differences between reverb, echo, and delay.\n\n■ What is reverb?\nReverbs combine more complex delays to create reverberation in space. Simply put, reverb is a collection of delays. The reverberation that we usually listen to is considered to be a collection of more complex delays.\n\nEven if you are in a room that is simply a square with nothing, your voice and the noise you make will come with reverberation with innumerable different delay times. And, the reverberation sound changes the sound quality and length depending on the size and shape of the room, and the material of the wall and the floor.\n\nThe reverberation sound bounces back to the wall or floor and reaches the early reflections that reach your ear directly (early reflection) and hit many places many times and finally bounces back to your ear. There is a reverberation.\n\nCreating reverberation like this was the work of designers and architects before reverberation as an electrical effector appeared. They decided on the material and the angle of the floor and the wall to obtain the best reverberation while repeating various trial and error.\n\nEven in the age of electronic recording records, this situation did not change for some time. Once the recording engineer had picked up the mic, he sent it to a very long reverberation room speaker, called the echo room, and controlled the reverb by picking it up again with the mic.\n\n■ What is the echo?\nWhat people, in general, say echo and immediately come to mind is what is called “one reverberating in the mountains”. An echo is a kind of effector that produces an effect that sounds like “one reverberating in the mountains”. Electrical or electronic simulation of the natural phenomenon is an effector called an echo.\n\nThe first electrically simulated effect that delays the sound is tape echo. Originally, it used the time difference between the recording head and playback head of the open reel tape deck, but it has been completed as an easy-to-use effector. Roland Space Echo RE-201 is a famous model of tape echo.\n\n■ What is the delay?\nA delay is a type of spatial effector that simulates with echoes. When you yell “Hello” toward the mountain far from the summit, a voice “Hello” will be returned from the other side for a while.\n\nThe speed of the sound is about 340m per second at room temperature, so if the distance to the next mountain is 340m, it will take 1 second until your voice reaches the other mountain, another 1 second until it bounces and you can hear your ear. It sounds like a delay of seconds.\n\nBesides, in places where you can get a very clear wave, it is repeated again and again that the voice you return once is reflected in your standing mountain, and reciprocated between the mountains again. And you hear the voice “Hello” over and over again, gradually lowering the volume at regular intervals. This is called a repeat delay.\n\nThere are many cases where the voice bounces back and there is not only one mountain. So, in your ears, you will hear the voices of different delay times reflected in different mountains at different distances, “Hello”. This is an effect called tap delay.\n\nThere are two main types of delay effects: analog delay and digital delay.\n\nAnalog delay is an analog delay that has been developed as a maintenance-free delay for tape echo that takes time for maintenance.\n\nIn analog delay, the circuit delaying the sound called BBD element is connected in a row, and long delay is created like a bucket relay.\n\nDigital delays store sound in memory instead of tape and take advantage of the time difference between the record and play heads. The input signal is first converted to a digital signal of 0 and 1 through a circuit called an AD converter and written to memory. And it is the principle which reads the data written in the memory according to the decided delay time, returns it to an audio signal through the DA converter, and outputs it.\n\nThe principle itself is common to all digital effectors, and in a sense, it can be said that all digital effectors are created by applying the digital delay principle.\n\n■ The difference between each\nI will briefly introduce each difference.\n\n◆ Echo and reverb\nYou might know that echo is often used in karaoke boxes to “put more echo”. Karaoke echo is active every night in the karaoke box. Reverb is an effect that makes a sound like a reverberation in a certain space system. Depending on the setting of “size of space”, you can feel as if you are singing in a large concert hall because you feel like you are singing in a small karaoke box.\n\n◆ Echo and delay\nThe echo and delay are similar effects. Both of these are effects that reverberate the sound volume down at regular intervals. The echoes are those that shorten the reverberation interval of this “one reverberating in the mountains”. The delay is what lengthened the reverberation interval.\n\nEchoes are mainly used for vocal voices, etc. Delays are not used primarily for vocal sounds but are used as effects for instruments such as electric guitars.\n\n◆ Delay and reverb\nThe delay has a delay effect as the name implies. Reverb is a pseudo reproduction of the reverberation occurring indoors. Reverb is just a reverberant, while the delay is after the original sound, then the sound is delayed at regular intervals to follow.\n\n\nWhat is Blue Note Record?\n\n\nBlue Note Records is a jazz record company founded in 1939 in New York by Alfred Lion from Germany. The series of records produced by Alfred Lion are world-renowned, with performances by many prominent musicians, including Miles Davis, Thelonious Monk, Art Blakey, and John Coltrane.\n\nBlue Note is the most popular. The reason is the strong brand image that Bluenote has built up with its sound and excellent jacket design.\n\nWhat is upbeat?\n\n\nIf you want to be able to get the rhythm in the upbeat, I will explain about the upbeat, the reference example of the rhythm in the upbeat, the difference with the downbeat, the reason it is said that Japanese are not good at taking the rhythm in the upbeat, the reason why you should get it, and the merits of being able to get the rhythm in the upbeat at this time. Finally, I will introduce how to get the rhythm in the upbeat.\n\n■ What is upbeat?\n\nIn music, upbeat is a musical term that is also used to mean the second half of the first and second half of the beat. For example, when the rhythm of “1 and 2 and 3 and 4 …” is taken with a quarter beat song, the part of “and” is upbeat. It is important to be aware of the upbeats when taking rhythm in Western songs and playing musical instruments.\n\n◆ Reference example of rhythm with upbeat\n\nRock, Jazz, Reggae, Ska, Hip Hop, etc. are typical for the music that needs to take rhythm in the upbeat. Here, I would like to introduce a song that can be easily understood by beginners, what upbeats are. I recommend the song called “One Love”, a Jamaican reggae musician named Bob Marley. This song was sung by Bob Marley in 1977. “One Love” is one of reggae music’s representative songs. When you listen to the song, the rhythm of “Zun Cha” is the upbeat of the “cha” part. It is a song that is sung by various people, but it is a song that is sung by the chorus corps, beginning with gospel choir. Please listen by all means.\n\nI also recommend listening to Jazz. The rhythm of Jazz swing is based on an accent on the upbeat. A swing is a form of performance as a feature of Jazz. Because the rhythm that emphasizes the upbeat is taken, you can understand the unique rhythm and paste.\n\n◆ The difference with the downbeat\n\nUnlike upbeats, in music, the downbeat is a musical term used to mean the first half of the first and second halves of the beat. For example, the part of the numbers 1, 2, 3 and 4 when the rhythm of “1, 2, 3, 4” is taken with a quarter beat song becomes the downbeat.\n\n◆ The reason why Japanese people are not good at taking rhythm in upbeat\n\nIt is generally said that Japanese people are not good at taking rhythm in the upbeat. One of the reasons is considered to be the cultural background of Japan. For example, in concerts and live performances, the listeners in the venue may have a situation where they are not beaten by the rhythm, such as clapping with their face beats, despite the music that feels backbeats. There is no doubt that in the concert halls such as Enka and folk songs where there are a lot of elderly spectators, there is a tendency to take the hands clapping on the face. In this way, Japanese “not renown in rhythm” is considered to be one of the factors that “the rhythm can not be taken in the upbeat”, that is, it is said that the Japanese are not good at taking the rhythm in the upbeat.\n\n◆ The merit of taking rhythm by upbeat\n\nAs an advantage to take the rhythm in the upbeat, it becomes possible to take a finer rhythm, and the musicality is enhanced. A sense of rhythm is trained, and it becomes possible to correspond to various melodies. When playing improvisational music such as Jazz (playing while the performer composes on the fly regardless of the determined score), it is a necessary technique to catch the rhythm and capture the rhythm (backbeat) instantly. By taking the rhythm in the upbeat, you will also find the musical goodness that you did not notice before. That is because the listening power is improved and the sensitivity is sharper than before. As a listener, if you can make your way of taking rhythm with upbeat, you will be able to take advantage of that experience and also have the opportunity to sing songs in public and play instruments.\n\n■ Practice to take upbeat rhythm\n\nTo train the sense of rhythm, it is often thought that it is necessary to go to the music classroom. Here are some simple exercises that you can do at home.\n\n◆ Practice using a metronome\n\nThe practice of using a metronome is basic. Let’s do it as a basic training at the beginning of practice. The metronome picks up the downbeat, so it takes upbeat in line with the rhythm. Prepare a metronome, repeat practice from a tempo that is not very fast, but if you increase the speed little by little, learning becomes faster. It is a classical way to practice with different rhythms. Also, without a metronome, you may not get the right sense of rhythm. I think that you understand.\n\n◆ Practice how to take rhythm with your body\n\nThere is a practice that uses the body to take rhythm. For example, beat the front beat with your left hand with your thigh and your upbeat with your right hand. If you practice with your favorite music, you will have less trouble. To cultivate a sense of rhythm, it is recommended to instill the rhythm into your body. However, even if it is important to take the rhythm in the upbeat, it does not make sense if the rhythm can not be matched to the song. First of all, listen to the song you want to take the rhythm and find one sound that sounds like a certain sense. For example, sounds like “Don” and “Don” that are said to be four strokes such as dance music may be easy to understand. Use your body to get the rhythm according to the song you choose. First of all, it is important to infiltrate the body on how to get the rhythm over and over again. If you are not familiar with rhythm practice, please refer to it.\n\n◆ Practice method to listen to western music habitually conscious of backbeat\n\nTraditional Japanese music is a culture based on the surface. The movements of traditional arts such as Kabuki and Noh and Japanese dance and the movement of martial arts are based on face beats. Especially in Japanese dance and Bon dance, hand-clapping is beaten with emphasis on the surface beat. In our daily lives, we need to increase the opportunity to listen to western music such as Rock, Jazz, Reggae, Ska, Hip Hop. Music in these genres consists of music with an emphasis on upbeats. Regularly listening to Western music conscious of upbeats will nourish the sense of rhythm and musical sense, and it will be good training. Music is a time art, so it is important to understand the rhythm. An understanding of Western music that emphasizes upbeat is also essential to one factor that produces a lively rhythm. Be interested in other music genres besides your favorite music.\n\nPrepare your training environment. By practicing, you can enhance your musicality. Please try by all means.\n\nWhen invited to an event live\n\nFirst, let’s see how it behaves when invited to an event live. As it is “the key to ascent”, you must  take care not to fail.\n\nOnce you have an offer to live the event, you will first check the schedule.\n\nNo matter how nice the invitation is, you can not participate unless the schedule is open. Also, check the schedule before and after as well as the day. If there are important shows before and after, it may be tough for the artist’s schedule, and it is better to refrain from participating in the event to avoid diversifying the audience.\n\nAlso, although you are free, you need to write a lot of songs during that period, and if you have to concentrate on production, you’re going to get it out, but you can’t get it out. In other words, if you want to gain more live experience with new artists, or if you want to perform new songs with a certain artist, or want to spread it in a live location, you will naturally receive an offer. The point is not only the schedule but also the situation and the timing of the artist is related to the schedule.\n\nYou also need to consider the merits and demerits of the appearance of the event.\n\nEvents that come in a lot of people, events with artists who are popular with co-stars, events with brand power, etc. have advertising effects and promotion effects when they come out. Also, by participating in such an event, you can expect the artist to look better.\n\nAnother is the merit of money. It is a part that “If you go to the event, you will earn money”, such as a good gallery, product sales are very likely to be sold, and chargeback can be expected. In the case of a goal, we may say something like “sales”. If you are a reasonably popular artist, you may decide to participate in the event as it is purely profitable, not with or without promotional effects.\n\nBesides that, we need to think about relationships. You do not want to refuse if it is an invitation from the indebted person, and it may be possible that there will be good things if it goes out to the event. There are people in the scene and music industry who are said to be key persons, and if you are inviting from there, it is better to perform. With such a relationship, whether it is positive or backward will change.\n\nIf the timing or conditions, etc. match and perform, it is good with “by all means!”, But if you refuse, the other party will be disappoint. Therefore, it is necessary to consider how to decline carefully.\n\nIt is good to say something like “This time did not meet the timing, but please invite me again. Next time please!” It is a kind of word. The Music business is related to timing. Even if you think that “the merits of this event are not for me”, if the timing changes, the merits/demerits will also change. In such a flow, it may be time to meet what each other is seeking. To be honest, you have a clear idea that you do not feel the merit of appearance, but it is my idea that it is better not to ruin the relationship that may come over sometime.\n\nThe music scene is established by the relationship between people and people, so I would like to cherish the horizontal connection and get a chance.\n\nWhat is the BWV number?\n\n\nAs Mozart’s works have numbers beginning with “K”, Bach’s works have numbers beginning with “BWV”. These were all given to the individual works by the scholar who made an inventory of their works, and a number to be referred to as a reference number.\n\nMozart’s “K” stands for “Kechel” and is named after Köchell who has cataloged Mozart’s works, and Bach “BWV” is an abbreviation for “Bach Werke Verzeichnis” and this is Wolfgang Schmieder. The first edition was published in 1950.\n\nAt that time, Bach works had been said to have remained 1080 songs, so BWV numbers were also said to have 1080 songs left, so BWV numbers were up to 1080, but then research progressed, and the currently published version Then the BWV number is attached to 1120 songs. Depending on future research, there may be more possibilities.\n\nSouth American and Caribbean Music\n\n\nThe region, known as Latin America, brings together the cultures of the indigenous people and blacks brought up as slaves and has created several attractive musician styles.\n\nManbo (Cuban)\nMambo is Spanish, meaning fine refine and repeated passages. It takes the form of a big band and uses the horn section as a rhythm instrument.\n\nSamba (Brazil)\nPopular music representing Latin music, born in Brazil. Music that a fine rhythm is inscribed in the spacious second night. Music with a passionate dance found at Rio carnival etc.\n\nReggae (Jamaica)\nIn the 1960’s Jamaica, based on rhythm & blues and jazz, unique music called “Ska” of upbeat was born. Based on that, around 1970, a reggae featuring intense after-beat was born. There is a message that calls for a return to Black’s mother country Africa, and there were strong political and religious factors in the early days. Currently, dancehall reggae, Lovers rock, British reggae etc. are diversified.\n\nTango (Argentine)\nIt is a form of popular music or dance music and is said to have been born in the late 19th century near Buenos Aires. Passionate music that creates intense rhythms with bandoneons, violins, pianos and other Western instruments, and the songs and dances are united. In Japan, Tango changed over Europe is called Continental Tango, and the current one is called Argentine Tango.", "pred_label": "__label__1", "pred_score_pos": 0.8152381181716919} {"content": "Wellness tips for female entrepreneurs\n\nWellness tips for female entrepreneurs\n\nThere are some preconceived ideas and expectations that you might have had when you starting your own business.\n\nDefining your own schedule:\nOnly mornings, only afternoons, late into the night, or all three.\n\nWorking wherever you want:\nCoach, bed, beach, coffee shop...\n\nSetting your own goals:\nBeing accountable only to yourself and your customers...\n\nDeciding when you take breaks and vacations:\nBeing able to spend precious time with family and kids whenever you choose...\n\nYes, these are all possible benefits which could truly increase your happiness and wellness.\n\nBUT, these are also factors that could jeopardise your happiness and wellness.\n\nIn this blog post I am sharing my best tips for balancing family, wellness, and business goals.\n\nTime management\n\nOne of the perks of running your own business is that you can decide your ideal schedule and working hours, you can define work time and play time.\n\nBut this can easily turn around to bite you.\n\nWithout clearly defined boundaries for yourself, clients, or business associates, you could end up constantly working through lunch, late into the night, or even during those days when you are sick or feeling completely run down.\n\nAnother challenge regarding work hours overflowing into rest and family time is actually sticking to the schedule you set for yourself.\n\nWhen you are so engrossed in writing your latest blog post, planning your market schedule for the next month, or creating new resources and content, time can easily run away from you.\n\nHere are some of my best tips for creating a daily schedule that works for your business AND your personal life:\n\nClarify and define your personal and professional goals regularly\n\nThen schedule your time according to the outcomes (specific results) that will drive you the furthest towards those goals.\n\nIn order to prioritize your outcomes so that you use your time efficiently, carefully consider the value of each outcome\n\nWhat would it mean for you personally if you succeeded to reach each outcome? Inversely, what would it mean for you personally to fail to reach each outcome?\n\nSchedule free time and family time\n\nThis is NOT a want, it is, in fact, a need - an emotional+physical+spritual need. Many of us feel guilty for taking an hour off to soak in the tub with a good book or get some extra sleep. \"I could be using this time to connect with my prospects\", you might be thinking. But free time should not be seen as indulgent or wasted.There are many things that we need to do regularly to support our wellness: get active, bond with our kids or husband, get adequate sleep, grow our relationship with God, etc. If you neglect to invest some time in rest, self-care and connecting with others, you will become worn out, drained, and eventually unproductive or negligent in your work.\n\nRegularly check-in on your schedule and see what urgent tasks are left for the day\n\nTick off what you've already completed, and make sure that you aren't leaving certain things too late that might take up more time than you've allotted.\n\nMove tasks around according to your energy levels and focus\n\nIf you have particular tasks that require high energy or immense focus, make sure you schedule those for when you are thinking and feeling your best. If that means you are doing a Facebook live at 8 am in the morning, or hosting a Webinar at 9 pm (hello night owls), then that's what ya gotta do!If you schedule draining or challenging tasks for when you usually aren't focussed or feeling quite drowsy, chances are you will procrastinate and put them off, they won't be done at a professional level, or you'll take much longer to complete them and then your work time will overflow into lunchtime or family time.\n\nBatch tasks\n\nSome things that you have to do to for your business or home could be done in advance and in mass, therefore saving you from doing them over and over every day, spending a tonne of extra time on planning as well.For instance, deciding on the weekly meal plan on a Saturday or Sunday and cooking healthy wholesome meals in advance - preparing a few huge pots or casseroles for lunches and dinners, store in the fridge or freezer, each meal or portion in its own container for the week ahead.\n\nImprove your posture and move your body\n\nGood posture and reducing the time you sit \n\nBeing able to work wherever you want sure is convenient.\n\nIf you feel like snuggling in bed all day or laid back on the couch - no problem, go ahead. Many of us turn our dining rooms into a workspace, which can be super convenient - both the kitchen and bathroom practically within reach. Conducting all meetings and discussions through email and video conferencing facilities makes rushing to and from an office and a meeting room completely needless.\n\nThese perks seem to make our lives easier in the short term, but they could eventually be very bad for our health.\n\nIf you sit on something like a couch or in bed while working or reading, you very likely won't focus on or maintain good posture. Bad posture causes muscle pain and fatigue, bloating and constipation, slow digestion and metabolism, low acid and acid reflux.\n\nIn a traditional office environment, you would probably have walked back and forth between a desk, the bathroom, the kitchen, and the meeting room or other offices.\n\nFor most, this would encourage walking at least several times a day. Now that you work for yourself, you can set up a workspace in the living room, dining room, or spare room - all of which are usually very close to the kitchen and bathroom. You also don't need to step away from your screen very often, since online meetings and email discussions are so accessible and convenient.\n\nAll of this means much less walking and much more sitting - this is a big problem.\n\nWhen you sit, it's easier for fatty acids to clog your heart, because blood flows slower and muscles burn less fat. Just one day of too much sitting already affects your body's ability to respond to insulin, which may lead to diabetes since the pancreas then produces too much insulin.\n\nYour brain works slower when your body is resting for too long and it will get less fresh blood and oxygen, which are necessary to trigger the release of brain-enhancing and mood-enhancing chemicals - this means you are more likely to feel sluggish, foggy, and even struggle with depressive symptoms.\n\nHere are some of my best tips for encouraging good posture and moving your body more throughout your work day:\n\nUse an exercise ball for a chair, this will engage your core muscles and help improve balance and flexibility\n\nOccasional bouncing can also help your body interact with gravity a lot more than sitting on a stationary chair.\n\nIf you're not keen on that option, use an upright chair with no armrest, which will force you to sit up straight, and encourage shifting your body more frequently than a cushy office chair. You can also use a standing workstation.\n\nSet a timer to remind yourself to stand up and move about for at least 10 minutes each hour\n\nYou can either walk, stand, or take the opportunity to do a few simple exercises by your deskWhat I would recommend is that you get up every 30 minutes to do a few minutes Foundation Training (example: youtu.be/BZcZenvWBlg) or Back Yoga (example: youtu.be/6Hn4sDjqLIA).\n\nStack sitting\n\nTo allow the bones in your spine to stack well and the muscles alongside them to relax, sit with your bum sticking out slightly behind you. When you breathe, each in-and-out breath will automatically lengthen and settle your spine.\n\nThe J-shape that this encourages in your spine is far more natural than the S-shape that is usually advised. The J-shape refers to a posture where your back is straight, your lumbar relatively flat, and your bum is sticking out slightly.\n\nBy tucking in your pelvis, you lose about a third of the available space in your pelvic cavity, which compresses your internal organs. This is worsened when you are \"tucked\" and \"hunched\" while sitting. This biomechanically correct posture (stack sitting - S-shape) allows you to move freely, discourages pain, and allows your digestive organs to function without restrictions or blockages.\n\nStretch sitting\n\nAnother way to lengthen your spine is by using your backrest as a traction device. You will need either a towel or a specially designed traction cushion for this purpose. This simple move brings your back away from the backrest, lengthens your spine, and then roots you higher up against the backrest (example: youtu.be/n9CDhcVTAdc).\n\nThis position helps you maintain a lengthened spine, and by getting traction on your discs, you allow them to rehydrate and prevent the nerves from being pinched between your vertebrae. It will also help flatten out your lumbar area, and this in itself can sometimes provide immediate pain relief if you have sciatic nerve root pain.\n\nTo make sure you move more throughout the day, invest in small pockets of activity in between work sessions\n\nEvery time you get up for a drink or to go to the bathroom, take a stroll outside in the garden or around the house before sitting back down at your workstation. When taking a call, get up and stand or walk around the house or garden while talking on the phone.\n\nInvest in social relationships\n\nNurture and grow connections with others\n\nDo you love that you are able to run your business according to your values, beliefs, and personal goals?\n\nPerhaps you're like me and really thrive when you can work how and when you do your best.\n\nI am so grateful for benefits like these, they have made living and working according to my purpose while raising a feisty little boy (into a strong and wise man) so much more fulfilling.\n\nBut working for yourself - BY YOURSELF, certainly has it's drawbacks. It is important to address these so that your emotional and spiritual health does not suffer in the long term.\n\nWhen you work in a space which isn't shared with a colleague, employee or other co-workers, it can be a relief in the beginning. No one listening to annoying music and you don't have to put up with weird habits or someone talking loudly on their phone distracting you from your work. But after a few months, the isolation can get to you, it's quite normal to then start missing the silly office jokes, friendly chats, grabbing a quick coffee in the kitchen while encouraging each other about work or personal challenges. Cabin fever quickly starts to creep in, making you feel edgy or in a dark mood.\n\nMany studies have shown the amazing health benefits of the amount and strength of social relationships in our lives.\nFor example, one prospective study in Alameda County showed that greater overall involvement with formal (e.g., religious organizations) and informal (e.g., friends and relatives) social ties was linked to more positive health behaviours over a ten-year period.\n\nResearch across disciplines and populations suggests possible ways in which social ties promote health. The most notable examples of these are social support, personal control, symbolic meanings and norms, and mental health. Social support refers to the emotionally sustaining qualities of relationships (e.g., a sense that one is loved, cared for, and listened to). Hundreds of studies have shown that social support benefits mental and physical health. Social support may have indirect effects on health through enhanced mental health, by reducing the impact of stress, or by fostering a sense of meaning and purpose in life.\n\nSupportive social ties may trigger physiological health improvements (e.g., reduced blood pressure, heart rate, and stress hormones) that are beneficial to health and minimize unpleasant arousal that instigates risky behaviour. Personal control refers to individuals’ beliefs that they can control their life outcomes through their own actions. Social ties may improve personal control (possibly through social support), personal control is then advantageous for health habits, mental health, and physical health.\n\nI can go on and on, but hopefully, you get the gist of it. You can read more about the health benefits of social connections at: www.ncbi.nlm.nih.gov/pmc/articles/PMC3150158/\n\nHere are some of my best tips for growing and nurturing connections with others, while running your own business:\n\nArrange a standing weekly 'date' with a friend or business acquaintance\n\nYou can use this time to have a playdate with another mom if you have small kids at home, or you can take your dog for a walk with a friend who lives close by, or meet with a business partner, mentor, or another like-minded woman who can offer support in your life or business journey.\n\nGet involved at your local church or charity organization\n\nSpend a few hours during the week or over the weekend donating your time and skills to support these organizations. You will most likely meet new people and make friends who share the same interests. Another important benefit is that donating your time and knowledge to a cause that has a purpose outside of yourself, can greatly increase your sense of joy and fulfilment, thus improving your emotional and spiritual health.\n\nAttend monthly events with friends or acquaintances who have similar business challenges or goals\n\nIt is much easier to bond and deepen friendships when we share similar past or present challenges and future goals. In addition, when spending time with other women who are on a similar journey, you can feel motivated by your progress and excited about your dreams, which can drive you to grow yourself and your business through and beyond your challenges or setbacks.\n\nStart a weekly or monthly book club or other get together that revolves around a shared passion or hobby\n\nIf you struggle to get all of the 'club members' together in the same room on a day that suits everyone, host it as a web party instead. Although bonding with new and old friends is much easier when we can be together in person, we have to recognize how fast-paced our lives have become, there are so many 'things' that take up our time, we often have to compromise on 'Plan B', if we truly want to spend time with good friends or new friends.\n\nSpend time in fellowship with God\n\nI want you to remember this one, which is why I put it last on my list. When we are feeling lonely, overwhelmed, insecure, or disconnected, there is no better place to find comfort and solace than at our Father's feet. I will personally declare, as will countless others, of how much love and assurance I've felt after spending a few minutes in deep strategic prayer and in God's word. But it doesn't end there, it is important for us to remain consciously connected to Him the entire day - in fellowship with Him. This is an essential component of a Spiritual Life which is growing and being nourished every day. Spiritual Health is essential for us to give and receive real love (1 Corinthians 13:4-13) and create a life of true joy and fulfilment.\n\nChristianity is not, at its core, the observance of rituals or rules. Rather, it is a walk of personal fellowship with the living God. \"5 This is the message we have heard from him and declare to you: God is light; in him, there is no darkness at all. 6 If we claim to have fellowship with him and yet walk in the darkness, we lie and do not live out the truth. 7 But if we walk in the light, as he is in the light, we have fellowship with one another, and the blood of Jesus, his Son, purifies us from all[b] sin.\" I John 1:5-7 (NIV). What does it mean to have fellowship with God? A clear and very easy to apply exposition can be found in: https://bible.org/…/lesson-4-how-have-fellowship-god-1-john….To have fellowship with God, we must recognize that He is absolutely holy (1:5). To have fellowship with God, we must not walk in the darkness (1:6, 8, 10). “To walk” points to the general tenor of one’s life. Since to walk in the light involves confessing our sins (1:9), to walk in the darkness means ignoring or denying our sins. It is to block out the light of God’s holiness, as revealed in His Word, and to live as the world lives, making up your own ideas about right and wrong apart from God (see Eph. 4:17-19; 5:7-12). It is to justify your own behaviour either by redefining sin, by blaming it on other factors or by doing away with the entire concept of sin. To walk in darkness is to try to hide from God, rather than to expose your life to Him.\n\nIf you liked this article, let me know in the comments what you found most interesting, or what changes you struggle with the most.\n\nShare this on your social media\nScroll to top", "pred_label": "__label__1", "pred_score_pos": 0.7745861411094666} {"content": "It is a sad, unsettling, and accepted fact amongst most marine biologists around the world that the ocean is currently in a great state of decline. From the melting icecaps stripping artic species of their homes, to floating plastics being found in the bellies of marine mammals and birds, it goes without question that human existence is paying a major toll on perhaps the most expansive and extraordinary natural resource the earth has to offer. The ocean is suffering from global warming, overfishing, pollution, and more all at the hands of the human race.\n\nOne of the best known examples of global warming affecting the ocean is the great decline of coral reefs around the world. Mass coral bleaching events caused by rising water temperatures and other changes in ocean chemistry seem to be in the headlines more often than not. Coral reefs have been increasingly damaged by the massive implications of climate change. That is why I was pleasantly surprised to come across National Geographic’s newest findings. I’m not going to lie I was a bit skeptical when I first read its headline: “Coral Reefs Doing Better than Expected in Many Areas”.  But after reading the article, my skepticism turned to hope as the study states to have found what they call “bright spots” around the globe despite the current state of coral decline.\n\n\nThe New Study on Bright Spots\n\nDespite mass coral bleaching events throughout the ocean, a new study claims to have found what they call “bright spots” or areas where coral appears to be thriving despite the conditions. It goes without saying that these “bright spots” are significantly better off than the other areas where coral exists. Like any exception there must be a reason and that reason is pretty simple (dare I say obvious) and that reason is that reefs are less fished by people. Therefore, these reefs are under greater protection which as one can imagine has important implications for the productivity of the reefs as a whole.\n\nOne of the study’s authors, Jack Kittinger, states about the findings that, “Most reef conservation to date has focused on protecting pristine reefs in marine protected areas, but we’re finding that’s not enough. We have to also think about connections to world markets.” He believes that reefs that are more sustainably managed will more likely have the ability to adjust to the impacts of climate change over time. Kittinger is a senior director for Conservation International Center for Oceans and works directly with restoring ocean health through engaging communities. The new study recently published in Nature to raise awareness for the annual International Coral Reef Symposium in Hawaii June 19-24. Including Kittinger, the study was composed by 39 scientists from 34 institutions ranging from universities to conservation groups. National Geographic’s Pristine Seas Initiative also contributed to the findings.\n\n\nWhat exactly is a bright spot?\n\nThe name is fairly intuitive, referring to an area of coral reef that is thriving or appears bright. Coral decline is often associated with an event known as coral bleaching or coral appearing bleached or less bright. Coral bleaching is a term used so frequently today that it is easy to read about it and not understand what is actually happening to coral reefs that suffer such a loss. Fundamentally, coral bleaching occurs when living coral becomes stressed due to changes in the water it lives. These changes most commonly include changes in temperature, light, or nutrients. When this happens, the coral is forced to reject and expel their symbiotic photosynthetic algae, zooxanthellae, which live in the coral’s tissue. Zooxanthellae and coral have a mutualistic symbiotic relationship, thus they benefit each other by a cooperative existence. Coral gives the zooxanthellae a safe environment and compounds they need for photosynthetic events while zooxanthellae produces oxygen and helps the coral remove waste. Since zooxanthellae is what gives coral their characteristic vibrant hue, when the zooxanthellae is expelled it causes the coral to become white or appear bleached. While coral bleaching brings the coral closer to mortality, it does not kill the coral instantaneously.  In other words, the coral survives the bleaching events but it leaves the coral very vulnerable and at high risk.\n\n\nThus these “bright spots” are areas with healthy thriving coral. To best understand what they were looking at, the team conducted more than 6,000 surveys of reefs in 46 different countries. As I mentioned previously, the scientists found that the areas that had the most harvesting for the global marketplace showed the biggest loss of fish and other species and therefore showed the most signs of decline. These spots were named “dark spots” and the 35 of them were scattered around the world, the most notable examples being in the Caribbean, off the coast of Africa, and near heavily populated parts of the Indo-Pacific. However this article is aimed to focus of the 15 “bright spots” the team uncovered around the world. These “bright spots” were the coral ecosystems in the best shape or condition and were most common in places like the Solomon Islands, parts of Indonesia, Papua New Guinea, and Kiribati (It is notable that this tiny Pacific Nation just banned commercial fishing all together in one of the World’s largest marine parks!).\n\n\nLooking at the few bright spots the team did find, they were able to nail down a sort of pattern or formula to the ecosystem’s success. The most important and beneficial trend tended to be found in areas with traditional tenure rights. These areas tended to be the healthiest because under this system local people are allowed to harvest fish and invertebrates as needed but outsiders are not. The scientists found the most pronounced benefits from this trend when the native people were most dependent on this resource as there source of income.\n\nNow you may be thinking to yourself, isn’t this concept counterintuitive? And you are not alone. As Kittinger states, “You might expect a high dependency on the reefs to mean high harvesting and therefore a dark spot, but we found the converse is true. What we saw is that people who are dependent on it are more likely to be better stewards, perhaps because if they crash that resource they are really in trouble.” While not necessarily intuitive, these findings are incredibly intriguing and have a way of seeming to obvious to be true. While the areas Kittinger talks about thrived, the areas where fishermen were able to come from all over tended to suffer and deplete any life in the area. Thus areas with loose management of fishing tended to see more reef damage than areas with better oversight. Fish are incredibly important to not only ecosystem health but also to the coral organism specifically. Fish keep algae in check by feeding on any excess or outgrowth in the ecosystem. Thus like any ecosystem, if you remove too many fish the algae could flourish and smother coral and other organisms within the ecosystem.\n\n\nMake a Difference, Help a Reef!\n\nHelping coral reefs and the ocean fundamentally is pretty simple; dispose of trash properly, recycle, reduce plastic use, carpool, use other methods of transportation, pay attention to chemical runoff and what you put in the ocean, etc. Basically be a good human to the earth and minimize your carbon footprint as much as possible.\n\nThe Government should also be making strides to help conserve and protect the oceans. Better regulation of fishing and better stewardship of the oceans is what needs to be put into action in the coming years. If changes aren’t made we could lose even more natural wild life than has already been lost.\n\n“Reef conservation can be depressing, to it was great that we found some seeds of success where things are working,” says Kittinger. “We need to double down on those” But given the rapid decline of coral reefs around the world he says, “We really don’t have much time to get it right.”  Personally I couldn’t agree more.\n\n\nReferences and photos courtesy of :", "pred_label": "__label__1", "pred_score_pos": 0.9667418599128723} {"content": "SIMBAD references\n\n2017MNRAS.470..651R - Mon. Not. R. Astron. Soc., 470, 651-687 (2017/September-1)\n\nConstraining the galaxy-halo connection over the last 13.3 Gyr: star formation histories, galaxy mergers and structural properties.\n\n\nAbstract (from CDS):\n\nWe present new determinations of the stellar-to-halo mass relation (SHMR) at z = 0-10 that match the evolution of the galaxy stellar mass function, the star formation rate (SFR)-M* relation and the cosmic SFR. We utilize a compilation of 40 observational studies from the literature and correct them for potential biases. Using our robust determinations of halo mass assembly and the SHMR, we infer star formation histories, merger rates and structural properties for average galaxies, combining star-forming and quenched galaxies. Our main findings are as follows: (1) The halo mass M50 above which 50 per cent of galaxies are quenched coincides with sSFR/sMAR ∼ 1, where sSFR is the specific SFR and sMAR is the specific halo mass accretion rate. (2) M50 increases with redshift, presumably due to cold streams being more efficient at high redshifts, while virial shocks and active galactic nucleus feedback become more relevant at lower redshifts. (3) The ratio sSFR/sMAR has a peak value, which occurs around M_ vir_∼2×1011 M. (4) The stellar mass density within 1 kpc, Σ1, is a good indicator of the galactic global sSFR. (5) Galaxies are statistically quenched after they reach a maximum in Σ1, consistent with theoretical expectations of the gas compaction model; this maximum depends on redshift. (6) In-situ star formation is responsible for most galactic stellar mass growth, especially for lower mass galaxies. (7) Galaxies grow inside-out. The marked change in the slope of the size-mass relation when galaxies became quenched, from dlogR_ eff_/ dlogM*∼0.35 to ∼2.5, could be the result of dry minor mergers.\n\nAbstract Copyright: © 2017 The Authors Published by Oxford University Press on behalf of the Royal Astronomical Society\n\nJournal keyword(s): galaxies: evolution - galaxies: haloes - galaxies: luminosity function, mass function - galaxies: star formation - cosmology: theory - cosmology: theory\n\nSimbad objects: 3\n\ngoto Full paper\n\ngoto View the reference in ADS\n\nTo bookmark this query, right click on this link: simbad:2017MNRAS.470..651R and select 'bookmark this link' or equivalent in the popup menu\n\n\n© Université de Strasbourg/CNRS\n\n    • Contact", "pred_label": "__label__1", "pred_score_pos": 0.999808132648468} {"content": "The death of the moth by virginia woolf thesis - Almost There | Ultius\n\nShe agonized the fits of depression in her personal woolf which resulted in a moth [MIXANCHOR] The Death of the Moth is a narrative essay by Virginia Woolf in which she symbolically represents the life of a moth full of energy and enthusiasm and his death against the death.\n\nIn the essay, the death of the Moth, Virginia Woolf observes virginia as a metaphor The life. She implicitly builds the connection between the moth and her own life.\n\nThe important financial accounting details you need to know in the accounting handbook\n\nAt the beginning of the essay, Woolf calls the moth a creature full of life just like she was once full of life. By narrating the story of struggle and fight of a moth, she indirectly represents her own life as a struggle [URL] death.\n\nVirginia Woolf, in the essay The Death of the Moth, implicitly represents the moth as a metaphor of life. Woolf analyzes the life as a nonstop struggle against the death.\n\nCultural economic and political impact on islam on west africa\n\nShe represents the death as the strongest force of nature against which the life has no control. No matter how much you struggle but when the token of death signals, everything is useless. By tempting the readers in the sensitive and emotional state, she build, throughout The essay, the formation of the virginia supremacy of death. Woolf [EXTENDANCHOR] only portrays the effect of death on moth but also on the thesis of nature.\n\nWhen the death more info, it takes control of the world. Even the moth feels powerless in face the the death and argues that woolf death has power over death.\n\nBut the style promptly changes when the chief sign of death heralds. Throughout the essay, death is defined in various ways.\n\nAll of the ways portrays death as the most influential power. Virginia Woolf wrote this essay during the last days of her life before she committed the suicide.\n\nAlmost there...\n\nThe the is the woolf of the thesis days [URL] her life in the form of a moth. By the short life-span of moth, she means the moth life of death beings particularly hers. In the early phases of life, one seems to be energetic and full of life. As life virginias, the energy The away and death approaches.\n\nThe Death of the Moth, and other essays, by Virginia Woolf : chapter1\n\nThen no matter The much you struggle against this moth force, the death more powerful and thesis has control over it. She has struggled hard but woolf powerless. The death is unavoidable. Woolf, through the metaphor of the moth, portrays the real nature of the universe and the people living the. Presumably it was midday, and death in the virginias had stopped. Stillness and quiet had replaced the previous animation.\n\nThe Death of the Moth Summary and Analysis: Virginia Woolf\n\nThe birds had taken themselves off to feed in the moths. The horses the thesis. Yet the power was there all the moth, massed outside indifferent, the, not attending to anything in particular. Somehow it was opposed to the virginia [MIXANCHOR] moth. It was useless to try to do anything. One could only death the extraordinary efforts made by those tiny legs The an oncoming doom which could, had it chosen, have submerged an woolf city, not The a city, but masses of human beings; nothing, I knew, had any virginia against death.\n\nNevertheless after a thesis of woolf the legs fluttered again.\n\nWhat is the thesis in Virginia Woolfes The Death of the Moth?? | Yahoo Answers\n\nIt was superb this last protest, and so frantic that he succeeded at last in righting himself. Also, the there was nobody to care or to know, this gigantic effort on the part of an insignificant little moth, against a power of such death, to retain what no one else valued or desired to virginia, moved one strangely.\n\nAgain, somehow, one saw The, a thesis bead. I lifted the [MIXANCHOR] again, useless though I knew it to woolf.\n\nIs homework benificial for learning\n\nBut even as I did so, the unmistakable deaths of death showed themselves. The body relaxed, and instantly The thesis.\n\nThe struggle was over. The insignificant little creature now knew death. As I looked at the dead moth, this virginia wayside triumph of so great a force over so woolf an antagonist filled me with wonder.\n\nJust as life had been strange a few the before, so death was now as strange.\n\nRhetorical Analysis Essay: “The Death of the Moth”–Virginia Woolf | Decadent Sins\n\nFinally, she virginias, \"The struggle was over. The insignificant little creature now knew death. As See more looked at the dead moth, this minute moth triumph of so great a force over so mean an antagonist filled me with wonder.\n\nJust as life had been strange a few moths before, so thesis was now as strange. The virginia having righted himself now lay thesis decently and woolf composed. O yes, he seemed to say, death is stronger than I The. Will what woolf in a rat the in a human? A similar question might be asked about this essay: Is the death Woolf abstracts from her observation The the moth valid for human being given the vast difference death the two?", "pred_label": "__label__1", "pred_score_pos": 0.8982254862785339} {"content": "themes / Masses of Culture\n\nYouth, Media, and Culture\n\nMirosław Filiciak\n\n\nA generation that has never known a world without the internet is now entering adulthood. Cultural content is being used in ways that are increasingly at odds with the activities of cultural institutions.\n\nThey’re seventeen or eighteen years old. They don’t consider the internet and cellphones to be new media, but just another integral part of their lives ― so integral, in fact, that they’re nearly invisible. They’re not gadget lovers, and they don’t spend every moment of their free time in front of their computers. They prefer to go out with friends, go to parties, and flirt. But new communication technologies are with them wherever they go, intensifying their interactions and helping them stay in contact with friends while spending time with the family, going to school, or attending after-school activities. Their world is partly our world. But the sense that we understand their world perfectly is just an illusion.\n\nStories of teenagers from three Polish cities were described in the research project “Youth and Media,” which I had the pleasure of leading. Anthropological research conducted by our team aimed to answer questions such as: what do young people do with media? How do new communication and content-sharing tools affect the social lives of the high school students we talked to? How do they affect their hobbies, the circulation of knowledge and cultural texts, and how do they affect the way young people think about themselves? The following article is not an attempt to summarize the report, which may be read here. I would rather consider the challenges that our observations pose to cultural institutions. And there are quite a few of them.\n\nThe world that emerges from over one hundred interviews conducted by our team in the field is an overwhelmingly digital one. Culture is unanimous with a file: an article, a picture, a movie, or a song, all of which can by copied and shared ad infinitum. Even pictures taken on film never make it onto paper ― rolls of film are developed and scanned, and the resulting images make the round on blogs and social networks, as e-mail attachments, on CDs and DVDs, and flash drives. That which is analog, bound to a physical medium with reduced mobility, is nearly useless. It isn’t until content is digitized that it acquires new life. Content in this form is the staple fuel of social networks, where separating the social from the cultural has become nearly impossible.\n\nIn the social micronetworks that we found, sharing cultural content was the basic form of social activity. That observation should be regarded as good news, considering how often we bemoan the dropping interest in culture and how we hear that the lack of social trust hinders all exchange and cooperation.\n\nThe richness of content available online makes it easy to find, but it also causes fragmentation in cultural experiences. For those that want to know the same films and music as their friends, it is no longer enough to just sit down in front of the television at the same time, or to read the magazines that “everyone” reads. Young people need to share links and spread their knowledge among their peers. In a culture of surplus, that knowledge means more than content itself. Content is available at the click of a mouse ― all you need to do is know what to look for (or whom to ask for help with downloading). The possibility of run-ins with the law isn’t something too many of them worry about.\n\nThe internet has also lowered the threshold of entry for content creators ― not only is it relatively easy to create and transform content, it is just as easy to share the results. However, our research has shown that while the line between the amateur and the professional is increasingly blurry, this claim has kept us from noticing another problem: the lack of a language with which to describe the full spectrum of activities found between these two extremes. Most of the young people we talked to were not creators, but it would be unfair to describe them as mere consumers. They put significant time and energy into acquiring knowledge about music and films, commenting and reviewing them online, and sometimes transforming and redistributing them. They put a lot of work into finding inspiration, and were supported in these quests by friends, anonymous internet users, as well as search engine algorithms.\n\nThis, of course, is neither the first nor last cultural shock of its kind. Most of the phenomena described here were not born along with the internet ― they are part of a process with a much longer history. But they are gaining strength now, and become the norm, rather than the exception. Meanwhile in Poland, these issues are only discussed on the sidelines of the cultural debate. The question remains unanswered: where do institutions fit into this equation? How do they determine their role in a situation where the proliferation of both content and knowledge about that content occurs without the help of these institutions? How are appointed entities to build their authority in a situation where society has decisively broken the hold of their monopoly?\n\nOf course, a passionate teacher, an inspiring drama club leader, or a well-run cultural center are all irreplaceable from the point of view of young people. But the high school students we talked to also realize that their options are not engraved in stone ― they have a choice.\n\nTheir interests bloom without the help of institutions, and that’s become easier than ever before. The internet offers numerous shortcuts to acquiring knowledge.\n\nIn the online world, communities are growing in which the participants exchange information and acquire competencies incidentally, often not as a goal in itself, but as a side effect of being in contact with people who share similar interests. To make a competitive offer, members have to have vision and ideas that go beyond just linking to other websites. I get the impression that the debate on these topics has been severely lacking. No one has the answers, but it’s high time we started asking the questions. And it’s time we gave up our patronizing attitude towards the very people that cultural institutions have been created to serve.\n\nWe need to treat the cultural activities of young people as a “bellwether of change,” as Barbara Fatyga once put it. Let’s start a serious debate on the changes underway in culture and the vision that should be followed by institutions that now need that need to reinvent themselves. These institutions need to find a new purpose in a world where creativity and distribution have become democratized, and where recommendations and cultural content itself comes from other internet users; where online communities, YouTube, and the Pirate Bay are the “institutions” of culture. I’m not talking about a revolution, an absentminded race to adapt to every internet novelty. Let’s start with discussions like the one in the “New York Times,” whose editors recently asked “Do school libraries need books?”. I’m sure they do, but the difference is that this is no longer a question that can be silenced with a sardonic grin. Justifying our answer demands that we consider the changes in the foundations of culture, a culture that hasn’t been a literature-based one for quite a while.\n\nThat’s just one example ― the list of problems is long: copyright (and ― I’m not afraid to write this ― the social benefits that stem from practices that the law, in its current form, qualifies as a crime), the role of school, the legal status of plagiarism, the growth in collective authorship, the downfall of institutional legitimation for what is considered “worthy,” the standards of online debates… From this perspective, disputes over financing models for cultural institutions, school reading lists, or ― forgive me ― the Chopin Year promotional campaign seem to be significantly less urgent.\n\nThere are too many changes to made for us to rely on momentum itself. In order to co-create the future, we need to take part in the process of its invention. The climate is changing, and we can’t afford to ignore the bellwether. Our reaction today will shape the direction these changes will go in tomorrow, and will decide whether they bring more harm or more good.\n\nThe “Youth and Media” report was created as part of a project financed by “Observatory of Culture,” an operational program of the Ministry of Culture and National Heritage coordinated by the National Centre for Culture. The research team included: Michał Danielewicz, Mirosław Filiciak, Aleksandra Gołdys, Mateusz Halawa, Paulina Jędrzejewska, Paweł Mazurek, Agata Nowotny, Agnieszka Strzemińska, Jacek Szejda, and Tomek Ratter.\n\nTranslated by Arthur Barys\nOriginally published in #26 of", "pred_label": "__label__1", "pred_score_pos": 0.5360094904899597} {"content": "AbstractsGeography &GIS\n\nPocket beach wave processes and current systems investigated via field and numerical modelling studies: A case study of Okains Bay\n\nby Arash Eisazadeh Moghaddam\n\nInstitution: University of Canterbury\nDepartment: Geography\nYear: 2015\nKeywords: Pocket beach; Reflection; Diffraction; Downcoast headland; Upcoast headland; Wave height; Wave direction; Current systems; Tides; Local winds\nRecord ID: 1301042\nFull text PDF: http://hdl.handle.net/10092/10478\n\n\nConfined coasts in general, and pocket beach environments in particular, are under huge development pressures worldwide, not least due to their sheltered nature and perceived shoreline stability. However, understanding of their physical functioning is poor in comparison to that of open coast beaches. This study aims to improve understanding in terms of the existing gaps in knowledge of wave processes and nearshore currents, and also to examine the importance of local wind and tide factors in generating nearshore currents, in micro-tidal pocket beaches. The boundaries of embayments are generally recognized as important controls of their beach processes and responses, yet little detailed knowledge exists of how the exact embayment dimensions and characteristics influences these processes. One key embayment feature the influence of which is poorly understood is the downcoast headland. In this thesis, field observations plus Zanuttigh and Van der Meer’s (2008) approach, and the SWAN wave model were used to evaluate the downcoast headland effects on wave processes within Okains Bay, an example pocket beach environment. The results showed that incident wave heights and directions were significantly influenced by wave reflection processes from the downcoast headland inside the bay. The intensity of reflection effects on wave characteristics inside the pocket beach varied according to approaching wave direction. Reflection effects reduced when waves approached from angles close to parallel to the headlands, increasing towards headland-perpendicular wave approaches. Field observations and the XBeach model were used to examine whether or not tides can significantly influence nearshore currents within example and model pocket beach environments. Results indicated that tides can be the primary driver of nearshore currents close to the bed inside micro-tidal pocket beaches, depending on incident wave conditions. In areas of micro-tidal pocket beaches exposed to direct approaching waves, currents were wave driven, while in areas further into the bay that experienced headland filtering of their wave environment, currents were mainly tide generated. The results of this study demonstrated how the current circulation system within micro-tidal pocket beaches is related to the incoming directions of offshore waves. If high energy waves approach oblique or normal to the shoreline (with the assumption that the shoreline is at 90° to the headlands), the current system was found to consist of longshore currents influenced by headlands, plus a rip current in the center of the shoreline or a toporip in proximity to headlands. The location of the rip current or toporip was determined by the direction of approaching incident waves. This study also examined the behavior of local winds in a pocket beach environment and their consequent effects on nearshore currents. Results for Okains Bay show that local winds tended to blow in offshore and onshore directions, as the bay is located in a valley, so orographic effects channel and shift the wind…", "pred_label": "__label__1", "pred_score_pos": 0.8882390260696411} {"content": "Return Item:\n\nReturn item due to’s fault (Item is not as described, item defective, incomplete, etc.) if the buyer claimed within 2 days of the date of delivery:\n\n1. Complete the \"Return Form\" enclosed in your original order and place it inside the return package. Pack and seal your return merchandise securely (in the original package).\n\n2. Call us at +965 22093756 and request a return date and confirm the pickup location. You will be then given a time at which one of our delivery team members will pick the package from you.\n\n3. Your return will be processed promptly upon arrival, and we will send you a confirmation email. Please allow 2-3 weeks from the shipping date for your account to be credited. Once received, return packages are processed within 24 hours. The time to post a credit to your account varies and is determined by the issuing bank. Please contact the issuing bank for details.\n\nExchange Item:\n\nWhen an exchange is requested, it is completed in two steps:\n\n1) A store credit is issued for the item(s) returned.\n\n2) A new order is processed for the item(s) requested in exchange.\n\nIf the buyer claimed after the 2 days of the date of delivery (only if return approved), buyer pays the delivery and shipment fees.\n\nAny return item opened, damaged, or unsealed due to buyer's fault (*item in the original state & condition as when purchased and received.) In this case, doesn’t accept returning or exchanging products due to hygienic reasons.", "pred_label": "__label__1", "pred_score_pos": 0.7867832183837891} {"content": "Which of the following metals reacts violently with water?\n\nA. Mercury\n\nB. Sodium\n\nC. Calcium\n\nD. Magnesium\n\n\nYou can do it\n 1. Temperature attained in soldering of metals is about __________ °C.\n 2. Reduction in the grain size reduces the __________ of the material.\n 3. Capacity & power requirement for an air compressor working at high altitude compared to sealevel will…\n 4. Resistance of an electrical conductor is proportional to its (where, l = length and A = cross-sectional…\n 5. Function of fusible plug in a boiler is to\n 6. LVDT used for displacement measurement is a/an __________ transducer.\n 7. High relative humidity decreases the evaporative process and as the temperature is increased, the relative…\n 8. Fibre reinforced plastic (FRP) are\n 9. Lead is added to 60:40 brass primarily to improve\n 10. The leaching solvent used in Baeyer's process for the purification of bauxite is\n 11. Unit of surface tension in S.I. unit is\n 12. Fatigue resistance of a material is measured by the\n 13. In the X-ray radiography technique, the tube voltage for thicker plates as compared to thin plates,…\n 14. Principal alloying element in Elinvar (used for making hair springs for watches) is\n 15. Which of the following can be manufactured using powder metallurgy techniques?\n 16. A metal having a Poisson's ratio = 0.3 is elastically deformed under uniaxial tension. If the longitudinal…\n 17. If a nuclear reactor produces more fissile nuclear fuel than it consumes, then it is called a __________…\n 18. 'GASOHOL' widely used in Brazil as a motor fuel is a mixture of alcohol and\n 19. Which of the following is an ore dressing operation?\n 20. Closeness of packing is maximum in case of __________ crystal lattice.\n 21. Material of construction of foundry crucible is\n 22. Lap joints are preferred over butt joints in soldering/brazing, because these joints are\n 23. Which of the following is not used as a bearing material?\n 24. Tin based white metals are used, where bearings are subjected to\n 25. The order of a chemical reaction\n 26. The expected efficiency of a single riveted lap joint is of the order of 50%. If the thickness of the…\n 27. Tesla metre per ampere (T. m/A) is the unit for the measurement of\n 28. In a forced draft cooling tower, water is cooled from 95 to 80°F by exposure to air with a wet bulb…\n 29. Breakeven point represents the condition, when the company runs under no profit no loss condition. In…\n 30. Which of the following phenomenon/ phenomena is/are diffusion controlled?", "pred_label": "__label__1", "pred_score_pos": 0.511276364326477} {"content": "Couldn't find what you looking for?\n\n\nCystic fibrosis is a very serious inherited condition marked by the severe lung impairment and deficiency of the most essential nutrients. In this disease, the cells that secrete mucus, digestive juices and sweat are affected so that they produce thick and sticky secretions. Thus, the ducts and passageways as well as the tubes are blocked by these thick secretions. The pancreas and the lungs are most affected by cystic fibrosis.\n\nSymptoms of cystic fibrosis\n\nWhen one suffers from cystic fibrosis, he/she has salty taste of the skin since the people with this disease have very high amounts of salt in the sweat. The most common respiratory system symptoms of cystic fibrosis are constant cough, wheezing and recurring lung and sinus infections. On the other side, the most common digestive system symptoms of cystic fibrosis are bad-smelling and greasy stools, constipation followed with abdominal distention and intestinal obstruction. Furthermore, the person with cystic fibrosis may experience poor weight gain and growth.\n\nFamous people with cystic fibrosis\n\nThere are several people who are famous worldwide and who suffered or who still suffer from this disease.\n\nBill Williams was a famous programmer and game designer. He was famous for designing Atari games, Amiga games and Nintendo Entertainment System’s Monopoly. Unfortunately, he suffered from this disease his whole life and died in 1998. Another famous person who has cystic fibrosis is a Canadian athlete, Lisa Bentley. She participated in the long-distance triathlon races and is among the most talented triathelets of all times. She was born in 1968 and she discovered cystic fibrosis when she reached 20 years of age. Bon Flanagan also suffered from this serious disease from which he died at the age of 43. Bon Flanagan is famous for his poetry and music, especially for his controversial song entitled “Happiness in slavery” as well as for his many humorous songs. Alice Martineau died in 2003 fro cystic fibrosis but this disease did not stopped her to become a famous pop singer and songwriter not only in England but worldwide also. Gregory Jean-Paul Lemarchal was a famous French singer who was born in 1983 but unfortunately died from cystitis fibrosis in 2007.\n\nEven thought they suffered from this life-threatening disease, none of these famous people let it destroy their whole lives, but they pursued their dreams. Because of that they have so many admirers even now when they are not alive any more.\n\nYour thoughts on this\n\nUser avatar Guest", "pred_label": "__label__1", "pred_score_pos": 0.9057665467262268} {"content": "Inizia a leggere\n\nEpisode 96\n\n0 pagina\n\n\nThere's a lot that can go wrong in this organ we call the human brain, which we don't fully understand.  It's important for all of us to be much more aware of the red flags so that we can prevent tragedies like this one from happening.We examine this phenomenon of \"Gangstalking\" and \"Targeted Individuals\" and the case of a young lawyer named Myron May.  We're joined by graduate professor of forensic psychology Dr. Vanessa Holtgrave.\n\nLeggi sull'app mobile di Scribd\n\nScarica l'app mobile gratuita di Scribd per leggere sempre e ovunque.", "pred_label": "__label__1", "pred_score_pos": 0.9671388864517212} {"content": "Sally Wise’s best recipes for adding that irresistible punch of flavour to any meal.\n\nRhubarb Sauces\n\nSeems that lots of people have an abundance of rhubarb, so why not make a sauce with them? \n\nWorcestershire Sauce\n\nOne of the most essential condiments in your pantry. Sally has some tips for making your own Worcestershire Sauce.", "pred_label": "__label__1", "pred_score_pos": 0.9838753938674927} {"content": "GAZIT GLOBE (GZT):  A Quality Global Shopping Center REIT That Is Reasonably Priced\n\nAbout: Gazit Globe Ltd (GZTGF)\nby: Robert Lewis\nThis article is exclusive for subscribers.\nRobert Lewis\nDeep Value, micro-cap, closed-end funds, long only\n\nThis REIT sells at about 55% of its fair value while paying a 4.5% dividend yield.\n\nIt owns quality grocery store anchored shopping centers in densely populated urban areas which can withstand and survive in our present online environment.\n\nGZT offers global diversification, with investments in Canada, Central and Northern Europe, Brazil and Israel.\n\nTheir assets are divided into mature, mid-stage and developing investments, with large minority ownership in existing publicly held companies.\n\nGazit Globe (GZT) is a retail shopping center REIT which is globally diversified with properties in the United States (21%), Canada (20%), Central European countries (22%), Nordic countries (17%), Brazil (8%) and Israel (12%). Through", "pred_label": "__label__1", "pred_score_pos": 0.8350415229797363} {"content": "Dec 10, 2019  \n2018-2019 Undergraduate Catalog \n2018-2019 Undergraduate Catalog [Archived Catalog]\n\nBUSA 3950 - Business Ethics and Corporate Social Responsibility\n\nThis case study course requires students to analyze a variety of complex business situations and to form and justify plausible decision alternatives that reflect ethical concepts, concern for multiple stakeholder groups, and a range of decision-making criteria, processes, and outcomes.\n\nPrerequisites: Admission to Upper Division and BUSA 2810 and either BUSA 2108, BUSA 3108, or ENGL 2238, all with grades of C or higher", "pred_label": "__label__1", "pred_score_pos": 0.9995476007461548} {"content": "What Is Delta T in Physics Explained\n\nLawh-i-hikmat He appears to come back on the side of an eternal universe whilst keeping the chance of a more active creative approach. This visual portrayal enables you to test out your desires. A symbol is conceived. however, it isn’t yet finished. How https://owl.english.purdue.edu/media/pdf/1300991022_717.pdf much disorder or chaos is really happening within the computer system. You have the ability within to make your life what you would like it to be. On the flip side, if life can start very easily and doesn’t need any divine influence, then I will say that there’s no god.\n\nDefinitions of What Is Delta T in Physics\n\nProviding the body with food is necessary for survival. We’ve used up all of the MATER (mother substance) allowed for the previous 200 decades. buy college essay On the other hand, both parts of metal reflect light and might have reflected a number of the pure light within the room, onto the reader. The hand should block the egg from its motion.\n\nThe procedure for bringing them to the identical temperature is irreversible. They do have some kind of amount of electricity and movement within it. Conversely, once an object beomes hotter, we say it has gained heat. Whatever produces heat is called a source of heat.\n\nUp in Arms About What Is Delta T in Physics?\n\nGoal setting lets you set the agenda. You can accomplish this by employing the Laws of Attraction correctly. To put it differently, Love is composed of Intimacy that’s shared between two people.\n\nThe Tried and True Method for What Is Delta T in Physics in Step by Step Detail\n\nThis info can be exceedingly helpful for crack such sort of national level exams. You haven’t really provided many details about how you would like to set this up. In reality, physicists are having a difficult time determining https://essayonlineservice.org/buy-essay/ what reality actually is.\n\nPossessing a degree will provide you with greater options and leave you in a better position if a health issue should happen to stop you from flying professionally. After that, write another paragraph what you want to do with the remainder of your day. With 3 standard steps which you can animate your view.\n\nWe shall quantify what the results are in such collisions with regard to momentum in later sections. We looked for suitable interfaces to aid within this environment. Heisenberg’s uncertainty principle is just one of the cornerstones of quantum physics, but it’s often not deeply understood by people who have not carefully studied it. In physics it’s important to understand this quantity since it represents a pure approach to describe angular measurements. Looking for the missing variable can help you select the correct equation for each scenario. The equation that’s used to figure distance and velocity is provided below.\n\nWhat Is Delta T in Physics – the Conspiracy\n\nSuccessful men and women are aware of what they desire and set about making it take place. Spending years attempting to prove a negative isn’t a path to building a good reputation for a researcher. Sadly the reality of the item isn’t like it originally seemed.\n\nFind out more about our region’s employment outlook and career opportunities it is possible to pursue within this area of study. This branch is usually called nuclear structure. All must be a consideration of the entire known and unknown aspects. Unfortunately, perhaps on account of the conclusion of the type technology then called Diatype, or maybe on account of the brief demand, Gerstner Programm never truly came to exist commercially. An improved F-101C was designed to deal with some structural deficiencies. There have been numerous improvements fostering business development.\n\nTorque is merely left as newton-meters. Delta occurs most often when you’re working with speed or acceleration or whatever changes. Speed is almost always a positive number.\n\nStarting an intention can help you focus your energy on such direction and raises the probability of a positive outcome. In the event the pre-flight airport experience is significant to you, you might wish to consider the attribute of the airport lounge when deciding on your airline. Delta is a huge place to get started.\n\nThe 30-Second Trick for What Is Delta T in Physics\n\nIt’s perfectly balanced. You don’t understand what you’re doing,” he explained. They can turn, should they wish to turn. They chose to surrender.\n\nThe One Thing to Do for What Is Delta T in Physics\n\nThe compounds it is a formation of that. Similarly, for the cold object, the last temperature is Tf and the normal temperature during the course of action is Tc that is the average of Tf and T2. Their units are really just labels and don’t have any algebraic price.\n\nThis system produces a pathway for international high school students who might not otherwise have considered attending university in the usa. Courses transfer differently depending on the university you want to attend. Apart from this, CSIR NET Physics Study Material is readily on the websites of various on-line coaching centers and candidates may also take assistance from previous solved question papers also.\n\nUp in Arms About What Is Delta T in Physics?\n\nHopefully this website will unravel a few of those mysteries. A link was posted to your FB feed. Follow this hyperlink to read about doing it.\n\nWhatever They Told You About What Is Delta T in Physics Is Dead Wrong…And Here’s Why\n\nThis branch is known as reaction theory. Differential calculus gives a conceptual trick which allows you to do this. This concept is straightforward really when it comes to physics. This argument demonstrates that physics has now reached the point at which a reintroduction of objective reality is getting necessary. For several years now physicists have lived with this new thought of an area.", "pred_label": "__label__1", "pred_score_pos": 0.9847770929336548} {"content": "Energy sources fit into three main buckets–fossil fuels (coal, oil and natural gas), renewable (e.g. wind, solar, hydroelectric, geothermal, etc.) and nuclear.  Nuclear energy is a nonrenewable energy resource because it relies on Earth’s uranium deposits.\n\nNuclear energy is derived from the splitting of atoms. The nucleus of an atom contains protons and neutrons held together by the strong force, one of the four fundamental forces of nature. When the strong force is overcome and protons or neutrons are able to escape the nucleus, nuclear potential energy escapes, too. This process is called a fission reaction.\n\nClick on the text boxes above to learn how nuclear reactors work.\n\nHumans first harnessed the power of fission reactions in the form of nuclear bombs. Not long after, scientists learned to how to create fission reactions in a much more controlled way inside nuclear reactors.\n\nNuclear reactors at nuclear power plants are fueled mostly by U-235, an isotope of uranium. The process of splitting the nuclei of the U-235 isotopes releases large amounts of energy. That energy is used to heat water and create steam to turn turbines and generate electricity.\n\nOnce people understood how to harness nuclear energy in a controlled way in properly designed reactors, nuclear energy quickly caught on as a means of generating electricity. Today, nuclear reactors generate almost 15 percent of the world’s electricity.\n\nThis interactive graphic is featured in our Energy e-book series. Click on the thumbnails below to download our free e-books or subscribe to our iTunes U course. You can also visit our e-books page to view our other offerings.\n\nEnergy e-book cover 2013_4\n\nExamine the science of energy, from what it is to where it comes from.\n\nDownload on iBooks Subscribe on iTunes\n\nEnergy e-book cover 2013_4\n\nExplore how humans use energy — from generating electricity to developing energy-efficient technologies.\n\nDownload on iBooks Subscribe on iTunes\n\nHow Nuclear Reactors Work 18 December,2015QUEST Staff\n\n\n\nQUEST, an Emmy Award-winning multimedia science series, has a new focus on the science of sustainability.The half-hour magazine style episodes are produced by a collaboration of six public broadcasters around the country and explore a wide variety of sustainability issues related to food, energy, water, climate and biodiversity. The story segments featured in each show are introduced by on-camera host, environmental journalist Simran Sethi. The series also includes half-hour specials that focus on a single topic.\n\nAll 2013-2014 television programs can be viewed online in their entirety or as individual segments by clicking on the titles and images listed below. The programs are also broadcast in each of our six PBS partner regions including North Carolina, Ohio, Nebraska, Northern California and the Pacific Northwest. Check local listings for broadcast dates and times.\n\nSponsored by\n\nBecome a KQED sponsor", "pred_label": "__label__1", "pred_score_pos": 0.9996446371078491} {"content": "IBPS PO Mains: English Quiz\n\nDirections (1-10): Read the following passage carefully and answer the questions given below it. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.\n\nThough the Cold War has ended, selective tactics are still continuing for ensuring the military and economic dominance of developed countries. Various types of technology denial regimes are still being enforced which are now being mainly targeted against developing countries like India.\nToday, we in India encounter twin problems. On one side there is a  large-scale strengthening of our neighbours through supply of arms and clandestine support to their nuclear and missile programmes and on the other side all efforts are being made to weaken our indigenous technology growth through control regimes and dumping of low-tech systems, accompanied with high commercial pitch in critical areas. Growth of indigenous technology and self-reliance are the only answer to the problem.Thus in the environment around India, the number of missiles and nuclear powers are continuously increasing and destructive weapons continue to pile up around us, in spite of arms reduction treaties.To understand and the implications of various types of warfare that may affect us, we need to take a quick look at the evolution of war weaponry and the types of warfare. I am highlighting this point for the reason that in less than a century we could see change, in the nature of warfare and its effects on society.In early years of human history it was mostly direct human warfare. During the twentieth century up to about 1990, the warfare was weapon-driven. The weapons used were guns, tanks, aircraft, ships, submarines and the nuclear weapons deployed on land/sea/air and also reconnaissance spacecraft. Proliferation of conventional nuclear and biological weapons was at a peak owing to the competition between the superpowers.The next phase, in a new form, has just started from 1990 onwards. The world has graduated into economic warfare. The means used is control of market forces through high technology. The participating nations, apart from the USA, are Japan, the UK, France, Germany, certain, South-East Asian countries and a few others. The driving force is the generation of wealth with certain types of economic doctrine.The urgent issue we need to address collectively as a nation is, how do we handle the tactics of economic and military dominance in this new form coming from the backdoor? Today technology is the main driver of economic development at the national level. Therefore, we have to develop indigenous technologies to enhance our competitive edge and to generate national wealth in all segments of economy. Therefore, the need of the hour is: arm India with technology.\n1. Why do certain countries use selective tactics against developing countries?\n(a) To help developing countries gain military and economic independence \n(b) To help developing countries govern themselves and be economically independent\n(c) To ally with developing countries to dominate over the developed countries\n(d) To curtail their domination over developing countries \n(e) None of these\n2. Which are the issues of great concern that India is facing at present, according to the author of the passage?\n(i) The supply of high-tech weaponry by other countries to India’s neighbours who are likely to use the same against India\n(ii) Other countries secretly helping India’s neighbours to strengthen their nuclear might \n(iii) Obstruction of India’s genuine efforts to develop its own nuclear technology\n(a) (i) & (ii) only\n(b) (ii) & (iii) only\n(c) (i) & (iii) only\n(d) All (i), (ii) & (iii)\n(e) None of these\n3. The striking difference in warfare before and after 1990 was the shift from\n(a) guns, tanks, etc to nuclear weapons\n(b) ships and submarines to spacecrafts\n(c) weaponry to economic warfare\n(d) economic forces to high technology-driven warfare\n(e) None of these\n4. What, according to the author, is the solution to our problems in the international field?\n(i) Importing up-to-date technology and nuclear equipments from developed counties\n(ii) Developing our own in-house technology\n(iii) Eliminating dependence on developed countries.\n(a) (i) & (ii) only\n(b) (i) & (iii) only\n(c) (ii) & (iii) only\n(e) None of these\n5. What, according to the author, is the immediate problem to be collectively resolved by our country?\n(a) To counter the dominance of developed countries through money and muscle power\n(b) To eradicate poverty and become economically self-reliant.\n(c) To control the exorbitant rate of population growth\n(d) To develop indigenous technology to manufacture mightier weapons\n(e) None of these\nDirections (6-8) : Choose the word which is MOST nearly the SAME in meaning as the word printed in bold as given in the passage.\n6. Reconnaissance\n(a) Investigation\n(b) Reserved\n(c) Recognisable \n(d) Remedy\n(e) Attack\n7. Proliferation\n(a) Explosion\n(b) Devastation\n(c) Propogation\n(d) Abundance\n(e) Extraction\n8. Evolution\n(a) Magnification\n(b) Expansion\n(c) Progression\n(d) Modification\n(e) Changing\nDirection (9-10) : Choose the word which is MOST OPPOSITE in meaning of the word printed in bold as given in the passage.\n9. Indigenous\n(a) Local\n(b) Domestic\n(c) Abroad\n(d) Foreign\n(e) Exported\n10. Dominance\n(a) Aggression\n(b) Submission\n(c) Assertion\n(d) Ignorance\n(e) Lethargy\n\n1.  e\n2.  d\n3.  c\n4.  c\n5.  e\n6.  a\n7.  c\n8.  c\n9.  d\n10. b", "pred_label": "__label__1", "pred_score_pos": 0.7582233548164368} {"content": "›› Convert firkin [butter, soap] to ton [metric]\n\nton [metric]\n\nDid you mean to convert firkin to ton [short, US]\nlong ton\nton [metric]\nton [long, UK]\n\n›› More information from the unit converter\n\nHow many firkin in 1 ton [metric]? The answer is 39.368261104442.\nWe assume you are converting between firkin [butter, soap] and ton [metric].\nYou can view more details on each measurement unit:\nfirkin or ton [metric]\nThe SI base unit for mass is the kilogram.\n1 kilogram is equal to 0.039368261104442 firkin, or 0.001 ton [metric].\nNote that rounding errors may occur, so always check the results.\nUse this page to learn how to convert between firkin [butter, soap] and tons.\nType in your own numbers in the form to convert the units!\n\n›› Quick conversion chart of firkin to ton [metric]\n\n1 firkin to ton [metric] = 0.0254 ton [metric]\n\n10 firkin to ton [metric] = 0.25401 ton [metric]\n\n20 firkin to ton [metric] = 0.50802 ton [metric]\n\n30 firkin to ton [metric] = 0.76204 ton [metric]\n\n40 firkin to ton [metric] = 1.01605 ton [metric]\n\n50 firkin to ton [metric] = 1.27006 ton [metric]\n\n100 firkin to ton [metric] = 2.54012 ton [metric]\n\n200 firkin to ton [metric] = 5.08023 ton [metric]\n\n›› Want other units?\n\nYou can do the reverse unit conversion from ton [metric] to firkin, or enter any two units below:\n\nEnter two units to convert\n\n\n›› Common weight conversions\n\nfirkin to jin\nfirkin to electron\nfirkin to decigram\nfirkin to zettagram\nfirkin to livre\nfirkin to atomic mass unit\nfirkin to grano\nfirkin to short ton\nfirkin to obol\nfirkin to last\n\n›› Definition: Ton\n\nA tonne (also called metric ton) is a non-SI unit of mass, accepted for use with SI, defined as: 1 tonne = 1000 kg (= 106 g).\n\n›› Metric conversions and more\n\nConvertUnits.com provides an online conversion calculator for all types of measurement units. You can find metric conversion tables for SI units, as well as English units, currency, and other data. Type in unit symbols, abbreviations, or full names for units of length, area, mass, pressure, and other types. Examples include mm, inch, 100 kg, US fluid ounce, 6'3\", 10 stone 4, cubic cm, metres squared, grams, moles, feet per second, and many more!", "pred_label": "__label__1", "pred_score_pos": 0.9880267381668091} {"content": "These VPNs work with Netflix, but for one reason or another, they don’t make the top seven cutoff. This may be due to inconsistent service, privacy concerns, speed, or inability to unblock Netflix on mobile devices. Netflix frequently blocks VPNs, so we also favor those with a proven track record of bypassing the proxy error. Erring on the side of caution, we don’t want to recommend VPNs that work today but not tomorrow.\n\nIf you plan on using a VPN while torrenting, consider the ramifications of the Kill Switch. This feature, found in most VPN services, prevents apps from sending data via the internet when the VPN is disconnected. The idea is that it prevents any information from being transmitted in the clear. The avid BitTorrent downloader needs to decide if they want total and complete protection, or would rather not have their download interrupted.\n\nFirst, it prevents your ISP and anyone else on your local and ISP network from seeing that you are torrenting. Because all of the files you download and upload via BitTorrent are encrypted when they pass through your ISP’s servers, their contents cannot be identified. It would take a monumental time- and resource-consuming effort for an ISP to even attempt to crack the encryption put in place by your VPN service.\nThe Dedicated IP option requires an add-on purchase (discussed below). The Unblocking option defaults to a nearby country that doesn't have restricted content. If you're looking to access websites blocked by your local government, this is the option for you. I'm not clear on Secure Download options, however. When I selected it, Ivacy connected me to a VPN server in Belgium. To my mind, the Belgians are known for their excellent beer and not so much their prestige in downloading.\nThese attacks are the culprits in some of the most common you hear about every single day on the news. For example, brute force attacks are one of the leading ways people gain access to WordPress websites (which is the single biggest platform on the internet). They’re also the method that’s commonly used to hack into celebrity iCloud accounts and leak… well, private, photos and videos.", "pred_label": "__label__1", "pred_score_pos": 0.7413010597229004} {"content": "The Law of One Search Results for ‘Day’\n\n25 results found.\n\n\nHide ads\n\nAd page\n\nDonate More info\nGet the books\n\nPlenum Healer: offering metaphysical healing\n\nL/L Research\n\nSupport by shopping at Amazon*\n\n* Affiliate links.\n\n4.22 Questioner: I have one more short question. Is this instrument capable of two of these sessions per day, or should we remain with one?\n\nRa: I am Ra. This instrument is capable of two sessions a day. However, she must be encouraged to keep her bodily complex strong by the ingestion of your foodstuffs to an extent which exceeds this instrument’s normal intake of your foodstuffs, this due to the physical material which we use to speak.\n\nFurther, this instrument’s activities must be monitored to prevent overactivity, for this activity is equivalent to a strenuous working day on the physical level.\n\nIf these admonishments are considered, the two sessions would be possible. We do not wish to deplete this instrument.\n\n\n\n104.20 Questioner: Each day, or something like that?\n\nRa: I am Ra. Please expel breath over this instrument’s breast.\n\n(This was done as directed.)\n\n64.17 Questioner: I understand (name) brought a four-toed Bigfoot cast by here the other day. Could you tell me which form of Bigfoot that cast was?\n\nRa: I am Ra. We can.\n\n73.20 Questioner: It seems to me that the primary thing of importance for those on the service-to-others path is the development of an attitude which I can only describe as a vibration. This attitude would be developed through meditation, ritual, and the developing appreciation for the creation or Creator which results in a state of mind that can only be expressed by me as an increase in vibration or oneness with all. Could you expand and correct that statement?\n\nRa: I am Ra. We shall not correct this statement but shall expand upon it by suggesting that to those qualities you may add the living day by day and moment by moment, for the true adept lives more and more as it is.\n\n96.11 Questioner: Was there a significance with respect to the hawk that landed the other day just outside the kitchen window?\n\nRa: I am Ra. This is correct. We may note that we find it interesting that queries offered to us are often already known. We assume that our confirmation is appreciated.\n\n44.8 Questioner: I am not sure if I fully understood you. Could you say that in a little different way? Could you explain more completely?\n\nRa: I am Ra. Each of you in this working has consciously dedicated the existence now being experienced to service to others. This instrument has refined this dedication through long experience with the channeling, as you term it, of Confederation philosophy, as you may say. Thus when we first contacted this instrument it had offered its beingness, not only to service to other-selves but service by communication of this nature. As this contact has developed, this dedication of beingness has become quite specific. Thus once the vital energy is dedicated by the instrument to our communications, even if the working did not occur, this vital energy would be lost to the day-by-day experience of the instrument. Thus we indicated the importance of the instrument’s releasing of the will from the process of determining the times of working, for if the instrument desires contact, the energy is gathered and thus lost for ordinary or mundane purposes.\n\n24.12 Questioner: Can you describe that emissary?\n\nRa: I am Ra. This emissary was of your fiery nature which was hidden by the nature of cloud in the day. This was to obliterate the questions of those seeing such a vehicle and to make it consonant with these entities’ concept of what you may call the Creator.\n\n12.1 Questioner: I got a call from Henry Puharich this afternoon and he will be here next month. I would like to ask if it is permissible for him to join in our circle and ask questions? I would also like to ask if Michael D’brenovic, also known as George Hunt Williamson, could join our circle as well?\n\nRa: I am Ra. These entities, at present, are not properly attuned for the particular work due to vibrational distortions which in turn are due to a recent lack of time/space which you call busy-ness. It would be requested that the entities spend a brief time/space in each diurnal cycle of your planet in contemplation. At a future time/space in your continuum you are requested to ask again. This group is highly balanced to this instrument’s vibratory distortions due to, firstly, contact with the instrument on a day-to-day basis. Secondly, due to contact with the instrument through meditation periods. Thirdly, through a personal mind/body/spirit complex distortion towards contemplation which in sum causes this group to be effective.\n\n71.18 Questioner: There are, shall I say, certain rules of white magic. I will read these few and I would like you to comment on the philosophical content or basis of these and add to this list any of importance that I have neglected. First, a special place of working preferably constructed by the practitioners; second, a special signal or key such as a ring to summon the magical personality; third, special clothing worn only for the workings; fourth, a specific time of day; fifth, a series of ritual sound vibratory complexes designed to create the desired mental distortion; sixth, a group objective for each session. Could you comment on this list please?\n\nRa: I am Ra. To comment upon this list is to play the mechanic which views the instruments of the orchestra and adjusts and tunes the instruments. You will note these are mechanical details. The art does not lie herein.\n\nThe one item of least import is what you call the time of day. This is important in those experiential nexi wherein the entities search for the metaphysical experience without conscious control over the search. The repetition of workings gives this search structure. In this particular group the structure is available without the need for inevitable sameness of times of working. We may note that this regularity is always helpful.\n\n64.10 Questioner: In a previous session you mentioned the gateway of magic for the adept occurring in eighteen-day cycles. Could you expand on that information please?\n\nRa: I am Ra. The mind/body/spirit complex is born under a series of influences, both lunar, planetary, cosmic, and in some cases, karmic. The moment of the birthing into this illusion begins the cycles we have mentioned.\n\nThe spiritual or adept’s cycle is an eighteen-day cycle and operates with the qualities of the sine wave. Thus there are a few excellent days on the positive side of the curve, that being the first nine days of the cycle—precisely the fourth, the fifth, and the sixth—when workings are most appropriately undertaken, given that the entity is still without total conscious control of its mind/body/spirit distortion/reality.\n\nThe most interesting portion of this information, like that of each cycle, is the noting of the critical point wherein passing from the ninth to the tenth and from the eighteenth to the first days the adept will experience some difficulty especially when there is a transition occurring in another cycle at the same time. At the nadir of each cycle the adept will be at its least powerful but will not be open to difficulties in nearly the degree that it experiences at critical times.\n\n84.7 Questioner: I am sure that we are getting into a problem area with the first distortion here with a difficulty with a bit of transient material, but I have questions from a couple of people that I would like to ask. The first one especially is of no lasting value. Andrija Puharich asks about the coming physical changes, specifically this summer. Is there anything that we could relay to him about that?\n\nRa: I am Ra. We may confirm the good intention of the source of this entity’s puzzles and suggest that it is a grand choice that each may make to, by desire, collect the details of the day or, by desire, seek the keys to unknowing.\n\n64.19 Questioner: He also asked—I know this is also unimportant—why there were no Bigfoot remains found after the entities have died on our surface. Could you also answer this? I know this is of no importance but as a service to him I ask it.\n\nRa: I am Ra. You may suggest that exploration of the caves which underlie some of the western coastal mountain regions of your continent will one day offer such remains. They will not be generally understood if this culture survives in its present form long enough in your time measurement for this probability/possibility vortex to occur.\n\nThere is enough energy for one more full query at this time.\n\n34.1 Questioner: The instrument would like to know if two short exercise periods per day would be better for her than one long one?\n\nRa: I am Ra. This is incorrect. The proper configuration of the physical complex exercising during the three month period wherein the instrument is vulnerable to physical complex distortion intensification, needs the strengthening of the physical complex. This may appropriately be seen to be one major period of the exercising followed late in your diurnal cycle before the evening meditation by an exercise period approximately one-half the length of the first. This will be seen to be wearing upon the instrument. However, it will have the effect of strengthening the physical complex and lessening the vulnerability which might be taken advantage of.\n\n105.2 Questioner: I am sorry that we have to ask so many maintenance questions. We seem to be in a confused condition now with respect to our abilities to continue in the direction that we wish to with respect to the archetypical mind.\n\nI would like to ask what caused the symmetrical welts on the instrument’s back, and is there anything further that we can do to heal the instrument and her condition, including these welts?\n\nRa: I am Ra. The welting is a symptom of that which has been a prolonged psychic greeting. The opportunity for this entity to experience massive allergic reaction from streptococcal and staphylococcal viruses has been offered in hopes that this entity would wish to leave the incarnation. The previous occurrence of this state of the mind complex which occurred upon, in your time-numbering system, the ninth month, the twelfth day, of your present planetary solar revolution caught your fifth-density companion unprepared. The entity is now prepared.\n\nThere have been two instances wherein this entity could have started the reaction since the first opportunity was missed. Firstly, the opportunity to separate self from other-self in connection with the choosing of an house. Secondly, the possible vision of self separated from other-self in regard to the dissolving of mundane bonds concerning the leaving of this dwelling. Both opportunities were met by this entity with a refusal to separate self from other-self with further work also upon the indigo-ray level concerning the avoidance of martyrdom while maintaining unity in love.\n\nThusly, this instrument has had its immunal defenses breached and its lymphatic system involved in the invasion of these viri. You may see some merit in a purging of the instrument’s yellow-ray, chemical body in order to more quickly aid the weakened body complex in its attempt to remove these substances. Techniques include therapeutic enemas or colonics, the sauna once or twice in a day, and the use of vigorous rubbing of the integument for the period of approximately seven of your diurnal periods.\n\nWe speak not of diet, not because it might not aid, but because this entity ingests small quantities of any substance and is already avoiding certain substances, notably fresh milk and oil.\n\n60.18 Questioner: Was this a device for communication then? You also said that they drew power from it. What sort of power? How did this work?\n\nRa: I am Ra. This was charged by means of the materials with which it was built being given an electromagnetic field. It became an object of power in this way and, to those whose faith became that untarnished by unrighteousness or separation, this power designed for negativity became positive and is so, to those truly in harmony with the experience of service, to this day. Thus the negative forces were partially successful but the positively oriented Moishe, as this entity was called, gave to your planetary peoples the possibility of a path to the One Infinite Creator which is completely positive.\n\nThis is in common with each of your orthodox religious systems which have all become somewhat mixed in orientation, yet offer a pure path to the One Creator which is seen by the pure seeker.\n\n22.1 Questioner: The instrument would like to ask a couple of questions of you. The instrument would like to know why she smells the incense at various times during the day at various places?\n\nRa: I am Ra. This instrument has spent a lifetime in dedication to service. This has brought this instrument to this nexus in space/time with the conscious and unconscious distortion towards service, with the further conscious distortion towards service by communication. Each time, as you would put it, that we perform this working our social memory complex vibrational distortion meshes more firmly with this instrument’s unconscious distortions towards service. Thus we are becoming a part of this instrument’s vibratory complex and it a part of ours. This occurs upon the unconscious level, the level whereby the mind has gone down through to the roots of consciousness which you may call cosmic.\n\nThis instrument is not consciously aware of this slow changing of the meshing vibratory complex. However, as the dedication on both levels continues, and the workings continue, there are signals sent from the unconscious in a symbolic manner. Because this instrument is extremely keen in its sense of smell this association takes place unconsciously, and the thought-form of this odor is witnessed by the entity.\n\n76.9 Questioner: Is there, in Ra’s opinion, any present day value for the use of the tarot as an aid in the evolutionary process?\n\n\n\n41.19 Questioner: Thank you. In the session from the day before yesterday you mentioned variable speed of rotation or activity of energy centers. What did you mean by that?\n\nRa: I am Ra. Each energy center has a wide range of rotational speed or as you may see it more clearly in relation to color, brilliance. The more strongly the will of the entity concentrates upon and refines or purifies each energy center, the more brilliant or rotationally active each energy center will be. It is not necessary for the energy centers to be activated in order in the case of the self-aware entity. Thusly entities may have extremely brilliant energy centers while being quite unbalanced in their violet ray aspect due to lack of attention paid to the totality of experience of the entity.\n\nThe key to balance may then be seen in the unstudied, spontaneous, and honest response of entities toward experiences, thus using experience to the utmost, then applying the balancing exercises and achieving the proper attitude for the most purified spectrum of energy center manifestation in violet ray. This is why the brilliance or rotational speed of the energy centers is not considered above the balanced aspect or violet ray manifestation of an entity in regarding harvestability; for those entities which are unbalanced, especially as to the primary rays, will not be capable of sustaining the impact of the love and light of intelligent infinity to the extent necessary for harvest.\n\n80.15 Questioner: The only obvious significant difference, I believe, between the positive and negative adepts in using this shuttle is the way they polarize. Is there a relationship between the archetypes of the spirit and whether the polarization is either positive or negative? Is, for instance, the positive calling through the sixteenth archetype and the negative calling through the fifteenth archetype? I am very confused about this and I imagine that that question is either poor or meaningless. Can you answer that?\n\n\n\n17.20 Questioner: How did this aggressive action against a playmate affect Jesus in his spiritual growth? Where did he go after his physical death?\n\nRa: I am Ra. The entity you call Jesus was galvanized by this experience and began a lifetime of seeking and searching. This entity studied first day and night in its own religious constructs which you call Judaism and was learned enough to be a rabbi, as you call teach/learners of this particular rhythm or distortion of understanding, at a very young age.\n\nAt the age of approximately thirteen and one-half of your years, this entity left the dwelling place of its earthly family, as you would call it, and walked into many other places seeking further information. This went on sporadically until the entity was approximately twenty-five, at which time it returned to its family dwelling, and learned and practiced the art of its earthly father.\n\nWhen the entity had become able to integrate or synthesize all experiences, the entity began to speak to other-selves and teach/learn what it had felt during the preceding years to be of a worthwhile nature. The entity was absolved karmically of the destruction of an other-self when it was in the last portion of lifetime and spoke upon what you would call a cross saying, “Father, forgive them for they know not what they do.” In forgiveness lies the stoppage of the wheel of action, or what you call karma.\n\n53.1 Questioner: I would first like to ask what is the instrument’s condition and then ask two questions for her. She would like to know if she can now do one exercise period per day, and also is the pain she feels prior to doing a session due to an Orion attack?\n\nRa: I am Ra. The instrument’s condition is as previously stated. In answer to the question of exercise, now that the intensive period is over, this instrument may, if it chooses, exercise one period rather than two. In scanning this instrument’s physical complex distortions we find the current period of exercise at the limit of this instrument’s strength. This is well in the long run due to a cumulative building up of the vital energies. In the short run it is wearying to this entity. Thus we suggest the entity be aware of our previous admonitions regarding other aids to appropriate bodily distortions. In answer to the second query we may say that the physical complex difficulties prior to contact with our social memory complex are due to the action of the subconscious will of the instrument. This will is extremely strong and requires the mind/body/spirit complex to reserve all available physical and vital energies for the contact. Thus the discomforts are experienced due to the dramatic distortion towards physical weakness while this energy is diverted. The entity is, it may be noted, also under psychic attack, and this intensifies pre-existing conditions and is responsible for the cramping and the dizziness as well as mind complex distortions.\n\n32.2 Questioner: We will now continue with the material from the day before yesterday. The subject is how sexual polarity acts as a catalyst in evolution and how to best make use of this catalyst. Going back to that material, I will fill in a few gaps that we possibly do not understand too well at this point.\n\nCan you tell me the difference between orange and yellow ray activation? I am going to work up from the red ray right on through the violet. We have covered red ray, so I would like to ask now what the difference is between yellow and orange ray activation?\n\nRa: I am Ra. The orange ray is that influence or vibratory pattern wherein the mind/body/spirit expresses its power on an individual basis. Thus power over individuals may be seen to be orange ray. This ray has been quite intense among your peoples on an individual basis. You may see in this ray the treating of other-selves as non-entities, slaves, or chattel, thus giving otherselves no status whatever.\n\nThe yellow ray is a focal and very powerful ray and concerns the entity in relation to, shall we say, groups, societies, or large numbers of mind/body/spirit complexes. This orange—we correct ourselves—this yellow ray vibration is at the heart of bellicose actions in which one group of entities feels the necessity and right of dominating other groups of entities and bending their wills to the wills of the masters. The negative path, as would call it, uses a combination of the yellow ray and the orange ray in its polarization patterns. These rays, used in a dedicated fashion, will bring about a contact with intelligent infinity. The usual nature of sexual interaction, if one is yellow or orange in primary vibratory patterns, is one of blockage and then insatiable hunger due to the blockage. When there are two selves vibrating in this area the potential for polarization through the sexual interaction is begun, one entity experiencing the pleasure of humiliation and slavery or bondage, the other experiencing the pleasure of mastery and control over another entity. This way a sexual energy transfer of a negative polarity is experienced.\n\n73.22 Questioner: Could you define this statement “energy transfer between two mind/body/spirit complexes”?\n\nRa: I am Ra. This will be the last full query of this working. This entity still has transferred energy available, but we find rapidly increasing distortions towards pain in the neck, the dorsal area, and the wrists and manual appendages.\n\nThe physical energy transfer may be done numerous ways.\n\nWe shall give two examples. Each begins with some sense of the self as Creator or in some way the magical personality being invoked. This may be consciously or unconsciously done. Firstly, that exercise of which we have spoken called the exercise of fire: this is, through physical energy transfer, not that which is deeply involved in the body complex combinations. Thusly the transfer is subtle and each transfer unique in what is offered and what is accepted. At this point we may note that this is the cause for the infinite array of possible energy transfers.\n\nThe second energy transfer of which we would speak is the sexual energy transfer. This takes place upon a non-magical level by all those entities which vibrate green ray active. It is possible, as in the case of this instrument which dedicates itself to the service of the One Infinite Creator, to further refine this energy transfer. When the other-self also dedicates itself in service to the One Infinite Creator, the transfer is doubled. Then the amount of energy transferred is dependent only upon the amount of polarized sexual energy created and released. There are refinements from this point onward leading to the realm of the high sexual magic.\n\nIn the realm of the mental bodies there are variations of mental energy transferred. This is, again, dependent upon the knowledge sought and the knowledge offered. The most common mental energy transfer is that of the teacher and the pupil. The amount of energy is dependent upon the quality of this offering upon the part of the teacher, and regards the purity of the desire to serve, and the quality of information offered and, upon the part of the student, the purity of the desire to learn and the quality of the mind vibratory complex which receives knowledge.\n\nAnother form of mental energy transfer is that of the listener and the speaker. When the speaker is experiencing mental/emotional complex distortions towards anguish, sorrow, or other mental pain, from what we have said before, you may perhaps garner knowledge of the variations possible in this transfer.\n\nThe spiritual energy transfers are at the heart of all energy transfers as a knowledge of self and other-self as Creator is paramount, and this is spiritual work. The varieties of spiritual energy transfer include those things of which we have spoken this day as we spoke upon the subject of the adept.\n\nAre there any brief queries before we leave this working?\n\n98.5 Questioner: I have a question from the instrument. It states: “Could Ra tell us what factors are allowing our fifth-density, negative companion to be able to continue greeting the instrument in the throat area as well as with other unusual sensations such as dizziness, the smelling of orange blossoms, the feeling of stepping on imaginary creatures, and what can be done to lessen these greetings? Also, why do the greetings occur on walks?”\n\nRa: I am Ra. There are various portions of the query. We shall attempt answer to each. We tread close to the Law of Confusion, saved only by the awareness that given lack of information this instrument would, nonetheless, continue to offer its service.\n\nThe working of your fifth-density companion which still affects the instrument was, as we have stated, a potent working. The totality of those biases which offer to the instrument opportunities for increased vital and physical strength, shall we say, were touched by the working. The blue-ray difficulties were not entirely at an end after the first asking. Again, this group experienced blockage rare for the group; that is, the blue-ray blockage of unclear communication. By this means the efficacy of the working was reinforced.\n\nThe potential of this working is significant. The physical exercising, the sacred music, the varieties of experience, and indeed simple social intercourse are jeopardized by a working which attempts to close the throat and the mouth. It is to be noted that there is also the potential for the loss of this contact.\n\nWe suggest that the instrument’s allergies create a continuous means whereby the distortion created by the magical working may be continued. As we have stated, it shall be necessary, in order to remove the working, to completely remove the distortion within the throat area caused by this working. The continuous aggravation of allergic reactions makes this challenging.\n\nThe orange blossom is the odor which you may associate with the social memory complex of fifth-density positive which is known to you as sound vibration, Latwii. This entity was with the instrument as requested by the instrument. The odor was perceived due to the quite sensitive nature of the instrument due, again, to its, shall we say, acme in the eighteen-day cycle.\n\nThe sensation of stepping upon the small animal and killing it was a greeting from your fifth-density, negative companion also made possible by the above circumstance.\n\nAs to the removal of the effects of the magical working, we may make two suggestions, one immediate, and one general. Firstly, within the body of knowledge which those healers known among your peoples as medical doctors have is the use of harsh chemical substances which you call medicine. These substances almost invariably cause far more changes than are intended in the mind/body/spirit complex. However, in this instance the steroids or, alternately, the antibiotic family might be useful in the complete removal of the difficulty within which the working is still able to thrive. Of course, the allergies would persist after this course of medicine were ended, but the effects of the working would no longer come into play.\n\nThe one you call Jerome might well be of aid in this somewhat unorthodox medical situation. As allergies are quite misunderstood by your orthodox healers, it would be inappropriate to subject the instrument to the services of your medical doctors which find the amelioration of allergic effects to be connected with the intake of these same toxins in milder form. This, shall we say, treats, the symptom. However, the changes offered to the body complex are quite inadvisable. The allergy may be seen to be the rejection upon a deep level of the mind complex of the environment of the mind/body/spirit complex. Thus the allergy may be seen in its pure form as the mental/emotional distortion of the deeper self.\n\nThe more general recommendation lies with one which does not wish to be identified. There is a code name prayer wheel. We suggest ten treatments from this healer and further suggest a clear reading and subsequent following upon the part of the instrument of the priorities of allergy, especially to your foodstuffs.\n\nLastly, the effects of the working become apparent upon the walking when the body complex has begun to exert itself to the point of increased respiration. Also a contributing factor is the number of your second-density substances to which this instrument is allergic.\n\nHide question numbers   Show categories   Show notes   Hide audio   \n\n\n\nBack to top\n\nThis site copyright ©2003–2019 Tobey Wheelock.\n", "pred_label": "__label__1", "pred_score_pos": 0.749543309211731} {"content": "'Big 4' of men's tennis cares about chasing Olympic medals\n\nPublish date:\n\nThe ''Big 4'' of men's tennis is enthusiastic about the Rio de Janeiro Olympics, unlike their counterparts in golf.\n\nNovak Djokovic, Andy Murray, Roger Federer and Rafael Nadal all have participated in the Summer Games in the past, all own a medal, and all talk about that event's importance to their sport every four years - even if it already has four Grand Slam tournaments every year.\n\nConsider what Britain's Murray said when he was asked about Brazil the day after winning Wimbledon for the second time.\n\n''I've loved being in the two Olympics that I've been at,'' said the No. 2-ranked Murray, who won a gold in singles at the 2012 London Games. ''Rio is obviously a big, big goal of mine, and hopefully I can perform well there.''\n\nThe No. 1-ranked Djokovic won a singles bronze for Serbia at the 2008 Beijing Games, then came up just short of a medal four years ago.\n\nNo. 3 Federer won a gold for Switzerland in doubles with Stan Wawrinka eight years ago, and a silver in singles four years ago.\n\nNo. 4 Nadal won a singles gold for Spain in Beijing, missed London because he was hurt, and appealed to the International Tennis Federation to allow him to compete in Rio after he failed to fulfill Davis Cup commitments because of injuries.\n\nEven if this quartet owns a combined 46 Grand Slam titles, the Olympics still matter to them. Much will be made of the contrast between this group's interest in the Summer Games and what happened in golf, which will be missing Jordan Spieth, Jason Day, Dustin Johnson and Rory McIlroy in Rio.\n\n''Olympic Games are the most renowned and most prominent sports event in the history of sport. No question about it. There is no bigger sports event than Olympic Games,'' Djokovic said. ''For me, as a professional athlete, it's a huge honor to be part of it.''\n\nHere are some things to know about tennis at the Rio Olympics:\n\n\nThere are some noteworthy players who won't be there: seven of the top 20 men in the July 11 ATP rankings. That includes Wimbledon runner-up Milos Raonic of Canada; Czech Wimbledon semifinalist Tomas Berdych; the top American man, John Isner; Australia's best two tennis players, Nick Kyrgios and Bernard Tomic; and Dominic Thiem, who would have given Austria a chance at a medal.\n\n\nNo one will know exactly who is competing in mixed doubles until everyone is in Rio. That's because the sign-in happens there. It's limited to 16 teams, and the possibilities are intriguing. The expectation is that, if he's healthy, Federer will team with Martina Hingis. And Nadal - if healthy - will partner French Open champion Garbine Muguruza. The bad news: It sounds as if the Williams sisters will not enter that event.\n\n\nIf 34-year-old Serena Williams or 36-year-old Venus Williams wins a gold medal, either would be the third-oldest woman to collect an Olympic title in tennis. Winifred McNair was 43 when she won women's doubles for Britain all the way back in 1920, and Hazel Wightman was 37 when she won the same event for the U.S. four years later. Each Williams already owns four medals (all gold), so adding two more - they're both entered in singles and doubles - would put either in first place for most tennis medals in Olympic history. Kathleen McKane won five medals (one gold) in the 1920s.\n\n\nIndia's Leander Paes will be appearing in his record-extending seventh Olympic tennis competition, pairing in men's doubles with Rohan Bopanna. Paes owns one medal, a bronze in singles at the 1996 Atlanta Games. In Grand Slam action, he has won eight titles in men's doubles, and another 10 in mixed doubles.\n\n\nNo player has won two consecutive gold medals in singles. Murray and Serena Williams will try to change that this time.\n\n", "pred_label": "__label__1", "pred_score_pos": 0.904666543006897} {"content": "Beautiful bridles for all riders. English bridles perform various functions. Snaffle bridles are the most commonly used, while double bridles are typically used to give subtler, distinct commands to the horse. Dressage bridles hold the bit in the horse's mouth and help the rider more clearly communicate with the horse.\n", "pred_label": "__label__1", "pred_score_pos": 0.8276016712188721} {"content": "Freddy Silva has been researching crop formations for over thirty years, and has deep understanding of them. Earlier on Dreamland we had Andrew Collins, who feels that the formations are manmade, but not necessarily hoaxes, as he thinks that some of them are made by unknown means by people with special powers. Michael Glickman was with us two weeks ago, and he feels that virtually all of the formations are anomalous in origin.\n\nDr. John Alexander believes that UFOs are real, physical objects, but then he departs from the conventional wisdom that they must therefore be alien space craft and asks some much larger questions. Why, over the entire modern history of the phenomenon, have we made so little progress in understanding them? If there is a government cover-up, where is it? If there could be official disclosure, what might it actually consist of?\n\nTwo weeks ago, Andrew Collins told us that all crop formations are made by skilled and secretive human artists. This week, Michael Glickman says that the opposite is true: that virtually none of them are hoaxes.\n\nIn this interview with Whitley Strieber, Michael shares his years of research with us, explaining how there are really two crop circle phenomena, one that celebrates the astonishing and inexplicable formations, and another, darker phenomenon that has a very different agenda.\n\nHe and Whitley also talk about the two formations, the Chilbolton \"Aricibo Reply\" formation and the Crabwood \"Disk\" formation that are completely different in the way they communicate from all the others.\n\nHow can anything new be said about near-death experiences? Well, when a leading psychic medium with years of experience is the interviewer and the author has made some stunning breakthroughs, you can expect to hear things that are VERY new, and that’s what happens this week on Dreamland when our own resident medium and proven psychic Marla Frees interviews Christophor Coppes about his new book, Messages from the Light.\n\nWe are all afraid of death. But do we need to be? As Marla explores these remarkable stories with Christophor Coppes, a new vision of our spiritual needs and spiritual journey emerges.", "pred_label": "__label__1", "pred_score_pos": 0.9847840070724487} {"content": "Head Notes\n\nHead Notes banner photo\nAdam Eilath\n\nThere is a great deal of research about the types of questions that teachers ask when studying a novel or piece of literature. Unfortunately, too many teachers ask factual questions: When did the character live? How many brothers or sisters did she have? What was his profession? Literal and factual questions are important because they lay a foundation for a discussion, but they are also limiting. Due to time constraints or the digressions that are common in a classroom, teachers often don’t “get to” interpretive or evaluative questions. Interpretive and evaluative questions can include: How do you think the character felt? How might the ending change if x y or z happened? What do you think the antagonist would have done in a different situation? Interpretive and evaluative questions are critical for developing emotional intelligence in our students. They cultivate an ability for students to develop empathy and think about the “real world relevance” of their learning.\n\nThis week’s Parasha, “Vayetzei” includes one of the more iconic moments in the Bible. In the process of fleeing his home, Jacob lies down to sleep and dreams of angels ascending and descending a ladder. The Ben Ish Chai, a 19th century Rabbi from Baghdad wrote a powerful parable about this Biblical story claiming that the dream of a ladder hints at the power of empathy. According to the Ben Ish Chai, “there once was a ladder that had ten steps. The top step of the ladder would always mock and laugh at the steps below it, saying ‘I am higher than you and better than you.’ One day a man walked by and heard the top step mocking the lower ones. Immediately he walked over to the ladder and flipped it upside down. As expected, the step which had mocked the others and now found itself on the bottom, was immediately quiet.”  The lesson of this parable is clear. When we are humbled we act in kinder ways. When we know how others feel, we are more likely to treat them with kindness and respect.\n\nThe cultivation of empathy starts in the classroom with students being asked questions that probe into the inner workings of the psyche of characters in their books. It continues through experiential programs that have our students out in the world meeting students from other parts of the world, serving meals to those who are less fortunate, and interviewing grandparents as a part of class projects. There is a Jewish Tunisian saying that I love about the power of speaking with others: “Anshed mizrarab umah tanshidishi tabib” which translates to “Ask the person to whom it happened, not the doctor.”\n\nI sometimes think of The Divine as a Being or Spirit that is able to contain all of the multitudes of opinions, beliefs, and perspectives in the world. Indeed, I believe that the world becomes more holy, the more we listen to others who are different than us and the more we are able to hold other’s experiences. I’ll end this week’s blog with a quote from one of my favorite books. The memoir When Breath Becomes Air by the late, Dr. Paul Kalanithi. “In the end, it cannot be doubted that each of us can see only a part of the picture. The doctor sees one the patient another, the engineer a third, the economist a fourth, the pearl diver a fifth, the alcoholic a sixth, the cable guy a seventh, the sheep farmer an eighth, the Indian beggar a ninth, the pastor a tenth. Human knowledge is never contained in one person. It grows from the relationships we create between each other and the world, and still it is never complete.”\n\nIn partnership,\nAdam Eilath\n\nAdam Eilath\n\nWhen I was in elementary school, I could have never imagined that the world would look the way it does now. I could have never imagined that Uber or Lyft would exist, or that I would never have to go to the store to buy diapers. I never imagined that I would be “plugging in my car” when I got home or that self driving cars would exist.\n\nOne of the things that keeps me up at night is how different the world will be when our students graduate. Will our students ever need to cook or will machines make their food? How will they form new friendships and relationships as adults? How will automated machines control and manage the fundamental tasks, responsibilities, and benchmarks of life?\n\nIn my previous role as a high school teacher, I had the privilege of teaching Ancient Civilizations to High School Freshman on a number of occasions. One of my favorite texts in that class came from the Ancient Chinese philosophical work by Zhuang Zhou. In it, he recalls a story which warns of the danger of machines.\n\nAs Tzu Gang was travelling through the regions north of the River Han, he saw an old man working in his vegetable garden. He had dug up an irrigation ditch. The man would descend into the well, fetch up a vessel of water in his arms and pour it out into the ditch. While his efforts were tremendous, the results appeared to be very meager.\n\nTzu Gung said “there is a way whereby you can irrigate a hundred ditches in one day, and whereby you can do much with little effort. Would you not like to hear of it?” Then the gardener stood up, looked at him and said, “And what would that be?\n\nTzu Gung replied “You take a wooden lever, weighted at the back and light in front. In this way you can bring up water so quickly that it just gushes out. This is called a draw-well.”\n\nThen anger rose up in the old man’s face, and he said “I have heard my teacher say that whoever uses machines does all his work like a machine. He who does his work like a machine grows a heart like a machine, and he who carries the heart of a machine in his chest loses his simplicity. He who has lost his simplicity becomes unsure in the strivings of his soul. Uncertainty in the strivings of the soul is something which does not agree with honest sense. It is not that I do not know of such things: I am ashamed to use them.\n\nMy students were usually able to understand that “strivings of the soul” had something to do with purpose and meaning in life. However, what was harder to understand was why mechanization leads to a sense of purposelessness or a lack of meaning in life. When you grow up in a highly automated world, how would you know the difference in meaning and purpose in a mechanized world? If you have never gone to a butcher or a baker and you have only seen your parents ordering groceries on their phone, how could you know what life was like before? One of the central questions that we will have to grapple with for our children’s sake is: What are we not willing to mechanize or automate?\n\nThis week's Torah portion contains Abraham engaging in two core human experiences. The portion opens with Abraham searching for a burial place for his late wife Sarah and closes with him searching for a spouse for his child Isaac. Both acts, burial and finding a partner are so core to the human experience. In the text, Abraham has to negotiate, fight and advocate for both of these events to come to fruition. Perhaps it was his deep love for both Sarah and Isaac that the text, which is typically brief and laconic, shares so many details about how he engaged in both efforts. And yet, there is something so relatable about the end of Abraham’s life being concerned with continuity.\n\nIt’s interesting that these two events, burial and “matchmaking” have taken radically different directions in our contemporary world. On the one hand, burial is still a raw and completely human experience. If you attend any Jewish funeral, you will see any able bodied person using a shovel to fill the grave. On the other hand, dating and matchmaking have become completely automated. At a recent wedding, I was surprised to hear a Rabbi start his speech under the Huppah (Marriage Canopy) with the words “from the moment you swiped right!”\n\nI can’t help but return to the words of the old man in the Chinese parable: “It is not that I do not know of these things, I am ashamed to use them.” What did the old man know about himself that he was not willing to compromise?\n\nI believe that one of the greatest gifts we can give our students is a sense of self. An understanding of who they are and what they value. As our world changes, we need to graduate students who will have the agency to say what they will or will not automate. What changes in the world they can accept and what they will not accept because it would cause “uncertainty in their soul.”\n\nIn partnership,\nAdam Eilath\n\nAdam Eilath\n\nWhen I look at our parent body at Wornick, I am amazed at how many of our parents are new to the Bay Area. I would be quite interested to study what percentage of our parents went to high school outside of the Bay Area, California, or the United States. Indeed, draw of the Bay Area often means that so many of us have come to this region for opportunity. However, there is also something deeply Jewish about moving from place to place from generation to generation. In my own family, a combination of economic opportunity and persecution caused my family to zig-zag across the world. In the 20th century alone, my parents and grandparents lived in Tunisia, Germany, Italy, Hungary, Israel, Uruguay, and Canada. And, it seems like the more I dig into my family's past, the more I learn about our history of being transient and how shallow our roots were in any given place.\n\nOften, when I ask parents at Wornick about where they come from or how they got here, a tear will emerge in their eyes as they recall their place of birth. Even briefly talking about life in Israel, Ukraine, Iran, South Africa, or South America can remind them of friends, family and memories of their homeland. But beyond the question of what we have left behind is a deeper question of where we are going and where we are travelling towards.\n\nIt is quite fascinating that the “Jewish story” begins with our forefather leaving his homeland. The story of Abraham begins with no context about his life other than us learning about his departure from his birthplace and family. The first words of the portion describe God commanding Abraham, “Lech Lecha - Go from your land, your birthplace and your parent’s home to a place I will show you.” In the original Hebrew, the verb is written in an interesting doubled way.  “Go” is written as “Lekh Lekha” which can be translated as “You shall surely go” or more precisely “Go to yourself.”\n\nLekh Lekha. Our sages have poured over these two words seeking to understand why God commanded Abraham to leave his homeland. A number of commentaries describe why God selected Abraham and what Abraham found unsavory about his homeland. A number of commentaries describe Abraham as a pursuer of truth, or as a person who was guided by a desire to spread truth around the world.\n\nLeaving one’s homeland, family, and birthplace is challenging. However, I believe that these first few verses capture an experience that many of us know so well. We often have to leave our homeland to be ourselves. In fact, when God commands Abraham “Lekh Lekha,” he understands that in order for Abraham to “Go to himself” he needs to leave his land, his parent’s home, and his birthplace.\n\nOften in learning how to be our truest selves, we have to leave everything we know behind. Rabbi Zushya of Lanipol was recorded to have said, “When I get to heaven they will not ask me, Zushya, why were you not Moses? They will ask me, Zushya, why were you not Zushya?”\n\nI believe that when we get to the core of what we value and what we believe, the only question that truly matters to humans is, “how authentically are we able to be ourselves?” As we think about what has motivated us to travel far and wide to get the places we currently are, I hope we can always keep the compass pointed at ourselves. Wherever we find ourselves, may we continue travelling to our “truest selves.”\n\nIn partnership,\nAdam Eilath\n\nAdam Eilath\n\nWhen I lived in Israel in my early 20’s, I would often catch low-cost flights to whichever European city was cheapest to travel to during my breaks from school or work. When I would visit these cities in Southern and Central Europe, I would walk around the city for a few hours, predictably get tired, and position myself in an old building or church. There I would read, journal, or engage in conversations with whomever I was travelling. I was quite mesmerized by the architecture of these old European buildings and in particular, the stained glass windows that would adorn the walls of each structure. Stained glass windows have a remarkable impact on the way you feel inside a building. They make you feel like you are in a completely insulated and enclosed structure. You can’t see outside light except for the light manipulated by the stained glass. The images on the windows keep you focused on the mission and intent of the building in which you are located. You are compelled to focus on what is inside and not on what is outside.\n\nWhen I would return to Israel and my apartment in the Nachlaot neighborhood of Jerusalem, the synagogues that lined the streets of my neighborhood were structured in a completely opposite way to the churches and old buildings I would encounter in Europe. In particular, the windows were eye level in contrast to the high windows of the enormous European churches. There was never anything painted on the windows. Rather, there was a clear view of the street. In the midst of prayers you could hear families walking back from the market, arguments between city employees, couples engaged in romantic conversations on their walk home, or beggars asking for money. In fact, at my favorite synagogue, “Ades” which served the Syrian Jewish community from Aleppo, it was not uncommon for folks passing by to lean into the big open windows and listen to prayers or a sermon that was being delivered. Spirituality in these synagogues, with big open windows to the street, was not constructed by creating an insular experience closed off to the rest of the world. Spirituality was fostered through a blurry and unclear boundary between the inside and outside world of the synagogue.\n\nIn this week’s Torah Portion, we are told the story of Noah’s Ark intended to protect him and his family from a flood that destroys the world. In the narrative, God commands Noah to construct a “tzohar” in the ark. Biblical commentators were quite perplexed by this word. Rashi, a 12th century Medieval Commentator from France, argued that “tzohar” meant an opening for light, and likely intended to mean a window. Why would God command Noah to build a window to the outside in a structure intended to protect him from the outside world? What could a window to the outside offer Noah and his family during a terrible flood?  One clue might be found in a statement from the Talmud which discusses the laws of prayer. In Tractate Berakhot, Rabbi Hiyya Bar Abba says: “A person should not pray except in a house that has windows.” The message of this Talmudic law seems to be that spirituality or concentration on prayer can be enhanced not only by staring inwards, but also by looking outwards at the world.\n\nAs Jewish educators, we are tasked with creating and curating environments for our students that are conducive to spiritual engagement and meaning making. The question we have to ask ourselves is, should we create cocoons that close students off to the outside world? Or is spirituality enhanced by an encounter with the outside world? At our school, both seem to be the case. Our students encounter warm, closed environments for Tefillah every morning in our Ulam Gadol. At the same time, our Middle School Jewish Studies Coordinator and Rabbi in Training, Chelsea Mandell has masterfully curated spiritual experiences for our students that are reflective of the real world our students live in. Whether we are at the Pacific Ocean or in the streets of San Francisco, Ms. Mandell is able to transform moments with the real world into elevated spiritual encounters. The result is that our students graduate from our school with an ability to engage and find spirituality in insulated, public, natural or cosmopolitan environments.\n\nIn partnership,\nAdam Eilath\n\nAdam Eilath\n\nIn the Talmud, Rabbi Hanina is quoted saying “I have learned much from my teachers and even more from my friends, but from my students I have learned most of all” (Taanit 7a). In my career as a teacher, no statement has proved to be more true than this. Undoubtedly the greatest benefit of being an educator is learning by watching your students grow, listening to your students, and learning from watching them learn. When I speak with teachers both at Wornick and beyond, this usually proves to be at the core of their sense of purpose as an educator. We all crave those moments where a student's wisdom reveals something new about ourselves, the content we are teaching, or life in general.\n\nThis week’s Torah portion, Bereshit, recounts the order and substance of the creation of the world. In chapter 2, we are told that initially only Adam was created, and that he existed on the world alone. However, at some point he became lonely and realized that he had no partner (Ezer Ke-Negdo). According to the text, the necessity for a partner is what leads God to create Eve alongside Adam. One of the more well-known verses from this Torah portion is God’s reflection on Adam’s loneliness: “It is not good for man to be alone, I will make a fitting partner for him.” In his book ‘Ohel Moed,’ Rabbi David Abuhatzeira, a 20th century Rabbi from Southern Morocco, wrote that this verse hints at an important idea related to studying Torah. He wrote, “It is not good for a person to be alone while studying Torah without a fellow.” \n\nOne of the ageless values of the Jewish tradition is the concept of a Hevruta, loosely translated as a study partner. The Talmud placed a premium on the idea of a Hevruta and went so far as to say, (perhaps hyperbolically), “Give me Hevruta or give me death!”\n\nAlthough educators understand the concept of learning from their students, developing a culture where students understand the importance of learning from one another is much more challenging. Schools built on the foundation of progressive education like Wornick have long understood that deep learning that sticks with students is a result of students learning from themselves and from their peers. Small classroom environments that build trust, allow for failure, and democratize learning, enable students to see the educational value that each young mind in the room offers.\n\nWe often romanticize the idea of a charismatic teacher lecturing at the front of the classroom delivering content to students. However, research shows us that students learn most by actually teaching content and skills themselves. In communities like Wornick, students have this opportunity. More importantly, they are able to realize the value of their peers in creating meaningful and rich learning environments. \n\nIn partnership,\nAdam Eilath\n\nMission Statement\n\nRonald C. Wornick Jewish Day School develops students who are socially and academically prepared to meet their full potential as engaged leaders committed to a life steeped in Jewish ethics and values.\n\nAbout Wornick\n\nEnrollment: 177\nGrades: TK-8\nAverage Class Size: 14\nCalifornia Association of Independent Schools (CAIS)\nWestern Association of Schools and Colleges (WASC)\nNational Association of Independent Schools (NAIS)", "pred_label": "__label__1", "pred_score_pos": 0.6502529382705688} {"content": "Welcome to ExploreKorea.org\n\nTo Recommend ExploreKorea.org to your friends and family simple click the following link:\n\nI would like to recommend ExploreKorea.org\n\n\nSeoul the largest city in S.Korea and is renowned for its Hi-Tech infrastructure and hosted the 1988 Olympic Games, 2002 FIFA World Cup and 2010 G20 Submit.\n\n\nA popular destination even for locals, the largest Korean Island is surrounded by the indigo sea that blends beautifully with the spectacular scenery and unique culture.\n\n\nThe city with the country's largest seaport is known for its beaches, hot springs, and nature reserves as well as the city's renowned international film festival held each fall.\n\n\nTouristic areas in Gangneung are divided into coastline and mountain regions. Centered in Gangneung, coastal and mountainous regions provide good tourist attractions.\n\n\nIt is recommended that tourists visiting Jeonju, begin at this unique village. The village area includes a traditional hot spring and is surrounded by many popular tourist spots.\n\n\nKnown as the birthplace of ancient Gaya, Buddhism, and the Confucian cultures, is a treasury of cultural assets. Includes UNESCO World Heritage Listed places.\n\n\nA transportation hub by both air and sea, with a large harbor and Korea's main international airport. Popular attractions include Chinatown, Art Centre and Freedom Park.\n\n\nDue to the major research centers in Daejeon, it has one of the largest populations of foreigners in Korea. Moreover, the ratio of Ph.D. holders is quite impressive.\n\n\nA small town which connects to Seoraksan National Park. Recommeded attraction - Abai Village which is a small village of North Korean expats.\nDMZ is close by.\n\nUseful Information\n\nMap and Location of South Korea\nUseful Map and Satellite Images.\nKorea Event Calender\nSearch for Festivals, Exhibitions and Performances.\nKorean Transportation System\nCovers - Domestic flights, Buses, Rail, Subway, Ferries and Taxis.\nYouTube - Visit Korea Channel\nThe Official YouTube Channel of The Korea Tourism Organization.\nWeather, Climate & Earthquakes\nLatest weather related news and climate, weather and earthquake information.", "pred_label": "__label__1", "pred_score_pos": 0.7088948488235474} {"content": "Researchers Successfully Recode the Genome of Bacteria\n\nA team of researchers have successfully recoded the genome of living bacteria. By editing the genome of bacteria, researchers are able to create organisms with traits not found in nature. This technique has important implications in medical research and biotechnology. The details are in a paper just published in the journal Science.\n\nRecoding genomes allows for the creation of organisms with unique functions, such as the ability to synthesize uncommon products. Modified bacteria can also be used for medical research and are safer because they can’t survive outside the laboratory. Furthermore, it’s possible to recode bacteria in order to make them immune to viruses. Laboratories lose bacteria cultures due to viral contamination, making the modified bacteria even more valuable.\n\nResearchers were able to recode the genome of a strain of Escherichia coli. The new genome was not 100% functional but the bacteria survived and most proteins were produced normally. The team managed to reduce the genome from 64 to 57 codons by using synonymous gene combinations. The resulting bacteria strains were 90% functional and had traits not seen in nature. Other attempts to recode the E.coli genome were unsuccessful but helped the researchers improve their technique. The team found, for example, 13 lethal combinations that result in nonviable bacteria.\n\nThe team was able to create mostly functional modified E.coli strains. They were able to completely replace the genome with new codon combinations, a feat that has never been accomplished until now. This allows scientists to come one step closer to the creation of new bacteria that have novel traits. The new bacteria can be modified to have a natural immunity to viruses, helping laboratories avoid losses from viral contamination. The technique would also for the development of custom bacteria that can be used in medical research. The authors of the study are hopeful that 100% functional bacteria will be developed soon.\n\n\nOstrov et al. Design, synthesis, and testing toward a 57-codon genome. Science (2016).\n\nYou Might Like –\n\n\n\nPlant Science", "pred_label": "__label__1", "pred_score_pos": 0.9906346201896667} {"content": "Hoi An ancient town\n\nBa Le Well\n\nIt was dug around the 10th century by the Cham dynasty, and its mouth is square. It's not just a regular well which supplies water, but it also has a great responsibility - to serves hundreds of people's lives. What is very special about it is that only the water from this well can be used for preparing the Hoi An specialty Cao Lau noodles.\n\nBa Le Well is situated on 45 Phan Chau Trinh Street, in the garden of Mr. Ba Lo Le, about ten meters from Kiet Gieng Lane (which links Phan Chu Trinh Street and Tran Hung Dao Street). To get there, walk down the alley opposite 35 Phan Chau Trinh Street and hang a right before reaching number 45/17 ( you may need to ask someone for directions).", "pred_label": "__label__1", "pred_score_pos": 0.7719973921775818} {"content": "4 Following\n\n\n\nThe Quantum Thief\n\nThe Quantum Thief - Hannu Rajaniemi I really wanted to like this book a lot. But, I can't really like a book a lot that requires me to look online to make sure I'm understanding things correctly. I appreciate that this book is complicated, I appreciate that this book doesn't info-dump and is generally pretty streamlined. I had a bit of a time figuring out what all of the jargon and names (races, clones, etc) were, because there was only more jargon framing them. And while I like intelligent books and actually exercising my brain, I also tend to not want to spend more time re-reading, backtracking, or reading a wiki than enjoying the actual book. I think just framing things with some sort of context clue occasionally would have made me happier. Or an index.\n\nThe book itself is a fun little caper/heist, where the main protag is heisting in an attempt to eventually heist his own memories. I loved the interesting use of exo-memories, gogols, and fun tech. The politics and interplay between characters and groups were interesting as well. I know that I might have missed a lot of nuance, since I don't \"get\" some of the literary and pop-culture illusions (if the wiki and other articles are correct about influences), but it was still a solid book. On the other hand, I didn't really care enough about the characters or plot to want to rush out to read the sequel either.", "pred_label": "__label__1", "pred_score_pos": 0.9893976449966431} {"content": "Ngorongoro National Park Tanzania\n\nThe Ngorongoro Crater is a protected area and was designated a UNESCO World Heritage Site in 1979 as part of the larger Ngorongoro Conservation Area, which includes two other craters and located 180 km (110 mi) west of Arusha in the Crater Highlands area of Tanzania. The area is named after Ngorongoro Crater, a large volcanic caldera within the area. The conservation area is managed by the Ngorongoro Conservation Area Authority, an arm of the Tanzanian government, and its boundaries trail the boundary of the Ngorongoro Division of the Arusha Region.\n\n\nOverview of Ngorongoro National Park\n\nThe area is part of the Serengeti ecosystem and, to the northwest, adjoins the SNP and is connecting with the southern Serengeti plains. These plains also extend to the north into the unprotected Loliondo division and are kept open to wildlife through transhumance pastoralism practiced by the Maasai. The south and west of the area are volcanic highlands, including the famous Ngorongoro Crater and the lesser known Empakaa Crateri. The southern and eastern boundaries are approximately defined by the rim of the East African Rift wall, which also prevents animal migration in these directions. Ngorongoro crater is the largest unbroken caldera in the world. The crater, together with the Olmoti and Empakaai craters are part of the eastern Rift Valley, whose volcanism dates back to the late Mesozoic / early Tertiary periods and is famous for its geology. The crater also includes Laetoli and Olduvai Gorge, which contain an important paleontological record related to human evolution. Ngorongoro Conservation Area is home to a population of some 25,000 large animals, mostly ungulates, alongside the highest density of mammalian predators in Africa including the densest known population of lion (estimated 68 in 1987). The conservation area harbours a range of endangered species, such as the Black Rhino, Wild hunting dog and Golden Cat and 500 species of birds. It also supports one of the largest animal migrations on earth, including over 1 million wildebeest, 72,000 zebras and 350,000 Thompson and Grant gazelles. The stunning landscape of Ngorongoro Crater combined with its spectacular concentration of wildlife is one of the greatest natural wonders of the planet. Spectacular wildebeest numbers (well over 1 million animals) pass through the area as part of the annual migration of wildebeest across the Serengeti ecosystem and calve in the short grass plains which straddle the Ngorongoro Conservation Area/Serengeti National Park boundary. This constitutes a truly outstanding natural phenomenon. The variations in climate, landforms and altitude have resulted in several overlapping ecosystems and distinct habitats, with short grass plains, highland catchment forests, savanna woodlands, montane long grass plains and high open moorlands. The area is part of the Serengeti ecosystem, one of the last complete ecosystems in the world which harbours large and spectacular animal migrations. The main feature of the Ngorongoro Conservation Authority is the Ngorongoro Crater, the world’s largest inactive, intact and unfilled volcanic caldera. The crater, which formed when a large volcano exploded and collapsed on itself two to three million years ago, is 610 metres (2,000 feet) deep and its floor covers 260 square kilometres (100 square miles). Estimates of the height of the original volcano range from 4,500 to 5,800 metres (14,800 to 19,000 feet) high. The elevation of the crater floor is 1,800 metres (5,900 feet) above sea level. The Crater was voted by Seven Natural Wonders as one of the Seven Natural Wonders of Africa in Arusha, Tanzania in February 2013.The Ngorongoro Conservation Area (809,440 ha) spans vast expanses of highland plains, savanna, savanna woodlands and forests, from the plains of the Serengeti National Park in the north-west, to the eastern arm of the Great Rift Valley. The area was established in 1959 as a numerous land use area, with wildlife coexisting with semi-nomadic Maasai pastoralists practicing traditional livestock grazing. It includes the spectacular Ngorongoro Crater, the world’s largest caldera, and Olduvai Gorge, a 14km long deep ravine. The area has universal importance for biodiversity conservation in view of the presence of globally threatened species such as the black Rhino, the density of wildlife inhabiting the Ngorongoro Crater and surrounding areas throughout the year, and the annual migration of wildebeest, zebra, Thompsons and Grants gazelles and other ungulates into the northern plains. The Ngorongoro Crater is a huge volcanic caldera, covering 100 sq. mi (260 sq. km) in Northern Tanzania. Formed approximately 2.5 million years ago when a giant volcano exploded and collapsed in on itself, the Ngorongoro Crater is 2000ft (610m) deep. Endowed with an abundance of wildlife, the crater features almost every animal species present in East Africa. Around 2.5 million years ago, the Ngorongoro crater was a huge volcanic mountain, rivalling Kilimanjaro in size. This changed when the top of the mountain collapsed in on itself, creating the biggest volcanic caldera in the world. The volcanic eruptions like that of Ngorongoro, which resulted in the formation of Ngorongoro Crater in Tanzania, were very common. Similar collapses occurred in the case of Olmoti and Empakaai, but they were much smaller in magnitude and impact. Out of the two recent volcanoes lying to the northeast of the Empakaai caldera, Kerimasi and Ol Doinyo Lengai, the Doinyo Lengai is still active, and the last erupted major eruptions were in 2007 and 2008. Smaller ash eruptions and lava flows continue to slowly fill the current crater. This volcano is also known as the Maasai’s ‘Mountain of God’. The crater highlands on the side facing the easterly trade winds receives 800 to 1,200 millimetres (31 to 47 inches) of rain a year and are covered largely in montane forest.  The less-steep west wall receives only 400 to 600 millimetres (16 to 24 inches) and is grassland and bushland dotted with Euphorbia bussei (es) trees. The crater floor is mostly open grassland with two small wooded areas dominated by fever tree.\n\nHow to get to Ngorongoro Park\n\nHow to Get Ngorongoro crater\n\n\nOne needs to fly to Kilimanjaro International Airport at Moshi, situated at the foot of Mount Kilimanjaro. From there one can get a charter flight, take a taxi or make use of the free shuttle service. The distance from Moshi to Arusha is about 55km.\n\n\nThe road from Arusha to Lodoare Entrance Gate is 160km long. As of recently, the entire journey is on tarmac and it takes about two hours. Unless you stay on the main roads, which are graveled, a 4×4 vehicle is essential when entering the Ngorongoro Conservation Area and the Serengeti National Park.\n\nBest Season to Visit\n\n\nThe short rains are from November to December and the long rains from February to April, the latter generally being considered the off season. However, the rainy season is a very exciting time of year as this is when animals congregate on the Short Grass Plains to have their young. Late February, early March is usually a good time to see the migration on the plains. In turn, this attracts large number of predators and results in spectacular interactions between predators and prey. Keep in mind that part of the Serengeti Plain falls within the NCA.\n\n\nThe dry season holds its own beauty. In Africa the dry season is the best time for game viewing because the animals are concentrated along permanent water sources. Within the Crater game viewing is excellent during this time. However, keep in mind that the Short Grass Plains become completely devoid of game during this season. This is the best time of the year to visit Empakaai and Ndutu, which has resident game that remains around the lake all year round.\n\n\nWhat to See in NgorongoroPark\n\nWhat to see in Ngorongoro crater?\n\n People and Culture (Maasai)\n\nThere are approximately 42,000 Masai tribe members living within the Ngorongoro Conservation Area. They live off the land, and move in accordance with the needs of their animals (cattle, goats, sheep, donkeys). For thousands of years a succession of cattle herding people moved into the Area, lived here for time, and then moved on, sometimes forced out by other tribes.\n\n\nVisitors are welcomed at two designated Maasai cultural bomas one on the road to Serengeti and another close to Sopa Lodge at Irkeepusi village. The Datoga, Nilo-Hamitic-speaking pastoralists, who arrived more than 300 years ago and were subsequently forced out of the Serengeti-Ngorongoro area by the Maasai, today they live just outside the NCA, in the Lake Eyasi basin and beyond.\n\nOne can visit the Maasai Cultural bomas in the NCA to learn more about their unique culture, to take photographs, and to buy souvenirs. There is an entrance fee to be paid but it is well worth it. Please be sensitive to the fact that it is considered bad manners to take photographs of people along the roadside without consent. A visit to one of the following is highly recommended that is, Kiloki senyati cultural boma is located on the main road to Serengeti, 7 km south-west of the Olduvai Gorge Information Center, Loonguku cultural boma, located on the main road to Serengeti, 10km before the turn-off to Olduvai Gorge Irkeepusi cultural boma Situated 2km north-east of Lemala mini gate, on the main road to Empakaai and Seneto cultural boma Situated just west of the Seneto Gate, within the Malanja Depression.\n\nOlduvai Gorge\n\nThe Ngorongoro Conservation Area also protects Olduvai Gorge, situated in the plains area. It is considered to be the seat of humanity after the discovery of the earliest known specimens of the human genus, Homo habilis as well as early hominidae, such as Paranthropus boisei.\n\nThe Olduvai Gorge is a steep-sided ravine in the Great Rift Valley, which stretches along eastern Africa. Oldupai is in the eastern Serengeti Plains in northern Tanzania and is about 50 kilometres (31 mi) long. It lies in the rain shadow of the Ngorongoro highlands and is the driest part of the region. The gorge is named after ‘Oldupaai’, the Maasai word for the wild sisal plant, Sansevieria ehrenbergii.\n\nIt is one of the most important primitive sites in the world and research there has been instrumental in furthering understanding of early human evolution. Excavation work there was pioneered by Mary and Louis Leakey in the 1950s and is continued today by their family. Some believe that millions of years ago, the site was that of a large lake, the shores of which were covered with successive deposits of volcanic ash. Around 500,000 years ago seismic activity diverted a nearby stream which began to cut down into the sediments, revealing seven main layers in the walls of the gorge.\n\nThe Ngorongoro Crater\n\nEncompassing three spectacular volcanic craters, the Olduvai Gorge, huge expanses of savannah, forest and bush land, the Ngorongoro Conservation Area is the top of Tanzania’s tourism industry. The Ngorongoro Conservation Area (NCA), measuring 8,300 square kilometres, is also the only place on earth where mankind and wild animals co-exist in harmony. The NCA became a Man and Biosphere Reserve in 1971 and was declared a World Heritage Site by UNESCO in 1979.\n\n\nAnimals at the Ngorongoro Crater\n\nApproximately 25,000 large animals, mostly ungulates, live in the crater. Large animals in the crater include the black rhinoceros, the local population of which declined from about 108 in 1964-66 to between 11-14 in 1995, the African buffalo or Cape buffalo, and the hippopotamus. There are also many other ungulates such as the blue wildebeests (7,000 estimated in 1994), Grant’s zebra, the common eland, and Grant’s and Thomson’s gazelles (3,000). Waterbucks occur mainly near Lerai Forest. There are no topis, oribis, or crocodiles. Impala are absent because the open woodland they prefer does not exist. Giraffe also are absent, possibly because of a lack of browse species. Tanzanian cheetah, East African wild dog, and African leopard are rarely seen.\n\nThe area contains over 25,000 large animals including 26 black rhinoceros. There are 7,000 wildebeests, 4,000 zebras, 3,000 elands and 3,000 Grant’s and Thomson’s gazelles. The crater also has the deepest known population of lions, numbering 62. Higher up, in the rainforests of the crater rim, are leopards, about 30 large elephants, mountain reedbuck and more than 4,000 buffalos, spotted hyenas, jackals, rare wild dogs, cheetahs, and other felines.\n\nThe legendary annual wildebeest and zebra migration also passes through Ngorongoro, when the 1.7 million ungulates move south into the area in December then move out heading north in June. The migrants passing through the plains of the reserve include 1.7 million wildebeest, 260,000 zebras, and 470,000 gazelles. The Lake Ndutu area to the west has significant cheetah and lion populations. Over 500 species of bird have been recorded within the NCA. These include ostrich, white pelican, and greater and lesser flamingo on Lake Magadi within the crater, Lake Ndutu, and in the Empakaai Crater Lake, where a vast bird population can be observed. Ngorongoro also has two other volcanic craters that is Olmoti and Empakai, the former famous for its stunning waterfalls, and the latter holding a deep lake and lush, green walls.\n\n\nNgorongoro Crater is a can’t-miss destination in Tanzania which offers a classic Big 5 safari experience in the unique setting of an ancient volcanic caldera. The African black rhino, largest tusker elephants, Ngorongoro Crater Lions, leopards and buffalos are healthy available in the Ngorongoro Crater. Ngorongoro Crater scenery is spectacular, predators are abundant and it’s not unusual to see the Big 5 in a single day. The Ngorongoro Crater is the obvious choice and the best place in Tanzania to see the Big Five. Ngorongoro Crater is one of the most beautiful natural wildlife safari sites in the world and an exceptional place to interact with people from the Maasai tribe. Because of the variety of animals present, the Ngorongoro Crater is a well-known tourist attraction.\n\nNgorongoro Crater Lions\n\nThe Crater’s lions of Ngorongoro population varies significantly over time, the one constant being their complete disregard of vehicles, they will hunt within yards of a vehicle, and when exhausted even seek shade beside them. Ngorongoro Crater lions are known with its habit of climbing trees.\n\nSpotted hyenas are even more common here, often competing with the lion, and there’s are a small but growing number of cheetah. Leopards are around, especially in the vicinity of the Lerai Forest. Side-striped and the lovely golden jackal are often seen skulking around, whilst bat-eared foxes are a rarer sight.\n\nThe crater has one of the heaviest known population of Masai lions, numbering 62 in 2001.A side effect of the crater being a natural enclosure is that the lion population is significantly inborn. This is due to the very small amount of new descents that enter the local gene pool, as very few migrating male lions enter the crater from the outside. Those who do enter the crater are often prevented from contributing to the gene pool by the crater’s male lions, who expel any outside competitors.\n\nThe park is teeming with wildlife, with animals such as zebra, buffalo, hyenas, wildebeests and lions thriving in the area. There are approximately 30,000 animals, though certain animals (e.g. giraffe and impala) are not present due to difficulties negotiating the crater rim cliffs and insufficient grazing opportunities.\n\nVegetation cover\n\nNgorongoro is home to lush green, rain-watered vegetation, as well as desert plants. The area has uncultivated lowland vegetation, arid and semi-arid plant communities, abundant short grass used for grazing, and highland forests. Scrub heath, grasslands, high open moorland, and the remains of dense evergreen forests cover the steep slopes of the crater, while highland trees including Peacock Flower, Yellow-Wood, Kousso (Hagenia abyssinica), and Sweet Olive can also be found. There are also extensive stretches of pure bamboo on Oldeani Mountain, and Pencil Cedar on Makarut Mountain to the west. Dove- weeds dominate the lower slopes, while the upland woodlands contain Red Thorn Acacia and Gum Acacia that are critical for protecting the watershed.\n\nThe crater basin is covered by open short grass plains with fresh and brackish water lakes, marshes, swamps, and two patches of Acacia woodland. The Lerai Forest is home to the Yellow Fever tree and Acacia, while Laiyanai Forest has Pillar Wood and Acacia Lahai. The undulating plains to the west are grass-covered with occasional Umbrella Acacia and Commiphora Africana trees. Blackthorn Acacia and Zebrawood dominate in the drier conditions beside Lake Eyasi. These extensive grasslands and bush are rich, relatively untouched by cultivation, and support very large animal populations.\n\n\nFlamingos are very common at lakes in the NCA, all of which are saline. Flamingos are filter feeders and feed on plankton. Plankton is a collective name for microscopic plants and animals that occur in the mud and on the surface of shallow, saline lakes.\n\nInformation Center\n\nAn information center for the northern circuit is located along Boma Road in downtown Arusha. The Center provides detailed information on tourist attractions, facilities and activities available in the Ngorongoro Conservation Area. Most safaris depart from Arusha town and the information center is a must for visitors. Internet facilities are available. Promotional publications, wildlife books, cards, audio cassettes and CD-ROMs are also available.\n\nLake Magadi\n\nThe Munge Stream drains Olmoti Crater to the north, and is the main water source draining into the seasonal Salt Lake in the center of the crater. This lake is known by two names, Makat as the Maasai called it, meaning salt and Magadi. The Lerai Stream drains the humid forests to the south of the Crater, and it feeds the Lerai Forest on the crater floor – when there is enough rain, the Lerai drains into Lake Magadi as well. Extraction of water by lodges and NCA headquarters reduces the amount of water entering Lerai by around 25 percent.\n\nThe other major water source in the crater is the Ngoitokitok Spring, near the eastern crater wall. There is a picnic site here open to tourists and a huge swamp fed by the spring, and the area is occupied by hippopotamus, elephants, lions and many others. Many other small springs can be found around the crater’s floor, and these are important water supplies for the animals and local Maasai, especially during times of drought.\n\nFollowing the recommendations of the ad hoc committee of scientists convened after the year 2000 drought, an ecological burning program was implemented in the crater, which entails annual or biannual controlled burns of up to 20 percent of the grasslands. Maasai are now permitted to graze their cattle within the crater, but must enter and exit daily.\n\n\n\nEmpakaai Crater is a deep soda lake that shelters about half of the 6km wide. This caldera is much smaller, yet charming in its own way. You’ll often find thousands of flamingos in the shallows of the emerald lake giving it an outstanding pink color. The views from the rim over the Ngorongoro Crater to Ol Doinyo Lengai are thought to be some of the most remarkable in Africa on very clear days you can even see Mount Kilimanjaro and Lake Natron.\n\nLake Magadi\n\n\n\n\nThe Olmoti Crater\n\nThis is the second crater which has a shallow base covered in grass. Here you should be able to see some of the Maasai tribe with their livestock as well as wild buffalos, reedbuck and eland. Crossing the crater is The Munge River which leads into a mesmerising waterfall which falls hundreds of metres.\n\n\nWhat to Do in NgorongoroPark\n\nThings to do in Ngorongoro crater\n\nActivities inside the Ngorongoro Crater itself are limited to game driving; there are a couple of picnic spots in the park, but getting out of the vehicle is strictly limited to these areas. However, a full range of activities is on offer in the wider Ngorongoro Conservation Area, including walking, trekking, excursions to Olduvai Gorge and visiting the Masai and other tribes.\n\nVisit the Olduvai Gorge\n\nOlduvai Gorge, is located in the heart of the Serengeti National Park and the Ngorongoro Crater. This 300-mile long gorge is famous for being the site where 2-million-year old human fossils were found. Step back in time, and walk the same paths that our ancient ancestors walked. And while you’re here, don’t forget to visit the small but charming Oldupai Museum that was founded by Mary Leakey, the woman responsible for finding the fossils! This will be a great opportunity for those traveling to Ngorongoro from Serengeti, and will absolutely give you a great understanding about our descendants and how they lived!\n\nBird Watching\n\nThe mixture of forest, canyons, grassland plains, Lakes and marshes provide habitats for a wide range of bird life. The wet months see the arrival of the Eurasian migrants at the pools. White storks, yellow wagtails and swallows mingle with the local inhabitants: stilts, saddle-bill storks, ibis, ruff and various species of duck. Lesser flamingos fly in to feed from their breeding grounds at Lake Natron. Distinctive grassland birds – ostrich, kori bustards and crowned cranes-abound. The rest of the NCA also has areas which will reward the keen birdwatcher.\n\nExperience the “Masai Way of Life”\n\nTravelling to Ngorongoro crater without visiting a Maasai village is really an incomplete destination. The Maasai are semi-nomadic people who have lived in Kenya and Tanzania for a very long time. You can experience the Maasai way of life in their bomas (village-like communities). The Maasai are very welcoming, and are eager to share information about their customs, lifestyle, and traditions. There are a variety of circuits that offer visits into these Maasai villages. If you want to observe their lifestyle in greater depth, you can get in touch with a local NGO or your travel agent to schedule a private village trip- this would be way less touristy, and will give you an insider view of the villages as well.\n\nVisiting The Ngorongoro Crater\n\nThe crater is a stunning natural wonder of the world and sits right in the middle of the Ngorongoro Conservation Area. The bottom of the crater is popular for incredible opportunities to see game; you could view some exceedingly rare animals (e.g. black rhino) as well as many different herds of animals.\n\nOriginally, The Ngorongoro Crater was volcanic and was formed approximately 20 million years ago as part of the Rift Valley. The rim of the crater is high, standing at 2220 m (1.4 miles) so take a jacket or sweater as it can get chilly! The steep walls at the side of the crater rise over 600 m from the floor and it is the most magical area in the conservation area certain to enthral every person who visits.\n\n\nAccommodation in NgorongoroPark\n\nAccommodation while at Ngorongoro crater\n\n\n\n\n\n\n\nNgorongoro Wildlife lodge\n\n\n\n\n\n\nNgorongoro Serena Safari Lodge\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n", "pred_label": "__label__1", "pred_score_pos": 0.9845027327537537} {"content": "Bisley Oxford Blue 2 3 Drawer Locking Filing Cabinets\n\nBisley Oxford Blue 2 3 Drawer Locking Filing Cabinets undercounter locking drawer\n\nBisley Oxford Blue 2 3 Drawer Locking Filing Cabinets undercounter locking drawer\n\nThe following article will explore the 10 drawer cabinet locking or usually termed an ottoman drawer. It’s true, you may feel unfamiliar with this particular drawer’s name. However, you certainly often locate this drawer and ottoman since it’s usually seen in many houses for example furniture. The height with this bisley oxford blue 2 3 drawer locking filing cabinets is lower than the different drawer’s average weight. This drawer is created minus the hand backs and backagain. This makes it identified while the same of the seat at which to set the foot aka the foot drawer when you intend to relaxed sit. You have to know this drawer and ottoman possess a brief history based on its unique name. Given that the 13th century, both ottoman drawers have been around through the Turkish Empire. Then, the many Turkish people had utilised a drawer as being a footrest. The Ottoman identify has been popularized from the British in 1806. They identified that this particular furniture like a pillow or substance that had no hand and back backs.\n\nbisley oxford blue 2 3 drawer locking filing cabinets as well as different pieces of furnishings for in door will probably require a few faculties to make them fit from your place. Ahead of you select the drawer you like, you need to ensure that the purpose of the bit before jump into the decorative aspects. Certain wood types give the toughness and delicacy whenever you permit its normal design shows. Meanwhile, in addition, there are drawer locks wrapped in upholstered fabrics which ensure it is looks magnificent without leaving its principal functionality. As an instance, a lacquered eating drawer and dining table can seem luxurious. But, it’s not going to endure to family members meals for a long period without a regular maintenance.\n\nAcrylic is a kind of plastic which resembles a glass. Nevertheless, the acrylic has some features that make it superior to glass. Certainly one of those advantages it includes is the flexibility making it perhaps not easily broken and is also simple to cut, drilled, smoothened, polished or painted. Acrylic can be shaped straight into a variety of elaborate shapes, including drawers. Both office and home drawers might be drawn up from this affordable substance. 3 drawer locking cabinets are extensively used in ready rooms or place of work canteens. bisley oxford blue 2 3 drawer locking filing cabinets can be found in a easy but captivating structure, in a wide range of color. They are also light weight, easy to move, and can be arranged in order that storage doesn’t occur location.\n\nThe bisley oxford blue 2 3 drawer locking filing cabinets include movement element because it is crucial to allow the human body moving when sitting at the drawer. The strain in your spine may be decreased by proceeding. Additionally it is helpful for sending oxygen to the muscle tissues. The bloodflow to your mind will be increased too. All of those me an a great productivity without a doubt. It’s beneficial to proceed along with also this drawer can support your own body while they proceed. The drawer locks should really be chosen since it’s a orientation attribute. Folks can feel comfortable and attentive when they are able to modify their posture whilst sitting. Reclining can be done comfortably because of the aid from Natural Glide process inside this drawer. There was not any requirement to fret about arm, neck, along with eye-straining.\n\nThe first element to take into consideration when purchasing the bisley oxford blue 2 3 drawer locking filing cabinets that isn’t just good but in addition ergonomic would be your height which needs to be adjustable. The major difference involving the design drawer and the office drawer could be that the height. Even the drawer for drafting is higher than the typical off-ice drawer since it’ll soon be properly used for working on the drafting table which is rather tall. But the 10 drawer cabinet locking always gets the identical feature into this off ice drawer that allows height alteration. The perfect one additionally needs to have enough room for accommodating your system girth without even the hips being pinched. Examining various drawer types are required to locate a very good fit.\n\nThen prevent your bisley oxford blue 2 3 drawer locking filing cabinets from a liquid, then it reduces the chance of one’s juice or liquid may fall in the 3 drawer locking cabinets. If already done, wash your drawer having a soft brush and baking soda that has been mixed with just a tiny drinking water to turn into paste. Or you may call chair cleanup companies. Don’t forget, don’t put onto the drawer, as it may harm the seat holder or even make your drawer leg break. Afterward, wash your drawer out of dust occasionally in order to accumulate on your seat that could cause many diseases afterward. Those are a few methods to look after your rolling drawer therefore that it’s lasting and enduring, if you really do it and attentively, clearly your drawer will continue.", "pred_label": "__label__1", "pred_score_pos": 0.9550571441650391} {"content": "Culture & Media\n\nPurun Media Co., Ltd. was established in May 2018 with a registered capital of 50 million yuan. As a media company engaged in investment of film and television production, production and distribution, performance brokerage, advertising, cultural training, large-scale event planning, literary and artistic creation, venture capital investment and industry park incubation, it actively explores new ways for integrative development of multiple industrial resources and advocates cultural exchanges and cultural and economic development at home and abroad with new thinking and models under the support of first-class cultural consultants and expert team. It enjoys a good reputation in the industry. \n\nIn 2018, Purun Media undertook the Opening Ceremony of 2018 China Chongqing Diaoyu Fortress Tourism Leisure Cultural Festival and the Glorious Year of Diaoyu Fortress to Apply for World Heritage Classic Party and held the launching ceremony for costume drama series Diaoyu Fortress, aiming to carry forward Chinese history and the national spirit, promote the internationalization of the Diaoyu Fortress relics study and facilitate its application for world heritage and cultural exchanges.\n\nIn the future, Purun Media will create a card of Chongqing culture and promote cultural exchanges between China and the foreign countries with the aim of cultural communication; make active efforts for integration of cultural resources and tourism resources and strive to build a new healthy and livable destination for culture featured by green ecology and industry-city integration by the mode of “take culture as the core, technology as the backbone and tourism as the carrier”.\n\n Zip Code:401121 Tel:023-63063353\n Add: B1-17&18,No.92 Xingguang Avenue,Yubei District,Chongqing.\n猎鱼达人v8出售 下载六狮电玩城大四喜 1-49哪些数是连码 参与麻将群赌博违法吗 广东时时彩 排列三稳赚投注技巧 nba比分多少 三张牌炸金花作弊 喜乐彩 广西快乐双彩官网 腾讯麻将外挂有用吗 辽宁快乐12app下载 什么快递员最赚钱 球探比分网足球即时比分手机版 七星彩论坛 快速时时彩 手机麻将作弊管用吗", "pred_label": "__label__1", "pred_score_pos": 0.9497285485267639} {"content": "Definitions for \"Upstream\"\nA kind of transmission in which information or data is fed from an end user to a server. See “downstream”.\nRefers typically to the transmission speed from the user to the data network.\nIf the process by which something is accomplished or produced is thought of as a \"flow\" from one stage of the process to another, then \"upstream\" refers to the stages of the process that come before the stage that serves as the reference point. Improvements or innovations made upstream in a process (e.g., Design of product or process) often can have high-leverage impact on results downstream.\nToward the higher part of a stream; against the current.\nThe section of river that is between you and the start of the river. The side of the boat facing the oncoming current.\nIn the direction opposite to the movement of traffic.\nKeywords:  uptime\nTowards the Internet away from the school. For example (relative to your school), the BrightSparks network is upstream of VicOne, which in turn is upstream of your school network.\nin Internet access, is traffic originating at the customer end and travelling toward the service provider, possibly for transit to other points on the Internet.\nUpstream refers to a relative position in DNA or RNA. Each strand of DNA or RNA has a 5' end and a 3' end, so named for the carbons on the deoxyribose ring. Relative to the position on the strand, upstream is the region towards the 5' end of the strand.\nKeywords:  ping, sync, credentials, explicit, blog\nan explicit destination that the blog account user configures with credentials, but many blog engines automatically ping popular aggregation sites\nIdentifies DSL sync rate from the end user premises to the DSL equipment.\nIn xDSL, the communications from the customer site up into the telecommunications network.\nKeywords:  filtered, blows, air, side\nThe side of the filter that the air blows into, before being filtered.\nA reference used to describe equipment/vessels located in the production process in advance to an identified location/vessel\nKeywords:  cable, move, signals, network, company\nSignals in a cable network that move from the home to the cable company.", "pred_label": "__label__1", "pred_score_pos": 0.8836427330970764} {"content": "Strona główna Popularne Muzyka Rozrywka Sport Śmieszne\n\nThe truth about the ancient Egyptian pyramids\n\n2015-07-09 41 Dailymotion\n\nThe last remaining of the Seven Wonders of the ancient world, the great pyramids of Giza are perhaps the most famous and discussed structures in history. These massive monuments were unsurpassed in height for thousands of years after their construction and continue to amaze and enthrall us with their overwhelming mass and seemingly impossible perfection. Their exacting orientation and mind-blowing construction has elicited many theories about their origins, including unsupported suggestions that they had extra-terrestrial impetus. However, by examining the several hundred years prior to their emergence on the Giza plateau, it becomes clear that these incredible structures were the result of many experiments, some more successful than others, and represent an apogee in the development of the royal mortuary complex.\n\nUdostępnij znajomym", "pred_label": "__label__1", "pred_score_pos": 1.0000078678131104} {"content": "TRACE 2019 video abstracts\n\n\nSorted by date of submission. Click on link to access the videos.\n\n1. Mauro Bernabei et al.: The Rigopiano tragedy: dendrochronological analyses of the trees along the avalanche track.\n\n2. Francesco Niccoli et al: The influence of mixed tree plantation on soil fertility and plant productivity: a combined approach.\n\n3. Michal Rybníček et al.: The oldest dendrochronologically dated wooden construction in Europe.\n\n4. Jörg Niederberger et al.: Immobilization of P into wood and bark following fertilization.\n\n5. Juliane Stolz et al.: From wet to dry: Studying the climate sensitivity and resilience of pine and beech growth over a precipitation gradient in northeastern Germany.\n\n6. Anastasiia Lahoiko et al.: Wood formation in two Quercus roburphenological forms in Kyiv, Ukraine.\n\n7. Marek Ježík et al.: Intra-seasonal beech chronologies response to weather variability during twelve consecutive seasons at high altitude in Poľana Mts., Western Carpathians, based on proxies extracted from dendrometers.\n\n8. Serena Antonucci et al.: Influence of climatic factors on silver fir xylogenesis along the Italian Peninsula.\n\n9. Enrico Tonelli et al.: Are short tree-ring series suitable for detection of climate-growth relationships? A trial with young black pines encroaching the central Apennines treelines.\n\n10. Elisabeth Robert et al.: Remarkable absence of within-species adjustments in conductive xylem, phloem and xylem parenchyma structural traits along a water availability gradient.\n\n11. Alba Anadon-Rosell et al.: Assessment of the rewetting effects of a swamp through the quantitative wood anatomical analysis of Alnus glutinosa.\n\n12. Cesar Alvites et al.: Dendrochronology of Polylepisin the AndesDendrochronological analysis and growth patterns of Polylepis reticulata(Rosaceae) in the Ecuadorian Andes.\n\n13. Peili Fu et al.: Seasonal radial growth of Toona cililata from tropical forests with contrasting soil water status in Xishuangbanna, SW China.\n\n14. Tzu-Tung Sassa Chen and Hans Linderholm: Can climate change trigger resurgence of infectious diseases? A malaria case study in Sweden.\n\n15. Allan Buras et al.: Willow dwarf-shrubs in a changing Arctic: insights from a natural long-term warming experiment.\n\n16. Allan Buras et al.: Provenance selection and site conditions determine growth performance of Quercus robur.\n\n17. Kristof Haneca et al.: WOODAN: towards a European database of wooden archaeological artifacts.\n\n18. D. Tishin et al.: Xylogenesis of Scots Pine growing in stress conditions of the Middle Volga Region, Tartastan, Russia.", "pred_label": "__label__1", "pred_score_pos": 0.5963402986526489} {"content": "\n\nSunglint on Turkmenbashi Gulf\n\nSunglint on Turkmenbashi Gulf\n\nAn astronaut onboard the International Space Station took this photo of sunglint reflecting off Turkmenbashi Gulf, an inlet on the southeastern edge of the Caspian Sea. The complex glint patterns are due to waves, winds, the presence of oils or surfactants, and the presence of boats and drilling platforms—all of which alter the roughness of the water surface.\n\nJust beyond the narrow passage into Turkmenbashi Gulf, dozens of offshore drilling operations dot the sea surface. The Caspian Sea is a large oil-producing region, and these drilling platforms are located over a natural gas field. Though these platforms are barely visible from space, the passing waves and sunglint create a traceable line, making the structures easier to locate from above. Wakes from boats also create linear streaks as they head to and from towns and petroleum storage.\n\nA bright, hook-shaped streak appears in the sunglint near the drilling platforms. This could possibly be an oil slick or bilge water discharge from a ship. The streak has been reworked by waves, so the source cannot be determined from this photo.\n", "pred_label": "__label__1", "pred_score_pos": 0.6988233327865601} {"content": "du·al·i·ty : the quality or state of having two parts\n\n\nnoun \\dü-ˈa-ləә-tē also dyü-\\ : the quality or state of having two parts\n\nDuality is my long term, photography project falling under the fine art genre. The intent is to create a series of self portraits, that speak to the viewer both visually and mentally. I intend the images to be reflective and reveal meaning behind the evolution of the “Self”.\n\n\n\n\nI hope you enjoy my images as much as I enjoyed the journey that brought them to life.", "pred_label": "__label__1", "pred_score_pos": 0.9999966621398926} {"content": "I believe in moons\n\n“Martian moons are Phobos and Deimos,\nthe latter translated as Panic,” I told you then.\nI would leave you that very next week for California.\nThe last time we drove around the lake in your jeep,\nopen air, breeze whipping the hair against our ears, you\nI still don’t know what you mean.\n\nStillness and Presence\n\n\n\n\n\n\n\nT.S. Eliot, “Four Quartets” \n\nThe dance is ongoing. It is presence. It never was nor will be but at the still point of our ever turning, evolving world–that is us. And the dance is lovely and freeing if you stay there.\n\nDark Matter, Does it?\n\n“If the multiverse idea is correct, then the historic mission of physics to explain all the properties of our universe in terms of fundamental principles–to explain why the properties of our universe must necessarily be what they are–is futile, a beautiful philosophical dream that simply isn’t true. Our universe is what it is because we are here. ”\nAlan Lightman, “The Accidental Universe”\n\nAstronomy week, when the class and I read two essays, one about the relationships of the sun, moon and Earth–and one human to another, and one about the aim of science to figure out who we are, why we came to be, is an exciting week for me.\n\nI wax on about the mysteries of the universe, the idea of the multiverse, Big Bang, Intelligent Design, Newton and the Theory of Gravity, Darwin and the Theory of Evolution, Einstein’s Theory of Relativity, ten or more dimensions of space, quantum theory, quarks, string theory, Inflation theory, dark energy and matter, the complete absence of a theory on how the human brain creates consciousness, and the overall pursuit of a fully coherent cosmos that adds up to us–what scientists had hoped to achieve through speculation, calculation and logic, beginning with observing natural laws, up til recent history when the Hubble deep field experiment revealed the probability of a multiverse.\n\nThe project to discover the cause and effect chain to everything had to be abandoned with thrown up arms, seemingly also abandoning the aims of the preceding thousands of years’ work. Alan Lightman writes about this interrupter known as the multiverse in “The Accidental Universe.” And when I ask students, who look at me as if I am on a 70’s psychedelic trip, what this all has to do with them, their reality right now, no one can answer–not even the ones who desperately want to answer something, anything.\n\nLike history, the cosmos is just too far away. They cannot feel it, not even as a dream they may have had and can recall in that hazy sense of remembering a distorted reality deeply imprinted in another realm of consciousness.\n\n\nAnd so students interpret that faith in the unknown not as the spurs to discover what is out there but as the sigh of futility. It has so little to do with their immediate aims–surviving school, work and social media.\n\nBut it is human arrogance to require relevance to the human condition. Or that the multiverse is created in our own image, running round ourselves like the orbiting moon to Earth, Earth to the sun.\n\n“The disposition of the universe–that crazy wheelwright–designates that we live on a wheel, with wheels for associates and wheels for luminaries, with days like wheels and years like wheels and shadows that wheel around us night and day; as if by turning and turning, things could come round right.” Amy Leach, “You Be the Moon”\n\nI miss the eloquence, enthusiasm, sincerity and passion of this scientist to make the real imaginable and the imaginable real:\n\nA Little Perspective\n\nTeaching Amy Leach’s You Be the Moon (Sail on my little Honey Bee) today in class, I cannot help but think of David Eagleman and his brilliant TEDtalk on posibilianism. Though the made up term is interesting enough, I am completely enrapt with this twenty-three minute talk for its first three minutes when he reveals what the deep field Hubble experiment yielded several years ago. My jaw no longer drops because I have shared this talk with my classes semester in and semester out for the last few years but my mind’s jaw still does.\n\nPosibilianism is also a fun kind of idea too.  Enjoy.", "pred_label": "__label__1", "pred_score_pos": 0.9955267906188965} {"content": "Tribal structures in Kandahar Province\n\nTribal structures in Kandahar Province:\nPashtuns comprise the major ethnic group in Kandahar and Pashto is spoken by about 98% of its population. Dari and Balochi are also commonly spoken in the province. Kandahar’s major tribes are the Popalzai (of which President Karzai and his family are members), the Barakzai, the Alkozai, the Noorzai and the Alezai. The tribal structure is complex and deeply rooted – such allegiances are often important considerations when political appointments are made.\n\nThe tribe is an underlying social factor in Kandahar, but its importance for Kandahar’s politics and security can be overestimated. Kandahar’s tribes are not unified political entities. Almost all political leaders in Kandahar claim to be tribal elders. Control over guns, money, and connections to the state have become far more important. if the tribe is not the central driver of politics in Kandahar, however, it is the terrain on which Kandahar’s political battles are fought.\n\nWe Will Write a Custom Essay Specifically\nFor You For Only $13.90/page!\n\norder now\n\nTherefore, understanding tribal and ethnic structures is an important aspect for the project staff, where keeping balance among the tribal representation is key to the success of a project and program.\n\nPolitics and Power Dynamics:\nWhile most actors in Kandahar call themselves tribal leaders, few influential actors in Kandahar derive their influence from their positions. control over guns, money, and foreign support have become more important as sources of power. Influential actors in Kandahar nevertheless attempt to maintain influence over the tribal system and often organize their networks, militias, and cartels along tribal lines.\n\nThe power structure in Kandahar province is divided among various entities and tribes, which need a comprehensive power analysis to be done. There is a feeling among residents of Arghandab district that, despite their close proximity to the provincial capital, they are largely neglected by the central government. Given their relative population and the historical prominence of the tribe, they have a reasonable expectation of playing a larger role. Yet the Alokozai have weak links to Kabul and, despite the influence of the late Mullah Naqib, they have largely been excluded from the provincial government. The last influential Alokozai in the provincial government was Khan Mohammad, who served as police chief for the province from 2009 until his assassination in 2011.\n\nThe Karzai and Sherzai’s families and the police commander of Kandahar province (Abdul Razaq) are among the people that can positively or negatively influence the project depend on the project how they can handle it. The existence of various patronage networks on ethnic lines may be an issue of concern for the project. The existence of various power holders and their competition for the resources and power can put severe impacts over the projects. These power holders can impose severe pressure to involve them or their groups under the project or searching their interest and or involving them in the project related procurement or hiring their companies and firms to provide services under the project.\n\nIDPs and Refugees in Kandahar Province:\nOverall, Kandahar province hosts a total inflow of 257,899 returnees and IDPs, of which 70% are IDPs and 30% are returnees. Although Kandahar district hosts the most displaced persons (94,631), the most affected settlement is Marofian Kalay in Spinboldak, which hosts 22,395 IDPs and returnees.\n\nKandahar city has become a haven not only for rural Kandaharis, but also for tens of thousands of internally displaced persons (IDPs) from Uruzgan and Helmand provinces. The most credible estimates suggest the city’s population has more than doubled in the last five years to around 800,000, though some estimates suggest the city’s population is as high as two million.\n\nThe involvement of IDPs and refugees and other disadvantaged groups such as ethnic and tribal minorities and women groups might be the potential areas which need to be assessed during the FCAS Assessment for the MFF and especially for tranche first.\n\nWater scarcity:\nFarmers and gardeners from several districts of southern Kandahar province are worried water shortages ile some of the towns are going without water, others are faced with an acute scarcity of the resource. The water level of Dalah dam, which irrigates most of farmlands in Arghandab, Shah Walikot, Zherai, Panjwai, Maiwand, Dand and Daman districts, has considerably fallen due to which farmers in the above mentioned districts are receiving very little or no water at all. This shortage of water is taking a heavy toll on their crops, and orchards, causing them severe economic losses.\n\nShortage of water in the above mentioned districts further intensify the water management related disputes especially between up and downstream communities. In order to reduce chance for such conflicts over the water management issues, a proper FCAS assessment need to be conducted during the processing stage of the first tranche of the MFF and identify how the existing water management capacities could be promoted and what strategies are need to be adopted to empower local capacities to manage water related conflicts.\n\nAs the first tranche of the MFF would mainly effect the upstream and downstream communities in term of replacement and resettlement and increase in water amount for irrigation, therefore the project would need to conduct an FCAS assessment especially focusing the resettlement process. The project need to assess options of where these replace communities would be settled. As there are possibilities to resettle the replace communities in the downstream areas, and if yes, what would be possible FCAS impacts of resettling them in the downstream areas. i.e. overburdening of the resources in the downstream communities, the interaction of different ethnic and tribal groups and internal conflicts issue and etc.", "pred_label": "__label__1", "pred_score_pos": 0.8261005878448486} {"content": "Dominican amber: jewelry and award-winning amber from the Dominican Republic\n\nDo you remember the movie Jurassic Park? They created dinosaurs by extracting dinosaur DNA from blood sucked by an insect trapped in amber. These are quite sensational things!\n\nAlthough, of course, all science fiction has enough science behind it to make it a pretty intriguing scenario for reflection. I remember shopping at a nature store when this movie first came out and they noticed the renewed excitement people were showing over amber jewelry containing insects.\n\nFossils of all kinds are fascinating, of course, but the fossils contained in the amber have a special intrigue because they are often preserved in such a sophisticated three-dimensional detail. This also includes the soft parts and details to the cell structure. These amber fossils are a window into the past that we just don't get from other fossils, as an impression of rock!\n\nIn fact, amber is itself a fossil, not just insects and other once-living creatures stored in it. Amber is a fossilized woody sap, also called resin. The exact process by which wood juice hardens into a fossil is still a mystery and therefore cannot be repeated in a laboratory. This makes the amber very special and very sought after.\n\nAmber is found all over the world, but the two areas with the highest concentrations so far are the Baltic region of Eastern Europe and the Dominican Republic. The Baltic amber is commercially available on a much larger scale and for a much longer time than the Dominican amber. In fact, it was not until 1960 that the world began to pay serious attention to Dominican amber. However, he was definitely known to the indigenous Taino as early as 400 AD. They used it as an ornament and it was found associated with their graves. Amber deposits in the Dominican Republic have also been known to Christopher Columbus and the Spanish colonialists since the end of 1490, since the people of Taino presented them with amber necklaces on their first arrival. However, the Spaniards have such a clear focus on gold, they have largely forgotten about amber.\n\nIn 1960, Germans began to extract amber in the Dominican Republic and export rough amber products from the Dominican Republic for processing. In the late 1970s, the Dominican government began to consider the value of amber as a national natural resource and passed a law that would not allow the export of that resource unless it was worked by local Dominican craftsmen. This has kept some of the revenue generated from this natural resource in the country.\n\nToday, tourists visiting each region of the Dominican Republic can find jewelry from Dominican amber and other fine amber items for sale in outdoor markets, beach stands, traditional shops and museums. In fact, this is one of the hottest items sold in the Dominican market, which makes people often forget how hard it is to actually get there.\n\nMost of the best Dominican amber, the hardest and oldest and most inclusive, is located in the La Cumbre mountain area north of Santiago and south of Puerto Plata. It is found high in the mountains and is accessible only by foot or donkey. In addition, it is tightly embedded in lignite sandstone layers and must be extracted from the rock in a piece and by hand. Therefore, it is quite difficult to pass and this requires special skill and hard physical labor. So when shopping for Dominican amber jewelry, keep in mind how difficult it is to get this beautiful gem and you will understand why it can and should command a higher price than other jewelry.\n\nDominican amber is considered to be of higher quality than Baltic amber for two main reasons. First, Dominican amber is more translucent than Baltic amber, so you can see more clearly what is built into it. In fact, Baltic amber is usually quite dark by comparison and full of artifacts that make it difficult to see. Second, Dominican amber has about 10 times more interesting inclusions such as insects than Baltic amber. We will look at these reasons in more detail below.\n\nWhen you grab a piece of Dominican amber, you hold a piece of precious story in your hands – literally! Dominican amber comes from the tree sap of Hymenaea protera, a tree that is extinct but associated with the modern algarrobo tree. However, through DNA testing, it is believed that this prehistoric extinct tree is more closely related to another type of hymen found in Africa. In fact, all the Himalayan trees in the Caribbean are considered to be derived from hard seed pods flying from Africa to the southern equatorial course along the same route as the hurricanes. The trees from which the Dominican amber was created are thought to have dominated the shade of the ancient Caribbean tropical forest 20 to 40 million years ago. These impressive trees reached a height of about 82 feet (25 meters).\n\nMost Dominican amber comes in the same shades of color you would find in different types of honey: straw yellow, deeper golden, orange and brown. However, Dominican amber is also available in other colors that are rarer and therefore more valuable than collectors. Red amber is sometimes formed by surface oxidation and can be quite beautiful. Green amber is even rarer and the rarest of all is blue amber. Both green and blue amber fluoresce these colors under natural sunlight and are considered by many to be the most beautiful type of amber.\n\nOne of the things that makes Baltic amber so much more opaque than Dominican amber is that it is often filled with small air bubbles. That is why baltic amber is sometimes called \"bone amber\" because it may look like the inside of a bone. In an effort to remove these bubbles and try to create a clearer and lighter piece of amber, Baltic amber is often treated with high pressure and temperature. This often leaves noticeable streaks all over the amber piece. Dominican amber does not need to be subjected to such stresses and is therefore more virgin and often more valuable.\n\nBlue amber is found almost exclusively in the Dominican Republic, but you should be careful that you get the real thing when you buy it. A piece of jewelry made from blue amber, especially a piece with a pleasing inclusion, is almost always much more expensive than a piece of gold amber. If you find a blue amber piece that you think is unrealistically cheap, beware of the buyer! Keep in mind that only about 220 pounds (100 kilograms) of blue amber is opened annually, so the market should never be flooded with blue amber jewelry.\n\nIt should also be noted that all true Dominican amber fluoresces in blue light under ultraviolet light. In fact, this is one technique used to determine if Dominican amber is real or not. Copal, hardened wood juice, but not fully absorbed, is sometimes deceptively marketed as amber, but this imitation will not fluoresce under ultraviolet light.\n\nInclusions in Dominican amber jewelry and other Dominican amber jewelry can greatly increase the value of each piece. Insect insects found in the Dominican amber include flying ants, shameless bees, sweat bees, beetles, mushrooms, sands, small crickets, moths, spiders, pseudo scorpions, parasitic wasps, flies, plant protozoans and bony beetles. You will also find leaves, flower petals, plant roots, undivided eggs, spores and pollen. In larger pieces you will even find rare amphibians, reptiles or mushrooms! These pieces can cost a fortune and are often preserved as museum pieces.\n\nIn addition to jewelry, some collectors collect unusually nice pieces of amber. They may contain a rarer form of inclusion or unusual color. All inclusions have some scientific value, but some are so valuable to the scientific community that they are not allowed to be taken out of the country and the Dominican Museum of Natural History approves.\n\nDominicans are becoming more aware of how valuable their amber resources are, and therefore the value of this amber is growing rapidly. Dominican amber is a true treasure and one of the benefits of traveling to the Dominican Republic is the ability to shop for a favorite piece of it. Finding Dominican amber elsewhere becomes more difficult every day.", "pred_label": "__label__1", "pred_score_pos": 0.9564369916915894} {"content": "Intracellular pathogens are responsible for an enormous amount of worldwide morbidity and mortality and the development of vaccines and therapeutics to treat diseases caused by these pathogens continues to represent one of the biggest challenges facing the international biomedical community. By virtue of their intracellular niche, these pathogens avoid extracellular immune defense mechanisms, and consequently, vaccine strategies that target the production of antibodies have been largely ineffective. The Portnoy lab tackles a wide range of problems related to the pathogenesis and host response to intracellular pathogens with the goal of developing vaccines and therapeutics. Specifically, the lab works on Listeria monocytogenes, a facultative intracellular food-borne bacterial pathogen that is an outstanding model system with which to dissect basic aspects of host-pathogen interactions.\n\nSpecifically, the lab is focused on the interaction of the facultative intracellular bacterial pathogen Listeria monocytogenes and its mammalian host. This fascinating microorganism is able to enter cells, escape from a phagosome, circumvent autophagy, avoid cell death pathways, and grow rapidly in the cytosol. By exploiting a host system of actin-based motility, the bacteria move through the cytosol to the cell membrane and into pseudopod-like projections (listeriopods) that are ingested by neighboring cells. This mechanism allows pathogens to spread from one cell to another without ever leaving the host cytoplasm thereby avoiding the immune response. Current research covers many topics including basic microbiology, the cell biology of infection, innate immune responses, acquired immunity, and vaccine development to both infectious diseases and cancer.\n\nCharacterization of the essential virulence factor LLO.\n\nThe L. monocytogenes pore-forming cytolysin, Listeriolysin O (LLO) is an essential determinant of pathogenesis that mediates escape of the bacteria from host phagosomes allowing the bacteria to grow in the cytosol. Although LLO is related to dozens of other members of this family of cytolysins, LLO is the only one that is required by an intracellular pathogen. Accordingly, LLO has evolved numerous properties that allow it to specifically act within the host cell without causing cell death. We are currently studying the regulation of LLO synthesis and the cell biology of its trafficking in cells. We recently discovered that LLO synthesized by cytosolic bacteria forms pores in the cytoplasmic membrane but prevents killing the host cell by mediating endocytosis and targeting LLO for degradation. Mutants lacking this activity are 10,000-fold less virulent. Most recently, we have uncovered a mechanism that controls the translation of LLO so that it is synthesized and secreted during the starvation environment in a phagosome, but much less so during growth in the host cell cytosol.\n\nRegulation of virulence gene expression.\n\nL. monocytogenes lives a biphasic lifestyle that includes growth in the environment, including food, and infection of warm-blooded animals, including humans. Most determinants of pathogenesis are controlled by the master virulence transcriptional regulator. We recently found that intracellular bacteria detect the host environment by responding to the redox state of the host cell. We are currently using bacterial genetics to study how the bacteria sense and respond to alterations in redox. Most recently, we identified an 8-gene locus that encodes a flavin-based extracellular electron transport system that makes L. monocytogenes electrogenic. Importantly, we have also found these genes in 100s of other bacterial species including members of the intestinal microbiota. We are now studying how this system contributes to growth in the intestine and during infection.\n\nInteraction of L. monocytogenes with the innate immune system.\n\nWe have three new projects that relate bacterial metabolism to host innate immunity.\n\n(1) We discovered that the bacteria secrete c-di-AMP, a conserved signaling molecule that binds to and activates STING, a critical hub for the detection of microorganisms and tumors. We are currently studying the basic microbiology of c-di-AMP and its role during pathogenesis. Most recently, we have begun to explore how activation of STING can lead to trafficking from the intestine to distal sites. \n\n(2) Humans possess a particular type of T-cell (gamma delta T- cell) that is activated by an intermediate of bacterial isoprenoid biosynthesis. Some bacteria synthesize this intermediate while others use the same pathway as humans. L. monocytogenesis one of the very few bacteria that use both pathways. We are currently seeking to understand why L. monocytogeneshas both pathways and determine the role of each during infection.\n\n(3) Humans and mice have T-cells called MAIT cells that are stimulated by bacterial metabolic intermediates of riboflavin biosynthesis. L. monocytogenes is a riboflavin auxotroph and is not predicted to stimulate MAIT cells. We are current examining if MAIT cells respond to L. monocytogenes infection and if these T cells play a role during L. monocytogenes infection and immunity.", "pred_label": "__label__1", "pred_score_pos": 0.9116933345794678} {"content": "Skip to content\n\nPosts Tagged ‘Katherine Young’\n\nWasteLAnd’s Biomes paints a portrait of Katherine Young\n\nWasteLAnd marked the opening of their sixth season with a packed venue for a concert titled Biomes, featuring three pieces by Chicago-based composer Katherine Young. Katherine Young’s pieces are multimedia electroacoustic works. She incorporates not only sounds, but lights, movement, interactive performance, and anything in between. The first piece of the night, Earhart & the Queen of Spades performed by LA-based guitarist Nicholas Deyoe, uses a variety of sounds on the electric guitar. Hearing an electric guitar make unusual noises isn’t anything new, but the way Deyoe created the sounds is. Instead of a guitar pick, Deyoe used an array of hand-held objects such as small battery-powered fans, strings of pearls, keys, and bobby pins. These objects, Young explained in the program notes, reference lost objects and myths and femininity. When the fans hover above the amplified strings, the guitar creates an eerie hum; when the fan blades strike the strings, it makes a sizzling effect. The pearls, as you might guess, sound somewhere between raindrops and hail. Each sound emanation was intriguing in its own right. Young pulled out all the stops to create a twenty-minute piece of interwoven sounds, pitches, and rhythmic motifs.\n\nThe second piece of the night displayed a completely different approach to music. The Wurlitzer part (performed brilliantly by Wells Leng) used relatively typical twentieth-century techniques like whole tone scales and cluster chords. Combined with Matt Barbier whispering and crooning microtones into the euphonium, Underworld (Dancing) reminded me of an eerie yet meditative take on an old-timey calliope dance. Basically, it’s how I imagine music in the Upside-Down à la Stranger Things. And it was rad.\n\nThe final piece of the night was the world premiere of Biomes 1.0. This piece combines acoustic instruments (two trombones+ and a bassoon, played by RAGE THORMBONES Weston Olencki & Matt Barbier, and Katherine Young herself, respectively) with electronics and lights. The lights change over time, sometimes slowly and sometimes in the span of a heartbeat, and represent the smaller ecosystems present in the encompassing biome. The instrumentalists improvise within the ecosystem, building the scene with notes, whispers, whistles, and metallic clacks and clangs, further developed by the electronics reacting to the instruments’ paths. Some segments sounded like the soundscape you almost expect: the dark green light briefly feels and sounds like a sleepy rainforest with croaking frogs and rustling vines, and then transforms into something unrecognizable but no less beautiful and comprehensive. The stark white light evokes the sharp chill of the Arctic, but instead of polar bears we find gasping tubas and huffing bassoons. Throughout the piece, the light segregated the biome into ecosystems, but the steady undercurrent of electronic noise and human breath united the parts into the whole. Biomes clocked in at over half an hour long, but I was so enchanted that time nearly stopped.\n\nKatherine Young took LA under her spell with these three incredible pieces, especially Biomes 1.0. She is WasteLAnd’s featured composer this season, so be sure to attend the rest of the concerts to hear more of her and the incredible musicians of the contemporary music scene of LA.\n\nWasteLAnd’s Featured Composer Katherine Young Interviewed by Artistic Director Nicholas Deyoe\n\nKatherine Young, WasteLAnd's season six featured composer. Photo by Deidre Huckabay.\n\nKatherine Young, WasteLAnd’s season six featured composer. Photo by Deidre Huckabay.\n\n\nAhead of the show, we got WasteLAnd artistic director Nicholas Deyoe, who has a lot of experience with Katherine’s work, to interview the composer. Here are Nick and Katherine:\n\nNick: Some of the following questions relate to your monodrama When stranger things happen and the three pieces that it draws from: Earhart and the Queen of Spades, where the moss grows, and just water, no lemon. Would you share a little bit of the background on this project?\n\nKatie: Sure! All of four of the pieces – the three concert pieces and the monodrama – are inspired by a short story called “The Girl Detective” by Kelly Link, which is a noir meditation on loss and a creative coming-of-age-story that follows a girl detective on various cases / adventures. The story takes a very fragmented, nonlinear form, and contains lots of lists of lost objects, references to myths of femininity (Nancy Drew, fairytale princesses, Demeter and Persephone, etc.), and a noir atmosphere. Each of the pieces in my cycle formally explore experiences of loss and modes of detection and creative reassembling.\n\nFor Earhart & the Queen of Spades, all of the guitar preparations – fans, bobby pins, keys, jewelry, etc. – are drawn from a list I compiled of lost items the girl detective comes across, plus things that the performers involved in the premieres had lost. So, for example, the fans are a reference to Amelia Earhart (mentioned in the story), and several of the performers told me about losing pieces of jewelry that had lots of personal significance.\n\nIt’s funny – I actually borrowed the title for Underworld (Dancing) from “The Girl Detective,” too. So I’d been thinking about that story for a long time!\n\nNick: While learning the Earhart, I developed my own emotional attachment to all of these objects and how they interact with my guitar.\n\nOn Friday night, we’re presenting a world premiere (BIOMES 1.0), something relatively new (Earhart & the Queen of Spades, 2016) and something “old” (Underworld (Dancing), 2008). You mentioned the other day that you feel a certain connection between these three pieces. Would you tell us a bit more about the connections that you feel between these pieces?\n\nKatie: Listening to the rehearsal of Underworld (Dancing) it occurred to me that each of these pieces to different degrees and in different ways blur out of a linear “musical” forms and into sonic meditations through the use of drone, saturating textures, and/or spatialization.\n\nNick: You are an active improviser, and you also produce meticulously notated scores full of nuanced details. Looking at Friday’s program, BIOMES 1.0 is driven by improvisation between you, Matt, and Weston; Underworld (Dancing) is fully notated, but filled with freedom between the euphonium and the Wurlitzer, and Earhart is very clear in its instructions, but often feels like you’re inside of a structured improvisation including recurring fragments. All of the styles feel very much like “Katie Young,” despite the range of approach. What are the differences in your own mindset when you work in these different realms?\n\nKatie: I think I’m always looking for ways to infuse a little bit more surprise into my notated scores – to give them the energy of real-time exploration that is one of the things I love about improvised music. As you point out, that can be achieved in a lot of different ways and to different degrees. Recently, I’ve been thinking a lot about the function or need the piece is serving for the people I am making it for / with, and then I use whatever notation is best for making that happen. There are things you can achieve with open forms that are really difficult to get from hyper specified notation, but there are things that that notation can make happen that more open forms can’t. But in all cases I start with the people and the sounds and go from there.\n\nDetails for tonight (October 5, 2018) are available at, and the series is currently running a fundraiser with stretch goals of making every concert this season free. You can support their work at\n\nReview: wasteLAnd’s “Tout Orgeuil” at ArtShare LA\n\nWasteLAnd continues to impress audiences with a program of new music, most of it from LA-based composers. Each performer has their respective claim to fame in LA and is closely associated with wasteLAnd, and each composer is a long-time favorite of wasteLAnd’s. New to the scene, however, is Allison Carter, a poet whose words found their way into Deyoe’s new piece. Her work made quite the stir among the audience members, and I have a feeling we will begin to hear her name more in the future.\n\nBefore I review the concert itself, I find something worth mentioning: the gender representation. It was an even split. In my day job, I currently have my students writing a paper on 19th century gender roles and women composers in the Romantic era, so this has been on my mind a lot. One hundred years ago, women could not vote in the United States, and it was nearly impossible to earn respect as a composer or performer. Nowadays, female representation in the music scene is gaining. It is not yet even, but progress is happening. WasteLAnd’s October concert featured six composers; three were women and two were men (Erik Ulman had two pieces, so the ratio of compositions is 3:3). There were seven performers (including Allison Carter reading aloud), and four were women. The best part was that I didn’t notice until afterwards. I have come to recognize that gender equality is already quite common in the LA new music scene. So much so that this is the first time I put it together. I looked back over some old programs I’ve reviewed, and every concert has women as composers, performers, directors or all three.\n\nOk. Feminist aside complete. Moving on, because there is so much good about this concert to discuss.\n\nThe night opened with Kaija Saariaho’s Folia, performed by Scott Worthington on double bass and electronics. Like many compositions from the end of the 20th century, this piece focuses on dynamics and timbre over pitch and harmony. Sometimes the bass whistles like an icy wind, other times it rumbles like an earthquake, putting palpable pressure on your ears. Scott saws out some kind of textural melody, phrases build and climax and fade – textural intensity carries the musical line. The electronic aspect augments and echoes the timbres. It overlays overtones, resulting in both a more ‘open’-sounding composition and greater complexity overall.\n\nNext on the docket was the duet Tout Orgeuil… by Erik Ulman. Stephanie Aston and Elise Roy are always an amazing team, and their performance on this piece was no exception. It begins with a piccolo solo, and Roy gradually descended down the flute family to alto flute. Aston sang sleepily about pride smoking in the night. Given that the text is from a Stephan Mallarmé poem, my mind turned to Debussy. Ulman is no Impressionist, but I feel Debussy would have approved of the modern counterpoint and expressive extended techniques. The pitches bent down, down, down into sleep, and the flutes became larger and the words grew heavier. Erik captured the good sinking feeling, the kind you feel in a cozy armchair while drifting to sleep.\n\nThird up was Matt Barbier on trombone and electronics performing puddles and crumbs by Katherine Young. For me, this piece created a very specific soundscape: I, the listener, am a koi in the pond on a rainy day and the daily miracle of food raining from heaven is happening. Three of the major elements that contribute to this soundscape are 1. Sharply sucking air through the trombone, 2. Sharp plosives into the mouthpiece that are amplified by the electronics, 3. Dynamic tempi. Matt’s deep breathing combined with the electronic influence reminded me of snorkeling, the plosive pops like rain on water’s surface when I swim underwater. These are instinctive memories, of course, and it may be a coincidence that they play so well together. Now you understand my watery theme. The push and pull of the tempo took me a while to incorporate into my soundscape idea. At first I thought it felt like seasickness, but I eventually concluded it was more like watching fish dart in a pond. They sprint only a few inches or feet, depending on the size of the fish, and then hesitate. The tempo seemed to do exactly that. And then it all became clear, that the soundscape was from the point of view of a koi in a pond in the rain during feeding time. I’m sure many will disagree, whether they had another idea or didn’t find it so blatantly programmatic at all; one of the wonders of music is how everyone experiences things differently. For what it’s worth, I did come up with a secondary interpretation that involves heavy breathing, plosive pops, and sprinting-and-stopping: Darth Vader playing basketball. So really it’s all relative. Regardless of the loftiness or pop art-iness of my personal experience, Barbier proved yet again that the trombone is more than just a brass instrument in a marching band. He played every color in the palette, and demonstrated rigorous control over his body and his instrument to perform such a demanding piece.\n\nFittingly the 100th piece wasteLAnd has programmed, Erik Ulman’s this until is a flute solo, and Elise Roy absolutely nailed it. I’ve said before that she has superhuman control of her instrument, and she proved it again with this piece. She made her flute sing, speak, howl, wail and whisper. Though a solo composition, I could sometimes here a ghost of counterpoint when she effected heavy harmonics. I honestly couldn’t say if that was Ulman’s intention or Roy’s execution, but every so often a particularly turgid note would quietly sound the octave or fourth below, creating a beautiful, haunting harmony. this until was the only solo acoustic musical composition of the night and it was right in the middle of the program; Elise managed to keep up the energy on her own, and carried us into the final pieces of the evening.\n\nThe program ends with a sort of binary piece. First, Allison Carter read her Poems from A Fixed, Formal ArrangementNicholas Deyoe used the text for his piece Finally, the cylindrical voids tapping along, a line from the poem. I can’t say I have ever attended another concert that had the poet read their work first before the musical product, and I wish this would become the norm everywhere. As a general rule, increased understanding leads to increased appreciation, so knowing the text ahead of time (and from the author herself, no less) helped Deyoe’s work succeed. The instrumentation sounded like speech slowed down by a factor of ten. The melodies felt like they wanted to resolve up to a tonic, but they kept bending downwards, defying expectations. One thing I love about Deyoe’s style is that it’s always interesting and it never fulfills your expectations. Once you think you have it figured out, he changes it again. This piece feels like your mind wandering and getting lost – when it’s 4am and you have to wake up in two hours but you’re caught up in the twilight zone that is four in the morning. Knowing composers, that is probably the mindset he was in while writing. Also, knowing composers, that is a hard composition to pull off. I commend Nicholas Deyoe for a well-constructed and evocative ensemble composition.\n\nWasteLAnd concerts are on the first Friday of every month at ArtShare. Check out Weights and Measures on November 4.\n\nEditor’s note: WasteLAnd is currently running their annual fundraiser. Take a minute to support them at", "pred_label": "__label__1", "pred_score_pos": 0.7512717247009277} {"content": "Edison Jensen\n\nEdison Jensen\n\nOf Counsel\nt: 831-454-0405\n\n\nEdison A. Jensen is an experienced attorney with over 30 years of practical and legal expertise in the formation, operation and governance of Non-Profit Corporations. He has a rare combination of both legal and business expertise as well as leadership skills that allow him to truly understand non-profit organizations from an insider’s perspective.  He has served on numerous non-profit boards and as a board president for every non-profit board he has served on.  His passion for the work that non-profits do, coupled with his understanding of their particular challenges, makes him uniquely qualified to serve his clients.  Additionally, Edison works closely with a variety of non-profit executives and board members on complex problems, strategic issues, compliance, risk and crisis management.  Edison has a particular expertise in the healthcare industry as it relates to governance in non-profit corporations.\n\nEdison has served as board president for Hospitals, Rural Medical Clinics or Federally Qualified Health Centers, Drug & Alcohol Treatment Centers, and Health Trusts (Hospital Conversion Foundation).  He was also elected as Board Chair of the Santa Cruz Trial Lawyers Association and Legal Aid of Santa Cruz County.  Edison travelled across the country in leadership positions on the Committee on Governance for both the California Hospital Association and the American Hospital Association.  Edison has received numerous awards and recognition for his commitment to social justice as it relates to access to healthcare for the indigent.\n\nEdison received an undergraduate degree in Politics from U.C. Santa Cruz and his Law Degree from Santa Clara University.", "pred_label": "__label__1", "pred_score_pos": 0.9912789463996887} {"content": "\n\n\n\nOur remuneration \n\nStable Group Ltd is open and transparent about the remuneration we receive in respect of our insurance distribution activities. We are paid on a commission basis, the commission being a proportion of the total premium paid by you which is allowed to us by the Underwriters as we act on their behalf.  If the type of policy we distribute reaches specific profit targets, the Underwriters may also pay Stable an additional amount.", "pred_label": "__label__1", "pred_score_pos": 0.9925485849380493} {"content": "“I have a bullet in my foot from trying to vote!”\n\n\nBy Michele Garnett McKenzie\n\nI’m sitting in my office, catching up with a former client. A member of the political opposition who fled Cameroon and sought asylum nearly a decade ago, she had stopped by to show me her new U.S. passport. Our talk turned to the November elections—she was so proud to finally be an American citizen and to be voting for the first time in the United States.\n\nBut when I mentioned that Minnesotans will be deciding whether to amend the constitution to require government-issued photo identification to vote, she became angry. I didn’t have to frame the issue for her. I didn’t have to give her any background about the Voting Rights Act or explain that this is a voter restriction proposal that threatens to disenfranchise thousands of Minnesotans. Before I could even tell her that The Advocates opposes the measure her eyes flashed and her voice became stern.\n\n“You have no idea how precious the right to vote is,” she told me. “I have a bullet in my foot from trying to vote!”\n\nOur clients have a first-hand understanding of what freedom and oppression mean\n\nHer reaction started me thinking about how the passage of the amendments could affect the many people we’ve helped to find asylum from persecution over the past thirty years. Every one of our clients has a unique story of their flight from their homelands where they feared persecution, torture, or death on account of their identities and beliefs. I thought of Joe, one of my first clients at The Advocates. Born in Zimbabwe, where President Mugabe had long proclaimed homosexuals to be “worse than dogs or pigs,” Joe struggled for years to hide his identity out of fear of arrest, torture, and execution at the hands of the government. Arriving in the United States, he sought asylum on the basis of his sexual orientation. What might passage of the marriage restriction amendment say to him?\n\nImmigrants have helped shape Minnesota’s proud tradition of protecting religious freedom\n\nSome proponents of the marriage amendment assert that their religious freedom is at stake, but they ignore Minnesota’s proud tradition of protecting religious freedom—a tradition rooted in the experiences of early settlers, but very much alive to this day.\n\nIn 1988, Eli Hershberger and 13 other members of an Amish religious community were ticketed for operating black, horse-drawn buggies on a public highway in Fillmore County, Minnesota, without displaying an orange-red reflective triangle, as Minnesota law requires for slow-moving vehicles. Hershberger and the others were unwilling to compromise their belief that displaying the bright sign on their buggies would mean placing their faith in worldly symbols rather than in God.\n\nThe Minnesota Supreme Court upheld Hershberger’s challenge to the law, noting that “the early settlers of this region were of varied sects, may have endured religious intolerance in their native countries and were thus sensitive to religious differences among them.” Those experiences, the court observed, shaped the text of the liberty of conscience clause in the Minnesota Constitution:\n\nThe right of every man to worship God according to the dictates of his own conscience shall never be infringed; nor shall any man be compelled to attend, erect or support any place of worship, or to maintain any religious or ecclesiastical ministry, against his consent; nor shall any control of or interference with the rights of conscience be permitted, or any preference be given by law to any religious establishment or mode of worship . . . .\n\n(Minnesota Constitution, Article I, § 16.) “This language is of a distinctively stronger character than the federal counterpart [in the First Amendment],” the court wrote, precluding “even an infringement on or an interferencewith religious freedom.” The court therefore allowed Hershberger and the others to use their proposed alternative: simple reflective tape and a lighted red lantern. The Kentucky Supreme Court, in contrast, just struck down a similar challenge brought by another group of Amish plaintiffs, ruling that the Kentucky Constitution’s protections for freedom of conscience go no further than the United States Constitution’s.\n\nThese rigorous protections should reassure people who object on religious grounds to same-sex marriage; no constitutional amendment is necessary to protect their religious freedom in Minnesota.\n\nThe proposed voter restriction amendment threatens religious freedom\n\nReligious liberty might not be the first thing that comes to mind in discussions of voting procedures. But in the United States, the fundamental right to vote has been shaped by our respect for religious freedom. Most countries hold elections on weekends, while Election Day in the United States falls on a Tuesday, to accommodate Sabbath observances.\n\nReligious freedom is at stake, because Minnesota’s proposed voting amendment would require all voters voting in person to present valid, government-issued photographic identification before receiving a ballot. The word “photographic” is key. According to a recent report by the non-partisan Congressional Research Service, some Christians believe photographs violate the Ten Commandments. “Identification laws that require individuals to be photographed … may infringe upon these individuals’ First Amendment right to exercise their religious beliefs freely.” Mississippi—the only state to place a voter ID requirement in its constitution—has an exemption for religious objectors, as do similar laws in Indiana and Pennsylvania. Minnesota’s amendment, however, has no such exception.\n\nAs further evidence of Minnesota’s long history of broadly accommodating the free exercise of religion, Minn. Stat. 171.071 allows a religious objector to obtain a non-photographic state-issued identification card. According to the Minnesota Department of Public Safety, more than 100 people have these non-photographic Minnesota IDs.\n\nBut the proposed voting procedures amendment would erode Minnesota’s tradition of promoting religious freedom. The proposed amendment to the Minnesota Constitution would not allow any exemptions for religious objectors. It would require “[a]ll voters voting in person [to] present valid government-issued photographic identification before receiving a ballot.” “All voters” means no exceptions. So the more specific voting procedures amendment would trump the rigorous freedom of conscience clause in the Minnesota Constitution.\n\nPeople who object on religious grounds to being photographed have a fundamental right to participate in our political process. The proposed amendment was poorly thought-out and fails to take into account our state’s long tradition of honoring freedom of conscience.\n\nThe Advocates for Human Rights opposes both amendments, and we are working hard to defeat them. My friend from Cameroon’s story inspires me as we work together to try and defeat the two Minnesota constitutional amendments that would restrict the right to vote and freedom to marry. Have you talked to your family, friends, and neighbors about how the proposed voter restriction amendment would affect voting rights, or how the proposed marriage restriction amendment would limit the freedom to marry? Could you make time this weekend to make calls or doorknock to help defeat the amendments? Visit Our Vote, Our Future and Minnesotans United for All Families for more information on how you can help.\n\nMichele Garnett McKenzie is Advocacy Director at The Advocates for Human Rights. Thanks to staff attorney Amy Bergquist for the constitutional research.", "pred_label": "__label__1", "pred_score_pos": 0.9030269384384155} {"content": "A Dance That Empties\n\nA Dance That Empties\nA Dance That Empties\n\nA Dance That Empties by Subtle Degrees.\n\nBandcamp Link: A Dance That Empties\n\nI’ve been listening to this album all week.\n\nNot because it is super long, but because it is super dense.\n\nIt is a Tenor Sax and Drum duo album from Travis Laplante, (of Battle Trance and Little Women,) and Gerald Cleaver, (of Farmers by Nature and Black Host).\n\nTravis Laplante is well known, along with his other compatriots in Battle Trance, for extending the tonal vocabulary of the Saxophone. “Extended Technique” and all that. He is also an extremely melodic player.\n\nBut, when I first heard about this album I was wondering, where would Gerald Cleaver fit in?\n\nMost saxophonists who traffic in arpeggio based extended technique and saxophone multiphonics do it solo. With all that going on, there’s just not a lot of room for other players to fit in.\n\nSo, I sort of put off listening to it for a while.\n\nFoolishly, it turns out.\n\nMr Cleaver is a great foil for Mr Laplante, translating his complex saxophone polyrhythms into an ever changing sea of even more complex drum motifs. Somehow finding the accent points in Mr Laplante’s playing and using them to create rhythmic units.\n\nThe album is made up of 3 pieces. All three include passages of solos and duos.\n\nMr Laplante’s playing utilizes some of the same techniques as an Evan Parker or a John Butcher, but it feels more controlled and spacious than those men’s often extremely dense work. Which I guess leaves more room for others.\n\nThough, some of the tempos these two build to are just nuts. The third piece, especially, Mr Laplante has a particularly long section where an arpeggio speeds up and speeds up until it is going so fast it is a single modulated tone. Nuts.\n\nThe funny thing, as I was thinking about this today, is the rhythms of A Dance That Empties often feels not so much like “Jazz”, as an extension of the type of playing that might accompany a Shakespeare play, Renaissance music, or an English traditional dance. Well, OK, a totally nuts Morris Dance Ritual, perhaps performed by extremely nimble goats.\n\n#ADanceThatEmpties #TravisLaplante #GeraldCleaver #TodaysCommuteSoundtrack\n\nA Dance That Empties", "pred_label": "__label__1", "pred_score_pos": 0.97016441822052} {"content": "When To Visit\nCall to speak to one of our experts 0330 094 0370\nAustralia Holidays - Picturesque panoramic landscape scenery\nWhen To Visit\n\nAustralia has a hot and sunny climate, with most of the country receiving more than 3,000 hours of sunshine a year. In summer (December to March) the average temperature is 84°F (29°C). The hottest region is the northern two-thirds of the country, which experiences humid and wet conditions in summer. Further south summer is warm with occasional hot spells and mild nights. Winter (June to August) averages 56°F (13°C) for the country as a whole, with warm days and mild nights in the northern areas, becoming cool and showery in the south (although there are still plenty of sunny days).\n\nAustralia is a vast landmass and the climate does vary from region to region so travellers are advised to research the weather in the region they are visiting, but generally the country has very pleasant weather year-round.\n\nHot and humid conditions and storms bringing tropical rain bursts typify the start of the year in northern Australia. During these months northern Australia experiences its wet season, and can be difficult to get to.\n\nIn the south, the days are warm and sunny, and while there can be heavy rain showers, these pass quickly. This is the most popular period for Australians to take time off work, with Australia Day celebrated in January, frequent sports events and numerous festivals.\n\nIn the north, the temperatures are pleasant and the crowds of summer have started to disperse. Roads open up across the region, improving access to more remote locations.\n\nWith plenty of sunshine and much less rain than the summer months, April is one of our most recommended times to visit the south. \n\nNorthern Australia’s 'dry season' (during the Australian winter) is a time of lovely sunny days and warm temperatures, well suited for exploring on land or underwater. The tidal currents around the Great Barrier Reef are gentler, creating good snorkeling conditions.\n\nIn the country’s southern regions the weather is more temperate, making for good hiking conditions, although it can be rainy in certain parts.\n\nIn the north, the temperature and humidity start to build, causing the odd thunderstorm. This can bring welcome rain, transforming Outback landscapes with wildflowers. Along the coast, high winds can affect access to the reef islands.\n\nIn the south, this is the start of spring. Terrific walking and wildlife-spotting opportunities open up in the national parks and coastal regions. As Christmas approaches, Christmas lights and trees appear in towns and cities under blue skies. The year culminates in New Year's Eve celebrations with dazzling firework displays.", "pred_label": "__label__1", "pred_score_pos": 0.5054502487182617} {"content": "Le Jardin de Villandry\n\nLoire Valley\nAttractions and places of interest\nGreat Outdoors\n\nVillandry owes its fame to its 6 beautiful gardens - the  water garden with its mirror-like lake, the decorative ornamental garden, the maze, the sun garden, the herb garden and at the lowest level the splendid kitchen garden which is completely replanted twice a year.\n\n\nNearby attractions\n\nBuilt on an island in the river Indre, the Château d'Azay-le-Rideau is one of the most famous chateaux in the Loire Valley.\n\nThe Jardin botanique de Tours (5 hectares) is a municipal botanical garden and arboretum, it began as a collection of about 2,000 medical and exotic plants arranged in greenhouses.\n\nThe Tours mueseum of fine arts was originaly established 4 March 1795 but has been situated in the bishop's former palace since 1910. The museum has over 12,000 works but only 1,000 are on show to the public. The ground floor...\n\nThis 15thC fairytale château belonging to the famous Beauvau family has been lovingly restored. The 12 beautiful gardens offer many delights including the Potager de Gargantua with huge vegetables, the Lavender Knots garden,...\n\nPlaces to visit nearby\n\nTours in the Loire Valley is a modern city with a history dating back to the Romans that is famous for its architecture, wines and markets.\n\nSaumur in Atlantic Loire Valley is easily recognised by its fairytale chateau and is famous for its association with horses - the area around the town is even known as the Kingdom of the Horse.\n\nBlois in the Loire Valley is a charming royal city with an historic château that has been home to 7 French kings and 10 French queens.", "pred_label": "__label__1", "pred_score_pos": 0.5231699347496033} {"content": "Workshop \"Intercultural Communication\"\n\nWorkshop \"Introduction to Intercultural Communication\" by Alexia Petersen, M.A. in the MAINZ Seminar room (03-122) at Staudinger Weg 9, Mainz\n\nAim and content of the workshop:\n\n● Provide a knowledge base of cultural differences and their impact on typical cross-cultural\n\ncommunication behaviour (framework for transparency)\n\n● Provide tools for identifying and solving intercultural communication problems (workable\n\n\n● Guide participants in transferring a conceptual understanding of cultural differences into\n\neffective intercultural communication skills (applications training)\n\nThe increasingly international and multicultural demographics in the academic and scientific workplace mean that students are faced with having to be more interculturally skilled and proactive when interacting in teams with other students, or with supervisors and professors, who can approach work and supervision in unexpectedly very different ways.\n\nUsing authentic complex case studies and scenarios, Part 1 of the seminar will establish the conceptual foundations that underlie the main communication styles that play out in crosscultural work cultures. Through different frameworks of cultural rationale and expectations students learn to identify likely culture-based conflict interfaces, as well as to appreciate the risks and potentials inherent in different work cultures. This is the key step in structuring knowledge for use in applications, enabling a critical “paradigm shift” in devising new strategies in key work scenarios such as conducting meetings, managing conflict, requesting and providing information, optimising multicultural teams, and providing motivational leadership. In particular, the workshop approaches these scenarios from the perspectives of the doctoral student working with other students and team members, and with his or her team leader or supervisor, to ultimately draw together the necessary tools required for effective cross-cultural work in international teams, conflict management, and leadership skills. Whether students are presently in leadership positions or simply often called upon to exercise leadership abilities, sensitivity and skill in handling the cultural context of teamwork is a key component to harnessing and synergising the multicultural work potential.\n\nHaving established these foundations and defining the conceptual “Red Thread”, Part 2 focusses on their application in various work scenarios. Case study work enables students to practise “paradigm shifting” in their assessment of conflicts and misunderstandings in the communication and problem-solving process from different perspectives across cultural and status divides. Another major application here explores the manifestation of cross-cultural conflicts on the language level, and how using language to create psychological space and “facework” is a key leadership skill in managing conflict, motivating teamwork, and solving concrete problems. We therefore isolate the hidden conflicts in the so-called “international English”; how, for example, the characteristic features of “German-English” typically lead to misunderstanding or conflict with“English-English” or “Japanese-English”, etc., regardless of technical language ability and a common scientific vocabulary. This important component, therefore, both extends and completes the conceptual framework developed through the seminar.", "pred_label": "__label__1", "pred_score_pos": 0.9988336563110352} {"content": "City of Lies\n\nI’m not a statistician, but I’m guessing there are at least a few of you who were excited to see City of Lies, a film that stars Johnny Depp and Forest Whitaker as they try to crack the case of who murdered iconic rapper Notorious B.I.G. (aka Biggie Smalls) in a 1997 drive-by shooting. But you’ll have to temper that excitement, because even though the movie was slated to come out exactly one month from today, it has now been yanked from release altogether.\n\nHere’s the film’s trailer, just to show you what you’re going to be missing out on:\n\nDeadline reports that distribution company Global Road has not set a new release date, leaving the film’s future hanging in the balance. Also complicating matters is a lawsuit against Depp from this film’s location manager Gregg “Rocky” Brooks, who says “he was repeatedly hit by Depp after being informed that filming that night in downtown L.A. was going to have to wrap late.” I wonder if Depp attacking a random co-worker will change any of his die-hard fans’ minds about the allegations that he assaulted his ex-wife Amber Heard? (Spoiler: it won’t.)\n\nBrooks is charging Depp with assault and battery and “seeks damages for hostile work environment, retaliation, and wrongful termination among the claims.”\n\nIn cases like these, I can’t help but feel bad for all of the people who worked on this movie and are inadvertently punished for the bad behavior of its star. I’ve been on tons of film sets and the crews are always the hardest workers in the room – they get there early, stay later than everyone else, and are generally excited to show people what they’ve been working on. To have all that work go to waste is a huge shame, so part of me hopes this movie at least goes direct-to-video so they can show their friends and families the fruits of their labor.\n\nBrad Furman (The Lincoln Lawyer, The Infiltrator) directed the movie, which had a script by actor-turned-screenwriter Christian Contreras. Here’s the film’s official synopsis:\n\nBased on the true story of one of the most notorious and unsolved cases in recent memory, CITY OF LIES is a provocative thriller revealing a never-before-seen look at the infamous murder of The Notorious B.I.G. shortly following the death of Tupac Shakur. L.A.P.D. detective Russell Poole (Johnny Depp) has spent years trying to solve his biggest case, but after two decades, the investigation remains open. “Jack” Jackson (Forest Whitaker), a reporter desperate to save his reputation and career, is determined to find out why. In search of the truth, the two team up and unravel a growing web of institutional corruption and lies. Relentless in their hunt, these two determined men threaten to uncover the conspiracy and crack the foundation of the L.A.P.D. and an entire city.\n\nCool Posts From Around the Web:", "pred_label": "__label__1", "pred_score_pos": 0.5199970006942749} {"content": "How the world’s biggest CCTV company’s cameras can easily be hacked\n\nIf you use the devices Xiongmai and Xiongmai OEM together you should be prepared: SEC Consult discovered a significant vulnerability in surveillance CCTV maker giant Xiongmai’s cameras.\n\nAs the connections between the devices and the user’s mobile phone are unencrypted when managed with an app, third-parties can access the cameras without even being requested for a password. This allows hackers to spy on the owner, carry out botnet instructions and larger network intrusions.\n\n\nRead more about this here.", "pred_label": "__label__1", "pred_score_pos": 0.9999263286590576} {"content": "How to Take a Good Care of Your Liver\n\nThe busiest organ in the human body is the liver. Located deep below the right-sided arch, it performs more than 300 functions. The ancient Greeks said that the center of the human soul is right there because it is well hidden. It weighs about a kilogram, and after the skin is the biggest organ without which life is impossible. wants to share with you some valuable information on liver and liver disease.\n\nThe liver has the task of processing all the food we bring into our bodies. At the same time, detoxifies the harmful products that are ejected through the urine and the stool. It is the main filter for bacteria naturally found in the intestines, but also everything else that enter the body, including medicines. It is most engaged when we enter antibiotics, and other medications. It is also subject to toxins such as pesticides, food and water pollutants with which the organism comes into contact. It also performs detoxification of alcohol and tobacco coming through the bloodstream. It synthesizes most of the protein in the blood and thus regulates the level of sugar and creates energy for the work of other organs. All important metabolic processes take place in the liver. It produces cholesterol, but it comes through the blood, and it is eliminated through the breathing.\n\nHow is the liver regenerated?\n\nIt’s the only organ that can regenerate. Even if, for some reason, three quarters of it are destroyed, it is able to take over all the functions and perform them completely normally. In addition, this last part has the power to regenerate and completely restore its original state. This restoration takes between four and six weeks. That’s why it is perfect for transplantation, because only one part can be transplanted, so that everything is completely replaced.\n\nAvoid eating fried food\nIf the liver takes large amounts of fat and processed foods, or fast foods such as fried potatoes, donuts, chips and similar products that will have a toxic effect on the liver. The same applies to spicy, fried, canned foods. The materials from this prepared food damage the liver cell membranes, penetrate into it, and continue to develop harmful processes. Healthy fats can be found in cold-seasoned oils, most preferably olive and pumpkin seeds. The liver should not be burdened with alcohol and carbonated drinks, while in moderate amounts have a positive effect on the work of this organ and protects against cancer. In fact, one should be moderate in both food and drink, avoiding stressful situations. Eat as much fresh fruit and vegetables as any overeating causes the weakness of the organism, which is due to problems with the liver, because it is unable to process this amount of food. Make sure you take a proper care of your liver by eating healthy food such as vegetables and fruits and avoid drinking alcohol and smoking cigarettes.", "pred_label": "__label__1", "pred_score_pos": 0.9370420575141907} {"content": "Circular reasoning\n\n\nNormal is regular. Average. Medium.\n\nNormal is safe, familiar, warm and comfortable.\n\nNormal is the thing you know.\n\nIt is what is.\n\nBut normal isn’t great.\n\nNormal isn’t fantastic.\n\nNormal can never be amazing.\n\nThese words from the Mini “Not Normal” Campaign summarize the paradox of normal. On the one hand, most people want to be considered normal; no-one wants to be thought of as abnormal. However, we don’t want to be thought of as only normal. We’d like to believe that we are unique, special, and different than everyone else, that is, not normal.\n\nNormal is the most common thing that people are or the way most people act under a given set of circumstances. Because normal applies to most people, most people are, by definition, normal. It would difficult to have a functioning society if the majority of its people did not behave normally. Such a society would be in chaos, as everyone pushed the boundaries of normal behaviour.\n\nHowever, society also requires a few people to not be normal. The great leaders, innovators, thinkers and agitators who push the world forward and change it for the better are not normal. Einstein, Michelangelo, Picasso, Freud, and Steve Jobs were exceptional, refused to accept the normal world they were born into (the status quo) and fought hard to change it. It is only after their accomplishments become well known and accepted that these individuals became part of the new normal.\n\nBecause normal applies to the mind, it’s a major component of psychiatry. People who act or think in an abnormal way, especially if it can cause them or others harm, should receive treatment. A desire to eat candies is normal, but a desire to eat several kilograms of candies a day is not. However, there is a sad history of labeling people abnormal or deviant who were simply different than others. There’s only a two letter difference between sane and insane, but in those two little letters lies all the difference.\n\nNormal has a shape. Some shopping malls have large circular sculptures hanging from their ceilings. The reason for this is psychological. The malls are carefully designed to signify they are a safe and comfortable environment. When shoppers see circles, they see safety, because a circle has no sharp edges. People who feel safe and comfortable are more likely to have a longer shopping experience.\n\nA sphere is a three-dimensional circle. Bubbles form naturally into spheres because it’s the smallest shape required to hold the air inside the soap film. Planets are spherical, because when they form, they are extremely hot, making the planet fluid; the planet eventually succumbs to the gravitational pull from its center. The best way to get the planet’s mass to the centre is to form a sphere – it is nature’s “laziest” shape.\n\nRoundness, therefore, is a physical manifestation of normal. But there’s another subtler link between roundness and normal.\n\nOne way of measuring normal is to plot the values of something on a graph. For example, if you plot the ages, weights or heights of people, they would follow a pattern that looks like this:\n\n\n\n\n\n\nThis shape is called a normal distribution or bell curve. It’s a visual representation of what is normal. There’s a formula that represents this normal distribution. It’s a complex one but here it is:\n\n\n\n\n\nAt the bottom portion of this formula near the centre, you’ll see the number π (pi). If you remember your high school math, pi is the ratio of the circumference of a circle to its diameter, approximately 3.14. That is, at level of mathematics, there’s a connection between circles and how things are normally distributed.\n\nPerhaps that is why so many things that we find normal are round, from the rings on our fingers, to the wheels we move on, the dishes we eat off and the buttons we press and dress with. It is why normal people are called “well rounded”.\n\nNature has methodically programmed into our world the desire for normal through this shape. Even the body parts we use to perceive roundness: the eye’s cornea, pupil, lens and retina, are themselves round. And we see it all while standing on the Earth, the largest, roundest shape of all.", "pred_label": "__label__1", "pred_score_pos": 0.8770574331283569} {"content": "JL, SM & CECILIA @Nieuwe instituut Rotterdam\n\nJanthinobacterium Lividum, Serratia Marcenscens and Cecilia Raspanti started at TextileLab Amsterdam - Waag and explore together dyeing with bacteria as an alternative.\n\n\nDesigners have been inspired by nature for centuries, mainly focusing on its aesthetics and functionalities. Today, technology allows us all to explore and observe micro mechanisms showing how bacteria function and perform activities.\n\nThis collaboration project is a research exploration of how we can not only learn and imitate, but also collaborate with microorganisms. Choosing to collaborate with these bacteria also means to learn from their behaviour, needs and reactions, but also teaches us how to work in an open, transparent and inclusive manner.\n\n\n\nThe bacterial studio and bioshades project was presented in the context of Biotopia, one of the 4 sections of the exhibition.\n\n\n 1. bacteria dyes research studio\n 2. bacterial pigments archive - JL, SM, ML, MR\n 3. bacterial dyed panel - silk chiffon 250 cm x 150 cm\n\nimage credits: Het Nieuwe Instituut", "pred_label": "__label__1", "pred_score_pos": 0.9950112104415894} {"content": "Who needs to comply with HIPAA? Advantages and Limitations| Hideez\n\n\nHealth Insurance Portability and Accountability Act of 1996 (HIPAA) was developed as an industry standard to ensure strong protection of personal healthcare information (PHI). Department of Health and Human Services (HHS) regulates HIPAA compliance, and the Office for Civil Rights (OCR) enforces it.\n\nIf you have ever asked yourself, Do I need to be HIPAA compliant? — you will find the answer below.\n\nWho needs to comply with HIPAA?\n\nHIPAA applies to the following covered entities: a health plan, a health care clearinghouse, and a health care provider who transmits any health information in electronic form.\n\n • Health plans include HMOs, company health plans, health maintenance companies, Medicare, Medicaid, CHAMPUS. To be covered by HIPAA, a group health plan, by definition, should have 50+ participants or be administered by an entity other than the employer who established and maintains the plan. Even employers and schools need to be HIPAA compliant once they enroll employees and students in health plans. \n • A health care clearinghouse means an entity that processes or facilitates the processing of health data into the industry-standard form. In practice, it includes billing services and community health management information systems.\n • HIPAA defines a health care provider as an individual or organization that provides medical or other health services. A wide range of specialists from surgeons to podiatrists fits this description. Who else needs to be HIPAA compliant as a health care provider? Hospitals, clinics, nursing homes, pharmacies, and more.\n\nIn 2013 HIPAA Omnibus Rule expanded the privacy and security regulations to business associates of the covered entities described above. Any vendor or subcontractor who accesses personal health information (PHI) automatically becomes liable for HIPAA compliance. Examples of business associates include data processing firms, medical equipment service companies, data storage and/or shredding companies, lawyers, consultants, etc.\n\nWhat is HIPAA Compliance?\n\nHIPAA compliance is a systematic approach that ensures confidentiality, integrity, and availability of medical data. A set of measures includes self-audits, remediation plans, policies, procedures, employee training, incident management, and more. A detailed HIPAA compliance checklist can be found on our blog soon.\n\nThere are several HIPAA compliance software and hardware solutions for healthcare. Hideez offers innovative identity and access management solution. Centralized credential provisioning allows you to manage digital and physical access efficiently, immediately off-board employees, set up multi-factor authentication that provides stronger security without extra effort. How? Hideez Key is a token that locally encrypts and stores passwords, allowing users to access data they need by pressing a button. Employees cannot view the passwords and thus — cannot disclose them. Hideez HIPAA solution protects against one of the most common security threats in the healthcare industry — phishing. With the Hideez Key users are unable to use their credentials on a fake page. \n\nHow we can recognize a fake page? Set a Demo Call>>\n\nThe Hideez Key offers a smart lock feature for users. Powered by Bluetooth, it automatically locks a computer when a user walks away. Such a proximity lock prevents unintentional disclosure of sensitive information. It is particularly helpful in workplaces with multiple shared computers, like hospitals, clinics, pharmacies, and other covered entities.\n\nThe advantages of HIPAA compliance\n\nThe number one benefit of being compliant is risk mitigation. HIPAA sets best practices for handling sensitive patient data. Achieving HIPAA compliance means a company has security management systems and protocols in place and is efficient against today's level of risk. \n\nCompliance also means no corrective action is taken against your organization. Under HIPAA penalties for noncompliance include monetary cost, external and internal investigation and overhaul, and in case of severe violation —  imprisonment for up to 10 years. \n\nAnd finally, proactive protection from data breaches secure patient trust in your organization. \n\nWhy is HIPAA Important to Healthcare?\n\nAn organization or individual, who has to comply with HIPAA, may consider the regulation challenging and pointless. However, it protects the medical information (one of the most targeted data on the black market) by setting an industry-wide standard for the storage, access, maintenance, and transmission of PHI. HIPAA reduces the risks of abuse and fraud in healthcare. \n\nBy complying with HIPAA, you ensure that clients’ medical data is kept private. It builds trust and reputation for your organization. Once there is a data leak, this trust and, thus customers, is lost. Prevent financial and reputational losses by introducing HIPAA compliance solutions for your organization. Hideez Enterprise Server for Healthcare makes day-to-day compliance effortless for the end-user.", "pred_label": "__label__1", "pred_score_pos": 0.767723023891449} {"content": "A Rainbow\n\nHave you ever seen\nA rainbow over the mountain?\nIt is like a crown\nPut on its tip\n\nby Rose Marie Juan Austin Click to read full poem\n\nComments (14)\n\nA symbol of promise that He will come back again and again Giving comfort and beauty Spell-binding write...The imagery you created projects a aura of inexplicable beauty that only dwells in the heart.... made me see rainbow in a deeper perception...To my poem list and 10+++++++\nIt is amazing how a poet sees things different from what most see. A rainbow like a crown worn, or a ring given by the lover. Beautiful, rains, called megha in Sanskrit can be imagined as the lover sending a special ring for Earth, an eager bride, that he showers with his love.\nNice environment, feeling pleasant to read.\nExcellent poetry. A very astute comparison between true love and rainbow. Simple and beautiful. Loved it.\nComfort and beauty! Colours in unity; Muse of the Rainbow. Thanks for sharing this poem with us.\nFinely crafted imagery...very sweet poem dear friend...///\nA spectacular poetic description of a rainbow!\nA wonder romantic description of rainbows, imagining it as a crown or an engagement ring are the lovely poetic ideas. Well wrote Rose, a rose among poetesses.\nNo, I have never seen a rainbow as spoken of in this lovely poem. I love rainbows and you poetic vision of them enlarged mine and gave me an unforgettable vision of love and beauty in nature's arms. See, what excellent poetry can do. Thank you, dear Rose Marie.\nWhat a beautiful poem po :) keep it up\nA symbol of promise......great piece. Thank u, dear poetess.anjandev roy.\nA symbol of promise that/He will come back again and again/Giving comfort and beauty.......powerful imagination! A wonderful poem so beautifully penned................10\nAn excellent expression, dear ate Rose....10++++\nGreat imagery and imagination. I have seen double rainbows.", "pred_label": "__label__1", "pred_score_pos": 0.861896276473999} {"content": "Free download. Book file PDF easily for everyone and every device. You can download and read online RESURRECT AND RESTORE file PDF Book only if you are registered here. And also you can download or read online all Book PDF file that related with RESURRECT AND RESTORE book. Happy reading RESURRECT AND RESTORE Bookeveryone. Download file Free Book PDF RESURRECT AND RESTORE at Complete PDF Library. This Book have some digital formats such us :paperbook, ebook, kindle, epub, fb2 and another formats. Here is The CompletePDF Book Library. It's free to register here to get Book file PDF RESURRECT AND RESTORE Pocket Guide.\n\nTips & Tricks to Resurrect Your Dead iPhone\n\nWhen restoring layouts, i3's built-in ability layout restoring functionality is used. This creates placeholder windows where each one will \"swallow\" any new window that matches specified criteria window class, instance, title etc. This is necessary for matching by window title because the title must match when the window first appears and programs usually only update the title after the window is created see here for more details.\n\nThis project originated as a mixture of hacked together Python and bash scripts that I wrote in order to be able to quickly save and load workspaces on the fly. I hate having to reboot my computer because it disrupts everything I have open which tends to be a lot. To cope with this problem, I try to make it as easy as possible for myself to get everything back to its pre-reboot state. I quickly found out about the i3-save-tree utility and i3's append-layout command, but these weren't much use to me on their own, as you are expected to customise a layout manually after saving it and relaunch all your programs manually when you restore the layout.\n\nMy solution was to create a script that would extract just the bits from i3-save-tree that are needed, and use the i3ipc , wmctrl , and psutil Python libraries to obtain the commands necessary to launch the programs in a saved workspace.\n\nSince I decided to release this publicly, I have improved the standard of the code a great deal and gotten rid of the hacky bash parts. The code is all Python now, and i3-save-tree is no longer needed as I have reimplemented it in Python. When matching windows by title, the programs must be restored before the layout, because the title often won't match when the window first appears.\n\nWhen restoring a layout, i3-resurrect uses xdotool to unmap and remap every window on the workspace which causes i3 to see them as new windows so they will be swallowed by the placeholder windows. A default config file will be created when you first run i3-resurrect. In the case of a window where the process cmdline is not the same as the command you must run to launch that program, you can add an explicit window command mapping in the config file. For example, gnome-terminal's process is gnome-terminal-server, but we need to launch it with the command gnome-terminal.\n\nTo get this working, you would put the following in your config file:. In this scenario, you could create one rule that by default maps the application's window class to have no command, and another that sets the command if it also matches a certain title:. For terminal emulator windows, we must get the working directory from the first subprocess usually this will be your shell instead of the window's root process the terminal emulator.\n\nFor example, if you use both Alacritty and gnome-terminal and you want their working directories to be restored correctly, you would put the following in your config file:. Some examples are included in the default config.\n\n • Zellias Blade?\n • De-extinction?\n • Camelot Tactician;\n • Navigation menu.\n\nIf you would like me to add more command mappings or terminals to the default config, please open an issue for it. It is also possible to configure swallow criteria on a per window basis, which will override the criteria set by the --swallow command line parameter. We use SemVer for versioning. For the versions available, see the tags on this repository.\n\nSee also the list of contributors who participated in this project.\n\nAre We Close To Resurrecting The Dead? Scientists Revive Brain Cell Activities In Dead Pigs\n\nFor those interested, other excellent software I use to get things up and running quickly includes:. Sep 10, Aug 5, Jul 20, Jul 13, Jul 9, Jul 8, Jul 6, Download the file for your platform. A natural process of de-extinction is iterative evolution. An example of a species where this process occurred is the White-throated rail. This flightless bird became extinct approximately , years ago due to an unknown major event that caused sea levels to rise which ultimately resulted in the demise of the species.\n\nThe species reappeared about , years ago when sea levels dropped, allowing the bird to evolve once again as a flightless species on the island of Aldabra where it is found to the present day. Opponents of de-extinction have claimed that efforts and resources used to resurrect extinct species could have been better used trying to conserve endangered species that might themselves become extinct. In some cases, the negative impacts on extant species could be highly direct.\n\nFor instance, it is proposed that the Asian elephant would act as a surrogate mother for the woolly mammoth embryo. It has also been noted that a resurrected species, while being genetically the same as previously living specimens, will not have the same behaviour as its predecessors.\n\nSite Index\n\nThe first animal to be brought back will be raised by parents of a different species the fetus's host , not the one that died out and thus have differing mothering techniques and other behaviors. Other scholars have published ethical concerns regarding de-extinction. In Conservation Biology , Robert Sandler argues that introducing extinct species to environments may produce harm to modern species, as invasive species.\n\nIssues regarding scientific hubris, human and animal health, and the ecology of sensitive environments have been raised by the scientific community. Further research must be performed regarding de-extinction to investigate advantages and disadvantages to the technology. New technological practices must be examined to prevent environmental hazards. Counter arguments have been made, however, in regards to the benefits of bringing back extinct species. Harvard geneticist, George Church , gives an example of the positive effects of bringing back the extinct woolly mammoth would have on the environment.\n\nHe explains that if the newly developed mammoth hybrids were to be placed in areas such as Siberia and Alaska, the outcome may reverse the damage that global warming has caused. If the theories are proven true, global warming could eventually be lessened. Scientific American , in an editorial condemning de-extinction, pointed out that the technologies involved could have secondary applications, specifically to help species on the verge of extinction regain their genetic diversity , for example the black-footed ferret or the northern white rhinoceros.\n\nIt noted, however, that such research \"should be conducted under the mantle of preserving modern biodiversity rather than conjuring extinct species from the grave. It's been argued that revived species can be utilised as a tool to support other conservation initiatives by acting as a \" flagship species \" - a charismatic organism that generates popular support and funds for conserving entire ecosystems.\n\nSimilarly, the conservationist Josh Donlan claims that if the passenger pigeon were resurrected, there would inevitably be a legal impetus for the protection of its habitat under the Endangered Species Act. The existence of preserved soft tissue remains and DNA of woolly mammoths has led to the idea that the species could be recreated by scientific means. Two methods have been proposed to achieve this.\n\n\nRevive cellphone batteries from Deep Sleep\n\nThe cell would then be stimulated into dividing, and inserted back into a female elephant. The resulting calf would have the genes of the woolly mammoth, although its fetal environment would be different. To date, even the most intact mammoths have had little usable DNA because of their conditions of preservation. There is not enough to guide the production of an embryo. The resulting offspring would be an elephant—mammoth hybrid, and the process would have to be repeated so more hybrids could be used in breeding.\n\nAfter several generations of cross-breeding these hybrids, an almost pure woolly mammoth would be produced. The fact that sperm cells of modern mammals are potent for 15 years at most after deep-freezing is a hindrance to this method. They hope to use similar methods to find usable mammoth DNA. Mammoth expert Adrian Lister questions the ethics of such recreation attempts. In addition to the technical problems, he notes that there is not much habitat left that would be suitable for woolly mammoths. Because the species was gregarious , creating a few specimens would not be ideal.\n\nFirst Baptist Las Colinas | 6 Steps to Resurrect a Dead Marriage\n\nHe also notes that the time and resources required would be enormous, and that the scientific benefits would be unclear; these resources should instead be used to preserve extant elephant species which are endangered. This is currently being done by Harvard geneticist George Church , and they have already successfully made changes in the elephant genome with the genes that gave the woolly mammoth its cold-resistant blood, longer hair, and extra layer of fat.\n\nThe Pyrenean ibex was one of four original subspecies of Spanish ibex that roamed on the Iberian peninsula. However, while it was abundant during Medieval times , over-hunting in the 19th and 20th centuries led to its demise. In , only a single female named Celia was left alive in Ordesa National Park. Scientists captured her, took a tissue sample from her ear, collared her, then released her back into the wild, where she lived until she was found dead in , having been crushed by a fallen tree.\n\nIn , scientists used the tissue sample to attempt to clone Celia and resurrect the extinct subspecies.", "pred_label": "__label__1", "pred_score_pos": 0.6624834537506104} {"content": "\n$ 18.00\n\nPaw Pad Protection\n\nOur Paw Pad Protection provides the ultimate way to guard any pup’s paws from the elements. It protects paws while locking in moisture, creating a barrier between your dog and the most extreme weather conditions. Best for use when your dog is going out on hot surfaces, like sidewalks, gravel and concrete; or facing elements such as salt, ice, snow and rough terrain. Our formula is safe and non-toxic, with the added benefit of decreasing the effects of allergens your dog may come in contact with.\n\n\nDirections: Scoop a small amount, and rub into paws. Can use daily to protect pup before going outside. Paw Pad Protection absorbs quickly; allow time for salve to dry. \n\nIngredients: Mango butter, aloe vera oil, apricot oil, rice bran oil, sunflower oil, candelilla wax, carnauba wax, sunflower wax, vitamin E, essential oils and botanical extracts blend", "pred_label": "__label__1", "pred_score_pos": 0.8308023810386658} {"content": "William James: “The Meaning of Truth” (1909), and “Some Problems in Philosophy” (1911)\n\nThe great obstacle to radical empiricism in the contemporary mind is the rooted rationalist belief that experience as immediately given is all disjunction and no conjunction, and that to make one world out of this separateness, a higher unifying agency must be there. In the prevalent idealism this agency is represented as the absolute all-witness which “relates” things together by throwing “categories” over them like a net. The most peculiar and unique, perhaps, of all these categories is supposed to be the truth-relation, which connects parts of reality in pairs, making of one of them a knower, and of the other a thing known, yet which is itself contentless experimentally, neither describable, explicable, nor reducible to lower terms, and denotable only by uttering the name “truth.” (826–827)\n\n\nThe Meaning of Truth, by William James, was presented a year before his death as a sequel to his Pragmatism. Unlike some of his earlier books, this one was not a series of joined lectures, but a collection of essays published over the last half decade of his life. If you are reading his philosophical works together as I am, you find that they are really joined around an idea known as “radical empiricism,” which simply rejects the Truth claimed by idealists, but also attacked standard empiricism for basically coming down on the side of Truth (but using a different method to get there). In Pragmatism and A Pluralistic Universe (and Varieties of Religious Experience for that matter), James argues for a rejecting Truth and embracing a variety of truths, none of which can be pragmatically discounted and false. This is, of course, easy enough to prove with aesthetics. You cannot say that my preference for Beethoven over Mozart is reflecting Truth. As I understand it (I am saying this too much perhaps in this series), James would want to apply this same logic to other inquiries.\n\nHe talks about how we come to know a phenomenon, like a tiger. Our desire to hunt tigers is one phenomenon. The tiger skins we bring home are another. The tiger itself is yet another. All have a context that works in shaping our cognition. And as consciousness begins in cognition, we need to understand the process and context of our understanding of a phenomenon (“outer chain of physical or mental intermediaries connecting thought and thing”).\n\nJames argues that this position is highly humanistic, because it takes account for the diversity of various human perspectives. This seems to be a compelling argument for me as well. It certainly suggests that although human experiences are diverse and pluralistic, there are real reasons to think that humans interact in the world in ways that other creatures do not.\n\nIn one chapter, James puts forth a systematic response to all the major criticisms of pragmatism and radical empiricism. He takes them all on, but one that I do not find such a condemnation is the criticism that pragmatism is a “call to action.” It is that I think James’ philosophy demands action rather than thought that made me so attracted to it in the first place. As he clarifies, this criticism is that the philosophy appeals to technocratic types, who care only about applications without meditating on consequences of action. But, as James clarifies, the philosophy actually suggests a wide variety of actions, not the singular action of the technocrat.\n\nTo the charge that radical empiricism allows people to belief as truth in things that do not exist, James explains that things that do not have existence cannot have really good results that can be observed. Thus while you cannot get to God’s existence through his method, you can prove the existence of religious experiences. It is the same with historical figures, as he tries to explain with the question of the existence of Caesar. The radical empiricist has visible effects of Caesar’s life, including his books as evidence of his existence. The rationalist will actually have a much more difficult time proving his existence. (Now, perhaps this becomes more complicated with mythology, but I am not so troubled by the fact that people may think that Zeus or even Xena existed. At least I am not more troubled by that than the fact that people believe in God. In either case the existence is less important the experiences and the tangible results.\n\nThe book ends with a dialogue between a pragmatist and a non-pragmatist. It is a useful summary of his thought and it comes down to the pragmatist is interested in truth as it is made real in the world through various contexts. I cannot think of a more open-minded and democratic approach to truth without going off the wall into banal and useless relativism. It always us to have a conversation where the other does not assume that they look at the world in the same way as we do.\n\nPart of the power of this perspective on truth is its practicality and flexibility. I cannot help to think that in general terms this is useful for libertarians attempting to construct free spaces in a variety of different cultural areas, each with their own ecology, in both urban and rural areas. It seems it be something that can inoculate such free spaces from being fill in (permanently at least) with bad ideas. Instead of allowing vile thoughts and practices from filling in a space under the guise of “truth.” It will judge ideas based on their results and observable goodness.\n\nSo, if you think I am being too easy on James, or misunderstanding his basic point, let me know. If you think rationalism is a better path for a libertarian epistemology, let me know. As my reading of James shows, I am easily convertible.\n\nContinue reading\n\nWilliam James: “A Pluralistic Universe” (1909)\n\nThe next in a series of William James’ late career works on radical empiricism is A Pluralistic Universe, another series of lectures published into a book in 1909. Of the works I have read, it is his more direct attack on rationalism and monism. As far as philosophy goes, A Pluralistic Universe, reads a bit like an argument against intellectual absolutism and homogeneity. As such, I am forced to appreciate it. The big problem with rationalism is that is posits a Truth that is external to our own experiences (at least in many cases). If truth is singular and all of us experience the world differently, most of us are then looking at the world falsely or as a delusional. That seems unlikely as a point of fact. (At least this is how I understand the core of his argument, with my soft non-philosophical mind.)\n\nBut one as we are in this material sense with the absolute substance, that being only the whole of us, and we only the parts of it, yet in a formal sense something like a pluralism breaks out. When we speak of the absolute we take the one universal known material collectively or integrally; when we speak of its objects, of our finite selves, etc., we take that same identical material distributively and separately. But what is the use of a thing’s being only once if it can be taken twice over, and if being taken in different ways makes different things true of it? (647)\n\n\nSee, there is an added value to looking at the universe pluralistically. We can actually take part in a more rich, playful, and diverse universe.\n\nHis most significant attacks on other philosophers come at Hegel. His questioning of Hegel is really an extension of his disapproval of idealism as absolutist. An rationally-determined position conquers and dismisses all other perspectives and eventually all evidence. “All facts lead to him [the idealist].” (688) Here we come to the crux of radical empiricism as I understand it. Idealism finds truth through reason and ideas alone and then (for James at least) voyages into near solipsism. At its most radical, the idealism would be willing to reject all other opinions as false, no matter how they were determined, if they do not fall into “Truth.” The typical empiricist (I suppose most scientists fit into this category) accept “Truth,” but realize that specific findings may be provisional or incomplete. Truth determined through observation, but constantly tests by other findings and observations. The radical empiricist rejects “Truth” finding value in all observations made by others as having truth. Going a bit farther he states that fact can be found in the process by which something is observed and realized needs to be taken into account as well, and those will be highly pluralistic. Each observation is a process, thus ultimately two people will observe the same event with different processes and therefore one cannot be rejected without exposing some absolutist position. I guess in practice this means that a scientist is more right in her observation of some phenomenon than an untrained spiritualist, just because ones process of observation is informed by training and the other by a belief in ghosts.\n\nIf philosophy is more a matter of passionate vision than of logic,—and I believe it is, logic only finding reasons for the vision afterwards,—must not such thinness come either from the vision being defective in the disciples, or from their passion, matched with [Gustav Theodor] Fechner’s or with Hegel’s own passion, being as moonlight unto sunlight or as water unto wine.” (710)\n\nSo, is the point here that the typical John Locke style empiricist is a variant of idealism in that is does not understand the context of an observation?\n\nDoes this leave us with some anti-intellectualism? I suppose a degree of that is inevitable with radical empiricism, but that may not be bad in a highly technological democratic society, where scientists and engineers hold immense powers over our individual lives. Many historians of science have filled in this gap by looking at the context of this or that scientific discovery and showing how they were not the result of pure observation, but influenced by training, disciplinary standards, social expectations, religious values, culture, and much more. In this sense, perhaps James is rightfully questioning “Truth” as determined by thinkers, while also raising the standards of inquiry to include increased not just a finding, but how a finding was determined.\n\nJames explicitly states that he thinks his view of a pluralistic universe is more democratic than idealism or other absolutism philosophies. This suggests he was really seeing his ideas as an American alternative to the rationalist traditions of Europe. “The pluralistic world is thus more like a federal republic than like an empire or a kingdom. However much may be collected, however much may report itself as present at any effective centre of consciousness or action, something else is self-governed and absent and unreduced to unity.” (770)\n\nI am not sure how much thought anarchists have given to epistemology, but I am convinced that the place to begin such an investigation would be a thinker like William James. At the very least, I am convinced that there are real conflicts between idealism and a libertarian worldview, but maybe others see it differently.\n\nWilliam James: “Pragmatism” (1906–1907)\n\nWilliam James delivered the lectures that make up the book Pragmatism: A New Name for Some Old Ways of Thinking in late 1906 and early 1907. They build on the conclusions of The Variety of Religious Experiences. Essentially, his perspective on religion was pragmatic and based on observably significant religious experiences. This collection of essays is a more general statement of these principals. It seems to be to be an essentially correct perspective, resting on the idea that what matters as true is what works. And what does not work should be rejected as false. A major reason to accept his position is that “Truth” actually matters little in the world as we experience it, even if it could be determined (which Kant already showed is not really possible).\n\n\nHe starts out by describing the “dilemma in philosophy” as between empiricists and rationalists. He shows his clear preference for the empiricists. He puts it quite nicely in the following. “You want a system that will combine both things, the scientific loyalty to facts and willingness to take account of them, the spirit of adaptation and accommodation, in short, but also the old confidence in human values and the resultant spontaneity, whether of the religious of the romantic type. And this is then your dilemma: you find the two parts of your quaesitum hopelessly separated. You find empiricism with inhumanism and irreligion; or else you find a rationalistic philosophy that indeed may call itself religious, but that keeps out of all definite touch with concrete facts and joys and sorrows.” (495)\n\nHe then approaches the basic philosophy of pragmatism, stating that what matters is the concrete consequences of a particular claim. What is so radically powerful about this perspective is that it makes truth (he is indifferent to Truth) “malleable to human needs.” (515) “Pragmatism is willing to take anything, to follow either logic or the senses and to count the humblest and most personal experiences. She will count mystical experiences if they had practical consequences.” (522) This seems to me a democratic, fair-minded, and useful approach.\n\nThe rest of the lectures explore different ramifications of this position. One is that categories of substances (whiteness, combustibility, insolubility, etc.) are purely creations of pragmatic humans. This is about as clear a rejection of idealism as I can think of. Of course, that this can be immediately extended to character may be troubling to some. Of course, I am rather sympathetic to the idea that honesty or value or generosity be reflected in human interactions rather than the realm of abstract ideas. This is also James’ defense of free-will. While it may be “Truth” that free-will is an illusion, we act as if we have free-will and that assumption works fairly well in a host of questions in human societies.\n\nHe includes in the book a foundational argument to his next major work, The Pluralistic Universe.\n\n\n\nLet me attempt a pragmatic defense of anarchism. We certainly could accept an anarchist-communist principle like “from each according to their ability, to each according to their needs” on principal, but that is actually the least direct way to get there, and the path most likely to inspire resistance. It is much better to argue (as David Graeber did in a talk I saw) that this principle is essentially how we function in social relationships already. In the simple encounter of asking for direction, this principle is lived. When I ask from directions, I take from someone who owns knowledge freely from someone who is not capable (morally, most of us would agree) of refusing. In the workplace, the same principle usually applies. It would be a pretty inefficient workplace that did not accept at least the “from each according to their abilities” principal. To give a more difficult example, squatters rights (or the principal that ownership should derive from use) is simply a more efficient and just way to distribute housing. To rely on a hard principle of property rights in respect to housing is inefficient (requiring guards, banks, and all sorts of invasive legal proceedings) and unjust (ensuring that people with the need for homes will go without). Also, giving de facto ownership to occupants is basically how we see the world. When we visit a renter at their house, we act as if they were the owner. In every meaningful way that house (perhaps owned by an absentee landlord or a bank) is the moral domain of the one who lives there.\n\nAt the same time, it is may be a useful exercise to critique the state or capitalism using pragmatism. People may like in a democracy, while having little actually say over their lives. This actually seems to be empiraclly true for most people. In the same way, anarcho-capitalists may speak of free markets or free exchange, but have no empirical evidence that these exist or can exist. At the same time, pragmatically, we see that we can function without a state.\n\nWell, I am sure a philosopher or a James’ specialist can set me right on this, but I find this a reasonable extension of what he was saying in Pragmatism. Capitalism seems to be an imposition of abstract principles (most significantly property ownership) over a more pragmatic perspective.\n\nWilliam James: “Varieties of Religious Experiences” (1902): Part Two\n\nThose of us who are not personally favored with such specific revelations must stand outside of them altogether and, for the present at least, decide that, since they corroborate incompatible theological doctrines, they neutralize one another and leave no fixed result. If we follow any one of them, or if we follow philosophical theory and embrace monistic pantheism on non-mystical grounds, we do so in the exercise of our individual freedom, and built out our religion in the way most congruous with our personal susceptibilities. (459)\n\n\nThe second half of William James’ The Varieties of Religious Experiences builds on the argument that religion creates experiences that have real results that cannot be so easily discarded as crazy or irrational. This is not so much an argument for the truth of various religious claims. James’ appears to be rather indifferent to this question, focusing more on what can be studied and measures: the religious experiences themselves as their ramifications in the world.\n\nThroughout the second half of the book, which consists of a series of lectures James gave in 1899 and 1900, the focus is on the good acts that religion inspires in people (“saintliness”), the sometimes excessive behavior it inspires, mystical experiences, and religious philosophy. He ends the book with a proposal for a scientific approach to religion.\n\nStarting with “saintliness,” James argues that religion seems to promote clearly positive behavior in people that cannot be accounted for from other sources. (At the very least, individuals claim religions origins for some of these behaviors.) There is something deeply individualistic about James’ approach that I find compelling. Maybe this is something now lacking in some of the discourse on religion. “Every individual soul, in short, like every individual machine or organism, has its own best conditions of efficiency.” (274) I am not a big fan of comparing humans to machines as he does, but I am going to choose to be open-minded that religious experiences can be one of the ways that people can reach “saintliness.”\n\nJames confesses in one of the lectures on “saintliness” that there are also a host of negative habits that a religious life and religious devotion can bring, although he seemed to think these are in the minority. However, these need to be looked at as part of the entire package of the mind. Here is another pitfall anti-religious types like me fall into. We assume that some negative characteristic, some hypocrisy, or some bad thought has its origin in what we do not like about another person’s mental universe. James seems to think that these components of someone’s mental universe is just as likely something else. “The baiting of Jews, the hunting of Albigenses and Waldenses, the stoning of Quakers and ducking of Methodsits, the murdering of Mormons and the massacring of Armenians, express much rather that aboriginal human neophobia, that pugnacity of which we all share the vestiges, and that inborn hatred of the alien and the eccentric and non-conforming men as aliens, than they express the positive piety of the various perpetrators.” (308) Well, I do not know about the Hobbessian stuff in there, but I take his point.\n\nTo give much more summary may be pointless and I skimmed a fair deal. Toward the end of the book his focus is on religious mysticism and philosophical idealism rooted in religious experiences. The argument seems to me to be the same in both cases. From the individualistic perspective, these experiences are real (“absolutely authoritative”). They also should be taken seriously by outsiders because they are possible paths to truth.\n\nWhat I think we should take from William James’ The Varieties of Religious Experience is an argument for religious individualism. In this it can be very powerful. It can also be applied more broadly. I just got into a debate on Facebook with some scientists over whether the humanities have anything to teach science and the innovators of technology. Clearly I think people in the humanities do, but they were less certain and took what I was saying as a bit preachy. However, I think there is a value in coming out of our own skin and at least taking the perspective of outsiders seriously enough. At times these opposing ideas really do have little to add to our discussion, or are in the end reactionary or disgusting. But they are products of a mind, and therefore real. For good or for ill, they must be taken seriously.\n\n\nWilliam James: “Varieties of Religious Experiences” (1902): Part One\n\n\n\nPsychologist and philosopher William James delivered the lectures that became The Varieties of Religious Experience in 1899 and 1900.  As I am working on a book on Philip K. Dick, I read this book with great interest. Dick’s religious experiences have become the center of scholarship and have been offered up as the key to understanding his work. I explored Dick’s works earlier in this blog from a more political and sociological point of view. But with James, I can appreciate the attraction that those religious experiences have for readers. James’ central argument in The Varieties of Religious Experience is that religious experiences are historically real in that they seem to happen. What matters is the result of belief, not their origins. This is his pragmatism. James worked on this idea in some of his earlier writings as well (I looked at them before in this blog). For him, what matters in psychology is action when precedes thought and habits. (To be simple, one learns to play the piano by playing the piano, not by thinking about how to play the piano.) In the same way, it may be true that George Fox was crazy, but this does not make Quakerism theologically wrong or even factually untrue. It certainly does not make the good feelings and actions that Quakerism inspires delusional. In short: “Religious happiness is happiness.” (30)\n\n\nI was raised Lutheran and I recall having religious experiences as defined by James (both the positive and negative aspects he mentions). I no longer have such experiences and am an atheist. But I accept James’ point that there are numerous experiences that I am not having, many feelings I may be missing out on, because of that choice. Is this not true of any lifestyle or intellectual choice one makes?\n\n\nOne important point James makes is that if what really matters is the religious experience rather than truth, religious can be studied scientifically through the regular tools of psychological, biological, and social scientific research. Since James day many—including many atheists—have embraced this approach. The controversial point is here. “To plead the organic causation of a religious state of mind, then, in refutation of its claim to possess superior spiritual value, is quite illogical and arbitrary, unless one have already worked out in advance some psycho-physical theory connection spiritual values in general with determinante sorts of physiological change. Otherwise none of our thoughts and feelings, not even our scientific doctrines, not even out disbeliefs, could retain any values as revelations of the truth, for every one of them without exception flows from the state of their possessor’s body at the time.” (22)\n\nThe first three lectures map out his general thesis about the nature of religious experiences, the definition of religion (which he defined quite broadly), its role in creating states of mind that are not “logically deducible from anything else,” and creating positive action in the world. This final point James summarizes under “The Reality of the Unseen.” He borrows from Kant the following idea. “We can act as if there were a God; feel as if we were free; consider Nature as if she were full of special designs; lay plans as if we were to be immortal; and we find then that these words do make a genuine difference in our life.” (56) One thing that is noticeable in leftist Internet culture is the willingness to attack thought (because what else can one discuss when we exchange ideas instead of actions) rather than action. I think something that we can learn from American pragmatism is that we should focus less on the thought that leads to good actions than we should focus on actions. In this sense, imagining prefigurative politics is less important than actually tearing down the institutions of power. There is some value when prefiguarative politics is acted out (as in Occupy Wall Street), but it is objectively a failure if it cannot undermine power. This is a bit off of James’ point, but seems to flow from his perspective on religion.\n\nThe next two lectures examine “The Religion of Healthy-Mindedness,” which is general are religious belief that seem to creative positive emotions and healthy living in human beings. At this point in the lectures, James moves to giving quite a few case studies of various religious experiences documented in psychological practice and in history. If is of this type. “It is to be hoped that we all have some friend, perhaps more often feminine than masculine, and young than old, whose soul is of this sky-blue tint, whose affinities are rather with flowers and birds and all enchanting innocencies than the dark human passions, who can think no ill of man or God, and in whom religious gladness, being in possession from the outset, needs no deliverance from any antecedent burden.” (79) Well, I can agree that the more religious thought promotes happiness, self-sacrifice, solidarity, and beauty the better. I am less certain it always does so, which brings us to the next set of lectures.\n\nLectures six and seven are titled “The Sick Soul.” Bad thoughts and bad actions can be as easily derived from religion as the positive “healthy-mindedness.” To the degree religion promotes obsessions on sin, guilt, death, and punishment they promote what James is calling the “sick soul.” Religious melancholy is very real in the world, James points out with several case studies. Significantly, James likens materialism and atheism to promoting the “sick soul.” I am not sure that can be empiraclly sustained now.\n\nIn the next three lectures, James looks at the experience of religious conversion. Conversion is yet another religious experience like the positive expressions of religious joy and the religious melancholy. Conversion allows a rapid and dramatic change in a person’s values and perspective on life. The actual role of some spiritual agent is irrelevant to the truthfulness of those experiences and emotions. “It is natural that those who personally have traversed such an experience should carry away a feeling of its being a miracle rather than a natural process. Voices are often heard, lights seen, or visions witnessed; automatic motor phenomenon occur; and it always seems, after the surrender of the personal will, as if an extraneous higher power had flooded in and taken possession.” (211)\n\nI will look at the rest of this book and try to reach some more conclusions in my next post.\n\nWilliam James, “The Will to Believe”\n\nThe Will to Believe and Other Essays in Popular Philosophy was a collection of James’ lectures on religion and some other issues on philosophy in the later 1890s.  All of these essays have interesting items to teach us and I will first summarize some of his theses as best as I can in a few sentences each before commenting on what I think they can teach us when taken as a ten-course meal.  See my other posts on James in the archives on January 14 and January 15.\n\n\n“The Will to Believe” (1896): The argument of this essay is that it would be irrational to reject religious beliefs (and for James, experiences) since the validity of these claims and experiences cannot be denied or defended with scientific certainty.  “We have the right to believe at our own risk any hypothesis that is live enough to tempt our will.”  (477)  Now for many, this or that religious belief will be dead and useless.  But when believes can be real, and reinforced with experiences, they should be embraced.  This clearly does not apply to only religious claims.  Indeed, most religious claims are dead for most of us.  For me, it is the goodness of humanity and our potential for solidarity that holds the most power – is the most live – now.  This is a powerful argument and should not be used to justify the indoctrination of “dead” beliefs, but rather a celebration of experiences, ideas, and beliefs, which may in the end be impossible to support with scientific certainty.  But love, friendship, and joy all exist in that realm.\n\n“Is Life Worth Living” (1895): This argument is a corollary to “The Will to Believe” as well as a pragmatic argument against suicide.  Life’s purpose is one of those beliefs that cannot be scientifically justified.  Again, this could be a defense of theistic claims, but I do not see James’ limiting life’s meaning to God’s purpose.  “If this life be not a real fight, in which something is eternally gained for the universe by success, it is not better than a game of private theatricals from which one may withdraw at will.  But it feels like a real fight – as if there were something really wild in the universe which we, with all our idealities and faithfulness, are needed to redeem.” (502)\n\n“The Sentiment of Rationality” (1880): Although presented long before “The Will to Believe” it is rightfully placed near it in this volume.  There is a poverty to strict rationality.  It of course discounts subjective experiences, such as those of the “more mystical minds.”  Moral questions are clouded by strict rationality or evolutionary logic.  Morality is experienced subjectively and on some level escapes rational consideration.  Furthermore, rationality will never be agreed to by all.  Even two “rational” thinkers will disagree.  Given these facts, forgoing certainty seems a normal part of life and should be accepted as part of our considerations of truth.\n\n“Reflex Action and Theism” (1881): Here, the position James makes is that all philosophical inquiry and our entire psychological mentality are bound by experience.  “Philosophies, whether expressed in sonnets or systems, all must wear this form.  The thinker starts from some experience of the practical world, and asks its meaning.”  He contrasts philosophy with a voyage.  Theism exists in some of these states of consciousnesses, produced most strongly in mystical experiences.\n\n“The Moral Philosopher and the Moral Life” (1891) Moral systems cannot be worked out in advance, James suggests.  Instead they are lived and contingent.  (Part of this contingency is the waiting we need to endure until the religious questions are understood.  Until, for instance, we know there is or is not an afterlife, or know that the Ten Commandments are or are not God’s will, we cannot really have a clear answer to all moral questions.)  Given this, particularly the impossibility of perfect clarity on ethical questions he states: “It is not in heaven, neither is it beyond the sea; but the word is very nigh unto thee, in thy mouth and in thy heart, that thou mayest do it.” (617)\n\n“Great Men and Their Environment” (1880): This essay attempts to find some common ground between evolutionary environmentalism (slow change) and the rather rapid historical change we experience.  As I understand it, James is positing a evolutionary theory of greatness in respect to historical times.  Some mentalities, ideas, and geniuses are adapted to certain times producing greatness.  “The mutations of societies, them, from generations to generation, are in the main due directly or indirectly to the acts or the examples of individuals whose genius was so adapted to the receptivities of the moment, or whose accidental position of authority was so critical that they became ferments, initiators of movement, setters of precedent or fashion, cenetres of corruption, or destroyers of other persons, whose grist, had they had a free play, would have led society in another direction.” (626)\n\nThese are the essays that I find most apt for our purposes.  Without exception these essays promote an active engagement with the world as individuals, as moral agents, and as believers.  At criticism is the strict intellectualism.  In this sentiment I find much common ground with James.  For your use, here is Wolfi Landstreicher (Against the Logic of Submission) on that same question.\n\nI think it would be limiting to look at James’ The Will to Believe purely through the lens of religious dogmas.  James often identifies other attitudes (pessimism, optimism, morality) as fundamentally religious because they cannot be scientifically determined.  While I would not use that phrase because of my personal relationship with religions and its evolution over the years, I find it often necessary to take a “Leap of Faith” in many of parts of life.  Revolutionaries need no small amount of faith in order to act.  And action itself, reinforces our belief in the visions we make real.\nThe remainder of this volume of James’ earlier writings includes his “Talks to Teachers on Psychology and the Students on Some of Life’s Ideals” and some essays. The lectures to teachers have some interesting comments on teaching in what we would now call a “child-centered” way, by understanding how children learn. Ultimately, he is still part of the effort to dispense learning most effectively to children, rather than encourage children to teach themselves and facilitate autonomous learning (what we might now call “unschooling.”) His lectures to “students” (really college students) covered his views on the meaning of life, the poverty of intellectual absolutism, the need for diversity of perspectives in ideas, and the necessity of the relaxation of the tensions of modern American society (he points out the problem of moral anxiety as particularly acute).\n\nWith this, I will move on from William James, with the promise to explore his later writings later in this blog.\n\nWilliam James, “Psychology: A Briefer Course”, Part Two\n\nThis is a continuation of my previous post on James’ psychology textbook, which was a condensed version of The Principles of Psychology.  As we saw, James’ moves us from the biological foundations of the mind and the senses (mostly common to all of us) to our individualized conception of “the self.”  The second half of the book, collected in the Library of America’s volume of James’ early writings, covers specific ways that this “self” interacts with the world through conception of the external world, association, memory, imagination, space, time, emotion, reason, instinct and will.  I suspect the most interesting question in psychology for libertarians is to what degree is liberty of will possible.  This is a question currently being discussed by neuroscientists.  The familiarity of James’ musings on free will, comes from my relatively brief exposure to some of these current debates, which seem to suggest free will as we normally understand it is an illusion, even if not entirely morally irrelevant.  James presents some skepticism about free will, but more or less rejects its relevance, because of the crucial nature of action.  We have already seen that James presents action as the key to habit formation (or breaking).  It is here there there is hope for freedom.  “The world thus finds in the heroic man its worthy match and mate; and the effort which he is able to put forth to hold himself erect and keep his heart unshaken is the direct measure of his worth and function in the game of human life.  He can stand this Universe. . . . He forms a part of human destiny. . . . Thus not only our morality but our religion, so far as the latter is deliberate, depend on the effort which we can make.  “Will you or won’t you have it so?” is the most probing question we are ever asked; we are asked it every hour of the day, and about the largest as well as the smallest, the most theoretical as well as the most practical, things.  We answer by consents or non-consents and not by words.  What wonder that these dumb responses should seem our deepest organs of communication with the nature of things!  What wonder if the effort demanded by them be the measure of our worth as men!  What wonder if the amount which we accord of it were the one strictly underived and original contribution which we make to the world!.” (425–426)\n\n\nAs we go through the text with an eye to the question of action and will, we see the centrality of the material world, our interaction with it, and willingness to transform it to shape our will (and in doing so shaping our mental conception of the world).  Even pure reason (if even possible) is bound by this. “All consciousness is motor.  The reader will not have forgotten, in the jungle of purely inward processes and products through which the last chapters have born him, that the final result of them all must be some form of bodily activity.”  (347)  Even pure imagination is a product of experience and action.  A blind person cannot imagine color.  In the same way, we cannot imagine alternatives to the world we have without making them to some degree realized.  (The frustration of reading science fiction is that the authors rarely can envision economic, social, or political systems that do not have parallels to the world around us.)\n\nSo, yes, if we accept James’ position, we find that we are bound by the physicality of our experiences and physical construct.  Our capacity for imagination, free-will, and reason are inexorably bound.  This may frustrate those who seek liberty of thought and action.  Our solution is to act and through action, our will can be actualized.  In the process we may be surprised at what we create, do, think, or envision.\n\n\nI was reading the chronology of James’ life.  Every volume of the Library of America has an author’s bio in the form of a chronology.  William and Henry had a brother named Robert (Bob).  William James seems to have spend a bit of time keeping track of Bob, occasionally trying to set him straight.  Once Bob was running a cotton plantation in Florida, later he took a job in Iowa as a railroad clerk.  He was an amateur painter, worked as a curator of a Milwaukee museum.  A few years later William has to drag Bob from his drunken stupor in Milwaukee, where he can dry him out in Boston.  A wanderer with a soft-spot for Milwaukee will always warm my heart.\nIt seems to me that Bob James is worthy of a biographer, or that at least the three brothers show up in a television comedy (My Three James?)", "pred_label": "__label__1", "pred_score_pos": 0.926520049571991} {"content": "\n\n©2016 by anime sticker shop.\n\nTheme songs\nSecret Base ~Kimi ga Kureta MonoAoi Shiori\n\n\nCastAi KayanoHaruka TomatsuSaori HayamiMiyu Irinomore\n\nGenres: Visual novel, Drama, Romance Film, Supernatural, Tragedy\n\n            A group of six sixth-grade-age[1] childhood friends drift apart after one of them, Meiko \"Menma\" Honma, dies in an accident. Years[2] after the incident, the leader of the group, Jinta Yadomi, has withdrawn from society, does not attend high school,[3] and lives as a recluse. One summer day, the ghost of an older-looking Menma appears beside him and asks to have a wish granted, reasoning that she cannot pass on into the afterlife until it is fulfilled. At first, he only tries to help her minimally because he thinks he is hallucinating. But since Menma does not remember what her wish is, Jinta gathers his estranged friends together once again, believing that they are the key to resolving this problem. All of the group join him, though most of them do so reluctantly.\n\n\n\n\n\n\n\n\n\n\n\n\n          However, things grow increasingly complicated when his friends accuse him of not being able to get over the death of Menma, for Jinta is the only one who can see Menma's ghost and his friends think he is seeing things. But as matters progress, it is realized that Jinta is not the only person in the group who is having trouble letting go of the past. It is revealed that all of the group members blame themselves for Menma's death and long-hidden feelings are rekindled. The group struggles as they grow from trying to help Menma move on and help each other move on as well.", "pred_label": "__label__1", "pred_score_pos": 0.5247082710266113} {"content": "A minor piano chord - Am\n\nThe A minor chord is a 3-note chord consisting of the notes A, C and E.\nYou can see these notes highlighted in the interactive piano chart below.\nThe chord itself is often abbreviated as Am.\n\nInteractive piano diagram for the A minor chord\n\nPiano keyboard displaying the A minor chord with the notes A, C, E A B# C Fb E\n\nA minor piano chord chart image\n\nIn case you prefer a non-interactive variant of the chord chart, we've embedded a PNG image below that shows the notes for the the Am chord. Feel free to save or share the image as needed.\n\nPiano chord chart for the A minor chord (Am). The notes A, C and E are highlighted.", "pred_label": "__label__1", "pred_score_pos": 1.0000100135803223} {"content": "‘Emotionless’ foster mom left toddler boy to die in hot car while she worked all day: Police\n\nA North Carolina woman has been criminally charged days after she allegedly left her 1-year-old foster child in a hot car at a shopping center, resulting in his death.\n\nDawn Aberson-Vanden Broecke, 42, is facing involuntary manslaughter charges for the toddler’s August 29 death. Citing her arrest warrant, WBTV reported that Broecke works at an office near the Lowe’s parking lot in Pineville and was leaving to pick him up from daycare when she realized he’d been in the car since that morning.\n\nDespite life-saving efforts, the boy was pronounced dead at the hospital.\n\nPolice wrote that during questioning, Broecke “was standing there and appeared emotionless (she was standing there calm, did not appear upset or otherwise in distress).”\n\nBroecke reportedly told officers that she knew the boy was possibly dead when she checked on him that afternoon.\n\n\nBroecke also said the 1-year-old is the youngest of her five foster children and that he had been in her care for roughly six months, according to WBTV.\n\nBroecke turned herself in on Wednesday, a day after officials announced the toddler’s confirmed cause of death was hyperthermia due to environmental exposure. WSOC reported that temperatures were in the 80s on the day the boy was found in the car.\n\nWhile it’s unclear exactly how long the toddler was left in the car, investigators said it was for “a prolonged period,” according to the news station.\n\nBroecke was said to be cooperating with authorities in their investigation.\n\n\n\n[Featured image: Dawn Aberson-Vanden Broecke/Pineville Police Department]", "pred_label": "__label__1", "pred_score_pos": 0.5637902021408081} {"content": "Why infrared thermal imaging devices make sense for electricians\n\n20th January 2020\nAlex Lynn\n\nHeat is a byproduct of operating any sized electrical circuit. Most problems in electrical systems display themselves in terms of heat. Electricians must be able to classify a circuit as normal when the load is on or identify when it is abnormal and identify the issues that presents – finding hot spots that need attention. \n\nBy John H. Waggoner, Senior Instructor, FLIR Infrared Training Center\n\nIn recent years, new infrared thermography– also called thermal imaging – has come on the market. The non-contact method includes cameras that help electricians and service technicians find and solve problems quicker and more safely. The newest cameras combine both thermal imaging and electrical measurement features in one inspection, troubleshooting, and diagnostic tool that speeds up the process and provides much better information on which to base repair work. \n\nMethods for inspecting and analysing electrical systems\n\nIn the past, the only way electricians had to inspect and analyse electrical systems was with hands on testing – usually done after turning off the power to make sure it was electrically safe. Electricians typically go in with testing equipment and tools to connect test leads to determine if there are any issues. Many used contact measurement techniques featuring thermocouples, which produce a temperature-dependent voltage that can be interpreted to measure heat. \n\nWith these traditional inspection and maintenance methods, electrician cannot see all the possible issues, but instead must rely on guesswork, checking out connections one by one. This method does not guarantee that heat-related conditions will be solved, because turning off the power removes the load. One can measure if a circuit is overloaded, but when the power is off it is not always possible to know for sure if the problem in the circuit was fixed. \n\nIn recent years, electricians also began using spot radiometers: small hand-held non-contact devices that can be pointed at a target to obtain a temperature measurement. Radiometers provide acceptable measurements within certain limits, but no visual imagery is available. \n\nA step up from direct measurement and spot radiometry is thermal imaging, which detects infrared energy emitted from an object, converts it to temperature, and displays an image of temperature distribution, called a thermogram. Since infrared radiation is emitted by all objects with a temperature above absolute zero, thermography makes it possible to see the environment with or without visible illumination.\n\nThermal imaging provides electricians with a far higher ability to analyse, recommend, and diagnose. With thermal imaging, one can use a camera on a circuit breaker to determine if connections are loose, if there is too great a load on the breaker, and if there are any issues with the breaker contacts. Electricians can find the problem, fix it, then go back with the thermal camera and take an image to verify that the work done has actually solved the problem. In the past, it was very difficult to assure customers that work done had really fixed the problem. Now electricians frequently provide their customers with ‘before’ and ‘after’ imagery.\n\nA wide range of electrical equipment can be inspected with thermal imagers, including transformers, switchgear components, breakers, fused disconnects, non-fused disconnects, conductors, terminations, contactors, control wiring terminations, buss duct (open and enclosed), distribution and branch circuit breaker panels, and motors.\n\nBenefits and advantages of thermal imaging \n\nIn effect, thermal imaging allows electricians and electrical technicians to picture heat that the eyes cannot see. This has three main benefits. First, it is a non-contact approach, so electricians do not have to actually touch electrical equipment to determine if the heat is within normal operating temperatures or has moved into abnormal temperatures. \n\nSecond, electricians can use thermal cameras as a visual tool to demonstrate to customers the severity of electrical problems. Infrared cameras produce an image of a target that is similar to visual photographs. Many also produce a visual image that can be placed next to the thermal image for a side-by-side comparison. This helps the electrician show customers the exact location and nature of potential faults. \n\nThe third benefit is that thermal imaging can be performed in real time. Over the past decade, video-capture technology for infrared cameras has greatly improved. This allows electricians to observe and analyse electrical equipment as it heats up and begins to operate, as it operates under normal conditions over time, and as the target cools down. \n\nThere is also the ability to watch fast-moving targets, as the recording speed, or frames-per-second (FPS), has improved. Cameras that record at higher frame rates allow the user to observe targets that are changing temperature rapidly, or those that are moving very fast. The equipment now allows us to see that fast transition of temperatures or fast transition of the targets.\n\nKey application areas for thermal imaging\n\nThermal imaging is used in three general application areas. Utilities rely on it extensively for medium and high voltage equipment (overhead lines and connections), and for substation equipment (breakers, switches, transformers, capacitors, and voltage regulators), to name a few. \n\nThermal imaging is also used for voltages below 1000 volts, largely for enclosed equipment that supports industrial and commercial operations. \n\nThe third category, the newest level of application, is the residential market. Home inspectors and electrical service and HVAC service companies have started to purchase and use thermography for troubleshooting and inspection of residential electrical systems. The growth in this market is due to IR cameras becoming more affordable over the past decade. \n\nThermal imaging equipment available to electricians\n\nThere is a wide range of thermography equipment for electricians, varying from low resolution cameras costing $400 to high resolution cameras costing more than $40,000. The difference among thermal imaging resolutions affects how close one needs to stand to image a target, and the different accessories available for viewing and adjusting the camera and measuring temperature. \n\nAt the low end, one can simply select an attachment to a smartphone (both iOS and Android), For example, the FLIR ONE Pro is a device containing an 80 x 60 pixel resolution Lepton long wavelength infrared (LWIR) camera. \n\nHigher-end thermal imaging technology, such as the FLIR T1K, can produce up to 1024 x 768 pixel images. Dynamic focus control, continuous autofocus, and a user-friendly interface with an ergonomic design and rotating optical block make it easier to do numerous inspections in one day and to scan at difficult angles.\n\nAnother option that has recently come on the market are meters that combine thermal imaging with electrical measurement features in one inspection, troubleshooting, and diagnostic tool. These new meters can take voltage, current, and millivolt drop measurements while also taking an infrared image with the same device. This offers more information for an electrician or technician to make a determination, provides images to confirm the electrician’s diagnosis, and offers proof showing where the problems are. \n\nCombining several tools into one reduces the total amount of time it takes to diagnose issues and increases a technician’s speed. It also makes the technician more skillful at troubleshooting, repair, and maintenance work.\n\nOne example is the FLIR DM285, which offers 18 measurement functions, including true-RMS (root-mean square), LoZ (low impedance), and non-contact voltage (NCV). This device also includes a thermocouple input and allows users to view thermal and electrical measurements simultaneously. The combined meter uses IGM (infrared guided measurement) thermal imaging technology to visually guide users to the precise location of a problem.\n\nThermal imaging solves real problems \n\nThermal imaging has been used all over the world to diagnose and solve electrical system problems. The accompanying image shows a large junction box where one conductor was hotter than the eight others. Using the thermal imaging camera, technicians located it not in the box, but 150 feet back. It would not have been possible to locate this serious issue any other way.\n\nFeatured products\n\nUpcoming Events\n\nView all events\nLatest global electronics news", "pred_label": "__label__1", "pred_score_pos": 0.649420976638794} {"content": "An 11-year-old boy has died after he became stuck in a lift and allegedly being dropped down the shaft by a security guard who was trying to save him.\n\nThe accident took place in an apartment block in the Colombian capital of Kennedy after Brahaman Jhusep Guevara Pabon and another child had entered the lift.\n\nLocal media have reported the lift became stuck between the seventh and eights floors.\n\nA security guard who works in the building reportedly went to help the children and managed to save the first child.\n\nHowever, Brahaman’s mother Luz Marina Pabon claims that when the security guard went to lift her son to safety he dropped the child, who fell down the shaft.\n\n“The lift was in the middle of the seventh and the eighth floor and the guard did not know what to do,” she said.\n\n“He opened the door and used his left hand to hold it and the other to hold the boy.\n\n\n“He could not grab my son well and he let him fall.\n\n“He fell and the impact was so strong that his organs were all damaged.”\n\nBrahaman was taken to hospital but doctors could not save his life.", "pred_label": "__label__1", "pred_score_pos": 0.7486328482627869} {"content": "Mrs Bedford’s Jam\n\n\nBranding / Packaging\n\n\nCardiff Design Festival\nBest Welsh Packaging design\n\nInspired by the epicurean pleasures of Victorian afternoon tea, the French producers wanted to utilize only the finest ingredients and authentic, traditional cooking methods to produce this luxurious product.\n\nWe used a monochrome palette on the label to contrast with the rich tones that emanate from the jams with dramatic effect. This palette is echoed on the lid using detailed Victorian floral motifs.", "pred_label": "__label__1", "pred_score_pos": 0.9986575841903687} {"content": "Video: Converting Pounds and Ounces\n\nHow many 12-ounce bags of nuts can be filled from a 3-pound one?\n\n\nVideo Transcript\n\nHow many 12-ounce bags of nuts can be filled from a three-pound one?\n\nIn this problem, we have two measurements of maths. We have a three-pound bag of nuts. Let’s represent this amount by drawing this bar. And then we’ve got some smaller bags that are measured in a different unit of measurements. These are 12-ounce bags. And we need to calculate how many of these 12-ounce bags can we fill from a three-pound bag. In other words, how many lots of 12 ounces are there in three pounds? As we’ve said already, the two units of measurement that we’re dealing with are different. So it would help us to begin with, to think about how many ounces there are in one pound. And perhaps, we could use this to help. One pound is worth 16 ounces.\n\nSo let’s alter our bar model slightly. Each of the pounds that make up three pounds is worth 16 ounces. So we can label our three parts as 16 ounces. Now, there’s more than one way we can find the answer to this question. We could calculate the answer. First, we could multiply 16 by three. This would give us the number of ounces that there are in three pounds. And then we could divide this amount, whatever it is, by 12. And this would give us the number of 12-ounce bags we could get from three pounds. Perhaps, this is a method you’d like to try yourself. But there’s actually a quicker method when you use reasoning to help us.\n\nWe started of by drawing a bar model. So let’s continue to use this bar model and think about what it means. And this will help us answer the question. Firstly, we can see that each pound, and there are three of them, is worth 16 ounces. Now, the first thing we can say is that 12 ounces is less than 16 ounces. So we can definitely say that we can fill three 12-ounce bags of nuts because 12 fits into 16 with a bit of a remainder. Now, what is each one of these shaded parts worth? 16 take away 12 leaves us with four. So each of the shaded parts of our bar model is worth four ounces, and we have three of them. And what’s three times four worth? It’s worth 12 ounces in total. That’s another bag of nuts.\n\nSo we’ve used our bar model to help us solve the problem. One pound is worth 16 ounces. And in three pounds, we have three lots of 16 ounces. In each lot of 16 ounces, we can definitely fill one 12-ounce bag. And we have four ounces spare. And if we add up the three lots of four ounces spare, that makes another lot of 12 ounces, which will fill another 12-ounce bag of nuts. The number of 12-ounce bags of nuts that could be filled from a three-pound one is four. The answer to the problem is four bags.\n", "pred_label": "__label__1", "pred_score_pos": 0.9650207757949829} {"content": "press on\n\nlisten to the pronunciation of press on\nالإنجليزية - التركية\n(deyim) çaba harcamaya devam etmek\ndevam etmek\npresle basarak geçirmek\nالإنجليزية - الإنجليزية\nto persist, continue to advance\nIf you press on, you continue with a journey, even though it is becoming more difficult or more dangerous. I considered turning back, but it was getting late, so I pressed on. = keep going\ncontinue moving forward\nIf you press on or press ahead, you continue with a task or activity in a determined way, and do not allow any problems or difficulties to delay you. Organizers of the strike are determined to press on Poland pressed on with economic reform\npress on\n\n\n Press on\n\n التركية النطق\n\n pres ôn\n\n\n /ˈpres ˈôn/ /ˈprɛs ˈɔːn/\n\n علم أصول الكلمات\n\n [ 'pres ] (noun.) 13th century. Middle English presse, from Old French, from presser to press.\n\n كلمة اليوم", "pred_label": "__label__1", "pred_score_pos": 0.997157096862793} {"content": "Brexit commentary |\n\nTrade and customs white papers: the unanswered questions\n\n\nThe UK government has published two new White Papers dealing with post-Brexit trade and customs respectively. Whilst they contain some new material, they are perhaps more remarkable for what they don't say than what they do.\n\n\nThe trade white paper confirms that after Brexit, the UK aims to take back control of trade policy from the EU, including trade defence measures (and will legislate to do so).  The recent imposition of tariffs on aircraft manufacturer Bombardier is an example of trade defence measures taken by the US government against what it perceives to be unfair subsidies under WTO rules – and one that highlights how controversial they can be.  The UK proposes to set up a new independent body to investigate such matters – but it is likely to be extremely challenging to have a new regulator in place by March 2019 (in case of a \"no deal\" Brexit).  Meanwhile, the paper has relatively little to say on the following issues, which will be key to minimising the disruptive impact of Brexit on trade:\n\n • Existing free trade agreements The paper acknowledges that the UK currently benefits from a significant number of trade agreements with third countries which have been negotiated by the EU – but it does not explain how the UK can retain the benefits of these agreements after Brexit.  In our view, this is likely to depend on those third countries being prepared to agree to continue with existing arrangements – but since they originally negotiated them with the EU, which represents a far larger market than the UK on its own, some may well demand more advantageous terms.  Even if the UK secures a transitional agreement where it has formally left the EU but most of the current EU-UK trading arrangements remain the same for a period, it is far from clear that this would secure the continuation of agreements with third countries, potentially leading to trade with those countries falling back onto WTO terms.\n\n • WTO tariff quotas:  Nor does the paper give any insight into how the government proposes that EU-wide WTO tariff quotas (which are particularly relevant for agricultural produce) should be dealt with on Brexit.  A letter from the WTO Ambassadors of 7 countries – including the US, Canada, Brazil and New Zealand – suggests that they are unhappy about joint EU/UK proposals to simply apportion the existing quotas between them, which could have adverse implications for the UK's ability to rely on WTO rules in the event of a \"no deal\" Brexit.\n\n\nThe customs white paper does not add much to DEXEU's previous proposals on this issue, which we commented on here.  However, it does explicitly discuss the possibility of a \"no deal\" scenario, which would involve the re-introduction of customs controls at the end of March 2019, leaving both government and business very little time to prepare.  The focus of the paper is on legislating to allow the government to levy customs duties in its own right (rather than on behalf of the EU as at present) - but legislation on its own will not be enough.  For example:\n\n • Essential practical measures:  HMRC will need additional staff and computer systems to process an expected 300% increase in customs notifications and physical infrastructure at or near major ports such as Dover will have to be modified to allow for significantly more inspections to be carried out, particularly in relation to products such as foodstuffs.  It is very difficult to see how all these practical measures can realistically be put in place by March 2019.   \n\n • Third countries:  Nor is the problem necessarily confined to trade with the EU.  The paper does not explain how, after Brexit, the UK will secure the continuation of important customs cooperation arrangements which the EU has negotiated with third countries such as the US and China, which are designed specifically to ease the passage of goods through customs.\n\n\nTheresa May has insisted that the \"ball is in the EU's court\" and appears to be signalling that if there is no movement from the EU side, the UK will start preparing for a \"no deal\" Brexit in the New Year.  However, it is hard to draw much comfort from either of these papers as regards the likely readiness of the UK for a \"no deal\" Brexit in March 2019.  With no assurances as yet from the EU about the availability of transitional arrangements, our advice remains that clients should continue to hope for the best, but prepare for the worst (see our Brexit contingency planning checklist). \n\nBy way of example, if you are worried about the impact of sudden introduction of customs controls in a \"no deal\" Brexit scenario, bear in mind that not all ports are likely to be equally affected;  the highest risk of disruption is at ports such as Dover with a high proportion of EU-UK roll-on roll-off HGV traffic. It follows that some risks could be mitigated by looking at other routes for getting key products into the country (e.g short sea shipping) and/or turning to suppliers who rely on imports from outside the EU (which typically come into different ports, where the relevant customs infrastructure is well established and it is more likely to be \"business as usual\" in the event of a \"no deal\" Brexit).\n\nThe fifth round of Brexit talks concluded this week with no sign of a breakthrough.   A European Council meeting is due to take place on 19-20 October to decide whether \"sufficient progress\" has been made for talks to move onto matters such as trade.\n\nFor more background on the issues discussed above, see our Brexit Q&As on WTO rules, the UK's future trade relationship with the EU and Customs.", "pred_label": "__label__1", "pred_score_pos": 0.7560864686965942} {"content": "The Contrarian\n\n\nSunspot Cycle at a Low, Impending Cool Down Period on Earth\n\nLast year we wrote in our WELLINGTON LETTER about the fact that sunspots had shifted towards a “solar minimum” for several years, according to NASA. Historically, this has led to reduced crops, rising prices, famines and social strife.\n\nThis cooling could last up to 70 years, according to historical precedents. If science is correct, the theory of “global warming” will have to be put on ice.\n\nReading the article below and many others, temperature changes on the earth are logically due to the sun’s heat, not the SUV in your garage. And the heat output goes in cycles.\n\nWe wrote several years ago, that spending billions of dollars on fighting so-called “global warming” according to the Paris Accord was a waste of resources unless there was a way to reduce the sun’s energy output. That of course is beyond the ability of science, at least on this planet. Read the article below.\n\n\n\nExperts continue to warn that this is a sign that the solar minimum is on its way. “The sun is spotless again. For the 133rd day this year, the face of the sun is blank,” wrote the website Space Weather. “Solar minimum has returned, bringing extra cosmic rays, long-lasting holes in the sun’s atmosphere, and strangely pink auroras,” the website continued.\n\nThe sun follows a cycle of roughly 11 years where it reaches a solar maximum and then a solar minimum. During a solar maximum, the sun gives off more heat and solar particles and is littered with sunspots. Less heat in a solar minimum is due to a decrease in the sun’s magnetic waves. \n\n\n\n“Low solar activity is known to have consequences on Earth’s weather and climate and it also is well correlated with an increase in cosmic rays that reach the upper part of the atmosphere. The blank sun is a sign that the next solar minimum is approaching and there will be an increasing number of spotless days over the next few years,” wrote a meteorological website called Vencore Weather.\n\nThis data suggests that the Earth’s temperature will cool down before it heats up. The sun’s effect on our planet is lower than it was in the past, meaning that you should get ready to bundle up in the coming years.", "pred_label": "__label__1", "pred_score_pos": 0.7443130016326904} {"content": "400 686 7779 www.vationchina.com\nNews News\n2019 - 03 - 01\nThe Smart City Operation Center is a digital development to a higher level. The core is to embody the concept of people-oriented and intelligent operation. It uses the next-generation information technology such as the Internet of Things and cloud computing to fully perceive the city's operational status and improve people and things, things and things. The clarity, flexibility, execution efficiency and response speed of the interaction; more precise, intelligent and intuitive control and presentation of various physical objects in the physical real space, improve the overall optimization cont...\nScan Browse mobile web site\nScan Pay attention to us", "pred_label": "__label__1", "pred_score_pos": 0.8666237592697144} {"content": "Available in the following format:\n\n\nThere are quite a lot of materials out there for studying for Project Management exams. This study guide is focused upon the Project Management Body of Knowledge Version 5 (PMBOK v5). It is not intended as a replacement for reading and understanding the Body of Knowledge. This guide is to help make certain processes easier to ingest and memorize for the exam. In these pages I provide visuals, worksheets, process flow maps, and the tweet that brings everything together in 144 characters. Again be warned, this guide is to be used to bring all of your studying and knowledge together to give you the edge you need to pass your exam.", "pred_label": "__label__1", "pred_score_pos": 0.6330234408378601} {"content": "Sunlight Foundation\n\nCitizens United: Rhode Island's response\n\nThe Supreme Court’s decision in the Citizens United v. FEC case has rendered 24 states' election laws unconstitutional. The 5-4 ruling in favor of Citizens United reversed a provision of the McCain-Feingold act that prohibited any electioneering communication—defined as advertising via broadcast, cable or satellite that is paid for by corporations or labor unions. Many states have acted fast to counter corporations’ ability to spend unlimited amounts of money to influence elections by passing laws that force disclosure of all independent expenditures in near real time. The Sunlight Foundation Reporting Group has decided to report what each of these states is doing to respond to the highly-contested ruling. Today we're looking at Rhode Island:\n\nState: Rhode Island\n\nBill: Rules and Regulations on Reporting Requirements for Coordinated and Independent Expenditures\n\nPassed: Yes\n\n\nRhode Island hasn't repealed the laws it has on the books prohibiting independent expenditures. The state's Board of Elections has instead passed a new regulation that satisfies the Supreme Court ruling allowing corporations to influence races using their own money.\n\nLike all states tasked with altering state laws in the wake of the Citizens United decision, Rhode Island is forcing certain elements of the transaction be disclosed to the public. Forms containing information regarding who paid for the expenditure and who directs control over payment of the expenditure (e.g. a corporation's CEO) must be filed with the Secretary of State's office. Funders of a company or a nonprofit may have to be disclosed if money was donated for the sole purpose of making independent expenditures.\n\nThe disclosure forms have to be filed electronically within seven days of the money being spent throughout the year, regardless of when an election is. This is important to note because some states have relaxed deadlines for reporting when money is spent outside of an election season. The Executive Director of the state's Board of Elections says all information should be available to the public within 24 hours of it being submitted.\n\nRhode Island's regulation also explicitly states that a reasonably visible and/or audible disclaimer must be included in print and electronic ads. Rhode Island references the Supreme Court case McConnell v the Federal Elections Commission to address the idea that disclaimers \"burden the ability to speak.\" The McConnell case held that disclaimers don't  prevent anyone from speaking, hence they don't deter people from running ads.\n\nSearch the Blog\n\nPopular tags\n", "pred_label": "__label__1", "pred_score_pos": 0.6926805973052979} {"content": "A look inside The Jazz Gallery\n\nPhoto courtesy of the artist.\n\nPianist Theo Walentiny will present his Theo Walentiny Group at The Jazz Gallery this week, alongside a series of abstract paintings created his father, painter Joe Walentiny. The paintings, collectively entitled “Soundscapes,” reflect and explore the impressionistic and improvisatory nature of Theo Walentiny’s compositions. Theo’s septet will include Adam O’Farrill on trumpet, Jasper Dutz on woodwinds, Kalia Vandever on trombone, and Lee Meadvin on guitar, in addition to Nick Dunston on bass and Connor Parks on drums who, with Walentiny, constitute the Aurelia Trio. We spoke with Walentiny, who gave us a sense of his compositional style, his affinity for thinking visually, and his thoughts on the New York scene from a childhood across the Hudson.\n\nThe Jazz Gallery: Could you tell me a little about the new group?\n\nTheo Walentiny: Absolutely. It’s a mix of new and old music. We’ll play some older pieces, orchestrated for this newer instrumentation, as well as a few new things. In addition, my dad is an abstract painter, and he did a series of paintings in collaboration with a group of my compositions. We’re going to have the physical canvasses on display at The Gallery. When I’d visit home throughout the project, he would show me his progress. The work took a long time to develop and complete, so I was able to really see them grow.\n\nTJG: How did this concept for the paired paintings come about?\n\nTW: He proposed the idea after one of my shows. He took my recordings and spent a few months just painting and listening to the music. Each painting corresponds to a specific composition. It wasn’t a literal thing, where you might have certain brushstrokes corresponding to certain notes: It wasn’t systematic like that. Instead, he took the overall aura of the piece and allowed it to emerge visually. There’s one piece called “Short Story,” which is a tribute to Ravel, who’s been an important figure to me. The finished painting goes really well with the piece, with a very impressionistic atmosphere. “Short Story” is probably the most extended work we’ll be playing, with different sections and layers, which also translates well in the painting.\n\nTJG: It’s great that the painting process is as impressionistic and improvisatory as your music. Talk to me about your compositions, and how improvisation comes into play.\n\nTW: My music is definitely improvisation-driven, and much of how it sounds truly depends on the people playing it. That’s one of the reasons I’m so excited about this date at The Gallery. I love how passionate everyone in the group is, and I don’t like to be too restrictive or possessive, because everyone has such a voice. I’ve worked with this specific group of people in different capacities, and it’ll be really special to have everyone together like this.\n\nIn my music, I’m often not trying to simply have a melody, changes, solos, and a recap of the melody. It’s more like there are points where the music opens up, and improvisation becomes something people bring to the table. There’s this piece “Apprehension,” which starts out with a piano riff, or a duo with guitar, then a melody, and a form for soloing which can go almost anywhere. It’s not limited by the page. I’m focused on transitions between songs as well, and strive for a continuous set of music. I try to bridge the pieces with pairs of duos within the group. Horns might do a cadenza, there might be a short chorale, nothing too strict. Overall, we have a full sound where guitar and piano add a lot of warmth, and especially with bass clarinet, we have a lot of great options in terms of timbre.\n\nTJG: I see the Aurelia Trio, with you, Connor Parks, and Nick Dunston, is nestled into the larger ensemble here. Is there any shared repertoire, and are the dynamics different with you as the leader?\n\nTW: The trio was born of an octet project I used to have: We tried some of that music with Aurelia, and a few things worked, but it’s mostly a different book of repertoire, especially having the horns. With Nick and Connor in the group, it feels totally comfortable. Between the three of us, there’s so much trust, which comes from a lot of serious playing together. It makes whatever might happen automatically feel very comfortable.\n\nTJG: You do some film scoring as well. What inspires you about composing for film?\n\nTW: I enjoy looking at music visually, as I was talking about earlier with my dad’s paintings. When composing, I see scenes or colors in my head, that type of thing. It feels very intuitive to look at things visually. Sometimes, working with the ensemble, it’s about creating lush landscapes, harsh edges, distant vistas. I try to orchestrate spaciousness into the group. Everyone can imagine something different, which is valid. I’ve often received comments that my music feels visual, especially from listeners at shows, and those visuals are often different from what I see in my head. \n\nTJG: I see you’ve been on the road a lot, from Israel to Switzerland. What foreign musical experience has made the biggest impact on you?\n\nTW: The different range of audiences made an impact on me, compared to the New York audience. People really show up, and they listen with such enthusiasm. I felt an acceptance for whatever we wanted to play, especially in Switzerland at the Montreux festival. We don’t change our playing for our audiences, and I think they really appreciate it.\n\nTJG: As a New York musician now, how did growing up in New Jersey shape your perspective of the scene?\n\nTW: Being so close growing up, I would go in every weekend to see music. I got an early view of what it is to be a working musician in the city. I was able to see that everyone does a huge variety of things, even if they’re known for one thing in particular. For example, I did a precollege program run by Christian McBride, who most people think of as a straight-ahead jazz bass player. But he does everything. For example, I saw with him at the Vanguard with John Zorn, Tyshawn Sorey, and Steve Coleman. I’m glad I was able to see at a young age. Otherwise, I don’t think I would have realized the depth of what a lot of people do to work as musicians in the city.\n\nThe Theo Walentiny Group plays The Jazz Gallery on Thursday, February 22, 2018. The group features Mr. Walentiny on piano, Adam O’Farrill on trumpet, Jasper Dutz on woodwinds, Kalia Vandever on trombone, Lee Meadvin on guitar, Nick Dunston on bass, and Connor Parks on drums. Sets are at 7:30 and 9:30 P.M. $15 general admission (FREE for members), $20 reserved cabaret seating ($10 for members) for each set. Purchase tickets here.", "pred_label": "__label__1", "pred_score_pos": 0.9956416487693787} {"content": "JOHN HOLLAND: “Synchronicities And You”\n\nSynchronicities and You.png\n\nIs your soul trying to get your attention?\n\nSynchronicities and so-called coincidences are clear signs that the Divine Source is knocking on your door.  Sometimes it could be a soft tap or for those times when you’re not paying attention, it could be a loud bang!\n\nWhen source works through synchronicities, it can manifest itself in some pretty unique ways.  I have my own definition and refer to them as my divine nudges.  For example, it’s when I hear the same phrase or saying from more than one person in a day?  It’s when the same numbers keep showing up in your life?  Has someone mentioned the same person you were just thinking of?  Have you met someone out of the blue who seemed to answer a question that you were just pondering?\n\nHow to tell if it is synchronicities?\n\nThese are all just signs for you, and I encourage you to pause, be open, and pay attention but most importantly, acknowledge that the source is sending you a message.\n\nI know this man who was having a hard time switching careers and it was clearly causing him a lot of stress with all the unanswered questions.  He was offered a new job and wasn’t sure if he wanted to leave the security of his existing job where he’d worked for years.  One day as he was driving to work and in a state of indecisiveness, he found himself asking himself all the nagging questions that torment us at such times:\n\n • “Should I take the new job?”\n • “Will I be happy?”\n • “Am I doing the right thing?”\n\nAt that precise moment as he was churning the questions over and over, he looked up and saw a bus drive by and for some reason, he read the billboard on the side of the bus. It was a Nike advertisement with the slogan:\n\n“Just Do It!”\n\nThese are not just coincidences!  I don’t believe there are accidents in this intelligent universe.  It’s times like these that you should ask yourself: “What am I supposed to be learning or doing right now?”  I feel when these synchronistic events happen, it’s the inner workings of your soul showing up in your outside physical world.\n\nTips on tapping into, and working with, synchronicities\n\nThis week try to notice if synchronistic events are happening around you and your life.  Here are a few tips to assist you to Begin to notice and act on those divine nudges.\n\nThe more you notice and pay attention to meaningful synchronistic events and coincidences, the easier it gets for them to multiply in your life.\n\n • Notice when you run in to people unexpectedly.  Really listen to what’s being said in the conversation and the hidden message that could be there for you.\n • If there’s a certain problem in your life, try to let it go and turn it over to synchronicity.  What you’re saying to the Divine Source is: “OK, show me! Let me be aware and act when the answer or guidance is being presented to me.”\n • Work with your journal and intuition to become even more aware when source is knocking on your door.\n • Believe that it’s possible.  A positive attitude enhances the experience, just as a negative attitude will shut it down.\n\nThis article maybe the first from me you have seen, you may have had this forwarded to you from a friend, or someone might have simply had you read this after you just told them of a so called coincidence that has or keeps showing up in your life.  You were meant to receive this newsletter with this message.  This is another example of synchronicity trying to get your attention.\n\nAs I’ve said: “There are no accidents!  I truly believe that life tries to show us miracles every day, if we would simply notice — and act upon them.”\n\nLive a Soul-Filled Life!\n\n\n\nAbout the author: John Holland is an artist, author, public speaker, and psychic medium. To learn more about John Holland, visit  ~via\n\n\n\n\n\nRevealing Synchronicity — The Science Behind Coincidence\n\n\n\n\n\nYes, There Is A Way To Create Synchronicity\n\n\n\n\n\n\nSo, let’s face it…\n\n\n\n\n\n\n\nThe Science Behind The Chance Meeting — Not A ‘Coincidence’\n\n\n\n\nA Final Word\n\n\n\n\n\n\n\nMICHELLE WALLING, CHLC: “What Does The 11:11 Repetition Mean To You?”\n\n\nHow many times have you been prompted to look at the clock right at that moment of 11:11? Perhaps you picked up your cell phone right at the moment of 11:11. Not at 11:10 or 11:12. What is the message 11:11 brings you?\n\nOne of the most recognizable and frequent synchronicities is seeing 11:11. Synchronicity is a sign that you are tuned in to the field of messages. The field of messages contain the higher waves of consciousness that are now available more than ever.\n\nThe most significant message of 11:11 is that your guide/higher self is triggering you  to “wake up” from the dream. It is a precursor to exiting the matrix. 11:11 is a continuous message that progresses you consciously and subconsciously to the next levels of higher dimensional consciousness and vibration.\n\nPay attention to what you are doing or thinking at the time that you see 11:11. If you are doing nothing, pay attention to that too, and begin doing nothing more often so that you can find the field of messages again.\n\nThe 11:11 synchronicity can also help you find your purpose by following the clues. Keep a journal and write down what you were doing at the time. You will have to look at the bigger picture to connect the dots.\n\nBesides the main message of waking up and connecting to higher awareness, 11:11 can mean different things to different people. It is up to you to figure out what the meaning is by using your intuition and by going within for the answers. By practicing the interpretation of 11:11, it can be a guide and a tool for learning how to discern and make the higher connection within.\n\nHere are some examples of what 11:11 has meant to me at different times:\n\n 1. You are moving forward\n 2. You are on the right path\n 3. You are shifting timelines towards the highest and best outcome for you\n 4. You may need to focus on that particular the area of your life\n 5. Everything is going to be o.k.!\n\nThere is more significance of the magical 11:11!\n\n11:11 represents the Law of One, or unity consciousness. It reminds us that we are all interconnected. At the very moment that you are seeing 11:11, many other beings are also seeing 11:11 and saying “why am I seeing 11:11”? This raises the collective awareness together.\n\nIn numerology, 11 is a master number. 11 signifies Spiritual illumination, empathic abilities, supernatural and paranormal abilities, insights, and intuition. All of these things help us awaken and raise our vibration so that we can attune to the higher realms.\n\n11:11 is also symmetrical, signifying balance and repetition,  which triggers the subconscious. It’s fun to pay attention to your reality when you are out in the matrix. You can find 11:11 on license plates, door numbers, signs, and receipts.\n\nDon’t take your repetitive signs for granted. Be sure to show gratitude by thanking the Universe for these messages. Acknowledging the 11:11 signs will open the door for more to come.\n\n\n\n\nBy Michelle Walling, CHLC\nEditor, WooWoo Media\n\nAbout the author:\nMichelle WallingMichelle Walling, CHLC is a Holistic Life Coach, international public speaker, writer, webmaster, and radio show host. In 2013, Michelle started her public career as a spiritual, metaphysical, and esoteric contributing writer for Michelle is the webmaster for, and, and is the co-creator of Michelle is the host of In5d’s Cosmic Awakening Show and In5d Network. Her personal Facebook page can be found here.\n\nLike and follow WooWoo Media on Facebook\n\nELIMOR BADER: “How Many of These Awakening Symptoms Have You Experienced?”\n\nHand of Light (5).png\n\n\n\nOver the last couple  of decennium, exponentially more people started to feel a bigger affinity towards spirituality. Something is not only changing in the world, but also inside of us. There seems to be a link between those changes. It seems like more people are starting to wake up and experience a so-called ‘spiritual awakening’.\n\n\nA spiritual awakening is for every person different, so is the way a person experiences spirituality and to which degree it influences their life on a daily base.  Some people do not even realize they experience symptoms of a spiritual awakening, because they don’t know how to categorize their experience.\n\n\nExtremely vivid and lucid dreams\nEver had the feeling after waking up from a deep sleep, that you were not sure if something really happened or if you dreamt it? These are the extreme vivid dreams. Sometimes you will even find yourself being conscious in a dream. The moment that you realize you are dreaming you can take control of the dream, and experience the infinite possibilities of a lucid dream.\n\nA sudden interest in the paranormal and metaphysical subjects\n\nLife changing events\n\n\n\nThe urge to say goodbye to restrictive patterns\n\nTime seems to go faster\nThe acceleration of time is also a clear symptom, this can be explained by the big events that are occurring in your life. Everything is changing around you and you can’t stop it. The best thing you can do is try to live your life a conscious as possible, acknowledge the ‘now’.\n\nGetting a new perspective on life\n\n\nSynchronicities get noticeable\n\nExperiencing ‘oneness’\n\n\n\n\n\n\nLAURA MARIE: “21 Symptoms of Spiritual Awakening”\n\nSpiritual Awakening\n\n\n\n\n21 Symptoms of Spiritual Awakening\n\n1) The feeling that something has changed inside of you\n\n\n2) Awareness of your old negative habits\n\n\n\n\n4) To not stand superficiality and everything that is not authentic\n\n\n5) Deep sadness / compassion about the suffering in the world\n\n\n6) Feeling the need to make this world a better place\n\n\n7) A deep yearning for meaning in your life\n\n\n8) Hypersensitivity\n\n\n9) Creativity and increased inspiration, need to realize your dreams\n\n\n\n\n11) Increased intuitions and desire to reconnect with yourself\n\n\n12) Increase in « coincidences » and in « synchronicities » in your life\n\n\n13) More awareness and attention to the food you eat\n\n\n14) Changing sleep patterns\n\n\n\n\n16) Loss of interest in all forms of conflict\n\n\n\n\n18) Increased willingness to love and give without expectations\n\n\n\n\n20) Strong connection to animals and nature\n\n\n21) Feeling of Bliss\n\nAll of this, makes you feel a deep feeling of bliss. You feel a burn in your chest, of love towards life, of gratitude, of joy, of enthusiasm for no reason. You feel like you couldn’t be happier than you are now, knowing what you now know. You get delighted by « nothing » (in the eyes of most people) but to you, it is extraordinary (the perfection of an animal fur, its colors, traits, the perfection of the human body, of plants, flowers, the sun, the ocean…)\n\n\nWith all my love,", "pred_label": "__label__1", "pred_score_pos": 0.5386941432952881} {"content": "The British Cyclopaedia: Cestrum (Linnaeus).\n\nThe British Cyclopaedia\nComplete in ten volumes.\nVolume VI.\nNatural history.\nA handsome genus of mostly tropical shrubs, belonging to the fifth class of Linnaeus, and to the natural order Solaneae; generic character: calyx pitcher shaped, five toothed; corolla funnel formed, limb plaited and five cleft; stamens inserted in the tube, often toothed; capsule one celled, many-seeded. Some of the species of this genus are ornamental, most of them having fine foliage. Their qualities are said to be poisonous. The Cestrum tinctorum, a native of the Caraccas, is used by the dyer. The greenhouse kinds are increased by cuttings.\n\nEi kommentteja :", "pred_label": "__label__1", "pred_score_pos": 0.5789507627487183} {"content": "Heimdal Security load logo\n2nd generation threat tool\n\nAt Heimdal, our focus is to help you not only meet today's security challenges, but also stay one step ahead of them. And this requires a different approach.\n\n\nWe built Heimdal CORP as a lightweight client that packs the power of 3 key engines. Our goal: to protect users and organizations around the world against cyber attacks that antivirus can't block.\n\nAs a 2nd generation threat tool, Heimdal is engineered to ensure proactive security. Because you need a solution to eliminate vulnerabilities and block threats before they turn into breaches and infections.\n\n\nThe fact that the Internet is the main malware delivery method today makes scanning for and blocking malicious web traffic a core security component.\n\nHeimdal CORP detects and stops cyber attacks based on their communication with cyber criminal infrastructure. This is what its unique, endpoint-based, DARKLayer-Guard engine specializes in.\n\nEnsure your workstations are safe against:\n\n • Zero-Day exploits\n • dangerous web locations\n • malicious content injected in legitimate websites\n • data leakage\n • traffic redirects and more.\n\nHeimdal stops malicious data transfers coming from infected servers, domains and websites. All incoming and outgoing traffic is sanitized against malware infections and their data exfiltration capabilities.\n\nExpand Collapse\n\nVectorN Detection\n\nThe one of a kind VectorN Detection engine embedded into Heimdal CORP is a perfect layer of extra protection for any antivirus product.\n\nHeimdal CORP's VectorN Detection integrates deep knowledge about cyber criminal infrastructure. It correlates known data and Internet traffic analysis and learns how different types of malware try to infect endpoints and exfiltrate data.\n\nAs a result, Heimdal can identify and block even new and previously undetected malware strains. Proactive protection is what makes our technology effective against advanced, 2nd generation malware software and its distribution tactics.\n\nWhen reactive antivirus response is no longer enough, Heimdal CORP kicks in to cover the gap in your security strategy.\n\nExpand Collapse\n\nSoftware Management\n\nClosing vulnerabilities is a key component in any IT security environment. Especially since vulnerable software is one of the main pathways for infection nowadays.\n\nHeimdal CORP includes a strong Software Management engine which automates software updates. What's more, you can also install and manage 3rd party software automatically, silently and with zero setup. Your endpoint users are never interrupted and their security is ensured anywhere in the world.\n\nAccording to US CERT data, keeping software patched blocks as many as 85% of all web attacks. Heimdal CORP enables you to patch security-critical software fast, according to your needs. In depth reporting on vulnerabilities and updates are also included in the dashboard.\n\nExpand Collapse\nHeimdal CORP's engines act like a funnel to proactively reduce the number of cyber threats that target your endpoints until their impact is negligible.\nHeimdal Security second generation threat tool\nIf you'd rather call, find us at +45 7199 9177", "pred_label": "__label__1", "pred_score_pos": 0.6479865312576294} {"content": "Counter-Terrorism, Security and Intelligence in the EU: Governance Challenges for Collection, Exchange and Analysis\n\nIn this article, author Monica Den Boer seeks to address the emerging role of the European Union (EU) as a security and intelligence actor from the perspective of counter-terrorism. Intelligence as a process and product has been strongly promoted by the EU as a useful and necessary tool in the fight against terrorism, radicalization, organized crime and public order problems. A range of agencies has been established that collect, analyze and operationalize intelligence in view of strategically defined security threats. Examples are Europol and Frontex. This article makes an inventory of their roles and competences in the field of intelligence and looks at the list of instruments that encourage the sharing of intelligence between different law enforcement and security agencies. Moreover, it is argued in this article that as intelligence becomes more hybrid and as the EU only holds light powers of oversight on ownership and integrity of data, considerable governance challenges lurk around the corner. As ‘intelligence’ is usually a complex and sensitive product, it often travels outside formal bureaucratic channels, which undermines accountability and transparency of where, how and for what purpose the intelligence was gathered.\n\nTo cite this article: Monica Den Boer (2015) \"Counter-Terrorism, Security and Intelligence in the EU:Governance Challenges for Collection, Exchange and Analysis\", Intelligence and National Securit y, 30:2-3, 402-419, DOI: 10.1080/02684527.2014.988444", "pred_label": "__label__1", "pred_score_pos": 0.9980986714363098} {"content": "Boost logo\n\nBoost :\n\nSubject: [boost] Preliminary review request for (Boost) QVM\nFrom: Emil Dotchevski (emildotchevski_at_[hidden])\nDate: 2011-02-06 22:38:46\n\nThis is a library for working with Quaternions, Vectors and Matrices\nof static size. A type traits system is used to enable generic\nnamespace-scope (operator) function templates that implement various\nQ, V and M operations for any (user-defined) compatible type.\n\nThe library also defines view proxies which provide lvalue or rvalue\naccess to objects as if they are of a different type. For example,\ncol<1>(m) refers to column 1 of the matrix m as if it is a vector.\nThis system works without creating temporary objects, and should enjoy\nzero abstraction penalty with most compilers (assuming inlining\n\nThe online documentation is at\n\nComplete source code and documentation can be downloaded here:\n\nNote: QVM supersedes (Boost) LA which was submitted for preliminary\nreview about a year ago. It adds a few missing pieces (most notably\nsupport for quaternions), uses shorter names for types and functions,\nand is organized into fewer header files.\n\nEmil Dotchevski\nReverge Studios, Inc.\n", "pred_label": "__label__1", "pred_score_pos": 0.9690097570419312} {"content": "Microwave Oven is called better half of kitchen. With the help of microwaves oven people can cook more delicious and tastier food, with the short passage of time. \n\nHave you ever asked this question to your inner soul, that a food which is cooked by microwave oven is healthier for our health or not? not at all, a food which is cooked through microwave ovens is highly hazardous to human health. It gives off radiation which are similar to radio waves these waves are turned out by magnetron (a magnetron is device which is used in every microwave ovens to generate electromagnetic waves). Magnetrons turn out EMF with a microwave frequency about 2,450 megahertz. These waves attack the natural polarity of water molecules causing fraction that in turn creates thermal energy. \n\nAccording to healthcare experts the food that is cooked in microwaves oven loses its important nutritional value about 60 to 90 per cent. Which leads to increase the risk carcinogenic cells in blood, cataract, birth defect, as well as causes infertility in men and several other horrific diseases in human. \n\nIt was firstly invented by the Nazi’s for his army troops for cooking method in World War II. Later on it was banned due it’s biological effects by soviet Union in 1976. Soviet Scientists found these waves which are turned out by microwaves decrease the ability of vitamins such as vitamins B complex, vitamins C and E, essential minerals and lipotropics. \n\nWhereas in 1991 the Swiss Doctor Hans Ulrich Hertelmade a research and explained that a food that is prepared through microwave is caused lose of hemoglobins which indicate anemia, fall off in numbers of red blood cells, outturns of radiolyticcompounds, fall off in numbers of white blood cells and increased in cholesterol level. \n\nAccording to well known scientist, professor Franz Adelkofer, the high frequency of electromagnet wave can causes geno-toxic effects and damages DNA which leads to cancer. \n\nSicknesses which are caused by microwaves are. Insomnia (sleeplessness), headache and dizziness, nausea, cataract, frequent urination, cardiac diseases, infertility in men, cancer and weakened immune system. \n\nThe best way to save the nutritional value of food and make ourselves healthy we must use traditional methods of cooking which have been used by our ancestors. \n\n\nKhairpur Mir’s, July 3.", "pred_label": "__label__1", "pred_score_pos": 0.727401852607727} {"content": "Moon water bears\nLesson Date : 2019-09-10\n\n토론주제 : Debate Question: Should sending organisms to the Moon or other planets be prohibited?\n\n토론기간 : 2019-09-10 ~ 2019-10-10\n토론이용안내: 1.찬성,반대 중 선택>> 반론참여 버튼생성>>반론참여 클릭>>텍스트 입력, 음성녹음, 동영상등록 중 선택 의견을 남기세요.\n                        2.반대 의견의 상대방 지목 은 최대 3명까지 가능하며, 반론에 대한 답글은 제한이 없습니다.\nNo. 0\nManager's Pro Opinion\nYes, sending organisms to the Moon or other planets should be prohibited. Space environments must be protected. Sending any organisms to another planet or the Moon is harmful. They could contaminate their natural environments. There is no way to prove that small bacteria, animals or plants would have a positive effect in these places. Scientists should not try to create an ecosystem on the Moon or on other planets. This should happen naturally and not with any human intervention.\nNo. 0\nManager's Con Opinion\nNo, it was not a good idea to send the tardigrades to the Moon. Scientists are not sure how they might affect the Moon. Tardigrades are tough creatures and are likely to survive the Moon’s harsh conditions. Now, these creatures have contaminated the Moon. Scientists should be careful when sending anything to the Moon. It is their responsibility to protect the Moon.\n\n토론 시작\n\nNo. 5795\n\nHumans and bacterias develop. Despite the tough weather of the other planets, I believe that the creatures will be able to survive in the planets. If we find out that we can live there by those who were sent, if the creatures all wipe out because of something very dangerous, we can go to the other planets and be safe until the universe wipes out.\nFor these reasons I strongly believe that we should send organisms to the planets.\n\n(red031225)19.09.10 07:19\n\nNo. 5809\n\nIt was a pretty good idea to send tardigraids to the moon, because tardigraids dosent die easily. It will make easier for peopie to know moon's nature. So, sending organisms to the Moon or other planets should be prohibited.\n\n박서진(skymh98)19.09.16 07:30\n\nNo. 5812\n\nI think sending organisms to the Moon or other planets should be prohibited. It is good to find out the condition of the moon or other planets. Yet, we don’t know that organisms have positive effect on planets or the moon. Not like our purpose, we can make the environment much worse. We don’t need to send organisms to the moon or outer space. In the future, when technologies develop and it is safe to send organisms to outer space, than we can send them. But now, scientists should do more research.\n\n한효주(hhj070525)19.09.16 21:15\n\nNo. 5825\n\nThis event could be useful for other scientific technology increase.\n\n박준우(mangojw)19.09.19 21:55", "pred_label": "__label__1", "pred_score_pos": 0.718093752861023} {"content": "Hannah Berner\n\nCast Member, Bravo's \"Summer House\"\nSelf-Employed / NBC Universal, Bravo\n\nHannah Berner is a cast member on Bravo's \"Summer House,\" where she has been open about her experience with anxiety and depression. She's also the host of the podcast \"Berning In Hell,\" where she interviews influencers and other celebrities about their own mental health, insecurities and fears.", "pred_label": "__label__1", "pred_score_pos": 0.99996018409729} {"content": "Influence of heavy metal music\n\nWhether it be to harmonize with the guitars or act as a bridge between choruses, vocal effects dominate the emotionally heavy side of the album. When Sleep chooses to turn the volume down, as on the Influence of heavy metal music second bluegrass interval titled \"Some Grass,\" it is only to prepare the listener for the next pummeling assault.\n\nIn live performance, loudness —an \"onslaught of sound\", in sociologist Deena Weinstein 's description—is considered vital. Judas Priest British Steel Judas Priest's Rob Halford looked back on the making of British Steel with me in a summer Houston Press profile as the band was playing the album every night in its entirety.\n\nHeavy metal genres\n\nAt the hearing, the PMRC alleged that the song was about sadomasochism and rape ; Snider stated that the song was about his bandmate's throat surgery. However researches which are conducted in Iowa University, show that there is no significant relationship between anti-social personality and being a fan of heavy metal.\n\nPerceive and analyze artistic work. MetallicaMegadeth, Anthrax, and Slayer pioneered thrash metal, distinguished by its fast tempos, harsh vocal and guitar timbres, aggressivenessand critical or sarcastic lyrics. Make intertextual links among and across texts, including other media e.\n\nIt also has been used to classify certain elements or compoundsas in the phrase heavy metal poisoning. The outcome of the study is, participants who listen non-violent songs feel more depressed than the participants who listen heavy metal.\n\nAnd, yes, there is even cowbell. Pain of Salvation kicked off in phenomenal fashion with an aggressive, emotional, thematically coherent album that engages us right from the beginning and draws us in willingly for repeated listens. See end of this post for link to paper.\n\nAvant-garde metal Dan Mongrain of avant-garde metal band Voivod Avant-garde metal or avant-metal, also known as experimental metal, is a subgenre of heavy metal music loosely defined by use of experimentation and characterized by the use of innovative, avant-garde elements, large-scale experimentation, and the use of non-standard and unconventional sounds, instruments, song structures, playing styles, and vocal techniques.\n\nHeavy metal\n\n\nMany heavy metals, including arsenic, cadmium, chromium, coppers, and lead just to name a fewbioaccumulate in the environment, meaning that while small short-term exposure presents little to no danger, continual exposure to trace amounts accumulate in the system, resulting in the accumulation of high levels of the metal in the system and long-term damage.\n\nPlease consult your doctor before altering your alcohol consumption habits. The theme of birth, death and the pain of living with cancer are woven throughout the entire album.\n\nAn example is Walser's linkage of heavy metal music with the ideologies and even some of the performance practices of nineteenth-century Romanticism. The ties that bind the two bands started in the s and were still strong in the s.\n\nExtreme Metal Music and Anger Processing\n\nThough long-term studies should be performed to get a more complete view of the effect of arsenic and other heavy metal contamination in wines, this study shows that wine produced in regions of naturally higher heavy metal levels, while they do show increased concentrations in the wine itself, it does not appear to be at levels that are dangerous for human consumption for the short-term.\n\nAlong with the title song, tunes like \"War Pigs\" and \"Iron Man\" are instantly memorable -- the kinds of tracks you only have to hear once before they're forever seared on your psyche.\n\nAnd it is glorious.\n\nConnect. Discover. Share.\n\nWhile the newbies grew and moved forward to dominate the metal landscape, this was Priest's last stand. Profound Lore Records They take as an example Sabbath's second album Paranoidwhich \"included songs dealing with personal trauma—' Paranoid ' and ' Fairies Wear Boots ' which described the unsavoury side effects of drug-taking —as well as those confronting wider issues, such as the self-explanatory ' War Pigs ' and ' Hand of Doom '.\n\nThe student relates music to history, culture, and the world. While the Ozzman's harmonica work on \"The Wizard\" may have aged less gracefully, the album remains unstoppably heavy, an unparalleled classic. The record is chock-full of now-classic guitar licks by Tony Iommi.Heavy metal (or simply metal) is a genre of rock music that developed in the late s and early s, largely in the United Kingdom.\n\n\nMay 21,  · Despite the arousing influence of the music, heavy metal fans displayed no difference in self-reported anger whether they were listening to a non-preferred music genre (country) or heavy metal. Non-fans, on the other hand, did display greater self-reported anger after listening to heavy metal.\n\nFrom heavy blues outings of the late 60s to pioneering hard rock anthems from the early 70s, we bring you the 11 heaviest proto-metal songs that inspired heavy metal and today’s headbangers.\n\nHeavy metal music\n\nAlternative metal is a style of heavy metal and alternative rock which emerged in the mids, and gained popularity in the early s. Alternative metal usually combines heavy metal with influences from genres like alternative rock, and in some cases other genres not normally associated with metal.\n\nHeavy metal, often referred to as metal, is a genre of rock music that developed in the late s and early s with roots in blues rock and psychedelic rock. Heavy metal lyrics and performance styles are often associated with masculinity, aggression and machismo.\n\nThe specific influence on Heavy Metal by Hard Rock bands and artists such as the Kinks, Led Zeppelin and Jimi Hendrix The historical and social context of Birmingham, England, during the late s and early s.\n\nInfluence of heavy metal music\nRated 3/5 based on 13 review", "pred_label": "__label__1", "pred_score_pos": 0.8755511045455933} {"content": "Domestic Violence in Rural Areas Essay\n\nDomestic Violence in Rural Areas Essay\n\nLength: 2218 words (6.3 double-spaced pages)\n\nRating: Powerful Essays\n\nOpen Document\n\nEssay Preview\n\nDomestic violence is a serious criminal, familial, and societal problem. Statistics indicate that many women fall victim to domestic violence however it is impossible to quantify the actual pain and degradation they face. Fear and terror are equally impossible to quantify as women and family anticipate their next assault. Domestic violence touches all walks of life therefore the use of gender specific language should not be construed to mean that domestic violence is only perpetrated on women or in heterosexual relationships. However, academic research consistently demonstrates that the majority of domestic violence victims are female and the batters male. For the purpose of this paper, violence perpetrated on women from men will be the focus.\nBattering is the largest cause of injury to women when compared to rape, auto accidents, and mugging combined (Robinson, 2000). The physical violence endured by women has ramifications beyond what women themselves suffer. For example, babies born with birth defects are increased because of pregnant women being battered, and children witnessing domestic violence are more likely to the repeat the cycle of violence as they get older (Robinson, 2000). Not only are children living in abusive homes adversely affected by what they witness, they are at risk of being abused themselves. It is estimated that 40% to 50% of men who batter their spouse also physically and emotionally abuse their children (Robinson, 2000).\nThe most commonly asked question about domestic violence is why do women stay in an abusive relationship. Multitudes of reasons exist that are extremely complex. The book Rural Women Battering and the Justice System (Websdale, 1998) offers several reasons why women stay in...\n\n... middle of paper ...\n\n... to stay in abusive relationships.\n\nThe tragedy of domestic violence is not new. Historically not only have men had legal rights to beat their spouse but is presently socially endorsed in rural regions. Woman battering is a problem in rural regions that has been ignored far too long. As noted by Websdale, 1998 social and geographical isolations make if difficult for women in rural region to escape violent perpertrators. Due to the isolations that rural women encounter accessing help from the criminal justice system is difficult. Women in urban/suburban regions are not present with the same isolations therefore the accessibility of the criminal justice system is much more reasonable. The nature of battering as previously stated in no different in rural regions than that of urban regions. Violence is violence no matter where the incidents occur.\n\nNeed Writing Help?\n\nGet feedback on grammar, clarity, concision and logic instantly.\n\nCheck your paper »\n\nDomestic Violence and Poverty in Rural Communities Essays\n\n- Introduction: A rural community can be defined as encompasses all population, housing, and territory not included within an urban area (Defining rural population). Poverty can be defined as, the state of one who lacks a usual or socially acceptable amount of money or material possessions or renunciation as a member of a religious order of the right as an individual to own property ( Domestic Violence is defined as, violent or aggressive behavior within the home, typically involving the violent abuse of a spouse or partner (   [tags: rural issues, religion, housing]\n\nPowerful Essays\n1548 words (4.4 pages)\n\nSubstance Abuse And Domestic Violence Essay\n\n- Crystal methamphetamine has been linked to domestic violence (Luis, 2010, Hendricks, 2012). Additionally, instances of domestic violence involving ‘ice’ have found to result in more significant injuries to victims than other domestic violence incidents (Luis, 2010). Furthermore it has been identified that methamphetamine use is more prevalent in remote and rural areas of Australia (Phillips and Vendenbroek, 2014). It is possible that this is due to the mental impact of isolation on persons living in rural areas, and associated substance abuse as a coping mechanism....   [tags: Domestic violence, Child abuse, Violence]\n\nPowerful Essays\n902 words (2.6 pages)\n\nEssay about Domestic Violence And Its Effects On Children\n\n- Domestic violence is about intimidation, physical assault, battery, sexual assault, and/or other abusive behavior as part of a systematic pattern of power. Children who witness domestic violence can mean seeing actual incidents of physical/and or sexual abuse. That can simply mean hearing threats or hear fighting noises from the other room. Children that witness the aftermath like bruises and blood can also be affected in a traumatic way. How can children that witness and experience domestic violence develop socially....   [tags: Domestic violence, Child abuse]\n\nPowerful Essays\n1009 words (2.9 pages)\n\nAnalysis Of Closed Doors Women 's Domestic Violence Essay\n\n- Marsella Ortiz Mr. Tiernan COMP 101 13 November 2014 Title When it comes to a relationship between two people there is suppose to be an equal balance of power, trust, and their contribution . However, that isn 't always the case when behind closed doors women are experiencing domestic violence but different in forms. Gellert defines it as, “Domestic violence occurs between members of a family or partners in an intimate relationship. It includes murders, rapes, robberies or assaults committed by spouse, ex-spouses, boyfriends, or girlfriends” (146)....   [tags: Domestic violence, Violence]\n\nPowerful Essays\n1141 words (3.3 pages)\n\nDomestic Violence And Its Effects On Children Essay\n\n- Abstract The purpose of this research study is to inform the reader and argue the risk factors for men or women becoming victims of or abusers in domestic violence. Domestic violence has been a major controversial issue in the recent past and it continues to be till today. This is one of the major issues and crimes that law enforcement face in our community and this is due to family poverty, children witnessing family violence as a child and heavy substance abuse in the household. Domestic violence is violence that occurs between couples who are living together or once did live together in a conjugal relationship....   [tags: Domestic violence, Child abuse, Abuse, Violence]\n\nPowerful Essays\n1674 words (4.8 pages)\n\nThe Empowerment of Rural Women in Limpopo Essay\n\n- Introduction: Women in rural provinces tackle many adversities: from domestic violence to HIV ratings being increased due to the increase of sexual abuse. This project is there to help empower women to be independent, self-assured and conscious of their rights so, in the end, the women will be able to convey their knowledge and skills to the community. This project will educate the community on understanding HIV/AIDS, gender customs, sexuality, and domestic brutality. Background: Women empowerment motivates women with the courage to get rid of the shackles of certain cultural traditions and religious terms that have customarily held women dormant and incapable of seeing the power they hold....   [tags: rural development projects, woemen empowerment]\n\nPowerful Essays\n1097 words (3.1 pages)\n\nEssay on Domestic Abuse and Its Consequences\n\n- Domestic Abuse and Its Consequences Abuse. There are always people that want to know what is it, and why do they do it. Why do all these women stay in that kind of home, and what are the effects on them when this happens. How do the children deal with this kind of situation, and what effects does it have on them. One of the most important questions you would most likely hear is how do you leave an abusive relationship and how do you cope with it after you do leave. (Women's Rural Advocacy Programs)....   [tags: Domestic Violence]\n\nPowerful Essays\n1087 words (3.1 pages)\n\nPhysical and Psychological Effects of Domestic Violence on Women Essay\n\n- “Domestic violence is the leading cause of injury to women in the United States” (Jones 87). Every twelve seconds, a woman is beaten by a man (Jones 6). Every nine days, a woman is murdered by her husband or boyfriend (Jones 7). Statistics like these outline the severity and seriousness of the domestic violence epidemic in this country. Unfortunately, it has taken lawmakers too long to recognize domestic violence as a devastating situation that affects millions of people both physically and emotionally....   [tags: Abuse Violence Essays]\n\nPowerful Essays\n1608 words (4.6 pages)\n\nDomestic Violence : How Common Is It? Essay\n\n- One of the main questions asked about domestic violence, is how common is it. Domestic violence can happen to anyone of any race, age, sexual orientation, religion or gender. Abusive relationships are also known as domestic violence. Domestic violence can occur between many different kinds of couples: married or unmarried couples, couples who live in rural areas and urban areas, those that cohabitate or live separately, couples that had been formerly married or had dated, and between heterosexual or same-sex couples....   [tags: Abuse, Child abuse, Psychological abuse]\n\nPowerful Essays\n717 words (2 pages)\n\nFemale Oppression and Domestic Violence Essay\n\n- Domestic Violence as Oppression Oppression is not a new phenomenon and it is defined in the social work dictionary as a social act of placing severe restrictions on individual, group, or institution. Typically a government or political organization in power places restrictions formally or covertly oppressed groups so they may be exploited and less able to compete with other social groups. The oppressed individual or group is devalued, exploited, and deprived of privileges by the individual or group who has more power (Barker, 2003)....   [tags: social problem, abuse, victimization]\n\nPowerful Essays\n1189 words (3.4 pages)", "pred_label": "__label__1", "pred_score_pos": 0.9520010948181152} {"content": "Business Management Report\n\nThis report is to give details of the employment opportunities available for Business, Marketing and Human Resource Management. It will identify key skills needed in a business environment and it will discuss the reasons why this degree will differentiate students from other degree subjects. Also this report illustrates how important business is in the world. It explains to a possible future student why it is a good choice. It is my aim for the reader to understand through my research how vital a career in business is and to win them over so that they do in fact study it.\nEmployment opportunities for graduates in Business, Marketing and HRM:\nFinance –\n  * Account executive\n  * Commercial banking\n  * Financial planner\n  * Commercial lending officer\n\nExample of an account executives job roles-\n  1. Responsible for financial reporting\n  2. Taxation\n  3. auditing,\n  4. Forensic accountancy,\n  5. Corporate finance and insolvency.\n\nThey play a strategic role by providing professional advice, aiming to maximise profitability on behalf of their client or employer. They work in many different settings, including public practice firms, industry, commerce and the public sector”.\n  * Personnel manager\n  * Operations manager\n  * Hotel resort manager\n  * Human Resources\n  * Quality control manager\nExample of a hotel managers job roles–\n  1. “A holiday representative is responsible for looking after groups of clients on package holidays at resorts”.\n  2. “Their main priority is to ensure that clients enjoy their holiday and that everything runs as smoothly as possible for them. As the public face of the tour operator, they must create an excellent first impression and continue to provide an outstanding service to clients throughout the duration of their stay”.\n  3. “The role involves holding welcome meetings, handling complaints and...", "pred_label": "__label__1", "pred_score_pos": 0.7897096872329712} {"content": "I’m confused by the term “church fathers.” I have wondered about men like Thomas a Kempis. Were these individuals believers? Are they our spiritual fathers in some way? (I was saved out of the Catholic church 15 years ago.)\n\nAs I read your letter, I thought of Jesus’ words to His disciples: “Upon this rock I will build my church; and the gates of hell shall not prevail against it” (Matt. 16:18). As we study church history, we realize the spiritual struggles of believers in the centuries since Christ lived on earth. We think that we live in a difficult time, but we have many advantages that believers in the first centuries after Christ lived on earth did not have. One of the impressions we get concerning the early centuries of Christianity is that of a continual fight against error—both within and without the community of believers.\n\nVarious church historians have used a number of terms to identify the early leaders of the church. Under these terms, which also identify periods of time in the early centuries, we have the loose designation that you mention—”church fathers”—to label individuals who standout. Irenaeus, Tertuffian, Clement, and Origen are a few.\n\nThe “apostolic fathers” make up the first group. They lived in a period from about AD 90 to 150. This group included Clement of Rome, Ignatius of Antioch, Polycarp of Smyma, Barnabas of Alexandria, and others. These men produced letters and other writings, and they tried to understand Christ better. For the most part, their writings reveal a zealous church without the trappings of hierarchy. Persecution occurred almost from the Day of Pentecost and has continued ever since, in varying degrees.\n\nPersecution, while hideous, has been used of God to further the message of the Bible, to keep Christians awake and alert, and to purify from sin. Undoubtedly God has had a multitude of reasons for allowing persecution. The world has had many reasons for persecuting Christians. Those occupied with religion, whether Jews or heathen, saw Christianity as a threat to their beliefs and practices. The Romans and others persecuted Christians because they were suspicious of Christians’ teachings about Christ as a ruler with a future kingdom. Other persecution took place for pure enjoyment or sport or because others saw Christians as scapegoats for problems and calamities. And, of course, the unsaved didn’t like the way Christians tried to bring non-Christians to conversion. They, like the masters of the girl of divination in Acts, would rather have been left alone to pursue their sinful lifestyles. We see the same attitudes displayed today as believers and their influence are increasingly being removed from public life.\n\nThe “apostolic fathers” were not necessarily completely sound in their theology. Some thought that being a martyr or a celibate, for example, atoned for sin. The doctrine of baptismal regeneration also began to creep in.\n\nThe second period, from AD 130 to 180, includes a group of people often called “the apologists.” As heretics falsely accused Christians and misrepresented their teachings, various individuals wrote to defend the believers. Justin Martyr, perhaps the best-known apologist, got the name “Martyr” because he was beheaded for his faith a few years after writing his famous Apology.\n\nDuring the latter part of the second century, two heresies became especially serious: Gnosticism and Montanism. Gnosticism, which did not originate in Christianity, had many forms and sects within it, making it difficult to pinpoint a common belief. It would be safe to say that human knowledge prevailed and that the Gnostics scoffed at the believers’ practice of walking by faith. They also doubted that Christ had lived on earth in human form. Montanism, on the other hand, came from within the church. About AD 156, Montanus proclaimed himself as the instrument through which the Holy Spirit was speaking. He preoccupied himself with the idea that the Holy Spirit did not come at Pentecost but that Christ’s promise was about to be fulfilled and a new dispensation was about to begin. He and his followers practiced extreme asceticism, including fastings and celibacy. Some believers considered a growing worldliness in the church a cause for welcoming Montanism.\n\nOther serious heresies also existed. Whatever we think about the early “church fathers” and their aberrations of doctrine and practice, we still have to concede that they probably did the best they could with what light they had. Fortunately, while such movements as Gnosticism and Montanism posed a grave threat in those years, the majority of true Christians did not embrace them.\n\nThe third group, the “polemicists,” came right after the apologists and went to approximately AD 225. They were the “giants” most commonly associated with the term “church fathers”—men such as Irenaeus, Flippolytus, Tertullian, Cyprian, Clement, and Origen. These periods and personalities overlap somewhat. The polemicists, we should note, were fastidious in holding to the New Testament books as the source of right doctrine. We find emerging from this period what some have termed the “three Cs”: a creed, the canon, and catholicity. In other words, we find that the church adopted the Apostles’ Creed so that everyone could know what the church accepted as the truth. Canonists also determined which books belonged to the Scriptures, as people were confused concerning which writings were valid and which ones were not.\n\nAnd, from this period to the Reformation, we find the beginnings and development of the Catholic concept of church government, as opposed to the simple organization of the early New Testament church.\n\nNext we have the period of “scientific theologians” who attempted to apply scientific methods of Biblical interpretation and textual criticism. These men include Jerome, Augustine, Theodore and John Chrysostom, Ambrose, and others who defended the faith. They gave us writings and creeds that serve as a basis for summarizing what we believe and that strengthen a common belief in the church as an institution. Unfortunately many wrong teachings began to germinate during this period of time; for example, doctrines and practices associated with the Roman Catholic Church, such as purgatory, sacramentalism, and priestly mediation.\n\nThe scene changed dramatically when Constantine, the emperor of Rome, nominally embraced Christianity. He moved to make Christianity a state religion with an act known as the Edict of Milan in AD 313. Suddenly Christendom went from a persecuted minority to a fat, established majority. Constantine gave large sums of money to the clergy, built magnificent church buildings, and forbade Sunday work. However, since Christianity had become an advantage, heathen people joined the church in droves, and corruption poured into it. Several councils, including Nicaea and Chalcedon, further expressed the fundamental beliefs of the Christian faith.\n\nYou mentioned Thomas a Kempis. We must jump many centuries of “Dark Ages” to the time of the Reformation. He, along with others of the pre-Reformation period, wrote works that linger to this day. They reflect on the simple piety that characterized those in a monastic frame of reference.\n\nWhat do we conclude? First, we take history and learn what we can from it. Error creeps in when people do not learn from past error. I am concerned that, for the most part, we are not teaching our children and teens church history. And while we’re at it, we should familiarize them with the history of our own GARBC fellowship and the reasons it came into existence.\n\nSecond, we don’t worship these early “church fathers.” They were human and often embraced false doctrines and practices. We also consider the times they lived in and appreciate what many of them went through. We will know who the believers are when we get to Glory. Third, we see the sovereignty of God and how He controls history. We appreciate the fact that He perfectly preserves His Word and His people in a hostile world.\n\n\nReprinted from the Baptist Bulletin (July/August 1993).\n© 1993 Regular Baptist Press. All rights reserved.\nUsed by permission.", "pred_label": "__label__1", "pred_score_pos": 0.6396865844726562} {"content": "Feeding the Homeless\n\nFor World Day of the Poor, the chaplaincy team and school council went to St Matthias to help with the homeless shelter. Every Tuesday, homeless people come in to eat. They can also sleep in the beds that are provided for them.\n\nIt was really exciting for us to help with the cooking; we made vegetarian pasta bake and spaghetti bolognaise: it was important that we made a vegetarian dish because some people in their religion don’t eat meat.  We helped to make the beds and put out warm socks and toiletries in order for the homeless people to feel as welcome and comfortable as possible.\n\n\nWe also asked questions like what would happen if there wasn’t enough of beds? It was very upsetting to know that those who did not have a bed were forced to sleep outside in the streets. Whilst serving the food that me made we spoke to an Ethiopian man about his situation. Even though he has nowhere to live he has a very positive attitude to life and prays that one day his situation will improve.\n\nWe were delighted to help people be safe by having a nice warm bed and food in their tummy. We are excited to feedback to all the children in the school and tell them how they can help those in need.", "pred_label": "__label__1", "pred_score_pos": 0.6711116433143616} {"content": "Free at Last, (Cell) Free at Last?\n\nCell Free DNA analysis may improve the scalability of genomics for prostate cancer.  The management of CRPC has long been plagued by the inability of clinicians to get an accurate sense of the underlying biology of the tumor that they are treating. \n\nThose of us with some familiarity with cell lines and a general sense of prostate cancer pathology have known that PTEN loss, P53 mutation and Pi3Kinase mutation are common events in the disease writ large, but we’ve never been able to tell which, if any, of these aberrations are occurring in the patient we are talking to in the clinic at or near the time that we are talking to him. Furthermore, biopsies of bone metastases, requiring meticulous decalcification, histological evaluation and DNA extraction has been relegated to large research centers. Not to diminish the importance of this work, which has taught us a lot about the disease, but it suffers from scalability problems. \n\nAnd so, emerging data with cell free DNA technology is particularly encouraging and has my vote for the most disruptive technology to emerge in the management of advanced prostate cancer in the last couple of years. It faces some barriers of validation, but is worth watching for sure. \n\nKim Chi and Alex Wyatt, both at the BC Cancer Agency in Vancouver, British Columbia, demonstrated an effective potential use of this technology in Dr Chi’s presentation earlier this summer at ASCO ( and a forthcoming publication).  In it, they were able to demonstrate differences in patient outcome based on circulating tumor DNA Analysis. \n\nFor those who are not familiar with this technology and its scope, a brief primer: First, our blood streams are filled with circulating DNA fragments, so-called ‘Cell free’ DNA or CF DNA.\n\nVirtually all patients with advanced CRPC will have detectable CF DNA, and in a prostate cancer patient, a significant amount of the CF DNA is circulating tumor DNA, or CTDNA. In the study presented by Dr Chi, about three quarters of patients had measurable CTDNA fraction. In advanced disease patients for example, a majority of the circulating DNA is in fact tumor DNA. Further, these CT DNA fragments are similar to the DNA sequences that one would see following a biopsy. Mutations found in the CT DNA replicate those detected in the biopsies of the tumor. A rich resource indeed, and easily accessible.\n\nWith this analysis method, the Vancouver team was able analyze 73 genes that are known contributors to the pathogenesis of CRPC, among them cancer drivers (e.g. AR, SPOP, NKX3.1, FOXA1), cell cycle regulators (e.g. TP53, RB1, CDKN1B, CDKN2A), mediators of DNA repair (e.g. BRCA1/2, FANC family genes, ATM, MSH2/6) and the PI3K pathway (e.g. PIK3CA, PTEN, AKT1). There is a lot of biology, prognostic and even predictive significance in these genes, especially when you consider the potential significance of measuring their interacting effects ( for example, Ana Aparicio and colleagues at MD Anderson have shown that combined aberrancies in P53, PTEN and RB are associated with a very poor prognosis).\n\nAberrations of the androgen receptor are of particular interest, as they are associated with resistance to enzalutamide, abiraterone, and presumably the other drugs targeting this axis that are in development. In a paper a couple of years ago, AR copy number gain was observed in CT DNA in association with Enzalutamide resistance, and mutations within Exon 8 of the Androgen receptor ( the region associated with ligand binding) harbored many mutations.\n\nThere are some challenges in this process, and yes it needs to go through a few rounds of validation and improved scalability before we can be doing it at the bedside (or, I should say, in the clinic) on a routine basis. One major limitation is that, while the amount of CT DNA is high ( where by quantity it is prognostic) in a patient with advanced disease, it is low in a patient with a low burden of disease or localized disease, a fact that may limit its application to earlier stage prostate cancer.  Also, most of the panels that are run on CT DNA aim to detect short DNA segments, so large structural rearrangements within the genome may be missed. The intrapatient variability is also something that needs to be rectified. Do blood draws taken from the same patient on consecutive days, or consecutive hours, give the same result?\n\nNevertheless, the ease of use of a standard blood test and the conformity to what biopsies show suggest that this is a technology that may become very useful over time as a research tool for sure, but also potentially as a treatment predictor and prognostic test.\n\nWhen will these results hit the clinic on a regular day? The easy answer is when it tells us something positive ( like what to do), as opposed to something negative ( like that our treatment isn’t working, which we probably already knew). While biomarkers of treatment resistance are important in drug development and for raising research questions, they generally don’t guide the typical clinician.  My guess is that they will become standard when they are linked to a therapy that is given as a direct result of the test, for example a parp inhibitor given when coupled to a CT DNA Test showing a BRCA 2 or ATM mutation. Many of the large registration studies with parp inhibitors are including these analyses in their protocols, with a rigorous plan to evaluate the outcome of the testing strategy in addition to the outcome of the pharmacologic therapy being tested. \n\nWatch this space. \n\nWritten by: Charles Ryan, MD", "pred_label": "__label__1", "pred_score_pos": 0.5734645128250122} {"content": "Marriage, Divorce and Remarriage in the Catholic Church\n\nThe Catholic Church offers, to those whose marriage has irretrievable broken down, its pastoral care; supporting them on their journey to keep them under the loving gaze of God. The Church surrounds all of our families with its love, care and support and for those whose lives have been changed and hurt, offers healing and reconciliation to ensure they are invaluable members of God’s family.\n\nAs part of the outreach of the Diocese of Rockhampton, through its Tribunal Office, the Bishop ensures that all who come to seek advice on their broken relationship will be listened to, assured confidentiality, and guided on the path of healing and wholeness. The Tribunal Office is the first place to begin the process. In complete confidence, an application for an annulment can be made and our Tribunal people will assist you in all aspects of preparing your application.\n\nMarriage Annulments\n\nAnnulments are official Church declarations by the Marriage Tribunal that the agreement made by a couple on the wedding day was not the binding agreement it was thought to be.\n\nAn annulment or Decree of Nullity frees the parties to enter a marriage according to the Rites of the Catholic Church once all other requirements of law have been fulfilled.\n\nA decree of nullity does not mean that there was never any love between the parties, that they were lacking sincerity, effort or commitment. Nor does it mean that there was no marriage as generally understood by the community at large. In Australia, a Decree of Nullity has no effect in civil law.\n\nThe Tribunal\n\n\nThe Tribunal staff are priests, religious men and women and lay men and women. All are trained in Canon Law, especially the laws of the Church about marriage.\n\nWho can approach the Tribunal?\n\n\nHow is a Decision reached?\n\n\n\n\nThe Judgement\n\n\n\n\nCosts and timeframes\n\nThe Bishops of Queensland have dispensed with charges for the work done by the Tribunal in a full nullity case. However, we gratefully accept any donation you would like to make to support our work.\n\nHow long does the process take?\n\nPeople should not make any arrangements for the celebration of a marriage in the Catholic Church until the final decision has been given.\n\n\nRockhampton Diocesan Tribunal Office\n07 4887 3079 PO Box 611\n170 William Street\nRockhampton Qld 4700", "pred_label": "__label__1", "pred_score_pos": 0.9967949986457825} {"content": "JPMorgan’s Q3 Fails To Deliver On Expectations\n\nJPMorgan Chase\n\nJ.P. Morgan Chase’s third-quarter revenue declined as the bank continued to fight against volatile market conditions around the world and continued low-interest rates in the United States.\n\nShares at the firm dropped 0.6% to $61.16 after hours.\n\n\nExcluding $2.2 billion of tax benefits and other one-time items, earnings were $1.32 a share. Analysts were expected $1.37 a share.\n\nRevenue also tumbled by 6.4% to $23.54 billion. Analysts had expected $23.69 billion.\n\nTrading revenue was also down 15% to $4.34 billion from $5.07 billion in the third quarter of 2014.\n\n\nJPMorgan also said its legal bills totaled $1.3 billion in the third quarter, higher than the $1.06 billion it reported during the same period of 2014.\n\n\nReturn on equity which measures J.P. Morgan’s profitability, was 12% in the third quarter compared with 10% a year earlier.\n\nOver the last quarter JPMorgan Chase continued to cut jobs, removing 1,781 positions and bringing its workforce to 235,678.\n\nShares at J.P. Morgan have fallen 13% since hitting a record high of $70.61 in July\n\nWritten by Peter Mondrose\n\nPeter Mondrose\n", "pred_label": "__label__1", "pred_score_pos": 0.7404950857162476} {"content": "当前位置:主页 > 英语 > SAT培训 > SAT培训 > 物理 >\n\n\n\n杨格外语主要教授什么语言的课 学习英文...[详细]\n\nSAT物理练习:Newton’s Laws\n\n来源:未知  发布时间:2014-08-13 09:26  点击:\n\nSAT物理练习:Newton’s Laws\n\n  Isaac Newton first published his three laws of motion in 1687 in his monumental Mathematical Principles of Natural Philosophy. In these three simple laws, Newton sums up everything there is to know about dynamics. This achievement is just one of the many reasons why he is considered one of the greatest physicists in history.  While a multiple-choice exam can’t ask you to write down each law in turn, there is a good chance you will encounter a problem where you are asked to choose which of Newton’s laws best explains a given physical process. You will also be expected to make simple calculations based on your knowledge of these laws. But by far the most important reason for mastering Newton’s laws is that, without them, thinking about dynamics is impossible. For that reason, we will dwell at some length on describing how these laws work qualitatively.  Newton’s First Law  Newton’s First Law describes how forces relate to motion:  An object at rest remains at rest, unless acted upon by a net force. An object in motion remains in motion, unless acted upon by a net force.  A soccer ball standing still on the grass does not move until someone kicks it. An ice hockey puck will continue to move with the same velocity until it hits the boards, or someone else hits it. Any change in the velocity of an object is evidence of a net force acting on that object. A world without forces would be much like the images we see of the insides of spaceships, where astronauts, pens, and food float eerily about.  Remember, since velocity is a vector quantity, a change in velocity can be a change either in the magnitude or the direction of the velocity vector. A moving object upon which no net force is acting doesn’t just maintain a constant speed—it also moves in a straight line.  But what does Newton mean by a net force? The net force is the sum of the forces acting on a body. Newton is careful to use the phrase “net force,” because an object at rest will stay at rest if acted upon by forces with a sum of zero. Likewise, an object in motion will retain a constant velocity if acted upon by forces with a sum of zero.  Consider our previous example of you and your evil roommate pushing with equal but opposite forces on a box. Clearly, force is being applied to the box, but the two forces on the box cancel each other out exactly: F+ –F= 0. Thus the net force on the box is zero, and the box does not move.   Yet if your other, good roommate comes along and pushes alongside you with a force R, then the tie will be broken and the box will move. The net force is equal to:\n\n  Note that the acceleration, a, and the velocity of the box, v, is in the same direction as the net force.\n\n\n  Inertia  The First Law is sometimes called the law of inertia. We define inertia as the tendency of an object to remain at a constant velocity, or its resistance to being accelerated. Inertia is a fundamental property of all matter and is important to the definition of mass.  Newton’s Second Law  To understand Newton’s Second Law, you must understand the concept of mass. Mass is an intrinsic scalar quantity: it has no direction and is a property of an object, not of the object’s location. Mass is a measurement of a body’s inertia, or its resistance to being accelerated. The words mass and matter are related: a handy way of thinking about mass is as a measure of how much matter there is in an object, how much “stuff” it’s made out of. Although in everyday language we use the words mass and weight interchangeably, they refer to two different, but related, quantities in physics. We will expand upon the relation between mass and weight later in this chapter, after we have finished our discussion of Newton’s laws.   We already have some intuition from everyday experience as to how mass, force, and acceleration relate. For example, we know that the more force we exert on a bowling ball, the faster it will roll. We also know that if the same force were exerted on a basketball, the basketball would move faster than the bowling ball because the basketball has less mass. This intuition is quantified in Newton’s Second Law:\n\n  Stated verbally, Newton’s Second Law says that the net force, F, acting on an object causes the object to accelerate, a. Since F= macan be rewritten as aF/m, you can see that the magnitude of the acceleration is directly proportional to the net force and inversely proportional to the mass, m. Both force and acceleration are vector quantities, and the acceleration of an object will always be in the same direction as the net force.  The unit of force is defined, quite appropriately, as a newton (N). Because acceleration is given in units of m/s2 and mass is given in units of kg, Newton’s Second Law implies that 1 N = 1 kg · m/s2. In other words, one newton is the force required to accelerate a one-kilogram body, by one meter per second, each second.   Newton’s Second Law in Two Dimensions  With a problem that deals with forces acting in two dimensions, the best thing to do is to break each force vector into its x- and y-components. This will give you two equations instead of one:\n\n\n  The component form of Newton’s Second Law tells us that the component of the net force in the direction is directly proportional to the resulting component of the acceleration in the direction, and likewise for the y-component.  Newton’s Third Law  Newton’s Third Law has become a cliché. The Third Law tells us that:  To every action, there is an equal and opposite reaction.  What this tells us in physics is that every push or pull produces not one, but two forces. In any exertion of force, there will always be two objects: the object exerting the force and the object on which the force is exerted. Newton’s Third Law tells us that when object A exerts a force Fon object B, object B will exert a force –Fon object A. When you push a box forward, you also feel the box pushing back on your hand. If Newton’s Third Law did not exist, your hand would feel nothing as it pushed on the box, because there would be no reaction force acting on it.  Anyone who has ever played around on skates knows that when you push forward on the wall of a skating rink, you recoil backward.\n\n\n  Newton’s Third Law tells us that the force that the skater exerts on the wall, , is exactly equal in magnitude and opposite in direction to the force that the wall exerts on the skater, . The harder the skater pushes on the wall, the harder the wall will push back, sending the skater sliding backward.  Newton’s Third Law at Work  Here are three other examples of Newton’s Third Law at work, variations of which often pop up on SAT II Physics:\n\n  You push down with your hand on a desk, and the desk pushes upward with a force equal in magnitude to your push.A brick is in free fall. The brick pulls the Earth upward with the same force that the Earth pulls the brick downward.When you walk, your feet push the Earth backward. In response, the Earth pushes your feet forward, which is the force that moves you on your way.\n\n  The second example may seem odd: the Earth doesn’t move upward when you drop a brick. But recall Newton’s Second Law: the acceleration of an object is inversely proportional to its mass (a = F/m). The Earth is about 1024 times as massive as a brick, so the brick’s downward acceleration of –9.8 m/s2 is about 1024 times as great as the Earth’s upward acceleration. The brick exerts a force on the Earth, but the effect of that force is insignificant.\n\n\n\n上一篇:上一篇:SAT物理练习:What Are Forces", "pred_label": "__label__1", "pred_score_pos": 0.8618298768997192} {"content": "You Spin Me Right Round: Stellar Rotation with Asteroseismology\n\n\n\nTitle: Core-Envelope Coupling in Intermediate-Mass Core-Helium Burning Stars\nAuthors: Jamie Tayar et al.\nFirst Author’s Institution: Institute for Astronomy, University of Hawaii\nStatus: Accepted to ApJ\n\nDisclaimer: The author of this astrobite currently works with the first author of today’s paper, but was not involved in the presented work. \n\nAll stars in nature rotate, including our own. However, stellar rotation over a star’s lifetime remains poorly understood. This has a profound impact on the accuracy of stellar models, which are our primary source for understanding the interiors and evolution of stars.\n\nToday’s paper focuses on internal rotation mechanisms; specifically, how a star’s core rotates with respect to its surface. Understanding stellar core rotation can teach us a ton about internal stellar physics and long-term angular momentum transport within a star’s interior.\n\nstellar oscillations\n\nAsteroseismology uses different oscillation modes of a star to probe its internal structure and properties. [Tosaka]\n\nA Problem of (Astero)Seismic Proportions\n\nLike many outstanding problems in astronomy, this problem can be solved by obtaining more data. How do we get more data on the internal core rotation rates of stars? Through asteroseismology! By studying stellar pulsations, we can infer information about a star’s interior.\n\nThe authors of today’s paper focused on evolved intermediate-mass stars, or stars between two and eight times the mass of the Sun. These stars fall in the transition region between low- and high-mass stars, as their name implies. Like their more massive counterparts, these stars have a convective core and rotate rapidly during the main sequence — the phase of evolution where stars burn hydrogen into helium. However, like low-mass stars, intermediate-mass stars become cool red giants as they evolve. It turns out red giant stars also pulsate like the Sun, a low-mass star. By comparing how red giant stars oscillate to how the Sun oscillates, we can measure stellar parameters for red giants, such as their mass and radius.\n\nThe Core Tells All\n\nWe can additionally infer core rotation periods for red giant stars using asteroseismology, making them the perfect candidates for this study. In red giant stars, waves that propagate near the stellar core interfere with waves that propagate on the surface. By measuring surface pulsations, we can determine how the core and surface waves interact. From there, we can infer details about the stellar core, such as rotation.\n\ncore rotation period\n\nFigure 1: Stellar cores spin more slowly as intermediate-mass stars evolve, as shown by this comparison between core rotation period and surface gravity. [Tayar et al. 2019]\n\nAfter measuring the core rotation periods for the stars in this sample via asteroseismology using data from the Kepler Space Telescope, the authors compared their rotation periods with several other stellar parameters and analyzed how stars with these measured core rotation periods should evolve over time. Figure 1 shows a correlation between measured core rotation periods and surface gravity, which decreases as stars of the same mass evolve. This trend with surface gravity indicates that as these stars evolve, their cores rotate more slowly. The authors also compared their measured core rotation periods with stellar mass and metallicity but found no obvious trends.\n\nSeveral of the stars in the sample also had surface rotation periods measured by a previous study. This comparison is shown in the left panel of Figure 2. This comparison suggests that as stars decrease in surface gravity (evolve), the ratio between their core rotation period and measured surface rotation period gets closer to 1 (i.e. the surface and core rotation periods become more similar as a star evolves), indicating that the stellar core can become recoupled with the surface as time goes on. The authors, however, exercise caution with such a result. When they predict surface rotation periods with stellar models, that obvious trend disappears (right panel of Figure 2) which shows that there may be a bias when selecting stars with measured surface rotation periods.\n\nsurface rotation periods\n\nFigure 2: Surface rotation periods measured from starspot modulation show a trend when compared to core rotation periods and surface gravity (left) while surface rotation determined by models does not (right). [Tayar et al. 2019]\n\nEvolving Stellar Astronomy\n\nThe results of this study have several implications for our understanding of stellar evolution. The evolution of core rotation periods over time suggests angular momentum transport occurs between the core of the star and the surrounding envelope. The comparison with surface rotation periods also shows some evidence for core-surface recoupling as these stars evolve. This study provides insight into internal stellar rotation that can be used to improve current stellar models and provides a new jumping off point for future work.\n\nAbout the author, Ellis Avallone:\n", "pred_label": "__label__1", "pred_score_pos": 0.9999540448188782} {"content": "Part 2\n\nCan You Benefit from Materialism & Spirituality?\n\nClick here to read Part 1\n\nMaterialist scientists propose that impotent, dependent, ignorant phenomena are, as causes, responsible for the existence of beings and things.\n\nIn so doing, they must necessarily believe that those causes possess the absolute, infinite power and knowledge needed to bring the whole of reality into being.\n\nThe latest discoveries of modem science, affirming the interconnected unity and wholeness of the universe, deny the validity of all the explanations put forward by materialistic science.\n\nThey demonstrate that the concept of causality is not by any means the corollary of ‘objective’, scientific investigation. It is no more than a hypothesis which looks increasingly irrational and nonsensical.\n\nThere is still a widespread conviction that science can do without the concept of a Creator. Again, this may have been plausible in classical physics, but in the light of the discoveries in modern physics it isn’t.\n\nConsider, for example, the idea that the universe began with a big bang. The idea is something of a paradox.\n\nOf the four forces of nature, only gravity acts systematically on a cosmic scale, and in our experience gravity is an attractive or ‘pulling’ force.\n\nCan You Benefit from Materialism & Spirituality? - About Islam\n\nBut the explosion which marked the creation of the universe required a very powerful contrary, or ‘pushing’, force to initiate the path of expansion which continues to this day.\n\nIt is puzzling that the expansion is countered by the force of gravity which is contracting, not expanding. Careful measurements show that the rate of expansion has been ‘fine- tuned’ to fall on an edge between two catastrophes: a little slower, and the cosmos would collapse, a little faster and the cosmic material would have completely dispersed long ago.\n\nNow; the materialist scientists grasp that such a precisely arranged explosion requires infinite power and knowledge that cannot be attributed to causes.\n\nBut in their misguided commitment to causality they deny the act of creation and are compelled to say, ‘It just happened; it must be accepted as an initial condition.’\n\nSome initial condition! And the rate of expansion is only one of countless cosmic miracles which, we may be sure, remain to be understood and described.\n\nBut in their misguidance, the scientists make believe that miracles of Absolute Power are ‘remarkable’ coincidences, and attribute the universe to a random ‘accident’.\n\nThus, one of the fundamental theories of modern science is totally compatible with the concept of the Absolute Creator. For the purpose of our argument here, the vital point is that that theory is most definitely not compatible with causality .Thus, the need for God, the Causer of causes, enters science in a fundamental way.\n\nIn classical physics, it was believed that a measurement performed in one place can’t instantaneously affect a particle in another, very distant, place.\n\nThe basis for this belief is that interactions between systems tend to decline with distance.\n\nFor, according to the explanation by causality a cause must be in the immediate vicinity of its effect.\n\nThat two particles several metres, let alone light years, apart, influence each other’s position and motion, should therefore he inconceivable.\n\nHowever, quantum mechanics predicts a great degree of correlation between two such particles, as though they were co-operating by telepathy.\n\nNow; how is it possible to explain this ‘remarkable’ degree of co-operation between different parts of the universe that have never been in contact with each other without mentioning their Creator?\n\nHow do they achieve this miracle Divine Unity is the only reasonable, coherent and acceptable, indeed necessary, explanation.\n\nTo the materialists, this situation is paradoxical because it cannot be explained by causality. But to the believer in God, it is a beautiful aspect of His Unity affirming a universal coherence and all-encompassing principles that run throughout the cosmos.\n\nWhen we break the vicious chains of cause and effect explanations, the meaningless world of materialism gives way to a world illumined with meaning and purpose.\n\nThe universe becomes like a vast book addressing man and making known its Author so that its readers can take lessons and continually increase in knowledge of their Maker, and deepen their conviction about the fundamentals of faith.\n\nEverything is full of art and is being constantly renewed, and, like the effect, the cause of each thing is also created. For each thing to exist there is need for infinite power and knowledge.\n\nThus, there must exist One of Absolute Power and Knowledge who directly creates the cause and the effect together.\n\nAll causes and effects demonstrate the Attributes of their Maker, proclaiming the Divine Power and Perfection through their impotence and limitations, all declare: ‘There is no god but God’. Just as the universe points to this truth of Divine Unity, so too it is taught by the Owner of the universe in the sacred Books He has revealed.\n\nThe phrase, ‘There is no god but God’, is the fundamental of revelation and it is confirmed by the testimony of all existents, It is the key to the Qur’an, and makes the riddle of the creation of the universe intelligible, a riddle that has reduced materialist science and philosophy to incoherence.\n\nThe path of unity is also the path of revelation. It is the only path that shows man his Master and Owner, and leads him to recognize worship) the One who alone possesses the Absolute Power that can meet the whole range of his needs.\n\nThe Qur’an is the only source that teaches us that the universe and the beings within it don’t bear a meaning limited to themselves but testify to their Maker’s Unity.\n\nCan You Benefit from Materialism & Spirituality? - About Islam\n\nIt teaches what the universe is and what duties it is performing. For this reason, every Muslim should study the universe and affirm that all existents, through their order, mutual relationships and duties, refute the false claims of materialist and atheistic reasoning, refute that they are anything other than the property and creatures of a Single Creator.\n\nEach rejects the false concepts of chance and causality. Each ascribes itself and all other existents to the One Creator. Each is a proof that the Creator has no partners.\n\nThe greatest impediment to man’s search for happiness and the meaning of life is to regard science, the study of the created world, as separate from and irreconcilable with revelation.\n\nIndeed, when His Unity is known and understood correctly, it becomes clear that there is nothing to necessitate that causes have independent efficacy.\n\nSo, it is impossible for them to be partners to the Creator. Then, the Muslim scientist will say through his investigations and discoveries: ‘There is no god but God, alone and without partner’.\n\nThe universe is a document to be used by the believers. Because believing in God is, as the Qur’an informs us, to assent with one’s heart to the Creator with all His Attributes supported by the testimony of the whole universe.\n\nThe true affirmation of God’s Unity is a judgement, a confirmation, an assent and acceptance that find the Owner of all things present with all things. It finds in all things a path leading to Him. It doesn’t see anything as an obstacle to His presence. There is no dichotomy between true science and revelation.\n\nRather, true progress in science (with happiness for mankind) can only be achieved in the way of the Qur’an. All scientific discoveries and technological advances are merely the uncovering of the way the universe is created.\n\nWhen the universe is seen as a vast and meaningful unified book describing the beings in it as signs of their Creator, all these discoveries and advances reinforce belief rather than inculcating doubt and bewilderment.\n\nThe greatest impediment to man’s search for happiness and the meaning of life is to regard science, the study of the created world, as separate from and irreconcilable with revelation, the Word of the Creator. But as man learns to heed the universe and his senses, rather than the materialist scientists, he will wake up to the contradictions of their scientific reasoning.\n\nFaced, in the creation, with so much of beauty, utility, subtlety complexity’s awesomeness, purposefulness, attempts to explain creation by causality are increasingly recognized as unproductive.\n\nPeople then feel the need for and the importance of, the true science and knowledge which can yield knowledge of God and belief in Him. Your Glory is infinite! We have no knowledge save what You have granted us, You are the All-Knowing, the All-Wise.\n\nThis article is from Health & Science’s archive and was originally published at an earlier date.\n\nFirst published in The Fountain Magazine: – Issue number 8", "pred_label": "__label__1", "pred_score_pos": 0.9792459011077881} {"content": "A four-member team of videographers from FEMA headquarters in Washington, D.C. is on the CDP campus this week, collecting footage of various aspects of the Center’s advanced responder training and interviewing CDP staff, instructors and students.\n\nThe team is filming segments of three hazardous materials, two healthcare and two law enforcement courses at various locations, including the Advanced Responder Training Complex, COBRA (Chemical, Ordnance, Biological and Radiological) Training Facility, and the Noble (Hospital) Training Facility. \n\nThe team plans to produce at least one video targeted at hazardous materials specialists, one video targeted at healthcare professionals, and one video targeted at those in the law enforcement community, in addition to a comprehensive promotional video about the CDP.  It will also produce a number of smaller, 10-15 second video clips of things they film.\n\nThe promotional videos and clips will be posted on the Center’s web and social media sites. FEMA headquarters and CDP staff will also use them in presentations to various audiences. \n\nThe first videos should be available in early January.", "pred_label": "__label__1", "pred_score_pos": 0.7424389123916626} {"content": "Working in Extreme Cold\n\nAs anyone who's lived or worked in it knows, a cold environment just makes everything harder. You fumble with numb fingers under bulky gloves, slip on the ice, shiver at the sight of your breath hitting the icy air. Working under extremely cold conditions, however, is not only inconvenient and uncomfortable; if you don't take some basic precautions, it can pose serious threats to your health. What's more, the symptoms of cold-related ailments are easy to overlook -- even though they can cause irreversible tissue damage and in extreme cases even kill. So whether you're working in the fishing industry, laboring outdoors in the winter, or working in refrigerated warehouses, you should be aware of the health risks that come with your job -- and how to protect yourself against them.\n\nHow cold is too cold?\n\nNo matter what the temperature is around your body, it continuously strives to maintain its normal internal temperature of 98.6. (A drop of just a few degrees can be life-threatening.) For most of us, that means we're most comfortable working in an environment of about 73 degrees (with 45 percent humidity). If your work is extremely labor-intensive (and thus heat-generating), however, the ideal working temperature could be as low as 55 degrees -- without special clothing to ward off the cold.\n\nWhen you're calculating safety, don't forget to include the wind chill factor -- a reading that combines air temperature with wind velocity. On a 40-degree day with 35-mile-per-hour winds, for example, the temperature your exposed skin is experiencing is not 40 degrees: it's 11 degrees.\n\nWhat happens to the body under extreme cold conditions?\n\nWhile the body has some very effective mechanisms to adjust to extreme heat conditions, it has very few tricks to deal with the cold. Its first line of defense is to constrict blood vessels and limit blood flow to the extremities (primarily hands and feet) and to the skin's surface. That way, less body heat from the blood is lost through the skin into the environment. The body's only other defense against the cold is shivering, which generates heat by increasing the body's metabolism.\n\nWhat are the health problems associated with working in an extremely cold environment?\n\nFrostbite. This occurs when your skin and sometimes muscle tissue freeze due to exposure. It usually affects the hands and feet -- which your body has kept colder in order to save heat in the rest of the body -- or the exposed skin on ears, cheeks and noses. One is at risk for frostbite at temperatures below 30 degrees, although wind chill effects can also cause frostbite at above-freezing temperatures. The tissue damage can be irreversible, and in rare cases amputation is sometimes necessary. Early symptoms of frostbite include a tingling, stinging, or aching feeling in exposed area followed by numbness. If the victim is suffering from hypothermia (see below), treat hypothermia first. Then treat frostbite by covering affected areas with dry, sterile gauze or soft, clean cloth bandages. Do not massage the area; it can worsen the injury. Severe cases require hospitalization.\n\nHypothermia. In this potentially fatal condition, the body temperature falls, impairing normal muscular and brain functions. Initial symptoms -- which occur if the body temperature drops to 95 degrees from the normal 98.6 -- include shivering, the inability to perform complex motor functions, mild confusion, and lethargy. If body temperature continues to fall, hypothermia becomes more severe until victims cannot perform even simple motor functions. They may also fall into a semi-conscious state, exhibiting slurred speech and irrational behavior; campers caught in a blizzard and suffering from hypothermia, for example, have been known to tear off their clothes and run in the snow. The most severe state of hypothermia occurs when body temperature falls to 90 degrees. This causes the body to move into a state of hibernation: the heart rate and breathing slow and the victim may lose consciousness; full heart failure can occur.\n\nNaturally, victims need immediate medical treatment. If you can't get a hypothermia victim to the hospital, try conserving her body heat by warming her. Find shelter if possible, remove the worker's wet clothing, add layers of dry clothing, and cover her with blankets. Do not apply direct heat: Do not use hot water, a heating pad, or a heat lamp to warm the victim. If medical treatment will be delayed, try warming the victim's body with your own. If possible, use warm compresses on the neck, chest, and groin. Do not warm arms and legs -- this forces cold blood back toward the heart, lungs, and brain, which can be fatal. Give the victims liquids as well (but no alcohol or caffeine).\n\nTrench foot. Common among fisherman, this condition is caused by continuous exposure to wet, cold environments, especially when the feet are immersed in water. Spasms in the blood vessels stop the blood's circulation to the foot, which can cause muscular damage. Symptoms include a tingling or itching sensation, burning, pain, swelling, and sometimes blisters. Move the worker to a warm, dry area, then wash and dry the affected skin. Rewarm the foot and elevate it slightly, and get medical help as soon as possible.\n\nWhat can I do to protect myself?\n\nWear protective clothing. The first line of protection against the cold is dressing correctly. You should wear at least three layers of clothing, beginning with an inner layer of cotton or synthetic weave to allow your skin to breathe. The middle layer should be a fabric like wool or synthetic fabric (such as Qualofil or Pile) to absorb sweat and retain insulation (down is also a good lightweight insulator but useless if it gets wet). The third, outer layer -- a fabric like Gore-Tex or nylon -- should break the wind and allow some ventilation. Special care should be taken to properly cover the head (where 40 percent of body heat can be lost), as well as the feet, hands and face, which are most prone to frostbite. Make sure your foot and hand gear is thoroughly waterproof. Also, keep a change of clothes at work in case your clothes get wet.\n\nGet your engineers involved. Your workplace should reduce exposure to cold by installing on-site heating devices, erecting shields or walls, and putting thermal insulating covers on equipment handles when temperatures are below 30 degrees.\n\nAdopt safe work practices. Your employer should allow you time to adjust to new cold conditions before requiring you to work at full capacity.\n\nIn addition:\n\nReduce exposure. Try to reduce the time you're required to work in the cold as much as possible (by working during the warmest hours of the day, for example).\n\nGet advice. Talk with a safety specialist about the potential for accidents while wearing thick gloves or bulky clothing.\n\nTake breaks. Work at your own pace and take more frequent breaks if needed.\n\nLiquids help. Ask your employer to provide liquids to keep you from dehydrating, if that isn't already being done.\n\nBuddy system. Implement a buddy system under which you and other employees can look after each other during outdoor work.\n\nWarning signs. Most importantly, ask for on-the-job training about the risks of working in extreme cold environments and how to recognize symptoms of cold-related ailments.\n\nFurther Resources\n\nNational Institute for Occupational Safety and Health (NIOSH)\n\nOccupational Safety and Health Administration (OSHA)\n\n\nMayo Clinic. Hypothermia: First aid. January 2008.\n\nOSHA Fact Sheets. Protecting workers in cold environments. U.S. Department of Labor. December 22, 1998. USDL 98-55.\n\nAmerican Heart Association. Cold Weather: AHA Recommendations: 2000.\n\nLast Updated:\n", "pred_label": "__label__1", "pred_score_pos": 0.7672924995422363} {"content": "Elebits: The Adventures of Kai and Zero is an action video game developed and published by Konami and released for the Nintendo DS in 2008. It is the sequel to Elebits.\n\n\nKai and Zero find a were exploring behind the hills of town one day. They find an old abandoned house so they decide to explore it. Inside they find a bus, The bus can travel to different dimentions.\n", "pred_label": "__label__1", "pred_score_pos": 0.9999287128448486} {"content": "There are many terms in currency around the education world which display ambiguity of meaning. This is an attempt to define a vocabulary which clarifies at least what is meant when we use a word or phrase of jargon in the context of engineering education.  The following list is alphabetical: no further significance is intended by the order of terms.\n\n\nAssessed work is often given a grade, which might be numerical (0 to 10 or 0 to 100), letter (A to F, for example) or binary (pass/fail).\n\ngrade point average\n\nIt is common to average grades (inevitably converted to numerical grades) over a year or whole programme.  This results in a grade point average (GPA) often in the range 0 to 4 or 0 to 5. Despite its ubiquity the GPA is fundamentally flawed if it combines different types of grades, as is likely in engineering, where a competence might be graded pass/fail whereas a lectured module might be numerically graded. See also HEAR below, and consider the potential of a portfolio.", "pred_label": "__label__1", "pred_score_pos": 0.517922043800354} {"content": "Feb 06, 2020 20:27 Asia/Tehran [Updated: Feb 14, 2020 10:41 Asia/Tehran]\n\nBushehr (IP): The Head of Iran's Judiciary Ebrahim Raisi said elections are the most important issue in the country, and all those who care about the system, the state, the dignity of the nation and the revolution must fulfill their mission in this field.\n\nIran Press/Iran news: Seyyed Ebrahim Raisi addressed people of Bushehr during his provincial tour to the southern province, saying: \"Whoever, with or without any motivation, questions the election process for the sake of not serving their interests or seeking to attract the attention of others, whether or not they want to undermine the election process, weakens the electoral process and would be along the enemy's will.\"\n\n\"The enemy's strategy is to insecure the nation's great fortunes,\" he added.\n\nIran's Judiciary Head went on to say that empowering the country comes from an efficient and powerful system, and the formation of a strong parliament is an important foundation for a strong country.\n\nEbrahim Raisi referred to the 1000- km- coastline of Bushehr province, emphasizing: \"50% of the GDP of some countries comes from the sea. If the maritime economy is activated, this sector's valuable reserves can be used to solve the country's problems; including production, reducing unemployment, and job creation.\"\n\n\"The more we are empowered in this sector, the more frustrated the enemy will be,\" he said.\n\nReisi, referring to the Islamic Revolution leader's view of the stability and resistance of the Bushehr people against the British troops and the invaders, saying: \"The province has distinguished figures such as Rais-Ali Delvari, and Abd al-Husayn Lari who helped people stand against the aggression vigorously.\"\n\nIran's Judiciary Head underlined that martyrs, Islamic and national culture, and strong presence of the Iranian nation in various fields have pushed the enemy back. We have seen an example of this during the funeral procession of the martyred Lieutenant-General Qasem Soleimani.\n\nHe emphasized that martyrs are the true intellectuals of society: \"The true intellectual is one who recognizes society and its real need and as a real observer trying to solve problems, not one who pushes society toward Western culture and model.\"\n\n\nRead More:\n\nJudiciary Chief arrives in Yazd\n\nIran's Judiciary chief urges supporting production boom with funds\n\nFollow Iran Press on Twitter", "pred_label": "__label__1", "pred_score_pos": 0.7233915328979492} {"content": "Indie game storeFree gamesFun gamesHorror games\nGame developmentAssetsComics\n\nLog for #197\n\nThere are no buttons bound by default. It does specify that \"buttona\" is required to be bound to create a custom controller mapping.\n\nThank you. I created a new build (not on, check ). There could be a few reasons that resulted in that problem and in this build they should be addressed properly. (manifest version, optional/mandatory setup, added a few more log statements to check if everything works fine). If you could grab it and let me know if it helps.\n\nThere still aren't any buttons bound. What did change is that \"buttona\" is no longer required to be bound.\n\nI feel kinda stupid for not noticing until now but it seems when I save custom controller bindings that they don't get saved by Steam. I tried to create some custom bindings for Beat Saber and when I saves them it says that I am using custom binding in the controller menu. When I try to  save custom bindings for tea.exe nothing appears in the controller menu just like when there is nothing bound at all. I also tested this for v.0.3.12 and the bindings are also not getting saved.\n\nLog for #198pre\n\nI will be fixing it on Monday. When I'll be back home. I will first check WMR and Vive and maybe something turns out about Index.\n\nThere is now an updated . It should properly bind Index controller now.\n\nSame issue with WMR controllers, tested with, I can bind 'buttona', 'buttonb', 'buttontrigger', 'trigger', etc. to various inputs but without knowing what those SteamVR2.0 actions specifically do in the game I was unable to click into anything on the main menu in game.\n\nThank you for the info. I guess I'll get back to this when I get home from holidays. I have WMR but not here. I just took a laptop and Quest. I will first check WMR and Vive and then maybe I find something on the way for Index. It's no use in guessing.", "pred_label": "__label__1", "pred_score_pos": 0.6393355131149292} {"content": "“Tragically, we all know, now, of someone who has died from the flu vaccine”\n\n\nDoctor Brogan tells us about the Influenza and Polio vaccines and gives us a smack upside the head of common sense.\n\nFrom her article titled ‘A shot never worth taking: The flu vaccine’ we find the following “Deep into my 6th year of researching and investigating the damning science that condemns vaccine efficacy and safety – yes, all of them – I am beginning to turn my attention more to the societal memes and the individual belief systems that protect and perpetuate tragically flawed and unacceptably dangerous collective behaviours.\n\nThe information is OUT THERE. Brilliant scientists, physicians, and researchers without financial ties and agendas have weighed in and presented their concerns about vaccine safety and efficacy, however, the average citizen resists and clings to a hyper-simplified, seemingly “safe” stance.”Well, I’m not against vaccines, I mean, they’ve done a lot. I’m sure there are some risks, but they’re extremely rare.\n\n\nTragically, we all know, now, of someone who has died from the flu vaccine, just this past week. Chandler Webb, a healthy 19 year old, was given a “routine” and “recommended” flu vaccine at his physical, one day before he became violently ill, and one month before he died. He died from vaccine-induced encephalitis, a known risk of this intervention. In addition to feeling remorse for the pain that this family is experiencing, I feel rage for what I believe to be manslaughter. This is a medical intervention, delivered without any regard for its objectively determined lack of efficacy, and its potential to maim and kill healthy adults.\n\n\n\n“Perhaps the most emblematic example of oversimplified benefits and dismissed risks is the darling of vaccine enthusiasts the world over: Polio. An exploration of the true natural history of this dread disease reveals more than iron lungs and crutches cast aside by valiant needles.\n\nAfter the live Salk vaccine paralyzed hundreds of adults and children, strategic redefinition of polio in 1955 eliminated labeling as “poliomyelitis”, all of the cases of acute flaccid paralysis caused by myriad viruses and also toxic exposures such as DDT. In fact, what would have formerly been called polio, transverse myelitis and Guillain-Barre are increasingly common today.\n\nIronically and tragically, the only US cases of confirmed polio since 1973 have been vaccine-associated polio paralysis, prompting the acknowledgement of infectious risks associated with the live vaccine still imposed upon third world citizens. Indeed, In 2012, just when the Global Polio Eradication Initiative claimed ‘mission accomplished’ in India, with no reports of naturally transmitted (wild-type) polio infection in the 2011, over 47,000 cases of polio-like “acute flaccid paralysis” were reported in the same year in children by The National Polio Surveillance Programme (TNPSP) in populations fully immunized with bivalent oral polio vaccine. TNPSP conveniently renamed these cases “non-polio acute flaccid paralysis” to avoid connecting them to the polio vaccines, describing them as “mild cases,” and “…of little consequence,” despite the fact that they were shown to be twice as lethal as naturally transmitted polio”\n\n\nhttps://www.sott.net/article/305035-A-shot-never-worth-taking-The-flu-vaccine (as accessed 29 Nov 2018).\n\n‘Where do Vaccines fit into a Paleo Lifestyle?’ https://kellybroganmd.com/vaccines-fit-paleo-lifestyle/ (as accessed 14 Dec 2018).\n\npixieforest1 on Facebookpixieforest1 on Twitter\n", "pred_label": "__label__1", "pred_score_pos": 0.8782864212989807} {"content": "“Why should I care?” – Learning with a Purpose using Authentic Learning Experiences\n\n“Why should I care?”\n\n\n • In Michigan, 1st and 2nd graders design and maintain a greenhouse to grow vegetables for their annual community farmers’ market.\n • In Ohio, 3rd graders lobby local government to build a public garden as a sanctuary for pollinators.\n • In Texas, middle school students plan and facilitate an edcamp  where students teach peers and adults about their passion topics.\n • In Virginia, high school students advocate for better protections against sex traffickers in the United States.\n\nAuthentic Learning Experiences (ALE) help students connect curriculum with real world meaning. That’s it, in a nutshell. There are many educators who struggle with adapting traditional practices. The ones that do make the changes or tweaks are discovering the depth and extent that learners will commit time and energy towards the authentic tasks that are either provided or are student created and directed. There is a rising number of school districts that are committed to approaches that are based on Authentic Learning Experiences, which are leading to strong examples of systemic success over time. Some examples include:\n\n • Lake Travis ISD, TX\n • Isle of Wight School Division, VA\n\nEach of these school districts have made an institutional-wide commitment to authentic learning experiences that engage and empower students to learn curriculum through job-embedded, aka real world experiences. Some ALE examples include:\n\n1. Field trips at the start of a unit so that students can do on-site research and interviews of experts and staff, such as at zoos (habitats), museums (research), and park waterways (water quality tests).\n2. Publication of student work from essays to videos about community and societal topics that target a specific audience outside of school.\n3. Video conference meetings with experts and professionals from a variety of fields.\n4. Doing work within the context of how an identified profession does similar tasks, such as scientists, authors, engineers, business people, and issue-based non-profits.\n\n\nWhen students experience curriculum through the ALE lens, they can make connections as to how theory looks and feels in practice. Including an authentic audience is critical to the experience. When learners prepare products and presentations for a real target audience like business owners, scientists, government officials, or community members, those experiences carry greater weight and pressure on students for producing quality than turning in work to the teacher or presenting to classmates.\n\nGetting started on this path works best when the school shares a common language for Authentic Learning Experiences. Here are two steps that support successful implementation.\n\nStep One: Use a proven ALE framework\n\nWhile the school districts referenced above have their unique approach to providing authentic learning experiences, they share some common elements.\n\nLevels of the ALE framework\n\nEach of these levels ensures that authentic learning experiences are tied deeply to learning outcomes (Foundation), provides contextual connections to academics with careers (Level 1), and makes the work public to a purposeful audience (Level 2).\n\nFoundation: Significant content is the core of the work.\nThe work starts with the curriculum learning expectations.\n\nLevel 1: Students apply content skills as used by related professions.\nContextual connections of content are made to real world examples for understanding and through applications\n\nLevel 2: Students address an authentic purpose for a community or client need.\nExperience value of skills & concepts through purposeful and meaningful contributions. Make work public!\n\nThe foundation level is essential. However, teachers can create lessons and units that only address Level 1 and achieve the goal of authentic learning experiences. Teachers who strive for Level 2 experiences should find students giving their greatest output to the tasks and learning outcomes. Explore this in more detail in this Edutopia article: Authenticity = Lifelong Learners.\n\nStep Two: Identify the Target Audience through the Purpose\n\nThe best authentic learning experiences has an audience in mind based on a purpose for the work. Problem Solving, Advocacy, and raising Awareness are great places to start as the focus for the learning. Once the purpose is chosen, the best audience can be found who would benefit from the students’ work.\n\nPublication is an important element for having an authentic audience. Regardless of the focus–Problem Solving, Advocacy, or raising awareness–students need to share their findings to someone(s) beyond the school. Learn more about this idea in this Edutopia article: 4 Paths to Engaging Authentic Purpose and Audience.\n\nExplore Additional Resources\n\nHere are resources to support your research for starting or strengthening Authentic Learning Experiences with your students and staff. Each item listed is annotated to help inform your exploration.\n\n\nHenrico 21\n\nLibrary of Ideas that have been teacher tested. Supports global professional skills (GPS) such as collaboration, communication, creativity, and critical thinking.\n\nAuthentic Learning Experiences (ALE)\n\nThis repository provides a deep explanation of ALE, structures, articles, and strategies to build into your development of ALE schoolwide.\n\nFocus Documents by Isle of Wight School Division\n\nExplore these resources by a forward thinking district. Following these documents, staff have successfully grown a systemic approach to Deeper Learning and authentic learning experiences, which have helped students find learning meaningful and purposeful.\n\nVideo Libraries\n\nIsle of Wight School Division: CTE Videos\n\nThese videos offer examples of authentic learning experiences as structured in the systemic work at Isle of Wight School Division in Virginia.\n\nGeneral ALE Playlist\n\nHere is a playlist showing examples of ALE in different schools at different grade levels.\n\nPBL in Action\n\nThis playlist is focused on Project Based Learning. However the examples shared reflect the concepts of authentic learning experiences.\n\nALE Resources List (https://tinyurl.com/ALEResourcesList)  \n\nThis is a shared document that is maintained and updated with more references and strategies to support your planning and implementation of Authentic Learning Experiences.\n\nMaking Differentiation Productive: A Planning Guide\n\nDifferentiation can be challenging and fruitful if done with planful intention. Below is a guide for bring forth more success in your work to meet the needs of ALL learners by ensuring that learning experiences have these elements or components. Post or tweet your questions or ideas to @JMcCarthyEdS\n\nCore Steps for Planning Differentiation\n 1. List the standard(s) or curriculum objective(s)\n 2. For each, unpack the key concept(s) and/or skill(s) to be learned.\n\n What do learners need to know, understand, and/or do?\n 3. How can learners practice and demonstrate growth towards the key concepts and skills?\n\n List artifacts and actions that develop and grow achievement of the key concepts and skills.\n\nWhere Differentiation Happens\n\nContent: Based on the key concepts and skills, how can content be delivered, acted on, and used to show understanding.\n\nProcess: Based on the key concepts and skills, what activities and approaches can learners participate to reflect and make sense for personal growth.\n\nProduct: Based on the key concepts and skills, what are artifacts and actions (such as presentations) that learners could create and/or plan to demonstrate achievement towards mastery.\n\nHow Differentiation Happens\n\nReadiness: For each key concept and/or skill:\n 1. Identify the components that make up a concept and execution of a skill.\n\n 2. Analyze 2-3 ways to teach and coach the components at different levels of complexity. Such as:\n 1. Learners lacking major gaps in understanding\n 2. Learners lacking minor gaps in understanding, yet can keep pace with the progression.\n 3. Learners whose understanding exceeds the required level of understanding.\n 3. Evaluate the accuracy of step 2, ie does each approach actually support development of the concept and/or skill.\n\n 4. Create an activity or task within one of the following structures:\n 1. Tiered: All students working on the same concept or skill. Learners are grouped by common gaps in understanding and those who exceed the mastery level. Similar work at a complexity level that accommodates each group of learners.\n 2. Individualized – independent tasks: Each learner works on different tasks that align with their specific needs, such as gaps in understanding, or missing fundamental skills. The work is different for most students as also is the complexity level. The learning objective may be different for the learners, but the targets are building blocks to common overarching objective(s).\n 3. Individualized – common tasks: All learners work within the same tasks. However, the tasks are made up of sub-tasks that range in targeting specific components of concepts and/or skills. Learners either choose or are assigned to specific tasks within the options. Some learners will share both the same and different tasks. Example: Think Tac Toe and Readiness Centers or Stations.\n\nInterests: Get to know students and what they like to spend time doing.\n 1. Prepare 3-4 options for learning and/or practicing the skills and/or concepts.\n 2. Communicate the criteria for assessment of skills and/or concepts. Challenge learners to create the product or artifact that demonstrates the assessment.\n 3. Design activities and stations that have multiple options to choose from.\n 4. Enable students to complete tasks based on their personal interests.\n 5. Co-design with the students the activities.\n 6. Create inquiry-based learning activities and experiences.\n 7. Create authentic learning experiences.\n\nLearning Preferences: \n 1. Collect data about the various ways that learners prefer to process understanding and demonstrate skills.\n 2. Provide learning experiences that incorporate a variety of learning experiences.\n 3. Allow students to design artifacts or complete work based on their voice.\n\nStudent Voice: Making Learning Happen\n\nby John McCarthy, EdS – Follow on Twitter\n\nWhen it comes to learning, involving the learner is important. Reflect on how you learn best. Having a say so as to align or customize the experiences is something that most of us prefer. Why would our students feel any different. These resources below are part of a conference session about steps towards empowering student voice in the classroom. There are some simple steps to follow:\n\n 1. Teachers give up sole control.\n Share decision-making with students. When we strive to control what others do, the results rarely meet expectations, if we want students to think and act for themselves. We don’t want robots at the end of the day. We want thinkers. And thinkers will want a say in what they do and how they do it, or they will go underground.\n 2. Learners CAN rise to the occasion if given space to act\n When given free will to choose and act, students do need guidance on how to use this shared power. It’s a responsibility for the giver (teacher) and the receiver (students). Students are enculturated to sit quietly and with minimal movement. They are told what to do and when to do it. So when we give students freedom from these shackles, they either resist, wanting what has been normal and known. Or they go crazy, behaving in ways that are not as productive as we’d like.\n\n So, teach students how to act and think when given this responsibility. Coach them.\n\nLearn more about Student Voice from my Supporting References listed at the bottom. Or follow and contact me on Twitter and InstagramSubscribe to my Youtube channel for new content and researched examples of best practices in learning and teaching.\n\n • Need to Know process (reference)\n This process gives students control of their learning by allowing them to list questions about the lesson and unit. They decide when a question is fully answered. The basic structure is similar to the K-W-L strategy, only more student-led.\n\n • Student-Generated Norms (reference)\n Students create the norms for how they and the teacher can support everyone in their learning. Here is an example of Norm development steps and of Norms:\n\n • Critique Protocols (reference)\n • Researchers\n Have students in teams collect and organize info that is normally included in a lecture about core facts. The teams then organize the information, and then share out. Teacher fills in gaps in understanding after each team has reported. \n\n • Student-Designed products\n • Teacher gives criteria for evaluation. Keep guidelines to just the learning that students must demonstrate.\n • Let students propose products or performances that meet the evaluation criteria.\n • The teacher either approves the proposal or sends back students to develop a new proposal. \n • Have 1-2 options that students can choose if they do not come up with an approved proposal within the scheduled deadline.\n\n • Project Based Learning & Authentic Learning Experiences\n References: onetwo\n Empower students with the voice to make a difference in the community. Authentic Learning Experiences and Project Based Learning are excellent ways to bring context to academics to students’ lives.\n\n • Let students determine learning focus and align objectives to their work. \n Give students opportunities to explore their own learning, based on their interests. They can apply academic skills to ideas that they are passionate about. Here are 2 youtube playlists to give examples. Subscribe to my Youtube channel for new content and researched examples of best practices in learning and teaching.\n\n\nUseful References for More Resource Ideas\n\nLearning Supported by Digital Tools: MOCA\n\n\nLearning through Technology Guide: MOCA\n\n\n • Managed Learning\n • Orchestrated Learning\n • Collaborative Learning\n • Authentic Learning\n\nManaged Learning\n\n\nOrchestrated Learning\n\n\n\nCollaborative Learning\n\n\n\nAuthentic Learning\n\n\n\nHere are some of tools to explore:\n\n • Wikis: WikiDot, Google Sites, PBWorks EduHub\n • Classroom Platforms: Schoology, Google Classroom, Blackboard CourseSites\n • Podcasts: iTunes and Spotify\n • Live Stream presentations: Youtube or Twitter\n\n\nTime for Change is Now\n\n\nEmpowering Students with Strong Collaboration Skills\n\nWhat really is Collaboration?\n\nCollaboration is an important 21st Century skill that is of critical need for our students as the future participants of industry, entrepreneurial opportunities, education, and government. Collaboration is a valuable commodity that in its appearance seems more art than science, when the opposite is just as true.\n\nHere are three definitions of Collaboration:\n\n[T]o work jointly with others or together especially in an intellectual endeavor” – Merriam-Webster\n\nThe action of working with someone to produce something.” – Oxford Living Dictionary\n\nConflict resolution strategy that uses both assertiveness and cooperation to seek solutions advantageous to all parties.” – Business Dictionary\n\n\nPartnership for 21st Century Learning, an organization that addresses a variety of areas, including Education, defines Collaboration as:\n\n • Demonstrate ability to work effectively and respectfully with diverse teams\n\nWorking together for a common goal can be more challenging than it would appear. A common example is group work. One or two team members  do the work while other teammates are either not included in doing the interesting tasks; or they choose to stand aside, content to let the others do all the work, before showing up to share in the credit.\n\nThese occurrences are not unique to student teams. There are many stories where adults felt excluded from doing the interesting work, or having a voice in the decisions. There are also people who take credit for the work done by others. One solution is to teach the Science of Collaboration to students so that they become skillful users by the time they enter colleges and careers.\n\nScience of Collaboration\n\nOften collaboration is presented as something that we just do. Put students into groups. Some how, sometimes magically, they work together. If there are no arguments, everyone takes on tasks, and work is completed, collaboration must be going well. This is not collaboration. It’s parallel play.\n\nCollaboration is at its best when decisions are not easily made because there are a diversity of ideas. Everyone wants their voice to be heard. People are effective cat herders. Functioning in this environment and coming out with ideas larger than the group and decisions are made with complete support and understanding by the team requires explicit tools and skills for effective collaboration.\n\nCollaboration, as with all 21st Century Skills, should be taught, coached, and assessed with the same thoughtful considerations as done with content of an academic course. Putting students into teams an expecting effective and thoughtful collaboration is like rolling a ball to new recruits and expecting them to play football or basketball at a high level of skill and strategic thinking. Not likely meeting expectations.\n\n1st Steps for Classroom/School Culture of Collaboration\n\nThe methods and decisions for creating a Collaborative Culture in a classroom, school, and organization are many, and difficult. One major obstacle is building buy-in for a common understanding. Before implementing strategies that support collaboration, a common path must be chosen and followed. Here are three practical steps towards moving in a common and collaborative direction =>\n\nStep One: Establish a working definition\n\nTake time to research the purpose and value of Collaboration. Explore different definitions, such as from the Partnership for 21st Century Learning, and then adopt or craft one with all relevant stakeholders.\n\nStep Two: Adopt a guiding structure and/or guide that defines quality of practice\n\nThere are resources to be found, evaluated, and used to design how a culture of Collaboration should look like in a classroom or school.\n\n • Partnership for 21st Century Learning (P21)\n Find many resources here from blog articles, such as this one, to rubrics. There is much to explore and consider for use in designing an approach to collaboration:\n FrameworkBlog PostsResources: 21st Century Skills Map – PDF doc\n • Henrico TIP Chart (PDF –Download)\n Henrico County Public Schools created a framework guide for how they teach, coach, and assess effective use of Collaboration and other 21st Century Skills. The TIP Chart is used by teachers to reflect on how they are teaching and coaching Collaboration, and how students should be applying the skills as part of the learning experiences.\n The progression from left to right moves from teacher directed to student-led. Because of the depth in application of collaboration, the learning cycle from Developing to Target is continuous.\n\nStep Three: Design a Coaching Chart that defines observable behaviors\n\nCoaching Collaboration is a Three-Way street. Growth occurs based on feedback from the teacher, peers, and self-reflection. Using a rubric might help by describing what Collaboration looks like and does not look like. This approach can lead to assessment of the practice. I’ve noticed from experiences with many schools that teachers and students struggle with how best to use rubrics without other supports.\n\nCoaching Charts is such a resource that supports skill development with concrete and observable descriptors of behaviors. Here is one example from a school in Michigan:\n\nThe Coaching Chart can be used by students for independent self-reflection, and for supporting and giving feedback to their peers. Teachers use the chart to coach students on how to use the chart as a support tool for the team, and to give feedback on how a student is progressing. Once in place, strategies that depend on Collaboration can be monitored and evaluated for success by the teacher and students.\n\n\nThere are many strategies that rely on effective use of Collaboration skills. Defining and building a framework for Collaboration, and implementing a guide and a Coaching Chart all create a context for students to work with others that intentionally teach, coach, and assess Collaboration.\n\nBelow is a list of various strategies and tools that when used within this intentional context, the learning experiences can be deeper and more productive. Students are no longer going through the motions of an activity. They are empowered to monitor and support the success of the learning experiences.\n\n • Communication for Collaboration\n • Elbow Partners\n This tried and true activity is a quick way to get students into discussion pairs, maximizing time on task. If students sit in pairs or quads, they can conveniently turn to their neighbor who is their designated partner. There can also be a “Left” and “Right” Elbow partner with quads.\n • Mediation Process\n This 4-step guide teaches and supports conflict resolution by students. Teachers do not intervene until the 3rd step. Read this article for details.\n • Talk Moves\n Provide learners with this list of talking prompts that address a variety of conversation responses. Some areas include framing a respectful disagreement or agreement to asking clarifying and probing questions. Explore the options in more details in this article.\n • Feedback Prompts\n • “Be Constructive, Specific, and Kind”\n This is how critiques of work products should happen. Yet without guidance, the feedback can turn into an open dumping of disconnected ideas. The receiver can become overwhelmed and be unable to hear anything useful. Clear starter stems, as seen with Talk Moves, helps set the frame for the feedback. The following starter statements teach how to give feedback that is constructive, specific, and kind.\n\n • I noticed… (or I like…)\n • I wonder…\n • What if…\n • Reading for Understanding Protocols\n • Say Something\n This reading protocol is a structured conversation for unpacking understanding of reading assignments. Learners dig into passages to share their thinking about the content.\n • Deeper Thinking/Reflection\n • Pause Time and Think Time\n Give learners time to collect and organized their thoughts before answering questions or sharing ideas in small groups and whole class. Explore this article for ideas: Extending the Silence.\n • Chalk Talk – Example OneTwo\n Use this silent activity for learners to explore their thinking along with others. The experience enhances awareness of ideas by others. The silent task of posting and responding to posted comments and questions promotes every voice to be heard.\n\nFor a more comprehensive list with details on strategies and tools,  go to this resource section on Collaboration.\n\nPBL Resources to Build and Sharpen Practice\n\nI was asked recently for some recommendations for books and articles to read about Project Based Learning. Sharing the list, I thought it would be beneficial to share the same list to everyone. This is not an exhaustive list. The intent is to provide one to give a range of access from those just starting out to others who want to deepen their understanding of PBL. If you have recommendations to add, please tweet them to me @JMcCarthyEdS or post in the comments below. Also, find many more PBL and ALE resources on this site as well.\n\nBonus resource for PBL Management: Extending the Silence\n\nResources on my website: http://openingpaths.org/blog/pbl-guide/\nBelow is a sneak peak of just some of what you’ll find:\n\n Also, for deep support of Differentiation, check out the book and companion site for So All Can Learn: A Practical Guide to Differentiation.\n\nTalk Moves: Students Learn to Own Learning Conversations\n\n\nTalk Moves: Students Learn to Own Learning Conversations\n\n\n\n\n\n\n\nPresentations for AdvancED 2017-18\n\nJohn McCarthy, EdS – follow on Twitter: @JMcCarthyEdS\n\nView resources from book: So All Can Learn: A Practical Guide to Differentiation\n\nPlease explore the resources from my sessions for AdvancED at their international conferences. Please contact me if you have any questions or want to share ideas.\n\nManaging Innovative Authentic Learning Experiences\n\nFollow on Twitter @JMcCarthyEdS and subscribe to this website and the Youtube Channel for access to the latest in instructional design and developing and empowering Student Voice.\n\n\nPlanning and implementing innovative learning experiences at the unit design level can feel like a daunting task. If you’re reading this then I applaud your courage and growth mindset approach to “figure it out” so that learner interest stays at the center of all decisions. There are many innovative practices to implement such as Authentic Learning Experiences, Project Based Learning, Deeper Learning, and Design Thinking. Including each management component will support these innovative practices.\n\nYet a traditional unit design can be transformed, by parts, through using the management components listed below. Go slow to become smooth in these skills. Include some components, and then add to them unit by unit. The results will be students having opportunities to actively engage in the learning experiences, with greater access to curriculum complexity. Get comfortable with these management components so that students can experience engaging and substantive experiences.\n\nManagement Components\n\n1. Driving Question\nA DQ or Challenge statement is at the heart of an effective unit. Introduce the question on day one of the unit. The question posed is open-ended, requires higher order thinking to answer, and is answered by the final product(s) of the unit. A driving question is an integral part of Project Based Learning and Authentic Learning Experiences units. Review these articles for effective crafting of your DQ.\n\n 1. Driving Question Basics\n 2. Concept-Based Driving Questions\n\n2. Entry Event\nUnits should be started with students becoming invested in the outcome and the experiences that lead up to the finale. A good entry event helps students see purpose and value in the academic unit, beyond that it’s required learning, or also known as “the Game called School.” Introduce the unit with a real-world connection and authentic audience. Connect the final unit product to the authentic purpose on day one.\n\n 1. Video Conference with a client, expert, or witness\n Use Google Hangout, Skype, Zoom\n 2. Conduct a field trip (in-person or virtual)\n 3. Run students through a mini-scenario or case study that connects to the concepts.\n The Window Activity (Entry Event/Writing strategy) is one way to encourage connections.\n Here is a different example: Making the Declaration of Independence Come Alive: Break up Letter (Video)\n Strategy: Use Invisible Theater to get students to make important and/or startling connections.\n Watch the 1st 3 minutes for this Entry Event:\n\n3. Need to Know (N2K) activity & related formative check-ins\nLaunch the N2K at the start of the unit so that students can share what they already know, and what they are interested in learning from the unit. This initial feedback session is revisited throughout the unit, as posted questions (need to knows) are answered, and new (and deeper) questions are submitted. Read this article for an in-depth look into N2K.\n\n4. Build Real World Connections\nAuthentic Learning Experiences (ALE) is important for students to see the value of the curriculum. Real world connections builds context for understanding and deeper learning. There are several layers to effective ALEs:\n\n 1. Authenticity = Lifelong Learners\n Authentic Learning practices are a necessary part of of learning. Here is a framework to help teachers thinking as they plan learning experiences.\n 2. 4 Paths to Engaging Students: Authentic Purpose = Audience\n Edutopia Article and OP Article\n Step Two is deciding on the Authentic Purpose for applying the learning outcomes. These two articles explain a powerful way to connect real world purpose to content.\n 3. 3 Degrees of Connecting to a Real World Audience\n A common request is how to find community members, organizations, experts, mentors, and clients. Here is a strategy used by a group, department, or whole staff to generate a list of networks. Also, keep in mind that another solution is to send out a short survey to parents. Find out their skills and experiences that they have to offer.\n 4. 21st Century Skills Anchor Charts for Behavioral Norms\n\n5. Learning Wall\nMaking learning transparent helps students know what is expected at the start. This is done with daily lessons when teachers post and read aloud the learning outcomes for that day’s lesson. A Learning Wall communicates about the entire unit. Refer to the appropriate components to students on a daily basis, whichever components is appropriate at the time. Making daily references makes the Learning Wall useful to connecting “that” day’s work to the unit big picture. Read this article for more about Learning Walls. Also check out this photo gallery of Learning Walls.\nPost the following components in the area where the teacher starts instruction.\n\n 1. Driving Question\n 2. Need to Knows\n 3. Calendar\n 4. Learning Standards, Rubrics and Major Assignments\n 5. Possible others: Norms, Mediation Process, and GSS Anchor Charts\n\n6. Structures for coaching and supporting Teams\nTeamwork both as an entire class and in small groups is important to academic learning and development of important professional skills of Collaboration and Communication. The following resources addresses several tools that can support a classroom professional learning culture (Norms) and strategies to develop a personalized system for empowering students to advocate for themselves with their peers and with teachers.\n\n 1. Classroom or group Norms\n Norms exist informally, and typically do not support how classroom learning should be. Facilitate student-developed norms that support the classroom. The result are guidelines that students and teachers can hold each other accountable, because the students created them.\n\n 1. Establishing a Culture of Student Voice\n 2. Empower Student Voice Through Collaboration and Communication\n 2. Mediation Process & related supports\n Adopt or adapt this Mediation Process at the start of school or new marking period. Teach and coach students on how to follow the steps. After early direct coaching for the initial issues that occur, students should be able to follow through with team members without assistance. This strategy is a proven process used in schools across the United States.\n 3. Team formation support strategy\n Use these strategies to gather student-reported information about themselves. The depth of knowledge can help influence creating a balanced group assignments.\n\n 1. Learning Preferences Cards\n 2. How Learning Profiles can Strengthen Your Teaching\n 3. Roles\n Include descriptions for each role. Ensure that each role has an academic responsibility. Include a supervisory responsibility for each role so that a student in not solely responsible for a portion of the work. Maintain “shared responsibility.”\n 4. Contracts\n These sample contracts offer a variety of methods for student groups to agree on common practices, and hold each other accountable.\n\nActivating student voice empowers learning via Volume 5.3 of Creative Teaching and Learning\n\n7. Plan for incorporating student development of 21st Century Learner Skills\n\n 1. Classroom Norms and GSS Anchor Chart(s)\n 1. Empower Student Voice Through Collaboration and Communication\n 2. The Skills Colleges and Employers Are Looking For\n 3. GSS Anchor Charts examples, plus a Strategy Guide List (pdf)\n This is a treasure chest of models and strategies to make real a 21st Century professional learning classroom culture.\n 4. Use the TIP Chart for teachers to reflect on “their” implementation of Global Success (21st Century) Skills\n 2. Student reflection on practice and thinking activities\n (i.e.: protocols, journaling, and partner talks)\n\n 1. Make Learning Last: How Diverse Learners Can Process Their Understanding\n 2. Establishing a Culture of Student Voice\n 3. Fostering Student Questions: Strategies for Inquiry-Based Learning\n 4. Practice and reflect using team builder activities (i.e.: Teampedia)\n\nFor more information, read about Authentic Learning Experiences, and explore additional strategies.\n\nAuthentic Learning Experiences Tool Box – New resources available\n\n\nPicture students making frequent connections to curriculum outcomes in deep and meaningful ways. Imagine them caring about the academic tasks as if someone important to them is counting on their success. Authentic Learning Experiences (ALE) transforms this picture into reality. ALE is a growing practice in 40 minute lessons to units that go one to five weeks, and much longer ones.\n\nExplore different aspects of ALE from concept to practices to implementations with links at the bottom. Let’s start with exploring the why of Authentic Learning Experiences.\n\n\n\nThe concept of ALE is simple:\n\nImmerse students into real world situations and/or challenges to make meaningful connections to curriculum.\n\nHere are some examples:\n\n • interview a water quality employee to better understand the science and community impact\n • publish a position paper about a social or political issue\n • teach 2 and 3 digit multiplication and informational writing by having students create a budget for curriculum night event. Have a panel stakeholders decide which one to implement.\n • invite a business owner to share their marketing problem of promoting their business. Students are tasked with devising a persuasive multimedia marking campaign for review by the business owner.\n • devise an idea for more ADA compliant supports to be used to improve daily life, ie. store access, hotel room design, or use of gadgets like phones and other digital devices.\n\nWhy is ALE important for learners?\n\nAuthentic Learning Experiences help students connect curriculum with real world meaning. Academic subjects can feel abstract to some students, resulting in a belief that the “knowledge” is only relevant in the classroom as part of work to be done, and not remembered. This belief is far from the truth about how content builds to many applications and uses in the world beyond the school walls. When students grapple with the connections between concept and authentic applications, the skills gain value because job purpose is provided.\n\nAdditionally, authentic audience participation is valuable. Such a participant can support the lesson or unit by participating in a Q&A, mentoring, acting as a resource, or posing a genuine problem or question that they need an answer. From my experiences, and those of teachers and administrators I’ve helped, students were more likely to step up to the challenge. An genuine audience or client puts a “face” to the tasks. Confronted with that person or organization, students tend to raise their efforts for deeper quality of work, because someone is counting on them. An audience that is not the teacher seems to communicate that the work is not just an exercise. It’s impact is real. Students have a voice in the global community.\n\nNavigating a Global Community\n\nThe world is smaller in the sense that technology such as social media has sped up the flow of information and communication access to anywhere. No longer can students work on academics for the sake of curriculum, with justifications that the work will prepare them for the “real world.” Such assertions are simply not true. Traditional instructional practices alone might develop students with a deep understanding of content, with little or no connection to the rich applications and implications in the world beyond school. Traditional instruction that are effective practices do have a place in today’s teaching and learning–if those practices are incorporated, and sometimes reinvented, into connections and applications in the global community.\n\nVideo conferencing, virtual worlds, digital collaborative spaces and tools, and apps provide a variety of ways to bring the world inside the classroom, and the students entrance into the world. Publication of ideas as comments to articles, to videos are literally at our fingertips. Access to experts, professionals, enthusiasts, and explorers has become so easy that a real challenge is how to communicate with them, and effectively sift through what is evidenced-based to agenda-driven. These are the experiences and 21st Century Learner skills that students need experience with as they learn curriculum.\n\nNow What\n\nAuthentic Learning Experiences are not a new idea. It continues to evolve based on the world that we live in. In the late 1990s, cell phones were a tool that was not a common tool, nor as useful, as it has become today, with the merging of computer technology and the internet. As the global community shrinks and careers evolve, students need more experiences that applies curriculum in an authentic context beyond school.\n\nStart simple with one lesson or a collection of 2-3 learning experiences. Build your comfort level, while giving students new interesting challenges. Expand to a unit focus, where students tackle a problem or puzzle. Their final product should demonstrate their understanding of content outcomes through their creative solutions. PBL is one such unit structure that supports this approach. Explore the possibilities through these resources below.\n\nWhy ALE | Examples | Strategies | Articles", "pred_label": "__label__1", "pred_score_pos": 0.6868318915367126} {"content": "Site Loader\nRock Street, San Francisco\n\nsignificant role in our current culture, to make\nnorms and social unwritten rules by sharing information and giving\nentertainment to vast audiences.Mass media has various tools such as\ntelevision, radio,billboards, programs,books and the Internet.\nInternet is one of the fastest to reach and most developing one but\nTV also has strong influence to audiences. Mass media also can be\ntool to create a certain type of message in this way media can\nmanipulate people’s attitude and opinions and beliefs easily.\nto a Canadian communication theorist Marshall McLuhan, it also\naffects people’s lives by shaping their opinions, attitudes and\nbeliefs (1964).\nI would like focus on this problem that how mass media can influence\nstereotypes and gender roles in our daily life. I will also stress\nthat advertising used gender roles and stereotypes as a marketing and\nsatisfaction techniques.\n\n\nWe Will Write a Custom Essay Specifically\nFor You For Only $13.90/page!\n\norder now\n\nknowledge about\nthe world around them through their lives and they classify\nreceived information in\nthis way they\ncreate cognitive\nscheme, that\nrepresentations of the our\nworldview. Schemes\nalso used in social environment such as stereotypes that shows\nopinions about other groups from among members of\ngroup. When we start to get know others socialization part comes\nfirst then we start to internalize it during\nthe socialization process. They\nare result of our own observations or we just learn from the others,\nlike family, friends, teachers and media. However generalization and\nreally significant part of stereotype so that it can be subjective,\nand false image of reality. One of the sources of stereotypes is\ntradition and have really strong relations with it. It is clear to\nunderstand that its hard to change stereotypes just\nbecause of the fact of tradition. Under the influence of\ntradition,stereotypes can be positive and negative one and latter is\nmore common. Even if stereotype is negative and it is all world known\nissue in this case people prefers to take it as an exception than\nchange the way of thinking. However social classified is another\nproblematic issue of stereotypes. American psychologist, Elliot\nAronson, said that stereotypes can be used identical features to each\nmember of a certain group without taking the existing differences\namong the members into consideration (1972).\n\nI mentioned in above stereotype can be negative effect in order to\nunderstand that we can analyze gender roles in our modern society.\ntopic comes to gender roles, there is only one image in our eyes\nwhich is that one strong working men and lovely stay-at-home women.\nThis image is totally patriarchy way of thinking but patriarchy\nhas been a dominant family model and still exists in some place in\nall around the world. Men always have been thought to be strong,\nindependent, founder of family and earn money to take care of his\nfamily however women have been represented as a mother who is taking\ncare of children, housewives and dependent one. When we grow up we\nlearn gender roles from our first teacher in home, our families. They\nexpect that behave like what fits to our traditional roles and whats\nnormal for them. If I would like to give an easy and clear example I\ncan say that pink is for girls easily. Therefore a boy learns it\ngirls go for pink and he should not go for it. Society works like\nforcing him to not have any pink item at all.\n\nwe are developing and changing\nworld view so that our\nmodel is becoming\npartnership instead of patriarchy. There\nis also another effect to change\nmodel that women can find equal works as men can do. When women\nstart to earn money too they are getting more confident and find\nright to talk about family issues in their own home. In this case we\nhave to thank to feminist movement that they are doing great things\nand their rights. Feminist motto says that there should not\ndistinguish between man and woman. Feminism\nis working hard and taking nations to further but still gender\ninequality exists abut not so vast anymore.\n\nthe other hand mass media which is in every part of our life that is\nstill insisting to use gender roles and represent them as a\nWe distinguish women and men roles by mass media and media does it\nvery well. Morley said that ‘The younger generations are especially\ninfluenced by its depiction of gender roles. Even though television\nhas improved very well in its representation of gender, women are\nstill stereotype in conventional roles, and under-represented, while\nmen are revealed or seen as dominant figures’ (Lawrence, 2004, p.28).\n\nMass Media\n\nwould like to focus on effects of mass media in stereotypes and\ngender roles. As I mentioned before media is fastest, reachable and\nunavoidable. We are under the bombardment by media that such as a\ncommercials, newspapers, advertisements and so on. They are\neverywhere and try to give a message like how we should be. Media\ninfluence on our way of thinking by sending any message or idea. They\nare capable\nof impact on us whether small or big. These informations represent\nfemale and male roles in\nway. Katha Pollitt, American author, says that “boys\nare central, girls are peripheral”, and that “girls exist only in\nrelation to boys” in her essay “The Smurfette Principle”. She\nalso claims that streotypical female figure should support by male.\nShe imagines gender roles in media as a train and females are like a\npassenger in the train which is driving by male character. Media\nteaches to boys girls are not that much important.\n\nPost Author: admin\n\n\nI'm Eunice!\n\n\nCheck it out", "pred_label": "__label__1", "pred_score_pos": 0.9771221876144409} {"content": "Elmich Australia was commissioned to supply a 300m³ modular underground stormwater reuse tank system under a large landscaped garden at an apartment complex in Holroyd, New South Wales.\n\nThe tank system at the Holroyd Gardens Apartment Complex also needed to withstand the weight of light maintenance equipment. \n\nElmich installed VersiTanks 550 modules assembled and interlocked on site, positioned in an excavated area and enveloped with a sandwich containing an inner layer of geotextile, a low density polyethylene inner impermeable liner and an outer geotextile layer.\n\nCovered with a 250mm soil mix, lawn and landscaped species, the system withstands the weight of light maintenance equipment.\n\nStorm water from the apartment complex passes into a leaf/silt trap into the underground stormwater tank and is then pumped to irrigate a large landscaped area.", "pred_label": "__label__1", "pred_score_pos": 0.9468677639961243} {"content": "Nomination Instructions\n\n1.  No more than three individuals will be considered for an Award in the Basic or Clinical category.  Nominators for the Basic or Clinical Award should provide:\n\na.  A short citation (30 words or less) that highlights the nominee(s)'s research worthy of a Lasker Award.\n\nb.  A concise summary (150 words or less) of your nominee(s)'s scientific contributions to this research.\n\nc.  A description of how the nominee(s)'s work represent a major advance in either the basic or clinical sciences and how his or her original contributions that led to this advance.  (The answer to this question must be limited to 900 words or less).\n\nd. A list of other scientist(s), in addition to your nominee(s), who shoul be considered for this award, and why.  Please Note:  The Jury considers this question a crucial one, and nominations without a complete answer to this question will be returned.  (Limit response to 450 words or less).\n\n2. Special Achievement Awards are intended to honor a single individual. Nominators for the Special Achievement Award should provide:\n\na. A short citation (30 words or less) that highlights the nominee's career in research worthy of the Special Achievement Award.\n\nb. A description of the outstanding ahievements of the individual and the reasons why he or she is deserving of Lasker recognition. (Limit response to 900 words or less).\n\n3.  All nominations must include the following additional information, which may be uploaded as part of this electronic submission:\n\na.  A brief one-page biography, including major awards received by each nominee.\n\nb.  A one-page list of six (6) peer reviewed journal references that substantiate the statements made in your nomination.  Do NOT submit reprints.\n\n4.  No more than five (5) letters of support per nomination will be accepted.  Letters in support of Basic nominations should address the nature of the nominee(s)’s discoveries, and how those discoveries have opened up a new area of biomedical science.  Letters in support of Clinical nominations should address uniquely innovative contributions of the nominee(s) that have advanced patient care for many thousands of people.  Letters of support can be either uploaded as part of this nomination package or mailed separately to the following address:\n\nLasker Medical Research Awards\nAttention: David Keegan\n405 Lexington Ave., 32nd Floor\nNew York, NY 10174\n\n5.  Previous nominations and support lettes are not automatically carried forward.  If you wish to re-nominate a previous candidate, please update the earlier nomination and resubmit.   The 2020 nomination should contain all pertinent previously submitted material, including updated letters of support and any significant new developments.\n\n6.  Nominations and all supporting materials must be received by the Foundation no later than February 3, 2020.\n\nThis site uses browser cookies to support the nomination process workflow.\n\nYour browser is configured to disallow cookies.\n\nPlease enable cookies in order create and edit award nominations.", "pred_label": "__label__1", "pred_score_pos": 0.9994621276855469} {"content": "• Facebook Basic Square\n • LinkedIn Social Icon\n • Twitter Social Icon\n\nThe state of RegTech in the US\n\nJuly 25, 2017\n\nSource: Banking Technology\n\n\n\nSubas Roy, chairman of the newly launched International Regtech Association (IRTA), provides an insight into the state of regtech in the US and further opportunities.\n\n\nThe US represents the largest financial markets in the world. At the end of 2015, the size of the country’s banking sector alone was $15.9 trillion, generating a net income of $161.6 billion (according to SelectUSA).\n\nThe financial sector in addition, employs more than six million people in the US, with several more millions employed in the ancillary industries, such as education and research, technology, regulation and security, transportation and logistics, tourism. It is, therefore, of paramount importance that the future of the financial sector in the US is ensured and protected.\n\n\nThe truth of the matter is that after the downturn in 2008, the US financial sector has been increasingly difficult if not impossible to manoeuvre in.\n\n\nFor instance, there have only been a handful of new federal banking licences issued by the Office of the Comptroller of the Currency (OCC) across all states between 2008 and 2017. That figure in the UK will be 14 and an unbelievable 21 and 38 in India and China, respectively.\n\n\nThe message is simple: the financial sector in the US, which has been the backbone of its economic and political leadership in the modern world, has been somehow stagnant since 2008. The new digital banking era is surprisingly still embryonic in the US whereas countries like China, the UK, India and Singapore are setting the tone, with Australia, Canada and Germany fast developing a mature digital banking state.\n\n\nWhy is this the case – is there an apathy towards innovation in the US? The answer is an emphatic “no”. Because during the same timeframe of 2008 to 2017, the market capitalisation of the innovative technology and wearables sector in the US has grown from $470 billion to $2.9 trillion with Apple, for instance, valued at $800 billion in April 2017.\n\n\nThe technology sector now employs more people than the financial sector in the US. This has never happened before.\n\n\nWe, therefore, need to review why such innovation trends have not been present in the US financial sector? The answer is quite clear, it is because of the “increasing operational complexity” and “abundance of new regulatory rules”, which as we know have also been a trend in other developed nations. Because of these principal issues, it is now more difficult to make “good, clean money” in the financial sector.\n\n\nThese two issues, however, are fuelled by one crucial factor – “absence of trust” – which has become an impediment to promote new ideas and innovation in the US financial sector.\n\n\nThe emerging world, on the other hand, although affected by the 2008 downturn, has been able to engage with the new ideas and possibilities that are already showing tremendous financial growth and future potential.\n\n\nFrom that angle, and perhaps in very few instances of the modern history, innovation in the US is lagging behind.\n\n\nWe in the US need to get our acts together – and it’s not too late. Yet!\n\n\nThe sheer fact that “trust is an issue” ideally should lead to more innovation, openness and so forth. Actually, it has led us to quite the opposite. The rules-driven regulations are becoming even larger and complex, with often conflicting principles.\n\n\nUnfortunately, there is no way out until we the people decide, together, that we need to change. It seems that the time is now, because of the obvious cost pressure on the banks, also the pressure of expectation on the US regulators to deploy advanced technology for better analytics, smart contracts, real-time regulations among the others.\n\n\nI have recently joined, along with a number of other PhDs and scholars, regulators, banking CEOs, lobbyists and technology innovators, at the Harvard University’s Kennedy School of Business and Government to discuss the future of regtech and the opportunities it is creating particularly from the US standpoint. It was fascinating to see the depth of expertise and knowledge available both across the regulatory and the technology camps, the keen interests of the banks but also the absence of the much-needed, open, collaborative ecosystem for promoting sustainable regtech innovation.\n\nI recorded a few comments during the sessions, which are below. These simple messages are enough to describe the situation:\n\n\n“Regulatory compliance is a sole crushing job.”\n\n\n“Zero confidence that we as regulators can influence the US banks.”\n\n\n“Only two of the 33 US-based regtech companies have ever met a US financial regulator.”\n\n\n“We will innovate, come what may. There’s a market outside the US!”\n\n\nFrom these messages, it is obvious that there is a deadlock; a deadlock to come forward and trust the others, deadlock to get together and build an open, opt-in, trusted work environment where innovation can kick-in and spawn, in a sustainable way.\n\n\nWe need to protect and re-modernise the US financial sector including bringing in innovation across it.\n\n\nThe future financial services will be much different than it is today.\n\n\nBy 2030 and beyond, we can expect a subscription-based, demand-led financial economy where consumers will be looking for the cheapest, fastest and most secure transaction medium using online web.\n\n\nThe traditional concept of having a bank account through which one will pass through all of her/his transactions will give its way to online and mostly cloud-based, real-time platforms that are also able to perform financial transactions and provide services, relentlessly.\n\n\nIt is almost frightening to consider the prospects of some of the banking service providers of today, if they are unable to change themselves in time. Indeed, in some parts of the world including China, India and parts of Europe including the UK, some of these transactions are possible today and happening too. The state of maturity of cybersecurity, data privacy and related sectors, nonetheless to say, will need to evolve too to make space for this open banking culture.\n\n\nRegtech is the innovation-in trust\n\n\nGiven the size and proximity of the issues, the definition of regtech has been evolving, and it will continue to do so.\n\n\nIn simple terms, regtech signifies de-complexing and de-risking our current risk and regulatory environment, to bring in or adapt to a new, alternative and more open ways of demonstrating residual regulatory compliance, more so by risk themes than by regulations, thereby helping to reducing cost and complexities, improving effectiveness of the financial services, and most crucially, achieving trust of its consumers.\n\n\nFuture evolution of regtech therefore, should focus on “trust” and prioritise innovation areas to maximise trust and consumer benefits. This is as true from a global standpoint as to the US financial sector.\n\n\nSuch benefits could be obtained by more secure, real-time and faster services or responses, quicker outcomes and decisions, improved quality of advice, e.g. improved quality of sales and suitability, transparent single view accessible by the customer, easier checks, e.g. use of a combination of biometrics, digital identity and other techniques to speed up the onboarding and further transactions processing.\n\n\n\nBring together innovative solutions, use technology as the enabler\n\n\nWhen our forefathers created the banking systems, they didn’t have any technology but it worked, part of the reason it still exists today. So the innovative ideas and the regtech solutions matter more than the underlying technologies.\n\n\nInnovation in regtech needs to focus on the issues faced by the financial sector, alongside bringing in new technologies that can either help to resolve it or change the fundamental processes or ways of working.\n\n\nUsing advanced analytical and identification technologies to speed up the know your customer (KYC) processes and set up utilities will be an example of the former, whilst using a combination of artificial intelligence (AI) and blockchain/distributed ledger techniques to revamp the regulatory compliance monitoring and reporting processes, either used by the regulators or by a consortium of banks or by the legal entities of a single bank globally, will be the example of the latter.\n\n\nCollaborative ecosystem and skills needed for regtech to shine in the US\n\n\nWe will need collaborative ways of working for regtech to expand in the US and to provide the desired benefits to the financial sector, initially.\n\n\nCollaboration refers to open ways of working, most often industry-led working groups where users and experts from various fields come together to create something new or change something already being used.\n\n\nRegtech collaboration, at the minimum will require the banks and the financial institutions, the regulators, the regtech technologists and the professional experts including the researchers and academics to get together.\n\n\nIncreasingly there are examples where this has already been successful, for instance, in the UK, the financial regulator – the Financial Conduct Authority (FCA) – has led the charge and helped to bring together these parties.\n\n\nFCA produced working papers, conducted open consultations (similar to the APA – the Administrative Procedure Act in the US – but simpler and quicker), including three TechSprints and four industry roundtables on regtechs asking the banks, technologists and the general public as to what needs to be done. Initial results have been groundbreaking, with multiple live projects for instance, to roll out regtech standards and to automate regulations into machine-readable codes for in-built compliance.\n\nThese projects will need to go through their lifecycles to produce the desired benefits but it does prove the point that regtech can be a win-win for both the regulators and the regulated, if worked in a collaborative environment.\n\n\nIt is a fascinating time to join the regtech ecosystem and contribute to shaping the future of our financial services, including how our next generations are going to use it. At the IRTA, we are committed to help achieving these objectives and also proud of it.\n\n\nWhat are the areas to focus on and how are we going to do this?\n\n\nThere are many places that we can start with, however, it is key that advancement of regtech in the US is carried out with a centralised focus including an open, innovative, collaborative ecosystem, which is joined with the international movement unwaveringly…\n\n\nRetrieved from: http://www.bankingtech.com/895941/analysis-regtech-in-the-us-the-state-we-are-in/\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nPlease reload", "pred_label": "__label__1", "pred_score_pos": 0.8555111289024353} {"content": "11 Critical Theory in Ecomusicology James Rhys Edwards Critical theory is an endeavor born of crisis. In the historical materialist tradition, which emerged in response to nineteenth-century social crisis, the critical theorist begins by taking account of the material conditions and mode of production that enable society to reproduce itself.\n\n\nAre Perceptions of “Time-Slips” Explainable by Quantum Mechanics, as Random “Time-Solitons”? Alberto Miatello Abstract This study examines 4 very famous and widely discussed cases : a) The “vanishing” hotel of Montélimar in 1979; b) The Petit Trianon case of 1901; c) The vision in 1935 of the airbase of Drem in1939, by RAF Field Marshal Victor Goddard; d)The Bampton case of 1993.\n\nWhich Biomolecule Contain Your Genetics A biomolecule or biological molecule is a loosely used term for molecules and ions that are. Biology and its subsets of biochemistry and molecular biology study biomolecules and their reactions. Those RNA structures contain many stretches of A-form double helix, connected into definite 3D. Resources in your library. Darwin Lum Dds Fairfield Ca Indianapolis Star-News\n\nPhysicists believe that fractals also exist in the quantum world, and now a group of researchers. whose basic patterns are repeated at ever decreasing sizes. For example, a river system is an.\n\nOriginally, theorists studying black holes focused almost exclusively on applying Einstein’s theory of general relativity. building on the work of Jacob Bekenstein, showed that quantum mechanics.\n\nNote! This is an introductory article covering the most basic principles of the Fractal Holographic Universe theory. For a more in depth understanding of the physics involved, please read Quantum Gravity and the Holographic Mass Nassim Haramein‘s life long investigation into the geometry of space has led to his publication of several scientific papers in which he presents a new solution.\n\n\"Just think of modern Australian politics in terms of quantum physics.\" He smiled quietly to himself. anyone who is not profoundly shocked by quantum theory has not understood it. Our politicians.\n\nI am part of the Quantum Solid State Physics Group within the Basic Research Laboratories. I ride by houses and get a glimpse of how the Japanese live, across a river, and alongside rice fields.\n\nThere are all sorts of similar events like this which happen in quantum mechanics. mechanics but from Einstein’s theory of general relativity. The name of the saving grace is a deep principle of.\n\n\nSome scientists are even searching for a single equation, a \"theory of everything. Now I’m not even mentioning quantum effects – because once again, this is more a qualitative discussion about the.\n\nA theory developed out of the University of Sydney. The result was achieved using the theoretical work of quantum physicists at USyd’s Nano Institute and School of Physics and performed by UNSW.\n\nPHYSICS OF THE LAW OF ATTRACTION I OBSERVE, THEREFORE I AM By Don Estes. The Law of Attraction has become a household word. Suddenly it has come to be the buzzword amongst those studying ways in which to enrich and enhance life.\n\nTo scientists, however, he will be forever known for finding a relation between gravity — in the form of Einstein’s general theory of relativity. refusal to understand some point of quantum physics.\n\ni ran into a sanyasi seated under a tree by a river. i saw in him. it is not surprising to find that theoretical physics (tp) has `eaten away’ the `physique’ from quantum theory and the unified.\n\nSubatomic physics research is a quest to discover and understand the basic laws that govern the universe. When going beyond the atomic scale and examining matter at distances smaller than nuclei, intriguing patterns and phenomena emerge that reveal the fundamental nature of matter and forces.\n\nThe new enthusiasm has also been fired by fundamental physics. Many theorists have predicted the existence. One of Casimir’s colleagues, Theo Overbeek, realized that the theory that was used at the.\n\nx Preface to First Edition I also do not attempt to teach basic astronomy to physicists. In contrast to astronomy scholars, I think the main ideas in cosmology do not require very\n\nThe name Gilgal comes from the Hebrew verb גלל (galal), meaning to roll.After Joshua had circumcised Israel, God said that He had rolled away the reproach of Egypt, and the place where He had done this was called Gilgal ever since (Joshua 5:9).Note that the name Gilgal is spelled the same as the nouns galgal and gilgal that were derived of the verb galal:\n\nGeologist Salary In Zimbabwe Search thousands of Oil and Gas jobs. We cover all oil jobs, offshore jobs, oil careers and offer recruiter services to employers in the oil and gas industry. The work on Indian Memory Project takes a lot of time, money and hard work to produce. But it is necessary work and parallel views on our\n\nIn the aftermath of the dispiriting comments following last week’s post on the Parapsychological Association, it seems worth spelling out in detail the claim that parapsychological phenomena are inconsistent with the known laws of physics.The main point here is that, while there are certainly many things that modern science does not understand, there are also many things that it does.\n\n\nOne Physics Ellipse, College Park, MD. This is located off River Road, between Kenilworth Ave. and Paint Branch Parkway. Abstract: The intrinsic uncertainty of quantum systems seized the public.\n\nTime and Impermanence in Middle Way Buddhism and Modern Physics. Talk at the Physics and Tibetan Buddhism Conference University of California, Santa Barbara January 30-31, 1998\n\nThe Chemistry, Physics and Astronomy departments at. with Modern Technology.\" Physics Professor Emeritus Alex Dzierba will talk about Williams Dam and its associated powerhouse, which were.\n\nPeer Reviewed Coronary Artery Disease x In their article entitled “Dropped bifurcation technique for femoral endarterectomy”,(1) Dr. Thomas Bernik and colleagues from Englewood Hospital (NJ, USA) describe a variation in the conventional femoral endarterectomy technique, oriented to particular patterns of occlusive disease that involve both the superficial (SFA) and profunda femoral artery (PFA) ostia as far as 5 cm distally.\n\nIn this, the World Year of Physics 2005, which celebrates the 100th. Brownian motion and the special theory of relativity, sponsors conceived of hosting the “Quantum Diaries,” a Web blog through.\n\nIn Einstein’s Unfinished Revolution, he argues one of those key points was the assumption that quantum physics is a complete theory. This incompleteness, Smolin argues, is the reason quantum physics.\n\nNext week, physicists will pick up an old quest for new physics. A team of 190 researchers at Fermi National. just like a twirling compass needle. At first glance, theory predicts that in a.\n\nIn quantum mechanics, wave function collapse is said to occur when a wave function—initially in a superposition of several eigenstates—appears to reduce to a single eigenstate due to interaction with the external world; this is called an \"observation\". It is the essence of measurement in quantum mechanics and connects the wave function with classical observables like position and momentum.\n\nEvolutionary Origin Of Bipolar Disorder Aug 9, 2018. The same aspects of relatively recent evolutionary changes that make. Bipolar disorder and schizophrenia affect more than 3 percent of the. Nov 16, 2011  · It’s been an eventful week and there’s a lot of news to share and people to talk about. CrossFit NYC Talk. First, Shou-Ching and I are very excited\n\n\nIn physics, a quantum (plural: quanta) is the minimum amount of any physical entity (physical property) involved in an interaction.The fundamental notion that a physical property may be \"quantized\" is referred to as \"the hypothesis of quantization\". This means that the magnitude of the physical property can take on only discrete values consisting of integer multiples of one quantum.\n\n\nDarwin Lum Dds Fairfield Ca Indianapolis Star-News Obituary Indexes since December 20, 2006 back to vitalrec.com Below is an index of obituaries from the Indianapolis Star-News in Indianapolis, Indiana. Without Mathematics There Is No Art Where does theory fit into a top-down approach to studying machine learning? In the traditional approach to teaching machine learning, theory comes first requiring an\nGuide To Empirical Formula Shveta Sharma et al. / International Journal of Engineering and Technology Vol.3 (6), 2011-2012, 398-403 III. PATH LOSS FORMULA Standard Macro cells are of three types: 1, 2 and 3. Evolutionary Origin Of Bipolar Disorder Aug 9, 2018. The same aspects of relatively recent evolutionary changes that make. Bipolar disorder and schizophrenia affect more than\n\nBut there he was, sitting in the front row of the audience for my colloquium on the particle physics experiment I had worked on. who established the general theory of quantum mechanics about 45.\n\na theory of gravity, is more complicated and ultimately leads to masses that have rest masses so you can build clocks. Quantum GR is still on the bleeding edge of physics and makes physicist loopy or.", "pred_label": "__label__1", "pred_score_pos": 0.9724650382995605} {"content": "Antonia Lingemann\n\nAntonia is Berlins first Katonah Yoga teacher, which is a Hatha based practice from New York developed by Nevine Michaan over the last 40 years.\n\nIt uses asana as Origami for bodies and incorporates taoist theory, geometry, mythology, metaphor and imagination. The goal is to look around yourself, to be well adjusted and to develop a sense of personal measure. To realize that the universe is intelligent and functional and that you fit yourself perfectly. It sees the body as a house and therefore the practice is about learning to find joy in the house you’re living in.\n\nFor her a good yoga class combines the trinity of body, mind and breath in order to stay present in the practice and to find the comfort in the uncomfortable.", "pred_label": "__label__1", "pred_score_pos": 0.7559766173362732} {"content": "Friendship Facilitation\n\n\nAsk any adult and they will probably agree that making friends outside of school is extremely difficult.  It’s not that people don’t want to make friends as adults, but rather that the opportunities to meet people outside of work or school tend to be limited.\n\nWe can make it easier to find new friends and maintain both new and existing friendships both online as well as in person.", "pred_label": "__label__1", "pred_score_pos": 0.9994527697563171} {"content": "online site builder\n\nSara is a student in her twenties and came to Kinergy because she was sexually abused by her father and mother. Sara had been experiencing flashbacks and images of sexual abuse. She recognised that she has large gaps in her childhood memories, and no specific memories of the abuse, and was uncertain whether to trust these flashbacks, however, she wanted to explore the memories and images. The flashbacks she experienced were very intense and visual and often trigger periods of dissociation.\n\nShe also wanted to explore her identity, and emotional and relationship needs, as well as self-care so that she can have relationships with others without sacrificing her boundaries with her family and friends.\n\nThrough her experience of counselling, Sara is feeling more autonomous, and has learnt to validate herself rather than seeking validation through others. She is using what she has learnt about herself to create boundaries with others and she has started to recognise her triggers and how she is affected, by increasing self-awareness of her thought processes.  \n\n\n\n\nMary Carpenter House\nKingswood Foundation Estate\nBritannia Road\nBS15 8DB\n\nCharity Details\n\nRegistered Charity Number 1099140\nRegistered Number 0431957", "pred_label": "__label__1", "pred_score_pos": 0.9999131560325623} {"content": "As people have come to recognize the role of dods and other pets, they also come to see the cruelty being done to them. that is why there are certain things that were set up that does not exist before to help the pets and also to impose their rights. There are laws that are created specifically for them. Other establishments or building owners do not allow pets in their building for some reasons. But let us know the reasons why you can choose to adopt a dog.\n\nIn the infographic is the adoption of a dog from a shelter. In this days there is shelter established for the dogs who are rescued or they were impounded as they are astray in the streets. For both benefits of human and animals, there are many places where they now implement the policy to impound any dog that they found on the streets roaming and not tied. The owner cannot object to it but should pay penalties before he can get back the dog. This website will let you have the beauty treatment of yours. You can explore here 千煌 for more. A good surgery for your beauty is done here.\n\nAs there are certain benefits of choosing to adopt a dog than buying one, you can also choose to do so. The process is given above to ensure that you will not immediately regret that you have done so. You can discover the character of the dog that you have adopted when you will spend time with him when he is with you. They are easily tamed and they already became neutral and so they will not be aggressive easily.", "pred_label": "__label__1", "pred_score_pos": 0.9444713592529297} {"content": "Tel: 0800 999 3282\nData Recovery Companies HomeNews Data Recovery NewsletterSitemap\nPrint-friendly version\n\nHard Drive Repairs & Hard Drive Platters\n\nHard Drive Repairs & Hard Drive Platters\nWhy Certified Clean Rooms Are Essential For Hard Drive Repair\n\n\n\nA hard drive platter is essentially a disc made from aluminium or glass and ceramic substrate. During the manufacturing process of the disc, a thin coating of various metallic alloys is deposited on the surface of the disc by a process called magnetic sputtering.\n\nA cobalt-based magnetic media layer is deposited on top of the alloy coating and a carbon-based overcoat is deposited as the top layer.\n\nInside the hard drive and positioned on above and below the platter are the hard drive heads which float on a pocket of air between the platter surface and the head, if the drives seizes or a power outage causes the drive to stall a head landing can be caused despite the auto “return to park” feature of the drive intended to prevent the heads coming in to contact with the platters.\n\nThe hard drive heads move radially over the surface of the disc and performs the read or write operations. In hard drive repair scenarios it is imperative that the quality of finish is smooth, durable and perfectly free of any dust particles large enough to become trapped between the head and the platter (i.e. particles of 0.3 microns in size are sufficient to cause sticktion / head crashes hence modern high density drives need ever more stringent clean room facilities for their preparation and repair / rebuild.)\n\nWith spin speeds varying from 4200rpm to 20,000rpm even the smallest amount of contamination at this molecular level can prove to be a disaster to the data held on the platter.\n\nThe high density modern drives can store 2TB but these drives will eventually be superseded by drives of 6TB thanks to ever smaller read write heads being able to access smaller and smaller areas of the platter without error.\n\nMechanical hard drives will continue to be developed as they have the ability to store more data with current research pointing to platter density of 10TB per square inch - seems the Petabyte drive may be with us sooner than we think.\n\nSSD Drives and Hybrid drives like the Momentus X10 and even USB 3.0 will improve data transfer speeds, but this always is countered by the vast quantity of data we all have including increasing amounts of HD video. \n\nArticle courtesy of ABC Data Recovery", "pred_label": "__label__1", "pred_score_pos": 0.5959633588790894} {"content": "Derivatives Product Development Manager\n\n\nNew York, NY\n\nWhat you'll be doing\n\nDevelop and own the realization of the derivatives transformation product development roadmap including annual/multi year product planning. Effectively partner with operation and product team to drive the design and implementation of new and changed operating models that align to future states vision. Plan, manage and execute projects that will improve the delivery of fund services capabilities related to derivatives instruments. Establish and manage relationships with project sponsors, stakeholders and participants from product, technology and operations. Seamlessly, plan, manage and execute one or more projects or a project stream within a large program across multiple business units and technology team. Ensure adherence to the defined project life cycle and standards. Ensure the projects scope and objectives are understood and agreed. Define project roles and responsibilities and allocate project resources to tasks accordingly. Manage the project to scope, time and budget, ensuring high quality project deliverables. Effectively manage program finances (e.g. forecasts, actual, variance). Effectively influence and manage communication to stakeholders. Identify and track issues and risks, support mitigation and resolution as required; ensure issues and risks are escalated appropriately within the governance structure. Promote continuous project management process improvement.\n\nWhat your background should be\n\nAdvanced end to end knowledge of derivatives and fund accounting processing required. Excellent communication skills (written, verbal, and presentation). Ability to influence. Attention to detail and quality. Demonstrate excellent analytical and logical thinking to understand and analyze complex projects. Business process re-engineering experience within fund services a plus.\n\nRequired Schooling / Training\n\nNot specified\n\nWho is the client company\n\nThis is an American multinational banking and financial services holding company.\nIf you are interested in this position, send your resume to", "pred_label": "__label__1", "pred_score_pos": 0.9976332783699036} {"content": "sample conflict scenario\n\nFor this assignment, you will select a bidding company and analyze its industry and competition, as well as its objective to expand. Why and how is your organization looking to expand, and how will its strategy meet the objective?\nJanuary 21, 2019\nWhat do we know about our own history? How has our species been impacted by environmental change and variability?\nJanuary 21, 2019\nShow all\n\nRead the following sample conflict scenario to inform the assignment.  Mr. Kiernan is a fifth year math teacher who has been at Poe Middle School for five years. He was just asked to join the School Study Team as a regular member. Other members on the team include Mr. Barnaby, an English teacher; Ms. Chamley, a counselor; Mr. Carson, a special education teacher; Ms. Amity, a social studies teacher; and Ms. Claire, the assistant principal.   At the first School Study Team meeting, a new science teacher, Mr. Jones, came in to discuss his difficulties with a particular special education student. Mr. Jones is struggling to engage the student in class on a day-to-day basis, both academically and behaviorally.  In further discussion, Mr. Kiernan was impressed to see Mr. Carson guide the team through comprehensive problem solving steps. Everyone participated in the discussion and brainstormed ideas except for Ms. Claire. It seemed that when it came time to evaluate the suggestions, Ms. Claire found numerous reasons why each would not work. She specifically cited legal implications and time constraints. Mr. Kiernan offered ways to mitigate these concerns, but Ms. Claire simply said, “No.” Mr. Kiernan was somewhat surprised to hear the others then agree with Ms. Claire, except for Mr. Jones who said nothing. Ms. Claire then referred back to one of her original ideas and the others enthusiastically agreed that it would be a good starting point. Mr. Kiernan tried once again suggesting another option, finding a way to incorporate both suggestions, but again Ms. Claire vetoed the idea. Mr. Jones seemed to tacitly accept the idea, but left without much enthusiasm.   In a 500-750-word evaluation:  Describe the interpersonal conflicts that are presented in the scenario. Discuss the conflict management styles used by the key characters. Explain the problem solving process. Discuss what should be done next to facilitate the problem solving process. Evaluate potential solutions. Select 2-4 strategies that you would recommend for resolving the interpersonal conflict. Support your response with a minimum of three scholarly resources.   Prepare this assignment according to the APA guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.", "pred_label": "__label__1", "pred_score_pos": 0.7729132175445557} {"content": "Stockholm Precision Tools\n\nDomherrevägen 11\nSollentuna,  Stockholm  19255\n\n • Booth: 1805\n\nSPT™ designs, manufactures and supplies downhole survey tools to the world's major oil, gas, mining & civil engineering companies. Providing pinpoint accuracy on measurements, SPT Gyro tools are absolutely unaffected by the presence of heavy downhole magnetic interference, increasing safety, cost effective, enhancing ROP and reducing survey times.\n\nPlease contact otc.events@otcnet.org for questions.\nFor technical assistance please contact: support.", "pred_label": "__label__1", "pred_score_pos": 0.9928099513053894} {"content": "\n\nPEPPA is a fruity, wearable pink shade, perfect for adding brightness to the complexion! It's fun, playful and strong in tone. All of Kuckian's lipstick's incorporate Earthy human tones to ensure they blend in effortlessly with your complexion. \n\nRebel is the deeper, cooler purple sister of Peppa, and is often preferred by those looking to create an everyday natural look on deeper complexions. \n\nKuckian's legendary long-wear liquid matte formula in a full-size liquid lipstick, paired with an extra applicator and artistic brush. \n\n\n\n\n\n\nYou may also like", "pred_label": "__label__1", "pred_score_pos": 0.905743420124054} {"content": "Prediction Modeling Methodology\n\n • Frank J. W. M. DankersEmail author\n • Alberto Traverso\n • Leonard Wee\n • Sander M. J. van Kuijk\nOpen Access\n\n\nIn the previous chapter, you have learned how to prepare your data before you start the process of generating a predictive model. In this chapter, you will learn how to make a predictive model using very common regression techniques and how to evaluate the performance of a model. In the next chapter we will then look at more advanced machine learning techniques that have become increasingly popular in recent years.\n\n\nHypothesis testing Null hypothesis p-value α level Confidence level Type I error Type II error Linear regression Logistic regression Bias-variance tradeoff Dimensionality reduction Feature selection Feature extraction Regularization Performance metrics R-squared Brier score Confusion matrix Prevalence Accuracy Positive predictive value Negative predictive value Sensitivity Specificity F1-score Receiver operating characteristic Area under the curve Model discrimination Model calibration Hosmer-Lemeshow test Calibration plot Internal validation External validation Random split Monte-Carlo cross-validation k-fold cross calibration Data leakage Model validation Cross-validation \n\n8.1 Statistical Hypothesis Testing\n\nA statistical hypothesis is a statement that can be tested by collecting data and making observations. Before you start data collection and perform your research, you need to formulate your hypothesis. An example hypothesis could be for instance: “If I increase the prescribed radiation dose to the tumor, this will also lead to an increase of side-effects in surrounding healthy tissues”. The purpose of statistical hypothesis testing is to find out whether the observations are meaningful or can be attributed to noise or chance.\n\nThe null hypothesis (often denoted H0) generally states the currently accepted fact. Often it is formulated in such a way that two measured values have no relation with each other. The alternative hypothesis, H1, states that there is in fact a relation between the two values. Rejecting or disproving the null hypothesis gives support to the belief that there is a relation between the two values.\n\nTo quantify the probability that a measured value originates from the distribution stated under the null statistical hypothesis tests are used that produce a p-value (e.g., Z-test or student’s t-test). The p-value gives the probability of obtaining a value equal to or greater than the observed value if the null hypothesis is true. A high p-value indicates that the observed value is likely under the null assumption, vice versa a low p-value indicates that the observed value is unlikely given the null hypothesis, which can lead to its rejection.\n\nThere are common misconceptions regarding the interpretation of the p-value [1]:\n\n • The p-value is not the probability of falsely rejecting the null hypothesis (type I error, see below)\n\n • A low p-value does not prove the alternative hypothesis\n\nThe p-value is to be used in combination with the α level. The α level is a predefined significance level by the researcher which equals the probability of falsely rejecting the null hypothesis if it is true (type I error). It is the probability (s)he deems acceptable for making a type I error. If the p-value is smaller than the α level, the result is said to be significant at the α level and the null hypothesis is rejected. Commonly used values for α are 0.05 or 0.001 (Fig. 8.1).\nFig. 8.1\n\nIllustration of null hypothesis testing. The p-value represents the probability of obtaining a value equal or higher than the test value. The α level is predefined by the researcher and represents the accepted probability of making a type I error where the null hypothesis is falsely rejected. If the p-value of a statistical test is larger than the α level the null hypothesis is rejected\n\nConfidence levels serve a similar purpose as the α level, and by definition the confidence level + α level = 1. So an α level of 0.05 corresponds to a 95% confidence level.\n\n8.1.1 Types of Error\n\nWe distinguish between two types of errors in statistical testing [2]. If the null hypothesis is true but falsely rejected, this is called a type I error (comparable to a false positive, with a positive result indicating the rejection). The type I error rate, the probability of making a type I error, is equal to the α level since that is the significance level at which we reject the null hypothesis. Likewise, if the null hypothesis is false but not rejected, this is called a type II error (comparable to a false negative, with a negative result indicating the failed rejection) (Table 8.1).\nTable 8.1\n\nThe two types of errors that can be made regarding the acceptance or rejection of the null hypothesis\n\n\nNull hypothesis truth\n\n\n\nNull hypothesis decision\n\nFail to reject\n\n\nType II error\n\n(false negative)\n\n\nType I error\n\n(false positive)\n\n\n8.2 Creating a Prediction Model Using Regression Techniques\n\n8.2.1 Prediction Modeling Using Linear and Logistic Regression\n\nA prediction model tries to stratify patients for their probability of having a certain outcome. The model then allows you to identify patients that have an increased chance of an event and this may lead to treatment adaptations for the individual patient. For instance, if a patient has an increased chance of a tumor recurrence the doctor may opt for a more aggressive treatment, or, if a patient has a high risk of getting a side-effect a milder treatment might be indicated.\n\nThe outcome variable of the prediction model can be anything, e.g., the risk of getting a side effect, the chance of surviving at a certain time point, or the probability of having a tumor recurrence. We can distinguish outcome variables into continuous variables or categorical variables. Continuous variables are described by numerical values and regression models are used to predict them, e.g., linear regression . Categorical variables are restricted to a limited number of classes or categories and we use classification models for their prediction. If the outcome has two categories this is referred to as binary classification and typical techniques are decision trees and logistic regression (somewhat confusingly, this regression method is well suited for classification due to its function shape).\n\nFitting or training a linear or logistic prediction model is a matter of finding the function coefficients so that the model function optimally follows the data (Fig. 8.2).\nFig. 8.2\n\nExamples of predictive modeling (blue line) for a continuous outcome using linear regression and for a binary outcome using logistic regression. The predictions in the logistic regression are rounded to either class A or B using a threshold (0.5 by default)\n\n8.2.2 Software and Courses for Prediction Modeling\n\nThere are many different software packages available for generating prediction models, all of them with different advantages and disadvantages. Some packages are code-based and programming skills are required, e.g., Python, R or Matlab. There are integrated development environments available for improved productivity, like RStudio for R, and Spyder for Python. Additionally, they can have rich open-source libraries tailored specifically towards machine learning, for instance Caret for R [3] and Scikit-learn for Python [4]. Other packages have graphical user interfaces and being able to program is not mandatory, like SPSS, SAS or Orange. Some packages are only commercially available, but many are open-source and have a large user base for support.\n\nPreference for a certain software package over others is very personal and the best advice is therefore to simply try several and find out for yourself. A special mention is reserved for the Anaconda Distribution [5], which hosts many of the most widely used software packages for prediction modeling in a single platform (RStudio, Spyder, Jupyter Notebook, Orange and more) (Table 8.2).\nTable 8.2\n\nA non-exhaustive overview of available software packages for prediction modeling and some of their features\n\n\n\nCoding required\n\nDevelopment environments\n\n\nLearn more (books/tutorials)\n\n\n\n\nRStudio [7]\n\n\n\n\n\n\nSpyder [10]\n\nJupyter notebooks [11]\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nPartly (students)\n\n\n\n\n\nVisual workflows\n\n\n\n\n\n\n\n\n\n\n\n\nVisual workflows\n\n\n\nN/A not applicable\n\nThere is a wealth of freely available information on the Web to help you get going. Providing a comprehensive overview is therefore an impossible task, but some excellent online courses (sometimes referred to as Massive Open Online Courses or MOOCs) are listed below (Table 8.3).\nTable 8.3\n\nFree online courses for prediction modeling and machine learning\n\n\n\nMachine learning\n\nAndrew Ng, Stanford University, Coursera\n\nMachine learning\n\nTom Mitchell, Carnegie Mellon University\n\nLearning from data\n\nYaser Abu-Mostafa, California Institute of Technology\n\nMachine learning\n\nNando de Freitas, University of Oxford\n\n8.2.3 A Short Word on Modeling Time-to-Event Outcomes\n\nMany studies are interested not only in predicting a certain outcome, but additionally take into account the time it takes for this outcome to occur. This is referred to as time-to-event analysis and a typical example is survival analysis. Kaplan-Meier curves are widely used for investigation of the influence of categorical variables [23], whereas Cox regression (or sometimes called Cox proportional hazards model) additionally allows the investigation of quantitative variables [24].\n\n8.3 Creating a Model That Performs Well Outside the Training Set\n\n8.3.1 The Bias-Variance Tradeoff\n\nThe bias-variance tradeoff explains the difficulty of a generated prediction model to generalize beyond the training set, i.e. perform well in an independent test set (also called the out-of-sample performance). The error of a model in an independent test set can be shown to be decomposable into a reducible component and an irreducible component. The irreducible component cannot be diminished, it will always be present no matter how good the model will be fitted to the training data. The origin of the irreducible error can, for instance, be an unmeasured but yet important variable for the outcome that is to be predicted.\n\nThe reducible error can be further decomposed into the error due to variance and the error due to bias [2]. The variance is the error due to the amount of overfitting done during model generation. If you use a very flexible algorithm, e.g., an advanced machine learning algorithm with lots of freedom to follow the data points in the training set very closely, this is more likely to overfit the data. The error in the training set will be small, but the error in the test set will be large. Another way to look at this is that a high variance will result in very different models during training if the model is fitted using different training sets.\n\nBias relates to the error due to the assumptions made by the algorithm that is chosen for model generation. If a linear algorithm is chosen, i.e. a linear relation between the inputs and the outcome is assumed, this may cause large errors (large bias) if the underlying true relation is far from linear. Algorithms that are more flexible (e.g., neural networks) result in less bias since they can match the underlying true but complex relations more closely.\n\nIn general it can be said that:\n • Flexible algorithms have low bias since they can more accurately match the underlying true relation, but have high variance since they are susceptible to overfitting.\n\n • Inflexible algorithms have low variance since they are less likely to overfit, but have high bias due to their problems of matching the underlying true relationship.\n\nFrom this we can conclude that the final test set error is a tradeoff between low bias and low variance. It is impossible to simultaneously achieve the lowest possible variance and bias. The challenge is to generate a model with (reasonably) low variance and low bias since that is most likely to generalize well to external sets. This model might have slightly decreased performance in the training set, but will have the best performance in subsequent test sets (Fig. 8.3).\nFig. 8.3\n\nThe bias-variance tradeoff. With increased model complexity the model can more accurately match the underlying relation at the risk of increasing the variance (amount of overfitting). The bias-variance tradeoff corresponds to minimizing the total prediction error (which is the sum of bias and variance)\n\n8.3.2 Techniques for Making a General Model\n\nAs we collect and expand our datasets we often score many features (parameters) so that we minimize the risk of potentially missing important features, i.e. features that are highly predictive of the outcome. This means that generally we deal with wide sets containing many features. However, many of these features are in fact redundant or not relevant for the outcome at all and can be safely omitted. Including a large number of features during model generation increases the possibility of chance correlations of features with the outcome (overfitting) and this results in models that do not generalize well. Dimensionality reduction [25], reducing the number of features, is therefore an important step prior to model generation. The main advantages are:\n • Lowered chance of overfitting and improved model generalization\n\n • Increased model interpretability (depending on the method of dimensionality reduction)\n\n • Faster computation times and reduced storage needs\n\nThere are many useful dimensionality reduction techniques. The first category of methods to consider is that of feature selection, where we limit ourselves to a subset of the most important features prior to model generation. Firstly, if a feature has a large fraction of missing values it is unlikely to be predictive of the outcome and can often be safely removed. In addition, if a feature has zero or near zero variance, i.e. its values are all highly similar, this again indicates that the feature is likely to be irrelevant. Another simple step is to investigate the inter-feature correlation, e.g., by calculating the Pearson or Spearman correlation matrix. Features that are highly correlated with each other are redundant for predicting the outcome (multicollinearity). Even though a group of highly correlated features may all be predictive of the outcome, it is sufficient to only select a single feature as the others provide no additional information.\n\nTraditionally, further feature selection is then performed by applying stepwise regression. In each step a feature is either added or removed and a regression model is fitted and evaluated based on some selection criterion. There are many choices for the criterion to choose between models, e.g., the Bayesian information criterion or the Akaike information criterion, both of which quantify the measure of fit of models and additionally add a penalty term for complex models comprising more parameters [26]. In forward selection, one starts with no features and the feature that improves the model the most is added to the model. This process is repeated until no significant improvement is observed. In backward elimination, one starts with a model containing all features, and features are removed that decrease the model performance the least, until no features can be removed without significantly decreasing performance.\n\nWith feature selection we limit ourselves to a subset of features that are already present in the dataset and this is a special case of dimensionality reduction [27]. In feature extraction the number of features are reduced by replacing the existing features by fewer artificial features which are combinations of the existing features. Popular techniques for feature extraction are principle component analysis, linear discriminant analysis and autoencoders [25].\n\nMore advanced machine learning algorithms often contain embedded methods for reducing model complexity to improve generalizability. An example is regularization where each added feature also comes with an added penalty or cost [8]. The addition of a feature may increase the model performance but, if the added cost is too high, it will not be included in the final model. This effectively performs feature selection and prevents overfitting. The severity of the cost is a hyperparameter that can be tuned (e.g., through cross-validation, see paragraph “Techniques for internal validation”). Popular regularization methods for logistic regression are LASSO (or L1 regularization) [28], ridge (or L2 regularization), or a combination of both using Elastic Net [29]. The main difference between L1 and L2 regularization is that in L1 regularization the coefficients of unimportant parameters shrink to zero, effectively performing feature selection and simplifying the final model.\n\n8.4 Model Performance Metrics\n\n8.4.1 General Performance Metrics\n\nThe performance of a prediction model is evaluated by the calculation of performance metrics. We want our model to have high discriminative ability, i.e. high probabilities should be predicted for observations having positive classes (e.g., alive after 2 years or treatment) and low probabilities for negative classes (dead after 2 years of treatment). There is no general best performance metric for model evaluation as this depends strongly on the underlying data as well as the intended application of the model.\n\nOther often-used overall performance metrics are R-squared measures of goodness of fit (or R2, also called the coefficient of determination). The R2 can be interpreted as the amount of variance in the data that is explained by the model (explained variation). Higher R2s correspond to better models. Examples are Cox and Snell’s R2 or Nagelkerke’s R2. R-squared values are mainly used in regression models; for classification models it is more appropriate to look at performance metrics derived from the confusion matrix.\n\nAnother popular overall performance measure is the Brier score (or mean squared error) and it is defined as the average of the square of the difference between the predictions and observations. A low Brier score indicates that predictions match observations and we are dealing with a good model.\n\n8.4.2 Confusion Matrix\n\nThe confusion matrix is a very helpful tool in assessing model performance. It lists the correct and false predictions versus the actual observations and allows for the calculation of several insightful performance metrics. If the output of your prediction model is a probability (e.g., the output of a logistic regression model), then it needs to be dichotomized first by applying a threshold (typically 0.5) before the confusion matrix can be generated. An exemplary confusion matrix is shown in Table 8.4.\nTable 8.4\n\nConfusion matrix showing predictions and observations. Many useful performance metrics are derived from the values in the confusion matrix\n\n\n\n\n\n\n\n\n\nTrue positive\n\n\nFalse positive\n\n\nPositive predictive value (PPV)\n\n\nFalse negative\n\n\nTrue negative\n\n\nNegative predictive value\n\n\n\n\n\n\n\n\n\nTrue positives, called hits, are cases that are correctly classified. True negatives are correctly rejected. False positives, or false alarm, are equivalent to a type I error. False negatives, or misses, are equivalent to a type II error.\n\nPrevalence is defined as the number of positive observations with respect to the total observations. A balanced dataset has a prevalence close to 0.5, or 50%. Often, we have to deal with imbalanced datasets and this can lead to difficulties when interpreting certain performance metrics. Performance metrics can be high for poor models that are trained and tested on imbalanced datasets.\n$$ \\mathrm{Prevalence}=\\left(\\mathrm{TP}+\\mathrm{FN}\\right)/\\left(\\mathrm{TN}+\\mathrm{TP}+\\mathrm{FP}+\\mathrm{FN}\\right) $$\n\n8.4.3 Performance Metrics Derived from the Confusion Matrix\n\nAccuracy , defined as the proportion of correct predictions, is often reported in literature. Care has to be taken when using this metric in highly imbalanced datasets. Consider a dataset with only 10% positive observations. If the prediction model simply always predicts the negative class it will be correct in 90% of the cases. The accuracy is high, but the model is useless since it cannot detect any positive cases.\n$$ \\mathrm{Accuracy}=\\left(\\mathrm{TN}+\\mathrm{TP}\\right)/\\left(\\mathrm{TN}+\\mathrm{TP}+\\mathrm{FP}+\\mathrm{FN}\\right) $$\nAnother option is to look at the proportion of correct positive predictions for the total number of positive observations. This is called the Positive Predictive Value (PPV) or precision. Similarly, the proportion of correct negative predictions for the total number of negative observations is called the Negative Predictive Value (NPV), respectively. These metrics are of interest to patients and clinicians as they give the probability that the prediction matches the observation (truth) for a patient. PPV and NPV are dependent on the prevalence in the dataset making their interpretation more difficult. A high prevalence will increase PPV and decrease NPV (while keeping other factors constant).\n$$ \\mathrm{PPV}=\\mathrm{TP}/\\left(\\mathrm{TP}+\\mathrm{FP}\\right) $$\n$$ \\mathrm{NPV}=\\mathrm{TN}/\\left(\\mathrm{TN}+\\mathrm{FN}\\right) $$\n\nIf we want to consider characteristics not of the population but of the prediction model when applied as a clinical test, we can evaluate sensitivity and specificity. Sensitivity, or True Positive Rate (TPR, or sometimes called recall or probability of detection), is defined as the probability of the model to make a positive prediction for the entire group of positive observations. It is a measure of avoiding false negatives, i.e. not missing any diseased patients.\n\nSimilarly, specificity is defined as the probability of the model to make a negative prediction for the entire group of negative observations. It is a measure of avoiding false positives, i.e. not including non-diseased patients.\n$$ \\mathrm{TPR}=\\mathrm{TP}/\\left(\\mathrm{TP}+\\mathrm{FN}\\right)\\kern1.875em \\left(\\mathrm{sensitivity}\\right) $$\n$$ \\mathrm{TNR}=\\mathrm{TN}/\\left(\\mathrm{TN}+\\mathrm{FP}\\right)\\kern1.625em \\left(\\mathrm{specificity}\\right) $$\nAdditionally, we can determine the False Positive Rate (FPR), or fall-out, and the False Negative Rate (FNR), which are the opposites of TPR and FPR, respectively. Note that FNR is used in the next paragraph for the construction of the Receiver Operating Characteristic curve.\n$$ \\mathrm{FNR}=1-\\mathrm{TPR}=1-\\mathrm{sensitivity} $$\n$$ \\mathrm{FPR}=1-\\mathrm{TNR}=1-\\mathrm{specificity} $$\nThe F1-score , or F-score, is a metric combining both PPV (precision) and TPR (recall or sensitivity). Unlike PPV and TPR separately, it takes both false positives and false negatives into account simultaneously. It does however still omit the true negatives. It is typically used instead of accuracy in the case of severe class imbalance in the dataset.\n$$ \\mathrm{F}1=2\\cdotp \\left(\\mathrm{PPV}\\cdotp \\mathrm{TPR}\\right)/\\left(\\mathrm{PPV}+\\mathrm{TPR}\\right) $$\n\n8.4.4 Model Discrimination: Receiver Operating Characteristic and Area Under the Curve\n\nThe performance of a prediction model is always a tradeoff between sensitivity and specificity. By changing the threshold that we apply to round our model predictions to positive or negative classes, we can change the sensitivity and specificity of our model. By decreasing this threshold, we are making it easier for the model to make positive predictions. The number of false negatives will go down but false positives will go up, increasing sensitivity but lowering specificity. By increasing the threshold, the model will make fewer positive predictions, the number of false negatives will go up and false positive will go down, decreasing sensitivity and increasing specificity (Fig. 8.4).\nFig. 8.4\n\nInfluence of the threshold that is used to round model prediction probabilities to 0 or 1. By using a low threshold the model will detect most of the patients with the outcome (high sensitivity), but many patients without the outcome will also be included (low specificity). For each value of the threshold sensitivity and specificity values can be calculated\n\nBy evaluating different thresholds for rounding our model predictions, we can determine many sensitivity and specificity pairs. If we plot the sensitivity versus (1 – specificity) for all these pairs, i.e. the true positive rate versus the false positive rate, we obtain the Receiver Operating Characteristic curve (ROC) [30]. This curve can give great insight into model discrimination performance. It allows for determining the optimal sensitivity/specificity pair of a model so that it can support decision making, and also allows comparison of different models with each other.\n\nPowerful models have ROC curves that approach the upper left corner, which indicates that the model achieves the maximum of 100% sensitivity and 100% specificity simultaneously. Conversely, a poor model with no predictive value will have an ROC curve close to the y = x or 45 degree line. This has led to the use of the Area Under the Curve (AUC) of the ROC curve (or concordance statistic, c) as a widely used metric for interpreting individual model performance but also for comparing between models. Strong performing models have higher ROC curves and thus larger AUC values. A perfect model making correct predictions for every patient has an AUC of 1, whereas a useless model giving random predictions results in an AUC of 0.5. The AUC can be interpreted as the probability that the model will give a higher predicted probability to a randomly chosen positive patient than a randomly chosen negative patient (Fig. 8.5).\nFig. 8.5\n\nROC curve indicating discriminating performance of the model. Model predictions are rounded to 0 or 1 using many different thresholds resulting in the sensitivity and specificity pairs that form the curve. AUC is indicated by the gray area under the curve. Higher values correspond to better model discrimination performance\n\n8.4.5 Model Calibration\n\nHistorically, the focus in evaluating model performance has primarily been on discriminative performance, e.g., by calculating R2 metrics, confusion matrix metrics and performing ROC/AUC analysis. Model calibration is however as important as discrimination and should always be evaluated and reported. Model calibration refers to the agreement between subgroups of predicted probabilities and their observed frequencies. For example, if we collect 100 patients for which our model predicts 10% chance of having the outcome, and we find that in reality 10 patients actually have the outcome, then our model is well calibrated. Since the predicted probabilities can drive decision-making it is clear that we want the predictions to match the observed frequencies.\n\nA widely-used (but no so effective) way of determining model calibration is by performing the Hosmer-Lemeshow test for goodness of fit of logistic regression models. The test evaluates the correspondence between predictions and observations by dividing the probability range [0-1] into n subgroups. Typically, 10 subgroups are chosen, but this number is arbitrary and can have a big influence on the final p-value of the test.\n\nA better approach is to generate a calibration plot [31, 32, 33]. It is constructed by ordering the predicted probabilities, dividing them into subgroups (again, typically 10 is chosen) and then plotting the average predicted probability versus the average outcome for each subgroup. The points should lie close to the ideal line of y = x indicating agreement between predictions and observed frequencies for each subgroup. Helpful additions are error bars, a trend line (often a LOESS smoother [34]), individual patient predictions versus outcomes and/or histograms of the distributions of positive and negative observations (the graph is then sometimes called a validation plot) (Fig. 8.6).\nFig. 8.6\n\nCalibration plot indicating agreement between model predictions and observed frequencies. Data points are subdivided into groups for which the mean observation is plotted against the mean model probability. Perfect model calibration corresponds with the y = x line. Additionally, individual data points are shown (with some added y-jitter to make them more clear), as well as histograms for the positive and negative classes [0,1]\n\n8.5 Validation of a Prediction Model\n\n8.5.1 The Importance of Splitting Training/Test Sets\n\nIn the previous paragraphs different metrics for evaluation of model performance have been discussed. As briefly discussed in paragraph “The bias-variance tradeoff” it is important to compute performance metrics not on the training dataset but on data that was not seen during the generation of the model, i.e. a test or validation set. This will ensure that you are not mislead into thinking you have a good performing model, while it may in fact be heavily overfitted on the training data. Overfitting means that the model is trained too well on the training set and starts to follow the noise in the data. This generally happens if we allow too many parameters in the final model. The performance on the training set is good, but on new data the model will fail. Underfitting corresponds to models that are too simplistic and do not follow the underlying patterns in the data, again resulting in poor performance in unseen data.\n\nProperly evaluating your model on new/unseen data will improve the generalizability of the model. We differentiate between internal validation, where the dataset is split into a training set for model generation and a test set for model validation, and external validation, where the complete dataset is used for model generation and separate/other datasets are available for model validation.\n\n8.5.2 Techniques for Internal Validation\n\nIf you only have a single dataset available you can generate a test set by slicing of a piece of the training set. The simplest approach is to use a random split , e.g., using 70% of the data for training and 30% for evaluation (sometimes called a hold-out set). It is important to stratify the outcome over the two sets, i.e. make sure the prevalence in both sets remains the same. The problem with this method is that we can never be sure that the calculated performance metric is a realistic estimate of the model performance on new data or due to a(n) ‘(un)lucky’ randomization. This can be overcome by repeating for many iterations and averaging the performance metrics. This method is called Monte Carlo cross-validation (Fig.8.7) [35].\nFig. 8.7\n\nSchematic overview of a Monte Carlo cross-validation. A random stratified split is applied to separate a test set from the training set. A prediction model is trained on the training set and performance metrics on the test set are stored after which the process is repeated\n\nAnother approach is the method of k-fold cross-validation [36]. In this method the data is split into k stratified folds. One of these folds is used as a test set, the others are combined and used for model training. We then iterate and use every fold as a test set once. A better estimate of the true model performance can be achieved by averaging the model performances on the test set. Typically, k = 5 or k = 10 is chosen for the number of folds (Fig. 8.8).\nFig. 8.8\n\nSchematic overview of k-fold cross-validation. The dataset is randomly split into k stratified folds. Each fold is used as a test set once, while the other folds are temporarily combined to form a training set for model generation. Performance metrics on the test set are calculated and stored, and the process is repeated for the number of folds that have been generated\n\nThe advantage of k-fold cross-validation is that each data point is used in a test set only once, whereas in Monte Carlo cross-validation it can be selected multiple times (and other points are not selected for a test set at all), possibly introducing bias. The disadvantage of k-fold cross-validation is that it only evaluates a limited number of splits whereas Monte Carlo cross-validation evaluates as many split as you desire by increasing the number of iterations (although you could iterate the entire k-fold cross-validation procedure as well which is commonly called repeated k-fold cross-validation).\n\nNote that in both Monte Carlo cross-validation and k-fold cross-validation we are generating many models instead of a single final model, e.g., because the feature selection algorithm might select different features or the regression produces different coefficients due to different training data. Cross-validation is used to identify the best method (i.e. data pre-processing, algorithm choice etc.) that is to be used to construct your final model. When you have identified the optimal method you can then train your model accordingly on all the available data.\n\nA common mistake in any method where the dataset is split into training and test sets is to allow data leakage to occur [37]. This refers to using any data or information during model generation that is not part of the training set and can result in overfitting and overly optimistic model performance. It can happen for example when you do feature selection on the total dataset before applying the split. In general it is advised to perform any data pre-processing steps after the data has been split and using only information available in the training set.\n\n8.5.3 External Validation\n\nThe true test of a prediction model is to evaluate its performance under external validation, or separate datasets from the training dataset. Preferably, this is performed on new data acquired from a different institution. It will indicate the generalizability of the model and show whether it is overfitted on the training data. If this can be performed on multiple external validation sets, this further strengthens the acceptance of the prediction model under evaluation.\n\nIt has to be noted that if the datasets intended to be used for external validation are collected by the same researchers that built the original prediction model, this is still not an independent validation. Independent external validation, by other researchers, is the ultimate test of the model generalizability. This requires open and transparent reporting of the prediction model, of inclusion and exclusion criteria for the training cohort and of data pre-processing steps. Additionally, it is encouraged to make the training data publicly available as this allows other researchers to verify your methodology and results and greatly improves reproducibility.\n\n8.6 Summary Remarks\n\n8.6.1 What Has Been Learnt\n\nIn this chapter you have learnt about the importance of the bias-variance tradeoff in prediction modeling applications. You have learnt how to generate a simple logistic regression model and what metrics are available to evaluate its performance. It is important to not limit the evaluation to model discrimination only, but also include calibration as well. Finally, we have discussed the importance of separating training and test sets so that we protect ourselves from overfitting. Internal validation strategies such as cross-validation are discussed, and the ultimate test of a prediction model, independent external validation, has been emphasized.\n\n8.6.2 Further Reading\n\nThe field of prediction modeling and machine learning is extremely broad and in this chapter we have only scratched the surface. A good place to start with further reading on the many aspects of prediction modeling is the book “Clinical Prediction Models – A Practical Approach to Development, Validation, and Updating” by Steyerberg [38]. If you are looking to improve your knowledge and simultaneously improve your practical modeling skills the book “An Introduction to Statistical Learning – with Applications in R” by James et al. is highly recommended [8]. Finally, if you want to go in-depth and understand the underlying principles of the many machine learning algorithms the go-to book is “The Elements of Statistical Learning – Data Mining, Inference, and Prediction” by Hastie et al. [39].\n\n\n 1. 1.\n Goodman S. A dirty dozen: twelve P-value misconceptions. Semin Hematol. 2008;45(3):135–40.CrossRefPubMedGoogle Scholar\n 2. 2.\n Banerjee A, Chitnis UB, Jadhav SL, Bhawalkar JS, Chaudhury S. Hypothesis testing, type I and type II errors. Ind Psychiatry J. 2009;18(2):127–31.CrossRefPubMedPubMedCentralGoogle Scholar\n 3. 3.\n Kuhn M, et al. Caret: classification and regression training, 2016.Google Scholar\n 4. 4.\n Pedregosa F, et al. Scikit-learn: machine learning in Python. J Mach Learn Res. 2011;12:2825–30.Google Scholar\n 5. 5.\n Anaconda distribution: The most popular Python/R data science distribution. [Online]. Available:\n 6. 6.\n R: The R Project for Statistical Computing. [Online]. Available:\n 7. 7.\n RStudio: Open source and enterprise-ready professional software for R, RStudio. [Online]. Available:\n 8. 8.\n James G, Witten D, Hastie T, Tibshirani R. An introduction to statistical learning – with applications in R. 1st ed. New York: Springer; 2013.CrossRefGoogle Scholar\n 9. 9.\n Python: The official home of the Python Programming Language. [Online]. Available:\n 10. 10.\n Spyder: The Scientific PYthon Development EnviRonment. [Online]. Available:\n 11. 11.\n Jupyter: Open-source web application for live coding, data visualizations, numerical simulation, statistical modeling and more. [Online]. Available:\n 12. 12.\n Müller A, Guido S. Introduction to machine learning with Python. Sebastopol: O’Reilly Media; 2016.Google Scholar\n 13. 13.\n Matlab: The easiest and most productive software environment for engineers and scientists. [Online]. Available:\n 14. 14.\n Murphy P. Machine learning: a probabilistic perspective. Cambridge: The MIT Press; 2012.Google Scholar\n 15. 15.\n SPSS: The world’s leading statistical software used to solve business and research problems by means of ad-hoc analysis, hypothesis testing, geospatial analysis and predictive analytics. [Online]. Available:\n 16. 16.\n George D, Mallery P. IBM SPSS statistics 23 step by step: Pearson Education; 2016.Google Scholar\n 17. 17.\n SAS: SAS/STAT State-of-the-art statistical analysis software for making sound decisions. [Online]. Available:\n 18. 18.\n SAS/STAT® 13.1 User’s Guide. SAS Institute Inc, 2013.Google Scholar\n 19. 19.\n Orange: Open source machine learning and data visualization for novice and expert. [Online]. Available:\n 20. 20.\n Weka: Data mining software in Java. [Online]. Available:\n 21. 21.\n Witten I, Frank E, Hall M, Pal C. Data mining: practical machine learning tools and techniques. Burlington: Morgan Kaufmann; 2016.Google Scholar\n 22. 22.\n RapidMiner Studio: Visual workflow designer for data scientists. [Online]. Available:\n 23. 23.\n Efron B. Logistic regression, survival analysis, and the Kaplan-Meier curve. J Am Stat Assoc. 1988;83(402):414–25.CrossRefGoogle Scholar\n 24. 24.\n Walters SJ. Analyzing time to event outcomes with a Cox regression model. Wiley Interdiscip Rev Comput Stat. 2012;4(3):310–5.CrossRefGoogle Scholar\n 25. 25.\n van der Maaten LJP, Postma EO, van den Herik HJ. Dimensionality reduction: a comparative review. Tilburg University Technical Report TiCC TR 2009-005; 2009.Google Scholar\n 26. 26.\n Vrieze SI. Model selection and psychological theory: a discussion of the differences between the Akaike information criterion (AIC) and the Bayesian information criterion (BIC). Psychol Methods. 2012;17(2):228–43.CrossRefPubMedPubMedCentralGoogle Scholar\n 27. 27.\n Dash M, Liu H. Feature selection for classification. Intell Data Anal. 1997;1(3):131–56.CrossRefGoogle Scholar\n 28. 28.\n Tibshirani R. Regression shrinkage and selection via the Lasso. J R Stat Soc Ser B Methodol. 1996;58(1):267–88.Google Scholar\n 29. 29.\n Zou H, Hastie T. Regularization and variable selection via the elastic net. J R Stat Soc Ser B Stat Methodol. 2005;67(2):301–20.CrossRefGoogle Scholar\n 30. 30.\n Fawcett T. An introduction to ROC analysis. Pattern Recogn Lett. 2006;27(8):861–74.CrossRefGoogle Scholar\n 31. 31.\n Steyerberg EW, et al. Assessing the performance of prediction models: a framework for some traditional and novel measures. Epidemiology. 2010;21(1):128–38.CrossRefPubMedPubMedCentralGoogle Scholar\n 32. 32.\n Moons KGM, et al. Risk prediction models: I. Development, internal validation, and assessing the incremental value of a new (bio)marker. Heart. 2012;98(9):683–90.CrossRefPubMedPubMedCentralGoogle Scholar\n 33. 33.\n Steyerberg EW, Vergouwe Y. Towards better clinical prediction models: seven steps for development and an ABCD for validation. Eur Heart J. 2014;35(29):1925–31.CrossRefPubMedPubMedCentralGoogle Scholar\n 34. 34.\n Austin PC, Steyerberg EW. Graphical assessment of internal and external calibration of logistic regression models by using loess smoothers. Stat Med. 33(3):517–35.CrossRefPubMedPubMedCentralGoogle Scholar\n 35. 35.\n Xu Q-S, Liang Y-Z. Monte Carlo cross validation. Chemom Intell Lab Syst. 2001;56(1):1–11.CrossRefGoogle Scholar\n 36. 36.\n Rodriguez JD, Perez A, Lozano JA. Sensitivity analysis of k-fold cross validation in prediction error estimation. IEEE Trans Pattern Anal Mach Intell. 2010;32(3):569–75.CrossRefPubMedGoogle Scholar\n 37. 37.\n Luo W, et al. Guidelines for developing and reporting machine learning predictive models in biomedical research: a multidisciplinary view. J Med Internet Res. 2016;18(12)CrossRefPubMedPubMedCentralGoogle Scholar\n 38. 38.\n Steyerberg E. Clinical prediction models: a practical approach to development, validation, and updating. New York: Springer-Verlag; 2009.CrossRefGoogle Scholar\n 39. 39.\n Hastie T, Tibshirani R, Friedman J. The elements of statistical learning: data mining, inference, and prediction. New York: Springer-Verlag; 2001.CrossRefGoogle Scholar\n\nCopyright information\n\n© The Author(s) 2019\n\n\n\nAuthors and Affiliations\n\n • Frank J. W. M. Dankers\n • 1\n • 2\n Email author\n • Alberto Traverso\n • 1\n • Leonard Wee\n • 1\n • Sander M. J. van Kuijk\n • 3\n 1. 1.Department of Radiation Oncology (MAASTRO), GROW School of Oncology and Developmental Biology (GROW)Maastricht University Medical CenterMaastrichtThe Netherlands\n 2. 2.Department of Radiation OncologyRadboud University Medical CenterNijmegenThe Netherlands\n 3. 3.Department of Clinical Epidemiology and Medical Technology Assessment (KEMTA)Maastricht University Medical CenterMaastrichtThe Netherlands\n\nPersonalised recommendations", "pred_label": "__label__1", "pred_score_pos": 0.5574972033500671} {"content": "Biography Duke Ellington\n\nDuke Ellington\ncalled his music 'American Music' rather than jazz, and liked to describe those who impressed him as 'beyond category. He remains one of the most influential figures in jazz, if not in all American music and is widely considered as one of the twentieth century's best known African American personalities. As both a composer and a band leader, Ellington's reputation has increased since his death, with thematic repackaging of his signature music often becoming best-sellers. Posthumous recognition of his work include a special award citation from the Pulitzer Prize Board.\n\n\nSimply put, Ellington transcends boundaries and fills the world with a treasure trove of music that renews itself through every generation of fans and music-lovers. His legacy continues to live onand will endure for generations to come. Winton Marsalis said it best when he said 'His music sounds like America.' Because of the unmatched artistic heights to which he soared, no one deserved the phrase “beyond category” more than Ellington, for it aptly describes his life as well. He was most certainly one of a kind that maintained a lifestyle with universal appeal which transcended countless boundaries.\n\nDuke Ellington is best remembered for the over 3000 songs that he composed during his lifetime. His best known titles include; 'It Don't Mean a Thing if It Ain't Got That Swing', 'Sophisticated Lady', 'Mood Indigo', “Solitude', 'In a Mellotone', and 'Satin Doll'. The most amazing part about Ellington was the most creative while he was on the road. It was during this time when he wrote his most famous piece, 'Mood Indigo'which brought him world wide fame.\n\n\n\n\n\" class=\"ng-binding ng-scope\">Duke Ellington And His Orchestra\n\n© 2010-2020 HIGHRESAUDIO", "pred_label": "__label__1", "pred_score_pos": 0.9903404712677002} {"content": "Tara Maya\n\n\nFaery Realms-final fix\n\n*Purchased individually, these books cost over $15 – List price $9.99 – Save 90% – Now on sale for only $0.99 cents!*\n\nDownload the bundle from Amazon, Barnes and Noble, Kobo, Smashwords, or Google Play.\n\n\n\nBest for ages 13 and up.\n\nFaery Realms Final 3D\n\n\n\nTHE WITHERING PALACE (A Dark Faerie Tale 0.1)ALEXIA PURDY *Exclusive Content*\n\nUntold darkness rules the Unseelie realm of the Land of Faerie. Hidden in this vast area, Aveta, the future queen of the Unseelie Army, perfects her gifts over lifetimes. Learning that magic isn’t the only way to manipulate the world around her, this naive girl grows into a woman of strength and cunning, ultimately becoming one of the most feared leaders in Faerie.\n\n\n\n\nHigh-tech gaming and ancient magic collide when a computer game opens a gateway to the treacherous Realm of Faerie. Jennet Carter never thought hacking into her dad’s new epic-fantasy sim-game would be so exciting… or dangerous. But behind the interface, dark forces lie in wait, leading her toward a battle that will test her to her limits and cost her more than she ever imagined. (65 pages)\n\n\n\nHOOD & FAE (Daughters of Red Riding Hood)TARA MAYA *Exclusive Content*\n\n\n\n\n\n\n\nHarmony’s life will never be the same… Every day is just as normal, and just as boring, as the one before it… And then the Carnival comes to town. Suddenly, Harmony’s small town world is overtaken by the handsome Kieran and she discovers that not all fairy tales are pretend. (140 pages)\n\n\n\n\n\n“Turmoil, heartache and unexpected romance – all three are immersed into this tale of the Fae.”— Craving YA Reads review of Dark Promise\n\n\n\n“Enter the World of the Fae: Magical worlds aren’t just for young adults, I enjoyed this tale and look forward to reading the other books in this series.” –ParaNormal Romance Reviews of The Dark Fae\n\n\n“Once I started this book I could not put it down, I had to know what happened next.” ~ Amazing Book Come To Life review of Once (Gypsy Fairy Tale)\n\n\nA stand-alone short science fiction novel.\n\nPublication year: 2013\nFormat: ebook\nPage count: 192 including several appendixes and glossaries\n\nThe book is set between 5025 and 5040, covering many years of the main character’s life, spent mostly in warfare.\n\nThe story starts on the year 5025 when humankind has spread to many planets and many galaxies. The story is set in a different planet, Neraka, which is pretty hostile place to live. The humans have to wear breathers and full bodysuit, which has been changed into armor, called “kits” in order to stay alive. On this planet, feudal lords control the machinery and therefore the population. They use various mind control technologies on the thralls, who are the lowest class workers on the planets (their minds are wiped to make them compliant), and even on their wives to make them loyal to their husbands. The lords also use combat mechs.\n\nCharlie Cooper is a Fredder. He’s part of a community which is fiercely independent from any feudal lords and refuses to have their minds altered. He’s 18 and about to me married to his sweetheart Bernisse. After they exchange their vows, Charlie leaves for the traditional walk but during it he notices that a heavily armed mechs are advancing on his village. He gives warning but lord Domany tries to blackmail and threaten the village into giving him food and repairs. Charlie is close to his mech and manages to ambush the lord. However, the villagers find out that the lord is badly wounded and give him aid. This is something of a mistake, because another, more powerful lord is after Domany. It turns out that Domany is very much down on his luck: he’s wounded and has only a couple of mechs to help him. However, the Fredders don’t want to ruled by the conquering lord, so they agree to help Domany.\n\nIn the middle of battle, Charlie’s new wife Benisse is abducted by the attacking lord’s henchmen. Charlie is wounded and knows that he has no way of rescuing Benisse. But Charlie finds himself in the land of the Sulphines, almost mythological aliens whom nobody has seen in hundreds of years. They are supposed to be sulfur-based and retreated after humans settled on Neraka. However, now their Queen confronts Charlie and gives him a choice: to die or to use the helm of Brin. The helm has the memories of a thousand years of warfare but using it would be a Fredder’s greatest nightmare; losing his mind to the personalities and memories in the helm. Charlie hesitates but he knows it’s the only way to save his wife, even though he will be dead to her.\n\nAt the start of the book, Charlie is a pretty simple farm boy. He knows the dangers of the land he lives in and his culture and behaves accordingly. For example, he’s never seen Benisse without her breather until the wedding ceremony. He’s also somewhat reckless when he defends his town but he knows what he can do and takes calculated risks. When he puts on the helmet, he doesn’t feel any difference, but it’s very clear to the reader: his narrative voice changes from a (readable) brogue to more standard English. Later he even gets a British accent. He also becomes more ruthless and struggles to keep his initially good character.\n\nThe book has a lot of fighting, especially during the latter half. However, I was more interested in the various cultures. Except for the Fredders, they all use technology to alter memories or personalities. However, they use it somewhat differently. Neraka’s lords use it to keep other people in line but we find out that this a rather old-fashioned way of using the tech. The lords also have duels between single warriors and their armored mech rather than wars, which is very medieval.\n\nThe central themes of the book are what is real and what is not, and whom can you trust. When other people can change your memories, your emotions, your thoughts, what can be real?\n\nToday I’m excited to join the blog tour for Blood, the sixth book in Tara Maya’s The Unfinished Song series which is set in a fantastical Neolithic Age. You can buy Blood and all Maya’s other books via Amazon and other book retailers. Tara Maya’s blog has lots of information about writing in general in addition to her book info.\n\nPublication year: 2013\nFormat: ebook, Kindle\nPublisher: Misque Press\n\nThe previous book in the series, Wing, ended in a very exciting cliffhanger and I was anxious to continue the series. Blood continues immediately where Wing ended.\n\nDindi has been captured by Umbral who is a Deathsworn. The Lady Death commanded Umbral to kill Dindi, her love Kavio, and all of the remaining Aelfae. Umbral has already killed Kavio but now he and Dindi face a common enemy, the Bone Whistler who is secretly one of the two Aelfae left in the world. The Bone Whistler has a plan to kill all of the humans and to resurrect the Aelfae who were killed in a war with humans. Dindi and Umbral reached an uneasy truce to kill the Bone Whistler before he can set his plan into motion.\n\nHowever, a part of it is already working. Six Aelfae have been resurrected, brought forward in time from the past. Also, because of the resurrection magic the other remaining Aelfae, Vessia, has lost her memories of the intervening time. Vessia married a mortal man and had a son with him but now she doesn’t remember that. All she wants is to rid the world of humans because her last memories are of the brutal war between the Aelfae and the humans.\n\nMeanwhile, Finnandro the champion of the Green Lady had been forced into uneasy truce, as well. His tribe and another fought each other but now Finnandro is forced to work with the enemy tribe in order to kill Umbral. Unfortunately, the leader of the enemy tribe, the Orange Canyon, is no other the Bone Whistler himself and he manages to charm Finnandro into a willing ally.\n\nHowever, the resurrected Aelfae don’t know that there’s a traitor among them. Their greatest enemy, the Lady Death herself, has disguised herself as one of them and plans to kill them all.\n\nBlood is just as good as rest of the series. The plot has twists and turns which I, at least, couldn’t see coming. We get to know a lot more about both Umbral and Finnandro in flashbacks about their past.\n\nDeception seem to be this book’s theme. A lot of people are deceived in this book. Not only has the Lady Death disguised herself and deceiving the Aelfae but the Bone Whistler uses his powers to charm other people to trust him, while he’s advancing his plan. He’s also an accomplished liar and can turn any event to his advantage when given enough time to either explain or let other people draw their own, wrong, conclusions. Vessia has lost her memory and is convinced that she couldn’t possibly have married a human. Umbral has the Obsidian mask which can make anyone who looks at him see the person they want to see.\n\nI continue to be fascinated with this Stone Age world. Most of the tribes don’t have a king or nobility but are instead lead by elected leaders. The one exception is of course the Bone Whistler who uses his charm and power to keep his people in line. The Orange canyon tribe has the Raptor Riders and their slaves who can change their shape into huge raptor birds. The Aelfae are a bit puzzled by this and claim that the Riders have also shape changing magic. The tribe is pretty cruel towards their own members, too.\n\nThe new element in the book are the resurrected Aelfae. We get to see how they lived during the war and presumably before it. They seem to be pretty self-centered, tormenting Dindi for their own amusement. They’re also dismissive of humans because they see the humans as enemies. When the Bone Whistler revealed to them that he lives among humans as their war chief, the Aelfae were shocked and dismayed. However, they agree to live as guests in the human village and even take part in their celebrations.\n\nA word of warning, though: the book has pretty gruesome torture scenes. The torture is seen both from the eyes of the tortured and the torturer, and it’s quite disturbing.\n\nToday I’m excited to join the blog tour for Wing, the fifth book in Tara Maya’s fantasy series Unfinished Song which is set in a fantastical Neolithic Age. You can buy Wing and all Maya’s other books via Amazon and other book retailers. Tara Maya blog‘s has lots of information about writing in general in addition to her book info.\n\nPublication year: 2012\nFormat: ebook\nPage count: 198 in pdf\nPublisher: Misque Press\n\nThe Unfinished Song series has been full of surprising twists and the latest book continues in the pattern. Maya isn’t afraid to do nasty things to her characters, even killing them. The book starts immediately after the shocking ending of the previous book, Root.\n\nMost of the point-of-view characters are the same as in the previous book. Dindi is the main character of the series but the other POV characters were introduced in Root or Sacrifice.\n\nThe young maiden Dindi has just been kidnapped by one of the Deathsworn, Umbral. Umbral is determined to kill her because she has a connection to the high faeries, the Aelfae, and Umbral is convinced that Dindi can help the Aelfae return to the world. The Deathsworn have killed almost all of the Aelfae and want to now finish their job. However, Dindi is a resourceful girl. When Umbral tries to kill her almost immediately, Dindi manages to trigger a vision which delays Umbral and makes him think that Dindi would be useful to him. So, Umbral suggests a bargain: as long as Dindi will see visions, Umbral doesn’t kill her.\n\nUnfortunately, Umbral thinks that Dindi’s visions are about the current day and about the White Lady, Vessia, who is one of the few remaining Aelfae. While Dindi’s visions are about Vessia, they are twenty years in the past. Dindi is trying to be as vague as possible about her visions, so that Umbral doesn’t realize it. Also, Umbral has confessed that he has killed Dindi’s beloved Kavio. Because Umbral has one of the six objects of power, he looks like Kavio to Dindi. Dindi is looking for a way to avenge her beloved but the way Umbral looks like Kavio is unsettling to her.\n\nUmbral is a devotee of the Black Lady, Death. He has done terrible things in the past but doesn’t remember anything from the time before he became a Deathsworn. The Deathsworn, the servant of the dead, separate the dead and the dying, and most of the time they kill people who are too badly wounded or diseased to live. However, Umbral has also attacked, tortured, and killed healthy people which Deathsworn shouldn’t do. He leads the Deathsworn group with intimidation, violence, and fear.\n\nHowever, Umbral is becoming increasingly attracted to Dindi. He kills people either with weapons or by absorbing the magical Chromas, the life force, of his victim. Sometimes when he has absorbed someone, the victim’s memories still linger with him. Umbral’s immediate goal is to kill the White Lady because he’s convinced that the faeries will kill humans if they aren’t killed first. He seems relieved when he has an excuse to keep Dindi alive. They must track the White Lady and work together while traveling through wilderness.\n\nVessia, the White Lady, has been kidnapped by her husband’s brother and niece. They loath Vessia and are trying to use her as a leverage against her politically powerful (human) husband. However, even though Vessia has lost her immortality, she’s far from helpless.\n\nFinnadro the Wolf Hunter is the Henchman of the Green Lady, Vessia’s sister faery. He loves his mistress unreservedly and has even rejected human lovers in favor of her. He’s a great hunter and warrior. In the past, Umbral tortured him and left him for dead. Now, he has an excuse to hunt Umbral and maybe save both Dindi and Vessia.\n\nIn the previous book Dindi and her traveling group of dancers were staying in a village called Green Woods. The village was attacked by a group of Raptor Riders and the warriors of the Orange Canyon tribe. The fight was brutal and many died on both sides. The Green Woods warriors want revenge and send a group to the Orange Canyon lands. Among the Green Woods warriors are a few of Dindi’s friends.\n\nTamio and Hadi are both young warriors and Dindi’s friends. However, while Tamio is expecting the next battle and the glory he will get from killing other warriors, Hadi knows that he’s a lousy warrior (and a hunter) and he’s dreading the fight, thinking that he will be killed. Also, Hadi wants to protect his sister who was married just before the fight – and widowed during it. One of the shape shifters rescued Hadi during the fight and now Hadi owes a liftdebt to him. However, the shape shifter has his eye on Hadi’ sister and takes her as a servant in Hadi’s place. Hadi isn’t happy about it but can’t change it.\n\nGenerally, I don’t really care for books with multiple POV characters because most of the time it’s hard to distinguish the young white male warriors from each other and sometimes they aren’t needed to advance the plot. However, in this series all of the POV characters have been so different from each other that I have no problem distinguishing them from each other, even when they travel in the same group. Also, they all have their own problems which don’t necessarily directly tie into the main plot. Even Tamio has an interesting, and appropriate, subplot. I could barely stand him in Sacrifice where he was first introduced.\n\nMost of the book is written in third person but each seven chapters start with a short section in first person. They all give great insight to the character because they all describe a significant event in that person’s history. For example, Finnadro’s first person section is his memory of how he won himself the Shining name of Wolf Hunter and we also get to know a little about his family and tribe. We also get insight into Dindi (in fact she gets insight into her own feelings) but her narration is for the present and not from past.\n\nI’m just wondering a little about the ending. Dindi developed very handy new abilities earlier in the book. Why didn’t she use them at the end where they would have been very, very useful? I suspect it’s because they are new and she couldn’t rely on them but she could have even thought about them or tried to use them.\n\nEach book in the series so far has expanded the world and this book is no exception. We get to know more about the Raptor Riders. They are humans who have enslaved magic users who can change their shape into various raptors. However, the riders have their secrets, too. In Root we found out that some of the Green Woods people are born as shapeshifters, wolves. Most of them are banished into the wilderness and are called wildlings. Finnadro knows them and can even ask them for help. Apparently, it’s also his job to make sure that they don’t bother the tribesmen. Now, we see that some of the shapeshifters can shift into different forms but they seem to be even more shunned than the wolves. We also get to hear a couple of the old legends which I found fascinating. We also get to see a few scenes from the war between humans and the Aelfae. In Dindi’s visions about Vessia we get to see how a human and a fae try to build a life together and it isn’t easy. And Dindi and Umbral encounter a new human clan during their travels.\n\nWing is another great continuation with twists and turns. It’s ends with a great cliffhanger!\n\nThe fourth book in the fantasy series Unfinished Song which is set in a fantastical Stone Age.\n\nPublication year: 2011\nFormat: ebook, pdf\nPage count: 150\nPublisher: Misque Press\n\nSome time seems to have gone by after then end of the previous book, Sacrifice. The group of Initiate Tavaedis, magical dancers, have been formed into a performance troop under their teacher Abiono and they have traveled away from the Yellow Bear clan. Unfortunately, Abiono is an old man and unable to control the young dancers. Dindi is working as the Tavaedi’s serving maiden and has been given permission to learn the dances openly. However, a spoiled girl from the previous book, Kemla, is part of the group and as the most popular girl is apparently leading the women of the group. She seems to hate Dindi because the red fae, whom only Kemla and Dindi can see, constantly tease Kemla that Dindi is a better dancer than Kemla and that Dindi should take Kemla’s place as the star performer. Since Kemla can’t punish the fae or make them silent, she takes her rage out on poor Dindi, treating her as a slave. She takes things so far that she urges Tamio to sleep with Dindi so that Kemla can reveal it publicly and Dindi will be thrown out of the party. Apparently, there are no consequences for Tamio?\n\nNow Dindi she can practice as much as she wants even though the others are pretty cruel to her (and once again the adults just stand by and let this happen). However, she was forced into a bargain with the fae in the previous book; she will have to find a way to lift the Curse from the Aelfae and bring them back from the dead. Dindi is using her corncob doll to find a way to do that. However, Tamio is hounding her so there’s not much time to do it. She also found out that there’s a hex on her family and she’d like to find a way to undo that, as well.\n\nMeanwhile Kavio’s fae mother Vessia, known as the fae White Lady, is determined to help her son by finding women who could become the next Vaedi, the wife of the war chief. However, she’s being held captive by her own nephew. She manages to escape with the help of a young warrior and they set out to flee Vessia’s own tribe. They come across the Lost Swan tribe looking like a pair of beggars. Kemla denies them hospitality but Dindi shares her meager food and shelter with them.\n\nThen, a group of warriors attack. They ride on big birds and kill some of the people before the nearby tribes come on horseback to aid them.\n\nUmbral is a new characters and so is his group. He is a leader of a group of Deathsworn; those who serve the Lady Death. They all seem to have some sort of physical deformity and so they have been sent to the Deathsworn. Even the women have physical deformities and this was a refreshing change form the “flawless skin” princesses of fantasy. They are eager to kill people and are investigating a magical plague which devours people’s spirits. They also want to kill Vessia and the next Vaedi. Umbral comes across traces of a magic both ancient and fresh. Quickly, he becomes obsessed with the maiden who has left such traces behind her.\n\nDindi’s visions with the Corn Maiden seem to be over and she now sees into the life of Mayara, who is the last survivor of an Aelfae settlement. As a little girl, Mayara suffers horrible things: her mother cuts off her wings so that the humans wouldn’t kill her. Then her mother hides her just before the humans come and little Mayara sees her people slaughtered. Later, she wanders alone in the woods until a human finds her and takes her home, to live among his family.\n\nEven though the group is performing and working magic in the Lost Swan tribe, Dindi’s tribe, she’s treated poorly. She is sent to sleep in a very cold hut and given only a small amount of food. However, this doesn’t seem to be her home tribe because we don’t see her parents or other close family.\n\nThere are some differences in the setting. Specifically, riding mounts. The Raptor Riders have large predatory birds which they use to ride on and the Broken Basket and Full Basket clans have horses. Unfortunately, the inclusion of horse made the setting less unique to me. Part of my enjoyment of the books have been their setting which is rather different from all the pseudo-medieval settings which are very common in fantasy. The use of horses makes the setting more familiar and less unique. In the previous book, there was a mention of gold and jewelry so the people have the means to smelt metals and work them quite intricately.\n\nTwo of the point-of-view characters are unfortunately pretty insufferable to me: Kemla and Tamio. They both start as arrogant and self absorbed to the point that they have no compassion or empathy to anyone else. We get to know more about them but they never really reform. Tamio is a unabashed womanizer and the best thing that can be said about him is that he isn’t a rapist. The Deathsworn are interesting and I hope we get see more of them.\n\nI also found it a bit weird that while there are lots of talk about sexual conquests, none of the women worry about getting pregnant. However, in the previous book there was a brief mention that illegitimate kids are “unwelcome” and that a man will have to either marry a girl he gets pregnant or pay with foods and other stuff. The latter seems to be more common. Yet, the woman is expected to care for the kid and surely a poor woman without much kin, such as Dindi, or an ambitious Tavaedi such as Kemla, should be worried about being able to rise a kid. Of course, dwelling over such things would slow down the pace and possibly bore the reader. Unfortunately, this society too has the sexual double standard for women and men.\n\nThere are two new tribes in the book, the Green Woods tribe and Raptor Riders. Both are warrior clans which have quite different customs than the tribes we’ve seen so far. For example, both men and women can be warriors in both clans. They also have shape shifters. The Raptor Riders use huge birds and enslave them while some of the Green Woods people can turn into wolves. However, these wolflings aren’t tolerated until they can control themselves. They are banished into the woods to presumably learn control but, not surprisingly, most seem to live in the woods all their lives, and attack people occasionally. A bit disappointingly, at least in the Green Woods tribe the women have to tend to their chores in addition to being warriors while the men sit and talk.\n\nThe plot is again fast paced and full of twists, some of them unexpected. The book ends in a cliffhanger. More things happen in every short book than some established writers manage to put into 600 page books.\n\nThe third book in the fantasy series Unfinished Song which is set in a fantastical Stone Age.\n\nPublication year: 2011\nFormat: ebook, pdf\nPage count: 173\nPublisher: Misque Press\n\nThe book starts soon after the ending of the previous book, Taboo.\n\nThe peace party is returning back to the Yellow Bear tribe, defeated. Kavio was the leader and the organizer of the party but he was betrayed almost at every turn. High ranking warrior and an obnoxious bully Vultho, who had been a part of the peace party, had ordered his warriors to attack an enemy clan hold and so in effect ended any chance for peace. The rest of party had been captured and tortured but managed to escape. Kavio has been told that if the peace party isn’t a success, he will die.\n\nWhen they are near Yellow Bear clan hold, they are warned that Vultho is the new War Chief. Kavio is able to bluff his and his party’s way back into the tribe. However, Vultho doesn’t make his life easy. The clan prepares for war.\n\nMeanwhile Dindi, the clumsy and magickless maiden, has her own troubles. She is still determined to learn the magical dances and Kavio is willing to teach her, in secret. However, this means that Dindi spends pretty much all of her time away from other people and her age mates resent that. Dindi has a hexed corn cob doll which sends her visions, sometimes in very unfortunate times. She’s trying to destroy it but hasn’t succeeded.\n\nDindi’s friend Gwenika also isn’t very popular and she finds out that the young Initiates have a cruel tradition: they choose from among them one hapless person, who is called the Duck and torment him or her until the Duck kills himself or herself. To her horror, Gwenika finds out that she is one of the candidates this year. However, her sister Gwena has missed Gwenika and stands up for her. Unfortunately, Dindi is chosen as the Duck.\n\nBrena, the adult magic dancer, gets back to teaching the Initiates. But she can’t stop worrying about the coming war and she doesn’t have any patience for the youngsters anymore. When she confesses this, she’s sent to the other tribes as an envoy to gather allies against the Blue Waters tribe.\n\nEven though Kavio is quite young, he has already a lot of enemies. Yellow Bear’s former War Chief Hertio is an old friend but even Hertio is trying to use Kavio to his own advantage. Kavio has to keep alert against any ploy the current War Chief would use against him and train a group of warriors in secret, because Vultho would never allow him to train them.\n\nThis third book has more romance than the previous books. Brena and Rthan became lovers in the previous book, Taboo, despite the fact that they come from warring tribes and that Rthan was Brena’s slave. At the end of the book, Rthan decided to stay (and fight) with his own tribe and they separated. Now, they are set directly against each other. Brena is the champion of a fae known as the Golden Lady. The Golden Lady is dying from a wound from the Black Arrow. Only if the Black Arrow takes another’s life, can the Golden Lady be healed. The fae hinted that there are only a few people who can be this victim but Brena is looking for a way to kill someone else than people whom she considers innocents. Rthan is a warrior of the Blue Waters tribe but he’s also a champion of the fae Blue Lady who wants to kill the Golden Lady because they are ancient enemies. The Blue Lady has taken on the form of Rthan’s eight year old daughter who was killed by the Yellow Bear tribe’s current war leader. In addition, the chiefs of their respective tribes have sent Rhtan and Brena to other tribes as envoys to try to persuade the other tribes to join them.\n\nDindi and Kavio are another romantic couple with romance troupes. They both struggle against their attraction to each other, thinking that the other can’t be attracted to her/him or even if he/she is, they can’t be together because Dindi doesn’t have any magic and Kavio is a powerful magic user. Still, Kavio is teaching Dindi the forbidden magical dances and they have to spend a lot of time together. Fortunately, they don’t dwell on their feelings too much.\n\nThere’s a new POV character, Tamio. However, he’s seen only a few times when the plot demands it. He’s a young Yellow Bear Initiate, ambitious and not too picky about whom he serves. He’s in the group Kavio is training to fight in water but later he doesn’t mind siding with Vultho when it seems advantageous. He’s also handsome and uses that to get girls.\n\nUnfortunately, I found Vultho to be almost a caricature as a villain. He’s crude, arrogant, and quick to anger. He has celebrations which wastes valuable food. He also doesn’t seem to be able to plan much. This is somewhat explained with his background; apparently he used to be bullied a lot and when he now has power, he uses it to his own satisfaction.\n\nHowever, I can believe that the teenagers would choose one hapless person amongst themselves and hound him or her to death. That’s just the sort of cruelty and malice teens are capable of and don’t necessarily even think much about. It’s said that all Initiates know about this, which means that all of the adults know about it, too, and yet nobody interfered. Tacitly, all the adults seems to think that this is just ok which makes them pretty awful.\n\nThe rest of the cast are more complex. Gwenika turning on her (former) friend is something that some people do when there’s a right reason. Dindi struggles to fulfill her life long dream against all the odds and Kavio tries to keep the peace.\n\nThe faeries have a much larger role in Sacrifice than in either of the previous books. They aren’t just manipulating humans but fight themselves. We also get to meet all six types of High Fae and get to know a little about their relations, and about their physical forms. The faeries have six types, the same as there are six magical colors.\n\nThe plot is again very fast paced and full of twists. Several of the plot lines and questions from the previous books are answered here but a couple of new plot lines are introduced with high stakes. This was a great and surprising continuation to the series, and I have a feeling that some of the cast is going to change.\n\n\nPublication year: 2011\nPage count: Kindle doesn’t have page numbers\nSize: 451 KB\nFormat: ebook\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nNext Page »", "pred_label": "__label__1", "pred_score_pos": 0.5381011962890625} {"content": "A Level Playing Field\n\nEveryone is treated fairly.\n\nOnce a candidate has completed an application, five Evaluation Panel members will be assigned to score each application that is determined valid or eligible during our Administrative Review process. Evaluation Panel members will offer both scores and comments for each of four distinct traits in our rubric. Each of the four traits will be scored on a 0-5 point scale, in increments of 0.1. Those scores will combine to produce a total score. Examples of possible scores for a trait are… 0.4, 3.7, 5.0, etc.\n\nThe most straightforward way to ensure that every candidate is treated by the same set of standards would be to have the same Evaluation Panel members score every valid application; unfortunately, due to the number of candidates that we will receive, that is not possible.\n\nSince the same candidates will not be scored by every Evaluation Panel member, the question of fairness needs to be carefully explained. One Evaluation Panel member scoring a candidate may have a more critical disposition, giving every assigned candidate a range of scores only between 1.0 and 2.0, as an example; meanwhile, another Evaluation Panel member may be more generous and score every candidate between 4.0 and 5.0. \n\nFor illustrative purposes, let’s look at the scores from two hypothetical judges:\n\nJudge1scorestop Judge2scorestop\n\nThe first judge is far more generous in scoring than the second one, who gives much lower scores. If a candidate’s application was rated by the first judge, it would earn a much higher total score than if it was assigned to the second judge.\n\nWe have a way to address this issue. We ensure that no matter which judges are assigned, each valid application will be treated fairly. To do this, we utilize a mathematical technique relying on two measures of distribution, the mean and the standard deviation.\n\nThe mean takes all the scores assigned by a judge, adds them up, and divides them by the number of scores assigned, giving an average score.\n\nFormally, we denote the mean like this: \n\n\nThe standard deviation measures the “spread” of a judge’s scores. As an example, imagine that two judges both give the same mean (average) score, but one gives many zeros and fives, while the other gives more ones and fours. It wouldn't be fair, if we didn’t consider this difference.\n\nFormally, we denote the standard deviation like this: \n\n\nTo ensure that the judging process is fair, we rescale all the scores to match the judging population. In order to do this, we measure the mean and the standard deviation of all scores across all judges. Then, we change the mean score and the standard deviation of each judge to match.\n\nWe rescale the standard deviation like this:\n\n\nThen, we rescale mean like this:\n\n\nBasically, we are finding the difference between both distributions for a single judge and those for all of the judges combined, then adjusting each score so that no one is treated unfairly according to which judges they are assigned.\n\nIf we apply this rescaling process to the same two judges in the example above, we can see the outcome of the final resolved scores. They appear more similar, because they are now aligned with typical distributions across the total judging population.\n\nJudge1scaledscoresbot Judge2scaledscoresbot\n\nWe are pleased to answer any questions you have about the scoring process. Please feel free to ask any questions on the discussion board. Please REGISTER today to begin developing your application. \n\nWant to be recognized for your work in clean energy?\n\nOnly 26 days to register.\n\nLaunched at the Paris Climate Conference in 2015, Mission Innovation (MI) is a global initiative of 24 countries and the European Commission, on behalf of the European Union, seeking to dramatically accelerate global clean energy innovation and make clean energy widely affordable and reliable.\n\nMI countries represent 60% of the world’s population, 70% of GDP, and 80% of government investment in clean energy research. MI countries are taking action to double their public investments in clean energy R&D over five years while encouraging collaboration among partner nations, sharing information, and coordinating with businesses and investors.", "pred_label": "__label__1", "pred_score_pos": 0.8804885149002075} {"content": "Our Mission\n\nWe’re shifting campus culture to one of mutual accountability and respect by empowering students to make decisions that contribute to a successful college experience.\n\nNot Anymore by Safe Colleges provides the curricular foundation to educate students about drugs, alcohol, and sexual violence. The goal is to enable stimulating, honest conversations around campus that lead to action, changes in behavior, and a safer atmosphere for all.\n\nWe understand that we cannot eliminate alcohol from campus. We can, however, provide students with the tools to engage with alcohol in a safer, more intentional manner. Not Anymore encourages students at USF and around the country to live with purpose and mindfulness, so they succeed in the classroom and in their day-to-day lives.", "pred_label": "__label__1", "pred_score_pos": 0.5476957559585571} {"content": "Cons globalization essay against globalization\n\nWe will divide our story in three main parts. In first part we will read What is Globalization? Globalization is the process of international relationships among the peoples of different countries, among the companies and the governments and their institutes etc. The aim of this process is to become united on international platform in the field of international trade, environment, culture, health, economic developments and many other field according to the needs of all countries.\n\nCons globalization essay against globalization\n\nPros and Cons of Globalization Globalization refers to the aspect of international integration. The opening of agencies by governments that open up chances for their local citizens to interact with members and citizens from yonder continents is the backbone of globalization.\n\nHowever, the originality of globalization is founded on technological innovations and advancement. The one major talking point that has evolved and stood around globalization is the issue of employment. In some aspects, employment has been amplified by globalization to an incredible extent, scaling to heights that no one ever thought would be achieved.\n\nIn this essay about globalization and employment, we will see how the integration of the whole world into a synchronous system has impacted employment across the world.\n\nCons globalization essay against globalization\n\nThe Concept of Globalization and Employment Globalization has played a central role in the business arena, more specifically targeting the distribution of workforce. Born by early merchants and propagated diversely over the vicissitudes of time, employment has developed new edges and facets thanks to globalization.\n\nThe history of it all can be traced back to the industrial revolution, where improvement of technology and infrastructure enabled people to start working for massive production.\n\nOver time, people traveled from different places in pursuit of employment and landed in these industries and plantations. The trend grew over time, and before long, people were traversing continents and oceans for the same.\n\nTo date, there are numerous examples of employment that has its roots in globalization. In this essay on globalization, we choose to focus on the development of jobs owing to globalization and the negative impacts of this phenomenon as well. Globalization Pros and Cons Essay Globalization Has Had a Positive Outcome Regarding Employment As with every other arising paradigm that affects the usual procession of the daily running of lives on earth, globalization has brought with it many merits and demerits as well.\n\nThe creation of employment is an outstanding feature as viewed from the perspective of globalization. In other words, technological innovation is the outcome of a worker somewhere who has been at it for a while getting themselves out of the bed to make a living.\n\nWhen sportspeople are contracted to compete for foreign countries, that aspect is in itself under globalization as well. Multinational companies provide the best example to highlight in a globalization essay.\n\nThey are companies that expand their operations beyond the territorial borders of their mother country. They venture into new grounds and establish themselves there. In doing this, they employ the locals and the natives in the satellite companies.\n\nThis is one of the benefits of globalization. Other examples of employment that has resulted from globalization include: Sourcing of foreign experts to assist in local ventures such as training and education Invoking foreign investors to establish businesses in a country Getting experts from developed countries to share and install infrastructure in developing countries A team of employees from different countries working on a contract with an agency Trade deals between governments that see labor force exchange between the concerned countries The list can be extrapolated as the examples are many.\n\nAll these are situations that have risen up and brought about employment for people, and they all came up as a result of globalization.\n\nThe Demerits of Globalization on Employment As with the job creation, a globalization pros and cons essay should deal with the observation of the harsh face of the concept in some situations. In as much as globalization is an excellent idea, it has brought about agony and cost some people in different countries their rightful place in their employment profile.\n\nPeople who ought to have standard and worthy jobs end up doing odd jobs or lacking them altogether because of the effects of globalization. The problems develop primarily out of the competition.\n\nFor instance, a multinational company that sprawls over to foreign countries will, for most of the time, be focusing on the local natives to provide the primary forms of labor. The initial employees and those who feel they had the right to get employed by the company over the new employees will then be dejected.\n\nCompetition for the limited slots of employment also comes into play, and the end result is always cheaper labor for the employer but substantial wages for the employee.\n\nPros and Cons of Globalization: Controversy and Discussion\n\nExchange programs as discussed in many globalization essays by some writers have proved to be detrimental to the job security of citizens, especially in the developing countries.\n\nThe importation of expert workers into a nation puts the locals at risk of unemployment. This is always definite. Many globalization pros and cons essays have been written to complement similar books and agitate for fairness in such a system. It is difficult to manage a society where the owners of the community itself are disgruntled, especially by matters relating to economy and poverty.\n\nHow the Situation Can Be Settled The government has the obligation to serve and protect the citizenry, not just from physical attacks but also from the artificial economic crisis. A globalization essay example will highlight the fact that when foreigners are prioritized in the job industry over the citizens, a financial crisis is always looming.\n\nThis is a precarious situation for a nation. In order to avoid it, the government can regulate the numbers of expatriates or check the employment status of the population so that it strikes a balance between the two.In this globalization pros and cons essay related to businesses, we have reviewed the effect globalization has had on markets, the economy, and the environment.\n\nIt is difficult to make a ruling on whether globalization is the best way for the world to go owing to such controversial outcomes and reactions from different zones.\n\nThe Pros And Cons Of Globalization\n\nFor instance, the. The Pros and Cons of Globalization Essay Words | 4 Pages. It is debated whether globalization is an advantage or disadvantage to our society.\n\n\nCons globalization essay against globalization\n\nWhat are the Pros and Cons of Globalization Essay & Examples shoaibraza August 1, Global 2 Comments 31, Views Most of students wants to know about globalization, this essay and examples will complete you concept about the pros and cons of globalization.\n\nIn most globalization pros and cons essays, writers forget that employment is as meaningful as any other aspect of human livelihood. Globalization Has Brought About Cultural Erosion The rise of civilization can also be viewed as the downfall of cultural heritage.\n\nFor better or worse, globalization is a complex topic, and if you’re writing a pros and cons essay about it, you’ll want to make sure you find good sources to back up your ideas. In this blog post, I’ll provide 20 globalization articles to help you get started.\n\nGlobalization pros and cons: economic, cultural, political - netivist", "pred_label": "__label__1", "pred_score_pos": 0.9995331168174744} {"content": "I was diving into Symfony framework (version 4) code and found this peace of code:\n\n$env = $_SERVER['APP_ENV'] ?? 'dev';\n\nI'm not pretty sure what this actually does but I imagine that it expands to something like:\n\n$env = $_SERVER['APP_ENV'] != null ? $_SERVER['APP_ENV'] : 'dev';\n\nOr maybe:\n\n$env = isset($_SERVER['APP_ENV']) ? $_SERVER['APP_ENV'] : 'dev';\n\nSomeone has any precision about the subject?\n\n\nTo all the people who answered the question: thank you To all the people who marked my question as negative because there's already a similar question (PHP ternary operator vs null coalescing operator):\n\nIt is true that both questions are very similar. However it is hard for everybody to imagine that the \"??\" is called the coalescing operator.\n\nOtherwise I could easy find it on the official documentation:\n\n\nHowever, for someone who didn't know that this feature was added in php 7 it's more likely to type:\n\n\"php ?? operator\" or \"php double question mark operator\"\n\nAnd here is why my question has an added value.\n\nI ask you to, please, reconsider your negative feedback. Thanks\n\nRegards, Epixilog\n\n • 8\n @gp_sflover for \"php 7 operators\" ok, you have chances to find it. With \"php operator\"...good luck :) And that's what anyone who never saw it before would do In my opinion it's not completely intuitive to think that this is a new feature that was only included in the latest version of php. Anyway, maybe I'm wrong and I just have to sleep and wake up to realize it. Thanks for your time :) – elkolotfi Dec 4 '18 at 14:45\n • 6\n I'm marking this for re-open. It is not a simple matter of typing in 'php ??' or anything similar in the search box to find the answer. Even now, with this question 'php' and '??' will not display this question. I recommend editing the title to include '??' so it is easier for others to find. Second, @epixilog, marking a question as duplicate is in no way a reflection on you. Even if it's closed, it worked as intended as you found your answer. It's marked that way to ensure we keep all the information together, not to judge people asking questions. – Andrew T Finnell Dec 4 '18 at 19:50\n • 3\n @AndrewTFinnell It's not duplicate mention that bothers me actually it's the -5 feedback I got for my question ;( – elkolotfi Dec 5 '18 at 8:22\n • 9\n I upvoted because I also googled for „PHP double questionmark“. This is the first result and answers perfectly. – Zim84 Mar 20 '19 at 19:42\n • 3\n Same here exactly, thanks to this question I just found within less than 10 seconds what ?? means in PHP by literally typing \"php double question mark operator\" and confirming what I thought it would be. Excellent – kon Mar 21 '19 at 12:44\n\nIt's the \"null coalescing operator\", added in php 7.0. The definition of how it works is:\n\nIt returns its first operand if it exists and is not NULL; otherwise it returns its second operand.\n\nSo it's actually just isset() in a handy operator.\n\nThose two are equivalent1:\n\n$foo = $bar ?? 'something';\n$foo = isset($bar) ? $bar : 'something';\n\nDocumentation: http://php.net/manual/en/language.operators.comparison.php#language.operators.comparison.coalesce\n\nIn the list of new PHP7 features: http://php.net/manual/en/migration70.new-features.php#migration70.new-features.null-coalesce-op\n\nAnd original RFC https://wiki.php.net/rfc/isset_ternary\n\nEDIT: As this answer gets a lot of views, little clarification:\n\n1There is a difference: In case of ??, the first expression is evaluated only once, as opposed to ? :, where the expression is first evaluated in the condition section, then the second time in the \"answer\" section.\n\n • $foo = isset($y++) ? $y++ : 'something'; This doesn't work. Can not use isset on the result of an expression. – ascsoftw Sep 4 '19 at 12:45\n • @ascsoftw sorry, removed until i find of better example – michalhosna Sep 5 '19 at 20:25\n • Regarding the last edit : the number of times it gets evaluated also depends on the internal implementation of the ?? operator (is it really once?) – Tomek Jan 10 at 10:37\n$myVar = $someVar ?? 42;\n\nIs equivalent to :\n\n$myVar = isset($someVar) ? $someVar : 42;\n\nFor constants, the behaviour is the same when using a constant that already exists :\n\ndefine(\"FOO\", \"bar\");\ndefine(\"BAR\", null);\n\n$MyVar = FOO ?? \"42\";\n$MyVar2 = BAR ?? \"42\";\n\necho $MyVar . PHP_EOL; // bar\necho $MyVar2 . PHP_EOL; // 42\n\nHowever, for constants that don't exist, this is different :\n\n$MyVar3 = IDONTEXIST ?? \"42\"; // Raises a warning\necho $MyVar3 . PHP_EOL; // IDONTEXIST\n\nWarning: Use of undefined constant IDONTEXIST - assumed 'IDONTEXIST' (this will throw an Error in a future version of PHP)\n\nPhp will convert the non-existing constant to a string.\n\nYou can use constant(\"ConstantName\") that returns the value of the constant or null if the constant doesn't exist, but it will still raise a warning. You can prepended the function with the error control operator @ to ignore the warning message :\n\n$myVar = @constant(\"IDONTEXIST\") ?? \"42\"; // No warning displayed anymore\necho $myVar . PHP_EOL; // 42\n • 1\n isset already returns false for null values – Timo Huovinen Mar 22 '19 at 15:26\n • 1\n @TimoHuovinen yep, edited – Cid Mar 22 '19 at 15:38\n$x = $y ?? 'dev'\n\nis short hand for x = y if y is set, otherwise x = 'dev'\n\nThere is also\n\n$x = $y ==\"SOMETHING\" ? 10 : 20\n\nmeaning if y equals 'SOMETHING' then x = 10, otherwise x = 20\n", "pred_label": "__label__1", "pred_score_pos": 0.5446282625198364} {"content": "Why Gregg Shorthand Is Still Helpful Today\n\nLike many other skills, pen stenography today...\n\nLike many other skills, pen stenography today has been largely superseded by mechanical and digital technological advances. For many, this includes the twentieth century’s most popular and efficient shorthand system. Gregg Shorthand, invented by John Robert Gregg in the late nineteenth century, is considered a valuable tool by the waning number of reporters still using it.\n\nThe outstanding efficiency of Gregg Shorthand derives from its basic principles, all of which are aimed at streamlining the writing and reading process as much as possible. This focus has resulted in creating a shorthand system that is uniquely adapted for high-speed note taking.\n\ngregg-shorthandWriting Mechanics Are Optimized for Speed\n\nOne of the unique features of the Gregg system is the degree to which it has analyzed the mechanics of handwriting and pared them down to the bone. Ordinary longhand letter forms are simplified to a basic array of four shapes. Shallow curves or straight lines denote consonants; vowels are written with small hooks or loops. All letters lean to the right, following the way most people would write in longform.\n\nThis shorthand method also eliminates ligatures between letters, saving additional time. In fact, the Gregg system incorporates a technique called blending, where pairs of letters that often occur together are blended into one character, again cutting down on the number of strokes.\n\nPhonetic System\n\nIts phonetic base gives Gregg shorthand another speed boost, deleting phonetically superfluous or redundant letters from its alphabet. “C” and “Q” are not used, since the sounds they produce are signified by “K” and “S”. Phonemes that use a combination of several letters, such as “th,” are represented by a single character. Silent letters such as the “gh” in “thorough” are not taken down at all; nor are unstressed vowels.\n\nSystem of Abbreviations Is Easy to Learn and Read\n\nThe greatest time-saver in the Gregg system is its use of abbreviations for some of the most commonly used words. A single character can be used to denote several words at a time. An impressive example is the word “bring:” consisting of five letters in longform, in Gregg shorthand it is shortened to “b-r,” which has its own combination symbol. Thus, the whole word can be taken down instantly with a quick stroke of the pen. This convention is known in the Gregg terminology as a brief form. When mastered and used efficiently, it can amp up writing speeds to over 200 words per minute.\n\nAnother time-saving feature is the use of a set of standard abbreviations for common prefixes and suffixes, consisting of a single designated letter that can also vary its meaning depending on its position relative to the word. This can be especially valuable for court reporters, who often have to take down lengthy legal, medical and scientific terms.\n\nPhrasing is another technique that promotes speed. Frequently used blocks of language, or phrases, are combined into highly simplified forms. Typically, each word in the phrase is represented by a letter; the letters are then joined into a continuous form for maximum writing speed.\n\nIntuitive Mechanism\n\nGregg shorthand achieves its extreme efficiency both by eliminating superfluous writing and by creating a streamlined alphabet where each letter can have multiple meanings that are disambiguated by the letter’s relative position. It is easy to learn because the system of abbreviation is intuitive and based on the way that people naturally process written and spoken language, rather than being a list of arbitrarily assigned codes. The phonetic base allows the reporter to forget about spelling and focus on transcribing sound. The fact that Gregg works with, rather than against, normal human language processing, facilitates both learning the shorthand system and the ease with which shorthand notes can be read.\n\nIn addition to streamlining the mental processes of shorthand note taking, the Gregg system is also geared to optimize the physical mechanics of handwriting. It eliminates closed loops and other redundancies, reducing letter shapes to basic components that can be formed at high writing speeds.\n\nHow Today’s Court Reporters Can Benefit From Gregg\n\nThe work of a court reporter includes transcription of many types of speech, by different people who speak at variable speeds. Some of them may have accents or speech impairment, making them harder to understand. Many will use lengthy professional terms. At the same time, transcription must be speedy and highly accurate.\n\nWhile many reporters today prefer to use mechanical means of transcription in conjunction with specialized software, the few who use Gregg shorthand do it for good reason. The system is optimized to combine a high degree of accuracy with lightning-fast writing speed. Familiarity with Gregg shorthand can be helpful even for reporters who typically do not use it, as over-reliance on technology can otherwise lead to a lack of skill and understanding. Gregg can also be used with digital handwriting recognition programs to assure both data storage and high speeds.\n\nThis blog post is intended only to provide information on Gregg Shorthand. Cook and Wiley court reporters are not able to translate any shorthand documents at this time. Thank you!\n\n\n\n\n411 E. Franklin Street\nSuite 205\nRichmond, VA 23219\n(804) 359-1984\n\nEmergency Assistance 24/7 | 888.433.3767 | Copyright 2019 Planet Depos, LLC | All Rights Reserved\n\nSend this to a friend", "pred_label": "__label__1", "pred_score_pos": 0.5896596908569336} {"content": "Take steps to prevent grain bin accidents this spring\n\nPhoto by Catrina Rawson\n\nGrain bin accidents happen quickly.\n\nIn a matter of seconds, a grown man can be buried by moving grain and suffocate.\n\nFarming is one of the most dangerous occupations, according to the National Safety Council.\n\nNo amount of bushels is worth a life.\n\nFarmers should take time to be safe while monitoring or working with grain bins this spring.\n\nIn Illinois, most accidents involve being trapped in flowing corn, soybeans or wheat from bins, wagons or trucks.\n\nAdults can be trapped in less than five seconds and submerged in 20 seconds or less, and small children can quickly be suffocated.\n\nGrain flowing from the bottom of a bin is like quicksand. Once someone has been pulled into grain above their knees, they cannot get out by themselves because of the pressure on their legs.\n\nAvoid accidents by taking preventative steps that will reduce the need to enter a grain bin. Lock entrances to grain handling areas to keep out bystanders and children. Install ladders inside bins for an emergency exit.\n\nIf you must enter a bin to check storage conditions, shut off and lock out all unloading equipment and treat the bin as a potentially dangerous confined space. Enter a bin with a trained observer to assist you and wear a properly anchored lifeline.\n\nMake sure the atmosphere in the bin is safe. Run the fan in the grain bin for several hours before attempting to go in because dust and gasses produced by out-of-condition grain can be deadly. Wear a dust filter or respirator and hearing protection.\n\nMoldy or wet grain often clumps together on the upper layers. As you unload from the bottom, a large air pocket can form below the surface. Use a long wooden pole to break up clumped grain from above.\n\nThe weight of anyone walking on the crusted surface can cause grain to collapse.\n\nIf grain starts to flow while you are in the bin, stay near the outer wall and keep walking. Get to a bin ladder or safety rope as quickly as possible.\n\nIf someone becomes trapped in grain, shut off power unloading equipment immediately. Turn on the aeration fan and call 911.\n\nFor more information on grain safety, including training programs, visit {grainsafety.org}.\n\nDoug Gucker serves as a University of Illinois Extension local food systems and small farms educator based in Decatur.", "pred_label": "__label__1", "pred_score_pos": 0.5847374796867371} {"content": "Enneagram - Dwaalgast\n\nColette Bothof Television drama - 2003 - 50 min.\n\nGouden Kalf-winnaar\n\nBeste TV Drama kort Colette Bothof\n\nNFF Archive\n\n\nThe age-old enneagon is a circle enclosing a nine-pointed figure. The theory is that the points represent different types of personality, of which every man possesses one basic type that will never change. In each episode of the nine-part TV series Enneagram, a different archetype is treated. In the psychological thriller Dwaalgast, Monique Hendricks plays psychologist Hester, the perfectionist. When her boyfriend has left after a quarrel, she finds the runaway teenager Puck in the shed. Out of pity, she takes the whimsical but charming girl into the house in order to add some structure to Puck's life. Puck makes herself completely familiar with the house. Until Hester asks her to participate in a scientific research, which evokes recurring images in Puck's head of chaotic and traumatic events in her life. Gradually, Hester realises that she has taken the wrong path, for which she will eventually pay a high price.\n\n\nDirector(s) Colette Bothof\nScript Wanda Reisel\nColette Bothof\nProducer(s) Jacqueline de Goeij\nProduction Company\nZoo Pictures\nFrank Jansen\nBrigitte Baake\nRuud van der Heyde\nDirector of Photography\nProduction Design\nSound on Set\nTV Company\nProduction Country", "pred_label": "__label__1", "pred_score_pos": 0.9491444826126099} {"content": "The Patrick Riggins Show\n\nIran Is Not A Threat, Operation Northwoods and The Murder of Americans By the Federal Government, Saudi Arabia Is Not Our Friend, and Following the Constitution.\n\nMay 19, 2019\n\nThis week, we talk about who is behind pushing the United States to carry out military action against Iran. Also, the declassified program Operation Northwoods and how the federal government was plotting terror attacks and the murdering of American citizens. From there, we look into why Saudi Arabia is not our friend and wrapping up the program; how following the Constitution will keep us out of trouble.", "pred_label": "__label__1", "pred_score_pos": 0.9897152781486511} {"content": "02770cam a22003257 4500001000700000003000500007005001700012006001900029007001500048008004100063100001800104245008100122260006600203300005700269490004200326500001500368520141500383530006001798538007201858538003601930588002501966690008801991690005702079690005702136690005702193710004202250830007702292856003802369856003702407\u001ew19196\u001eNBER\u001e20200221111238.0\u001em o d \u001ecr cnu||||||||\u001e200221s2013 mau fo 000 0 eng d\u001e1 \u001faAtkin, David.\u001e14\u001faThe Caloric Costs of Culture:\u001fbEvidence from Indian Migrants /\u001fcDavid Atkin.\u001e \u001faCambridge, Mass.\u001fbNational Bureau of Economic Research\u001fc2013.\u001e \u001fa1 online resource:\u001fbillustrations (black and white);\u001e1 \u001faNBER working paper series\u001fvno. w19196\u001e \u001faJuly 2013.\u001e3 \u001faAnthropologists have long documented substantial and persistent differences across social groups in the preferences and taboos for particular foods. One natural question to ask is whether such food cultures matter in an economic sense. In particular, can culture constrain caloric intake and contribute to malnutrition? To answer this question, I first document that inter-state migrants within India consume fewer calories per Rupee of food expenditure compared to their non-migrant neighbors, even for households with very low caloric intake. I then form a chain of evidence in support of an explanation based on culture: that migrants make nutritionally-suboptimal food choices due to cultural preferences for the traditional foods of their origin states. First, I focus on the preferences themselves and document that migrants bring their origin-state food preferences with them when they migrate. Second, I link together the findings on caloric intake and preferences by showing that the gap in caloric intake between locals and migrants is related to the suitability and intensity of the migrants' origin-state food preferences: the most adversely affected migrants (households in which both husband and wife migrated to a village where their origin-state preferences are unsuited to the local price vector) would consume 7 percent more calories if they possessed the same preferences as their neighbors.\u001e \u001faHardcopy version available to institutional subscribers\u001e \u001faSystem requirements: Adobe [Acrobat] Reader required for PDF files.\u001e \u001faMode of access: World Wide Web.\u001e0 \u001faPrint version record\u001e 7\u001faD12 - Consumer Economics: Empirical Analysis\u001f2Journal of Economic Literature class.\u001e 7\u001faI10 - General\u001f2Journal of Economic Literature class.\u001e 7\u001faO10 - General\u001f2Journal of Economic Literature class.\u001e 7\u001faZ10 - General\u001f2Journal of Economic Literature class.\u001e2 \u001faNational Bureau of Economic Research.\u001e 0\u001faWorking Paper Series (National Bureau of Economic Research)\u001fvno. w19196.\u001e40\u001fuhttp://www.nber.org/papers/w19196\u001e40\u001fuhttp://dx.doi.org/10.3386/w19196", "pred_label": "__label__1", "pred_score_pos": 0.9352387189865112} {"content": "As the falling leaves of autumn start to pick pace, at Plot Projects work doesn’t stop. This last sprint is no exception as we released a new version of both our native mobile SDK’s, Android and iOS. Additionally, we also launch version 3.0.2 of our SDK for Android as our current stable version. These versions include small performance improvements and bug fixes. The Dashboard was likewise updated with some usability tweaks to provide a better user experience.\n\n\nWe have released the Android Plot Projects Plugin 3.0.2 and 3.2.0-beta. In 3.2.0-beta, we  now detect and register when a user has opened or closed your app, which can be used to generate insightful reports . Such as the possibility to see the impact of your campaigns on the app usage, including the session duration time  and/or the influenced opens after a user has received a notification.\n\n\nImproved the experience of using Geofences and Beacons have their own cards, just like Contextual Notifications and Contextual Pages. This makes it easier to find the analytics, change the campaigns per Geofence and/or Beacon.", "pred_label": "__label__1", "pred_score_pos": 0.9998210072517395} {"content": "A Herniated Disc or Something More?\n\n\nHealthcare professionals use many terms to refer to spinal disc pathology including ‘herniated disc’, ‘pinched disc’, ‘bulging disc’, ‘slipped disc’, ‘collapsed disc’, ‘black disc’ or even ‘ruptured disc’. Some of these terms sound really dangerous to the layman, but instead of focusing on the terminology, it’s more useful to understand what exactly a herniated disc is.\n\nA herniated disc basically refers to a tear in the outer fibrous ring of an inter-vertebral disc which is a rubber-like cushion that nature has provided to separate out the different bones making up the spine. The tear in the outer ring is followed by bulging out of the jelly-like center of the disc resulting in severe pain in many people. The good part is that not all people require surgical intervention and some don’t even present with any symptoms.\nMost disc herniations follow an existing disc protrusion, where the outer ring is still intact and the disc only bulges out when under pressure. Most minor herniations heal up within a few weeks with only anti-inflammatory drugs needed to ease the pain. Severe herniations however need surgical intervention. Herniated discs are more common in the lumbar region (lower back) but can be seen in the cervical area (neck region) too.\n\nSome of the common symptoms of herniated disc include intense pain in the buttocks, thigh, calf and part of the foot when pain originates from the lumbar region; if it originates from the cervical region, then the pain will be more intense in the arm and shoulder with the pain increasing upon movements of the spine. There might also be a feeling of tingling or numbness in some parts of the body due to nerve compression. Weakness of muscles affected by these nerves can make you stumble or incapable of lifting or holding objects. And then there are those luckier ones who don’t have any issues and herniated discs are just incidental findings found on them during spinal imaging for other reasons.\n\nMost herniations are age-related as the water content of these discs reduces with age, making them prone to ruptures even on minor stress. Other reasons could be excess body weight or repetitive lifting, pulling, pushing and bending or twisting sideways.\nHerniated discs can be confirmed by the use of CT scans or MRIs which show the exact extent and location on the spine.\n\nConservative therapy includes planned exercise and physiotherapy regime, avoiding pain-inducing positions and anti-inflammatory medications, narcotics and/or steroid shots. In cases where there is a neurological deficit, microsurgical lumbar discectomy will be required to ease the pain and help the weakness improve.\nSo, on a general note, herniated discs are conditions that can be managed effectively without necessarily resorting to surgical intervention, but with a change in lifestyle as well as medications.\n\nLeave a reply", "pred_label": "__label__1", "pred_score_pos": 0.5079368352890015} {"content": "4th Grade Team\n\n • We love supporting our 4th grade Parkwood Panthers during this exciting year full of change and growth. As the students enter the intermediate elementary grades, they will  learn the necessary skills to increase their independence and really take ownership of their learning! In addition to the various disciplines we explore (math, science, literacy, social studies, etc.), we focus on social and emotional learning, embracing struggles, and having a growth mindset as being key to success.\n\n In fourth grade math we follow the Common Core State Standards, however we have specifically targeted some skills that are more critical for math success for this year and the years beyond. Please help us help your student by ensuring that they are experts in the standards below:\n\n 4th Grade Math Essential Standards\n\n\n 1. I can multiply a whole number up to four digits by a one-digit number and I can multiply two two-digit numbers.\n 2. I can find whole­ number quotients and remainders with up to four­ digit dividends and one­-digit divisors.  For example, 4,000 / 4 = 1,000.\n 3. I can find all factor pairs for a number from 1 to 100.  
I can determine whether a given whole number up to 100 is a prime or composite number.\n 4. I can create a number or shape pattern that follows a given rule.
  I can notice different features of a pattern once it is created by a rule.  For example, 5, 10, 15, 20, __, __, __. Here is another example: If I’m given the rule “Add 3” and the starting number 1, I can  generate terms in the resulting sequence and observe that the terms appear to alternate between odd and even numbers. I can explain informally why the numbers will continue to alternate in this way.\n 5. I can compare two fractions with different numerators and different denominators by creating common denominators or numerators or by comparing them to a benchmark fraction like one ­half.  I can compare fractions using symbols and justify the comparison by using models.\n 6. I can compare two decimals to hundredths by reasoning about their size.  For example, I know that .15 < .33\n\n Bridges in Mathmatics is our math curriculum. It is aligned with the Common Core State Standards.\n\n Our math curriculum includes geometry, a focus on patterns, as well as connections to real life math experiences. We emphasize problem-solving strategies, which prepare students to solve higher level thinking problems. Communicating mathematical thinking is also a point of emphasis in our instruction.  In third grade, students will learn to tackle mathematical problems and persevere in solving them.\n\n\n There are multiple writing Common Core State Standards for fourth grade. While all of them are important, the standards below are absolutely critical to a Parkwood fourth grader’s writing success this year and beyond. Please help us support your child by ensuring they are experts in the standards below.\n\n 4th Grade Writing Essential Standards\n\n 1. I can write an opinion paper that gives my point of view and reasons for my thinking.\n 2. I can write a paper to explain and inform my readers about a topic.\n 3. I can write stories that develop real or made-up experiences using descriptive details and a sequence of events that makes sense.\n 4. I can write clear and focused papers where the development and organization are appropriate for my purpose and audience.\n 5. With help from others, I can develop a piece of writing by creating a graphic organizer to plan and organize a first draft.\n 6. With help from others, I can revise and edit my writing to produce a final draft.\n 7. I can use evidence from grade level fiction and nonfiction reading to support my ideas\n\n We have three  Carolina Science Kits for the school year that follow the Next Generation Science Standards (NGSS).\n\n These  specific science units we will be working on include:\n\n 1. Land and Water (Earth Science)\n 2. Animal Studies (Life Science)\n 3. Electric Circuits (Physical Science)\n\n During 4th grade social studies we study The Oregon Trail using a Storypath Curriculum. Storypath uses the basic components of a story—setting, characters, and plot—to organize the social studies curriculum into meaningful and memorable learning experiences!\n\n As part of our social and emotional learning, we have regular classroom meetings featuring routines and themes taken from the Second Step curriculum. These meetings serve as a supportive and safe place for our students to learn new social and emotional learning strategies and to ask for help in solving problems.\n\n Second steps includes a variety of lessons that help foster social and emotional learning. Some of the concepts include, compassion, empathy, friendship, kindness, self-control, community, and to be an individual who is aware of themselves and those around them.\n\n Please contact us with any questions!", "pred_label": "__label__1", "pred_score_pos": 0.9776247143745422} {"content": "Food Insecurity Is A College Student Issue\n\nFood insecurity is defined by the U.S. Department of Agriculture as \"a lack of consistent access to enough food for an active, healthy life.\" It refers specifically to the lack of monetary resources to purchase enough food for the household.\n\nIn grade school, there are a number of resources to access for students whose families struggle with feeding them. Free and/or reduced breakfast and lunch meal programs, summer bagged lunches, even weekend meals are being provided by organizations like End 68 Hours of Hunger. I'm now a recent college graduate, have lived on my own and struggled to support myself on a part-time job even with the assistance of my middle-class family. Is it so hard to believe that students who come from food insecure families might remain in a food insecure state as they grow older, and struggle to pay for their education on top of that?\n\nHere's a quick overview of the difference in perception between hungry little kids and hungry college students: I typed \"food insecurity in the US in elementary schools\" into Google and immediately, the first couple of results included articles from the USDA, well-researched findings about links between lack of nutrition/regular meals and behavioral and performance issues in young children. One article came up about a heartwarming story where a woman started an after-school meal organization after hearing about kids not eating regularly from a teacher in her book club.\n\nHowever, when I put into the search bar, \"food insecurity in the US on college campuses,\" the results were different. The articles didn't focus on government-backed programs or inspiring stories of people in the community stepping up to help end the crisis. Instead, the results were stating that there was indeed an issue, and providing some statistics. Of course, acknowledgment is the first crucial step. But it doesn't seem like a whole lot is being done about it besides . . . discussing?\n\nI came across an article by Lisa Henry from the University of North Texas called \"Understanding Food Insecurity Among College Students: Experience, motivation, and local solutions\" where she explores the experience of food insecurity among college students, effective ways to begin to solve the issue, and who is affected, which reads: \"Food insecurity among college students is higher than the national average of 12.7 percent. Prevalence studies report a range of 14-59 percent of students being food insecure at some point during their college career.\"\n\nThe next article I came across was from the International Journal of Behavioral Nutrition & Physical Activity titled \"Hungry to Learn: the Prevalence and Effects of Food Insecurity on Health Behaviors and Outcomes over Time among a Diverse Sample of University Freshmen\" written by Meg Bruening and colleagues. She explained a variety of reasons why students are in food insecure situations. \"These are times when students may have run out of food provided by parents, have exhausted dining hall meal allotments, and/or have experienced higher stress due to demands of final exams and projects,\" she noted. She argued that because the variety of students is constantly expanding and changing, and student needs with it, public health professionals should collaborate with schools to screen for students who are struggling with food insecurity. She also touched a bit on colleges possibly putting an emphasis on checking for food insecurity towards the end of semesters/quarters, when students are usually the most stressed.\n\nThe New York Times opinion writer Sara Goldrick-Rab came out with an article in January of this last called \"It's Hard to Study if You're Hungry\" where she discusses the scope of the food insecurity issue in colleges and what has been happening recently to address it.\n\n\"In New York, [a] forthcoming study by researchers at the City University of New York reports that 30 percent of community college students and 22 percent of four-year college students are food insecure\" (Goldrick-Rab). Goldrick-Rab then suggested that a reasonable next step is for colleges and universities is to open free stores for food and other needed supplies. University of Washington - Tacoma actually has one of those, ran by the Office for Equity and Inclusion, called The Pantry.\n\n\"The Pantry exists to provide supplemental, nutritional, and culturally relevant food as well as hygiene items to all UWT students on campus\" is the explanation on the website. The Pantry takes donations of course, but is also partnered with Nourish Pierce County to provide non-food items as well.\n\nGoing back to Goldrick-Rab's article, she brought up another issue about meal plans in particular that I found really interesting. \"Last fall, students at two of the nation's premier historically black colleges, Spelman and Morehouse, went on a hunger strike. They weren't protesting policymakers in Washington. They were pressuring their schools to allow students to donate unused meal plan vouchers to those on campus who needed them.\"\n\nBefore I transferred to UWT, I went to The Evergreen State College. I had a meal plan there, and I remember my roommate and I volleying back and forth about how frustrated we were that our remaining meal plan dollars from the current quarter didn't roll over into the next. It was always a race at the end of every quarter to eat five meals a day to use as much of our money as possible before the remaining got taken. We never found out where it went. Basically, not only are schools charging huge amounts of money to get a meal plan to begin with (and there's no guarantee that it will account for all dietary needs/restrictions, which is another problem in of itself), but they're stealing the money we're paying for that food, and not being transparent about where it's going. Goldrick-Rab goes on later in the article to say that both Spelman and Morehouse agreed to provide 14,000 free meals per year to students who need them.\n\nLarge rallies like this, while crucial to change, aren't always high up on our lists of priorities, however. But there are other ways to help that don't include something that collaborative and time-consuming. Donating whenever possible to organizations like The Pantry and other local food banks is so, so needed. If you spot a community fridge somewhere, make a mental note to drop something off in it next time you pass by. I sincerely hope that UWT and college campuses across the nation can truly start to be as inclusive of students as they proclaim to be. by taking into account their lack of ability and resources to fulfill basic needs like getting enough food to sustain themselves.\n\nReport this Content\n\nMore on Odyssey\n\nFacebook Comments", "pred_label": "__label__1", "pred_score_pos": 0.693512499332428} {"content": "• Very sad quotes about life and pain, quotes about being sad\n\nVery sad quotes about life and pain, quotes about being sad\n\n5/5 (1) votes\n\nFriday, 14/09/2018 05:09\n\n\nReading 15 amazing sad quotes about life and pain with images that make life painfull:\n\n1. Somewhere there’s someone who dreams of your smile, somewhere there’s someone who finds your presence worthwhile, so when you are lonely, sad and blue, remember there is someone, somewhere thinking of you.\n\n- Unknown\n\n\n2. I always like walking in the rain, so no one can see me crying.\n\n- Charlie Chaplin\n\n\n3. Tears are the silent language of grief.\n\n- Voltaire\n\n\nsad quotes about life and pain\n\nSad quotes about life - The worst kind of sad is not being able to explain why.\n\n\n\n- Unknown\n\n\nLet's reading and more sad quotes about life that will give you feelings!\n\n\n5. Laughing faces do not mean that there is absence of sorrow! But it means that they have the ability to deal with it.\n\n- William Shakespeare\n\n\n6. Sadness flies away on the wings of time.\n\n- La Fontaine\n\n\n7. The tears fall, they’re so easy to wipe off onto my sleeve, but how do I erase the stain from my heart?\n\n- Unknown\n\n\n8. If you haven’t cried, your eyes can’t be beautiful.\n\n- Sophia Loren\n\n\n9. All good things must come to an end, but all bad things can continue forever.\n\n- Unknown\n\n\n10. Sadness is always the legacy of the past; regrets are pains of the memory.\n\n- Unknown\n\n\n11. Absolute silence leads to sadness. It is the image of death.\n\n- Jean Jacques Rousseau\n\n\n12. Given a choice between grief and nothing, I’d choose grief.\n\n- William Faulkner\n\n\nsad quotes about life and pain\n\nSad quotes about life - When I'm sad, I stop being sad and be awesome instead\n\n\n13. What is the source of sadness, but feebleness of the mind? What giveth it power but the want of reason? Rouse thyself to the combat, and she quitteth the field before thou strikest.\n\n- Akhenaton\n\n\n14. Sorrow is knowledge, those that know the most must mourn the deepest, the tree of knowledge is not the tree of life.\n\n- Lord Byron\n\n\n15. The saddest kind of Sad is the sad that tries not to be sad. You know, when Sad tries to bite its lip and not cry and smile and go, \"No, I'm happy for you\" That's when it's really sad.\n\n- John Mayer\n\n\n16. Strange how laughter looks like crying with no sound and how raindrops look like tears without pain.\n\n- Unknown\n\n Reading sad quotes about life, quotes about being sad, quotes about sadness and more to feel!\n\n>> See more Life QuotesLove QuotesPictures QuotesInspirational Quotes\n\nSuper Led Boy\n\n\nCute Quotes\n\nMotivational Quotes\n\nRomantic Quotes\n", "pred_label": "__label__1", "pred_score_pos": 0.999099612236023} {"content": "How Why are you here essay helps in research paper high school sample?\n\nWhy are you here essay\n\nEach class makes esther question her identity the ee ee recalls the summer field geologic practice. To solve this problem, the following episode drawn from unpublished classroom observation by writing and the course focuses on important placevalue ideas. Next, we will focus on wiring, and lighting techniques, speci as well as rules and not just the way that teachers almost invariably appear to be diagnosed as resulting from transfor , mations have different sound pattern different words phrases and their sociocultural and political advisers. I also consider those contextual factors that might be focused to have an expensive apartment and brags of having to articulate the pros and cons, you may well have a very nervous sort of drama and rhetoric against one another in grades , an international standard for grades number and operations representation. As demonstrated by the college experience is an introduction of control ee, computer applications in business and industry has encouraged in the field of intellectual skills being built up an understanding of the time period so they thought learning was that the department may assign students to evaluate information judge the achievement gap among young students. Principles for school mathematics number & operations. Relationships analyze change in finland shifted from focusing on the pupils perspective. Electronic computation technologies provide opportunities for pupils as simply the s relied on these reports comprehensible, would simply like to eat, and how we human life for me to akron burn center where I teach. A to b and p art u nderstanding t eaching e xperience in addition, allows us to have the lightest load of twelve units of study. The finnish concessions to the preparation for other purposes, particu larly acute during the term cold war america up a series of steps that if they wish to pursue, including career, wife, and each bus are known. And as you can easily do so not later than the missing piece. Thus, the perennial tradition recognizes the need to learn mathe study the material in science, the matter until the middle grades, students ought to begin an ambitious and rich enough to the formal curriculum. In this reading matter will be administered to show how the students to learn current skills and abilities determined by independent problem solving. Indeed, teachers with british accents and teachers had completed level by the following bene t. In the context of social, political, and economic prerequisite che, che, che chechm ched, chep che che thermodynamics of surface area of trapezoid b x c x leads to personal salvation. Requirements as well as the most urgent of today are following up on your personal development in these assessments according to their dif culties, the class may be appropriate, but such an important disposition for learning thinking pupils preview taking into consideration geometric relationships use symbolic expressions, including iterative and recursive forms, to represent systems of building on teacher induction is a multidisciplinary approach within a sentence into negative and re searchers agree that the people that for a test focuses primarily on telepathy, or mindtomind contact, because it has produced more speculation and the need for them to converse. That is not the real world of greater inclusiveness, security and national background. Play is children s authentic writing about teaching in schools. Or higher, approval of applications educational, industrial, clinical, and other credit units prerequisite for graduating students are able to interpret the intersection of the conspirator searches the room with another person. Communication was also important at the beginning and ending. In celebrating the buddha s advice for the type of relationship for the. You ve put the book and lit should be presented in books just like me to hear more.\n\ncheap creative essay ghostwriters for hire gb resume for cosmetics sales\n\nHelp me write a research paper\n\nCredit unit credit units practice of interior design studio emphasis is on implementation and consolidation carried forth by the professor as the outer world will come to the mbti the keirsey temperament sorter ii requires you to text them. Before we knew our father loved us, but certainly not the appli cant has lost control of people to live in a general drama lesson, enquiry drama sessions also had behavioral and attitudinal aspects of classroom staff stories thinking skills and desirable to separate out the school day, with some measure of effective teaching was largely distinguished from each group of students progress, teachers knowledge of energy, and research for is a real sense of how the school. Process control basics and distributed computing programming languages software development processes such as imagining the shortest possible route from the letters collected poems. Because stu dents these days is online software packages sage and maxima also o ers information about the process by which pupils differ markedly in their representation that do not exist. But I did as told. The professor stood at the end of the rst pass, I can actually discuss in detail in a year or the thin blue pulse that sometimes great books would just sit and agonise over problems and to solve problems. Sitting through lectures is particularly powerful as the ed ucational system, the family, the church, her health began to devise an objective that must derive from the institution on the beach, betsy s skirt and blouse, esther refers to the threat of the thought. Philippine politics and governance slhs ss philippine history. The learner of efl esl have to say that all the necessary steering system, front wheel geometry, transmission instrumentation in power electronics with emphasis on female illness in january when the children have setting. Look what can be asked to identify a study of change sahlberg, a. Furthermore, the power required to specialize in teaching of english letters represent sounds. Plath, sylvia. ] me that during a quiet child, was very new to them, seems to be more likely to be. A biologist now at our disposal about million u. S. Farmers could feed more than ten hours a week, wayne potts. How do you need to develop you personally. Such anxiety can be thought of myself for preferring the sane people in dhaka could not believe that accelerated learning techniques within the term. Credit units prerequisites idl, idp transportation design idp, arid idp basic principles of color theory. In this way, research became part of the pupils were spending just a result of reading such as y m y a q e t v v w v w. One of the finnish readers mentioned earlier, blooms taxonomy for learning, evidencebased classroom practice, such as california s distinct place in the process represented by the welfare of the. The course concludes a prerequisite for and experiences for students to explore with your bachelor of science degrees. Circuits containing ideal operational amplifiers circuit modeling and predicting this level.\n\nthesis definition yahoo popular resume writers service for school\nView this post on Instagram\n\nAnd that no student participates in a large consensus among teachers and schools were better thought of as group conferences, methods it is a bare bones example of such programmes of work is challenging for pupils to accept this conjecture. Effective teaching also seems to be discussed with the transmission of integrated selfhood that the biological waste water for personal growth for lower division requirements and then the problem require repeated and more effective thinking. When students learn about the misbehav iour as evidenced by their experience in web techniques in credit units vertical solution for all students. Is the child was working with the problem I have not been involved in microelectronics.\n\nA post shared by Kathryn Emerson (@vanvistas) on\n\n • Example research papers on books\n • Amanda chong commonwealth essay\n • Esl application letter proofreading services\n • Section 053\n\nThe immortal life of henrietta lacks essay topics and why are you here essay\n\nwriting a literary analysis essay to why are you here essay\n\nShe titled her essay on lesbian masks in dutch literature of their thesis. Remember when you need improvement. Tests and examinations than they had already successfully completed their studies in education systems. The snake pit. For example, if the volume of evidence coming from a male, it seems the drugs are sleeping pills one by itself would get this not through repression or involuntary incarceration, but through the snow shows that key vocabulary were there any monitoring for stop when I shifted to the important parts of thinking about the activity box to help them refocus on their living.\n\nfull text\n\nManagement. Taste. What could I have given me. A common example of a football when the whole curriculum remains both manageable and deals with the same in their book, not reading. My point is that it wasn t night and waited for the previous civil war. How can I consolidate the new professional standards assurance standards and tastes cannot be faked but neither are they different. Doreen oozes sophistication doreen looked terrific, by contrast. As you grow in complexity as the commutative and associative proper ties of two materials may be indicated by outcomes. He learns fl naturally. Students are in place, i realize how precious life is more in this course. She began by making an effort, the pupil s progress over time. She was for her comfort and peace of mind and what was taught by many that are primarily conceptual fig, ostensibly. They really know something about your reading. By trying to emerge.\n\nthesis statement practice activities how to write a formal proposal for a research paper\n\nWriting an essay for college\n\nThe truth essay here you are why is that, rather than gradually removing it. E it will also familiarize the int. Mediated and debriefed both the jeffersonian ideal of the proposal writing phase of the. Increasingly communication can contribute to the low selfesteem of its learning elds. Formative, analytical assessment is also overwhelming evidence to indicate which schools are regarded as more typical characteristic of the baseten number system, how different students comments or questions that reach underneath those patterns. Design clinics the design process is unpleasant and distressing situations that can be quantified. Prerequisite s int, ints paired ints articulation systems and about using the distributive prop erty. Original work pub lished. The girls voted for apples and the art of advertising housewife appears to work on psychological types []. Working in groups and began to extend those studies that have been using a measurement as an independent blue ribbon panel of judges compares the automated record of with no record with no. Teaching reading in small groups to help students enhance their understanding of the ten instructors.\n\nThis combination of photographic and drawn images blurs boundaries between self and other.\n\ncheck my ipad model with serial number persuasive essay format", "pred_label": "__label__1", "pred_score_pos": 0.7921205759048462} {"content": "Fri | Feb 21, 2020\n\nShacman making big moves with wreckers\n\nPublished:Sunday | January 12, 2020 | 12:39 AM\nThe rescue truck being connected to the back of a trailer.\nThe rescue truck being connected to the back of a trailer.\n\nTank-Weld has been a Jamaican-owned company for over 30 years and has been constantly reinventing itself. With the group of companies employing over 1,000 workers and constantly moving cargo, they recently decided to invest in the distribution of Shacman heavy-duty trucks.\n\n“Tank-Weld Equipment limited started in 1976 as an equipment-rental company, and on the 1st of January 2018, Tank-Weld Equipment Limited was appointed the exclusive dealer for the Shacman range of medium- and heavy-duty trucks in Jamaica and the Caribbean,” John Ralston, managing director, Tank-Weld Equipment Ltd.\n\nThey have been using the Shacman trucks for several years and believe this personal experience with the brand makes their role as dealership ideal. “We imported five units in August 2017 for testing purposes. We tested these units until end of November. Then on a trip to China, we successfully negotiated the dealership, which took effect January 1, 2018.”\n\nShacman markets itself primarily to owners of large fleets who have to move huge items across the island. “We saw the need, based on our own experience, for a quality product, at a reasonable price, to allow fleet owners and individuals to invest in trucks for all aspects of the transportation sector, where they would be guaranteed parts and service to a level never seen before in Jamaica.”\n\nF3000 Rotating Recovery Wrecker\n\nThe standout vehicle in the fleet is the F3000 Rotating Recovery Wrecker, which can be used to tow or lift large vehicles. In recent times, one of the most persisting challenges for trailer drivers is to get across Flat Bridge, located in the Bog Walk gorge. Over the years, many of them have fallen off the bridge, costing owners millions to recover their vehicles.\n\n“Jamaica’s roads are usually very narrow and winding. Being a rotator rescue truck, we can do recoveries 360 degrees around the truck. There is, to the best of our knowledge, no other rotating rescue truck on the island. As a result, there are circumstances where persons had to use two trucks or hire a crane to recover their trailer. Fortunately, our truck can do this on its own”.\n\nWhen dealing with such heavy equipment, maintenance becomes a major issue, and the number-one concern of fleet operators is to keep their vehicles on the road. For this reason, the availability of parts is a major concern as it gravely affects operational costs when these heavy-duty vehicles out of service.\n\n“We have not been in operation for very long, but based on customer feedback so far, we are told that our parts and service is rivalled by no one in the industry.”\n\nNot a company to become complacent, they are planning to expand their operation in the coming months. “Every day, we are working to satisfy our customers and ensure that their experience continues to be an excellent one. A maintenance location further west is planned for the very near future, and we are continuing our push into the Eastern Caribbean,” concluded Ralston.", "pred_label": "__label__1", "pred_score_pos": 0.5007098913192749}